node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
9,186 | 4 | 2012_LinkedIn_hack:2012 linkedin hack social networking website linkedin hacked june 5 2012 passwords nearly 6.5 million user accounts stolen russian cybercriminals owners hacked accounts longer able access accounts website repeatedly encouraged users change passwords incident vicente silveira director linkedin confirmed behalf company website hacked official blog also said holders compromised accounts would find passwords longer valid website stolen passwords hashed i.e checksum stored allowing testing whether given password correct one cracked posted russian password forum later day morning june 6 passwords thousands accounts available online plain text graham cluley internet security firm sophos warned leaked passwords could possession criminals 6 june linkedin said official statement would email members security instructions instructions could reset passwords may 2016 linkedin discovered additional 100 million email addresses hashed passwords claimed additional data 2012 breach response linkedin invalidated passwords users changed passwords since 2012 rep. mary bono mack united states congress commented incident many times going happen congress finally wakes takes action latest incident brings sharp focus need pass data protection legislation senator patrick leahy said reports another major data breach give pause american consumers ever share sensitive personal information online transactions networking ... congress make comprehensive data privacy cybercrime legislation top priority marcus carey security researcher rapid7 said hackers penetrated databases linkedin preceding days expressed concerns may access website even attack michael aronowitz vice president saveology said everyday hundreds sites hacked personal information obtained stealing login information one account easily used access accounts hold personal financial information security experts indicated stolen passwords encrypted way fairly easy decrypt one reasons data breach katie szpyrka long time user linkedin illinois united states filed 5 million lawsuit linkedin complaining company keep promises secure connections databases erin ’ harra spokeswoman working linkedin asked lawsuit said lawyers looking take advantage situation propose bills sopa pipa united states congress amended complaint filed nov. 26 2012 behalf szpyrka another premium linkedin user virginia united states named khalilah gilmore–wright class representatives linkedin users affected breach lawsuit sought injunctive equitable relief well restitution damages plaintiffs members class linkedin apologized immediately data breach asked users immediately change passwords federal bureau investigation assisted linkedin corporation investigating theft 8 june 2012 investigation still early stages company said unable determine whether hackers also able steal email addresses associated compromised user accounts well linkedin said users whose passwords compromised would unable access linkedin accounts using old passwords internet security experts said passwords easy unscramble linkedin failure use salt hashing considered insecure practice allows attackers quickly reverse scrambling process using existing standard rainbow tables pre-made lists matching scrambled unscrambled passwords another issue sparked controversy ios app provided linkedin grabs personal names emails notes mobile calendar without user approval security experts working skycure security said application collects user personal data sends linkedin server linkedin claimed permission feature user-granted information sent securely using secure sockets layer ssl protocol company added never stored shared information third party october 5 2016 russian hacker detained czech police prague united states requested interpol warrant united states grand jury indicted nikulin three unnamed co-conspirators charges aggravated identity theft computer intrusion prosecutors alleged nikulin stole linkedin employee username password using gain access corporation network nikulin also accused hacking dropbox formspring allegedly conspiring sell stolen formspring customer data including usernames e-mail addresses passwords nikulin facing czech hearing determine whether extradited united states russian foreign ministry spokesperson maria zakharova indicated russian authorities trying block extradition nikulin currently held santa rita jail nikulin scheduled undergo psychological evaluation determine whether mentally competent | [
1024,
5636,
4623,
4117,
8726,
535,
9761,
4644,
4133,
1608,
3657,
8779,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
1251,
5349,
1254,
10477,
9460,
7418,
281... | Validation |
9,187 | 4 | Fakesysdef:fakesysdef trojan win32/fakesysdef originally dispersed application called hdd defragmenter hence name fakesysdef fake system defragmenter computer trojan type computer virus targeting microsoft windows operating system first documented late 2010 win32/fakesysdef manifests one array programs purport scan one computer hardware failures related system memory hard drives system functionality whole scan computer show false hardware issues present remedy defrag hard drives fine-tune system performance request user make payment order activate program user download new updates repair hardware issues fictitious scanning program detects one widespread varieties risks prevalent internet today everyday numerous fake antivirus security applications published released unsuspecting end-users via large assortment distribution channels many times software turn clones – developed code base packaged unique title design use skin branding strategy may look legitimate computer users names usually combination technical words hdd disk memory action words scanner defragmenter diagnostics repair fix users may encounter kind threat visit websites attempt convince remove non-existent malware security risks computers installing bogus software trojan also installed malware drive-by downloads downloading installing software users may directed sites way following methods programs intentionally misrepresent security status computer continually presenting fake scan dialog boxes alert messages prompt user buy product programs often icon notification area operating system desktop constantly display pop-up messages alerting user fake security issues virus infections pop-up windows disappear user purchased product non-existent threats supposedly removed compromised computer user decides purchase product presented form within application redirected website requests credit card information win32/fakesysdef installer may arrive computer various file names run installer drops injects dll file sometimes exe file common processes example explorer.exe winlogon.exe wininet.exe instances main executable drops dll exe components case exe set run every windows restart dll injected explorer.exe exe component ensure automatically runs every time windows starts drops copy exe component using random file name appdata folder win32/fakesysdef may make widespread changes system including modifying several internet explorer settings enabling submitting non-encrypted form data changing desktop wallpaper displaying hiding shortcuts hiding desktop start menu links disabling windows task manager disabling checking signatures downloaded programs setting low risk file types additionally win32/fakesysdef variants may terminate running processes installation may block launched application computer restarts installation process may terminate running processes force computer restart restart fakesysdef attempts block every launched program may display fake error messages offering fix problem repeatedly restarts computer user agrees buy fake software overwrites data hard drive/hard drive disk/hdd win32/fakesysdef displays numerous false alerts indicating system errors displaying appearance scanning hard disk defragmenting prompts user fix errors button buy activate fix discovered errors fix errors button selected fakesysdef pretends scan defragment hard disk displays fake error messages tells user needs purchase advanced module fix user chooses browser opens open custom web browser user input card information buy software anti-virus software makers responded threat fakesysdef adding checks products simple removal software enabled sometimes enough reverse damage configuration files fakesysdef known edit | [
3072,
6786,
7044,
10245,
10756,
9356,
6797,
3473,
8978,
4863,
4883,
9233,
278,
3351,
10392,
1690,
3867,
10141,
5281,
2213,
8998,
9256,
939,
7983,
1970,
3643,
444,
6588,
7739,
8639,
1088,
9791,
3395,
4165,
2508,
7515,
4344,
3941,
107,
877,... | None |
9,188 | 9 | TI_BASIC_(TI_99/4A):ti basic ti 99/4a ti basic ansi-compliant basic programming language interpreter built 1981 texas instruments ti-99/4a home computer predecessor ti-99/4 1979 developed microsoft bob wallace bob greenberg version supporting compiled code used commercial development language ti-990 range minicomputers text full screen graphics logic operations recording tape file system supported ti basic texas instruments also produced ti extended basic cartridge enhanced functionality accessible basic users statements ti basic call close data def dim display end for..to..step gosub goto if..then..else input let next on..gosub on..goto open option base print randomize read rem restore return stop every line ti basic contain one statement possibility put several statements line also necessary peek load calls use assembly language routines became available ti extended basic note poke statement ti basic loading executing machine code requires 32k memory expansion ti editor/assembler cartridge gives access call load 256 bytes ram directly accessible cpu mostly consumed basic interpreter ti basic stored ran programs 16k video ram unlike ti extended basic could take advantage 32k memory expansion unlike microsoft basics used left mid right instr manipulating strings ti basic used ansi-compliant seg pos subprograms called call statement e.g call clear user defined subprograms possible ti extended basic subprograms predefined ti basic written interpreted byte-code language known graphics programming language unique ti-99 line ti extended basic improved execution speed somewhat providing functionality assembly language wallace said put lot extra time trying get ti basic funny little things ... basic could bring line edit line ... suppose wanted line somewhere else ca n't edit line numbers n't work way worked lot get work way | [
2432,
3718,
7691,
1805,
9997,
786,
11412,
22,
3736,
3481,
9881,
797,
6813,
3233,
11683,
5925,
8101,
4136,
10666,
8494,
303,
7343,
11315,
315,
7355,
7612,
7486,
7870,
4160,
4674,
10750,
712,
847,
2383,
1879,
92,
11229,
2915,
5733,
11243,
... | Test |
9,189 | 6 | Episode_filesystem:episode filesystem episode posix compliant file system commonly known use dce/dfs file servers designed achieve goals portability scaling make efficient use available system bandwidth used variety methods achieve goals one use metadata logging designed enhance file system performance episode file system basis ibm z/os posix-compatible file system called zfs | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
2168,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5... | Validation |
9,190 | 3 | KGDB:kgdb kgdb debugger linux kernel kernels netbsd freebsd requires two machines connected via serial connection serial connection may either rs-232 interface using null modem cable via udp/ip networking protocol kgdb ethernet kgdboe target machine one debugged runs patched kernel host machine runs gdb gdb remote protocol used two machines kgdb implemented part netbsd kernel 1997 freebsd version 2.2 concept existing remote gdb protocol later adapted patch linux kernel scaled-down version linux patch integrated official linux kernel version 2.6.26 kgdb available following architectures linux x86 x86-64 powerpc arm mips s390 available supported architectures netbsd freebsd using rs-232 connectivity amit kale maintained linux kgdb 2000 2004 2004 2006 maintained linsyssoft technologies jason wessel wind river systems inc. took official maintainer ingo molnar jason wessel created slimmed-down cleaned version kgdb called kgdb light without ethernet support many hacks one merged 2.6.26 kernel version kgdb supports rs-232 connectivity using special driver split debugger inputs console inputs single serial port required program named kgdb also used freebsd gdb based utility debugging kernel core files also used remote live kernel debugging much way linux kgdb either serial connection firewire link | [
7938,
7812,
8326,
4360,
4493,
2195,
11155,
1813,
11413,
10780,
1694,
9374,
3618,
4011,
9646,
7983,
823,
9660,
10817,
7234,
5067,
8147,
1761,
4841,
5356,
9964,
8700
] | Test |
9,191 | 3 | Cyberun:cyberun cyberun zx spectrum video game ostensibly developed ultimate play game published u.s. gold 1986 although part jetman series similarities jetpac player must construct spaceship parts seek resources power-ups unlike ultimate titles cyberun written partnership tim chris stamper player controls spaceship trapped planet inhabited hostile aliens goal upgrade spaceship parts scattered around planet mine valuable element called cybernite atmosphere ground populated flying aliens clouds drip acid damaging ship shields ship requires fuel fly exhausted bounce along ground planet unable climb similar enemy ship also planet attempting mine cybernite player fuel replenished tankers planet surface damaged shields repaired player must venture caverns surface order mine cybernite done ship upgraded include mining laser sufficient cybernite collected player escape next planet zebarema system game well received critics crash awarding 90 crash smash spectrum giving 8/10 describing game classic pick pieces shoot em brilliant graphics link playing online | [
320,
4102,
9254,
2792,
9006,
4278,
5820,
2173
] | Test |
9,192 | 9 | MetaPost:metapost metapost refers programming language interpreter metapost programming language derived donald knuth metafont language interpreter metapost produces vector graphic diagrams geometric/algebraic description language shares metafont declarative syntax manipulating lines curves points geometric transformations however many limitations metapost derive features metafont instance metapost support features postscript notably paths one segment regions simply connected regions filled uniform colours postscript level 1 supports tiled patterns postscript 3 supports gouraud shading metapost distributed many distributions tex metafont framework example included miktex tex live distributions encapsulated postscript produced metapost included latex context tex documents via standard graphics inclusion commands encapsulated postscript output also used pdftex engine thus directly giving pdf ability implemented context latex graphics package used plain tex via supp-pdf.tex macro file context luatex supports inclusion metapost code within input file inclusion metapost code latex also possible using latex-packages example gmp mpgraphics single file samp example.mp /samp processed metapost interpreter via command codice_1 linux produces three eps files samp example.1 /samp samp example.2 /samp samp example.3 /samp pictured right resulting three eps files used tex via latex codice_2 command context codice_3 plain tex codice_4 command plain pdftex codice_5 command samp supp-pdf.tex /samp view print third diagram inclusion necessary tex fonts computer modern included eps files produced metapost default | [
9345,
2978,
1347,
3876,
9827,
8262,
1191,
9320,
73,
6553,
5612,
2798,
7983,
10352,
8628,
823,
345
] | None |
9,193 | 8 | CGIProxy:cgiproxy cgiproxy name suggests cgi proxy software package cgi common gateway interface proxy appears user web page allows user access different site cases anonymously anonymous cgi proxy type proxy server works encrypted web form embedded another web page hosted securely using ssl secure socket layering also often called web proxy cgiproxy written perl programming language installed web server execute perl program via cgi supports non-parsed header cgi scripts addition installed mod_perl fastcgi script standalone daemon supported protocols include http ftp ssl well related technologies javascript adobe flash cgiproxy development stalled december 25 2008 december 9 2011 later saw six releases 2014 quite extensive changelog including windows support though nature perl language practically requires source code cgiproxy visible install cgiproxy technically open source software due commercial license fee however extensively commented modularized designed start encourage users modify extend purposes author licenses used freely non-commercial use negotiate license terms commercial use | [
4224,
3462,
5254,
8582,
138,
1692,
9117,
3625,
2485,
8630,
8640,
3777,
2884,
3781,
7364,
225,
2661,
10341,
4725,
5749,
119,
5887
] | Validation |
9,194 | 2 | MS-Net:ms-net ms-net sometimes stylized ms-net early network operating system sold microsoft earliest days local area networking lans ms-net complete networking system microsoft licensed vendors used basis server programs ran ms-dos porting underlying networking hardware adding services top version 1.0 announced 14 august 1984 released along pc/at 2 april 1985 number ms-net products sold late 1980s replaced lan manager 1990 ms-net network interface based ibm netbios protocol definition allowed ported different networking systems relative ease implement entire netbios protocol however small number features required server role one key feature implemented netbios name management routines feature 3rd parties often added back system also supplied program redir.exe allowed transparent file access dos machines ms-net based server several products mid-to-late-1980s based ms-net system ibm pc-net slightly modified version ms-net system typically used token ring ms partnered 3com produce widely used 3+share system running 3com networking stack based xns protocol ethernet well-known systems including banyan vines novell netware use ms-net basis using unix custom os respectively however allow access files via redir.exe ms-net sold short period time ms 3com collaborated replacement known lan manager running os/2 using new server message block standard file transfer 3com version product retained xns-based protocol 3com abandoned server market long ms version remained based netbios supported number underlying protocols hardware lan manager replaced 1993 windows nt 3.1 | [
8576,
6787,
6797,
8976,
3857,
3477,
5406,
10273,
8098,
7983,
570,
7483,
3007,
321,
6596,
8262,
9033,
5067,
2380,
6476,
9166,
4305,
4051,
5600,
8423,
8301,
499,
5363,
5492,
3323,
1148,
639
] | Test |
9,195 | 9 | Douglas_Crockford:douglas crockford douglas crockford american computer programmer entrepreneur best known ongoing involvement development javascript language popularized data format json javascript object notation developing various javascript related tools jslint jsmin currently senior javascript architect paypal also writer speaker javascript json related web technologies crockford earned degree radio television san francisco state university 1975 took classes fortran worked university lab computer crockford purchased atari 8-bit computer 1980 wrote game galahad holy grail atari program exchange apx resulted chris crawford hiring atari inc atari crockford wrote another game burgers apx number experimental audio/visual demos freely distributed warner communications sold company joined national semiconductor 1984 crockford joined lucasfilm later paramount pictures became known video game oriented listservs early 1990s posted memoir expurgation maniac mansion videogaming bulletin board memoir documented efforts censor computer game maniac mansion nintendo satisfaction could release cartridge crockford mounting frustrations nintendo demands became obscure confusing together randy farmer chip morningstar crockford founded electric communities ceo 1994 1995 involved development programming language e. crockford founder state software also known veil networks cto 2001 2002 time state software crockford popularized json data format based upon existing javascript language constructs lightweight alternative xml obtained domain name json.org 2002 put description format july 2006 specified format officially rfc 4627 2002 reference president george bush war evildoers crockford started releasing jsmin software custom license created adding requirement software shall used good evil open source mit license clause carried jsmin-php variation jsmin ryan grove software hosted google code december 2009 due additional clause google determined license compliant definition free open source software permit restriction software may used jsmin-php forced migrate new hosting provider | [
256,
1409,
259,
8068,
3462,
6791,
1802,
6154,
10507,
8854,
4378,
8605,
7455,
6176,
1698,
803,
5031,
3761,
1203,
11060,
438,
4920,
1470,
5311,
2880,
65,
7871,
9152,
4171,
5067,
11087,
339,
84,
4056,
9560,
9561,
603,
8923,
479,
8289,
482,... | Test |
9,196 | 2 | Microsoft_CryptoAPI:microsoft cryptoapi microsoft windows platform specific cryptographic application programming interface also known variously cryptoapi microsoft cryptography api ms-capi simply capi application programming interface included microsoft windows operating systems provides services enable developers secure windows-based applications using cryptography set dynamically linked libraries provides abstraction layer isolates programmers code used encrypt data crypto api first introduced windows nt 4.0 enhanced subsequent versions cryptoapi supports public-key symmetric key cryptography though persistent symmetric keys supported includes functionality encrypting decrypting data authentication using digital certificates also includes cryptographically secure pseudorandom number generator function cryptgenrandom cryptoapi works number csps cryptographic service providers installed machine csps modules actual work encoding decoding data performing cryptographic functions vendors hsms may supply csp works hardware windows vista features update crypto api known cryptography api next generation cng better api factoring allow functions work using wide range cryptographic algorithms includes number newer algorithms part national security agency nsa suite b also flexible featuring support plugging custom cryptographic apis cng runtime however cng key storage providers still support symmetric keys cng works user kernel mode also supports algorithms cryptoapi microsoft provider implements cng housed bcrypt.dll cng also supports elliptic curve cryptography uses shorter keys expected level security efficient rsa cng api integrates smart card subsystem including base smart card cryptographic service provider base csp module encapsulates smart card api smart card manufacturers make devices compatible rather provide from-scratch solution cng also adds support dual_ec_drbg pseudorandom number generator defined nist sp 800-90a could expose user eavesdropping national security agency since contains kleptographic backdoor unless developer remembers generate new base points different cryptographically secure pseudorandom number generator true random number generator publish generated seed order remove nsa backdoor also slow used called explicitly cng also replaces default prng ctr_drbg using aes block cipher earlier rng defined superseded fips 186-2 based either des sha-1 broken ctr_drbg one two algorithms nist sp 800-90 endorsed schneier hash_drbg | [
10243,
9745,
9234,
1043,
10769,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
1098,
4174,
4178,
7252,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
1676,
653,
6797,
3224,
4771,
7846,
2221,
10414,
3250,
8... | None |
9,197 | 2 | YaST:yast yast yet another setup tool linux operating system setup configuration tool yast featured opensuse linux distribution well suse derived commercial distributions also part defunct united linux yast features tools configure many aspects system first suse distribution included yast released may 1996 yast re-written 1999 included first suse linux 6.3 installer yast2 added desktop suse linux 6.4 co-existed yast1 yast1 removal suse linux 8.0 yast free software suse made available gpl 2004 tool administering maintaining suse linux installation allows administrators install software configure hardware set networks servers feature yast contains graphical user interface gui text-based user interface tui ncurses front ends especially useful non-gui installations servers system administration slow internet connections one unable boot graphical x server still requires advanced user interface package manager example novice user trying downgrade xorg package fix graphical installation yast offers package management functionality zypp project first zypp enabled package management yast applications performance problems long start times improved 10.2 10.3 releases starting opensuse 11.0 alpha 3 zypp integrated sat solver project making yast zypper faster rpm based package managers yast used include sax sax2 suse advanced x configuration sax re-written sax2 suse linux 6.4 sax1 removed suse linux 8.1 sax2 removed yast control center opensuse 11.2 sax2 removed completely opensuse 11.3 gtk interface removed opensuse leap 42.1 yast often receives updates improvements tumbleweed versions leap opensuse leap 15.1 example saw improvements yast interface managing firewalls including addition interface command line version yast release opensuse leap yast updated logo improved partition management module yast implemented ruby programming language autoyast system installing one opensuse systems automatically without user intervention autoyast installations performed using control file installation configuration data profile current system stored codice_1 webyast web interface yast used check status current machine check installation packages shutdown reboot system change system settings time change status system services daemons change license yast previous rather restrictive license gpl 2004 made possible port yast gnu/linux distributions consequence project yast4debian launched worked port yast debian project contact yast team novell/suse reached important milestones port modules yast2-ncurses yast2-qt currently project dormant searching new voluntary project maintainer | [
4961,
9030,
5000,
4841,
1741,
3791,
7983,
10096,
1522,
4309,
823,
9245
] | None |
9,198 | 2 | Galcon:galcon galcon series real-time strategy video games android iphone webos windows linux mac os x flash developed phil hassey set space involves maneuvering fleets ships capture enemy planets original 1987 galactic conquest rick raddatz shareware title pc multiplayer conquest game similar board game risk based game called stellar invasion bearbyte software galcon classic released desktop late 2006 ludum dare timed game development contest developed advanced video game galcon classic features dozens single-player game modes full multiplayer july 2008 galcon publicly released instantaction web browser game platform released garagegames first time galcon released campaign sort gameplay couple months later galcon released iphone frequently called igalcon fans igalcon one first true multiplayer experiences iphone never gained enough publicity kick igalcon comes multiple single-player modes featuring varying degrees bot difficulty advanced online multiplayer system players battle rooms four june 2009 galcon flash released galcon flash flash port galcon closely resembled iphone port although galcon flash given small introductory price number registered users small however limited demo version galcon labs released early october 2009 galcon labs sequel first igalcon galcon labs features four new modes singleplayer multiplayer compatible galcon labs received positive addition galcon series february 11 2010 galcon fusion released mac windows latest addition galcon family desktop tablet equivalent galcon labs original galcon kick-starter galcon 2 launched december 7 2012 successfully funded released ios february 6 2014 players start 1-3 large home planets send ships conquer planets around numbers planet indicate many ships take conquer numbers player planet indicate number ships planet holds planet player owns produces ships player ships faster rate produced depending planet size players select percentage ships send planet players redirect ships mid-flight aim game defeat player eliminating enemy planets galcon 2 uses ranking system based upon elo rating system galcon classic received good reviews multiple awards iphone galcons received excellent reviews smaller publicity angle instantaction version given public reviews overall rating high galcon flash also receive many reviews mostly failed popularity igalcon macworld gave game 4 stars praising game entertaining online play felt single player levels progress evenly easy hard cases pocketgamer gave game 8 10 commenting 'innovative space game simple controls deep strategy slide play gave game 3 good 4 saying extremely satisfying online play made good game fall 2010 galcon used google ai challenge basis contest problem contest participants wrote programs competed simplified version game another modern game implementing idea behind galactic conquest foss game gnulactic konquest kdegames package solarmax series also based upon concept 2018 multiple clones galcon available mobile platforms | [
9732,
6797,
823
] | Validation |
9,199 | 4 | Scottish_National_Entitlement_Card:scottish national entitlement card scottish national entitlement card nec scotland-wide smart card scheme run scottish local authorities behalf scottish government predominantly operated concessionary travel pass also act proof age young people young scot nec give access civic services libraries leisure centres depending local authority 2000 scottish executive assigned budget modernising government fund intended improve public services part budget targeted towards development voluntary public sector smartcard initiative 2003 highlighted area developed local authorities parallel s.40 transport scotland act 2005 provided introduction national travel concession schemes would funded centrally rather local authorities decided known national entitlement card would used administer travel scheme introduced 2006 parallel development local authority administered citizen account modernising government fund 2006 articulated need assign records unique citizen reference number ucrn envisaged associating account nationally compatible smart cards service access tokens ucrn maintained part scotland national health service central register nhscr data access subset register scottish local authorities enabled s.57 local electoral administration registration services scotland act 2006 lears act scot nhscr assigned unique citizen reference number ucrn local authorities access certain conditions ucrn may linked nhscr data used verification purposes proposed expansion use 2014 raised fears ucrn form backbone scottish identity register persistent identification individuals across scottish state datasets open rights group accused proposal creating national id system backdoor despite scottish government opposition uk previous identity cards scheme february 2017 announced proposed expansion go ahead scottish nec allows scottish residents certain disabilities aged 60 years old access free travel within scotland nearly local bus scheduled long distance coach services including morning rush hour excluding premium fare night buses city sightseeing buses travel also valid bus services start/terminate carlisle berwick upon tweed long service travels to/from scotland entitlement free bus travel nec dependent scottish resident least 5 years old meeting one following criteria main cardholder meets following criteria also entitled companion travel usually attracting discount main cardholder get national entitlement card must discounted bus rail travel within scotland made available scottish residents aged 16-18 years old full-time volunteers aged 19 26 years old via young scot nec residents western isles orkney shetland also receive two free return ferry trips scottish mainland receive free bus travel young scot travel discount areas scotland additional concessionary travel options available example nec issued residing strathclyde partnership transport spt area gives access additional rail glasgow subway concessions young scot national youth information citizenship charity supported scottish government 11-26 year olds scotland young people age scotland eligible receive young scot national entitlement card young scot nec issued proof age standards scheme therefore used young person access age-restricted goods services addition travel concessions young people eligible card also entitles holder number services discounts young scot provide nec used number different additional purposes since introduction common uses include access cashless catering schools means providing library leisure membership discounted admissions basis age disability local authority areas card may used national purposes outlined local authorities normally issue nec valid application service using nec received | [
9483,
5868,
9199
] | None |
9,200 | 0 | Collostructional_analysis:collostructional analysis collostructional analysis family methods developed alphabetical order stefan th gries university california santa barbara anatol stefanowitsch free university berlin collostructional analysis aims measuring degree attraction repulsion words exhibit constructions notion construction far goldberg construction grammar collostructional analysis far comprises three different methods collostructional analysis requires frequencies words constructions similar wide variety collocation statistics differs raw frequency counts providing observed co-occurrence frequencies words constructions also comparison observed frequency one expected chance thus collostructional analysis distinguish attraction repulsion words constructions ii measure strength attraction repulsion usually log-transformed p-value fisher-yates exact test collostructional analysis differs collocation statistics measures association words words words syntactic patterns constructions thus takes syntactic structure seriously collocation-based analyses ii far used precise statistics namely fisher-yates exact test based hypergeometric distribution thus unlike -scores z -scores chi-square tests etc. analysis based violate distributional assumptions | [
1890,
5122
] | None |
9,201 | 2 | FreeBSD_Core_Team:freebsd core team freebsd core team would equivalent board directors freebsd project company freebsd project run freebsd committers developers svn commit access core team exists provide direction responsible setting goals freebsd project provide mediation event disputes also takes final decision case disagreement individuals teams involved project core team also responsible selecting individuals teams related development ongoing maintenance freebsd security officer release engineering team port manager team finally core team also vote nominations new committers event breach internal rules conduct falls core team decide sanctions freebsd core team equivalent similar body netbsd project called core group freebsd core team began unofficial group programmers mainly consisting initiated freebsd project eleven members new members could join invitation freebsd project grew core team year 2000 200 active committers core team expanded 18 people core members completely inactive others far less active many non-members even accusations cronyism old informal structure longer considered viable early 2000 discussions regarding future organisation set bylaws formulated jonathan lemon warner losh wes peters general vote active committers august 28 2000 bylaws passed 117 votes 5 freebsd core team elected body comprising nine members pool project developers rights directly change project repositories committers committers entitled vote core elections made least one change one project repositories past 12 months first election took place september 2000 seventeen candidates stood election including eight existing core team five re-elected alongside four new members elections taken place every two years since recent election results announced july 4 2018 elections shall held two years last vote even previous election early elections may held early membership core team fall seven petitioned 1/3 active developers bylaws may changed 2/3 majority committers least 50 active committers participate vote core team appoints secretary discretion non-voting position exists provide central point contact external parties group keeping track agenda acting interface core internal groups account creation team core team secretary also responsible writing distributing monthly status reports freebsd developer community current core team secretary joseph mingrone election lasts five weeks first week committers wish run election announce intention four weeks follow application period active committers vote nine candidates voting period closes votes counted ties resolved unambiguously elected candidates instance tie ninth place first eight decide tied candidates join team results announced within one week end voting period newly elected team enters office one week announcement | [
7425,
2180,
1927,
1801,
10761,
274,
9625,
1946,
4636,
2212,
6438,
10535,
684,
4908,
1071,
3248,
9009,
11698,
11573,
1718,
4919,
9784,
1465,
5177,
5819,
3006,
11459,
9927,
8266,
8395,
8909,
5710,
6864,
7249,
850,
10455,
6361,
8410,
6491,
9... | Test |
9,202 | 8 | ServerCentral:servercentral servercentral turing group infrastructure provider colocation cloud infrastructure iaas draas network connectivity managed storage managed services data centers across north america europe australia asia company customers include cdw outbrain new relic ars technica cars.com shopify 2018 servercentral named one fastest-growing private companies united states inc. magazine eighth consecutive year jordan lowe daniel brosk began hosting services friends local businesses virtual private servers growing 10,000 accounts growth spiked lowe brosk began advertising free domain names exchange prepaid hosting accounts daily deal website team switched manual billing account creation processes lifecycle hosting automation solution swsoft automated full customer lifecycle 2002 servercentral headquarters server operations moved chicago il 2003 servercentral opened data centers ashburn virginia san jose california servercentral private 10-gigabit ip network connected data centers year servercentral sponsored services php.net open-source community development php scripting 2004 servercentral expanded tokyo 2005 servercentral rebranded web hosting division wingsix 2008 sold uk2 group order concentrate managed data center infrastructure servercentral expanded amsterdam began collaboration cachefly high-speed content delivery network cdn 2006 servercentral one first large-scale networks deploy native ipv6 traffic 2009 servercentral expanded data center footprint elk grove village illinois signing long-term leasing agreement dupont fabros technology dft dft environmentally conscious design includes battery-free ups systems advanced mechanical automation high voltage throughout power distribution system may 2009 server operations opened new elk grove village il facility servercentral successfully completed sas 70 type ii audit singlehop signed 2.7 million agreement colocation space support servercentral elk grove data center singlehop signed 5-year 7-million contract servercentral april 2011 approximately 80 cabinets servercentral expanded three times within dft 2009 2012 bringing total elk grove footprint approximately 40,000 square feet 5.5 megawatts critical load 2010 servercentral introduced dedicated private cloud dpc single-tenant infrastructure tuned enterprise setup servercentral expanded within elk grove village il facility made inc. magazine list fastest-growing private companies america 2011 servercentral 58 employees 21.2 million revenue 13 annual growth june 2012 servercentral launched servercentral enterprise cloud public iaas servercentral completed type 2 ssae 16 soc 1 audit climbed inc. magazine list fastest-growing private companies america 2012 servercentral expanded 40,000 square feet 5.5 megawatts critical load elk grove village il 2013 brill street company named servercentral top 50 employer emerging gen talent chicago 2014 servercentral announced ddos mitigation radware servercentral also made inc. magazine honor roll named inc. 5000 fastest-growing private companies america fifth consecutive year 2015 servercentral expanded cloud portfolio multi-tenant managed vmware 2018 servercentral acquired turing group became known servercentral turing group sctg servercentral turing group operates twelve data centers across ten locations equipment space bandwidth add-on support rented retail customers 2019 servercentral turing group soc 2 type ii audited company pci-dss compliant managed services include dedicated servers data center migrations switch router maintenance vmware storage high-availability load balancers backup recovery remote hands firewalls application service infrastructure monitoring servercentral turing group provides backup replication single multi-site disaster recovery service servercentral turing group cloud computing services private shared hybrid iaas platforms colocation customers directly connect third-party public cloud providers servercentral turing group also provides aws cloud consulting services certified aws msp partner servercentral turing group network services include private ip transit dedicated data transport optical fiber managed network stacks native dual-stack ipv4 ipv6 service servercentral turing group operates 10-gigabit mpls backbone high-capacity bandwidth interconnectivity global data center locations servercentral turing group deployed native ipv6 traffic private network since 2006 servercentral turing group ranked among top service aws consulting companies clutch.co 2019 servercentral named top cloud consultant managed service provider clutch.co 2017 servercentral received award chicago best brightest companies work 2015 2016 servercentral ranked crn fast growth 150 list annual ranking fastest-growing solution providers north america 2011 2015 february 2015 servercentral made crn hosting msp 100 list recognizing american managed service providers operate data centers offer innovative subscription-based managed services servercentral held a+ rating better business bureau outstanding customer service since 2001 servercentral named inc. magazine list fastest-growing companies america 2010 2011 2012 2013 2014 2015 2016 2017 servercentral named one brill street company top employers gen talent 2013 servercentral received web host magazine editor choice award “ one solid networks industry. ” review included accolades company support team hardware quality pricing | [
4194,
8644,
6565,
3366,
8998,
6153,
11097,
2842,
5469,
5470
] | Test |
9,203 | 4 | UpGuard:upguard upguard inc. australian cybersecurity startup company founded alan sharp-paul leo venegas mike baukes presently based mountain view california upguard provides products services help companies stand securely configured systems guard outages breaches 2016 company raised 17m series b funding round 2018 company employs around 46 upguard cyber resilience platform determines company cyber-security risk factors scanning internal external computer systems platform automatically scans every server application network mobile devices environments create living model configuration state thereafter continually assessing system record security vulnerabilities configuration drift procedural changes model platform dynamically derives unified cyber-security risk score cstar determines cyber risk posture assets multivariate factors upguard formerly scriptrock australian security company offices mountain view california sydney australia working investment firm colonial first state company founders leo venegas alan sharp-paul mike baukes met on-the-job sydney australia sharp-paul web developer baukes systems administrator spending years financial services australia uk trio developed system corporations understand business software portfolios consequent risk breaches outages due poor configuration management first release system initially named guardrail allowed automation typical cybersecurity devops practices focusing deep analysis relevant servers software applications settings 2016 company raised 17m series b funding round co-led pellion included august capital square peg capital insurance australia group early 2017 upguard signed exclusive distribution partnership aca pacific order establish stronger presence apac region baukes sharp-paul opened upguard office sydney australia bringing company back region began june 2017 upguard announced found unsecured server containing data deep root analytics contained information almost 200 million american voters upguard helps companies stand securely configured systems guard outages breaches product uses resilience supervisor integrates checks every step technology lifecycle whilst continuously assessing risk factors misconfiguration configuration drift process vulnerabilities approach unique platforms architecture allows dynamic capture large configuration datasets continuously order difference visualize report potential breaches outages proactively products core configuration information transformed security policies procedural validations automations ensure desired integrity environments maintained auditable enhanced identifying authorized change vs unauthorised change dynamically reconciling entire environments ticketing systems itsm processes sdlc processes upguard summarizes key insights across data dynamically includes proprietary risk modeling method called cstar aggregates relevant risk factors score 0-950 similar credit score allowing companies effectively predict prioritize high-risk impact areas track risk hotspots time compare scores similar companies like industries comparison upguard ships three products interoperate form deployable cyber resilience strategy discover control predict aims address different source risk related information technology | [
2558
] | None |
9,204 | 6 | Du_(Unix):du unix codice_1 abbreviated disk usage standard unix program used estimate file space usage—space used particular directory files file system codice_1 utility first appeared version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie paul eggert jim meyering default single unix specification sus specifies codice_1 display file space allocated file directory contained current directory links displayed size link file linked size content directories displayed expected codice_1 reports allocation space absolute file space amount space file system shown codice_1 may vary shown codice_7 files deleted blocks yet freed also minfree setting allocates datablocks filesystem super user processes creates discrepancy total blocks sum used available blocks minfree setting usually set 5 total filesystem size info see core utils faq codice_1 takes single argument specifying pathname du work specified current directory used sus mandates du following options unix unix-like operating systems may add extra options example bsd gnu codice_1 specify -h option displaying disk usage format easier read user adding units appropriate si prefix e.g 10 mb sum directories -s kilobytes -k sum directories -s human-readable format -h byte kilobyte megabyte gigabyte terabyte petabyte disk usage subdirectories files including hidden files within current directory sorted filesize disk usage subdirectories files including hidden files within current directory sorted reverse filesize weight size subdirectory current directory -d 1 sum total end -c displayed human-readable format -h du gnu weight size subdirectories root directory -d 1 trailing sum total end -c displayed human-readable format -h without traversing filesystems -x useful /var /tmp directories separate storage root directory du gnu | [
2432,
515,
9733,
9735,
3976,
521,
5256,
6281,
6664,
4750,
8975,
11663,
4369,
5397,
2198,
6812,
7196,
4001,
6138,
9762,
2599,
7847,
10025,
8236,
4398,
7983,
1844,
823,
1336,
8504,
7356,
3522,
451,
1987,
965,
2245,
8517,
9542,
5706,
3659,
... | Test |
9,205 | 1 | SQL_Server_Express:sql server express microsoft sql server express version microsoft sql server relational database management system free download distribute use comprises database specifically targeted embedded smaller-scale applications product traces roots microsoft database engine msde product shipped sql server 2000 express branding used since release sql server 2005 sql server express provides many features paid full versions microsoft sql server database management system however technical restrictions make unsuitable large-scale deployments differences express product include unlike predecessor product msde express product include concurrent workload-governor limit performance database engine receives work typical small number users sql server express includes several gui tools database management include predecessor product msde generally lacked basic gui management tools features available sql server standard better editions absent sql server express include microsoft makes sql server express available free 2005 express version example standard approach installation options provided follows generally sql 2005 express installers packaged following consistent naming convention optional variants gone several service packs sp sp installer used without using older ones first | [
5380,
6797,
10900,
10389,
10902,
11030,
3224,
5401,
7064,
11414,
4384,
8227,
11683,
11559,
4010,
5546,
10157,
10286,
7983,
9263,
11570,
6709,
8246,
823,
315,
7486,
4674,
1347,
1348,
5320,
4174,
847,
83,
1366,
9434,
603,
7134,
608,
2401,
8... | None |
9,206 | 5 | Unidirectional_Link_Detection:unidirectional link detection unidirectional link detection udld data link layer protocol cisco systems monitor physical configuration cables detect unidirectional links udld complements spanning tree protocol used eliminate switching loops two devices b connected via pair optical fibers one used sending b sending b link bidirectional two-way one fibers broken link become one-way unidirectional goal udld protocol detect broken bidirectional link e.g transmitted packets arrive receiver fibers connected different ports device port udld packet sent port links packet contains sender identity information device port expected receiver identity information device port port checks udld packets receives contain identifiers device port udld cisco-proprietary protocol hp extreme networks avaya similar feature calling different name hp calls device link detection protocol dldp extreme networks call extreme link status monitoring elsm avaya calls link-state tracking similar functionality standardized form provided part ethernet oam protocol defined part ethernet first mile changes 802.3 previously 802.3ah d-link duld feature built top ethernet oam function brocade devices running ironware support proprietary form udld use udld 10gbe augmented per 802.3ae/d3.2 standard fault detected physical link | [
6834,
7865,
2426
] | Test |
9,207 | 5 | OMA_Instant_Messaging_and_Presence_Service:oma instant messaging presence service oma instant messaging presence service imps open mobile alliance enabler instant messaging presence wireless village consortium developed first cut specifications wireless village merged oma specs became oma imps 1.0 specifications imps widely deployed necessarily marketed interworking several operators imps platforms performed gsma initiative encourages interworking deployment instant messaging vanilla terminals often imps clients nokia chat client accessed via presence menu sony ericsson called friends motorola called im phones chat clients generally designed provider neutral put wireless village server settings phone n't inbuilt chat client might still able get third-party chat application runs phone symbian java brew application environment need get chat client wireless village compliant presence-enabled note still necessary operator provide im service and/or one connect third party server connection others im'ing partial list | [
7396,
1285,
11240,
3561,
5875,
1695
] | None |
9,208 | 9 | ScientificPython:scientificpython scientificpython open source library scientific tools python programming language development started 1995 updated since october 1 2014 library includes qt tk widget toolkits provided building cross-platform graphical user interfaces scientificpython released cecill main developer maintainer scientificpython konrad hinsen orléans university uses building block research code particular molecular modeling toolkit mmtk software nmoldyn uses molecular dynamics trajectories predict neutron scattering spectra outside particular application context users likely prefer package scipy seen dynamic evolution decade 2000–2010 involving several active developers | [
3960,
8554,
462
] | Validation |
9,209 | 9 | SuperTalk:supertalk supertalk scripting language used supercard supertalk descendant hypertalk one powerful features supercard adds hypertalk language user properties hypertalk fixed set properties objects supercard scripters use codice_1 command add new properties buttons fields properties contain arbitrary text including numbers object references also represented using text xtalks even dumps entire files supertalk provides several variations hypertalk codice_2 codice_3 commands let one choose several items list choose icon available icons pick midi instrument play sound choose file supported image format including preview disks folders different hypertalk dialogs supertalk answer ask dialogs resize dynamically hold text however since supercard allows cards i.e pages windows arbitrary types one easily build one dialog large enough supertalk also codice_4 command displays standard system alert windows sheets including standard system icons switch command available readability complex conditionals various types media recorded e.g screen grabs card sound quicktime movies also codice_5 command equivalent copying pasting leaves clipboard unchanged enumeration command creates global variables sequential integer values recently metacard familiar codice_6 command iterating lists added supercard also offers exception handling using codice_7 statement associated codice_8 command supertalk came source-level debugger well ahead hypercard supertalk debugger modal window let set breakpoints clicking beside line special codice_9 command used enter debugger one view currently executing line code execute commands evaluate expressions etc supertalk debugger explicitly turned instead available right away script error occurs codice_10 command little stricter syntax exchange supports numerous additional transition effects including quicktime transitions special plug-in modules stored data fork resources type codice_11 special kind external command get unloaded window added type codice_12 differs noticeably xcmd protocol also n't use xwindoid protocol later introduced adding windows hypertalk supertalk also uses codice_13 command starting external applications different hypertalk codice_14 command supertalk uses opening various windows hypertalk deviated using course supertalk also exposes supercard expanded object model making possible create sliders scroll bars progress indicators scales scriptable paint draw graphics native listbox first-class menu objects multiple windows several styles modal panel non-modal scrolling resizable ... floating palettes also available focus activation scope modified full script control parts supercard deviate english-like-ness hypertalk includes codice_4 command tried emulate slightly awkward syntax codice_2 command bit much also seems time number xcmds simply rolled engine built-in commands maintaining memorable handler call syntax obvious case codice_17 function movies kind invisibly tacked window instead implemented real controls like sliders elements also properties control general application behaviour one-to-one translations underlying system apis e.g using appearance manager theming engine mac os 9 | [
9185,
4042,
4486
] | Test |
9,210 | 9 | List_of_audio_programming_languages:list audio programming languages list notable programming languages optimized sound production algorithmic composition sound synthesis | [
7172,
267,
6933,
791,
6810,
4779,
2861,
9783,
1210,
9023,
3904,
8262,
3665,
10321,
7128,
7769,
9565,
7550,
10083,
2667,
1390,
7535,
8947,
8958
] | Test |
9,211 | 9 | DWR_(Java):dwr java dwr direct web remoting java open-source library helps developers write web sites include ajax technology allows code web browser use java functions running web server functions within browser dwr project started joe walker 2004 1.0 released 29 aug 2005 dwr takes novel approach ajax dynamically generating javascript code based java classes thus web developer use java code javascript local web browser whereas reality java code runs web server full access web server resources security reasons web developer must configure exactly java classes safe export often called web.xml dwr.xml method remoting functions java javascript gives dwr users feel much like conventional rpc mechanisms like rmi soap benefit runs web without requiring web browser plug-ins dwr consider web browser web server protocol important prefers ensure programmer interface natural greatest challenge marry asynchronous nature ajax synchronous nature normal java method calls asynchronous model result data available time initial call made dwr solves problem allowing web developer specify function called data returned using extra method parameter extra method called callback method value returned java function passed callback method sample callback callback function inside json object passed additional parameter remoted function version 2.0 dwr supports comet also called reverse ajax java code running server deliberately send dedicated javascript browser | [
9441,
803,
3462,
1802,
4171,
5612,
5677,
7983
] | None |
9,212 | 3 | Mindset_(computer):mindset computer mindset released spring 1984 intel 80186-based ms-dos personal computer unlike ibm pc compatibles time custom graphics hardware supporting 16 simultaneous colors chosen 512-shade palette hardware-accelerated drawing capabilities including blitter allowed update screen 50 times fast cga adaptor standard pc basic unit priced conceptually similar successful commodore amiga released year later due financial legal complications spite glowing reviews system never sold well disappeared market year lamented industry commenters looked event first clear evidence end innovation favor compatibility distinctive case remains permanent collection museum modern art new york computer systems era cpu used create graphics drawing bit patterns directly memory separate hardware reads patterns produces actual video signal display mindset designed ex-atari engineers added new custom-designed vlsi vector processor handle many common drawing tasks like lines filling areas instead cpu work changing memory directly mindset cpu would simply set instructions hand actual bit fiddling separate processor mindset president compared chipset intel 8087 floating point processor running alongside intel 80186 machine based number parallels mindset amiga 1000 another computer designed ex-atari engineers offered advanced graphics development continued became clear machine would ready ms-dos-based microsoft windows 1.0 bill gates became personally involved project assist mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom late 1983 rom run 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released release early 1984 jack tramiel rumored tried buy mindset technology would also amiga ultimately buying atari designing new machine off-the-shelf parts atari st mindset released 2 may 1984 base model 64k ram floppy disk drive sold us 1099 128k model single disk available 1,798 256k dual-disk version cost 2,398 disk-less version machine still usable system also included two rom cartridge ports front machine could used operating system another program canonical cartridge extended version gw-basic machine packaged unique enclosure designed gvo menlo park visually separated two sections rom slots lower half optional diskettes upper half sold complete custom nylon carrying case mindset president claimed graphics capabilities unmatched except us 50,000 workstations time garnered critical acclaim reviewers universally praising graphics overall performance much faster contemporary pcs although many cases caveat market rapidly standardizing summer 1985 clear system selling expected company re-purposed video production graphics design markets followed august round layoffs another january time half employees let go company filed chapter 11 protection 28 august never emerged 1985 clear system living promise windows 1.0 flop general john j. anderson published review system decrying personal computer market beginning value compatibility technology noted base system unit referred model m1001 later mindset ii computer released badge engineered version m1001 adhesive label designating ii embossed name internally video processor board separate mini-daughterboard enhanced functionality totally understood mindset ii advanced professional videographics system users guide makes mention chaining two mindset mindset ii referred front user guide model m1500 however internal pages reference m1000-ii also make mention mindset video production module model m1011 system architecture based intel 80186 proprietary vlsi chips enhanced sped graphics although disk compatible ibm pc dos enhanced graphics capabilities made achieving full ibm compatibility difficult competitors bill gates became involved development assisting mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom locked 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released mindset design modular many aspects top case opening access system bus allowed expansion module plug main computer module add memory one two disk drives mindset designed several ex-atari engineers like amiga 1000 another computer era advanced graphics subsystem modular expandability jack tramiel forming ttl – tramiel technologies limited tried buy mindset technology spring 1984 dual 5.25 floppy drive module sat main unit available part common sales configuration system module also included expansion memory well mindset dual front-mounted rom cartridge ports locking knob left side main computer module lock rom modules place mindset option system configuration utility able select whether system booted left right rom carts disk drive cartridges could also contain cmos ram would retained unplugged battery cartridge case cartridges envisioned primary medium software distribution mindset sales system low cartridges economical software distributed disk instead released 1984 models m1001 mindset computer bios rom code 1.07 earlier show copyright notice c 1983 mindset computer corp rear computer equipped following ports rear main computer module also 3× 36 pin expansion bus slots dual disk/memory expansion unit adds additional 3 36 pin expansion bus slots system note noticeable internal external differences dual disk drive/memory expansion modules marked model m1003 others found marked m1004 | [
4674,
10692,
9126,
9166,
7983,
6129,
9363
] | Validation |
9,213 | 4 | OCML:ocml open configuration management layer ocml universal application configuration management layer helps develop integrated applications independent underlying group applications configurations management | [
2149
] | Test |
9,214 | 4 | Peiter_Zatko:peiter zatko peiter c. zatko better known mudge network security expert open source programmer writer hacker prominent member high-profile hacker think tank l0pht well long-lived computer culture hacking cooperative cult dead cow involved l0pht mudge contributed significantly disclosure education information security vulnerabilities addition pioneering buffer overflow work security advisories released contained early examples flaws following areas code injection race condition side-channel attack exploitation embedded systems cryptanalysis commercial systems original author password cracking software l0phtcrack 2010 mudge accepted position program manager darpa oversaw cyber security research 2013 mudge went work google advanced technology projects division born december 1970 mudge graduated berklee college music top class adept guitar player mudge responsible early research type security vulnerability known buffer overflow 1995 published write buffer overflows one first papers topic published first security advisories research demonstrating early vulnerabilities unix code injection side-channel attacks information leaks leader full disclosure movement initial author security tools l0phtcrack antisniff l0phtwatch mudge one first people hacker community reach build relationships government industry demand public speaker spoke hacker conferences def con academic conferences usenix mudge also member cult dead cow since 1996 one seven l0pht members testified senate committee 1998 serious vulnerabilities internet time l0pht became computer security consultancy stake 1999 mudge became vice president research development later chief scientist 2000 first crippling internet distributed denial-of-service attacks invited meet president bill clinton security summit alongside cabinet members industry executives 2004 became division scientist government contractor bbn technologies originally worked 1990s also joined technical advisory board nfr security 2010 announced would project manager darpa project focused directing research cyber security 2013 announced would leave darpa position google atap 2015 zatko announced twitter would join project called cyberul testing organisation computer security inspired underwriters laboratories mandated white house 11 august 2007 married sarah lieberman co-worker bbn darpa created cyber analytical framework agency used evaluate dod investments offensive defensive cyber security tenure ran least three dod programs known military networking protocol mnp cyber-insider threat cinder cyber fast track cft military networking protocol mnp provided network prioritization full user-level attribution military computer networks cyber-insider threat cinder focused identifying cyber espionage conducted virtual insider threats future variants stuxnet duqu cinder often mistakenly associated wikileaks media possibly due confusion darpa programs focused identifying human insider threat adams identification software espionage posed malware cinder program issue clarified mudge defcon 2011 keynote 46 minutes 11 seconds talk cyber fast track cft provided resources funding security research including programs run hackers hackerspaces makerlabs program provided alternative traditional government contracting vehicles accessible individuals small companies previously unable work within cumbersome complicated darpa process novel contracting effort averaging time 7 days receipt proposal funding provided proposing research organization program initially announced shmoocon 2011 keynote mudge published numerous papers advisories detailing security problems across different applications operating systems pioneering champion full disclosure | [
9217,
3843,
6916,
5512,
1941,
4117,
161,
10914,
1187,
1315,
4389,
10279,
6184,
7741,
1474,
1861,
8135,
2007,
1114,
4956,
8671,
9460,
5111,
7545,
8827
] | Train |
9,215 | 4 | Trustwave_SecureBrowsing:trustwave securebrowsing trustwave securebrowsing previously known finjan securebrowsing m86 securebrowsing security plug-in web browsers internet explorer firefox google chrome developed trustwave holdings formerly known m86 security finjan product longer supported backend required work longer exists software scans classifies web addresses provide user safety rating urls user visits proactively alerting user potentially malicious web addresses links search results ads selected web pages software protects user webpages could used compromise user privacy identity unlike products market based static databases containing information web domain reputations software scans url currently exists web time address displayed user browser code analysis approach efficient method alternatives detecting malicious behavior | [
4487,
6797,
7983,
5078,
4471,
10745,
7515,
2558
] | None |
9,216 | 2 | SetACL:setacl setacl freeware utility manipulating security descriptors microsoft windows used available gnu lesser general public license lgpl command-line utility activex component changed freeware license version 3.0.0.0 list features taken product web page set 'change permissions directory c \angela user 'brian domain 'dom1 remove write change permission sets desktop replace 'read execute permissions example use autoit found | [
2432,
4771,
11683,
8582,
10026,
6797,
2959,
847,
2193,
7343,
7983
] | None |
9,217 | 4 | Chris_Wysopal:chris wysopal chris wysopal also known weld pond entrepreneur computer security expert co-founder cto veracode member high-profile hacker think tank l0pht vulnerability researcher chris wysopal born 1965 new connecticut mother educator father engineer attended rensselaer polytechnic institute troy new york received bachelor degree computer systems engineering 1987 seventh member join l0pht development projects included netcat l0phtcrack windows also webmaster/graphic designer l0pht website hacker news network first hacker blog researched published security advisories vulnerabilities microsoft windows lotus domino microsoft iis coldfusion weld one seven l0pht members testified senate committee 1998 could bring internet 30 minutes l0pht acquired stake 1999 became manager stake research group later stake vice president research development 2004 stake acquired symantec became director development 2006 founded veracode christien rioux serves cto 2017 veracode acquired ca technology 614m veracode subsequently spun became independent purchased thoma bravo 950m wysopal continues serve cto 2018 wysopal joined humanyze board directors wysopal instrumental developing industry guidelines responsible disclosure software vulnerabilities contributor rfpolicy first vulnerability disclosure policy together steve christey mitre proposed ietf rfc titled responsible vulnerability disclosure process 2002 process eventually rejected ietf within purview process become foundation organization internet safety industry group bringing together software vendors security researchers founder 2001 founded non-profit full disclosure mailing list vulnwatch moderator 2003 testified united states house representatives subcommittee topic vulnerability research disclosure 2008 wysopal recognized achievements industry named one 100 influential people eweek selected one infoworld cto 25 2010 named sans security thought leader 2012 began serving black hat review board named one top 25 disruptors 2013 computer reseller news 2014 named one 5 security thought leaders sc magazine | [
9569,
3619,
1861,
8135,
5512,
6665,
9447,
6797,
4369,
5111,
4117,
5048,
4439,
1912,
8827,
4956,
9214
] | Validation |
9,218 | 2 | Celerra:celerra celerra discontinued nas device produced emc corporation available either integrated unit nas header added independent emc storage array clariion symmetrix supports smb nfs ftp ndmp tftp mpfs protocols celerra unified storage device use clariion storage array storage layer also provides iscsi fibre channel block-level storage introduced october 1996 nas market symmetrix network file storage later renamed celerra celerra promoted platform virtualization optional features included de-duplication replication ndmp storage tiering celerra runs real-time operating system called data access real time dart dart modified unix embedded kernel 32mb additional functionality like fibre channel driver hba bonding ethernet added operate file server celerra based x-blade architecture clariion available single data mover x-blade multiple data movers active-passive n+1 configuration comparable celerra products products netapp offer similar features protocol support apart ability use block-level fibre channel 2011 emc introduced new vnx series unified storage disk arrays intended replace clariion celerra products early 2012 clariion celerra discontinued data access real time dart real-time operating system used emc celerra modified unix kernel additional functionality dart embedded real-time operating system comprising modified unix kernel dedicated file server software together transfer files multimedia data across network using variety network protocols dart file server software executes entirely kernel—a real-time kernel design based monotonic scheduling dart kernel environment generic user-application environment instead dart kernel provides run-time environment file service embedded dedicated application dart file server software linked kernel single system image loaded execution boot time dart organized seven layers layers handle data movement dart functionality dart directed implementing processes contained layers starting layer closest hardware ending layer closest user interface dart ’ functionality organized follows layers 1 – 4 comprise functions performed within kernel programmer typically uses components limited higher numbered layers 5 6 add data moving applications dart ’ rpc framework component provides client server facilities implemented streams sockets dart acts rpc server context nfs rpc client context nis dart external environment dart designed provide rapid data movement information sharing across variety hardware platforms networked environment data transfers either request-response pull-type file transfers streaming push-type multimedia data time-sharing real-time isochronous characteristics two types rpc implemented dart traditional rpc onc rpc due dart ’ multi-threaded architecture traditional rpc implemented dart several modifications example sun os rpc code generator rpcgen assumes single-threaded unix process calls library directly however dart ’ unix processes instead uses true multi-threading—that n threads pick rpc messages come therefore using traditional rpc dart application must perform functions registering portmapper extracting credentials security information message checking security without extracting responsibility falls application developer—thread creation initialization end point creation initial create main loop processing stream reading message collector general synchronizer particular rpc needs declared whereas oncrpc collector built addition traditional rpc basic structure receiving message application developer must take apart means xdr format analyze addition client-side fully implemented finally rpc primarily synchronous protocol used asynchronously dart conjunction mutexes condition variables types locks dart implements rpc user datagram protocol udp transport control protocol tcp application single udp stream one tcp stream per connection common ip module acting multiplexer | [
11233,
10302,
6852,
7364,
10951,
6153,
2154,
1967,
7983,
5363,
5397,
7189,
7863,
1400,
9366,
11413,
9374,
5471
] | None |
9,219 | 3 | Survivors_(video_game):survivors video game survivors also known survivors game home computers published atlantis software originally 1986 zx spectrum ported msx atari 8-bit family commodore 64 commodore 16 acorn electron bbc micro 1987 amstrad cpc 1988 puzzle game based rocks diamonds mechanics boulder dash game set 2087 'hibernation dome damaged nuclear war holds 1000 survivors stasis accessed humans fallen earth boulders player must control three droids gain access teleport survivors dome also populated guardian droids left maintain life support functions damaged nuclear fallout become hostile survivors must evacuated time limit runs radiation becomes strong game uses 'rocks diamonds mechanics popularised game boulder dash whereby player dig earth push boulders boulders fall area cleared emphasis puzzle element survivors closer repton main twist game droid perform one functions usually carried player similar games player must switch droids depending need droid 1 tunnel earth droid 2 teleport survivors home game equivalent collecting diamonds droid 3 push boulders means one droid becomes trapped game completed droids lose energy boulder falls top touch one faulty guardian droids guardian droids destroyed dropping boulders trapped behind boulders player droids destroyed game completed game first released zx spectrum received mixed reviews complaints included 'jerky movement dull graphics sound praise given playability value money crash awarded overall score 70 sinclair gave 6/10 c vg gave marks 4/10 5/10 without awarding overall score game ported number formats received generally positive reviews zzap 64 gave c64 version score 79 concluding game taxing mentally dexterously boulderdash fans suffering withdrawal symptoms enjoy survivors quite lot micro user even complimentary commenting could well knock repton perch electron user awarded 'golden game title overall score 9/10 including 10/10 playability value money | [
10931,
9853,
9006
] | None |
9,220 | 6 | Persistent_memory:persistent memory computer science persistent memory method apparatus efficiently storing data structures continue accessed using memory instructions memory apis even end process created last modified often confused non-volatile random-access memory nvram persistent memory instead closely linked concept persistence emphasis program state exists outside fault zone process created process program execution fault zone process subset program state could corrupted process continuing execute incurring fault instance due unreliable component used computer executing program efficient memory-like access defining characteristic persistent memory provided using microprocessor memory instructions load store also provided using apis implement remote direct memory access rdma actions rdma read rdma write low-latency methods allow byte-grain access data also qualify persistent memory capabilities extend beyond non-volatility stored bits instance loss key metadata page table entries constructs translate virtual addresses physical addresses may render durable bits non-persistent respect persistent memory resembles abstract forms computer storage file systems fact almost existing persistent memory technologies implement least basic file system used associating names identifiers stored extents minimum provide file system methods used naming allocating extents | [
346,
3820,
9762
] | None |
9,221 | 4 | Certificate_Authority_Security_Council:certificate authority security council certificate authority security council casc multi-vendor industry advocacy group created conduct research promote internet security standards educate public internet security issues group founded february 2013 seven largest certificate authorities issuers ssl certificates — comodo symantec trend micro digicert entrust globalsign godaddy digicert withdrew group june 15 2018 casc supports efforts ca/browser forum standards-setting bodies support development enhancements improve secure sockets layer ssl operations certificate authorities ca according robin alden cto comodo member council casc serve united front cas involved standards-setting organization ’ committed supplementing standards-setting organizations providing education research advocacy best practices use ssl casc limits membership ssl certificate authorities meet requirements reputation operation security members required undergo annual audit adhere industry standards ca/browser forum ’ baseline requirements network security guidelines group works collaboratively create define initiatives improve understanding policies impact internet infrastructure group primary focus promoting understanding importance certificate-revocation checking benefits ocsp stapling protocol intended ensure web users aware visit web site revoked expired ssl certificate group also worked secure software distribution digital code signing code signing certificates play key role helping users identify authentic software code reputable publishers receive assurance code tampered beforehand | [
11584,
9569,
3941,
517,
8615,
8358,
11653,
127
] | Test |
9,222 | 4 | DSPAM:dspam dspam free software statistical spam filter written jonathan a. zdziarski author book ending spam books intended scalable content-based spam filter large multi-user systems dspam distributed terms gnu general public license development discontinued 2014 project consists library libdspam contains core filtering storage routines command-line web-based interfaces dspam mta-independent store spam classification data number database formats uses bayesian filtering among techniques learn adapt spam dspam original author claims users dspam reported high 99.5 99.95 accuracy including “ best recorded levels accuracy ... 99.991 one avid user 2 errors 22,786 99.987 author. ” however spam filter test performed trec 2005 best-performing dspam configuration misclassification rates worse filters test stated levels accuracy zdziarski protests results rights project sold sensory networks may 2007 development dspam resumed december 2007 sensory networks publishing 27 community-created patches cvs tree along new php-based webui development fork dspam dspam-community registered sourceforge october 10 2008 january 7 2009 mick johnson sensory networks announced “ looking shutting hosting dspam server end january. ” january 12 2009 mick sent follow-up email stating “ handing trademarks copyright dspam source dspam website administration mailing lists ” “ crew dspam-community. ” dspam dspam-community merged january 2009 development project continued name dspam driven community developers users 2014 dspam active upstream developers removed debian ubuntu current package repositories | [
5249,
6762,
5835,
8747,
10541,
7983,
4272,
2804,
2901,
5397,
1305,
7802,
2399
] | None |
9,223 | 2 | Cwm_(window_manager):cwm window manager cwm calm window manager stacking window manager x window system primarily developed part openbsd base system portable versions available unix-like operating systems development cwm started patches evilwm marius aamodt eriksen ease implementation new features cwm eventually rewritten using code 9wm last release original author came august 2005 april 2007 cwm imported openbsd source tree january 2008 substantial part original source code including 9wm code rewritten cwm distributed openbsd since version 4.2 replaced wm2 third-party linux port also exists cwm stacking window manager oriented towards heavy keyboard usage small footprint ease use lacks explicit virtual desktops functionality emulated using window groups mechanism cwm draw window decorations except 1-pixel border around windows cwm includes several menus menus operate search type manner cwm allows raising hiding switching searching windows using keyboard making suitable use terminal emulator multiplexer furthermore allows manipulating pointing devices mice keyboard additional key bindings configuration options specified configuration file codice_1 cwm generally well received software minimalist communities cwm noted used mainly due status one default window managers openbsd though reasons sometimes cited cwm also praised flexibility ease use fact used without mouse | [
1668,
10631,
2825,
3465,
1932,
7309,
274,
2581,
5397,
7702,
10105,
7325,
934,
429,
6702,
7983,
9520,
3764,
823,
9150,
2245,
1993,
8778,
3404,
11086,
5970,
11221,
5084,
11485,
7139,
1637,
10341,
4071,
8682,
5867,
1644,
5230,
8304,
1785,
89... | Test |
9,224 | 2 | Concurrent_computing:concurrent computing concurrent computing form computing several computations executed overlapping time periods— concurrently —instead sequentially one completing next starts property system—this may individual program computer network—and separate execution point thread control computation process concurrent system one computation advance without waiting computations complete programming paradigm concurrent computing form modular programming namely factoring overall computation subcomputations may executed concurrently pioneers field concurrent computing include edsger dijkstra per brinch hansen c.a.r hoare concept concurrent computing frequently confused related distinct concept parallel computing although described multiple processes executing period time parallel computing execution occurs physical instant example separate processors multi-processor machine goal speeding computations—parallel computing impossible one-core single processor one computation occur instant single clock cycle contrast concurrent computing consists process lifetimes overlapping execution need happen instant goal model processes outside world happen concurrently multiple clients accessing server time structuring software systems composed multiple concurrent communicating parts useful tackling complexity regardless whether parts executed parallel example concurrent processes executed one core interleaving execution steps process via time-sharing slices one process runs time complete time slice paused another process begins resumes later original process resumed way multiple processes part-way execution single instant one process executed instant concurrent computations may executed parallel example assigning process separate processor processor core distributing computation across network general however languages tools techniques parallel programming might suitable concurrent programming vice versa exact timing tasks concurrent system executed depend scheduling tasks need always executed concurrently example given two tasks t1 t2 word sequential used antonym concurrent parallel explicitly distinguished concurrent/sequential parallel/serial used opposing pairs schedule tasks execute one time serially parallelism without interleaving sequentially concurrency task begins prior task ends called serial schedule set tasks scheduled serially serializable simplifies concurrency control main challenge designing concurrent programs concurrency control ensuring correct sequencing interactions communications different computational executions coordinating access resources shared among executions potential problems include race conditions deadlocks resource starvation example consider following algorithm make withdrawals checking account represented shared resource codice_1 suppose codice_2 two concurrent threads make calls codice_3 codice_4 line 3 operations executes line 5 operations find codice_5 evaluates codice_6 execution proceed subtracting withdrawal amount however since processes perform withdrawals total amount withdrawn end original balance sorts problems shared resources benefit use concurrency control non-blocking algorithms concurrent computing following advantages several models concurrent computing used understand analyze concurrent systems models include number different methods used implement concurrent programs implementing computational execution operating system process implementing computational processes set threads within single operating system process concurrent computing systems communication concurrent components hidden programmer e.g. using futures others must handled explicitly explicit communication divided two classes shared memory message passing concurrency different performance characteristics typically although always per-process memory overhead task switching overhead lower message passing system overhead message passing greater procedure call differences often overwhelmed performance factors concurrent computing developed earlier work railroads telegraphy 19th early 20th century terms date period semaphores arose address question handle multiple trains railroad system avoiding collisions maximizing efficiency handle multiple transmissions given set wires improving efficiency via time-division multiplexing 1870s academic study concurrent algorithms started 1960s credited first paper field identifying solving mutual exclusion concurrency pervasive computing occurring low-level hardware single chip worldwide networks examples follow programming language level operating system level network level networked systems generally concurrent nature consist separate devices concurrent programming languages programming languages use language constructs concurrency constructs may involve multi-threading support distributed computing message passing shared resources including shared memory futures promises languages sometimes described concurrency-oriented languages concurrency-oriented programming languages copl today commonly used programming languages specific constructs concurrency java c languages fundamentally use shared-memory concurrency model locking provided monitors although message-passing models implemented top underlying shared-memory model languages use message-passing concurrency model erlang probably widely used industry present many concurrent programming languages developed research languages e.g pict rather languages production use however languages erlang limbo occam seen industrial use various times last 20 years languages concurrency plays important role include many languages provide support concurrency form libraries levels roughly comparable list | [
5651,
5658,
1051,
3613,
9245,
10781,
8226,
6182,
6184,
5165,
5677,
5680,
9780,
1591,
6718,
8771,
8772,
10819,
8262,
1610,
9294,
3665,
6228,
2140,
7775,
3168,
8293,
4201,
3698,
9330,
9331,
2680,
3705,
9345,
2691,
7313,
3733,
8854,
10909,
9... | None |
9,225 | 7 | Publish–subscribe_pattern:publish–subscribe pattern software architecture publish–subscribe messaging pattern senders messages called publishers program messages sent directly specific receivers called subscribers instead categorize published messages classes without knowledge subscribers may similarly subscribers express interest one classes receive messages interest without knowledge publishers publish–subscribe sibling message queue paradigm typically one part larger message-oriented middleware system messaging systems support pub/sub message queue models api e.g java message service jms pattern provides greater network scalability dynamic network topology resulting decreased flexibility modify publisher structure published data publish-subscribe model subscribers typically receive subset total messages published process selecting messages reception processing called filtering two common forms filtering topic-based content-based topic-based system messages published topics named logical channels subscribers topic-based system receive messages published topics subscribe subscribers topic receive messages publisher responsible defining classes messages subscribers subscribe content-based system messages delivered subscriber attributes content messages matches constraints defined subscriber subscriber responsible classifying messages systems support hybrid two publishers post messages topic subscribers register content-based subscriptions one topics many pub/sub systems publishers post messages intermediary message broker event bus subscribers register subscriptions broker letting broker perform filtering broker normally performs store forward function route messages publishers subscribers addition broker may prioritize messages queue routing subscribers may register specific messages build time initialization time runtime gui systems subscribers coded handle user commands e.g. click button corresponds build time registration frameworks software products use xml configuration files register subscribers configuration files read initialization time sophisticated alternative subscribers added removed runtime latter approach used example database triggers mailing lists rss data distribution service dds middleware use broker middle instead publisher subscriber pub/sub system shares meta-data via ip multicast publisher subscribers cache information locally route messages based discovery shared cognizance one earliest publicly described pub/sub systems news subsystem isis toolkit described 1987 association computing machinery acm symposium operating systems principles conference sosp '87 paper exploiting virtual synchrony distributed systems 123–138 serious problems pub/sub systems side-effect main advantage decoupling publisher subscriber pub/sub system must designed carefully able provide stronger system properties particular application might require assured delivery pub/sub pattern scales well small networks small number publisher subscriber nodes low message volume however number nodes messages grows likelihood instabilities increases limiting maximum scalability pub/sub network example throughput instabilities large scales include pub/sub systems use brokers servers argument broker send messages subscriber in-band subject security problems brokers might fooled sending notifications wrong client amplifying denial service requests client brokers could overloaded allocate resources track created subscriptions even systems rely brokers subscriber might able receive data authorized receive unauthorized publisher may able introduce incorrect damaging messages pub/sub system especially true systems broadcast multicast messages encryption e.g transport layer security ssl/tls prevent unauthorized access prevent damaging messages introduced authorized publishers architectures pub/sub client/server systems also vulnerable authorized message senders behave maliciously | [
1280,
1411,
7175,
5257,
3851,
4107,
5772,
3733,
3350,
3990,
2456,
9365,
5537,
8100,
5029,
6694,
3629,
2222,
8751,
7347,
3894,
8758,
8640,
1218,
5700,
11339,
333,
2509,
11343,
337,
4817,
10581,
7802,
2137,
2011,
2780,
1628,
3038,
349,
734,... | Test |
9,226 | 5 | RPMsg:rpmsg rpmsg remote processor messaging protocol enabling inter-core communication heterogeneous multicore systems protocol rpmsg present linux kernel also available stand-alone component microcontroller-based systems rpmsg implementations developed open-source | [
810
] | Validation |
9,227 | 4 | Detekt:detekt detekt discontinued free tool amnesty international digitale gesellschaft eff privacy international scan surveillance software microsoft windows intended use activists journalists scan known spyware detekt available free download tool guarantee detection spyware meant give false sense security meant used methods combat malware spyware 2014 coalition unlawful surveillance exports estimated global trade surveillance technologies worth 3 billion gbp annually detekt available amharic arabic english german italian spanish tool required installation designed scan surveillance software windows pcs xp windows 8.1 tool scanned current surveillance software scanning would display summary indicating spyware found would generate log file containing details tool guarantee absolute protection surveillance software scanned known spyware time release could modified circumvent detection new software would become available therefore clean bill health n't necessarily mean pc free surveillance software website instructed user disconnect internet connection close applications running turn connection back spyware found detekt released gplv3 free license detekt developed claudio guarnieri help bill marczak morgan marquis-boire eva galperin tanya o'carroll andre meister jillian york michael ligh endalkachew chala provided patterns following malware darkcomet rat xtremerat blackshades rat njrat finfisher finspy hackingteam rcs shadowtech rat gh0st rat | [
3072,
6786,
7044,
10245,
10756,
9356,
6797,
9233,
8978,
4863,
4883,
278,
10392,
1690,
3867,
3996,
10141,
5281,
2213,
8998,
4903,
9256,
939,
7983,
1970,
3643,
6588,
7739,
8638,
9791,
1088,
3395,
4165,
2634,
2508,
7515,
4344,
3941,
8554,
10... | Test |
9,228 | 7 | Cloud_engineering:cloud engineering cloud engineering application engineering disciplines cloud computing brings systematic approach concerns commercialization standardization governance cloud computing applications practice leverages methods tools engineering conceiving developing operating maintaining cloud computing systems solutions process designing systems necessary leverage power economics cloud resources solve business problems cloud engineering field engineering focuses cloud services software service platform service infrastructure service multidisciplinary method encompassing contributions diverse areas systems engineering software engineering web engineering performance engineering information technology engineering security engineering platform engineering service engineering risk engineering quality engineering nature commodity-like capabilities delivered cloud services inherent challenges business model drive need cloud engineering core discipline elements cloud engineering include professionals work field cloud engineering primarily cloud architects engineers key skills possessed cloud engineering professionals demand skills advanced ict information communication technology rapidly expanded recent years business society transformed emergence internet web ubiquitous media enabling knowledge-based global economy turn created huge demand networked-enabled parallel distributed computing technologies changing way conduct science operate business tackle challenging problems epidemic diseases climate change many platforms available cloud engineering notion cloud engineering context cloud computing sparsely used discussions presentations talks various occasions middle 2000s term cloud engineering formally coined around 2007 concept cloud engineering officially introduced april 2009 various aspects topics subject extensively covered number industry events extensive research conducted specific areas cloud engineering development support cloud patterns cloud business continuity services first ieee international conference cloud engineering ic2e took place march 25–28 2013 second conference held march 10–14 2014 | [
4194,
467,
4429
] | Test |
9,229 | 8 | Phusion_Passenger:phusion passenger phusion passenger informally also known mod_rails mod_rack among ruby community free web server application server support ruby python node.js designed integrate apache http server nginx web server also mode running standalone without external web server phusion passenger supports unix-like operating systems available gem package tarball native linux packages originally designed web applications built ruby rails framework later extended support arbitrary ruby web frameworks rack interface later versions also added support python wsgi interface well support node.js 2012 phusion announced phusion passenger enterprise paid commercial variant phusion passenger wide array premium features phusion stated open source variant continue developed maintained along enterprise variant phusion passenger preferred deployment setup ruby rails applications 2016 recommended ruby rails authors 2009 2013 combination ruby 2.0 now-discontinued ruby enterprise edition phusion passenger claimed capable reducing rails memory consumption 33 well increasing performance | [
1920,
4485,
7430,
1802,
10506,
2191,
7695,
1937,
11154,
7443,
1556,
5397,
10771,
9245,
8350,
7457,
3746,
8994,
10020,
3237,
9125,
9726,
11682,
7338,
9387,
44,
7212,
10026,
10284,
10800,
11439,
4658,
564,
2485,
4277,
5945,
6714,
1852,
1468,
... | None |
9,230 | 4 | The_Radio_Hacker's_Codebook:radio hacker codebook radio hacker codebook book computer enthusiasts written george sassoon book explains receive international radioteletype signals convert circuit decode microcomputer case book computer superseded research machines 380z programs functions given written machine code basic however legal moral issues relating intercepting messages included radioteletype subject included fec automatic repeat request used maritime radiocommunications book also include exposition encryption including public key rsa cipher presciently expounds lack privacy cashless society code examples also given using sharp pc-320i encode decode german enigma machine books claims enigma kept secret long periods understanding could compromise american m-209 cipher machine still sold countries encryption topics covered include data encryption standard vernam cipher one-time pad pseudo random number generators transposition ciphers substitution ciphers radio hacker codebook idiosyncratic revealing personal quest sassoon decrypt military signals radio spectrum however would chance decode modern encryption described book radio hacker codebook broke ground low price technical computing book sold £6.95 well typical £10+ price computing books time published duckworth 239 pages | [
2752
] | None |
9,231 | 9 | Franz_Lisp:franz lisp computer programming franz lisp discontinued lisp programming language system written university california berkeley uc berkeley ucb professor richard fateman several students based largely maclisp distributed berkeley software distribution bsd digital equipment corporation dec vax minicomputer piggybacking popularity bsd package franz lisp probably widely distributed used lisp system 1970s 1980s name pun composer franz liszt written specifically host running macsyma computer algebra system vax project began end 1978 soon uc berkeley took delivery first vax 11/780 named ernie covax ernie kovacs first many systems pun names ucb franz lisp available free charge educational sites also distributed eunice berkeley unix emulator ran vax vms time franz lisp creation macsyma computer algebra system ran mainly dec pdp-10 computer limited address space caused difficulties attempted remedies included ports maclisp multics lisp machines even successful would solutions massachusetts institute technology mit machines costly uncommon franz lisp first example framework large lisp programs could run outside lisp machines environment macsyma considered large program ported franz lisp macsyma distributed 50 sites license restricted mit interest making macsyma proprietary vax macsyma ran franz lisp called vaxima symbolics inc. bought commercial rights macsyma mit sell along lisp machines eventually compelled sell macsyma also dec vax sun microsystems computers paying royalties university california use franz lisp lisp implementations vax mit nil never fully functional university utah portable standard lisp dec vax lisp xerox interlisp-vax le lisp 1982 port franz lisp motorola 68000 processor begun particular ported prototype sun-1 made sun microsystems ran variant berkeley software distribution bsd unix called sunos 1986 purdue university franz lisp ported cci power 6/32 platform code named tahoe major contributors franz lisp uc berkeley john k. foderaro keith sklower kevin layer company formed provide support franz lisp called franz inc. founders richard fateman john foderaro fritz kunze kevin layer keith sklower associated uc berkeley development research franz lisp continued years acceptance common lisp greatly reduced need franz lisp first product franz inc. franz lisp running various motorola 68000-based workstations port franz lisp even done vax vms lawrence berkeley national laboratory however almost immediately franz inc. began work implementation common lisp allegro common lisp franz lisp interpreter written c franz lisp bootstrapped solely using c compiler franz lisp compiler written entirely franz lisp called liszt completing pun name composer franz liszt notable features franz lisp arrays lisp interchangeable arrays fortran foreign function interface ffi allowed interoperation languages binary level many implementation methods borrowed maclisp bibop memory organization big bag pages small integers represented uniquely pointers fixed values fields fast arithmetic | [
10752,
11269,
2056,
2062,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
1613,
9299,
10841,
3675,
7267,
2660,
7269,
8293,
2666,
6772,
5751,
7805,
9345,
1159,
9865,
7819,
6797,
9877,
5803,
9391,
2225,
6840,
7... | None |
9,232 | 1 | Spindling:spindling computers spindling allocation different files e.g. data files index files database different hard disks practice usually reduces contention read write resources thus increasing system performance word comes spindle axis hard disks spin | [
1801,
2901
] | None |
9,233 | 4 | Computer_and_network_surveillance:computer network surveillance computer network surveillance monitoring computer activity data stored hard drive data transferred computer networks internet monitoring often carried covertly may completed governments corporations criminal organizations individuals may may legal may may require authorization court independent government agencies computer network surveillance programs widespread today almost internet traffic monitored surveillance allows governments agencies maintain social control recognize monitor threats prevent investigate criminal activity advent programs total information awareness program technologies high-speed surveillance computers biometrics software laws communications assistance law enforcement act governments possess unprecedented ability monitor activities citizens however many civil rights privacy groups reporters without borders electronic frontier foundation american civil liberties union expressed concern increasing surveillance citizens end even already mass surveillance society limited political and/or personal freedoms fear led numerous lawsuits hepting v. hacktivist group anonymous hacked government websites protest considers draconian surveillance vast majority computer surveillance involves monitoring data traffic internet example united states communications assistance law enforcement act mandates phone calls broadband internet traffic emails web traffic instant messaging etc available unimpeded real-time monitoring federal law enforcement agencies packet capture also known packet sniffing monitoring data traffic computer network data sent computers internet networks takes form small chunks called packets routed destination assembled back complete message packet capture appliance intercepts packets may examined analyzed computer technology needed perform traffic analysis sift intercepted data look important/useful information communications assistance law enforcement act u.s. telecommunications providers required install packet capture technology federal law enforcement intelligence agencies able intercept customers broadband internet voice internet protocol voip traffic far much data gathered packet sniffers human investigators manually search thus automated internet surveillance computers sift vast amount intercepted internet traffic filtering reporting investigators bits information interesting example use certain words phrases visiting certain types web sites communicating via email chat certain individual group billions dollars per year spent agencies information awareness office nsa fbi development purchase implementation operation systems intercept analyze data extracting information useful law enforcement intelligence agencies similar systems used iranian secret police identify suppress dissidents technology allegedly installed german siemens ag finnish nokia internet rapid development become primary form communication people potentially subject internet surveillance advantages disadvantages network monitoring instance systems described web 2.0 greatly impacted modern society tim ’ reilly first explained concept web 2.0 stated web 2.0 provides communication platforms user generated self-produced content motivating people communicate friends online however internet surveillance also disadvantage one researcher uppsala university said web 2.0 surveillance directed large user groups help hegemonically produce reproduce surveillance providing user-generated self-produced content characterize web 2.0 surveillance mass self-surveillance surveillance companies monitor people focused work entertainment yet employers also monitor employees order protect company assets control public communications importantly make sure employees actively working productive emotionally affect people cause emotions like jealousy research group states ... set test prediction feelings jealousy lead ‘ creeping ’ partner facebook women particularly likely engage partner monitoring response jealousy study shows women become jealous people online group virtual assistant become social integration lives currently virtual assistant amazon alexa call 911 local services constantly listening command recording parts conversations help improve algorithms law enforcement able called using virtual assistant law enforcement would able access information saved device device connected home internet law enforcement would exact location individual calling law enforcement virtual assistance devices popular many debate lack privacy devices listening every conversation owner even owner talking virtual assistant device still listening conversation hopes owner need assistance well gather data corporate surveillance computer activity common data collected often used marketing purposes sold corporations also regularly shared government agencies used form business intelligence enables corporation better tailor products and/or services desirable customers data also sold corporations use aforementioned purpose used direct marketing purposes targeted advertisements ads targeted user search engine analyzing search history emails use free webmail services kept database one important component prevention establishing business purposes monitoring may include following second component prevention determining ownership technology resources ownership firm networks servers computers files e-mail explicitly stated distinction employee personal electronic devices limited proscribed owned firm instance google search stores identifying information web search ip address search phrase used stored database 18 months google also scans content emails users gmail webmail service order create targeted advertising based people talking personal email correspondences google far largest internet advertising agency—millions sites place google advertising banners links websites order earn money visitors click ads page containing google advertisements adds reads modifies cookies visitor computer cookies track user across sites gather information web surfing habits keeping track sites visit sites information along information email accounts search engine histories stored google use build profile user deliver better-targeted advertising united states government often gains access databases either producing warrant simply asking department homeland security openly stated uses data collected consumer credit direct marketing agencies augmenting profiles individuals monitoring addition monitoring information sent computer network also way examine data stored computer hard drive monitor activities person using computer surveillance program installed computer search contents hard drive suspicious data monitor computer use collect passwords and/or report back activities real-time operator internet connection keylogger example type program normal keylogging programs store data local hard drive programmed automatically transmit data network remote computer web server multiple ways installing software common remote installation using backdoor created computer virus trojan tactic advantage potentially subjecting multiple computers surveillance viruses often spread thousands millions computers leave backdoors accessible network connection enable intruder remotely install software execute commands viruses trojans sometimes developed government agencies cipav magic lantern often however viruses created people spyware installed marketing agencies used gain access security breaches create another method cracking computer gain access network attacker install surveillance software remotely servers computers permanent broadband connections vulnerable type attack another source security cracking employees giving information users using brute force tactics guess password one also physically place surveillance software computer gaining entry place computer stored install compact disc floppy disk thumbdrive method shares disadvantage hardware devices requires physical access computer one well-known worm uses method spreading stuxnet one common form surveillance create maps social networks based data social networking sites well traffic analysis information phone call records nsa call database internet traffic data gathered calea social network maps data mined extract useful information personal interests friendships affiliations wants beliefs thoughts activities many u.s. government agencies defense advanced research projects agency darpa national security agency nsa department homeland security dhs currently investing heavily research involving social network analysis intelligence community believes biggest threat u.s. comes decentralized leaderless geographically dispersed groups types threats easily countered finding important nodes network removing requires detailed map network jason ethier northeastern university study modern social network analysis said following scalable social network analysis program developed information awareness office shown possible monitor computers distance commercially available equipment detecting radiation emitted crt monitor form computer surveillance known tempest involves reading electromagnetic emanations computing devices order extract data distances hundreds meters ibm researchers also found computer keyboards key emits slightly different noise pressed differences individually identifiable conditions possible log key strokes without actually requiring logging software run associated computer 2015 lawmakers california passed law prohibiting investigative personnel state force businesses hand digital communication without warrant calling electronic communications privacy act time california state senator jerry hill introduced bill making law enforcement agencies disclose information usage information stingray phone tracker device law took effect january 2016 require cities operate new guidelines relation law enforcement use device legislators holding public office disagreed technology warrantless tracking city wants use device must heard public hearing cities pulled using stingray santa clara county also shown adi shamir et al. even high frequency noise emitted cpu includes information instructions executed policeware software designed police citizens monitoring discussion interaction citizens within u.s. carnivore first incarnation secretly installed e-mail monitoring software installed internet service providers networks log computer communication including transmitted e-mails magic lantern another application time running targeted computer trojan style performing keystroke logging cipav deployed fbi multi-purpose spyware/trojan clipper chip formerly known myk-78 small hardware chip government install phones designed nineties intended secure private communication data reading voice messages encoded decode clipper chip designed clinton administration “ …protect personal safety national security developing information anarchy fosters criminals terrorists foreign foes. ” government portrays solving secret codes cryptographic age technology created thus raised controversy public clipper chip thought next “ big brother ” tool led failure clipper proposal even though many attempts consumer broadband digital television promotion act cbdtpa bill proposed united states congress cbdtpa known security systems standards certification act sssca draft form killed committee 2002 cbdtpa become law would prohibited technology could used read digital content copyright music video e-books without digital rights management drm prevented access material without permission copyright holder german-speaking countries spyware used made government sometimes called govware countries like switzerland germany legal framework governing use software known examples include swiss minipanzer megapanzer german r2d2 trojan surveillance censorship different surveillance performed without censorship harder engage censorship without form surveillance even surveillance lead directly censorship widespread knowledge belief person computer use internet surveillance lead self-censorship march 2013 reporters without borders issued special report internet surveillance examines use technology monitors online activity intercepts electronic communication order arrest journalists citizen-journalists dissidents report includes list state enemies internet bahrain china iran syria vietnam countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights computer network surveillance increase countries report also includes second list corporate enemies internet amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany companies sell products liable used governments violate human rights freedom information neither list exhaustive likely expanded future protection sources longer matter journalistic ethics journalists equip digital survival kit exchanging sensitive information online storing computer hard-drive mobile phone individuals associated high-profile rights organizations dissident groups protest groups reform groups urged take extra precautions protect online identities | [
3072,
10756,
10245,
9227,
3088,
8726,
9242,
9761,
9256,
9771,
1070,
10297,
3643,
7739,
9791,
1088,
4165,
7759,
4689,
615,
2151,
3688,
107,
2162,
4725,
5749,
3703,
119,
8824,
5245,
6786,
5764,
9356,
1169,
4245,
150,
10392,
1690,
1692,
5281... | Test |
9,234 | 2 | OLE_DB_provider:ole db provider ole db provider software component ole db api designed microsoft enables ole db consumer interact data source ole db providers analogous odbc drivers jdbc drivers ado.net data providers ole db providers created access simple data stores text file spreadsheet complex databases oracle microsoft sql server sybase ase many others also provide access hierarchical data stores email systems however different data store technologies different capabilities every ole db provider implement every possible interface available ole db standard capabilities available implemented use com objects ole db provider map data store technologies functionality particular com interface microsoft describes availability interface provider-specific may applicable depending data store technology involved note also providers may augment capabilities data store capabilities known services microsoft parlance example microsoft ships ole db providers part mdac jet kits simba technologies ships simbaprovider sdk used build custom ole db olap providers multi-dimensional star schema database connectivity openlink software ships components supporting ole db access number data sources including several sql dbms well bridges odbc- jdbc-accessible data sources | [
10243,
10769,
1043,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
4174,
4178,
9813,
603,
2145,
1656,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
4771,
7846,
10413,
10414,
8391,
214,
9943,
9434,
2783,
736,
4321,
6370,
4836,
17... | Test |
9,235 | 3 | MStar:mstar mstar semiconductor inc. taiwanese fabless semiconductor company specializing mixed-mode integrated circuit technologies based hsinchu hsien mstar made hardware multimedia wireless communications form display ics mixed-mode i.e combining analog digital functions asic/ips addition chip sets gsm mobile handsets mstar employed approx 1300 10 branches worldwide company revenue around us 1067 million 2010 growth substantial revenue 2005 us 175 million mstar listed taiwan stock exchange code 3697 mstar often referred little-m chinese community contrary part bigger semiconductor company big-m a.k.a mediatek mstar spin-off 2-1 stock split system general technology may 2002 power ic product line stayed system general technology employees display rfid product lines transferred new spin-off spin-off 1-2 stock swap taken exchange two companies back corresponding shareholders chairman mstar wayne liang 梁公偉 steve yang 楊偉毅 president co-founder 2004 involved court case ruling international trade commission itc mstar semiconductor found guilty infringing patent held genesis microchip method improve images liquid-crystal-display lcd monitors flat screen tvs 22 june 2012 mediatek inc. announced purchased 212 million 254 million shares mstar 40 48 outstanding shares 0.794 mediatek shares nt 1 cash per mstar share | [
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
10361,
638,
644,
8842,
146,
659,
7833,
666,
5786,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
1776,
6391,
3835,
2814,
781,
2838,
54... | Test |
9,236 | 6 | Amiga_Old_File_System:amiga old file system amiga old file system filesystem amigaos amiga fast file system even though used 512-byte blocks reserved first small portion block metadata leaving actual data block capacity 488 bytes per block n't suitable anything except floppy disks soon replaced originally known amiga file system came filesystem tripos formed basis first versions amigados received nickname old original file system fast file system released amigaos 1.3 ofs good repairing filesystem event problem although so-called diskdoctor provided commodore quickly earned name diskdestroyer could repair no-dos type autostart disks provided third-party software manufacturers bootable disks games idea create non-standard autobootable disks born primitive attempt prevent copy disks avoid loading launch amiga dos order directly access amiga graphic audio memory chipsets diskdoctor fact changed autostart disks bootblocks standard amigados-based ones renaming disk lazarus namedisk made autostart disk unusable amiga uses mfm encoding/decoding default handling floppy disks 80 cylinders amiga floppy disk cylinder 2 mfm tracks one side disk double density dd disks 11 sectors per mfm track high density hd disks 22 sectors geometry amiga floppy disk follows dd disk 11 2 80 1760 0 1759 blocks hd disk 22 2 80 3520 blocks amiga stores 880 kib dd disk 1760 kib hd floppy disk prior amigaos 3.5 amigados file handles maintained 32-bit wide offset parameter unsigned telling start next read write operation biggest size single amiga file operating systems therefore comes 2 4 gib amiga os 3.5 file handles may reference 2 16 eib files however ofs-formatted disks continue retain 32-bit limitations intrinsic limitation format recorded media ofs datablock stores block size bsize-24 bytes i.e normally 488 bytes frequently used bsize 512 bytes rootblock located physical middle media block number 880 dd disks block 1760 hds helps minimize seek times exact calculation stored follows rootblock contains information disk name formatting date etc also contains information accessing files/directories/links located uppermost root directory characters '/ forbidden file volume names |^+ =\- letters diacritical marks like âè allowed date fields root block blocks structured form days mins ticks days field contains number days since january 1 1978 mins number minutes passed since midnight ticks expressed 1/50s second day value zero considered illegal programs since days value stored 32-bit number amiga filesystem inherent year 2000 problem year 2038 problem reach file directory link amigados uses hash function calculate 32-bit word disk block use pointer hash bucket list turn contains file directory link record bucket list used support filesystem objects names hash offset example file_1a file_24 file_5u hash value filename characters lowercase uppercase case sensitive accessed say myfile myfile directory refer file files composed file header block contains information file size last access time data block pointers etc data blocks contain actual data file header block contains bsize/4-56 data block pointers amounts 72 entries usual 512 byte blocks file larger file extension blocks allocated hold data block pointers file extension blocks organised linked list starts file header block 'extension field | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9249,
9762,
5158,
11323,
8772,
5709,
6233,
5729,
4708,
5736,
11370,
9836,
7789,
5743,
9333,
6263,
9335,
9848,
9343,
8832,
7818,
139,
654,
5264,
2193,
2194,
2197,
2199,
11419,
3233,
6309,
1190,
52... | None |
9,237 | 2 | Linux_Phone_Standards_Forum:linux phone standards forum linux phone standards forum lips forum consortium group companies create standards use linux mobile devices main goal lips forum create application programming interfaces apis allow developers build applications inter-operate across linux handsets made manufacturers founding members include arm ltd cellon esmertec france telecom telecom italia fsm labs huawei jaluna mizi research montavista software open-plug palmsource march 2007 palmsource changed name parent company access inc newer members include texas instruments trolltech asa movial oy british telecom joined lips forum september 2007 september 2007 lips forum announced going align efforts open mobile alliance june 2008 lips forum announced would join limo foundation thereby cease exist separate organization | [
4225,
7938,
7812,
8326,
4360,
4493,
2195,
11155,
1813,
10780,
1694,
3618,
4011,
9646,
823,
2235,
9660,
10303,
10817,
5067,
8147,
1761,
4841
] | Test |
9,238 | 3 | Round-robin_DNS:round-robin dns round-robin dns technique load distribution load balancing fault-tolerance provisioning multiple redundant internet protocol service hosts e.g. web server ftp servers managing domain name system dns responses address requests client computers according appropriate statistical model simplest implementation round-robin dns works responding dns requests single potential ip address one list potential ip addresses corresponding several servers host identical services order ip addresses list returned basis term round robin dns response ip address sequence list permuted usually basic ip clients attempt connections first address returned dns query different connection attempts clients would receive service different providers thus distributing overall load among servers standard procedure deciding address used requesting application resolvers attempt re-order list give priority numerically closer networks desktop clients try alternate addresses connection timeout 30–45 seconds round-robin dns often used load balance requests number web servers example company one domain name three identical copies web site residing three servers three different ip addresses one user accesses home page sent first ip address second user accesses home page sent next ip address third user sent third ip address case ip address given goes end list fourth user therefore sent first ip address forth round-robin dns name rare occasions referred rotor due rotation alternative records although easy implement round-robin dns number drawbacks arising record caching dns hierarchy well client-side address caching reuse combination difficult manage round-robin dns solely relied upon service availability service one addresses list fails dns continue hand address clients still attempt reach inoperable service also may best choice load balancing since merely alternates order address records time name server queried consideration transaction time server load network congestion etc round-robin dns load balancing works best services large number uniformly distributed connections servers equivalent capacity otherwise load distribution methods exist overcome limitations example modified dns servers lbnamed routinely poll mirrored servers availability load factor server reply required server temporarily removed dns pool reports operating within specs | [
5472,
225,
277,
2887
] | None |
9,239 | 3 | Compaq_Presario_C502TU:compaq presario c502tu compaq presario c502tu notebook computer presario c500 series first produced 2007 series design based compaq presario c300 series compaq presario c500 notebook pc series specifications | [
6765
] | Test |
9,240 | 4 | Courage_Foundation:courage foundation courage foundation trust fundraising legal defence individuals whistleblowers journalists founded august 9 2013 'journalistic source protection defence fund wikileaks site later rebranded june 2014 trust accepts donations bitcoin maintains tor hidden service individuals supported trust advisers include pentagon papers military analyst daniel ellsberg former nsa executive thomas drake former mi5 british intelligence officer whistleblower annie machon member chaos computer club andy müller-maguhn guatemala human rights lawyer renata avila pussy riot courage trustees renata avila susan benn john pilger dame vivienne westwood courage acting director wikileaks member sarah harrison | [
8640,
10726,
3495,
5385,
9965,
7887,
82,
5426,
2683,
4956,
1087
] | Test |
9,241 | 8 | List_of_augmented_browsing_software:list augmented browsing software | [
1863,
1129,
8588,
5078,
5114,
8923
] | Train |
9,242 | 4 | CenterPOS_Malware:centerpos malware centerpos also known cerebrus point sale pos malware discovered cyber security experts discovered september 2015 along kinds pos malware newposthings blackpos alina two versions released developer responsible version 1.7 version 2.0 centerpos 2.0 similar functionality centerpos version 1.7 2.0 variant centerpos malware added effective features addition configuration file storing information command control server centerpos used target retailers order illegally obtain payment card information using memory scraper uses two distinct modes scrape store information smart scan normal scan normal scan mode malware looks processes device determines ones currently running processes named system system idle process idle contain keywords microsoft mozilla process meets criteria list malware search memory regions within process searching credit card data regular expressions regular expression list smart scan mode malware starts performing normal scan process regular expression match added smart scan list first pass malware search processes smart scan list malware contains functionality allows cybercriminals create configuration file centerpos malware searches configuration file contains c c information unable find configuration file asks password password entered correct payloads functions create configuration file malware different point sale system malware separate component called builder create payload centerpos malware looks credit debit card information smart scan mode encrypts scraped data using triple des encryption memory scraped data sent operator malware separate http post request | [
3072,
6786,
7044,
10245,
10756,
9356,
8206,
9233,
8978,
4863,
4883,
278,
10392,
1690,
3867,
10141,
5281,
2213,
8998,
9256,
939,
3629,
1970,
3643,
6588,
4797,
7739,
9791,
1088,
3395,
4165,
10309,
6091,
2508,
6360,
7515,
4344,
3941,
107,
87... | None |
9,243 | 3 | Split-brain_(computing):split-brain computing split-brain computer term based analogy medical split-brain syndrome indicates data availability inconsistencies originating maintenance two separate data sets overlap scope either servers network design failure condition based servers communicating synchronizing data last case also commonly referred network partition although term split-brain typically refers error state split-brain dns split-horizon dns sometimes used describe deliberate situation internal external dns services corporate network communicating separate dns name spaces administered external computers internal ones requires double administration domain overlap computer names risk fully qualified domain name fqdn may ambiguously occur name spaces referring different computer ip addresses high-availability clusters usually use heartbeat private network connection used monitor health status node cluster example split-brain syndrome may occur private links go simultaneously cluster nodes still running one believing one running data sets cluster may randomly serve clients idiosyncratic data set updates without coordination data sets may lead data corruption data inconsistencies might require operator intervention cleanup davidson et al. surveying several approaches handle problem classify either optimistic pessimistic optimistic approaches simply let partitioned nodes work usual provides greater level availability cost sacrificing correctness problem ended automatic manual reconciliation might required order cluster consistent state one current implementation approach hazelcast automatic reconciliation key-value store pessimistic approaches sacrifice availability exchange consistency network partitioning detected access sub-partitions limited order guarantee consistency typical approach described coulouris et al. use quorum-consensus approach allows sub-partition majority votes remain available remaining sub-partitions fall auto-fencing mode one current implementation approach one used mongodb replica sets another implementation galera replication mariadb mysql modern commercial general-purpose ha clusters typically use combination heartbeat network connections cluster hosts quorum witness storage challenge two-node clusters adding witness device adds cost complexity even implemented cloud without heartbeat fails cluster members determine active clusters without quorum member fails even members normally assign primary secondary statuses hosts least 50 probability 2-node ha cluster totally fail human intervention provided prevent multiple members becoming active independently either directly conflicting corrupting data | [
1701,
2887,
8683,
7022,
4274,
10102,
3927
] | Test |
9,244 | 2 | Android_Nougat:android nougat android nougat codenamed android n development seventh major version 14th original version android operating system first released alpha test version march 9 2016 officially released august 22 2016 nexus devices first receive update lg v20 first smartphone released nougat nougat introduces notable changes operating system development platform including ability display multiple apps on-screen split-screen view support inline replies notifications expanded doze power-saving mode restricts device functionality screen period time additionally platform switched openjdk-based java environment received support vulkan graphics rendering api seamless system updates supported devices nougat received positive reviews new app notification format received particular praise multitasking interface seen positive change reviewers experienced incompatible apps critics mixed experiences doze power-saving mode faster app installs tweaks user interface also reviewed positively 19.2 devices access google play run nougat 11.4 android 7.0 api 24 7.8 android 7.1 api 25 release internally codenamed new york cheesecake march 9 2016 ahead google i/o developer conference google released first alpha version android n part new android beta program intended testing developers enthusiasts official release summer developer preview builds compatible current google nexus devices 5x 6p 6 9 pixel c nexus player android beta program introduced allows testers opt-in over-the-air updates new beta versions released april 13 2016 android n beta preview 2 released google discussed android n i/o keynote may 18 2016 unveiled new virtual reality platform daydream beta preview 3 first preview release deemed suitable wider public beta testing released time google also announced would hold contest determine official release name operating system beta preview 4 released june 15 2016 june 30 2016 google announced n release name would nougat also confirmed nougat would version 7.0 android final beta preview 5 released july 18 2016 android 7.0 officially released august 22 2016 nexus 6 5x 6p 9 nexus player pixel c first devices receive update dave burke android vice president engineering stated august 2016 updates nougat would released quarterly maintenance releases focusing continued refinements polish september 6 2016 lg announced v20 first smartphone ship nougat pre-installed google unveiled first-party pixel pixel xl smartphones hardware-focused event october 4 2016 pixel phones replacing nexus series updates existing devices vary manufacturer carrier driver support version manufacturer device respective system-on-chip major manufacturers including htc sony motorola announced intents update range recent devices nougat qualcomm stated would support nougat devices using snapdragon 800 801 system-on-chips undisclosed reasons although developer preview builds nougat released device sony stated would upgrade xperia z3 uses snapdragon 801 final version due unforeseen platform limitations reported google compatibility test suite whose tests must passed order receive official certification specified devices running nougat must support either vulkan opengl es 3.1 graphics apis — neither supported device adreno 330 graphics core none less fairphone 2 purported device qualcomm snapdragon 801 chipset provide official support android 7.1.2. delivering effort towards increased longevity sustainable device post-release update known android 7.1 pre-loaded onto google pixel pixel xl smartphones released october 2016 new version adds support google daydream vr platform image keyboards expanded emoji support including male female versions support actions displayed menus home screen app shortcuts new features preview 7.1 existing nexus devices released via android beta program later month officially released android 7.1.1 december 5 2016 7.1.1 nexus 6 nexus 9 considered end-of-life receive updates android 7.1.2 released april 2017 providing various improvements minor functionality improvements nexus pixel-branded devices nougat redesigns notification shade features smaller row icons settings replacing notification cards new sheet design allowing inline replies notifications multiple notifications single app also bundled greater per-app control notifications split-screen display mode introduced phones two apps snapped occupy halves screen experimental multi-window mode also available hidden feature multiple apps appear simultaneously screen overlapping windows doze power saving mechanism introduced android marshmallow expanded include state activated device running battery screen period time stationary state network activity restricted apps granted maintenance windows access network perform background tasks marshmallow full doze state activated device stationary screen period time new data saver mode restricts background mobile data usage trigger internal functions apps designed reduce bandwidth usage capping quality streaming media december 2015 google announced android nougat would switch java runtime environment defunct apache harmony openjdk—the official open source implementation java platform maintained oracle corporation java community android runtime art incorporates profile-guided compilation system utilizing jit compiler profiling alongside current ahead-of-time compiler optimize apps device hardware conditions background nougat introduces system enabling seamless automatic system updates based upon sharing code implementation similar functionality chrome os system uses pair squashfs partitions android system executes online partition updates applied background redundant offline partition next boot following installation update redundant partition designated active device henceforth boots updated system previous system partition kept backup case update failure serve offline partition next update system removes requirement device reboot system recovery environment apply update prevents device used update complete also provides ability update automatically rolled back case failure google chose enable seamless updates devices shipped nougat later rather enabling earlier devices support feature repartitioning additionally due art changes nougat apps longer need re-compiled upon first boot system update developer preview 2 added platform support vulkan new low-level 3d-rendering api alternative opengl es higher graphics performance nougat first version featuring unicode 9.0 support comes updated emoji plus support emoji skin tones android 7.1 adds native api support implementing image keyboards multi-endpoint telephony shortcut menus rounded icon assets apps launchers support google daydream virtual reality platform daydream environment includes sustained performance mode assist developers optimizing apps device thermal profile new head tracking algorithm combines input various device sensors integration system notifications vr user interface response stagefright family bugs disclosed fixed 2015 several changes made harden media stack future vulnerabilities runtime integer overflow detection implemented preventing majority stagefright-like programming bugs becoming vulnerabilities addition helping fix prevent bugs android monolithic mediaserver process redesigned better adhere principle least privilege mediaserver split several separate processes running unprivileged sandbox granted permissions required task example audioserver access bluetooth libstagefright runs within mediacodecservice sandbox granted gpu access constraints placed media stack seccomp various mechanisms enabled reduce possibility malicious code injected and/or executed inside linux kernel including dividing kernel memory logical segments code data page access permissions read-only no-execute appropriate kernel also restricted directly accessing user space memory stronger stack protection enabled gcc compiler reduce stack smashing limit exposure kernel potentially malicious code perf disabled default ioctl commands restricted selinux seccomp-bpf enabled grant processes ability restrict system calls devices shipping android nougat verified boot policy introduced partially kitkat displaying notifications startup marshmallow must strictly enforced system files corrupted otherwise modified operating system allow operation limited-use mode refuse boot dieter bohn verge praised new multitasking interface android nougat calling long overdue android tablets although initially found implementation confusing wrote worked well understood properly though noted apps ’ fully support split screen others work fine pop warning anyway bohn also liked new way reply message notification stating android long advantage useful consistent notifications versus ios added quick replies standard n't see lead diminishing also noted tweaks throughout os welcome changes including quick toggles notification drawer settings menu visual information camera app cleaned bit bohn stated n't notice significant battery improvements despite doze power-saving feature nougat also wrote extensively fact even though nougat great ’ shame take long anybody see writing lack updates android devices unless nexus could months could becomes available phone chris velazco engadget also praised new bundled app notifications writing prior android versions notifications sort sit interaction nougat much better job bundling app letting get things done highlighted ability expand bundled gmail notification see subjects senders individual messages velazco stated split-screen multitasking big deal also encountered non-compatible apps visual elements settings app quick toggles notification dropdown new language emoji support also positive highlights review velazco note battery improvement doze power-saving feature stating nexus 6p seemed gain hour two standby battery life also wrote installing launching apps might little faster usual thanks nougat new app compiler hoped game developers utilize new vulkan api seriously good-looking mobile gaming | [
5637,
8719,
3600,
7700,
8214,
11294,
1578,
10284,
5677,
7734,
1083,
6212,
69,
8262,
1608,
4683,
4685,
11343,
3664,
10835,
8280,
8285,
2658,
6754,
8821,
6265,
11391,
1670,
9863,
7816,
5262,
10393,
8858,
7835,
673,
8870,
1191,
1203,
9913,
7... | Test |
9,245 | 9 | Ruby_(programming_language):ruby programming language ruby interpreted high-level general-purpose programming language designed developed mid-1990s yukihiro matz matsumoto japan ruby dynamically typed uses garbage collection supports multiple programming paradigms including procedural object-oriented functional programming according creator ruby influenced perl smalltalk eiffel ada basic lisp matsumoto said ruby conceived 1993 1999 post ruby-talk mailing list describes early ideas language matsumoto describes design ruby like simple lisp language core object system like smalltalk blocks inspired higher-order functions practical utility like perl name ruby originated online chat session matsumoto keiju ishitsuka february 24 1993 code written language initially two names proposed coral ruby matsumoto chose latter later e-mail ishitsuka matsumoto later noted factor choosing name ruby – birthstone one colleagues first public release ruby 0.95 announced japanese domestic newsgroups december 21 1995 subsequently three versions ruby released two days release coincided launch japanese-language ruby-list mailing list first mailing list new language already present stage development many features familiar later releases ruby including object-oriented design classes inheritance mixins iterators closures exception handling garbage collection following release ruby 0.95 1995 several stable versions ruby released following years 1997 first article ruby published web year matsumoto hired netlab.jp work ruby full-time developer 1998 ruby application archive launched matsumoto along simple english-language homepage ruby 1999 first english language mailing list ruby-talk began signaled growing interest language outside japan year matsumoto keiju ishitsuka wrote first book ruby object-oriented scripting language ruby オブジェクト指向スクリプト言語 ruby published japan october 1999 would followed early 2000s around 20 books ruby published japanese 2000 ruby popular python japan september 2000 first english language book programming ruby printed later freely released public widening adoption ruby amongst english speakers early 2002 english-language ruby-talk mailing list receiving messages japanese-language ruby-list demonstrating ruby increasing popularity non-japanese speaking world ruby 1.8 initially released august 2003 stable long time retired june 2013 although deprecated still code based ruby 1.8 partially compatible ruby 1.9 ruby 1.8 subject several industry standards language specifications ruby developed open standards promotion center information-technology promotion agency japanese government agency submission japanese industrial standards committee jisc international organization standardization iso accepted japanese industrial standard jis x 3017 2011 international standard iso/iec 30170 2012 around 2005 interest ruby language surged tandem ruby rails web framework written ruby rails frequently credited increasing awareness ruby ruby 1.9 released christmas day 2007 effective ruby 1.9.3 released october 31 2011 ruby switched dual-licensed ruby license gpl dual-licensed ruby license two-clause bsd license adoption 1.9 slowed changes 1.8 required many popular third party gems rewritten ruby 1.9 introduces many significant changes 1.8 series examples ruby 1.9 obsolete since february 23 2015 longer receive bug security fixes users advised upgrade recent version ruby 2.0 added several new features including ruby 2.0 intended fully backward compatible ruby 1.9.3 official 2.0.0 release february 24 2013 five known minor incompatibilities obsolete since february 22 2016 longer receive bug security fixes users advised upgrade recent version ruby 2.1.0 released christmas day 2013 release includes speed-ups bugfixes library updates starting 2.1.0 ruby versioning policy like semantic versioning although similar ruby versioning policy compatible semantic versioning semantic versioning also provides additional labels pre-release build metadata available extensions major.minor.patch format available ruby ruby 2.1 obsolete since april 1 2017 longer receive bug security fixes users advised upgrade recent version ruby 2.2.0 released christmas day 2014 release includes speed-ups bugfixes library updates removes deprecated apis notably ruby 2.2.0 introduces changes memory handling incremental garbage collector support garbage collection symbols option compile directly jemalloc also contains experimental support using vfork 2 system spawn added support unicode 7.0 specification features made obsolete removed include callcc dl library digest :hmac lib/rational.rb lib/complex.rb gserver logger :application well various c api functions ruby 2.3.0 released christmas day 2015 notable changes include 2.3 branch also includes many performance improvements updates bugfixes including changes proc call socket io use exception keywords thread name handling default passive net :ftp connections rake removed stdlib ruby 2.4.0 released christmas day 2016 notable changes include 2.4 branch also includes performance improvements hash table array max array min instance variable access ruby 2.5.0 released christmas day 2017 notable changes include top come lot performance improvements like faster block passing 3 times faster faster mutexes faster erb templates improvements concatenation methods ruby 2.6.0 released christmas day 2018 notable changes include matsumoto said ruby designed programmer productivity fun following principles good user interface design google tech talk 2008 matsumoto stated hope see ruby help every programmer world productive enjoy programming happy primary purpose ruby language stresses systems design needs emphasize human rather computer needs ruby said follow principle least astonishment pola meaning language behave way minimize confusion experienced users matsumoto said primary design goal make language enjoyed using minimizing programmer work possible confusion said applied principle least astonishment design ruby nevertheless phrase come closely associated ruby programming language phrase source surprise novice users may take mean ruby behaviors try closely match behaviors familiar languages may 2005 discussion newsgroup comp.lang.ruby matsumoto attempted distance ruby pola explaining design choice surprising someone uses personal standard evaluating surprise personal standard remains consistent would surprises familiar standard matsumoto defined way interview ruby object-oriented every value object including classes instances types many languages designate primitives integers booleans null variables always hold references objects every function method methods always called object methods defined top level scope become methods object class since class ancestor every class methods called object also visible scopes effectively serving global procedures ruby supports inheritance dynamic dispatch mixins singleton methods belonging defined single instance rather defined class though ruby support multiple inheritance classes import modules mixins ruby described multi-paradigm programming language allows procedural programming defining functions/variables outside classes makes part root 'self object object orientation everything object functional programming anonymous functions closures continuations statements values functions return last evaluation support introspection reflection metaprogramming well support interpreter-based threads ruby features dynamic typing supports parametric polymorphism according ruby faq syntax similar perl semantics similar smalltalk differs greatly python syntax ruby broadly similar perl python class method definitions signaled keywords whereas code blocks defined keywords braces contrast perl variables obligatorily prefixed sigil used sigil changes semantics scope variable practical purposes distinction expressions statements line breaks significant taken end statement semicolon may equivalently used unlike python indentation significant one differences python perl ruby keeps instance variables completely private class exposes accessor methods codice_11 codice_12 etc. unlike getter setter methods languages like c++ java accessor methods ruby created single line code via metaprogramming however accessor methods also created traditional fashion c++ java invocation methods require use parentheses trivial change instance variable full function without modifying single line calling code refactoring achieving similar functionality c vb.net property members python property descriptors similar come tradeoff development process one begins python using publicly exposed instance variable later changes implementation use private instance variable exposed property descriptor code internal class may need adjusted use private variable rather public property ruby ’ design forces instance variables private also provides simple way declare codice_13 codice_14 methods keeping idea ruby one never directly accesses internal members class outside class rather one passes message class receives response see examples section samples code demonstrating ruby syntax ruby official distribution also includes codice_15 interactive command-line interpreter used test code quickly following code fragment represents sample session using codice_15 following examples run ruby shell interactive ruby shell saved file run command line typing codice_17 classic hello world example basic ruby code input conversions variety ways define strings ruby following assignments equivalent strings support variable interpolation following assignments equivalent produce raw strings constructing using array constructing using associative array ruby called hash statement two syntaxes creating code block code block passed method optional block argument many built-in methods arguments parameter-passing block closure computer science |closure creating anonymous function returning closure computer science |closures method yielding flow program control block provided calling time iterating enumerations arrays using blocks method codice_18 accept parameter block codice_18 method iterates member list performing function retaining aggregate analogous codice_20 function functional programming languages example first pass block receives 10 argument inject codice_21 1 first element array codice_22 returns 11 becomes codice_21 next pass added 3 get 14 added 5 third pass finally return 19 using enumeration block square numbers 1 10 using range invoke method item codice_24 synonym codice_25 following code defines class named codice_26 addition codice_27 usual constructor create new objects two methods one override codice_28 comparison operator codice_29 sort age override codice_30 method codice_31 format output codice_12 example metaprogramming ruby codice_33 defines getter setter methods instance variables codice_12 getter methods last evaluated statement method return value allowing omission explicit codice_35 statement preceding code prints three names reverse age order codice_26 constant reference codice_37 object ruby classes never closed methods always added existing class applies classes including standard built-in classes needed open class definition existing class new contents specified added existing contents simple example adding new method standard library codice_38 class adding methods previously defined classes often called monkey patch|monkey-patching performed recklessly practice lead behavior collisions subsequent unexpected results code scalability problems since ruby 2.0 possible use refinements reduce potentially negative consequences monkey-patching limiting scope patch particular areas code base exception raised codice_39 call optional message added exception exceptions also specified programmer alternatively exception instance passed codice_39 method last construct useful raising instance custom exception class featuring constructor takes one argument exceptions handled codice_41 clause clause catch exceptions inherit codice_42 flow control keywords used handling exceptions codice_43 codice_44 common mistake attempt catch exceptions simple rescue clause catch exceptions one must write catch particular exceptions also possible specify exception object made available handler clause alternatively recent exception stored magic global codice_45 several exceptions also caught ruby code programmatically modify run time program lifecycle phase |runtime aspects structure would fixed rigid languages class method definitions sort metaprogramming used write concise code effectively extend language example following ruby code generates new methods built-in codice_46 class based list colors methods wrap contents string html tag styled respective color generated methods could used like implement equivalent many languages programmer would write method codice_47 codice_48 codice_49 etc separately possible uses ruby metaprogramming include original ruby interpreter computer software |interpreter often referred ruby mri|matz ruby interpreter mri implementation written c uses ruby-specific virtual machine standardized retired ruby 1.8 ruby mri|implementation written c programming language |c single-pass interpreted language starting ruby 1.9 continuing ruby 2.x official ruby interpreter yarv yet another ruby vm implementation superseded slower virtual machine used previous releases mri number alternative implementations ruby including jruby rubinius mruby takes different approach jruby rubinius providing just-in-time compilation mruby also providing ahead-of-time compilation ruby three major alternate implementations ruby implementations include defunct ruby implementations maturity ruby implementations tends measured ability run ruby rails rails framework complex implement uses many ruby-specific features point particular implementation achieves goal called rails singularity reference implementation jruby rubinius able run rails unmodified production environment matsumoto originally ruby development bsd|4.3bsd -based sony news|sony news-os 3.x later migrated work sunos 4.x finally linux 1999 ruby known work across many different operating system including news-os sunos aix svr4 solaris operating system |solaris nec up-ux nextstep bsd linux classic mac os|mac os dos windows operating system |windows beos modern ruby versions implementations available many operating systems linux bsd solaris aix macos windows windows phone windows ce symbian os beos ibm rubygems ruby package manager ruby package called gem easily installed via command line gems libraries though exist applications integrated development environment|ides 10,000 ruby gems hosted rubygems.org many new existing ruby libraries hosted github service offers revision control|version control repository hosting git software |git ruby application archive hosted applications documentation libraries ruby programming maintained 2013 function transferred rubygems category ruby programming language category articles example ruby code category class-based programming languages category dynamic programming languages category dynamically typed programming languages category free software programmed c category iso standards category object-oriented programming languages category programming languages created 1995 category programming languages iso standard category scripting languages category software using bsd license category text-oriented programming languages category free compilers interpreters | [
8201,
6160,
19,
8213,
10266,
6176,
50,
8262,
4171,
84,
6228,
10340,
102,
4200,
8297,
8303,
8304,
2181,
2186,
2191,
10387,
148,
155,
2206,
4255,
8355,
2217,
10413,
4277,
190,
6335,
8385,
6338,
10436,
6345,
8408,
6361,
219,
228,
8421,
104... | Test |
9,246 | 4 | Mikko_Hyppönen:mikko hyppönen mikko hermanni hyppönen born 1969 finland computer security expert columnist known hypponen law iot security states whenever appliance described smart vulnerable mikko hyppönen chief research officer f-secure worked f-secure finland since 1991 hyppönen assisted law enforcement united states europe asia since 1990s cybercrime cases advises governments cyber crime team took sobig.f botnet 2004 hyppönen cooperated vanity fair feature code warrior examined role defeating blaster sobig computer worms hyppönen given keynotes presentations number conferences around world including black hat def con dld rsa addition data security events hyppönen delivered talks general-interest events ted tedx dld sxsw slush google zeitgeist also spoken various military events including afcea events nato ccd coe iccc hyppönen reserve officer finnish army hyppönen member advisory board impact international multilateral partnership cyber threats since 2007 together yevgeny kaspersky hamadoun touré fred piper john thompson hyppönen columnist betanews wired also written research cnn new york times scientific american 2011 ranked 61st foreign policy top 100 global thinkers report hyppönen coined term cybercrime unicorns describe cybercrime organizations worth billion us dollars reference startup unicorns hyppönen made international news 2011 tracked visited authors first pc virus history brain hyppönen produced documentary event documentary published youtube hyppönen also documenting rise mobile phone malware since first smartphone viruses found blog news lab started hyppönen 2004 first blog antivirus company hyppönen credited twitter improving twitter security mr. hyppönen curator malware museum internet archive since 2016 | [
9537,
2275,
3843,
2213,
6344,
2154,
43,
3342,
10777,
5971,
9460,
11476,
2041,
7899
] | None |
9,247 | 3 | Salamander_(video_game):salamander video game retitled north america japanese arcade re-release europe known life force salamander scrolling shooter arcade game konami released 1986 spin-off gradius salamander introduced simplified power-up system two-player cooperative gameplay horizontally vertically scrolling stages later became norm future gradius games salamander followed sequel 1996 titled salamander 2 first player controls vic viper second player takes reins debuting spacecraft lord british sometimes referred road british due ambiguity japanese-to-english romanization game features six stages alter horizontal vertical scrolling players allowed continue leave upon death instead returned predefined checkpoint per gradius tradition continues single player mode two two-player mode number continues changed dip switches player gains power-ups picking capsules left behind certain enemies opposed selection bar used gradius games however japanese version life force keeps selection bar many power-ups combined example option fires second third salvo missiles ripple/plutonic lasers power-ups attained ripple laser however mutually exclusive power-up survive ship destruction options upon ship destruction options float space brief time disappearing new ship grab retain arcade version game released original title japan europe life force north america japanese european versions nearly identical american version changes game plot adding opening text establishes game set inside giant alien life-form infected strain bacteria stages feature starfield backgrounds changed web background stage 1 maintain consistency organic setting plot power-ups also given different names speed-up becoming hyper speed missile becoming destruct missile ripple laser becoming pulse laser force field becoming shield narration added beginning stage detailing area alien body player currently inhabiting enter stomach muscle zone bio-mechanical brain attack konami later released enhanced version salamander japan 1987 bearing american title life force fleshes organic motif backgrounds mechanical enemies completely redrawn given organic appearances power-up system also modified japanese life force using power-up gauge original gradius music tracks completely changed release power-up gauge arranged differently players ocean software imagine label released licensed versions salamander computer systems spectrum commodore amstrad 1988 spectrum amstrad versions generally criticized commodore 64 version highly praised critics day particularly zzap 64 though missing two six stages simultaneous two player mode gameplay much easier arcade counterpart commodore port generally considered one best arcade conversions system salamander ported family computer japan 1987 instead direct port salamander elements taken original salamander japanese life force re-release elements levels bosses removed make way new content background graphics enemy sprites salamander used favor used life force though gradius -style power bar used place original instant pick-up system year north america received port well nintendo entertainment system nes version practically identical famicom equivalent multiple endings two option power ups instead three titled life force north america version later re-released virtual console february 16 2009 wii january 23 2014 nintendo 3ds august 21 2014 wii u european version titled life force salamander cover released november 22 1989 nes version makes use konami code increases number lives three 30 first two levels life force profiled second issue nintendo power issued 1988 several issues later entire game re-profiled msx port significantly different original ports new port graphical introduction introduces human pilots ship well names stage levels notably longer arcade original player forced start pre-defined checkpoint upon death either pilot instead starting left level two player choose order next three stages addition player collect e capsules destroying certain enemies collecting fifteen permanently upgrade one available weapons power-up bar weapons allow player ships merge one player controlling movements second player controlling weapons instead vic viper lord british space destroyer ships known sabel tiger thrasher piloted human characters named iggy rock zowie scott story takes place year 6709 a.d 2 different endings msx version re-released wii virtual console japan january 12 2010 later released wii u virtual console july 20 2016 also made available project egg windows store may 19 2015 version pc engine released december 6 1991 based arcade version salamander changes port include starting pre-defined checkpoint upon death 1 player mode faster enemy animations improved music japan pc engine version re-released wii virtual console september 11 2007 playstation network july 21 2010 wii u virtual console october 22 2014 also project egg con windows store march 3 2014 released north america november 16 2017 wii u virtual console compilation titled salamander deluxe pack plus released japan sega saturn june 19 1997 playstation july 6 year compilation includes salamander japanese version life force well salamander 2 salamander released mobile phones 2003 three arcade versions salamander american japanese adaptations life force ported arcade archives november 27 2015 japan exclusively playstation 4 later released worldwide spring 2016 published hamster corporation another compilation salamander series titled salamander portable released playstation portable january 24 2007 japan psp compilation features three games previously included salamander deluxe pack plus well xexex msx version gradius 2 a.k.a nemesis ii unrelated arcade game december 20 2010 application called pc engine game box published app store served portal download classic pc engine video games among downloadable titles pc engine version salamander fee arcade version included konami arcade classics anniversary collection released april 2019 digital-only format playstation 4 xbox one nintendo switch pc initially compilation japan salamander version game everywhere else featured american life force instead june 2019 konami added free japanese versions respective games western arcade classics anniversary collection salamander version played addition japanese life force part compilation conversely american version life force added collection japan update 1988 ova mini-series studio pierrot directed hisayuki toriumi three episodes released vhs laserdisc february 25 1988 february 21 1989 series licensed british company western connection series canon however msx gradius series states events gofer take place two-hundred year period following crisis zelos salamander armada mini-series revealed bacterians capture sentient life create leaders space armada capture sentient life via dark fog going space changes inorganic matter organic matter large brain-like final bosses games crystal-like life-form origin noriko hidaka provided voice protagonist stephanie anime lord british space destroyer named one protagonists ike lord british planet latis thus making lord british space destroyer | [
2498,
9063,
8937,
9005,
9006,
10931,
4405,
11477
] | Validation |
9,248 | 1 | Blockchain:blockchain blockchain originally block chain growing list records called blocks linked using cryptography block contains cryptographic hash previous block timestamp transaction data generally represented merkle tree design blockchain resistant modification data open distributed ledger record transactions two parties efficiently verifiable permanent way use distributed ledger blockchain typically managed peer-to-peer network collectively adhering protocol inter-node communication validating new blocks recorded data given block altered retroactively without alteration subsequent blocks requires consensus network majority although blockchain records unalterable blockchains may considered secure design exemplify distributed computing system high byzantine fault tolerance decentralized consensus therefore claimed blockchain blockchain invented person group people using name satoshi nakamoto 2008 serve public transaction ledger cryptocurrency bitcoin identity satoshi nakamoto unknown invention blockchain bitcoin made first digital currency solve double-spending problem without need trusted authority central server bitcoin design inspired applications blockchains readable public widely used cryptocurrencies blockchain considered type payment rail private blockchains proposed business use sources computerworld called marketing blockchains without proper security model snake oil first work cryptographically secured chain blocks described 1991 stuart haber w. scott stornetta wanted implement system document timestamps could tampered 1992 bayer haber stornetta incorporated merkle trees design improved efficiency allowing several document certificates collected one block first blockchain conceptualized person group people known satoshi nakamoto 2008 nakamoto improved design important way using hashcash-like method add blocks chain without requiring signed trusted party design implemented following year nakamoto core component cryptocurrency bitcoin serves public ledger transactions network august 2014 bitcoin blockchain file size containing records transactions occurred network reached 20 gb gigabytes january 2015 size grown almost 30 gb january 2016 january 2017 bitcoin blockchain grew 50 gb 100 gb size words block chain used separately satoshi nakamoto original paper eventually popularized single word blockchain 2016 smart contracts run blockchain example ones creat e invoices pay shipment arrives share certificates automatically send owners dividends profits reach certain level require off-chain oracle access external data events based time market conditions need interact blockchain according accenture application diffusion innovations theory suggests blockchains attained 13.5 adoption rate within financial services 2016 therefore reaching early adopters phase industry trade groups joined create global blockchain forum 2016 initiative chamber digital commerce may 2018 gartner found 1 cios indicated kind blockchain adoption within organisations 8 cios short-term 'planning looking active experimentation blockchain blockchain decentralized distributed public digital ledger used record transactions across many computers involved record altered retroactively without alteration subsequent blocks allows participants verify audit transactions independently relatively inexpensively blockchain database managed autonomously using peer-to-peer network distributed timestamping server authenticated mass collaboration powered collective self-interests design facilitates robust workflow participants uncertainty regarding data security marginal use blockchain removes characteristic infinite reproducibility digital asset confirms unit value transferred solving long-standing problem double spending blockchain described value-exchange protocol blockchain maintain title rights properly set detail exchange agreement provides record compels offer acceptance blocks hold batches valid transactions hashed encoded merkle tree block includes cryptographic hash prior block blockchain linking two linked blocks form chain iterative process confirms integrity previous block way back original genesis block sometimes separate blocks produced concurrently creating temporary fork addition secure hash-based history blockchain specified algorithm scoring different versions history one higher score selected others blocks selected inclusion chain called orphan blocks peers supporting database different versions history time time keep highest-scoring version database known whenever peer receives higher-scoring version usually old version single new block added extend overwrite database retransmit improvement peers never absolute guarantee particular entry remain best version history forever blockchains typically built add score new blocks onto old blocks given incentives extend new blocks rather overwrite old blocks therefore probability entry becoming superseded decreases exponentially blocks built top eventually becoming low example bitcoin uses proof-of-work system chain cumulative proof-of-work considered valid one network number methods used demonstrate sufficient level computation within blockchain computation carried redundantly rather traditional segregated parallel manner block time average time takes network generate one extra block blockchain blockchains create new block frequently every five seconds time block completion included data becomes verifiable cryptocurrency practically transaction takes place shorter block time means faster transactions block time ethereum set 14 15 seconds bitcoin 10 minutes storing data across peer-to-peer network blockchain eliminates number risks come data held centrally decentralized blockchain may use ad-hoc message passing distributed networking peer-to-peer blockchain networks lack centralized points vulnerability computer crackers exploit likewise central point failure blockchain security methods include use public-key cryptography public key long random-looking string numbers address blockchain value tokens sent across network recorded belonging address private key like password gives owner access digital assets means otherwise interact various capabilities blockchains support data stored blockchain generally considered incorruptible every node decentralized system copy blockchain data quality maintained massive database replication computational trust centralized official copy exists user trusted transactions broadcast network using software messages delivered best-effort basis mining nodes validate transactions add block building broadcast completed block nodes blockchains use various time-stamping schemes proof-of-work serialize changes alternative consensus methods include proof-of-stake growth decentralized blockchain accompanied risk centralization computer resources required process larger amounts data become expensive open blockchains user-friendly traditional ownership records open public still require physical access view early blockchains permissionless controversy arisen blockchain definition issue ongoing debate whether private system verifiers tasked authorized permissioned central authority considered blockchain proponents permissioned private chains argue term blockchain may applied data structure batches data time-stamped blocks blockchains serve distributed version multiversion concurrency control mvcc databases mvcc prevents two transactions concurrently modifying single object database blockchains prevent two transactions spending single output blockchain opponents say permissioned systems resemble traditional corporate databases supporting decentralized data verification systems hardened operator tampering revision nikolai hampton computerworld said many in-house blockchain solutions nothing cumbersome databases without clear security model proprietary blockchains eyed suspicion great advantage open permissionless public blockchain network guarding bad actors required access control needed means applications added network without approval trust others using blockchain transport layer bitcoin cryptocurrencies currently secure blockchain requiring new entries include proof work prolong blockchain bitcoin uses hashcash puzzles hashcash designed 1997 adam back original idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail financial companies prioritised decentralized blockchains 2016 venture capital investment blockchain-related projects weakening usa increasing china bitcoin many cryptocurrencies use open public blockchains bitcoin highest market capitalization permissioned blockchains use access control layer govern access network contrast public blockchain networks validators private blockchain networks vetted network owner rely anonymous nodes validate transactions benefit network effect permissioned blockchains also go name 'consortium blockchains nikolai hampton pointed computerworld also need '51 percent attack private blockchain private blockchain likely already controls 100 percent block creation resources could attack damage blockchain creation tools private corporate server could effectively control 100 percent network alter transactions however wished set particularly profound adverse implications financial crisis debt crisis like financial crisis 2007–08 politically powerful actors may make decisions favor groups expense others bitcoin blockchain protected massive group mining effort unlikely private blockchain try protect records using gigawatts computing power — time consuming expensive also said within private blockchain also 'race incentive use power discover blocks faster competitors means many in-house blockchain solutions nothing cumbersome databases analysis public blockchains become increasingly important popularity bitcoin ethereum litecoin cryptocurrencies blockchain public provides anyone wants access observe analyse chain data given one know-how process understanding accessing flow crypto issue many cryptocurrencies crypto-exchanges banks reason accusations blockchain enabled cryptocurrencies enabling illicit dark market trade drugs weapons money laundering etc common belief cryptocurrency private untraceable thus leading many actors use illegal purposes changing specialised tech-companies provide blockchain tracking services making crypto exchanges law-enforcement banks aware happening crypto funds fiat crypto exchanges development argue led criminals prioritise use new cryptos monero question public accessibility blockchain data personal privacy data key debate cryptocurrency ultimately blockchain blockchain technology integrated multiple areas primary use blockchains today distributed ledger cryptocurrencies notably bitcoin operational products maturing proof concept late 2016 businesses thus far reluctant place blockchain core business structure cryptocurrencies use blockchain technology record transactions example bitcoin network ethereum network based blockchain 8 may 2018 facebook confirmed opening new blockchain group headed david marcus previously charge messenger according verge facebook planning launch cryptocurrency facilitating payments platform blockchain-based smart contracts proposed contracts could partially fully executed enforced without human interaction one main objectives smart contract automated escrow imf staff discussion reported smart contracts based blockchain technology might reduce moral hazards optimize use contracts general viable smart contract systems yet emerged due lack widespread use legal status unclear major portions financial industry implementing distributed ledgers use banking according september 2016 ibm study occurring faster expected banks interested technology potential speed back office settlement systems banks ubs opening new research labs dedicated blockchain technology order explore blockchain used financial services increase efficiency reduce costs berenberg german bank believes blockchain overhyped technology large number proofs concept still major challenges success stories blockchain game cryptokitties launched november 2017 game made headlines december 2017 cryptokitty character in-game virtual pet sold us 100,000 cryptokitties illustrated scalability problems games ethereum created significant congestion ethereum network 30 ethereum transactions game cryptokitties also demonstrated blockchains used catalog game assets digital assets specific token standards created support use blockchain gaming include erc-721 standard cryptokitties non-fungible tokens recent erc-1155 standard creation fungible e.g in-game currency non-fungible tokens e.g set rare armour blockchain use blockchain creation game assets provide advantages gamers include true ownership assets tied individual blockchain address rather accessed centralized game server transparency blockchain explorers used confirm total supply various game assets interoperability read decentralized public ledger blockchain assets open developers integrate game via blockchain choose number efforts industry organizations working employ blockchains supply chain logistics supply chain management blockchain transport alliance bita works develop open standards supply chains everledger one inaugural clients ibm blockchain-based tracking service walmart ibm running trial use blockchain-backed system supply chain monitoring — nodes blockchain administered walmart located ibm cloud hyperledger grid develops open components blockchain supply chain solutions blockchain technology used create permanent public transparent ledger system compiling data sales tracking digital use payments content creators wireless users musicians 2017 ibm partnered ascap prs music adopt blockchain technology music distribution imogen heap mycelia service also proposed blockchain-based alternative gives artists control songs associated data circulate among fans musicians new distribution methods available insurance industry peer-to-peer insurance parametric insurance microinsurance following adoption blockchain sharing economy iot also set benefit blockchains involve many collaborating peers online voting another application blockchain designs include currently least four types blockchain networks — public blockchains private blockchains consortium blockchains hybrid blockchains public blockchain absolutely access restrictions anyone internet connection send transactions well become validator i.e. participate execution consensus protocol usually networks offer economic incentives secure utilize type proof stake proof work algorithm largest known public blockchains bitcoin blockchain ethereum blockchain private blockchain permissioned one join unless invited network administrators participant validator access restricted hybrid blockchain simply explained combination different characteristics public private blockchains design allows users blockchain apis determine information stays private information made public decentralization relation primarily centralized private blockchains achieved various ways example instead keeping transactions inside network community run private nodes hash without payload posted completely decentralized blockchains bitcoin done automatically triggered thus providing historical transaction using signed hash allows users operate different blockchains selectively share data business logic blockchains like wanchain use interoperability mechanisms bridges submitting hash transaction without sensitive business logic public blockchains like bitcoin ethereum privacy blockchain concerns resolved personal identifiable information stored public blockchain depending hybrid blockchain architecture multicloud solutions allow store data compliance general data protection regulation geographical limitations also leveraging bitcoin global hashpower decentralize transactions october 2014 mit bitcoin club funding mit alumni provided undergraduate students massachusetts institute technology access 100 bitcoin adoption rates studied catalini tucker 2016 revealed people typically adopt technologies early given delayed access tend reject technology bank international settlements criticized public proof-of-work blockchains high energy consumption nicholas weaver international computer science institute university california berkeley examines blockchain online security energy efficiency proof-of-work public blockchains cases finds grossly inadequate september 2015 first peer-reviewed academic journal dedicated cryptocurrency blockchain technology research ledger announced inaugural issue published december 2016 journal covers aspects mathematics computer science engineering law economics philosophy relate cryptocurrencies bitcoin journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers non-repudiation purposes | [
8706,
8201,
2068,
1049,
5658,
10286,
53,
1087,
9286,
6728,
10326,
5210,
4194,
9828,
1638,
2669,
119,
1146,
2689,
3713,
9859,
10389,
4263,
1709,
9901,
2737,
9397,
4280,
10938,
4797,
5830,
8916,
10452,
4827,
2780,
10471,
6383,
7409,
3323,
7... | Test |
9,249 | 6 | Professional_File_System:professional file system professional file system filesystem originally developed commercially amiga distributed aminet 4-clause bsd license compatible successor amifilesafe afs emphasis added reliability speed compared standard amiga filesystems also features multi-user abilities like older mufs device split two main areas beginning device metadata section consists root block generic array blocks allocated store metadata rest device another contiguous generic array blocks allocated store data metadata section usually uses percent device depending size device metadata stored tree single blocks metadata section entire directory structure recorded metadata data section purely contains data files metadata describes location data files extents blocks makes metadata quite compact metadata update occurs system looks block containing metadata changed copies newly allocated block metadata section change made recursively changes metadata block points block way way eventually root block needs changed causes atomic metadata update filesystem reasonably good keeping files unfragmented although defragmentation tool available work online filesystem first filesystem introduce concept recycle bin natively filesystem-level amiga holding last deleted files hidden directory disk root pfs version 5.3 developed c small portion assembly code michiel pelt | [
5120,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
5709,
6233,
5729,
4708,
5736,
11370,
9836,
7789,
5743,
9333,
6263,
9335,
9848,
9343,
8832,
7818,
139,
654,
5264,
2193,
2194,
2197,
2199,
11419,
3233,
6309,
1190,
52... | Test |
9,250 | 4 | National_Cyber_Range:national cyber range national cyber range project overseen darpa build scale model internet used carry cyber war games project serves test range military create antivirus technologies guard cyberterrorism attacks hackers several organisations involved development network including johns hopkins university baltimore lockheed martin 500m allocated department defense develop cyber technologies | [] | None |
9,251 | 5 | Reliable_User_Datagram_Protocol:reliable user datagram protocol computer networking reliable user datagram protocol rudp transport layer protocol designed bell labs plan 9 operating system aims provide solution udp primitive guaranteed-order packet delivery desirable tcp adds much complexity/overhead order rudp gain higher quality service rudp implements features similar tcp less overhead order ensure quality extends udp means adding following features rudp currently formal standard however described ietf internet-draft 1999 proposed standardization cisco signalling link terminals either standalone integrated another gateway uses rudp backhauling ss7 mtp3 isdn signaling versions mutually incompatible differ slightly ietf draft structure cisco session manager used top rudp also different microsoft introduced another protocol named r-udp used mediaroom product owned ericsson iptv service delivery multicast networks proprietary protocol little known operation thought based referenced ietf draft | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5785,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
7983,
562,
2996,
9909,
4918,
10171,
4797,
3133,
3006,
5181,
5437,
7364,
11461,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
... | Test |
9,252 | 7 | MuleSoft:mulesoft mulesoft llc software company headquartered san francisco california provides integration software connecting applications data devices started 2006 company anypoint platform integration products designed integrate software service saas on-premises software legacy systems company originally provided middleware messaging later expanded provide integration platform service ipaas approach companies main product anypoint platform mulesoft anypoint platform includes various components anypoint design center allows api developers design build apis anypoint exchange library api providers share apis templates assets anypoint management center centralized web interface analyze manage monitor apis integrations mulesoft also offers mule runtime engine runtime solution connecting enterprise applications on-premises cloud designed eliminate need custom point-to-point integration code may 2 2018 salesforce acquired mulesoft 6.5 billion cash stock deal ross mason dave rosenberg founded mulesource 2006 company changed name mulesoft 2009 april 2013 startup announced 37 million series e financing round led new enterprise associates participation new strategic investor salesforce.com existing investors hummer winblad venture partners morgenthaler ventures lightspeed venture partners sapphire ventures formerly sap ventures bay partners round brought mulesoft total financing course seven funding rounds 259 million april 2013 mulesoft acquired programmableweb website used developers help build web mobile connected applications apis 2016 mulesoft ranked 20 forbes cloud 100 list february 2017 company filed ipo began trading new york stock exchange march 17 2017 stock rose 45 first day trading march 2018 salesforce.com announced buying mulesoft deal reported worth us 6.5b may 2018 salesforce completed acquisition mulesoft mule name comes drudgery donkey work data integration platform created escape august 2019 mulesoft 1,400 employees 1,600 customers | [
10090,
9104,
530,
467,
1363,
8122,
10236
] | Test |
9,253 | 3 | MX_Linux:mx linux mx linux midweight linux operating system based debian stable using core antix components additional software created packaged mx community developed cooperative venture antix former mepis communities aiming use best tools talents distributions community stated goal combine elegant efficient desktop simple configuration high stability solid performance medium-sized footprint mx linux uses xfce desktop environment kde plasma environments added available spin-off iso images mx linux began discussion future options among members mepis community december 2013 developers antix joined bringing iso build system well live-usb/dvd technology order listed distrowatch mx linux initially presented version antix received distrowatch page separate distribution release first public beta mx-16 november 2 2016 mx-14 series based debian stable wheezy used first xfce 4.10 14.4 release xfce 4.12 mx-14 versions intended fit onto cd constraint limited applications could included series saw gradual evolution mx tools collection handy utilities designed help user variety common tasks often complicated obscure mx-15 moved new debian stable jessie using systemd-shim meaning systemd installed default init sysvinit size limitation lifted enabling developers present user full turnkey product substantial expansion mx tools occurred mx-16 still based debian stable jessie many applications backported added well sources also additions refinements mx tools import advanced antix developments expanded support completely new icon/theme/wallpaper combination mx-16.1 collected bug fixes improvements since mx-16 added new kingfisher theme upgraded streamlined mx tools revised documentation new translations mx-17 changes base debian 9 stretch brings upgraded artwork new mx tools improved live operation via antix many changes detailed mx blog mx-18 continues development mx tools introduces recent kernel enables whole disk encryption adds grub themes splash functionality mx boot options new artwork improved localization included details mx blog mx linux basic tools like installer handles uefi computers gui-based method change linux kernel core antix programs mx stands distros shipping suite user-oriented tools called mx tools many tools developed specifically mx forked existing antix apps existing antix apps couple imported permission outside sources example one interesting mx-snapshot gui tool remaster live installation single .iso file quickly conveniently cloned image bootable disk usb-thumbdrive maintaining settings way installation conveniently migrated distributed new hard-disk usb-thumbdrive requiring next administrative effort since advanced method copying file system developed antix-linux utilizing bind-mounts performs heavy lifting snapshot also serves essentially complete convenient backup installation | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
8857,
10394,
6301,
10397... | None |
9,254 | 3 | Bubbler_(video_game):bubbler video game bubbler zx spectrum video game developed published ultimate play game 1987 ultimate final title 8-bit home computers evolving rare game isometric platform game style marble madness 1984 crash magazine reviewer ricky disliked impreciseness controls | [
320,
4102,
9191,
2792,
9006,
10931,
4278,
5820,
2173
] | Test |
9,255 | 3 | HSA_Foundation:hsa foundation hsa foundation not-for-profit engineering organization industry academia works development heterogeneous system architecture hsa set royalty-free computer hardware specifications well open source software development tools needed use hsa features application software hsa foundation aims develop define features interfaces various types computer processors including cpus graphics processors dsps well memory systems connect resulting architecture hsa aims make easier program parallel systems built heterogeneous combinations devices hsa foundation founded amd arm holdings imagination technologies mediatek qualcomm samsung texas instruments members include licensors licensees semiconductor intellectual property developers cpus gpus dsps application-specific integrated circuits asics based upon and/or licensed technology academic partners lawrence livermore national laboratory university bologna not-for-profit engineering organization linaro hsa foundation joined linux foundation hsa foundation engineering works upstream projects set requirements determined technical steering committee | [
3586,
10658,
9863,
4011,
8237,
1776,
6705,
2135,
7645,
415
] | Test |
9,256 | 4 | Honeypot_(computing):honeypot computing computer terminology honeypot computer security mechanism set detect deflect manner counteract attempts unauthorized use information systems generally honeypot consists data example network site appears legitimate part site actually isolated monitored seems contain information resource value attackers blocked similar police sting operations colloquially known baiting suspect honeypots classified based deployment use/action based level involvement based deployment honeypots may classified production honeypots easy use capture limited information used primarily corporations production honeypots placed inside production network production servers organization improve overall state security normally production honeypots low-interaction honeypots easier deploy give less information attacks attackers research honeypots research honeypots run gather information motives tactics black hat community targeting different networks honeypots add direct value specific organization instead used research threats organizations face learn better protect threats research honeypots complex deploy maintain capture extensive information used primarily research military government organizations based design criteria honeypots classified pure honeypots full-fledged production systems activities attacker monitored using bug tap installed honeypot link network software needs installed even though pure honeypot useful stealthiness defense mechanisms ensured controlled mechanism high-interaction honeypots imitate activities production systems host variety services therefore attacker may allowed lot services waste time employing virtual machines multiple honeypots hosted single physical machine therefore even honeypot compromised restored quickly general high-interaction honeypots provide security difficult detect expensive maintain virtual machines available one physical computer must maintained honeypot exorbitantly expensive example honeynet low-interaction honeypots simulate services frequently requested attackers since consume relatively resources multiple virtual machines easily hosted one physical system virtual systems short response time less code required reducing complexity virtual system security example honeyd recently new market segment called deception technology emerged using basic honeypot technology addition advanced automation scale deception technology addresses automated deployment honeypot resources large commercial enterprise government institution malware honeypots used detect malware exploiting known replication attack vectors malware replication vectors usb flash drives easily verified evidence modifications either manual means utilizing special-purpose honeypots emulate drives malware increasingly used search steal cryptocurrencies spammers abuse vulnerable resources open mail relays open proxies servers accept e-mail anyone internet—including spammers—and send destination system administrators created honeypot programs masquerade abusable resources discover spammer activity several capabilities honeypots provide administrators existence fake abusable systems makes abuse difficult risky honeypots powerful countermeasure abuse rely high volume abuse e.g. spammers honeypots reveal abuser ip address provide bulk spam capture enables operators determine spammers urls response mechanisms described m. edwards itpro today apparent source may another abused system spammers abusers may use chain abused systems make detection original starting point abuse traffic difficult indicative power honeypots anti-spam tools early days anti-spam honeypots spammers little concern hiding location felt safe testing vulnerabilities sending spam directly systems honeypots made abuse riskier difficult spam still flows open relays volume much smaller 2001-02 spam originates u.s. spammers hop open relays across political boundaries mask origin honeypot operators may use intercepted relay tests recognize thwart attempts relay spam honeypots thwart may mean accept relay spam decline deliver honeypot operators may discover details concerning spam spammer examining captured spam messages open relay honeypots include jackpot written java jack cleaver smtpot.py written python karl a. krueger spamhole honeypot |spamhole written c. bubblegum proxypot open source honeypot proxypot email address used purpose receive spam also considered spam honeypot compared term spamtrap term honeypot might suitable systems techniques used detect counterattack probes spamtrap spam arrives destination legitimately —exactly non-spam email would arrive amalgam techniques project honey pot distributed open source project uses honeypot pages installed websites around world honeypot pages disseminate uniquely tagged spamtrap email addresses spammers tracked—the corresponding spam mail subsequently sent spamtrap e-mail addresses databases often get attacked intruders using sql injection activities recognized basic firewalls companies often use database firewalls protection available sql database firewalls provide/support honeypot architectures intruder runs trap database web application remains functional honeypots weapons spammers honeypot detection systems spammer-employed counter-weapons detection systems would likely use unique characteristics specific honeypots identify many honeypots in-use utilise set unique characteristics larger daunting seeking detect thereby identify unusual circumstance software situation versionitis large number versions software differing slightly beneficial also advantage easy-to-detect honeypots deployed fred cohen inventor deception toolkit argues every system running honeypot deception port adversaries use detect honeypot cohen believes might deter adversaries two honeypots network form honey net typically honey net used monitoring larger and/or diverse network one honeypot may sufficient honey nets honeypots usually implemented parts larger network intrusion detection systems honey farm centralized collection honeypots analysis tools concept honey net first began 1999 lance spitzner founder honeynet project published paper build honeypot metaphor bear attracted stealing honey common many traditions including germanic celtic slavic common slavic word bear medved honey eater tradition bears stealing honey passed stories folklore especially well known winnie pooh brazilian folk tale boneca de pixe tells stealing monkey trapped puppet made pitch earliest honeypot techniques described clifford stoll 1989 book cuckoo egg 2017 dutch police used honeypot techniques track users darknet market hansa | [
3072,
10756,
10245,
1544,
9227,
9233,
9242,
8224,
9761,
9771,
5677,
7222,
10297,
3643,
7739,
9791,
1088,
4165,
9824,
6762,
107,
7798,
5245,
4734,
6786,
5764,
9356,
4245,
10392,
1690,
5281,
2213,
8387,
11461,
3786,
4314,
9950,
11502,
4344,
... | None |
9,257 | 2 | Samizdat:_And_Other_Issues_Regarding_the_'Source'_of_Open_Source_Code:samizdat issues regarding 'source open source code samizdat issues regarding 'source open source code 2004 report kenneth brown report suggests linux kernel may created distributed illegally open-source software may generally subject abuses report states linux kernel written using copied source code minix resources acquired improperly possibly illegally linus torvalds also suggests one never certain origins open source code similar misuse copyrighted code may exist open-source projects finally asserts gnu general public license bad economy book greeted widespread rejection technical world repudiated many claimed sources prerelease long delisted distributor site book never given proper release although prerelease pdf available online title reference samizdat form private circulation suppressed literature within soviet-bloc countries extension slang papers contain programming techniques code sometimes sources authorized publication often passed programmer programmer samizdat claims linus torvalds used source code taken minix small unix-like operating system used teaching computer science create linux 0.01 theory mere student could write entire unix-like kernel single-handedly book also recommends government-funded programming never licensed gpl bsd license similar simple permissive licenses states us government book claims methodology references seriously questioned including many quotes support thesis andrew s. tanenbaum author minix dennis ritchie one creators unix richard stallman leader gnu project others said quotes attributed interview adti fact prerelease journal papers ilkka tuomi messageboard posts charles mills henry jones alexey toptygin said commissioned brown find similarities minix linux 0.01 source code found support theory minix source code used create linux study mentioned book toptygin quoted saying asked friend ... wanted code analysis consultancy basis boss kenneth brown ended 10 hours work comparing early versions linux minix looking copied code summarize analysis found evidence whatsoever code copied called ask questions analysis methods results ask would like repeated source comparison tools bit shock apparently ken expecting find gobs copied source code spent conversation trying convince must made mistake since clearly impossible one person write os 'code theft occurred although linux 0.01 written using minix example starting point — minix created tanenbaum example study — code minix actually used tanenbaum agrees point stated much interview ken brown latter researching samizdat furthermore linux 0.01 barely functional first draft far sophisticated industry-grade linux-based operating systems would later grow samizdat detractors also point fact adti funded directly since 1999 microsoft company publishes competing proprietary operating system microsoft windows considers linux one important competitors see halloween documents documents ii month widespread rejection book technical press microsoft also repudiated mid-june spokesman calling “ unhelpful distraction matters most—providing best technology customers. ” notably absent brown research samizdat direct communication torvalds | [
7938,
7812,
8326,
4360,
4493,
6797,
2195,
11155,
1813,
5397,
10780,
1694,
3618,
4011,
9646,
7983,
823,
9660,
10817,
5067,
6352,
8147,
1761,
4841,
5492
] | None |
9,258 | 2 | HP_Universal_Print_Driver:hp universal print driver hp universal print driver upd intelligent print driver supports broad range hp laserjet printers mfps developed hewlett-packard combines general purpose driver unidrv pscript hp proprietary extensions hp upd simplifies driver deployment management advanced print driver ability discover hp printing devices automatically configure device capabilities e.g. duplex color finishing etc. hp universal print driver microsoft windows solution provides two modes operation traditional dynamic traditional mode hp upd behaves similarly traditional print drivers dynamic mode provides discovery auto configuration management features particularly well suited mobile computer users hp ’ universal print driver based microsoft ’ universal core drivers unidrv pscript core drivers usable device specific information used inform core driver actual device settings capabilities accomplish task universal printing dialog box inserted standard print setup dialog box universal printing dialog box allows users choose recently used device enter device ip address search local print devices choose device predefined list regardless device discovery method used microsoft core driver updated accordingly new device information reflected normal print driver user interface hp provides three different universal print drivers pcl5 pcl6 emulation postscript custom default values assigned hp driver configuration utility hp upd available microsoft windows 32-bit 64-bit driver automatically configures one 35 currently supported languages based upon language host system dynamic mode searching devices accomplished using mdns discovery protocol aka bonjour mdns protocol performs satisfactorily devices residing subnet users need enter ip addresses remote devices unless previously discovered available managed printers list whether discovered entered chosen hp universal printing dialog box submits snmp requests target device ’ ip address using enterprise auto configuration eac bidirectional communications port snmp requests ascertain device ’ configurations capabilities results used hp upd update print driver table windows registry accurately reflect target device ’ capabilities results also cached creg recently discovered device list updated provide easy method future selection dynamic mode hp upd considered virtual device therefore new device instances appear printers folder traditional mode hp upd bound print queue behaves like normal printer driver addition bi-directional communications device queries real time print job status mode chosen driver installation dynamic mode universal printing dialog box traditional mode bypasses universal printing dialog box goes directly typical print setup dialog box automatic configuration occur traditional mode users select manual updates ensure device ’ capabilities properly represented hp upd installed either dynamic mode traditional mode depending user requirements hp upd includes driver management features allowing administrators pre-configure deploy manage hp driver software management tools within hp upd include install.exe command line options hp mpa tool active directory templates driver configuration utility driver deployment utility hp web jetadmin install.exe hp upd installer allows driver default settings modified via command line options switches change system-wide behavior hp upd changes specific single print queue hp mpa utility hp mpa utility pre-configures driver default settings managed hp upd environment settings made within hp mpa utility control hp upd user level resulting policies maintained every printer attached hp upd global user policies affect hp upd users hp upd active directory templates hp upd administrative template active directory template added create group policy object manage user upd capabilities settings apply queue uses hp upd care taken locking configuration settings user unable change locked setting hp driver configuration utility hp driver configuration utility dcu windows application used edit configuration file associated particular driver configuration file controls print driver settings takes effect driver installed hp driver deployment utility ddu used pre-configure print driver deployment package run client computer new configuration file configures printer driver installed interfere whql certification ddu contains standalone dcu utility inside package launched pre-configure driver selected ddu tool beyond driver configuration hp upd also employs managed printer lists mpls managed print policies mpp control access devices capabilities technologies used hp upd dynamic mode mpls used searching devices unnecessary users presented predefined list devices choose mpls xml files created manually hp mpa utility exported hp web jetadmin hp upd activated begins searching network mpl file shown figure 6 mpps used control users access device features like color duplex etc default hp upd assumes hp mpa installed server named managed-print result hp upd searches network server find hp managed print policies hp managed printer lists driver also includes status notification pop-ups print submission inform user device status print job status consumable levels graphical popup window displays dashboard toner supply levels links reordering consumables instant support landing page particular hp device model hp upd selected printing attempt communicate directly printer gather status job information printing querying printer snmp get commands network traffic kept minimum present printing desired snps disabled | [
3974,
5384,
4457,
6797,
8628,
479
] | Test |
9,259 | 4 | NetScout_Systems:netscout systems netscout systems inc. provider application network performance management products headquartered westford massachusetts netscout serves enterprises community government agencies telecommunications service providers july 2015 netscout acquired communications business danaher corporation including arbor networks fluke networks tektronix communications vss monitoring netscout subsidiaries cayman islands tax netscout systems acquired network general 2007 network general developed original network packet sniffer 1986 merged mcafee associates 1997 form network associates mid-2004 network associates sold sniffer technologies business silver lake partners texas pacific group 275 million cash form network general early 2006 network general acquired fidelia technology adding netvigil business service monitoring technology network application performance analysis tools september 2007 network general agreed acquired netscout systems 205 million netscout systems founded anil singhal narendra popat frontier software 1984 netscout created first rmon based ethernet probe 1992 november 2007 netscout acquired sniffer infinistream network intelligence product lines network general netscout merged product lines allow performance manager product use probes infinistream technologies april 2011 netscout acquired voice video management company psytechnics ipswich u.k acquired fox replay privately held dutch company 2011 later year many years partnering complementing solutions network switch port aggregation netscout moved directly competition partners acquiring privately held simena networks october 2014 netscout systems announced entered definitive agreement acquire communications business science technology company danaher corporation 2.6 billion upon completion merger danaher shareholders would nearly 59.5 percent combined company netscout shareholders would remaining stake analyst firm 451 research technology-industry syndicated research data firm predicted may 2015 acquisition netscout largest company network visibility management space 3,000 employees well 1bn year revenue july 2015 netscout finalized acquisition communications business danaher corporation including arbor networks security systems fluke networks rf wi-fi network troubleshooting analytics tektronix communications traffic inspection customer experience management analytics vss monitoring network packet brokers prepared statement company noted acquisition accelerates netscout ’ strategic progress enabling company offer ... innovative service assurance cyber security solutions adds new employees netscout | [
9440,
793,
679
] | Test |
9,260 | 4 | National_Privacy_Commission_(Philippines):national privacy commission philippines national privacy commission npc independent body created republic act 10173 data privacy act 2012 mandated administer implement provisions act monitor ensure compliance country international standards set data protection attached philippines department information communications technology dict purposes policy coordination remains independent performance functions commission safeguards fundamental human right every individual privacy particularly information privacy ensuring free flow information innovation growth national development order fulfill mandate commission vested broad range powers receiving complaints instituting investigations matters affecting personal data protection compelling entities abide orders matters affecting data privacy also represents philippine government internationally data protection related issues commission formulates implements policies relating protection personal data including relevant circulars advisory guidelines assist organisations understanding complying data privacy act commission also reviews organizational actions relation data protection rules issue decisions directions compliance necessary mandated work relevant sector regulators exercising functions beyond regulating data protection issues npc also undertakes public sector-specific educational outreach activities help organizations adopt good data protection practices help individuals better understand may protect personal data misuse data privacy act 2012 first law philippines acknowledges rights individuals personal data enforcing responsibilities entities process initial definition offered first republic act 8792 section 32 better known ecommerce act philippines formally introduced department trade industry dti department administrative order 08 defining guidelines protection personal data information private sector along anti-cybercrime bill ra 10175 first draft law started 2001 legal regulatory committee former information technology ecommerce council itecc forerunner commission information communication technology cict headed former secretary virgilio ver peña committee chaired atty claro parlade initiative information security privacy sub-committee chaired albert dela cruz president phcert together anti-computer crime fraud division chief atty elfren meneses nbi administrative operational functions provided presidential management staff pms acting cict secretariat rising concerns information technology business process association philippines ibpap absence data privacy law philippine congress passed senate bill 2965 house bill 4115 june 6 2012 president benigno s. aquino iii signed republic act 10173 data privacy act 2012 august 15 2012 law influenced data protection directive apec privacy framework president aquino appointed march 7 2016 raymund liboro inaugural head commission damian domingo o. mapa ivy d. patdu inaugural deputy privacy commissioners fixed terms office continued roles administration president rodrigo duterte consultation various private organizations civil societies series public hearings manila cebu davao implementing rules regulations data privacy act signed august 24 2016 took effect september 9 2016 may 2016 commission formally investigated commission elections commission elections data breach one largest security breach government held personal data february 21 2017 npc announced commission elections investigated another security breach due alleged theft computer containing personal data voters npc also began coordinating different sectors privacy data protection 2016 national privacy commission accepted member international conference data protection privacy commissioners asia pacific privacy authorities | [
2818,
3880,
1930,
9901,
3599,
1169,
3858,
10002,
6455,
1368
] | Test |
9,261 | 7 | Ultimate_Software:ultimate software ultimate software american technology company develops sells ultipro cloud-based human capital management hcm software system businesses headquartered weston florida company founded 1990 current president ceo scott scherr released first version software 1993 fourth quarter 2017 ultimate software reported total revenues 940.7 million 2017 company employs 4,200 people services 4,100 customers 160 countries ultimate offices around usa canada uk singapore february 4 2019 hellman friedman capital partners announced would purchase ultimate software group 11 billion purchase closed may 3 2019 ultimate software founded scott scherr company ’ current ceo president 1990 1993 tech company released ultipro hrms/ payroll sold on-premises software servicing core hr payroll company went public nasdaq ulti june 1998 2002 ultipro reintroduced cloud-based software-as-a-service saas provide unified management tool human resources model allowed company hold 33 million client records cloud service 3,400 customers according career builder company announced expanding outside united states opened office london england later year ultimate announced additional expansions singapore company ultipro cloud-based platform delivers human capital management organizations across industries ultipro provides one system record hr payroll talent management according trustradius ultipro includes time attendance employee onboarding performance management compensation management succession management recruiting features like predictive analytics ultipro sold via saas model per-employee-per-month subscription according center generational kinetics center partnered company 2014 conduct research multiple generations workforce research looked work expectations across different generations focus millennials study explored millennials differ prior generations way feel applying job interviewing receiving feedback leaving job 2016 center generational kinetics continued partnership examine drivers motivators behind people workforce study focused organizations understand improve employee experience 2017 fortune magazine ranked ultimate software 7 best place work well 1 best workplace technology prior years fortune ranked ultimate software 6th best workplace millennials 23rd great workplace women 21st best company work additionally forbes ranked company 7th innovative growth company analyst firm nucleus research deemed tech company leader hcm technology past ultimate earned 2011 forrester groundswell award achieving business organizational goals innovation social technology applications 2013 brandon hall gold award best new product feature year | [
467
] | Train |
9,262 | 2 | N-Gage_(service):n-gage service n-gage service also referred n-gage 2.0 mobile gaming platform nokia available several nokia smartphones running s60 symbian n-gage provided numerous games 3d graphics application featuring online via n-gage arena social features takes name original 2003 n-gage gaming device succeeded n-gage platform compatible nokia n78 n79 n81 n81 8gb n82 n85 n86 n86 8mp n95 n95 8gb n96 n97 nokia 5320 xpressmusic 5630 xpressmusic 5730 xpressmusic nokia 6210 navigator 6710 navigator 6720 classic e52 e55 e75 due memory issues hinted interview february 2008 support nokia n73 n93 n93i cancelled less two years 30 october 2009 nokia announced new n-gage games would produced reasons cited failure bad development model marketing success apple app store nokia n-gage gaming smartphone 2003 perform well expected upgraded qd version n't improve either instead developing new gaming device change concept nokia explained world e3 2005 planning put n-gage platform several smartphone devices rather releasing specific device although n81 5730 xpressmusic models two dedicated gaming-buttons next screen marketed phone built gaming often nicknamed n-gage next generation public working behind closed doors took little year e3 2006 finally announcing n-gage mobile gaming service set 2007 release also started showing next-gen titles hooked creatures deep fighting game one perhaps visually impressive—even making use motion capture february 2007 nokia announced pilot service finland promote upcoming service nokia showed previews service 2007 game developers conference san francisco california 27 august 2007 nokia confirmed previously leaked n-gage logo official logo upcoming service n-gage gaming service final form finally announced nokia 29 august 2007 nokia used tagline get play promote platform supposed released december 2007 delayed nokia team making sure service ran 'smoothly public beta test n-gage application took place 4 february 2008 27 march 2008 though limited n81 period time referred first access public test client could downloaded free n-gage website final version user access features new application offer along three games try hooked creatures deep space impact kappa base later february nokia also released tetris block breaker deluxe world series poker pro challenge users try none games entirely free offer limited trial testing purposes order experience full game either purchased rented shortly released public hackers managed unpack n-gage installation file components installed separately thus removing n81-only limitation n-gage subsequently reported working nokia nseries devices n73 n95 response nokia released advisory asking users install unsupported version could cause errors issues 20 march official n-gage blog reported first access would come end 27 march though downloaded games time would still playable application updated version released—which occurred 3 april numerous delays many vague release dates n-gage platform finally also quite suddenly released public 3 april 2008 n-gage official website though five phone models compatible begin probably older models less powerful pointed interview earlier year whereas n-gage representative mentioned memory issues n73 launch titles also changed six five brain challenge first two titles n't even included original list included block breaker deluxe tetris instead sixth postponed game space impact kappa base hours launch ikona man behind official n-gage blog say delay currently ensuring block breaker deluxe space impact kappa base tetris running smoothly new application available showroom next week two four days later 7 april nokia posted official press release commenting release new mobile service point fifa 08 also became available purchase release official website also saw small change appearance price tags added games available download event calendar tab support application n-gage compatible devices much players logged website could also see reputation level n-gage level gathered n-gage points also release party held n-gage chat room shortly release several members n-gage team attending answer questions asked t-shirts randomly handed three-hour-long event everyone also promised n-gage points coming party expected launch problem-free numerous people reported trouble downloading purchasing activating games installing application logging n-gage arena n-gage software based solution first generation mmc games compatible new platform though games made comeback form sequel e.g remake/port e.g mile high pinball similarly games developed next-gen n-gage platform work original n-gage n-gage qd adding fact newer s60 software including n-gage client games n't binary-compatible older s60 devices vice versa user interface resembles microsoft ’ xbox live service top n-gage launcher five icons navigated pressing left right phone ’ thumb pad represent user games library profile friends list showroom launcher welcomes user home screen last game played shown along quick links friends progress score table featured game nokia wants highlight week inbox messaging within launcher screen shows games currently installed phone—be trial version full game purchased rented ones trial versions pink stripe says trial far right game icon overlapping looks somewhat like battery meter pay game illustrates progress game bottom list installed games quick link get games takes showroom games paid show pop-up every time play it—asking whether ’ like try free trial either purchase enter unlock code purchased given promotions rent game screen user may also rate games downloaded 1 5 stars well write small verdict next tab profile shows many n-gage points ’ scored far playing reputation level ranging 1-5 stars number friends enlisted chosen avatar/picture represent display white silhouette person orange background per default current status offline online away—the last two assigned personal message n-gage point level list games played gaming history selecting one display many points ’ gathered within chosen game—but also show well friends game users also able look achievements unlocked—or point pickups ’ called go add friend friends list well check highlighted may choose view recent conversations player send message view profile rate player messages sent regardless whether player currently online friends list sorted name availability/status n-gage points gathered showroom displays games available download well game extras expanding game extra content downloading new episodes/adventures adventure game dirk dagger games may browsed genre latest arrivals alphabetical order payment made either using credit card paying phone bill network operator apart actually purchasing game ’ also option renting games downloaded directly phone air gprs wifi user may choose download computer install phone using usb-cable nokia pc suite lot hands-on articles first access client generally reflect positive negative feedback official first access forum n81 users shared thoughts good could 've made better—regarding launcher games currently available biggest issues point players able activate purchased game still trial version play lot players also reporting connection issues head new experience nokia play jaakko kaidesoja say pocket gamer interview 21 february 2008 asked early feedback received feedback positive well received within company critical comments well received well know perfect yet features people want things want check get roadmap several n-gage 2.0 games nominated international mobile gaming awards 2007 two three n-gage 2.0 titles received award 8 may 2008 hooked creatures deep games award 2008 meffy awards cannes prior closure n-gage service nokia released updates n-gage application regular basis first update made available 2 october 2008 dubbed v1.010_131 update included following major changes version 1.20 1459 released 13 may 2009 n't much eliminate bugs 18 august 2009 version 1.40 1557 introduced new start-up icon welcoming screen way breaking installed games speed application slightly improved well updating application may done app itself—by using check updates function device downloaded get n-gage section n-gage.com order n-gage platform games run smoothly n-gage compatible mobile devices share common set specifications screen landscape portrait 320 x 240 pixels except n97 640 x 360 pixels screen graphics stretched displayed letterbox format keep aspect ratio os symbian s60 3rd edition s60 5th edition n97 interface 5 way left right center directional pad dedicated action buttons circle square mapped onto keypad 5 0 portrait mode 2 contextual buttons touch screen interactions supported n97 emulated actions buttons on-screen buttons connectivity 3g wifi required connecting n-gage platform downloading games online functions rankings multiplayer cpu arm11 speed ranges 369 mhz n81 600 mhz e52 gpu 3d graphics hardware accelerator supported games running devices hw-accelerated n95 enhanced performance audio stereo channel n-gage games packaged differently normal symbian applications extension .n-gage run via n-gage application game resources protected drm use native symbian apis instead use proprietary api n-gage sdk n-gage api fact extension rga api available open c++ plug-in select companies allowed access n-gage sdk gain access first must approved nokia sign nda 23 october 2009 49 games released officially n-gage many games cancelled shutting n-gage service see games sequels remakes ports first generation n-gage mmc games games reportedly development cancelled include 30 october 2009 nokia announced new n-gage games would produced effectively shutting n-gage platform n-gage services includes purchasing games various online features reportedly ceased operation end 2010 31 march 2011 nokia closed drm activation service leaving customers unable reactivate purchases case device format software update transition purchases made ovi store compensation given according support staff software purchases supported one year gaming websites e.g pocket gamer link n-gage failure overwhelming competition faces apple iphone ovi gaming cited poor implementation support parent company nokia | [
10368,
8577,
10754,
6276,
9732,
11655,
4365,
529,
10770,
10900,
1687,
5274,
669,
5406,
10270,
9508,
3626,
7722,
10410,
5938,
1972,
7220,
5178,
1083,
7866,
1216,
7877,
199,
5067,
7246,
3152,
4305,
7253,
4951,
8413,
737,
4324,
231,
7399,
90... | Test |
9,263 | 2 | ADO.NET:ado.net ado.net data access technology microsoft .net framework provides communication relational non-relational systems common set components ado.net set computer software components programmers use access data data services database part base class library included microsoft .net framework commonly used programmers access modify data stored relational database systems though also access data non-relational data sources ado.net sometimes considered evolution activex data objects ado technology changed extensively considered entirely new product ado.net conceptually divided consumers data providers consumers applications need access data providers software components implement interface thereby provide data consumer functionality exists visual studio ide create specialized subclasses dataset classes particular database schema allowing convenient access field schema strongly typed properties helps catch programming errors compile-time enhances ide intellisense feature entity framework ef open source object-relational mapping orm framework ado.net part .net framework set technologies ado.net supports development data-oriented software applications architects developers data-oriented applications typically struggled need achieve two different objectives entity framework enables developers work data form domain-specific objects properties customers customer addresses without concern underlying database tables columns data stored entity framework developers work higher level abstraction deal data create maintain data-oriented applications less code traditional applications linq sql formerly called dlinq allows linq used query microsoft sql server databases including sql server compact databases since sql server data may reside remote server sql server query engine use query engine linq instead converts linq query sql query sent sql server processing however since sql server stores data relational data linq works data encapsulated objects two representations must mapped one another reason linq sql also defines mapping framework mapping done defining classes correspond tables database containing certain subset columns table data members | [
10243,
10769,
9234,
1043,
3096,
1055,
2083,
8227,
1577,
2603,
4143,
11316,
1077,
6709,
8246,
6219,
4174,
4178,
83,
9813,
603,
608,
2145,
10340,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
4231,
5259,
653,
6797,
9360,
9362,
10900,
109... | None |
9,264 | 9 | Jean_Ichbiah:jean ichbiah jean david ichbiah 25 march 1940 – 26 january 2007 french computer scientist initial chief designer 1977–1983 ada general-purpose strongly typed programming language certified validated compilers ichbiah descendant greek turkish jews thessaloniki emigrated france 1972 1974 worked designing experimental system implementation language called lis based pascal simula chairman simula user group also one founding members ifip wg 2.4 systems implementation languages joined cii honeywell bull cii-hb louveciennes france becoming member programming research division ichbiah team submitted language design labelled green competition choose united states department defense embedded programming language green selected 1978 continued chief designer language named ada 1980 ichbiah left cii-hb founded alsys corporation la celle-saint-cloud continued language definition standardize ada 83 later went ada compiler business also supplying special validated compiler systems nasa us army others later moved waltham massachusetts subsidiary alsys 1990s ichbiah designed keyboard layout fitaly specifically optimized stylus touch-based input subsequently started textware solutions company sells text entry software pdas tablet pcs well text-entry software medical transcription pcs 1979 jean ichbiah designated chevalier knight french legion honour correspondent french academy sciences received certificate distinguished service united states department defense work ada jean ichbiah died complications brain tumor january 26 2007 | [
1952,
4998,
10568,
10617,
428,
8524,
3350,
4025
] | Test |
9,265 | 5 | Maximum_segment_lifetime:maximum segment lifetime maximum segment lifetime time tcp segment exist internetwork system arbitrarily defined long maximum segment lifetime value used determine time_wait interval 2*msl command used many unix systems determine time_wait interval 60000 60 seconds common value freebsd systems description value checked command sysctl gets result linux systems value checked either commands | [
10924
] | Test |
9,266 | 2 | Linux-powered_device:linux-powered device linux-based devices linux devices computer appliances powered linux kernel possibly parts gnu operating system device manufacturers reasons use linux may various low cost security stability scalability customizability many original equipment manufacturers use free open source software brand products community maintained linux devices also available devices intended run linux time production community effort made possible either full partial linux support open source philosophy free open source software brings software world many people ported linux kernel run devices typical desktop laptop server computer ports performed committed individuals groups provide alternative software favorite hardware original hardware vendors cases supportive efforts linksys wrt54g least tolerate use software end users see tivo hacking others go great lengths try stop alternative implementations android linux-based operating system optimised mobile touchscreen environments—smartphones tablets e-books like developed published maintained google android open source project consultation open handset alliance android relieves smartphone manufacturers costs developing- licensing proprietary handset operating systems first unveiled 2007 android became world widely deployed smartphone platform q4 2010 september 2012 500 million android devices activated 1.3 million devices activated per day google nexus developer phones flagship brand android handsets features capabilities represent state art time launch typically every eleven months cases oems open use software fulfil requirements free software licenses gnu general public license gpl small number cases use masked either deliberately professed ignorance misunderstanding violators usually found public records may forced declare implementations advertising example embedded software engineers mandatory linux experience required careers pages yet site product documentation offers source download offer supply software source required license gpl organizations gpl-violations.org free software foundation fsf software freedom law center sflc organized pursuing violators obtaining compliance usually seek voluntary compliance first step enter legal proceedings blocked notified violations confirm asking supplier examining available product samples even going far make blind purchases product front companies | [
1537,
3585,
4616,
3082,
10780,
10785,
3618,
6178,
6180,
8242,
1083,
4161,
10817,
8772,
6213,
10820,
11337,
8268,
589,
593,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
8326,
7821,
4238,
10382,
1682,
2195,
2711,
6808,
10393,
9882,
1694,... | Test |
9,267 | 2 | ICade:icade icade accessory apple ipad line devices functions miniaturised portable arcade cabinet including physical joystick buttons ipad inserted icade connects device using bluetooth allowing used arcade-style controller compatible games icade input devices include 8-way ball-top joystick eight digital buttons placed inside icade ipad positioned vertically groove behind inputs accommodates landscape-mode play front device coin slot lights show icade powered flashes batteries running low power sourced either two aa batteries ac adapter also possible run ipad docking cable underside icade order charge ipad play internally icade essentially bluetooth keyboard—the joystick buttons simply mapped 24 different standard keys since ipad natively supports bluetooth keyboards able receive inputs icade without requirement special software beyond games designed respond inputs icade sends system also allows bluetooth input devices icontrolpad use protocol order control applications designed icade icade originally announced thinkgeek april 1 2010 april fools day prank however widely covered electronics media potential product thinkgeek responded speculation saying real icade possibility april fools icade stated connect via standard apple dock connector noted potential blocker release due licensing fees restrictions placed dock connections apple shortly revelation icade gag product thinkgeek contacted privately ion audio proposal develop concept thinkgeek ion staff worked tandem project able secure support atari rightsholders large catalogue arcade games thus working icade produced ion audio demonstrated running 1979 arcade title asteroids consumer electronics show january 2011 projected release late spring version replaced dock connection wireless bluetooth one sidestepping potential issues completed device released thinkgeek june 27 2011 ion audio provides document covers information necessary add icade support applications document also includes guidelines acceptance apple avoiding references icade name addition ios app developer stuart carnie manomio freely released unofficial sdk application authors use speed implementation icade controls outside ios development library made available adding icade support adobe flash games icade presents standard bluetooth hid keyboard numeric passcode must entered via buttons control stick pairing mapping used code entry quite straightforward readily apparent icade thus included reference put icade pairing mode hold bottom 4 buttons top white button 6 8 0 enter buttons simultaneously 4 seconds release official icade list http //www.ionaudio.com/products/icade-games reception icade mostly positive ars technica called attractive capable piece hardware exactly want ign referred icade surprisingly functional saying certain please target market toucharcade felt absolute must-have ipad accessory serious retro gamer engadget coverage accessory described well constructed awesome addition gaming collection feelings icade controls mixed positive ign described joystick buttons responsive however noted input configuration little cramped unbearably ars technica reviewer ben kuchera felt joystick little looser would prefer buttons require heavy finger push said controls held heavy hand toucharcade praised buttons finding exactly like 'd find old defender cabinet widest criticism device small library compatible software many early reviews drawing attention fact one icade-compatible title atari greatest hits available launch speaking positively hardware crunchreview felt limited software availability made device one trick pony ign opined 'd pretty passionate lunar lander centipede missile command fan feel disappointed n't play new 99 icade following icade atari taito released respective versions atari arcade invadercade atari arcade connects standard dock connector instead bluetooth atari arcade works atari ’ greatest hits app offers 99 games 10 although criticized flimsy controls taito space invader themed invadercade functions charger ipad plugged additionally invadercade built speakers dedicated volume knob function general media center itunes internet radio functionality compatible ipad ipad 2 invadercade similarly requires taito space invaders hd app run icade jr smaller version icade apps currently somewhat fully supported yet see ion compatibility list runs 50 via thinkgeek uses either iphone ipod touch | [
6539
] | Train |
9,268 | 9 | Forté_Software:forté software forté proprietary application server developed forté software used developing scalable highly available enterprise applications forté created integrated solution developing managing client/server applications forté 4gl consists application server tools deploying monitoring application object oriented proprietary programming language tool transactional object oriented language given tool runs forté application server many users simply refer tool applications forté applications product 3.5 million lines c/c++ software ported approximately twelve different operating system environments spanning range ibm mainframes microsoft windows pc first release forté 4gl published august 1994 releasing initial product forté inc. proceeded build several extensions including 1999 forté software came version forte based java instead tool named synerj also referred forté java original tool-based products consisted development ide code repository runtime environment new java product interest sun microsystems bought company tool-based listed bundled together re-branded unified development server uds integration server iplanet division server modules later bundled together enterprise application integration eai sun declared product end-of-life indicating future plans continue development product sun official support forte ceased end april 2009 enterprise application development system forté supported close linkage number different relational database systems including oracle sybase microsoft sql server informix db2 linkages could via sql embedded within tool code via sql constructed fly also support distributed applications developer would create instance specific class would placed user-specified server calls methods instance would sent across network transparently developer would need know underlying details call would transmitted tool object-oriented language following features among others tool code case-insensitive statement always terminated semicolon compound statements enclosed keywords codice_2 codice_3 comments indicated // -- remainder line becomes comment /* ... */ data types simple data types corresponding object data types examples arrays indicated keywords codice_4 first element array indexed 1 variable declaration conditional statements if-statement case-statement iteration loops events event posted e.g following statement statement posts event named codice_5 event one argument named id events handled event handlers example exception handling multithreading new thread launched statement like codice_6 | [
9665,
6850,
9286,
11085,
11030
] | Test |
9,269 | 5 | Discovery_and_Configuration_Protocol:discovery configuration protocol discovery basic configuration protocol dcp protocol definition within profinet context link layer based protocol configure station names ip addresses restricted one subnet mainly used small medium applications without installed dhcp server | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
5471,
5472,
10341,
... | Test |
9,270 | 5 | RadioVIS:radiovis radiovis protocol sideband signalling images text messages broadcast audio service provide richer visual experience application sub-project radiodns allows radio consumption devices look ip-based service based parameters currently tuned broadcast station january 2015 functionality radiovis integrated visual slideshow etsi ts 101 499 v3.1.1 original rvis01 document deprecated protocol enables either streaming text oriented messaging protocol stomp comet deliver text image urls client images acquired http connection technology currently implemented number broadcasters across world including global radio bauer radio uk rté republic ireland südwestrundfunk germany number australian media groups amongst others number software clients exist show protocol well hardware devices pure sensia pure digital colourstream roberts radio | [
3983
] | Train |
9,271 | 4 | Marc_Stevens_(cryptology):marc stevens cryptology dr. ir marc stevens cryptology researcher known work cryptographic hash collisions creation chosen-prefix hash collision tool hashclash part master degree thesis first gained international notoriety work alexander sotirov jacob appelbaum arjen lenstra david molnar dag arne osvik benne de weger creating rogue ssl certificate presented 2008 25th annual chaos communication congress warning dangers using md5 hash function issuing ssl certificates several years later 2012 according microsoft authors flame malware used similar methodology researchers warned initiating md5 collision forge windows code-signing certificate marc recently awarded google security privacy anti-abuse applied award google selected stevens award recognition work cryptanalysis particular related sha-1 hash function february 2017 first known successful sha-1 collision attack practice termed shattered recognized marc stevens first-credited subsequent paper along cwi amsterdam colleague pierre karpman researchers elie bursztein ange albertini yarik markov alex petit bianco clement baisse google marc currently employed cryptology researcher centrum wiskunde informatica | [
928,
6954,
9744,
1783,
8029
] | Validation |
9,272 | 9 | Write_once,_compile_anywhere:write compile anywhere write compile anywhere woca philosophy taken compiler associated software libraries software library/software framework refers capability writing computer program compiled platforms without need modify source code opposed sun write run anywhere slogan cross-platform compatibility implemented source code level rather also compiled binary code level many languages follow woca philosophy c++ pascal see free pascal ada c condition n't use functions beyond provided standard library languages like go go even far system specific things used work system-specific elements system platform-specific files used computer program may also use cross-platform libraries provide abstraction layer hiding differences various platforms things like sockets gui ensuring portability written source code example supported qt lazarus ide via lcl corresponding widgetsets | [
1952,
6403,
8262,
5612,
2804,
3577,
1435,
2045,
5663
] | Test |
9,273 | 6 | OFFSystem:offsystem owner-free file system system short peer-to-peer distributed file system shared files represented randomized multi-used data blocks instead anonymizing network data blocks anonymized therefore data garbage ever exchanged stored forwarding via intermediate nodes required claims created expressed intention cut gangrene-infested bits copyright industry development started within hacktivism group big hack 2003 hackers cheater512 captainmorgan aqlo whiteraven 2004 rudimentary version finished written php distributed two demo cds following spectralmorning re-implemented functionality 2004 c++ led current mainline client august 14 2006 captainmorgan posted letter closing addressed copyright industry associations america riaa mpaa stating created purpose ending problems consumer copyright infringement 2008 network consisted around 50 nodes april 11 2008 beta test held network size 100 nodes since spectralmorning stopped work late 2008 minor bug fix releases made mainline starting 2007 alternative compatible client developed called blocksnet written ruby well-maintained saw major improvements recent time development 2011 client offload fork mainline seemingly adds features reasons fork unclear another distantly related program monolith uses similar principle created features multi-use blocks networking system kind anonymous fully decentralized p2p file sharing program network contrast anonymous file sharing networks derive anonymity forwarding data blocks via intermediate network nodes derives anonymity anonymizing data files thus system refers brightnet contrast method operation private file sharing systems known darknets traditional forwarding anonymous p2p programs order store file local storage resp block cache choose tuple size formula_1 default 3 split source file formula_2 blocks formula_3 size 128 kib pad random data fit following finally store descriptor list block blocks list larger 128 kib insert blocks formula_11 block cache generate url referencing source file output user local url database retrieve obtain descriptor block blocks contained set size formula_1 following derives anonymity following anonymizes data blocks exchanged instead network forwarding via intermediate nodes required therefore method higher degree efficiency traditional forwarding-based anonymous p2p systems forwarding method requires data block uploaded downloaded several times reaches destination happens 5 15 times. according resulting formula formula_17 equivalent overhead 900 2900 overhead without optimizations 200 formula_2 source file size formula_19 inbound tunnel length formula_20 outbound tunnel length plus 1 hop outbound endpoint inbound gateway efficiency increased implementations | [
8640,
6797,
7983,
9245,
823,
5085
] | Test |
9,274 | 9 | Emios:emios emios acronym environmental memory interoperable open service mdd mde platform aims provide range services storing sharing information environmental research activities emios initiated c. faucher june 2006 based environmental memory concepts developed motive cnrs committee specifically franck guarnieri 2003 emios set eclipse plugins based emf distributed terms epl license current version 0.0.1 mainly contains geographic information standards manager gism gism first part emios implements iso 19100 series international standards iso tc211 faucher c. gourmelon f. lafaye j.y. rouan m. mise en place ’ une mémoire environnementale adaptée aux besoins ’ un observatoire du domaine cotier menir revue internationale de géomatique hermès/lavoisier vol 19/1 pp 7-26 2009 http //geo.e-revues.com/ faucher c. lafaye j.y. 2007 model-driven engineering implementing iso 19100 series international standards coastgis 07 8th international symposium gis computer mapping coastal zone management vol 2 p. 424-433 7-10 october santander spain emios web site | [] | Test |
9,275 | 8 | Acid3:acid3 acid3 test web test page web standards project checks web browser compliance elements various web standards particularly document object model dom javascript test successful results acid3 test display gradually increasing fraction counter series colored rectangles number subtests passed indicate percentage displayed screen percentage represent actual percentage conformance test really keep track subtests actually started 100 assumed moreover browser also render page exactly reference page rendered browser like text acid2 test text acid3 reference rendering bitmap order allow certain differences font rendering acid3 development april 2007 released 3 march 2008 main developer ian hickson google employee also wrote acid2 test acid2 focused primarily cascading style sheets css third acid test also focuses technologies used highly interactive websites characteristic web 2.0 ecmascript dom level 2 subtests also concern scalable vector graphics svg extensible markup language xml data uris includes several elements css2 recommendation later removed css2.1 reintroduced world wide web consortium w3c css3 working drafts made candidate recommendations yet april 2017 updated specifications diverged test latest versions google chrome mozilla firefox longer pass test written hickson acknowledges aspects test controversial written test longer reflects consensus web standards purports test especially comes issues affecting mobile browsers main part acid3 written ecmascript javascript consists 100 subtests six groups called buckets including four special subtests 0 97 98 99 compliance criteria require test run browser default settings final rendering must 100/100 score must pixel-identical reference rendering browsers designed personal computers animation smooth taking 33 ms subtest reference hardware equivalent top-of-the-line apple laptop well though slower performance slow device imply non-conformance pass test browser must also display generic favicon browser toolbar favicon image acid3 web server acid3 server asked codice_1 gives 404 response code image data body tests web browser correctly handles 404 error code fetching favicon treating failure displaying generic icon instead test running rectangles added rendered image number subtests passed bucket determine color rectangles note acid3 display exactly many subtests passed bucket example 3 subtests passing 4 subtests passing bucket 2 would render black rectangle acid3 test page completely rendered word acid3 clicked see alert shift-click new window explaining exactly subtests failed error message case one 100 tests passed took much time report includes timing results single test alert reports total time whole acid3 test order render test correctly user agents need implement css 3 text shadows css 2.x downloadable fonts specifications currently consideration w3c standardized required test uses custom truetype font called acidahemtest cover 20x20 red square supporting truetype fonts however required css specification browser supporting opentype fonts cff outlines embedded opentype fonts could support css standard fail test acid3 test glyph rendered downloaded font square made white css thus invisible addition test also uses base64 encoded images advanced selectors css 3 color values hsla well bogus selectors values ignored google employee ian hickson started working test april 2007 development progressed slowly december 2007 work restarted project received public attention january 10 2008 mentioned blogs anne van kesteren time project resided url clearly showing experimental nature nowiki http //www.hixie.ch/tests/evil/acid/003/not_ready_please_do_not_use.html /nowiki despite notice url test received widespread attention web-development community time 84 subtests done january 14 ian hickson announced competition fill missing 16 following developers contributed final test competition even official release acid3 impact browser development dramatic particular webkit score rose 60 87 less month test officially released march 3 2008 guide commentary expected follow within months march 2011 commentary released announcement test complete means considered stable enough actual use problems bugs found test modified fix march 26 2008—the day opera webkit teams announced 100/100 score—developers webkit contacted hickson critical bug acid3 presumably allowed violation svg 1.1 standard pass hickson fixed bug help cameron mccormack member w3c svg working group 2008 development versions presto webkit layout engines used opera safari respectively scored 100/100 test rendered test page correctly time browser using presto webkit layout engines passed performance aspect test google chrome opera mobiledisplayed score 100/100 security concerns downloadable fonts delayed chrome passing version 68 later chrome gets score 97/100 time acid3 release mozilla firefox developers preparing imminent release firefox 3 focusing stability acid3 success consequently firefox 3 score 71 firefox 3.5 scored 93/100 firefox 3.6 scored 94/100 initially firefox 4 scored 97/100 support svg fonts later firefox 4 scored 100/100 svg font tests removed acid3 according mozilla employee robert o'callahan firefox support svg fonts mozilla considered woff superior alternative svg fonts another mozilla engineer boris zbarsky claimed subset specification implemented webkit opera gives benefits web authors users woff asserted implementing svg fonts fully web browser hard designed integration html mind april 2 2010 ian hickson made minor changes test mozilla due privacy concerns altered way gecko handles codice_2 pseudo-class firefox 51.0a1 made regression 100 99 september 14 2016 firefox 55.0a1 regressed 97 may 1 2017 firefox quantum versions 63.0 received 97/100 64.0 got 96/100 microsoft said acid3 agree goal internet explorer 8 ie8 would improve standards tested acid3 ie8 scored 20/100 much worse relevant competitors time acid3 release problems rendering acid3 test page 18 november 2009 internet explorer team posted blog entry early development internet explorer 9 pdc presentation showing internal build browser could score 32/100 throughout 2010 several public developer previews improved internet explorer 9 test scores 55/100 16 march 95/100 4 august dean hachamovich general manager ie team argued striving 100/100 acid3 test neither necessary desirable claimed two acid3 failures related features svg fonts smil animation transition internet explorer 11 edge display score 100/100 early iterations test criticized cherry-picked collection features rarely used well still w3c working draft eric a. meyer notable web standards advocate wrote real point acid3 test n't broad-spectrum standards-support test showpiece something potemkin village shame really needed right exhaustive test suites specifications—xhtml css dom svg implementing enough standard pass test disingenuous nothing standards compliance argued mozilla ux lead alex limi article mythbusting firefox 4 wo n't score 100 acid3 limi argued tests particularly svg fonts relation real usage implementations browsers created solely point raising scores september 17 2011 ian hickson announced update acid3 hickson words håkon wium lie opera software commented parts test might get changed specs hoped change would allow specs change whatever way best web rather constraining changes things happened fit acid3 tested result firefox 4 internet explorer 9 achieved score 100/100 acid3 internet explorer n't render test properly support text-shadow internet explorer 10 parts following standards tested acid3 passing score considered valid browser default settings used following browser settings user actions may invalidate test | [
1664,
2304,
6528,
3971,
6657,
3462,
7943,
8584,
6028,
6034,
2579,
7572,
8854,
7965,
9757,
8351,
10910,
417,
5026,
7713,
1834,
9770,
7340,
559,
9908,
4661,
3639,
11449,
4797,
5054,
64,
9029,
10057,
11082,
5707,
11466,
7885,
11469,
4048,
10... | Validation |
9,276 | 2 | The_Linux_Schools_Project:linux schools project linux schools project formerly karoshi translated literally death overwork japanese operating system designed schools linux distribution based ubuntu operating system project maintains two custom distributions one designed use servers use server version client machines server distribution official karoshi client known karoshi client tlsp uses prepackaged gui scripts order simplify install configuration process inexperienced users tlsp originally developed using red hat early 2000s aim making linux adoption easier schools uk linux time considered difficult use educational environments computing expertise mainly came teachers dedicated staff version 5.1.x tlsp moved pclinuxos platform since adopted ubuntu place current production version tlsp 11.1 tlsp downloadable homepage installation steps require initial install ubuntu live cd prompts initiate following machine reboot installation ubuntu install tlsp system initiated automatically tlsp primarily aimed educational environments also suitable use small medium enterprise sme business environment included systems suitable use file print email web e-learning servers leveraging technologies possible administer complete network using integrated web tools using form remote desktop technology tlsp system scalable single multi server system comprising many features chief among ability act primary domain controller windows network tlsp uses built samba ldap servers store user group computer information emulates microsoft windows nt 4.0 server system using technologies providing computer user authentication along file print services local network tlsp creates standard windows domain local network names linuxgrid tlsp uses kixtart scripts set windows xp clients domain providing mandatory profiles users system roaming profiles used recommended due heavy network overhead involved using mandatory profiles folder redirection mapped file shares server allows every user store files documents folder tlsp includes moodle e-learning package several website content management systems including joomla website baker egroupware squirrelmail built system allowing full calendar email facilities installed standalone machine dmz section thus providing increased security systems directly exposed internet particularly interesting inclusion wpkg enables remote installation software windows clients using machine profile stored server possible install software packages hotfixes security updates background also helpful terms creating machine profiles allowing 'blank windows xp machine updated automatically particular wpkg profile machine added domain type technology compared group policy mechanism windows server 2003 particularly machine administration perspective means replacement group policy step right direction first version karoshi client based pclinuxos upgrades system whole led client using modified version ubuntu 10.04 lts gui similar microsoft windows interface interface designed fast run well older hardware june 2012 work started karoshi client version 2 would interface closer gnome 2 windows development client release given robin mccorkell student dover grammar school boys 21 july 2012 karoshi client 2 uploaded sourceforge.net karoshi client contains many applications deemed necessary school work media production software including music production image manipulation video editing software included along programming tools visualization software many ides installed default mainly set use java also supporting c/c++ programming languages c++ compiler standard libraries installed default along boost libraries ncurses mesa libraries opengl programming java development kit installed integrated installed ides xfce used desktop manager customized theme panel layout developer ported clearlooks gtk2 theme gtk3 gnome 3 applications like gedit would display correctly panel layout similar gnome 2 environment compositing effects enabled default environment interface settings locked xfce configuration files due need suitability school environment children may try play settings kde greeter lightdm used log screen due problems kdm ubiquity version karoshi client integrated server distribution previous client releases custom configuration files pulled primary domain controller boot server patch added correct files client released 23 july 2012 difficult integrate tlsp existing windows network without changing address space standard one used tlsp system limitation early versions longer applies kerberos support planned karoshi server client system providing single sign services provided karoshi distribution unfeasible samba 4 released due complexities surrounding integration user resolution file access across multiple operating systems support active directory protocols integration occurred already working client system authenticates using kerberos authenticates successfully moodle samba squid using kerberos credentials | [
9728,
8837,
7435,
6797,
10127,
2321,
5397,
4887,
10394,
673,
3745,
10530,
9253,
10149,
11305,
7854,
2738,
3250,
4790,
823,
439,
56,
59,
7483,
3903,
4673,
2375,
4039,
1353,
8907,
1110,
9693,
2914,
485,
3685,
5608,
4841,
6890,
7913,
7020,
... | Test |
9,277 | 6 | Panasas:panasas panasas data storage company creates network-attached storage technical computing environments founded 1999 garth gibson william courtright panasas computer data storage product company headquartered sunnyvale california panasas received seed funding mohr davidow ventures mdv others first panasas products shipped 2004 year victor m. perez became ceo faye pairman became ceo 2011 panasas developed extension managing parallel file access network file system later integrated parallel nfs pnfs part nfs version 4.1 specification published internet engineering task force rfc 5661 january 2010. pnfs described way nfs protocol process file requests multiple servers storage devices instead handling requests serially panasas supports directflow nfs parallel nfs server message block also known cifs data access protocols integrate existing local area networks panasas blade servers manage metadata serving data directflow nfs cifs clients using 10 gigabit ethernet panasas systems provide data storage management high-performance applications biosciences energy media entertainment manufacturing government research sectors activestor product line scale-out nas appliance integrates hybrid storage hardware hard drives solid state drives panfs parallel file system proprietary directflow data access protocol industry standard nfs cifs network protocols activestor ultra introduced november 2018 newest generation panasas activestor storage system features re-engineered portable file system delivers performance reliability suitably qualified industry standard storage hardware platforms activestor ultra four storage nodes node six hdd drive slots two ssd drive slots node supports six eight hdds zero two ssds activestor ultra deliver 6-7.5 gb/s per 4u enclosure depending configuration minimum configuration three activestor ultra enclosures total bandwidth performance expected 18-22 gb/s activestor ultra designed extreme performance extreme scalability configurations supports flexible networking options activestor ultra/panfs 8 solution aimed hpc shops well enterprises need kind performance parallel file systems afford enterprise customers especially approach intended give kind simplicity low tco demand activestor 20 activestor classic announced august 2016 increased capacity using larger faster disks november 2017 panasas released activestor director 100 activestor hybrid 100 activestor prime disaggregated director blade controller node panasas storage system storage nodes november 2018 panasas introduced activestor ultra featured completely re-engineered portable file system panfs® 8 running industry standard hardware panasas created panfs clustered file system single pool storage global filename space support multiple applications workflows single storage system panfs supports directflow pnfs nfs cifs data access protocols simultaneously panfs 7.0 added freebsd operating foundation gui supports asynchronous push notification system changes without user interaction november 2018 panasas introduced panfs 8 intelligent posix compliant parallel file system incorporates latest software innovations runs linux enable easy portability new industry standard hardware panfs 8 includes newly re-engineered storage node software stack use new activestor ultra family storage nodes panfs theoretically portable across much wider array hardware opening possibility hosting file system third-party storage platforms file system ’ portability also offers panasas flexibility use different hardware suppliers future versions activestor hardware – director storage modules advantage keeping costs potentially offering even options customers panfs 8 optimized match object access update patterns common mixed workloads directflow parallel data access protocol designed panasas activestor directflow avoids protocol i/o bottlenecks accessing panasas storage directly parallel directflow originally supported linux expanded april 2016 support apple macos | [
3328,
3909,
998,
1801,
2314,
1454,
5167,
6003,
823,
2395,
3677
] | Train |
9,278 | 7 | Proofpoint_Systems,_Inc.:proofpoint systems inc. proofpoint systems inc. provider software systems programs support individual organizational performance based silicon valley los altos california founded 2003 jim hill proofpoint systems developed first browser-based performance analysis software systems proofpoint systems research development facilities denver colorado well sales offices phoenix arizona washington d.c. proofpoint systems founded 2003 jim hill retired united states marine corps officer former sun microsystems executive year proofpoint secured contracts united states navy resulting international society performance improvement award 2005 patent proofpoint systems performance analysis support system pass filed april 5 2006 published october 25 2007 pass operates guiding user detailed consistent analysis process ... helping organizational leaders accurately diagnose critical performance productivity issues proofpoint first product comprehensive performance analysis support system compass later developed web-based organizational analysis system management consulting engagements 2006 compass finalist stevie awards category best new product service year proofpoint systems awarded united states navy contracts support strategic planning manpower training education proofpoint offers products services including strategic planning goal development web based diagnostics assessment | [
9665,
4194,
8061
] | Validation |
9,279 | 4 | Amazingports:amazingports amazingports linux-based software product customized use firewall captive portal billing system hotspots project started 2001 amazingports mainly deployed access control system private public networks deployed single hotspot controller airports hotels private locations hospitals used internet cafes europe 2002 together intel used city-wide wi-fi project 2004 internet roaming 2002 amazingports created 2001 initial vision building free networks later company refocused provided technology network builders company implemented service-oriented provisioning 2002 first implement 802.11a public hotspots europe 2009 2010 administrative system updated features include | [
1792,
2049,
4480,
2825,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
5924,
550,
8998,
10790,
7082,
1708,
3885,
686,
7983,
8753,
2996,
823,
569,
5178,
11577,
3007,
10303,
5057,
1858,
10433,
11073,
2118,
5959,
9927,
5322,
4814,
7887,
9423,
712... | Test |
9,280 | 7 | ORBexpress:orbexpress ois orbexpress commercial object request broker orb product objective interface systems ada c++ c java programming languages orbexpress features tools developing debugging distributed real-time applications | [
7234,
5380,
8100,
10985,
5356,
428,
823,
5677,
7983,
9964,
1399,
1304,
8700
] | Test |
9,281 | 5 | Network_Security_Services:network security services computing network security services nss comprises set libraries designed support cross-platform development security-enabled client server applications optional support hardware tls/ssl acceleration server side hardware smart cards client side nss provides complete open-source implementation cryptographic libraries supporting transport layer security tls secure sockets layer ssl s/mime previously tri-licensed mozilla public license 1.1 gnu general public license gnu lesser general public license nss upgraded gpl-compatible mpl 2.0 release 3.14 nss originated libraries developed netscape invented ssl security protocol nss software crypto module validated five times 1997 1999 2002 2007 2010 conformance fips 140 security levels 1 2 nss first open source cryptographic library receive fips 140 validation nss libraries passed niscc tls/ssl s/mime test suites 1.6 million test cases invalid input data aol red hat sun microsystems/oracle corporation google companies individual contributors co-developed nss mozilla provides source code repository bug tracking system infrastructure mailing lists discussion groups others named use nss variety products including following nss includes framework developers oems contribute patches assembly code optimize performance platforms mozilla certified nss 3.x 18 platforms nss makes use netscape portable runtime nspr platform-neutral open-source api system functions designed facilitate cross-platform development like nss nspr used heavily multiple products addition libraries apis nss provides security tools required debugging diagnostics certificate key management cryptography-module management development tasks nss comes extensive growing set documentation including introductory material api references codice_1 pages command-line tools sample code programmers utilize nss source shared dynamic libraries every nss release backward-compatible previous releases allowing nss users upgrade new nss shared libraries without recompiling relinking applications nss supports range security standards including following nss supports pkcs 11 interface access cryptographic hardware like tls/ssl accelerators hsm-s smart cards since hardware vendors safenet inc. aep thales also support interface nss-enabled applications work high-speed crypto hardware use private keys residing various smart cards vendors provide necessary middleware nss version 3.13 support advanced encryption standard new instructions aes-ni network security services java jss consists java interface nss supports security standards encryption technologies supported nss jss also provides pure java interface asn.1 types ber/der encoding mozilla cvs tree makes source code java interface nss available | [
513,
2050,
4100,
517,
9736,
9744,
9745,
9757,
2083,
9764,
5677,
7736,
7238,
3657,
10831,
11345,
6231,
8283,
7264,
10850,
10341,
9318,
10860,
7794,
5749,
4728,
2169,
3707,
637,
1664,
1157,
6791,
4746,
8331,
1683,
1688,
11418,
3742,
10405,
... | Test |
9,282 | 4 | Zemra:zemra zemra ddos bot first discovered underground forums may 2012 zemra capable http syn flood flooding also simple command control panel protected 256-bit des encryption communicating command control c c server zemra also sends information computer name language settings windows version send data remote location specific date time also opens backdoor tcp port 7710 receive commands remote command-and-control server able monitor devices collect system information execute files even update uninstall necessary | [
9536,
9569,
2018,
10852,
901,
4488,
2409,
6347,
1965,
2299,
9727
] | Test |
9,283 | 4 | RISKS_Digest:risks digest risks digest forum risks public computers related systems online periodical published since 1985 committee computers public policy association computing machinery editor peter g. neumann moderated forum concerned security safety computers software technological systems security risk taken broadly risks concerned merely so-called security holes software unintended consequences hazards stemming design lack thereof automated systems recurring subjects include cryptography effects technically ill-considered public policies risks also publishes announcements calls papers various technical conferences technical book reviews usually rob slade though occasionally others although risks forum computer science association contributions readable informative anyone interest subject heavily read system administrators computer security managers well computer scientists engineers risks digest published frequent irregular schedule moderated usenet newsgroup comp.risks exists solely carry digest summaries forum appear columns edited neumann acm sigsoft software engineering notes sen communications acm cacm | [
6305,
10372,
709,
3350,
8155,
2558
] | Validation |
9,284 | 5 | Multi-frequency_time-division_multiple_access:multi-frequency time-division multiple access mf-tdma multi-frequency time-division multiple access technology dynamically sharing bandwidth resources over-the-air two-way communications network | [
10112,
2306,
388,
8708,
3847,
11288,
2458,
5020,
1192,
11560,
7723,
11181,
7490,
5321,
7498,
2911,
3168,
2785,
5092,
5863,
2802
] | None |
9,285 | 3 | Single_point_of_failure:single point failure single point failure spof part system fails stop entire system working spofs undesirable system goal high availability reliability business practice software application industrial system systems made robust adding redundancy potential spofs instance owner small tree care company may one woodchipper chipper breaks may unable complete current job may cancel future jobs obtain replacement redundancy achieved various levels instance owner tree care company may spare parts ready repair wood chipper case fails higher level may second wood chipper bring job site finally highest level may enough equipment available completely replace everything work site case multiple failures assessment potential spof involves identifying critical components complex system would provoke total systems failure case malfunction highly reliable systems rely individual component computing redundancy achieved internal component level system level multiple machines site level replication one would normally deploy load balancer ensure high availability server cluster system level high-availability server cluster individual server may attain internal component redundancy multiple power supplies hard drives components system level redundancy could obtained spare servers waiting take work another server fails since data center often support center operations business logic represents potential spof thus site level entire cluster may replicated another location accessed case primary location becomes unavailable typically addressed part disaster recovery resiliency program paul baran donald davies developed packet switching key part survivable communications networks networks including arpanet internet designed single point failure multiple paths two points network allow points continue communicating packets routing around damage even single failure one particular path one intermediate node network protocols used prevent spof software engineering bottleneck occurs capacity application computer system severely limited single component bottleneck lowest throughput parts transaction path tracking bottlenecks sometimes known hot spots sections code execute frequently i.e highest execution count called performance analysis reduction usually achieved help specialized tools known performance analyzers profilers objective make particular sections code perform fast possible improve overall algorithmic efficiency mistake one component compromise entire system concept single point failure also applied fields outside engineering computers networking corporate supply chain management transportation management design structures create single points failure include bottlenecks series circuits contrast parallel circuits transportation noted recent examples concept recent application included nipigon river bridge canada partial bridge failure january 2016 entirely severed road traffic eastern canada western canada several days located along portion trans-canada highway alternate detour route vehicles take norwalk river railroad bridge norwalk connecticut aging swing bridge sometimes gets stuck opening closing disrupting rail traffic northeast corridor line concept single point failure also applied fields intelligence edward snowden talked dangers described single point failure – sole repository information | [
6531,
8195,
7049,
2314,
4878,
8343,
2206,
8865,
8229,
3495,
3751,
8233,
2986,
5047,
2117,
7753,
9677,
11343,
4817,
6877,
3805,
7794,
6003,
3582
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.