node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
9,086
4
Blancco:blancco blancco ltd. international data security company specializes data erasure computer reuse corporations governments computer remarketing companies founded headquartered joensuu finland company operates offices across europe north america middle east russia asia australasia blancco wholly owned subsidiary regenersis strategic outsourcing company consumer technology companies 1997 janne tervo kim väisänen co-founded carelian innovation ltd company ’ first data erasure product blancco data cleaner released 1999 2000 carelian innovations ltd. changed name blancco ltd. sun microsystems blancco formed partnership 2007 deliver secure flexible data erasure solutions 2007 blancco approved included nato information assurance product catalogue niapc company expanded product line 2008 introduction blancco 4.5 client series added server support data center edition enables safe reuse hard drives mass storage environments clients sun hp emc need deep data expunging company released blancco mobile smartphone erasure 2012 2011 blancco lun launched 2012 blancco 5 management console 3 released company also acquired dban 2012 received common criteria certification year blancco acquired regenersis april 2014 blancco ’ data wipe products scale single reusable pc erasure tool software erasure requirements mass storage environments data centers various versions support erasure different hardware configurations blancco ’ security certificates approvals include common criteria iso 15408 communications electronics security group united kingdom information technology group cesg nato listed nato information assurance product catalogue
[ 9665, 1475, 3972, 8997, 2534, 5384, 7369, 8074, 8904, 11368, 1873, 7090, 10195, 4408, 9499, 6494, 831 ]
Test
9,087
4
Asprox_botnet:asprox botnet asprox botnet network hacking tool used gain access ipv4 address network attacks microsoft windows mac e-mails untrusted websites social networking websites block fresh installation software compromise devices like computers printers ipads phones tablets playstation infection removed anti-virus like norton mcafee avast avg webroot etc network firewall lock programming tool security remove infection prevent network contamination future well since discovery 2008 asprox botnet involved multiple high-profile attacks various websites order spread malware botnet consists roughly 15,000 infected computers may 2008 although size botnet highly variable controllers botnet known deliberately shrink later regrow botnet order prevent aggressive countermeasures community botnet propagates somewhat unusual way actively searches infects vulnerable websites running active server pages finds potential target botnet performs sql injections website inserting iframe redirects user visiting site site hosting malware botnet usually attacks waves goal wave infect many websites possible thus achieving highest possible spread rate wave completed botnet lay dormant extended amount time likely prevent aggressive counterreactions security community initial wave took place july 2008 infected estimated 1,000 2,000 pages additional wave took place october 2009 infecting unknown number websites another wave took place june 2010 increasing estimated total number infected domains 2,000 estimated 10,000 13,000 within day infection targets asprox botnet randomly determined google searches high-profile websites infected past infections received individual coverage
[ 3072, 899, 10756, 3724, 3347, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 10297, 3643, 7739, 7996, 11583, 9664, 9154, 8133, 10952, 81, 4945, 8789, 10457, 7515, 988, 3807, 8032, 3941, 10477, 4462, 2041, 10875, 3581, 5886 ]
Test
9,088
4
Michigan_Cyber_Range:michigan cyber range michigan cyber range established merit network summer 2012 teach cybersecurity certification courses provide cybersecurity-related services merit network staffs operates michigan cyber range ann arbor michigan range infrastructure contains virtual servers placed merit fiber-optic network michigan cyber range currently four physical locations michigan campuses eastern michigan university ypsilanti michigan ferris state university big rapids northern michigan university marquette 110th attack wing facility battle creek expansion plans could involve many 10 sites michigan cyber range foundational piece michigan governor rick snyder cyber initiative launched october 2011 improve cybersecurity efforts protect families communities businesses government merit network ceo president welch professor helped create united states military academy cybersecurity program worked david behen state brigadier general mike stone michigan national guard create vision cyber range secure start-up funding throughout 2012 public private organizations pledged funds michigan cyber range created staffed william j joe adams joined merit network june 2012 executive director research michigan cyber range adams career signal corps officer u.s. army formerly cio national defense university adams also served professor research scientist west point network engineer supreme headquarters allied powers europe shortly hiring adams assembled staff create maintain michigan cyber range cybersecurity training environment called alphaville alphaville virtual environment simulates computer systems town hall library small company police station power company organizations companies practice detection mitigation cybersecurity threats using alphaville environment november 9 2012 michigan governor snyder participated ribbon-cutting ceremony michigan cyber range michigan cyber range partners include merit network u.s. department homeland security u.s. department energy national institute standards technology dte energy consumers energy plante moran pllc juniper networks eastern michigan university michigan state police michigan department military veterans affairs michigan economic development corporation michigan department technology management budget january 2013 michigan cyber range began collaboration arrangement mile2 developer provider vendor neutral professional certifications cybersecurity industry mile2 provides course materials instructors certification exams michigan cyber range range offers full curriculum training courses many cybersecurity disciplines mile2 recognized u.s. national security agency nsa information assurance ia courseware institution company nsa cnss-accredited well nist niccs-mapped organizations businesses use michigan cyber range conduct cybersecurity exercises simulate various kinds cyberattacks july 24 2013 members west michigan cyber security consortium wmcsc participated red team–blue team exercise wmcsc team members defended resources virtual town cyber attacks initiated michigan cyber range staff michigan cyber range members west michigan cyber security consortium wmcsc members michigan cyber civilian corps mic3 joined forces second red vs. blue team exercise campus davenport university july 23 2014 september 2013 merit network introduced new cybersecurity service called merit secure sandbox uses infrastructure michigan cyber range organizations use service cybersecurity exercises educational purposes software testing march 25 2014 michigan cyber range opened first cybersecurity hub kind u.s. national guard base dedicating facility located 110th attack wing battle creek michigan michigan governor rick snyder attended ribbon-cutting ceremony event teams battle creek participated cybersecurity exercises similar teams united states military academy west point california national guard october 15 2014 consumers energy dte energy conducted incident response exercise using michigan cyber range representatives two power companies michigan state police worked closely cyber range staff create exercise called power phoenix required participants diagnose mitigate malware-compromised computer network scada environment early 2015 wayne county community college district wcccd conjunction michigan cyber range mile2 hosted groundbreaking veteran retraining program 13-week program prepared group military veterans career cybersecurity 17 students participated retraining program veterans selected based experience aptitude conjunction wayne county ’ veterans affairs office 2016 michigan cyber range added new publicly-accessible hubs southeast michigan location provides certification courses cybersecurity training exercises product hardening/testing direct connection michigan cyber range cyber range hubs opened inside velocity center macomb-oakland university sterling heights march 18th pinckney community high school december 7th fall 2016 merit network michigan governor rick snyder launched governor high school cyber challenge competition high school students test skills computer science information technology cybersecurity final round challenge happened north american international cyber summit hosted governor snyder october 17 2016 three-person team clinton high school crowned champions competition defeating 28 teams inaugural event michigan cyber range provided challenges infrastructure annual cyber competition michigan cyber range twice named north american authorized training center atc year mile2 2017 michigan cyber range doubled participation governor ’ high school cyber challenge 292 high school students 584 included successful elicitation participation native american tribal areas michigan another milestone addition cyber range hubs florida georgia continuing commitment since 2015 cyber range provides exercises support infrastructure us cyber challenge national cyber competition sponsored department homeland security milestones include creation virtual environments facilitate cybersecurity involvement kinetic training exercises creation international cyber exercise ice promote collaboration partnership states ’ national guard units countries participating state partnership program spp successful launch regional cybersecurity education collaboration partnership state michigan cisco ice event 2017 run naics – 12 states 10 countries participated
[ 7528, 7887, 6834, 6645, 11097, 316 ]
None
9,089
4
Packet_Storm:packet storm packet storm security popular information security website offering current historical computer security tools exploits security advisories operated group security enthusiasts publish new security information offer tools educational testing purposes site originally created ken williams sold 1999 kroll o'gara year later given back security community kroll o'gara packet storm awarded mixter 10,000 whitepaper contest dedicated mitigation distributed denial service attacks today offer suite consulting services site referenced hundreds books 2013 packet storm launched bug bounty program buy working exploits would given back community testing purposes later year worked security researcher help expose large scale shadow profile issue popular internet site facebook facebook claimed 6 million people affected additional testing packet storm exposed numbers accurately reported
[ 2409, 6473, 5003, 3473, 2007, 2558, 735 ]
None
9,090
3
UltraSPARC_T2:ultrasparc t2 sun microsystems ultrasparc t2 microprocessor multithreading multi-core cpu member sparc family successor ultrasparc t1 chip sometimes referred codename niagara 2 sun started selling servers t2 processor october 2007 t2 commodity derivative ultrasparc series microprocessors targeting internet workloads computers storage networking devices processor manufactured 65 nm available eight cpu cores core able handle eight threads concurrently thus processor capable processing 64 concurrent threads new features include 8 stages integer operations instead 6 t1 t2 processor found following products sun fujitsu computer systems sun also licensed t2 processor themis computer introduced first non-sun t2-based servers 2008 april 2008 sun released servers based ultrasparc t2 plus processor smp capable version ultrasparc t2 sun released ultrasparc t2 plus processor following changes ultrasparc t2 plus processors found following products sun fujitsu computer systems two-way smp servers four-way smp server high performance computing virtual laboratory canada built compute cluster using 78 sun sparc enterprise t5140 servers two 1.2 ghz t2 plus chips t5140 server cluster close 10,000 compute threads making ideal high-throughput workloads like t1 t2 supports hyper-privileged execution mode sparc hypervisor runs mode partition t2 system 64 logical domains two-way smp t2 plus system 128 logical domains run independent operating system instance ultrasparc t2 offers variety performance improvements former ultrasparc t1 processor ultrasparc t2 performance related tunings documented oracle engineers blogs peak power consumption go high 123 watts t2 typically consumes 95 watts nominal system operation 72 watts t1 sun explains due higher degree system integration onto chip april 12 2006 sun announced tape-out ultrasparc t2 sun announced t2 release 7 august 2007 billing world fastest microprocessor april 9 2008 sun announced ultrasparc t2 plus december 11 2007 sun made ultrasparc t2 processor design publicly available gnu general public license via opensparc project release includes
[ 5378, 9090, 9731, 1801, 4235, 1809, 4241, 7702, 1818, 8863, 10789, 1707, 2731, 10926, 3247, 9137, 6322, 10675, 1461, 4664, 4285, 6464, 7104, 9665, 8644, 3911, 2895, 3919, 4561, 597, 1115, 731, 2269, 6107, 9569, 9955, 7270, 11626, 7022, 10...
Test
9,091
3
PSX_(digital_video_recorder):psx digital video recorder psx sony digital video recorder fully integrated playstation 2 video game console released japan december 13 2003 since designed general-purpose consumer video device marketed main sony corporation instead sony computer entertainment carry usual playstation branding high cost resulted poor sales meaning psx never released outside japan making commercial failure device fully functional digital video recorder included infrared remote control s-video composite video rf inputs able tune analog vhf catv also linked playstation portable transfer photos videos music via usb ports features software non-linear video editing image editing audio editing dvd+r support introduced future update first device use sony xrossmediabar xmb graphical user interface later used playstation portable playstation 3 2008-era bravia tvs psx fully supports playstation playstation 2 software slot-loading dvd drive onboard ee+gs chip unification ps2 emotion engine graphics synthesizer chips online game compatibility available using broadband connection games use ps2 hdd final fantasy xi supported well psx supplied game controllers two controller ports back device psx compatible standard ps/ps2 controllers memory cards exception pocketstation variant dualshock 2 controller marketed specifically psx also sold featured 4-meter long cord bit longer standard versions controller two playstation memory card ports front psx behind panel cover different placement memory card slots located controller ports standard ps2 consoles psx incompatible playstation multitap ps2 counterpart psx-compatible multitap ever produced games require use two usb ports also incompatible psx like standard ps2 consoles psx laid horizontally stood vertically psx released eight retail configurations lifespan 5000 series embossed logo top grey stripe back shipped 160 gb hard disk drives 7000 series colored logo top black stripe back contained 250 gb drives software updates made available disc download 7500/7700 models added ghost reduction tuner inclusion bs uhf/vhf connectors varied model final revision series supported playstation portable video export via memory stick revisions console support psp games compatible umd discs models two sets indicator lights power lights infrared receivers one along front horizontal orientation second strip along top-back vertical orientation 'disk rec indicator front device later models known ps1 first playstation console came known colloquially provisional codename psx adopted echo msx home computer standard sold sony companies throughout 1980s cause confusion device referred psx initially displayed ceatec white silver yellow red blue white variant released commercially limited edition silver model made available 2004
[ 10368, 4098, 643, 3077, 11398, 10761, 6799, 921, 9508, 6311, 9512, 684, 9006, 7983, 306, 1587, 1091, 9543, 10056, 6732, 10316, 6738, 8917, 6873, 859, 4060, 607, 359, 5736, 8937, 7916, 1776, 3824, 5746, 7028, 7801, 8316, 6781 ]
Validation
9,092
3
Zen_(microarchitecture):zen microarchitecture zen codename computer processor microarchitecture amd first used ryzen series cpus february 2017 first zen-based preview system demonstrated e3 2016 first substantially detailed event hosted block away intel developer forum 2016 first zen-based cpus codenamed summit ridge reached market early march 2017 zen-derived epyc server processors launched june 2017 zen-based apus arrived november 2017 zen clean sheet design differs long-standing bulldozer architecture zen-based processors use 14 nm finfet process reportedly energy efficient execute significantly instructions per cycle smt introduced allowing core run two threads cache system also redesigned making l1 cache write-back zen processors use three different sockets desktop mobile ryzen chips use am4 socket bringing ddr4 support high-end desktop zen-based threadripper chips support quad-channel ddr4 ram offer 64 pcie 3.0 lanes vs 24 lanes using tr4 socket epyc server processors offer 128 pci 3.0 lanes octal-channel ddr4 using sp3 socket socket am4 cpus based zen microarchitecture 7th gen apus athlon x4s based excavator microarchitecture zen based soc design memory pcie sata usb controllers incorporated chip processor cores advantages bandwidth power expense chip complexity die area soc design allows zen microarchitecture scale laptops small-form factor mini pcs high-end desktops servers according amd main focus zen increasing per-core performance new improved features include zen architecture built 14 nanometer finfet process subcontracted globalfoundries turn licenses 14nm process samsung electronics gives greater efficiency 32 nm 28 nm processes previous amd fx cpus amd apus respectively summit ridge zen family cpus use am4 socket feature ddr4 support 95 w tdp thermal design power newer roadmaps n't confirm tdp desktop products suggest range low-power mobile products two zen cores 5 15 w 15 35 w performance-oriented mobile products four zen cores zen core decode four instructions per clock cycle includes micro-op cache feeds two schedulers one integer floating point segments core two address generation units four integer units four floating point units two floating point units adders two multiply-adders however using multiply-add-operations may prevent simultaneous add operation one adder units also improvements branch predictor l1 cache size 64 kib instructions per core 32 kib data per core l2 cache size 512 kib per core l3 1–2 mb per core l3 caches offer 5× bandwidth previous amd designs amd began planning zen microarchitecture shortly re-hiring jim keller august 2012 amd formally revealed zen 2015 team charge zen led keller left september 2015 3-year tenure amd senior fellow chief architect michael clark zen originally planned 2017 following arm64-based k12 sister core amd 2015 financial analyst day revealed k12 delayed favor zen design allow enter market within 2016 timeframe release first zen-based processors expected october 2016 november 2015 source inside amd reported zen microprocessors tested met expectations significant bottlenecks found december 2015 rumored samsung may contracted fabricator amd 14 nm finfet processors including zen amd then-upcoming polaris gpu architecture clarified amd july 2016 announcement products successfully produced samsung 14 nm finfet process amd stated samsung would used needed arguing would reduce risk amd decreasing dependence one foundry processors based zen use 14 nm finfet silicon processors reportedly produced globalfoundries tsmc prior zen amd smallest process size 28 nm utilized steamroller excavator microarchitectures immediate competition intel skylake kaby lake microarchitecture also fabricated 14 nm finfet though intel planned begin release 10 nm parts later 2017 comparison intel 14 nm finfet amd claimed february 2017 zen cores would 10 smaller intel later announced july 2018 10nm mainstream processors expected second half 2019 identical designs die shrinks would use less current power frequency voltage cpus usually power limited typically ~125w ~45w mobile smaller transistors allow either lower power frequency higher frequency power one zen major goals 2016 focus performance per-core targeting 40 improvement instructions per cycle ipc predecessor excavator comparison offered 4–15 improvement previous architectures amd announced final zen microarchitecture actually achieved 52 improvement ipc excavator inclusion smt also allows core process two threads increasing processing throughput better use available resources zen processors also employ sensors across chip dynamically scale frequency voltage allows maximum frequency dynamically automatically defined processor based upon available cooling amd demonstrated 8-core/16-thread zen processor outperforming equally-clocked intel broadwell-e processor blender rendering handbrake benchmarks zen supports avx2 requires two clock cycles complete avx2 instruction compared intel one zen supports ddr4 memory eight channels ecc pre-release reports stated apus using zen architecture would also support high bandwidth memory hbm however first demonstrated apu use hbm previous apus amd relied shared memory gpu cpu processors built 14 nm node finfet silicon show reduced power consumption therefore heat 28 nm 32 nm non-finfet predecessors equivalent designs computationally powerful equivalent heat output/power consumption zen also uses clock gating reducing frequency underutilized portions core save power comes frome amd sensemi technology using sensors across chip dynamically scale frequency voltage zen added support amd secure memory encryption sme amd secure encrypted virtualization sev secure memory encryption real-time memory encryption done per page table entry encryption occurs hardware aes engine keys managed onboard security processor arm cortex-a5 boot time encrypt page allowing ddr4 memory including non-volatile varieties encrypted amd sme also makes contents memory resistant memory snooping cold boot attacks secure encrypted virtualization sev feature allows memory contents virtual machine vm transparently encrypted key unique guest vm memory controller contains high-performance encryption engine programmed multiple keys use different vms system programming management keys handled amd secure processor firmware exposes api tasks incorporating much southbridge soc zen cpu includes sata usb pci express nvme links augmented available socket am4 chipsets add connectivity options including additional sata usb connections support amd crossfire nvidia sli amd announcing radeon instinct line argued upcoming zen-based naples server cpu would particularly suited building deep learning systems 128 pcie lanes per naples cpu allows eight instinct cards connect pcie x16 single cpu compares favorably intel xeon line 40 pcie lanes zen architecture used current-generation desktop ryzen cpus also epyc server processors successor opteron processors apus first desktop processors without graphics processing units codenamed summit ridge initially expected start selling end 2016 according amd roadmap first mobile desktop processors amd accelerated processing unit type codenamed raven ridge following late 2017 amd officially delayed zen q1 2017 august 2016 early demonstration architecture showed 8-core/16-thread engineering sample cpu 3.0 ghz december 2016 amd officially announced desktop cpu line ryzen brand release q1 2017 also confirmed server processors would released q2 2017 mobile apus h2 2017 march 2 2017 amd officially launched first zen architecture-based octacore ryzen desktop cpus final clock speeds tdps 3 cpus released q1 2017 demonstrated significant performance-per-watt benefits previous k15h piledriver architecture octacore ryzen desktop cpus demonstrated performance-per-watt comparable intel broadwell octacore cpus march 2017 amd also demonstrated engineering sample server cpu based zen architecture cpu codenamed naples configured dual-socket server platform cpu 32 cores/64 threads first generation ryzen processors ryzen 1000 series ryzen apus identified either g ge suffix name february 2018 amd announced v1000 series embedded zen+vega apus four skus amd announced march 2017 would release server platform based zen codenamed naples second quarter year platform include 1- 2-socket systems cpus multi-processor configurations communicate via amd infinity fabric chip supports eight channels memory 128 pcie 3.0 lanes 64 lanes used cpu-to-cpu communication infinity fabric installed dual-processor configuration amd officially revealed naples brand name epyc may 2017 june 20 2017 amd officially released epyc 7000 series cpus launch event austin texas february 2018 amd also announced epyc 3000 series embedded zen cpus
[ 3586, 8322, 5380, 9475, 6151, 8327, 3337, 10375, 5645, 398, 5649, 6033, 9369, 8090, 7963, 9500, 2719, 9122, 2339, 5541, 11047, 2088, 1322, 2094, 11183, 1329, 6705, 7218, 7858, 1461, 10675, 1463, 9400, 1085, 833, 6978, 7234, 9541, 11080, 2...
None
9,093
3
Mappy:mappy player guides mappy police mouse mansion cats called meowkies mewkies japan retrieve stolen goods player uses left-right joystick move mappy single button operate doors mansion six floors hallways four five versions stolen items stashed mappy cats move floors bouncing trampolines various places house mappy cats land floor way way mappy passes cats air mappy unharmed mappy runs cat anywhere else lose life trampolines break mappy bounces four times row trampolines change color depending many times mappy used without rest addition meowkies boss cat goro nyamco japanese also roams around faster less aggressive meowkies throughout levels goro hides behind different recoverable objects mappy recovers item goro hiding behind player receives 1000 points addition score item current world record score set may 12 2019 marc holliday marc holliday scored 3,423,470 points beating previous record 2,313,890 held mike kasper opening closing doors important feature game doors open towards doorknobs opening door cat near score 50 points stun cat knocking meowkie goro backwards meowkies open doors go open ones goro open door opens away blue doors opened blast slow moving microwave direction doorknob trap cats touches remove board wave reaches edge screen cats caught points gained goro trapped wave score doubled cats removed way return shortly round completed loot retrieved player takes longer usual clear round hurry message appears music speeds cats move quickly aggressively meowkies added two appear ready drop meowkies normally immediately following hurry message meowkies arrive later player takes much longer green disc goro face named gosenzo coin drop onto top-middle platform chase mappy effectively meowkies kill jumping gosenzo open doors stopped microwave doors objects third round every fourth round bonus round mappy unbothered cats must bounce across series trampolines popping fifteen different suspended red balloons 200 pts goro 2000 points along way bonus 5000 pts awarded balloons popped music ends every bonus round new feature added gameplay bells freeze cats hurry message also appear sooner 256 levels japan-only port game initially released famicom japanese version nes msx 1984 followed later port sega game gear 1991 followed video game console-only sequel called mappy-land 1986 released united states taxan 1998 re-released part microsoft revenge arcade pc mappy also several japan-only sequels including hopping mappy 1986 arcades mappy kids 1989 famicom also version called mappy arrangement released 1995 part namco classic collection vol 1 1995 arcades famicom version original mappy re-released japan part famicom mini series 2004 mappy included ms. pac-man collection manufactured jakks pacific also featured 1996 game boy compilation namco gallery vol 1 later released xbox gamecube pc playstation 2 2005 appear game boy advance version also appears namco museum ds mappy also re-released part pac-man arcade party arcade machine 2010 mappy playable playstation portable version namco museum battle collection mappy included dot-s set also one first arcade titles released virtual console 2002 released japan pachinko title mappy park 2003 two mobile games released japan titles 2009 titled september 2011 new mobile game titled bandai namco games bringing back series titled ios 2015 japan part bandai namco shiftylook initiative animated mappy web series titled mappy beat announced 2012 series written directed scott kurtz kris straub also performed character voices presented using limited animation style blamimations series story follows mappy working thankless job security guard former foe goro company nyamco accompanied friends fellow nyamco employees laid-back digging-obsessed dig dug dim good-natured sky kid along bandai namco characters working office mappy beat premiered shiftylook youtube channel july 22 2013 ran 13 episodes roughly eight minutes length final episode released january 20 2014 kurtz also made guest appearance mappy concurrent bravoman animated series bravoman turn appearing final story arc mappy portrayed guest voice dax gordine following closure shiftylook channel removed youtube making episodes longer available
[ 1060, 9081, 2540, 10316, 9006, 10287, 1776, 10544, 10931, 6452, 5717, 8663, 4216, 5753 ]
None
9,094
7
Open_Architecture_Computing_Environment:open architecture computing environment open architecture computing environment oace specification aimed provide standards-based computing environment order decouple computing environment software applications proposed united states department defense 2004
[ 6419 ]
Test
9,095
3
Xeon_Phi:xeon phi xeon phi series x86 manycore processors designed made intel intended use supercomputers servers high-end workstations architecture allows use standard programming languages apis openmp since originally based earlier gpu design intel shares application areas gpus main difference xeon phi gpgpu like nvidia tesla xeon phi x86-compatible core less modification run software originally targeted standard x86 cpu initially form pcie-based add-on cards second generation product codenamed knights landing announced june 2013 second generation chips could used standalone cpu rather add-in card june 2013 tianhe-2 supercomputer national supercomputer center guangzhou nscc-gz announced world fastest supercomputer used intel xeon phi coprocessors ivy bridge-ep xeon processors achieve 33.86 petaflops xeon phi product line directly competes nvidia tesla amd radeon instinct lines deep learning gpgpu cards larrabee microarchitecture development since 2006 introduced wide 512-bit simd units x86 architecture based processor design extended cache-coherent multiprocessor system connected via ring bus memory core capable four-way multithreading due design intended gpu well general purpose computing larrabee chips also included specialised hardware texture sampling project produce retail gpu product directly larrabee research project terminated may 2010 another contemporary intel research project implementing x86 architecture many-multicore processor 'single-chip cloud computer prototype introduced 2009 design mimicking cloud computing computer datacentre single chip multiple independent cores prototype design included 48 cores per chip hardware support selective frequency voltage control cores maximize energy efficiency incorporated mesh network inter-chip messaging design lacked cache-coherent cores focused principles would allow design scale many cores teraflops research chip prototype unveiled 2007 experimental 80-core chip two floating point units per core implementing 96-bit vliw architecture instead x86 architecture project investigated intercore communication methods per-chip power management achieved 1.01 tflops 3.16 ghz consuming 62 w power intel many integrated core mic prototype board named knights ferry incorporating processor codenamed aubrey isle announced 31 may 2010 product stated derivative larrabee project intel research including single-chip cloud computer development product offered pcie card 32 in-order cores 1.2 ghz four threads per core 2 gb gddr5 memory 8 mb coherent l2 cache 256 kb per core 32 kb l1 cache power requirement ~300 w built 45 nm process aubrey isle core 1,024-bit ring bus 512-bit bi-directional connects processors main memory single board performance exceeded 750 gflops prototype boards support single precision floating point instructions initial developers included cern korea institute science technology information kisti leibniz supercomputing centre hardware vendors prototype boards included ibm sgi hp dell others knights corner product line made 22 nm process size using intel tri-gate technology 50 cores per chip intel first many-cores commercial product june 2011 sgi announced partnership intel use mic architecture high performance computing products september 2011 announced texas advanced computing center tacc use knights corner cards 10 petaflops stampede supercomputer providing 8 petaflops compute power according stampede comprehensive petascale computing environment second generation intel knights landing mics added become available increasing stampede aggregate peak performance least 15 petaflops 15 november 2011 intel showed early silicon version knights corner processor 5 june 2012 intel released open source software documentation regarding knights corner 18 june 2012 intel announced 2012 hamburg international supercomputing conference xeon phi brand name used products based many integrated core architecture june 2012 cray announced would offering 22 nm 'knight corner chips branded 'xeon phi co-processor 'cascade systems june 2012 scalemp announced virtualization update allowing xeon phi transparent processor extension allowing legacy mmx/sse code run without code changes important component intel xeon phi coprocessor core vector processing unit vpu vpu features novel 512-bit simd instruction set officially known intel initial many core instructions intel imci thus vpu execute 16 single-precision sp 8 double-precision dp operations per cycle vpu also supports fused multiply-add fma instructions hence execute 32 sp 16 dp floating point operations per cycle also provides support integers vpu also features extended math unit emu execute operations reciprocal square root logarithm thereby allowing operations executed vector fashion high bandwidth emu operates calculating polynomial approximations functions 12 november 2012 intel announced two xeon phi coprocessor families using 22 nm process size xeon phi 3100 xeon phi 5110p xeon phi 3100 capable 1 teraflops double precision floating point instructions 240 gbit/s memory bandwidth 300 w. xeon phi 5110p capable 1.01 teraflops double precision floating point instructions 320 gbit/s memory bandwidth 225 w. xeon phi 7120p capable 1.2 teraflops double precision floating point instructions 352 gbit/s memory bandwidth 300 w. 17 june 2013 tianhe-2 supercomputer announced top500 world fastest tianhe-2 used intel ivy bridge xeon xeon phi processors achieve 33.86 petaflops fastest list two half years lastly november 2015 cores knights corner based modified version p54c design used original pentium basis intel mic architecture leverage x86 legacy creating x86-compatible multiprocessor architecture use existing parallelization software tools programming tools include openmp opencl cilk/cilk plus specialised versions intel fortran c++ math libraries design elements inherited larrabee project include x86 isa 4-way smt per core 512-bit simd units 32 kb l1 instruction cache 32 kb l1 data cache coherent l2 cache 512 kb per core ultra-wide ring bus connecting processors memory knights corner instruction set documentation available intel code name second generation mic architecture product intel intel officially first revealed details second generation intel xeon phi products 17 june 2013 intel said next generation intel mic architecture-based products available two forms coprocessor host processor cpu manufactured using intel 14 nm process technology knights landing products include integrated on-package memory significantly higher memory bandwidth knights landing contains 72 airmont atom cores four threads per core using lga 3647 socket supporting 384 gb far ddr4 2133 ram 8–16 gb stacked near 3d mcdram version hybrid memory cube core two 512-bit vector units supports avx-512 simd instructions specifically intel avx-512 foundational instructions avx-512f intel avx-512 conflict detection instructions avx-512cd intel avx-512 exponential reciprocal instructions avx-512er intel avx-512 prefetch instructions avx-512pf national energy research scientific computing center announced phase 2 newest supercomputing system cori would use knights landing xeon phi coprocessors 20 june 2016 intel launched intel xeon phi product family x200 based knights landing architecture stressing applicability traditional simulation workloads also machine learning model lineup announced launch included xeon phi bootable form-factor two versions standard processors processors integrated intel omni-path architecture fabric latter denoted suffix f model number integrated fabric expected provide better latency lower cost discrete high-performance network cards 14 november 2016 48th list top500 contained 10 systems using knights landing platforms pcie based co-processor variant knight landing never offered general market discontinued august 2017 included 7220a 7240p 7220p coprocessor cards intel announced discontinuing knights landing summer 2018 models boost peak speeds adding 200 mhz base frequency running one two cores running three maximum number cores chips boost 100 mhz base frequency chips run high-avx code frequency reduced 200 mhz knights hill codename third-generation mic architecture intel announced first details sc14 manufactured 10 nm process knights hill expected used united states department energy aurora supercomputer deployed argonne national laboratory however aurora delayed favor using advanced architecture focus machine learning 2017 intel announced knights hill canceled favor another architecture built ground enable exascale computing future new architecture expected 2020–2021 terms exascale computing high performance computing hpc got meanwhile linked intel towards term omni-path architecture opa publications knights mill intel codename xeon phi product specialized deep learning initially released december 2017 nearly identical specifications knights landing knights mill includes optimizations better utilization avx-512 instructions enables 4-way hyperthreading single-precision variable-precision floating-point performance increased expense double-precision floating-point performance empirical performance programmability study performed researchers authors claim achieving high performance xeon phi still needs help programmers merely relying compilers traditional programming models still far reality however research various domains life sciences deep learning computer-aided engineering demonstrated exploiting thread- simd-parallelism xeon phi achieves significant speed-ups
[ 3459, 5380, 2821, 3973, 8325, 7432, 5386, 9611, 4108, 9741, 4622, 5649, 10641, 5523, 6804, 7699, 4886, 8851, 3352, 9111, 6818, 10021, 6311, 10669, 9391, 8624, 7218, 10675, 4276, 1461, 10548, 9911, 7097, 2237, 5309, 8125, 8126, 833, 6339, ...
Test
9,096
4
Self-XSS:self-xss self-xss social engineering attack used gain control victims web accounts self-xss attack victim attack unknowingly runs malicious code web browser thus exposing attacker self-xss operates tricking users copying pasting malicious content browsers web developer console usually attacker posts message says copying running certain code user able hack another user account fact code allows attacker hijack victim account past similar attack took place users tricked pasting malicious javascript address bar browser vendors stopped preventing easily running javascript address bar attackers started using self-xss current form web browser vendors web sites taken steps mitigate attack mozilla firefox google chrome begun implementing safeguards warn users self-xss attacks facebook google+ others display warning message users open web developer console link pages explaining attack detail self part name comes fact user attacking themself xss part name comes abbreviation cross-site scripting attacks result malicious code running legitimate site however attacks n't much else common xss attack website users protect fixed site operator making site secure whereas self-xss social engineering attack user savvy users protect site operator anything
[ 4198, 3462, 9055 ]
Train
9,097
8
Adobe_Atmosphere:adobe atmosphere adobe atmosphere informally abbreviated atmo software platform interacting 3d computer graphics 3d models created commercial program could explored socially using browser plugin available free charge atmosphere originally developed attitude software 3d anarchy later bought adobe systems product spent majority lifetime beta testing adobe released last version atmosphere version 1.0 build 216 february 2004 discontinued software december year atmosphere focused explorable worlds later officially called environments linked together portals analogous world wide web hyperlinks portals represented spinning squares red green blue revolved around floated ground portals indicative atmosphere team desire mirror functionality web pages although world described codice_1 codice_2 file images sounds kept separately usually gif wav mp3 format objects worlds scriptable using specialized dialect javascript allowing immersive environment worlds could generated dynamically using php using javascript world author could link object web page user could example launch web page clicking billboard advertisement ctrl+shift+click earlier versions version 1.0 atmosphere also boasted support using macromedia flash animations windows media video textures atmosphere-based worlds consisted mainly parametric primitives floors walls cones primitives could painted solid color given image-based texture made subtractive invisible subtractive primitives could used cut holes primitives build complex shapes many worlds also contained animated polygon meshes made possible atmosphere implementation subcomponent viewpoint corporation viewpoint media player however viewpoint stopped supporting atmosphere subcomponent time atmosphere discontinued unlike centralized structure active worlds environments primarily built within alphaworld atmosphere worlds spread throughout internet usually hosted author web site codice_1 files binary ascii versions codice_1 file format though ascii format phased later releases codice_1 files could generated dynamically using server-side content management systems demonstrated atmoworlds.com worlds directory users represented worlds avatars later builds option allowed user see avatar early quirk atmosphere displayed users whose avatars yet loaded colorful slanted cylinders announced arrival users bug zapper sound whereas activeworlds possible communicate users within 200-meter radius atmosphere users could chat users world model appropriate atmosphere considering smaller sizes worlds technically users could chat anyone yacp channel reference irc protocol see exception worlds would receive many visitors often case homeworld worlds would clone creating duplicate channels world would often cause confusion users. ref name= patent 9/788526 /ref world developers wrote scripts limited communication users within certain distance greater realism built-in havok physics engine detailed rendering dynamic lighting support lighting effects like radiosity distance fog glare also contributed realism atmosphere worlds many world authors wanted create large worlds order build realistic cities example worlds would often take excessive amount time load visitor web browser especially visitor using slower dial-up connection alleviate issue atmosphere supported pattern reminiscent inline frames html sections world – subworlds models – would load user neared city could load block block rather one atmosphere problems however excessive memory usage exacerbated use advanced features embedded models flash movies many worlds atmosphere chat console used windows-1252 character encoding inception adobe photoshop album included 3d gallery feature could publish photo album atmosphere world adobe atmosphere began 3d anarchy attitude software originally relied irc chat functionality original user interface rather eccentric featuring two ever-present eyeballs would occasionally blink later versions adopted conventional interface although one pre-supplied avatars based eyes adobe bought technology attitude november 1999 announced first public beta version new name march 26 2001 atmosphere came two stand-alone applications builder used build online worlds player allowed users explore worlds 3d anarchy components called editor chat respectively addition applications adobe provided browser plugin explore worlds within web browser companion chat server called adobe community server ran irc-like protocol known yet another chat protocol yacp beta-testing three components atmosphere available free charge adobe distributed server software atmosphere open source license permissive open source license beta versions builder notoriously unstable program crashed frequently user wrote program automatically saved worlds opened builder fixed interval preventing users losing hours work august 2002 adobe began scrap stand-alone player instead devoting resources develop atmosphere plugin time viewed buggy less attractive alternative player company focus plugin viewed attempt compete flash developer macromedia purchased adobe part plugin ran internet explorer windows despite frequent requests community members expand atmosphere support mozilla-based browsers linux mac os unofficially plugin ran mozilla-based browsers limited functionality one user able run stand-alone player linux using wine albeit less-than-usable state part efforts garner commercial interest software adobe introduced support embedding atmosphere worlds pdf documents viewing acrobat reader company also distanced atmosphere reputation platform online chat first disabling chat various official adobe-hosted worlds deleting worlds version 1.0 released october 22 2003 point adobe decided charge builder simply renamed atmosphere continue provide plugin server free beta-testing program ended adobe sent free copies builder registered beta-testers late 2003 early 2004 via airborne express dhl following long period relative silence developers adobe announced december 2004 would continue development software according faq adobe adobe retains copyright atmosphere give permission others distribute copies software company decision stop making builder available purchase essentially halted creation new worlds plugin remains available free download adobe ftp site however adobe still provides 3d capabilities popular adobe acrobat product features developed using technology new zealand right hemisphere rather using atmosphere nearly atmosphere development team went work acrobat team atmosphere component still use adobe scripting api atmosphere components including scene graphs physics engine licensed companies viewpoint atmosphere dedicated beta-testing community whose members constructed many worlds avatars promoted software word mouth conducted community events world tours building contests largest contests star wars 3d large-scale effort create comprehensive set worlds avatars based star wars trilogy creations unveiled july 4 2003 festivities officially continued july 6 another large effort held themed lord rings trilogy community members also organized attended events world tours featured innovative worlds week tech talks originally weekly event intended world avatar developers initially community discussion occurred either worlds appropriate adobe user-to-user forums later supplement official atmosphere product web site discussion forums community created large number resource web sites listed beta-testers dubbed atmosphere developers zombies recognition long hours adobe employees apparently spent developing software running joke team instead typical meal brains atmosphere zombies ingested eyeballs due visual nature product beta-testing community eagerly awaited new releases development team developers invariably answered would take two weeks response became euphemism ready despite decentralized structure atmosphere popularity world-building contests atmosphere community still preferred gather worlds created adobe partner digitalspace adobe annually-revamped homeworld digitalspace atmospherians community homeworld primary starting place new users community found easier establish lively crowds adobe shut homeworld along number adobe-hosted worlds many builders made attempts emulating success homeworld starting points however without constant stream new users homeworld experienced attempts failed attract small group regulars years adobe ended support atmosphere worlds remain online though maintained fewer still continue support multi-user chat nonetheless software continues enjoy small fanbase meets online year halloween
[ 5251, 3462, 1801, 6797, 3350, 11291, 7983, 8627, 8628, 823, 5048, 3137, 7364, 8644, 1632, 225, 11237, 10097, 119, 1916, 2045 ]
Validation
9,098
7
Wireless_mesh_network:wireless mesh network wireless mesh network wmn communications network made radio nodes organized mesh topology also form wireless ad hoc network mesh refers rich interconnection among devices nodes wireless mesh networks often consist mesh clients mesh routers gateways mobility nodes less frequent nodes constantly frequently move mesh spends time updating routes delivering data wireless mesh network topology tends static routes computation converge delivery data destinations occur hence low-mobility centralized form wireless ad hoc network also sometimes relies static nodes act gateways truly all-wireless ad hoc network mesh clients often laptops cell phones wireless devices mesh routers forward traffic gateways may need connected internet coverage area radio nodes working single network sometimes called mesh cloud access mesh cloud depends radio nodes working together create radio network mesh network reliable offers redundancy one node longer operate rest nodes still communicate directly one intermediate nodes wireless mesh networks self form self heal wireless mesh networks work different wireless technologies including 802.11 802.15 802.16 cellular technologies need restricted one technology protocol see also mesh networking wireless mesh architecture first step towards providing cost effective low mobility specific coverage area wireless mesh infrastructure effect network routers minus cabling nodes built peer radio devices cabled wired port like traditional wlan access points ap mesh infrastructure carries data large distances splitting distance series short hops intermediate nodes boost signal cooperatively pass data point point b making forwarding decisions based knowledge network i.e perform routing first deriving topology network wireless mesh networks relatively stable-topology network except occasional failure nodes addition new nodes path traffic aggregated large number end users changes infrequently practically traffic infrastructure mesh network either forwarded gateway wireless ad hoc networks client mesh networks traffic flows arbitrary pairs nodes rate mobility among nodes high i.e. link breaks happen frequently wireless mesh networks start break low communication performance type infrastructure decentralized central server centrally managed central server relatively inexpensive reliable resilient node needs transmit far next node nodes act routers transmit data nearby nodes peers far away reach single hop resulting network span larger distances topology mesh network must relatively stable i.e. much mobility one node drops network due hardware failure reason neighbors quickly find another route using routing protocol mesh networks may involve either fixed mobile devices solutions diverse communication needs example difficult environments emergency situations tunnels oil rigs battlefield surveillance high-speed mobile-video applications board public transport real-time racing-car telemetry self-organizing internet access communities important possible application wireless mesh networks voip using quality service scheme wireless mesh may support routing local telephone calls mesh applications wireless mesh networks similar wireless ad hoc networks current applications principle similar way packets travel around wired internet—data hops one device another eventually reaches destination dynamic routing algorithms implemented device allow happen implement dynamic routing protocols device needs communicate routing information devices network device determines data receives – either pass next device keep depending protocol routing algorithm used attempt always ensure data takes appropriate fastest route destination multi-radio mesh refers different radios operating different frequencies interconnect nodes mesh means unique frequency used wireless hop thus dedicated csma collision domain radio bands communication throughput likely increase result available communication channels similar providing dual multiple radio paths transmit receive data one often cited papers wireless mesh networks identified following areas open research problems 2005 70 competing schemes routing packets across mesh networks include ieee developed set standards title 802.11s less thorough list found ad hoc routing protocol list standard autoconfiguration protocols dhcp ipv6 stateless autoconfiguration may used mesh networks mesh network specific autoconfiguration protocols include
[ 11267, 5382, 5132, 2829, 527, 6419, 2466, 10021, 3751, 686, 11696, 10550, 7232, 8640, 1733, 11077, 3016, 9933, 11094, 5978, 11483, 5470, 8160, 5092, 6267 ]
Test
9,099
8
Shiftboard:shiftboard shiftboard community online scheduling recruitment time management tool lets individuals groups participating organizations within community collaborate participation overall staff work coverage general accountability employee scheduling software similar job board communications online forum shiftboard provides work portals used large small civic non-profit/arts charity global healthcare municipal staffing organizations shiftboard active member open source software community located seattle washington united states
[]
None
9,100
2
Apple_Icon_Image_format:apple icon image format apple icon image format icon format used apple inc. macos supports icons 16 × 16 32 × 32 48 × 48 128 × 128 256 × 256 512 × 512 1024 × 1024 pixels 1- 8-bit alpha channels multiple image states example open closed folders fixed-size icons scaled operating system displayed intermediate size file format consists 8 byte header followed number icons time format improved support compression parts pixel data 32-bit is32 il32 ih32 it32 argb ic04 ic05 pixel data often compressed per channel format similar packbits sources mentioned os supports compressed uncompressed data chunks following pseudocode decompresses data example decompress various image viewers load *.icns files free open source converters png also exist gtk+ load *.icns resources since 2007 tools supporting format include apple icon composer icns browser iconfactory iconbuilder br macos offers built-in codice_1 command line tool pack unpack *.icns files
[ 4615, 4111, 5647, 1042, 6700, 4657, 1074, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 1162, 11402, 6797, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 941...
None
9,101
2
Index_of_articles_related_to_BlackBerry_OS:index articles related blackberry os list blackberry-related topics
[ 2179, 9366, 410, 2208, 5546, 9391, 690, 1083, 9408, 2892, 3152, 3537, 2259, 4194, 487, 8044, 3949, 9964, 10619, 6271 ]
Validation
9,102
4
FastPOS:fastpos fastpos variant pos malware discovered trend micro researchers new pos malware foregrounds speed credit card data stolen sent back hackers researchers trend micro named new malware variant tspy_fastpos.smztda malware used hackers target small mid-sized businesses smbs many countries like france taiwan japan brazil hong kong united states unlike pos malware fastpos store information locally send cyber thieves periodically variant pos malware executes attack target infected websites virtual network computing vnc via file sharing service stolen data instantly transferred control command server hardcoded hacker pos malware consists two components– keylogger ram scraper logged keystrokes stored memory transmitted attacker enter key pressed stored file infected system stolen data user credentials payment information depends business procedures ram scraper devised steal credit card data memory scraper designed verify service code credit card help remove cards demands pins
[ 3072, 6786, 7044, 10245, 10756, 9356, 9233, 8978, 4863, 4883, 278, 10392, 1690, 3867, 10141, 5281, 2213, 8998, 9256, 939, 10364, 1970, 3643, 6588, 7739, 9791, 1088, 3395, 4165, 10309, 6091, 2508, 6360, 7515, 4956, 4344, 3941, 107, 877, 33...
None
9,103
9
CLIPS:clips clips public domain software tool building expert systems name acronym c language integrated production system syntax name inspired charles forgy ops5 first versions clips developed starting 1985 nasa-johnson space center alternative existing system art*inference mid-1990s development group responsibilities ceased focus expert system technology original name project nasa ai language nail clips probably widely used expert system tool clips written c extensions written c clips called c. syntax resembles programming language lisp clips incorporates complete object-oriented language writing expert systems cool combines programming paradigms procedural object oriented logical theorem proving languages clips uses forward chaining like expert system languages clips deals rules facts various facts make rule applicable applicable rule fired facts rules created first defining shown set reset command causes clips read facts rules case would lead three trouble_shooting facts asserted run command used given two facts listed rule1 asserted conditions action met additional fact asserted result run clips salience allows user assign priority weight rule descendants clips language include jess rule-based portion clips rewritten java later grew different direction fuzzyclips adds concept relevancy language
[ 9345, 8002, 6502, 8262, 5677, 2045, 3389, 6335 ]
Validation
9,104
7
Cloudreach:cloudreach cloudreach international cloud computing consultancy specialises planning implementation operational support public cloud services including amazon web services microsoft azure google cloud platform also blackstone group portfolio company company headquartered london uk offices multiple countries around world including canada france germany india netherlands united states switzerland cloudreach advisor integrator enterprises greater 1 billion revenues wish move functions public cloud environments customers include bp hearst met office skyscanner ströer time inc. cloudreach also developed two in-house systems sceptre infrastructure automation suite aws connect integration platform service ipaas whilst competitors connect mulesoft offer cloud-based integration focussed apis online services cloudreach also offers solutions focused purely integration services cloud environments cloudreach founded london 2009 pontus noren james monico three years later 2012 company opened second office edinburgh 2015 report research group fast track said cloudreach among 20 fastest-growing british technology companies february 2017 cloudreach acquired major global investor blackstone undisclosed amount noren cofounder remain ceo dave johnson senior blackstone advisor becoming chairman board directors august 2017 cloudreach acquired two us-based businesses emerging technology advisors cloud professional services company cloudamize cloud migration specialist cloudamize cloud computing analytics platform provides data analysis recommendations speed simplify cloud migration management july 2017 cloudreach announced partnership t-systems subsidiary deutsche telekom july 2018 aaron painter named new ceo cloudreach replacing co-founder pontus noren became vice chairman board directors management change comes cloudreach acquired private equity firm blackstone 2017 august 2018 cloudreach acquired relus cloud atlanta based data analytics specialist acquisition relus cloud cloudreach employs 700 people acquisition cloudreach third since investment firm blackstone bought majority stake company last year
[ 4194, 9252, 10090, 1935, 7248, 5905, 530 ]
None
9,105
3
Interrupt_storm:interrupt storm operating systems interrupt storm event processor receives inordinate number interrupts consume majority processor time interrupt storms typically caused hardware devices support interrupt rate limiting interrupt processing typically non-preemptible task time-sharing operating systems interrupt storm cause sluggish response user input even appear freeze system completely state commonly known live lock state system spending resources processing interrupts instead completing work end-user appear processing anything often output interrupt storm sometimes mistaken thrashing since similar symptoms unresponsive sluggish response user input little output common causes include misconfigured faulty hardware faulty device drivers flaws operating system metastability one components latter condition rarely occurs outside prototype amateur-built hardware modern hardware operating systems methods mitigating effect interrupt storm example ethernet controllers implement interrupt rate limiting causes controller wait programmable amount time interrupt generates present within device similar functionality usually written device driver and/or operating system common cause device behind another signals interrupt apic advanced programmable interrupt controller computer peripherals generate interrupts apic number interrupts always less typically 15 modern pc number devices os must query driver registered interrupt ask interrupt originated hardware faulty drivers may always claim yes causing os query drivers registered interrupt one interrupt processed time device originally requested interrupt therefore get interrupt serviced new interrupt generated cleared processor becomes swamped continuous interrupt signals operating system live lock interrupt storm caused fault kernel debugger usually break storm unloading faulty driver allowing driver underneath faulty one clear interrupt user input still possible drivers often implemented 3rd party operating systems also polling mode queries pending interrupts fixed intervals round-robin fashion mode set globally per-driver per-interrupt basis dynamically os detects fault condition excessive interrupt generation polling mode may enabled dynamically number interrupts resource use caused interrupt passes certain thresholds thresholds longer exceeded os may change interrupting driver interrupt interrupt handling globally interrupt mode polling mode interrupt rate limiting hardware usually negates use polling mode still happen normal operation intense i/o processor unable switch contexts quickly enough keep pace perhaps first interrupt storm occurred apollo 11 lunar descent 1969 interrupt rate limiting must carefully configured optimum results example ethernet controller interrupt rate limiting buffer packets receives network interrupt rate set low controller buffer overflow packets dropped rate must take account fast buffer may fill interrupts interrupt latency interrupt transfer buffer system hardware-based software-based approaches problem example freebsd detects interrupt storms masks problematic interrupts time response system used napi example hardware-based approach system driver starts interrupt enabled state interrupt handler disables interrupt lets thread/task handle event task polls device processing number events enabling interrupt another interesting approach using hardware support one device generates interrupt event queue state changes empty empty free dma descriptors rx fifo tail device drops event event added tail fifo entry marked occupied point entry tail−1 free cleared interrupt generated level interrupt tail pointer incremented hardware requires interrupt acknowledged cpu interrupt handler handle valid dma descriptors head return interrupt
[ 11075, 3725, 7983, 2960, 5457, 10612, 1176, 5529, 1660, 3197, 3294, 5823 ]
Test
9,106
4
PureMessage:puremessage sophos puremessage anti-spam program sophos plc aimed primarily corporate environments sophos puremessage microsoft exchange — part email security data protection — blocks spam viruses spyware phishing scanning inbound outbound internal email exchange message stores proactively protects email-borne threats prevents confidential data lost
[ 2424, 6762, 6797, 7983, 9055, 823, 1304, 3487 ]
Validation
9,107
2
Bluebottle_OS:bluebottle os bluebottle formerly known active object system aos recently a2 modular object-oriented operating system originally developed eth zurich unconventional features including automatic garbage-collected memory management zooming user interface a2 next generation native oberon x86 pc version niklaus wirth oberon operating system small fast supports multiprocessor computers provides soft real-time operation entirely written upward-compatible dialect oberon programming language called active oberon oberon active oberon members pascal family along modula-2 a2 design allows development efficient systems based active objects run directly hardware active objects represent combination traditional oops notion object combined thread executes context object active oberon implementation active object may include addition activity activity ancestor objects differences a2 mainstream operating systems extremely minimalistic design completely implemented type-safe language automatic memory management combined powerful flexible set primitives level programming language runtime system synchronisation access internal properties objects competing execution contexts kernel layer a2 provides flexible collection modules providing unified abstractions devices services file systems user interfaces network connections media codecs etc bluebottle os replaces older oberon os unique tui zooming user interface zui significantly like conventional graphical user interfaces like oberon though user interface supports point-and-click metaphor execute commands directly text similar clicking hyperlinks browser
[ 9762, 2179, 5380, 6979, 9320, 5356, 8524, 9964, 7983, 8082, 499, 5363, 8219, 6558, 7775 ]
Test
9,108
1
Data_administration:data administration data administration data resource management organizational function working areas information systems computer science plans organizes describes controls data resources data resources usually stored databases database management system software electronic spreadsheets many smaller organizations data administration performed occasionally small component database administrator ’ work context information systems development data administration ideally begins system conception ensuring data dictionary help maintain consistency avoid redundancy model database make logical usable means data modeling including database normalization techniques according data management association dama data resource management development execution architectures policies practices procedures properly manage full data lifecycle needs enterprise data resource management may thought managerial activity applies information system data management tools task managing organization ’ data resource meet company ’ business needs information provide shareholders since beginning information age businesses need types data business activity data created business transaction made need data created data new direction needed focuses managing data critical resource organization directly support business activities data resource must managed intensity formality critical resources managed organizations must emphasize information aspect information technology determine data needed support business use appropriate technology build maintain high-quality data resource provides support data resource quality measure well organization data resource supports current future business information demand organization data resource support current business information demand sacrificing future business information demand must support current future business information demand ultimate data resource quality stability across changing business needs changing technology corporate data resource must developed within single organization-wide common data architecture data architecture science method designing constructing data resource business driven based real-world objects events perceived organization implemented appropriate operating environments overall structure data resource provides consistent foundation across organizational boundaries provide easily identifiable readily available high-quality data support business information demand common data architecture formal comprehensive data architecture provides common context within data organization disposal understood integrated subject oriented meaning built data subjects represent business objects business events real world interest organization data captured maintained
[ 9112, 4155, 3004, 2901 ]
Train
9,109
2
Quick_Look:quick look quick look quick preview feature developed apple inc. introduced operating system mac os x 10.5 leopard feature announced worldwide developers conference jun 11 2007 os x finder always icon previews quick look allows users look contents file finder full near-full size depending size document relative screen resolution preview files pdfs html quicktime readable media plain text rtf text documents iwork keynote pages numbers documents odf documents microsoft office word excel powerpoint files including ooxml raw camera images quick look also opened full screen launched command line additionally multi-page documents like powerpoint slide shows navigated using slide previews side preview window quick look technology implemented throughout apple suite software starting mac os x 10.5 including ichat theater time machine finder cover flow quick look apis available developers via quick look framework ios part quartz framework mac since debut quick look included number generators common file types plug-ins added quick look allow previewing content file formats plug-ins also used add additional functionality quick look syntax highlighting source code files add plug-in quick look needs placed folder codice_1 activate plug-in either computer needs restarted quick look needs reset command multiple ways invoke quick look keyboard shortcuts command line menu quick look exploited conducting forensic examination computer contents thumbnail cache created user random subfolder codice_2 called com.apple.quicklook.thumbnailcache cache contains two files quick look thumbnails stored documents internal disks also documents located removable disks including encrypted pose significant security hole document may well number thumbnails different dimensions range large small cache reset invoking codice_3 command via terminal window
[ 4615, 5647, 1042, 6700, 4657, 1074, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 9319, 3691, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 1732, 713, 941...
Validation
9,110
3
Mr._Do's_Castle:mr. castle mr. castle arcade game released universal september 1983 asian title game mr. versus unicorns though marketed sequel original mr released one year earlier game bears far closer resemblance space panic second mr. series video games although n't intended began game called knights vs. unicorns u.s. division universal persuaded japanese arm modify graphics mr. game taking account first game popularity object mr. castle score many points possible collecting cherries defeating unicorn-like monsters game takes place castle filled platforms ladders flipped one platform another player controls mr. collects cherries using hammer knock blocks contain various platforms empty holes left knocked-out blocks serve traps monsters monster falls hole player defeat causing block monster fall top player takes long complete level monsters transform faster difficult forms occasionally multiply game advances next level cherries level collected enemies defeated player loses life mr. caught monster game ends player runs lives mr player earn extra life collecting letters word extra regular monsters changed monsters bearing extra letters collecting three keys distributed around playfield picking magic shield top floor monsters state easier defeat normal simple hammer strike job brief interval change back normal forms game also offers bonus credit collecting rare diamond appears playfield random intervals cherry blocks absent mr. vs. unicorns early revisions mr. castle instead blocks keys skulls start stage fill blocks left behind unicorns fall holes left alone time three ways complete level version versus four ways complete levels mr. castle addition early revisions fill blocks change colors every two stages mr. castle ported colecovision msx atari 2600 atari 5200 commodore 64 sharp x68000 atari commodore colecovision published parker bros. version atari 8-bit family released mr. castle followed mr. wild ride run run released 1984
[ 1776, 11373, 9006, 8151 ]
Test
9,111
3
Cascade_Lake_(microarchitecture):cascade lake microarchitecture cascade lake intel codename 14nm server enthusiast processor microarchitecture cascade lake optimization intel process-architecture-optimization model intel states first microarchitecture support 3d xpoint-based memory modules also feature deep learning boost instructions cascade lake-ap branded xeon platinum 9200 series skus soldered motherboard cpus n't support optane memory
[ 3459, 5380, 2821, 3973, 8325, 9095, 5386, 9611, 4108, 9741, 398, 5649, 7313, 5523, 6804, 8851, 4886, 3352, 9500, 5883, 2088, 10669, 9391, 10675, 4276, 1461, 10548, 2237, 5309, 8125, 8126, 833, 6339, 5444, 9541, 1998, 2638, 977, 2514, 5073...
Test
9,112
1
Database_administrator:database administrator database administrators dbas use specialized software store organize data role may include capacity planning installation configuration database design migration performance monitoring security troubleshooting well backup data recovery list skills required become database administrators database administrators benefit bachelor degree master degree computer science associate degree certificate may sufficient work experience many certifications available becoming certified database administrator try share best many certifications offered database vendors database administrator certifications may earned passing series tests sometimes requirements schools offering database administration degrees also found example database administrator responsibilities include following tasks
[ 8201, 1037, 10258, 2068, 1049, 5658, 8742, 10286, 11327, 9286, 72, 10326, 9314, 11362, 9828, 8808, 2669, 2681, 1146, 2688, 9867, 6797, 10389, 4263, 10413, 2222, 5808, 10418, 9397, 3254, 3768, 11457, 4309, 9942, 2780, 10469, 10471, 6383, 946...
Validation
9,113
4
Jericho_Forum_Commandments:jericho forum commandments jericho forum® commandments define areas principles must observed planning de-perimeterised future whilst building “ good security ” commandments specifically address areas security necessary deliver de-perimeterised vision commandments serve benchmark concepts solutions standards systems assessed measured jericho forum commandments issued creative commons license found https //collaboration.opengroup.org/jericho/commandments_v1.2.pdf
[ 9513, 9858, 9954 ]
Validation
9,114
2
Microsoft_RPC:microsoft rpc microsoft rpc microsoft remote procedure call modified version dce/rpc additions include partial support ucs-2 unicode strings implicit handles complex calculations variable-length string structure paradigms already present dce/rpc dce 1.0 reference implementation allows constructs size_is len possibly size_is len-1 msrpc allows much complex constructs size_is len 2 1 even length_is max ~0x7 0x7 common expression dcom idl files msrpc used microsoft seamlessly create client/server model windows nt little effort example windows server domains protocols entirely msrpc based microsoft dns administrative tool microsoft exchange server 5.5 administrative front-ends msrpc client/server applications mapi made secure proxying mapi set simple msrpc functions enable encryption msrpc layer without involving mapi protocol msrpc derived distributed computing environment 1.2 reference implementation open software foundation copyrighted microsoft dce/rpc originally commissioned open software foundation industry consortium set vendor- technology-neutral open standards computing infrastructure none unix vendors represented open group wanted use complex dce components dce/rpc time microsoft component object model based heavily msrpc adding interfaces inheritance marshalling semantics dce/rpc used serialize method calls results processes separate address spaces albeit com initially allow network calls different machines distributed component object model dcom com extended software components distributed across several networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure microsoft donated dcom open group
[ 10243, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 8246, 2120, 4178, 9813, 603, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 3224, 3235, 4771, 7846, 10414, 3250, 214, 9434, 736, 4321, 6370, 9441, 4836, 10465, 1770, 1149...
None
9,115
2
Motorola_One:motorola one motorola one stylised motorolaone series android smartphones developed motorola mobility motorola phone series uses android one version android motorola mobile phones run android one called motorola one three models released first 2018 motorola ones phones shipped near stock version android guaranteed receive two upgrades version android security updates minimum 3 years release first release series simply named motorola one however carry alternative name p30 play areas asia released october 2018 available two different colours white black came market price 180 euros making low mid range phone second iteration mobile phone series named motorola one vision released may 2019 boasted larger previous screen 48mp camera well upto 1tb sd card slot came market price 300 euros making mid range phone expensive series third release series named motorola one action released august 2019 first phone market record landscape video footage held portrait position due array three camera came market price 260 euros making mid range phone
[ 10658, 392, 5963, 5100, 2383, 1776, 7983, 7835, 2838, 1083, 7548, 9949, 3835 ]
None
9,116
7
Kimble_(app):kimble app kimble cloud-based psa software application kimble founded 2010 sean hoban mark robinson david scott company headquartered london england offices united states including boston park city chicago atlanta 2018 kimble secured investment accel-kkr technology-focused investment firm based silicon valley kimble provides professional services automation psa solution known kimble psa built salesforce platform recognized salesforce premier partner kimble app automates pipeline forecasting resource planning delivery management project accounting kimble applications helps professional service organizations run project-based businesses better global leaders consulting software hi-tech ntt data tcs sage canon use kimble optimize resource utilization profitability business scalability kimble leading software vendor focuses exclusively professional services automation psa putting energy innovating features easy-to-use functionality improve team collaboration efficiency around key services processes built work seamlessly crm kimble drives forward-looking focus timely decision making intelligent insights guidance 2018 ranked best professional services automation software g2 crowd momentum grid
[ 4194, 10090 ]
Test
9,117
4
Great_Firewall:great firewall great firewall china gfw combination legislative actions technologies enforced people republic china regulate internet domestically role internet censorship china block access selected foreign websites slow cross-border internet traffic effect includes limiting access foreign information sources blocking foreign internet tools e.g google search facebook twitter wikipedia others mobile apps requiring foreign companies adapt domestic regulations besides censorship gfw also influenced development china internal internet economy nurturing domestic companies reducing effectiveness products foreign internet companies great firewall operated golden shield project bureau public information network security supervision mentioned one country two systems principle china special administrative regions hong kong macau affected project sars governmental legal systems therefore enjoy high degree autonomy nevertheless u.s. state department reported central government authorities closely monitored internet use regions term great firewall china portmanteau firewall great wall china first used print geremie barmé 1997 term started use beijing 1996 stephen guerin redfish group beijing-based web consultancy 1996 interviews guerin cnn andrea koppel npr marky kay magistad included guerin discussing china reversing firewall political ideological background gfw project considered one deng xiaoping ’ favorite sayings early 1980s open window fresh air flies blown saying related period economic reform china became known socialist market economy superseding political ideologies cultural revolution reform led china towards market economy opened market foreign investors nonetheless despite economic freedom values political ideas communist party china protected swatting flies unwanted ideologies internet china arrived 1994 inevitable consequence supporting tool socialist market economy gradually internet availability increasing internet become common communication platform tool trading information ministry public security took initial steps control internet use 1997 issued comprehensive regulations governing use key sections articles 4–6 1998 communist party china feared china democracy party cdp would breed powerful new network party elites might able control cdp immediately banned followed arrests imprisonment year gfw project started first part project lasted eight years completed 2006 second part began 2006 ended 2008 6 december 2002 300 people charge gfw project 31 provinces cities throughout china participated four-day inaugural comprehensive exhibition chinese information system exhibition many western high-tech products including internet security video monitoring human face recognition purchased estimated around 30,000–50,000 police employed gigantic project fang binxing known substantial contribution china internet censorship infrastructure dubbed father china great fire wall china view internet internet sovereignty notion internet inside country part country sovereignty governed country united states several western countries passed laws creating computer crimes beginning 1970s china legislation 1997 year china sole legislative body national people congress npc passed cl97 law criminalizes cyber crimes divided two broad categories crimes target computer networks crimes carried computer networks behavior illegal latter category includes among many things dissemination pornographic material usurping state secrets chinese judges critical cl97 calling ineffective unenforceable however npc claimed intentionally left law flexible could open future interpretation development given gaps law central government china relies heavily administrative body state council determine falls definitions determinations required go npc legislative process result cpc ended relying heavily state regulation carry cl97 latter definition online activities punishable cl97 crimes carried computer networks used justification great firewall cited government blocks isp gateway connections access anything internet definition also includes using internet distribute information considered harmful national security using internet distribute information considered harmful public order social stability chinese morality central government relies heavily state council regulators determine specific online behavior speech fall definitions reasons behind internet censorship china include part great firewall beginning 2003 china started golden shield project massive surveillance censoring system hardware provided mostly u.s. companies including cisco systems project completed 2006 carried buildings machines manned civilians supervised china national police force public security bureau psb main operating activities gatekeepers golden shield project include monitoring domestic websites email searching politically sensitive language calls protest damaging content found local psb officials dispatched investigate make arrests however late 2007 golden shield project proved operate sporadically best users long adapted internet blocking using proxy servers among strategies make communications circumnavigate blocked content february 2008 chinese government announced operation tomorrow effort crack youth usage internet cafés play online games view content declared illegal internet cafés extremely popular way getting online developing countries fewer people afford personal computer regulated chinese government local chinese government officials minors china age 18 allowed internet cafés although law widely ignored enforced spurred creation underground black web bars visited underage 2008 internet cafés required register every customer log used internet records may confiscated local government officials psb illustrate local regulation internet cafés one instance government official town gedong lawfully banned internet cafés operating town believed harmful minors frequented play online games including considered violent surf internet however internet cafés town simply went underground minors deterred visiting may 2015 china indefinitely blocked access chinese-language wikipedia contrast 2018 english-language wikipedia blocked rarely intermittently china 2017 discussed plans version wikipedia may 2019 language versions wikipedia blocked chinese government system blocks content preventing ip addresses routed consists custom dns proxy servers filtering mechanism researchers university california davis university new mexico said censorship system true firewall since banned material sometimes able pass several routers entire system without blocked filtering mechanism may differ one chinese isp another tend common possible reported methods included research evidence indicated suspicion great firewall china sense one surveilled online leads chilled speech self-censorship effective blocking internet content great firewall great firewall form trade protectionism allowed china grow internet giants tencent alibaba baidu china version many foreign web properties example tencent video youtube tencent weibo twitter qzone facebook wechat whatsapp ctrip orbitz others zhihu quora nearly one quarter global internet population 700 million users internet behind gfw considered parallel universe internet exists outside mainland chinese internet censorship programs censored web sites include among things blocked web sites indexed lesser degree chinese search engines sometimes considerable impact search results according new york times google set computer systems inside china try access web sites outside country site inaccessible added google china blacklist however unblocked web sites reindexed referring google first-hand experience great firewall hope international community reveal secrets simon davies founder london-based pressure group privacy international challenging google reveal technology used china behest way understand nature beast perhaps develop circumvention measures opening communications would dossier extraordinary importance human rights davies says google yet respond call great firewall blocks destination ip addresses domain names inspects data sent received basic censorship circumvention strategy use proxy nodes encrypt data circumvention tools combine two mechanisms 2008 english-language bbc website chinese language website unblocked 2017 china censored google including google maps alternate map applications available reporters without borders suspects countries cuba vietnam zimbabwe belarus obtained surveillance technology china although censorship countries less stringent china even one see booming sector well one dynamic china second largest information communication technology market according international data corporation market reach us 844 billion 2020 market big data expected become part industrial world china 2025 regardless strictness industrial internet architecture already place despite strict government regulations chinese people continue protest government attempt censor internet covert protesters set secure ssh vpn connections using tools ultrasurf also utilize widely available proxies virtual private networks fanqiang 翻墙 climb wall bypass gfw active protest absent chinese people post grievances online occasions successful 2003 death sun zhigang young migrant worker sparked intense widespread online response chinese public despite risk government punishment months later premier wen jiabao abolished chinese law led death sun ever since dissent regularly created turmoil internet china also january 2010 google announced longer censor web search results china even means might shut chinese operations altogether many chinese people went company chinese offices display grievances offer gifts flowers fruits cigarettes chinese corporate statutes mandate domestic foreign internet companies business mainland china cooperate great firewall efforts companies responsible content put websites well content users post website helps china promote self-censorship making censoring job less difficult allowing keep state licenses media chinese subsidiaries american companies yahoo google google services blocked google still presence china microsoft comply condition operating leadership companies regularly express distaste china great firewall policies vein consider necessary part business china better alternative would china business jerry yang founder yahoo additionally implied presence foreign internet companies china eventually help bring less internet restriction china critics argue gfw consequence china paranoia potential internet spreading opposition one-party rule arguments given china method limited internet impedes freedom speech holds economically speaking discouraging innovation disapproving communication important ideas prohibiting firms use certain services use also thought detrimental approach students professors since access resources promote sharing work ideas comprehensive learning another important argument gfw fear critics big countries begin following china approach whole purpose creation internet could put jeopardy like-minded countries successful imposing restrictions inhabitants globalized online companies free global exchange information could cease exist united states trade representative ustr “ national trade estimate report ” 2016 referred china digital great firewall china filtering cross-border internet traffic posed significant burden foreign suppliers claude barfield american enterprise institute expert international trade suggested u.s. government bring case firewall huge trade barrier world trade organization january 2017 8 24 trafficked websites china blocked great firewall created burden foreign suppliers rely websites sell products services.the lobby 2016 business climate survey showed 79 percent members reported negative impact business due internet censorship according stephen rosen gfw reflective chinese government fear civil disobedience rebellion among chinese population chinese communist party rule
[ 4224, 10368, 1157, 5254, 138, 5135, 1299, 1692, 5405, 8735, 4389, 8998, 3625, 11693, 10417, 6834, 5887, 8630, 8640, 3777, 2884, 3781, 11461, 1364, 11221, 2661, 3941, 10341, 2409, 9193, 1650, 4725, 5749, 8054, 4863 ]
Test
9,118
2
Rob_Savoye:rob savoye rob savoye primary developer gnash developer gnu project worked debian red hat dozens free/open source software projects among first employees cygnus support sold red hat 2001 began programming computers 1977 using fortran 4 projects worked include gcc gdb dejagnu cygwin ecos ctas rob savoye manages unofficial website rainbow family living light resides outside nederland colorado avid ice climber outdoorsman additionally rob involved search rescue lost stranded hikers climbers founding member imsar ilchester mountain search rescue organization libre planet 2011 savoye received individual achievement fsf award advancement free software work gnash
[ 4528, 9579, 9455 ]
None
9,119
2
NASLite:naslite naslite free commercial linux distribution designed turn conventional x86-based computers pci interface simple network-attached storage device fits onto single 3½-inch high density floppy disk formatted 1.72mb naslite boots floppy disk runs 4mb ram disk allowing full capacity hard disk drives used storage naslite supports serving files clients running windows linux mac os x well others versions available support different networking protocols booting operating system cd-rom usb mass storage device hard disk drive versions naslite variants contain gpl 'd proprietary components gpl 'd components available end user per gplv2 naslite runs well obsolete hardware requires least computer pci interface minimum requirements 486dx pentium cpu 16 mb ram pci ethernet card ide hard disk drive floppy disk drive naslite turns target machine simple file server since file serving takes little processing speed opposed network speed hard drive speed able run comparatively old computers little processing power runs floppy disk hypothetically usually four ide channels used hard drives naslite three variants supporting different file serving protocols samba support serving microsoft windows client machines nfs serve unix based operating systems ftp anonymous ftp also supports remote administration via telnet though ssh includes web server display usage error logs since based linux naslite like linux distributions supports new larger hard drives often supported older machines bypassing bios directly accessing hard drive greatly increasing usefulness older computer serving large amounts data
[ 8837, 7435, 6797, 10127, 2321, 5397, 4887, 9625, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 823, 439, 56, 59, 7483, 3903, 4673, 7364, 2375, 4039, 8907, 1110, 9693, 225, 2914, 485, 3685, 10341, 9064, 4841, 6890, ...
Test
9,120
3
Master_of_the_Lamps:master lamps master lamps one first music video games activision published game 1985 several home computer systems master lamps death arabian prince father king shatters three enchanted oil lamps freeing three genies trapped within genies overrun palace contain prince must reassemble three broken lamps player role prince wearing white thawb red keffiyeh must journey seven dens genie den contains one lamp pieces gameplay alternates two modes first prince maneuvers flying carpet winding tunnel genie den practice requires player direct carpet diamond-shaped gates appear failure returns prince beginning tunnel den second mode player strikes gong thrice summon genie genie draws hookah blows ball smoke smoke emerges sequence tones player must repeat call-and-response pattern order play tone player must strike corresponding gong player strikes incorrect gong strikes correct gong early genie magic transports prince beginning tunnel seven dens first genie tone audible manifests colored quaver eighth note floats toward ground seven dens second genie tone inaudible player must match color note color corresponding gong seven dens third genie tone audible note appears player must recognize note pitch strike correct gong player passes trial gateway another tunnel opens passing musical trials three genies player navigates one final tunnel palace player succeeds prince reclaims palace antic 1986 called master lamps offbeat game program number unique elements stating become little monotonous magazine approved non-violent gameplay
[ 10931, 9006 ]
Test
9,121
2
Ninite:ninite ninite codenamed volery private beta stage package management system offering lets users automatically install popular applications windows operating system allows users make selection list applications bundles selection single installer package free personal use paid version ninite pro available professional use alternatively cheaper albeit less robust version ninite pro known ninite updater available users want ability one-click updates without features offered ninite pro ninite works windows 7 later presents user list programs generates custom installer executable based user selection run installer downloads installs selected programs ninite installer always downloads latest version program accomplished downloading regularly-updated list applications download urls ninite servers time program run benefits using ninite rather individual applications installers include toolbar/adware free installations ability update multiple applications automatic selection architecture 64-bit vs 32-bit language selection based operating system language error reporting one installations fail austrian magazine der standard wrote ninite gets good basic package software computer computerwoche listed ninite number 11 28 reviewed freeware tools pc magazine listet batch-installer software installation one ninite webpage user chooses software preference activating checkboxes continues downloading executable installer preconfigured users custom selection executing installer previously chosen software unattended without requested user interaction installed computer chrome opera firefox discord skype pidgin thunderbird trillian itunes vlc aimp foobar2000 winamp musicbee audacity k-lite codec pack gom spotify cccp mediamonkey handbrake java adoptopenjdk x64 version 8 11 java adoptopenjdk 8 .net silverlight adobe air krita blender paint.net gimp irfanview xnview inkscape faststone greenshot sharex foxit reader libreoffice sumatrapdf cutepdf pdfcreator openoffice ms essentials malwarebytes avast avg spybot 2 avira superantispyware qbittorrent dropbox google backup sync onedrive sugarsync evernote google earth steam keepass 2 everything nv access teamviewer 14 imgburn realvnc teracopy cdburnerxp revo launchy windirstat glary infrarecorder classic start 7-zip peazip winrar python filezilla notepad++ jdk adoptopenjdk x64 8 11 jdk adoptopenjdk 8 jdk amazon corretto x64 8 11 jdk amazon corretto 8 winscp putty winmerge eclipse visual studio code ninite installer/updater includes software latest version discontinued software longer maintained software author ninite continues install python v2 despite python v3 preferred version recommended python users upgrade python v3 end 2019 july 2019 ninite offer python v3 option microsoft silverlight deprecated final update released beginning 2019 microsoft security essentials discontinued january 2020 time windows 7 newer versions windows functionality already install operating system feature name windows defender classic start discontinued end 2017 following software updated 3 years cutepdf sumatrapdf cccp imgburn infrarecorder launchy
[ 8584, 1417, 6797, 4623, 894, 9746, 10898, 1813, 11418, 10525, 3114, 2859, 4010, 7983, 4403, 5067, 5070, 5078, 11225, 1242, 2401, 9953, 8554, 3573, 6270 ]
None
9,122
3
Socket_FM2:socket fm2 socket fm2 cpu socket used amd desktop trinity richland apus connect motherboard well athlon x2 athlon x4 processors based fm2 launched september 27 2012 motherboards feature new fm2 cpu socket also utilize amd new a85x chipset socket similar fm1 based 31×31 grid pins 5×7 central void 3 pins missing corner additional key pins missing compared socket fm1 two key pins moved one removed leaving 904 pins available chipsets consult fusion controller hubs fch steamroller-based kaveri apus supported see socket fm2+ fm2r2 socket fp3 bga- 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
[ 3586, 9475, 3588, 8452, 9092, 10375, 3464, 4872, 5645, 398, 7058, 10260, 4246, 7963, 2719, 2463, 4767, 2850, 7712, 1322, 2094, 11183, 1329, 6705, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 11080, 2764, 7247, 9551, 7122, 9427, 10715, 7132, ...
Test
9,123
2
Craig_Federighi:craig federighi craig federighi born may 27 1969 apple senior vice president software engineering federighi oversees development ios ipados macos apple common operating system engineering teams teams responsible delivering software heart apple products including user interface applications frameworks graduating acalanes high school lafayette california federighi earned master science degree computer science bachelor science electrical engineering computer science university california berkeley italian descent federighi married 2014 federighi worked steve jobs next led development enterprise objects framework joined apple acquired next 1996 left 1999 enterprise company ariba chief technology officer returned apple 2009 led macos engineering march 23 2011 federighi succeeded bertrand serlet vice president mac software engineering apple august 27 2012 promoted senior vice president reporting ceo tim cook october 29 2012 upon announcement scott forstall departure apple role expanded encompass ios addition mac software engineering september 2016 federighi reported 500,000 shares apple stock worth us 100 million july 2019 within community apple users developers federighi known energetic presentations new apple software frequently featuring absurdist humor references somewhat bouffant hair use new software features organize events office karaoke parties camping trips claimed love band rush federighi notable nicknames around apple hair force one ” additionally apple ceo tim cook called superman first appearance onstage major apple event wwdc 2009 helped bertrand serlet introduce mac os x snow leopard made another appearance 2010 'back mac presentation showing mac os x lion introduced ios 7 os x mavericks apple wwdc 2013 developer conference ios 8 os x yosemite wwdc 2014 wwdc 2015 delivered apple 2-hour main opening-day presentation introducing ios 9 os x 10.11 el capitan revealing plans release apple new programming language swift open-source project september 2015 demoed 3d touch new iphone 6s wwdc 2016 federighi introduced ios 10 macos 10.12 sierra said 15-year-old os x would rebranded macos tune naming scheme used ios tvos watchos emphasized use widgets ios lock screen announced new apis siri imessage would open developers apple special event september 2017 federighi faced controversy initially failing properly demo face id feature iphone x. consequently people became skeptical reliability face id apple stated prior event apple employees inadvertently triggered face id one demonstration phones causing prompt passcode federighi attempted unlock it..
[ 10755, 9732, 1549, 7697, 11289, 6186, 6700, 1074, 8754, 9778, 9784, 8253, 576, 8783, 4180, 10838, 6234, 3681, 9826, 5733, 8806, 3691, 2676, 6264, 7806, 6783, 2686, 10878, 8842, 10386, 5784, 1177, 4251, 2207, 11430, 171, 2735, 3248, 4283, ...
None
9,124
8
WebMethods_Integration_Server:webmethods integration server webmethods integration server one core application servers webmethods platform java-based multiplatform enterprise integration server supports integration diverse services mapping data formats communication systems integration server may also known core webmethods enterprise service bus integration server supports java c/c++ programming languages writing services well proprietary graphical language known flow also supports graphical configuration 3rd party system operations via concept adapter services integration server exposes administration configuration auditing facilities user via html web interface programming languages protocols/standards core protocols/standards additional packages following list significant releases webmethods integration server webmethods integration server certified run following platforms application server runs top java 1.4.x version 6.x 1.7.x version 9.5 1.8.x version 9.10 integration server installation product via webmethods installer program webmethods acquired software ag
[ 7364, 3558, 5612, 5677, 10413, 7983, 9909, 502, 10486, 10236, 479 ]
None
9,125
8
Hiawatha_(web_server):hiawatha web server hiawatha web server available multiple platforms developed hugo leisink since 2002 hiawatha started january 2002 small web server suitable servers old hardware leisink computer science student time initially created server support internet servers student houses delft south holland netherlands server designed improved security focus leisink states lot security features hiawatha wo n't find webserver author said know long time vulnerabilities exist web servers one thing bothers runtime cgi cgi process web servers run forever single cgi script dos webserver system administrator needed kill script client hacker keeps guessing passwords http authentication kind issues inspired create hiawatha settings maximum request sending time maximum cgi run time client banning etc features opinion every daemon january 2009 edition linux magazine included article hiawatha web server describing light web server good performance innovative security functions hiawatha frequently cited lightweight alternative apache prioritizes easy installation reduced storage including many additional features february 2019 leisink simultaneously announced release version 10.9 end major development pair blog posts hiawatha web server implements important functions modern web server hiawatha many security features web server like preventing sql-injection cross-site scripting xss cross-site request forgery csrf prevention denial-of-service protection control external image linking banning potential hackers limiting runtime cgi applications author worked rfc3546 support openssl documentation subject extremely poor progress difficult although rfc3546 support included since v8.6 version developed polarsslv1.2 although security main focus hiawatha users also speak highly speed performance according performance test carried independent researcher saltwaterc hiawatha faster ten servers tested drupal static content performing comparably rest metrics hiawatha supports load-balanced fastcgi php-fastcgi utility although latter deprecated replaced php project fastcgi process manager php-fpm makes fast scalable handling dynamic content
[ 1920, 899, 4485, 7430, 6797, 4878, 7567, 7695, 1937, 9229, 7443, 788, 1556, 5397, 1304, 8350, 7457, 3746, 8994, 2596, 3237, 2470, 11682, 7338, 9387, 44, 11693, 7983, 10800, 11439, 2485, 1206, 823, 5433, 6714, 5819, 10622, 1991, 4561, 1113...
None
9,126
3
Vector_processor:vector processor computing vector processor array processor central processing unit cpu implements instruction set containing instructions operate one-dimensional arrays data called vectors compared scalar processors whose instructions operate single data items vector processors greatly improve performance certain workloads notably numerical simulation similar tasks vector machines appeared early 1970s dominated supercomputer design 1970s 1990s notably various cray platforms rapid fall price-to-performance ratio conventional microprocessor designs led vector supercomputer demise later 1990s cpu designs include multiple instructions vector processing multiple vectorised data sets typically known mimd multiple instruction multiple data realized vliw long instruction word fujitsu fr-v vliw/ vector processor combines technologies vector processing development began early 1960s westinghouse solomon project solomon goal dramatically increase math performance using large number simple math co-processors control single master cpu cpu fed single common instruction arithmetic logic units alus one per cycle different data point one work allowed solomon machine apply single algorithm large data set fed form array 1962 westinghouse cancelled project effort restarted university illinois illiac iv version design originally called 1 gflops machine 256 alus finally delivered 1972 64 alus could reach 100 150 mflops nevertheless showed basic concept sound used data-intensive applications computational fluid dynamics illiac fastest machine world illiac approach using separate alus data element common later designs often referred separate category massively parallel computing computer operations functions presented developed kartsev 1967 first successful implementation vector processing appears control data corporation star-100 texas instruments advanced scientific computer asc basic asc i.e. one pipe alu used pipeline architecture supported scalar vector computations peak performance reaching approximately 20 mflops readily achieved processing long vectors expanded alu configurations supported two pipes four pipes corresponding 2x 4x performance gain memory bandwidth sufficient support expanded modes star otherwise slower cdc supercomputers like cdc 7600 data related tasks could keep much smaller less expensive however machine also took considerable time decoding vector instructions getting ready run process required specific data sets work actually sped anything vector technique first fully exploited 1976 famous cray-1 instead leaving data memory like star asc cray design eight vector registers held sixty-four 64-bit words vector instructions applied registers much faster talking main memory cray design used pipeline parallelism implement vector instructions rather multiple alus addition design completely separate pipelines different instructions example addition/subtraction implemented different hardware multiplication allowed batch vector instructions pipelined technique called vector chaining cray-1 normally performance 80 mflops three chains running could peak 240 mflops – far faster machine era examples followed control data corporation tried re-enter high-end market eta-10 machine sold poorly took opportunity leave supercomputing field entirely early mid-1980s japanese companies fujitsu hitachi nippon electric corporation nec introduced register-based vector machines similar cray-1 typically slightly faster much smaller oregon-based floating point systems fps built add-on array processors minicomputers later building minisupercomputers throughout cray continued performance leader continually beating competition series machines led cray-2 cray x-mp cray y-mp since supercomputer market focused much massively parallel processing rather better implementations vector processors however recognising benefits vector processing ibm developed virtual vector architecture use supercomputers coupling several scalar processors act vector processor although vector supercomputers resembling cray-1 less popular days nec continued make type computer present day sx series computers recently sx-aurora tsubasa places processor either 24 48 gigabytes memory hbm 2 module within card physically resembles graphics coprocessor instead serving co-processor main computer pc-compatible computer plugged serving support functions modern graphics processing units gpus include array shader pipelines may driven compute kernels considered vector processors using similar strategy hiding memory latencies general terms cpus able manipulate one two pieces data time instance cpus instruction essentially says add b put result c data b c could be—in theory least—encoded directly instruction however efficient implementation things rarely simple data rarely sent raw form instead pointed passing address memory location holds data decoding address getting data memory takes time cpu traditionally would sit idle waiting requested data show cpu speeds increased memory latency historically become large impediment performance see memory wall order reduce amount time consumed steps modern cpus use technique known instruction pipelining instructions pass several sub-units turn first sub-unit reads address decodes next fetches values addresses next math pipelining trick start decoding next instruction even first left cpu fashion assembly line address decoder constantly use particular instruction takes amount time complete time known latency cpu process entire batch operations much faster efficiently one time vector processors take concept one step instead pipelining instructions also pipeline data processor fed instructions say add b add numbers numbers instead constantly decode instructions fetch data needed complete processor reads single instruction memory simply implied definition instruction instruction operate another item data address one increment larger last allows significant savings decoding time illustrate difference make consider simple task adding two groups 10 numbers together normal programming language one would write loop picked pairs numbers turn added cpu would look something like vector processor task looks considerably different several savings inherent approach one two address translations needed depending architecture represent significant savings another saving fetching decoding instruction done one time instead ten code also smaller lead efficient memory use vector processor may multiple functional units adding numbers parallel checking dependencies numbers required vector instruction specifies multiple independent operations simplifies control logic required improve performance avoiding stalls mentioned earlier cray implementations took step allowing several different types operations carried time consider code adds two numbers multiplies third cray would fetched added multiplied single operation using pseudocode cray math operations thus completed far faster overall limiting factor time required fetch data memory problems attacked sort solution including types instructions necessarily adds complexity core cpu complexity typically makes instructions run slower—i.e. whenever adding many numbers row complex instructions also add complexity decoders might slow decoding common instructions normal adding fact vector processors work best large amounts data worked reason sorts cpus found primarily supercomputers supercomputers general found places weather prediction centers physics labs huge amounts data crunched let r vector speed ratio f vectorization ratio time taken vector unit add array 64 numbers 10 times faster equivalent scalar counterpart r 10 also total number operations program 100 10 scalar vectorization f 0.9 i.e. 90 work done vector unit follows achievable speed formula_1 even performance vector unit high formula_2 get speedup less formula_3 suggests ratio f crucial performance ratio depends efficiency compilation like adjacency elements memory various machines designed include traditional processors vector processors fujitsu ap1000 ap3000 programming heterogeneous machines difficult since developing programs make best use characteristics different processors increases programmer burden increases code complexity decreases portability code requiring hardware specific code interleaved throughout application code balancing application workload across processors problematic especially given typically different performance characteristics different conceptual models deal problem example using coordination language program building blocks programming libraries higher order functions block different native implementation processor type users simply program using abstractions intelligent compiler chooses best implementation based context
[ 4098, 7173, 9739, 9741, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 10285, 3630, 6705, 7218, 3123, 2620, 2623, 2113, 7234, 3142, 1614, 2638, 6738, 9302, 2140, 1122, 4194, 10340, 3175, 5223, 6248, 8810, 2155, 5739, 4205, 8815, 1137, ...
None
9,127
5
Open_Control_Architecture:open control architecture open control architecture oca communications protocol architecture control monitoring connection management networked audio video devices networks referred media networks official specification oca audio engineering society aes standard known aes70-2015 aes70 document use newer term aes70 refer standard architecture specifies aes70 open standard may used freely without licenses fees organization memberships aes70 intended support media networks combine devices diverse manufacturers targeted professional applications aes70 suitable media networks 2 10,000 devices including networks mission-critical and/or life-safety roles aes70 device control monitoring connection management provide transport media program material however aes70 designed work virtually media transport scheme application requires aes70 parts separable may used independently example device may implement aes70 connection management use means operational control monitoring aes70 termed architecture provides basis definition multiple control protocols protocols share common programming model vary signalling detail depending form underlying data transport mechanism aes70 application use whichever aes70 protocol appropriate communications method available oca architecture aes70 developed oca alliance trade association beginning 2011 oca based existing control protocol named ocp created bosch communications systems 2009 2010 ocp turn based embryonic control protocol standard named aes-24 developed aes early 1990s outset intention involved oca rendered open public standard alliance completed oca development fall 2014 transferred specification aes rendering formal standard aes70 formal standard published january 4 2016 today oca alliance works develop enhance functionality aes70 promote aes70 adoption throughout professional media systems industry alliance promotes understanding adoption aes70 facilitates creation aes70 implementations related tools technologies develops future functional enhancements aes70 standard aes70 defines control interface media device presents network connected thus aes70 concerned representation device functions systematic way control monitoring functions via well-defined family protocols media networks normally include one devices called controllers user interfaces allow humans control monitor audio and/or video functioning networked devices aes70-compliant networks controllers use aes70 protocols communicate devices control aes70 defines control protocol used controllers devices scope extend cover design construction controllers user interfaces aes70 intended used professional applications technical requirements applications detailed elsewhere oca scope excludes applications homes automobiles consumer areas aes70 device model canonical description control interface aes70-compliant device presents network aes70 device model object-oriented defines required optional set objects oca objects device control interface implements using aes70 protocol controllers may access properties objects perform control monitoring connection management operations oca objects abstractions represent device control monitoring points media connections may may correspond actual programming objects hardware components inside device device correctly implements aes70 protocol aes70-compliant aes70 define may accomplished generally speaking aes70 device model tends differ device models control architectures several ways aes70 class structure defines set classes oca classes devices may use instantiate oca objects three kinds classes oca classes may broadly grouped three functional sets noted aes70 architecture supports multiple protocols depending nature network medium used present aes70 defines one protocol named ocp.1 ocp.1 aes70 protocol tcp/ip networks future plans include ocp.2 byte-serial version usb networks bluetooth connections point-to-point links ocp.3 text version json aes70 protocol defines three kinds messages follows aes70 control repertoire covers control monitoring connection management audio devices future versions expand audio control repertoire may address video devices well aes70 includes features allow manufacturers extend oca class structure address functions standard repertoire extensions may public confidential manufacturer chooses table 1 summarizes aes70-2015 control repertoire although aes70 provide media transport functions designed interface modern media transport standards control signal routing connection setup functions interface network directory/discovery services capacity aes70 provides useful level abstraction applications allowing controllers devices use one common software model managing stream connections various transport architectures oca alliance defines recommended practices interfacing aes70 various well-known media transport architectures specification interfacing aes70 given media transport scheme called aes70 adaptation aes70 includes architectural solution problems control grouping i.e use single control input effect multiple operating parameters example control grouping master gain control covering multiple device channels one devices control grouping poses difficult problems especially systems given operating parameter may affected multiple control groups example stereophonic multiway sound system gain left-channel high-frequency amplifier may affected settings master controls overall high-frequency level b left-channel level c overall level entire system systems machine intelligence required manage cumulative settings effects lead overrange underrange parameter values aes70 grouping mechanism provides basis management one many devices aes70 includes powerful general mechanism applying storing recalling uploading downloading sets operating parameter values partial full snapshots supported aes70 includes complete support managing configurations reconfigurable dsp devices i.e software-based devices whose signal processing topologies defined redefined runtime external controllers devices aes70 supports creation configuration deletion signal processing elements internal signal paths connect aes70 designed support proprietary extensions maximum compatibility manufacturers may define extensions control repertoire coexist peacefully standard elements aes70 devices controllers continue interoperate aes70 evolves years devices use various versions oca generally intermixable one media network without problems aes70 protocols offer encryption authentication options allow construction secure control monitoring networks completely secure media networks require encryption transmitted program content well mechanisms encryption lie outside scope ocaaes70 although aes70 may used configure control aes70 defines primitives allow reliable update device firmware network primitives may used maintenance software ensure incomplete firmware updates render critical devices networks inoperative aes70 open license-free standard may freely used products manufacturers choose although aes70 nurtured promoted oca alliance membership alliance required order use aes70 aes70 documents available audio engineering society aes standards store standard three parts two significant appendices follows 1 aes70 framework 2 aes70 class structure 3 aes70 protocols two appendices listed universal modeling language uml specifications uml files two forms oca alliance non-profit corporation originally formed secure standardization oca publication aes70 standard 2016 alliance ’ purposes evolved alliance members large small companies desire steer evolution aes70 benefit exchange technology business information trade association provide new members always welcome number development tools open source code available helps start developing aes70 compatible products
[ 5472, 7361, 10924 ]
None
9,128
9
Common_Lisp_Interface_Manager:common lisp interface manager common lisp interface manager clim common lisp-based programming interface creating user interfaces i.e. graphical user interfaces guis fully object-oriented programming user interface management system using common lisp object system clos based idea stream input output also facilities output device independence descended gui system dynamic windows symbolics lisp machines main development 1988 1993 clim 2.0 released 1993 clim designed portable across different common lisp implementations different windowing systems uses reflective architecture window system interface clim supports like dynamic windows so-called presentations clim available allegro cl lispworks macintosh common lisp symbolics genera free software implementation clim named mcclim several extensions clim used several applications like climacs emacs-like editor also provides mouse-sensitive lisp listener read–eval–print loop repl common lisp
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 9245, 8226, 2603, 5165, 5677, 3119, 3631, 2105, 6201, 3132, 6717, 576, 8258, 8771, 1613, 9299, 10841, 3675, 2658, 7267, 2660, 8293, 3176, 2666, 2667, 5743, 8303, 2673, 83...
Validation
9,129
6
USB_flash_drive_security:usb flash drive security secure usb flash drives protect data stored access unauthorized users usb flash drive products market since 2000 use increasing exponentially consumers businesses increased demand drives manufacturers producing faster devices greater data storage capacities increasing number portable devices used business laptops notebooks personal digital assistants pda smartphones usb flash drives mobile devices companies particular risk sensitive data stored unsecured usb flash drives employees use devices transport data outside office consequences losing drives loaded information significant including loss customer data financial information business plans confidential information associated risk reputation damage usb flash drives pose two major challenges information system security data leakage owing small size ubiquity system compromise infections computer viruses malware spyware large storage capacity usb flash drives relative small size low cost means using data storage without adequate operational logical controls may pose serious threat information availability confidentiality integrity following factors taken consideration securing important assets average cost data breach source necessarily flash drive ranges less 100,000 2.5 million sandisk survey characterized data corporate end users frequently copy examples security breaches resulting usb drives include early days computer viruses malware spyware primary means transmission infection floppy disk today usb flash drives perform data software storage transfer role floppy disk often used transfer files computers may different networks different offices owned different people made usb flash drives leading form information system infection piece malware gets onto usb flash drive may infect devices drive subsequently plugged prevalence malware infection means usb flash drive documented 2011 microsoft study analyzing data 600 million systems worldwide first half 2011 study found 26 percent malware infections windows system due usb flash drives exploiting autorun feature microsoft windows finding line statistics monthly reporting commonly detected malware antivirus company eset lists abuse autorun.inf first among top ten threats 2011 windows autorun.inf file contains information programs meant run automatically removable media often usb flash drives similar devices accessed windows pc user default autorun setting windows versions prior windows 7 automatically run program listed autorun.inf file access many kinds removable media many types malware copy removable storage devices always program ’ primary distribution mechanism malware authors often build additional infection techniques examples malware spread usb flash drives include since security physical drive guaranteed without compromising benefits portability security measures primarily devoted making data compromised drive inaccessible unauthorized users unauthorized processes may executed malware one common approach encrypt data storage routinely scan usb flash drives computer viruses malware spyware antivirus program although methods possible software solutions bitlocker diskcryptor popular veracrypt allow contents usb drive encrypted automatically transparently also windows 7 enterprise windows 7 ultimate windows server 2008 r2 provide usb drive encryption using bitlocker go apple computer mac os x operating system provided software disc data encryption since mac os x panther issued 2003 see also disk utility additional software installed external usb drive prevent access files case drive becomes lost stolen installing software company computers may help track minimize risk recording interactions usb drive computer storing centralized database usb drives utilize hardware encryption microchips within usb drive provide automatic transparent encryption manufacturers offer drives require pin code entered physical keypad device allowing access drive cost usb drives significant starting fall due type usb drive gaining popularity hardware systems may offer additional features ability automatically overwrite contents drive wrong password entered certain number times type functionality provided software system since encrypted data simply copied drive however form hardware security result data loss activated accidentally legitimate users strong encryption algorithms essentially make functionality redundant encryption keys used hardware encryption typically never stored computer memory technically hardware solutions less subject cold boot attacks software-based systems reality however cold boot attacks pose little threat assuming basic rudimentary security precautions taken software-based systems security encrypted flash drives constantly tested individual hackers well professional security firms times january 2010 flash drives positioned secure found poorly designed provide little actual security giving access data without knowledge correct password flash drives compromised claimed fixed include companies reacted immediately kingston offered replacement drives different security architecture sandisk verbatim trek released patches commercial environments secure usb drives used central/remote management system may provide organizations additional level asset control significantly reducing risks harmful data breach include initial user deployment ongoing management password recovery data backup remote tracking sensitive data termination issued secure usb drives management systems available software service saas internet connectivity allowed behind-the-firewall solutions
[ 3843, 5764, 3880, 1801, 6797, 10385, 7515, 467, 9460, 8471, 10392, 7739, 1083, 6494 ]
Test
9,130
9
PowerBuilder_Foundation_Classes:powerbuilder foundation classes powerbuilder foundation class library pfc set powerbuilder objects customized used develop class libraries objects used provide corporate departmental application consistency pfc also includes objects used utility purposes debugging pfc written powerbuilder delivered powerbuilder objects supporting powerscript source code uses advanced powerbuilder object oriented coding techniques features service-oriented design ensures application uses minimum amount computer resources library initially developed powersoft introduced powerbuilder 5 released library later open sourced sybase powerbuilder 10 released since couple forks occurred including one specifically support appeon web enabling tool powerbuilder sr. vendor product architecture
[ 1856 ]
Test
9,131
5
RTP_audio_video_profile:rtp audio video profile rtp audio/video profile rtp/avp profile real-time transport protocol rtp specifies technical parameters audio video streams rtp specifies general-purpose data format n't specify encoded data utilize features rtp payload type value put rtp header sampling rate clock rate rate rtp timestamp increments use etc. rtp profile specifies details rtp audio/video profile specifies mapping specific audio video codecs sampling rates rtp payload types clock rates encode data format rtp data payload well specifying describe mappings using session description protocol sdp rfc 3551 lists details payload format reference details provided payload identifiers 96–127 used payloads defined dynamically session document recommends dynamically assigned port numbers although port numbers 5004 5005 registered use profile dynamically assigned port required standard also describes process registering new payload types iana applications operating profile always support pcmu payload type 0 previously dvi4 payload type 5 also recommended recommendation removed august 2013 rfc 7007 many rtp deployments support dvi4 little reason use much modern codecs available
[ 7681, 9665, 9381, 9769, 10444, 7407, 5843, 10271 ]
None
9,132
3
Sunway_SW26010:sunway sw26010 sw26010 260-core manycore processor designed national high performance integrated circuit design center shanghai implements sunway architecture 64-bit reduced instruction set computing risc architecture designed china sw26010 four clusters 64 compute-processing elements cpes arranged eight-by-eight array cpes support single instruction multiple data simd instructions capable performing eight double-precision floating-point operations per cycle cluster accompanied conventional general-purpose core called management processing element mpe provides supervisory functions cluster dedicated ddr3 sdram controller memory bank address space processor runs clock speed 1.45 ghz cpe cores feature 64 kb scratchpad memory data 16 kb instructions communicate via network chip instead traditional cache hierarchy mpe traditional setup 32 kb l1 instruction data caches 256 kb l2 cache finally on-chip network connects single system interconnection interface connects chip outside world sw26010 used sunway taihulight supercomputer march june 2018 world fastest supercomputer ranked top500 project system uses 40,960 sw26010s obtain 93.01 pflops linpack benchmark
[ 6311, 1480, 8523, 4269, 9391, 7699, 407, 9851, 5598 ]
Test
9,133
9
FreeMat:freemat freemat free open-source numerical computing environment programming language similar matlab gnu octave addition supporting many matlab functions idl functionality features codeless interface external c c++ fortran code parallel distributed algorithm development via mpi plotting 3d visualization capabilities community support takes place moderated google groups
[ 7301, 5129, 3980, 6797, 15, 8079, 5148, 7580, 7326, 7341, 7983, 6962, 823, 6718, 2242, 5830, 5703, 8262, 5833, 477, 11239, 4840, 363, 5612, 5741, 7148, 3960, 2045 ]
Test
9,134
4
Paper_key:paper key paper key machine-readable print cryptographic key printed key used decrypt data e.g archives backup data paper key result offline private key protocol offline private key also function token two-factor authentication idea digital key decrypt recover sensitive personal data long-term durability stored computer network length secure cryptographic keys restricts memorization secret key takes form 2d barcode machine-readable print early implementations paper key company safeberg use data matrix barcode human-readable base 16 digits user stores printed key secure location avoid abuse key used combination ‘ normal ’ password user extract key creating digital photo scan paper key feeding cryptographic software extracts key decrypt data br
[ 7433, 7434, 3366, 10711 ]
None
9,135
3
SCO–SGI_code_dispute_of_2003:sco–sgi code dispute 2003 sco forum 2003 sco group sco showed several examples allegedly illegal copying copyrighted code linux open source community quickly debunked examples shown particular one example showed code unix indeed used sgi linux contributions linux maintainers stated code question fact already removed linux example revealed — infringing code question needlessly duplicated functions already present linux sgi analysts also responded matter confirmed code question never infringed sco forum held august 17 – 19 2003 sco publicly showed several alleged examples illegal copying copyright code linux time examples available people signed nda prohibited revealing information shown sco claimed infringements divided four separate categories literal copying obfuscation derivative works non-literal transfers example used sco demonstrate literal copying also known atemalloc example name original contributor revealed sco quick analysis code question pointed sgi time also revealed code already removed linux kernel duplicated already existing functions within hours open source community started several different analyses infringing code results analyses differ slightly confirm code question derived unix code analyses also pointed code could possibly originated unix necessarily prove infringement copyrights community determined particularly bad example code question never used mainstream distributions linux present ia-64 version relative sparseness worldwide ia-64 installations combined limited time code present linux makes chance actually encountering system running code slim possible code contributed linux originated unix system v original implementation happened early 1970s comparison original unix source code unix system v source reveal substantial differences two fact dennis ritchie one creators original versions unix acknowledged either ken thompson wrote original code unix system v code derived important original versions unix copyright claim source code time law required copyright claims effectively means early unix code protected copyright law additionally santa cruz operation sco group released source code early versions unix 4-clause bsd-like license allowing use source code open source products october 1 2003 sgi responded sco ’ allegations open letter linux community letter rich altmaier vice president software claims small code fragments indeed inadvertently included linux kernel
[ 11232, 10051, 7204, 9320, 9135, 2995, 823, 2584, 3323, 7134 ]
Test
9,136
7
MashApps:mashapps mashapps process-centric cloud applications small medium enterprises departmental deployments mashapps used solve different types business problems within enterprise integrations third party applications on-premises on-demand systems modeled without much dependency team mashup applications shared users organizations users looking mashapps business scenarios either build look similar solutions readily available google apps marketplace mashapps built online mashup enabler called mashapp composer building mashapp require programming languages like enterprise mashup markup language new mashapps assembled existing repository reusable mashup components like process library external web services
[]
Test
9,137
7
Fujitsu:fujitsu fujitsu chiefly makes computing products company subsidiaries also offer diversity products services areas personal computing enterprise computing including x86 sparc mainframe compatible server products well storage products telecommunications advanced microelectronics air conditioning approximately 140,000 employees products services available 100 countries fujitsu listed tokyo stock exchange constituent nikkei 225 topix indices fujitsu second oldest company ibm hewlett packard established june 20 1935 name spin-off fuji electric company joint venture furukawa electric company german conglomerate siemens founded 1923 despite connections furukawa zaibatsu fujitsu escaped allied occupation japan second world war mostly unscathed 1954 fujitsu manufactured japan first computer facom 100 mainframe 1961 launched second generation computers transitorized facom 222 mainframe 1968 facom230 5 series marked beginning third generation computers fujitsu offered mainframe computers 1955 least 2002 fujitsu computer products included minicomputers small business computers servers personal computers 1955 fujitsu founded kawasaki frontale company football club kawasaki frontale j league football club since 1999 1967 company name officially changed contraction since 1985 company also fields company american football team fujitsu frontiers play corporate x-league appeared 7 japan x bowls winning two winning two rice bowls 1971 fujitsu signed oem agreement canadian company consolidated computers limited ccl distribute ccl data entry product key-edit fujitsu joined icl earlier began marketing key-edit british commonwealth countries well western eastern europe ccl direct marketing staff canada usa london uk frankfurt mers kutt inventor key-edit founder ccl common thread led fujitsu ’ later association icl gene amdahl 1986 fujitsu queen university belfast business incubation unit qubis ltd established joint venture called kainos privately held software company based belfast northern ireland 1990 fujitsu acquired 80 uk-based computer company international computers limited icl 1.29 billion icl renamed fujitsu services 2002 september 1990 fujitsu announced launch new series mainframe computers time fastest world july 1991 fujitsu acquired half russian company kme-cs kazan manufacturing enterprise computer systems 1992 fujitsu introduced world first 21-inch full-color plasma display hybrid based upon plasma display created university illinois urbana-champaign nhk strl achieving superior brightness 1993 fujitsu formed flash memory manufacturing joint venture amd spansion part transaction amd contributed flash memory group fab 25 texas r facilities assembly plants thailand malaysia china fujitsu provided flash memory business division malaysian fujitsu microelectronics final assembly test operations february 1989 mid-1997 fujitsu built fm towns pc variant started proprietary pc variant intended multimedia applications computer games later became compatible regular pcs 1993 fm towns marty released gaming console compatible fm towns games fujitsu agreed acquire 58 percent amdahl corporation including canada-based dmr consulting group already around 850 million july 1997 april 1997 company acquired 30 percent stake glovia international inc. el segundo calif. manufacturing erp software provider whose software begun integrating electronics plants starting 1994 june 1999 fujitsu historical connection siemens revived two companies agreed merge european computer operations new 50:50 joint venture called fujitsu siemens computers became world fifth-largest computer manufacturing company april 2000 fujitsu acquired remaining 70 glovia international april 2002 icl re-branded fujitsu march 2 2004 fujitsu computer products america lost class action lawsuit hard disk drives defective chips firmware october 2004 fujitsu acquired australian subsidiary atos origin systems implementation company around 140 employees specialized sap august 2007 fujitsu signed £500 million 10-year deal reuters group reuters outsourced majority internal department fujitsu part agreement around 300 reuters staff 200 contractors transferred fujitsu october 2007 fujitsu announced would establishing offshore development centre noida india capacity house 1,200 employees investment us 10 million october 2007 fujitsu australia new zealand subsidiary acquired infinity solutions ltd new zealand-based hardware services consultancy company undisclosed amount january 2009 fujitsu reached agreement sell hdd business toshiba transfer business completed october 1 2009 march 2009 fujitsu announced decided convert fdk corporation time equity-method affiliate consolidated subsidiary may 1 2009 tentative schedule subscribing private placement increase fdk capital april 1 2009 fujitsu agreed acquire siemens stake fujitsu siemens computers approximately eur450m fujitsu siemens computers subsequently renamed fujitsu technology solutions april 2009 fujitsu acquired australian software company supply chain consulting 48 million deal weeks purchasing telstra subsidiary kaz 200 million concerning net loss forecast amounted 95 billion yen year ending march 2013 february 2013 fujitsu announced cut 5,000 jobs 3,000 jobs japan rest overseas 170,000 employees fujitsu also merge large scale integrated chip business panasonic corporation 2015 fujitsu celebrates 80 years since establishment side currently embarked upon fujitsu 2015 world tour included 15 major cities globally visited 10,000 professionals fujitsu presenting take future hyper connectivity human centric computing april 2015 glovia international renamed fujitsu glovia inc november 2015 fujitsu limited vmware announced new areas collaboration empower customers flexible secure cloud technologies also acquired usharesoft provides enterprise-class application delivery software automating build migration governance applications multi-cloud environments january 2016 fujitsu network communications inc. announced new suite layered products advance software-defined networking sdn carriers service providers cloud builders virtuora nc based open standards described fujitsu suite standards-based multi-layered multi-vendor network automation virtualization products hands-on hardened largest global service providers fujitsu laboratories fujitsu research development division 1,300 employees capital 5 billion yen run tatsuo tomita 2012 fujitsu announced developed new technology non-3d camera phones technology allow camera phones take 3d photos fujitsu electronics europe gmbh entered market global distributor 1 january 2016 fujitsu consulting consulting services arm fujitsu group providing information technology consulting implementation management services fujitsu consulting founded 1973 montreal quebec canada original name dmr acronym three founder names pierre ducros serge meilleur alain roy next decade company established presence throughout quebec canada extending reach international markets nearly thirty years dmr consulting grew become international consulting firm changing name fujitsu consulting 2002 acquired fujitsu ltd. fujitsu operates division company india resulting acquisition north america-based company rapidigm offshore divisions noida pune hyderabad chennai bangalore pune head office fujitsu consulting india launched second 10 million development center noida october 2007 year starting operation country following expansion plan fujitsu consulting india launched fourth development center bengaluru nov 2011 fujitsu ltd. 42 shareholding fujitsu general manufactures markets various air conditioning units humidity control solutions general fujitsu brands india fujitsu general joint venture eta-ascon manufactures sells air conditioners general brand pfu limited headquartered ishikawa japan wholly owned subsidiary fujitsu limited pfu limited established 1960 approximately 4,600 employees globally 2013 turned 126.4 billion yen 1.2 billion usd pfu manufactures interactive kiosks keyboards network security hardware embedded computers imaging products document scanners pfu fujitsu brand addition hardware pfu also produce desktop enterprise document capture software document management software products pfu overseas sales marketing offices germany pfu imaging solutions europe limited italy pfu imaging solutions europe limited united kingdom pfu imaging solutions europe limited united states america fujitsu computer products america inc pfu limited responsible design development manufacture sales support document scanners sold fujitsu brand fujitsu market leaders professional document scanners best selling fi-series scansnap scanpartner product families well paperstream ip paperstream capture scansnap manager cardminder magic desktop rack2filer software products fujitsu glovia wholly owned subsidiary fujitsu ltd. discrete manufacturing enterprise resource planning software vendor based el segundo california international operations netherlands japan united kingdom company offers on-premise cloud-based erp manufacturing software glovia g2 brand software service saas brand glovia om company established 1970 xerox computer services developed inventory manufacturing financial applications fujitsu acquired 30 percent renamed glovia international 1997 remaining 70 percent stake 2000 fujitsu client computing limited fccl headquartered kawasaki kanagawa city company founded division fujitsu responsible research development design manufacturing sales consumer pc products formerly wholly owned subsidiary november 2017 fccl spun joint venture lenovo development bank japan dbj new company retains name fujitsu still responsible sales support products however lenovo owns majority stake 51 fujitsu retains 44 remaining 5 stake held dbj fujitsu computing product lines include may 2011 fujitsu decided enter mobile phone space microsoft announcing plans fujitsu would release windows phone devices fujitsu primergy eternus distributed tritech distribution limited hong kong lifebook amilo fujitsu range notebook computers tablet pcs fujitsu offers public cloud service delivered data centers japan australia singapore united states united kingdom germany based global cloud platform strategy announced 2010 platform delivers infrastructure-as-a-service iaas – virtual information communication technology ict infrastructure servers storage functionality – fujitsu data centers japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany japan fujitsu also launched windows azure powered global cloud platform partnership microsoft offering delivering platform-as-a-service paas known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options inter-operating services covering implementation migration applications system building systems operation support fujitsu acquired runmyprocess april 2013 cloud-based integration platform-as-a-service paas specialized workflow automation business application development fujitsu launched cloud service k5 offering availability zones currently deployed japan uk deployments progressing across europe cloud service k5 based open-standard technologies consumed public cloud virtual private cloud private cloud fujitsu offers local cloud platforms australia provide ability rely domestic data centers keep sensitive financial data local jurisdiction compliance standards fujitsu produces sparc-compliant cpu sparclite venus 128 gflop sparc64 viiifx model included k computer world fastest supercomputer june 2011 rating 8 petaflops november 2011 k became first computer top 10 petaflops september 2011 fujitsu fr fr-v arm architecture microprocessors widely used additionally asics application-specific standard products assp like milbeaut customer variants named nikon expeed acquired spansion 2013 old slogan possibilities infinite found company logo major advertisements ties small logo letters j word fujitsu smaller logo represents symbol infinity april 2010 fujitsu process rolling new slogan focused entering partnerships customers retiring possibilities infinite tagline new slogan shaping tomorrow fujitsu reports notebook tablet pcs released globally comply latest energy star standard greenpeace cool leaderboard february 2012 evaluates global companies leadership fight stop climate change ranks fujitsu 3rd 21 leading manufacturers strength well-developed case study data solutions transparent methodology standing leaderboard scoring high future savings goal criterion
[ 11271, 3594, 8714, 5137, 530, 7702, 10273, 36, 4132, 9766, 8237, 10288, 7218, 3123, 10802, 10303, 8772, 4679, 4172, 8268, 7246, 7248, 597, 10837, 8792, 6748, 1638, 8301, 1141, 630, 127, 2689, 2179, 6276, 9351, 9863, 6282, 11405, 8863, 681...
None
9,138
9
EGL_(programming_language):egl programming language egl enterprise generation language originally developed ibm available edt egl development tools open source project eclipse public license epl programming technology designed meet challenges modern multi-platform application development providing common language programming model across languages frameworks runtime platforms language borrows concepts familiar anyone using statically typed languages like java cobol c etc however borrows concept stereotype unified modeling language uml typically found statically typed programming languages nutshell egl higher-level universal application development language egl similar syntax common languages learned application developers similar previous programming background egl application development abstractions shield programmers technical interfaces systems middleware allowing focus building business functionality egl applications services written tested debugged egl source level satisfactorily functionally tested compiled cobol java javascript code support deployment business applications run following environments egl program part generatable logic part one entry point program part contains main function represents logic runs program start program include functions access functions outside program function main invoke functions program functions composed set egl statements variables constants egl record part defines set data elements example record name customerrecord defined 6 fields egl specialized type record called sqlrecord used exchange data relational database egl service part contains public functions meant accessed applications systems example service two functions defined main component rich ui application rich ui handler part parts generated javascript december 2008 ibm introduced new technology egl rich ui simplify creation web 2.0-style rich internet applications technology simplifies development hiding complexities ajax javascript rest soap developer enables focus business requirement underlying technologies egl programming tools available eclipse-based commercial product rational business developer also egl edition rational developer system z. egl target language modernization legacy applications language semantics affinity procedural languages legacy 4th generation languages tools searching large egl code bases comparing individual egl files changes detecting duplicated code available semantic designs
[ 6850, 3462, 1802, 10474, 5677, 6797, 5872, 11024, 1363, 1235, 5078, 823, 2168, 10486, 2045, 3966 ]
Test
9,139
2
IBM_DPPX:ibm dppx distributed processing programming executive discontinued operating system introduced ibm pre-installed ibm 8100 later ported es/9370 dppx written programming language distributed systems pl/ds pl/i-derived systems programming language similar pl/s systems programming language used mvs vm part dppx/370 development process developing pl/ds 2 language based pl/ds changes necessitated changed instruction set pl/ds like pl/s high-level language encourages significant use inline assembly user interfaces e.g. command line dppx clean easy use syntax commands whole concept ideas dppx looked straightforward consistent command line online help etc every aspect documented online rich set well organized printed manuals dppx system could operated truly operator-less remote hence distributed part name one benefit clean design programs could written modern dialects cobol dialogs could developed interactively addition expected functions operating system dppx included several functions allowed remote administration distributed host command facility dhcf allowed host command facility hcf user mainframe log either full-screen mode line mode execute commands though logged locally distributed systems network node executive dsnx allowed distributed systems executive dsx later netview/dm job manage files separate additional products also available including cobol fortran compilers distributed transaction management system dtms command facilities extensions cfe provided easy support full-screen applications data stream capability dsc allow dppx users log applications mainframe performance tool pt
[ 2179, 4996, 6148, 10883, 7053, 9619, 11673, 2168, 6557, 3359, 10273, 6442, 7983, 7217, 6325, 8502, 573, 1219, 964, 6342, 8262, 863, 3938, 5603, 868, 3429, 5220, 6503, 9829, 375, 3960, 3323, 2172, 2813 ]
None
9,140
2
Application_Packaging_Standard:application packaging standard application packaging standard aps standard defines technology integrating application software hosting platforms integration application hosting platforms implemented creating aps package application aps package deployment creates aps application aps involves three types participants integration process aps went two stages aps 1 emerged way creating predominantly two types aps packages respectively two types aps applications aps 2 added flexibility integrate applications hosting platforms also aps 2 makes possible create custom user interface hosting platforms managing integrated applications following web hosting platforms allow installations aps packages aps packages available download application catalog isvs make applications publicly available uploading catalog
[ 467, 4309 ]
None
9,141
2
Coherent_(operating_system):coherent operating system coherent clone unix operating system ibm pc compatibles microcomputers developed sold now-defunct mark williams company mwc historically operating system proprietary product became open source 2015 released 3-clause bsd license coherent unix mark williams company rights either unix trademark t/bell labs source code early years existence mwc received visit delegation looking determine whether mwc infringing unix property delegation included dennis ritchie concluded hard believe coherent basic applications created without considerable study os code details applications however also stated much operating system written alumni university waterloo tom duff dave conroy randall howard johann george trevor john thompson significant contributions also made people nigel bree auckland new zealand later author ghost coherent originally written pdp-11 range minicomputers 1980 ported various early 1980s microcomputer systems including ibm pc compatibles machines based zilog z8000 motorola 68000 initially sold oems starting 1983 available consumer market mwc directly point coherent 2.3 offered roughly functionality version 7 unix pc hardware including nroff formatter bsd extensions offered competing unix/clone vendors compared competitors small system distributed seven double-sided floppy disks costing us 500 license byte 1984 called coherent highly compatible unix version 7 lookalike 1985 criticized difficulty installation stated unix clone coherent amazingly complete ... easy port programs ... price 495 bargain early 1990s reviews coherent pointed system much smaller contemporary unix offerings well less expensive us 99.95 lacking functionality software support pc magazine called coherent 3.0 time capsule captured state unix late 1970s without support mice lans scsi disks good learning basic unix programming business automation review auug newsletter positive favorably comparing coherent mks toolkit minix xenix suggesting might fill niche low-end training platform coherent able run intel-based pcs intel 8088 286 386 486 processors coherent version 3 intel-based pcs required least 286 coherent version 4 intel-based pcs required least 386 like true unix coherent able multitask support multiple users version 4 released 1992 coherent also support x11 mgr windowing systems later versions coherent version 4 higher supported features common modern unix-like systems including version microemacs access dos fat16 file systems optimizing c compiler modified version taylor uucp final releases coherent also fully supported ibcs coff binary standard allowed binary compatibility sco unix applications including wordperfect lotus 1-2-3 several microsoft applications including quickbasic microsoft word multiplan last 386 versions supported virtual memory demand paging zilog z8000 port coherent also used canceled commodore 900 system 1983 ncsc subsidiary nixdorf announced port coherent ibm mainframes form unix compatibility subsystem ibm dos/vs dos/vse nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short mark williams company closed 1995 january 3 2015 coherent sources released 3-clause bsd license
[ 2560, 7682, 6675, 8725, 1561, 9762, 7224, 9784, 2120, 6218, 2132, 86, 11363, 7269, 6760, 9320, 5236, 633, 3197, 640, 2179, 132, 6787, 6297, 671, 7848, 3241, 3248, 10436, 1247, 6369, 9444, 10469, 11501, 5363, 9972, 2301, 11013, 6412, 787, ...
Test
9,142
4
Ntop:ntop ntop stylized ntop computer software probes computer network show network use way similar program top processes interactive mode displays network status user terminal web mode acts web server creating html dump network status supports netflow-sflow emitter-collector hypertext transfer protocol http based client interface creating ntop-centric monitoring applications rrdtool rrd persistently storing traffic statistics ntop available unix win32-based platforms developed luca deri italian research scientist network manager university pisa common usage linux system start ntop daemon /etc/init.d/ntopd start one use web interface ntop via visiting nowiki http //127.0.0.1:3000 /nowiki provided loopback device started /etc/init.d/net.lo start listening port ntop 3000 look -w option ps aux grep ntop
[ 225, 10788, 4423, 4797, 9544, 1580, 5612, 6797, 10417, 5492, 823, 4762, 2045 ]
None
9,143
1
Lossless-Join_Decomposition:lossless-join decomposition computer science concept lossless-join decomposition central removing redundancy safely databases preserving original data also called nonadditive decompose relation formula_1 relations formula_2 lossless-join natural join two smaller relations yields back original relation .e formula_3 formula_1 split formula_5 formula_6 decomposition lossless least one two following criteria met projecting formula_5 formula_6 joining back results relation started let formula_1 relation schema let set functional dependencies formula_1 let formula_5 formula_6 form decomposition formula_1 decomposition lossless-join decomposition formula_1 least one following functional dependencies stands closure every attribute attribute sets
[ 4281, 2901 ]
Test
9,144
9
Lucee:lucee lucee open source software implements lightweight dynamically-typed scripting language java virtual machine jvm facilitating rapid development web applications compile directly java bytecode lucee compatible contemporary cfml script tag language variants provides configurable support legacy cfml lucee language supports multiple development paradigms including object orientation inheritance interfaces functional constructs like higher-order functions closures codice_1 codice_2 lucee created lucee association switzerland forked version 4.2 railo server developed lucee built-in support microsoft sql server mysql oracle postgresql many popular relational database engines lucee also supports database jdbc driver available lucee built-in support calling consuming data returned existing web services along ability easily configure expose web services consumed lucee supports three types web services lucee built-in support object relational mapping orm framework hibernate facilitating hibernate usage lucee code without complex explicit configuration lucee built-in support multiple caching systems including infinispan ehcache memcached extended additional systems cache implementations configured within lucee server used within application—both explicitly implicitly—for caching database results function call results external http request results serialized session storage flexible backing store in-process ram-based file-system abstraction lucee supports multiple virtual file systems—built-in abstractions various local remote resources—including zip http ftp s3 ram allow lucee server developer treat access abstracted resource manner local file system lucee derived coldfusion markup language cfml therefore support tag-based script-based versions cfml examples assign string hello world value variable codice_3 output value response buffer typically display web browser lucee project led lucee association switzerland non-profit swiss association association consists members help fund guide project project also enterprise corporate individual supporters supporters members lucee association help fund promote project exchange certain benefits
[ 2946, 6277, 3469, 9618, 148, 11030, 4507, 4512, 6819, 8739, 10020, 5677, 11693, 7983, 4529, 7862, 3895, 5048, 2234, 7100, 11201, 5314, 9666, 7364, 9286, 6860, 8539, 10340, 102, 7274, 7022, 5872, 10994, 10486, 9467 ]
Validation
9,145
4
Cyber_insurance:cyber insurance cyber-insurance insurance product used protect businesses individual users internet-based risks generally risks relating information technology infrastructure activities risks nature typically excluded traditional commercial general liability policies least specifically defined traditional insurance products coverage provided cyber-insurance policies may include first-party coverage losses data destruction extortion theft hacking denial service attacks liability coverage indemnifying companies losses others caused example errors omissions failure safeguard data defamation benefits including regular security-audit post-incident public relations investigative expenses criminal reward funds cyber-insurance market many countries relatively small compared insurance products overall impact emerging cyber threats difficult quantify impact people businesses cyber threats also relatively broad compared scope protection provided insurance products insurance companies continue develop services insurers pay cyber-losses cyber threats develop change insurance products increasingly purchased alongside existing security services indeed underwriting criteria insurers offer cyber-insurance products also early development underwriters actively partnering security companies develop products well directly improving security cyber-insurance enormously beneficial event large-scale security breach insurance provides smooth funding mechanism recovery major losses helping businesses return normal reducing need government assistance finally insurance allows cyber-security risks distributed fairly cost premiums commensurate size expected loss risks avoids potentially dangerous concentrations risk also preventing free-riding information technology inherent facet virtually modern businesses requirement separate product exists deliberate scoping exercise excluded theft damage associated modern technologies existing product lines bruce schneier postulated existing insurance practices tend follow either flood fire model however cyber events n't appear modeled either event types led situation scope cyber insurance restricted decrease risk underwriters compounding paucity data relating actual damage correlated type event lack standards associated classification events lack evidence associated efficacy industry best practices insurance relies upon sound actuarial data largely static background risk given n't exist present unlikely either buyers products achieve value outcomes desire.this view market reflected current market state standard exclusions result situation insurer could argue apply almost data breach early works 1990s focused general merits cyber-insurance protocols borrowed digital cash enable risk reallocation distributed systems late 1990s business perspective information security became prominent visions cyber-insurance risk management tool formulated although roots 1980s looked promising battered events y2k 9/11 attacks market cyber-insurance failed thrive remained niche unusual demands coverage tightly limited clients include smbs small medium businesses need insurance qualify tenders community banks small hedge risks online banking operations first least one first cyber liability policies call developed lloyd london market 2000 policy spearheaded keith daniels rob hamesfahr attorneys chicago il law firm blatt hammesfahr eaton working closely ian hacker lloyd underwriter ted doolittle kinsey carpenter brokers kinsey carpenter san francisco ca insurance broker policy provided third-party coverage along business interruption coverage early days thought big risk would company negligently transmit virus could infect companies systems would bring suit original company well business interruption policy one first well include first-party third-party coverages form errors omissions likely happened suits organizations basis proven rare focus forms developed since 2000 business interruption payment fines penalties credit monitoring costs public relations costs cost restoring rebuilding private data continue expand evolve today addition technology errors omissions policies sold third-party coverage organizations programmers technology installers could get sued advice product fails satisfactory clients early entrants cyber market included american international group aig chubb today 80 companies competing cyber market even 2002 conservative forecast predicted global market cyber-insurance worth 2.5 billion 2005 turned five times higher size market 2008 overall relative terms market cyber-insurance shrank internet economy grew practice number obstacles prevented market cyber-insurance achieving maturity absence reliable actuarial data compute insurance premiums lack awareness among decision-makers contributing little demand well legal procedural hurdles identified first generation cyber-insurance literature 2005 latter aspect may cause frustration claiming compensation damages furthermore entities considering cyber-insurance must undergo series often invasive security evaluation procedures revealing infrastructures policies meanwhile witnessing thousands vulnerabilities millions attacks substantial improvement defining security standards computer forensics calls question validity factors causally explain lack insurance market infrastructure users services offered computer networks today subject wide variety risks posed threats include distributed denial service attacks intrusions various kinds eavesdropping hacking phishing worms viruses spams etc order counter risk posed threats network users traditionally resorted antivirus anti-spam software firewalls intrusion-detection systems idss add-ons reduce likelihood affected threats practice large industry companies like symantec mcafee etc well considerable research efforts currently centered around developing deploying tools techniques detect threats anomalies order protect cyber infrastructure users resulting negative impact anomalies spite improvements risk protection techniques last decade due hardware software cryptographic methodologies impossible achieve perfect/near-perfect cyber-security protection impossibility arises due number reasons view above-mentioned inevitable barriers near 100 risk mitigation need arises alternative methods risk management cyberspace highlight importance improving current state cyber-security us president barack obama issued cyber-security executive order february 2013 emphasizes need reduce cyber-threats resilient regard security researchers recent past identified cyber-insurance potential tool effective risk management cyber-insurance risk management technique via network user risks transferred insurance company return fee i.e. insurance premium examples potential cyber-insurers might include isp cloud provider traditional insurance organizations proponents cyber-insurance believe cyber-insurance would lead design insurance contracts would shift appropriate amounts self-defense liability clients thereby making cyberspace robust term ‘ self-defense implies efforts network user secure system technical solutions anti-virus anti-spam software firewalls using secure operating systems etc cyber-insurance also potential market solution align economic incentives cyber-insurers users individuals/organizations policy makers security software vendors i.e. cyber-insurers earn profit appropriately pricing premiums network users seek hedge potential losses jointly buying insurance investing self-defense mechanisms policy makers would ensure increase overall network security security software vendors could experience increase product sales via forming alliances cyber-insurers key area manage risk establish acceptable risk organization practicing 'duty care helps protect interested parties executives regulators judges public affected risks duty care risk analysis standard docra provides practices principles help balance compliance security business objectives developing security controls consequently 2005 “ second generation cyber-insurance literature emerged targeting risk management current cyber-networks authors literature link market failure fundamental properties information technology specially correlated risk information asymmetries insurers insureds inter-dependencies information asymmetry significant negative effect insurance environments typical considerations include inability distinguish users different high low risk types i.e. so-called adverse selection problem well users undertaking actions adversely affect loss probabilities insurance contract signed i.e. so-called moral hazard problem challenge due interdependent correlated nature cyber-risks particular cyber-insurance differentiates traditional insurance scenarios e.g. car health insurance former large distributed system internet risks span large set nodes correlated thus user investments security counter risks generate positive externalities users network aim cyber-insurance enable individual users internalize externalities network user optimally invests security solutions thereby alleviating moral hazard improving network security traditional insurance scenarios risk span quite small sometimes spans one two entities uncorrelated thus internalizing externalities generated user investments safety much easier like insurance policies cyber insurance typically includes war exclusion clause explicitly excluding damage acts war majority cyber insurance claims relate simple criminal behaviour increasingly companies likely fall victim cyberwarfare attacks nation states terrorist organisations whether specifically targeted simply collateral damage us uk governments characterised notpetya attack russian military cyber-attack insurers arguing cover events current work regarding existence cyber-insurance markets among important ones works lelarge bolot ii pal golubchik psounis hui iii johnson et al. iv shetty et al works first comment free riding behavior internet users without presence cyber-insurance works lelarge et al shetty et al present benefits cyber-insurance incentivizing internet users invest appropriately security however works address restricted market types lelarge et al model information asymmetry work shetty et al prove cyber-insurance markets inefficient conditions information asymmetry johnson et al discuss role joint existence self-insurance market insurance adoption different types insurance users recent work pal et al prove inefficiency cyber-insurance markets conditions partial information asymmetry correlated risks show existence efficient markets regulated unregulated premium discrimination 2014 90 cyber-insurance premium volume covering exposure united states although least 50 insurance companies cyber-insurance product offerings actual writing concentrated within group five underwriters many insurance companies hesitant enter coverage market sound actuarial data cyber exposure non-existent hampering development actuarial data inadequate disclosure regarding cyber attacks affected significant malware incident 2017 however reckitt benckiser released information much cyberattack would impact financial performance leading analysts believe trend companies transparent data cyber incidents cyber insurance premiums expected grow around 2 billion 2015 estimated 20 billion 2025 insurers reinsurers continuing refine underwriting requirements market immaturity lack standardization two reasons underwriting cyber products today make interesting place insurance world insurance marketplace ’ trying reach standard accommodate needs today ’ insured also time rapidly developing exposure landscape capacity available
[ 2213, 2558, 8998, 9319, 10309, 6762, 2926, 9688, 2041, 7739, 4956, 5245, 2750 ]
None
9,146
5
TCP/IP_stack_fingerprinting:tcp/ip stack fingerprinting tcp/ip stack fingerprinting passive collection configuration attributes remote device standard layer 4 network communications combination parameters may used infer remote machine operating system aka os fingerprinting incorporated device fingerprint certain parameters within tcp protocol definition left implementation different operating systems different versions operating system set different defaults values collecting examining values one may differentiate among various operating systems implementations tcp/ip tcp/ip fields may vary include following values may combined form 67-bit signature fingerprint target machine inspecting initial ttl window size fields often enough order successfully identify operating system eases task performing manual os fingerprinting protection fingerprint doorway attack achieved limiting type amount traffic defensive system responds examples include blocking address masks timestamps outgoing icmp control-message traffic blocking icmp echo replies security tool alert potential fingerprinting match another machine fingerprinter configuration detecting fingerprint disallowing tcp/ip fingerprinting provides protection vulnerability scanners looking target machines running certain operating system fingerprinting facilitates attacks blocking icmp messages one array defenses required full protection attacks targeting icmp datagram obfuscator running top ip internet layer acts scrubbing tool confuse tcp/ip fingerprinting data exist ms windows linux freebsd list tcp/os fingerprinting tools
[ 3872, 3486, 2084, 6345, 11434, 684, 10924, 7031, 5490, 2739, 1429, 4085, 823, 11319, 5402, 3006 ]
Test
9,147
1
Associative_model_of_data:associative model data associative model data data model database systems data models relational model object data model record-based models involve encompassing attributes thing car record structure attributes might registration colour make model etc associative model everything “ discrete independent existence ” modeled entity relationships modeled associations granularity data represented similar schemes presented chen entity-relationship model bracchi paolini pelagatti binary relations senko entity set model number claims made model simon williams book associative model data distinguish associative model traditional models associative database management system data metadata data data stored two types things associative model would use two structures store piece information flight ba1234 arrived london heathrow 12-dec-05 10:25 seven items four nouns flight ba1234 london heathrow 12-dec-05 10:25 three verbs arrived three links needed store data first link flight ba1234 source arrived verb london heathrow target second link first link source verb item 12-dec-05 target link begins ellipsis ... previous link source third link second link source verb 10:25 target alternative way write thing using parentheses associative database may regarded comprising two tables one items one links item link arbitrary number called surrogate identifier
[ 2688, 5632, 8201, 9631, 1697, 9397, 4155, 7868, 11324, 2369, 11457, 6085, 2512, 2901, 7767, 11098, 7650, 8291, 9828, 10471, 1146, 6395, 3196 ]
Test
9,148
2
Georg_C._F._Greve:georg c. f. greve georg c. f. greve born 10 march 1973 helgoland germany software developer physicist author currently co-founder president vereign working technology politics since founded free software foundation europe fsfe 2001 greve working full-time president fsfe since early 2001 june 2009 handed presidency fsfe karsten gerloff responsibilities fsfe included coordination general assembly supporting local representatives work working political legal issues well projects giving speeches informing journalists spread knowledge free software addition georg greve also worked consultant representing google ooxml standardisation process iso project reviewer european commission greve married currently lives switzerland 2010 greve awarded cross merit ribbon federal republic germany verdienstkreuz bande greve degree physics biophysics physical oceanography astronomy minor fields study computer science department university hamburg interdisciplinary diploma thesis written field nanotechnology scanning probe microscopy greve first software development 12 years old first publication program professional journal 1992 partly financed studies managed software development evaluate squid-sensor data biomagnetometic laboratory university medical center hamburg-eppendorf hamburg germany 1993 came across free software gnu project linux 1998 european speaker gnu project began writing brave gnu world monthly column free computer software featuring interesting gnu projects month published internet many ten languages international printed magazines including german linux-magazin name brave gnu world reference aldous huxley novel brave new world early 2001 initiated free software foundation europe fsfe fsf europe first free software foundation outside united states america transnational free software foundation greve invited expert “ commission intellectual property rights ” uk government represented coordination circle german civil society first phase united nations un world summit information society wsis part german governmental delegation also networked civil society working groups european level well thematic working group patents copyrights trademarks pct free software 2010 2017 served ceo well president later member board kolab systems ag küsnacht switzerland developers kolab server late 2017 greve known advocate open source co-founded company called vereign enable authentic communication blockchain federated networks claus h. bressmer
[ 2050, 1028, 2180, 4230, 11654, 9865, 4493, 1939, 2332, 10012, 3744, 802, 3618, 4265, 11180, 6962, 5555, 823, 2233, 10687, 8258, 10822, 5703, 5833, 4561, 8147, 1112, 3674, 2010, 7904, 8673, 9696, 10464, 3817, 9579, 1007, 8304, 1394, 8436, ...
Test
9,149
0
Mindnet:mindnet mindnet name several automatically acquired databases lexico-semantic relations developed members natural language processing group microsoft research 1990s considered one world largest lexicons databases could make automatic semantic descriptions along wordnet framenet hownet integrated linguistic database particularly distinguished wordnet way created automatically dictionary mindnet designed continuously extended first built longman dictionary contemporary english ldoce later included american heritage full text microsoft encarta system analyze linguistic representations arbitrary text underlying technology based parser used microsoft word grammar checker deployed natural language query engine microsoft encarta 99 encyclopedia
[ 416, 5639 ]
Test
9,150
8
Cwm_(software):cwm software cwm pronounced koom general-purpose data processing software semantic web similar sed awk text files xslt xml forward chaining semantic reasoner used querying checking transforming filtering information core language rdf extended include rules use rdf/xml rdf/n3 see notation3 primer serializations cwm perform following tasks cwm written python 2000-10 onwards tim berners-lee dan connolly w3c
[ 5632, 9223, 9735, 8554, 10452, 502, 479 ]
None
9,151
2
Berkeley_Software_Distribution:berkeley software distribution berkeley software distribution bsd operating system based research unix developed distributed computer systems research group csrg university california berkeley today bsd often refers descendants freebsd openbsd netbsd dragonfly bsd bsd initially called berkeley unix based source code original unix developed bell labs 1980s bsd widely adopted workstation vendors form proprietary unix variants dec ultrix sun microsystems sunos due permissive licensing familiarity many technology company founders engineers although proprietary bsd derivatives largely superseded 1990s unix svr4 osf/1 later releases provided basis several open-source operating systems including freebsd openbsd netbsd dragonfly bsd darwin trueos turn used proprietary operating systems including apple macos ios derived microsoft windows used part tcp/ip code earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd 4.3bsd released june 1986 determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability addition portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd used proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained permissive nature bsd license allowed many operating systems open-source proprietary incorporate bsd source code example microsoft windows used bsd code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 darwin basis apple macos ios based 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also incorporate bsd code starting 8th edition versions research unix bell labs close relationship bsd began 4.1cbsd vax used basis research unix 8th edition continued subsequent versions 9th edition incorporated source code improvements 4.3bsd result later versions research unix closer bsd system v. usenet posting 2000 dennis ritchie described relationship bsd research unix eric s. raymond summarizes longstanding relationship system v bsd stating divide roughly longhairs shorthairs programmers technical people tended line berkeley bsd business-oriented types system v. 1989 david a. curry wrote differences bsd system v. characterized system v often regarded standard unix however described bsd popular among university government computer centers due advanced features performance berkeley unix first unix include libraries supporting internet protocol stacks berkeley sockets unix implementation ip predecessor arpanet ncp ftp telnet clients produced university illinois 1975 available berkeley however memory scarcity pdp-11 forced complicated design performance problems integrating sockets unix operating system file descriptors became almost easy read write data across network access disk laboratory eventually released streams library incorporated much functionality software stack different architecture wide distribution existing sockets library reduced impact new api early versions bsd used form sun microsystems sunos founding first wave popular unix workstations bsd operating systems run much native software several operating systems architecture using binary compatibility layer much simpler faster emulation allows instance applications intended linux run effectively full speed makes bsds suitable server environments also workstation ones given increasing availability commercial closed-source software linux also allows administrators migrate legacy commercial applications may supported commercial unix variants modern operating system retaining functionality applications replaced better alternative current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system several operating systems based bsd including freebsd openbsd netbsd midnightbsd dragonfly bsd netbsd freebsd created 1993 initially derived 386bsd also known jolix merged 4.4bsd-lite source code 1994 openbsd forked netbsd 1995 dragonfly bsd forked freebsd 2003 bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix nextstep later became foundation apple inc. macos
[ 6155, 2061, 2062, 19, 8213, 25, 6180, 8243, 10292, 2109, 8262, 2120, 6218, 6221, 10318, 2132, 10333, 97, 8298, 10346, 2168, 8316, 2179, 132, 2180, 10382, 2197, 6296, 2201, 178, 6329, 190, 8388, 10436, 2248, 4296, 8395, 2253, 6361, 8410, ...
Test
9,152
9
SpiderMonkey:spidermonkey spidermonkey code name first javascript engine written brendan eich netscape communications later released open-source currently maintained mozilla foundation eich wrote javascript ten days 1995 recruited netscape promise 'doing scheme browser idea using scheme abandoned engineering management decided language must ‘ look like java ’ fall 1996 eich needing pay substantial technical debt left first year stayed home two weeks rewrite mocha codebase became known spidermonkey mocha original working name language name spidermonkey may chosen reference movie beavis butt-head america character tom anderson mentions title characters whacking like couple spider monkeys 2011 eich transferred management spidermonkey code dave mandelin spidermonkey implements ecma-262 edition 5.1 ecmascript several added features ecma-357 ecmascript xml e4x dropped early 2013 even though spidermonkey used firefox provide host environments document object model dom mozilla projects support dom gecko provides host environment spidermonkey written c/c++ contains interpreter ionmonkey jit compiler garbage collector tracemonkey first jit compiler written javascript language compiler first released part spidermonkey firefox 3.5 providing performance improvements ranging 20 40 times faster baseline interpreter firefox 3 instead compiling whole functions tracemonkey tracing jit operates recording control flow data types interpreter execution data informed construction trace trees highly specialized paths native code improvements jägermonkey eventually made tracemonkey obsolete especially development spidermonkey type inference engine tracemonkey absent spidermonkey firefox 11 onward jägermonkey internally named methodjit whole-method jit compiler designed improve performance cases tracemonkey could generate stable native code first released firefox 4 eventually entirely supplanted tracemonkey replaced ionmonkey jägermonkey operated differently compilers class typical compilers worked constructing optimizing control flow graph representing function jägermonkey instead operated iterating linearly forward spidermonkey bytecode internal function representation although prohibits optimizations require instruction reordering jägermonkey compiling advantage fast useful javascript since recompiling due changing variable types frequent mozilla implemented number critical optimizations jägermonkey importantly polymorphic inline caches type inference difference tracemonkey jägermonkey jit techniques need explained hacks.mozilla.org article in-depth explanation technical details provided chris leary one spidermonkey developers blog post technical information found developer blogs dvander dmandelin ionmonkey name mozilla current javascript jit compiler aims enable many new optimizations impossible prior jägermonkey architecture ionmonkey traditional compiler translates spidermonkey bytecode control flow graph using static single assignment form ssa intermediate representation architecture enables well-known optimizations programming languages used javascript including type specialization function inlining linear-scan register allocation dead code elimination loop-invariant code motion compiler emit fast native code translations javascript functions arm x86 x86-64 platforms default engine since firefox 18 odinmonkey name mozilla new optimization module asm.js easily compilable subset javascript odinmonkey jit compiler uses current jit compiler included firefox release 22 spidermonkey intended embedded applications provide host environments javascript incomplete list follows spidermonkey includes javascript shell interactive javascript development command-line invocation javascript program files
[ 9736, 19, 9757, 31, 9281, 7234, 4171, 84, 6231, 603, 1632, 5219, 10860, 9843, 4728, 637, 1664, 6791, 8854, 11418, 1713, 3761, 7861, 11449, 5311, 7871, 7889, 4822, 7396, 5356, 9964, 10991, 8443, 2304, 259, 5380, 10507, 3854, 1295, 7439, ...
Validation
9,153
2
BSD_Daemon:bsd daemon bsd daemon nicknamed beastie generic mascot bsd operating systems bsd daemon named software daemons class long-running computer programs unix-like operating systems play words takes cartoon shape demon bsd daemon nickname beastie slurred phonetic pronunciation bsd beastie customarily carries trident symbolize software daemon forking processes freebsd web site noted evi nemeth 1988 remarks cultural-historical daemons unix system administration handbook ancient greeks concept 'personal daemon similar modern concept 'guardian angel ... rule unix systems seem infested daemons demons copyright official bsd daemon images held marshall kirk mckusick early bsd developer worked bill joy freely licensed mascot individual personal use within bounds good taste example bad taste picture bsd daemon blowtorching solaris logo use requires copyright notice attribution reproduction daemon quantity t-shirts cdroms requires advance permission mckusick restricts use implementations bsd company logo although companies bsd-based products scotgold wind river systems gotten kind permission mckusick said early 1990s almost lost daemon certain large company failed show due diligence protecting 've taken due diligence seriously since request use license creative commons mckusick replied prefer bsd daemon used context bsd software reason carefully control copyright bsd daemon image ensure image used inappropriately agreed allow small image appear wikipedia larger ones also going put creative commons copyright bsd daemon first drawn 1976 comic artist phil foglio developer mike o'brien working bonded locksmith time opened wall safe foglio chicago apartment roommate split town without leaving combination return foglio agreed draw t-shirt artwork o'brien gave polaroid snaps pdp-11 system running unix along notions visual puns pipes demons/daemons forks bit bucket named /dev/null etc foglio drawing showed four happy little red daemon characters carrying tridents climbing falling water pipes front caricature pdp-11 used first national unix meeting us held urbana illinois bell labs bought dozens t-shirts featuring drawing subsequently appeared unix t-shirts decade usenix purchased reproduction rights foglio artwork 1986 original drawing apparently lost shortly sent digital equipment corporation use advertisement known copies photographs surviving t-shirts later popular versions bsd daemon drawn animation director john lasseter beginning early greyscale drawing cover unix system manager manual published 1984 usenix 4.2bsd author/editor sam leffler technical staff member csrg lasseter employees lucasfilm time four years lasseter drew widely known take bsd daemon cover mckusick co-authored 1988 book design implementation 4.3bsd operating system lasseter drew somewhat lesser-known running bsd daemon 4.4bsd version book 1994 1994 2004 netbsd project used artwork shawn mueller logo featuring four bsd daemons pose similar famous photo raising flag iwo jima however logo seen inappropriate international project superseded abstract flag logo chosen 400 entries competition early versions openbsd 2.3 2.4 used bsd daemon halo briefly used daemon police officer version 2.5 however openbsd switched puffy blowfish mascot freebsd project used 1988 lasseter drawing logo mascot 12 years however questions arose graphic effectiveness logo daemon unique freebsd since historically used bsd variants members freebsd core team considered inappropriate corporate marketing purposes lithographically scanned lasseter drawing line art however drawn neither scaled easily wide range sizes rendered appealingly two three colours contest create new freebsd logo began february 2005 scalable graphic somewhat echoes bsd daemon head chosen following october although little red fellow kept official project mascot walnut creek cdrom also produced two variations daemon cdrom covers freebsd 1.0 1.1 cdrom covers used 1988 lasseter drawing freebsd 2.0 cdrom used variant different colored specifically green tennis shoes distributions used image different colored tennis shoes years starting freebsd 2.0.5 walnut creek cdrom covers used daemon walking cdrom starting freebsd 4.5 freebsd mall used mirrored image walnut creek 2.0 image walnut creek 2.0 image also appeared cover different freebsd handbook editions mid-1990s marketer walnut creek cdrom called mascot chuck perhaps referring brand name kind shoes worn character name strongly deprecated copyright holder said bsd daemon proud fact name bsd daemon insist name call beastie ascii art image bsd daemon felix lee appeared startup menu freebsd version 5.x still set startup image later versions also used daemon_saver screensaver
[ 7552, 5506, 1927, 4745, 10761, 2061, 9743, 5397, 7702, 8725, 5534, 1316, 11689, 684, 4908, 1839, 7983, 1718, 823, 1080, 9151, 3651, 7748, 10436, 4423, 9927, 8395, 2253, 850, 6361, 9306, 10202, 3551, 607, 8671, 9320, 873, 9452, 633, 8316, ...
Validation
9,154
4
Lethic_botnet:lethic botnet lethic botnet initially discovered around 2008 botnet consisting estimated 210 000 310 000 individual machines mainly involved pharmaceutical replica spam around early january 2010 botnet dismantled neustar employees contacted various lethic internet service providers bid take control botnet command control servers move temporarily caused botnets spam decrease trickle original volume february 2010 owners botnet managed re-establish control botnet use new command control servers located united states takedown decreased spam volume botnet however february 2010 botnets amount spam third original april 2010 botnet estimated 1.5 share spam market sending 2 billion spam messages day
[ 3072, 10756, 3724, 3347, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 10297, 3643, 7739, 7996, 11583, 9664, 8133, 10952, 2508, 81, 8789, 10457, 7515, 988, 3807, 8032, 3941, 10477, 4462, 2041, 10875, 3581, 5886, 9087 ]
Validation
9,155
3
List_of_devices_using_Mediatek_SoCs:list devices using mediatek socs page lists every major device using mediatek system-on-a-chip soc organized chip devices uses based 32-bit arm7ej-s risc processor smartwatches mt6223c direct support cif camera based 32-bit arm7ej-s risc processor mt6238 support 3mp camera soc support java applications midp-2.1 cldc-1.1 instruction sets mediatek first soc compatible 3g networks smartwatches smartwatches
[ 7170, 8720, 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 8250, 8253, 7745, 7235, 7747, 2635, 99, 8812, 11374, 10361, 638, 644, 8842, 146, 659, 1170, 7833, 666, 5786, 7835, 4258, 4773, 9913, 7869, 8383, 10945, 9928, 4305, 2788, 3301, ...
Test
9,156
4
Known-plaintext_attack:known-plaintext attack known-plaintext attack kpa attack model cryptanalysis attacker access plaintext called crib encrypted version ciphertext used reveal secret information secret keys code books term crib originated bletchley park british world war ii decryption operation usage crib adapted slang term referring cheating e.g. cribbed answer test paper crib originally literal interlinear translation foreign-language text—usually latin greek text—that students might assigned translate original language idea behind crib cryptologists looking incomprehensible ciphertext clue word phrase might expected ciphertext would wedge test break otherwise random attacks cipher managed sometimes produce words preferably phrases would know might right track words phrases appeared would feed settings used reveal back whole encrypted message good effect case enigma german high command meticulous overall security enigma system understood possible problem cribs day-to-day operators hand less careful bletchley park team would guess plaintext based upon message sent recognizing routine operational messages instance daily weather report transmitted germans time every day due regimented style military reports would contain word wetter german weather location every message knowing local weather conditions helped bletchley park guess parts plaintext well operators would send standard salutations introductions officer stationed qattara depression consistently reported nothing report heil hitler occurring end message another well-known example bletchley park world war ii strenuous efforts made use even force germans produce messages known plaintext example cribs lacking bletchley park would sometimes ask royal air force seed particular area north sea mines process came known gardening obvious reference enigma messages soon sent would likely contain name area harbour threatened mines germans could accommodating regard whenever turned german double-cross agents sent message written british respective handlers frequently obligingly re-encrypted message word word enigma onward transmission berlin captured german revealed interrogation enigma operators instructed encode numbers spelling alan turing reviewed decrypted messages determined number eins one common string plaintext automated crib process creating eins catalogue assumed eins encoded positions plaintext catalogue included every possible position various rotors starting positions keysettings enigma polish cipher bureau likewise exploited cribs anx method world war ii germans use german followed x spacer form text anx united states britain used one-time tape systems 5-uco sensitive traffic devices immune known-plaintext attack however point-to-point links required massive supplies one time tapes networked cipher machines considered vulnerable cribs various techniques used disguise beginning ends message including cutting messages half sending second part first adding nonsense padding ends latter practice resulted world wonders incident kl-7 introduced mid-1950s first u.s. cipher machine considered safe known-plaintext attack classical ciphers typically vulnerable known-plaintext attack example caesar cipher solved using single letter corresponding plaintext ciphertext decrypt entirely general monoalphabetic substitution cipher needs several character pairs guessing fewer 26 distinct pairs
[ 1797, 2957, 4497, 658, 6164, 1941, 2341, 9381, 3629, 11185, 1970, 4036, 6863, 9556, 8286, 9058, 11241, 1898, 11119, 10997, 7416, 7161, 8318 ]
Validation
9,157
3
Socket_AM2:socket am2 socket am2 renamed socket m2 prevent using name cyrix mii processors cpu socket designed amd desktop processors including performance mainstream value segments released may 23 2006 replacement socket 939 am2 processors incompatible 939 motherboards vice versa although 940 pins incompatible socket 940 socket am2 supports ddr2 sdram memory ddr memory previous socket 939 supported anandtech reported socket am2 system performance 7 faster socket 939 equivalents applications 2 faster despite 30 greater memory bandwidth due ddr2 support first processor cores support socket am2 single-core orleans athlon 64 manila sempron dual-core windsor athlon 64 x2 athlon 64 fx processors socket am2 include sse3 instructions developed 90 nanometer technology later models featured 65 nanometer technology socket am2 also supports newer amd phenom processors originally built socket am2+ backward compatible am2 however depended upon system/motherboard manufacturer supply bios firmware update operate processor socket am2 part amd generation cpu sockets included socket f servers socket s1 mobile computing also single-socket opteron processors available am2 technical documentation readily available earlier generations amd processor sockets am2 processor functional data sheet amd document number 31117 made publicly available 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable multiple sockets announced theory pin-compatible socket am2 differ terms features socket am2+ intermediate successor socket am2 features split power planes hypertransport 3.0 socket am2+ chips plug socket am2 motherboard although certain motherboard manufacturers support operate hypertransport 2.0 socket am3 processors able run socket am2 am2+ motherboards appropriate bios updates vice versa am3 processors new memory controller supporting ddr2 ddr3 sdram allowing backwards compatibility am2 am2+ motherboards since am2 am2+ processors lack new memory controller work am3 motherboards
[ 3586, 8322, 3588, 8452, 9475, 3464, 4872, 7058, 10260, 4246, 3352, 4767, 2463, 7712, 9122, 1322, 11183, 1329, 3892, 8629, 9400, 6978, 11331, 3783, 7247, 9551, 977, 7122, 9427, 4695, 10715, 7132, 2525, 4451, 5859, 1260, 7788, 7151, 1137, 1...
Validation
9,158
3
Adjust_flag:adjust flag adjust flag cpu flag flags register x86-compatible cpus preceding 8080-family also called auxiliary flag auxiliary carry flag ac flag bit located position 4 cpu flag register indicates arithmetic carry borrow generated four least significant bits lower nibble primarily used support binary-coded decimal bcd arithmetic auxiliary flag set 1 add operation carry low nibble lowest four bits high nibble upper four bits borrow high nibble low nibble low-order 8-bit portion subtraction otherwise carry borrow occurs flag cleared reset set 0
[ 11107, 9668, 11499, 3630, 5234, 3699, 499, 602 ]
Validation
9,159
3
Peripheral_pin_controller:peripheral pin controller peripheral pin controller ppc feature intel strong arm processor family enable disable i/o ports also allows user make uses pins normally dedicated peripherals peripheral disabled pins available general purpose use set predetermined alternate uses serial ports 1 4
[ 1776 ]
Test
9,160
4
Automotive_security:automotive security automotive security refers branch computer security focused cyber risks related automotive context increasingly high number ecus vehicles alongside implementation multiple different means communication towards vehicle remote wireless manner led necessity branch cybersecurity dedicated threats associated vehicles confused automotive safety implementation multiple ecus electronic control units inside vehicles began early '70s thanks development integrated circuits microprocessors made economically feasible produce ecus large scale since number ecus increased 100 per vehicle units nowadays control almost everything vehicle simple tasks activating wipers safety-related ones like brake-by-wire abs anti-lock braking system autonomous driving also strongly reliant implementation new complex ecus adas alongside sensors lidars radars control units inside vehicle ecus connected cabled wireless communication networks bus controller area network bus media oriented system transport flexray rf radio frequency many implementations tpmss tire pressure monitoring systems important notice many ecus require data received networks arrive various sensors operate use data modify behavior vehicle e.g. cruise control modifies vehicle speed depending signals arriving button usually located steering wheel since development cheap wireless communication technologies bluetooth lte wi-fi rfid similar automotive producers oems designed ecus implement technologies goal improving experience driver passengers safety-related systems onstar general motors telematic units communication smartphones vehicle speakers bluetooth android auto apple carplay rkes remote keyless entry systems examples vehicle become externally connected devices cases internet furthermore since 2016 development implementation marketed vehicles v2x technologies long- short-range communication interfaces vehicle become considerably bigger although implementation new technologies devices improved safety driving experience vehicle increasingly high number externally-communicating units inside vehicle led increment dimension attack surfaces vehicle electronic control units nowadays capability modifying behavior vehicle necessary ensure attacker capabilities take control critical systems inside vehicle due last ten fifteen years new concept automotive security started become important designing new vehicles threat models automotive world based real-world theoretically possible attacks real-world attacks aim safety people around car modifying cyber-physical capabilities vehicle e.g. steering braking accelerating without requiring actions driver theoretical attacks supposed focus also privacy-related goals obtaining gps data vehicle capturing microphone signals similar regarding attack surfaces vehicle usually divided long-range short-range local attack surfaces lte dsrc considered long-range ones bluetooth wi-fi usually considered short-range although still wireless finally usb obd-ii attack surfaces require physical access car defined local attacker able implement attack long-range surface considered stronger dangerous one requires physical access vehicle 2015 possibility attacks vehicles already market proven possible miller valasek managed disrupt driving jeep cherokee remotely connecting remote wireless communication common network used vehicles one mainly used safety-related communication due real-time properties simplicity cheapness reason majority real-world attacks implemented ecus connected type network majority attacks demonstrated either actual vehicles testbeds fall one following categories sniffing computer security field generally refers possibility intercepting logging packets generally data network case since bus network every node listens communication network useful attacker read data learn behavior nodes network implementing actual attack usually final goal attacker simply sniff data since packets passing type network usually valuable read dos information security usually described attack objective making machine network unavailable dos attacks ecus connected buses done network abusing arbitration protocol used always win arbitration targeting single ecu abusing error handling protocol second case attacker flags messages victim faulty convince victim broken therefore shut network spoofing attacks comprise cases attacker falsifying data sends messages pretending another node network automotive security usually spoofing attacks divided masquerade replay attacks replay attacks defined attacker pretends victim sends sniffed data victim sent previous moment masquerade contrary spoofing attacks data payload created attacker increasing complexity devices networks automotive context requires application security measures limit capabilities potential attacker since early 2000 many different countermeasures proposed cases applied following list common security measures
[ 899, 5636, 10756, 9607, 9356, 9488, 3473, 8978, 7700, 10392, 5373, 5246, 4892, 5404, 8094, 2975, 2084, 2213, 8998, 939, 1453, 3629, 3887, 7855, 9646, 1970, 5433, 7739, 3262, 9791, 4163, 3525, 7368, 5325, 2262, 6360, 9688, 7515, 4956, 9440...
Test
9,161
3
The_Castle_(video_game):castle video game castle computer game released ascii corporation 1986 fm-7 x1 computers later ported msx nec branded personal computers got single console port sg-1000 game set within castle containing 100 rooms contain one puzzles object game navigate castle rescue princess player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block additionally player progress blocked many doors requiring key color unlock key removed player inventory upon use prince must standing platform next door able unlock simply jump fall press door player navigate castle help map obtained early game map provide player matrix 10x10 rooms highlight room princess located rooms visited player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers followed castlequest also known castle excellent japan games notable early examples metroidvania genre
[ 5762, 8371, 10931, 9006 ]
Test
9,162
2
Sintran_III:sintran iii sintran iii real-time multitasking multi-user operating system used norsk data computers 1974 unlike predecessors sintran ii entirely written norsk data sintran iii written nord pl intermediate language norsk data computers sintran primarily command line based operating system though several shells could installed control user environment strictly far popular user-environment one clever features able abbreviate commands filenames hyphens example list-files typed would ask several prompts including print paging etc. could override using following li-fi n would abbreviate list-files command prompt bypass prompts one could also refer files way say ped h-w would refer hello-world symb file h number characters hyphen w number characters file ending saved quite lot keystrokes would allow users nice learning curve complete self-explanatory commands like list-all-files l-a-f advanced user hyphen key norwegian keyboards resides slash key u.s ones sintran mostly disappeared operating system references however job control batch language available called jec believed known job execution controller could used set batch jobs compile cobol programs etc
[ 10883, 6276, 6675, 276, 9366, 7319, 2201, 9628, 2345, 10030, 7983, 6207, 321, 10561, 1221, 8262, 9927, 6985, 341, 10590, 2399, 6624, 5603, 5220, 1253, 1126, 10482, 11383 ]
None
9,163
3
List_of_applications_of_ARM_cores:list applications arm cores list applications arm cores lists products using various arm microprocessor cores sorted generation release name
[ 1537, 7170, 9732, 8720, 11282, 9235, 11289, 1057, 6178, 38, 4139, 8237, 9774, 2097, 11314, 8250, 8253, 7745, 7235, 7747, 4679, 11337, 2635, 10838, 6748, 99, 8812, 10862, 11374, 10361, 6266, 638, 644, 9863, 8842, 11405, 9359, 146, 659, 117...
Test
9,164
4
Countersign_(legal):countersign legal countersigning means writing second signature onto document example contract official document signed representative company may countersigned supervisor verify authority representative also money order financial instrument may signed upon receipt signed person presented payment indication bearer person originally received item thief stolen item could carried place presented example countersignature needed uk passport applications constitutional monarchies parliamentary republics order head state monarch president valid unless countersigned another authorised relevant person head government responsible minister case promulgation parliamentary resolution presiding officer legislature
[ 9576 ]
None
9,165
4
FIPS_140-3:fips 140-3 federal information processing standard fips publication 140-3 announced update u.s. government computer security standard used accredit cryptographic modules title standard security requirements cryptographic modules fips 140-2 remains currently approved version efforts update fips 140-2 date back early 2000s fips 140-3 2013 draft scheduled signature secretary commerce august 2013 however never happened draft subsequently abandoned 2014 nist released substantially different draft fips 140-3 version effectively directing use international organization standardization/international electrotechnical commission iso/iec standard 19790:2012 replacement fips 140-2 2014 draft fips 140-3 also abandoned august 12 2015 nist formally released statement federal register asking comments potential use portions iso/iec 19790:2014 update fips 140-2 reference 2014-version iso/iec 19790 inadvertent error federal registry posting 2012 recent version update process fips 140 hamstrung deep technical issues topics hardware security apparent disagreement us government path forward abandoned 2013 draft fips 140-3 required mitigation non-invasive attacks validating higher security levels introduced concept public security parameter allowed deference certain self-tests specific conditions met strengthened requirements user authentication integrity testing remains unclear whether issues addressed ultimately approved release fips 140-3 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components federal agencies departments validate module use covered existing fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment csec canadian government security programs overseen nist csec focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes march 22 2019 united states secretary commerce wilbur ross approved fips 140-3 security requirements cryptographic modules succeed fips 140-2 according announcement fips 140-3 become effective september 22 2019 validated cryptographic module validation program cmvp fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time
[ 8674, 420, 11432, 1941, 2558 ]
Test
9,166
2
MS-DOS:ms-dos ms-dos acronym microsoft disk operating system operating system x86-based personal computers mostly developed microsoft collectively ms-dos rebranding ibm pc dos operating systems attempting compatible ms-dos sometimes referred dos also generic acronym disk operating system ms-dos main operating system ibm pc compatible personal computers 1980s early 1990s gradually superseded operating systems offering graphical user interface gui various generations graphical microsoft windows operating system ibm licensed re-released august 12 1981 pc dos 1.0 use pcs although ms-dos pc dos initially developed parallel microsoft ibm two products diverged twelve years 1993 recognizable differences compatibility syntax capabilities lifetime several competing products released x86 platform ms-dos went eight versions development ceased 2000 initially ms-dos targeted intel 8086 processors running computer hardware using floppy disks store access operating system application software user data well progressive version releases delivered support mass storage media ever greater sizes formats along added feature support newer processors rapidly evolving computer architectures ultimately key product microsoft growth programming language company diverse software development firm providing company essential revenue marketing resources also underlying basic operating system early versions windows ran gui flexible operating system consumes negligible installation space ms-dos renamed form 86-dos owned seattle computer products written tim paterson development 86-dos took six weeks basically clone digital research cp/m 8080/z80 processors ported run 8086 processors two notable differences compared cp/m improved disk sector buffering logic introduction fat12 instead cp/m filesystem first version shipped august 1980 microsoft needed operating system ibm personal computer hired tim paterson may 1981 bought 86-dos 1.10 75,000 july year microsoft kept version number renamed ms-dos also licensed ms-dos 1.10/1.14 ibm august 1981 offered pc dos 1.0 one three operating systems ibm 5150 ibm pc within year microsoft licensed ms-dos 70 companies designed os could run 8086-family computer computer would distinct hardware version ms-dos similar situation existed cp/m ms-dos emulating solution cp/m adapt different hardware platforms end ms-dos designed modular structure internal device drivers minimally primary disk drives console integrated kernel loaded boot loader installable device drivers devices loaded integrated boot time oem would use development kit provided microsoft build version ms-dos basic i/o drivers standard microsoft kernel would typically supply disk end users along hardware thus many different versions ms-dos different hardware major distinction ibm-compatible isa machine ms-dos compatible machine machines like tandy 2000 ms-dos compatible ibm-compatible could run software written exclusively ms-dos without dependence peripheral hardware ibm pc architecture design would worked well compatibility application programs used ms-dos services perform device i/o indeed design philosophy embodied windows nt see hardware abstraction layer however ms-dos early days greater speed attainable programs direct control hardware particular importance especially games often pushed limits contemporary hardware soon ibm-compatible architecture became goal long 8086-family computers closely emulated ibm hardware single version ms-dos fixed hardware platform needed market version version ms-dos discussed dozens oem versions ms-dos relevant systems designed case similar function capability standard version ibm pc—often same-numbered version always since oems used proprietary version numbering schemes e.g labeling later releases ms-dos 1.x 2.0 vice versa —with notable exceptions microsoft omitted multi-user support ms-dos microsoft unix-based operating system xenix fully multi-user company planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run motorola 68000 zilog z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft advertised ms-dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting breakup bell system however computer systems started selling unix system v. believing could compete unix market microsoft abandoned xenix 1987 transferred ownership xenix santa cruz operation sco march 25 2014 microsoft made code scp ms-dos 1.25 mixture altos ms-dos 2.11 televideo pc dos 2.11 available public microsoft research license agreement makes code source-available open source defined open source initiative free software foundation standards microsoft would later re-license code mit license september 28 2018 making versions free software april fool day joke 2015 microsoft mobile launched windows phone application called ms-dos mobile presented new mobile operating system worked similar ms-dos microsoft licensed released versions ms-dos different names like lifeboat associates software bus 86 a.k.a sb-dos compaq-dos ncr-dos z-dos eventually enforced ms-dos name versions ibm one originally called ibm personal computer dos later shortened ibm pc dos competitors released compatible dos systems dr dos pts-dos could also run dos applications former eastern bloc ms-dos derivatives named dcp 3.20 3.30 existed late 1980s produced east german electronics manufacturer veb robotron following versions ms-dos released public microsoft dos released oem channel digital research released dr dos 5.0 retail upgrade pc dos 5.00.1 ibm-microsoft agreement started end ibm entered retail dos market ibm dos 5.00.1 5.02 6.00 pc dos 6.1 6.3 7 2000 7.1 localized versions ms-dos existed different markets western issues ms-dos evolved around set tools drivers localized message languages differing sets supported codepages keyboard layouts language versions considerably different western issues adapted run localized pc hardware additional bios services available western pcs support multiple hardware codepages displays printers support dbcs alternative input methods graphics output affected issues include japanese dos/v korean arabic ados 3.3/5.0 hebrew hdos 3.3/5.0 russian rdos 4.01/5.0 well eastern european versions dos microcomputers based intel 8086 8088 processors including ibm pc clones initial competition pc dos/ms-dos line came digital research whose cp/m operating system inspired ms-dos fact remains controversy whether qdos less plagiarised early versions cp/m code digital research released cp/m-86 months ms-dos offered alternative ms-dos microsoft licensing requirements higher price executable programs cp/m-86 ms-dos interchangeable many applications sold ms-dos cp/m-86 versions ms-dos became preponderant later digital research operating systems could run ms-dos cp/m-86 software ms-dos originally supported simple .com modelled similar binary incompatible format known cp/m-80 cp/m-86 instead supported relocatable format using file extension .cmd avoid name conflicts cp/m-80 ms-dos .com files ms-dos version 1.0 added advanced relocatable .exe executable file format machines early days ms-dos differing system architectures certain degree incompatibility subsequently vendor lock-in users began using ms-dos machines compelled continue using version customized hardware face trying get proprietary hardware software work new system business world 808x-based machines ms-dos tied faced competition unix operating system ran many different hardware architectures microsoft sold version unix pc called xenix emerging world home users variety computers based various processors serious competition ibm pc apple ii early apple macintosh commodore 64 others use 808x processor many 808x machines different architectures used custom versions ms-dos first machines competition time ibm pc hardware configuration became dominant 808x market software written communicate directly pc hardware without using standard operating system calls ran much faster true pc-compatibles non-pc-compatible 808x machines small market fast software written alone market remained open ibm pcs machines closely imitated architecture running either single version ms-dos compatible pcs equivalent ibm pc dos clones cost much less ibm-branded machines similar performance became widely used home users ibm pcs large share business computer market microsoft ibm together began intended follow-on ms-dos/pc dos called os/2 os/2 released 1987 microsoft began advertising campaign announcing dos dead stating version 4 last full release os/2 designed efficient multi-tasking standard operating systems since 1963 offered number advanced features designed together similar look feel seen legitimate heir kludgy dos platform ms-dos grown spurts many significant features taken duplicated microsoft products operating systems ms-dos also grew incorporating direct licensing feature duplicating functionality tools utilities developed independent companies norton utilities pc tools microsoft anti-virus qemm expanded memory manager stacker disk compression others period digital research competing operating system market computers like amstrad pc1512 sold floppy disks two operating systems one could used time ms-dos cp/m-86 derivative digital research produced dos plus compatible ms-dos 2.11 supported cp/m-86 programs additional features including multi-tasking could read write disks cp/m ms-dos format os/2 protracted development digital research released ms-dos compatible dr dos 5.0 included features available third-party add-ons ms-dos unwilling lose portion market microsoft responded announcing pending release ms-dos 5.0 may 1990 effectively killed dr dos sales actual release ms-dos 5.0 june 1991 digital research brought dr dos 6.0 sold well pre-announcement ms-dos 6.0 stifled sales dr dos microsoft accused carefully orchestrating leaks future versions ms-dos attempt create industry called fud fear uncertainty doubt regarding dr dos example october 1990 shortly release dr dos 5.0 long eventual june 1991 release ms-dos 5.0 stories feature enhancements ms-dos started appear infoworld pc week brad silverberg vice president systems software microsoft general manager windows ms-dos business unit wrote forceful letter pc week november 5 1990 denying microsoft engaged fud tactics serve customers better decided forthcoming version 5.0 denying microsoft copied features dr dos feature enhancements ms-dos version 5.0 decided development begun long heard dr dos 5.0 similar features 50 million ms-dos users n't surprising dri heard requests customers – schulman et al 1994 pact microsoft ibm promote os/2 began fall apart 1990 windows 3.0 became marketplace success much microsoft contributions os/2 also went creating third gui replacement dos windows nt ibm already developing next version os/2 carried development platform without microsoft sold alternative dos windows response digital research dr dos 6.0 bundled superstor disk compression microsoft opened negotiations stac electronics vendor popular dos disk compression tool stacker due diligence process stac engineers shown microsoft part stacker source code stac unwilling meet microsoft terms licensing stacker withdrew negotiations microsoft chose license vertisoft doubledisk using core doublespace disk compression ms-dos 6.0 6.20 released 1993 including microsoft doublespace disk compression utility program stac successfully sued microsoft patent infringement regarding compression algorithm used doublespace resulted 1994 release ms-dos 6.21 disk compression removed shortly afterwards came version 6.22 new version disk compression system drivespace different compression algorithm avoid infringing code prior 1995 microsoft licensed ms-dos windows computer manufacturers three types agreement per-processor fee system company sold per-system fee system particular model per-copy fee copy ms-dos installed largest manufacturers used per-processor arrangement lowest fee arrangement made expensive large manufacturers migrate operating system dr dos 1991 u.s. government federal trade commission began investigating microsoft licensing procedures resulting 1994 settlement agreement limiting microsoft per-copy licensing digital research gain settlement years later successor interest caldera sued microsoft damages caldera v. microsoft lawsuit believed settlement ran order 150 million revealed november 2009 release settlement agreement 280 million microsoft also used variety tactics ms-dos several applications development tools operating perfectly running genuine ms-dos pc dos would break run another vendor implementation dos notable examples practice included introduction windows 3.0 1990 easy usability graphical user interface severely diminished usage ms-dos based command line release windows 95 continuing windows 9x product line windows integrated version ms-dos used bootstrapping troubleshooting backwards-compatibility old dos software particularly games longer released standalone product windows 95 dos called ms-dos 7 booted separately without windows gui capability retained windows 98 second edition windows removed capability boot underlying ms-dos 8.0 alone hard disk retained ability make dos boot floppy disk called emergency boot disk hacked restore full access underlying dos contrast windows 9x series windows nt-derived 32-bit operating systems developed alongside 9x series windows nt 2000 xp newer contain ms-dos part operating system nt built subsystem running dos entirely different independent operating system provide subset dos emulation run dos applications provide dos-like command prompt windows 64-bit versions windows nt line provide dos emulation run dos applications natively windows xp contains copy windows boot disk stripped bootstrap accessible formatting floppy ms-dos startup disk files like driver cd-rom support deleted windows bootdisk startup files autoexec.bat config.sys longer content modified disk base creating ms-dos image windows xp deleted files recovered undelete tool booting ms-dos startup disk made windows xp format tool version reports windows millenium ms-dos 8.0 used base windows 98 never released stand alone product windows vista files startup disk dated april 18 2005 otherwise unchanged including string ms-dos version 8 copyright 1981–1999 microsoft corp inside codice_1 starting windows 10 ability create dos startup disk removed either virtual machine running ms-dos older version virtual machine dual boot must used format floppy disk image must obtained external source solutions include using dos compatible alternatives freedos even copying required files boot sector ms-dos 6.22 last standalone version produced microsoft intel 8088 intel 8086 intel 80286 processors remain available download via msdn volume license oem license partner websites customers valid login credentials ms-dos still used embedded x86 systems due simple architecture minimal memory processor requirements though current products switched still-maintained open-source alternative freedos 2018 microsoft released source code ms-dos 1.25 2.0 github purpose according microsoft mainly education experimentation historic operating systems new programmers gain understanding low-level software works historic current due historical nature software microsoft accept pull requests code pull requests modified translated documentation accepted users however allowed fully encouraged fork repository containing ms-dos source code make modifications whatever like versions ms-dos obtained operation modification abandonware sites winworldpc versions microsoft windows ms-dos-like command-line interface cli called command prompt could run many dos variously win32 os/2 1.x posix command line utilities command-line session allowing piping commands user interface icon windows 2000 followed native ms-dos interface 16-bit versions windows 3.11 ran graphical user interface gui top ms-dos windows 95 98 98 se ms-dos part superficially integrated treating operating systems complete package though dos component could actually stand alone command line accessed dos command line usually codice_1 windows module winoldap.mod new line windows windows nt boot kernel whose sole purpose load windows one run win32 applications loader system manner os/2 unix consumer windows launch character-mode sessions command session permits running various supported command line utilities win32 ms-dos os/2 1.x posix emulators ms-dos os/2 posix use host window way win16 applications use win32 explorer using host window allows one pipe output emulations ms-dos emulation done ntvdm nt virtual dos machine modified softpc former product similar virtualpc running modified ms-dos 5 ntio.sys ntdos.sys output handled console dlls program prompt codice_3 codice_4 codice_5 see output 64-bit windows either dos emulation dos commands come 32-bit windows dos version returns 5.00 5.50 depending api function used determine utilities ms-dos 5.00 run emulation without modification early beta programs nt show ms-dos 30.00 programs running ms-dos 30.00 would assume os/2 control os/2 emulation handled os2ss.exe os2.exe doscalls.dll os2.exe version os/2 shell cmd.exe passes commands os2ss.exe input-output windows nt shell windows 2000 last version nt support os/2 emulation os/2 1.30 posix emulated posix shell emulated shell commands handled directly cmd.exe command prompt often called ms-dos prompt part official name windows 9x early versions windows nt nt 3.5 earlier part softpc emulation dos redirects output actually codice_1 16-bit commands run ntvdm codice_7 codice_8 initialisation determined codice_9 optionally permitting use win32 console applications internal commands codice_10 directive win32 console applications use codice_3 command prompt shell confusion exist os/2 separate dos os/2 prompts running dos program os/2 launch separate dos window run application versions windows itanium longer sold microsoft x86-64 architectures longer include ntvdm therefore longer natively run ms-dos 16-bit windows applications alternatives form virtual machine emulators microsoft virtual pc well vmware dosbox others 1983 onwards various companies worked graphical user interfaces guis capable running pc hardware however required duplicated effort provide much consistency interface design even products company later 1985 microsoft windows 1.0 released microsoft first attempt providing consistent user interface applications early versions windows ran top ms-dos first windows met little success also true companies efforts well example gem version 3.0 windows gained market acceptance windows 9x used dos boot process launch protected mode basic features related file system long file names available dos running subsystem windows windows nt runs independently dos includes ntvdm component simulating dos environment legacy applications ms-dos compatible systems include microsoft manufactured ibm pc dos ibm ms-dos identical products eventually diverged starting ms-dos version 6.0 digital research follow microsoft version numbering scheme example ms-dos 4 released july 1988 followed dr dos 5.0 may 1990 ms-dos 5.0 came april 1991 dr dos 6.0 released following june products collectively referred dos even though disk operating system generic term used systems unrelated x86 ibm pc ms-dos also generic reference dos ibm pc compatible computers microsoft control windows platform programming practices intentionally made windows appear ran poorly competing versions dos crippled ability dos makers continue compete ms-dos digital research release interim releases circumvent windows limitations inserted artificially designed specifically provide microsoft competitive advantage
[ 10240, 6148, 2055, 6153, 10257, 4115, 25, 10273, 37, 2096, 8241, 8243, 4150, 58, 10306, 8262, 4170, 10328, 10333, 95, 97, 10340, 8298, 8300, 8301, 2159, 10352, 2168, 8315, 4220, 2179, 4228, 2193, 10387, 6296, 2201, 6321, 178, 8369, 181, ...
Validation
9,167
5
Microsoft_Media_Server:microsoft media server microsoft media server mms microsoft proprietary network-streaming protocol serves transfer unicast data windows media services previously called netshow services mms transported via udp tcp mms default port udp/tcp 1755 microsoft deprecated mms favor rtsp tcp/udp port 554 2003 release windows media services 9 series continued support mms time interest backward compatibility support protocol finally dropped windows media services 2008 several years developers sdp multimedia download-tool reverse engineered mms protocol published unofficial documentation however microsoft finally released protocol specification february 2008
[ 10242, 5251, 5765, 9609, 6028, 3086, 3218, 11413, 790, 6171, 10269, 10270, 7713, 35, 9380, 10026, 10282, 10924, 6319, 11060, 10808, 6330, 4797, 10173, 7364, 6993, 6231, 11223, 2777, 8281, 603, 1501, 10727, 11112, 5482, 4219, 9834, 9328, 665...
Test
9,168
4
Claria_Corporation:claria corporation claria corporation formerly gator corporation software company based redwood city california invented “ behavioral marketing ” highly effective controversial new form online advertising founded 1998 denis coleman co-founder symantec stanford mba sasha zorovic engineer mark pennell based work zorovic done stanford march 1999 jeff mcfadden hired ceo zorovic effectively forced name later used interchangeably gain advertising network claimed serviced 50 million users claria exited adware business end second quarter 2006 eventually shut completely october 2008 gator also known gain adserver products collected personal information unknowing users including websites visited portions credit card numbers target display ads computers web surfers billed leader online behavioral marketing company changed name claria corporation october 30 2003 effort better communicate expanding breadth offerings provide consumers advertisers according ceo president jeff mcfadden originally released 1999 gator frequently installed together programs offered free charge go zilla kazaa development programs partially funded revenue advertising displayed gator mid-2003 gator installed estimated 35 million pcs even though gator installed uninstall available via add/remove programs control panel microsoft windows many spyware removal tools also detect remove gator end user license agreement attempts disallow manual removal prohibiting unauthorized means uninstallation gator software undercut fundamental ad-supported nature many internet publishers replacing banner ads web sites thereby depriving content provider revenue necessary continue providing content june 2002 number large publishers including new york post new york times dow jones company sued gator software practice replacing ads lawsuits settled court february 2003 gator attempted combat spyware labels litigation september 2003 company threatened sites pc pitstop libel lawsuits part settlement signed sept. 30 2003 pc pitstop -- scans computers hostile otherwise undesirable code -- removed pages spyware information center titles gator spyware gator boycott list february 2004 gator made confidential settlement litigation brought seven top newspaper publishers including washington post new york post new york times dow jones washington post l.l bean extended stay america suits similarly settled gator corporation released suite free internet applications performed various tasks however installing applications user would continually shown ads gain network even programs running foreground suite included using software user shown advertisements according computer associates spyware information center applications suite classified adware spyware display ads unrelated product primary user interface visible programs employ user internet connection report behavior information back claria although user explicit consent always required install applications claria took advantage fact users choose bothering educate installing cases install process users must choose whether install free version serves lots ads described pay 30 version serves ads since announcement shut ad network claria stopped accepting payment ad free versions despite unpopular reputation claria corporation received backing major venture capital firms including greylock technology crossover ventures u.s. venture partners andy bechtolsheim early investor filed 150 million ipo april 2004 stating income 35 million revenues 90 million 2003 investors concerned practices might illegal least utah time another concern revenue came one partner yahoo overture claria withdrew filing august 2004 july 2005 microsoft corporation came fire revealed anti-spyware product would longer quarantine claria software spyware though still offered users option remove software microsoft reportedly contemplating purchase claria many consumers felt conflict interest spyware-reporting agencies computer associates panda software truprevent technologies still label claria products adware spyware march 2006 claria claimed would exiting adware business focusing personalized search technology july 1 2006 claria ceased displaying pop-up ads around time new company nebuad formed former claria employees another approach targeted advertisements april 21 2008 claria sold gator.com domain october 2008 rebranded jelly cloud company quietly shut today claria former senior management team occupy variety leadership roles throughout online marketing industry scott vandevelde claria last ceo former chief revenue officer chief revenue officer dotomi online advertising firm specializing personalized media scott eagle claria former chief operating officer chief marketing officer joined eharmony online dating company chief marketing officer former ceo jeff mcfadden vp business development zen marketing former vp business development mitchell weisman part leadership team lifestreet corporation largest ad network facebook tony martin claria former vp engineering ran engineering operations project playlist claria former vp engineering analytics dominic bennett claria senior director finance dennis jang part leadership team turn leading online advertising dsp vp engineering vp finance respectively co-founder former claria cto mark pennell senior software engineer apple 2016 claria core engineering team works apple
[ 704, 9569, 713, 202, 877, 6797, 10392, 3163, 3452, 3485 ]
Test
9,169
7
Explicit_multi-threading:explicit multi-threading random-access machine ram abstract machine model used computer science study algorithms complexity standard serial computing pram computational model abstract parallel machine model introduced similarly study parallel algorithms complexity parallel computing yet built researchers developed large body knowledge parallel algorithms pram model parallel algorithms also known simple standards approaches parallel algorithms large body parallel algorithms knowledge pram model relative simplicity motivated building computers whose programming guided parallel algorithms since productivity parallel programmers long considered crucial success parallel computer simplicity algorithms important multi-core computers built around two processor cores integrated single integrated circuit die widely used across many application domains including general-purpose computing explicit multi-threading xmt computing paradigm building programming multi-core computers tens hundreds thousands processor cores experimental work published 2011 2012 demonstrates significantly greater speedups advanced pram algorithms xmt prototypes problems state-of-the-art multi-core computers work published 2018 shows lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems inductive lock-step approach stands contrast multi-threaded programming approaches many core systems known challenging programmers xmt paradigm introduced uzi vishkin explicit multi-threading xmt computing paradigm integrates several levels abstraction work-time wt sometimes called work-depth framework introduced provides simple way conceptualizing describing parallel algorithms wt framework parallel algorithm first described terms parallel rounds round operations performed characterized several issues suppressed example number operations round need clear processors need mentioned information may help assignment processors jobs need accounted second suppressed information provided inclusion suppressed information fact guided proof scheduling theorem due wt framework useful since greatly simplify initial description parallel algorithm inserting details suppressed initial description often difficult example wt framework adopted basic presentation framework parallel algorithms books pram model well class notes explains simple connection wt framework rudimentary ice abstraction noted xmt paradigm programmed using xmtc parallel multi-threaded programming language small extension programming language c. xmt paradigm include programmer ’ workflow starts casting algorithm wt framework proceeds programming xmtc xmt multi-core computer systems provides run-time load-balancing multi-threaded programs incorporating several patents one generalizes program counter concept central von neumann architecture multi-core hardware january 2007 64-processor computer named paraleap demonstrates overall concept completed xmt concept presented xmt 64-processor computer since making parallel programming easy one biggest challenges facing computer science today demonstration also sought include teaching basics pram algorithms xmtc programming students ranging high-school graduate school experimental work reported maximum flow problem two papers graph connectivity connectivity graph theory graph biconnectivity biconnected graph graph triconnectivity triconnected component problems demonstrated advanced algorithms parallel algorithmic literature xmt paradigm offer 8 times 100 times greater speedups problems state-of-the-art multi-core computers reported speedup obtained comparing clock cycles xmt prototype relative fastest serial algorithm running fastest serial machines xmt prototyping culminated establishing lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems 2018 result sharpens contrast xmt programming multi-threaded programming approaches employed nearly many-core systems whose race conditions demands tend challenge sometimes even fail programmers
[ 10102, 9739, 6950 ]
Test
9,170
4
Birthday_attack:birthday attack birthday attack type cryptographic attack exploits mathematics behind birthday problem probability theory attack used abuse communication two parties attack depends higher likelihood collisions found random attack attempts fixed degree permutations pigeonholes birthday attack possible find collision hash function formula_1 formula_2 classical preimage resistance security general though disputed result quantum computers perform birthday attacks thus breaking collision resistance formula_3 example consider scenario teacher class 30 students n 30 asks everybody birthday simplicity ignore leap years determine whether two students birthday corresponding hash collision described intuitively chance may seem small teacher picked specific day say 16 september chance least one student born specific day formula_4 7.9 however counter-intuitively probability least one student birthday student day around 70 n 30 formula formula_5 given function formula_6 goal attack find two different inputs formula_7 formula_8 pair formula_7 called collision method used find collision simply evaluate function formula_6 different input values may chosen randomly pseudorandomly result found birthday problem method rather efficient specifically function formula_11 yields formula_12 different outputs equal probability formula_12 sufficiently large expect obtain pair different arguments formula_14 formula_15 formula_8 evaluating function formula_17 different arguments average consider following experiment set h values choose n values uniformly random thereby allowing repetitions let p n h probability experiment least one value chosen probability approximated let n p h smallest number values choose probability finding collision least p inverting expression find following approximation assigning 0.5 probability collision arrive let q h expected number values choose finding first collision number approximated example 64-bit hash used approximately 1.8 × 10 different outputs equally probable best case would take 'only approximately 5 billion attempts 5.38 × 10 generate collision using brute force value called birthday bound n -bit codes could computed 2 examples follows easy see outputs function distributed unevenly collision could found even faster notion 'balance hash function quantifies resistance function birthday attacks exploiting uneven key distribution however determining balance hash function typically require possible inputs calculated thus infeasible popular hash functions md sha families subexpression formula_22 equation formula_23 computed accurately small formula_24 directly translated common programming languages codice_1 due loss significance codice_2 available c99 example equivalent expression codice_3 used instead done first column table computed zero several items second column even one correct significant digit python function accurately generate table math import log1p sqrt def birthday probability_exponent bits code saved file named codice_4 run interactively following example good rule thumb used mental calculation relation also written works well probabilities less equal 0.5 approximation scheme especially easy use working exponents instance suppose building 32-bit hashes formula_28 want chance collision one million formula_29 many documents could close correct answer 93 digital signatures susceptible birthday attack message formula_31 typically signed first computing formula_32 formula_6 cryptographic hash function using secret key sign formula_32 suppose mallory wants trick bob signing fraudulent contract mallory prepares fair contract formula_31 fraudulent one formula_36 finds number positions formula_31 changed without changing meaning inserting commas empty lines one versus two spaces sentence replacing synonyms etc combining changes create huge number variations formula_31 fair contracts similar manner mallory also creates huge number variations fraudulent contract formula_36 applies hash function variations finds version fair contract version fraudulent contract hash value formula_40 presents fair version bob signing bob signed mallory takes signature attaches fraudulent contract signature proves bob signed fraudulent contract probabilities differ slightly original birthday problem mallory gains nothing finding two fair two fraudulent contracts hash mallory strategy generate pairs one fair one fraudulent contract birthday problem equations apply formula_41 number pairs number hashes mallory actually generates formula_42 avoid attack output length hash function used signature scheme chosen large enough birthday attack becomes computationally infeasible i.e twice many bits needed prevent ordinary brute-force attack besides using larger bit length signer bob protect making random inoffensive changes document signing keeping copy contract signed possession least demonstrate court signature matches contract fraudulent one pollard rho algorithm logarithms example algorithm using birthday attack computation discrete logarithms
[ 8674, 1315, 7556, 4389, 262, 2154, 6954, 8554, 3984, 8627, 8628, 2357, 1941, 3477, 10806, 6905, 11639 ]
None
9,171
3
Call_gate_(Intel):call gate intel call gate mechanism intel x86 architecture changing privilege level process executes predefined function call using call far instruction call gates intended allow less privileged code call code higher privilege level type mechanism essential modern operating systems employ memory protection since allows user applications use kernel functions system calls way controlled operating system call gates use special selector value reference descriptor accessed via global descriptor table local descriptor table contains information needed call across privilege boundaries similar mechanism used interrupts assuming call gate set already operating system kernel code simply call far necessary segment selector offset field ignored processor perform number checks make sure entry valid code operating sufficient privilege use gate assuming checks pass new cs/eip loaded segment descriptor continuation information pushed onto stack new privilege level old ss old esp old cs old eip order parameters may also copied old stack new stack needed number parameters copy located call gate descriptor kernel may return user space program using ret far instruction pops continuation information stack returns outer privilege level os/2 early user call gates transfer application code running ring 3 privileged code running ring 2 kernel code ring 0 windows 95 executes drivers process switching ring 0 applications including api dll kernel32.dll krnl386.exe executed ring 3 driver vwin32.vxd provides key operating system primitives ring 0 allows calling driver functions 16-bit applications msdos win16 address obtained calling int 2fh 1684h ax register identify vxd entry point requested bx register set 16-bit vxd id upon return int instruction es.di registers contain far pointer called transfer control vxd running ring 0 descriptor pointed es actually call gate 32-bit applications however need access windows 95 driver code call undocumented vxdcall function kernel32.dll essentially calls int 30h changes ring mode modern x86 operating systems transitioning away call far call gates introduction x86 instructions system call sysenter/sysexit intel syscall/sysret amd new faster mechanism introduced control transfers x86 programs architectures support call gates use rare even new instructions software interrupts traps preferred portability even though call gates significantly faster interrupts call gates flexible sysenter/sysexit syscall/sysret instructions since unlike latter two call gates allow changing arbitrary privilege level arbitrary albeit higher equal privilege level fast sys* instructions allow control transfers ring 3 0 vice versa preserve system security global descriptor table must held protected memory otherwise program able create call gate use raise privilege level call gates used software security exploits ways found around protection one example e-mail worm gurong.a written exploit microsoft windows operating system uses \device\physicalmemory install call gate
[ 8551, 6797, 7983, 3473, 5457, 5363, 2041, 2653, 1247 ]
Test
9,172
9
Charles_H._Moore:charles h. moore charles havice chuck moore ii born 1938 american computer engineer programmer best known inventor forth programming language 1968 employed united states national radio astronomy observatory nrao moore invented initial version forth language help control radio telescopes 1971 co-founded elizabeth rather forth inc. first still one leading purveyors forth solutions 1970s ported forth dozens computer architectures 1980s moore turned attention forth development techniques cpu design developing several stack machine microprocessors gaining several microprocessor-related patents along way designs emphasized high performance low power usage also explored alternate forth architectures cmforth machine forth closely matched chips machine languages 1983 moore founded novix inc. developed nc4000 processor design licensed harris semiconductor marketed rtx2000 radiation hardened stack processor used numerous nasa missions 1985 consulting firm computer cowboys developed sh-boom processor starting 1990 developed vlsi cad system okad overcome limitations existing cad software used tools develop several multi-core minimal instruction set computer misc chips mup21 1990 f21 1993 moore founder itv corp one first companies work internet appliances 1996 designed another custom chip system i21 moore developed colorforth dialect forth language derived scripting language custom vlsi cad system okad 2001 rewrote okad colorforth designed c18 processor 2005 moore co-founded became chief technology officer intellasys develops markets chip designs seaforth-24 multi-core processor 2009 co-founded became cto greenarrays inc marketing ga4 ga144 multi-computer chips
[ 1376, 3904, 1702, 5354, 10675, 5655, 2623 ]
None
9,173
2
Windows_7_editions:windows 7 editions windows 7 major release microsoft windows operating system available six different editions starter home basic home premium professional enterprise ultimate home premium professional ultimate widely available retailers editions focus markets software development world enterprise use editions support 32-bit ia-32 cpus editions except starter support 64-bit x64 cpus 64-bit installation media included home-basic edition packages obtained separately microsoft according microsoft features editions windows 7 stored machine regardless edition use users wish upgrade edition windows 7 features could use windows anytime upgrade purchase upgrade unlock features editions microsoft announced windows 7 pricing information editions june 25 2009 windows anytime upgrade family pack pricing july 31 2009 since october 31 2013 windows 7 longer available retail except professional edition preinstalled discontinued october 31 2016 mainstream support editions new features bug fixes ended january 2015 extended support security updates continue january 2020 main editions also take form one following special editions in-place upgrade windows vista service pack 1 windows 7 supported processor architecture language editions match see in-place upgrade supported earlier versions windows moving windows 7 machines requires clean installation i.e removal old operating system installing windows 7 reinstalling previously installed programs windows easy transfer assist process microsoft made upgrade skus windows 7 selected editions windows xp windows vista difference skus full skus windows 7 lower price proof license ownership qualifying previous version windows restrictions in-place upgrading applies skus well addition windows 7 available family pack upgrade edition certain markets upgrade windows 7 home premium gives licenses upgrade three machines vista windows xp windows 7 home premium edition full versions machine upgraded must one qualifying previous versions windows work united states offer expired early december 2009 october 2010 commemorate anniversary windows 7 microsoft made windows 7 home premium family pack available limited time supplies lasted two possible ways upgrade windows 7 earlier version windows table lists upgrade paths allow in-place install note in-place upgrades performed previous version windows architecture upgrading 32-bit installation 64-bit installation downgrading 64-bit installation 32-bit installation clean install mandatory regardless editions used microsoft also supported in-place upgrades lower edition windows 7 higher one using windows anytime upgrade tool currently three retail options available though currently unclear whether used previous installations n versions family pack versions anytime upgrade editions possible use product key standard upgrade edition accomplish in-place upgrade e.g home premium ultimate
[ 8576, 641, 5380, 6150, 3463, 8841, 651, 5004, 6797, 8080, 3857, 8976, 10896, 2196, 11283, 4505, 6686, 4515, 11301, 8103, 3496, 6441, 6697, 1581, 10926, 7983, 5681, 3250, 3890, 9910, 10747, 1978, 6972, 10812, 6462, 7615, 321, 7106, 582, 10...
None
9,174
3
Apple_A9:apple a9 apple a9 64-bit arm-based system-on-chip soc designed apple inc manufactured apple tsmc samsung first appeared iphone 6s 6s plus introduced september 9 2015 apple stated 70 cpu performance 90 graphics performance compared predecessor apple a8 a9 features apple-designed 64-bit 1.85 ghz armv8-a dual-core cpu called twister a9 iphone 6s 2 gb lpddr4 ram included package a9 per-core l1 cache 64 kb data 64 kb instructions l2 cache 3 mb shared cpu cores 4 mb l3 cache services entire soc acts victim cache a9 includes new image processor feature originally introduced a5 last updated a7 better temporal spatial noise reduction well improved local tone mapping a9 directly integrates embedded m9 motion coprocessor feature originally introduced a7 separate chip addition servicing accelerometer gyroscope compass barometer m9 coprocessor recognize siri voice commands a9 adds hardware decoding heif 8-bit 10-bit hevc a9 features custom storage solution uses apple-designed nvme-based controller communicates pcie connection iphone 6s nand design akin pc-class ssd embedded flash memory common mobile devices gives phone significant storage performance advantage competitors often use emmc ufs connect flash memory a9 microarchitecture similar second generation cyclone used a8 chip microarchitecture microarchitectural features follows half performance boost a8 comes 1.85 ghz frequency quarter comes better memory subsystem 3× bigger caches remaining quarter comes microarchitectural tuning smaller technology node according apple every ios device dedicated aes-256 crypto engine built dma path flash storage main system memory making file encryption highly efficient a9 later a-series processors flash storage subsystem isolated bus granted access memory containing user data via dma crypto engine apple a9 chips fabricated two companies samsung tsmc samsung version called apl0898 manufactured 14 nm finfet process 96 mm large tsmc version called apl1022 manufactured 16 nm finfet process 104.5 mm large intended significant difference performance parts october 2015 alleged iphone 6s models samsung-fabricated a9 chips consistently measured shorter battery life tsmc-fabricated versions cpu heavy usage web browsing graphics different apple responded tests run processors continuous heavy workload battery depletes representative real-world usage said internal testing combined customer data demonstrated variance 2–3 twister cpu core implements armv8-a instruction set architecture licensed arm holdings independent cpu design unrelated much older similarly named cortex-a9 arm9 cpu designed arm implement 32-bit armv7-a armv5e versions architecture processors nearly identical visually packaging dimensions approx 15.0×14.5 mm superficial differences like designation text inside packaging silicon die differs size a9 processor listed minimum requirement arkit
[ 10755, 9732, 1549, 5647, 7697, 4114, 9235, 11282, 6165, 11289, 7706, 8222, 1057, 2551, 38, 6183, 1576, 6186, 4139, 6700, 7211, 8237, 9774, 2097, 1074, 8754, 9784, 8250, 8253, 576, 7745, 1090, 7747, 2635, 8783, 4180, 10838, 1623, 3672, 108...
None
9,175
3
Northeastern_University:northeastern university northeastern university nu neu private research university boston massachusetts established 1898 categorized r1 institution doctoral universities highest research activity carnegie classification institutions higher education university offers undergraduate graduate programs main campus fenway-kenmore roxbury south end back bay neighborhoods boston university satellite campuses charlotte north carolina seattle washington san jose california toronto canada exclusively offer graduate degrees northeastern recently purchased new college humanities london plans open additional campus vancouver canada university enrollment approximately 18,000 undergraduate students 8,000 graduate students northeastern features cooperative education program commonly known co-op integrates classroom study professional experience contains 3,100 partners across seven continents program key part northeastern curriculum experiential learning hundred years one largest co-op/internship programs world required students academic disciplines participate co-op program participation nearly universal among undergraduate students helps distinguish university experience universities northeastern currently ranked 1st best schools internships list princeton review consistently ranked top five decade northeastern also comprehensive study abroad program spans 170 universities colleges northeastern large highly residential university students choose live campus upperclassmen option live campus 75 northeastern students receive form financial aid 2019–20 school year university committed 296.2 million grant scholarship assistance university sports teams northeastern huskies compete ncaa division members colonial athletic association caa 18 varsity sports men women hockey teams compete hockey east men women rowing teams compete eastern association rowing colleges earc eastern association women rowing colleges eawrc respectively men track field caa back back years 2015 2016 2013 men basketball first caa regular season championship men soccer caa title first time women ice hockey record 16th beanpot championship northeastern men hockey team 2018 2019 beanpot beating boston university boston college harvard evening institute younger men located huntington avenue ymca held first class october 3 1898 starting would transform northeastern university course four decades school law formally established year assistance advisory committee consisting dean james barr ames harvard university school law dean samuel bennett boston university school law judge james r. dunbar 1903 first automobile engineering school country established followed school commerce finance 1907 day classes began 1909 1916 bill introduced massachusetts legislature incorporate institute northeastern college considerable debate investigation passed march 1916 march 30 1917 frank palmer speare inaugurated new college first president five years later school changed name northeastern university better reflect increasing depth instruction march 1923 university secured general degree-granting power legislature exception a.b. s.b. medical degrees college liberal arts added 1935 two years later northeastern university corporation established board trustees composed 31 university members 8 ymca 1948 northeastern separated completely ymca following world war ii northeastern began admitting women postwar educational boom university created college education 1953 university college called college professional studies 1960 colleges pharmacy nursing 1964 later combined bouvé college health sciences college criminal justice 1967 followed college computer science 1982 since renamed khoury college computer sciences early 1980s one-time night commuter school grown nearly 50,000 enrollees including full- part-time programs undergraduate graduate level 1989–1990 university enrollment reduced 40,000 full part-time evening students 1990 first class live-on-campus commuter students graduated following retirement president kenneth ryder 1989 university adopted slow thoughtful approach change historically accepting 7,500 10,000 students per year based applications 15,000 20,000 acceptance rates 50 75 depending program attrition rates huge 25 freshmen dropout rate graduation rate 50 40 5,672 undergraduate full-time day students enrolled fall 1984 graduating 1989 president john curry left office 1996 university population systematically reduced 25,000 incoming president richard freeland decided focus recruiting type students already graduating school prime demographic early 1990s university cut freshman class size around 4,500 students 2,800 order become selective began 485 million construction program included residence halls academic research facilities athletic centers 1996 2006 average sat scores increased 200 points retention rates rose dramatically applications doubled university transition students experienced reorganization co-operative education system better integrate classroom learning workplace experience full-time degree programs shifted four-quarter system two traditional semesters two summer minimesters allowing students delve deeply academic courses experience longer substantive co-op placements throughout transformation president freeland oft-repeated goal crack top 100 u.s. news world report rankings accomplished 2005 transformation commuting school national research university complete freeland stepped august 15 2006 replaced dr. joseph aoun former dean university southern california aoun implemented decentralized management model giving university deans control budgets faculty hiring decisions fundraising part five-year 75 million academic investment plan ran 2004 2009 university concentrated undergraduate education core graduate professional programs centers research excellence faculty originally bolstered 100 new tenured tenure-track professors later expanded include 300 additional tenure tenure-track faculty interdisciplinary fields aoun also placed emphasis improving community relations reaching leaders neighborhoods surrounding university addition aoun created academic partnerships institutions boston area including tufts hebrew college school museum fine arts time northeastern advanced national rankings placed 42nd 2014–2015 u.s. news world report best colleges guide 7 position jump 2013–2014 27 place gain since 2010–2011 argued northeastern recent rise rankings shows university cracked code academic rankings others suggested figured game system 2018 edition u.s. news world report ranked northeastern 40th annual ranking national universities whether rise northeastern ranking result effort game system would agree institution continual improvements placement u.s. news world report best colleges guide allowed university improve rapidly via significantly larger endowment competitive student body explains able surpass local universities rankings simmons college wentworth institute technology started around time also said northeastern ranking improvements cyclical effect improved rankings gave university access resources turn allowed improve quality university therefore rankings regardless objectively evident quality university skyrocketed within last twenty years result introduction new academic programs far competitive applicants new buildings larger endowment alumni donations new satellite campuses expansion flagship co-op program early 2019 northeastern university acquired new college humanities 210 student london-based college founded 2012 philosopher a. c. grayling deal pending regulatory approval presidents northeastern tenures office campus buildings named honor addition northeastern main boston campus university operates number satellite locations massachusetts including george j. kostas research institute burlington financial district campus hilton hotel near faneuil hall downtown boston dedham campus dedham marine science center nahant kostas research institute homeland security opened 2011 addition laboratory structural testing resilient sustainable systems stress laboratory laboratory equipped test full-scale large-scale structural systems materials failure explore development new strategies designing simulating sensing structural infrastructure systems university also launched number full-service remote graduate campuses north america including charlotte north carolina october 2011 seattle washington january 2013 san jose california march 2015 toronto ontario 2016 additional satellite campuses austin texas minneapolis minnesota planned northeastern 2019 acceptance rate 18 class 2023 northeastern received 62,000 applications 11,160 students accepted 2018 record number applications 62,272 led drop acceptance rate eight percentage points lower previous year additionally northeastern one top ten applied colleges 2018 class 2021 enrolling fall 2017 northeastern received 54,209 applications also previous year time accepted 14,876 27 enrolled 3,108 applicants northeastern steadily increasing 49,822 2014 54,209 applicants 2017 year applied 2016 9,500 international students 1,128 international applicants 2006 enrolled 20 international students power international education 2017 open doors report northeastern ranked fourth-highest institution united states host international students freshmen enrolled middle 50 range sat scores 660–740 critical reading 710–780 math 690–760 writing act composite range 31–34 class enrolling fall 2013 forbes placed northeastern 35th top 100 colleges ranked sat scores enrolled 76 top tenth high school graduating class 94 top quarter high school graduating class freshman international students 76 state comes undergraduate graduate students number international students totals 13,000 representing 147 different nations half student body due fact vast majority graduate students come abroad number international students northeastern steadily increased 1,000 students every year since 2008 2019 edition u.s. news world report rankings northeastern tied 44th national universities category 2018 northeastern tied 40th national universities category ranked 228th global universities category u.s. news world report 2018 2017 northeastern ranked top 30 colleges highest average sat act scores admitted students 22nd act 27th sat northeastern offers undergraduate majors 65 departments graduate level 125 programs northeastern education interdisciplinary entrepreneurial founded 2009 idea northeastern university student-led venture accelerator provides entrepreneurs including students faculty alumni northeastern community necessary support educational experience towards developing business core concept launch academics northeastern grounded liberal arts education integration classroom studies experiential learning opportunities including cooperative education student research service learning global experience including study abroad international co-op university cooperative education program places 5,000 students annually 3,000 co-op employers boston across united states around globe 2014 college prowler gave northeastern a+ rating quality classes professors overall academic environment colleges listed including schools degrees offered northeastern university offers students opportunity join various ethnic cultural political organizations along numerous honor societies special interest groups fraternities sororities detailed list organizations viewed university honors program offers selected students enhanced curriculum students selected regular applicant pool separate application represent applicants highest gpa sat/act scores year starting first year reading project moving participating wide range courses undergraduate years program gives students variety academic choices culminating experience advanced specialty work major field college-specific choices including specialized advanced honors seminars independent research project addition students honors program exclusively live living-learning community housed west villages c f. fall 2009 university began housing first-year honors students lower nine floors newly constructed international village residence hall starting fall 2017 students housed lower floors even newer 17 story east village residence hall 2017 also marked beginning honors discovery course introduction student assessed integrated learning sail app northeastern one largest co-op/internship programs world started 1909 nu co-op program one oldest nation co-op program students alternate periods academic study periods professional employment usually paid related major majors offer four-year graduation option fewer co-op placements five-year program slightly popular students students co-op pay tuition students living campus pay room board co-op program typically begins spring second year fall third year traditional program first semesters campus students usually take anywhere one three 96 participating one 78 participating two co-op placements range small start-up companies large multinational companies including many fortune 500 corporations program also places students government agencies branches government nonprofits non-governmental organizations northeastern students found interning united states congress white house united nations nasa student placements usually last six months time students paid students may live university residence halls campus co-op employment university currently leases housing students co-oping new york city san francisco seattle washington d.c. assists elsewhere northeastern co-op students staying boston usually benefit fact city prominent industries numerous offices/headquarters boston consequential industries financial sector technology sector medicine/life sciences sector tend hire many co-ops fields especially big-name companies comes d'amore-mckim business students many co-ops end working large financial firms state street john hancock financial accounting firms pricewaterhousecoopers pwc deloitte touche well consulting firms boston consulting group tend hire many co-ops every cycle well retail companies like tjx companies staples tend hire several marketing students every cycle students also decide develop co-ops wish something offered usually involves starting new company reaching company northeastern partnership facilitating creation co-op partnership many companies continually pass co-op opportunities northeastern students new partnerships documented northeastern co-op database known nucareers given future northeastern students students decide start companies usually involved idea northeastern venture accelerator sometimes spend entire two three co-ops solely developing companies might also join husky startup challenge also helps develop student-run companies company successful either idea husky startup challenge often move onto masschallenge boston huge global non-profit startup accelerator competition northeastern students take least one class prepares co-op expectations given industry schools like d'amore-mckim students take three different one-credit classes prepare co-op classes students work advisers inside outside class pursue potential co-ops well work strategies make competitive candidates co-op program led university high reputation comes job placement 50 northeastern students receive job offer previous co-op employer 92 either employed enrolled graduate school 9 months graduation also led northeastern consistently rank within top 5 princeton review list best career services/internships within last decade mainly taking top spot list split best career services best internships 2016 northeastern currently ranks 3rd career services 5th internships united states senior capstone advanced-level course related student major course requires student integrate learned academic coursework experiential learning experience co-op research study abroad service university partnered tufts university school medicine create early-acceptance ba/md program program since discontinued northeastern campus blocks longwood medical academic area harvard medical school harvard school dental medicine located along associated teaching hospitals northeastern semester-long study abroad programs placements africa asia australia europe south america participating schools include university cambridge london school economics england university edinburgh scotland reims management school france european school business germany university cape town south africa university auckland new zealand swinburne university technology australia obirin university japan american college thessaloniki greece pontificia universidad católica de chile chile also antarctica northeastern international business program member international partnership business schools program international business students opportunity awarded dual-degree northeastern well sister school abroad since arrival president aoun 2006 school also emphasizing co-op abroad effort make school global internationally engaged many programs offered including social entrepreneurship peru kenya south africa northeastern also notable dialogues civilizations program features dozens one-month-long programs usually taking place summer faculty member teach group students foreign country related curriculum specific class sort mini study abroad program area focus – example geneva program focuses small arms multilateral negotiations south africa program based non-governmental organizations program meant communicative experience exchange ideas cultures open majors years popular study abroad option northeastern program used northeastern students gain extra credits minor concentration also used students trying graduate 4 years also participating one co-ops program sometimes take place multiple locations entrepreneurship global consulting israel dialogue starts boston eventually students go tel-aviv beer sheva israel dialogues span multiple countries one taught marrakesh morocco amsterdam concluding paris addition dialogues civilizations program northeastern also offers program called n.u.in primarily first-year students choose start first semester studying abroad program accepts students university spend first semester studying foreign university partnered northeastern students take classes english credits transfer northeastern arrive campus spring program began 2007 creation n.u.in australia option students go abroad fall semester coming home campus boston students year go n.u.in fall spring semester however majority complete program complete fall freshman year 2008 greece england added options n.u.in since early 2010s program started accepting students university selecting students admit n.u.in program idea behind bring students diverse experiences back boston campus presenting students motivated travel opportunity immediately study abroad also used introduce students professors communities across globe northeastern students could help university global presence northeastern goals global expansion outlined northeastern 2025 campaign stating northeastern 2025 build university network campuses around world create intercultural hubs lifelong experiential learning expanded study-abroad programs international co-op opportunities international dialogues coursework embedded employer partners 2012 500 students enrolled n.u.in program time offered destinations london dublin thessaloniki greece sydney san josé costa rica 2017 number grew 1,100 students program expanded shanghai rome berlin montreal melbourne removed san josé n.u.in destination students n.u.in program study top college campuses around world like mcgill university n.u.in canada students university sydney n.u.in australia students locations including n.u.in australia n.u.in england n.u.in ireland northeastern partnered two universities give students options would like study 2019 n.u.in locations include australia canada england greece ireland italy research centers institutes northeastern include university provides undergraduate students opportunity engage research center experiential education censsis research experience undergraduates honors research louis stokes alliance minority participation program provost office research grants fy 2007 annual external research funding exceeded 78 million fy 2009–2010 research funding close 82 million 2002 northeastern center subsurface sensing imaging systems designated nsf engineering research center 2004 northeastern one six institutions selected national science foundation center research nanotechnology 2010 northeastern granted 12 million alum homeland security research facility named george j. kostas research institute homeland security chief benefactor northeastern 1,257 full-time faculty 94.4 possess doctorate terminal degree field 403 part-time faculty fall 2015 northeastern faculty members direct 35 research education centers including national science foundation nsf engineering research center nsf nanomanufacturing center two nsf integrated graduate education research traineeship programs northeastern university accredited new england association schools colleges neasc empower campaign launched may 2013 goal raise 1 billion 2017 500 million philanthropic support 500 million industry government partnerships goal raised 1.25 billion 2015 campaign inspired richard d'amore alan mckim 60 million donation university business school 2012 money raised student support co-ops study abroad student research student ventures financial aid faculty advancement/expansion innovation education development co-op program research october 2017 northeastern revealed final total empower campaign 1.4 billion 100,000 individuals 3,800 organizations donated empower donors came 110 different nations across globe university able surpass goal twice surpassed goal set 2015 150 million northeastern 19 varsity teams ncaa 30 club sports teams 200 student organizations several prominent student-run organizations including resident student association rsa student government association sga northeastern university television nutv fraternity sorority life fsl council university programs cup organize activities northeastern students well surrounding community fourteen eighteen northeastern varsity sports teams competing ncaa division colonial athletic association since 2005 school sponsors following sports teams nu mascot paws school colors red black white trim fight song hail northeastern composed charles a. pethybridge class 1932 notable athletes played northeastern sports teams dan ross played football northeastern long setting super bowl record receptions game reggie lewis still holds men basketball career scoring record jose barea played point guard huskies averaged 21 points 4.4 rebounds 8.4 assists per game senior barea drafted dallas mavericks 2006 carlos peña named major league baseball american league comeback player year 2007 al gold glove winner 2008 u.s. olympic women ice hockey teams included northeastern alumni shelley looney chanda gunn baseball team competed one college world series played ncaa regionals seven times first year caa men basketball team finished 6th place 12 teams advanced semifinals conference tournament caa proved competitive conference 2006 ncaa basketball tournament george mason university advanced way final four 2007 second year caa women track team captured conference championship volleyball team finished second women basketball team 10 games 2008 previous year biggest one-year turnaround caa advanced tournament quarterfinals northeastern men women hockey teams compete hockey east conference 2007–2008 season men team ranked high 7 country held top spot conference finishing season sixth place hockey east teams also participate annual beanpot tournament four major boston-area colleges northeastern men team annual event 4 times 54-year history women team captured beanpot 14 times 2008–2009 season men team ranked high 3rd nation held top spot hockey east last weekend season team made ncaa tournament first time since 1994 beanpot championship game first time since 2004 goalie brad thiessen made hobey hat trick second northeastern player northeastern 2018 beanpot championship defeating boston college 3-0 first match defeating boston university 5-2 final match victory came northeastern attained highest placement 2017-2018 standings beanpot competitors beanpot also presents two awards individual players one valuable player one best goalie determined best save percentage second award named eberly award glen dan eberly goalies northeastern boston university addition winning beanpot title northeastern took home awards award valuable player presented adam gaudette eberly award presented cayden primeau save percentage .974 making goalie second highest save percentage win award 44 years award given northeastern crew team consistently ranks one top 10 teams nation 2008 national championship team made grand finals placed fourth behind university wisconsin–madison university washington university california berkeley beating brown university princeton university university pennsylvania harvard university northeastern offers 40 club sports including sailing judo rugby lacrosse alpine skiing squash cycling ultimate frisbee 2005 women rugby team finished third nation division ii year men rugby team largest annual tournament united states recently women rugby team competed placed 11th collegiate rugby championship men lacrosse team began 2008 season ranked top 10 nationally men women squash team finished 2008 season ranked top 20 nationally 2008–2009 academic year northeastern club field hockey women basketball teams respective national championships 2007 2009 northeastern club baseball team three straight new england club baseball association championships may 25 2010 club baseball team defeated penn state win national club baseball association division ii world series national championship citing sparse attendance numerous losing seasons expense renovate parsons field acceptable standard university board trustees voted november 20 2009 end football program according president joseph aoun leadership requires make choices decision allows us focus existing athletic programs northeastern located boston fenway roxbury back bay neighborhoods adjacent huntington avenue near museum fine arts symphony hall area also known fenway cultural district although located heart boston nu campus still filled trees flowers grassy quads since late 1990s northeastern considered model design urban universities twice beautiful new renovated exterior space award presented american institute architects 2001 2004 site first baseball world series commemorated front university churchill hall statue cy young recent sustainable endowments institute college sustainability report card issued northeastern grade a- environmental sustainability efforts programs additionally princeton review rated northeastern one top 15 green colleges nation 2010 2011 greenmetric world university ranking evaluated northeastern second greenest university world first us accordance boston zoning code amendment 2007 international village residence hall certified leed gold building 2010 dockser hall first building campus achieve leed certification also gold completion renovation 2010 northeastern university police department nupd full-service law enforcement agency full powers arrest university property property used northeastern students faculty campus adjacent boston police department headquarters 2008 reader digest survey ranked nu second safest school united states johns hopkins university maryland northeastern bracketed mbta orange line green line e branch six stations serve campus massachusetts avenue ruggles orange line symphony northeastern museum fine arts longwood medical area green line green line paralleled 39 bus ruggles also serves needham providence/stoughton franklin lines mbta commuter rail system northeastern campus mostly located along huntington avenue area known fenway cultural district part boston fenway back bay neighborhoods notable institutions district include museum fine arts isabella stewart gardner museum symphony hall huntington theatre company new england conservatory boston conservatory berklee college music christian science center mary baker eddy library harvard school public health northeastern campus something urban oddity despite location central boston northeastern home significant amount green open space quads site master planning competition awarded contract revive rejuvenate campus process started 1988 creation new northeastern quad mt ryder small oval land centrally located campus main entrance refurbished donations graduating class 1989 concrete square outside library student center transformed brick pavers granite curbstones scalloped design would eliminate square corners concept developed outgoing class 1989 northeastern news poll suggestion president ryder assoc dean students harvey vetstein presented board trustees march 1988 corners campaign kicked fundraiser ell student center parents weekend october 1988 later selection nationally recognized green space landscape architect 1990 started renewal plan continues today since late 1990s northeastern twice beautiful new renovated exterior space award presented american institute architects 2001 2004 2008 west village building f recognized american institute architects new england 2008 merit awards design excellence 2004 northeastern awarded prestigious gold medal massachusetts horticultural society dedham campus residential halls northeastern vary quite significantly buildings like kennedy hall 153 hemenway street former boston apartment buildings bought northeastern turned residential halls international village east village tall high-rise buildings built specifically purpose housing northeastern students residential halls host little 50 students many 1,000 traditional dorms include one room single double triple quad depending many students reside suites usually contain bathroom shared common area multiple rooms residential buildings traditional housing following list divides ones contain traditional ones suite-style housing traditional accommodations suite-style accommodations students usually divided groups called living learning communities llcs place student certain majors interests hobbies together llcs host events related specific area interest members llc participate llcs span sections floors residential hall entire floors multiple floors entire buildings found present multiple buildings list llcs offered freshman first year college affiliated llc options first year interdisciplinary llc options first year thematic based llc options east village northeastern newest dorm building honors freshmen upperclassmen building located 291 st. botolph street opened january 2015 honors freshman live suite-style rooms whereas upperclassmen choose full apartments kitchen facilities total five classrooms found building four basement one first floor event space provided 17th floor west village complex includes eight buildings serving mainly residence halls classrooms plans building k 22-story high rise housing 600 beds completed rented university able buy opened 1910 widely known boston arena matthews arena world oldest surviving indoor ice hockey arena located east edge northeastern university campus home northeastern huskies men women hockey teams men basketball team well wentworth institute technology men hockey team arena named former chair board trustees george j. matthews wife late hope m. matthews arena original home nhl boston bruins wha new england whalers nhl carolina hurricanes also secondary home nba boston celtics 1940s hosted part america east conference men basketball tournament total seven times hosted 1960 frozen four arena also served original home annual beanpot tournament boston four major college hockey programs named roger marino co-founder emc corporation marino center features first floor atrium two cafés tatte b.good food market wollaston second floor includes student exercise area multipurpose room used aerobics classes martial arts clubs gymnasium consists three basketball courts third floor state-of-the-art resistance training area fully equipped free weight room three-lane suspended track available either walking jogging rowing ergometers available centennial common created mark 100th anniversary university 1998 also serves gateway west campus area large grass oval spans hundred feet contains lawnchairs students relax well flagpole displays u.s. flag area frequently used students recreational purposes organizations/clubs booths nu libraries include snell library john d. o'bryant african-american institute library nu school law library separately administered nu school law snell library opened 1990 cost 35 million contains 1.3 million volumes digital media design studio within library collaborative interdisciplinary learning environment creating course-related multimedia presentations projects portfolios library home favat collection current collection children literature k-12 curriculum resources instructional materials related information support courses offered school education contains three computer labs operated nu information services two available nu students faculty staff teaching lab june 2016 library staff adopted open-access policy make members professional research publicly accessible online nu libraries received federal depository designation 1962 selective depository libraries receive forty-five percent federal publication series available depository libraries snell library also home northeastern university archives special collections department includes benjamin laguer papers collection special collections focus records boston-area community-based organizations concerned social justice issues snell library also open 24 hours day allowing students study given time within urban environment characterizes campus whole nu carved quiet peaceful space centrally located ell building spiritual life center sacred space nondenominational sacred space center main assembly hall configured carpets mats chairs distinctive ceiling consisting 3 hanging domes made overlapping aluminum tiles origami-like effect warm wood floors accents glass-paneled walls lean outward slightly shape material giving sense openness volume space faucets ablution available flanking antechamber center also contains smaller meeting space library sacred space opened 1998 architects office da nader tehrani monica ponce de leon received 2002 harleston parker medal boston society architects design northeastern university southernmost section campus located along columbus avenue roxbury parallel orange line university expanded south roxbury time building west village 2001 davenport commons opened providing 585 students housing two residence halls 75 families representing range incomes able purchase condo townhouse boston market value davenport commons also created commercial space tremont street summer 2006 northeastern university proposed new residence hall away main campus corner tremont street ruggles street construction began late february 2007 spring 2009 complex named international village opened later summer nicknames include iv inv consists three interconnected residence halls office complex administration building gym 400-seat dining hall available members northeastern community well public following buildings make south campus residential buildings administrative buildings athletic buildings february 21 2014 northeastern university groundbreaking ceremony new interdisciplinary science engineering complex isec columbus avenue completed 2017 building provides research educational space students faculty college science bouvé college health sciences college engineering khoury college computer sciences centerpiece complex includes large atrium spiral staircase 280-seat auditorium dodge hall mainly used northeastern business programs snell library opened 1990 served university main library dodge hall five floors basement houses computer lab connected university large network underground tunnels connects many buildings classrooms lounge area occupy first floor d'amore-mckim school business undergraduate office second floor graduate office third floor school professional accounting office fourth floor directly behind dodge hall ymca northeastern founded ell hall one oldest buildings campus hosts northeastern largest auditorium blackman auditorium blackman hosts many different types events classes theatre groups dance teams musical groups choral groups fraternities sororities orchestral ensembles blackman hosted many talented individuals dr. maya angelou seth meyers like dodge hall ell hall five floors also connects underground tunnel network building also contains classrooms art gallery
[ 10083, 132, 4839, 2666, 5837, 11255, 4828 ]
None
9,176
3
Vanguard_(microkernel):vanguard microkernel vanguard discontinued experimental microkernel developed apple computer research group atg early 1990s based v-system vanguard introduced standardized object identifiers unique message chaining system improved performance vanguard used apple commercial products development ended 1993 ross finlayson project principal investigator left apple vanguard generally similar v-system added support true object oriented programming operating system meant kernel server interfaces exported objects could inherited extended new code change real effect system primarily change source code makes programming easier instance vanguard i/o class supported number different servers networking file servers instance new applications could interact importing i/o interface calling methods also made writing new servers much easier standard program well able share code easily key concept almost microkernels breaking single large kernel set communicating servers instead single large program control entire hardware side computer system sorts duties handed smaller programs given rights control different parts machine instance particular server might given control networking hardware another task managing hard drives another server would handle file system calling lower-level servers user applications ask services sending messages servers using form inter-process communications ipc opposed asking kernel work via syscall trap v ipc system appears conceptually modeled remote procedure calls rpc client application perspective client application imported interface definition file containing information calls supported kernel applications used definition package requests called kernel would immediately take examine results pass information right handler potentially within kernel results handed back kernel client general terms operation system appears client application similar working normal monolithic kernel although results passed back might come third party handler essentially invisible client servers handling requests operated similar fashion clients opening connections kernel pass data however servers generally spawned new threads required handle longer-lasting requests handled responses posted thread could de-allocated servers could go receive mode awaiting requests contrast microkernel systems based model asynchronous communications opposed synchronous procedure calls canonical microkernel system mach modeled messages i/o several important side-effects primary among normal task schedulers unix-like systems normally block client waiting i/o request way actions pausing restarting applications waiting messages already built underlying system downside approach scheduler fairly heavyweight calling serious performance bottleneck led extensive development efforts improve performance v-system model message passing overhead reduced process scheduler consulted question next run – server called downside v approach requires work server side response may take time process one major addition ipc system vanguard opposed v concept message chains allowing single message sent several interacting servers single round-trip theory chaining could improve performance common multi-step operations consider case client application wishes read file normally would require one message kernel find file server three additional messages file server one resolve file name object id another open id finally another read file using vanguard chaining single message could constructed client contained requests message would sent kernel passed file server would handle three requests finally returning data much performance problem normally associated microkernel systems due context switches messages passed back forth applications example running v system would total eight context switches two request client switched kernel vanguard using chain would reduce three switches one client kernel another kernel file server finally server back client cases overhead context switch greater time takes actually run request vanguard chaining mechanism could result real-world performance improvements v also introduced simple distributed name service name service stored well known character names representing various objects distributed v system instance 2nd floor laser printer applications could ask name server objects name would handed back identifier would allow interact object name service separate server managed code kernel contrast full-blown name server spring operating system knew objects inside system also used servers system translate private names – file names ip addresses instance v-system objects servers referred via ad hoc private key sort say 32-bit integer clients would pass keys servers order maintain conversation specific task instance application might ask kernel file system handed 32-bit key representing program id use key send message file system asking open file addresses would result 64-bit key handed back keys example proprietary servers common key format used across system sort name resolving common v authors decided make keys first-class citizens vanguard instead using whatever object id servers happened use vanguard servers expected understand return globally unique 128-bit key first 64-bits containing server identifier second identifying object server server id maintained kernel allowing hand message network server referenced remote machine client invisible clear id handed randomly avoid guessing ill-intentioned software
[ 9441, 2761, 7561, 9931, 11180, 7983, 5363, 7187, 8700, 11123, 5976, 5049, 6300, 10813 ]
Test
9,177
1
Comparison_of_database_tools:comparison database tools following tables compare general technical information number available please see individual product articles information article neither all-inclusive necessarily date systems listed light purple background longer active development legend legend legend
[ 4614, 4106, 1037, 2063, 10258, 3096, 1562, 8742, 1579, 5677, 10286, 3636, 72, 5198, 5727, 1632, 11362, 1636, 10340, 8295, 8808, 1135, 2681, 5242, 10873, 6780, 2688, 11392, 1668, 9867, 6797, 9360, 5779, 10899, 10389, 4255, 8871, 9389, 10413,...
Test
9,178
9
Pack200:pack200 pack200 specified jsr 200 deprecated jep 336 compacting archive format developed sun capable reducing jar file sizes factor 7 9 pack200 optimized compressing jar archive files specifically java bytecode portion jar files applications technology included faster java application deployment java web start pack200 usually gzip compression applied http compression content specified content-encoding type pack200-gzip stored file extension .pack.gz used pack200 may also referred pack200 compression tools pack200 unpack200 provided sun java development kit since java 5 well pack200 compressed files
[ 4960, 9665, 8108, 910, 4561 ]
None
9,179
3
Apache_Flink:apache flink apache flink open-source stream-processing framework developed apache software foundation core apache flink distributed streaming data-flow engine written java scala flink executes arbitrary dataflow programs data-parallel pipelined manner flink pipelined runtime system enables execution bulk/batch stream processing programs furthermore flink runtime supports execution iterative algorithms natively flink provides high-throughput low-latency streaming engine well support event-time processing state management flink applications fault-tolerant event machine failure support exactly-once semantics programs written java scala python sql automatically compiled optimized dataflow programs executed cluster cloud environment flink provide data-storage system provides data-source sink connectors systems amazon kinesis apache kafka alluxio hdfs apache cassandra elasticsearch apache flink developed apache license 2.0 apache flink community within apache software foundation project driven 25 committers 340 contributors data artisans company founded original creators apache flink 12 apache flink committers currently employed data artisans apache flink dataflow programming model provides event-at-a-time processing finite infinite datasets basic level flink programs consist streams transformations “ conceptually stream potentially never-ending flow data records transformation operation takes one streams input produces one output streams result. ” apache flink includes two core apis datastream api bounded unbounded streams data dataset api bounded data sets flink also offers table api sql-like expression language relational stream batch processing easily embedded flink datastream dataset apis highest-level language supported flink sql semantically similar table api represents programs sql query expressions upon execution flink programs mapped streaming dataflows every flink dataflow starts one sources data input e.g. message queue file system ends one sinks data output e.g. message queue file system database arbitrary number transformations performed stream streams arranged directed acyclic dataflow graph allowing application branch merge dataflows flink offers ready-built source sink connectors alluxio apache kafka amazon kinesis hdfs apache cassandra flink programs run distributed system within cluster deployed standalone mode well yarn mesos docker-based setups along resource management frameworks apache flink includes lightweight fault tolerance mechanism based distributed checkpoints checkpoint automatic asynchronous snapshot state application position source stream case failure flink program checkpointing enabled upon recovery resume processing last completed checkpoint ensuring flink maintains exactly-once state semantics within application checkpointing mechanism exposes hooks application code include external systems checkpointing mechanism well like opening committing transactions database system flink also includes mechanism called savepoints manually-triggered checkpoints user generate savepoint stop running flink program resume program application state position stream savepoints enable updates flink program flink cluster without losing application state flink 1.2 savepoints also allow restart application different parallelism—allowing users adapt changing workloads flink datastream api enables transformations e.g filters aggregations window functions bounded unbounded streams data datastream api includes 20 different types transformations available java scala simple example stateful stream processing program application emits word count continuous input stream groups data 5-second windows import org.apache.flink.streaming.api.scala._ import org.apache.flink.streaming.api.windowing.time.time case class wordcount word string count int object windowwordcount apache beam “ provides advanced unified programming model allowing developer implement batch streaming data processing jobs run execution engine. ” apache flink-on-beam runner feature-rich according capability matrix maintained beam community data artisans conjunction apache flink community worked closely beam community develop flink runner flink dataset api enables transformations e.g. filters mapping joining grouping bounded datasets dataset api includes 20 different types transformations api available java scala experimental python api flink dataset api conceptually similar datastream api flink table api sql-like expression language relational stream batch processing embedded flink java scala dataset datastream apis table api sql interface operate relational table abstraction tables created external data sources existing datastreams datasets table api supports relational operators selection aggregation joins tables tables also queried regular sql table api sql offer equivalent functionality mixed program table converted back dataset datastream logical plan defined relational operators sql queries optimized using apache calcite transformed dataset datastream program flink forward annual conference apache flink first edition flink forward took place 2015 berlin two-day conference 250 attendees 16 countries sessions organized two tracks 30 technical presentations flink developers one additional track hands-on flink training 2016 350 participants joined conference 40 speakers presented technical talks 3 parallel tracks third day attendees invited participate hands-on training sessions 2017 event expands san francisco well conference day dedicated technical talks flink used enterprise flink system internals ecosystem integrations flink future platform features keynotes talks flink users industry academia hands-on training sessions apache flink speakers following organizations presented flink forward conferences alibaba amadeus bouygues telecom capital one cloudera data artisans emc ericsson hortonworks huawei ibm google mapr mongodb netflix new relic otto group red hat researchgate uber zalando 2010 research project stratosphere information management cloud funded german research foundation dfg started collaboration technical university berlin humboldt-universität zu berlin hasso-plattner-institut potsdam flink started fork stratosphere distributed execution engine became apache incubator project march 2014 december 2014 flink accepted apache top-level project release dates apache incubator release dates pre-apache stratosphere release dates
[ 9344, 10377, 8460, 7567, 1296, 6161, 1047, 1913, 2842, 6555, 8217, 8860, 11161, 3877, 10661, 11303, 5677, 10413, 1327, 7983, 7159, 4919, 5047, 4538, 1851, 6074, 6458, 7485, 7742, 9789, 4417, 6338, 4419, 7233, 10303, 1222, 1991, 4294, 7750, ...
Test
9,180
6
Logic_File_System:logic file system logic file system research file system replaces pathnames expressions propositional logic allows file metadata queried superset boolean syntax commonly used modern search engines actual name logic information systems file system abbreviated lisfs avoid confusion log-structured file system lfs implementation logic file system available lisfs website intended used unix-like operating systems bit difficult install needs several non-standard ocaml modules
[ 1825, 7983 ]
Test
9,181
4
DDoS_mitigation:ddos mitigation ddos mitigation set techniques tools resisting mitigating impact distributed denial-of-service ddos attacks networks attached internet protecting target relay networks ddos attacks constant threat businesses organizations threatening service performance shut website entirely even short time first things ddos mitigation identify normal conditions network traffic defining “ traffic patterns ” necessary threat detection alerting ddos mitigation also requires identifying incoming traffic separate human traffic human-like bots hijacked web browsers process done comparing signatures examining different attributes traffic including ip addresses cookie variations http headers javascript footprints detection made next process filtering filtering done anti-ddos technology like connection tracking ip reputation lists deep packet inspection blacklisting/whitelisting rate limiting one technique pass network traffic addressed potential target network high-capacity networks traffic scrubbing filters manual ddos mitigation longer recommended due ddos attackers able circumvent ddos mitigation software activated manually ways prevent ddos attacks implemented on-premise or/and via cloud-based solution providers on-premise mitigation technology commonly hardware device placed front ” network disadvantage filtering capacity limited capacity filtering device middle option hybrid solution combining on-premise filtering cloud-base filtering best practices ddos mitigation include anti-ddos technology anti-ddos emergency response services ddos mitigation also available cloud-based providers ddos attacks executed websites networks selected victims number vendors offering ddos resistant hosting services mostly based techniques similar content delivery networks distribution avoids single point congestion prevents ddos attack concentrating single target one technique ddos attacks use misconfigured third-party networks allow amplification spoofed udp packets proper configuration network equipment enabling ingress filtering egress filtering documented bcp 38 rfc 6959 prevents amplification spoofing thus reducing number relay networks available attackers
[ 10368, 5636, 3462, 11413, 7965, 5407, 5295, 10417, 4414, 1088, 2240, 6080, 6347, 3807, 4194, 3941, 2409, 8176, 8956, 7037 ]
None
9,182
3
Apple_A9X:apple a9x apple a9x 64-bit arm-based system chip soc designed apple inc first appeared ipad pro announced september 9 2015 released november 11 2015 a9x m9 motion coprocessor embedded new innovation seen previous chip generations variant a9 apple claims 1.8 times cpu performance 2 times gpu performance predecessor a8x a9x features apple-designed 64-bit armv8-a dual-core cpu called twister offers double memory bandwidth double storage performance apple a8x unlike a9 a9x contain l3 cache due significant dram bandwidth a9x paired 4 gb lpddr4 memory 12.9 ipad pro 2 gb lpddr4 memory 9.7 ipad pro total bandwidth 51.2 gb/s high bandwidth necessary feed soc 12-core powervr 7 series gpu ram included a9x package unlike sibling a9 a9x uses nand interface a9 uses apple-designed nvme-based controller communicates pcie connection ipad pro nand design akin pc-class ssd embedded flash memory common mobile devices gives ipad pro significant storage performance advantage competitors often use msata emmc connect storage systems
[ 10755, 9732, 1549, 5647, 7697, 4114, 9235, 11282, 6165, 11289, 7706, 8222, 1057, 2551, 38, 6183, 1576, 6186, 4139, 6700, 7211, 8237, 9774, 2097, 1074, 8754, 9784, 8250, 8253, 576, 7745, 1090, 7747, 2635, 8783, 4180, 10838, 1623, 3672, 108...
Test
9,183
1
Database_publishing:database publishing database publishing area automated media production specialized techniques used generate paginated documents source data residing traditional databases common examples mail order catalogues direct marketing report generation price lists telephone directories database content form text pictures also contain metadata related formatting special rules may apply document generation process database publishing incorporated larger workflows component documents created approved revised released basic idea using database contents like article price information fill pre-formatted template documents templates typically created normal desktop layout application certain boxes text designated placeholders placeholders targeted new content flows database allows quick generation final output case changes database quickly perform updates limited manual intervention another model database publishing found many web-to-print sites users browse templates online catalog business cards brochures personalize selected template filling form view rendered result case initial source data user input captured database user revisits site later resume editing left form pre-filled database-stored variables user entered main layout applications workflow datalogics pager adobe framemaker indesign quarkxpress xyvision arbortext advanced print publisher formerly 3b2 generally layout applications corresponding server version receives commands via web interfaces rather desktop interaction quarkxpress server adobe indesign server take full advantage design features available respective desktop versions applications make broad spectrum features available extension integration vertical products developed either internally form scripting e.g javascript applescript indesign externally api corresponding developer kits variants database publishing rendering content direct pdf output approach prevents manual intervention final output since pdf comfortably editable may perceived limitation situations like report generation manual editability needed desired
[ 2688, 3462, 9481, 10505, 10258, 10518, 4376, 9112, 7968, 290, 1314, 7461, 8742, 5550, 5808, 10418, 9527, 3768, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 8518, 72, 9683, 853, 2901, 9942, 9177, 987, 860, 11362, 10471, 8808, 6383, 9079, 268...
Test
9,184
4
Business_continuity_planning:business continuity planning business continuity planning business continuity resiliency planning process creating systems prevention recovery deal potential threats company addition prevention goal enable ongoing operations execution disaster recovery organization resistance failure ability ... withstand changes environment still function often called resilience capability enables organizations either endure environmental changes without permanently adapt organization forced adapt new way working better suits new environmental conditions event could negatively impact operations included plan supply chain interruption loss damage critical infrastructure major machinery computing /network resource bcp subset risk management us government entities refer process continuity operations planning coop business continuity plan outlines range disaster scenarios steps business take particular scenario return regular trade bcp written ahead time also include precautions put place usually created input key staff well stakeholders bcp set contingencies minimize potential harm businesses adverse scenarios 2005 analysis disruptions adversely affect operations corporations investments resilience give competitive advantage entities prepared various contingencies extended then-common business continuity planning practices business organizations council competitiveness embraced resilience goal adapting change apparently slower evolutionary manner sometimes many years decades described resilient term strategic resilience used go beyond resisting one-time crisis rather continuously anticipating adjusting case change becomes desperately obvious approach sometimes summarized preparedness protection response recovery business continuity intended outcome proper execution business continuity planning disaster recovery payoff cost-effective buying spare machines servers performing backups bringing off-site assigning responsibility performing drills educating employees vigilant major cost planning preparation audit compliance management documents automation tools available reduce time cost associated manually producing information several business continuity standards published various standards bodies assist checklisting ongoing tasks planners must information analysis phase consists quantifying loss ratios must also include dollars defend lawsuit estimated dollar spent loss prevention prevent seven dollars disaster-related economic loss business impact analysis bia differentiates critical urgent non-critical non-urgent organization functions/activities function may considered critical dictated law function two values assigned maximum time constraints long enterprise key products services unavailable undeliverable stakeholders perceive unacceptable consequences named according iso 22301 terms maximum acceptable outage maximum tolerable period disruption mean thing defined using exactly words defining recovery requirements potential threat may require unique recovery steps common threats include areas cascade responders stumble supplies may become depleted 2002-2003 sars outbreak organizations compartmentalized rotated teams match incubation period disease also banned in-person contact business non-business hours increased resiliency threat impact scenarios identified documented reflect widest possible damage share seven tiers disaster recovery released 1992 updated 2012 ibm eight tier model two main requirements impact analysis stage phase overlaps disaster recovery planning solution phase determines british standards institution bsi released series standards itil defined terms within uk bs 25999-2:2007 bs 25999-1:2006 used business continuity management across organizations industries sectors documents give practical plan deal eventualities—from extreme weather conditions terrorism system failure staff sickness 2004 following crises preceding years uk government passed civil contingencies act 2004 businesses must continuity planning measures survive continue thrive whilst working towards keeping incident minimal possible act separated two parts united kingdom australia incorporated resilience continuity planning united kingdom resilience implemented locally local resilience forum new zealand canterbury university resilient organisations programme developed assessment tool benchmarking resilience organisations covers 11 categories 5 7 questions resilience ratio summarizes evaluation implementation phase involves policy changes material acquisitions staffing testing 2008 book exercising excellence published british standards institution identified three types exercises employed testing business continuity plans start stop times pre-agreed actual duration might unknown events allowed run course biannual annual maintenance cycle maintenance bcp manual broken three periodic activities issues found testing phase often must reintroduced analysis phase bcp manual must evolve organization maintain information know specialized technical resources must maintained checks include software work process changes must documented validated including verification documented work process recovery tasks supporting disaster recovery infrastructure allow staff recover within predetermined recovery time objective
[ 6019, 903, 7979, 3757, 5327, 6514, 11157, 7898, 7739, 4956, 5373, 383 ]
Test
9,185
9
XTalk:xtalk xtalk loosely defined family scripting languages mother xtalk languages hypertalk language used apple hypercard environment languages characterized simple english-like syntaxes using real-life metaphors top smalltalk-style image message sending apparatus pascal-style block boundaries less rigid structure xtalk languages share common set basic data structures commands well general object model thus allow relative portability among programming languages bear surface similarities hypertalk inspired however object models differ substantially porting code another xtalk requires complete rewrite xtalk languages share following basic constructs xtalk smalltalk-like messaging send message write command function call like pascal message parameters require declarations resolved runtime correct handler handler looks like behaves pretty much like pascal equivalent except parameter list variadic fewer parameters passed handler declares first line remaining variables filled empty strings passed quietly ignored instead declaring parameters list handler name also accessed using functions also gives access ignored parameters xtalk scripts often attached objects hypertalk supertalk mediatalk livecode though always e.g compileit sensetalk script contain handler particular message uses message passed owning object script handle scripts also manually pass message parent using command xtalks support following basic commands main assignment statement xtalks also support prefixing/suffixing values also support 'get value command equivalent put statement container named 'it like pascal handler passes data back message sender also valid command handlers return value stored built-in variable change property object range text text contents given value used modify instance variables objects well apply text styles text fields object specified global property host application assumed xtalks support conditional statements following form line break following statement token omitted single command may follow statement may omitted allows writing entire if-then-else statement single line chaining conditionals if-then-else-if-then-else chains also entire block may omitted token may wrapped onto next line loop statements quite free-form many dialects add additional loop syntax things like looping chunks xtalks support usual mathematic expressions apart usual operators also support integer division exponent remainder integer division codice_1 equality unequality codice_2 codice_3 number comparison/string sort order substring matching point coordinates lie inside rectangle coordinates boolean negation logical booleans logical booleans string concatenation string concatenation space type detection determine file/object existence variables xtalks need declared rather transparently created value first put variable name used nothing yet put treated unquoted string literal evaluates name thus mimicking behavior line-by-line interpreter variables xtalks variants conceptually strings interpreted internally data type current operation performed however may following types string integer number point rect date logical aka boolean equal string representations case rects points comma-separated lists numbers h v resp left top right bottom logicals true false perfectly valid perform string operations numbers immediately mathematical operations global variables need declared using special keyword often xtalks word used instead import current handler scope xtalks support chunk expressions mid-level operations extract modify substring ranges variable expressions value container usually form supported chunk types usually char acter item word line though dialects add support bytes chunk units xtalks support changing delimiter use items default comma using property reset later point though supertalk resets comma end handler hypertalk resets idle time i.e system events also mathematical commands like etc xtalks based hypercard 1.2-level architecture since hypercard 1.2 support multiple windows menus movies web browsers many xtalks implement aspects differently e.g supertalk implements multiple windows replacing 'stack level object hierarchy 'project script container representing file 'window effectively stack used may several one project file whereas hypercard 2.0 livecode kept 'stack level instead provided new different commands allow requesting second stack opened window instead replacing current stack onscreen hypersense kept similar approach renamed 'card 'page popup buttons menus fully native persistent objects project file image scripts supertalk referenced 'item copy menu edit like hypertalk transient objects added global menu bar shared stacks using 'create menu command referenced 'menuitem copy menu edit single-line 'menumessage send picked similarly types styles objects placed card differ greatly xtalks divergence point hypercard 1.2.x buttons fields supercard let background fields content different cards requiring use draw text graphics labels instead hypercard hypercard 2.x compound term 'part subsume buttons fields etc card also supported xtalks although hypercard never provided feature xtalks today implement 'user properties feature first introduced supercard allows adding custom instance variables existing objects host application used like built-in properties hold data type example using user property also codice_4 command remove properties object
[ 544, 8225, 4486, 3462, 4844, 6958, 10097, 8854, 9209 ]
Test