node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
8,886 | 4 | BlueBorne_(security_vulnerability):blueborne security vulnerability blueborne type security vulnerability bluetooth implementations android ios linux windows affects many electronic devices laptops smart cars smartphones wearable gadgets one example vulnerabilities first reported armis iot security firm 12 september 2017 according armis blueborne attack vector potentially affect devices bluetooth capabilities estimated 8.2 billion devices today 2017 blueborne security vulnerabilities first reported armis iot security firm 12 september 2017 2017 blueborne estimated potentially affect 8.2 billion devices worldwide many devices affected including laptops smart cars smartphones wearable gadgets google provides blueborne vulnerability scanner armis android procedures help protect devices blueborne security vulnerabilities reported september 2017 | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
1083,
1608,
3657,
8779,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
6797,
4240,
2709,
1688,
2717,
9375,
9904,
9395,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
9460,
7418,
281... | Test |
8,887 | 3 | Antarctic_Adventure:antarctic adventure gameplay similar sega turbo plays much slower pace features platform game elements penguin later named penta must reach next station time runs avoiding sea lions breaks ice throughout levels fish jump ice holes caught bonus points game like many early video games ending – player reaches last station game starts first level increased difficulty antarctic adventure followed sequel msx computer 1986 entitled penguin adventure addition penguin character penta son pentarou became mascot konami 1980s made appearances 10 games particularly note appearances parodius series shoot 'em games penta son pentarou appeared medal games like tsurikko penta balloon penta imo hori penta following 2002 released mobile 2001 released three mobiles like may 6 2003 titled part konami taisen colosseum following fishing game penta tsuri boken released i-revo screen game briefly seen introduction gradius rebirth released 2008 wii virtual console 2014 wii u virtual console msx version re-released windows store egg project november 25 2014 japan rumored coin-operated arcade version released konami 1984 existence actual example yet confirmed 1990 konami released japan handheld electronic game antarctic adventure although usually listed south pole literal translation japanese title 2014 antarctic adventure released special version colecovision flashback atgames available dollar general stores games pentarou makes fisherman | [
1763,
10695,
4524,
9006,
10576,
6449,
10931,
11478,
1626
] | Test |
8,888 | 3 | P.T.O.:p.t.o p.t.o pacific theater operations released japan console strategy video game released koei originally released pc-8801 1989 ported various platforms x68000 1990 msx2 1991 fm towns sega genesis super nes three 1992 players could assume one side pacific theater operations world war ii acting naval commander organizing fleets building new ships appropriating supplies fuel even engaging diplomacy countries player choose one several world war two battles simulate could control entire pacific campaign well japanese attack pearl harbor sequel p.t.o ii released koei 1993 teitoku ketsudan iii never released outside japan p.t.o iv released playstation 2 us europe players must choose one nine scenarios starting game first scenario negotiations breakdown long-term campaign player must win war mid-1941 war declared victory obtained controlling ports eliminating enemy ships scenarios begin midst certain major pacific conflict goal capture defend certain port sink protect number enemy ships scenario goal achieved player continue full campaign player option playing one two major world war ii pacific maritime powers united states allies japan axis countries begin allies two nations whatever point war gameplay begins time non-allied nations convinced ally side significant gifts diplomacy nations also break alliances poor diplomacy lead departure ships loaned navy instance united kingdom breaks allied forces us lose british ships fleet hermes countries behave historically example italy cease member axis 1943 due allied invasion countries available allies power starts control number pacific bases depending scenario begins focus long-term campaign capture enemy territories defending one reducing number ports enemy control zero territories produce fuel materials power controls fuel refers oil ships supplies soldiers materials refer ores metals used base repair ship repair construction new warships money used fund construction aircraft transports fund improvement technologies capturing territories thus increases resources available player denying use enemy power one home port newly manufactured ships aircraft stationed upon completion turn aircraft fuel materials assigned base however depending safety distance trade route resources may arrive certain ports capable 'urgent repair meaning affect small repairs ships docked ports capability control key regions crucial order maintain fighting capabilities one fleet sea less turnaround time ship repair ships damaged combat p.t.o faithfully recreates many actual battleships available pacific war displays ship icon relative ships ships given several attributes fortitude speed anti-air capability anti-ship capability ships also fitted radar search gunnery rockets scouts marines land invasion ships also given overall 'luck rating 1 99 ships survived many conflicts history like enterprise luck rating 99 several types warship available dreadnought battleships battleships cruisers fleet aircraft carriers light carriers destroyers submarines power starts certain number ships type number ships construction usually launching around historical commission date additional ships constructed replace ships previously lost battle either player prior scenario start date ship construction scheduled 6–24 months closer launch date industrial power expended construction materials consumed well dependent type hull built ship ratings chosen design ship class chosen construction cosmetic affect actual ship limitations attributes like actual hull type ships organized fleets comprise 16 ships 16 fleets arranged inactive ships home port one fleet side engage battle one time fleets must attack enemy succession rather fleets rating morale fatigue 0 99 morale goes victories shore leave defeats flagship lost also raised emergency banquet sea fatigue goes every battle crew infected plague ships also individual levels crew experience value starts high japanese low us experience levels gradually increase combat conducting training drills another type ship constructed transports used carrying additional fuel extend fleet range transporting resources territories home ports additional non-controlled shipping fleets constantly active game though displayed tactical maps transport fleets supplying bases protected unlisted destroyers cruisers engage enemy fleet following types aircraft immediately available fighters bombers scouts later game technology levels advanced jet fighters long-range bombers become available aircraft carriers fitted allow jets technology levels sufficient modified carrier carry jet fighters normal fighters long-range bombers launched land bases aircraft deployed bases aircraft carriers although ship types allow scouts launched via catapult aircraft placed bases take defensive role attacking fleet aircraft used scout enemy fleets day enemy fleets found land-based aircraft sortie attack naval fleet begins certain number fictional fleet commanders depending scenario chosen commanders placed command 16 fleets player arranges player creates commanders set rolled scores certain attributes – air command ability sea command ability bravery overall war ability scores range 01 99 total four scores 102 air sea abilities affect actual combat performance ships planes commander control bravery affects commander decision making fleet ai control war overall rating useful comes convincing army military officials agree submissions objectives budgeting industrial production computer gaming world 1993 approved genesis version p.t.o suitable core group strategy wargamers normally play videogames criticizing inadequate documentation reported game randomized campaigns provided 200-300 hours play time—more comparatively priced cartridge magazine favorably concluded p.t.o establishes new trend video gaming | [
10316
] | Test |
8,889 | 2 | Time_Sharing_Operating_System:time sharing operating system time sharing operating system tsos discontinued operating system rca mainframe computers spectra 70 series tsos originally designed 1968 spectra 70/46 modified version 70/45 tsos quickly evolved virtual memory operating system vmos 1970 vmos continued supported later rca 3 rca 7 computer systems rca computer business 1971 sold computer business sperry corporation sperry renamed tsos vs/9 continued market early 1980s mid seventies enhanced version tsos called bs2000 offered german company siemens sperry – unisys – discontinued vs/9 bs2000 variant called bs2000/osd still offered fujitsu siemens computers used mainframe customers primarily europe name suggests tsos provided time sharing features beyond provided common user interface time sharing batch big advantage ibm os/360 successors mvs os/390 z/os | [
6529,
2179,
10499,
10883,
394,
1147,
1804,
3978,
6797,
7053,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
9887,
10016,
9762,
421,
5158,
10235,
2345,
7983,
3248,
7217,
11184,
6837,
823,
9784,
4409,
10809,
6... | Test |
8,890 | 3 | Single-core:single-core single-core processor microprocessor single core chip running single thread one time term became common emergence multi-core processors several independent processors single chip distinguish non-multi-core designs example intel released core 2 solo core 2 duo one would refer former 'single-core variant microprocessors prior multi-core era single-core class many-core processors follows multi-core progression showing increasing parallelism time processors remained single-core impossible achieve performance gains increased clock speed transistor count allowed moore law diminishing returns increasing depth pipeline increasing cpu cache sizes adding execution units | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
4286,
2241,
2243,
993... | Test |
8,891 | 7 | Workboard:workboard workboard inc. enterprise saas company whose strategy results platform helps large organizations align quickly results workboard pioneered active strategy management category leveraging powerful okr technique distinctive enterprise-class technology workboard based redwood city california founded 2013 deidre paknad daryoush paknad deidre paknad history founding companies workboard including pss systems acquired ibm 2010 working ibm thought idea workboard dealing inefficiency tenure starting founding 2013 paknad co-founder daryoush paknad focused vq velocity quotient define speed organization able accomplish goal 2014 workboard secured seed money several venture capital firms including opus capital granite ventures crosslink capital announced series round december 2017 led floodgate microsoft ventures arjun chopra priya sapraisad joined board hundreds organizations use workboard including microsoft reliance industries transamerica samsung workboard also provides world okr coach certification program certified 300+ coaches to-date certified coaches experts implementing okrs organization | [] | None |
8,892 | 7 | CDDLM:cddlm cddlm configuration description deployment lifecycle management specification global grid forum standard management deployment configuration grid service lifecycles inter-organization resources specification based component documents development api done global grid forum open standard model ietf standard development originally edited d. bell t. kojo p. goldsack s. loughran d. milojicic s. schaefer j. tatemura p. toft system administration distributed environment diverse hardware software patch level imposed user requirements makes ability deploy manage describe services software configuration difficult within grid difficulty complicated need similar service end points possibly heterogeneous architectures grid service requests may require configuration changes standard provided framework described language methods ability describe system configuration move system services software towards desired configuration endpoints furthermore served first real attempt address system administration issues within grid cddlm grids cfengine servers | [
7935,
9948,
479
] | Test |
8,893 | 3 | PowerBook_Duo:powerbook duo powerbook duo line small subnotebooks manufactured sold apple computer 1992 1997 compact companion powerbook line improving upon powerbook 100 portability immediate predecessor apple third-smallest laptop duo came seven different models duo 210 230 250 270c 280 280c 2300c 210 230 earliest 2300c final incarnation entire line dropped early 1997 weighing mere slightly smaller sheet paper thick lightest smallest apple powerbooks time remains one apple smallest notebooks ever produced macbook air retina macbook pro retina macbook weigh less though wider deeper considerably thinner duo common original macbook air included one usb 2.0 port one video port requiring adapter one speaker port ability expansion powerbook duo line replaced powerbook 2400 slightly larger size duos still fifth-smallest behind 12-inch powerbook g4 succeeded fourth-smallest although featured much onboard functionality lacked docking ability duo line offered ultraportable design light functional travel expandable via unique docking connector however certain compromises made achieve level portability duo series used 88 standard desktop-sized keyboard criticized difficult type likewise trackball reduced size even used powerbook 100 usable port came standard duo dual printer/modem eia-422 serial port slot expensive optional internal 14.4 express modem provision built-in ethernet somewhat limited configuration meant way move data laptop stock configuration without purchasing additional accessories via relatively slow appletalk connection practical event hard drive problems compensating limitations initial duo offering provided considerably higher ram limit 24 mb compared 100 series 14 mb standard 80 mb hard drive versus 100 40 mb drive debut year duo offered passive matrix display mid-level high-end models contrast high end 100-series line duos shared processors powerbook 170 180 crisp active matrix displays already great demand lower-powered models passive matrix displays following year apple replaced earlier models active matrix display color active matrix display latter becoming de facto standard powerbook line respective duo models easily differentiated display method processor features identical 2xx duos powered either motorola 68030 68lc040 processors ranging 25-33 mhz apple debuted next-generation powerpc processors 1994 took nearly two years first powerpc duo 2300c debut original powerpc 601 like original 68040 produced much heat consumed much power apple use laptop end 1995 efficient powerpc 603e developed featured duo 2300c full-size companion powerbook 5300 series powerpc 603e designed 64-bit bus engineered apple run older 32-bit bus maintain compatibility duo docks led poor system video performance powerbook duos lacked common ports featuring one internal printer/modem serial port optional fax/modem card port place docking ability accomplished via unique 156-pin processor direct slot pds giving docks full access duo central processing unit cpu data buses several dock options offered apple third parties largest expensive dock powerbook duo form factor offered exclusively apple unlike docks port replicators plugged back laptops duo dock pulled laptop inside dock metal plastic case via internal sliding mechanism similar vhs player dock turned powerbook duo full-size ac-powered fully functional desktop computer standard ports like desktop computer dock could physically support heavy high-resolution crt display top duo dock included floppy drive side two nubus expansion slots optional floating-point unit fpu level 2 cache slot vram enable colors higher resolutions space second hard drive original duo dock replaced duo dock ii added aaui networking compatibility newer color-screen powerbook duos replacement lid offered allow use thicker color duos original duo dock dock ii followed duo dock plus identical duo dock ii lacked fpu level 2 cache—which compatible 68lc040-processor duo 280 powerpc-processor duo 2300c laptop lcd display obviously could opened inside dock additional nubus video cards could installed drive three monitors mini dock port expander powerbook duo popularly offered many third-party manufacturers apple attached powerbook duo could plugged various standard desktop devices including scsi apple desktop bus adb serial floppy disk external speakers external display type dock also allowed duo internal lcd battery used third-party contributions mini dock added variety specialized custom options including ethernet connectivity ntsc pal video ports significant difference docks full desktop configuration lack custom pds nubus expansion slots included standard desktop macs shortfall made task-specific third-party dock offerings type dock manufactured apple many third parties gave powerbook duo three extra ports minimal configuration examples include floppy scsi video ethernet docks typically included one adb port well least expensive basic docks type dock allowed duo internal lcd used well could run duo internal battery reduced amount time popular due minimal impact accessories must carried duo offered practical alternative emergency hard disk software situations task-specific needs 2300 last apple product carry vestige snow white design language apple phasing since 1990 drawing heavily upon improvements made original powerbook 140 design duo series continues many styling traits powerbook 100 approximately equivalent size weight addition snow white features duo takes 100 radius curves step along display top front sides also heavily mirrored various docks penlite early tablet computer prototyped apple computer 1993 around time apple newton pda rather complete computer project canceled 1994 due similarity newton penlite based powerbook duo meant tablet-style addition stylus input device designed compatible powerbook duo docks accessories ran standard classic mac os one stylish iconic laptops available time duo widely used advertising film television | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
576,
1090,
4180,
10838,
10840,
3167,
9312,
8806,
6258,
5235,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
7305,
8842,
6283,
7824,
147,
4244,
7830,
6807,
4258,
7842,
... | Validation |
8,894 | 9 | Raster_Document_Object:raster document object .rdo raster document object file format native format used xerox docutech range hardware software underpins company xerox document demand xdod systems therefore significant file format print demand market sector along postscript pdf rdo metafile format based open document architecture oda specifications xerox rdo implementation description control information stored within rdo file raster images stored separately usually separate folder tiff files rdo file dictates bitmap images used page document placed approach advantages disadvantages monolithic approach used pdf disadvantages rdo largely proprietary format multi-file approach means file management orphan control issue one tell computer file system whether files required document print present correct rdo favor multi-file approach allows networked device load small rdo file request larger bitmap files necessary allows full job specification loaded installed network almost immediately larger bitmap files transferred needed allowing flexibility managing network traffic loading tiff file format highly portable xerox makeready software supplied xdod systems readily imports export postscript files however xerox demand systems typically require document library stored rdo tiff files non-xerox applications read rdo structures directly | [
8628
] | None |
8,895 | 2 | CSR_Classics:csr classics csr classics free-to-play drag-racing game boss alien collaboration mad atom games published naturalmotion games game player takes role new racer looking make name city resembling las vegas ruled five racing crews story line consists racer agent trying prove seemingly corrupt mr. baladin guilt worked way business magnate behind scenes csr classics follow-up title successful csr racing released october 2013 ios end march 2014 gradually released android via google play csr classics features game mechanics similar sister title features classic race cars ranging 1950s 1980s late march 2018 announced online features csr classics would discontinued may 1 2018 online features later discontinued update may 21 2018 player starts found agent recruits player player goes tutorial game player receives sum money sufficient purchase first vehicle afterwards meeting race official csr classics universe player guided various events throughout game starts challenging first crew authentics led marco player starts challenge marco personally defeating crew members agent approaches player explains suspicion mr. baledin recently became top crew leader purchased valentine massive casino agent suspicion mr. baledin corrupt crew leaders involvement reign power agent reveals marco tearaway child thief also romantic affair another crew leader kandy however ties mr. baledin yet known player proceeds defeat marco authentics progressing tier 2 tier 2 player proceeds challenge thrillers commandeered olivia player continues challenge olivia agent tells player olivia background olivia runs car show name experienced severe financial troubles came mr. baledin loan however loan little help financial situation olivia car show became debt mr. baledin olivia associates agreed race mr. baledin make loss player defeats olivia thrillers moving onto tier 3 player starts challenging lord aziz high rollers tier 3 crew beaten lord aziz crew starting challenge lord aziz agent informs player lord aziz lord aziz inherited wealth father recently passed large gambler lord aziz lost father wealth playing baccarat blamed mr. baledin rigged baccarat games despite working mr. baledin rule lord aziz highly despises mr. baledin player defeats lord aziz high rollers made tier 4 player next crew defeat tier 4 crew lucky 7 kandy ringleader player defeats kandy crew members proceeds challenge agent shines light upon kandy despite romantic relationship marco kandy seen multiple times flirting mr. baledin later revealed marco kandy performed heist valentine mr. baledin caught duo instead alerting authorities mr. baledin blackmailed kandy marco working player defeats kandy last time proceeds tier 5 tier 5 player starts challenging house mr. baledin rule player defeats mr. baledin crew starts challenge leader csr classics universe agent informs player plan arrest mr. baledin player would distract baledin continuously racing allowing authorities prepare trap valentine mr. baledin allowing easy arrest defeating mr. baledin third final time mr. baledin shown custody agent talks player informing csr classics league unanimously elected marco become new leader league vowing ameliorate player also congratulated former crew leaders victory secretly despised mr. baledin however player shown discussion jailed mr. baledin formerly unknown client discuss plan executed perfectly revealed marco end line actually behind business csr classics single-player component split five tiers tier introducing progressively faster opposition vehicles player gets challenge boss level player must first beat boss crew move new tier player must race beat crew boss level beating boss level three times player challenged high-stakes rematch player wins race awarded boss car car one tier tier however player loses must give back prize gold previous boss race unlike traditional racing game csr classics feature steering braking acceleration controls instead game focuses timing gear changes use nitrous upgrade tapping screen similar fashion rhythm game player comes buy car choose unloved loved cars unloved cars upgrades usually able purchased via main form in-game currency whereas loved cars come equipped several upgrades always mandate usage valuable in-game currency loved cars also multiplayer via prize cars building car pieces purchasing loved version reduced price races take place across track extending quarter mile events split several categories | [] | Test |
8,896 | 3 | Macintosh_Color_Classic:macintosh color classic macintosh color classic sold macintosh colour classic markets personal computer designed manufactured sold apple computer inc. february 1993 may 1995 all-in-one design integrated 10″ sony trinitron display supporting thousands colors video memory upgrade 512×384 pixel resolution color classic final model original compact family macintosh computers replaced larger-display macintosh lc 500 series power macintosh 5200 lc color classic motorola 68030 cpu running 16 mhz logic board similar macintosh lc ii like macintosh se se/30 color classic single expansion slot lc-type processor direct slot pds incompatible se slots primarily intended apple iie card primary reason color classic switchable 560x384 display essentially quadruple iie 280x192 high-resolution graphics offered education models lcs card allowed lcs emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition apple ii models macintoshes cards cpu accelerators ethernet video cards also made available color classic pds slot color classic shipped apple keyboard known apple keyboard ii m0487 featured soft power switch keyboard mouse supplied apple mouse known apple desktop bus mouse ii m2706 slightly updated model color classic ii featuring macintosh lc 550 logicboard 33 mhz processor released japan canada international markets 1993 sometimes performa 275 versions color classic 256 kb onboard vram expandable 512 kb plugging 256 kb vram simm onboard 68-pin vram slot name color classic printed directly front panel separate plastic insert enabled alternative spelling colour classic colour classic ii used appropriate markets color classic users upgraded machines motherboards performa/lc 575 units mystic upgrade others put entire performa/lc/quadra 630 successor innards takky upgrade based takky way upgrade color classic g3 cpu another common modification unit change display allow 640 × 480 resolution common requirement many programs especially games run introduced february 1 1993 introduced february 10 1993 introduced october 1 1993 introduced october 21 1993 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
4807,
4810,
... | Test |
8,897 | 4 | Dmailer_Backup:dmailer backup dmailer backup developed dmailer backup software microsoft windows os x operating systems provisory could back restore data computer two modes application automatic mode launched backup user data documents video music custom mode choose data would backed software included online service called dmailer online 2 gb free lifetime allowed user send online existing backup app service suspended data retrieved anymore version 3.0 application free use without license costs | [
3366,
2280,
1801,
6797,
1358,
7983
] | None |
8,898 | 3 | Canon_Cat:canon cat canon cat task-dedicated desktop computer released canon inc. 1987 price surface unlike dedicated word processors popular late 1970s early 1980s far powerful incorporates many unique ideas data manipulation canon cat primarily creation jef raskin originator macintosh project apple leaving company 1982 began designing new computer closer original vision inexpensive utilitarian people computer byte 1987 described cat spiritual heir macintosh features text user interface making use mouse icons graphics data seen long stream text broken several pages instead using traditional command line interface menu system cat makes use special keyboard commands activated holding use front key pressing another key cat also uses special leap keys held allows user incrementally search strings characters machine hardware consists 9-inch 229 mm black-and-white monitor single 3½-inch 256 kb floppy disk drive ibm selectric–compatible keyboard uses motorola 68000 cpu like macintosh lisa atari st amiga running 5 mhz 256 kb ram internal 300/1200 bit/s modem setup user preference data stored 8 kb non-volatile battery backed-up ram cat array i/o interfaces encompasses one centronics parallel port one rs-232c serial port db-25 two rj11 telephone jacks modem loop total weight system 17 pounds 7.7 kg extensive range application software built 256 kb rom standard office suite programs communications 90,000 word spelling dictionary user programming toolchains forth assembly language text-only machine cat includes graphics routines rom well connectors mouse pointing device never used defunct software project called archy initiated raskin develop similar yet even capable system current computing systems project designed eventually replace current software user interfaces | [
3904,
1121,
7041,
7269,
780,
2383,
1776,
7983,
4114,
2843,
477
] | Test |
8,899 | 3 | PowerPC_applications:powerpc applications microprocessors belonging powerpc architecture family used numerous applications apple computer dominant player market personal computers based powerpc processors 2006 switched intel-based processors apple used powerpc processors power mac imac emac powerbook ibook mac mini xserve classic macintosh accelerator boards using powerpcs made daystar digital newer technology sonnet technologies totalimpact several attempts create powerpc reference platforms computers ibm others ibm prep powerpc reference platform system standard intended ensure compatibility among powerpc-based systems built different companies ibm pop powerpc open platform open free standard design powerpc motherboards pegasos open desktop workstation odw open free standard design powerpc motherboards based marvell discovery ii mv64361 chipset prep standard specifies pci bus also support isa microchannel pcmcia prep-compliant systems able run os/2 aix solaris taligent windows nt chrp common hardware reference platform open platform agreed apple ibm motorola chrp systems able run mac os os/2-ppc windows nt aix solaris novell netware chrp superset prep powermac platforms power.org defined power architecture platform reference papr provides foundation development computers based linux operating system list computers based powerpc ibm apple cray sony ibm released personal digital assistant pda reference platform arctic based powerpc 405lp low power project discontinued ibm sold powerpc 4xx design amcc three major seventh-generation game consoles contain powerpc-based processors sony playstation 3 console released november 2006 contains cell processor including 3.2 ghz powerpc control processor eight closely threaded dsp-like accelerator processors seven active one spare microsoft xbox 360 console released 2005 includes 3.2 ghz custom ibm powerpc chip three symmetrical cores core smp-capable two threads nintendo wii console also released november 2006 contains extension powerpc architecture found previous system gamecube ibm sony zarlink semiconductor released several set top box stb reference platforms based ibm powerpc 405 cores ibm set top box stb system-on-chip soc | [
291,
4743,
4264,
5384,
5642,
8937,
5339,
3472,
6834,
9302,
823,
3323,
8700,
3677
] | Validation |
8,900 | 4 | Hitachi:hitachi hitachi listed tokyo stock exchange constituent nikkei 225 topix indices ranked 38th 2012 fortune global 500 129th 2012 forbes global 2000 hitachi founded 1910 electrical engineer namihei odaira ibaraki prefecture company first product japan first induction motor initially developed use copper mining company began in-house venture fusanosuke kuhara mining company hitachi ibaraki odaira moved headquarters tokyo 1918 odaira coined company toponymic name superimposing two kanji characters hi meaning “ sun ” tachi meaning “ rise. ” world war ii significant impact company many factories destroyed allied bombing raids discord war founder odaira removed company hitachi reconstruction efforts war hindered labor strike 1950 company saw increase business korean war due defense contracts offered american military meanwhile hitachi went public 1949 hitachi america ltd. established 1959 hitachi europe ltd. established 1982 march 2011 hitachi agreed sell hard disk drive subsidiary hgst western digital wd combination cash shares worth us 4.3 billion due concerns duopoly wd seagate technology eu commission federal trade commission hitachi 3.5 hdd division sold toshiba transaction completed march 2012 january 2012 hitachi announced would stop producing televisions japan september 2012 hitachi announced invented long-term data solution quartz glass capable preserving information millions years october 2012 hitachi agreed acquire united kingdom-based nuclear energy company horizon nuclear power plans construct six nuclear power plants uk e.on rwe £700 million november 2012 hitachi mitsubishi heavy industries agreed merge thermal power generation businesses joint venture owned 65 mitsubishi heavy industries 35 hitachi joint venture began operations february 2014 october 2015 hitachi completed deal johnson controls form joint-venture would takeover hitachi hvac business hitachi maintained 40 stake resulting company johnson controls-hitachi air conditioning may 2016 hitachi announced investing 2.8 billion iot interests february 2017 hitachi honda announced partnership develop produce sell motors electric vehicles march 14 2018 zoomdata announced partnership hitachi ins software help develop big data analytics market japan december 2018 hitachi ltd. announced would take abb ltd. power grid division 6.4 billion note new product hitachi called memory glass introduced 2015 high density information storage medium utilizing laser etched/readable fused quartz following fukushima daiichi nuclear disaster 2011 extended temporary closure japanese nuclear plants hitachi nuclear business became unprofitable 2016 hitachi ceo toshiaki higashihara argued japan consider merger various competing nuclear businesses hitachi taking 2016 estimated ¥65 billion write-off value silex technology laser uranium enrichment joint venture general electric 2019 hitachi suspended abwr development british subsidiary horizon nuclear power provide adequate economic rationality private enterprise proceed hitachi communication technologies america provides communications products services telecommunications cable tv utility enterprise industrial markets hitachi consulting international management technology consulting firm headquarters dallas texas founded 2000 currently employs approximately 6,500 people across united states japan united kingdom netherlands india spain portugal germany china brazil vietnam hitachi vantara wholly owned subsidiary hitachi provides hardware software services help companies manage digital data flagship products virtual storage platform enterprise storage hitachi unified storage vm large sized companies hitachi unified storage small mid-sized companies hitachi content platform archiving cloud architecture hitachi command suite storage management hitachi truecopy hitachi universal replicator remote replication hitachi nas platform since september 19 2017 hitachi data systems hds become part hitachi vantara new company unifies operations pentaho hitachi data systems hitachi insight group company name hitachi data systems hds logo longer used market hitachi manufactures many types electronic products including tvs camcorders projectors recording media brand name hitachi provides various defense related/derived products services among things hitachi metals supplies materials aircraft engines fuselage components e.g landing gear along finished components aerospace applications also provides materials components tools automotive electronics industries hitachi koki manufactures many types tools including chainsaws drills woodworking power tools branded koki tanaka march 1 2016 hitachi koki acquired german power tools manufacturer metabo chequers capital hitachi plant technologies ltd. along subsidiaries engages design development manufacture sale servicing execution social industrial infrastructure machinery mechatronics air-conditioning systems industrial plants energy plant equipment asia internationally hitachi rail rolling stock manufacturing division hitachi mitsubishi heavy industries agreed cooperate field international intra-city railway systems 2010 hitachi markets general-purpose train known a-train uses double-skin friction-stir-welded aluminium body construction a-train concept customised form different types trains ranging high-capacity commuter metro trains automated 3000 series train nanakuma line fukuoka city subway limited express e257 series jointly produced tokyu corporation high-speed trains class 395 trains southeastern uk made trains domestic international operators alike among significant orders winning tender uk department transport intercity express programme june 2008 hitachi many products include designing manufacturing many shinkansen models including n700 series shinkansen exported thsr 700t taiwan high speed rail company also markets driverless metro system developed hitachi rail italy pioneered copenhagen metro straddle beam monorail technology known hitachi monorail form basis trains operating world longest monorail system currently part chongqing rail transit network february 24 2015 hitachi agreed purchase italian rolling stock manufacturer ansaldobreda acquire finmeccanica stake ansaldo sts railway signaling division finmeccanica purchase completed later year point company renamed hitachi rail italy since hitachi obtained majority stake ansaldo sts hitachi solutions america consulting firm systems integrator focusing primarily microsoft dynamics firm utilizes ax crm dynamics family provide customers broad base solutions company international subsidiaries residing united kingdom canada philippines thailand japan india hitachi solutions america acquired ignify – another leading microsoft dynamics solution providers december 2015 hitachi solutions 2000 microsoft dynamics consultants worldwide acquisition ignify hitachi works oldest member hitachi group consists three factories kaigan works yamate works rinkai works yamate works oldest three factories founded 1910 namihei odaira electrical equipment repair manufacturing facility facility named hitachi hitachi mine near hitachi ibaraki regarded ancestral home hitachi ltd many management trainees intern hitachi works permanently assigned hitachi divisions senior management personnel often participants rotations hitachi works years career develops towards eventual head office stature result many senior managers hitachi ltd passed hitachi works spin-off entities hitachi works include hitachi cable 1956 hitachi canadian industries 1988 hitachi global storage technologies hitachi gst manufactures computer hard drives 3 main ranges hitachi travelstar hitachi deskstar hitachi ultrastar march 7 2011 hitachi global storage technologies purchased western digital corporation 3.5 billion cash 750 million western digital common stock hitachi printing systems established 1980 acquired ricoh 2004 becoming ricoh printing systems ltd. hitachi joint venture kerala public sector company telk 1963 1989 production electrical equipment collaboration hitachi telk first company manufacture 400kv transformers india telk transformers well known quality great demand indian power system august 2011 announced hitachi would donate electron microscope five universities indonesia university north sumatra medan indonesian christian university jakarta padjadjaran university bandung general soedirman university purwokerto muhammadiyah university malang hitachi group | [
7297,
11395,
6148,
9351,
3722,
7053,
1298,
5523,
7068,
7709,
10140,
9375,
10658,
8355,
9894,
4011,
2861,
9006,
9137,
2995,
7607,
1083,
10811,
8900,
1480,
2383,
4563,
7638,
1376,
2273,
7269,
3431,
3304,
3560,
6248,
9964,
8944,
6003,
1141,
... | None |
8,901 | 7 | MOSIX:mosix mosix proprietary distributed operating system although early versions based older unix systems since 1999 focuses linux clusters grids mosix cluster/grid need modify link applications library copy files login remote nodes even assign processes different nodes – done automatically like smp mosix researched developed since 1977 hebrew university jerusalem research team prof. amnon barak far ten major versions developed first version called mos multicomputer os 1981–83 based bell lab seventh edition unix ran cluster pdp-11 computers later versions based unix system v release 2 1987–89 ran cluster vax ns32332-based computers followed bsd/os-derived version 1991–93 cluster 486/pentium computers since 1999 mosix tuned linux x86 platforms second version mosix called mosix2 compatible linux-2.6 3.0 kernels mosix2 implemented os virtualization layer provides users applications single system image linux run-time environment allows applications run remote nodes run locally users run regular sequential parallel applications mosix transparently automatically seek resources migrate processes among nodes improve overall performance mosix2 manage cluster multicluster grid well workstations shared resources flexible management grid allows owners clusters share computational resources still preserving autonomy clusters ability disconnect nodes grid time without disrupting already running programs mosix grid extend indefinitely long trust cluster owners must include guarantees guest applications modified running remote clusters hostile computers connected local network nowadays requirements standard within clusters organizational grids mosix2 run native mode virtual machine vm native mode performance better requires modifications base linux kernel whereas vm run top unmodified operating system supports virtualization including microsoft windows linux mac os x. mosix2 suitable running compute intensive applications low moderate amount input/output i/o tests mosix2 show performance several applications 1 gbit/s campus grid nearly identical single cluster mosix suitable running hpc applications low moderate amount i/o tests mosix show performance several applications 1 gbit/s campus grid nearly identical single cluster particularly suitable examples mosix4 released july 2014 version 4 mosix n't require kernel patching mosix became proprietary software late 2001 moshe bar forked last free version started openmosix project february 10 2002 july 15 2007 bar decided end openmosix project effective march 1 2008 claiming increasing power availability low cost multi-core processors rapidly making single-system image ssi clustering less factor computing plans reconfirmed march 2008 linuxpmi project continuing development former openmosix code | [
8992,
5506,
5956,
330,
5452,
6797,
7983,
499,
11604,
118,
823,
2264
] | Test |
8,902 | 2 | Data_General_RDOS:data general rdos data general rdos real-time disk operating system real-time operating system released 1970 software sold bundled company popular nova eclipse minicomputers rdos capable multitasking ability run 32 called tasks similar current term threads simultaneously two grounds foreground background within 64 kb memory space later versions rdos compatible data general 16-bit eclipse minicomputer line cut-down version rdos without real-time background foreground capability still capable running multiple threads multi-user data general business basic called data general diskette operating system dg-dos somewhat confusingly simply dos another related operating system rtos real-time operating system diskless environments rdos micronova-based micro products micro-minicomputers sometimes called dg/rdos rdos superseded early 1980s data general aos family operating systems including aos/vs mp/aos mp/os smaller systems following list commands supported rdos/dos cli late 1970s data general sued sherman clayton antitrust acts competitors practice bundling rdos data general nova eclipse minicomputer data general introduced data general nova company called digidyne wanted use rdos operating system hardware clone data general refused license software claimed bundling rights 1985 courts including united states court appeals ninth circuit ruled data general case called digidyne v. data general supreme court united states declined hear data general appeal although justices white blackmun would heard precedent set lower courts eventually forced data general license operating system restricting software data general hardware illegal tying arrangement 1999 data general taken emc corporation | [
512,
2179,
6675,
9366,
8729,
8999,
2345,
7983,
5046,
7483,
6207,
4423,
5969,
3418,
477,
96,
5359,
5363,
3960
] | Train |
8,903 | 8 | Keyword_Tool_(software):keyword tool software keyword tool free saas product uses google autocomplete search engines generate relevant long-tail keywords related keywords topic keyword tool launched middle 2014. created artem galimov leow kah thong started providing keywords 83 languages autocomplete 194 google domains 2015 keyword tool participated startup chile 13th generation program keywordtool helps user locate long-tail related keywords relies google autocomplete feature giving quick access popular search terms scrapes keyword suggest ideas google youtube bing amazon ebay app store | [
467,
9063
] | Train |
8,904 | 4 | Common_Criteria:common criteria common criteria information technology security evaluation referred common criteria cc international standard iso/iec 15408 computer security certification currently version 3.1 revision 5 common criteria framework computer system users specify security functional assurance requirements sfrs sars respectively security target st may taken protection profiles pps vendors implement make claims security attributes products testing laboratories evaluate products determine actually meet claims words common criteria provides assurance process specification implementation evaluation computer security product conducted rigorous standard repeatable manner level commensurate target environment use common criteria evaluations performed computer security products systems evaluation process also tries establish level confidence may placed product security features quality assurance processes far pps evaluated sts/certified products components e.g. firewalls operating systems smart cards common criteria certification sometimes specified procurement standards containing e.g. interoperation system management user training supplement cc product standards examples include iso/iec 17799 properly bs 7799-1 iso/iec 27002 german details cryptographic implementation within toe outside scope cc instead national standards like fips 140-2 give specifications cryptographic modules various standards specify cryptographic algorithms use recently pp authors including cryptographic requirements cc evaluations would typically covered fips 140-2 evaluations broadening bounds cc scheme-specific interpretations national evaluation schemes phasing eal-based evaluations accept products evaluation claim strict conformance approved pp united states currently allows pp-based evaluations canada process phasing eal-based evaluations cc originated three standards cc produced unifying pre-existing standards predominantly companies selling computer products government market mainly defence intelligence use would need evaluated one set standards cc developed governments canada france germany netherlands uk u.s. testing laboratories must comply iso/iec 17025 certification bodies normally approved iso/iec 17065 compliance iso/iec 17025 typically demonstrated national approval authority characteristics organizations examined presented iccc 10 well common criteria standard also sub-treaty level common criteria mra mutual recognition arrangement whereby party thereto recognizes evaluations common criteria standard done parties originally signed 1998 canada france germany united kingdom united states australia new zealand joined 1999 followed finland greece israel italy netherlands norway spain 2000 arrangement since renamed common criteria recognition arrangement ccra membership continues expand within ccra evaluations eal 2 mutually recognized including augmentation flaw remediation european countries within former itsec agreement typically recognize higher eals well evaluations eal5 tend involve security requirements host nation government september 2012 majority members ccra produced vision statement whereby mutual recognition cc evaluated products lowered eal 2 including augmentation flaw remediation vision indicates move away assurance levels altogether evaluations confined conformance protection profiles stated assurance level achieved technical working groups developing worldwide pps yet transition period fully determined july 2 2014 new ccra ratified per goals outlined within 2012 vision statement major changes arrangement include common criteria generic directly provide list product security requirements features specific classes products follows approach taken itsec source debate used prescriptive approach earlier standards tcsec fips 140-2 common criteria certification guarantee security ensure claims security attributes evaluated product independently verified words products evaluated common criteria standard exhibit clear chain evidence process specification implementation evaluation conducted rigorous standard manner various microsoft windows versions including windows server 2003 windows xp certified security patches address security vulnerabilities still getting published microsoft windows systems possible process obtaining common criteria certification allows vendor restrict analysis certain security features make certain assumptions operating environment strength threats faced product environment additionally cc recognizes need limit scope evaluation order provide cost-effective useful security certifications evaluated products examined level detail specified assurance level pp evaluations activities therefore performed certain depth use time resources offer reasonable assurance intended environment microsoft case assumptions include a.peer systems toe communicates assumed management control operate security policy constraints toe applicable networked distributed environments entire network operates constraints resides within single management domain security requirements address need trust external systems communications links systems assumption contained controlled access protection profile capp products adhere based assumptions may realistic common use general-purpose operating systems claimed security functions windows products evaluated thus considered secure assumed specified circumstances also known evaluated configuration whether run microsoft windows precise evaluated configuration apply microsoft security patches vulnerabilities windows continue appear security vulnerabilities exploitable product evaluated configuration product common criteria certification voluntarily withdrawn vendor alternatively vendor re-evaluate product include application patches fix security vulnerabilities within evaluated configuration failure vendor take either steps would result involuntary withdrawal product certification certification body country product evaluated certified microsoft windows versions remain eal4+ without including application microsoft security vulnerability patches evaluated configuration shows limitation strength evaluated configuration august 2007 government computing news gcn columnist william jackson critically examined common criteria methodology us implementation common criteria evaluation validation scheme ccevs column executives security industry researchers representatives national information assurance partnership niap interviewed objections outlined article include 2006 research paper computer specialist david a. wheeler suggested common criteria process discriminates free open-source software foss -centric organizations development models common criteria assurance requirements tend inspired traditional waterfall software development methodology contrast much foss software produced using modern agile paradigms although argued paradigms align well others attempted reconcile paradigms political scientist jan kallberg raised concerns lack control actual production products certified absence permanently staffed organizational body monitors compliance idea trust common criteria it-security certifications maintained across geopolitical boundaries throughout lifetime cc universally adopted even creator nations particular cryptographic approvals handled separately canadian us implementation fips-140 cesg assisted products scheme caps uk uk also produced number alternative schemes timescales costs overheads mutual recognition found impeding operation market early 2011 nsa/css published paper chris salter proposed protection profile oriented approach towards evaluation approach communities interest form around technology types turn develop protection profiles define evaluation methodology technology type objective robust evaluation concern may negative impact mutual recognition sept 2012 common criteria published vision statement implementing large extent chris salter thoughts previous year key elements vision included | [
10752,
3594,
5136,
9745,
8725,
5149,
9245,
5674,
3126,
1079,
10813,
62,
2558,
1610,
2122,
9290,
3671,
9817,
2656,
3178,
8302,
5240,
125,
5247,
10378,
8854,
8859,
10908,
4253,
2206,
5280,
11432,
10413,
5816,
7354,
6337,
2761,
202,
715,
430... | Test |
8,905 | 5 | Fast_and_Secure_Protocol:fast secure protocol fast secure protocol fasp proprietary data transfer protocol fasp network-optimized network protocol developed aspera owned ibm associated client/server software packages also commonly called aspera technology patented us patent 20090063698 method system aggregate bandwidth control similar connectionless udp protocol fasp expect feedback every packet sent packets marked really lost must requested recipient result suffer much loss throughput tcp networks high latency high packet loss large organizations like ibm european nucleotide archive us national institutes health national center biotechnology information others use protocol different areas amazon also wants use protocol uploading data centers fasp built-in security mechanisms affect transmission speed encryption algorithms used based exclusively open standards transfer ssh used key exchange authentication randomly generated one-way keys discarded end transmission data encrypted decrypted immediately sending receiving aes-128 counteract attacks monitoring encrypted information long transfers aes operated cipher feedback mode secret initialization vector block addition integrity check data block takes place case example man-in-the-middle attack would noticed fasp control port tcp port 33001 port ssh uses data transfer begins udp port 33001 increments additional connection thread | [
10242,
3847,
649,
2827,
9868,
3218,
4863,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
3629,
562,
2996,
9909,
6651,
5433,
10171,
3133,
3006,
4797,
5181,
5437,
8386,
7364,
1607,
2887,
8265,
2509,
4687,
... | None |
8,906 | 2 | LinuxPAE64:linuxpae64 linuxpae64 port linux kernel running compatibility mode x86-64 processor kernel capable loading i386 modules device drivers supports 64-bit linux applications user mode | [
5356,
823
] | None |
8,907 | 2 | Remix_OS:remix os remix os now-discontinued computer operating system personal computers x86 arm architectures prior discontinuation development shipped number 1st- 3rd-party devices remix os allowed pc users run android mobile apps compatible intel-based pc january 2016 jide announced beta version operating system called remix os pc based android-x86 — x86-port android operating system — available download free website beta version remix os pc brings hard drive installation 32-bit support uefi support ota updates except free software licensed parts available github unlike android-x86 source code remix os available public google mobile services gms removed remix mini remix os update 3.0.207 jide claimed ensure consistent experience across android devices later comments suggest compatibility issue apps resulted google requesting gms pre-loaded july 17 2017 jide announced development remix os pc well related consumer products development discontinued stating company would restructuring approach remix os transitioning away consumer space april 2019 os succeeded continued numerous forks intending continue improve project prominently phoenixos primeos three versions remix os remix os pc remix os remix ultratablet remix os remix mini remix os pc remix ultratablet remix mini remix os 3.0 device remix pro 2-in-1 tablet announced 2016 however longer made due popularity affordability os asia numerous forks/clones project made various firms notably phoenixos chinese-based chaozhuo technology primeos indian-based floydwiz technologies private limited like remixos pre-dominantly closed source lot improved features intended improve optimise os newer applications pc projects like openthos blissos intend release project open source mind openthos restricted chinese markets moment blissos based slightly modified version android | [
4611,
5637,
3079,
8719,
3600,
3089,
4113,
8209,
7700,
8727,
9244,
11294,
543,
11297,
7204,
9253,
11305,
1578,
5677,
56,
3129,
4153,
59,
8248,
9276,
4673,
6212,
69,
3654,
5190,
8262,
3147,
2125,
4685,
3664,
1107,
1110,
8280,
89,
5721,
82... | Test |
8,908 | 9 | Mocl:mocl mocl programming language dialect implementation language lisp named common lisp focused mobile device platforms includes compiler runtime system currently runs ios android macos mocl first announced november 14 2012 first release timed occur lisp universal time 3581000000 june 23 2013 recent release mocl named paren mage released may 6 2014 adding support macos application creation remote read–eval–print loop repl runs mobile device | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
6201,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
3176,
2666,
2667,
5751,
7805,
9345,
1159,
9865,
9877,
4779,
5803,
2225,
8... | Test |
8,909 | 2 | Comparison_of_open-source_wireless_drivers:comparison open-source wireless drivers wireless network cards computers require control software make function firmware device drivers list status open-source drivers 802.11 wireless network cards following incomplete list supported wireless devices | [
4616,
3082,
6670,
10255,
4636,
9245,
5663,
10785,
546,
6180,
3114,
5677,
8237,
8242,
7223,
5177,
6718,
4161,
8772,
6213,
3654,
5703,
8266,
8268,
589,
1101,
10317,
593,
7249,
10329,
9306,
10332,
4192,
10851,
6244,
1637,
5222,
9320,
10856,
... | Test |
8,910 | 9 | FOCAL-69:focal-69 focal-69 landmark version focal programming language widely publicized original version language created 1968 focal-69 created richard merrill important variable names may start letter except f f reserved functions may contain sequence letters numbers however first two characters significant instance following code sample focal new conversational language refers variable destination des variable may treated array taking subscripts -2048 2047 focal-69 contained five mathematical operators focal-69 unusual mathematical expressions could use interchangeably matched pairs establish precedence language support relative operators e.g. greater .gt. etc. language contained following built-in functions every line focal-69 program must start line number joss unlike basic line numbers real numbers focal-69 integers allowed line numbers may range 1.01 31.99 whole number referred group number group number 1 31 used command editor also allows programmer print statements group e.g. write 2 delete group e.g. erase 2 multiple statements placed single line usually behavior different statements separate lines except case loops ask command abbreviation take list strings variables echo strings store user input variables user n't enter number enters text system convert initial character unique number comment command abbreviation c creates remark command abbreviation branches execution subroutine subroutine referenced either group number line number execution resumed next statement return encountered command abbreviation f provides loop three arguments specified first initial value loop variable second increment assumed 1 omitted third value terminating value loop sample loop go command abbreviation g jumps program execution specified line number editor go command also used start program beginning specified line number command abbreviation provides conditional branch based sign expression numeric expression command take one three line numbers expression less zero execution branches first line number equal zero second line number greater zero third line number language lacked relative operators greater equal less branch x 5 one must compare x 5 quit command abbreviation q terminates execution program returns control editing environment return command abbreviation r branches execution subroutine back calling location following sample subroutine converting yes/no prompt value set command abbreviation assigns results expression specified variable type command abbreviation provides output displaying item series item consists exclamation mark group exclamation marks output carriage return line feed item consists hash mark output carriage return without line feed new lines entered program simply beginning command line number editing commands erase abbreviation e modify abbreviation write abbreviation w file command open abbreviation unusual interactive system size focal-69 supported ability chain programs use library commands program names could six characters long library command abbreviation l focal-71 added since interpreter lacked sufficient memory space store error messages richard merrill used work-around focal reported address error-detecting code pseudo floating-point number example division zero error detected code address 4333 error message 28.73 01.10 01.10 referred line number merrill clearly derived focal-69 joss focal-69 concise simplification joss simplicity required pdp-8 minicomputer opposed mainframe joss developed | [
7076,
1061,
1716,
8503,
8732
] | Test |
8,911 | 2 | Basic_direct_access_method:basic direct access method basic direct access method bdam access method ibm os/360 successors computer operating systems system/360 later mainframes bdam consists routines used retrieving data storing data onto direct access devices bdam available os/360 os/vs2 mvs z/os related high-end operating systems basic ibm terminology indicates lower-level access method deals data sets terms physical blocks provide either read-ahead called anticipatory buffering synchronization — user program explicitly wait completion input/output event bdam programmer directly store retrieve block specifying either actual device address relative position within data set relative block number relative track within data set system begin search bdam provides index structure file except programmed application many applications hashing randomizing function may used assign block address based key data physical keys used key last record within block must written key block bdam application program interface compared interface offered open read write close calls using file handles operating systems unix windows bdam still supported ibm 2012 dependence physical device geometry new ibm direct-access devices used z/os emulate ibm 3390 devices regardless real physical characteristics programmer specifies codice_1 data control block dcb indicate use bdam space 16 extents volume data set equivalent file reside 255 extents across multiple volumes application dependency space contiguous tracks allocate space direct data set contiguous tracks coding codice_2 dd statement direct data sets must preformatted use opening output writing blocks sequentially load dummy records load initial data basic access method bdam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_3 macro bdam uses standard system macros codice_4 codice_5 codice_6 codice_7 codice_3 codice_6 codice_7 macro instructions must provide block address key desired record codice_3 macro used wait completion specific operation data accessed data buffer reused possible start multiple input/output operations run concurrently records direct data set contain user-specified recorded keys 255 bytes—all keys file must length reads writes specify key addition disk address bdam search starting requested block entire area file record matching key allows multiple keys hashing track handled automatically i/o subsystem bdam accepts disk addresses either actual device addresses relative track addresses relative block numbers device addresses eight byte fields form mbbcchhr subfields binary numbers specifying device addresses makes dataset unmovable relative track addresses three byte fields form ttr subfields binary numbers relative block numbers four byte fullword binary numbers indicating block number file first block block 0 form addressing used fixed length blocks codice_12 | [
10508,
6797,
7053,
6434,
4645,
2616,
10040,
1219,
7881,
8393,
7244,
10958,
8272,
3669,
868,
7272,
4586,
10094,
5492,
2168,
11131
] | Validation |
8,912 | 7 | SHIWA_project:shiwa project shiwa sharing interoperable workflows large-scale scientific simulations available dcis project led lpds laboratory parallel distributed systems mta computer automation research institute project coordinator prof. dr. peter kacsuk started 1 july 2010 lasted two years shiwa project number 261585 supported grant european commission fp7 infrastructures-2010-2 call grant agreement n°261585 shiwa project developed deployed shiwa simulation platform ssp enable infrastructure workflow interoperability two levels project ended shiwa technology overtaken er-flow support action project provide sustainability extend user community base scientists disciplines invested tremendous effort exploitation distributed computing infrastructures dcis ability support compute-intensive in-silico experiments virtual organizations many dcis large user communities emerged last decade distributed european infrastructure supercomputing applications deisa niederberger mextorf 2005 egee grid enabling grids e-science egee n.d. german d-grid initiative d-grid gentzsch 2006 uk national grid service ngs ngs n.d. north american teragrid tg teragrid n.d. based different middleware stacks provide abstraction layer computer resources applications example ngs teragrid built globus toolkit foster 2006 egee glite glite n.d. deisa relies globus toolkit unicore erwin snelling 2002 d-grid executed glite globus toolkit unicore europe momentum climaxing 2010 emergence european grid initiative egi federate major european organizations related distributed-computing national grid initiatives ngis effort create next generation pan-europe dci egi face unprecedented challenges related heterogeneity national grid infrastructures resources operating middleware production dcis commonly built large number components data resources metadata catalogues authentication authorisation methods software repositories managing execution applications dcis consequently complex task moreover solutions developed one particular grid difficult port infrastructures order shield complexity researchers facilitate design in-silico experiments workflow systems widely used virtualization layer top underlying infrastructures become essential integrate expertise application user domain dci infrastructure domain order optimize support research scientific computing community current multi-dci panorama users need access different infrastructures order enlarge widen variety resources usable well share reuse domain specific resources interoperability among dcis hardly achieved middleware level though shiwa considers egi production infrastructure major dci great interest european scientists design simulate experiments in-silico directly addresses challenges related scientific experiments design simulation workflows description ii middleware heterogeneities encountered among many existing dcis workflow interoperability techniques shiwa aimed improving experience virtual research communities heavily using dcis scientific experimentation recent multiplication efforts dedicated e-infrastructures scientific simulation benefit availability massive computing data storage facilities sustain multi-disciplinary scientific challenges side effect variety non-interoperable technologies coexist enable exploitation computing infrastructures in-silico experiments europe momentum climaxing emergence egi federate major european organizations related distributed computing ngis consequently european research simulation currently hampered several interoperability issues reduce efficiency limiting knowledge expertise sharing among scientific communities shiwa designed user-centred project aiming lowering barriers among scientific communities providing services tackling interoperability issues particular shiwa work program focuses improving efficiency workflow-based in-silico experiments targeting following three objectives workflow interoperability enables execution workflows different workflow systems may span multiple heterogeneous infrastructures dcis facilitate application migration due infrastructure services workflow system evolution workflow interoperability allows workflow sharing support foster adoption common research methodologies improve efficiency reliability research reusing common methodologies increase lifetime workflows reduction development time new workflows interoperability among workflow systems permit development enactment large-scale comprehensive workflows also reduces existing gap different dcis consequently promotes cooperation among research communities exploiting dcis workflow systems enable researchers build comprehensive workflow applications dcis project consortium identified workflow interoperability promising approach bridge existing gaps among dcis workflow dci interoperability paramount importance advance quality impact scientific applications target dcis enables advanced features previously available shiwa developed workflow interoperability solutions several workflow systems namely askalon fahringer et al 2005 moteur glatard et al 2008 pegasus deelman 2005 pgrade kacsuk et al 2003 galaxy gwes kepler loni pipeline taverna proactive triana majithia et al 2004 provide access grids built glite globus middleware create production-level services run workflow-based large-scale simulations targeted middleware workflow systems depicted components bold borders figure 1.1.1 project use existing grid middleware interoperability solutions enabling access glite globus based grids austrian grid d-grid egee ngs project consortium also consider support emi-supported nordugrid advanced resource connector arc m.ellert 2007 unicore | [
8420,
5414,
11353,
8122,
6042
] | None |
8,913 | 7 | Mainsoft:mainsoft mainsoft software company founded 1993 develops interoperability software products microsoft windows linux/unix platforms mainsoft founded 1993 mainly propose integration products windows systems mainsoft one main providers microsoft windows interface source environment wise program licensing program microsoft allowed developers recompile run windows-based applications unix macintosh platforms wise software development kits sdks directly provided microsoft instead microsoft established partnerships several software providers turn sold wise sdks end-users wise program microsoft extended agreements mainsoft port windows media player 6.3 internet explorer unix since mainsoft activity shifted integration microsoft sharepoint ibm products ibm lotus notes ibm websphere rational jazz products focusing .net framework javaee according linkedin profile mainsoft corporation changed name harmon.ie www.harmon.ie 2010 able develop wise sdks software providers needed access windows internals source code 2004 30000 source files windows 2000 windows nt 4.0 leaked internet later discovered source leak originated mainsoft | [
1632,
10950,
3560,
6797,
3250,
5492,
3573,
823,
3323
] | None |
8,914 | 8 | Pageview:pageview pageview page view abbreviated business pv occasionally called page impression request load single html file web page internet site world wide web page request would result web surfer clicking link another page pointing page question contrast hit refers request file web server therefore may many hits per page view since html page contain multiple files—images css etc balance page views refer number pages viewed clicked site given time page views may counted part web analytics owner site information useful see change page information way presented results visits advertisements page publishers would also interested number page views determine expected revenue ads reason term used widely internet marketing advertising page impression long measure user activity website however activity necessarily associated loading complete html page modern programming techniques serve pages means n't show http requests since page views help estimate popularity sites helps determine value advertising revenue common metric cpm stands 'cost per thousand roman numeral 1,000 commonly used metrics measure page views divided thousands cost per 1000 views used ad rates thus less cpm better deal offers advertisers however growing concern cpm trustworthy looks advertising market although cpm arrangement everyone visits site makes publishers ’ money advertiser ’ view cpm challenged comparison cpc cpa terms adverts ’ efficiency visiting mean clicking ads preferred way count page views using web analytics software measure number pages site therefore helps people receive rough estimate page views web sites also many page view measurement tools available including open source ones well licensed products despite wide range use page view come criticisms page view manipulated boosted specific purposes example recent incident called 'page view fraud compromised accuracy measurement page view boosting page view perpetrators used tool called bot buy fake page-views attention recognition feedback increasing site value result people already started building alternatives measure audiences ophan saying page view becoming passe fake page views reflect bots instead humans wikipedia provides tools allow one see many people visited wikipedia article given time period used tools instance display popular articles day wikipedia pageviews certain types articles correlate changes stock market prices box office success movies spread disease among applications datamining since search engines directly influence popular wikipedia statistics may provide unfiltered real-time view people searching web societal interests instance used gain insights public anxiety information seeking events identification concepts significant increase interest public 2015 study examines influence reddit posts wikipedia pageviews | [
2432,
225,
5442,
10756,
6533,
4167,
3688,
9036,
5295,
6576,
4917,
119,
11578,
5150
] | Test |
8,915 | 9 | Linotte:linotte linotte interpreted 4th generation programming language linotte syntax french language goal allow french-speaking children francophones little computer science experience easily learn programming slogan french know read book write computer program linotte uses non-technical vocabulary entirely french terms closer used film literature program book variable actor screen cloth instead executing book read function body starts début french start keywords languages might named things print log linotte named things like affiche french display similarly program demande ask prompt user enter value linotte also supports things like networking graphics even contains web templating engine allows mixing html linotte file much like php jsp | [
9345,
8644,
8262
] | Test |
8,916 | 5 | Stellar_(payment_network):stellar payment network stellar open source decentralized protocol digital currency fiat money transfers allows cross-border transactions pair currencies stellar protocol supported 501 c 3 nonprofit stellar development foundation 2014 jed mccaleb founder mt gox co-founder ripple launched network system stellar former lawyer joyce kim official launch mccaleb formed website called secret bitcoin project seeking alpha testers nonprofit stellar development foundation created collaboration stripe ceo patrick collison project officially launched july stellar received 3 million seed funding stripe stellar released decentralized payment network protocol native currency stellar launch network 100 billion stellars 25 percent would given non-profits working toward financial inclusion stripe received 2 percent 2 billion initial stellars return seed investment cryptocurrency originally known stellar later called lumens xlm august 2014 mercado bitcoin first brazilian bitcoin exchange announced would using stellar network january 2015 stellar approximately 3 million registered user accounts platform market cap almost 15 million stellar development foundation released upgraded protocol new consensus algorithm april 2015 went live november 2015 new algorithm used scp cryptocurrency protocol created stanford professor david mazières lightyear.io for-profit entity stellar launched may 2017 commercial arm company september 2017 stellar announced benefits program part stellar partnership grant program would award partners 2 million worth lumens project development september 2018 lightyear corporation acquired chain inc combined company named interstellar 2015 announced stellar releasing integration vumi open-sourced messaging platform praekelt foundation vumi uses cellphone talk time currency using stellar protocol stellar partnered cloud-based banking software company oradian april 2015 integrate stellar oradian banking platform add microfinance institutions mfis nigeria deloitte announced integration stellar 2016 build cross-border payments application deloitte digital bank december 2016 announced stellar payment network expanded include coins.ph mobile payments startup philippines icici bank india african mobile payments firm flutterwave french remittances company tempo money transfer october 2017 stellar partnered ibm klickex facilitate cross-border transactions south pacific region cross-border payment system developed ibm includes partnerships banks area december 2017 techcrunch announced stellar partnership sureremit nigerian based non-cash remittances platform stellar open-source protocol exchanging money tokens using stellar consensus protocol platform source code hosted github servers run software implementation protocol use internet connect communicate stellar servers server stores ledger accounts network transactions among accounts occur mining rather consensus process among accounts quorum slice | [
3713,
8706,
9859,
3462,
1435,
9245,
9248,
5677,
7983,
4280,
1087,
11332,
4827,
11612,
8554,
5612,
1908,
3323,
764
] | Test |
8,917 | 3 | Philips_CD-i:philips cd-i philips cd-i abbreviation compact disc interactive interactive multimedia cd player developed marketed dutch company philips supported december 1991 late 1998 created provide functionality audio cd player game console lower price personal computer cd-rom drive cost savings due lack floppy drive keyboard mouse monitor standard television used less operating system software cd-i also refers multimedia compact disc standard used cd-i console also known green book co-developed philips sony addition games educational multimedia reference titles produced interactive encyclopedias museum tours popular public internet access widespread cd-i also one earliest game systems implement internet features including subscriptions web browsing downloading e-mail online play facilitated use additional hardware modem cd-online disc renamed web-i us philips initially released britain 1995 150 us development cd-i format began 1984 first publicly announced 1986 first philips cd-i player released 1991 initially priced around us 1,000 capable playing interactive cd-i discs audio cds cd+g cd+graphics karaoke cds photo cds video cds vcds though latter required optional digital video card provide mpeg-1 decoding philips also licensed cd-i format manufacturers use also cd-i players sony intelligent discman brand philips marketed cd-i home entertainment system europe games educational machine u.s cd-i abandoned 1996 commercial failure estimated lost philips much one billion u.s. dollars american market philips first marketed cd-i family entertainment product avoided mentioning video games compete game consoles early software releases focused heavily educational music self-improvement titles games many adaptations board games connect four however system handily beaten market multimedia devices cheap low-end pcs games best-selling software 1993 philips encouraged ms-dos console developers create games introduced 250 peripheral memory support full-motion video added new consoles second controller port multiplayer games attempts develop foothold games market unsuccessful system designed strictly multimedia player thus under-powered compared gaming platforms market respects earlier cd-i games included entries popular nintendo franchises although games developed nintendo specifically mario game titled hotel mario three legend zelda games released zelda adventure nintendo philips established agreement co-develop cd-rom enhancement super nintendo entertainment system due licensing disagreements nintendo previous partner sony agreement produced prototype console called snes-cd philips nintendo never released cd-rom add-on philips still contractually allowed continue using nintendo characters applications developed using authoring software produced optimage included optimage balboa runtime libraries mediamogul second company produced authoring software script systems produced abcd-i philips also released several versions popular tv game shows cd-i including versions jeopardy hosted alex trebek name tune hosted bob goen two versions joker wild one adults hosted wink martindale one kids hosted marc summers cd-i games north america exception name tune charlie o'donnell announcer netherlands also released version lingo cd-i 1994 1993 american musician todd rundgren created first music-only fully interactive cd world order cd-i application allows user completely arrange whole album personal way 15,000 points customization cd-i series learning games edutainment targeted children infancy adolescence intended younger audience included busytown berenstain bears various others usually vivid cartoon-like settings accompanied music logic puzzles although extensively marketed philips notably via infomercial consumer interest cd-i titles remained low 1994 sales cd-i systems begun slow 1998 product line dropped plans cd-i 2 certainly present argonaut software even designated design chip sets successor cd-i however president con boonstra saw interest media area philips philips sold everything including media subsidiary polygram dutch half philips media sold softmachine released lost ride cd-i last product philips also sold french half gaming subsidiary philips media bv french publisher infogrames 1997 dutch eurodance duo 2 unlimited released cd-i compilation album 1994 called beyond limits contains standard cd tracks well cd-i-exclusive media disc large number full motion video titles dragon lair mad dog mccree appeared system one considered one stronger cd-i titles later ported pc february 1994 issue electronic gaming monthly remarked cd-i full motion video capabilities strongest point nearly best software required mpeg upgrade card mid-1996 u.s. market cd-i software dried philips given releasing titles continued publish cd-i games europe console still held popularity home market exhausted philips tried success position technology solution kiosk applications industrial multimedia addition consumer models professional development players sold philips interactive media systems vars philips marketed several cd-i player models also exist number hard-to-categorize models fw380i integrated mini-stereo cd-i player 21tcdi30 television built-in cd-i device cd-i 180/181/182 modular system first cd-i system produced collaboration kyocera 1988 actual debut cd-i addition philips several manufacturers produced cd-i players including philips subsidiary magnavox goldstar lg electronics digital video systems memorex grundig saab electric sony intelligent discman hybrid home/portable cd-i player kyocera nbs highscreen bang olufsen produced television built-in cd-i device beocenter av5 recognizing growing need among marketers networked multimedia philips partnered 1992 amsterdam-based cdmatics develop telecd-i also telecd concept cd-i player connected network pstn internet enabling data-communication rich media presentation dutch grocery chain albert heijn mail-order company early adopters introduced award-winning telecd-i applications home-shopping home-delivery services cdmatics also developed special philips telecd-i assistant set software tools help worldwide multimedia industry develop implement telecd-i telecd-i world first networked multimedia application time introduction 1996 philips acquired source code rights cdmatics 1995 philips introduced cd-online service provided cd-i full internet access 14.4k modem including online shopping email support networked multiplayer gaming select cd-i games service required cd-i player dv cartridge internet starter kit initially retailed £99.99 andy stout writer official cd-i magazine explained cd-online cd-online service went live uk october 25 1995 march 1996 netherlands 399 guilders system reportedly scheduled launch us web-i august 1996 although philips aggressively promoted cd-i august 1993 computer gaming world reported skepticism persists long-term prospects compared platforms like ibm pc compatibles apple macintosh sega genesis magazine stated january 1994 despite philips new emphasis games cd-i still answer hardcore gamers console may yet surprise us future recommended cd-i video cartridge needing buy new console price right software support 3do probably better could wait months early 1995 review system gamepro stated inconsistent game quality puts cd-i disadvantage high-powered game producers late 1995 review next generation criticized philips approach marketing cd-i hardware unit excels practically nothing except fmv addition 200 digital video cartridge magazine noted philips yet officially discontinued cd-i dead intents purposes citing evidence fact though philips large booth 1995 electronic entertainment expo cd-i hardware software display next generation scored console one five stars discontinuation retrospectively cd-i overwhelmingly panned critics blasted graphics games controls microsoft ceo bill gates admitted initially worried cd-i due philips heavy support device two-pronged attack games console pc markets retrospect device kind basically got caught middle terrible game machine terrible pc cd-i various controllers ranked fifth worst video game controller ign editor craig harris pc world ranked fourth list 10 worst video game systems time gamepro.com listed number four list 10 worst-selling consoles time 2008 cnet listed system list worst game console ever 2007 gametrailers ranked philips cd-i fourth worst console time top 10 worst console lineup games heavily criticized include hotel mario zelda adventure egm seanbaby rated wand gamelon one worst video games time however positively received critics often held standout title cd-i october 1994 philips claimed installed base one million units cd-i 1996 wall street journal reported total us sales amounted 400,000 units | [
1121,
8355,
9091,
424,
5736,
8937,
7916,
10316,
494,
2638,
1776,
4046,
6129,
7983,
3350,
921,
410
] | Test |
8,918 | 4 | Purplera1n:purplera1n purplera1n utility jailbreaks version 3.0 iphone os achieved patching firmware device fly meaning edits firmware located device whilst dfu device firmware upgrade mode allowed users install either cydia rock app cydia alternative allowed user gain access root directory file system gaining access users could install themes tweaks homebrew applications purplera1n superseded blackra1n | [
9762,
9518,
7983,
5138,
9972,
7420,
4957
] | None |
8,919 | 2 | GeeksPhone_Peak:geeksphone peak geeksphone peak low-end smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers peak entry-level keon first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours unlike lower-end geeksphone keon peak fully open source contains requires proprietary qualcomm code geeksphone peak+ improved version original peak first announced 16 july 2013 unlike original peak peak+ customer-oriented device features twice ram original peak added compass sensor peak+ also features exterior dimensions peak geeksphone estimates shipping peak+ devices start november 2013 've issues material providers n't complying given dates mozilla allow geeksphone peak+ called firefox os device insists described device based boot gecko technology said mozilla yet make mind regarding firefox os certification entails favors carrier supports start-ups geeksphone geeksphone assures despite mozilla wanting support peak/peak+ display resolution internals peak+ exactly original peak without mozilla logos peak running certified copy firefox os 1.1 geeksphone peak+ cancelled 28 november 2013 | [
7492,
10884,
9863,
5963,
9964,
2383,
1776,
2259,
9913,
1083
] | None |
8,920 | 4 | Laplink:laplink laplink proprietary piece software used synchronize laptops desktops using parallel port serial port laplink cable laplink typically shipped serial parallel cables serial cables much lower data transfer rate parallel cables later laplink iterations shipped ethernet cables port port traffic | [
6993,
8659,
780
] | Test |
8,921 | 7 | Amazon_(company):amazon company amazon.com inc. american multinational technology company based seattle washington focuses e-commerce cloud computing digital streaming artificial intelligence considered one big four technology companies along google apple facebook amazon known disruption well-established industries technological innovation mass scale world largest e-commerce marketplace ai assistant provider cloud computing platform measured revenue market capitalization amazon largest internet company revenue world second largest private employer united states one world valuable companies amazon second largest technology company revenue amazon founded jeff bezos july 5 1994 bellevue washington company initially started online marketplace books later expanded sell electronics software video games apparel furniture food toys jewelry 2015 amazon surpassed walmart valuable retailer united states market capitalization 2017 amazon acquired whole foods market 13.4 billion vastly increased amazon presence brick-and-mortar retailer 2018 bezos announced two-day delivery service amazon prime surpassed 100 million subscribers worldwide amazon distributes downloads streaming video music audiobook amazon prime video amazon music audible subsidiaries amazon also publishing arm amazon publishing film television studio amazon studios cloud computing subsidiary amazon web services produces consumer electronics including kindle e-readers fire tablets fire tv echo devices addition amazon subsidiaries also include ring twitch.tv whole foods market imdb among various controversies company criticized technological surveillance overreach hyper-competitive demanding work culture tax avoidance anti-competitive practices 1994 jeff bezos incorporated amazon chose location seattle technical talent microsoft located may 1997 organization went public company began selling music videos 1998 time began operations internationally acquiring online sellers books united kingdom germany following year organization also sold video games consumer electronics home-improvement items software games toys addition items 2002 corporation started amazon web services aws provided data web site popularity internet traffic patterns statistics marketers developers 2006 organization grew aws portfolio elastic compute cloud ec2 rents computer processing power well simple storage service s3 rents data storage via internet made available year company started fulfillment amazon managed inventory individuals small companies selling belongings company internet site 2012 amazon bought kiva systems automate inventory-management business purchasing whole foods market supermarket chain five years later 2017. board directors 2000 u.s. toy retailer toys r us entered 10-year agreement amazon valued 50 million per year plus cut sales toys r us would exclusive supplier toys baby products service chain website would redirect amazon toys games category 2004 toys r us sued amazon claiming perceived lack variety toys r us stock amazon knowingly allowed third-party sellers offer items service categories toys r us granted exclusivity 2006 court ruled favor toys r us giving right unwind agreement amazon establish independent e-commerce website company later awarded 51 million damages 2001 amazon entered similar agreement borders group amazon would co-manage borders.com co-branded service borders pulled arrangement 2007 plans also launch online store october 18 2011 amazon.com announced partnership dc comics exclusive digital rights many popular comics including superman batman green lantern sandman watchmen partnership caused well-known bookstores like barnes noble remove titles shelves november 2013 amazon announced partnership united states postal service begin delivering orders sundays service included amazon standard shipping rates initiated metropolitan areas los angeles new york high-volume inability deliver timely way plans expand dallas houston new orleans phoenix 2014 june 2017 nike confirmed pilot partnership amazon sell goods directly platform amazonfresh sold range booths branded products home delivery selected areas september 2017 amazon ventured one sellers jv appario retail owned patni group recorded total income us 104.44 million ₹ 759 crore financial year 2017–18 november 2018 amazon reached agreement apple inc. sell selected products service via company selected apple authorized resellers result partnership apple authorized resellers may sell apple products amazon effective january 4 2019 amazon.com product lines available website include several media books dvds music cds videotapes software apparel baby products consumer electronics beauty products gourmet food groceries health personal-care items industrial scientific supplies kitchen items jewelry watches lawn garden items musical instruments sporting goods tools automotive items toys games amazon separate retail websites countries also offers international shipping products certain countries amazon.com number products services available including amazon owns 40 subsidiaries including zappos shopbop diapers.com kiva systems amazon robotics audible goodreads teachstreet twitch imdb a9.com company focused researching building innovative technology subsidiary since 2003 amazon maritime inc. holds federal maritime commission license operate non-vessel-owning common carrier nvocc enables company manage shipments china united states audible.com seller producer spoken audio entertainment information educational programming internet audible sells digital audiobooks radio tv programs audio versions magazines newspapers production arm audible studios audible also become world largest producer downloadable audiobooks january 31 2008 amazon announced would buy audible 300 million deal closed march 2008 audible became subsidiary amazon beijing century joyo courier services subsidiary amazon applied freight forwarding license us maritime commission amazon also building logistics trucking air freight potentially compete ups fedex brilliance audio audiobook publisher founded 1984 michael snodgrass grand michigan company produced first 8 audio titles 1985 company purchased amazon 2007 undisclosed amount time acquisition brilliance producing 12–15 new titles month operates independent company within amazon 1984 brilliance audio invented technique recording twice much cassette technique involved recording two channels stereo track credited revolutionizing burgeoning audiobook market mid-1980s since made unabridged books affordable comixology cloud-based digital comics platform 200 million comic downloads offers selection 40,000 comic books graphic novels across android ios fire os windows 8 devices web browser amazon bought company april 2014 createspace offers self-publishing services independent content creators publishers film studios music labels became subsidiary 2009 eero company manufactures mesh-capable routers company founded 2015 based san francisco amazon announced would buy eero 2019 goodreads social cataloging website founded december 2006 launched january 2007 otis chandler software engineer entrepreneur elizabeth chandler website allows individuals freely search goodreads extensive user-populated database books annotations reviews users sign register books generate library catalogs reading lists also create groups book suggestions discussions december 2007 site 650,000 members 10 million books added amazon bought company march 2013 lab126 developers integrated consumer electronics kindle became subsidiary 2004 amazon announced would fund deploy large broadband satellite internet constellation called project kuiper april 2019 expected take decade fully deploy 3,236 satellites planned full constellation order provide internet tens millions people lack basic access broadband internet amazon announced intend sell broadband service directly consumers offer broadband service partnerships companies satellites use orbit height kuiper work concert amazon previously announced large network 12 satellite ground station facilities aws ground station unit announced november 2018 amazon filed communications license documents us regulatory authorities july 2019 included information wholly owned amazon subsidiary intended deploy satellite constellation kuiper systems llc based seattle washington kuiper system consist 3,236 satellites operating 98 orbital planes altitudes kuiper system includes high-performance satellites terrestrial gateways internetworking technologies range customer terminals president kuiper systems rajeev badyal former vice president spacex satellite internet constellation business unit ring home automation company founded jamie siminoff 2013 primarily known wifi powered smart doorbells manufactures devices security cameras amazon bought ring 1 billion usd 2018 shelfari social cataloging website books shelfari users built virtual bookshelves titles owned read could rate review tag discuss books users could also create groups members could join create discussions talk books topics recommendations could sent friends site books read amazon bought company august 2008 shelfari continued function independent book social network within amazon january 2016 amazon announced would merging shelfari goodreads closing shelfari souq.com largest e-commerce platform middle east based dubai united arab emirates march 28 2017 amazon confirmed would acquiring souq.com 580 million souq.com subsidiary amazon acts amazon arm middle east region twitch live streaming platform video primarily oriented towards video gaming content service first established spin-off general-interest streaming service known justin.tv prominence eclipsed twitch justin.tv eventually shut parent company august 2014 order focus exclusively twitch later month twitch acquired amazon 970 million twitch amazon also owns curse inc. operator video gaming communities provider voip services gaming since acquisition twitch began sell games directly platform began offering special features amazon prime subscribers site rapid growth boosted primarily prominence major esports competitions service leading gamespot senior esports editor rod breslau described service espn esports service 1.5 million broadcasters 100 million monthly viewers whole foods market american supermarket chain exclusively featuring foods without artificial preservatives colors flavors sweeteners hydrogenated fats august 23 2017 reported federal trade commission approved merger amazon.com whole foods market following day announced deal would closed august 28 2017 junglee former online shopping service provided amazon enabled customers search products online offline retailers india junglee started virtual database used extract information internet deliver enterprise applications progressed junglee started use database technology create single window marketplace internet making every item every supplier available purchase web shoppers could locate compare transact millions products across internet shopping mall one window amazon acquired junglee 1998 website junglee.com launched india february 2012 comparison-shopping website curated enabled searching diverse variety products clothing electronics toys jewelry video games among others across thousands online offline sellers millions products browse-able whereby client selects price directed seller november 2017 amazon closed junglee.com former domain currently redirects amazon india amazon first launched distribution network 1997 two fulfillment centers seattle new castle delaware amazon several types distribution facilities consisting crossdock centers fulfillment centers sortation centers delivery stations prime hubs prime air hubs 75 fulfillment centers 25 sortation centers 125,000 employees employees responsible five basic tasks unpacking inspecting incoming goods placing goods storage recording location picking goods computer recorded locations make individual shipment sorting packing orders shipping computer records location goods maps routes pickers plays key role employees carry hand-held computers communicate central computer monitor rate progress domain amazon.com attracted least 615 million visitors annually 2008 amazon attracts 130 million customers us website per month start 2016 company also invested heavily massive amount server capacity website especially handle excessive traffic december christmas holiday season results generated amazon search engine partly determined promotional fees amazon localized storefronts differ selection prices differentiated top-level domain country code amazon allows users submit reviews web page product reviewers must rate product rating scale one five stars amazon provides badging option reviewers indicate real name reviewer based confirmation credit card account indicate reviewer one top reviewers popularity customers may comment vote reviews indicating whether found review helpful review given enough helpful hits appears front page product 2010 amazon reported largest single source internet consumer reviews publishers asked bezos amazon would publish negative reviews defended practice claiming amazon.com taking different approach ... want make every book available—the good bad ugly ... let truth loose cases positive reviews written posted public relations companies behalf clients instances writers using pseudonyms leave negative reviews rivals works search inside book feature allows customers search keywords full text many books catalog feature started 120,000 titles 33 million pages text october 23 2003 300,000 books program amazon cooperated around 130 publishers allow users perform searches avoid copyright violations amazon return computer-readable text book instead returns picture matching page instructs web browser disable printing puts limits number pages book single user access additionally customers purchase online access books via amazon upgrade program amazon derives many sales around 40 2008 third-party sellers sell products amazon associates receive commission referring customers amazon placing links amazon websites referral results sale worldwide amazon 900,000 members affiliate programs middle 2014 amazon affiliate program used 1.2 websites second popular advertising network google ads frequently used websites non-profits provide way supporters earn commission amazon reported 1.3 million sellers sold products amazon websites 2007 unlike ebay amazon sellers maintain separate payment accounts payments handled amazon associates access amazon catalog directly websites using amazon web services aws xml service new affiliate product astore allows associates embed subset amazon products within another website linked another website june 2010 amazon seller product suggestions launched rumored internally called project genesis provide transparency sellers recommending specific products third-party sellers sell amazon products suggested based customers browsing history amazon sales rank asr provides indication popularity product sold amazon locale relative indicator popularity updated hourly effectively best sellers list millions products stocked amazon asr direct effect sales product used amazon determine products include bestsellers lists products appear lists enjoy additional exposure amazon website may lead increase sales particular products experience large jumps sales ranks may included within amazon lists movers shakers listing provides additional exposure might lead increase sales competitive reasons amazon release actual sales figures public however amazon begun release point sale data via nielsen bookscan service verified authors asr source much speculation publishers manufacturers marketers amazon release details sales rank calculation algorithm companies analyzed amazon sales data generate sales estimates based asr though amazon states amazon employs multi-level e-commerce strategy amazon started focusing business-to-consumer relationships customers business-to-business relationships suppliers moved facilitate customer-to-customer amazon marketplace acts intermediary facilitate transactions company lets anyone sell nearly anything using platform addition affiliate program lets anyone post-amazon links earn commission click-through sales program lets affiliates build entire websites based amazon platform large e-commerce sellers use amazon sell products addition selling websites sales processed amazon.com end individual sellers processing order fulfillment amazon leases space retailers small sellers used new goods go amazon marketplace offer goods fixed price amazon also employs use drop shippers meta sellers members entities advertise goods amazon order goods direct competing websites usually amazon members meta sellers may millions products listed large transaction numbers grouped alongside less prolific members giving credibility someone business long time markup anywhere 50 100 sometimes sellers maintain items stock opposite true amazon increases dominance marketplace drop shippers become commonplace recent years november 2015 amazon opened physical amazon books store university village seattle store 5,500 square feet prices products match website amazon open tenth physical book store 2017 media speculation suggests amazon plans eventually roll 300 400 bookstores around country amazon plans open brick mortar bookstores germany amazon.com primarily retail site sales revenue model amazon takes small percentage sale price item sold website also allowing companies advertise products paying listed featured products amazon.com ranked 8th fortune 500 rankings largest united states corporations total revenue fiscal year 2018 amazon reported earnings us 10.07 billion annual revenue us 232.887 billion increase 30.9 previous fiscal cycle since 2007 sales increased 14.835 billion 232.887 billion thanks continued business expansion amazon market capitalization valued us 803 billion early november 2018 since founding company attracted criticism controversy actions including supplying law enforcement facial recognition surveillance tools forming cloud computing partnerships cia leading customers away bookshops adversely impacting environment placing low priority warehouse conditions workers actively opposing unionization efforts remotely deleting content purchased amazon kindle users taking public subsidies seeking patent 1-click technology engaging anti-competitive actions price discrimination reclassifying lgbt books adult content criticism also concerned various decisions whether censor publish content wikileaks website works containing libel material facilitating dogfight cockfight pedophile activities december 2011 amazon faced backlash small businesses running one-day deal promote new price check app shoppers used app check prices brick-and-mortar store offered 5 discount purchase item amazon companies like groupon ebay taap.it countered amazon promotion offering 10 products company also faced accusations putting undue pressure suppliers maintain extend profitability one effort squeeze vulnerable book publishers known within company gazelle project bezos suggested according brad stone amazon approach small publishers way cheetah would pursue sickly gazelle july 2014 federal trade commission launched lawsuit company alleging promoting in-app purchases children transacted without parental consent november 2018 community action group opposed construction permit delivered goodman group construction logisitics platform amazon operate lyon–saint-exupéry airport february 2019 filed request behalf second regional community action group asking administrative court decide whether platform served sufficiently important public interest justify environmental impact construction suspended matters decided october 16 2016 apple filed trademark infringement case mobile star llc selling counterfeit apple products amazon suit apple provided evidence amazon selling counterfeit apple products advertising genuine purchasing apple found able identify counterfeit products success rate 90 amazon sourcing selling items without properly determining genuine mobile star llc settled apple undisclosed amount april 27 2017 amazon state sales tax collection policy changed years since collect sales taxes early years u.s. state local sales taxes levied state local governments federal level countries amazon operates sales tax value added tax uniform throughout country amazon obliged collect customers proponents forcing amazon.com collect sales tax—at least states maintains physical presence—argue corporation wields anti-competitive advantage storefront businesses forced collect sales tax. ref name= bloomberg/businessweek /ref many u.s. states 21st century passed online shopping sales tax laws designed compel amazon.com e-commerce retailers collect state local sales taxes customers amazon.com originally collected sales tax five states amazon collects sales taxes customers 45 states state sales tax washington d.c. amazon paid federal income taxes u.s. 2017 2018 actually got tax refunds worth millions dollars despite recording several billion dollars profits year cnn reported amazon tax bill zero took advantage provisions years losing money allowed offset future taxes profits well various tax credits amazon criticized political figures paying federal income taxes early 2018 president donald trump repeatedly criticized amazon use united states postal service prices delivery packages stating right amazon costing united states post office massive amounts money delivery boy trump tweeted amazon pay costs plus bourne sic american taxpayer amazon shares fell 6 percent result trump comments shepard smith fox news disputed trump claims pointed evidence usps offering below-market prices customers advantage amazon however analyst tom forte pointed fact amazon payments usps made public contract reputation sweetheart deal throughout summer 2018 vermont senator bernie sanders criticized amazon wages working conditions series youtube videos media appearances also pointed fact amazon paid federal income tax previous year sanders solicited stories amazon warehouse workers felt exploited company one story james bloodworth described environment akin low-security prison stated company culture used orwellian newspeak reports cited finding new food economy one third fulfilment center workers arizona supplemental nutrition assistance program snap responses amazon included incentives employees tweet positive stories statement called salary figures used sanders inaccurate misleading statement also charged inappropriate refer snap food stamps september 5 2018 sanders along ro khanna introduced stop bad employers zeroing subsidies stop bezos act aimed amazon alleged beneficiaries corporate welfare walmart mcdonald uber among bill supporters tucker carlson fox news matt taibbi criticized journalists covering amazon contribution wealth inequality earlier october 2 amazon announced minimum wage american employees would raised 15 per hour sanders congratulated company making decision former employees current employees media politicians criticized amazon poor working conditions company 2011 publicized workers carry tasks heat breinigsville pennsylvania warehouse result inhumane conditions employees became extremely uncomfortable suffered dehydration collapse loading-bay doors opened allow fresh air concerns theft amazon initial response pay ambulance sit outside call cart away overheated employees company eventually installed air conditioning warehouse workers pickers travel building trolley handheld scanner picking customer orders walk 15 miles workday fall behind targets reprimanded handheld scanners give real-time information employee quickly slowly working scanners also serve allow team leads area managers track specific locations employees much idle time gain working german television report broadcast february 2013 journalists diana löbl peter onneken conducted covert investigation distribution center amazon town bad hersfeld german state hessen report highlights behavior security guards employed third party company apparently either neo-nazi background deliberately dressed neo-nazi apparel intimidating foreign temporary female workers distribution centers third party security company involved delisted amazon business contact shortly report march 2015 reported verge amazon removing non-compete clauses 18 months length us employment contracts hourly-paid workers criticism acting unreasonably preventing employees finding work even short-term temporary workers sign contracts prohibit working company would directly indirectly support good service competes helped support amazon 18 months leaving amazon even fired made redundant 2015 front-page article new york times profiled several former amazon employees together described bruising workplace culture workers illness personal crises pushed unfairly evaluated bezos responded writing sunday memo employees disputed times account shockingly callous management practices said would never tolerated company effort boost employee morale november 2 2015 amazon announced would extending six weeks paid leave new mothers fathers change includes birth parents adoptive parents applied conjunction existing maternity leave medical leave new mothers mid-2018 investigations journalists media outlets guardian reported poor working conditions amazon fulfillment centers later 2018 another article exposed poor working conditions amazon delivery drivers response criticism amazon n't pay workers livable wage jeff bezos announced beginning november 1 2018 us uk amazon employees earn 15 hour minimum wage amazon also lobby make 15 hour federal minimum wage time amazon also eliminated stock awards bonuses hourly employees black friday 2018 amazon warehouse workers several european countries including italy germany spain united kingdom went strike protest inhumane working conditions low pay daily beast reported march 2019 emergency services responded 189 calls 46 amazon warehouses 17 states years 2013 2018 relating suicidal employees workers attributed mental breakdowns employer-imposed social isolation aggressive surveillance hurried dangerous working conditions fulfillment centers one former employee told daily beast isolating colony hell people breakdowns regular occurrence july 15 2019 onset amazon prime day sale event amazon employees working united states germany went strike protest unfair wages poor working conditions 2013 amazon secured contract cia poses potential conflict interest involving bezos-owned washington post newspaper coverage cia kate martin director center national security studies said serious potential conflict interest major newspaper like washington post contractual relationship government secret part government later followed contract department defence may 2018 amazon threatened seattle city council employee head tax proposal would funded houselessness services low-income housing tax would cost amazon 800 per employee 0.7 average salary retaliation amazon paused construction new building threatened limit investment city funded repeal campaign although originally passed measure soon repealed expensive repeal campaign spearheaded amazon incentives given metropolitan council nashville davidson county amazon new operations center excellence nashville yards site owned developer southwest value partners controversial including decision tennessee department economic community development keep full extent agreement secret incentives include 102 million combined grants tax credits scaled-down amazon office building well 65 million cash grant capital expenditures exchange creation 5,000 jobs seven years tennessee coalition open government called transparency another local organization known people alliance transit housing employment pathe suggested public money given amazon instead spent building public housing working poor homeless investing public transportation nashvillians others suggested incentives big corporations n't improve local economy november 2018 proposal give amazon 15 million incentives criticized nashville firefighters union nashville chapter fraternal order police called corporate welfare february 2019 another 15.2 million infrastructure approved council although voted three council members including councilwoman angie henderson dismissed cronyism amazon publicly opposed secret government surveillance revealed freedom information act requests supplied facial recognition support law enforcement form rekognition technology consulting services initial testing included city orlando florida washington county oregon amazon offered connect washington county amazon government customers interested rekognition body camera manufacturer ventures opposed coalition civil rights groups concern could lead expansion surveillance prone abuse specifically could automate identification tracking anyone particularly context potential police body camera integration backlash city orlando publicly stated longer use technology amazon lobbies united states federal government state governments issues enforcement sales taxes online sales transportation safety privacy data protection intellectual property according regulatory filings amazon.com focuses lobbying united states congress federal communications commission federal reserve amazon.com spent roughly 3.5 million 5 million 9.5 million lobbying 2013 2014 2015 respectively amazon.com corporate member american legislative exchange council alec dropped membership following protests shareholders meeting may 24 2012 2014 amazon expanded lobbying practices prepared lobby federal aviation administration approve drone delivery program hiring akin gump strauss hauer feld lobbying firm june amazon lobbyists visited federal aviation administration officials aviation committees washington d.c. explain plans deliver packages | [
0,
8064,
2818,
8451,
7044,
8962,
9732,
9863,
6027,
6539,
7820,
11659,
1935,
8719,
7697,
5396,
10393,
410,
4890,
5660,
7835,
5918,
10140,
10270,
8865,
11038,
4259,
4388,
11556,
424,
2217,
5677,
5295,
6834,
8627,
10681,
1083,
10303,
11201,
... | Test |
8,922 | 4 | Kismet_(software):kismet software kismet network detector packet sniffer intrusion detection system 802.11 wireless lans kismet work wireless card supports raw monitoring mode sniff 802.11a 802.11b 802.11g 802.11n traffic program runs linux freebsd netbsd openbsd mac os x client also run microsoft windows although aside external drones see one supported wireless hardware available packet source distributed gnu general public license kismet free software kismet differs wireless network detectors working passively namely without sending loggable packets able detect presence wireless access points wireless clients associate also widely used date open source wireless monitoring tool kismet also includes basic wireless ids features detecting active wireless sniffing programs including netstumbler well number wireless network attacks kismet features ability log sniffed packets save tcpdump/wireshark airsnort compatible file format kismet also capture per-packet information headers kismet also features ability detect default configured networks probe requests determine level wireless encryption used given access point order find many networks possible kismet supports channel hopping means constantly changes channel channel non-sequentially user-defined sequence default value leaves big holes channels example 1-6-11-2-7-12-3-8-13-4-9-14-5-10 advantage method capture packets adjacent channels overlap kismet also supports logging geographical coordinates network input gps receiver additionally available kismet three separate parts drone used collect packets pass server interpretation server either used conjunction drone interpreting packet data extrapolating wireless information organizing client communicates server displays information server collects updating kismet -ng kismet supports wide variety scanning plugins including dect bluetooth others kismet used number commercial open source projects distributed kali linux used wireless reconnaissance used packages inexpensive wireless intrusion detection system used number peer reviewed studies detecting rogue access points using kismet | [
6797,
1429,
6559,
10788,
1064,
9640,
7983,
8497,
2739,
7222,
823,
61,
6345,
842,
1232,
2006,
8922,
9440,
4580,
10346,
5612,
2292,
5245,
2430
] | Test |
8,923 | 9 | Cascading_Style_Sheets:cascading style sheets cascading style sheets css style sheet language used describing presentation document written markup language like html css cornerstone technology world wide web alongside html javascript css designed enable separation presentation content including layout colors fonts separation improve content accessibility provide flexibility control specification presentation characteristics enable multiple web pages share formatting specifying relevant css separate .css file reduce complexity repetition structural content separation formatting content also makes feasible present markup page different styles different rendering methods on-screen print voice via speech-based browser screen reader braille-based tactile devices css also rules alternate formatting content accessed mobile device name cascading comes specified priority scheme determine style rule applies one rule matches particular element cascading priority scheme predictable css specifications maintained world wide web consortium w3c internet media type mime type codice_1 registered use css rfc 2318 march 1998 w3c operates free css validation service css documents addition html markup languages support use css including xhtml plain xml svg xul css simple syntax uses number english keywords specify names various style properties style sheet consists list rules rule rule-set consists one selectors declaration block css selectors declare part markup style applies matching tags attributes markup selectors may apply following classes ids case-sensitive start letters include alphanumeric characters hyphens underscores class may apply number instances elements id may applied single element pseudo-classes used css selectors permit formatting based information contained document tree one example widely used pseudo-class identifies content user points visible element usually holding mouse cursor appended selector pseudo-class classifies document elements whereas pseudo-element makes selection may consist partial elements selectors may combined many ways achieve great specificity flexibility multiple selectors may joined spaced list specify elements location element type id class combination thereof order selectors important example applies elements class myclass inside div elements whereas applies div elements elements class myclass following table provides summary selector syntax indicating usage version css introduced declaration block consists list declarations braces declaration consists property colon codice_2 value multiple declarations block semi-colon codice_3 must inserted separate declaration properties specified css standard property set possible values properties affect type element others apply particular groups elements values may keywords center inherit numerical values 200 pixels 50 percent viewport width 80 percent parent element width color values specified keywords e.g hexadecimal values e.g also abbreviated rgb values 0 255 scale e.g codice_4 rgba values specify color alpha transparency e.g hsl hsla values e.g non-zero numeric values representing linear measures must include length unit either alphabetic code abbreviation codice_5 codice_6 percentage sign codice_7 units – codice_8 centimetre codice_9 inch codice_10 millimetre codice_11 pica codice_12 point – absolute means rendered dimension depend upon structure page others – codice_13 em codice_14 ex codice_15 pixel – relative means factors font size parent element affect rendered measurement eight units feature css 1 retained subsequent revisions proposed css values units module level 3 adopted w3c recommendation provide seven length units codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 css nearly presentational attributes html documents contained within html markup font colors background styles element alignments borders sizes explicitly described often repeatedly within html css lets authors move much information another file style sheet resulting considerably simpler html example headings codice_23 elements sub-headings codice_24 sub-sub-headings codice_25 etc. defined structurally using html print screen choice font size color emphasis elements presentational css document authors wanted assign typographic characteristics say codice_24 headings repeat html presentational markup occurrence heading type made documents complex larger error-prone difficult maintain css allows separation presentation structure css define color font text alignment size borders spacing layout many typographic characteristics independently on-screen printed views css also defines non-visual styles reading speed emphasis aural text readers w3c deprecated use presentational html markup example pre-css html heading element defined red text would written using css element coded using style properties instead html presentational attributes advantages may immediately clear since second form actually verbose power css becomes apparent style properties placed internal style element even better external css file example suppose document contains style element codice_23 elements document automatically become red without requiring explicit code author later wanted make codice_23 elements blue instead could done changing style element rather laboriously going document changing color individual codice_23 element styles also placed external css file described loaded using syntax similar decouples styling html document makes possible restyle multiple documents simply editing shared external css file css information provided various sources sources web browser user author information author classified inline media type importance selector specificity rule order inheritance property definition css style information separate document embedded html document multiple style sheets imported different styles applied depending output device used example screen version quite different printed version authors tailor presentation appropriately medium style sheet highest priority controls content display declarations set highest priority source passed source lower priority user agent style process called cascading one goals css allow users greater control presentation someone finds red italic headings difficult read may apply different style sheet depending browser web site user may choose various style sheets provided designers may remove added styles view site using browser default styling may override red italic heading style without altering attributes specificity refers relative weights various rules determines styles apply element one rule could apply based specification simple selector e.g h1 specificity 1 class selectors specificity 1,0 id selectors specificity 1,0,0 specificity values carry decimal system commas used separate digits css rule 11 elements 11 classes would specificity 11,11 121 thus following rules selectors result indicated specificity consider html fragment example declaration codice_30 attribute overrides one codice_31 element higher specificity thus paragraph appears green inheritance key feature css relies ancestor-descendant relationship operate inheritance mechanism properties applied specified element also descendants inheritance relies document tree hierarchy xhtml elements page based nesting descendant elements may inherit css property values ancestor element enclosing general descendant elements inherit text-related properties box-related properties inherited properties inherited color font letter-spacing line-height list-style text-align text-indent text-transform visibility white-space word-spacing properties inherited background border display float clear height width margin min- max-height -width outline overflow padding position text-decoration vertical-align z-index inheritance used avoid declaring certain properties style sheet allowing shorter css inheritance css inheritance class-based programming languages possible define class b like class modifications css possible style element class modifications however possible define css class b like could used style multiple elements without repeat modifications given following style sheet suppose h1 element emphasizing element em inside color assigned em element emphasized word illustrate inherits color parent element h1 style sheet h1 color pink hence em element likewise pink whitespace properties selectors ignored code snippet functionally equivalent one one common way format css readability indent property give line addition formatting css readability shorthand properties used write code faster also gets processed quickly rendered css 2.1 defines three positioning schemes four possible values position property item positioned way static properties top bottom left right used specify offsets positions codice_32 property may one three values absolutely positioned fixed items floated elements normally flow around floated items unless prevented codice_33 property css first proposed håkon wium lie october 10 1994 time lie working tim berners-lee cern several style sheet languages web proposed around time discussions public mailing lists inside world wide web consortium resulted first w3c css recommendation css1 released 1996 particular proposal bert bos influential became co-author css1 regarded co-creator css style sheets existed one form another since beginnings standard generalized markup language sgml 1980s css developed provide style sheets web one requirement web style sheet language style sheets come different sources web therefore existing style sheet languages like dsssl fosi suitable css hand let document style influenced multiple style sheets way cascading styles html grew came encompass wider variety stylistic capabilities meet demands web developers evolution gave designer control site appearance cost complex html variations web browser implementations violawww worldwideweb made consistent site appearance difficult users less control web content displayed browser/editor developed tim berners-lee style sheets hard-coded program style sheets could therefore linked documents web robert cailliau also cern wanted separate structure presentation different style sheets could describe different presentation printing screen-based presentations editors improving web presentation capabilities topic interest many web community nine different style sheet languages proposed www-style mailing list nine proposals two especially influential became css cascading html style sheets stream-based style sheet proposal ssp two browsers served testbeds initial proposals lie worked yves lafon implement css dave raggett arena browser bert bos implemented ssp proposal argo browser thereafter lie bos worked together develop css standard h removed name style sheets could also applied markup languages besides html lie proposal presented mosaic web conference later called www2 chicago illinois 1994 bert bos 1995 around time w3c already established took interest development css organized workshop toward end chaired steven pemberton resulted w3c adding work css deliverables html editorial review board erb lie bos primary technical staff aspect project additional members including thomas reardon microsoft participating well august 1996 netscape communication corporation presented alternative style sheet language called javascript style sheets jsss spec never finished deprecated end 1996 css ready become official css level 1 recommendation published december development html css dom taking place one group html editorial review board erb early 1997 erb split three working groups html working group chaired dan connolly w3c dom working group chaired lauren wood softquad css working group chaired chris lilley w3c css working group began tackling issues addressed css level 1 resulting creation css level 2 november 4 1997 published w3c recommendation may 12 1998 css level 3 started 1998 still development 2014 2005 css working groups decided enforce requirements standards strictly meant already published standards like css 2.1 css 3 selectors css 3 text pulled back candidate recommendation working draft level css 1 specification completed 1996 microsoft internet explorer 3 released year featuring limited support css ie 4 netscape 4.x added support typically incomplete many bugs prevented css usefully adopted three years web browser achieved near-full implementation specification internet explorer 5.0 macintosh shipped march 2000 first browser full better 99 percent css 1 support surpassing opera leader since introduction css support fifteen months earlier browsers followed soon afterwards many additionally implemented parts css 2 however even later 'version 5 web browsers began offer fairly full implementation css still incorrect certain areas fraught inconsistencies bugs quirks microsoft internet explorer 5.x windows opposed different ie macintosh flawed implementation 'css box model compared css standards inconsistencies variation feature support made difficult designers achieve consistent appearance across browsers platforms without use workarounds termed css hacks filters ie/windows box model bugs serious internet explorer 6 released microsoft introduced backwards-compatible mode css interpretation 'quirks mode alongside alternative corrected 'standards mode non-microsoft browsers also provided 'mode'-switch behavior capability therefore became necessary authors html files ensure contained special distinctive 'standards-compliant css intended marker show authors intended css interpreted correctly compliance standards opposed intended long-obsolete ie5/windows browser without marker web browsers 'quirks mode'-switching capability size objects web pages ie5/windows would rather following css standards problems patchy adoption css along errata original specification led w3c revise css 2 standard css 2.1 moved nearer working snapshot current css support html browsers css 2 properties browser successfully implemented dropped cases defined behaviors changed bring standard line predominant existing implementations css 2.1 became candidate recommendation february 25 2004 css 2.1 pulled back working draft status june 13 2005 returned candidate recommendation status july 19 2007 addition problems codice_34 extension used software product used convert powerpoint files compact slide show files web servers served codice_34 mime type codice_36 rather codice_1 css various levels profiles level css builds upon last typically adding new features typically denoted css 1 css 2 css 3 css 4 profiles typically subset one levels css built particular device user interface currently profiles mobile devices printers television sets profiles confused media types added css 2 first css specification become official w3c recommendation css level 1 published december 17 1996 håkon wium lie bert bos credited original developers among capabilities support w3c longer maintains css 1 recommendation css level 2 specification developed w3c published recommendation may 1998 superset css 1 css 2 includes number new capabilities like absolute relative fixed positioning elements z-index concept media types support aural style sheets later replaced css 3 speech modules bidirectional text new font properties shadows w3c longer maintains css 2 recommendation css level 2 revision 1 often referred css 2.1 fixes errors css 2 removes poorly supported fully interoperable features adds already implemented browser extensions specification comply w3c process standardizing technical specifications css 2.1 went back forth working draft status candidate recommendation status many years css 2.1 first became candidate recommendation february 25 2004 reverted working draft june 13 2005 review returned candidate recommendation 19 july 2007 updated twice 2009 however changes clarifications made went back last call working draft 7 december 2010 css 2.1 went proposed recommendation 12 april 2011 reviewed w3c advisory committee finally published w3c recommendation 7 june 2011 css 2.1 planned first final revision level 2—but low priority work css 2.2 began 2015 unlike css 2 large single specification defining various features css 3 divided several separate documents called modules module adds new capabilities extends features defined css 2 preserving backward compatibility work css level 3 started around time publication original css 2 recommendation earliest css 3 drafts published june 1999 due modularization different modules different stability statuses modules candidate recommendation cr status considered moderately stable cr stage implementations advised drop vendor prefixes single integrated css4 specification split separate level 4 modules css3 split css language definition modules modules allowed level independently modules level 3—they build things css 2.1 level-4 modules exist image values backgrounds borders selectors build functionality preceding level-3 module modules defining entirely new functionality flexbox designated level 1 css working group sometimes publishes snapshots collection whole modules parts drafts considered stable interoperably implemented hence ready use far five best current practices documents published notes 2007 2010 2015 2017 2018 web browser uses layout engine render web pages support css functionality consistent browsers parse css perfectly multiple coding techniques developed target specific browsers workarounds commonly known css hacks css filters adoption new functionality css hindered lack support major browsers example internet explorer slow add support many css 3 features slowed adoption features damaged browser reputation among developers order ensure consistent experience users web developers often test sites across multiple operating systems browsers browser versions increasing development time complexity tools browserstack built reduce complexity maintaining environments addition testing tools many sites maintain lists browser support specific css properties including caniuse mozilla developer network additionally css 3 defines feature queries provide codice_38 directive allow developers target browsers support certain functionality directly within css css supported older browsers also sometimes patched using javascript polyfills pieces javascript code designed make browsers behave consistently workarounds—and need support fallback functionality—can add complexity development projects consequently companies frequently define list browser versions support websites adopt newer code standards incompatible older browsers browsers cut accessing many resources web sometimes intentionally many popular sites internet visually degraded older browsers due poor css support work large part due evolution javascript web technologies noted limitations current capabilities css include additionally several issues present prior versions css standard alleviated css frameworks pre-prepared libraries meant allow easier standards-compliant styling web pages using cascading style sheets language css frameworks include foundation blueprint bootstrap cascade framework materialize like programming scripting language libraries css frameworks usually incorporated external .css sheets referenced html provide number ready-made options designing laying web page although many frameworks published authors use mostly rapid prototyping learning prefer 'handcraft css appropriate published site without design maintenance download overhead many unused features site styling size css resources used project increases development team often needs decide common design methodology keep organized goals ease development ease collaboration development performance deployed stylesheets browser popular methodologies include oocss object oriented css acss atomic css ocss organic cascade style sheet smacss scalable modular architecture css bem block element modifier | [
513,
6657,
9732,
9736,
6154,
16,
2579,
24,
4121,
9241,
6171,
7708,
9757,
7713,
10791,
3626,
9770,
559,
3120,
2611,
4661,
3639,
10808,
9786,
3643,
9275,
64,
65,
1098,
4171,
5707,
10834,
6231,
8281,
2139,
6747,
9311,
8289,
1642,
9834,
984... | Test |
8,924 | 9 | Coq:coq computer science coq interactive theorem prover allows expression mathematical assertions mechanically checks proofs assertions helps find formal proofs extracts certified program constructive proof formal specification coq works within theory calculus inductive constructions derivative calculus constructions coq automated theorem prover includes automatic theorem proving tactics various decision procedures association computing machinery rewarded thierry coquand gérard pierre huet christine paulin-mohring bruno barras jean-christophe filliâtre hugo herbelin chetan murthy yves bertot pierre castéran 2013 acm software system award coq seen programming language coq implements dependently typed functional programming language seen logical system implements higher-order type theory development coq supported since 1984 inria collaboration école polytechnique university paris-sud paris diderot university cnrs 1990s ens lyon also part project development coq initiated gérard pierre huet thierry coquand 40 people mainly researchers contributed features core system implementation team successively coordinated gérard huet christine paulin-mohring hugo herbelin matthieu sozeau coq part implemented ocaml bit c. core system extended due mechanism plug-ins word coq means rooster french stems local tradition naming french research development tools animal names 1991 coquand implementing language called calculus constructions simply called coc time 1991 new implementation based extended calculus inductive constructions started name changed coc coq also indirect reference thierry coquand developed calculus constructions along gérard pierre huet calculus inductive constructions along christine paulin-mohring coq provides specification language called gallina meaning hen latin spanish italian catalan programs written gallina weak normalization property – always terminate one way avoid halting problem may surprising since infinite loops non-termination common programming languages georges gonthier microsoft research cambridge england benjamin werner inria used coq create surveyable proof four color theorem completed 2005 based work significant extension coq developed called ssreflect stands small scale reflection despite name new features added coq ssreflect general-purpose features useful merely computational reflection style proof include ssreflect 1.4 freely available dual-licensed open source cecill-b cecill-2.0 license compatible coq 8.4 | [
4612,
9866,
1936,
11026,
11028,
10008,
2585,
5796,
6188,
7983,
2045,
4791,
6460,
8511,
11221,
3926,
5079,
9816,
7386,
4446,
6239,
8926,
5612,
369,
11641,
1019,
5885
] | None |
8,925 | 3 | Robowarrior:robowarrior robowarrior known japan english language action/puzzle video game developed hudson soft co-developed aicom making first nes game worked published jaleco nintendo entertainment system msx robowarrior takes place alien planet called altile created scientists solution overpopulation problem earth peaceful period altitle robowarriors decommissioned earth xantho empire invades altitle try transform personal gain player operates cyborg named zed z-type earth defence game zed raids altile fight xantho empire destroy leader xur zed deploys bombs clear path rocks walls forests killing enemies collecting items gameplay elements resemble bomberman 1983 robowarrior comprises five level formats 27 levels game one player must obtain key time limit expires another key unavailable player acquires crystal chalice levels cast darkness rendering obstructions invisible unless player lit lamp still levels mazes player must find blast-through weak points walls proceed periodically player engages boss level multiple bombs required bomb certain unconventional areas robowarrior also features water stages enemies respawn stage allowing player stock bombs zed controlled via overhead viewpoint player move four directions like hudson soft games hudson bee game lot stage work robowarrior features 4 11 horizontal hudson bees 1991 sunsoft published sequel bomber king game boy titled bomber king scenario 2 | [
10010,
6109,
9006
] | Test |
8,926 | 9 | Curry–Howard_correspondence:curry–howard correspondence programming language theory proof theory curry–howard correspondence also known curry–howard isomorphism equivalence proofs-as-programs propositions- formulae-as-types interpretation direct relationship computer programs mathematical proofs generalization syntactic analogy systems formal logic computational calculi first discovered american mathematician haskell curry logician william alvin howard link logic computation usually attributed curry howard although idea related operational interpretation intuitionistic logic given various formulations l. e. j. brouwer arend heyting andrey kolmogorov see brouwer–heyting–kolmogorov interpretation stephen kleene see realizability relationship extended include category theory three-way curry–howard–lambek correspondence beginnings curry–howard correspondence lie several observations words curry–howard correspondence observation two families seemingly unrelated formalisms—namely proof systems one hand models computation other—are fact kind mathematical objects one abstracts peculiarities either formalism following generalization arises proof program formula proves type program informally seen analogy states return type function i.e. type values returned function analogous logical theorem subject hypotheses corresponding types argument values passed function program compute function analogous proof theorem sets form logic programming rigorous foundation proofs represented programs especially lambda terms proofs run correspondence starting point large spectrum new research discovery leading particular new class formal systems designed act proof system typed functional programming language includes martin-löf intuitionistic type theory coquand calculus constructions two calculi proofs regular objects discourse one state properties proofs way program field research usually referred modern type theory typed lambda calculi derived curry–howard paradigm led software like coq proofs seen programs formalized checked run converse direction use program extract proof given correctness—an area research closely related proof-carrying code feasible programming language program written richly typed development type systems partly motivated wish make curry–howard correspondence practically relevant curry–howard correspondence also raised new questions regarding computational content proof concepts covered original works curry howard particular classical logic shown correspond ability manipulate continuation programs symmetry sequent calculus express duality two evaluation strategies known call-by-name call-by-value speculatively curry–howard correspondence might expected lead substantial unification mathematical logic foundational computer science hilbert-style logic natural deduction two kinds proof systems among large family formalisms alternative syntaxes include sequent calculus proof nets calculus structures etc one admits curry–howard correspondence general principle proof system hides model computation theory underlying untyped computational structure kinds proof system possible natural question whether something mathematically interesting said underlying computational calculi conversely combinatory logic simply typed lambda calculus models computation either girard linear logic developed fine analysis use resources models lambda calculus typed version turing machine would behave proof system typed assembly languages instance low-level models computation carry types possibility writing non-terminating programs turing-complete models computation languages arbitrary recursive functions must interpreted care naive application correspondence leads inconsistent logic best way dealing arbitrary computation logical point view still actively debated research question one popular approach based using monads segregate provably terminating potentially non-terminating code approach also generalizes much richer models computation related modal logic natural extension curry–howard isomorphism radical approach advocated total functional programming eliminate unrestricted recursion forgo turing completeness although still retaining high computational complexity using controlled corecursion wherever non-terminating behavior actually desired general formulation curry–howard correspondence correspondence formal proof calculi type systems models computation particular splits two correspondences one level formulas types independent particular proof system model computation considered one level proofs programs time specific particular choice proof system model computation considered level formulas types correspondence says implication behaves function type conjunction product type may called tuple struct list term depending language disjunction sum type type may called union false formula empty type true formula singleton type whose sole member null object quantifiers correspond dependent function space products appropriate summarized following table level proof systems models computations correspondence mainly shows identity structure first particular formulations systems known hilbert-style deduction system combinatory logic secondly particular formulations systems known natural deduction lambda calculus natural deduction system lambda calculus following correspondences beginning simple remark curry feys 1958 book combinatory logic simplest types basic combinators k combinatory logic surprisingly corresponded respective axiom schemes α → β → α α → β → γ → α → β → α → γ used hilbert-style deduction systems reason schemes often called axioms k s. examples programs seen proofs hilbert-style logic given one restricts implicational intuitionistic fragment simple way formalize logic hilbert style follows let γ finite collection formulas considered hypotheses δ derivable γ denoted γ ⊢ δ following cases formalized using inference rules left column following table typed combinatory logic formulated using similar syntax let γ finite collection variables annotated types term also annotated type depend variables γ ⊢ δ generation rules defined given right-column curry remark simply states columns one-to-one correspondence restriction correspondence intuitionistic logic means classical tautologies peirce law α → β → α → α excluded correspondence seen abstract level correspondence restated shown following table especially deduction theorem specific hilbert-style logic matches process abstraction elimination combinatory logic thanks correspondence results combinatory logic transferred hilbert-style logic vice versa instance notion reduction terms combinatory logic transferred hilbert-style logic provides way canonically transform proofs proofs statement one also transfer notion normal terms notion normal proofs expressing hypotheses axioms never need detached since otherwise simplification happen conversely non provability intuitionistic logic peirce law transferred back combinatory logic typed term combinatory logic typable type results completeness sets combinators axioms also transferred instance fact combinator x constitutes one-point basis extensional combinatory logic implies single axiom scheme principal type x adequate replacement combination axiom schemes curry emphasized syntactic correspondence hilbert-style deduction combinatory logic howard made explicit 1969 syntactic analogy programs simply typed lambda calculus proofs natural deduction left-hand side formalizes intuitionistic implicational natural deduction calculus sequents use sequents standard discussions curry–howard isomorphism allows deduction rules stated cleanly implicit weakening right-hand side shows typing rules lambda calculus left-hand side γ γ γ denote ordered sequences formulas right-hand side denote sequences named i.e. typed formulas names different paraphrase correspondence proving γ ⊢ α means program given values types listed γ manufactures object type α axiom corresponds introduction new variable new unconstrained type rule corresponds function abstraction rule corresponds function application observe correspondence exact context γ taken set formulas e.g. λ -terms λx λy x λx λy type would distinguished correspondence examples given howard showed correspondence extends connectives logic constructions simply typed lambda calculus seen abstract level correspondence summarized shown following table especially also shows notion normal forms lambda calculus matches prawitz notion normal deduction natural deduction follows algorithms type inhabitation problem turned algorithms deciding intuitionistic provability howard correspondence naturally extends extensions natural deduction simply typed lambda calculus non-exhaustive list time curry also time howard proofs-as-programs correspondence concerned intuitionistic logic i.e logic particular peirce law deducible extension correspondence peirce law hence classical logic became clear work griffin typing operators capture evaluation context given program execution evaluation context later reinstalled basic curry–howard-style correspondence classical logic given note correspondence double-negation translation used map classical proofs intuitionistic logic continuation-passing-style translation used map lambda terms involving control pure lambda terms particularly call-by-name continuation-passing-style translations relates kolmogorov double negation translation call-by-value continuation-passing-style translations relates kind double-negation translation due kuroda finer curry–howard correspondence exists classical logic one defines classical logic adding axiom peirce law allowing several conclusions sequents case classical natural deduction exists proofs-as-programs correspondence typed programs parigot λμ-calculus proofs-as-programs correspondence settled formalism known gentzen sequent calculus correspondence well-defined pre-existing model computation hilbert-style natural deductions sequent calculus characterized presence left introduction rules right introduction rule cut rule eliminated structure sequent calculus relates calculus whose structure close one abstract machines informal correspondence follows n. g. de bruijn used lambda notation representing proofs theorem checker automath represented propositions categories proofs late 1960s period time howard wrote manuscript de bruijn likely unaware howard work stated correspondence independently sørensen urzyczyn 1998 2006 pp 98–99 researchers tend use term curry–howard–de bruijn correspondence place curry–howard correspondence bhk interpretation interprets intuitionistic proofs functions specify class functions relevant interpretation one takes lambda calculus class function bhk interpretation tells howard correspondence natural deduction lambda calculus kleene recursive realizability splits proofs intuitionistic arithmetic pair recursive function proof formula expressing recursive function realizes i.e correctly instantiates disjunctions existential quantifiers initial formula formula gets true kreisel modified realizability applies intuitionistic higher-order predicate logic shows simply typed lambda term inductively extracted proof realizes initial formula case propositional logic coincides howard statement extracted lambda term proof seen untyped lambda term realizability statement paraphrase fact extracted lambda term type formula means seen type gödel dialectica interpretation realizes extension intuitionistic arithmetic computable functions connection lambda calculus unclear even case natural deduction joachim lambek showed early 1970s proofs intuitionistic propositional logic combinators typed combinatory logic share common equational theory one cartesian closed categories expression curry–howard–lambek correspondence used people refer three way isomorphism intuitionistic logic typed lambda calculus cartesian closed categories objects interpreted types propositions morphisms terms proofs correspondence works equational level expression syntactic identity structures case curry howard correspondences i.e structure well-defined morphism cartesian-closed category comparable structure proof corresponding judgment either hilbert-style logic natural deduction clarify distinction underlying syntactic structure cartesian closed categories rephrased objects types defined morphisms terms defined well-defined morphisms typed terms defined following typing rules usual categorical morphism notation formula_13 replaced sequent calculus notation formula_14 identity composition unit type terminal object cartesian product left right projection currying application finally equations category equations imply following formula_34-laws exists formula_37 iff formula_38 provable implicational intuitionistic logic thanks curry–howard correspondence typed expression whose type corresponds logical formula analogous proof formula examples example consider proof theorem lambda calculus type identity function λ x x combinatory logic identity function obtained applying λ fgx fx gx twice k λ xy x k k description proof says following steps used prove general procedure whenever program contains application form p q steps followed complicated example let look theorem corresponds b function type b β → α → γ → β → γ → α b equivalent k k roadmap proof theorem β → α → γ → β → γ → α first step construct k make antecedent k axiom look like axiom set α equal equal avoid variable collisions since antecedent consequent detached using modus ponens theorem corresponds type k apply expression taking follows put yielding detach consequent formula type k special case theorem last formula must applied k. specialize k time replacing antecedent prior formula detaching consequent switching names variables gives us remained prove diagram gives proof natural deduction shows interpreted λ -expression λ λ b λ g b g type recently isomorphism proposed way define search space partition genetic programming method indexes sets genotypes program trees evolved gp system curry–howard isomorphic proof referred species correspondences listed go much farther deeper example cartesian closed categories generalized closed monoidal categories internal language categories linear type system corresponding linear logic generalizes simply-typed lambda calculus internal language cartesian closed categories moreover shown correspond cobordisms play vital role string theory extended set equivalences also explored homotopy type theory became active area research around 2013 still type theory extended univalence axiom equivalence equivalent equality permits homotopy type theory used foundation mathematics including set theory classical logic providing new ways discuss axiom choice many things curry–howard correspondence proofs elements inhabited types generalized notion homotopic equivalence proofs paths space identity type equality type type theory interpreted path | [
10043,
10145,
5796,
8262,
4455,
4392,
9065,
10953,
12,
6188,
10395,
5585,
1019,
8924,
6239
] | Validation |
8,927 | 4 | MAGEN_(security):magen security magen masking gateway enterprises information security technology designed ibm haifa research lab magen designed keep users viewing discrete chunks secret sensitive data screens authorized see magen applies sort inverse highlighting data question real time rendered screen allows eyes business logic implemented screen rather within affected application magen leverages combination optical character recognition screen scraping techniques | [
5857,
5373
] | None |
8,928 | 2 | Futex:futex computing futex short fast userspace mutex kernel system call programmers use implement basic locking building block higher-level locking abstractions semaphores posix mutexes condition variables futex consists kernelspace wait queue attached atomic integer userspace multiple processes threads operate integer entirely userspace using atomic operations avoid interfering one another resort relatively expensive system calls request operations wait queue example wake waiting processes put current process wait queue properly programmed futex-based lock use system calls except lock contended since operations require arbitration processes happen cases futex implemented 1995 beos also known benaphores https //www.haiku-os.org/legacy-docs/benewsletter/issue1-26.html linux hubertus franke ibm thomas j. watson research center matthew kirkwood ingo molnár red hat rusty russell ibm linux technology center originated futex mechanism futexes appeared first time version 2.5.7 linux kernel development series semantics stabilized version 2.5.40 futexes part linux kernel mainline since december 2003 release 2.6.x stable kernel series 2002 discussions took place proposal make futexes accessible via file system creating special node codice_1 codice_2 however linus torvalds strongly opposed idea rejected related patches may 2014 cve system announced vulnerability discovered linux kernel futex subsystem allowed denial-of-service attacks local privilege escalation may 2015 linux kernel introduced deadlock bug via commit b0c29f79ecea caused hang user applications bug affected many enterprise linux distributions including 3.x 4.x kernels red hat enterprise linux version 5 6 7 suse linux 12 amazon linux futexes implemented openbsd since 2016 futex mechanism one core concepts zircon kernel google fuchsia operating system since least april 2018 futexes two basic operations codice_3 codice_4 third operation called codice_5 available functions generic codice_4 operation move threads waiting queues | [
7175,
4616,
9225,
3082,
5139,
10780,
10785,
6180,
1584,
8242,
9266,
4665,
4161,
8772,
6213,
8268,
589,
593,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
7821,
4238,
10382,
2195,
2709,
2711,
6808,
9882,
1694,
2723,
8364,
10933,
5815,
... | None |
8,929 | 7 | Messaging_pattern:messaging pattern software architecture messaging pattern network-oriented architectural pattern describes two different parts message passing system connect communicate telecommunications message exchange pattern mep describes pattern messages required communications protocol establish use communication channel two major message exchange patterns — request–response pattern one-way pattern example http request–response pattern protocol udp one-way pattern term message exchange pattern specific meaning within simple object access protocol soap soap mep types include ømq message queueing library provides so-called sockets kind generalization traditional ip unix sockets require indicating messaging pattern used optimized pattern basic ømq patterns pattern defines particular network topology request-reply defines so-called service bus publish-subscribe defines data distribution tree push-pull defines parallelised pipeline patterns deliberately designed way infinitely scalable thus usable internet scale | [
1280,
9441,
10913,
5029,
7175,
5449,
9225,
333,
2222,
8252,
337,
11413,
3990,
10486,
2011,
1756,
4797
] | Test |
8,930 | 4 | Billion_laughs_attack:billion laughs attack computer security billion laughs attack type denial-of-service dos attack aimed parsers xml documents also referred xml bomb exponential entity expansion attack example attack consists defining 10 entities defined consisting 10 previous entity document consisting single instance largest entity expands one billion copies first entity frequently cited example first entity string lol hence name billion laughs amount computer memory used would likely exceed available process parsing xml certainly would time vulnerability first reported original form attack aimed specifically xml parsers term may applicable similar subjects well problem first reported early 2002 began widely addressed 2008 defenses kind attack include capping memory allocated individual parser loss document acceptable treating entities symbolically expanding lazily extent content used xml version= 1.0 doctype lolz lolz lol9 /lolz xml parser loads document sees includes one root element lolz contains text lol9 however lol9 defined entity expands string containing ten lol8 strings lol8 string defined entity expands ten lol7 strings entity expansions processed small 1 kb block xml actually contain 10 billion lol taking almost 3 gigabytes memory billion laughs attack described takes exponential amount space quadratic blowup variation causes quadratic growth storage requirements simply repeating large entity avoid countermeasures detect heavily nested entities see computational complexity theory comparisons different growth classes billion laughs attack exist file format contain references example yaml bomb lol lol lol lol lol lol lol lol lol b b *a *a *a *a *a *a *a *a *a c c *b *b *b *b *b *b *b *b *b *c *c *c *c *c *c *c *c *c e e *d *d *d *d *d *d *d *d *d f f *e *e *e *e *e *e *e *e *e g g *f *f *f *f *f *f *f *f *f h h *g *g *g *g *g *g *g *g *g *h *h *h *h *h *h *h *h *h reason file formats allow references often preferred data arriving untrusted sources | [
1474,
2758,
2409,
6667,
7091,
11351,
855,
2558,
479
] | Test |
8,931 | 3 | List_of_PowerPC_processors:list powerpc processors following list powerpc processors 32-bit 64-bit powerpc processors favorite embedded computer designers keep costs low high-volume competitive products cpu core usually bundled system-on-chip soc integrated circuit socs contain processor core cache processor local data on-chip along clocking timers memory sdram peripheral network serial i/o bus pci pci-x rom/flash bus i2c controllers ibm also offers open bus architecture called coreconnect facilitate connection processor core memory peripherals soc design ibm motorola competed along parallel development lines overlapping markets later development book e powerpc specification implemented ibm freescale semiconductor defines embedded extensions powerpc programming model northbridge host bridge powerpc cpu integrated circuit ic interfacing powerpc cpu memory southbridge ic northbridge also provide interface accelerated graphics ports agp bus peripheral component interconnect pci pci-x pci express hypertransport bus specific northbridge ic must used powerpc cpu impossible use northbridge intel amd x86 cpu powerpc cpu however possible use certain types x86 southbridge powerpc based motherboards example via 686b amd geode cs5536 list northbridge powerpc | [
6914,
3844,
10501,
3846,
4743,
5642,
1548,
3472,
4880,
7065,
8090,
1563,
1309,
799,
6949,
6311,
3883,
10543,
4017,
5297,
7218,
11314,
8120,
6715,
1725,
1983,
1985,
8530,
3540,
342,
9302,
6878,
1635,
8035,
3185,
4211,
5235,
8058,
8700
] | Validation |
8,932 | 4 | CA_Anti-Spyware:ca anti-spyware ca anti-spyware spyware detection program distributed ca inc. 2007 known pestpatrol product offered total defense inc. named total defense anti-virus pestpatrol inc. carlisle pa based software company founded dr. david stang robert bales developed pestpatrol released first version 2000 originally called safersite company changed name 2002 better reflect focus company pestpatrol anti-malware product designed protect computer system threats adware spyware viruses performed automated scans system hard disks windows registry crucial system areas enabled manual scans specific threats selected long list known malicious software among unique features cookiepatrol purges spyware cookies keypatrol detects keyloggers unlike anti-spyware programs designed home use single desktop pestpatrol also provided solution network environments found enterprises among features made appealing enterprise security administrators ability manage networked desktops remotely early versions product criticized poor user interface described alternatively something looks like application ported os/2 unclear buttons clunky text-based ui reviewers praised malware detection removal capabilities stating pestpatrol effective anti-spyware system short switch linux 've ever used described infoworld one established brands anti-spyware 2002 selected security product year network world cited ability detect remove 60,000 types malware defenses remote administration tools rats billing authority spyware protection licensed signature files use yahoo companion others 2003 along anti-spyware anti-malware companies webroot lavasoft aluria formed industry consortium fight malware called consortium antispyware technology coast computer associates ca technologies bought pestpatrol 2004 made part etrust computer security line includes virus scanner firewall using newly acquired technology ca created bundle named ca integrated threat management itm consisted anti-virus solution pestpatrol anti-spyware renamed ca anti-spyware 2007 program bought separately part ca internet security 2007 ca anti-spyware team instrumental exposing fact facebook collecting personal information users without knowledge even users opted facebook ill-fated beacon program even users logged facebook | [
6797,
877,
6382,
7983,
9713,
8978,
7957,
823,
10392,
8735
] | Validation |
8,933 | 5 | Reliable_Event_Logging_Protocol:reliable event logging protocol reliable event logging protocol relp networking protocol computer data logging computer networks extends functionality syslog protocol provide reliable delivery event messages often used environments tolerate message loss financial industry relp uses tcp message transmission provides basic protection message loss guarantee delivery circumstances connection aborts tcp reliably detect whether last messages sent actually reached destination unlike syslog protocol relp works backchannel conveys information back sender messages processed receiver enables relp always know messages properly received even case connection abort relp developed 2008 reliable protocol rsyslog-to-rsyslog communication relp designer rainer gerhards explains lack reliable transmission industry-standard syslog core motivation create relp originally rfc 3195 syslog considered take part rsyslog suffered high overhead missing support new ietf syslog standards since published rfc 5424 named time relp initially meant solely rsyslog use became adopted widely currently tools linux windows support relp also in-house deployments java relp still formally standardized evolved industry standard computer logging relp inspired rfc 3195 syslog rfc 3080 initial connection sender receiver negotiate session options like supported command set application level window size network event messages transferred commands receiver acknowledges command soon processed sessions may closed sender receiver usually terminated sender side order facilitate message recovery session aborts relp keeps transaction numbers command negotiates messages need resent session reestablishment current version relp specify native tls support however practical deployments use wrappers around relp session order provide functionality publicly available implementations listed list exhaustive | [
961,
6273,
10924
] | None |
8,934 | 7 | Cloud_communications:cloud communications cloud communications internet-based voice data communications telecommunications applications switching storage hosted third-party outside organization using accessed public internet cloud services broad term referring primarily data-center-hosted services run accessed internet infrastructure recently services data-centric evolution voip voice internet protocol voice become part cloud phenomenon cloud telephony also known hosted telephony refers specifically voice services specifically replacement conventional business telephone equipment private branch exchange pbx third-party voip service cloud communications providers deliver voice data communications applications services hosting servers providers maintain giving customers access “ cloud. ” pay services applications use customers cost-effective reliable secure communications environment without headaches associated conventional pbx system deployment companies cut costs cloud communications services without sacrificing features success google others cloud-based providers demonstrated cloud-based platform effective software-based platform much lower cost voice services delivered cloud increases value hosted telephony users equally well turn cloud-based offering instead relying facilities-based service provider hosted voip expands options beyond local regional carriers past businesses able services telecommunication cloud communications attractive cloud become platform voice data video hosted services built around voice usually referred hosted voip cloud communications environment serves platform upon modes seamlessly work well integrate three trends enterprise communications pushing users access cloud allowing device choose development traditional communications infrastructure designed handle first trend increasingly distributed company operations branches home offices making wide area networks cumbersome inefficient costly second communications devices need access enterprise networks – iphones printers voip handsets example third data centers housing enterprise assets applications consolidating often located managed remotely cloud telephony services predominantly used business processes advertising e-commerce human resources payments processing services include distributed call centers economical teleworking scale services features functionality expected evolve even coming years embrace mobilisation facilitate direct collaboration streamline communications small medium-sized business capital investment set voip infrastructure in-house could high compared potential return cloud telephony could offer services lower-cost subscription basis cloud telephony provider also expert technology whereas small business unlikely employee level expertise justify expense full-time telecommunication infrastructure position traditional telephony applications required on-premises maintenance pbx great deal wiring main distribution frame mdf cloud communications promoted help businesses collaboration scalability supporting access via multiple locations devices cloud technology still must exist physical servers physical location servers important many nation laws cloud telephony companies provide hosted off-site software versions services previously constructed on-site hardware also allow users geographically distributed since voice traffic moves internet examples include | [
0,
4194,
9732,
2376,
5202,
8314,
3327
] | Test |
8,935 | 4 | Jim_Geovedi:jim geovedi jim geovedi born 28 june 1979 security expert indonesia focuses discovery computer network security vulnerabilities bbc news described guy n't look like bond villain ... possesses secrets might kill geovedi co-founded ran several security consulting companies 2001 co-founded c2pro consulting providing general consulting mostly government agencies 2004 co-founded bellua asia pacific renamed xynexis international later 2010 noosc global managed security services company part hackers group began 1996 called w00w00 met future co-founder bellua anthony zboralski currently based london interviewed issues including satellite security system banking security law enforcement geovedi also professional dj music producer currently signed elektrax recordings sydney-based techno label geovedi born bandarlampung lampung indonesia graduating high school 1998-1999 found living street without steady work later managed teach computer security programming despite lacking formal education field media often use example people become successful industry relying empirical knowledge acumen even without holding university degrees arsenal fan also fan death metal grindcore music interview beritagar 2013 geovedi revealed fan napalm death brutal truth cannibal corpse deicide | [
939,
2484,
2558
] | Test |
8,936 | 1 | FloraNT:florant florant public access web-based database flora northern territory provides authoritative scientific information 4300 native taxa including descriptions maps images conservation status nomenclatural details together names used various aboriginal groups alien taxa 470 species also recorded users access fact sheets species details specimens held northern territory herbarium herbaria codes nt dna together keys regional factsheets distribution guides florant uses ibra version 5.1 botanical regions conservation act nt flora fauna territory parks wildlife conservation act 1976 twpca uses iucn criteria categories | [] | Test |
8,937 | 3 | PlayStation_3:playstation 3 playstation 3 officially abbreviated ps3 home video game console developed sony computer entertainment successor playstation 2 part playstation brand consoles first released november 11 2006 japan november 17 2006 north america march 23 2007 europe australia playstation 3 competed mainly consoles microsoft xbox 360 nintendo wii part seventh generation video game consoles console first officially announced e3 2005 released end 2006 first console use blu-ray disc primary storage medium console first playstation integrate social gaming services including playstation network well first controllable handheld console remote connectivity playstation portable playstation vita september 2009 slim model playstation 3 released longer provided hardware ability run ps2 games lighter thinner original version featured redesigned logo marketing design well minor start-up change software super slim variation released late 2012 refining redesigning console early years system critically negative reception due high price 599 60 gigabyte model 499 20 gb model complex processor architecture lack quality games praised blu-ray capabilities untapped potential reception would get positive time system slow start market managed recover particularly introduction slim model successor playstation 4 released later november 2013 september 29 2015 sony confirmed sales playstation 3 discontinued new zealand system remained production markets shipments new units europe australia ended march 2016 followed north america ended october 2016 heading 2017 japan last territory new units still produced may 29 2017 sony confirmed playstation 3 discontinued japan playstation 3 began development 2001 ken kutaragi president sony computer entertainment announced sony toshiba ibm would collaborate developing cell microprocessor time shuhei yoshida led group programmers within hardware team explore next-generation game creation early 2005 focus within sony shifted towards developing ps3 launch titles sony officially unveiled playstation 3 public may 16 2005 e3 2005 along boomerang-shaped prototype design sixaxis controller functional version system present tokyo game show september 2005 although demonstrations held events software development kits comparable personal computer hardware video footage based predicted playstation 3 specifications also shown notably final fantasy vii tech demo initial prototype shown may 2005 featured two hdmi ports three ethernet ports six usb ports however system shown year later e3 2006 reduced one hdmi port one ethernet port four usb ports presumably cut costs two hardware configurations also announced console 20 gb model 60 gb model priced us 499 €499 us 599 €599 respectively 60 gb model configuration feature hdmi port wi-fi internet flash card readers chrome trim logo silver models announced simultaneous worldwide release november 11 2006 japan november 17 2006 north america europe september 6 2006 sony announced pal region playstation 3 launch would delayed march 2007 shortage materials used blu-ray drive tokyo game show september 22 2006 sony announced would include hdmi port 20 gb system chrome trim flash card readers silver logo wi-fi would included also launch price japanese 20 gb model reduced 20 60 gb model announced open pricing scheme japan event sony showed 27 playable ps3 games running final hardware playstation 3 first released japan november 11 2006 07:00 according media create 81,639 ps3 systems sold within 24 hours introduction japan soon release japan ps3 released north america november 17 2006 reports violence surrounded release ps3 customer shot campers robbed gunpoint customers shot drive-by shooting bb guns 60 campers fought 10 systems console originally planned global release november start september release europe rest world delayed march somewhat last-minute delay companies taken deposits pre-orders sony informed customers eligible full refunds could continue pre-order january 24 2007 sony announced playstation 3 would go sale march 23 2007 europe australia middle east africa new zealand system sold 600,000 units first two days march 7 2007 60 gb playstation 3 launched singapore price 799 console launched south korea june 16 2007 single version equipped 80 gb hard drive iptv following speculation sony working 'slim model sony officially announced ps3 cech-2000 model august 18 2009 sony gamescom press conference new features included slimmer form factor decreased power consumption quieter cooling system released major territories september 2009 time new logo introduced console replace previous spider-man wordmarks named due use font logos sony then-current spider-man films new ps3 wordmark evoking design playstation 2 wordmark replacing capitalized playstation 3 lettering september 2012 tokyo game show sony announced new slimmer ps3 redesign cech-4000 due release late 2012 would available either 250 gb 500 gb hard drive three versions super slim model revealed one 500 gb hard drive second 250 gb hard drive available pal regions third 12 gb flash storage available pal regions canada storage 12 gb model upgradable official standalone 250 gb hard drive vertical stand also released model united kingdom 500 gb model released september 28 2012 12 gb model released october 12 2012 united states ps3 super slim first released bundled console 250 gb model bundled game year edition released september 25 2012 500 gb model bundled assassin creed iii released october 30 2012 japan black colored super slim model released october 4 2012 white colored super slim model released november 22 2012 super slim model 20 percent smaller 25 percent lighter slim model features manual sliding disc cover instead motorized slot-loading disc cover slim model white colored super slim model released united states january 27 2013 part instant game collection bundle garnet red azurite blue colored models launched japan february 28 2013 garnet red version released north america march 12 2013 part bundle 500 gb storage contained god war ascension well god war saga azurite blue model released gamestop exclusive 250gb storage playstation 3 launched north america 14 titles another three released end 2006 first week sales confirmed insomniac games top-selling launch game north america game heavily praised numerous video game websites including gamespot ign awarded playstation 3 game year award 2006 titles missed launch window delayed early 2007 f.e.a.r sonic hedgehog japanese launch ridge racer 7 top-selling game also fared well sales offerings namco bandai games playstation 3 launched europe 24 titles including ones offered north american japanese launches formula one championship edition motorstorm virtua fighter 5 motorstorm successful titles 2007 games subsequently received sequels form resistance 2 e3 2007 sony able show number upcoming video games playstation 3 including heavenly sword lair warhawk released third fourth quarters 2007 also showed number titles set release 2008 2009 notably killzone 2 infamous gran turismo 5 prologue littlebigplanet number third-party exclusives also shown including highly anticipated alongside high-profile third-party titles grand theft auto iv assassin creed devil may cry 4 resident evil 5 two important titles playstation 3 final fantasy xiii final fantasy versus xiii shown tgs 2007 order appease japanese market sony since launched budget range playstation 3 titles known greatest hits range north america platinum range europe australia best range japan among titles available budget range include motorstorm call duty 3 assassin creed ninja gaiden sigma october 2009 devil may cry 4 army two also joined list 595 million games sold playstation 3 best selling ps3 games grand theft auto v gran turismo 5 last us last game released playstation 3 fifa 19 september 28 2018 december 2008 cto blitz games announced would bring stereoscopic 3d gaming movie viewing xbox 360 playstation 3 technology first demonstrated publicly ps3 using sony technology january 2009 consumer electronics show journalists shown wipeout hd gran turismo 5 prologue 3d demonstration technology might work implemented future firmware update 3.30 officially allowed ps3 titles played 3d requiring compatible display use system software update 3.50 prepared 3d films game must programmed take advantage 3d technology titles may patched add functionality retroactively titles patches include wipeout hd pain super stardust hd playstation 3 convex left side playstation logo upright vertical top side convex horizontal glossy black finish playstation designer teiyu goto stated spider-man-font-inspired logo one first elements scei president ken kutaragi decided logo may motivating force behind shape ps3 march 22 2007 sce stanford university released folding home software playstation 3 program allows ps3 owners lend computing power consoles help study process protein folding disease research ps3 hardware also used build supercomputers high-performance computing fixstars solutions sells version yellow dog linux playstation 3 originally sold terra soft solutions rapidmind produced stream programming package ps3 acquired intel 2009 also january 3 2007 dr. frank mueller associate professor computer science ncsu clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v 2.5 gnu compiler collection cellsdk 1.1 cost-effective alternative conventional supercomputers u.s. military purchased clusters ps3 units research purposes retail ps3 slim units used supercomputing ps3 slim lacks ability boot third-party os december 2008 group hackers used cluster 200 playstation 3 computers crack ssl authentication november 2010 air force research laboratory afrl created powerful supercomputer connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyze high definition satellite imagery playstation 3 features slot-loading 2x speed blu-ray disc drive games blu-ray movies dvds cds optical media originally available hard drives 20 60 gb 20 gb model available pal regions various sizes 500 gb made available since see model comparison ps3 models user-upgradeable 2.5 sata hard drives playstation 3 uses cell microprocessor designed sony toshiba ibm cpu made one 3.2 ghz powerpc-based power processing element ppe eight synergistic processing elements spes eighth spe disabled improve chip yields six seven spes accessible developers seventh spe reserved console operating system graphics processing handled nvidia rsx 'reality synthesizer produce resolutions 480i/576i sd 1080p hd playstation 3 256 mb xdr dram main memory 256 mb gddr3 video memory rsx system bluetooth 2.0 support seven bluetooth devices gigabit ethernet usb 2.0 hdmi 1.4 built wi-fi networking also built-in 20 gb models flash card reader compatible memory stick sd/mmc compactflash/microdrive media built-in 60 gb cechexx 80 gb models playstation 3 produced various models original slim super slim successive models added removed various features numerous accessories console developed accessories include wireless sixaxis dualshock 3 controllers logitech driving force gt logitech cordless precision controller bd remote playstation eye camera playtv dvb-t tuner/digital video recorder accessory sony e3 press conference 2006 standard wireless sixaxis controller announced controller based basic design playstation 2 dualshock 2 controller wireless lacked vibration capabilities built-in accelerometer could detect motion three directional three rotational axes six total hence name sixaxis cosmetic tweaks press conference 2007 tokyo game show sony announced dualshock 3 trademarked dualshock 3 playstation 3 controller function design sixaxis vibration capability included hands-on accounts describe controller noticeably heavier standard sixaxis controller capable vibration forces comparable dualshock 2 released japan november 11 2007 north america april 5 2008 australia april 24 2008 new zealand may 9 2008 mainland europe july 2 2008 united kingdom ireland july 4 2008 e3 2009 sony unveiled plans release motion controller later named playstation move gdc 2010 released september 15 2010 europe september 19 2010 north america october 21 2010 japan october 13 2010 sony announced official surround sound system ps3 official playstation youtube channel playstation 3 also use dualshock 4 controller initially via usb cable firmware update 4.60 enabled wireless connection according ars technica number playstation 3 consoles experienced failure well within normal failure rates consumer electronics industry 2009 study squaretrade warranty provider found two-year failure rate 10 playstation 3s september 2009 bbc watchdog television program aired report investigating issue calling yellow light death ylod among consoles experienced failure found usually occurred 18–24 months purchase standard sony warranty covers one year purchase time period playstation 3 owners pay sony fixed fee refurbished console sony claimed according statistics returned consoles approximately 0.5 consoles reported showing ylod response televised report sony issued document criticizing program accuracy conclusions specifically faults evidence manufacturing defect document also complained report inappropriate tone might damage sony brand name sony included ability operating system referred system software updated updates acquired several ways original playstation 3 also included ability install operating systems linux included newer slim models removed older playstation 3 consoles release firmware update 3.21 april 2010 functionality available users original consoles choose update system software beyond version 3.15 installed third-party modified unofficial versions firmware instead standard playstation 3 version xrossmediabar pronounced cross media bar abbreviated xmb includes nine categories options users settings photo music video tv/video services game network playstation network friends similar playstation portable media bar tv/video services category services like netflix and/or playtv torne installed first category section channels lets users download various streaming services including sony streaming services crackle playstation vue default new section playstation network displayed system starts ps3 includes ability store various master secondary user profiles manage explore photos without musical slide show play music copy audio cd tracks attached data storage device play movies video files hard disk drive optical disc blu-ray disc dvd-video optional usb mass storage flash card compatibility usb keyboard mouse web browser supporting compatible-file download function additionally upnp media appear respective audio/video/photo categories compatible media server dlna server detected local network friends menu allows mail emoticon attached picture features video chat requires optional playstation eye eyetoy webcam network menu allows online shopping playstation store connectivity playstation portable via remote play playstation 3 console protects certain types data uses digital rights management limit data use purchased games content playstation network store governed playstation network digital rights management ndrm ndrm allows users access data 2 different playstation 3 activated using user playstation network id playstation 3 also limits transfer copy protected videos downloaded store machines states copy protected video may restore correctly following certain actions making backup downloading new copy protected movie photo gallery optional application view create group photos ps3 installed separately system software 105 mb introduced system software version 2.60 provides range tools sorting displaying system pictures key feature application organize photos groups according various criteria notable categorizations colors ages facial expressions people photos slideshows viewed application along music playlists software updated release system software version 3.40 allowing users upload browse photos facebook picasa playmemories optional stereoscopic 3d also standard photo viewing application installed playstation store 956 mb application dedicated specifically 3d photos features ability zoom 3d environments change angle perspective panoramas requires system software 3.40 higher 3d photos 3d hdtv hdmi cable 3d images viewed properly new application released part system software version 3.40 allows users edit videos playstation 3 upload internet software features basic video editing tools including ability cut videos add music captions videos rendered uploaded video sharing websites facebook youtube addition video service provided sony entertainment network playstation 3 console access variety third party video services dependent region since june 2009 vidzone offered free music video streaming service europe australia new zealand october 2009 sony computer entertainment netflix announced netflix streaming service would also available playstation 3 united states paid netflix subscription required service service became available november 2009 initially users use free blu-ray disc access service however october 2010 requirement use disc gain access removed april 2010 support mlb.tv added allowing mlb.tv subscribers watch regular season games live hd access new interactive features designed exclusively psn november 2010 access video social networking site mubi enabled european new zealand australian users service integrates elements social networking rental subscription video streaming allowing users watch discuss films users also november 2010 video rental service vudu nhl gamecenter live subscription service hulu plus launched playstation 3 united states august 2011 sony partnership directv added nfl sunday ticket october 2011 best buy launched app cinemanow service april 2012 amazon.com launched amazon video app accessible amazon prime subscribers us upon reviewing playstation netflix collaboration pocket-lint said 've used netflix app xbox good think ps3 version might edge stated netflix lovefilm playstation mind-blowingly good july 2013 yupptv ott player launched branded application ps3 computer entertainment system united states playstation 3 initially shipped ability install alternative operating system alongside main system software linux unix-based operating systems available hardware allowed access six seven synergistic processing elements cell microprocessor rsx 'reality synthesizer graphics chip 'otheros functionality present updated ps slim models feature subsequently removed previous versions ps3 part machine firmware update version 3.21 released april 1 2010 sony cited security concerns rationale firmware update 3.21 mandatory access playstation network removal caused controversy update removed officially advertised features already sold products gave rise several class action lawsuits aimed making sony return feature provide compensation december 8 2011 u.s. district judge richard seeborg dismissed last remaining count class action lawsuit claims suit previously dismissed stating legal matter ... plaintiffs failed allege facts articulate theory sony may held liable u.s. court appeals ninth circuit partially reversed dismissal sent case back district court march 1 2010 utc many original fat playstation 3 models worldwide experiencing errors related internal system clock error many symptoms initially main problem seemed inability connect playstation network however root cause problem unrelated playstation network since even users never online also problems playing installed offline games queried system timer part startup using system themes time many users noted console clock gone back december 31 1999 event nicknamed apocalyps3 play word apocalypse ps3 abbreviation playstation 3 console error code displayed typically 8001050f affected users unable sign play games use dynamic themes view/sync trophies problem resided within 1st 3rd generation original ps3 units newer slim models unaffected different internal hardware clock sony confirmed error stated narrowing issue continuing work restore service march 2 utc 2010 owners original ps3 models could connect psn successfully clock longer showed december 31 1999 sony stated affected models incorrectly identified 2010 leap year bug bcd method storing date however users hardware operating system clock mainly updated internet associated internal clock needed updated manually re-syncing via internet june 29 2010 sony released ps3 system software update 3.40 improved functionality internal clock properly account leap years playstation portable connect playstation 3 many ways including in-game connectivity example formula one championship edition racing game shown e3 2006 using psp real-time rear-view mirror addition users able download original playstation format games playstation store transfer play psp well ps3 also possible use remote play feature play playstation network games remotely psp network internet connection sony also demonstrated psp playing back video content playstation 3 hard disk across ad hoc wireless network feature referred remote play located browser icon playstation 3 playstation portable remote play since expanded allow remote access ps3 via psp wireless access point world playstation network unified online multiplayer gaming digital media delivery service provided sony computer entertainment playstation 3 playstation portable announced 2006 playstation business briefing meeting tokyo service always connected free includes multiplayer support network enables online gaming playstation store playstation home services playstation network uses real currency playstation network cards seen playstation store playstation home playstation plus commonly abbreviated ps+ occasionally referred psn plus premium playstation network subscription service officially unveiled e3 2010 jack tretton president ceo scea rumors service speculation since kaz hirai announcement tgs 2009 possible paid service psn current psn service still available launched alongside ps3 firmware 3.40 psp firmware 6.30 june 29 2010 paid-for subscription service provides users enhanced services playstation network top current psn service still available features enhancements include ability demos game updates download automatically playstation 3 subscribers also get early exclusive access betas game demos premium downloadable content playstation store items north american users also get free subscription qore users may choose purchase either one-year three-month subscription playstation plus playstation store online virtual market available users sony playstation 3 ps3 playstation portable psp game consoles via playstation network store offers range downloadable content purchase available free charge available content includes full games add-on content playable demos themes game movie trailers service accessible icon xmb ps3 psp ps3 store also accessed psp via remote play connection ps3 psp store also available via pc application media go 600 million downloads playstation store worldwide playstation store updated new content tuesday north america wednesday pal regions may 2010 changed thursdays allow psp games released digitally closer time released umd new announced gamescom 2009 released september 1 2009 playstation 3 system software 3.0 feature replace existing information board displayed news playstation website associated user region concept developed major playstation network feature interacts status indicator display ticker content excluding recently played content currently north america japan system displays new screen default instead games menu video menu movie inserted starting new four sections pick recently played latest information new content available playstation store four kinds content new screen displays links sections recently played displays user recently played games online services whereas sections contain website links links play videos access selected sections playstation store playstation store icons game video section act similarly new screen except display link games videos playstation store respectively playstation home virtual 3d social networking service playstation network home allowed users create custom avatar could groomed realistically users could edit decorate personal apartments avatars club houses free premium content users could shop new items win prizes ps3 games home activities users could interact connect friends customize content virtual world home also acted meeting place users wanted play multiplayer video games others closed beta began europe may 2007 expanded territories soon home delayed expanded several times initially releasing open beta test started december 11 2008 remained perpetual beta closure march 31 2015 home available directly playstation 3 xrossmediabar membership free required psn account home featured places meet interact dedicated game spaces developer spaces company spaces events service underwent weekly maintenance frequent updates time closure march 2015 home downloaded 41 million users life playstation released september 18 2008 succeed folding home retired november 6 2012 life playstation used virtual globe data display news information city along folding home functionality application provided access three information channels first live channel offering news headlines weather provided google news weather channel university wisconsin–madison space science engineering center among sources second channel world heritage channel offered historical information historical sites third channel united village channel united village designed share information communities cultures worldwide update allowed video photo viewing application fourth channel u.s. exclusive playstation network game trailers channel direct streaming game trailers april 20 2011 sony shut playstation network qriocity prolonged interval revealing april 23 due external intrusion system sony later revealed personal information 77 million users might taken including names addresses countries email addresses birthdates psn/qriocity logins passwords handles/psn online ids. ref name= psn/qriocity service update /ref also stated possible users profile data including purchase history billing address playstation network/qriocity password security answers may obtained evidence credit card data taken possibility could ruled sony advised customers credit card data may obtained additionally credit card numbers encrypted sony never collected three digit cvc csc number back credit cards required authenticating transactions response incident sony announced welcome back program 30 days free membership playstation plus psn members two free downloadable ps3 games free one-year enrollment identity theft protection program although playstation predecessors dominant competition hugely profitable sony playstation 3 inauspicious start sony chairman ceo sir howard stringer initially could convince investors turnaround fortunes ps3 lacked unique gameplay affordable wii became generation successful console terms units sold furthermore ps3 compete directly xbox 360 market head start result platform longer exclusive titles ps2 enjoyed grand theft auto final fantasy series regarding cross-platform games xbox 360 versions generally considered superior 2006 although 2008 ps3 versions reached parity surpassed took longer expected ps3 enjoy strong sales close gap xbox 360 sony also continued lose money ps3 sold 2010 although redesigned slim ps3 cut losses since playstation 3 initial production cost estimated isuppli us 805.85 20 gb model us 840.35 60 gb model however priced us 499 us 599 respectively meaning units may sold estimated loss 306 241 depending model cost estimates correct thus may contributed sony games division posting operating loss ¥232.3 billion us 1.97 billion fiscal year ending march 2007 april 2007 soon results published ken kutaragi president sony computer entertainment announced plans retire various news agencies including times wall street journal reported due poor sales scei maintains kutaragi planning retirement six months prior announcement january 2008 kaz hirai ceo sony computer entertainment suggested console may start making profit early 2009 stating next fiscal year starts april try achieve next fiscal year would great thing profitability definite commitment would like try shoot however market analysts nikko citigroup predicted playstation 3 could profitable august 2008 july 2008 interview hirai stated objective playstation 3 sell 150 million units ninth year surpassing playstation 2 sales 140 million nine years market january 2009 sony announced gaming division profitable q3 2008 since system launch production costs reduced significantly result phasing emotion engine chip falling hardware costs cost manufacturing cell microprocessors fallen dramatically result moving 65 nm production process blu-ray disc diodes become cheaper manufacture january 2008 unit cost around 400 manufacture august 2009 sony reduced costs total 70 meaning costs sony around 240 per unit early playstation 3 reviews launch critical high price lack quality games game developers regarded architecture difficult program ps3 however commended hardware including blu-ray home theater capabilities graphics potential critical commercial reception ps3 improved time series price revisions blu-ray victory hd dvd release several well received titles ars technica original launch review gave ps3 6/10 second review console june 2008 rated 9/10 september 2009 ign named playstation 3 15th best gaming console time behind competitors wii 10th xbox 360 6th however ps3 ign console showdown —based console offers best selection games released year—in three four years since began 2008 2009 2011 xbox winning 2010 ign judged playstation 3 best game line-up 2008 based review scores comparison wii xbox 360 comparison piece pc magazine greenwald june 2012 ps3 selected overall better console compared xbox 360 pocket-lint said console ps3 always brilliant games console best media device money ps3 given number-eight spot pc world magazine list top 21 tech screwups 2006 criticized late expensive incompatible gamesradar ranked ps3 top item feature game-related pr disasters asking sony managed take one anticipated game systems time — within space year — turn hate object reviled entire internet added despite problems system untapped potential business week summed general opinion stating impressed playstation 3 could currently developers also found machine difficult program 2007 gabe newell valve said ps3 total disaster many levels think really clear sony lost track customers developers wanted continued 'd say even late date cancel say 'this horrible disaster 're sorry 're going stop selling stop trying convince people develop doug lombardi vp marketing valve since stated valve interested developing console looking hire talented ps3 programmers future projects later restated valve position ability get ps3 team together find people want come valve valve want work n't really see us moving platform sony e3 2010 press conference newell made live appearance recant previous statements citing sony move make system developer friendly announce valve would developing portal 2 system also claimed inclusion steamworks valve system automatically update software independently would help make ps3 version portal 2 best console version market activision blizzard ceo bobby kotick criticized ps3 high development costs inferior attach rate return xbox 360 wii believes factors pushing developers away working console interview times kotick stated 'm getting concerned sony playstation 3 losing bit momentum n't make easy support platform continued expensive develop console wii xbox selling better games generate better return invested capital roic xbox playstation kotick also claimed activision blizzard may stop supporting system situation addressed sony cut ps3 retail price n't attach rates likely slow realistic might stop supporting sony kotick received heavy criticism statement notably developer bioware questioned wisdom threatened move referred statement silly despite initial negative press several websites given system good reviews mostly regarding hardware cnet united kingdom praised system saying ps3 versatile impressive piece home-entertainment equipment lives hype ... ps3 well worth hefty price tag cnet awarded score 8.8 10 voted number one must-have gadget praising robust graphical capabilities stylish exterior design criticizing limited selection available games addition home theater magazine ultimate av given system blu-ray playback favorable reviews stating quality playback exceeds many current standalone blu-ray disc players interview kazuo hirai chairman sony computer entertainment argued choice complex architecture hexus gaming reviewed pal version summed review saying playstation 3 matures developers start really pushing 'll see playstation 3 emerge console choice gaming gdc 2007 shiny entertainment founder dave perry stated think sony made best machine best piece hardware without question playstation 3 slim received extremely positive reviews well boost sales less 24 hours announcement ps3 slim took number-one bestseller spot amazon.com video games section fifteen consecutive days regained number-one position one day later ps3 slim also received praise pc world giving 90 100 praising new repackaging new value brings lower price well praising quietness reduction power consumption stark contrast original ps3 launch given position number-eight top 21 tech screwups 2006 list cnet awarded ps3 slim four five stars praising blu-ray capabilities 120 gb hard drive free online gaming service affordable pricing point complained lack backward compatibility playstation 2 games techradar gave ps3 slim four half stars five praising new smaller size summed review stating ps3 slim phenomenal piece kit amazing something small much however criticized exterior design build quality relation original model eurogamer called product cost-cutting – large – tastefully done said nothing short massive win sony super slim model ps3 received positive reviews gaming website spong praised new super slim quietness stating noticeable noise comes drive seeks new area disc starting load game occurs infrequently added fans quieter slim went praise new smaller lighter size criticism placed new disc loader stating cover moved hand wish also eject button work software eject triangle button menus xross media bar xmb interface addition close cover hand bit fiddly upright ps3 wo n't start reading disc unless close cover also said real drop retail price tech media website cnet gave new super slim 4 5 stars excellent saying super slim playstation 3 shrinks powerful gaming machine even tinier package maintaining features predecessors great gaming library strong array streaming services ... whilst also criticising cheap design disc-loader stating sometimes cover n't catch feel like 're using one old credit card imprinter machines short feels cheap n't realize convenient autoloading disc trays 're gone whether cut costs save space move ultimately step back criticism also due price stating cheapest super slim model still expensive cheapest slim model smaller size bigger hard drive n't considered upgrade hard drive slim model easily removed replaced praise hard drive super slim model easiest yet simply sliding side panel reveals drive bay quickly unscrewed also stated whilst super slim model way upgrade could indicator come may revolutionary super slim ps3 impressive machine much smaller package n't seem reason existing ps3 owners upgrade prospective ps3 buyer super slim probably way go deal slot-loading disc drive pocket-lint gave super slim positive review saying much affordable brilliant gaming second-to-none video media player think blinding good console one serve years come second-hand games even new releases without doubt n't ps3 time buy gave super slim 4 half stars 5 technology magazine t3 gave super slim model positive review stating console almost nostalgic design similarities original fat model n't know whether play ps3 games blu-ray discs differently yet look feel new ps3 slim obvious homage original ps3 minus considerable excess weight immediately would concerned durability top loading tray feels like could yanked straight console ultimately feels like sony nostalgic way signing current generation console anticipation ps4 official websites auxiliary sites sony directories | [
3585,
4098,
10241,
3077,
10761,
7183,
4112,
4120,
10780,
9247,
11306,
1067,
9774,
10287,
2096,
1587,
57,
1599,
10817,
1091,
8266,
2635,
6732,
10316,
6738,
1619,
607,
95,
5736,
5746,
7283,
4724,
7801,
10874,
1148,
6781,
8316,
10368,
643,
3... | None |
8,938 | 6 | Cramfs:cramfs compressed rom file system cramfs free gpl'ed read-only linux file system designed simplicity space-efficiency mainly used embedded small-footprint systems unlike compressed image conventional file system cramfs image used i.e without first decompressing reason linux distributions use cramfs initrd images debian 3.1 particular installation images suse linux particular constraints memory image size 2013 linux maintainers indicated cramfs made obsolete squashfs file system got rehabilitated 2017 use low-memory devices using squashfs may viable files cramfs file systems zlib-compressed one page time allow random read access metadata compressed expressed terse representation space-efficient conventional file systems file system intentionally read-only simplify design random write access compressed files difficult implement cramfs ships utility codice_1 pack files new cramfs images file sizes limited less 16mb maximum file system size little 272mb last file file system must begin 256mb block extend past | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1... | Test |
8,939 | 4 | Frame_injection:frame injection frame injection attack attack internet explorer 5 internet explorer 6 internet explorer 7 load arbitrary code browser attack caused internet explorer checking destination resulting frame therefore allowing arbitrary code javascript vbscript also happens code gets injected frames due scripts validating input type frame injection affects browsers scripts validate untrusted input | [
11683,
3462,
6028,
8281,
3643
] | None |
8,940 | 2 | Android_application_package:android application package android package apk package file format used android operating system distribution installation mobile apps middleware apk analogous software packages appx microsoft windows debian package debian-based operating systems make apk file program android first compiled parts packaged one container file apk file contains program code .dex files resources assets certificates manifest file case many file formats apk files name needed provided file name ends file extension .apk apk files used downgrade apps older file version i.e downgrade app version 78.9 55.1 uninstalling upgraded app installing older version via unknown sources setting settings see information done various reasons upgrade causing app repeatedly freeze and/or crash upgrade changing app drastically e.g background dark bright preferred features present changed hidden restoring/removing something upgrade removed installed apk file also solution installing apps/games limited restricted countries apk files type archive file specifically zip format-type packages based jar file format codice_1 filename extension mime type associated apk files codice_2 apk files installed android-powered devices like installing software pc user downloads android application using android device official source google play store automatically installed apk files also downloaded google play store without installation using non-android device either chrome firefox extension directly unofficial sites several android apps used process moving apk files different devices known also called apk sideloading apps include android file manager apps app orientation apps ... installation apk files outside google play disabled default users install unknown apk files enabling unknown sources accounts security settings user developer also install apk file directly device via download network desktop computer using communication program adb apk file archive usually contains following files directories | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
3114,
5677,
2095,
1083,
10817,
7234,
6212,
69,
8262,
3659,
4685,
4174,
10317,
3664,
8280,
8285,
97,
2658,
10857,
11391,
1670,
6797,
5262,
10393,
7835,
673,
8870,
1191,
196,
8907,
722,
3804,
8413,... | Validation |
8,941 | 8 | AWStats:awstats awstats open source web analytics reporting tool suitable analyzing data internet services web streaming media mail ftp servers awstats parses analyzes server log files producing html reports data visually presented within reports tables bar graphs static reports created command line interface on-demand reporting supported web browser cgi program awstats supports major web server log file formats including apache ncsa combined/xlf/elf log format common log format clf webstar iis w3c log format many common web server log formats development moved sourceforge github 2014 written perl awstats deployed almost operating system server administration tool packages available linux distributions awstats installed workstation microsoft windows local use situations log files downloaded remote server awstats licensed gnu general public license gpl proper web log analysis tool configuration report interpretation requires bit technical business knowledge awstats support resources include documentation user community forums on-demand cgi program object security exploits case many cgi programs organizations wishing provide public access web analytics reports consider generating static html reports on-demand facility still used restricting use internal users precautions taken referrer spam referrer spam filtering functionality added version 6.5 | [
5249,
5253,
6533,
8582,
6797,
3988,
1943,
10270,
7967,
10276,
6313,
1837,
4398,
7983,
6576,
2485,
9014,
11201,
7364,
4294,
3401,
7764,
11221,
4439,
11610,
7518,
225,
865,
11492,
2281,
5612,
124,
3837
] | Validation |
8,942 | 3 | Warp_&_Warp:warp amp warp player must take control monster fighter must shoot tongue-sticking aliens named berobero space world without letting touch kills three berobero colour row mystery alien appear killed extra points warp zone centre screen flashes katakana text japanese version english text warp us versions possible monster fighter warp maze world berobero must killed time-delay bombs delay controlled long player holds button every time kills one bombs get stronger making easier monster fighter blow bombs returns space world powerups may appear levels allow player shoot exploding bullets attach bombs directly onto enemy aliens however exploding bullets present space world obtained maze world powerup attach bombs onto enemies maze world appears space world players must alternate turns controls arcade version multiplayer mode two players play simultaneously famicom version first player controls white warpman second player controls orange warpman shooting player warpman multiplayer game causes become unable move fire certain period time three aliens called arcade version famicom version killing three aliens color causes mystery alien appear three four famicom version types mystery aliens three original types worth 500 1000 2000 points respectively fourth type mystery alien leaves one letter word extra killed extra life awarded player obtains five letters points awarded killing generic aliens differ depending area screen killed color changes three areas aliens killed near center screen yield highest number points 120 killed near edges yield lowest number points 60 killed near area worth 90 points killing multiple aliens single bomb maze world also worth 500 bonus points arcade version high score erased whenever cabinet reset turned famicom version high score kept even game reset erased console turned round number indicated flags bottom-right corner screen stop updating 48th round like namco galaxian king balloon number flags shown subsequent levels similarly indicator showing number lives remaining bottom-left corner stops updating four lives player still gain extra lives five lives remaining game reaches 1,000,000 points score roll | [
9516,
9006,
10287,
1776,
10931,
8663
] | Validation |
8,943 | 4 | Little_Snitch:little snitch little snitch host-based application firewall macos used monitor applications preventing permitting connect attached networks advanced rules produced maintained austrian firm objective development software gmbh unlike stateful firewall designed primarily protect system external attacks restricting inbound traffic little snitch designed protect privacy limiting outbound traffic little snitch controls network traffic registering kernel extensions standard application programming interface api provided apple application process attempts establish network connection little snitch prevents connection dialog presented user allows one deny permit connection one-time permanent basis dialog allows one restrict parameters connection restricting specific port protocol domain little snitch integral network monitor allows one see ongoing traffic real time domain names traffic direction displayed application version 4 received positive 4.5/5 review macworld | [
1792,
2049,
4480,
2563,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
5178,
11577,
9279,
576,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10451,
10708,
4568,
... | Test |
8,944 | 3 | PA-RISC:pa-risc pa-risc instruction set architecture isa developed hewlett-packard name implies reduced instruction set computer risc architecture pa stands precision architecture design also referred hp/pa hewlett packard precision architecture architecture introduced 26 february 1986 hp 3000 series 930 hp 9000 model 840 computers launched featuring first implementation ts1 pa-risc succeeded itanium originally ia-64 isa jointly developed hp intel hp stopped selling pa-risc-based hp 9000 systems end 2008 supported servers running pa-risc chips 2013 late 1980s hp building four series computers based cisc cpus one line ibm pc compatible intel i286-based vectra series started 1986 others non-intel systems one hp series 300 motorola 68000-based workstations another series 200 line technical workstations based custom silicon sapphire sos chip design sos based 16-bit hp 3000 classic series finally hp 9000 series 500 minicomputers based 16 32-bit focus microprocessor precision architecture result known inside hewlett-packard spectrum program hp planned use spectrum move non-pc compatible machines single risc cpu family first processors introduced 1986 thirty-two 32-bit integer registers sixteen 64-bit floating-point registers number floating-point registers doubled 1.1 version 32 became apparent 16 inadequate restricted performance architects included allen baum hans jeans michael j. mahon ruby bei-loh lee russel kao steve muchnick terrence c. miller david fotland william s. worley first implementation ts1 central processing unit built discrete transistor–transistor logic 74f ttl devices later implementations multi-chip vlsi designs fabricated nmos processes ns1 ns2 cmos cs1 pcx first used new series hp 3000 machines late 1980s – 930 950 commonly known time spectrum systems name given development labs machines ran mpe-xl hp 9000 machines soon upgraded pa-risc processor well running hp-ux version unix operating systems ported pa-risc architecture include linux openbsd netbsd nextstep interesting aspect pa-risc line generations level 2 cache instead large level 1 caches used formerly separate chips connected bus integrated on-chip pa-7100lc pa-7300lc l2 caches another innovation pa-risc addition vectorized instructions simd form max first introduced pa-7100lc precision risc organization industry group led hp founded 1992 promote pa-risc architecture members included convex hitachi hughes aircraft mitsubishi nec oki prime stratus yokogawa red brick software allegro consultants inc.. isa extended 1996 64 bits revision named pa-risc 2.0 pa-risc 2.0 also added fused multiply–add instructions help certain floating-point intensive algorithms max-2 simd extension provides instructions accelerating multimedia applications first pa-risc 2.0 implementation pa-8000 introduced january 1996 | [
10752,
7173,
9739,
9742,
2066,
3603,
7699,
5655,
10779,
10781,
6181,
8231,
1064,
2088,
6187,
10796,
3630,
4144,
6705,
7218,
1085,
2623,
2113,
7234,
1606,
3142,
2638,
8795,
2655,
2656,
1122,
10851,
2149,
7269,
3175,
7783,
8815,
6268,
3197,
... | Test |
8,945 | 3 | Ad_Lib,_Inc.:ad lib inc ad lib inc. canadian manufacturer sound cards computer equipment founded martin prevel former professor music vice-dean music department université laval company best known product adlib music synthesizer card almsc simply adlib called first add-on sound card ibm compatibles achieve widespread acceptance developers adoption games becoming first de facto standard audio reproduction today adlib functionality recreated emulators adplug vdmsound latter deprecated source code incorporated dosbox emulating adlib gold 1000 proves challenge due surround sound module 2x oversampling effect development work almsc adlib music synthesizer card concluded prevel struggled engage development community company new product example handed development kits trade shows hopes reach development staff software companies attendees simply used handouts personal entertainment discarded outright subsequently prevel engaged assistance top star computer services inc. also known tscs new jersey company provided quality assurance services game developers top star president rich heimlich sufficiently impressed product demonstration quebec 1987 endorse product top customers sierra on-line king quest iv became first game title support adlib game high audio production values including hired professional composer riding already popular game franchise catapulted adlib card mainstream media coverage soon game developers embraced adlib hoping give software competitive edge retail channel side retail stores chains wholesale distributor selling adlib sound cards 1990 adlib used yamaha ym3812 sound chip produces sound via fm synthesis adlib card consisted ym3812 chip off-the-shelf external glue logic plug standard pc compatible isa 8-bit slot pc software generated multitimbral music sound effects adlib card although acoustic quality distinctly synthesized digital audio pcm supported would become key missing feature competitor creative labs implemented sound blaster cards still possible however output pcm sound card software modulating playback volume audio rate done example microprose game f-15 strike eagle ii multi-channel music editor sound club ms-dos engineers developed sound cards software libraries adlib worked lyrtech notable sound designer worked adlib henri chalifour designed sound demos instrumental showing adlib products could including scoring music adlib commercial two separate revisions original adlib sound card original design 1987 provided mono output via ¼ inch jack aimed composers musicians second design 1990 used 3.5 mm miniature mono output quickly becoming new standard computer game industry adlib release microchannel version original sound card adlib mca used mca p82c611 interface ic notable updates mca version use volume wheel original potentiometer made card thick mca standard ad lib planned wholly new proprietary standard releasing 12-bit stereo sound card called adlib gold gold 1000 used later generation yamaha ymf262 opl3 12-bit digital pcm capability retaining backward compatibility opl2 opl3 chip albeit opl3 responds slightly differently ym3812/opl2 commands sound 100 exactly alike onboard yamaha ymz263-f also performs 2x oversampling would affect opl3 output slightly surround sound module developed optional attachment allowed chorus surround effect enabled opl3 outputs however games supported one unique aspect could initialized certain sounds affect entire output default optional attachments scsi support modem support development well evidence anti-competitive behavior creative failure card yamaha made parts creative adlib creative yamaha biggest customer time chip yamaha created adlib card continually failed pass testing creative yamaha chip passed enabled creative come market first shortly adlib chip passed testing late sustain despite adlib efforts gold 1000 failed capture market company eventually went bankrupt cheaper alternatives creative labs sound blaster 16 adlib designed gold 1000 mainly in-house gold 1000 layout lot discrete circuitry many surface mount components grid array creative labs able integrate sound cards tightly reduce cost gold 1000 finally released sound blaster series entrenched de facto pc sound card standard priced significantly cheaper adlib gold however sound blaster 16 suffered noisier output cheaper components contain unique 2x oversampling effect pc game developers supported gold directly however adlib gold support still found way small number mainstream games descent rayman dune police quest 3 bought games adlib gold 1000 planned ibm microchannel architecture bus named adlib gold mc2000 however adlib went bankrupt card could produced known prototypes confirmed success adlib music card soon attracted competitors long introduction creative labs introduced competing sound blaster card sound blaster fully compatible adlib hardware meaning would play past present future game written adlib card also added two key features absent adlib pcm audio channel game port pcm audio could record play digital audio recordings included dialogue sound effects short musical performances although pcm audio fidelity scarcely better radio allowed game developers include realistic sound effects speech could reproduced yamaha fm synthesis proved popular among game developers finally sound blaster inclusion game port made single-card gaming system superior product better marketing sound blaster quickly overshadowed adlib de facto standard pc gaming audio adlib slow response adlib gold sell well enough sustain company 1992 ad lib filed bankruptcy sound blaster family continued dominate pc game industry year binnenalster gmbh germany purchased assets ad lib government quebec acquired prevent creative labs buying company renamed adlib multimedia relaunched adlib gold sound card many products binnenalster sold adlib multimedia softworld taiwan 1994 | [
7108,
5702,
2861,
400,
5009,
5265,
6129,
8561,
8945,
10359,
4699
] | Test |
8,946 | 5 | Reliable_Datagram_Sockets:reliable datagram sockets reliable datagram sockets rds high-performance low-latency reliable connectionless protocol delivering datagrams developed oracle corporation included linux kernel 2.6.30 released 9th june 2009 code contributed openfabrics alliance ofa october 19 2010 vsr announced vulnerability within linux 2.6.30 kernel could result local privilege escalation via kernel implementation rds subsequently fixed may 8 2019 cve-2019-11815 published regarding race condition linux rds implementation could lead use-after-free bug possible arbitrary code execution bug fixed linux 5.0.8 | [
10242,
3847,
649,
9868,
3218,
7570,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
1954,
9380,
2085,
9381,
3751,
3752,
6184,
10924,
562,
5682,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
... | None |
8,947 | 9 | JSyn:jsyn jsyn java synthesis free api developing interactive sound applications java developed phil burk others distributed burk company mobileer inc. jsyn flexible unit generator-based synthesis dsp architecture allows developers create synthesizers audio playback routines effects processing algorithms within java framework allows easy integration java routines e.g graphics user interface etc. plugin available web browsers run jsyn-enabled applets distributed world wide web although fundamentally synthesis language imitative directly inspired csound music-n languages jsyn number powerful extensions ancillary libraries including jmsl java update hmsl music specification language jscore staff notation editor library adds significantly higher level musical informatics package would normally supplied set synthesis routines wire graphical editor jsyn routines also allows developers create dsp chains using simple gui gives api ease use programs max/msp commercial though inexpensive developer license allows jsyn incorporated commercial applications | [
9210,
5677,
8958,
6810,
7550,
9023
] | Test |
8,948 | 3 | Paul_Horn_(computer_scientist):paul horn computer scientist paul m. horn born august 16 1946 american computer scientist solid state physicist made contributions pervasive computing pioneered use copper self-assembly chip manufacturing helped manage development deep computing important tool provides business decision makers ability analyze develop solutions complex difficult problems horn born august 16 1946 graduated clarkson college 1968 bachelor science degree obtained phd university rochester physics 1973 horn various times senior vice president ibm corporation executive director research ibm initiated project develop watson computer competed successfully quiz show jeopardy currently new york university nyu distinguished scientist residence nyu stern executive residence also professor nyu tandon school engineering 2009 appointed senior vice provost research nyu | [
3323
] | Test |
8,949 | 2 | Real-Time_Multiprogramming_Operating_System:real-time multiprogramming operating system real-time multiprogramming operating system rtmos 24-bit process control operating system developed 1960s general electric supported real-time computing multiprogramming programming done assembly language process fortran two languages could used program allowing programmers alternate two desired multiprogramming operating systems considered obsolete replaced multitasking | [
2345,
2179,
7983
] | None |
8,950 | 4 | Caller_ID_spoofing:caller id spoofing caller id spoofing practice causing telephone network indicate receiver call originator call station true originating station example caller id display might display phone number different telephone call placed term commonly used describe situations motivation considered malicious originator caller id spoofing available years people specialized digital connection telephone company called isdn pri circuit collection agencies law-enforcement officials private investigators used practice varying degrees legality first mainstream caller id spoofing service star38.com launched september 2004 star38.com first service allow spoofed calls placed web interface stopped offering service 2005 handful similar sites launched august 2006 paris hilton accused using caller id spoofing break voicemail system used caller id authentication caller id spoofing also used purchase scams web sites craigslist ebay scamming caller claims calling canada u.s. legitimate interest purchasing advertised items often sellers asked personal information copy registration title etc. scammer purchaser invests time effort come see for-sale items 2010 election fake caller ids ambulance companies hospitals used missouri get potential voters answer phone 2009 vindictive brooklyn wife spoofed doctor ’ office husband ’ lover attempt trick woman taking medication would make miscarry frequently caller id spoofing used prank calls example someone might call friend arrange white house appear recipient caller display december 2007 hacker used caller id spoofing service arrested sending swat team house unsuspecting victim february 2008 collegeville pennsylvania man arrested making threatening phone calls women home numbers appear caller id make look like call coming inside house march 2008 several residents wilmington delaware reported receiving telemarketing calls early morning hours caller apparently spoofed caller id evoke tommy tutone ’ 1981 hit 867-5309/jenny “ 2014 increase illegal telemarketers displaying victim number either verbatim digits randomised observed attempt evade caller id-based blacklists canadian federal election may 2 2011 live calls robocalls alleged placed false caller id either replace caller identity fictitious person pierre poutine joliette quebec disguise calls ohio call centre peterborough ontario domestic calls see robocall scandal june 2012 search google returned nearly 50,000 consumer complaints individuals receiving multiple continuing spoofed voice ip voip calls lines leased originating “ pacific telecom communications group ” located los angeles ca mailbox store apparent violation fcc rules companies lease thousands phone numbers anonymous voice-mail providers combination dubious companies like “ phone broadcast club ” actual spoofing allow phone spam become increasingly widespread pervasive problem 2013 misleading caller name teachers phone reported large quantity robocalls advertising credit card services ruse trick students families answering unwanted calls mistaken belief local schools january 7 2013 internet crime complaint center issued scam alert various telephony denial service attacks fraudsters using spoofed caller id impersonate police attempt collect bogus payday loans placing repeated harassing calls police victim number displayed impersonation police common scams involved impersonating utility companies threaten businesses householders disconnection means extort money impersonating immigration officials impersonating medical insurers obtain personal data use theft identity bogus caller id also used grandparent scams target elderly impersonating family members requesting wire transfer money caller id spoofed variety methods different technology popular ways spoofing caller id use voip pri lines past caller id spoofing required advanced knowledge telephony equipment could quite expensive however open source software asterisk freeswitch almost voip company one spoof calls minimal costs effort voip providers allow user configure displayed number part configuration page provider web interface additional software required caller name sent call instead generated number database lookup destination may configured part settings client-owned analog telephone adapter sip phone level flexibility provider-dependent provider allows users bring device unbundles service direct inward dial numbers may purchased separately outbound calling minutes flexible carrier n't follow established hardware standards skype locks subscribers configuration settings hardware subscriber owns outright vonage restrictive providers market wholesale voip typically intended allow displayed number sent resellers want end user numbers appear rare cases destination number served voice-over-ip reachable directly known sip address may published enum telephone number mapping .tel dns record located using intermediary sip broker google voice users directly reachable sip inum initiative numbers country codes +883 5100 +888 federated voip scheme provides direct internet connection pass signaling gateway public switched telephone network shares advantages nearly free unlimited access worldwide disadvantages ernet applications spoofing services work similarly prepaid calling card customers pay advance personal identification number pin customers dial number given company pin destination number number wish appear caller id call bridged transferred arrives spoofed number chosen caller—thus tricking called party many providers also provide web-based interface mobile application user creates account logs supplies source number destination number bogus caller id information displayed server places call two endpoint numbers bridges calls together providers offer ability record calls change voice send text messages another method spoofing emulating bell 202 fsk signal method informally called orange boxing uses software generates audio signal coupled telephone line call object deceive called party thinking incoming call waiting call spoofed number fact new incoming call technique often also involves accomplice may provide secondary voice complete illusion call-waiting call orange box truly spoof incoming caller id prior answering relies certain extent guile caller considered much social engineering technique technical hack methods include switch access signaling system 7 network social engineering telephone company operators place calls desired phone number telephone exchange equipment manufacturers vary handling caller name display much equipment manufactured bell system companies united states sends caller number distant exchange switch must use database lookup find name display calling number canadian landline exchanges often run nortel equipment sends name along number mobile clec internet independent exchanges also vary handling caller name depending switching equipment manufacturer calls numbers differing country codes represent complication caller id often displays local portion calling number without indicating country origin format mistaken domestic invalid number results multiple possible outcomes caller id spoofing remains legal canada recently become prevalent canadian anti-fraud centre add ed automated message practice fraud-reporting hotline crtc estimates 40 complaints receive regarding unsolicited calls involve spoofing agency advises canadians file complaints regarding calls provides list protection options dealing website july december 2015 held public consultation identify technical solutions address issue regulators set march 31 2019 target date implementation cid authentication system december 19 2018 crtc announced beginning december 19 2019 phone providers must block calls ids purport originate telephone numbers conform established numbering plans according report india department telecommunications government india taken following steps cli spoofing service providers per dot using spoofed call service illegal per indian telegraph act sec 25 c using service may lead fine three years imprisonment uk spoofed number called presentation number must either allocated caller allocated third party used third party explicit permission starting 2016 direct marketing companies obliged display phone numbers offending companies hit fines £2 million ofcom caller id spoofing generally legal united states unless done intent defraud cause harm wrongfully obtain anything value relevant federal statute truth caller id act 2009 make exceptions certain law-enforcement purposes callers also still allowed preserve anonymity choosing block outgoing caller id information phone lines act also targets voip services illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value ... forfeiture penalties criminal fines 10,000 per violation exceed 1,000,000 could imposed law maintains exemption blocking one outgoing caller id information law enforcement n't affected new york times sent number 111-111-1111 calls made offices august 15 2011 fake number intended prevent extensions reporters appearing call logs thus protect reporters divulge calls made anonymous sources times abandoned practice proposed changes caller id law many companies blocking calls well-known number starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir shaken/stir acronyms signature-based handling asserted information using tokens shaken secure telephone identity revisited stir standards august 1 2019 fcc voted extend truth caller id act international calls text messaging | [
1601,
11170,
4163,
2920,
2409,
1899,
4753,
7730,
11671,
1914,
10299,
10269
] | Test |
8,951 | 6 | Sector_slipping:sector slipping sector slipping technique used deal defective sectors hard disk drives due volatility hard disks moving parts low tolerances sectors become defective defective sectors even come hard disks factory disks incorporate bad-block recovery system cope issues low-level format defect lists populated store sectors bad bad sectors mapped sector slipping algorithm utilized using sector slipping bad sectors disk access time largely affected drive skip sectors takes time would read sector spare sectors located disk aid sectors “ slip ” sectors allowing preservation sequential ordering data accuracy programs reliant static knowledge cylinders block positions compromised though bad sectors found normal usage disk capable sector slipping algorithm applied instead linear reallocation sector forwarding used bad sector replaced sector spare area affect access times disk need seek spare sector since lookups bad sector redirect new sector example physical sectors 3 5 found bad sectors slipped allow logical sectors placed sequential order good sectors sector 3 slipped 4 sector 4 slipped 6 rest sectors slipped remaining spare sectors sector 4 6 sector 5 7 | [
3841,
3315
] | Test |
8,952 | 3 | Palm_III:palm iii palm iii personal digital assistant made palm computing division 3com went sale 1998 replacement palmpilot handheld first palm handheld support infrared file transfer flash rom-capable operating system release palm iii priced us 400 first glance notable difference palm iii predecessor palmpilot rugged streamlined case differences include removable hard cover protect screen removal memory door recessed contrast adjustment knob infrared port battery door less prone accidentally falling palm iii ran new palm os version 3.0 featured new application launcher extra font size bug fixes improvements featured two megabytes edo sdram storage user data software two megabytes flash rom storage operating system built-in applications lcd screen palm iii essentially palm pilot professional palm pilot personal display 2-bit greyscale lcd screen also electroluminescent backlight turned holding power button three seconds allow easier viewing dark areas palm iii os rom ram mounted memory card separate motherboard card could replaced third party upgrade card increase palm iii storage functionality year 2000 kodak released palmpix digital camera image display screen palm handheld | [
2308,
10500,
6790,
3606,
8982,
6178,
5164,
7983,
9013,
694,
5318,
3017,
11337,
9037,
2258,
1621,
4832,
4449,
2285,
7151,
1776,
2420,
9598
] | None |
8,953 | 3 | The_Earth_Fighter_Rayieza:earth fighter rayieza game character designer go nagai also drew illustrations game package game background music composed y. sawamura sawamura included arranged version yellow magic orchestra rydeen battle theme year 2300 human race created earth federation government spread space begin colonizing surrounding planets however alien species far reaches outer space began attacking human forces putting survival human race stake though matter time earth fell enormous power enemy forces earth army commander issued order calling units dispersed around colonized planets return earth player takes role young soldier stationed rayieza unit planet mars journey begins makes way back earth along members unit family computer port game released december 15 1987 though game largely faithful port pc version arrangements made addition side-scrolling screen player lands planet surface rimi able use psychic powers later parts game enemies begin appear frequently new enemy special attacks added lower maximum hit-points allied characters lowered points return next time character level increases | [
10931,
9006
] | None |
8,954 | 4 | Sudo:sudo sudo program unix-like computer operating systems allows users run programs security privileges another user default superuser originally stood superuser older versions codice_1 designed run commands superuser however later versions added support running commands superuser also restricted users thus also commonly expanded substitute user although latter case reflects current functionality accurately codice_1 still often called superuser since often used administrative tasks unlike similar command su users must default supply password authentication rather password target user authentication configuration file typically located codice_3 permits user access system invokes requested command configuration file offers detailed access permissions including enabling commands invoking terminal requiring password per user group requiring re-entry password every time never requiring password particular command line also configured permit passing arguments multiple commands robert coggeshall cliff spencer wrote original subsystem around 1980 department computer science suny/buffalo robert coggeshall brought sudo university colorado boulder 1986 1993 code features substantially modified staff university colorado boulder computer science department college engineering applied science including todd c. miller current version publicly maintained openbsd developer todd c. miller since 1994 distributed isc-style license since 1999 november 2009 thomas claburn response concerns microsoft patented sudo characterized suspicions overblown claims narrowly framed particular gui rather sudo concept unlike command su users supply personal password sudo necessary authentication configuration file permits user access system invokes requested command sudo retains user invocation rights grace period 5 minutes per pseudo terminal default see https //www.sudo.ws/man/1.8.27/sudo.man.html allowing user execute several successive commands requested user without provide password sudo may configured log command run user attempts invoke sudo without listed configuration file exception indication presented user indicating attempt recorded root user alerted via mail entry recorded system log file /etc/sudoers contains list users user groups permission execute subset commands privileges root user another specified user program may configured require password system distributions sudo largely supplanted default use distinct superuser login administrative tasks notably linux distributions well apple macos allows secure logging admin commands prevents exploits association selinux sudo used transition roles role-based access control rbac visudo command-line utility allows editing sudo configuration file fail-safe manner prevents multiple simultaneous edits locks performs sanity syntax checks program runas provides similar functionality microsoft windows pass current directories environment variables long command lines child supports running child another user support simple elevation true su sudo windows pass state information start child either elevated another user included hamilton c shell graphical user interfaces exist sudo notably kdesudo gksudo deprecated debian longer included ubuntu release 18.04 user interfaces directly built sudo provide similar temporary privilege elevation administrative purposes user account control microsoft windows mac os x authorization services doas available since openbsd 5.8 october 2015 written order replace sudo openbsd base system latter still made available port | [
515,
260,
9733,
9223,
3976,
2825,
3465,
9735,
1932,
13,
4750,
6797,
10631,
274,
2322,
788,
5397,
2198,
7702,
537,
10105,
6812,
5923,
7847,
4398,
6702,
7983,
9520,
10036,
1336,
5179,
700,
7356,
965,
2245,
1993,
8522,
3659,
3404,
8778,
11... | Validation |
8,955 | 4 | Access_level:access level computer science computer programming access level denotes set permissions restrictions provided data type reducing access level effective method limiting failure modes debugging time overall system complexity restricts variable modification methods defined within interface class thus incorporated many fundamental software design patterns general given object created read updated deleted function without sufficient access level two common access levels public private denote respectively permission across entire program scope permission within corresponding class third protected extends permissions subclasses corresponding class access levels modifiers commonly used java well c provides internal level c++ difference struct class default access level private classes public structs illustrate benefit consider public variable accessed part program error occurs culprit could within portion program including various sub-dependencies large code base leads thousands potential sources alternatively consider private variable due access restrictions modifications value must occur via functions defined within class therefore error structurally contained within class often single source file class means debugging requires evaluation single file sufficient modularity minimal access level large code bases avoid many challenges associated complexity retrieved java coffee break q imperative variable balance defined private int ensures classes methods functions accidentally overwrite variable balance instead must access interface class bank_balance whose methods ensure balance drop 0 | [
10145,
2556
] | Test |
8,956 | 4 | Cloudflare:cloudflare cloudflare inc. u.s. web infrastructure website security company providing content delivery network services ddos mitigation internet security distributed domain name server services cloudflare services sit website visitor cloudflare user hosting provider acting reverse proxy websites cloudflare headquarters san francisco california additional offices lisbon london singapore munich san jose champaign illinois austin new york city washington d.c. cloudflare faced controversy number times stance providing technical support online hate groups terrorists citing free speech concerns cloudflare ensured continue abide law serve customers explaining proper role internet censor example one time cloudflare provided technical services 8chan image board linked multiple mass shootings united states christchurch mosque shootings new zealand however 2017 cloudflare succumbed pressure longer provide services neo-nazi website daily stormer similarly august 2019 cloudflare stopped services 8chan following mass shooting el paso 2014 cloudflare introduced project galileo response cyber attacks launched important yet vulnerable targets artistic groups humanitarian organizations voices political dissent 2019 cloudflare celebrated five-year anniversary project galileo announced 600 users organisations currently participating cloudflare created 2009 matthew prince lee holloway michelle zatlyn previously worked project honey pot cloudflare launched september 2010 techcrunch disrupt conference received media attention june 2011 providing security lulzsec website june 2012 cloudflare partnered various web hosts including hostpapa implement railgun technology february 2014 cloudflare mitigated largest-ever recorded ddos attack time peaked 400 gbit/s undisclosed customer november 2014 cloudflare reported another massive ddos attack independent media sites targeted 500 gbit/s november 2009 cloudflare raised 2.1 million series round pelion venture partners venrock july 2011 cloudflare raised 20 million series b round new enterprise associates pelion venture partners venrock december 2012 cloudflare raised 50 million series c round new enterprise associates pelion venture partners venrock union square ventures greenspring associates december 2014 cloudflare raised 110 million series round led fidelity investments participation google capital microsoft qualcomm baidu march 2019 cloudflare raised 150 million series e round led franklin templeton investments participation new enterprise associates union square ventures venrock pelion venture partners greenspring associates capitalg microsoft baidu qualcomm fidelity february 2014 acquired stopthehacker offers malware detection automatic malware removal reputation blacklist monitoring december 2016 cloudflare acquired eager view upgrading cloudflare apps platform allow drag-and-drop installation third-party apps onto cloudflare-enabled sites late 2017 cloudflare acquired neumob mobile vpn startup customers cloudflare offers 'm attack mode cloudflare claims mitigate advanced layer 7 attacks presenting javascript computational challenge must completed user browser user access website march 2013 cloudflare defended spamhaus ddos attack exceeded 300 gbit/s akamai chief architect stated time largest publicly announced ddos attack history internet cloudflare also reportedly absorbed attacks peaked 400gbit/s ntp reflection attack cloudflare allows customers paid plans utilize web application firewall service default firewall owasp modsecurity core rule set alongside cloudflare ruleset rulesets popular web applications cloudflare offers free authoritative domain name system dns service clients powered anycast network solvedns found cloudflare consistently one fastest dns lookup speeds worldwide reported lookup speed 5.6ms july 2019 april 1 2018 cloudflare announced 'privacy-first consumer dns service hosted ip addresses 1.1.1.1 1.0.0.1 alternatively service accessed via ipv6 2606:4700:4700 :1111 2606:4700:4700 :1001 november 11 2018 cloudflare announced mobile version 1.1.1.1 service ios android key functionality cloudflare act reverse proxy web traffic cloudflare supports new web protocols including spdy http/2 addition cloudflare offers support http/2 server push cloudflare also supports proxying websockets cloudflare network highest number connections internet exchange points network worldwide cloudflare caches content edge locations act content delivery network cdn requests reverse proxied cloudflare cached content served directly cloudflare 2014 cloudflare introduced project galileo response cyber attacks launched important yet vulnerable targets artistic groups humanitarian organizations voices political dissent working free speech public interest civil society organizations cloudflare extended enterprise-class ddos protection business-level performance benefits ensure websites stay online without violated project galileo compared alphabet project shield different service providing protection vulnerable humanitarian free-speech groups contrast project shield project galileo create guidelines eligible users rather outsourced selection 28 non-profit organisations one accept users program cloudflare ceo matthew prince hopes companies follow suit start similar projects according project galileo users organisations benefit able choose work notion echoed cloudflare ceo since project started 2014 cloudflare remained fairly secretive project part avoid drawing attention organisations might targeted five-year anniversary project blogpost created sharing detail service revealing 600 organisations currently participating announcing number new additions cloudflare created project athenian ensure state local government election websites highest level protection enterprise grade reliability free constituents always access election information voter registration 2019 cloudflare announced new domain registrar service promised offer low-cost wholesale pricing easy ways enable dnssec april 1 2019 cloudflare announced new freemium virtual private network service named warp service would initially available 1.1.1.1 mobile apps desktop app available later june 21 2019 cloudflare announced users would able sync computers time securely cloudflare ntp service cloudflare ’ time service allow users connect network time protocol ntp server supports network time security nts enabling users obtain time authenticated manner cloudflare provides dns services 12 million websites adding approximately 20,000 new customers every day cloudflare provided support services 8chan august 2019 8chan since moved bitmitigate august 3 interview immediately post 2019 el paso shooting guardian matthew prince defended cloudflare support 8chan saying happened el paso today abhorrent every possible way ’ ugly hate ’ association us … us question worse evil cloudflare come pressure multiple occasions due ironclad policy free speech refusing cease technical support dns routing ddos mitigation etc websites lulzsec daily stormer 8chan activists argue cloudflare services allow access content spreads hate led harm deaths cloudflare consider content passes infrastructure protected first amendment matter content consequences.cloudflare broad legal immunity content produced users cloudflare provided dos protection hacker group lulzsec services garnered significant positive media attention time cloudflare young relatively unknown company cloudflare provided dns routing dos protection white supremacist neo-nazi website daily stormer 2017 cloudflare stopped providing services daily stormer announcement controversial website asserted upper-echelons cloudflare secretly supporters ideology previously cloudflare refused take action regarding daily stormer despite widespread public pressure removal addressed blogpost cloudflare emphasized dedication towards freedom speech 'free speech absolutist cloudflare ceo matthew prince vowed never succumb external pressure sought create 'political umbrella future matthew prince addressed dangers large companies deciding allowed stay online concern shared number civil liberties groups privacy experts electronic frontier foundation said services cloudflare adjudicating speech acceptable adding illegal activity like inciting violence defamation occurs proper channel deal legal system according huffington post cloudflare provides services least 7 terrorist groups designated united states department state according article cloudflare provides services taliban hamas al-quds brigades among others aware since least 2012 taken action us justice department asked company discontinue services cloudflare came pressure due technical support provided discussion board 8chan allows users post discuss content free interference site administrator message board linked mass shootings united states christchurch mosque shootings new zealand addition number news organizations including washington post daily dot reported child pornography child rape discussion boards wake 2019 el paso shooting cloudflare announced terminating support 8chan due consistent use site terror purposes announcement ceo matthew prince warned end 8chan described previous events daily stormer unfortunately seen situation good sense play almost exactly two years ago made determination kick another disgusting site cloudflare network daily stormer caused brief interruption site operations quickly came back online using cloudflare competitor competitor time promoted feature fact n't respond legal process today daily stormer still available still disgusting bragged readers ever longer cloudflare problem remain internet problem wake pressured censor daily stormer cloudflare sought create alliance free speech organizations company could stand pressure next time number organizations including electronic frontier foundation u.s. digital rights charity joined project galileo supporting cloudflare free speech stance cloudflare vocal values ceo matthew prince stating one greatest strengths united states belief speech particularly political speech sacred website course nothing speech ... website speech bomb imminent danger creates provider affirmative obligation monitor make determinations theoretically harmful nature speech site may contain cloudflare services used rescator website sells payment card data two islamic state iraq levant top three online chat forums guarded cloudflare u.s. law enforcement asked discontinue service chosen november 2015 anonymous discouraged use cloudflare services following isil attacks paris renewed accusation provides help terrorists cloudflare responded calling accusers 15-year-old kids guy fawkes masks saying whenever concerns raised consult actual anti-terrorism experts abide law breaking long-standing policy total content neutrality cloudflare withdrew access services white supremacist web site daily stormer 16 august 2017 aftermath fatal vehicular attack charlottesville rally four days earlier withdrew website protection distributed denial service attack soon thereafter attackers took website ceo matthew prince stated woke morning bad mood decided kick internet tipping point decision team behind daily stormer made claim secretly supporters ideology andrew anglin editor daily stormer denied team made claim move disconnect daily stormer cloudflare services criticised 'dangerous prince anglin electronic frontier foundation august 2019 cloudflare terminated services 8chan american image board hacker group ugnazi attacked cloudflare partially via flaws google authentication systems june 2012 gaining administrative access cloudflare using deface 4chan cloudflare published full details hack following google publicly announced patched flaw google enterprise app account recovery process allowed hackers bypass two-step verification september 2016 february 2017 major cloudflare bug nicknamed cloudbleed leaked sensitive data—including passwords authentication tokens customer websites sending extra data response web requests leaks resulted buffer overflow occurred according analysis cloudflare approximately 1 every 3,300,000 http requests cloudflare publishes transparency report semi-annual basis show often law enforcement agencies request data clients may 2017 propublica reported cloudflare matter policy relays names email addresses persons complaining hate sites sites question led complainants harassed cloudflare general counsel defended company policies saying base constitutional law people face accusers response cloudflare updated abuse reporting process provide greater control notify complaining party cloudflare listed spamhaus providing spam support services pink contract current list spamhaus listings changes near daily basis reported issues addressed responsible website owner october 2015 report found cloudflare provisioned 40 ssl certificates used phishing sites deceptive domain names resembling banks payment processors july 2019 cloudflare suffered major outage rendered 12 million websites unreachable 27 minutes 80 customers affected websites responded blank 502 error page cloudflare published internal investigation results cause outage pinpointed faulty regular expression | [
10368,
9987,
1157,
3462,
11158,
923,
157,
5547,
4268,
7345,
8244,
7352,
64,
1474,
2887,
3018,
331,
6474,
9293,
82,
5078,
11222,
7515,
9181,
3941,
10344,
2409,
8170,
9834,
5749,
4095
] | None |
8,957 | 2 | NimbleX:nimblex nimblex small slackware-based linux distribution optimized run cd usb drive network environment nimblex praised fast boots well small disk footprint considered surprising distribution using kde desktop environment nimblex also remarked web site allows users generate custom bootable images using web browser also covered mainstream romanian press first linux distribution put together romanian nimblex reported boot fast important factor user experience running optical media usb drives review 2007 nimblex edition noted expect boot less half time live cd fedora ubuntu knoppix takes recent review 2008 edition also noted nimblex speed easily one fastest bootups 've seen even tried hinder cripple boot time even dog slow pendrive old dirt test machine still booted amazingly fast desktop applications also fast nimblex also compact distribution review 2007 edition wondered managed include kde mention applications included size 200 mb window-based graphical user interface slimmed kde fit firefox web browser office documents editor koffice pdf reader media player play almost file formats without need install codec photo editing software gimp anti-virus bluetooth support integrated name applications included 2008 installation process major linux distributions customized creating custom installation disks usually called spins creating spin requires certain amount expertise creating spin run installation media requires customization nimblex makes process user-friendly providing web interface process similar embedded linux distributions e.g freewrt features made distribution popular early judge forums nimblex attracted surprisingly large number users relatively unknown distribution nimblex uses 2.6 kernel default gui kde slower computers default desktop environment exchanged one lower resource usage like fluxbox xfce typical office web browsing messaging components included nimblex hardly offers graphical administration tools — administration tasks like adding new user performed command line tradeoff allows nimblex small installation footprint — typical installation 400 megabytes additional applications installed using graphical installer gslapt codice_1 command line brings automatic resolution dependencies slackware packages text-mode hard driver installer available codice_2 considered beta quality 2008 edition 2008 edition comes three standard install images 200mb two smaller even ones 100 69mb installers allow customizations packets installation however nimblex 2008 uses kde 3.5.9 nimblex 2010 beta version also present site based kde 4 support new hardware user also enable compiz fusion via link desktop openoffice.org included instead koffice provided office suite nimblex included 200 mb package useful applications like firefox web browser koffice pdf reader kopete instant messenger klamav anti-virus gimp photo editor bluetooth support remote connection pc important software supported bigger nimblex package openoffice.org java python samba wine windows applications emulator many applications compiled community included distribution nimblex 2008 criticized irresponsible lacking common security features box even though clamav anti-virus guarddog firewall installed default non-root user account created installation root password required log desktop default root password displayed nimblex web site nimblex 2010 also fixed applications removed another problem nimblex packages created repackaging slackware packages since nimblex installs fewer libraries sometimes results uninstallable unusable packages reviews | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
5677,
6189,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
1632,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
... | Test |
8,958 | 9 | Hierarchical_Music_Specification_Language:hierarchical music specification language hierarchical music specification language hmsl music programming language written 1980s larry polansky phil burk david rosenboom mills college written top forth allowed creation real-time interactive music performance systems algorithmic composition software kind program requires high degree musical informatics distributed frog peak music runs light memory footprint ~1 megabyte macintosh amiga systems unlike csound languages audio synthesis hmsl primarily language making music interfaces sound-making devices built-in midi classes however high degree built-in understanding music performance practice tuning systems score reading main interface manipulation musical parameters metaphor shapes created altered combined create musical texture either response real-time scheduled events score hmsl widely used composers working algorithmic composition twenty years addition authors also composers hmsl used pieces nick didkovsky hub james tenney tom erbe pauline oliveros java port hmsl developed nick didkovsky name jmsl designed interface jsyn api | [
3904,
9210,
7172,
8262,
5037,
7535,
3665,
7571,
8947,
6933,
7769,
6810,
9565,
7550
] | Test |
8,959 | 2 | .exe:.exe exe file contains executable program windows exe short executable standard file extension used windows programs many windows users exe files synonymous windows programs making .exe one recognizable file extensions several file formats may used file extension 16-bit 32-bit windows executable run windows execution starts either ne pe ignores mz code known dos stub started dos stub typically displays message program run dos mode similar exiting cleanly thereby constituting minimal form fat binary dual-mode programs mz-ne mz-pe regedit older winzip self extractors include functional dos section besides also many custom exe formats including limited w3 collection le files used win386.exe w4 compressed collection le files used vmm32.vxd dl mp p2 p3 last three used phar lap extenders | [
11270,
6664,
5643,
4624,
8215,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
7251,
10839,
603,
9819,
3170,
4712,
622,
9839,
2672,
4210,
7796,
1656,
6265,
7290,
4731,
93... | None |
8,960 | 4 | Mark_Rasch:mark rasch mark d. rasch attorney author working areas corporate government cybersecurity privacy incident response former chief security evangelist verizon communications vice president deputy general counsel chief privacy data security officer saic 1983 1992 rasch worked u.s. department justice within criminal division fraud section rasch earned j.d 1983 state university new york buffalo 1976 graduate bronx high school science prosecuted robert tappan morris case united states v. morris 1991 also drafted amicus brief related data encryption doj v bernstein prosecuted presidential candidate lyndon larouche organized crime figures new york associated gambino crime family also helped uncover individual responsible so-called craigslist murder boston assisted investigation lead arrest chelsea manning rasch regular contributor securitycurrent securityfocus security boulevard issues related law technology regular contributor wired magazine also longtime columnist storefrontbacktalk now-defunct publication tracked global retail technology appeared quoted msnbc fox news cnn new york times forbes pbs washington post npr national international media | [
8368,
311
] | Test |
8,961 | 8 | Remark_Media:remark media remark media global digital media company specializes creating technology platforms user interfaces combine content social media spun discovery communications howstuffworks 2007 remark media owns operates international versions howstuffworks china brazil digital publisher certain content world book china company founding partner sharecare searchable social q healthcare platform organizing answering questions health company formerly known hsw international remark media also provides client services including strategic counsel concept design content production technology development implementation project management analytics company clients include major media companies boutique businesses start-ups company publicly listed nasdaq included russell index approximately 100 employees worldwide u.s. offices new york atlanta international offices beijing são paulo 2006 hsw international founded subsidiary howstuffworks bring website global emerging economies one year later company launched first international version howstuffworks – comotudofunciona brazil october 2007 hsw international went public nasdaq connection merger intac international merger facilitated launch company ’ second international version howstuffworks – bowenwang china 2008 2008 company acquired us website dailystrength – social media website hosting health wellness discussions starting 2009 part establishing joint venture harpo studios dr. mehmet oz discovery communications sony pictures television jeff arnold founder webmd company developed launched social q health website sharecare may 2011 partnership discovery communications company developed launched website curiosity.discovery.com – q site discovery channel ’ tv show curiosity october 2011 company announced would change name remark media december 2011 company formally changed name remark media nasdaq stock ticker mark | [] | None |
8,962 | 6 | Amazon_Elastic_File_System:amazon elastic file system amazon elastic file system amazon efs cloud storage service provided amazon web services aws designed provide scalable elastic concurrent restrictions encrypted file storage use aws cloud services on-premises resources amazon efs built able grow shrink automatically files added removed amazon efs supports network file system nfs versions 4.0 4.1 nfsv4 protocol control access files portable operating system interface posix permissions according amazon use cases file system service typically include content repositories development environments web server farms home directories big data applications amazon efs provides open-after-close consistency semantics applications expect nfs amazon efs available aws regions asia pacific seoul became available may 2018 | [
8451,
9224,
6027,
3993,
5660,
11038,
11556,
2217,
3629,
7983,
10681,
11201,
5960,
10185,
4298,
8266,
590,
7248,
7512,
8921,
735,
1001,
5612,
3696,
8181,
7802,
8446
] | None |
8,963 | 6 | GNU_fcrypt:gnu fcrypt gnu fcrypt disk encryption software project intended offer multiple hidden partitions fly encryption automatic transparent encryption plausible deniability disbanded project part gnu project november 2012 richard stallman dubbed fcrypt official gnu project program called gnu fcrypt software encryption intended prove resistant cracked quantum computers | [
3572,
7983,
823
] | Test |
8,964 | 9 | Synthesis_Toolkit:synthesis toolkit synthesis toolkit stk open source api real time audio synthesis emphasis classes facilitate development physical modelling synthesizers written c++ written maintained perry cook princeton university gary scavone mcgill university contains low-level synthesis signal processing classes oscillators filters etc higher-level instrument classes contain examples currently available physical modelling algorithms use today stk free software number classes particularly physical modelling algorithms covered patents held stanford university yamaha stk used widely creating software synthesis applications versions stk instrument classes integrated chuck csound real-time cmix max/msp part percolate supercollider faust ported symbianos ios well | [
3665,
7172,
6933,
8262
] | None |
8,965 | 7 | Appserver.io:appserver.io appserver.io application server php based web environments project consists middleware delivers classical php web applications provides additional services basic idea wildfly equivalent php present within techdivision well july 2013 development project began due technical shortcomings php language time possibility non-blocking socket-based php middleware given using asynchronous event driven workflow forked processes parallel august 2012 threading extension php joe watkins enabled true posix compatible multithreading controversially threads used allow programmer account hardware usage instead relying used runtime environment enable easier communication parallel working batches deciding technical blueprint development began github platform project consisted 36 separate repositories around 80,000 lines code estimated effort 18 years cocomo model appserver.io open-source software osl version 3.0 downloaded either installable package project page source github project aims freemium marketing approach splitting software community professional enterprise edition community edition contained base features open source free charge professional edition could used within microsoft azure cloud service offers additional developer support appserver.io includes runtime environment containing php extended external libraries php extensions service daemons out-of-the-box runtime environment php development use multithreading environment considered break so-called shared nothing concept php allows inter-process communication object level together bundled runtime appserver.io bundles administration version 0.6.0 application management implemented file-based application deployment appserver.io offers servlets objects persist client requests eliminate repeated bootstrapping applications require wrapping bootstrap parts appserver.io offers enterprise bean implementation similar enterprise java beans functionality appserver.io offers modular services used individually internal external applications features appserver.io allows component-based scalability services servers e.g http webserver adjustable size number based xml configuration file additional components configured remote access allowing distributed systems component replication appserver.io early stage development project provided tested pre-release versions github development releases regularly published homepage appserver.io follows naming convention based major minor version numbers major digit specifies context minor version names exist 1.* major version named iron stands mythological view medieval age every minor version 1.x within major release consist noun describing something common major context | [
4960,
8644,
4423,
4589,
6797,
1935,
7983,
4817,
10798,
1556,
11221,
823,
8122,
3517,
2045,
479
] | Test |
8,966 | 3 | Loader_(computing):loader computing computer systems loader part operating system responsible loading programs libraries one essential stages process starting program places programs memory prepares execution loading program involves reading contents executable file containing program instructions memory carrying required preparatory tasks prepare executable running loading complete operating system starts program passing control loaded program code operating systems support program loading loaders apart highly specialized computer systems fixed set specialized programs embedded systems typically loaders instead code executes directly rom order load operating system part booting specialized boot loader used many operating systems loader resides permanently memory though operating systems support virtual memory may allow loader located region memory pageable case operating systems support virtual memory loader may actually copy contents executable files memory rather may simply declare virtual memory subsystem mapping region memory allocated contain running program code contents associated executable file see memory-mapped file virtual memory subsystem made aware pages region memory need filled demand program execution actually hits areas unfilled memory may mean parts program code actually copied memory actually used unused code may never loaded memory unix loader handler system call codice_1 unix loader tasks include microsoft windows 7 loader codice_3 function contained ntdll.dll following operating systems need relocating loaders adjust addresses pointers executable compensate variations address loading starts operating systems need relocating loaders program always loaded location address space pointers absolute addresses rather offsets program base address well-known examples ibm os/360 system/360 mainframes descendants including z/os z/architecture mainframes os/360 descendant systems privileged operating system facility called iewfetch internal component os supervisor whereas non-privileged loader application perform many functions plus linkage editor entirely external os supervisor although certainly uses many supervisor services iewfetch utilizes highly specialized channel programs theoretically possible load relocate entire executable within one revolution dasd media 16.6 ms maximum 8.3 ms average legacy 3,600 rpm drives load modules exceed track size also possible load relocate entire module without losing revolution media iewfetch also incorporates facilities so-called overlay structures facilitates running potentially large executables minimum memory model small 44 kb versions os 88 kb 128 kb common os nucleus always resident portion supervisor formatted way compatible stripped-down version iewfetch unlike normal executables os nucleus scatter loaded parts nucleus loaded different portions memory particular certain system tables required reside initial 64 kb tables code may reside elsewhere system linkage editor application named iewl iewl main function associate load modules executable programs object modules output say assemblers compilers including automatic calls libraries high-level language built-in functions format may efficiently loaded iewfetch large number editing options conventional application commonly employed load module format includes initial text record followed immediately relocation and/or control record text record followed instances text record relocation and/or control record pairs end module text records usually large relocation and/or control records small iewfetch three relocation and/or control record buffers fixed 260 bytes smaller relocation and/or control records certainly possible 260 bytes maximum possible iewl ensures limitation complied inserting additional relocation records required next text record necessary special case sequence records may ... text record relocation record ... control record text record ... special byte within relocation and/or control record buffer used disabled bit spin communication area initialized unique value read ccw relocation and/or control record program controlled interrupt bit set processor thereby notified ccw accessed channel via special ios exit point processor enters disabled bit spin loop sometimes called shortest loop world byte changes initialized value cpu exits bit spin relocation occurs gap within media relocation and/or control record next text record relocation finished next record nop ccw following read changed tic loading relocating proceed using next buffer channel stop nop ccw restarted iewfetch via another special ios exit three buffers continuous circular queue pointing next last pointing first three buffers constantly reused loading relocating proceeds iewfetch thereby load relocate load module practical size minimum possible time dynamic linking loaders another type loader load link shared libraries like .so files .dll files already loaded running programs | [
1922,
4998,
6664,
6921,
11656,
6797,
11539,
7071,
6950,
6829,
7983,
5040,
7728,
7607,
5432,
9911,
3386,
1724,
10176,
9921,
1219,
4424,
5065,
5578,
8012,
5840,
1106,
7421,
2138,
477,
2786,
8037,
1775,
7792,
11632,
5363,
2804,
5492,
9331,
2... | Test |
8,967 | 8 | Composite_application:composite application computing composite application software application built combining multiple existing functions new application technical concept compared mashups however composite applications use business sources e.g. existing modules even web services information mashups usually rely web-based often free sources wrong assume composite applications definition part service-oriented architecture soa composite applications built using technology architecture composite application consists functionality drawn several different sources components may individual selected functions within applications entire systems whose outputs packaged business functions modules web services composite applications often incorporate orchestration local application logic control composed functions interact produce new derived functionality composite applications based soa ws-caf web services standard composite applications | [
489,
4107
] | Test |
8,968 | 4 | Host_Based_Security_System:host based security system host based security system hbss official name given united states department defense dod commercial-off-the-shelf cots suite software applications used within dod monitor detect defend dod computer networks systems enterprise-wide information assurance computer network defense solutions steering group essg sponsored acquisition hbss system use within dod enterprise network hbss deployed non-classified internet protocol routed network niprnet secret internet protocol routed network siprnet networks priority given installing niprnet hbss based mcafee inc epolicy orchestrator epo mcafee point product security applications host intrusion prevention system hips seeing need supply comprehensive department-wide security suite tools dod system administrators essg started gather requirements formation host-based security system summer 2005 march 2006 bae systems mcafee awarded contract supply automated host-based security system department award 22 pilot sites identified receive first deployments hbss pilot roll dod system administrators around world identified trained using hbss software preparation software deployment across dod october 9 2007 joint task force global network operations jtf-gno released communications tasking order cto 07-12 deployment host based security system hbss mandating deployment hbss combatant command service agency cc/s/a networks within dod completion date 3rd quarter 2008 release cto brought hbss attention major department heads cc/s/a providing essg necessary authority enforce deployment agencies willing comply cto risked disconnected dod global information grid gig lack compliance lessons learned pilot deployments provided valuable insight hbss program eventually leading defense information systems agency disa supplying pre-loaded hbss hardware well providing hbss software image could loaded compliant hardware platforms proved invaluable easing deployment task newly trained hbss system administrators provided consistent department-wide software baseline disa provided step-by-step documentation completing hbss baseline creation freshly installed operating system lessons learned niprnet deployments simplified process deploying hbss siprnet throughout lifetime hbss undergone several major baseline updates well minor maintenance releases first major release hbss known baseline 1.0 contained mcafee epolicy orchestrator engine hips software compliance profiler scp rogue system detection rsd asset baseline manager abm assets software new releases introduced software products evolved new products added cases completely replaced different products january 2011 hbss currently baseline 4.5 maintenance release 2.0 mr2 mr2 contains following software heart mcafee epolicy orchestrator epo management engine hbss mcafee tools responsible mcafee considers point product individual software applications controlled epo server hbss point products consist following host intrusion prevention system hips consists host-based firewall application-level blocking consolidated single product hips component one significant components hbss provides capability block known intrusion signatures restrict unauthorized services applications running host machines policy auditor pa introduced hbss baseline 2.0 policy auditor responsible ensuring compliance mandates payment card industry data security standard pci dss sarbanes–oxley act 2002 sox gramm–leach–bliley act 1999 glba health insurance portability accountability act 1996 hipaa federal information security management act 2002 fisma well best practice frameworks control objectives information related technology cobit pa maps controls predefined policy content mcafee policy auditor helps report consistently accurately key industry mandates internal policies across infrastructure specific targeted systems policy auditor agent-based audit solution leverages security content automation protocol scap automate processes required internal external audits assets baseline module released baseline 1.0 government off-the-shelf gots product used address system baseline configurations changes order respond information operations condition infocon infocon changes necessary times heightened security threats system initial deployment stages hbss assets module juvenile lacked much products intended capabilities however application fully evolved robust feature packed version capable handling original software design goals abm originally known assets 1.0 upgraded assets 2.0 hbss baseline 2.0 later called assets 3000 hbss baseline 3.0 rogue system detector rsd component hbss used provide real-time detection new hosts attaching network rsd monitors network segments reports hosts seen network epo server epo server determines whether system connected epo server mcafee agent installed identified exception considered rogue epo server take appropriate action concerning rogue host specified rsd policy hbss baseline 1.0 introduced rsd 1.0 rsd updated 2.0 hbss baseline 2.0 dcm component hbss introduced hbss baseline 2.0 specifically address use usb devices dod networks jtf-gno cto 09-xxx removable flash media device implementation within department defense dod networks released march 2009 allowed use usb removable media provided meets conditions stated within cto one conditions requires use hbss dcm module installed configured manage usb devices attached system dcm renamed data loss prevention dlp hbss baseline 3.0 mr3 assets publishing service aps hbss introduced hbss baseline 4.0 allow enclaves report asset information third-party dod entity standards-compliant format adds contextual information hbss assets allows improved reporting features systems relying hbss data according jtf-gno cto 07-12 dod agencies required deploy hbss networks disa made hbss software available download pki protected patch server users attempting download software required common access card cac .mil network disa provides software updates free charge dod entities additionally hbss administrators require satisfactory completion hbss training commonly appointed unit section commander writing order receive administer hbss system system administrators must satisfactorily complete online class hbss training well identified hbss administrator online training takes 30 hours complete class training requires four days excluding travel advanced hbss class also available hbss administrators wishing acquire in-depth knowledge system hbss online class training managed disa information pertaining training classes obtained disa information assurance support environment iase website disa risk management executive office formerly field security office fso provides free technical support hbss administrators help desk disa three tiers support tier tier iii tier tier ii support provided disa fso tier iii support provided mcafee disa fso support available using one following methods current pace hbss updated several times original baseline 1.0 current baseline 3.0 mr3 version within baseline 3.0 maintenance releases introduced every two four months bringing better stability security release hbss follows mcafee epo version updates closely expected continue trend epo continuously developed | [
704,
10831,
5780,
8471,
7388
] | Test |
8,969 | 1 | Tibero:tibero tibero relational databases database management system utility developed tmaxsoft tmaxsoft developing tibero since 2003 2008 second company world deliver shared-disk-based cluster tac main products tibero tibero mmdb tibero prosync tibero infinidata tibero datahub tibero relational database management system rdbms considered alternative oracle databases due complete compatibility oracle products including sql tibero guarantees reliable database transactions logical sets sql statements supporting acid atomicity consistency isolation durability providing enhanced synchronization databases tibero 5 enables reliable database service operation multi node environment tibero implemented unique tibero thread architecture address disadvantages previous dbms result tibero make efficient use system resources cpu memory fewer server processes ensures tibero offers combination performance stability expandability facilitating development administration functions additionally provides users developers various standard development interface easily integrate dbms 3rd party tools addition block transfer technology applied improve ‘ tibero active cluster ’ shared db clustering technology similar oracle rac tibero supports self-tuning based performance optimization reliable database monitoring performance management korea tibero adopted 450 companies across range industries finance manufacturing communication public sector globally 14 companies july 2011 tibero uses multiple working processes working process uses multiple threads number processes threads changed user requests handled thread pool removes overhead dispatcher handles input/output processing memory usage number os processes reduced using thread pool number simultaneous processes changed tibero following three processes listener receives requests new connections clients assigns available working thread listener plays intermediate role clients working threads using independent executable file tblistener background processes independent processes primarily perform time-consuming disk operations specified intervals request working thread another background process following processes belong background process group tibero rdbms provides distributed database links data replication database clustering tibero active cluster tac similar oracle rac. parallel query processing query optimizer conforms sql standard specifications development interfaces guarantees high compatibility types databases features include row-level locking multi-version concurrency control parallel query processing partition table support tibero rdbms enables stable efficient management dbmss guarantees high-performance transaction processing using tibero active cluster hereafter tac technology failover operation based shared disk clustering system environment tac allows instances different nodes share data via shared disk supports stable system operation 24x365 fail-over function optimal transaction processing guaranteeing integrity data instance ’ memory tac main feature tibero providing high scalability availability instances executed tac environment execute transactions using shared database access shared database mutually controlled data consistency conformity processing time reduced larger job divided smaller jobs jobs performed several nodes multiple systems share data files based shared disks nodes act use single shared cache sending receiving data blocks necessary organize tac high speed private network connects nodes even node stops operating nodes continue services transition happens quickly transparently tac cluster system application level provides high availability scalability types applications recommended apply replication architecture servers also hardware storage devices helps improve high availability virtual ip vip assigned node tac cluster node tac cluster failed public ip accessed virtual ip used connections connection failover following main components tac | [
11136,
8969,
5612,
6797,
10286,
7983,
10640,
6993,
10389,
823,
1304
] | Validation |
8,970 | 7 | GGPO:ggpo ggpo short good game peace middleware designed help create near-lagless online experience various emulated arcade games fighting games program created tony cannon co-founder fighting game community site shoryuken popular evolution championship series creation ggpo creator tony cannon completely dissatisfied 2006 xbox 360 re-release experiencing criticized online capabilities reaction service cannon began development ggpo released first ever version late 2006 cannon later demonstrated ggpo capcom positively received downloadable ggpo client supported many games capcom snk including super street fighter ii turbo king fighters 2002 metal slug x use built-in emulator video game companies also implemented licensed version ggpo games using include skullgirls killer instinct 2013 video game ggpo uses netcode technique called “ rollback ” rather waiting input received players simulating next frame ggpo predicts inputs send simulates next frame without delay using assumption players ’ inputs arrive input ’ match prediction ggpo rolls back state game last correct state replays players ’ revised inputs back current frame hope predictions correct time allowing smooth play minimal sudden changes game state system highly similar client-side prediction applied peer-to-peer setup client program allow players manually adjust latency high-ping situations either creating possibly-jerky yet accurate representation smoother game input delay ggpo originally bundled client enabled users play supported games online players matchmaking system allowed players request challenges users non-participants could spectate match chat challenge initiated match ran rom prepackaged emulator finalburn alpha client discontinued superseded clients make use ggpo networking middleware | [
3793,
8122,
6797,
7983
] | Train |
8,971 | 4 | RunScanner:runscanner runscanner freeware microsoft windows system utility scans windows system configured running programs autostart locations program created best worlds effort combine positive features similar programs like hijackthis autoruns silentrunners unlike similar programs runscanner connects online database rate good bad items main purpose database whitelisting instead blacklisting runscanner scans windows autostart locations gives user possibility delete misconfigured malware items inexperienced users post log files forums specialist helpers help solve malware problems advanced users use features modern malware fighters come expect unlike similar software runscanner also exchange binary files users | [
5636,
11401,
6797,
7983,
7413,
7515
] | Validation |
8,972 | 2 | Virtual_machine_introspection:virtual machine introspection computing virtual machine introspection vmi technique monitoring runtime state system-level virtual machine vm helpful debugging forensic analysis term introspection application virtual machines introduced garfinkel rosenblum invented approach protecting security application attack malicious software called vmi vmi common term different virtual machine forensics analysis methods vmi-based approaches widely used security applications software debugging systems management vmi tools may located inside outside virtual machine act tracking events interrupts memory writes sending requests virtual machine virtual machine monitor usually provides low-level information like raw bytes memory converting low-level view something meaningful user known semantic gap problem solving problem requires analysis understanding systems monitored programs running inside vm may provide information processes information may sent network interface virtual devices like serial port examples vivo introspection programs windbg gdb servers interact remote debugger drawback approach requires functioning os within vm os hangs n't loaded yet introspection agent could n't work vmi tools may implemented within virtual machine monitor separate programs capture information e.g. contents memory virtual machine monitor data interpreted understand processes system one popular tools interpretation volatility framework framework contains profiles many popular operating systems may extract different information like process tree list kernel objects | [
5457
] | Test |
8,973 | 9 | Bootstrapping_(compilers):bootstrapping compilers computer science bootstrapping technique producing self-compiling compiler — compiler assembler written source programming language intends compile initial core version compiler bootstrap compiler generated different language could assembly language successive expanded versions compiler developed using minimal subset language many compilers many programming languages bootstrapped including compilers basic algol c c pascal pl/i factor haskell modula-2 oberon ocaml common lisp scheme go java rust python scala nim eiffel bootstrapping compiler following advantages note points assume language runtime also written language one needs compile compiler language x written language x issue first compiler compiled different methods used practice solving chicken egg problem include methods distributing compilers source code include providing portable bytecode version compiler bootstrap process compiling compiler t-diagram notation used explain compiler bootstrap techniques cases convenient way get complicated compiler running system little software involves series ever sophisticated assemblers compilers assemblers first language tools bootstrap first high-level language provide bootstrap neliac 1958 first widely used languages burroughs b5000 algol 1961 lisp 1962 hart levin wrote lisp compiler lisp mit 1962 testing inside existing lisp interpreter improved compiler point could compile source code self-hosting technique possible interpreter already exists language compiled borrows directly notion running program input also used various proofs theoretical computer science proof halting problem undecidable due security concerns regarding trusting trust attack various attacks binary trustworthiness multiple projects working reduce effort bootstrapping source also allowing everyone verify source executable correspond include bootstrappable builds project reproducible builds project following programming languages self-hosting compilers | [
512,
6016,
4486,
2062,
6414,
8082,
1435,
6558,
5663,
1952,
3876,
6437,
5803,
428,
5165,
5677,
692,
8502,
3904,
8000,
1349,
2374,
8262,
2505,
8524,
11599,
7889,
7896,
11610,
477,
7775,
6242,
10083,
7805,
8554,
2798,
10991,
9714,
10739,
396... | None |
8,974 | 4 | Underground_(Dreyfus_book):underground dreyfus book underground tales hacking madness obsession electronic frontier 1997 book suelette dreyfus researched julian assange describes exploits group australian american british black hat hackers late 1980s early 1990s among assange book also mentions hackers contacts protagonists among erik bloodaxe legion doom corrupt masters deception first chapter underground relates diffusion reactions computer security community wank worm attacked dec vms computers decnet 1989 purportedly coded melbourne hacker book sold 10,000 copies author made electronic edition book freely available 2001 announced slashdot server housing book crashed due demand book reached 400,000 downloads within two years 2002 documentary realm hackers directed kevin anderson centered phoenix electron inspired book | [
8612,
2558,
4435,
3896,
4956,
4830
] | None |
8,975 | 2 | The_Open_Group:open group open group industry consortium seeks enable achievement business objectives developing open vendor-neutral technology standards certifications 625 members provides number services including strategy management innovation research standards certification test development established 1996 x/open merged open software foundation open group certifying body unix trademark publishes single unix specification technical standard extends posix standards open group also develops manages togaf standard industry standard enterprise architecture framework 625 members include range vendors buyers well government agencies including example capgemini fujitsu oracle hpe orbus software ibm huawei philips u.s. department defense nasa obligation product developers vendors adopt standards developed association early 1990s major unix system vendors begun realize standards rivalries often called unix wars causing participants harm good leaving unix industry open emerging competition microsoft cose initiative 1993 considered first unification step merger open software foundation osf x/open 1996 ultimate step end skirmishes osf previously merged unix international 1994 meaning new entity effectively represented elements unix community time january 1997 responsibility x window system transferred open group defunct x consortium 1999 x.org formed manage x window system management services provided open group x.org members made number releases including x11r6.8 open group provided management services 2004 x.org open group worked together establish newly formed x.org foundation took control x.org domain name stewardship x window system see history x window system open group best-known services certification programs including certification products best practices posix north american state lotteries association naspl unix open group offers certifications professionals addition togaf certification covers tools services people certification open group also administers open group certified architect open ca program open group certified specialist open cits certification program latter skills experience based certification programs open group also offers certification archimate tools people well people certification open fair it4it open group provides platform members discuss requirements work jointly development adoption industry standards facilitate enterprise integration note open group documents available members especially development based area interest members join one semi-autonomous forums include members come together open group quarterly events member meetings open group also provides range services initial setup ongoing operational support collaboration standards best practices development assistance market impact activities assist organizations setting business objectives strategy procurement also provide certification test development includes services government agencies suppliers companies organizations set governments | [
5888,
5506,
515,
5636,
5763,
9733,
9735,
9858,
7053,
4750,
5397,
3222,
1304,
8984,
6812,
6813,
7847,
10024,
429,
7983,
10672,
9137,
11567,
2995,
8499,
5815,
7356,
10303,
8260,
1093,
9542,
1479,
458,
3659,
716,
2253,
8522,
6993,
10068,
853... | None |
8,976 | 3 | Windows_NT:windows nt windows nt family operating systems produced microsoft first version released july 27 1993 processor-independent multiprocessing multi-user operating system first version windows nt windows nt 3.1 produced workstations server computers intended complement consumer versions windows based ms-dos including windows 1.0 windows 3.1x gradually windows nt family expanded microsoft general-purpose operating system product line personal computers deprecating windows 9x family nt formerly expanded new technology longer carries specific meaning starting windows 2000 nt removed product name included product version string nt first purely 32-bit version windows whereas consumer-oriented counterparts windows 3.1x windows 9x 16-bit/32-bit hybrids multi-architecture operating system initially supported several instruction set architectures including ia-32 mips dec alpha support powerpc itanium x64 arm added later latest versions support x86 specifically ia-32 x64 arm major features windows nt family include windows shell windows api native api active directory group policy hardware abstraction layer ntfs bitlocker windows store windows update hyper-v suggested dave cutler intended initialism wnt play vms incrementing letter one however project originally intended follow-on os/2 referred nt os/2 receiving windows brand one original nt developers mark lucovsky states name taken original target processor—the intel i860 code-named n10 n-ten 1998 question-and-answer session bill gates revealed letters previously expanded new technology longer carry specific meaning letters dropped names releases windows 2000 later though microsoft described product built nt technology main design goal nt hardware software portability various versions nt family operating systems released variety processor architectures initially ia-32 mips dec alpha powerpc itanium x86-64 arm supported later releases idea common code base custom hardware abstraction layer hal platform however support mips alpha powerpc later dropped windows 2000 broad software compatibility achieved support several api personalities including windows api posix os/2 apis – latter two phased starting windows xp partial ms-dos compatibility achieved via integrated dos virtual machine – although feature phased x86-64 architecture nt supported per-object file function role access control lists allowing rich set security permissions applied systems services nt supported windows network protocols inheriting previous os/2 lan manager networking well tcp/ip networking microsoft would implement tcp/ip stack derived first streams-based stack spider systems later rewritten in-house windows nt 3.1 first version windows use 32-bit flat virtual memory addressing 32-bit processors companion product windows 3.1 used segmented addressing switches 16-bit 32-bit addressing pages windows nt 3.1 featured core kernel providing system api running supervisor mode ring 0 x86 referred windows nt kernel mode platforms set user-space environments apis included new win32 environment os/2 1.3 text-mode environment posix environment full preemptive multitasking kernel could interrupt running tasks schedule tasks without relying user programs voluntarily give control cpu windows 3.1 windows applications although ms-dos applications preemptively multitasked windows starting windows/386 notably windows nt 3.x several i/o driver subsystems video printing user-mode subsystems windows nt 4 video server printer spooler subsystems moved kernel mode windows nt first gui strongly influenced programmatically compatible windows 3.1 windows nt 4 interface redesigned match brand new windows 95 moving program manager windows shell design ntfs journaled secure file system created nt windows nt also allows installable file systems starting versions 3.1 nt could installed fat hpfs file systems windows nt introduced driver model windows nt driver model incompatible older driver frameworks windows 2000 windows nt driver model enhanced become windows driver model first introduced windows 98 based nt driver model windows vista added native support windows driver foundation also available windows xp windows server 2003 extent windows 2000 microsoft decided create portable operating system compatible os/2 posix supporting multiprocessing october 1988 development started november 1989 windows nt known os/2 3.0 third version operating system developed jointly microsoft ibm ensure portability initial development targeted intel i860xr risc processor switching mips r3000 late 1989 intel i386 1990 microsoft also continued parallel development dos-based less resource-demanding windows environment resulting release windows 3.0 may 1990 windows 3 eventually successful microsoft decided change primary application programming interface still unreleased nt os/2 known extended os/2 api extended windows api decision caused tension microsoft ibm collaboration ultimately fell apart ibm continued os/2 development alone microsoft continued work newly renamed windows nt though neither operating system would immediately popular microsoft ms-dos windows products windows nt would eventually far successful os/2 microsoft hired group developers digital equipment corporation led dave cutler build windows nt many elements design reflect earlier dec experience cutler vms rsx-11 also unreleased object-based operating system developed dave cutler dec prism team joined selected members disbanded os/2 team including moshe dunie operating system designed run multiple instruction set architectures multiple hardware platforms within architecture platform dependencies largely hidden rest system kernel mode module called hal hardware abstraction layer windows nt kernel mode code distinguishes kernel whose primary purpose implement processor- architecture-dependent functions executive designed modified microkernel windows nt kernel influenced mach microkernel developed carnegie mellon university meet criteria pure microkernel kernel executive linked together single loaded module ntoskrnl.exe outside module little distinction kernel executive routines directly accessible example kernel-mode device drivers api sets windows nt family implemented subsystems atop publicly undocumented native api allowed late adoption windows api win32 subsystem windows nt one earliest operating systems use unicode internally windows nt 3.1 3.51 incorporated program manager file manager windows 3.1x series windows nt 4.0 onwards replaced programs windows explorer including taskbar start menu originally appeared windows 95 first release given version number 3.1 match contemporary 16-bit windows magazines era claimed number also used make version seem reliable .0 release also novell ipx protocol apparently licensed 3.1 versions windows software nt version number generally used marketing purposes still used internally said reflect degree changes core operating system however application compatibility reasons microsoft kept major version number 6 releases following vista changed later 10 windows 10 build number internal identifier used microsoft developers beta testers windows nt written c c++ small amount written assembly language c mostly used kernel code c++ mostly used user-mode code assembly language avoided possible would impede portability order prevent intel x86-specific code slipping operating system developers used developing x86 chips windows nt 3.1 initially developed using non-x86 development systems ported x86 architecture work initially based intel i860-based dazzle system later mips r4000-based jazz platform systems designed internally microsoft windows nt 3.1 released intel x86 pc compatible pc-98 dec alpha arc-compliant mips platforms windows nt 3.51 added support powerpc processor 1995 specifically prep-compliant systems ibm power series desktops/laptops motorola powerstack series despite meetings michael spindler bill gates power macintosh prep compliant power macintosh project failed ship intergraph corporation ported windows nt clipper architecture later announced intention port windows nt 3.51 sun microsystems sparc architecture neither version sold public retail product two windows nt 4.0 variants ia-32 alpha full set service packs available ports done third parties motorola intergraph etc publicly available updates windows nt 4.0 last major release support alpha mips powerpc though development windows 2000 alpha continued august 1999 compaq stopped support windows nt architecture three days later microsoft also canceled alphant program even though alpha nt 5 windows 2000 release reached rc1 status microsoft announced january 5 2011 next major version windows nt family include support arm architecture microsoft demonstrated preliminary version windows version 6.2.7867 running arm-based computer 2011 consumer electronics show eventually led commercial release windows 8-derived windows rt october 26 2012 implementation nt ce windows phone 8 according microsoft common misconception xbox xbox 360 use modified windows 2000 kernel xbox operating system built scratch implements subset windows apis 64-bit versions windows nt originally intended run itanium dec alpha latter used internally microsoft early development 64-bit windows continued time microsoft publicly announced cancelling plans ship 64-bit windows alpha alpha versions windows nt 32-bit windows 2000 supports intel ia-32 32-bit windows xp server 2003 server 2008 server 2008 r2 one edition dedicated itanium-based systems comparison itanium microsoft adopted x64 greater scale every version windows since windows xp dedicated x64 edition x64 editions minimum hardware specification required run release professional workstation version windows nt fairly slow-moving 6.0 vista release requires minimum 15 gb free disk space 10-fold increase free disk space alone previous version | [
6148,
4104,
2058,
13,
8214,
2071,
10273,
2101,
6213,
8262,
10310,
10322,
8275,
93,
10338,
8296,
6250,
8299,
6252,
8301,
6265,
8315,
2179,
2180,
4228,
10378,
2193,
10387,
2196,
6297,
2212,
2221,
178,
2231,
8379,
6345,
4305,
2259,
4309,
215... | Test |
8,977 | 3 | ArcaOS:arcaos arcaos operating system developed marketed arca noae llc derived os/2 based last release ibm development continues stated goal add wider compatibility modern computing platforms including uefi gpt support limited pae support ram excess 4 gb utilized ram disk utilizing smp kernel supports 64 physical cpus real cpu cores hyper-threading recommended arcaos 32-bit operating system runs x86 processor architecture real virtualized arcaos based ibm os/2 warp 4.52 also known merlin convenience pack 2 mcp2 arcaos 5.0.3 acpi 6.2a-compliant acpica 20180508 arcaos compatible x86-based personal computers including portables desktops servers availability traditional bios case uefi-based systems complete csm arcaos includes device drivers number network adapters either using arca noae multimac technology employs freebsd driver code older ibm third-party-supplied drivers selection genmac drivers support wireless networking somewhat limited though multimac support select chipsets planned arcaos supports usb 2.0 connectivity development usb 3.0 driver ongoing audio support utilizes uniaud generic audio driver maintained arca noae uniaud based alsa addition selection device-specific drivers included os distribution video support provided panorama generic unaccelerated vesa driver snap accelerated video driver acceleration supported limited number graphics chipsets features zooming multi-head also available limited number chipsets snap lacks support many modern chipsets though support additional chips planned storage drivers available ide ahci select number scsi adapters supported nvme driver yet available arcaos includes capable dos vdm ships modified version windows 3.11 winos2 capable running 16-bit windows applications also capable running 32-bit windows applications utilizing odin project based part wine addition ported native os/2 code linux applications quite common well qt applications ported linux qt applications included distribution may installed rpm packages several available yum repositories openjdk 6 included arcaos capable running wide range java applications heimdal kerberos authentication client included arcaos distribution based 1.5.3 heimdal code arcaos native file system jfs though hpfs also supported os may booted either filesystem fat12 fat16 fat32 also supported using either kernel fat driver ifs driver arcaos supports several file systems use additional ifs drivers cdfs udf netdrive os/2 provides access samba 4 shares via ifs driver arcaos distribution includes limited license version netdrive fully licensed version capable mounting number local native foreign file systems arcaos formally announced october 23 2015 warpstock 2015 event os/2 ecomstation user group event code name blue lion arca noae managing member lewis rosenthal planned features blue lion announced time warpstock 2015 conference initial release projected late third quarter 2016 arca noae also stated actual release date set pre-orders arcaos ever taken announced name arcaos first published tech republic article may 26 2016 arcaos.com domain registered december 20 2015 tech republic article lewis rosenthal quoted saying first release arcaos would version 5.0 follows onto last release os/2 warp ibm 4.52 also stated arcaos 5.1 provide french spanish italian german dutch versions operating system arcaos 5.0 code name blue lion released may 15 2017 two editions released commercial edition intended enterprise use including 12 months upgraded/prioritized technical support personal edition targeted non-business users including six months standard technical support reduced price pricing listed 229 per license commercial edition 129 per license personal edition 99 promotional price effect first 90 days following release 9 july 2017 arcaos 5.0.1 released contained fixes installer arca noae current drivers ahci driver updated along multimac fix virtualpc use ibm ’ smouse driver version 5.0.2 arcanoae added usb booting support allowing os/2 boot usb media addition optical media version 5.0.2 released february 10 2018 19 august 2018 version 5.0.3 released included several updates bundled drivers programs 21 july 2019 version 5.0.4 released introduced new updater feature allowing arcaos installations upgraded latest release without reinstalling operating system | [
6675,
7187,
10776,
25,
4637,
9762,
5158,
7217,
9784,
10809,
576,
10333,
1632,
97,
8298,
7285,
9335,
2168,
1147,
3197,
1150,
2179,
10883,
6797,
7313,
9366,
6296,
7325,
9887,
3248,
6837,
8388,
9932,
5840,
7382,
8410,
1253,
5363,
2811,
3323,... | None |
8,978 | 4 | Keystroke_logging:keystroke logging keystroke logging often referred keylogging keyboard capturing action recording logging keys struck keyboard typically covertly person using keyboard unaware actions monitored data retrieved person operating logging program keylogger either software hardware programs legal many designed allow employers oversee use computers keyloggers often used purpose stealing passwords confidential information keylogging also used study human–computer interaction numerous keylogging methods exist range hardware software-based approaches acoustic analysis software-based keyloggers computer programs designed work target computer software keyloggers used organizations troubleshoot technical problems computers business networks families business people use keyloggers legally monitor network usage without users direct knowledge even microsoft publicly admitted windows 10 operation system built-in keylogger final version “ improve typing writing services ” however malicious individuals use keyloggers public computers steal passwords credit card information keyloggers stopped https encryption protects data transit computers thus threat user computer technical perspective several categories keystroke logging established research method study writing processes different programs developed collect online process data writing activities including inputlog scriptlog translog keystroke logging legitimately used suitable research instrument number writing contexts include studies cognitive writing processes include keystroke logging used research writing specifically also integrated educational domains second language learning programming skills typing skills software keyloggers may augmented features capture user information without relying keyboard key presses sole input features include hardware-based keyloggers depend upon software installed exist hardware level computer system mid 1970s soviet union developed deployed hardware keylogger targeting typewriters termed selectric bug measured movements print head ibm selectric typewriters via subtle influences regional magnetic field caused rotation movements print head early keylogger written perry kivolowitz posted usenet news group net.unix-wizards net.sources november 17 1983 posting seems motivating factor restricting access /dev/kmem unix systems user-mode program operated locating dumping character lists clists assembled unix kernel 1970s spies installed keystroke loggers us embassy consulate buildings moscow installed bugs selectric ii selectric iii electric typewriters soviet embassies used manual typewriters rather electric typewriters classified information—apparently immune bugs 2013 russian special services still use typewriters writing simple software applications keylogging trivial like nefarious computer program distributed trojan horse part virus trivial attacker however installing covert keystroke logger without getting caught downloading data logged without traced attacker manually connects host machine download logged keystrokes risks traced trojan sends keylogged data fixed e-mail address ip address risks exposing attacker researchers devised several methods solving problem presented deniable password snatching attack keystroke logging trojan installed using virus worm 2000 fbi used flashcrest ispy obtain pgp passphrase nicodemo scarfo jr. son mob boss nicodemo scarfo also 2000 fbi lured two suspected russian cyber criminals us elaborate ruse captured usernames passwords keylogger covertly installed machine used access computers russia fbi used credentials hack suspects computers russia order obtain evidence prosecute effectiveness countermeasures varies keyloggers use variety techniques capture data countermeasure needs effective particular data capture technique case windows 10 keylogging microsoft enough change privacy settings computer example on-screen keyboard effective hardware keyloggers transparency defeat some—but all—screenloggers anti-spyware application disable hook-based keyloggers ineffective kernel-based keyloggers also keylogger program authors may able update code adapt countermeasures may proven effective anti-keylogger piece software specifically designed detect keyloggers computer typically comparing files computer database keyloggers looking similarities might signal presence hidden keylogger anti-keyloggers designed specifically detect keyloggers potential effective conventional antivirus software antivirus software consider keylogger virus circumstances keylogger considered legitimate piece software rebooting computer using live cd write-protected live usb possible countermeasure software keyloggers cd clean malware operating system contained secured fully patched infected soon started booting different operating system impact use hardware bios based keylogger many anti-spyware applications able detect software based keyloggers quarantine disable cleanse however many keylogging programs legitimate pieces software circumstances anti spyware often neglects label keylogging programs spyware virus applications able detect software-based keyloggers based patterns executable code heuristics keylogger behaviours use hooks certain apis software-based anti-spyware application 100 effective keyloggers also software-based anti-spyware defeat non-software keyloggers example hardware keyloggers attached keyboards always receive keystrokes software-based anti-spyware application however particular technique anti-spyware application uses influence potential effectiveness software keyloggers general rule anti-spyware applications higher privileges defeat keyloggers lower privileges example hook-based anti-spyware application defeat kernel-based keylogger keylogger receive keystroke messages anti-spyware application could potentially defeat hook- api-based keyloggers network monitors also known reverse-firewalls used alert user whenever application attempts make network connection gives user chance prevent keylogger phoning home typed information automatic form-filling programs may prevent keylogging removing requirement user type personal details passwords using keyboard form fillers primarily designed web browsers fill checkout pages log users accounts user account credit card information entered program automatically entered forms without ever using keyboard clipboard thereby reducing possibility private data recorded however someone physical access machine may still able install software able intercept information elsewhere operating system transit network transport layer security tls reduces risk data transit may intercepted network sniffers proxy tools using one-time passwords may keylogger-safe password invalidated soon used solution may useful someone using public computer however attacker remote control computer simply wait victim enter his/her credentials performing unauthorised transactions behalf session active use smart cards security tokens may improve security replay attacks face successful keylogging attack accessing protected information would require hardware security token well appropriate password/passphrase knowing keystrokes mouse actions display clipboard etc used one computer subsequently help attacker gain access protected resource security tokens work type hardware-assisted one-time password system others implement cryptographic challenge-response authentication improve security manner conceptually similar one time passwords smartcard readers associated keypads pin entry may vulnerable keystroke logging so-called supply chain attack attacker substitutes card reader/pin entry hardware one records user pin on-screen keyboards on-screen keyboard comes windows xp send normal keyboard event messages external target program type text software key loggers log typed characters sent one program another additionally keylogging software take screenshots displayed screen periodically and/or upon mouse click means although certainly useful security measure on-screen keyboard protect keyloggers keystroke interference software also available programs attempt trick keyloggers introducing random keystrokes although simply results keylogger recording information needs attacker task extracting keystrokes interest—the security mechanism specifically well stands cryptanalysis unclear similar on-screen keyboards speech-to-text conversion software also used keyloggers since typing mouse movements involved weakest point using voice-recognition software may software sends recognized text target software recognition took place also many pdas lately tablet pcs already convert pen also called stylus movements touchscreens computer understandable text successfully mouse gestures use principle using mouse movements instead stylus mouse gesture programs convert strokes user-definable actions typing text similarly graphics tablets light pens used input gestures however less common everyday potential weakness speech recognition applies technique well help many programs seemingly meaningless text expanded meaningful text time context-sensitively e.g en.wikipedia.org expanded web browser window focus biggest weakness technique programs send keystrokes directly target program however overcome using 'alternating technique described i.e sending mouse clicks non-responsive areas target program sending meaningless keys sending another mouse click target area e.g password field switching back-and-forth alternating typing login credentials typing characters somewhere else focus window cause keylogger record information need although could easily filtered attacker similarly user move cursor using mouse typing causing logged keystrokes wrong order e.g. typing password beginning last letter using mouse move cursor subsequent letter lastly someone also use context menus remove cut copy paste parts typed text without using keyboard attacker able capture parts password larger key space attack chose execute brute-force attack another similar technique uses fact selected text portion replaced next key typed e.g. password secret one could type dummy keys asdfsd dummies could selected mouse next character password e typed replaces dummies asdfsd techniques assume incorrectly keystroke logging software directly monitor clipboard selected text form take screenshot every time keystroke mouse click occurs may however effective hardware keyloggers | [
3072,
5636,
10245,
6,
10756,
9227,
13,
9233,
9745,
1557,
9242,
4637,
7710,
9761,
2084,
3620,
9256,
9771,
3629,
10801,
5172,
9781,
8247,
10297,
3643,
7739,
9791,
1088,
4165,
4689,
8281,
8283,
8797,
4198,
107,
10348,
6254,
4725,
10872,
5245... | None |
8,979 | 1 | Federated_database_system:federated database system federated database system type meta-database management system dbms transparently maps multiple autonomous database systems single federated database constituent databases interconnected via computer network may geographically decentralized since constituent database systems remain autonomous federated database system contrastable alternative sometimes daunting task merging several disparate databases federated database virtual database composite constituent databases federated database system actual data integration constituent disparate databases result data federation data abstraction federated database systems provide uniform user interface enabling users clients store retrieve data multiple noncontiguous databases single query—even constituent databases heterogeneous end federated database system must able decompose query subqueries submission relevant constituent dbmss system must composite result sets subqueries various database management systems employ different query languages federated database systems apply wrappers subqueries translate appropriate query languages mcleod heimbigner among first define federated database system mid 1980s fdbs one define architecture interconnect databases minimize central authority yet support partial sharing coordination among database systems description might accurately reflect mcleod/heimbigner definition federated database rather description fits mcleod/heimbigner called composite database mcleod/heimbigner federated database collection autonomous components make data available members federation publication export schema access operations unified central schema encompasses information available members federation among surveys practitioners define federated database collection cooperating component systems autonomous possibly heterogeneous three important components fdbs autonomy heterogeneity distribution another dimension also considered networking environment computer network e.g. many dbss lan many dbss wan update related functions participating dbss e.g. updates nonatomic transitions atomic updates dbms classified either centralized distributed centralized system manages single database distributed manages multiple databases component dbs dbms may centralized distributed multiple dbs mdbs classified two types depending autonomy component dbs federated non federated nonfederated database system integration component dbms autonomous federated database system consists component dbs autonomous yet participate federation allow partial controlled sharing data federated architectures differ based levels integration component database systems extent services offered federation fdbs categorized loosely tightly coupled systems multiple dbs fdbs specific type characterized along three dimensions distribution heterogeneity autonomy another characterization could based dimension networking example single databases multiple databases lan wan distribution data fdbs due existence multiple dbs fdbs built data distributed among multiple databases could stored single computer multiple computers computers could geographically located different places interconnected network benefits data distribution help increased availability reliability well improved access times heterogeneities databases arise due factors differences structures semantics data constraints supported query language differences structure occur two data models provide different primitives object oriented oo models support specialization inheritance relational models differences due constraints occur two models support two different constraints example set type codasyl schema may partially modeled referential integrity constraint relationship schema codasyl supports insertion retention captured referential integrity alone query language supported one dbms also contribute heterogeneity component dbmss example differences query languages data models different versions query languages could contribute heterogeneity semantic heterogeneities arise disagreement meaning interpretation intended use data schema data level classification possible heterogeneities include creating federated schema one resolve heterogeneities integrating component db schemas dealing incompatible data types query syntax obstacle concrete implementation fdbs systems planned top-down generic problem lies matching semantically equivalent differently named parts different schemas =data models tables attributes pairwise mapping n attributes would result formula_1 mapping rules given equivalence mappings number quickly gets large practical purposes common way provide global schema comprises relevant parts member schemas provide mappings form database views two principal approaches depend direction mapping examples data integration called schema matching problem fundamental difference mdbs fdbs concept autonomy important understand aspects autonomy component databases addressed component dbs participates fdbs four kinds autonomies addressed heterogeneities fdbs primarily due design autonomy ansi/x3/sparc study group outlined three level data description architecture components conceptual schema internal schema external schema databases three level architecture however inadequate describing architectures fdbs therefore extended support three dimensions fdbs namely distribution autonomy heterogeneity five level schema architecture explained heterogeneity autonomy requirements pose special challenges concerning concurrency control fdbs crucial correct execution concurrent transactions see also global concurrency control achieving global serializability major correctness criterion requirements characterized difficult unsolved commitment ordering introduced 1991 provided general solution issue see global serializability see commitment ordering also architectural aspects solution five level schema architecture includes following accurately representing state art data integration five level schema architecture suffer major drawback namely imposed look feel modern data users demand control data presented needs somewhat conflict bottom-up approaches data integration | [
10632,
8201,
4490,
7180,
2068,
10389,
7446,
11030,
2456,
1049,
5658,
5403,
9112,
7581,
10137,
4255,
9248,
9631,
9634,
1447,
2344,
4263,
7080,
10793,
10413,
10286,
49,
9397,
3004,
1341,
7868,
11324,
10048,
2369,
5953,
6850,
2246,
9286,
2632,... | None |
8,980 | 4 | HideMyAss!:hidemyass hidemyass hma virtual private network vpn provider founded 2005 united kingdom subsidiary czech cybersecurity company avast since 2016 hidemyass created 2005 norfolk england jack cator time cator sixteen years-old created hma order circumvent restrictions school accessing games music network according cator first hidemyass service created hours using open-source code first product free website users typed url delivered website user browser cator promoted tool online forums featured front page digg attracting one thousand users cator incorporated ads hma take venture capital funding generated 1,000 2,000 per month founder went college pursue degree computer science 2009 cator dropped college focus hma added paid vpn service early hma employees freelancers found odesk.com 2012 one freelancers set-up competing business hma responded hiring contractors full-time employees establishing physical offices london 2012 united kingdom government sent hidemyass court order demanding provide information cody andrew kretsinger use hma service hack sony member lulzsec hacking group hma provided information authorities hma said violation company terms use use software illegal activities 2013 hma added software anonymize internet traffic mobile devices first added 2013 2014 company introduced hidemyphone service allowed mobile phone users make calls appear come different location 2014 service 10 million users 215,000 paying subscribers vpn service made £11 million revenue year hma 100 staff established international offices belgrade kiev 2015 hma became one largest vpn providers may 2015 acquired avg technologies 40 million became part avast 2016 acquisition avg technologies 2017 security vulnerability discovered allowed hackers access user laptop obtain elevated privileges device 2019 reported hma received directive russian authorities join state sponsored registry banned websites would prevent russian hma users circumventing russian state censorship hma reportedly given one month comply face blocking russian authorities hidemyass provides digital software services intended help users remain anonymous online encrypt online traffic software used access websites may blocked user country anonymize information could otherwise used hackers something unscrupulous without identified hma privacy policy terms use prohibit using illegal activity hma hides user ip address identifying information routing user internet traffic remote server however experts note company log connection data including originating ip address duration vpn session amount bandwidth used may 2018 company 830 servers 280 locations across globe provided 3000 ip addresses 2015 review tom hardware said hidemyass easy use good customer service large number server locations choose criticized slowing internet speeds contrast digital trends said hidemyass strong speeds good server selection n't full-proof ensuring anonymity stored user activity logs 2017 pc world noted difficult measure effect vpn service internet speed variables like location internet service speeds hardware 2016 review pc magazine gave hma android app 3 5 stars praised hma server selection user interface criticized price speed lack advanced features 2018 pc magazine gave similar feedback hma vpn service pc world ’ 2017 review also praised hma simple user interface criticized lack advanced features saying software ideal casual users need advanced configuration options | [
7362,
2859,
9488,
5749,
2558
] | Test |
8,981 | 9 | JSLEE:jslee jslee jain service logic execution environment java programming language api developing deploying network services standardized java specification requests jsr 22 jsr 240 sun microsystems opencloud metaswitch participation 80 operators software vendors technical specification designed implementations meet stringent requirements communications applications like high throughput low latency scalability availability software portability furthermore allows software developers write robust components integrates acid properties transactions programming model jslee environment acts integration point multiple network resources communications protocols | [
4960,
9665,
10048,
7802,
4795
] | Validation |
8,982 | 3 | Palm_IIIxe:palm iiixe palm iiixe discontinued palm personal digital assistant designed manufactured palm inc cost us 249 new manufacturer part number 3c80304u note requirements palm desktop pim software originally shipped palm iii xe os required apple mac os 7.5.3 later microsoft windows 95 microsoft windows 98 microsoft windows nt 4.0 later palm iiixe introduced marketplace february 2000 one two remaining models palm iiic iii series line palm personal digital assistants palm iiixe unit came black flip lid infrared port top lets users beam memos addresses etc another palm handheld personal computer right software iiixe also used universal remote control bottom unit serial port hotsyncing user desktop computer way cradle serial port also support various peripherals including palmpix camera stowaway foldable gotype keyboards like palms series bottom portion screen features silkscreen used graffiti input system provide shortcuts calculator application list application menu search unit comes seven physical buttons power/backlight date book address book scroll buttons list memo pad buttons except scroll buttons used turn unit iiixe features 16 mhz motorola 68328 ez dragonball cpu powered two aaa batteries last month two depending use also features enhanced 160x160 pixel grayscale super-twisted nematic display area palm iiie palm iiix 4-bit display 16 greyscales 8 mb ram 2 mb internal flash memory system upgrades third party applications unit shipped palm os 3.5 patched later versions palm os 3.5.2 fixed memory leak version 3.5 palm os palm os 3.5.3 fixed flow control problem dynamic ui pointer issue caused incompatibilities 3rd party applications latest version palm os runs iiixe version 4.1 released november 2001 unlike free version 3.5 updates palm os 4.1 available paid upgrade cd-rom peculiar note palm iii series top battery inserts backwards positive terminal battery contacts battery compartment spring however bottom battery inserts usual way negative terminal battery touching spring battery compartment nimh batteries used extend runtime reduce waste alkaline batteries palm iiic iiixe vx units manufactured october 1999 may 2000 dram defect could overwrite user data randomly palm released diagnostics patch correct problem | [
2308,
10500,
6790,
6797,
3606,
6178,
5164,
7983,
3250,
9013,
694,
5318,
3017,
11337,
9037,
2258,
1621,
4832,
4449,
2285,
1776,
2420,
8952,
9598
] | None |
8,983 | 8 | Microwork:microwork microwork series small tasks together comprise large unified project completed many people internet microwork considered smallest unit work virtual assembly line often used describe tasks efficient algorithm devised require human intelligence complete reliably term developed 2008 leila chirayath janah samasource microtasking process splitting large job small tasks distributed internet many people since inception microwork many online services developed specialize different types microtasking rely large voluntary workforce composed internet users around world typical tasks offered repetitive simple automated good candidates microtasks following characteristics may also known ubiquitous human computing human-based computation focused computational tasks complex distributed computing microtasks distinguished macrotasks typically done independently require fixed amount time require specialized skill wage paid range cents per task hundreds dollars per project amazon mechanical turk allows workers choose perform simple tasks online reporting directly platform receive payments exchange task complex algorithm writing simple labelling photos videos describing products transcribing scanned documents employers submit tasks set payments often pennies task crowdsourcing project initiated amazon way users find duplicate webpages soon became service individuals contract computer programmers individuals finish tasks computers unable accomplish since project expanded original form nowadays people complete various mechanical turk projects extra income side liveops uses distributed network people run cloud call center virtual call center contact center contracted workers answer calls provide call center facilities without need physical building equipment traditional call center red cross utilized system successfully hurricane katrina 2005 process 17,000+ calls without open hire staff call center similar model used text message question-answering services like 63336 researchers connect service home receive questions submitted innocentive allows businesses post problems offer payment answers questions often far less simple tasks posted services like mechanical turk payments accordingly higher example think find way prevent orange juice stored see-through bottles turning brown may 20,000 samasource non-profit organization allows people living poverty opportunity complete microwork living wage service specializes online content moderation digital transcription data gathering promotion galaxy zoo scientific effort use online crowdsourcing classify large number galaxies astronomical images 2010 company internet eyes launched service return potential reward home viewers would watch live cctv streams alert shop owners potential theft progress uses microtasking services involve processing data especially online include driving traffic websites gathering data like email addresses labelling tagging data online also used accurately translate transcribe audio clips pictures since activities better suited humans computers used practical data conversion purposes also improve upon test fidelity machine learning algorithms identification pictures humans used help missing persons searches though little effect manipulation data services also good platform reaching large population social studies surveys since make easy offer monetary incentives companies also outsource projects specialists otherwise would expended resources hiring screening method pay per task attractive employers therefore companies like microsoft yahoo currently crowdsourcing work crowdflower company specializes allocating jobs foreign local crowd workers crowdflower alone completed 450 million completed human intelligence tasks 2007 2012 crowdflower operates differently amazon mechanical turk jobs taken company turn allocated right workers range channels implemented system called virtual play allows users play free games would turn accomplish useful tasks company 2011 estimated 375 million contributed digital crowdsourced labour india united states together make roughly 92 workers amazon mechanical turk u.s. making 56 however percentage indian turkers quadrupled one year 2008 2009 2009 indian turkers much younger educated american counterparts citation needed average age indian workers 26 american workers 35 addition 45 digital workforce india bachelor degrees 21 master degrees contrast 38 american turkers bachelor degree 17 master degree nonetheless majority digital workforce educated young adults major difference american indian workforce lies gender 63 indian turkers male compared 37 makes american turkers microtasking services implemented allow workers work home workers complete tasks voluntary basis time-sensitive jobs like call centers choose jobs complete complete workers work anywhere world receive payment directly internet workers reside anywhere world microwork provide job opportunities large fortune 500 companies many smaller companies people living poverty would otherwise able make living wage services like samasource work wealth distributed companies developed countries large volume families poverty especially women youth would otherwise able generate income services like amazon mechanical turk restrict countries workers connect employers microtasking services provide platform quickly get project online start receiving results many workers time services offer large workforces complete tasks concurrently large volumes small tasks completed quickly furthermore since task discretely contained tasks usually simple nature individual worker fully trained complete knowledge project contribute work united states tax law workers treated independent contractors means employers withhold taxes need file form 1099-misc internal revenue service given worker earns 600 per year workers responsible paying income taxes including self-employment tax would otherwise paid employer microtasking services criticized providing healthcare retirement benefits sick pay minimum wage pay piece treat workers independent contractors rather employees also avoid laws child labor labor rights additionally workers may little idea work used result may workers end contributing project negative impact morally opposed services especially amazon mechanical turk services pay pennies task called digital sweatshops analogy sweatshops manufacturing industry exploit workers maintain poor conditions wages vary considerably depending speed worker per-piece price offered workers choose tasks complete based task price experience employer employers bid higher faster completion higher-quality workers average unskilled turkers earn less 2.00 hour minimum wage united states however india well minimum cities india 1200 minimum wages global services outsource work underdeveloped developing regions competitive pricing task completion could result lower wages possibility also exists true brick mortar sweatshops exploit microtasking services enlisting poor afford computer aggregating work wages also possibility requesters may tell worker reject work cheat worker using anyway avoid paying however dispersed geography microwork used keep wages low networks fragment labour process also used workers organising resistance san francisco-based company crowdflower facilitated outsourcing digital tasks countries poverty stimulate local economies crowdsourcing company partnership samasource non-profit organization brings computer based work developing countries currently outsourced millions repetitive microwork kenyan refugee camps workers make 2 hour locals average refugees asked exploitation lukas biewald crowdflower argues digital sweatshop much better job people developing world opposed working manufacturing sweatshop states treatment received workers far superior categorized sweatshop great thing digital work really hard make sweatshop digital work really hard force someone work ca n't beat someone computer screen | [
3688,
1001,
8735
] | Validation |
8,984 | 1 | Terminfo:terminfo terminfo library database enables programs use display terminals device-independent manner mark horton implemented first terminfo library 1981–1982 improvement termcap improvements include terminfo included unix system v release 2 soon became preferred form terminal descriptions system v rather termcap bsd continued use imitated pcurses 1982–1984 pavel curtis available unix implementations adapting incorporating fixes mark horton information refer posting comp.sources.unix newsgroup december 1986 terminfo database describe capabilities hundreds different display terminals allows external programs able character-based display output independent type terminal configurations terminfo databases consist one descriptions terminals description must contain canonical name terminal may also contain one aliases name terminal canonical name aliases keys library searches terminfo database description contains one capabilities conventional names capabilities typed boolean numeric string terminfo library predetermined types capability name checks types capability syntax applications use terminfo know types respective capabilities obtain values capabilities terminfo database using library calls return successfully capability name corresponds one predefined typed capabilities like termcap string capabilities represent escape sequences may sent host pressing special keys keyboard capabilities represent strings may sent application terminal latter case terminfo library functions termcap library substituting application parameters string sent functions provide stack-based expression parser primarily used help minimize number characters sent control sequences optional parameters sgr select graphic rendition contrast termcap libraries provide limited set operations useful terminals terminfo descriptions constructed including contents one description another suppressing capabilities included description overriding adding capabilities matter storage model used terminfo library returns terminal description requested description using data compiled using standalone tool e.g. tic terminfo data stored binary file making less simple modify termcap data retrieved terminfo library files stored data organized tables boolean numeric string capabilities respectively scheme devised mark horton except differences regarding available names used terminfo implementations x/open specify format compiled terminal description fact even mention common tic infocmp utilities compiled terminfo entries contain metadata identifying indices within tables capability assigned necessarily compatible implementations however since implementations use overall table structure including sizes header data items possible automatically construct customized terminfo libraries read data given implementation example ncurses built match terminfo data several implementations original common implementation terminfo library retrieves data directory hierarchy using first character name terminal description one component pathname name terminal description name file retrieve terminfo library usually outperforms searching large termcap file implementations terminfo store terminal description hashed database e.g. something like berkeley db version 1.85 store two types records aliases point canonical entry canonical entry contains data terminal capabilities open group documents limits terminfo minimum guaranteed values apply source file two special interest 14-character limit addresses old filesystems could represent filenames longer filesystems generally obsolete limits documented late 1980s unreviewed since 32,767 limit positive values signed two complement 16-bit value terminfo entry may use negative numbers represent cancelled absent values unlike termcap terminfo source compiled representation limits compiled representation unspecified however implementations note documentation tic terminal information compiler compiled entries exceed 4,096 bytes size | [
6213,
9067,
8975,
2995,
2804,
2901,
7188,
1594,
9054
] | Test |
8,985 | 3 | Microsoft_Diagnostics:microsoft diagnostics msd microsoft diagnostics software tool developed microsoft assist diagnostics 1990s-era computers users primarily deployed tool provide detailed technical information user software hardware print gathered information usually use support technicians troubleshooting resolving problems assumptions made program valid late 1990s handle plug-and-play usb new technologies appeared around 2000 pc dos 6.1 codice_1 provides similar functionality commercial alternatives include manifest codice_2 quarterdeck qemm codice_3 first shipped microsoft word windows later included windows 3 ms-dos 6 windows 9x cd-roms os/2 windows nt contain code forked dos dos 5 level versions codice_3 included correspond era i.e version 2.0 windows nt 3 4 codice_5 program similar features however dos/windows specific functions replaced similar windows nt concerns codice_6 included resource kits provides print functionality codice_3 codice_5 since nt 5 windows 2000 codice_9 loader codice_10 users generally started program dos command prompt using command codice_11 starting program dos window either windows os/2 shows dos details allocated dos session machine general aspects system codice_3 provided technical information microsoft replaced codice_3 codice_10 similar features targets recent machines first appeared ms-word later distributed plus windows 95 windows 98. codice_10 windows xp stores system history wmi xml files codice_16 interest backward compatibility codice_5 became loader codice_18 | [
11270,
5643,
4624,
537,
540,
3102,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9874,
10900,
... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.