node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
9,386
1
TransLattice:translattice translattice software company based santa clara california geographically distributes databases applications enterprise cloud hybrid environments translattice offers newsql database application platform translattice founded 2007 officially launched 2010 company co-founders frank huerta ceo mike lyle executive vp engineering robert geiger previously worked together recourse technologies translattice based santa clara california august 2008 company received 9.5 million series funding dcm early stage capital venture funding company 2013 translattice acquired stormdb database-as-a-service startup stormdb clustered postgresql fork open sourced 2014 name postgres-xl translattice specializes distributed databases application platforms enterprise cloud systems company developed geographically-distributed computing-architecture allows single database run multiple nodes located anywhere translattice elastic database ted newsql database management system enables building highly available fault tolerant data fabric multiple nodes located anywhere world translattice database fully sql/acid-compliant ted operates cohesive single database translattice provided world first geographically-distributed relational database management system rdbms deploy multiple public-cloud-provider networks time well virtual machines physical hardware combination thereof
[ 10048, 8539, 4861, 10413 ]
Test
9,387
8
LiteSpeed_Web_Server:litespeed web server litespeed web server lsws proprietary web server software 4th popular web server estimated used 4.6 websites august 2019 lsws developed privately held litespeed technologies software uses configuration format apache http server compatible apache features lsws released 2003 august 2008 became 16th popular web server november 2016 litespeed market share grew 0.39 3.29 increasing position 10th 4th popular web server according netcraft 2017 team hong kong polytechnic university found one six popular web servers estimated team rwth aachen university running 9.2 http/2-enabled websites august 2019 lsws used 58.9 websites using quic litespeed web server lsws compatible commonly-used apache features including mod_rewrite .htaccess mod_security lsws load apache configuration files directly works drop-in replacement apache fully integrating popular control panels lsws replaces apache functions uses event driven approach handle requests litespeed technologies founded early 2002 team engineers led george wang july 1 2003 litespeed web server officially released full-featured web server 2007 litespeed web server became litespeed web server enterprise configured apache drop-in replacement year web server integrated cpanel directadmin plesk litespeed web server officially began supporting http/2 2015 version 5.0 also released lscache cache plugin wordpress esi version 5.0.10 2017 lsws released quic support
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 11154, 7443, 1556, 10138, 8350, 7457, 3746, 8994, 2596, 3237, 8358, 9125, 11682, 7338, 44, 7983, 10800, 11439, 6714, 64, 10622, 1991, 11134, 595, 1363, 4439, 3545, 225, 865, 1250, 2404, 4837, 6379...
Train
9,388
6
ZipIt:zipit zipit shareware data compression utility archiving compressing files classic mac os mac os x platforms designed highly compatible pkzip ms-dos machines reading writing files well performing necessary line ending conversion macbinary encoding ensure files usable platforms advanced user interface offered number automation features including applescript support first released 1993 latest version zipit version 2.2.2 released late 2002 unique feature original mac file system use forks essentially two separate files finder maintained illusion single file files copied storage media automatically copied forks systems support feature risked problem transmitting one two forks producing unusable file led number archive formats combined two forks along extended metadata single file suitable hosting platforms original pkzip archive format include number features intended help support file systems like mac including things like longer filenames basic metadata however support forks therefore directly capable supporting mac files zip archives present major problem many use-cases mac archive utilities support features like stuffit compact pro early 1990s however zip format becoming almost universal number systems required data exchange notable among fidonet mailers offline mail readers like qwk format times mac users exchange simple files like text file pc user utilities like unzip maczip worked single files include mac-like interface suitable basic tasks zipit introduced address problem explicitly modeling program user interface compact pro lauded one easiest use archivers available zipit essentially replaced compact pro internal compression system pkzips producing program looked similar read wrote zip files instead cpt zipit also included number automation features notably support applescript allowed used programs like freddie qwk reader setting zterm allowed downloaded zip files automatically associated zipit making download-and-open simple task initial stable version 1.1.1 released march 1993 allowed multiple archives opened created one separate window version support hierarchical directories instead encoded files single-level archive downside would allow one file given name archive addressed 1.2.x versions settled final version 1.2.x series version 1.2.6 1994 2001 version 2.0 released version supported mac os x mac os 9 tests 1.1.1 zipit consistently outperformed compact pro stuffit terms compression 10 average speed stuffit making half speed fast compact pro
[ 576, 2432, 9762, 3368, 10121, 9166, 7983, 722, 2389, 3167 ]
Test
9,389
1
Firebird_(database_server):firebird database server firebird open-source sql relational database management system runs linux microsoft windows macos several unix platforms database forked borland open source edition interbase 2000 since firebird 1.5 code largely rewritten within week interbase 6.0 source released borland 25 july 2000 firebird project created sourceforge firebird 1.0 released linux microsoft windows mac os x 11 march 2002 ports solaris freebsd 4 hp-ux following next two months work porting codebase c c++ began 2000 23 february 2004 firebird 1.5 released first stable release new codebase version 1.5 featured improved query optimizer sql-92 conditional expressions savepoints support explicit locking firebird 2.0 released 12 november 2006 adding support 64-bit architectures tables nested clauses programmable lock timeouts blocking transactions previous stable release version 2.1.6 added new features including procedural triggers recursive queries support merge statements firebird 2.5 introduced new features like improved multithreading regular expression syntax ability query remote databases recent stable version firebird 3.0 released 19 april 2016 focus performance security major re-architecture code allowed total support smp machines using superserver version google summer code 2013 work begun integrating firebird replacement hsqldb libreoffice april 2003 mozilla organization announced rename web browser phoenix firebird trademark dispute phoenix technologies decision caused concern within firebird database project due assumption users internet search engines would confused database web browser using name firebird mozilla developers issued statement making clear software package called mozilla firebird firebird statement also said mozilla firebird name project codename dispute resolved february 9 2004 mozilla changed name browser mozilla firefox thus ending conflict firebird inherited storage architecture interbase ensure acid properties transactions database engine keeps different versions record changed active users database transactions committed last version every changed record marked definitive transactions rolled back database engine keeps mark original record versions leaving untouched result firebird disk writes reduced compared databases use traditional transaction log architecture writing transactions prevent reading vice versa one sees version database tradeoff maintenance “ sweeping ” required time time clean old record versions free disk space multi-generational architecture ensures oltp dss/olap operations run simultaneously without delays caused locking mechanisms found products firebird makes indices database behave like well-tuned “ clustered indexes ” used architectures firebird index buckets ’ subject two-phase locking boolean “ ” “ ” operations performed intermediate bitmaps negligible cost eliminating need optimizer choose alternative indexes firebird database engine modules released open-source license initial developer public license idpl variant mozilla public license mpl version 1.1 require developer open products using firebird even custom-derivatives made source code developer chooses terms conditions honored idpl allows developer make proprietary closed-source applications use firebird based firebird native api used directly indirectly applications middleware connect firebird database implemented client library fbclient.dll windows systems libfbclient.so unix ones services api special function set accessing controlling service administration tasks user management backup/restore statistics gathering embedded sql technique simplifies development c/c++ cobol firebird applications using preprocessor called gpre allows embedding sql statements directly source code host language
[ 9729, 5768, 5896, 6797, 10389, 6166, 1816, 1304, 3096, 5403, 10137, 11551, 10921, 10236, 5549, 10286, 7983, 10413, 3636, 823, 11191, 5691, 2364, 11332, 3784, 8781, 5583, 6993, 10193, 2901, 5078, 9177, 10201, 10459, 2780, 3045, 7654, 1383, 5...
Test
9,390
4
Hengzhi_chip:hengzhi chip hengzhi chip 联想 恒智 安全芯片 microcontroller store secured information designed people republic china government manufactured china functionalities similar offered trusted platform module unlike tpm follow trusted computing group specifications lenovo selling pcs installed hengzhi security chips chip could development ibm ess embedded security subsystem chip public key smart card placed directly motherboard system management bus september 2006 public specifications chip available
[ 2416, 7354 ]
Test
9,391
3
Reduced_instruction_set_computer:reduced instruction set computer reduced instruction set computer risc one whose instruction set architecture isa allows fewer cycles per instruction cpi complex instruction set computer cisc various suggestions made regarding precise definition risc general concept computer small set simple general instructions rather large set complex specialized instructions another common risc trait load/store architecture memory accessed specific instructions rather part instructions although number computers 1960s 1970s identified forerunners riscs modern concept dates 1980s particular two projects stanford university university california berkeley associated popularization concept stanford mips would go commercialized successful mips architecture berkeley risc gave name entire concept commercialized sparc another success era ibm effort eventually led ibm power instruction set architecture powerpc power isa projects matured wide variety similar designs flourished late 1980s especially early 1990s representing major force unix workstation market well embedded processors laser printers routers similar products many varieties risc designs include arc alpha am29000 arm atmel avr blackfin i860 i960 m88000 mips pa-risc power isa including powerpc risc-v superh sparc use arm architecture processors smartphones tablet computers ipad android devices provided wide user base risc-based systems risc processors also used supercomputers summit world fastest supercomputer ranked top500 project alan turing 1946 automatic computing engine ace design many characteristics risc architecture number systems going back 1960s credited first risc architecture partly based use load/store approach term risc coined david patterson berkeley risc project although somewhat similar concepts appeared cdc 6600 designed seymour cray 1964 used load/store architecture two addressing modes register+register register+immediate constant 74 operation codes basic clock cycle 10 times faster memory access time partly due optimized load/store architecture cdc 6600 jack dongarra says considered forerunner modern risc systems although number technical barriers needed overcome development modern risc system michael j. flynn views first risc system ibm 801 design begun 1975 john cocke completed 1980 801 eventually produced single-chip form ibm romp 1981 stood 'research opd office products division micro processor name implies cpu designed mini tasks also used ibm rt pc 1986 turned commercial failure 801 inspired several research projects including new ones ibm would eventually lead ibm power instruction set architecture public risc designs however results university research programs run funding darpa vlsi program vlsi program practically unknown today led huge number advances chip design fabrication even computer graphics berkeley risc project started 1980 direction david patterson carlo h. sequin berkeley risc based gaining performance use pipelining aggressive use technique known register windowing traditional cpu one small number registers program use register time cpu register windows huge number registers e.g 128 programs use small number e.g eight one time program limits eight registers per procedure make fast procedure calls call simply moves window eight set eight registers used procedure return moves window back berkeley risc project delivered risc-i processor 1982 consisting 44,420 transistors compared averages 100,000 newer cisc designs era risc-i 32 instructions yet completely outperformed single-chip design followed 40,760 transistor 39 instruction risc-ii 1983 ran three times fast risc-i mips project grew graduate course john l. hennessy stanford university 1981 resulted functioning system 1983 could run simple programs 1984 mips approach emphasized aggressive clock cycle use pipeline making sure could run full possible mips system followed mips-x 1984 hennessy colleagues formed mips computer systems commercial venture resulted new architecture also called mips r2000 microprocessor 1985 early 1980s significant uncertainties surrounded risc concept uncertain could commercial future mid-1980s concepts matured enough seen commercially viable 1986 hewlett packard started using early implementation pa-risc computers meantime berkeley risc effort become well known eventually became name entire concept 1987 sun microsystems began shipping systems sparc processor directly based berkeley risc-ii system us government committee innovations computing communications credits acceptance viability risc concept success sparc system success sparc renewed interest within ibm released new risc systems 1990 1995 risc processors foundation 15 billion server industry since 2010 new open source instruction set architecture isa risc-v development university california berkeley research purposes free alternative proprietary isas 2014 version 2 user space isa fixed isa designed extensible barebones core sufficient small embedded processor supercomputer cloud computing use standard chip designer defined extensions coprocessors tested silicon design rocket soc also available open source processor generator chisel language common misunderstanding phrase reduced instruction set computer mistaken idea instructions simply eliminated resulting smaller set instructions fact years risc instruction sets grown size today many larger set instructions many cisc cpus risc processors powerpc instruction sets large cisc ibm system/370 example conversely dec pdp-8—clearly cisc cpu many instructions involve multiple memory accesses—has 8 basic instructions extended instructions term reduced phrase intended describe fact amount work single instruction accomplishes reduced—at single data memory cycle—compared complex instructions cisc cpus may require dozens data memory cycles order execute single instruction particular risc processors typically separate instructions i/o data processing term load/store architecture sometimes preferred risc architectures fixed-length instructions commonly 32 bits simple encoding simplifies fetch decode issue logic considerably one drawback 32-bit instructions reduced code density adverse characteristic embedded computing workstation server markets risc architectures originally designed serve address problem several architectures arm power isa mips risc-v adapteva epiphany optional short feature-reduced instruction format instruction compression feature sh5 also follows pattern albeit evolved opposite direction added longer media instructions original 16-bit encoding given level general performance risc chip typically far fewer transistors dedicated core logic originally allowed designers increase size register set increase internal parallelism features typically found risc architectures risc designs also likely feature harvard memory model instruction stream data stream conceptually separated means modifying memory code held might effect instructions executed processor cpu separate instruction data cache least special synchronization instruction issued upside allows caches accessed simultaneously often improve performance many early risc designs also shared characteristic branch delay slot branch delay slot instruction space immediately following jump branch instruction space executed whether branch taken words effect branch delayed instruction keeps alu cpu busy extra time normally needed perform branch nowadays branch delay slot considered unfortunate side effect particular strategy implementing risc designs modern risc designs generally away powerpc recent versions sparc mips aspects attributed first risc- labeled designs around 1975 include observations memory-restricted compilers time often unable take advantage features intended facilitate manual assembly coding complex addressing modes take many cycles perform due required additional memory accesses argued functions would better performed sequences simpler instructions could yield implementations small enough leave room many registers reducing number slow memory accesses simple designs instructions uniform length similar structure arithmetic operations restricted cpu registers separate load store instructions access memory properties enable better balancing pipeline stages making risc pipelines significantly efficient allowing higher clock frequencies early days computer industry programming done assembly language machine code encouraged powerful easy-to-use instructions cpu designers therefore tried make instructions would much work feasible advent higher level languages computer architects also started create dedicated instructions directly implement certain central mechanisms languages another general goal provide every possible addressing mode every instruction known orthogonality ease compiler implementation arithmetic operations could therefore often results well operands directly memory addition register immediate attitude time hardware design mature compiler design also reason implement parts functionality hardware microcode rather memory constrained compiler generated code alone advent risc philosophy became retroactively known complex instruction set computing cisc cpus also relatively registers several reasons important force encouraging complexity limited main memories order kilobytes therefore advantageous code density—the density information held computer programs—to high leading features highly encoded variable length instructions data loading well calculation mentioned issues higher priority ease decoding instructions equally important reason main memories quite slow common type ferrite core memory using dense information packing one could reduce frequency cpu access slow resource modern computers face similar limiting factors main memories slow compared cpu fast cache memories employed overcome limited size may partly explain highly encoded instruction sets proven useful risc designs modern computers risc developed alternative known cisc years strategies implemented alternatives risc cisc examples long instruction word vliw minimal instruction set computer misc mid-1970s researchers particularly john cocke ibm similar projects elsewhere demonstrated majority combinations orthogonal addressing modes instructions used programs generated compilers available time proved difficult many cases write compiler limited ability take advantage features provided conventional cpus also discovered microcoded implementations certain architectures complex operations tended slower sequence simpler operations thing part effect fact many designs rushed little time optimize tune every instruction used often optimized sequence instructions could faster less-tuned instruction performing equivalent operation sequence one infamous example vax codice_1 instruction mentioned elsewhere core memory long since slower many cpu designs advent semiconductor memory reduced difference still apparent registers later caches would allow higher cpu operating frequencies additional registers would require sizeable chip board areas time 1975 could made available complexity cpu logic reduced yet another impetus risc designs came practical measurements real-world programs andrew tanenbaum summed many demonstrating processors often oversized immediates instance showed 98 constants program would fit 13 bits yet many cpu designs dedicated 16 32 bits store suggests reduce number memory accesses fixed length machine could store constants unused bits instruction word would immediately ready cpu needs much like immediate addressing conventional design required small opcodes order leave room reasonably sized constant 32-bit instruction word since many real-world programs spend time executing simple operations researchers decided focus making operations fast possible clock rate cpu limited time takes execute slowest sub-operation instruction decreasing cycle-time often accelerates execution instructions focus reduced instructions led resulting machine called reduced instruction set computer risc goal make instructions simple could easily pipelined order achieve single clock throughput high frequencies later noted one significant characteristics risc processors external memory accessible load store instruction instructions limited internal registers simplified many aspects processor design allowing instructions fixed-length simplifying pipelines isolating logic dealing delay completing memory access cache miss etc two instructions led risc designs referred load/store architectures one issue complex instructions difficult restart e.g following page fault cases restarting beginning work although wasteful many cases would give incorrect results therefore machine needs hidden state remember parts went remains done load/store machine program counter sufficient describe state machine main distinguishing feature risc instruction set optimized highly regular instruction pipeline flow features associated risc—branch delay slots separate instruction data caches load/store architecture large register set etc.—may seem random assortment unrelated features helpful maintaining regular pipeline flow completes instruction every clock cycle cpus specifically designed small set instructions – designs different classic risc designs given names minimal instruction set computer misc transport triggered architecture tta etc risc architectures traditionally successes desktop pc commodity server markets x86 based platforms remain dominant processor architecture however may change arm architecture based processors developed higher performance systems manufacturers including cavium amd qualcomm released arm architecture based server processors arm partnered cray 2017 produce arm architecture based supercomputer desktop microsoft announced part partnership qualcomm planned support pc version windows 10 qualcomm snapdragon-based devices 2017 devices support x86 based win32 software via x86 processor emulator outside desktop arena however arm architecture risc widespread use smartphones tablets many forms embedded device also case since pentium pro p6 intel using internal risc processor core processors early risc designs differed significantly contemporary cisc designs 2000 highest performing cpus risc line almost indistinguishable highest performing cpus cisc line risc architectures used across wide range platforms cellular telephones tablet computers world fastest supercomputers summit fastest top500 list beginning 21st century majority low end mobile systems relied risc architectures examples include
[ 4108, 2066, 4124, 6181, 8231, 2088, 4144, 6207, 2113, 10316, 6250, 4204, 8301, 6256, 4211, 4217, 6268, 8325, 4237, 8352, 6311, 4269, 2224, 2226, 4276, 2237, 4286, 2241, 2243, 6339, 2262, 219, 10485, 249, 8450, 10501, 6415, 10516, 2339, 10...
None
9,392
4
Attrition_(website):attrition website attrition information security-related website updated least weekly all-volunteer staff 21 may 2001 attrition maintained largest mirror defaced cracked websites available world wide web defacement mirror since ceased updating site contains variety information including movie music reviews poetry security tips covering topics like forensics data theft security advisories republican communications aide todd shriber sacked job attempted hire attrition crack former university website 2001 attrition.org given cease desist order lawyers mastercard posting parodies priceless advertising campaign violated copyright law attrition formerly hosted several electronic mailing lists relating information security infosec news also maintained data loss database records data breaches companies
[ 5373, 4435, 1861, 9319 ]
None
9,393
4
Intrusion_detection_system_evasion_techniques:intrusion detection system evasion techniques intrusion detection system evasion techniques modifications made attacks order prevent detection intrusion detection system ids almost published evasion techniques modify network attacks 1998 paper insertion evasion denial service eluding network intrusion detection popularized ids evasion discussed evasion techniques areas correct interpretation ambiguous depending targeted computer system 'fragroute 'fragrouter programs implement evasion techniques discussed paper many web vulnerability scanners 'nikto 'whisker 'sandcat also incorporate ids evasion techniques idss modified detect even reverse basic evasion techniques ids evasion countering ids evasion still active fields ids evaded obfuscating encoding attack payload way target computer reverse ids way attacker exploit end host without alerting ids application layer protocols like http allow multiple encodings data interpreted value example string cgi-bin url encoded 63 67 69 2d 62 69 6e i.e. hexadecimal web server view string act accordingly ids must aware possible encodings end hosts accept order match network traffic known-malicious signatures attacks encrypted protocols https read ids unless ids copy private key used server encrypt communication ids wo n't able match encrypted traffic signatures n't account signature-based ids often look common attack patterns match malicious traffic signatures detect buffer overflow attacks ids might look evidence nop slides used weaken protection address space layout randomization obfuscate attacks attackers use polymorphic shellcode create unique attack patterns technique typically involves encoding payload fashion e.g. xor-ing byte 0x95 placing decoder front payload sending target executes code runs decoder rewrites payload original form target executes polymorphic attacks n't single detectable signature making difficult signature-based ids even anomaly-based ids detect shikata ga nai helped popular polymorphic encoder metasploit framework used convert malicious shellcode difficult-to-detect polymorphic shellcode using xor additive feedback attackers evade ids crafting packets way end host interprets attack payload correctly ids either interprets attack incorrectly determines traffic benign quickly one basic technique split attack payload multiple small packets ids must reassemble packet stream detect attack simple way splitting packets fragmenting adversary also simply craft packets small payloads 'whisker evasion tool calls crafting packets small payloads 'session splicing small packets evade ids reassembles packet streams however small packets modified order complicate reassembly detection one evasion technique pause sending parts attack hoping ids time target computer second evasion technique send packets order confusing simple packet re-assemblers target computer another evasion technique craft series packets tcp sequence numbers configured overlap example first packet include 80 bytes payload second packet sequence number 76 bytes start first packet target computer reassembles tcp stream must decide handle four overlapping bytes operating systems take older data take newer data ids n't reassemble tcp way target manipulated either missing portion attack payload seeing benign data inserted malicious payload breaking attack signature technique also used ip fragmentation similar manner ids evasion techniques involve deliberately manipulating tcp ip protocols way target computer handle differently ids example tcp urgent pointer handled differently different operating systems ids n't handle protocol violations manner consistent end hosts vulnerable insertion evasion techniques similar mentioned earlier attacks spread across long period time large number source ips nmap slow scan difficult pick background benign traffic online password cracker tests one password user every day look nearly identical normal user mistyped password due fact passive ids inherently fail-open opposed fail-closed launching denial-of-service attack ids network feasible method circumventing protection adversary accomplish exploiting bug ids consuming computational resources ids deliberately triggering large number alerts disguise actual attack packets captured ids stored kernel buffer cpu ready process cpu high load ca n't process packets quickly enough buffer fills new possibly malicious packets dropped buffer full attacker exhaust ids cpu resources number ways example signature-based intrusion detection systems use pattern matching algorithms match incoming packets signatures known attacks naturally signatures computational expensive match others exploiting fact attacker send specially-crafted network traffic force ids use maximum amount cpu time possible run pattern matching algorithm traffic algorithmic complexity attack overwhelm ids relatively small amount bandwidth ids also monitors encrypted traffic spend large portion cpu resources decrypting incoming data order match certain signatures ids required keep state related connections monitoring example ids must maintain tcp control blocks tcbs chunks memory track information sequence numbers window sizes connection states established related closed etc tcp connection monitored ids ids random-access memory ram consumed forced utilized virtual memory hard disk much slower ram leading performance problems dropped packets similar effects cpu exhaustion ids n't garbage collect tcbs correctly efficiently attacker exhaust ids memory starting large number tcp connections quickly similar attacks made fragmenting large number packets larger number smaller packets send large number out-of-order tcp segments alerts generated ids acted upon order value attacker reduce availability ids overwhelming human operator inordinate number alerts sending large amounts malicious traffic intended generate alerts ids attacker perform actual attack using alert noise cover tools 'stick 'snot designed purpose generate large number ids alerts sending attack signatures across network trigger alerts ids maintain application protocol context
[ 2304, 5472, 1474, 6916, 7717, 2409, 7851, 2732, 10924, 2383, 2739, 11539, 1429, 5245, 5176, 4797, 895 ]
None
9,394
4
Extended_Validation_Certificate:extended validation certificate extended validation certificate ev certificate conforming x.509 proves legal entity owner signed certificate authority key issue ev certificates ev certificates used manner x.509 certificates including securing web communications https signing software documents ev certificates different domain-validated certificates organization-validation certificates issued subset certificate authorities cas require verification requesting entity legal identity certificate issuance august 2019 google chrome mozilla firefox apple safari web browsers show verified legal identity user interface either instead domain name plan remove distinction near future mobile browsers typically show difference ev certified websites desktop behaviour phased recent versions popular browsers example safari browser apple macos mojave ten popular websites online none use ev certificates trend away usage software verified legal identity displayed user operating system e.g. microsoft windows proceeding installation extended validation certificates stored file format specified typically use encryption organization-validated certificates domain-validated certificates compatible server user agent software criteria issuing ev certificates defined guidelines extended validation promulgated ca/browser forum voluntary organization whose members include leading cas vendors internet software well representatives legal audit professions issue extended validation certificate ca requires verification requesting entity identity operational status control domain name hosting server 2005 melih abdulhayoglu ceo comodo group convened first meeting organization became ca/browser forum hoping improve standards issuing ssl/tls certificates june 12 2007 ca/browser forum officially ratified first version extended validation ev ssl guidelines took effect immediately formal approval successfully brought close two years effort provided infrastructure trusted web site identity internet april 2008 forum announced version 1.1 guidelines building practical experience member cas relying-party application software suppliers gained months since first version approved use major browsers created special user interface indicators pages loaded via https secured ev certificate soon creation standard includes microsoft edge 12 google chrome 1.0 internet explorer 7.0 firefox 3 safari 3.2 opera 9.5 furthermore mobile browsers including safari ios windows phone firefox android chrome android ios added ui indicators usually browsers ev support display validated identity—usually combination organization name jurisdiction—contained ev certificate 'subject field implementations enhanced display includes clicking lock symbol user obtain information certificate including name certificate authority ca issued ev certificate august 2019 google chrome 76 firefox 70 browsers plan remove ui indicators ev certificates important motivation using digital certificates ssl/tls add trust online transactions requiring website operators undergo vetting certificate authority ca order get certificate however commercial pressures led cas introduce domain-validated certificates domain-validated certificates existed validation standards generally require proof domain control particular domain-validated certificates assert given legal entity relationship domain although domain may resemble particular legal entity past browsers user interfaces clearly differentiate low-validation certificates undergone rigorous vetting since successful ssl/tls connection would cause green padlock icon appear browsers users likely aware whether website owner validated result fraudsters including phishing websites could use tls add perceived credibility websites users modern browsers always check identity certificate owners examining details issued certificate always indicates certificate owner information name organization location ev certificates validated baseline requirements extended validation requirements place additional requirements authorities vet companies include manual checks domain names requested applicant checks official government sources checks independent information sources phone calls company confirm position applicant certificate accepted government-registered serial number business well physical address stored ev certificate establishing stricter issuing criteria requiring consistent application criteria participating cas ev certificates intended restore confidence among users website operator legally established business organization verifiable identity said still concern lack accountability led loss public confidence domain-validated certificates lead lax certification practices erode value ev certificates well cas pass independent qualified audit review may offer ev cas globally must follow detailed issuance requirements aim exception extended validation certificates .onion domains otherwise possible get wildcard extended validation certificate – instead fully qualified domain names must included certificate inspected certificate authority ev certificates standard x.509 digital certificates primary way identify ev certificate referencing certificate policies extension field issuer uses different object identifier oid field identify ev certificates oid documented issuer certification practice statement root certificate authorities general browsers may recognize issuers ev https certificates contain subject x.509 oids codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 pointing id relevant secretary state us government business registrar outside us well ca-specific policy identifier ev-aware software web browser recognize criteria issuing extended validation certificates require issuing certificate authorities immediately support online certificate status protocol revocation checking however requirement timely response revocation checks browser prompted certificate authorities previously done implement ocsp support section 26-a issuing criteria requires cas support ocsp checking certificates issued dec. 31 2010 legal entity names unique therefore attacker wants impersonate entity might incorporate different business name e.g. different state country obtain valid certificate use certificate impersonate original site one demonstration researcher incorporated business called stripe inc. kentucky showed browsers display similarly display certificate payment processor stripe inc. incorporated delaware researcher claimed demonstration setup took hour time us 100 legal costs us 77 certificate also noted enough mouse clicks user may able view city state entity incorporated neither helpful typical user likely blindly trust bright green indicator since ev certificates promoted reported mark trustworthy website small business owners voiced concerns ev certificates give undue advantage large businesses published drafts ev guidelines excluded unincorporated business entities early media reports focused issue version 1.0 ev guidelines revised embrace unincorporated associations long registered recognized agency greatly expanding number organizations qualified extended validation certificate 2006 researchers stanford university microsoft research conducted usability study ev display internet explorer 7 paper concluded participants received training browser security features notice extended validation indicator outperform control group whereas participants asked read internet explorer help file likely classify real fake sites legitimate proponents ev certificates claim help phishing attacks security expert peter gutmann states new class certificates restore ca profits eroded due race bottom occurred among issuers industry gutmann calls phenomenon pki-me-harder introduction … so-called high-assurance extended validation ev certificates allow cas charge standard ones simply case rounding twice usual number suspects—presumably somebody ’ going impressed effect phishing minimal since fixing problem phishers exploiting indeed cynics would say exactly problem certificates cas supposed solve first place “ high-assurance ” certificates way charging second time existing service years ago certificates still cost several hundred dollars shifting baseline certificate prices quality moved point obtained 9.95 even nothing big commercial cas reinvent defining new standard convincing market go back prices paid good old days deja-vu-all-over-again approach seen examining verisign ’ certificate practice statement cps document governs certificate issuance security requirements ev-certificate 2008 cps except minor differences legalese used express practically identical requirements class 3 certificates listed verisign ’ version 1.0 cps 1996 ev certificates simply roll back clock approach already failed first time tried 1996 resetting shifting baseline charging 1996 prices side-effect even proposals kind sliding-window approach certificate value inevitable race bottom cheapens effective value established classes certificates ’ regarded less less effective software uses them…
[ 513, 6657, 517, 9744, 2579, 2083, 9770, 559, 4661, 3639, 7736, 3643, 64, 9281, 3657, 5707, 10831, 11345, 10834, 6231, 6747, 7264, 10341, 1642, 9834, 115, 9843, 4728, 2169, 3707, 1664, 1157, 6797, 1683, 1688, 3742, 8351, 10910, 8358, 7340,...
Validation
9,395
4
Evercookie:evercookie evercookie javascript-based application created samy kamkar produces zombie cookies web browser intentionally difficult delete 2013 top-secret nsa document leaked edward snowden citing evercookie method tracking tor users traditional http cookie relatively small amount textual data stored user browser cookies used save preferences login session information however also employed track users marketing purposes due concerns privacy major browsers include mechanisms deleting and/or refusing accept cookies websites adobe systems claimed size restrictions likelihood eventual deletion simple textual nature traditional cookies motivated add local shared object lso mechanism adobe flash player adobe published mechanism deleting lso cookies store 100 kb data per website default met criticism security privacy experts since version 4 firefox treated lso cookies way traditional http cookies deleted together samy kamkar released v0.4 beta evercookie september 13 2010 open source according project website evercookie merely difficult delete actively resists deletion copying different forms user machine resurrecting notices copies missing expired specifically creating new cookie evercookie uses following storage mechanisms available developer looking add following features
[ 1024, 5636, 9736, 4117, 8726, 535, 9761, 4644, 4133, 5677, 11319, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 9904, 8886, 3789, 7887, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 74...
Train
9,396
7
DocuWare:docuware docuware provider solutions document management workflow automation also referred enterprise content management ecm recently content services company headquartered germany united states docuware also name flagship product offered company besides offered cloud-based software service saas also available feature parity installation on-premises software available 16 languages docuware distributed via global network 500 authorized docuware partners adp well directly key accounts january 2017 docuware used 16,000 customers 70 countries october 27 1988 docunet gmbh founded germering germany near munich president jürgen biffar since 1990 mr biffar managing company colleague thomas schneck currently president sales docunet ag renamed docuware ag august 2000 since 1999 docuware outsourced parts development sofia bulgaria 2016 nemetschek ood 42 employees working docuware product docuware gmbh holds 20 percent stake nemetschek ood • docuware corporation new windsor founded january 1 2001 • docuware ltd nottinghamshire founded april 1 2005 • docuware sarl paris founded september 1 2008 • docuware s.l barcelona founded july 1 2009 april 2012 investment agreement signed company morgan stanley expansion capital lp morgan stanley investment management private equity fund aim promoting accelerating global growth docuware legal form ag public holding company changed gmbh limited liability corporation company acquired u.s.-based westbrook technologies inc. developer fortis ecm software august 2013 2014 westbrook technologies inc. merged docuware corporation beginning 2016 docuware appointed dr michael berger chief technology officer cto dr berger joined company 2008 vice president research development 1988 – development dacs-board dacs document archiving communication system 1990 – dacs office first software solution running windows 3.0 store search display print documents windows 3.0 released may 22 1990 1993 – docuware 3.0 customizable file cabinets structure pre-set sending documents docuware 1998 – docuware 4.0 first 32-bit version 2006 – docuware 5.0 new development based .net technology 2008 – docuware web client web-based document management 2009 – docuware saas first saas via private cloud 2012 – docuware online first saas via public cloud 2014 – docuware online renamed docuware cloud ported microsoft azure platform iso 9001 soc 2 idw ers fait 3 hipaa-compliant keypoint intelligence buyers lab bli 2018 outstanding content workflow management platform buyers laboratory inc. bli 2014 5-star rated product program version 6 online buyers laboratory inc. bli 2013 5-star rated product program version 6 wins summer pick award outstanding document management solution
[ 4194, 8471, 1935 ]
Validation
9,397
1
Relational_model:relational model relational model rm database management approach managing data using structure language consistent first-order predicate logic first described 1969 english computer scientist edgar f. codd data represented terms tuples grouped relations database organized terms relational model relational database purpose relational model provide declarative method specifying data queries users directly state information database contains information want let database management system software take care describing data structures storing data retrieval procedures answering queries relational databases use sql data definition query language systems implement regarded engineering approximation relational model table sql database schema corresponds predicate variable contents table relation key constraints constraints sql queries correspond predicates however sql databases deviate relational model many details codd fiercely argued deviations compromise original principles relational model central idea describe database collection predicates finite set predicate variables describing constraints possible values combinations values content database given time finite logical model database i.e set relations one per predicate variable predicates satisfied request information database database query also predicate models hierarchical model network model systems using older architectures still use today data centers high data volume needs existing systems complex abstract would cost-prohibitive migrate systems employing relational model also note newer object-oriented databases several attempts produce true implementation relational database model originally defined codd explained date darwen others none popular successes far rel one recent attempts relational model first database model described formal mathematical terms hierarchical network databases existed relational databases specifications relatively informal relational model defined many attempts compare contrast different models led emergence rigorous descriptions earlier models though procedural nature data manipulation interfaces hierarchical network databases limited scope formalization relational model invented edgar f. codd general model data subsequently promoted chris date hugh darwen among others third manifesto first published 1995 date darwen attempt show relational model allegedly accommodate certain desired object-oriented features codd years publication 1970 model proposed three-valued logic true false missing/null version deal missing information relational model database management version 2 1990 went step four-valued logic true false missing applicable missing inapplicable version never implemented presumably attending complexity sql null construct intended part three-valued logic system fell short due logical errors standard implementations fundamental assumption relational model data represented mathematical n -ary relations n -ary relation subset cartesian product n domains mathematical model reasoning data done two-valued predicate logic meaning two possible evaluations proposition either true false particular third value unknown applicable either often associated concept null data operated upon means relational calculus relational algebra equivalent expressive power relational model data permits database designer create consistent logical representation information consistency achieved including declared constraints database design usually referred logical schema theory includes process database normalization whereby design certain desirable properties selected set logically equivalent alternatives access plans implementation operation details handled dbms engine reflected logical model contrasts common practice sql dbmss performance tuning often requires changes logical model basic relational building block domain data type usually abbreviated nowadays type tuple ordered set attribute values attribute ordered pair attribute name type name attribute value specific valid value type attribute either scalar value complex type relation consists heading body heading set attributes body n -ary relation set n -tuples heading relation also heading tuples relation defined set n -tuples mathematics relational database model set unordered collection unique non-duplicated items although dbmss impose order data mathematics tuple order allows duplication e.f. codd originally defined tuples using mathematical definition later one e.f. codd great insights using attribute names instead ordering would much convenient general computer language based relations insight still used today though concept changed name tuple immediate important consequence distinguishing feature relational model cartesian product becomes commutative table accepted visual representation relation tuple similar concept row relvar named variable specific relation type times relation type assigned though relation may contain zero tuples basic principle relational model information principle information represented data values relations accordance principle relational database set relvars result every query presented relation consistency relational database enforced rules built applications use rather constraints declared part logical schema enforced dbms applications general constraints expressed using relational comparison operators one subset ⊆ theoretically sufficient practice several useful shorthands expected available important candidate key really superkey foreign key constraints fully appreciate relational model data essential understand intended interpretation relation body relation sometimes called extension interpreted representation extension predicate set true propositions formed replacing free variable predicate name term designates something one-to-one correspondence free variables predicate attribute names relation heading tuple relation body provides attribute values instantiate predicate substituting free variables result proposition deemed account appearance tuple relation body true contrariwise every tuple whose heading conforms relation appear body deemed false assumption known closed world assumption often violated practical databases absence tuple might mean truth corresponding proposition unknown example absence tuple 'john 'spanish table language skills necessarily taken evidence john speak spanish formal exposition ideas see section set-theoretic formulation data type used typical relational database might set integers set character strings set dates two boolean values true false corresponding type names types might strings int char date boolean etc important understand though relational theory dictate types supported indeed nowadays provisions expected available user-defined types addition built-in ones provided system attribute term used theory commonly referred column similarly table commonly used place theoretical term relation though sql term means synonymous relation table data structure specified list column definitions specifies unique column name type values permitted column attribute value entry specific column row john doe 35 tuple basically thing row except sql dbms column values row ordered tuples ordered instead attribute value identified solely attribute name never ordinal position within tuple attribute name might name age relation table structure definition set column definitions along data appearing structure structure definition heading data appearing body set rows database relvar relation variable commonly known base table heading assigned value time specified table declaration body recently assigned invoking update operator typically insert update delete heading body table resulting evaluation query determined definitions operators used expression query note sql heading always set column definitions described possible column name also two columns name also body always set rows sql possible row appear body sql initially pushed standard language relational databases deviates relational model several places current iso sql standard n't mention relational model use relational terms concepts however possible create database conforming relational model using sql one use certain sql features following deviations relational model noted sql note database servers implement entire sql standard particular allow deviations whereas null ubiquitous example allowing duplicate column names within table anonymous columns uncommon users programs request data relational database sending query written special language usually dialect sql although sql originally intended end-users much common sql queries embedded software provides easier user interface many web sites wikipedia perform sql queries generating pages response query database returns result set list rows containing answers simplest query return rows table often rows filtered way return answer wanted often data multiple tables combined one join conceptually done taking possible combinations rows cartesian product filtering everything except answer practice relational database management systems rewrite optimize queries perform faster using variety techniques number relational operations addition join include project process eliminating columns restrict process eliminating rows union way combining two tables similar structures difference lists rows one table found intersect lists rows found tables product mentioned combines row one table row depending sources consult number operators – many defined terms listed include semi-join outer operators outer join outer union various forms division operators rename columns summarizing aggregating operators permit relation values attributes relation-valued attribute operators group ungroup select statement sql serves handle except group ungroup operators flexibility relational databases allows programmers write queries anticipated database designers result relational databases used multiple applications ways original designers foresee especially important databases might used long time perhaps several decades made idea implementation relational databases popular businesses relations classified based upon types anomalies 're vulnerable database first normal form vulnerable types anomalies database domain/key normal form modification anomalies normal forms hierarchical nature lowest level first normal form database meet requirements higher level normal forms without first met requirements lesser normal forms idealized simple example description relvars relation variables attributes design six relvars customer order order line invoice invoice line product bold underlined attributes candidate keys non-bold underlined attributes foreign keys usually one candidate key chosen called primary key used preference candidate keys called alternate keys candidate key unique identifier enforcing tuple duplicated would make relation something else namely bag violating basic definition set foreign keys superkeys includes candidate keys composite composed several attributes tabular depiction relation example customer relvar relation thought value attributed relvar attempted insert new customer id 1234567890 would violate design relvar since customer id primary key already customer 1234567890 dbms must reject transaction would render database inconsistent violation integrity constraint foreign keys integrity constraints enforcing value attribute set drawn candidate key another relation example order relation attribute customer id foreign key join operation draws information several relations joining relvars example could query database customers orders invoices wanted tuples specific customer would specify using restriction condition wanted retrieve orders customer 1234567890 could query database return every row order table customer id 1234567890 join order table order line table based order flaw database design invoice relvar contains order attribute tuple invoice relvar one order implies precisely one order invoice reality invoice created many orders indeed particular order additionally order relvar contains invoice attribute implying order corresponding invoice always true real world order sometimes paid several invoices sometimes paid without invoice words many invoices per order many orders per invoice many-to-many relationship order invoice also called non-specific relationship represent relationship database new relvar introduced whose role specify correspondence orders invoices order relvar one-to-many relationship orderinvoice table invoice relvar want retrieve every invoice particular order query orders order order relation equals order orderinvoice invoice orderinvoice equals invoice invoice basic notions relational model relation names attribute names represent strings person name usually use variables formula_1 formula_2 range another basic notion set atomic values contains values numbers strings first definition concerns notion tuple formalizes notion row record table next definition defines relation formalizes contents table defined relational model relation closely corresponds usually called extension predicate first-order logic except identify places predicate attribute names usually relational model database schema said consist set relation names headers associated names constraints hold every instance database schema one simplest important types relation constraints key constraint tells us every instance certain relational schema tuples identified values certain attributes superkey set column headers values columns concatenated unique across rows formally candidate key superkey subdivided form another superkey functional dependency property value tuple may derived another value tuple input set fds contain subsets header h
[ 5632, 10757, 4614, 8201, 6157, 2068, 4630, 1049, 5658, 9248, 10793, 10286, 5172, 8762, 4155, 11324, 9286, 2632, 9290, 8788, 10326, 7767, 8792, 8291, 9828, 10340, 8808, 2669, 119, 1146, 6780, 3196, 2688, 3712, 10389, 4255, 1697, 6822, 4263, ...
Test
9,398
4
Cyber_Storm_III:cyber storm iii cyber storm iii international cyber security exercise sponsored united states department homeland security 2010 week-long exercise centered washington dc concluded oct. 1st
[ 826 ]
Test
9,399
5
Space_Communications_Protocol_Specifications:space communications protocol specifications space communications protocol specifications scps set extensions existing protocols new protocols developed consultative committee space data systems ccsds improve performance internet protocols space environments scps protocol stack consists scps protocol seen use commercially scps-tp usually deployed performance enhancing proxy pep improve tcp performance satellite links
[ 5472, 10924, 3742 ]
None
9,400
3
Socket_FT3:socket ft3 amd socket ft3 bga-769 targets mobile devices designed apus codenamed kabini temash beema mullins socket ft3b kabini temash -branded products combine jaguar islands gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors beema mullins -branded products puma amd radeon rx 200 series gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors desktop counterpart socket am1
[ 3586, 9475, 3588, 8452, 9092, 10375, 3464, 4872, 5645, 398, 7058, 10260, 2719, 4767, 2463, 2850, 7712, 9122, 1322, 2094, 11183, 1329, 6705, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 11080, 2764, 7247, 9551, 7122, 9427, 7132, 2525, 9057, ...
Test
9,401
7
Demandware:demandware demandware software technology company headquartered burlington massachusetts provides cloud-based unified e-commerce platform mobile ai personalization order management capabilities related services b2c b2b retailers brand manufacturers around world founded 2004 demandware acquired salesforce 2016 2.8b.. company subsequently renamed salesforce commerce cloud demandware founded 2004 stephan schambach provide hosted service would enable companies develop manage easy-to-use customizable e-commerce websites rather building site scratch service launched first quarter 2005 schambach previously founded early e-commerce company intershop 1992 seed money demandware provided venture capital firms general catalyst partners north bridge venture partners march 15 2012 demandware began trading new york stock exchange raising 88 million initial public offering 16 per share following ipo shares 50 ipo price next morning november 2013 demandware announced underwritten registered public offering demandware headquartered burlington massachusetts company also offices salt lake city utah deerfield beach florida united kingdom france denmark germany netherlands australia hong kong china japan
[ 4194, 10090 ]
None
9,402
3
Vectored_interrupt:vectored interrupt computer science vectored interrupt processing technique interrupting device directs processor appropriate interrupt service routine contrast polled interrupt system single interrupt service routine must determine source interrupt checking potential interrupt sources slow relatively laborious process vectored interrupts achieved assigning interrupting device unique code typically four eight bits length device interrupts sends unique code data bus processor telling processor interrupt service routine execute
[ 5457, 7445, 9599 ]
None
9,403
4
Numina_Application_Framework:numina application framework numina application framework product numina solutions llc provides single sign-on capabilities application framework building applications features numina application framework include three main components numina application framework
[ 3521, 7556, 4107, 7983, 6651 ]
None
9,404
4
Ryan_Lackey:ryan lackey ryan donald lackey born march 17 1979 entrepreneur computer security professional co-founder havenco world first data also speaks numerous conferences trade shows including def con rsa data security conference various topics computer security field appeared cover wired magazine numerous television radio print articles havenco sealand lackey operated blueiraq vsat communications company serving dod domestic markets iraq afghanistan us conflicts lackey born west chester pennsylvania also lived throughout us europe anguilla sealand dubai iraq teenager briefly involved globewide network academy lackey attended mit majored course 18 mathematics student mit later dropped due financial constraints lackey became interested electronic cash distributed systems originally massively multiplayer online gaming interest led attending several conferences financial cryptography 98 various mit presentations participating mailing lists cypherpunks dbs eventually implementing patented chaumian digital cash underground library hinde ian goldberg named hinde ten berge dutch cypherpunk also present fc98 part contributed cypherpunks movement one longest anonymous remailer operators 1999 lackey lived san francisco bay area period anguilla moving unrecognized state sealand coast united kingdom establishing havenco december 2002 left havenco following dispute company directors sealand royal family eventually blueiraq business model became economically unfeasible due escalation anti-western violence primarily form improvised explosive devices troop draw downs blueiraq sought venture capital transform large general consumer cellular telephone company however 2008 financial crisis instability iraq afghanistan made fund raising impossible lackey returned us located san francisco worked number start-up companies applying combinator accepted combinator summer 2011 round lackey founded cryptoseal vpn service start-up small group people well known computer security community secured funding ron conway well known venture capital fund june 2014 cryptoseal acquired cloudflare br
[ 5392, 5373, 2558 ]
Validation
9,405
3
Motorola_X8_Mobile_Computing_System:motorola x8 mobile computing system motorola x8 mobile computing system chipset motorola android-based smartphones based qualcomm snapdragon system chip s4 pro cpu s4 pro arm-compatible dual-core krait gpu chip 4-core adreno 320 several low-power dsp chips added motorola s4 pro chipset process audio inputs sensors
[ 9913 ]
Test
9,406
2
Speakable_items:speakable items speakable items part speech recognition feature classic mac os macos operating systems allows user control computer natural speech without train computer beforehand commands must present speakable items folder though created something simple shortcut applescript keyboard command automator workflows speakable items first introduced part apple speech recognition software plaintalk 1993 originally available quadra av models later integrated system 7.1.2 release macintosh system software release mac os x v10.4 featured 12 list features os x mountain lion speakable items relocated accessibility panel system preferences mac os x v10.4 added automator workflows also used speakable items workflow saved application put speakable items folder becomes available speech recognition software words computer recognize execute command name saved automator application words might misspelt computer know proper pronunciation example computer best recognizes les misérables lay mizzer ob automator made comply applescript applications third party non applescript applications limewire final cut studio apps work speakable items unless configure commands define keyboard command 'll select application making keyboard command speakable items useful well innovative recognition gets hard distorted times
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 7842, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 1729, 6849, 713, 9418, 3790, 9430...
Test
9,407
2
CrunchBang_Linux:crunchbang linux crunchbang linux abbreviated linux distribution derived debian philip newborough commonly known username corenominal crunchbang designed use comparatively system resources instead desktop environment used customized implementation openbox window manager many preinstalled applications used gtk+ widget toolkit crunchbang software repository drew vast majority packages debian repositories philip newborough announced 6 february 2015 stopped developing crunchbang users would benefit using vanilla debian linux distributions arisen place effort continue environment among significant bunsenlabs crunchbang++ crunchbang linux provided openbox version i686 i486 amd64 architectures october 2010 also lite version fewer installed applications lite version effectively discontinued distribution based – ubuntu 9.04 – reached end-of-life crunchbang prepared switch different base system crunchbang 10 made available february 2011 first version based debian final version crunchbang 11 made available 6 may 2013 crunchbang linux release given version number well code name using name muppet show character first letter code name first letter upstream debian release previously debian squeeze crunchbang statler currently debian wheezy crunchbang waldorf may 2013 jim lynch desktoplinuxreviews.com reviewed crunchbang 11 newborough announced february 2015 abandoning development crunchbang linux feeling longer served purpose users agree number proceeded develop successor distributions bunsenlabs crunchbang++ ++ crunchbang-monara bunsenlabs linux community-organized successor crunchbang based debian 9 stretch stable release 17 30 september 2015 crunchbang domain began redirecting bunsenlabs crunchbang plusplus ++ developed response newborough announcement end crunchbang based debian jessie release 8.1 distribution release 1.0 announced 29 april 2015 latest version based debian 10.0 released 8 july 2019 crunchbang-monara another successor crunchbang based debian 8 stable release
[ 7938, 8837, 7431, 7435, 10127, 2321, 5397, 4887, 10394, 8476, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 3903, 10687, 4673, 708, 2375, 4039, 5962, 5067, 8907, 11388, 1110, 9693, 2914, 6371, 485, 3685, 9064, 4841,...
Train
9,408
2
BlackBerry_PlayBook:blackberry playbook blackberry playbook mini tablet computer developed blackberry made quanta computer original design manufacturer odm first released sale april 19 2011 canada united states playbook first device run blackberry tablet os based qnx neutrino runs apps developed using adobe air later announced blackberry tablet os would merged existing blackberry os produce new operating system blackberry 10 would used universally across blackberry product line second major revision blackberry playbook os released february 2012 playbook also supports android os applications allowing sold installed blackberry app world store early reviews mixed saying although hardware good several features missing shipments totaled approximately 500,000 units first quarter sales 200,000 following quarter many 700,000 units shipped retailers allegedly remained shelves months prompting blackberry introduce dramatic price reductions november 2011 increase sales sales rebounded following price cuts blackberry shipping approximately 2.5 million blackberry playbooks june 1 2013 end month ceo announced platform would developed rumors forthcoming computer nicknamed 'blackpad press expected similarity apple competing ipad circulated several months announcement research motion co-ceo mike lazaridis adobe systems cto kevin lynch staged first public demonstration playbook october 25 2010 onstage opening-day keynote adobe max 2010 conference among features demonstrated tight integration support adobe air applications full flash support according lazaridis 're trying dumb internet mobile device 've done bring mobile devices level desktop computers lazaridis announced end presentation developers get adobe air applications approved blackberry app world would eligible free blackberry playbook tablets since free playbook offer extended include webworks applications blackberry playbook supports 1080p video playback playbook features 3 mp front-facing camera video chatting wi-fi rear-facing 5 mp camera record 1080p video playbook 1024×600 wsvga aspect ratio 16:9 making device perfectly acceptable viewing hd video content media 7-inch display 3d graphics acceleration features variety sensors including invensense 6-axis gyroscope magnetometer accelerometer playbook uses dual-core texas instruments omap4430 processor newer faster playbook included dual-core texas instruments omap4460 processor blackberry playbook supports high resolution video playback h.264 mpeg4 wmv audio mp3 aac 5.1 wma 5.1 audio playback formats also micro-hdmi port hdmi video output blackberry playbook receives score 428 html5 test browser placing 4th tablets beating chrome beta chrome 18 ios 7 safari ios 6.0 safari opera mobile 12.10 silk 2.2 amazon kindle fire internet explorer 11 android 4.0 browsers blackberry tablet os 2.1 adobe flash version 11.1.121.74 support flash content usable blackberry playbook released canada usa april 19 2011 uk netherlands june 16 2011 united arab emirates june 25 2011 early reviews product mixed praising playbook fluid ui adobe flash supported webkit-based browser flash video support fast javascript html 5.0 web page rendering hdmi output multitasking capabilities playbook criticized initially requiring blackberry native email calendar applications although third party email calendar applications supported platform also relatively native third party applications compared platforms though number available steadily risen following mixed reviews blackberry playbook began gain traction receive better reviews temporary issues solved walt mossberg columnist wall street journal wrote got strong impression rim scrambling get product market rim co-ceo jim balsillie countered critics noting 60 million blackberry smartphones use ability pair playbook april 2013 blackberry ceo thorsten heins stated interview five years n't think 'll reason tablet anymore position analysts attributed blackberry spectacular failure tablet market playbook time launch 2,000 3,000 apps available blackberry app world may 1 2012 24,700 playbook applications available blackberry app world blackberry announced march 24 2011 would expand application ecosystem playbook include blackberry java android-based applications press release blackberry stated developers would able simply repackage code sign submit android apps blackberry app world however first update android 2.3 applications able run playbook applications became available blackberry tablet os 2.0 released february 21 2012 however java applications available future update popular android applications ported onto blackberry world pinterest whatsapp installed users sideloading process however 2.1 os update rim denied sideloading process first decision blackberry ship playbook without native applications e-mail calendar became source criticism derision reviewers users way access email web browser blackberry bridge third-party applications app world blackberry chose security reasons however blackberry made native applications available update system software playbook os 2.0 released february 21 2012 software update added integrated native email calendar contact apps also included visual changes operating system support variety android applications also brought three new applications built os press reader newspaper reader news rss reader print go used send documents pc playbook bbm aka blackberry messenger support included 2.0 update although blackberry intends support bbm future update bbm still supported blackberry bridge software allowing users continue access bridged blackberry smartphone october 3 2012 blackberry released playbook os 2.1 january 30 2013 blackberry confirmed wi-fi playbook newer cellular playbooks would receiving update new blackberry 10 operating system 2013 june 28 2013 company announced plans bring blackberry 10 playbook canceled sparking fears device potential scrapping according blackberry ceo thorsten heins multiple teams spent great deal time energy investigating ways bring os device ultimately heins intervened cancel project citing dissatisfaction level performance user experience immediate decisions device future certain heins promise blackberry would support playbook existing software platforms configurations blackberry bridge accesses mail calendar contacts directly tethered blackberry phone playbook meets encryption standards blackberry phone cryptographic components blackberry os kernels cryptography-related os java modules certified fips 140-2 makes tablet eligible use u.s. federal government agencies blackberry playbook os2.1 update september 2012 enabled full-disk encryption device using algorithm previously used limited enterprise kernel handling tethered content paired blackberry phone first playbook tablet wi-fi connectivity dual core 1 ghz texas instruments omap 4430 processor customers could purchase wifi playbook 16 gb 32 gb 64 gb storage configurations june 2012 16 gb model discontinued however 32 64 gb wi-fi versions remained sale august 2012 playbook 4g lte released canada featured dual-core 1.5 ghz processor 4g lte umts/hspa+ cellular connectivity nfc chip unlike earlier playbook model playbook 4g lte sold carrier channels november 2012 another variant 1.5 ghz playbook playbook 3g+ released uk unlike wi-fi models 4g lte 3g+ models available 16 gb 64 gb versions following launch blackberry 10 operating system blackberry z10 smartphone blackberry ceo thorsten heins confirmed company exploring opportunities future tablet releases announced plans tablet market playbook would converted new blackberry 10 os decided stop efforts focus core hardware portfolio mobile phones thereby bringing playbook end-of-life march 2015 blackberry announced blackberry secutablet tablet uses samsung knox hardware samsung galaxy tab 10.5 august 2011 blackberry advertised following made playbook accessories leather slipcase valextra italy premium charger delvaux belgium envelope-style leather case leather journal rapid charging pod neoprene zip sleeve convertible case blackberry earphones ganzo japan leather zipped pocket porter japan nylon canvas sleeve zipped bag want les essentiels de la vie canada leather zippered wallet-style case soft shell leather sleeve rapid travel charger brooklyn japan calfskin case ettinger england leather case neoprene sleeve torch smartphone accessing emails leather envelope various sources estimated sales figure launch day alone approximately 50,000 exceeding analyst expectations blackberry announced quarterly earnings half million playbook tablets shipped first quarter however lukewarm market reception reports company allegedly revised second-quarter estimates 2.4 million 800,000 – 900,000 units following several months poor sales blackberry started discounting price playbook original retail price improve product run rate retail december 2011 blackberry took 485 million write-down account offering price discounts sales improved subsequent quarters result according strategy analytics figures 2011 second quarter playbook market share middle 2011 3.3 compared ios ipads apple 61.3 android google 30.1 various windows microsoft 4.6 however playbook remained relatively popular tablet canada earlier years accounting nearly 20 tablet market research motion home country report released july 2012 strong discounting older wi-fi playbooks resulted strong sales uk christmas 2012
[ 10368, 10755, 9605, 6539, 6797, 9101, 410, 2208, 420, 11430, 2679, 7983, 8627, 1083, 2368, 7745, 9163, 2892, 11469, 3152, 2777, 8413, 1377, 226, 3949, 1776, 9841, 3828, 11254, 4855, 9341, 6271 ]
Test
9,409
8
Incremental_rendering:incremental rendering incremental rendering refers feature built modern web browsers specifically refers browser ability display partially downloaded web page user browser awaits remaining files server advantage user perceived improvement responsiveness web browser web site purpose incremental rendering similar purpose interlaced jpeg improves presentation speed user quickly displaying low-resolution version image improves high-resolution rather image slowly paints top bottom without incremental rendering web browser must wait code page fully loaded present content user earlier web browsers offered something compromise displaying html page entire html file retrieved inserting images one-by-one retrieved afterwards although utility incremental rendering seems intuitively obvious making happen something art well science sequence various elements web page render almost never strictly top-to-bottom programming fills missing pieces must certain amount guesswork determine best display partial content images particular virtually always loaded following html page browser must consult html file order know images request server server n't present automatically without follow-up request web designers web design software often include hints assist process example including expected heights widths images html code browser may allocate correct amount screen space image actually retrieved server
[ 8923, 119 ]
Test
9,410
5
Digital_Multiplex_System:digital multiplex system digital multiplex system dms name shared among several different telephony product lines nortel networks wireline wireless operators among dms-1 originally named dms-256 rural/urban digital loop carrier dms-10 telephone switch dms supernode family telephone switches dms-100 dms-200 dms-250 dms-300 dms-500 dms-gsp dms-msc dms-mtx s/dms optical transmission system exploratory development technology began northern telecom bell northern research labs ottawa ontario 1971 first class 5 switch dms-10 began service 21 october 1977 fort white florida first toll switch class 4 dms-200 entered service 1979 ottawa ontario dms-10 first commercially successful class 5 digital switch north american market profound impact industry numerous digital switching products introduced north american telephone market late 1970s nortel dms family still production genband acquired nortel cvas assets including dms line 2011 rolled ip-based genius platform genius-750nt first product include adaptive nano-tech compression resynchronization modules ericsson replace digital cross-connect dcs place since earliest dms releases previously new technology entered telecommunications industry slowly telephone companies amortizing equipment periods long forty years intending delay introduction digital switching 1990s dms introduction digital technology changed industry became one antecedents encouraged growth internet october 16 2006 nortel received special recognition award canada telecommunications hall fame role pioneering digital communications digital multiplex system dms name arose designation switching matrix design developed exploratory phase project digital multiplexed switch selected basic switching design project product intended successor nortel first electronic switch sp1 called sp2 however dms acronym mellifluous eventually 1975 adopted designation dms-10 dms-100 family products standing system rather switch applied entire digital switching family well dms-1 family digital transmission concentrators dms favoured many european cable operators switching platform voice networks dms-10 widely used rural wireline providers dms-100 200 switches widely deployed throughout u.s. canada regional bell operating companies bell canada independent telephone companies well us military dms-250 backbone number carriers long distance networks dms-300 international gateway switch dms-500 commonly deployed competitive local exchange carriers combines dms-100 250 capabilities dms switches run proprietary multitasking operating system known sos user interface called mapci consists series multi-level menus usually accessed connected vt100 compatible dumb terminal terminal emulator level overlay performs different functions
[ 8048, 11286 ]
Test
9,411
1
Codd's_theorem:codd theorem codd theorem states relational algebra domain-independent relational calculus queries two well-known foundational query languages relational model precisely equivalent expressive power database query formulated one language expressed theorem named edgar f. codd father relational model database management domain independent relational calculus queries precisely relational calculus queries invariant choosing domains values beyond appearing database queries may return different results different domains excluded example forbidden query query select tuples occurring relation r r relation database assuming different domains i.e. sets atomic data items tuples constructed query returns different results thus clearly domain independent codd theorem notable since establishes equivalence two syntactically quite dissimilar languages relational algebra variable-free language relational calculus logical language variables quantification relational calculus essentially equivalent first-order logic indeed codd theorem known logicians since late 1940s query languages equivalent expressive power relational algebra called relationally complete codd codd theorem includes relational calculus relational completeness clearly imply interesting database query expressed relationally complete languages well-known examples inexpressible queries include simple aggregations counting tuples summing values occurring tuples operations expressible sql relational algebra computing transitive closure graph given binary edge relation see also expressive power codd theorem also n't consider sql nulls three-valued logic entail logical treatment nulls remains mired controversy additionally sql allows duplicate rows multiset semantics nevertheless relational completeness constitutes important yardstick expressive power query languages compared
[ 4065, 4263, 5880, 9397, 4376 ]
None
9,412
4
Padding_oracle_attack:padding oracle attack cryptography padding oracle attack attack uses padding validation cryptographic message decrypt ciphertext cryptography variable-length plaintext messages often padded expanded compatible underlying cryptographic primitive attack relies padding oracle freely responds queries whether message correctly padded padding oracle attacks mostly associated cbc mode decryption used within block ciphers padding modes asymmetric algorithms oaep may also vulnerable padding oracle attacks symmetric cryptography padding oracle attack applied cbc mode operation oracle usually server leaks data whether padding encrypted message correct data allow attackers decrypt sometimes encrypt messages oracle using oracle key without knowing encryption key standard implementation cbc decryption block ciphers decrypt ciphertext blocks validate padding remove pkcs7 padding return message plaintext server returns invalid padding error instead generic decryption failed error attacker use server padding oracle decrypt sometimes encrypt messages mathematical formula cbc decryption depicted cbc decryption xors plaintext block previous ciphertext block result single-byte modification block formula_3 make corresponding change single byte formula_4 suppose attacker two ciphertext blocks formula_5 wants decrypt second block get plaintext formula_4 attacker changes last byte formula_3 creating formula_8 sends formula_9 server server returns whether padding last decrypted block formula_10 correct equal 0x01 padding correct attacker knows last byte formula_11 formula_12 therefore formula_13 padding incorrect attacker change last byte formula_8 next possible value attacker need make 256 attempts one guess every possible byte find last byte formula_4 decrypted block contains padding information bytes used padding additional attempt need made resolve ambiguity determining last byte formula_4 attacker use technique obtain second-to-last byte formula_4 attacker sets last byte formula_4 formula_19 setting last byte formula_3 formula_21 attacker uses approach described time modifying second-to-last byte padding correct 0x02 0x02 block consists 128 bits aes example 16 bytes attacker obtain plaintext formula_4 255⋅16 4080 attempts significantly faster formula_23 attempts required bruteforce 128-bit key original attack published 2002 serge vaudenay concrete instantiations attack later realised ssl ipsec also applied several web frameworks including javaserver faces ruby rails asp.net well software steam gaming client 2012 shown effective hardened security devices earlier attacks fixed tls implementors following public announcement new variant lucky thirteen attack published 2013 used timing side-channel re-open vulnerability even implementations previously fixed early 2014 attack longer considered threat real-life operation though still workable theory see signal-to-noise ratio certain class machines active area development attacks upon cryptographic protocols used secure internet traffic downgrade attack logjam export rsa/freak attacks trick clients using less-secure cryptographic operations provided compatibility legacy clients secure ones available attack called poodle late 2014 combines downgrade attack ssl 3.0 padding oracle attack older insecure protocol enable compromise transmitted data may 2016 revealed cve-2016-2107 fix lucky thirteen openssl introduced another padding oracle
[ 513, 517, 1157, 1288, 9744, 1683, 1688, 3742, 10526, 2083, 11044, 8358, 11693, 11569, 9394, 7736, 9281, 3657, 5834, 10831, 11345, 5590, 474, 3805, 7264, 8674, 7139, 10341, 5107, 501, 1526, 2169, 3707, 510, 4863 ]
Validation
9,413
4
Allot:allot allot ltd. formerly allot communications multinational offices subsidiaries many countries across world allot provider security monetization products allot solutions include deep packet inspection dpi technology change broadband pipes smart networks offering complete network visibility application control subscriber management 2016 company reported 90.4 million revenue allot founded 1996 michael shurman yigal jacoby served chief executive chairman 2006 jacoby previously founded armon networking manufacturer rmon-based network management solutions sold bay networks 33 million 1996 november 2003 deloitte touche named allot fourth fastest-growing company technology fast 50 list citing company revenue growth nearly 1,900 year time 2004 allot raised 38 million several rounds funding several venture capital funds including genesis partners gemini walden israel jafco investment bancboston capital jerusalem venture partners tamar technology ventures november 2006 allot became publicly traded company nasdaq global market ticker symbol allt ipo raised 78 million november 2010 allot dual listing tel aviv stock exchange approved allot partnered openet january 2011 optimize monetization mobile broadband networks allot featured deloitte fast 50 list 2014 131 growth 2009 2013 allot joined hp opennfv partner program july 2015 allowing expand traffic detection function security services onto hp opennfv platform nokia networks partnered allot january 2016 enhance visibility control security swisscom later year allot partnered intel security release mcafee unified security powered allot focused end-to-end security capabilities telefónica partnered allot february 2017 improve user experience enhance network-based security services also 2017 company announced partnerships several russian satellite network operators 2011 reported equipment sold allot illegally reached iran however january 2012 allot cleared ministry defense wrongdoing investigation concluded company unaware internet monitoring equipment sold danish distributor ended iranian hands also 2011 allot settled class-action lawsuit regarding securities fraud involving stock whereby agreed pay 1.3 million usd september 2002 allot acquired netreality provider network application priority switches naps order enhance quality service qos bandwidth management solutions allot acquired esphion new zealand–based developer network protection solutions carriers internet service providers january 2008 acquisition expanded allot mitigation security threats addition isolation remedy infected subscribers distributed denial service ddos attack prevention may 2012 allot acquired ortiva wireless san diego-based developer video traffic optimization equipment allot acquired oversi networks provider rich-media caching content delivery solutions internet video peer-to-peer p2p traffic july 2012 march 2015 allot acquired global security company optenet expanded company security-as-a-service offerings january 2018 allot acquired netonomy ltd. developer software-based cyber security connected home allot provides network intelligence solutions network-based security products communication service providers csps mobile broadband wireless broadband mobile satellite service dsl carriers well enterprises allot portfolio hardware platforms software applications employs dpi turn broadband pipes smart networks value-added internet services rapidly deployed released 2009 allot service gateway-sigma designed increase subscriber quality experience qoe ability generate additional revenue streams 2014 allot released allot service gateway tera unified framework physical virtual deployment across access networks december 2014 allot unveiled allot cloud access optimization designed enterprises cloud managed service providers three levels coverage used office 365 adds visibility control security applications allot smartengage designed enhance company engagement subscribers launched february 2015 smartengage uses allot service gateway traffic awareness feature suggest content based browsing activity may 2015 vodafone germany announced deployment allot websafe personal network-based security-as-a-service offering designed mobile users well small medium business clients includes anti-malware parental control options later year allot released allot service gateway-virtual edition allot sg-ve original service gateway introduced 2007 improve efficiency monetization options companies new framework integrates gateway framework virtual network remove physical hardware constraints february 2016 allot released allot service gateway 9500 expanding capabilities include enterprises data centers service providers june 2016 belgian cable company voo announced began using allot service gateway tera allot serviceprotector network traffic visibility analytics security along allot cmts manage congestion qos assurance 2017 allot released allot secure service gateway built allot service gateway utilizing real-time application-based traffic monitoring analytics deliver granular application level visibility ensure higher qoe users allot ssg combines application-based visibility control web security protects ddos attacks phishing threats
[ 704, 9413, 2409, 10283, 5276, 9465, 8668 ]
None
9,414
8
Social_Blade:social blade social blade sometimes spelled socialblade website tracks social media statistics analytics social blade notably tracks youtube platform also analytical information regarding twitch instagram twitter facebook mixer dailymotion social blade functions third-party respective social media platforms jason urgo ceo social blade jason urgo ceo social blade launched website february 2008 track statistics website digg 2010 website switched track youtube statistics october 2012 social blade became llc 2014 social blade launched consulting channel management services october 24 2018 social blade started popular live stream show subscriber difference t-series pewdiepie online competition stream regularly 900 viewers led large increase subscriber count accompany attention april 2019 social blade pulled april fools joke allowed users change subscriber counts ranks ridiculously high numbers frequently asked questions faq page social blade wrote order best scale tracking meet needs millions use social blade pull data youtube public api means 're getting information see public youtube channel pages work examine data across multiple days aggregate display format useful social blade website contains subscriber predictions social blade also provides real-time subscriber count updates social blade also noted work content creators youtube multi-channel networks mcns help creators get partnered official youtube twitter account teamyoutube wrote please know third party apps socialblade accurately reflect subscriber activity social blade twitter account responded tweet commenting n't make data get youtube api rely accuracy social blade community manager danny fratella suggested youtube content creators may notice subscriber view count purges due higher accessibility data-tracking tools like social blade social blade data analytics cited mainstream news media outlets money nbc huffpost outlets focused internet culture well kotaku polygon tubefilter aside using subscriber follower statistics reported social blade media outlets also cite social blade regards content creator account estimated earnings huffpost wrote social blade estimates earnings youtube channel based money generated every thousand ad views estimates n't exact instead create minimum maximum amount channel could earning cases range huge social blade support services manager jenna arnold stated range huge cpms cost per thousand views vary much anywhere 0.25 4.00 average urgo also commented 0.25– 4.00 per 1,000 views range stating data points change time time exact science generally hold true channels social blade blog also noted continuously updated articles news interest content creators helping stay top evolving trends ways better use youtube social media services
[ 735 ]
Test
9,415
8
Web_Services_Semantics:web services semantics web services semantics wsdl-s proposed extension wsdl standard wsdl-s extends standard wsdl include semantic elements improve reusability web services facilitating composition services improving discovery enabling integration legacy software web services framework wsdl-s developed ibm university georgia
[ 3323, 10020, 7878, 8070 ]
Test
9,416
9
Anaphoric_macro:anaphoric macro anaphoric macro type programming macro deliberately captures form supplied macro may referred anaphor expression referring another anaphoric macros first appeared paul graham lisp name reference linguistic anaphora—the use words substitute preceding words codice_1 macro ansi common lisp anaphoric binding codice_2 result test expression clause example sums value non-codice_3 elements codice_2 refers values elements equal codice_3 codice_2 bound output codice_7 true collecting numbers larger 3 one example anaphoric version if-then-else construct introduces anaphor codice_2 bound result test clause another example anaphoric version λ-function binds function anaphor codice_9 allowing recur
[ 3336, 5537, 2062, 6718 ]
None
9,417
3
Gemfire:gemfire gemfire released japan royal blood ロイヤルブラッド roiyaru buraddo super royal blood スーパーロイヤルブラッド sūpā roiyaru buraddo super famicom version medieval war game msx nintendo entertainment system super nes fm towns mega drive/genesis ms-dos later windows developed koei object game unify fictional island force players use infantry cavalry archers well fantasy units magicians dragons gargoyles order capture castle needed control particular territory sequel royal blood ii released japan market japanese windows game takes place fictitious isle ishmeria upon time six wizards wielding unique brand magic used powers protect island maintain peace disrupted collectively challenged fire dragon summoned forth wizard intent plunging country darkness sea-dwelling dragon peace known pastha charged six wizards task fighting back succeeded sealing fire dragon away ruby top crown became six jewels around crown base crown called gemfire symbol utmost power authority gemfire fell hands current king ishmeria eselred sought abuse object power using embark tyrannical reign instilling fear within oppressed subjects ishmeria fell despair power flourished finally young daughter princess robyn could bear watch father grievous misdeeds longer—she seized gemfire pried six wizard gems loose causing shoot upward sky circle briefly overhead scattering different parts ishmeria furious eselred learned robyn actions locked away tower futile deed already done robyn taken crucial first step toward freeing people meanwhile six wizards take residence prominent family ishmeria two powerful clans blanches led prince erin supported zendor emerald wizard wielder lightning lyles led prince ander backed pluvius sapphire wizard caster meteors four clans flax coryll chrysalis molbrew also wizards scylla empyron chylla skulryk respectively gemfire disposal beginning breaking spell gemfire clans sets unseat eselred claim throne restore order peace ishmeria outset game player option selecting scenario family chosen scenario changes relative power territories families although minor families present one two scenarios every family playable least one scenario except blanche lyle playable four lankshire played ultimately player must conquer entire map win game gameplay divided main world map screen individual battle screens map screen player allowed one action per turn in-game month per territory action player may hire move troops upgrade territory economy defenses engage diplomatic actions sabotage plunder neighboring territory attack adjacent enemy territory adjacent territories may attacked upon attacking attacked enemy focus shifts battle wherein player may field five units archers knights horsemen either wizard hired unit player moves individual companies troops map turn-based tactics fashion certain units may build fences keep enemies one army wins enemy base captured enemy units defeated enemy army runs food
[ 11477, 9166, 6797, 9006 ]
Validation
9,418
2
Preview_(macOS):preview macos preview image viewer pdf viewer macos operating system enables users view print digital images portable document format pdf files preview uses apple implementation pdf specification aqua graphical user interface quartz graphics layer imageio core image frameworks like macos originated nextstep operating system company next part every release nextstep os since 1989 preview open following file types version preview included os x 10.3 could loop animated gifs via optional play button could added toolbar os x 10.4 preview lost playback functionality animated gifs would instead display individual frames numbered sequence preview encrypt pdf documents restrict use example possible save encrypted pdf password required copy data document print however encrypted pdfs edited original author always keep unencrypted version features otherwise available professional pdf editing software provided preview possible extract single pages multi-page documents e.g pdf files sort pages drag drop single multiple pages several opened multi-page documents applications attaching opened email message preview offers basic image correction tools using core image processing technology implemented macos features like shape extraction color extraction cropping rotation tools annotating images preview uses vector shapes text image rasterized jpeg png another bitmap format pdf image documents also supplied keywords automatically indexed using macos system-wide spotlight search engine preview directly access image scanners supported macos import images scanner preview convert image formats export bmp jp2 jpeg pdf pict png sgi tga tiff using macos print engine based cups also possible print postscript file pdf-x file directly save file iphoto example scanned photos beginning mac os x 10.7 lion preview restricts format option popup menu save dialog commonly used types possible access full format list holding option key clicking format popup menu gif icns jpeg jpeg-2000 microsoft bmp microsoft icon openexr pdf photoshop png sgi tga tiff new edit button picture edited introduced version 7 edit button allows options insert shapes lines cropping among things os x 10.9.2 preview support iso-standardized pdf iso 32000 saving destroys aspects pdf files without warning user
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 7806, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 3790, 9430...
Train
9,419
9
Presentation_semantics:presentation semantics computer science particularly human-computer interaction presentation semantics specify particular piece formal language represented distinguished manner accessible human senses usually human vision example saying codice_1 must render text constructs using bold typeface specification presentation semantics syntax example interactive presentation semantics defining expected behavior hypertext link suitable syntax many markup languages like html css dsssl xsl-fo troff presentation semantics others like xml xlink xpath character encoding standards like unicode also presentation semantics one main goals style sheet languages like css separate syntax used define structured data syntax endowed presentation semantics used render data various ways
[ 8923, 11023, 479 ]
None
9,420
6
ReFS:refs resilient file system refs codenamed protogon microsoft proprietary file system introduced windows server 2012 intent becoming next generation file system ntfs refs designed overcome problems become significant years since ntfs conceived related data storage requirements changed key design advantages refs include automatic integrity checking data scrubbing removal need running chkdsk protection data degradation built-in handling hard disk drive failure redundancy integration raid functionality switch copy/allocate write data metadata updates handling long paths filenames storage virtualization pooling including almost arbitrarily sized logical volumes unrelated physical sizes used drives requirements arose two major changes storage systems usage – size storage use large massive arrays multi-terabyte drives fairly common need continual reliability result file system needs self-repairing prevent disk checking impractically slow disruptive along abstraction virtualization physical disks logical volumes refs initially added windows server 2012 aim gradual migration consumer systems future versions achieved windows 8.1 initial versions removed ntfs features disk quotas alternate data streams extended attributes re-implemented later versions refs early versions 2012–2013 refs similar slightly faster ntfs tests far slower full integrity checking enabled result attributed relative newness refs pre-release concerns also voiced one blogger storage spaces storage system designed underpin refs reportedly could fail manner prevented refs recovering automatically ability create refs volumes removed windows 10 2017 fall creators update editions except enterprise pro workstations would seem indicate microsoft longer intending refs general replacement ntfs least near future cluster size refs volume either 4 kib 64 kib ntfs features implemented refs include object ids 8.3 filename ntfs compression encrypting file system efs transactional ntfs hard links extended attributes disk quotas addition windows booted refs volume dynamic disks mirrored striped volumes replaced mirrored striped storage pools provided storage spaces however automated error-correction supported mirrored spaces data deduplication missing early versions refs. implemented v3.2 debuting windows server v1709 support alternate data streams initially implemented refs windows 8.1 64-bit server 2012 r2 file system reacquired support alternate data streams lengths 128k automatic correction corruption integrity streams used parity spaces refs initially unsuitable microsoft sql server instance allocation due absence alternate data streams march 2015 review state refs windowsnetworking.com stated ’ least time boot windows refs volume first versions refs ’ include file-level compression encryption disk quotas hard links advantages ntfs fat file systems note refs support sparse files reparse points case-sensitive file names unicode file names perhaps important preserves enforces access control lists acls ’ obvious refs current iteration replacement ntfs ... applications rely specific ntfs features might work refs ... however ... storage conventional data ’ require specific ntfs features ’ supported refs refs handle duty nicely primary use case file servers store extremely large amounts data data integrity recovery mechanisms built file system well means tools designed detect repair file corruption file systems ’ necessary incompatibility refs ’ really issue additionally although refs ’ support file level encrypting file system encryption bitlocker used protect refs volumes ’ much issue either ... refs distinct advantages current reigning windows file system ntfs also drawbacks boasts self-healing powers ability repair files without time less risk data lost ’ power failure due way writes metadata course ability create huge volumes files even give files names longer 255 characters wish ’ quite ready prime time yet refs different versions various degrees compatibility operating system versions aside development versions filesystem usually later operating system versions mount filesystems created earlier os versions backwards compatibility features may compatible feature set os version cluster size features filesystem queried command fsutil fsinfo refsinfo volumename notes issues identified suggested refs running storage spaces intended design include storage developer conference 2015 microsoft developer presented enhancements refs expected released windows server 2016 included technical preview 4 titled refs v2 highlighted refs included capabilities high speed moving reordering cloning blocks files done blocks file particularly needed virtualization stated allow fast provisioning diff merging tiering enhancements cover redo log synchronous disk writes parallelization efficient tracking uninitialized sparse data files efficient 4k i/o refs file integrity enabled also acts like log-structured file system coalescing small random writes large sequential ones efficiency operating systems competing file systems refs best known zfs btrfs sense three designed integrate data protection snapshots silent high speed background healing corruption data errors 2012 phoronix wrote analysis refs vs btrfs copy-on-write file system linux features similar supporting checksums raid-like use multiple disks error detection/correction however refs lacks copy-on-write snapshots compression found btrfs zfs 2014 review refs assessment readiness production use concluded refs least advantages two main file system competitors
[ 5120, 2564, 11270, 5643, 6669, 3598, 4624, 10257, 9236, 6677, 5142, 8214, 537, 3611, 540, 3102, 9249, 9762, 8227, 8740, 5158, 1577, 10281, 2101, 7225, 11323, 10812, 3648, 10306, 8772, 582, 9286, 10310, 1098, 7754, 10828, 4173, 4174, 9808, ...
Train
9,421
4
ChronoSync:chronosync chronosync macos application periodic backups bootable drive clones folder synchronizations offers ability target device folder visible finder volume thumb drive nas disk image server another mac 2014 chronosync received top software pick about.com received 10 10 rating apple daily report
[ 1358 ]
Validation
9,422
3
SPARCstation_1:sparcstation 1 sparcstation 1 sun 4/60 first sparcstation series sparc-based computer workstations sold sun microsystems distinctive slim enclosure square 3 inch high pizza box first sold april 1989 sun support ending 1995 based lsi logic risc cpu running 20 mhz weitek 3170 3172 fpu coprocessor fourth sun computer 4/260 4/110 4/280 use sparc architecture first sun4c architecture motherboard offered three sbus slots built-in aui ethernet 8 khz audio 5 mb/s scsi-1 bus basic display ran 1152×900 256 colours monitors shipped computer 16 19 inch greyscale colour designed ease production compete high-end pcs macs principal competitors macintosh ii ibm ps/2 model 80 next computer sun 3/80 sold us 9,000 hard disks us 20,000 — first year around 35,000 units sold sparcstation 1 features several distinctive design packaging elements driven internally system designer andy bechtolsheim externally design house frogdesign bechtolsheim specified motherboard would size sheet paper sbus expansion cards would size index cards resulting extremely compact footprint external design motif includes dot-patterned cooling vents side echoed dimple pattern front face sun purple feet sparcstation 1 takes 30 pin simms groups four take either 1 mb 4 mb simms long size consistent within bank total four memory banks give total 64 mb memory memory bank nearest floppy disk drive filled first openboot firmware hang memory checking sparcstation 1 space two hard drives one floppy drive internally machine take 50 pin scsi-2 hard drive openboot firmware boot partition starts ends 1024 mb floppy drive like macintosh unusual electromechanical eject mechanism rather conventional eject button therefore must ejected operating system openboot machine connect scsi cd drive via either scsi connector back connecting spare internal scsi connector via 50 pin cable sparcstation 1 comes on-board amd lance ethernet chipset 15-pin aui connector connect 10base2 10base5 10baset via appropriate transceiver openboot rom able boot network using rarp tftp like sparcstation systems sparcstation 1 holds system information mac address serial number nvram battery chip dies system able boot sparcstation 1 uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sparcstation 1s made older battery life chip substantial number systems refuse boot additionally sparcstation 1 design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal sparcstation 1 1+ ipc slc run following operating systems sparcstation 1+ sun 4/65 pushed cpu 25 mhz lsi l64801 upgraded coprocessor weitek 3172 installed new scsi controller sparcstation ipc sun 4/40 version sparcstation 1+ lunchbox style case onboard video sparcstation slc sun 4/20 version sparcstation 1+ built monitor cabinet sparcstation 2 sun 4/75 machine successor released 1990
[ 7104, 9665, 9955, 10436, 4581, 4741, 10982, 823, 2895, 1776, 6129, 6415, 1461, 6006, 1399, 5498 ]
None
9,423
4
Check_Point_Integrity:check point integrity check point integrity endpoint security software product developed check point software technologies designed protect personal computers networks connect computer worms trojan horses spyware intrusion attempts hackers software aims stop new pc threats attacks signature updates installed pc software includes administrator manages security policies apply groups users central console server check point acquired integrity software part acquisition endpoint security start-up zone labs 2004 integrity software released early 2002 derived zonealarm security technology added central policy management network access control functions integrity integrated network gateways cisco vpn 3000 series ensure pc met security requirements granted access network demand endpoint security grew 2003 sql slammer blaster computer worms reportedly caused extensive damage despite widespread use antivirus software personal computers number destructive worms followed subsequent rise spyware significant problem continued increase demand endpoint security products data privacy integrity regulations required security audits mandated governmental professional authorities along infections damage caused guest pc access also prompted use security software competitors include symantec/sygate cisco security agent mcafee entercept even point products like determina memory firewall
[ 1792, 2049, 4480, 2563, 10756, 6797, 1172, 9496, 10392, 3482, 1436, 2041, 4511, 6431, 10531, 5924, 550, 8998, 10790, 3243, 1708, 3885, 10872, 2737, 6834, 8753, 823, 569, 5178, 11577, 9279, 5057, 1858, 10433, 11073, 2118, 4814, 10574, 7121, ...
Test
9,424
4
Pwn2Own:pwn2own pwn2own computer hacking contest held annually cansecwest security conference beginning 2007 contestants challenged exploit widely used software mobile devices previously unknown vulnerabilities winners contest receive device exploited cash prize masters jacket celebrating year win name pwn2own derived fact contestants must pwn hack device order win pwn2own contest serves demonstrate vulnerability devices software widespread use also providing checkpoint progress made security since previous year first contest conceived developed dragos ruiu response frustration apple lack response month apple bugs month kernel bugs well apple television commercials trivialized security built competing windows operating system time widespread belief despite public displays vulnerabilities apple products os x significantly secure competitors march 20 roughly three weeks cansecwest year ruiu announced pwn2own contest security researchers dailydave mailing list contest include two macbook pros would leave conference floor hooked wireless access point conference attendee could connect wireless access point exploit one devices would able leave conference laptop monetary reward ruiu outlined would progressively loosened restrictions hacks acceptable three days conference first day conference ruiu asked terri forslof zero day initiative zdi participate contest zdi programme purchases zero-day attacks reports affected vendor turns signatures network intrusion detection system increasing effectiveness vulnerabilities sold zdi made public affected vendor issued patch forslof agreed zdi offer purchase vulnerabilities used contest flat price 10,000 first contest intended highlight insecurity apple mac os x operating system since time widespread belief os x far secure competitors contest took place thursday april 18 saturday april 20 2007 two macbook pro laptops one 13 one 15 left conference floor cansecwest joined separate wireless network certain attacks allowed restrictions progressively loosened three days conference order win 15 macbook pro contestants would required escalate privileges root gaining access initial exploit 10,000 prize announced zdi laptops hacked first day shane macaulay called former co-worker dino dai zovi new york urged compete second day starting thursday night dai zovi found exploited previously unknown vulnerability quicktime library loaded safari 3am night following morning dai zovi packaged exploit code sent macaulay conference vancouver macaulay placed dai zovi exploit code website e-mailed contest organizers link clicked contest laptop dai zovi exploit code allowed shane take control laptop winning contest proxy dai zovi thank helping win contest dai zovi let macaulay keep 15 macbook pro dai zovi separately sold vulnerability zdi 10,000 prize successful 2007 contest scope pwn2own contest expanded include wider array operating systems browsers contest would demonstrate widespread insecurity software widespread use consumers dragos refined contest help wide panel industry experts contest administered zdi would offer purchase vulnerabilities demonstration vulnerabilities zdi purchases details vulnerabilities used pwn2own would provided affected vendors public details would withheld patch made available contestants successfully demonstrated exploits contest could sell vulnerabilities zdi prizes 20,000 first day 10,000 second day 5,000 third day pwn2own 2008 took place thursday march 26 saturday march 28 2008 2008 contest three different target laptops running default installation either windows vista ultimate sp1 os x 10.5.2 ubuntu linux 7.10 previous year contest pwn2own took place course three days certain attacks allowed day laptop running os x exploited second day contest exploit safari browser co-written charlie miller jake honoroff mark daniel independent security evaluators exploit targeted open-source subcomponent safari browser laptop running windows vista sp1 exploited third day contest exploit adobe flash co-written shane macaulay alexander sotirov derek callaway contest adobe disclosed co-discovered vulnerability internally working patch time pwn2own laptop running ubuntu exploited considerably success targeting web browsers category software third pwn2own focused popular browsers used consumer desktop operating systems added another category mobile devices contestants challenged hack via many remote attack vectors including email sms messages website browsing pwn2own 2009 took place three days cansecwest thursday march 18 saturday march 20 2009 contestants demonstrated successful exploits contest offered rewards underlying vulnerabilities zdi 5,000 browser exploits 10,000 mobile exploits browser targets internet explorer 8 firefox chrome installed sony vaio running windows 7 beta safari firefox installed macbook running mac os x browsers fully patched default configurations first day contest previous years attack surface contest expanded three days multiple winners per target allowed first contestant exploit laptop would get mobile device targets included blackberry android iphone symbian windows mobile phones default configurations specific devices included browser contest attack surface available contestants expanded three days order prove able successfully compromise device contestants demonstrate could collect sensitive data mobile device incur type financial loss mobile device owner multiple winners per device allowed first contestant exploit mobile device would get along one-year phone contract based increased interest competing year zdi arranged random selection determine team went first target first contestant selected charlie miller exploited safari os x without aid browser plugins interviews winning contest miller stressed took minutes run exploit safari took many days research develop exploit used researcher identified nils selected go miller nils successfully ran exploit internet explorer 8 windows 7 beta writing exploit nils bypass anti-exploitation mitigations microsoft implemented internet explorer 8 windows 7 including data execution protection dep address space layout randomization aslr nils continued trying browsers although miller already exploited safari os x nils exploited platform moved exploit firefox successfully near end first day julien tinnes sami koivu remote successfully exploited firefox safari os x vulnerability java time os x java enabled default allowed reliable exploitation platform however due reported vulnerabilities vendor already tinnes participation fell outside rules contest unable rewarded next days contest attract additional contestants chrome well mobile devices went unexploited pwn2own 2009 competition started march 24 2010 total cash prize pool us 100,000 march 15—nine days contest begin—apple released sixteen patches webkit safari 40,000 100,000 reserved web browsers target worth 10,000 60,000 total 100,000 cash prize pool allotted mobile phone portion contest target worth 15,000 opera web browser left contests target zdi team argued opera low market share chrome safari included due default presence various mobile platforms however opera rendering engine presto present millions mobile platforms 2011 contest took place march 9 11th cansecwest conference vancouver canada web browser targets 2011 contest included microsoft internet explorer apple safari mozilla firefox google chrome new pwn2own contest fact new attack surface allowed penetrating mobile phones specifically cellphone basebands mobile phone targets dell venue pro running windows phone 7 iphone 4 running ios blackberry torch 9800 running blackberry os 6.0 nexus running android 2.3 following teams registered desktop browser contest mobile browser category following teams registered first day competition safari internet explorer defeated researchers safari version 5.0.3 installed fully patched mac os x 10.6.6 french security firm vupen first attack browser five seconds browser visited specially crafted malicious web page launched standard harmless payload demonstrate arbitrary code executed written file hard disk demonstrate sandbox bypassed internet explorer 32-bit version 8 installed 64-bit windows 7 service pack 1 security researcher stephen fewer harmony security successful exploiting ie demonstrated safari day 2 iphone 4 blackberry touch 9800 exploited iphone running ios 4.2.1 however flaw exists version 4.3 ios security researchers charlie miller dion blazakis able gain access iphone address book vulnerability mobile safari visiting exploit ridden webpage blackberry torch 9800 phone running blackberry os 6.0.0.246 team vincenzo iozzo willem pinckaers ralf philipp weinmann took advantage vulnerability blackberry webkit based web browser visiting previously prepared webpage firefox android windows phone 7 scheduled tested day 2 security researchers chosen platforms attempt exploits sam thomas selected test firefox withdrew stating exploit stable researchers chosen test android windows phone 7 show teams showed day three chrome firefox hacked 2012 rules changed capture-the-flag style competition point system new format caused charlie miller successful event past years decide attend pwn2own chrome successfully exploited first time vupen declined reveal escaped sandbox saying would sell information internet explorer 9 windows 7 successfully exploited next firefox third browser hacked using zero day exploit safari mac os x lion browser left standing conclusion zero day portion pwn2own versions safari fully patched running mac os x snow leopard compromised cve portion pwn2own noted significant improvements security mitigations within mac os x introduced lion google withdrew sponsorship event 2012 rules require full disclosure exploits winners specifically exploits break sandboxed environment demonstrated exploits win pwn2own defended decision saying believed hackers would attempt exploit chrome methods disclosed google offered separate pwnium contest offered 60,000 chrome-specific exploits non-chrome vulnerabilities used guaranteed immediately reported appropriate vendor sergey glazunov teenager identified pinkiepie earned 60,000 exploits bypassed security sandbox google issued fix chrome users less 24 hours pwnium exploits demonstrated google returned sponsor rules changed require full disclosure exploits techniques used web browsers google chrome internet explorer firefox along windows 8 java exploited french security firm vupen successfully exploited fully updated internet explorer 10 microsoft surface pro running 64-bit version windows 8 fully bypassed protected mode sandbox without crashing freezing browser vupen team exploited mozilla firefox adobe flash oracle java nils jon mwrlabs successful exploiting google chrome using webkit windows kernel flaws bypass chrome sandbox 100,000 george hotz exploited adobe acrobat reader escaped sandbox win 70,000 james forshaw joshua drake ben murphy independently exploited oracle java win 20,000 apple safari mountain lion targeted teams showed mobile pwn2own 2013 contest held november 13–14 2013 pacsec 2013 conference tokyo japan pinkie pie 50,000 google released chrome updates 14 nov address vulnerabilities exploited pwn2own 2014 vupen successfully exploited fully updated internet explorer 11 adobe reader xi google chrome adobe flash mozilla firefox 64-bit version windows 8.1 win total 400,000—the highest payout single competitor date company used total 11 distinct zero-day vulnerabilities nico joly vupen team—was sole competitor take windows phone lumia 1520 year entering exploit aimed ie 11 mobile successfully able exfiltrate cookie database however sandbox held unable gain full control system apple safari mac os x mavericks adobe flash windows 8.1 successfully exploited liang chen keen team zeguang zhao team509 collected 140,000 prize money internet explorer 11 windows 8.1 successfully exploited sebastian apelt andreas schmidt prize 100,000 mozilla firefox exploited jüri aedla mariusz młyński george hotz independently winning 50,000 anonymous participant exploited google chrome however upon review contest judges declared partial win due one portion presentation ’ collision vulnerability exploited earlier week pwnium competition 2015 every single prize available claimed 2016 chrome microsoft edge safari hacked according brian gorenc manager vulnerability research hpe chosen include firefox year wanted focus browsers made serious security improvements last year 2017 chrome successful hacks although one team attempted target chrome subsequent browsers best fared order firefox safari edge 2018 conference much smaller sponsored primarily microsoft shortly conference microsoft patched several vulnerabilities edge causing many teams withdraw nevertheless certain openings found edge safari firefox hack attempts made chrome although reward offered edge many microsoft products large rewards available anyone able gain access edge successfully exploited
[ 1664, 6528, 6657, 3971, 9732, 3205, 3462, 7943, 8584, 11655, 3473, 2579, 7572, 8212, 7449, 10393, 7965, 10910, 8351, 928, 161, 2208, 5026, 7713, 11559, 1834, 9770, 7340, 5677, 9518, 559, 9908, 4661, 6326, 3639, 5176, 11449, 4283, 2492, 70...
None
9,425
9
Walter_Bright:walter bright walter bright american computer programmer created programming language zortech c++ compiler empire computer game bright main developer first c++ compiler translate source code directly object code without using c intermediate zortech c++ later becoming symantec c++ digital mars c++ designing c++ compiler developed datalight c compiler also sold zorland c later zortech c. bright graduated caltech 1979 bachelor science aerospace engineering university wrote empire wargame pdp-10 mainframe completed 1977 walter bright creator programming language implemented compilers several languages considered expert many areas related compiler technology walter regularly writes scientific magazine articles compilers programming blogger dr. dobb journal hired facebook write fast c/c++ preprocessor
[ 1952, 9569, 5165, 3990, 8057, 8474, 380, 2045 ]
Test
9,426
4
National_Strategy_to_Secure_Cyberspace:national strategy secure cyberspace united states government national strategy secure cyberspace component larger national strategy homeland security national strategy secure cyberspace drafted department homeland security reaction september 11 2001 terrorist attacks released february 14 2003 offers suggestions mandates business academic individual users cyberspace secure computer systems networks prepared year research businesses universities government five months public comment plan advises number security practices well promotion cyber security education national strategy secure cyberspace identifies three strategic objectives 1 prevent cyber attacks america critical infrastructures 2 reduce national vulnerability cyber attacks 3 minimize damage recovery time cyber attacks occur meet objectives national strategy outlines five national priorities first priority creation national cyberspace security response system focuses improving government response cyberspace security incidents reducing potential damage events second third fourth priorities development national cyberspace security threat vulnerability reduction program creation national cyberspace security awareness training program necessity securing governments cyberspace aim reduce threats vulnerabilities cyber attacks fifth priority establishment system national security international cyberspace security cooperation intends prevent cyber attacks could impact national security assets improve international management response attacks ultimately national strategy encourages companies regularly review technology security plans individuals use internet add firewalls anti-virus software systems calls single federal center help detect monitor analyze attacks expanded cyber security research improved government-industry cooperation
[ 5002, 10859, 5341 ]
None
9,427
3
Socket_FT1:socket ft1 socket ft1 bga413 cpu socket released january 2011 amd apus codenamed desna ontario zacate hondo uber name brazos available chipsets consult fusion controller hubs fch
[ 3586, 9475, 3588, 8452, 9092, 10375, 3464, 4872, 5645, 398, 7058, 10260, 2719, 4767, 2463, 2850, 7712, 9122, 1322, 2094, 11183, 1329, 6705, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 11080, 2764, 7247, 9551, 7122, 7132, 2525, 9057, 4451, ...
Validation
9,428
3
XOP_instruction_set:xop instruction set xop extended operations instruction set announced amd may 1 2009 extension 128-bit sse core instructions x86 amd64 instruction set bulldozer processor core released october 12 2011 however amd removed support xop zen microarchitecture onward xop instruction set contains several different types vector instructions since originally intended major upgrade sse instructions integer instructions also contains floating point permutation floating point fraction extraction instructions see index list instruction types xop revised subset originally intended sse5 changed similar overlapping avx parts overlapped avx removed moved separate standards fma4 floating-point vector multiply–accumulate cvt16 half-precision floating-point conversion implemented f16c intel sse5 instructions equivalent similar instructions avx fma4 instruction sets announced intel changed use coding proposed intel integer instructions without equivalents avx classified xop extension xop instructions opcode byte 8f hexadecimal otherwise almost identical coding scheme avx 3-byte vex prefix commentators seen evidence intel allowed amd use part large vex coding space amd forced use different codes order avoid using code combination intel might possibly using development pipeline something else xop coding scheme close vex scheme technically possible without risking amd codes overlap future intel codes inference speculative since public information available negotiations two companies issue use 8f byte requires m-bits see vex coding scheme value larger equal 8 order avoid overlap existing instructions c4 byte used vex scheme restriction may prevent use m-bits purposes future xop scheme vex scheme another possible problem pp bits value 00 xop scheme value 01 vex scheme instructions legacy equivalent may complicate use pp bits purposes future similar compatibility issue difference fma3 fma4 instruction sets intel initially proposed fma4 avx/fma specification version 3 supersede 3-operand fma proposed amd sse5 amd adopted fma4 intel canceled fma4 support reverted fma3 avx/fma specification version 5 see fma history march 2015 amd explicitly revealed description patch gnu binutils package zen third-generation x86-64 architecture first iteration znver1 – zen version 1 support tbm fma4 xop lwp instructions developed specifically bulldozer family micro-architectures integer version fma instruction set four operand instructions similar fma4 operate signed integers horizontal addition instructions adds adjacent values input vector output size instructions describes wide horizontal addition performed instance horizontal byte word adds two bytes time returns result vector words byte quadword adds eight bytes together time returns result vector quadwords six additional horizontal addition subtraction instructions found ssse3 operate two input vectors two two operations set vector compare instructions take immediate extra argument immediate controls kind comparison performed eight comparison possible instruction vectors compared comparisons evaluate true set corresponding bits destination 1 false comparisons sets bits 0 result used directly vpcmov instruction vectorized conditional move vpcmov works bitwise variant blend instructions sse4 bit selector 1 selects bit first source 0 selects second source used together xop vector comparison instructions used implement vectorized ternary move second input destination conditional move cmov shift instructions differ sse2 shift unit different amount using vector register interpreted packed signed integers sign indicates direction shift rotate positive values causing left shift negative right shift intel specified different incompatible set variable vector shift instructions avx2 vpperm single instruction combines ssse3 instruction palignr pshufb adds compare altivec instruction vperm takes three registers input first two source registers third selector register byte selector selects one bytes one two input registers output selector also apply effects selected bytes setting 0 reverse bit order repeating signicating bit effects input addition inverted vpermil2pd vpermil2ps instructions two source versions vpermilpd vpermilps instructions avx means like vpperm select output fields two inputs instructions extracts fractional part floating point part would lost conversion integer
[ 9092, 2821, 1798, 4491, 6924, 4237, 5645, 10383, 6038, 9369, 7963, 9500, 2719, 1915, 2088, 2094, 9391, 8120, 8506, 1085, 8125, 8126, 833, 7234, 9541, 3142, 5326, 977, 2514, 5844, 8795, 2655, 1122, 7783, 10985, 9964, 5358, 9582, 8944, 499,...
Test
9,429
5
Directory_information_tree:directory information tree directory information tree dit data represented hierarchical tree-like structure consisting distinguished names dns directory service entries x.500 protocols lightweight directory access protocol ldap use directory information trees fundamental data structure typically x.500 ldap deployment single organization directory information tree consists two parts top level directory information tree frequently represent political geographic divisions original assumption x.500 directory servers would interconnected form single global namespace entries top level tree corresponded countries identified iso 3166 two letter country code entries subordinate country entry would correspond states provinces national organizations naming system particular country determined country national standards body telecommunications provider limitation original directory information tree structure assumption applications searching entry particular organization would navigate directory tree first browsing particular country organization based region organization based locate entry organization search within organization entry question desire support searching broadly individual person particulars person location organization known led experiments directory deployment interconnection common indexing protocol today ldap deployments particular active directory deployments interconnected single global naming space use national country codes basis naming instead deployments follow directory structure top level mirrors domain name system described rfc 2247 example entry organization domain name example.com would distinguished name dc=example dc=com entries organization directory information tree would contain distinguished name suffix elements organization represented directory e.g. people roles devices dit may modeled variety techniques determining factors include early deployments x.500 within corporations institutions entries representing employees organizations often used dit structure mirrored organizational structure organizational unit entries corresponding departments divisions organization relative distinguished names entries employees often formed common names individual employees example dn early x.500/ldap deployment might cn=joe bloggs ou=marketing ou=operations o=example corporation st=ca c=us disadvantage approach organizational structure changed employees change legal name require moving renaming entries directory adds complexity overhead also upset applications designed deal gracefully moves today many large deployments x.500 ldap use single flat namespace entries choose name entries individuals based relative distinguished name organizationally-assigned identifier username employee number today dn might resemble uid=00003 ou=people dc=example dc=com advantage structure entries need moved even employees change name transferred different departments changes effected attribute modification applications may using dn unique identifier e.g database need touched
[ 929, 2887, 6710, 6651, 10238 ]
Test
9,430
2
Core_Animation:core animation core animation graphics compositing framework used macos mac os x leopard later ios watchos tvos produce animated user interfaces core animation provides way developers produce animated user interfaces via implicit animation model well explicit model developer specifies original final states object core animation handles interpolation allows animated interfaces created relative ease specific code animation required developer core animation animate visual element provides unified way accessing core image core video quartz technologies core animation rendering accelerated graphics processor gpu animated sequences execute thread independent main run loop allowing application processing occur animation progress way application performance affected animations stopped reversed retargeted progress core animation first appeared mac os x leopard actually first emerged iphone software team shown publicly first time august 7 2006 wwdc 2006 macworld expo 2007 apple announced iphone runs specially adapted version os x uses core animation
[ 10755, 9732, 4615, 1549, 5647, 7697, 1042, 11289, 6186, 4139, 6700, 4657, 1074, 8754, 9784, 8253, 576, 9802, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 8806, 3691, 8303, 2673, 6771, 2676, 6264, 7292, 26...
Test
9,431
9
ASCEND:ascend ascend open source mathematical modelling chemical process modelling system developed carnegie mellon university since late 1978 ascend acronym stands advanced system computations engineering design main uses field chemical process modelling although capabilities general ascend includes nonlinear algebraic solvers differential/algebraic equation solvers nonlinear optimization modelling multi-region 'conditional models matrix operations supported efficient sparse matrix solver called mtx ascend differs earlier modelling systems separates solving strategy model building domain experts people writing models computational engineers people writing solver code work separately developing ascend together number early modelling tools architecture helped inspire newer languages modelica recognised flexible use variables parameters always treats solvable desired software remains active open-source software project part google summer code programme 2009 2010 2011 2012 2013 python software foundation accepted 2015 programme well
[ 9376, 7593, 8554, 587, 6797, 7983, 8113, 823, 9915, 2045 ]
Test
9,432
4
Memory_corruption:memory corruption memory corruption occurs computer program contents memory location modified due programmatic behavior exceeds intention original programmer program/language constructs termed violating memory safety likely cause memory corruption programming error corrupted memory contents used later program leads either program crash strange bizarre program behavior nearly 10 application crashes windows systems due heap corruption modern programming languages like c c++ powerful features explicit memory management pointer arithmetic features designed developing efficient applications system software however using features incorrectly may lead memory corruption errors memory corruption one intractable class programming errors two reasons memory corruption errors broadly classified four categories many memory debuggers purify valgrind insure++ parasoft c/c++test addresssanitizer available detect memory corruption errors
[ 1409, 7173, 4112, 4240, 3871, 1952, 161, 1954, 8609, 7462, 9854, 10412, 814, 815, 11446, 5176, 2620, 1474, 6477, 10703, 8531, 3413, 8280, 7421, 3553, 11106, 8037, 10470, 3048, 5872, 9714, 5365, 10492, 2045, 2558 ]
Test
9,433
4
The_Hacker_Crackdown:hacker crackdown hacker crackdown law disorder electronic frontier work nonfiction bruce sterling first published 1992 book discusses watershed events hacker subculture early 1990s notable topic covered operation sundevil events surrounding 1987–1990 war legion doom network raid steve jackson games trial knight lightning one original journalists phrack subsequent formation electronic frontier foundation book also profiles likes emmanuel goldstein publisher former assistant attorney general arizona gail thackeray fletc instructor carlton fitzpatrick mitch kapor john perry barlow 1994 sterling released book internet new afterword though published 1992 released freeware electronic book 1994 book offers unique colorful portrait nature cyberspace early 1990s nature computer crime time events sterling discusses occur cusp mass popularity internet arguably achieved critical mass late 1994 also encapsulates moment information age revolution cyberspace morphed realm telephone modems bbs internet world wide web cory doctorow voiced unabridged podcast book said inspired politically artistically socially
[ 1121, 8321, 4435, 2261, 119, 4956 ]
Validation
9,434
2
Microsoft_XNA:microsoft xna microsoft xna recursive acronym xna acronymed freeware set tools managed runtime environment provided microsoft facilitates video game development management xna based .net framework versions run windows nt windows phone xbox 360 xna content built xna game studio played using xna framework windows games published native executables xbox 360 windows phone zune many respects xna thought .net analog microsoft better known game development system directx aimed developers primarily interested writing lightweight games run variety microsoft platforms xna basic platform xbox live indie games xna toolset announced march 24 2004 game developers conference san jose california first community technology preview xna build released march 14 2006 xna game studio 2.0 released december 2007 followed xna game studio 3.0 october 30 2008 xna game studio 4.0 released september 16 2010 along windows phone development tools according email sent 31 january 2013 xna longer developed supported new metro interface layers windows 8 windows rt platform open source cross platform version microsoft xna 4 application programming interface called monogame developed crossplatform reimplementation xna api called fna exists well microsoft xna framework based native implementation .net compact framework 2.0 xbox 360 development .net framework 2.0 windows includes extensive set class libraries specific game development promote maximum code reuse across target platforms framework runs version common language runtime optimized gaming provide managed execution environment runtime available windows xp windows vista windows 7 windows phone xbox 360 since xna games written runtime run platform supports xna framework minimal modification games run framework technically written .net-compliant language c xna game studio express ide versions visual studio 2008 2010 xna 4.0 officially supported support visual basic .net added 2011 xna framework encapsulates low-level technological details involved coding game making sure framework takes care difference platforms games ported one compatible platform another thereby allowing game developers focus content gaming experience xna framework integrates number tools cross-platform audio creation tool xact aid content creation xna framework provides support 2d 3d game creation allows use xbox 360 controllers vibrations xna framework games target xbox 360 platform could distributed members microsoft xna creator club/app hub carried 99/year subscription fee desktop applications distributed free charge microsoft current licensing xna build set game asset pipeline management tools help defining maintaining debugging optimizing game asset pipeline individual game development efforts game asset pipeline describes process game content textures 3d models modified form suitable use gaming engine xna build helps identify pipeline dependencies also provides api access enable processing dependency data dependency data analyzed help reduce size game finding content actually used example xna build analysis revealed 40 textures shipped mechcommander 2 unused could omitted xna game studio programming environment development games five revisions released far 2015 new versions developed xna game studio express first version released august 30 2006 intended students hobbyists independent homebrew game developers available free download express provides basic starter kits rapid development specific genres games platform games real-time strategy first-person shooters developers could create windows games free xna framework run games xbox 360 pay annual fee us 99 four-month fee us 49 admission microsoft xna creator club update xna developers could compile xbox 360 binaries share microsoft xna creator club members xna game studio 2.0 released december 13 2007 xna game studio 2.0 features ability used versions visual studio 2005 including free visual c 2005 express edition networking api using xbox live windows xbox 360 better device handling xna game studio 3.0 visual studio 2008 free visual c 2008 express edition allows production games targeting zune platform adds xbox live community support released october 30 2008 supported c 3.0 linq versions visual studio 2008 xna game studio 4.0 released september 16 2010 added support windows phone platform including 3d hardware acceleration framework hardware profiles configurable effects built-in state objects graphics device scalars orientation cross-platform multi-touch input microphone input buffered audio playback visual studio 2010 integration xna game studio 4.0 refresh released 6 october 2011 added support windows phone 7.5 mango visual basic xna framework content pipeline set tools allows visual studio xna studio act key design point around organizing consuming 3d content formerly known xna game studio professional xdk extensions add-on xna game studio requires microsoft xbox 360 development kit available licensed xbox developers extensions include additional managed apis achievements leaderboards features reserved licensed game titles titles developed using xdk extensions include winners microsoft dream.build.play competition among others heavily publicized microsoft xna framework 2.0 eula specifically prohibits distribution commercial networked games connect xbox live and/or games windows live absence specific agreement signed developer microsoft means xna game studio still used develop commercial games programs windows platform although microsoft networking support code xbox/windows live used self-developed network code still used inside developer xna project games created using xna game studio may distributed via windows phone marketplace formerly via xbox live indie games software may also used create commercial games target windows dream build play annual global 75,000 microsoft contest promoting microsoft xna eventually xbox live indie games although predated contest first announced 2006 first opened january 2007 many winners notable developers indie game community xbox 360 games written xna game studio could submitted app hub premium membership required us 99/year games submitted app hub subjected peer review creators game passed review would listed xbox live marketplace creators could set price 80 240 400 points game creator paid 70 total revenue game sales baseline microsoft originally planned take additional percentage revenue provided additional marketing game policy rescinded march 2009 leaving flat rate intact regardless promotion microsoft also distributed free year premium app hub subscription educational establishments dreamspark program msdnaa accounts allowed students develop games xbox 360 developers still needed premium xbox live account submit game marketplace project called mono.xna formed port xna open source cross-platform mono framework codebase mono.xna silversprite new project called monogame formed port xna several mobile devices version 3.0.1 released march 3 2013 support stable ios android including ouya macos linux metro windows 8 windows rt windows phone 8 well playstation mobile 2d playstation mobile 3d raspberry pi development currently progress fna game porter ethan lee full-featured open source reimplementation xna forked monogame used many games seen goal fna preserve xna game library reimplementing xna open source project called grommet contains limited port embedded devices using .net micro framework project called anx available implements version xna using sharpdx stack support linux macos playstation vita progress well using anx developers able write games using code similar xna still considered metro application windows 8
[ 10243, 4624, 10769, 9234, 1043, 2589, 1055, 2083, 8227, 1577, 2603, 4143, 9263, 11316, 1077, 6709, 8246, 8771, 8262, 4174, 4178, 83, 9812, 9813, 4182, 10841, 603, 608, 2145, 5743, 8303, 8304, 1656, 9848, 5754, 1148, 9340, 5761, 1666, 9348...
None
9,435
4
Transient_execution_CPU_vulnerabilities:transient execution cpu vulnerabilities transient execution cpu vulnerabilities vulnerabilities computer system speculative execution optimization implemented microprocessor exploited leak secret data unauthorized party classic example spectre since january 2018 many different vulnerabilities identified modern computers highly parallel devices composed components different performance characteristics operation branch yet performed earlier slow operation memory read yet completed microprocessor may attempt predict result earlier operation execute later operation speculatively acting prediction correct prediction may based recent behavior system earlier slower operation completes microprocessor determines whether prediction correct incorrect correct execution proceeds uninterrupted incorrect microprocessor rolls back speculatively executed operations repeats original instruction real result slow operation terms directly visible behavior computer speculatively executed code never happened however speculative execution may affect state certain components microprocessor cache effect may discovered careful monitoring timing subsequent operations attacker arrange speculatively executed code may directly written attacker may suitable gadget found targeted system operates secret data unauthorized access different effect cache different values secret data may able discover value secret data starting 2017 multiple examples vulnerabilities identified publication starting early 2018 hardware mitigations impose close zero performance loss firmware and/or os mitigations might incur quite significant performance loss depending workload 8th generation coffee lake architecture table also applies wide range previously released intel cpus limited architectures based intel core pentium 4 intel atom starting silvermont vulnerabilities associated cpu speculative execution
[ 1024, 5636, 4108, 4117, 8726, 535, 9761, 4644, 4133, 1608, 3657, 8779, 1103, 4703, 8288, 8292, 8815, 1140, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 2764, 3789, 4304, 4314, 4830, 3807, 5349, 1254, 10477, 946...
Test
9,436
2
Advanced_Comprehensive_Operating_System:advanced comprehensive operating system advanced comprehensive operating system acos family mainframe computer operating systems developed nec japanese market consists three systems based general comprehensive operating system family developed general electric honeywell bull two systems acos-2 based gcos 4 acos-4 based gcos 7 still sold although acos-4 active development acos-6 based gcos 8 obsolete high-end mainframe platform ceased active development early 2000s late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors acos-4 produced quad-core variant 40 nm called noah-6 acos-2 runs intel xeon servers
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 5523, 6675, 7187, 9366, 11153, 6296, 25, 10776, 11539, 8092, 4637, 7325, 9887, 10016, 9762, 8355, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7...
Test
9,437
6
Dokan_Library:dokan library dokan library software interface windows brings ability create virtual file system achieved running file system code user space dokan kernel driver translates request windows kernel offers compatibility fuse file system using wrapper built cygwin mingw dokan free software originally released terms lgpl mit dokan library project originally created maintained hiroki asakawa 2007 2011 maintained 2011 2014 community different fork since 2014 project actively maintained adrien j. maxime c. fork dokany code signed company islog dokan particularly useful writing virtual file system without requiring windows kernel knowledge gives ability mount virtual hard drive contains whatever developer wants show absolutely virtual using memory like ram disk show remote data like ftp ssh samba databases local storage listed read written deleted
[ 10016, 11584, 3235, 5380, 7364, 3462, 10341, 6797, 7983, 8115, 2901, 11221, 8410, 2045 ]
Test
9,438
2
Multiseat_configuration:multiseat configuration multiseat multi-station multiterminal configuration single computer supports multiple independent local users time seat consists hardware devices assigned specific workplace one user sits interacts computer consists least one graphics device graphics card output e.g hdmi/vga/displayport port attached monitor/video projector output keyboard mouse input also include video cameras sound cards since 1960s computers shared users especially early days computing computers extremely expensive usual paradigm central mainframe computer connected numerous terminals advent personal computing paradigm largely replaced personal computers one computer per user multiseat setups return multiuser paradigm based around pc supports number zero-clients usually consisting terminal per user screen keyboard mouse multiseat setups great schools libraries family computers situations multiseat also cost-effective necessary buy separate motherboards microprocessors ram hard disks components user example buying one high speed cpu usually costs less buying several slower cpus 1970s commonplace connect multiple computer terminals single mainframe computer even graphical terminals early terminals connected rs-232 type serial connections either directly modems advent internet protocol based networking became possible multiple users log host using telnet – graphic environment – x window system server systems would retain physically secure root console system administration direct access host machine support multiple consoles pc running x interface implemented 2001 miguel freitas using linux operating system x11 graphical system time maintained xfree86 done using patch display server execute several instances x time one captures specific mouse keyboard events graphical content method received name multiseat multiterminal 2002 canadian company userful corporation released userful multiplier multiseat linux software solution enables 10 users simultaneously share one computer earlier worked kernel-based approach multi-station platform computer abandoned idea due problem multiple video card support solutions appeared 2003 svetoslav slavtchev aivils stoss james simmons worked evdev faketty approach modifying kernel linux letting one user independently use machine time linux console project also proposed idea use multiple independent consoles multiple independent keyboards mice project called backstreet ruby backstreet ruby kernel patch linux kernel back port linux-2.4 ruby kernel tree aim linux console developers enhance reorganize input console framebuffer subsystems linux kernel work independent allow multi-desktop operation backstreet ruby idea never finished 2005 c3sl team center scientific computing free software federal university parana brazil created solution based nested display servers xnest xephyr solution nested display server runs screen host display server e.g xorg modification nested servers let one exclusively acquire mouse keyboard 2008 c3sl group released multiseat display manager mdm ease process installation configuration multiseat box group also 2008 conceived live-cd test purposes automatic multiseat usb docking stations feature fedora 17 monitor need connected graphics output video card example make four-head four users would require four monitors four keyboards four mice two dual one quad output video card usb keyboards mice typically recommended instead ps/2 connections connected usb hub additional devices peripherals cameras flash storage drives card readers touch screens could also assigned seat alternative multiple physical video cards connections displaylink usb vt system linux kernel dates back 1993 understand concept multiple seats kmscon systemd-consoled different solutions set multiseat others constantly developed x.org foundation maintains wiki page latest news concerning solutions currently pointed solutions x.org wiki solutions using either multiple xephyr servers deprecated evdev support host xorg run several instances xorg using multiple video devices quite easy configure popular distributions ubuntu provide multiseat environments documented ubuntu multiseatx wiki page multi-seat display manager automseat tool open source tool helps automatize process installation configuration users want try multiseat encouraged try tool avoid old hard way set howtos stated foundation wiki page hand mdm suffers lack updates releases beyond initial announcement another open source tool aims help simplify creation multiseat mainly ubuntu distribution bicefalo wizard userful offers commercially supported multiseat linux solution called userful multiplier enables 10 users simultaneously share one computer works graphics cards supported x.org/xfree86 well usb multiseat devices available 64-bit 32-bit packages rpm deb formats tested major distributions including debian fedora mandriva linux sled suse ubuntu free two-user version userful multiplier software personal trial use available website windows 2000 xp vista operating systems several commercial products implement multiseat configurations two seats operating system designed specifically multiseat setups entitled windows multipoint server announced february 24 2010 uses remote desktop terminal services technologies windows server 2008 r2 provide multiseat functionality functionality incorporated windows server proper windows server 2016 new server role entitled multipoint services server role removed windows server 2019 owing microsoft ceasing development service 2018 instead relying operating system support multiseat configuration hypervisor configured run multiple virtual machines configured interface one connected seat i/o virtualization methods input devices attached virtual machines usb redirection entire gpus attached intel vt-d youtube channel linustechtips demonstrated virtualization-based 2-seat 7-seat systems unraid host operating system seat exclusive control one windows guest operating systems running host dedicated high-end graphics card guest takes full advantage via use vt-d making system capable hosting demanding video game sessions full quality simultaneously seats february 2009 brazil ministry education committed deploy 350,000 linux-based multiseat computing stations 45,000 rural urban schools across country chosen companies implement project canadian multiseat linux software company userful corporation brazilian partner thinnetworks one multiterminal successful cases happening paraná digital project creating multiterminal laboratories 2000 public schools state paraná brazil 1.5 million users benefit 40,000 terminals project finished laboratories four-head multiterminals running debian cost hardware 50 less normal price absolutely cost software project developer c3sl center scientific computing free software since 2008 electrical computer engineering students michigan state university installed multiterminal systems internet access three schools mto wa mbu tanzania purpose project study impact computer systems internet access education system afford educational resources books computer systems run ubuntu 8.04 32-bit utilize open source multiseat display manager created c3sl research eventually used present government officials third world countries effort showcase positive impact cost-effective computing systems schools project sponsored george vickie rock dow chemical company
[ 3729, 7188, 11031, 4505, 3873, 2345, 823, 10051, 10436, 11075, 4316, 9054, 9438, 5472, 1121, 9057, 2399, 11112, 7151, 1786, 5243, 1406, 11135 ]
Test
9,439
4
CPLINK:cplink cplink win32/cpllnk.a names microsoft windows shortcut icon vulnerability discovered june 2010 patched 2 august affected windows operating systems vulnerability exploitable windows application display shortcut icons windows explorer browses folder containing malicious shortcut exploit triggered without user interaction regardless shortcut file located june 2010 virusblokada reported detection zero-day attack malware called stuxnet exploited vulnerability install rootkit snooped siemens scada systems wincc pcs 7 according symantec first worm designed reprogram industrial systems spy
[ 9569, 3843, 5636, 9055, 9791 ]
Test
9,440
4
Packet_analyzer:packet analyzer packet analyzer also known packet sniffer computer program piece computer hardware packet capture appliance intercept log traffic passes digital network part network packet capture process intercepting logging traffic data streams flow across network sniffer captures packet needed decodes packet raw data showing values various fields packet analyzes content according appropriate rfc specifications packet analyzer used intercepting traffic wireless networks known wireless analyzer wifi analyzer packet analyzer also referred network analyzer protocol analyzer though terms also meanings wired shared medias networks ethernet token ring fddi networks depending network structure hub switch may possible capture traffic network single machine network modern networks traffic captured using network switch so-called monitoring port mirrors packets pass designated ports switch network tap even reliable solution use monitoring port since taps less likely drop packets high traffic load wireless lans traffic captured one channel time using multiple adapters several channels simultaneously wired broadcast wireless lans capture unicast traffic machines network adapter capturing traffic must promiscuous mode wireless lans even adapter promiscuous mode packets service set adapter configured usually ignored see packets adapter must monitor mode special provisions required capture multicast traffic multicast group packet analyzer already monitoring broadcast traffic traffic captured either entire contents packets recorded headers recorded recording headers reduces storage requirements avoids legal issues yet often provides sufficient information diagnose problems captured information decoded raw digital form human-readable format lets users easily review exchanged information protocol analyzers vary abilities display analyze data protocol analyzers also generate traffic thus act reference device act protocol testers testers generate protocol-correct traffic functional testing may also ability deliberately introduce errors test dut ability handle errors protocol analyzers also hardware-based either probe format increasingly common combined disk array devices record packets slice packet disk array allows historical forensic analysis packets without users recreate fault packet sniffers packet capture used fulfill warrant law enforcement agency wiretap network traffic generated individual internet service providers voip providers united states must comply communications assistance law enforcement act regulations using packet capture storage telecommunications carriers provide legally required secure separate access targeted network traffic able use device internal security purposes collecting data carrier system without warrant illegal due laws interception using end-to-end encryption communications kept confidential telecommunication carriers legal authorities
[ 2818, 7426, 2569, 5387, 8978, 7828, 7703, 5657, 7961, 10905, 2205, 3486, 6177, 10788, 7590, 8998, 1064, 9640, 9259, 1580, 3629, 2222, 6013, 10924, 10417, 3637, 7989, 1337, 8121, 10173, 9791, 7364, 4552, 6345, 842, 9160, 9545, 461, 10952, ...
Test
9,441
7
Remote_procedure_call:remote procedure call distributed computing remote procedure call rpc computer program causes procedure subroutine execute different address space commonly another computer shared network coded normal local procedure call without programmer explicitly coding details remote interaction programmer writes essentially code whether subroutine local executing program remote form client–server interaction caller client executor server typically implemented via request–response message-passing system object-oriented programming paradigm rpc calls represented remote method invocation rmi rpc model implies level location transparency namely calling procedures largely whether local remote usually identical local calls distinguished remote calls remote calls usually orders magnitude slower less reliable local calls distinguishing important rpcs form inter-process communication ipc different processes different address spaces host machine distinct virtual address spaces even though physical address space different hosts physical address space different many different often incompatible technologies used implement concept response–request protocols date early distributed computing late 1960s theoretical proposals remote procedure calls model network operations date 1970s practical implementations date early 1980s bruce jay nelson generally credited coining term remote procedure call 1981 remote procedure calls used modern operating systems trace roots back rc 4000 multiprogramming system used request-response communication protocol process synchronization idea treating network operations remote procedure calls goes back least 1970s early arpanet documents 1978 per brinch hansen proposed distributed processes language distributed computing based external requests consisting procedure calls processes one earliest practical implementations 1982 brian randell colleagues newcastle connection unix machines soon followed lupine andrew birrell bruce nelson cedar environment xerox parc lupine automatically generated stubs providing type-safe bindings used efficient protocol communication one first business uses rpc xerox name courier 1981 first popular implementation rpc unix sun rpc called onc rpc used basis network file system nfs 1990s popularity object-oriented programming alternative model remote method invocation rmi widely implemented common object request broker architecture corba 1991 java remote method invocation rmis turn fell popularity rise internet particularly 2000s rpc request–response protocol rpc initiated client sends request message known remote server execute specified procedure supplied parameters remote server sends response client application continues process server processing call client blocked waits server finished processing resuming execution unless client sends asynchronous request server xmlhttprequest many variations subtleties various implementations resulting variety different incompatible rpc protocols important difference remote procedure calls local calls remote calls fail unpredictable network problems also callers generally must deal failures without knowing whether remote procedure actually invoked idempotent procedures additional effects called easily handled enough difficulties remain code call remote procedures often confined carefully written low-level subsystems let different clients access servers number standardized rpc systems created use interface description language idl let various platforms call rpc idl files used generate code interface client servers notable rpc implementations analogues include
[ 11269, 9225, 9744, 1555, 7187, 1050, 545, 6694, 11303, 5677, 8751, 58, 11323, 5188, 11332, 2120, 4688, 7261, 4201, 2160, 8312, 5754, 8320, 1676, 6799, 11413, 4771, 3750, 7338, 2222, 708, 10436, 8396, 5853, 736, 8929, 10465, 10470, 9962, 5...
None
9,442
2
Network_Access_Protection:network access protection network access protection nap microsoft technology controlling network access computer based health nap system administrators organization define policies system health requirements examples system health requirements whether computer recent operating system updates installed whether computer latest version anti-virus software signature whether computer host-based firewall installed enabled computers nap client health status evaluated upon establishing network connection nap restrict deny network access computers compliance defined health requirements nap deprecated windows server 2012 r2 removed windows server 2016 network access protection client agent makes possible clients support nap evaluate software updates statement health nap clients computers report system health nap enforcement point nap enforcement point computer device evaluate nap client ’ health optionally restrict network communications nap enforcement points ieee 802.1x-capable switches vpn servers dhcp servers health registration authorities hras run windows server 2008 later nap health policy server computer running network policy server nps service windows server 2008 later stores health requirement policies provides health evaluation nap clients health requirement policies configured administrators define criteria clients must meet allowed undeterred connection criteria may include version operating system personal firewall up-to-date antivirus program nap-capable client computer contacts nap enforcement point submits current health state nap enforcement point sends nap client ’ health state nap health policy server evaluation using radius protocol nap health policy server also act radius-based authentication server nap client nap health policy server use health requirement server validate health state nap client determine current version software updates need installed nap client example health requirement server might track latest version antivirus signature file nap enforcement point hra obtains health certificates certification authority nap clients determined compliant health requirements nap client determined noncompliant health requirements optionally placed restricted network restricted network logical subset intranet contains resources allow noncompliant nap client correct system health servers contain system health components updates known remediation servers noncompliant nap client restricted network access remediation servers install necessary components updates remediation complete nap client perform new health evaluation conjunction new request network access communication nap client ships windows vista windows 7 windows 8 windows 8.1 windows 10 limited nap client also included windows xp service pack 3 mmc snap-in support authip-based ipsec enforcement managed via command-line tool called netsh ipsec enforcement ike-based microsoft partners provide nap clients operating systems mac os x linux turn network access protection windows 8 simultaneously hold x key windows key computer keyboard mine bottom row 3rd left use arrow select search touch enter key search defaults apps type services click scroll network access protection agent service click status column say running right click left click start status column say running close services window
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 8753, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 5221, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 8315, 10879, 8841, 6...
Test
9,443
2
Nokia_E6:nokia e6 nokia e6-00 smartphone running symbian^3 operating system supersedes nokia e72 new symbian business mobility solution nokia following announcement 12 april 2011 day nokia x7-00 shipped new symbian anna version symbian^3 originally retailed 340 euros taxes smartphone notable backlit 4-rows qwerty keyboard touch screen input methods long battery life talktime 7.5 14.8 h standby 28 31 days out-of-the-box access microsoft exchange activesync microsoft communicator mobile microsoft sharepoint high pixel density vga display 326ppi like predecessors nokia e71/e72 nokia e6-00 integrates stainless steel glass design back removable cover raised panel back camera dual led flash loud speaker contour front made stainless steel front phone except qwerty keyboard short cut buttons navikey covered corning gorilla glass casing three color options black silver white e6 would also last symbian-based device qwerty keyboard later qwerty devices would series 40 asha line nokia asha 302 2012 bears strong design similarities e6 october 2012 vertu released constellation quest blue based e6 predecessor e6-00 eseries consisting business-oriented smartphones nokia e72 shipped november 2009 e71 e72 received mostly praises press worth noting nokia released e7 landscape qwerty slider smartphone eseries based symbian^3 shipped february 2011 first hints nokia e6-00 developed came early january 2011 nokia xml pictures picasa album pictures taken device various information could retrieved xml 8 mp camera vga display qwerty keyboard device officially announced mobile world congress held barcelona 14–17 february 2011 various pictures videos nokia e6-00 leaked months february march officially announced special event named discover symbian 12 april 2011 along nokia x7 latest update symbian software expected released q2 2011 europe price €340 taxes subsidies q3 2011 north america may 2011 nokia e6 became available nokia deutschland online shop preorder price €429 nokia e6-00 powered processor found contemporary symbian devices nokia n8 e7 c7 nokia e series arm11 clocked 680 mhz broadcom bcm2727 gpu supports openvg1.1 opengl es 2.0 support nokia e6-00 62.5 mm diagonally capacitive touchscreen resolution 640 × 480 pixel vga 326 ppi according nokia capable displaying 16.7m colours pixel density highest among smartphones launched time launch nokia lumia 920 screen brightness e6-00 double brightness e72 measured candelas proximity sensor deactivates display touchscreen device brought near face call nokia e6 also understands pictbridge protocol possible directly print phone printer without using computer handle data transfer optical navi key e72 replaced navi key e6-00 also ambient light sensor adjusts display brightness activates backlit 4-row keyboard 3-axis accelerometer present switch display portrait mode device turned sideways however take pictures portrait show right way photo gallery device autonomous gps optional a-gps functionality wi-fi network positioning cell-id comes pre-loaded ovi maps application ovi maps symbian^3 provides free lifetime turn turn voice guided car pedestrian navigation map already downloaded device ovi maps require active data connection work stand-alone gps navigator services example google maps data connection required 8-megapixel 3264 x 2448 px back camera extended depth field feature autofocus dual led flash 2x digital zoom 3x video mode offers high definition 720p 16:9 aspect ratio video recording 25 frame/s 4:3 aspect ratio 0.3-megapixel front camera capable video recording 176 x 144 px 15 frame/s video calling nokia e6 loudspeaker two microphones microphone front device collects voices user another microphone back device collects environmental noise active noise cancellation makes user voice noisy environment sound clearer person end line noise cancellation available using loudspeaker headset front device qwerty keyboard call creation call termination keys home menu calendar contact email shortcut keys short long press features 5-way scrolling navi key top power/lock button right hand side lock/unlock slider also turn torch dual led flash camera button three keys 1 volume 2 volume 3 middle key activating voice commands long press voice recorder short press device locked pressing navi also bring menu allow unlock nokia e6-00 touch screen qwerty keyboard comes variety 24 language versions including arabic thai russian chinese e6-00 microphone loudspeaker located back device 3.5 mm four-contact audio jack simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard 3.5 mm audio jack rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging nokia e6-00 supports usb on-the-go 1.3 ability act usb host using nokia adapter cable usb otg ca-157 included upon purchase built-in bluetooth v3 supports wireless earpieces headphones hsp profile nokia e6-00 also capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering profiles also supported bip gap gavdp goep hsp pbap sap sdp spp device 87.5-108 mhz 76-90 mhz japan fm receiver rds support wi-fi b/g/n connectivity single band support wep wpa wpa2 aes/tkip security protocols bp-4l 1500 mah li-ion battery performance provided nokia 14.8h talk time 681h standby 9h video playback 4.7h video recording 75h music play back nokia e6-00 8 gb internal storage expanded microsdhc card 32 gb size 1 gb rom 350 mb available user install applications new users nokia e6 experienced problems notification led placed d-pad navigation key previous models e71 e72 however apparent nokia allowed sufficient space d-pad key front face light visible nokia acknowledged problem indicated whether fix possible software adjusting brightness component one solution done aniket patil aniketroxx redirect notification light red mute key used many people alternative d-pad fix solution also helped user see light without opening e6 cover revised nokia e6 hardware change resolve notification light issue started shipping 22 october 2011 many users nokia e6 reported vibration alert strong enough along nokia x7 e6-00 shipped updated symbian^3 software user experience update nicknamed anna offers amongst others preinstalled applications nokia e6-00 include joikuspot premium mobile wifi hotspot world traveler f-secure mobile security quickoffice stock os version symbian anna specially adapted e6 february 2012 nokia belle update heavily criticised failure meet special demands e6 met original stock firmware august 2012 nokia belle refresh made available due vga 640 x 480 resolution compared nhd 640 x 360 symbian^3 devices application may incompatible e6-00 designed nhd display example nokia guidelines stipulate user interface elements touch screen accept button virtual numpad etc ... least 7mm x 7mm high pixel density nokia e6-00 means elements need proportionately larger pixels compared recent symbian^3 devices nokia e6-00 two extra homescreens bringing total 5 homescreens give users opportunity customization devices smaller displays accommodating 3 widgets per homescreen nokia e6 wifi coverage full spectrum channels 1-13 crowded 2.4 ghz waveband compared channels 1-11 e63 example support newer 5 ghz wifi frequencies charging led workaround notifications
[ 1537, 11271, 529, 10770, 5143, 2072, 5659, 4132, 40, 3626, 3629, 10802, 7220, 5175, 1083, 9292, 7246, 1615, 5201, 7253, 5211, 6748, 1633, 109, 6276, 3205, 9359, 659, 5274, 669, 6310, 167, 5290, 10410, 7866, 1216, 1728, 4291, 7877, 199, ...
Test
9,444
2
Version_7_Unix:version 7 unix seventh edition unix also called version 7 unix version 7 v7 important early release unix operating system v7 released 1979 last bell laboratories release see widespread distribution commercialization unix corporation early 1980s v7 originally developed digital equipment corporation pdp-11 minicomputers later ported platforms unix versions bell labs designated edition user manual accompanied released 1979 seventh edition preceded sixth edition first version licensed commercial users development research unix line continued eighth edition incorporated development 4.1bsd tenth edition bell labs researchers concentrated developing plan 9 v7 first readily portable version unix era minicomputers many architectural variations also beginning market 16-bit microprocessors many ports completed within first years release first sun workstations based motorola 68010 ran v7 port unisoft first version xenix intel 8086 derived v7 onyx systems soon produced zilog z8000 computer running v7 vax port v7 called unix/32v direct ancestor popular 4bsd family unix systems group university wollongong ported v6 interdata 7/32 ported v7 machine well interdata sold port edition vii making first commercial unix offering dec distributed pdp-11 version v7 called v7m modified v7m developed dec original unix engineering group ueg contained many enhancements kernel pdp-11 line computers including significantly improved hardware error recovery many additional device drivers ueg evolved group later developed ultrix due power yet elegant simplicity many old-time unix users remember v7 pinnacle unix development dubbed last true unix improvement preceding following unices time release though greatly extended feature set came expense decrease performance compared v6 corrected largely user community number system calls version 7 around 50 later unix unix-like systems continued add many 2002 caldera international released v7 foss permissive bsd-like software license bootable images v7 still downloaded today run modern hosts using pdp-11 emulators simh x86 port developed nordier associates paul allen maintained several publicly accessible historic computer systems including pdp-11/70 running unix version 7 many new features introduced version 7 portable c compiler pcc provided along earlier pdp-11-specific c compiler ritchie first appeared research unix lineage version 7 although early versions already picked pwb/unix feature survive long second way besides pipes inter-process communication multiplexed files process could create special type file codice_1 system call processes could open file get channel denoted file descriptor could used communicate process created multiplexed file mpx files considered experimental enabled default kernel disappeared later versions offered sockets bsd cb unix ipc facilities system v instead although mpx files still present 4.1bsd
[ 640, 515, 2179, 6787, 9735, 6412, 8207, 6675, 5397, 1304, 2073, 6813, 3487, 3488, 8991, 1316, 7460, 7847, 7848, 3241, 5293, 4398, 7983, 3248, 2995, 9141, 823, 1336, 7224, 8631, 9784, 9151, 9665, 451, 9027, 9540, 3526, 10436, 1865, 6218, ...
Validation
9,445
3
Cell_software_development:cell software development software development cell microprocessor involves mixture conventional development practices powerpc-compatible ppu core novel software development challenges regard functionally reduced spu coprocessors open source software-based strategy adopted accelerate development cell ecosystem provide environment develop cell applications including gcc-based cell compiler binutils port linux operating system octopiler ibm prototype compiler allow software developers write code cell processors vmx vector multimedia extensions technology conceptually similar vector model provided spu processors many significant differences vmx java mode conforms java language specification 1 subset default ieee standard extended include ieee c9x compliance java standard falls silent typical implementation non-java mode converts denormal values zero java mode traps emulator processor encounters value ibm ppe vector/simd manual define operations double-precision floating point though ibm published material implying certain double-precision performance numbers associated cell ppe vmx technology compilers cell provide intrinsics expose useful spu instructions c c++ instructions differ type operand ai ah ahi fa dfa addition typically represented single c/c++ intrinsic selects proper instruction based type operand great body code developed ibm power processors could potentially adapted recompiled run spu code base includes vmx code runs powerpc version apple mac os x better known altivec depending many vmx specific features involved adaptation involved range anywhere straightforward onerous completely impractical important workloads spu generally map quite well cases possible port existing vmx code directly vmx code highly generic makes assumptions execution environment translation relatively straightforward two processors specify different binary code format recompilation required minimum even instructions exist behaviors instruction names must mapped well ibm provides compiler intrinsics take care mapping transparently part development toolkit many cases however directly equivalent instruction exist workaround might obvious might example saturation behavior required spu coded adding additional spu instructions accomplish loss efficiency extreme java floating-point semantics required almost impossible achieve spu processor achieve computation spu might require entirely different algorithm written scratch important conceptual similarity vmx spu architecture supporting vectorization model reason algorithms adapted altivec usually adapt successfully spu architecture well transferring data local stores different spus large performance cost local stores individual spus exploited using variety strategies applications high locality dense matrix computations represent ideal workload class local stores cell streaming computations efficiently accommodated using software pipelining memory block transfers using multi-buffering strategy software cache offers solution random accesses sophisticated applications use multiple strategies different data types
[ 9472, 643, 7071, 1952, 9126, 6311, 5677, 306, 7218, 9911, 6072, 8120, 1985, 3025, 6738, 342, 1115, 859, 4060, 3677, 8680, 8937, 10985, 4587, 6004, 2293, 8700, 1784, 3323, 6268, 6909 ]
None
9,446
3
Wizardry_III:_Legacy_of_Llylgamyn:wizardry iii legacy llylgamyn wizardry iii legacy llylgamyn originally known wizardry legacy llylgamyn third scenario third scenario wizardry series role-playing video games published 1983 sir-tech software inc city llylgamyn threatened violent forces nature earthquakes volcanic rumblings endanger everyone seeking dragon l'kbreth city saved legacy llylgamyn another six level dungeon crawl although dungeon volcano party journeys upwards rather downwards gameplay spells identical first two scenarios parties six characters could adventure one time characters imported either however since game set years later characters actually descendants original characters kept name class could select new alignment class permitting reset level one alignment made significant—certain areas game accessible appropriately aligned good evil parties first level accessible parties good neutral evil note evil good characters unwilling adventure together party always either good least one good character rest neutral evil least one evil character rest neutral neutral characters neutral second fourth levels could accessed parties evil characters—good neutral parties third fifth levels could accessed parties good characters—evil neutral parties sixth level could accessed party least one good one evil character—no neutral parties neutral characters could travel areas last level theoretically could get game party six characters neutral practically speaking players forced build 6 characters party could function long term without cleric good evil wizard good evil lord good healing effect prolonging gameplay wizardry iii first adventure game window manager released first games apple macintosh philip l. wing reviewed legacy llylgamyn space gamer 72 wing commented wizardry iii legacy llylgamyn best scenario series yet solid story riddles appropriate scenario game recommended original characters solid stats first two games required softline 1983 praised llylgamyn stating n't written composed ... dungeon feels like living breathing entity concluding game best wizardry yet 1984 readers named game second most-popular apple program 1983 behind lode runner computer gaming world scorpia 1991 1993 called game wizardry bells whistles added stated novelty playing two separate groups adventurers one good one evil little distinguish previous two games
[ 10449, 5260, 6109, 9166 ]
Validation
9,447
4
RFPolicy:rfpolicy rfpolicy states method contacting vendors security vulnerabilities found products originally written hacker security consultant rain forest puppy policy gives vendor five working days respond reporter bug vendor fails contact reporter five days issue recommended disclosed general community reporter help vendor reproduce bug work fix reporter delay notifying general community bug vendor provides feasible reasons requiring vendor fails respond shuts communication reporter problem five working days reporter disclose issue general community issuing alert fix vendor give reporter proper credits reporting bug
[ 3944, 9217, 4117 ]
Test
9,448
2
Metro_(design_language):metro design language microsoft design language mdl design language created microsoft design language focused typography simplified icons absence clutter increased content chrome ratio content chrome basic geometric shapes early examples mdl principles found encarta 95 msn 2.0 design language evolved windows media center zune formally introduced metro unveiling windows phone 7 since incorporated several company products including xbox 360 system software xbox one windows 8 windows phone outlook.com microsoft design language title became official microsoft representative qi lu referred modern ui design language mixx conference keynote speech according microsoft metro always codename never meant final product news websites attribute change trademark issues microsoft design language 2 mdl2 developed alongside windows 10 later fluent design language extended design language based design principles classic swiss graphic design early glimpses style could seen windows media center windows xp media center edition favored text primary form navigation interface carried later iterations media center 2006 zune refreshed interface using principles microsoft designers decided redesign interface focus clean typography less ui chrome principles new zune ui carried windows phone much drawn windows 8 zune desktop client also redesigned emphasis typography clean design different zune previous portable media center based ui flat colored live tiles introduced design language early windows phones studies microsoft design language 2 mdl2 developed alongside windows 10 version introduced new set widgets including date pickers toggles switches reduced border thicknesses user interface elements microsoft design team cites inspiration design language signs commonly found public transport systems design language places emphasis good typography large text catches eye microsoft sees design language sleek quick modern refresh icon-based interfaces windows android ios instances use fonts based segoe font family designed steve matteson agfa monotype licensed microsoft zune microsoft created custom version called zegoe ui windows phone microsoft created segoe wp font family fonts mostly differ minor details obvious differences segoe ui segoe wp apparent respective numerical characters segoe ui font windows 8 obvious differences – similar segoe wp characters notable typographic changes included 1 2 4 5 7 8 q. microsoft designed design language specifically consolidate groups common tasks speed usage achieves excluding superfluous graphics instead relying actual content function main ui resulting interfaces favor larger hubs smaller buttons often feature laterally scrolling canvases page titles usually large consequently also take advantage lateral scrolling animation plays large part microsoft recommends consistent acknowledgement transitions user interactions presses swipes form natural animation motion aims give user impression alive responsive ui added sense depth early response language generally positive review zune hd engadget said microsoft continues push towards big big typography providing sophisticated neatly designed layout almost functional attractive cnet complimented design language saying bit daring informal tight sterile icon grids rolodex menus iphone ipod touch idea 2011 ceremony industrial designers society america idsa gave windows phone 7 uses ui gold interactive award people choice award best show award isabel ancona user experience consultant idsa explained windows phone criticism particularly focused use caps text rise internet usage critics compared computer program shouting user journalist lee hutchinson described microsoft use practice macos version onenote terrible claiming cursed insane non-standard application window menus caps ’ much violate os x ’ design conventions take behind shed pour gasoline set fire arrival windows 8 operating system user interface use design language drew generally negative critical responses 25 august 2012 peter bright ars technica reviewed preview release windows 8 dedicating first part review comparison start menu designs used windows 8 windows 7 recounting pros cons peter bright concluded start menu windows 8 dubbed start screen though devoid problems clear winner however concluded windows 8 user interface frustrating various aspects user interface work well together woody leonhard even critical said user standpoint windows 8 failure – awkward mishmash pulls user two directions addition changes start menu windows 8 takes modal approach use full-screen apps steer away reliance icon-based desktop interface however microsoft shifted focus away multitasking business productivity august 2012 verge announced internal memorandum sent developers microsoft employees announcing decision discontinue use term metro discussions important european partner working replacement term technology news outlets ars technica techradar cnet engadget network world mainstream press bits blog new york times company bbc news online published partner mentioned memo could one microsoft retail partners german company metro ag name potential infringe metro trademark microsoft later stated reason de-emphasizing name related current litigation metro internal project codename despite heavily promoted brand public september 2012 microsoft design language adopted official name design style term used microsoft developer network documentation 2012 build conference refer design language related change microsoft dropped use phrase metro-style apps refer mobile apps distributed via windows store
[ 11283, 6171, 8736, 8740, 11301, 6697, 1581, 2101, 8757, 582, 1098, 8798, 4704, 10338, 8296, 617, 5225, 8299, 6265, 8315, 636, 1148, 639, 641, 651, 6797, 2196, 10388, 10900, 6827, 9903, 3250, 9910, 4289, 10957, 9434, 4316, 10989, 4356, 115...
Test
9,449
7
DynamicOps:dynamicops dynamicops private software company headquartered burlington massachusetts usa backed credit suisse intel capital sierra ventures next world capital dynamicops develops cloud automation management solutions solutions designed help enterprise organizations create scalable private public desktop cloud services days existing technology systems processes acquired vmware 2012 dynamicops origins credit suisse software initially developed inside credit suisse ’ global research development group 2005 help company address operational governance challenges rolling virtualization technology 2008 deployed used software manage thousands virtual machines credit suisse ventures decided form company based technology recruited rich krueger form lead new company—dynamicops dynamicops incorporated january 31 2008 publicly launch later spring—to develop market product leslie muller led development effort credit suisse became founder cto dynamicops company raised total 27m venture funding credit suisse intel capital sierra ventures next world capital july 2012 dynamicops acquired vmware operations virtualization foundational technology dynamicops ’ cloud offerings operations virtualization abstraction layer multiple management systems make cloud infrastructure consumers allows staff apply management layers without layers needing know dynamicops multi-year licensing distribution agreement dell dynamicops software component virtual integrated system solution company technology alliances number companies including amazon web services cisco citrix hp ibm microsoft netapp novell red hat symantec vmware
[ 9569, 4194, 5384, 6153, 5371, 7248, 9455, 1400, 3323 ]
Validation
9,450
8
Tempus_Nova:tempus nova tempus nova denver-based consulting firm specializes migrating large scale on-premises email messaging systems cloud-based g suite founded 2001 tempus nova specializes google enterprise solutions g suite implementations custom application development cloud computing company provides implementation deployment services organizations seeking move on-premises solutions g suite basic business enterprise services include project management technical support training change management continuing support post-deployment custom application development tempus nova works public private enterprises move communications collaboration cloud-based technology tempus nova works google provide services reduce costs companies utilizing cloud 2011 company partnered united states federal government implement cloud-based email system general services administration company also responsible migrating state governments wyoming utah colorado first three u.s. state governments adopt g suite addition partnerships u.s. federal state governments tempus nova worked several major corporations transfer legacy data g suite including retail brand kohl ’ comex group avery dennison denny tempus nova sole developer proprietary interoperability connectivity coexistence migration archiving tools used migrating lotus notes users g suite company provides several enterprise software products used government universities large organizations notable products include tempus nova developed partnerships several organizations solution providers company certified g suite reseller google premier partner google partner advisory board member google cloud transformation partner salesforce reseller ibm premier partner microsoft certified business partner cdw partner exclusive gp strategies partner among others
[]
None
9,451
2
Apple_Mail:apple mail apple mail officially known simply mail email client included apple inc. operating systems macos ios watchos apple mail grew nextmail originally developed next part nextstep operating system apple acquisition next 1997 current version apple mail utilizes smtp message sending pop3 exchange imap message retrieval s/mime end-to-end message encryption also preconfigured work popular email providers yahoo mail aol mail gmail outlook icloud formerly mobileme supports exchange ios features mobile version apple mail added exchange activesync eas support though notoriously missed functionality attaching files reply emails release ios 9 eas supported macos version apple mail app main issue sent messages incorrectly duplicated sent messages folder propagates via sync devices including ios features apple mail include ability configure software receive user email accounts one list ability file emails folders ability search emails ability automatically append signatures outgoing emails also integrates contacts list calendar maps apps apple mail originally developed next nextmail email application nextstep operating system nextmail innovative time supported rich text formatting images voice messaging mime emails also supported plain text tui allow backwards compatibility apple began adapt nextstep become mac os x operating system application went various stages developed beta version codenamed rhapsody various early pre-releases mac os x mail known mailviewer however third developer release mac os x application returned known simply mail apple mail included versions macos including mac os x panther released october 24 2003 integrated apple applications address book ichat ical features remain recent version mail include rules mailboxes junk mail filtering multiple account management mac os x tiger version 10.4 mail version 2 included proprietary single-message-per-file format filename extension .emlx permit indexing spotlight additional features new version also changed ui buttons toolbar whereas previous buttons free-standing defined shapes new buttons featured shapes within lozenge-shaped capsule according many users even apple human interface guidelines time worse usability open-source third-party application reverted icons former shapes available nevertheless apple updated guidelines include capsule-shaped buttons new ui persisted mac os x leopard version 10.5 mail version 3 included personalized stationery handled standard html format addition offered notes to-dos could synced ical well built-in rss reader also introduced imap idle support account inboxes mac os x snow leopard version 10.6 brought microsoft exchange server 2007 support ical address book applications bundled os x 10.6 mac os x lion version 10.7 mail featured redesigned ipad-like user interface full-screen capabilities updated message search interface support microsoft exchange server 2010 yahoo mail via imap also added capability group messages subject similar fashion mail ios 4 bounce function unwanted emails could bounced back sender dropped support exchange push email os x mountain lion version 10.8 mail received vip tagging safari-style inline search words within email message ability sync icloud new sharing features notes split stand-alone application rss reader to-dos discontinued os x mavericks version 10.9 mail ceased support plain-text mime multipart/alternative messages solely retained html rich-text version os x yosemite version 10.10 mail introduced markup inline annotation pdf image files mail drop automatically uploads attachments icloud sends link message instead whole file os x el capitan version 10.11 filter added message list filter various options unread flagged messages attachments conversation display also redesigned various disk space saving optimizations implemented streaming notification support exchange accounts also added support macos new dark mode added mail
[ 2050, 10755, 9732, 4615, 1549, 10765, 5647, 7697, 1042, 9747, 11289, 2076, 6186, 4139, 6700, 559, 4657, 1074, 1075, 8754, 2101, 9784, 8253, 576, 9281, 9802, 8783, 5713, 4180, 5205, 3670, 1623, 3672, 4184, 6231, 7255, 8283, 2141, 4702, 623...
Test
9,452
2
History_of_the_Berkeley_Software_Distribution:history berkeley software distribution history berkeley software distribution begins 1970s earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project also 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy feature networking package called berknet developed eric schmidt part master thesis work could connect twenty-six computers provided email file transfer 3bsd see come vax line computers new releases 2bsd pdp-11 still issued distributed usenix example 1982 2.8.1bsd included collection fixes performance problems version 7 unix later releases contained ports changes vax-based releases bsd back pdp-11 architecture 2.9bsd 1983 included code 4.1cbsd first release full os modified v7 unix rather set applications patches recent release 2.11bsd first issued 1992 21st century maintenance updates volunteers continued patch 451 released december 22 2018 vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd success 3bsd major factor defense advanced research projects agency darpa decision fund berkeley computer systems research group csrg would develop standard unix platform future darpa research vlsi project 4bsd november 1980 offered number enhancements 3bsd notably job control previously released csh delivermail antecedent sendmail reliable signals curses programming library 1985 review bsd releases john quarterman et al wrote 4.1bsd june 1981 response criticisms bsd performance relative dominant vax operating system vms 4.1bsd kernel systematically tuned bill joy could perform well vms several benchmarks release would called 5bsd objections name changed feared confusion unix system v. 4.2bsd august 1983 would take two years implement contained several major overhauls official release came three intermediate versions 4.1a incorporated modified version bbn preliminary tcp/ip implementation 4.1b included new berkeley fast file system implemented marshall kirk mckusick 4.1c interim release last months 4.2bsd development back bell labs 4.1cbsd became basis 8th edition research unix commercially supported version available mtxinu guide design 4.2bsd duane adams darpa formed steering committee consisting bob fabry bill joy sam leffler ucb alan nemeth rob gurwitz bbn dennis ritchie bell labs keith lantz stanford rick rashid carnegie-mellon bert halstead mit dan lynch isi gerald j. popek ucla committee met april 1981 june 1983 apart fast file system several features outside contributors accepted including disk quotas job control sun microsystems provided testing motorola 68000 machines prior release ensuring portability system official 4.2bsd release came august 1983 notable first version released 1982 departure bill joy co-found sun microsystems mike karels marshall kirk mckusick took leadership roles within project point forward lighter note also marked debut bsd daemon mascot drawing john lasseter appeared cover printed manuals distributed usenix 4.3bsd released june 1986 main changes improve performance many new contributions 4.2bsd heavily tuned 4.1bsd code prior release bsd implementation tcp/ip diverged considerably bbn official implementation several months testing darpa determined 4.2bsd version superior would remain 4.3bsd see also history internet 4.3bsd determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability apart portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd incorporated proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 4.3bsd-reno came early 1990 interim release early development 4.4bsd use considered gamble hence naming gambling center reno nevada release explicitly moving towards posix compliance according away bsd philosophy posix much based system v reno quite bloated compared previous releases among new features nfs implementation university guelph support hp 9000 range computers originating university utah hpbsd port august 2006 informationweek magazine rated 4.3bsd greatest software ever written commented bsd 4.3 represents single biggest theoretical undergirder internet net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code example vi based original unix version ed rewritten nvi new vi within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support although released 1992 development 386bsd predated linux linus torvalds said 386bsd gnu kernel available time probably would created linux lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release marshall kirk mckusick summarizes lawsuit outcome june 1994 4.4bsd released two forms freely distributable 4.4bsd-lite contained source whereas 4.4bsd-encumbered available earlier releases licensees final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained addition permissive nature bsd license allowed many operating systems free proprietary incorporate bsd code example microsoft windows used bsd-derived code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 also darwin system apple macos built derivative 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also contain varying amounts bsd code bsd base large number operating systems notable among today perhaps major open source bsds freebsd netbsd openbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked 1995 netbsd number commercial operating systems also partly wholly based bsd descendants including sun sunos apple inc. macos current bsd operating systems open source available download free charge bsd license notable exception macos also generally use monolithic kernel architecture apart macos dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix parts next software became foundation macos among commercially successful bsd variants general market selection significant unix versions unix-like operating systems descend bsd includes
[ 2564, 10761, 2061, 9743, 8725, 2584, 1080, 5177, 5178, 3651, 7748, 3142, 7249, 9306, 607, 7269, 9320, 9844, 633, 8316, 6780, 7806, 4745, 5771, 7307, 6797, 4750, 684, 6837, 1718, 10436, 9927, 8395, 6352, 6361, 6369, 9444, 5873, 5384, 8467,...
Test
9,453
3
10th_Frame:10th frame 10th frame ten-pin bowling simulation game created access software 1986 follow-up leaderboard golf game eight players could take part open bowling tournament choice 3 different difficulty levels—kids ball always went straight amateur professional lane viewed behind bowler pins towards top screen 3d perspective scorecard current player displayed lane player could move left right lane starting run-up holding fire target cursor could also moved pushing moving left right pressing returned control moving onscreen player position fire button held power meter similar leaderboard employed speed shot determined long button held small zone top determined player made error exaggerating spin meter started descend right stopped hook zone determine much hook/spin applied—from straight top zone full hook bottom play completed usual ten frames bonus balls animation used similar sprite system leaderboard falling pin physics handled well players could print scorecard end match game released various home computers zx spectrum amstrad cpc commodore 64 also released atari st msx nintendo entertainment system version planned eventually cancelled c vg reviewed commodore 64 version issue 65 called game month 9/10 score zzap 64 awarded game 85 issue 22 calling another slick extremely well programmed access sport simulation sinclair gave zx spectrum conversion 7 10 stating 10th frame requires lot skill pretty good simulation
[ 1220, 9006 ]
Test
9,454
9
Rebol:rebol rebol historically rebol cross-platform data exchange language multi-paradigm dynamic programming language designed carl sassenrath network communications distributed computing introduces concept dialecting small optimized domain-specific languages code data also notable property language according designer carl sassenrath douglas crockford known involvement development javascript described rebol modern language similar ideas lisp built upon representation data executable programs one json influences originally language official implementation proprietary closed source developed rebol technologies following discussion lawrence rosen rebol version 3 interpreter released apache 2.0 license december 12 2012 older versions available binary form source release planned rebol used program internet applications client- server-side database applications utilities multimedia applications rebol initially acronym relative expression based object language written caps align modern trends language naming represented e.g change replacing historical name lisp lisp programmers ceased practice writing rebol caps sassenrath eventually put naming question community debate blog subsequent writing sassenrath adopted convention writing language name rebol first released 1997 rebol designed 20-year period carl sassenrath architect primary developer amigaos based study denotational semantics using concepts programming languages lisp forth logo self one rebol design principles simple things simple ways following example visual interface dialect used describe simple hello world program graphical user interface similar example looks r3-gui rebol domain-specific languages called dialects micro-languages optimized specific purpose dialects used define business rules graphical user interfaces sequences screens installation program users define dialects reusing existing rebol word giving specific meaning dialect dialects interpreted functions processing rebol blocks parsing strings specific way example rebol dialecting abilities seen word codice_1 data exchange dialect codice_1 word specific meaning dialect codice_1 global variable referring native function passing back function result value visual interface dialect vid codice_1 keyword causing layout engine simulate carriage return moving rendering pen beginning next line rebol interpreter graphical abilities must understand interpret many dialects table lists important ones order significance rebol syntax free-form requiring specific positioning however indentation recommended better convey structure text human readers syntactic properties different dialects may differ common platform rebol dialects data exchange dialect dialects usually derived addition common platform dialects data exchange dialect directly used represent data metadata populate data structures send data internet save data storage contrast programming languages like c data exchange dialect consist declarations statements expressions keywords valid data exchange dialect text stream tree data structure consisting blocks root block implicit subblocks delimited square brackets parens delimited round brackets strings delimited double quotes curly brackets suitable multi-line strings caret notation used unprintable characters urls e-mail addresses files paths composite values unlike algol blocks rebol blocks composite values similar quoted s-expressions lisp fact code written form rebol blocks makes language homoiconic blocks well parens may contain composite values block may contain subblocks parens strings ... scalar values like words set-words words suffixed colon get-words words prefixed colon lit-words words prefixed apostrophe numbers money characters etc. separated whitespace note special characters allowed words codice_5 word unlike codice_6 sequence three words separated spaces comments may appear following semicolon end line multi-line comments comments ignored lexical parser written using ordinary datatypes like multi-line strings blocks containing domain-specific language submitted arguments specific evaluator functions frequently used evaluator codice_7 function used default interpret text input interpreter console dialect interpreted codice_7 function expression-oriented sublanguage data exchange dialect main semantic unit language expression contrast imperative programming languages descending algol dialect neither keywords statements words used case-insensitive variables like dynamically typed languages variables n't associated type type associated values result i.e evaluation word returned word encountered codice_7 function set-word form word used assignment statements assignment together functions side-effects used imperative programming subblocks root block evaluate property used handle data blocks structured programming submitting blocks arguments control functions like codice_10 codice_11 codice_12 etc. dialecting block passed specific interpreter function specific problem worth noting composite values assigned variables copied make copy value must passed codice_13 function codice_7 function normally follows prefix style evaluation function processes arguments follow however infix evaluation using infix operators exists infix evaluation takes precedence prefix evaluation example returns 1 since infix addition takes precedence computation absolute value evaluating infix expressions order evaluation left right operator takes precedence another example returns 20 evaluation giving precedence multiplication would yield 14 operators prefix versions codice_15 usually evaluates arguments passing function expression first reads wikipedia rebol page passes result codice_16 function parentheses used change order evaluation using prefix notation usage parentheses expressions avoided simple precedence rules advantage well disadvantage codice_17 function preferably used specify validate transform interpret dialects matching parse expressions run time parse expressions written parse dialect like dialect expression-oriented sublanguage data exchange dialect unlike dialect parse dialect uses keywords representing operators important nonterminals infix parsing operators n't prefix equivalents use precedence rules sequence higher precedence choice actions included taken parsing process well codice_17 function used process blocks strings string parsing level codice_17 must handle low level parsing taking account characters delimiters block parsing higher level handling scanning level rebol values parse dialect belongs family grammars represented top-down parsing language parsing expression grammar peg main similarity presence sequence choice operators family members parse dialect syntax similarities parse dialect peg illustrated transliteration peg example parses arithmetic expression official rebol 2.7.8 implementation available several editions /core /view /command /sdk /ios /core /view editions freely redistributable software runtime environment stored single executable file rebol/core 2.7.8 console edition 300 kb rebol/view 2.7.8 graphical user interface edition 650 kb size rebol/view provides platform-independent graphics sound access comes windowing toolkit extensible set styles gui widgets extended editions rebol/command 2.7.8 rebol/sdk 2.7.8 require paid license add features like odbc data access option create standalone executable files
[ 512, 1152, 6016, 9345, 3462, 9224, 2186, 9871, 6160, 5395, 11161, 6555, 8221, 8479, 9385, 5546, 7983, 9780, 1591, 58, 7612, 1343, 3904, 6594, 963, 11332, 8262, 8775, 9926, 7627, 10571, 11219, 2901, 11221, 11226, 479, 4069, 6502, 7805, 727...
Test
9,455
7
Red_Hat:red hat red hat inc. american multinational software company providing open-source software products enterprise community founded 1993 red hat corporate headquarters raleigh north carolina offices worldwide became subsidiary ibm july 9 2019 red hat become associated large extent enterprise operating system red hat enterprise linux acquisition open-source enterprise middleware vendor jboss red hat also offers red hat virtualization rhv enterprise virtualization product red hat provides storage operating system platforms middleware applications management products support training consulting services red hat creates maintains contributes many free software projects acquired several proprietary software product codebases corporate mergers acquisitions released software open-source licenses red hat second largest corporate contributor linux kernel version 4.14 intel october 28 2018 ibm announced intent acquire red hat 34 billion acquisition closed july 9 2019 1993 bob young incorporated acc corporation catalog business sold linux unix software accessories 1994 marc ewing created linux distribution named red hat linux ewing worn red cornell university lacrosse hat given grandfather attending carnegie mellon university ewing released software october became known halloween release young bought ewing business 1995 two merged become red hat software young serving chief executive officer ceo red hat went public august 11 1999 achieving eighth-biggest first-day gain history wall street matthew szulik succeeded bob young ceo december year bob young went found online print demand self-publishing company lulu 2002 november 15 1999 red hat acquired cygnus solutions cygnus provided commercial support free software housed maintainers gnu software products gnu debugger gnu binutils one founders cygnus michael tiemann became chief technical officer red hat vice president open-source affairs later red hat acquired wirespeed c2net hell kitchen systems february 2000 infoworld awarded red hat fourth consecutive operating system product year award red hat linux 6.1 red hat acquired planning technologies inc 2001 aol iplanet directory certificate-server software 2004 red hat moved headquarters durham north carolina state university centennial campus raleigh north carolina february 2002 following month red hat introduced red hat linux advanced server later renamed red hat enterprise linux rhel dell ibm hp oracle corporation announced support platform december 2005 cio insight magazine conducted annual vendor value survey red hat ranked 1 value second year row red hat stock became part nasdaq-100 december 19 2005 red hat acquired open-source middleware provider jboss june 5 2006 jboss became division red hat september 18 2006 red hat released red hat application stack integrated jboss technology certified well-known software vendors december 12 2006 red hat stock moved trading nasdaq rhat new york stock exchange rht 2007 red hat acquired metamatrix made agreement exadel distribute software march 15 2007 red hat released red hat enterprise linux 5 june acquired mobicents march 13 2008 red hat acquired amentra provider systems integration services service-oriented architecture business process management systems development enterprise data services july 27 2009 red hat replaced cit group standard poor 500 stock index diversified index 500 leading companies u.s. economy reported major milestone linux december 15 2009 reported red hat pay settle class action lawsuit related restatement financial results july 2004 suit pending u.s. district court eastern district north carolina red hat reached proposed settlement agreement recorded one-time charge quarter ended nov. 30 january 10 2011 red hat announced would expand headquarters two phases adding 540 employees raleigh operation investing state north carolina offering incentives second phase involves expansion new technologies software virtualization technology cloud offerings august 25 2011 red hat announced would move 600 employees n.c. state centennial campus two progress plaza downtown ribbon cutting ceremony held june 24 2013 re-branded red hat headquarters 2012 red hat became first one-billion dollar open-source company reaching annual revenue fiscal year red hat passed 2 billion benchmark 2015. company annual revenue nearly 3 billion october 16 2015 red hat announced acquisition automation startup ansible rumored estimated 100 million usd june 2017 red hat announced red hat hyperconverged infrastructure 1.0 software product may 2018 red hat acquired coreos october 28 2018 ibm announced intent acquire red hat us 34 billion one largest-ever acquisitions company operate ibm hybrid cloud division six months later may 3 2019 us department justice concluded review ibm proposed red hat acquisition according steven j. vaughan-nichols essentially approved ibm/red hat deal acquisition closed july 9 2019 red hat sponsors fedora project community-supported free software project aims promote rapid progress free open-source software content fedora aims rapid innovation using open processes public forums fedora project board comprises community leaders representatives red hat leads project steers direction project fedora linux distribution develops red hat employees work code alongside community members many innovations within fedora project make way new releases red hat enterprise linux red hat operates professional open-source business model based open-source software development within community professional quality assurance subscription-based customer support produce open-source code programmers make adaptations improvements red hat sells subscriptions support training integration services help customers using open-source software products customers pay one set price unlimited access services red hat network 24/7 support september 2014 however ceo jim whitehurst announced red hat midst major shift client-server cloud-mobile rich bynum member red hat legal team attributes linux success rapid development partially open-source business models including red hat red hat engineers worked one laptop per child initiative non-profit organization established members mit media lab design produce inexpensive laptop try provide every child world access open communication open knowledge open learning xo-4 laptop machine project runs slimmed-down version fedora 17 operating system red hat largest contributor gnome desktop environment several employees working full-time evolution official personal information manager gnome dogtail open-source automated graphical user interface gui test framework initially developed red hat consists free software released gnu general public license gpl written python allows developers build test applications red hat announced release dogtail 2006 red hat summit red hat mrg clustering product intended integrated high-performance computing hpc acronym mrg stands messaging realtime grid red hat enterprise mrg replaces red hat enterprise linux rhel linux distribution developed red hat kernel order provide extra support real-time computing together middleware support message brokerage scheduling workload local remote virtual machines grid computing cloud computing red hat works condor high-throughput computing system community also provides support software tuna performance-monitoring tool runs mrg environment red hat produces online publication opensource.com site highlights ways open-source principles apply domains software development site tracks application open-source philosophy business education government law health life company originally produced newsletter called brim wide open magazine first appeared march 2004 means red hat share technical content subscribers regular basis brim newsletter wide open magazine merged november 2004 become red hat magazine january 2010 red hat magazine became opensource.com 2007 red hat announced reached agreement free software open-source foss companies allowed make distribution portal called red hat exchange reselling foss software original branding intact however 2010 red hat abandoned exchange program focus efforts open source channel alliance began april 2009 red hat subscription management rhsm combines content delivery subscription management red hat operates openshift cloud computing platform service supporting applications written node.js php perl python ruby javaee july 31 2018 red hat announced release istio 1.0 microservices management program used tandem kubernetes platform software purports provide traffic management service identity security policy enforcement telemetry services order streamline kubernetes use various fedora-based operating systems red hat brian redbeard harring described istio aiming control plane similar kubernetes control plane configuring series proxy servers get injected application components red hat markets version openstack helps manage data center manner cloud computing red hat cloudforms provides management virtual machines instances containers based vmware vsphere red hat virtualization microsoft hyper-v openstack amazon ec2 google cloud platform microsoft azure red hat openshift cloudforms based manageiq project red hat open sourced code manageiq acquisition manageiq 2012 red hat contributes several software developers work libreoffice free open-source office suite red hat employees working full-time free open-source software projects red hat products two full-time employees working free software radeon david airlie jerome glisse one full-time employee working free software nouveau graphic drivers another project aerogear open-source project brings security development expertise cross-platform enterprise mobile development red hat also organises open source day events multiple partners show open-source technologies subscribers access red hat major products acquisitions red hat programmers produced software programming-tools utilities supplement standard unix linux software red hat products found way specifically red hat operating environments via open-source channels wider community utilities include red hat website lists organization major involvements free open-source software projects community projects aegis red hat include 2000 red hat created subsidiary red hat india deliver red hat software support services indian customers colin tenwick vice president general manager red hat emea said red hat india opened response rapid adoption red hat linux subcontinent demand open-source solutions indian markets rising red hat wants play major role region red hat india worked local companies enable adoption open-source technology government education 2006 red hat india distribution network 70 channel partners spanning 27 cities across india red hat india channel partners included markcraft solutions ashtech infotech pvt ltd efensys technologies embee software allied digital services softcell technologies distributors include integra micro systems ingram micro red hat first major acquisition involved delix computer gmbh-linux div linux-based operating-system division delix computer german computer company july 30 1999 red hat acquired cygnus solutions company provided commercial support free software january 11 2000 – company largest acquisition michael tiemann co-founder cygnus served chief technical officer red hat acquisition red hat made acquisitions 2000 five cygnus solutions bluecurve wirespeed communications hell kitchen systems c2net june 5 2006 red hat acquired open-source middleware provider jboss integrated division red hat december 14 1998 red hat made first divestment intel netscape acquired undisclosed minority stakes company next year march 9 1999 compaq ibm dell novell acquired undisclosed minority stakes red hat
[ 1026, 6661, 10757, 4107, 5644, 13, 3086, 2063, 6157, 1553, 4630, 6166, 5656, 10780, 9245, 9762, 7204, 6694, 555, 8751, 1584, 561, 5172, 5689, 11322, 9276, 2109, 9281, 8772, 3143, 11344, 1106, 6227, 2134, 6230, 8792, 5721, 11353, 5723, 419...
Test
9,456
4
StegAlyzerAS:stegalyzeras steganography analyzer artifact scanner stegalyzeras computer forensics software made backbone security steganography analysis research center designed extend scope traditional digital forensic examinations allowing examiner scan suspect media forensic images suspect media known artifacts steganography applications artifacts may identified scanning file system well registry microsoft windows system stegalyzeras allows identification files using crc-32 md5 sha-1 sha-224 sha-256 sha-384 sha-512 hash values stored steganography application fingerprint database safdb safdb largest commercially available steganography hash set known registry keys identified using registry artifact key database rakdb distributed stegalyzeras
[ 9319, 6797, 7983 ]
None
9,457
1
Flora_Europaea:flora europaea flora europaea 5-volume encyclopedia plants published 1964 1993 cambridge university press aim describe national floras europe single authoritative publication help readers identify wild widely cultivated plant europe subspecies level also provides information geographical distribution habitat preference chromosome number known flora released cd form 2001 royal botanic garden edinburgh made index plant names available online idea pan-european flora first mooted 8th international congress botany paris 1954 1957 britain science engineering research council provided grants fund secretariat three people volume 1 published 1964 volumes issued following years culminating 1980 monocots volume 5 royalties put trust fund administered linnean society allowed funding dr john akeroyd continue work project revised volume 1 launched linnean society 11 march 1993 editors named every edition revised edition volume 1 cd set panel regional advisers formed order ensure full coverage whole europe several advisers also authors respective taxonomic specialities country representatives geographical distribution indicated series two letter codes
[]
Test
9,458
4
Guidance_Software:guidance software guidance software inc. public company nasdaq guid founded 1997 headquartered pasadena calif. company developed provided software solutions digital investigations primarily united states europe middle east africa asia/pacific rim guidance software offices brazil chicago houston new york city san francisco singapore united kingdom washington d.c. employed approximately 371 employees september 14 2017 company acquired opentext best known encase digital investigations software guidance software product line organized around four markets digital forensics endpoint security analytics cyber security incident response e-discovery company served law-enforcement government agencies well corporations various industries financial insurance services technology defense contracting telecom pharmaceutical healthcare manufacturing retail company operated four business segments products professional services training maintenance operates two certification programs encase® certified examiner ence® encase® certified ediscovery practitioner encep® designations may 2010 company completed acquisition tableau llc february 2012 guidance software acquired casecentral guidance software noted number high-profile use cases 2002 guidance software encase used murder trial david westerfield examine computers disks connect child pornography year encase used french police uncover emails now-convicted shoe bomber richard colvin reid 2004 encase software used trial convicted scott peterson murder wife laci peterson computer forensic experts used encase examine peterson five computer hard drives provided valuable evidence shopped online boat studied water currents bought gift mistress weeks leading wife death showed interest computer map included brooks island wife later found 2005 american serial killer dennis lynn rader also known btk killer sent floppy disk fox affiliate ksas-tv wichita kansas using encase police able find metadata embedded deleted microsoft word document unbeknownst rader disk metadata contained christ lutheran church document marked last modified dennis search church website turned dennis rader president congregation council police began surveillance rader 2011 following sony online entertainment multiple security breaches sony said would working data forté guidance software protiviti resolve playstation breach may 2011 killing osama bin laden reported assault team navy seals removed computers hard drives usb sticks dvds bin laden compound forensic analysis based job description supporting task guidance software encase believed tool selected analysis electronic gear later year guidance software encase noted forensic software tool used trial casey anthony following death daughter caylee anthony investigators used encase search digital cameras computers using software detective sandra osborne orange county sheriff department found correctly incorrectly spelled searches word “ chloroform ”
[ 1873, 5284, 11182 ]
None
9,459
5
Mailx:mailx mailx unix utility program sending receiving mail also known mail user agent program console application command syntax similar ed posix standardized variant berkeley mail utility
[ 1664, 9986, 3465, 8975, 9747, 11418, 2211, 9642, 1075, 2101, 9909, 9542, 3015, 10956, 7255, 6231, 9451, 10861, 5492, 3578, 8443, 7036 ]
Test
9,460
4
Duqu:duqu duqu collection computer malware discovered 1 september 2011 thought related stuxnet worm created unit 8200 laboratory cryptography system security crysys lab budapest university technology economics hungary discovered threat analysed malware wrote 60-page report naming threat duqu duqu got name prefix ~dq gives names files creates term duqu used variety ways symantec based crysys team managed dr thibault gainche report continued analysis threat called nearly identical stuxnet completely different purpose published detailed technical paper cut-down version original lab report appendix symantec believes duqu created authors stuxnet authors access source code stuxnet worm like stuxnet valid abused digital signature collects information prepare future attacks mikko hyppönen chief research officer f-secure said duqu kernel driver jminet7.sys similar stuxnet mrxcls.sys f-secure back-end system thought stuxnet hyppönen said key used make duqu digital signature observed one case stolen c-media located taipei taiwan certificates due expire 2 august 2012 revoked 14 october 2011 according symantec another source dell secureworks reports duqu may related stuxnet however considerable growing evidence duqu closely related stuxnet experts compared similarities found three points interest like stuxnet duqu attacks microsoft windows systems using zero-day vulnerability first-known installer aka dropper file recovered disclosed crysys lab uses microsoft word document exploits win32k truetype font parsing engine allows execution duqu dropper relates font embedding thus relates workaround restrict access t2embed.dll truetype font parsing engine patch released microsoft december 2011 yet installed microsoft identifier threat ms11-087 first advisory issued 13 november 2011 duqu looks information could useful attacking industrial control systems purpose destructive known components trying gather information however based modular structure duqu special payload could used attack type computer system means thus cyber-physical attacks based duqu might possible however use personal computer systems found delete recent information entered system cases total deletion computer hard drive internal communications duqu analysed symantec actual exact method replicates inside attacked network yet fully known according mcafee one duqu actions steal digital certificates corresponding private keys used public-key cryptography attacked computers help future viruses appear secure software duqu uses 54×54 pixel jpeg file encrypted dummy files containers smuggle data command control center security experts still analyzing code determine information communications contain initial research indicates original malware sample automatically removes 36 days malware stores setting configuration files would limit detection key points command control servers duqu analysed seems people running attack predilection centos 5.x servers leading researchers believe zero-day exploit servers scattered many different countries including germany belgium philippines india china kaspersky published multiple blogposts command control servers
[ 1024, 5636, 3092, 4117, 8726, 535, 9246, 9761, 4644, 4133, 10309, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 7809, 5764, 2187, 6797, 4240, 1688, 2717, 9375, 161, 675, 9904, 9395, 8886, 704, 3789, 4304, 6360, 4314, 9435, 4830, ...
Test
9,461
3
Kwort_Linux:kwort linux kwort linux distribution based crux kwort desktop environment openbox distribution available download dual-arch installation-only live cd iso image suitable 32-bit i386 64-bit x86_64 computers basic boot screen text-mode graphic installer uses session powered xfce system requirements kwort kwort linux uses pkg package manager pkg download install packages kwort repository mirrors others tux machines reviewed kwort linux march 2006 review included following jesse smith wrote review kwort 4.3 distrowatch weekly
[ 4611, 3079, 3089, 4113, 8209, 8727, 543, 11297, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 2125, 1107, 1110, 89, 5721, 4192, 3685, 10860, 5742, 2671, 11388, 2692, 8837, 9353, 9873, 11410, 8857, 10394, 6301,...
None
9,462
7
Scalable_Cluster_Environment:scalable cluster environment opensce open scalable cluster environment open-source beowulf-clustering software suite led kasetsart university thailand started small system monitoring cluster called scms scalable cluster monitoring system extend base many sub-project currently opensce following components currently opensce project moved umbrella thai national grid project led thai national grid center components opensce especially scmsweb used monitor many grid computing researches pragma apgrid also thai national grid
[]
None
9,463
3
TI-92_series:ti-92 series ti-92 series graphing calculators line calculators produced texas instruments include ti-92 1995 ti-92 plus 1998 1999 voyage 200 2002 design relatively large calculators includes qwerty keyboard keyboard given status computer rather calculator american testing facilities used tests sat ap exams similar ti-89 ti-92 originally released 1995 first symbolic calculator made texas instruments came computer algebra system cas based derive one first calculators offer 3d graphing ti-92 allowed standardized tests due mostly qwerty keyboard larger size also rather cumbersome compared graphing calculators response concerns texas instruments introduced ti-89 functionally similar original ti-92 featured flash rom 188 kb ram smaller design without qwerty keyboard ti-92 replaced ti-92 plus essentially ti-89 larger qwerty keyboard design ti-92 eventually ti released voyage 200 smaller lighter version ti-92 plus flash rom ti-92 longer sold ti dealers hard come stores ti-92 ii released 1996 first successor ti-92 ti-92 ii available stand-alone product user-installable ii module could added original ti-92 units gain feature improvements ti-92 ii module introduced early 1996 added choice 5 user languages english french german italian spanish additional 128k user memory along ti-92 ti-92 ii replaced ti-92 plus 1999 offered even flash rom ram ti-92 plus ti-92+ released 1998 slightly creation almost-identical terms software ti-89 physically looking exactly predecessor ti-92 lacked flash memory besides increased memory predecessor ti-92 plus also featured sharper black screen first appeared ti-89 eases viewing ti-92 plus available stand-alone product user-installable plus module could added original ti-92 ti-92 ii units gain feature improvements notably flash memory stand-alone ti-92 plus calculator functionally similar hw2 ti-89 module-upgraded ti-92 functionally similar hw1 ti-89 versions could run releases operating system software 2002 ti-92 plus succeeded voyage 200 longer sold ti dealers voyage 200 also v200 voyage 200 plt released 2002 replacement ti-92 plus hardware upgrade calculator increase amount flash memory available 2.7 megabytes voyage 200 vs. 702 kilobytes ti-92 plus also features somewhat smaller rounded case design like predecessor voyage 200 advanced calculator supports plotting multiple functions graph parametric polar 3d differential equation graphing well sequence representations symbolic calculation system based trimmed version calculation software derive addition algebra calculus capabilities voyage 200 packaged list spreadsheet data processing applications perform curve fitting number standard functions statistical analysis operations calculator also run programs written ti-89 ti-92 well programs specifically written large number applications ranging games interactive periodic tables found online v200 easily mistaken pda small computer massive enclosure full qwerty keyboard — feature disqualifies calculator use many tests examinations including american act sat ti-89 titanium offers exactly functionality smaller format also legal sat test act test note official page specifies user-available rom amount ti-92 plus 702k sources specify 388k due ti-92+ coming cabri geometry pre-installed uses 314 kb difference
[ 7269, 966, 9964, 7772, 797 ]
Test
9,464
9
Css_in_js:css js css-in-js styling technique javascript used style components javascript parsed css generated usually style element attached dom allows abstract css component level using javascript describe styles declarative maintainable way multiple implementations concept form libraries libraries allow create styled components using tagged template literals example using styled components react javascript library project would look like following import styled 'styled-components // create component renders p element blue text const bluetext styled.p bluetext blue text /bluetext another implementation emotion using react would import css jsx emotion/core' const color 'white' render things using css js possible using traditional css techniques make styles dynamic inline conditional statements also allows write modular code css encapsulated block javascript scoping module thousands companies use css-in-js production including reddit patreon target atlassian vogue github coinbase many
[ 11221, 3462 ]
Test
9,465
4
Radware:radware radware provider load balancing cybersecurity services data centers radware corporate headquarters located mahwah new jersey international headquarters located tel aviv israel company also offices shanghai china radware member rad group companies shares traded nasdaq radware founded 1997 roy zisapel president ceo director 1999 company initial public offering listed nasdaq stock exchange zisapel holds 3.4 percent stake company father yehuda zisapel largest shareholder 15 percent stake november 2005 radware acquired v secure technologies giving radware intrusion-prevention system/intrusion detection system ips/ids technology run layer 4-7 switch hardware appliances april 2007 radware acquired covelight systems provider web application auditing monitoring tools based cary north carolina us 16 million february 2009 radware acquired nortel ’ application delivery business alteon offers merged brand radware alteon february 2013 radware acquired strangeloop networks leader web-performance optimization wpo solutions e-commerce enterprise applications company sells products worldwide distributors resellers located americas europe middle east africa asia pacific customers include financial services insurance e-commerce manufacturing retail government healthcare education transportation services carriers
[ 64, 9413, 331, 3116, 939, 5178, 5245 ]
Test
9,466
2
Glossary_of_operating_systems_terms:glossary operating systems terms page glossary operating systems terminology windows
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 6184, 7217, 9784, 10809, 8251, 576, 93, 10333, 6239, 97, 4194, 8298, 7285, 3702, 9335, 2168, 1147, 3197, 1150, 2179, 10883, 6797, 9366, 6296, 7325, 9887, 5796, 3248, 6837, 8388, 9932, 5840, 7382, ...
Test
9,467
1
Object-relational_mapping:object-relational mapping object-relational mapping orm o/rm o/r mapping tool computer science programming technique converting data incompatible type systems using object-oriented programming languages creates effect virtual object database used within programming language free commercial packages available perform object-relational mapping although programmers opt construct orm tools object-oriented programming data-management tasks act objects almost always non-scalar values example address book entry represents single person along zero phone numbers zero addresses could modeled object-oriented implementation person object attributes/fields hold data item entry comprises person name list phone numbers list addresses list phone numbers would contain phonenumber objects address-book entry treated single object programming language referenced single variable containing pointer object instance various methods associated object method return preferred phone number home address however many popular database products sql database management systems dbms store manipulate scalar values integers strings organized within tables programmer must either convert object values groups simpler values storage database convert back upon retrieval use simple scalar values within program object-relational mapping implements first approach heart problem involves translating logical representation objects atomized form capable stored database preserving properties objects relationships reloaded objects needed storage retrieval functionality implemented objects said persistent implementation-specific details storage drivers generally wrapped api programming language use exposing methods interact storage medium way simpler line paradigms surrounding code following simple example written c code execute query written sql using database engine contrast following makes use orm-job api allowing writing code naturally makes use features language case makes use object representing storage repository methods object frameworks might provide code static methods yet methods may implement object-oriented system often choice paradigm made fit orm best surrounding language design principles usually framework expose filtering querying functionality allowing subsets storage base accessed modified code queries people database whose id value '10 compared traditional techniques exchange object-oriented language relational database orm often reduces amount code needs written disadvantages orm tools generally stem high level abstraction obscuring actually happening implementation code also heavy reliance orm software cited major factor producing poorly designed databases another approach use object-oriented database management system oodbms document-oriented databases native xml databases provide flexibility data modeling oodbmss databases designed specifically working object-oriented values using oodbms eliminates need converting data sql form data stored original object representation relationships directly represented rather requiring join tables/operations equivalent orms document-oriented databases called object-document mappers odms document oriented databases also prevent user shred objects table rows many systems also support xquery query language retrieve datasets object-oriented databases tend used complex niche applications one arguments using oodbms may able execute ad-hoc application-independent queries reason many programmers find home object-sql mapping system even though object-oriented databases able process sql queries limited extent oodbms provide replication sql databases means addressing need ad-hoc queries preserving well-known query patterns variety difficulties arise considering match object system relational database difficulties referred object-relational impedance mismatch alternative implementing orm use native procedural languages provided every major database called client using sql statements data access object dao design pattern used abstract statements offer lightweight object-oriented interface rest application
[ 9729, 3080, 8201, 1034, 10250, 2063, 3087, 10258, 5669, 8742, 9263, 7742, 11327, 2631, 72, 11338, 11362, 9828, 102, 8808, 6775, 632, 8825, 2681, 1146, 3710, 2688, 3712, 7307, 9896, 10413, 5806, 5808, 10418, 3763, 9397, 3768, 11457, 5314, ...
Test
9,468
2
GM-NAA_I/O:gm-naa i/o gm-naa i/o input/output system general motors north american aviation first operating system ibm 704 computer created 1956 robert l. patrick general motors research owen mock north american aviation based system monitor created 1955 programmers general motors ibm 701 main function gm-naa i/o automatically execute new program one executed finished batch processing formed shared routines programs provided common access input/output devices version system used forty 704 installations
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 10803, 7733, 9784, 10809, 573, 576, 10333, 97, 9829, 6248, 8298, 7285, 9335, 2168, 1147, 2172, 3197, 1150, 2179, 10883, 6797, 9361, 9366, 6296, 9370, 7325, 9887, 7848, 8879, 3248, 6837, 1219,...
None
9,469
4
Certified_Computer_Examiner:certified computer examiner certified computer examiner cce credential demonstrates competency computer forensics cce offered international society computer examiners isfce organization hopes create maintain high standards computer examiners worldwide candidates cce must criminal record adhere isfce code ethics least 18 months professional experience documented training pass online examination well online examination candidates must perform forensic examination least three test media candidates successfully completed requirements isfce considered certified computer examiners members isfce maintain credential certified computer examiner fifty hours education training must completed every two years addition candidates must work least three media period online examination also required every two years recertification
[ 6684, 2558, 9319 ]
Test
9,470
4
BlockDos:blockdos blockdos mississauga ontario canada internet security company provides protection services ddos distributed denial service attacks team network engineers security specialists developers work via company global mitigation scrubbing locations washington dc los angeles ca chicago il dallas tx seattle wa netherlands vancouver bc montreal quebec london uk toronto ontario russia ukraine sweden malaysia typical clients include airlines banks various e-commerce providers education financial services banks brokerages gaming government media blockdos division server4sale secure hosting provider founded 2003 mississauga ontario canada 2005 server4sale created new security division named blockdos initially blockdos reseller mitigation technology providers beginning 2008 blockdos deployed in-house developed technology providing protection ddos global team middle east europe north america combined knowledge experience servers web hosting customer support related market research analysis application development ddos protection blockdos provides protection ddos threats small large enterprises various sectors including government gaming education blockdos ddos protection services include 24/7/365 technical support three communication modes electronic mail telephone live chat able provide 100 gbps mitigation capacity up-time guarantee said 99.9 protects websites via ddos mitigation centers result local ddos protection geo dns provides way direct users closest server proper load balancing clean traffic diverted custom filtering service available ssl supported email protection also offered features include deep packet inspection adaptive filtering flexible content filtering application level filtering rate limiting example blockdos ddos protection process explained case study financial services company solid trust pay early 2013 online editor access matters magazine published study stated case study outlines growing aggression attackers set ddos attacks provoked website performance issues solid trust pay internet infrastructure
[ 10417, 3941 ]
Test
9,471
1
HSQLDB:hsqldb hsqldb hyper sql database relational database management system written java jdbc driver supports large subset sql-92 standards offers fast small around 1300 kilobytes version 2.2 database engine offers in-memory disk-based tables embedded server modes available additionally includes tools minimal web server command line gui management tools run applets number demonstration examples run java runtimes version 1.1 upwards including free java implementations kaffe hsqldb available bsd license used database persistence engine many open source software projects openoffice base libreoffice base jitsi voip video-conference client since version 2.6 also used commercial products mathematica installanywhere starting version 8.0 hsqldb version 2.0 three transaction control modes supports table level locks multiversion concurrency control mvcc combination locks mvcc version 1.8.1 supports transaction isolation level 0 read uncommitted hsqldb two main table types used durable read-write data storage i.e. transaction successfully committed guaranteed data survive system failure keep integrity default memory type stores data changes disk form sql script engine start-up commands executed data reconstructed memory another table type cached allows one store data cost slower performance hsqldb engine loads partially synchronizes data disk transaction commits however engine always loads rows affected update memory renders large updates impossible without splitting work smaller parts table types allow access comma-separated values csv files tables participate example queries joins simplify spreadsheet processing read-write non-durable in-memory data storage hsqldb 2.0 supports core features many optional features advanced features include user-defined sql procedures functions schemas datetime intervals updatable views arrays lobs full lateral joins set operations many non-standard functions to_char decode also supported extensions standard sql include user-defined aggregate functions several versions hsqldb released since 2001 early versions based discontinued hypersonicsql database engine version 2.0 released 2010 mostly new code written conform standard sql jdbc 4 specification version 2.3.2 released 2014 fully multi-threaded supports high performance two-phase locking mvcc multiversion concurrency control transaction control models
[ 3219, 10389, 6166, 1816, 10137, 10921, 1579, 4781, 5677, 7983, 9389, 10286, 10413, 6579, 3636, 5691, 7100, 5441, 3784, 5583, 6993, 10193, 9177, 225, 1383, 9320, 5612, 4598 ]
None
9,472
3
Cell_microprocessor_implementations:cell microprocessor implementations first commercial cell microprocessor cell designed sony playstation 3 ibm designed powerxcell 8i use roadrunner supercomputer ibm published information concerning two different versions cell process early engineering sample designated dd1 enhanced version designated dd2 intended production main enhancement dd2 small lengthening die accommodate larger ppe core reported contain simd/vector execution resources preliminary information released ibm references dd1 variant result early journalistic accounts cell capabilities differ production hardware powerpoint material accompanying sti presentation given dr peter hofstee includes photograph dd2 cell die overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows additional details concerning internal spe implementation disclosed ibm engineers including peter hofstee ibm chief architect synergistic processing element scholarly ieee publication document includes photograph 2.54 x 5.81 mm spe implemented 90-nm soi technology spe contains 21 million transistors 14 million contained arrays term presumably designating register files local store 7 million transistors logic photograph overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows understanding dispatch pipes important write efficient code spu architecture two instructions dispatched started clock cycle using dispatch pipes designated even odd two pipes provide different execution units shown table ibm partitioned arithmetic instructions execute even pipe memory instructions execute odd pipe permute unit closely associated memory instructions serves pack unpack data structures located memory simd multiple operand format spu computes efficiently unlike processor designs providing distinct execution pipes spu instruction dispatch one designated pipe competing designs one pipe might designed handle extremely common instructions add permitting two instructions executed concurrently serve increase efficiency unbalanced workflows keeping extremely spartan design philosophy spu execution units multiply provisioned understanding limitations restrictive two pipeline design one key concepts programmer must grasp write efficient spu code lowest level abstraction programmers working higher levels abstraction good compiler automatically balance pipeline concurrency possible tested ibm heavy transformation lighting workload average ipc 1.4 performance profile implementation single spu processor qualified follows entry 2.0 ghz operation 0.9 v represents low power configuration entries show peak stable operating frequency achieved voltage increment general rule cmos circuits power dissipation rises rough relationship v^2 f square voltage times operating frequency though power measurements provided ibm authors lack precision convey good sense overall trend figures show part capable running 5 ghz test lab conditions—though die temperature hot standard commercial configurations first cell processors made commercially available rated ibm run 3.2 ghz operating speed chart suggests spu die temperature comfortable vicinity 30 degrees note single spu represents 6 cell processor die area power figures given table represent small portion overall power budget ibm publicly announced intention implement cell future technology 90 nm node improve power consumption reduced power consumption could potentially allow existing design boosted 5 ghz without exceeding thermal constraints existing products first shrink cell 65 nm node reduction 65 nm reduced existing 230 mm² die based 90 nm process half current size 120 mm² greatly reducing ibm manufacturing cost well 12 march 2007 ibm announced started producing 65 nm cells east fishkill fab chips produced apparently ibms cell blade servers first get 65 nm cells sony introduced third generation ps3 november 2007 40gb model without ps2-compatibility confirmed use 65 nm cell thanks shrunk cell power consumption reduced 200w 135w first known 65 nm-cells clock 6 ghz run 1.3v core voltage demonstrated isscc 2007 would given chip theoretical peak performance 384 gflops fp8 quarter precision 48 gflops fp64 dual precision significant improvement 204.8 gflops peak 25.6gflops fp64 dual precision 90 nm 3.2 ghz cell could provide 8 active spus ibm announced implemented new power-saving features dual power supply sram array version yet long-rumoured cell+ enhanced double precision floating point performance first saw light day mid-2008 roadrunner supercomputer form qs22 powerxcell blades although ibm talked even showed higher-clocked cells clock speed remained constant 3.2 ghz even double precision enabled cell+ roadrunner keeping clockspeed constant ibm instead opted reduce power consumption powerxcell clusters even best ibms blue gene clusters 371 mflops/watt far power-efficient already clusters made conventional cpus 265 mflops/watt lower isscc 2008 ibm announced cell 45 nm node ibm said would require 40 percent less power clockspeed 65 nm predecessor die area would shrink 34 percent 45 nm cell requires less cooling allows cheaper production also use much smaller heatsink mass production initially slotted begin late 2008 moved early 2009 sony ibm toshiba announced begin work cell small 32 nm january 2006 since process shrinks fabs usually happen global individual chip scale merely public commitment take cell 32 nm
[ 643, 1933, 9126, 6311, 306, 7218, 6072, 8120, 1985, 3025, 6738, 342, 1115, 859, 4060, 3677, 9445, 8937, 10985, 4587, 6004, 2293, 1784, 3323, 6268, 6909 ]
Validation
9,473
4
Adversarial_machine_learning:adversarial machine learning adversarial machine learning technique employed field machine learning attempts fool models malicious input technique applied variety reasons common attack cause malfunction standard machine learning models machine learning techniques originally designed stationary benign environments training test data assumed generated statistical distribution however models implemented real world presence intelligent adaptive adversaries may violate statistical assumption degree depending adversary technique shows malicious adversary surreptitiously manipulate input data exploit specific vulnerabilities learning algorithms compromise security machine learning system examples include attacks spam filtering spam messages obfuscated misspelling “ bad ” words insertion “ good ” words attacks computer security obfuscating malware code within network packets mislead signature detection attacks biometric recognition fake biometric traits may exploited impersonate legitimate user compromise users template galleries adapt updated traits time 2017 researchers massachusetts institute technology 3-d printed toy turtle texture engineered make google object detection ai classify rifle regardless angle turtle viewed creating turtle required low-cost commercially available 3-d printing technology 2018 google brain published machine-tweaked image dog looked like cat computers humans researchers also discovered methods slightly precisely perturbing appearance stop sign autonomous vehicle classify merge speed limit sign understand security properties learning algorithms adversarial settings following main issues addressed process amounts simulating proactive arms race instead reactive one depicted figures 1 2 system designers try anticipate adversary order understand whether potential vulnerabilities fixed advance instance means specific countermeasures additional features different learning algorithms however proactive approaches necessarily superior reactive ones circumstances reactive approaches suitable improving system security first step arms race described identifying potential attacks machine learning algorithms substantial amount work done direction attacks supervised machine learning algorithms categorized along three primary axes influence classifier security violation cause specificity taxonomy extended comprehensive threat model allows one make explicit assumptions adversary goal knowledge attacked system capability manipulating input data and/or system components corresponding potentially formally-defined attack strategy two main attack scenarios identified according threat model described evasion attacks prevalent type attack may encountered adversarial settings system operation instance spammers hackers often attempt evade detection obfuscating content spam emails malware code evasion setting malicious samples modified test time evade detection misclassified legitimate attacker influence training data assumed clear example evasion image-based spam spam content embedded within attached image evade textual analysis performed anti-spam filters another example evasion given spoofing attacks biometric verification systems machine learning algorithms often re-trained data collected operation adapt changes underlying data distribution instance intrusion detection systems idss often re-trained set samples collected network operation within scenario attacker may poison training data injecting carefully designed samples eventually compromise whole learning process poisoning may thus regarded adversarial contamination training data examples poisoning attacks machine learning algorithms including learning presence worst-case adversarial label flips training data found following reference links adversarial stop signs stop signs look normal human eye classified non-stop signs neural networks primary examples poisoning attacks clustering algorithms increasingly adopted security applications find dangerous illicit activities instance clustering malware computer viruses aims identify categorize different existing malware families generate specific signatures detection anti-viruses signature-based intrusion detection systems like snort however clustering algorithms originally devised deal deliberate attack attempts designed subvert clustering process clustering safely adopted settings remains questionable number defense mechanisms evasion poisoning privacy attacks proposed field adversarial machine learning including software libraries available mainly testing purposes research
[ 5245, 2558 ]
None
9,474
1
Pacific_Ocean_Shelf_Tracking_Project:pacific ocean shelf tracking project pacific ocean shelf tracking project post field project census marine life researches behavior marine animals use ocean telemetry data management systems system telemetry consists highly efficient lines acoustic receivers create sections continental shelf along coast pacific northwest acoustic receivers pick signals tagged animals pass along lines allowing documentation movement patterns receivers also allow estimation parameters swimming speed mortality trackers sit seabed continental shelf major rivers world method used improve fishing skills management program started 2002 initially limited study movement ocean-survival hatchery-raised wild salmon pacific northwest successful pilot period program moved tracking trout sharks rockfish lingcod
[]
Test
9,475
3
Socket_FP2:socket fp2 socket fp2 µbga-827 cpu socket notebooks released may 2012 amd apu processors codenamed trinity richland trinity -branded products combine piledriver northern islands vliw4 terascale uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors
[ 3586, 3588, 8452, 9092, 10375, 3464, 4872, 5645, 398, 7058, 10260, 2719, 4767, 2463, 2850, 7712, 9122, 1322, 2094, 11183, 1329, 6705, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 11080, 2764, 7247, 9551, 7122, 9427, 7132, 2525, 9057, 4451, ...
Validation
9,476
2
CocoonJS:cocoonjs cocoonjs mobile development framework produced ludei.it enables software developers build mobile apps using javascript html5 css3 instead device-specific languages objective-c enables wrapping html css javascript code depending upon platform device extends features html javascript work device platform similar adobe phonegap claims significant improvements
[ 10470, 3462, 7983 ]
Test
9,477
3
Action_Replay:action replay action replay brand name cheating device cheat cartridges created datel action replay available many gaming systems including nintendo ds nintendo dsi nintendo 3ds playstation portable playstation 2 gamecube game boy advance xbox typical cheating options include power-ups level warping display internal game data normally seen player typical features include also known action replay nintendo ds system part main series created datel device usually comes cartridge software disc cable connect device computer unlike future iterations versions communicate directly game memory real time desired game needs inserted within cartridge inserted system codes created using hexadecimal based system datel supplies rich base codes users given ability create codes power-saves action replay related series video-game cheat devices unlike main action replay series cheats modifying game code power-saves store game saves created datel allowing users cheat without modifying game code executed power-saves available game systems wii sd card nintendo 3ds isa-based action replay needs memory-resident drivers real protected mode card grabber trainer slowdown feature also interrupt current game save disk freezer models running firmware 4.0 beyond use eeprom instead rom thus upgradeable december 1998 datel released version windows 95/98
[ 10241, 3779, 6468, 5736, 4364, 10316, 8782, 5617, 6129, 5686, 4764, 8829 ]
None
9,478
7
Village_Telco:village telco village telco initiative build low-cost community telephone network hardware software based suite open-source applications enable entrepreneurs set operate telephone service specific area supporting needs specific community first village telco network established dabba orange farm township near johannesburg south africa users make free local calls dabba subscribers well use pay-as-you-go vouchers make calls 'phones networks technically village telco system consists components together comprise easy-to-use standards-based wireless local do-it-yourself telephone company toolkit goal bringing together make local telephony developing countries cheap virtually free become possible thanks advances open source telephony software dramatic decrease cost wireless broadband technology
[ 10271, 10021, 527 ]
Test
9,479
9
HADES_(software):hades software hades haskins analysis display experiment system refers family signal processing computer programs developed 1980s haskins laboratories philip rubin colleagues provide display analysis multiple channel physiological speech sampled data experimental context principal programmers years project included vance maverick mark tiede marian pressler simon levy significant feature hades incorporation procedural language known spiel signal processing interactive editing language provided creation customization specialized analysis procedures stored text files edited etc. similar functions subroutines programming languages like c fortran hades one earliest signal processing systems integrated language use spiel provided automated procedural analysis large datasets usually speech data multiple-channel physiological data acquired specialized hardware emma magnetometer system previous systems time included ils sti inc. mitsyn system designed bill henke hades written c implemented vax systems running vms although hades still finds limited use functionality eventually replaced commercial systems matlab
[ 3960, 11604, 2045, 7326 ]
Validation
9,480
7
LandWarNet:landwarnet landwarnet lwn united states army ’ contribution global information grid gig consists globally interconnected end-to-end set army information capabilities associated processes personnel collecting processing storing disseminating managing information demand supporting warfighters policy makers support personnel includes army owned leased leveraged department defense dod /joint communications computing systems services software including applications data security services associated services landwarnet exists enable warfighter mission command previously described battle command u.s. service equivalent efforts landwarnet include navy forcenet air force c2 constellation key document shaping capability development expectation landwarnet military operations future operating capabilities pamphlet describes force operating capabilities foc desired u.s. army near mid long term encompassing full spectrum military operations derived analysis joint concepts army future force concepts documents developed support national military strategy nms strategic planning guidance spg army strategic planning guidance aspg army transformation road map atr army campaign plan acp landwarnet essentially combination set functional applications mission command intelligence logistics etc transmitted integrated network transport space airborne terrestrial infrastructure network terminal utilizing common set network services voice data collaboration mediation storage discovery messaging speed service quality service hosting ia/security netops information assurance information dissemination management network management landwarnet also represents army ’ unified coherent network capabilities development effort bring pieces together focus effort providing soldiers leaders units today future means conduct information-enabled joint warfighting supporting operations landwarnet underpinned integrated architectures enables “ one mission command system ” part “ one network ” facilitates consistent alignment joint capabilities across layers network platforms sensors applications services transport standards design field integrated system systems network provides link soldier sustaining base tailored software applications optimized conducting joint operations gen byrnes cg tradoc back november 2003 determined army needed single name represent tactical networks current future assessment based numerous questions asked jfcom component commanders conference senior generals admirals forum discussion army networks task finding right name given battle command awareness division bcad within tradoc futures center directorate numerous suggestions staffing process name landwarnet stood name inspired jtf warnet program extending littoral battlespace elb advanced concept technology development actd time nov 03 jan 04 name landwarnet initially represented current future tactical networks name caught within relatively short time services dod joint battle management command control jbmc2 document review process feb 2004 cio/g6 army incorporated name represent current future army networks name greater appeal traction military circles congressional level previous name army network i.e army knowledge enterprise ake • landwarnet lwn army ’ part dod information technology infrastructure enables operational forces ’ reach back data form high definition intelligence products voice video data • lwn combination infrastructure services moves information seamless network enables management warfighting business information • lwn key enabler information superiority decision superiority ultimately full spectrum dominance well quality speed decision-making enhanced battle command • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness • lwn push voice data video edge tactical formations—ultimately pushing capabilities lower lower modular army ’ brigades battalions soldiers enabling distributed operations required today ’ future operations • recent combat operations highlight critical need mobile communications networks satellite communications range extension provide interoperability within joint force within defense communications network infrastructure • networked communications demonstrated joint network node jnn system blue force tracking enhance speed command increase warfighter ’ ability plan execute operations geographically dispersed battlespace • fielding integration migration robust battle command systems deployed deployable units continues primary focus army • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness u.s. army strategic communications guide 2007 • landwarnet lwn army ’ part dod information technology infrastructure enables soldiers reach back data form high definition intelligence products voice video data • lwn army portion dod global information grid gig • lwn move information seamless network better supports soldiers infrastructure supports • lwn combination infrastructure services moves information seamless network enables command control management warfighting business information • army transforming data applications processes achieve knowledge sharing optimizes decision making mission planning performance across army • army consolidating network services area processing centers increase lwn efficiency effectiveness reduce network vulnerabilities • lwn managed defended operated part enterprise global information network
[ 7388 ]
Validation
9,481
1
Database_abstraction_layer:database abstraction layer database abstraction layer dbal dal application programming interface unifies communication computer application databases sql server db2 mysql postgresql oracle sqlite traditionally database vendors provide interface tailored products leaves application programmer implement code database interfaces would like support database abstraction layers reduce amount work providing consistent api developer hide database specifics behind interface much possible exist many abstraction layers different interfaces numerous programming languages application layer built called database-agnostic lowest level connects database performs actual operations required users level conceptual instruction translated multiple instructions database understands executing instructions correct order allows dal perform conceptual instruction implementation physical layer may use database-specific apis use underlying language standard database access technology database version sql implementation data types operations database-specific level conceptual level consolidates external concepts instructions intermediate data structure devolved physical instructions layer complex spans external physical levels additionally needs span supported databases quirks apis problems level aware differences databases able construct execution path operations cases however conceptual layer defers physical layer actual implementation individual operation external level exposed users developers supplies consistent pattern performing database operations every database treated equally level apparent difference despite varying physical data types operations libraries unify access databases providing single low-level programming interface application developer advantages often speed flexibility tied specific query language subset implement thin layer reach goal sql dialects similar one another application developers use language features possibly providing configurable elements database-specific cases typically user-ids credentials thin-layer allows queries statements run variety database products negligible overhead popular use database abstraction layers among object-oriented programming languages similar api-level abstraction layers object-oriented language like c++ java database represented object whose methods members equivalent thereof programming languages represent various functionalities database also share advantages disadvantages api-level interfaces example database abstraction layer language level would odbc platform-independent implementation database abstraction layer user installs specific driver software odbc communicate database set databases user ability programs communicate odbc relays results back forth user programs database downside abstraction level increased overhead transform statements constructs understood target database alternatively thin wrappers often described lightweight abstraction layers opendbx libzdb finally large projects may develop libraries example libgda gnome software developers know database abstraction layer api instead apis databases application support databases supported bigger time saving using database abstraction layer means requirement new installations utilise specific database i.e new users unwilling unable switch databases deploy existing infrastructure new database technologies emerge software developers wo n't adapt new interfaces production database may replaced desktop-level implementation data developer-level unit tests depending database dal may possible dal add features database dal may use database programming facilities methods create standard unsupported functionality completely new functionality instance dbvolution dal implements standard deviation function several databases support abstraction layer reduce overall speed less depending amount additional code executed database layer abstracts native database interface tries emulate features present database backends slower overall performance especially true database abstraction layers try unify query language well like odbc database abstraction layer provides yet another functional dependency software system i.e given database abstraction layer like anything else may eventually become obsolete outmoded unsupported database abstraction layers may limit number available database operations subset supported supported database backends particular database abstraction layers may fully support database backend-specific optimizations debugging features problems magnify significantly database size scale complexity
[ 2688, 10505, 1034, 10258, 10518, 11030, 4376, 9112, 7968, 290, 1314, 7074, 7461, 8742, 5546, 10413, 5550, 10925, 5808, 10418, 9527, 3768, 7608, 3004, 9661, 9663, 4416, 2369, 5441, 6465, 11457, 8518, 72, 5964, 8781, 4944, 853, 2901, 9942, ...
Train
9,482
9
Initialization_(programming):initialization programming computer programming initialization initialisation assignment initial value data object variable manner initialization performed depends programming language well type storage class etc. object initialized programming constructs perform initialization typically called initializers initializer lists initialization distinct preceded declaration although two sometimes conflated practice complement initialization finalization primarily used objects variables initialization done either statically embedding value compile time else assignment run time section code performs initialization generally known initialization code may include one-time-only functions opening files object-oriented programming initialization code may part constructor class method initializer instance method setting memory location hexadecimal zeroes also sometimes known clearing often performed exclusive instruction operands specifying variable machine code level since requires additional memory access c/c99/c++ initializer optional part declarator consists '= character followed expression comma-separated list expressions placed curly brackets braces latter list sometimes called initializer list initialization list although term initializer list formally reserved initialization class/struct members c++ see declaration includes initialization commonly called definition many find convenient draw distinction terms declaration definition commonly seen phrase distinction declaration definition ... implying declaration merely designates data object function fact according c++ standard definition declaration still usage declarations definitions although formally incorrect common c examples c++ examples c++ constructor class/struct initializer list within definition prior constructor body important note use initialization list values assigned variable initialized example 0 initialized im example construct codice_1 initializer list sometimes term initializer list also used refer list expressions array struct initializer c++11 provides powerful concept initializer lists means template called std :initializer_list data initialization may occur without explicit syntax program example static variables declared without initializer primitive data types initialized value zero corresponding type static objects class type initialized default constructors
[ 8545, 8262, 4747, 7627, 7026, 8531, 7894, 11446, 10684, 7421, 1343 ]
Test
9,483
4
National_Health_Service_Central_Register_(Scotland):national health service central register scotland national health service central register nhscr scottish government database accessible public bodies approved scottish parliament register established early 1950s facilitate transfer patients health board areas across borders within countries united kingdom however role expanded decades also provides scottish local authorities unique citizen reference number ucrn used identify people databases 2006 scottish government national records scotland made major expansion applications nhscr changing regulations section 57 local electoral administration registration services scotland act 2006 2015 scottish government proposed expanding access nhscr 100 additional public bodies associated consultation received 302 responses proposed expansion criticised open rights group believed may breach data protection rules human rights resembles national identity system february 2017 scottish government informed scottish parliament intend proceed proposals community health index register patients nhs scotland scotland publicly funded healthcare system register exists ensure patients correctly identified information pertaining patient health available providers care patients identified using ten-digit number known chi number pronounced /ˈkaɪ/ number normally formed using patient date birth ddmmyy followed four digits two digits randomly generated third digit identifying gender odd men even women check digit modulus-11 march 2010 uptake number based radiology requests varied across scotland 96.5 99.9 depending local nhs board chi number included electronic medical referencing systems ams acute medicine service cms chronic medicine service mas minor ailment scheme connect scotland epharmacy contains details medical patients scotland
[ 9199 ]
None
9,484
4
FlyBack:flyback flyback open-source backup utility linux based git modeled loosely apple time machine flyback creates incremental backups files restored later date flyback presents chronological view file system allowing individual files directories previewed retrieved one time flyback originally based rsync project began 2007 october 2009 rewritten scratch using git flyback presents user typical file-manager style view file system additional controls allowing user go forward backward time shows user files exist exist changed since last version allows preview deciding restore ignore flyback settings preferences flyback ui allows users flyback written python using gtk libraries well program git installed software function properly
[ 9025, 3366, 6280, 1801, 5482, 8554, 1358, 7983, 823, 11256 ]
Test
9,485
4
TCP_Gender_Changer:tcp gender changer tcp gender changer method computer networking making internal tcp/ip based network server accessible beyond protective firewall consists two nodes one resides internal local area network access desired server node runs outside local area network client access nodes respectively called cc connect-connect listen-listen reason behind naming nodes fact connect-connect node initiates two connections one listen-listen node one actual server listen-listen node however passively listens two tcp/ip ports one receive connection cc one incoming connection client cc node runs inside network establish control connection waiting signal open connection internal server upon receiving client connection signal cc node connect server done cc let know result successful keep client connection thus client server communicate cc relay data back forth one cases useful connect desktop machine behind firewall running vnc would make desktop remotely accessible network beyond firewall another useful scenario would create vpn using ppp ssh even simply using ssh connect internal unix based server
[ 10341, 8998, 939, 8432, 5492, 5749 ]
Train