node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
9,486 | 4 | Out_of_the_Inner_Circle:inner circle inner circle hacker guide computer security book bill landreth howard rheingold published 1985 microsoft press distributed simon schuster inc. book created provide insight ways methods hacking community days internet became prevalent although largely outdated nostalgic show brought many current trends see network security today | [
4435,
4956
] | Test |
9,487 | 2 | MacPorts:macports macports formerly called darwinports package management system simplifies installation software macos darwin operating systems open-source software project simplify installation open source software similar aim function fink bsd ports collections darwinports started 2002 part opendarwin project involvement number apple inc. employees including landon fuller kevin van vechten jordan hubbard macports allows installation number packages entering command sudo port install packagename terminal download compile necessary install requested software also installing required dependencies automatically installed packages updated command sudo port upgrade outdated official gui application called pallet also available version 1.0 released april 28 2005 december 2005 project reached milestone surpassing 3000 ports time package installation involved source code downloaded compiled end user machine version 2.0 released 2011 introduced support prebuilt binary archives default ports installed using prebuilt binary archive available built source otherwise macports 21,600 ports macports hosted mac os forge open source hosting service created maintained apple inc. third-party projects supported apple apple closed mac os forge 2016 project moved github best-effort support sourced community macports supports universal binaries powerpc intel-based versions mac os x migrating powerpc installation macports version intel mac requires reinstalling installed ports | [
10760,
8213,
6680,
9245,
5155,
5670,
7722,
5677,
8754,
9784,
10817,
8778,
3667,
6227,
2149,
9324,
1138,
2168,
7293,
9342,
6797,
10900,
10394,
4775,
6828,
3248,
692,
1718,
5819,
190,
708,
4302,
2259,
3286,
6361,
8413,
741,
231,
2281,
5356,... | Test |
9,488 | 4 | Computer_security_software:computer security software computer security software cybersecurity software computer program designed enhance information security defense computers intrusion unauthorized use resources called computer security similarly | [
5636,
6149,
10756,
531,
2601,
6699,
3629,
8753,
569,
7739,
9791,
8784,
107,
2678,
8313,
5245,
5246,
127,
10880,
7809,
9356,
10385,
10392,
156,
5282,
2213,
5799,
7855,
2737,
5305,
10940,
3262,
704,
7362,
7368,
1242,
6373,
4860,
5373,
1279,... | None |
9,489 | 3 | Maxwell_(microarchitecture):maxwell microarchitecture maxwell codename gpu microarchitecture developed nvidia successor kepler microarchitecture maxwell architecture introduced later models geforce 700 series also used geforce 800m series geforce 900 series quadro mxxx series manufactured tsmc 28 nm process first maxwell-based products hit market geforce gtx 750 geforce gtx 750 ti released february 18 2014 chip code number gm107 earlier geforce 700 series gpus used kepler chips code numbers g k 1xx gm10x gpus also used geforce 800m series quadro kxxx series second generation maxwell-based products introduced september 18 2014 geforce gtx 970 geforce gtx 980 followed geforce gtx 960 january 22 2015 geforce gtx titan x march 17 2015 geforce gtx 980 ti june 1 2015 gpus gm 2 0x chip code numbers maxwell introduced improved streaming multiprocessor sm design increased power efficiency sixth seventh generation purevideo hd cuda compute capability 5.2 architecture named james clerk maxwell founder theory electromagnetic radiation maxwell architecture used system chip soc mobile application processor tegra x1 successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink first generation maxwell gpus gm107/gm108 released geforce gtx 745 gtx 750/750 ti gtx 850m/860m gm107 geforce 830m/840m gm108 new chips introduced consumer-facing additional features nvidia instead focused increasing gpu power efficiency l2 cache increased 256 kib kepler 2 mib maxwell reducing need memory bandwidth accordingly memory bus reduced 192 bit kepler gk106 128 bit reducing die area power draw streaming multiprocessor design kepler also retooled partitioned renamed smm maxwell structure warp scheduler inherited kepler texture units fp64 cuda cores still shared layout execution units partitioned warp schedulers smm controls one set 32 fp32 cuda cores one set 8 load/store units one set 8 special function units contrast kepler smx 4 schedulers schedule shared pool execution units prior kepler units connected crossbar uses unnecessary power allow shared maxwell crossbar removed became redundant allowed finer-grained efficient allocation resources kepler saving power workload n't optimal shared resources nvidia claims 128 cuda core smm 90 performance 192 cuda core smx efficiency increases factor 2 also graphics processing cluster gpc contains 4 smx units kepler 5 smm units first generation maxwell gm107 also supports cuda compute capability 5.0 compared 3.5 gk110/gk208 gpus 3.0 gk10x gpus dynamic parallelism hyperq two features gk110/gk208 gpus also supported across entire maxwell product line maxwell also provides native shared memory atomic operations 32-bit integers native shared memory 32-bit 64-bit compare-and-swap cas used implement atomic functions nvidia video encoder nvenc upgraded 1.5 2 times faster kepler-based gpus meaning encode video six eight times playback speed nvidia also claims eight ten times performance increase purevideo feature set e video decoding due video decoder cache paired increases memory efficiency however h.265 supported full hardware decoding first generation maxwell gpus relying mix hardware software decoding decoding video new low power state gc5 used maxwell gpus conserve power maxwell gpus found use tiled rendering second generation maxwell gpus introduced several new technologies dynamic super resolution third generation delta color compression multi-pixel programming sampling nvidia vxgi real-time-voxel-global illumination vr direct multi-projection acceleration multi-frame sampled anti-aliasing mfaa however support coverage-sampling anti-aliasing csaa removed direct3d12 api feature level 12_1 hdmi 2.0 support also added rop memory controller ratio changed 8:1 16:1 however rops generally idle gtx 970 enough enabled smms give work reducing maximum fill rate polymorph engine responsible tessellation upgraded version 3.0 second generation maxwell gpus resulting improved tessellation performance per unit/clock second generation maxwell also 4 smm units per gpc compared 5 smm units per gpc gm204 supports cuda compute capability 5.2 compared 5.0 gm107/gm108 gpus 3.5 gk110/gk208 gpus 3.0 gk10x gpus gm20x gpus upgraded nvenc supports hevc encoding adds support h.264 encoding resolutions 1440p/60fps 4k/60fps compared nvenc maxwell first generation gm10x gpus supported h.264 1080p/60fps encoding consumer complaints nvidia revealed able disable individual units containing 256kb l2 cache 8 rops without disabling whole memory controllers comes cost dividing memory bus high speed low speed segments accessed time reads l2/rop unit managing gddr5 controllers shares read return channel write data bus gddr5 controllers makes simultaneous reading gddr5 controllers simultaneous writing gddr5 controllers impossible used geforce gtx 970 therefore described 3.5 gb high-speed segment 224-bit bus 512 mb low-speed segment 32-bit bus peak speed gpu still attained peak speed figure reachable one segment executing read operation segment executing write operation theoretical single-precision processing power maxwell gpu flops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed hz theoretical double-precision processing power maxwell gpu 1/32 single precision performance noted low compared previous generation kepler successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink | [
3585,
3203,
398,
10658,
2339,
7086,
9774,
9911,
11322,
8514,
7111,
2635,
10971,
2525,
2277,
8937,
11630,
1776,
6900,
2937,
11130
] | Test |
9,490 | 2 | Reference_counting:reference counting computer science reference counting programming technique storing number references pointers handles resource object block memory disk space others garbage collection algorithms reference counts may used deallocate objects longer needed main advantage reference counting tracing garbage collection objects reclaimed soon longer referenced incremental fashion without long pauses collection cycles clearly defined lifetime every object real-time applications systems limited memory important maintain responsiveness reference counting also among simplest forms memory management implement also allows effective management non-memory resources operating system objects often much scarcer memory tracing garbage collection systems use finalizers delayed reclamation may cause problems weighted reference counts good solution garbage collecting distributed system tracing garbage collection cycles triggered often set live objects fills available memory requires extra space efficient reference counting performance deteriorate total amount free space decreases reference counts also useful information use input runtime optimizations example systems depend heavily immutable objects many functional programming languages suffer efficiency penalty due frequent copies however compiler runtime system knows particular object one reference many systems reference lost time similar new object created string append statement codice_1 replace operation mutation original object reference counting naive form two main disadvantages tracing garbage collection require additional mechanisms ameliorate addition memory allocated free list reference counting suffers poor locality reference counting alone move objects improve cache performance high performance collectors implement tracing garbage collector well implementations ones php objective-c suffer poor cache performance since implement copying objects dealing garbage collection schemes often helpful think reference graph directed graph vertices objects edge object object b holds reference b also special vertex vertices representing local variables references held runtime system edges ever go nodes although edges go nodes context simple reference count object in-degree vertex deleting vertex like collecting object done vertex incoming edges affect out-degree vertices affect in-degree vertices causing corresponding objects collected well in-degree also becomes 0 result connected component containing special vertex contains objects ca n't collected connected components graph contain garbage reference-counting garbage collection algorithm implemented garbage components must contain least one cycle otherwise would collected soon reference count i.e. number incoming edges dropped zero incrementing decrementing reference counts every time reference created destroyed significantly impede performance operations take time damage cache performance lead pipeline bubbles even read-only operations like calculating length list require large number reads writes reference updates naive reference counting one simple technique compiler combine number nearby reference updates one especially effective references created quickly destroyed care must taken however put combined update right position premature free avoided deutsch-bobrow method reference counting capitalizes fact reference count updates fact generated references stored local variables ignores references counting references data structures object reference count zero deleted system must verify scan stack registers reference still exists another technique devised henry baker involves deferred increments references stored local variables immediately increment corresponding reference count instead defer necessary reference destroyed quickly need update counter eliminates large number updates associated short-lived references list-length-counting example however reference copied data structure deferred increment must performed time also critical perform deferred increment object count drops zero resulting premature free dramatic decrease overhead counter updates obtained levanoni petrank introduce update coalescing method coalesces many redundant reference count updates consider pointer given interval execution updated several times first points object codice_2 object codice_3 forth end interval points object codice_4 reference counting algorithm would typically execute codice_5 codice_6 codice_7 codice_8 codice_9 ... codice_10 updates redundant order reference count properly evaluated end interval enough perform codice_5 codice_10 rest updates redundant levanoni petrank showed 2001 use update coalescing reference counting collector using update coalescing appropriate treatment new objects 99 counter updates eliminated typical java benchmarks addition need atomic operations pointer updates parallel processors eliminated finally presented enhanced algorithm may run concurrently multithreaded applications employing fine synchronization blackburn mckinley ulterior reference counting method 2003 combines deferred reference counting copying nursery observing majority pointer mutations occur young objects algorithm achieves throughput comparable fastest generational copying collectors low bounded pause times reference counting perhaps obvious way handle reference cycles design system avoid creating system may explicitly forbid reference cycles file systems hard links often judicious use weak non-counted references may also help avoid retain cycles cocoa framework instance recommends using strong references parent-to-child relationships weak references child-to-parent relationships systems may also designed tolerate correct cycles create way developers may design code explicitly tear references data structure longer needed though cost requiring manually track data structure lifetime technique automated creating owner object tearing-down destroyed instance graph object destructor could delete edges graphnodes breaking reference cycles graph cycles may even ignored systems short lives small amount cyclic garbage particularly system developed using methodology avoiding cyclic data structures wherever possible typically expense efficiency computer scientists also discovered ways detect collect reference cycles automatically without requiring changes data structure design one simple solution periodically use tracing garbage collector reclaim cycles since cycles typically constitute relatively small amount reclaimed space collector run much less often ordinary tracing garbage collector bacon describes cycle-collection algorithm reference counting similarities tracing collectors including theoretical time bounds based observation cycle isolated reference count decremented nonzero value objects occurs put roots list periodically program searches objects reachable roots cycles knows found cycle collected decrementing reference counts cycle references brings zero enhanced version algorithm paz et al able run concurrently operations improve efficiency using update coalescing method levanoni petrank although possible augment simple reference counts variety ways often better solution found performing reference counting fundamentally different way describe variants reference counting benefits drawbacks weighted reference counting reference assigned weight object tracks number references referring total weight references referring initial reference newly created object large weight 2 whenever reference copied half weight goes new reference half weight stays old reference since total weight change object reference count need updated destroying reference decrements total weight weight reference total weight becomes zero references destroyed attempt made copy reference weight 1 reference get weight adding total weight adding new weight reference splitting alternative situation create indirection reference object initial reference created large weight split property needing access reference count reference copied particularly helpful object reference count expensive access example another process disk even across network also help increase concurrency avoiding many threads locking reference count increase thus weighted reference counting useful parallel multiprocess database distributed applications primary problem simple weighted reference counting destroying reference still requires accessing reference count many references destroyed cause bottlenecks seek avoid adaptations weighted reference counting seek avoid attempting give weight back dying reference one still active weighted reference counting independently devised bevan watson watson 1987 indirect reference counting necessary keep track reference obtained means two references kept object direct one used invocations indirect one forms part diffusion tree dijkstra-scholten algorithm allows garbage collector identify dead objects approach prevents object discarded prematurely collection algorithm reference counting tracks object count number references held objects object reference count reaches zero object become inaccessible destroyed object destroyed objects referenced object also reference counts decreased removing single reference potentially lead large number objects freed common modification allows reference counting made incremental instead destroying object soon reference count becomes zero added list unreferenced objects periodically needed one items list destroyed simple reference counts require frequent updates whenever reference destroyed overwritten reference count object references decremented whenever one created copied reference count object references incremented reference counting also used file systems distributed systems full non-incremental tracing garbage collection time consuming size object graph slow access speed microsoft component object model com winrt makes pervasive use reference counting fact two three methods com objects must provide iunknown interface increment decrement reference count much windows shell many windows applications including ms internet explorer ms office countless third-party products built com demonstrating viability reference counting large-scale systems one primary motivation reference counting com enable interoperability across different programming languages runtime systems client need know invoke object methods order manage object life cycle thus client completely abstracted whatever memory allocator implementation com object uses typical example visual basic program using com object agnostic towards whether object allocated must later deallocated c++ allocator another visual basic component c++ perform reference-counting default fulfilling philosophy adding functionality might incur overheads user explicitly requested objects shared owned accessed via reference raw pointer iterator conceptual generalisation pointers however token c++ provides native ways users opt-into functionality c++11 provides reference counted smart pointers via class enabling automatic shared memory-management dynamically allocated objects programmers use conjunction weak pointers via break cyclic dependencies objects dynamically allocated intended shared lifetime automatically managed using addition c++11 move semantics reduce extent reference counts need modified removing deep copy normally used function returns object allows simple copy pointer said object apple cocoa cocoa touch frameworks related frameworks core foundation use manual reference counting much like com traditionally accomplished programmer manually sending codice_13 codice_14 messages objects automatic reference counting clang compiler feature automatically inserts messages needed added ios 5 mac os x 10.7 mac os x 10.5 introduced tracing garbage collector alternative reference counting deprecated os x 10.8 removed objective-c runtime library macos sierra ios never supported tracing garbage collector one language uses reference counting garbage collection delphi delphi mostly garbage collected language user-defined types must still manually allocated deallocated provide automatic collection however built-in types strings dynamic arrays interfaces ease use simplify generic database functionality programmer decide whether use built-in types delphi programmers complete access low-level memory management like c/c++ potential cost delphi reference counting desired easily circumvented reasons reference counting may preferred forms garbage collection delphi include gobject object-oriented programming framework implements reference counting base types including weak references reference incrementing decrementing uses atomic operations thread safety significant amount work writing bindings gobject high-level languages lies adapting gobject reference counting work language memory management system vala programming language uses gobject reference counting primary garbage collection system along copy-heavy string handling perl also uses reference counting without special handling circular references although cocoa c++ perl support weak references allows programmers avoid creating cycle php uses reference counting mechanism internal variable management since php 5.3 implements algorithm bacon mentioned paper php allows turn cycle collection user-level functions also allows manually force purging mechanism run python also uses reference counting offers cycle detection well reclaim squirrel also uses reference counting offers cycle detection well tiny language relatively unknown outside video game industry however concrete example reference counting practical efficient especially realtime environments tcl 8 uses reference counting memory management values tcl obj structs since tcl values immutable reference cycles impossible form cycle detection scheme needed operations would replace value modified copy generally optimized instead modify original reference count indicates unshared references counted data structure level problems frequent updates discussed arise xojo also uses reference counting without special handling circular references although cocoa c++ xojo support weak references allows programmers avoid creating cycle many file systems maintain count number references particular block file example inode link count unix-style file systems references usually called hard links count falls zero file safely deallocated addition references still made directories unixes allow referencing solely made live processes files exist file system hierarchy | [
2304,
3076,
8582,
4747,
8587,
2832,
5008,
9490,
11539,
11674,
7580,
541,
3102,
3871,
1954,
5154,
4777,
814,
1715,
692,
1844,
7219,
8631,
3512,
11317,
10044,
2625,
1474,
8644,
7237,
8772,
1736,
4424,
6730,
716,
6221,
3790,
847,
5840,
7292,... | None |
9,491 | 2 | Windows_Template_Library:windows template library windows template library wtl free software object-oriented c++ template library win32 development wtl created microsoft employee nenad stefanovic internal use later released unsupported add-on visual studio win32 framework sdk developed primarily light-weight alternative microsoft foundation classes builds upon microsoft atl another lightweight api widely used create com activex libraries wtl provides support implementing various user interface elements frame popup windows mdi standard common controls common dialogs property sheets pages gdi objects common ui elements scrollable windows splitter windows toolbars command bars wtl main objective deliver small efficient code close size speed straight sdk programs providing higher-level flexible object model developers classes string wrapper syntax-compatible mfc codice_1 templated collections also included wtl api mirror standard win32 calls interface tends familiar windows programmers although official documentation microsoft exists wtl documentation project attempting create comprehensive reference library wtl supported microsoft product support services wtl template library therefore code-based original license similar one used microsoft foundation class library mfc source code although contained usage distribution restrictions 2004 microsoft made complete source code available common public license released sourceforge since version 9.1 library licensed microsoft public license | [
10243,
2062,
9234,
1043,
9245,
1055,
2083,
8227,
1577,
2603,
5165,
5677,
3631,
4143,
9263,
8246,
576,
8771,
4178,
9813,
10841,
603,
2658,
5743,
8303,
2673,
8304,
1656,
9848,
5754,
7292,
9340,
1664,
5761,
1666,
9348,
5765,
10886,
2183,
525... | None |
9,492 | 9 | Robert_S._Boyer:robert s. boyer robert stephen boyer retired professor computer science mathematics philosophy university texas austin j strother moore invented boyer–moore string search algorithm particularly efficient string searching algorithm 1977 moore also collaborated boyer–moore automated theorem prover nqthm 1992 following worked moore matt kaufmann another theorem prover called acl2 boyer published extensively including following books | [
11488,
4612,
5064,
11083,
4916,
1783
] | Test |
9,493 | 7 | Veniam:veniam veniam technology startup intelligent networking platform moves massive amounts data connected vehicles cloud veniam unique mobile-data platform built future based autonomous vehicles avs emerging “ internet moving things ” brings three essential enablers vision truly smart cities multinetwork mesh networking local data management low-latency company headquartered mountain view california founded 2012 company received 4.9 million dollars 2014 funding round true ventures usv cane investments veniam technology used porto city buses 230,000 users onboard units obus installed 600 buses taxis garbage trucks aim equip many moving things wireless hotspots creating mesh could used build sensors turn city smarter.each vehicle equipped netrider multi network unit wi-fi 802.11p dsrc gps 4g/lte connectivity veniam founded joão barros ceo roy russell former zipcar cto susana sargento professor university aveiro robin chase former ceo zipcar buzzcar veniam platform | [] | None |
9,494 | 9 | Action_description_language:action description language artificial intelligence action description language adl automated planning scheduling system particular robots considered advancement strips edwin pednault specialist field data abstraction modelling ibm research staff member data abstraction research group since 1996 proposed language 1987 example action language pednault observed expressive power strips susceptible improved allowing effects operator conditional main idea adl-a basically propositional fragment adl proposed pednault adl-b extension -a -b extension actions described indirect effects introduction new kind propositions ” static laws third variation adl adl-c similar -b sense propositions classified static dynamic laws particularities sense planning language represent certain conditions environment based automatically generate chain actions lead desired goal goal certain partially specified condition action executed preconditions must fulfilled execution action yields effects environment changes environment described means certain predicates either fulfilled contrary strips principle open world applies adl everything occurring conditions unknown instead assumed false addition whereas strips positive literals conjunctions permitted adl allows negative literals disjunctions well adl schema consists action name optional parameter list four optional groups clauses labeled precond add delete update precond group list formulae define preconditions execution action set empty value true inserted group preconditions always evaluated holding conditions add delete conditions specified add delete groups respectively group consists set clauses forms shown left-hand column figure 1 update groups used specify update conditions change values function symbols update group consists set clauses forms shown left column figure 2 formal semantic adl defined 4 constraints first constraint actions may change set objects exist world means every action α every current-state/next-state pair ∈ must case domain equal domain second constraint actions adl must deterministic current-state/next-state pairs action ∃ must case third constraint incorporated adl functions introduced must representable first-order formulas every n -ary relation symbol r must exist formula φ x ... x free variables x ... x f given consequently f n ... x true performing action |= φ x ... x true beforehand note representability requirement relies first constraint domain f equal domain fourth final constraint incorporated adl set states action executable must also representable formula every action α represented adl must exist formula π property |= π state ∈ α i.e action α executable state terms computational efficiency adl located strips situation calculus adl problem translated strips instance – however existing compilation techniques worst-case exponential worst case improved willing preserve length plans polynomially thus adl strictly brief strips adl planning still pspace-complete problem algorithms polynomial space even preconditions effects complex formulae top-performing approaches classical planning internally utilize strips like representation fact planners ff lpg fast-downward sgplan5 lama first translate adl instance one essentially strips one without conditional quantified effects goals expressiveness strips language constrained types transformations sets formulas described language transformations sets formulas using strips operators accomplished removing formulas set transformed adding new additional formulas given strips operator formulas added deleted fixed sets formulas transformed consequently strips operators adequately model actions whose effects depend situations performed consider rocket going fired certain amount time trajectory may vary burn duration also velocity mass orientation rocket modelled means strips operator formulas would added deleted would depend set formulas transformed although efficient reasoning possible strips language used generally recognized expressiveness strips suitable modeling actions many real world applications inadequacy motivated development adl language adl expressiveness complexity lies strips language situation calculus expressive power sufficient allow rocket example described represented yet time restrictive enough allow efficient reasoning algorithms developed example complex version blocks world could block twice big blocks b c action xmoveonto b might effect negating clear c already true creating conditional effect depending size blocks kind conditional effects would hard express strips notation without conditional effects consider problem air freight transport certain goods must transported airport another airport plane airplanes need loaded unloaded necessary actions would loading unloading flying descriptors one could express whether freight c airplane p whether object x airport actions could defined follows | [
10042
] | Test |
9,495 | 7 | DesktopTwo:desktoptwo desktoptwo free webtop whose url desktoptwo.com parked domain developed sapotek whose url sapotek.com also parked domain also called webos although sapotek stated website term premature presumptuous mimics look feel functionality desktop environment operating system software reached beta stage spanish version called computadora.de desktoptwo web-based required adobe flash player operate web applications found desktoptwo built php back end features included drag-and-drop functionality sapotek liberated web applications found desktoptwo sapodesk agpl license desktoptwo belonged category services intended turn web full-fledged platform using web services foundation along presentation technologies replicated experience desktop applications users cloud os functionality server granularized abstracted web services web developers used create composite applications similar desktop software developers use several apis os create applications sites like facebook attempt create similar effect exposing apis allowing developers create applications upon features found desktoptwo file sharing webmail blog creator instant messenger address book calendar rss reader office productivity applications desktoptwo.com since closed longer running goes sapotek website sapotek since gone public market closed doors | [
3833,
8644,
7983
] | Test |
9,496 | 4 | MoBlock:moblock moblock free software blocking connections specified range hosts moblock ip address filtering program linux similar peerguardian microsoft windows development stopped favor phoenix labs official peerguardian linux parts code merged peerguardian linux | [
1792,
2049,
4480,
2563,
1163,
6797,
1172,
3482,
1436,
4511,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
5178,
11577,
9279,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10451,
10708,
4568,
4953,
... | None |
9,497 | 9 | Referential_transparency:referential transparency referential transparency referential opacity properties parts computer programs expression called referentially transparent replaced corresponding value without changing program behavior requires expression pure say expression value must inputs evaluation must side effects expression referentially transparent called referentially opaque mathematics function applications referentially transparent definition constitutes mathematical function however always case programming terms procedure method used avoid misleading connotations functional programming referentially transparent functions considered programming languages provide means guarantee referential transparency functional programming languages enforce referential transparency functions importance referential transparency allows programmer compiler reason program behavior rewrite system help proving correctness simplifying algorithm assisting modifying code without breaking optimizing code means memoization common subexpression elimination lazy evaluation parallelization concept seems originated alfred north whitehead bertrand russell principia mathematica 1910–13 adopted analytical philosophy willard van orman quine §30 word object 1960 quine gives definition mode containment φ referentially transparent whenever occurrence singular term purely referential term sentence ψ purely referential also containing term sentence φ ψ term appeared contemporary usage discussion variables programming languages christopher strachey seminal set lecture notes fundamental concepts programming languages 1967 lecture notes referenced quine word object bibliography functions involved expression pure functions expression referentially transparent consider function returns input source pseudocode call function might codice_1 codice_2 might identify particular disk file keyboard etc even identical values codice_2 successive return values different therefore function codice_4 neither deterministic referentially transparent subtle example function free variable i.e. depends input explicitly passed parameter resolved according name binding rules non-local variable global variable variable current execution environment dynamic binding variable closure static binding since variable altered without changing values passed parameter results subsequent calls function may differ even parameters identical however pure functional programming destructive assignment allowed thus free variable statically bound value function still referentially transparent neither non-local variable value change due static binding immutability respectively arithmetic operations referentially transparent codice_5 replaced codice_6 instance fact functions mathematical sense referentially transparent codice_7 transparent since always give result particular codice_8 assignments transparent instance c expression codice_9 changes value assigned variable codice_8 assuming codice_8 initially value codice_12 two consecutive evaluations expression yield respectively codice_13 codice_14 clearly replacing codice_9 either codice_13 codice_14 gives program different meaning expression referentially transparent however calling function codice_18 transparent implicitly change input x thus side effects codice_19 transparent evaluate replace value say jan 1 2001 n't get result run tomorrow depends state date languages side-effects like haskell substitute equals equals codice_20 every value x hold languages side-effects substitution expression value valid certain point execution program expression referentially transparent definition ordering sequence points theoretical foundation imperative programming part semantics imperative programming language however referentially transparent expression evaluated time necessary define sequence points guarantee order evaluation programming done without considerations called purely functional programming one advantage writing code referentially transparent style given intelligent compiler static code analysis easier better code-improving transformations possible automatically example programming c performance penalty including call expensive function inside loop even function call could moved outside loop without changing results program programmer would forced perform manual code motion call possibly expense source code readability however compiler able determine function call referentially transparent perform transformation automatically primary disadvantage languages enforce referential transparency make expression operations naturally fit sequence-of-steps imperative programming style awkward less concise languages often incorporate mechanisms make tasks easier retaining purely functional quality language definite clause grammars monads example let use two functions one referentially opaque referentially transparent function codice_21 referentially transparent means codice_22 codice_23 instance codice_24 however ca n't say thing codice_25 uses global variable modifies referential opacity codice_25 makes reasoning programs difficult example say wish reason following statement one may tempted simplify statement however work codice_27 occurrence codice_28 evaluates different value remember return value codice_25 based global value n't passed gets modified call codice_25 means mathematical identities formula_1 longer hold mathematical identities hold referentially transparent functions codice_21 however sophisticated analysis used simplify statement takes steps requires degree insight code infeasible compiler optimization therefore referential transparency allows us reason code lead robust programs possibility finding bugs could n't hope find testing possibility seeing opportunities optimization | [
1152,
2817,
1952,
11361,
3876,
8262,
6536,
7627,
10571,
655,
5456,
10011,
2045
] | Validation |
9,498 | 2 | Samsung_Ativ_Tab:samsung ativ tab samsung ativ tab tablet manufactured samsung ativ tab announced august 29 2012 ifa 2012 incorporates dual-core 1.2 ghz qualcomm snapdragon s4 processor runs windows rt operating system despite mixed reception windows rt operating system received comparison windows 8 ativ tab received positive reviews lightweight design ability use usb peripherals overall performance first generation windows rt device ativ tab released december 2012 united kingdom release germany united states cancelled due lukewarm reception unclear positioning windows rt design ativ tab relatively similar android-based counterparts galaxy note 10.1 built using mixture plastic glass micro hdmi port microsd slot full-size usb port incorporated design well volume rocker power button headphone jack located top physical windows button located directly screen charging port dock connector located bottom ativ tab uses ips display resolution 1366x768 tablet available either 32 gb 64 gb internal storage ativ tab originally scheduled release united kingdom november 2012 alongside windows phone 8 counterpart samsung ativ delayed mid-december release devices eventually held december 14 2012 january 2013 samsung announced cancelled american release ativ tab citing unclear positioning windows rt operating system modest demand windows rt devices plus effort investment required educate consumers differences windows 8 rt reasons move mike abary senior vice president samsung u.s. pc tablet businesses also stated company unable build ativ tab meet target price pointconsidering lower cost intended selling point windows rt devices samsung also reportedly planned pull ativ tab germany unspecified european markets similar reasons whilst demoing device ifa techradar praised ativ tab crisp screen lightweight design ability expand functionality storage usb port microsd card slot however also said processor relatively responsive certainly n't league galaxy note 2 anandtech said despite best substitute actual notebook due lagging performance arm-based processors rushed nature os ativ tab well executed first-generation windows rt device tablet relatively snappy performance battery life lightweight design regarded positive aspectsdespite considering design nothing particularly new exciting qualcomm apq8060a chipset used ativ tab also judged best processor windows rt far noting performance sufficient surprisingly competitive comparison chipsets used competing windows rt devices rear camera considered neither horrible great lack keyboard accessory dock connector also noted | [
9863,
1832,
3304,
5384,
6797,
7983,
1776,
4816,
3605,
1400,
9913,
10303
] | Test |
9,499 | 4 | Computer_recycling:computer recycling computer recycling electronic recycling e-waste recycling disassembly separation components raw materials waste electronics although procedures re-use donation repair strictly recycling common sustainable ways dispose waste 2009 38 computers quarter total electronic waste recycled united states 5 3 3 years prior respectively since inception early 1990s devices recycled worldwide due increased awareness investment electronic recycling occurs primarily order recover valuable rare earth metals precious metals short supply well plastics metals resold used new devices purification effect creating circular economy however one also make use useful components dead computers may damaged beyond repair make use parts new computers may cover material costs another cheap way recycling homes working areas recycling considered environmentally friendly prevents hazardous waste including heavy metals carcinogens entering atmosphere landfill waterways electronics consist small fraction total waste generated far dangerous stringent legislation designed enforce encourage sustainable disposal appliances notable waste electrical electronic equipment directive european union united states national computer recycling act obsolete computers old electronics valuable sources secondary raw materials recycled otherwise devices source toxins carcinogens rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe technical solutions available cases legal framework collection system logistics services need implemented applying technical solution u.s. environmental protection agency estimates 30 40 million surplus pcs classified hazardous household waste would ready end-of-life management next years u.s. national safety council estimates 75 personal computers ever sold surplus electronics 2007 united states environmental protection agency epa stated 63 million computers u.s. traded replacements discarded today 15 electronic devices equipment recycled united states electronic waste sent landfills incinerated releases materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment many materials used computer hardware recovered recycling use future production reuse tin silicon iron aluminium variety plastics present bulk computers electronics reduce costs constructing new systems components frequently contain copper gold tantalum silver platinum palladium lead well valuable materials suitable reclamation computer components contain many toxic substances like dioxins polychlorinated biphenyls pcbs cadmium chromium radioactive isotopes mercury typical computer monitor may contain 6 lead weight much lead glass cathode ray tube crt typical 15 inch 38 cm computer monitor may contain lead monitors estimated lead circuit boards contain considerable quantities lead-tin solders likely leach groundwater create air pollution due incineration us landfills 40 lead content levels e-waste processing e.g incineration acid treatments required reclaim precious substances may release generate synthesize toxic byproducts export waste countries lower environmental standards major concern basel convention includes hazardous wastes limited crt screens item may exported transcontinentally without prior consent country exporting receiving waste companies may find cost-effective short term sell outdated computers less developed countries lax regulations commonly believed majority surplus laptops routed developing nations high value working reusable laptops computers components e.g ram help pay cost transportation many worthless commodities laws governing exportation waste electronics put place govern recycling companies developed countries ship waste third world countries however concerns impact e-recycling human health health recycling workers environmental degradation remain example due lack strict regulations developing countries sometimes workers smash old products propelling toxins ground contaminating soil putting wear shoes danger procedures include burning away wire insulation acid baths resell circuit boards methods pose environmental health hazards toxins released air acid bath residue enter water supply switzerland first electronic waste recycling system implemented 1991 beginning collection old refrigerators years electric electronic devices gradually added system established producer responsibility organization swico mainly handling information communication organization technology european union implemented similar system february 2003 waste electrical electronic equipment directive weee directive 2002/96/ec pan european adoption legislation slow take-up italy united kingdom final member states pass law success weee directive varied significantly state state collection rates varying 13 kilograms per capita per annum little 1 kg per capita per annum computers electronic wastes collected households within europe treated weee directive via producer compliance schemes whereby manufacturers electronics pay scheme funds recovery household waste recycling centres hwrcs nominated waste treatment facilities known obligated weee however recycling ex corporate computer hardware associated electronic equipment falls outside producer compliance scheme known non-obligated uk waste obsolete corporate related computer hardware treated via third party authorized treatment facilities normally impose charge collection treatment united states congress considers number electronic waste bills like national computer recycling act introduced congressman mike thompson d-ca main federal law governing solid waste resource conservation recovery act 1976 covers crts though state regulations may differ also separate laws concerning battery disposal march 25 2009 house science technology committee approved funding research reducing electronic waste mitigating environmental impact regarded sponsor ralph hall r-tx first federal bill directly address electronic waste many states introduced legislation concerning recycling reuse computers computer parts electronics american computer recycling legislations address within larger electronic waste issue 2001 arkansas enacted arkansas computer electronic solid waste management act requires state agencies manage sell surplus computer equipment establishes computer electronics recycling fund authorizes department environmental quality regulate and/or ban disposal computer electronic equipment arkansas landfills recently passed electronic device recycling research development act distributes grants universities government labs private industries research developing projects line e-waste recycling refurbishment japan sellers manufacturers certain electronics televisions air conditioners required recycle covered least two legislations law promotion effective utilization resources lpur law recycling specified kinds home appliances lrha former passed 2001 encouraged manufacturers voluntarily help recycle goods lrha adopted 2009 required recycling efforts consumers manufacturers home appliances however legislation exists cover recycling computer cellphone-related wastes required south korea taiwan sellers manufacturers electronics responsible recycling 75 used products south korea local governments introduced recycling initiatives case seoul launched specialized e-waste recycling program includes sr center recycling facility takes apart salvages materials fifth 10-ton e-waste city generates year according report unep titled recycling – e-waste resources amount e-waste produced – including mobile phones computers – could rise much 500 percent next decade countries india one theory increased regulation electronic waste concern environmental harm mature economies creates economic disincentive remove residues prior export critics trade used electronics maintain easy brokers calling recyclers export unscreened electronic waste developing countries china india parts africa thus avoiding expense removing items like bad cathode ray tubes processing expensive difficult developing countries becoming big dump yards e-waste proponents international trade point success fair trade programs industries cooperation led creation sustainable jobs bring affordable technology countries repair reuse rates higher organizations like a2z group stepped responsibility collect recycle e-waste various locations india thanks national environmental management act 1998 national environmental management waste act 2008 person position causing harm environment failing comply waste act could fined r10 million put jail receive penalties transgressions consumer recycling options consists see sale donating computers directly organizations need sending devices directly back original manufacturers getting components convenient recycler refurbisher rising price precious metals — coupled high rate unemployment great recession — led larger number amateur profit electronics recyclers computer parts example stripped valuable components sold scrap metals like copper aluminium lead gold palladium recovered computers televisions recycling process tvs monitors mobile phones computers typically tested reuse repaired broken may disassembled parts still high value labour cheap enough e-waste shredded roughly 100 mm pieces manually checked separate toxic batteries capacitors contain poisonous metals remaining pieces shredded ~10 mm passed magnet remove ferrous metals eddy current ejects non-ferrous metals sorted density either centrifuge vibrating plates precious metals dissolved acid sorted smelted ingots remaining glass plastic fractions separated density sold re-processors tvs monitors must manually disassembled remove either toxic lead crts mercury flat screens corporations face risks incompletely destroyed data improperly disposed computers uk recycling companies use specialized weee-registered contractor dispose equipment electrical appliances disposes safely legally america companies liable compliance regulations even recycling process outsourced resource conservation recovery act companies mitigate risks requiring waivers liability audit trails certificates data destruction signed confidentiality agreements random audits information security national association information destruction international trade association data destruction providers online auctions alternative consumers willing resell cash less fees complicated self-managed competitive environment paid listings might sell online classified ads similarly risky due forgery scams uncertainty researching computer companies computer purchase consumers find offer recycling services major computer manufacturers offer form recycling user request may mail old computers arrange pickup manufacturer hewlett-packard also offers free recycling one national recycling programs available nationally rather one two specific states hewlett-packard also offers pick computer product brand fee offer coupon purchase future computers components largest computer recycler america 2003 recycled electronic waste globally since 1995 encourages shared approach collection points consumers recyclers meet manufacturers often offer free replacement service purchasing new pc dell computers apple inc. take back old products one buys new one refurbish resell computers one-year warranty many companies purchase recycle brands working broken laptops notebook computers individuals corporations building market recycling desktop computers proven difficult exchange programs laptops smartphones smaller electronics basic business model provide seller instant online quote based laptop characteristics send shipping label prepaid box seller erase reformat process laptop pay rapidly cheque majority companies also generalized electronic waste recyclers well organizations recycle computers exclusively include cash laptops laptop refurbisher nevada claims first buy laptops online 2001 constant rising costs due inflation many families schools sufficient funds available computers utilized along education standards families also impacted disaster suffer well due financial impact situation incurred many nonprofit organizations interconnection.org found locally well around web give detailed descriptions methods used dissemination detailed instructions donate impact seen locally globally affecting thousands need canada non profit organizations engaged computer recycling electronic recycling association calgary edmonton vancouver winnipeg toronto montreal computers schools canada wide active collecting refurbishing computers laptops help non profit charitable sectors schools term junkyard computing colloquial expression using old inferior hardware fulfill computational tasks handling reliability availability software level utilizes abstraction computational resources via software allowing hardware replacement low effort ease replacement hereby corner point since hardware failures expected time due condition underlying infrastructure paradigm became widely used introduction cluster orchestration software like kubernetes apache mesos since large monolithic applications require reliability availability machine level whereas kind software fault tolerant design orchestration tools also introduced fairly fast set-up processes allowing use junkyard computing economically even making pattern applicable first place use cases introduced continuous delivery getting widely accepted infrastructure execute tests static code analysis needed requires much performance possible extremely cost effective economical technological perspective junkyard computing practicable small number users companies already requires decent number physical machines compensate hardware failures maintaining required reliability availability implies direct need matching underling infrastructure house computers servers scaling paradigm also quite limited due increasing importance factors like power efficiency maintenance efforts making kind computing perfect mid-sized applications although consumer electronics radio popular since 1920s recycling almost unheard early 1990s end 1970s accelerating pace domestic consumer electronics drastically shortened lifespan electronics tvs vcrs audio new innovations appeared quickly making older equipment considered obsolete increased complexity sophistication manufacture made local repair difficult retail market shifted gradually substantially high-value items cherished years repaired necessary short-lived items rapidly replaced owing wear simply fashion discarded rather repaired particularly evident computing highlighted moore law 1988 two severe incidents highlighted approaching e-waste crisis cargo barge khian sea loaded 14,000 tons toxic ash pennsylvania refused acceptance new jersey caribbean sailing 16 months waste dumped topsoil fertiliser haiti bay bengal november 1988 june 1988 large illegal toxic waste dump created italian company discovered led formation basel convention stem flow poisonous substances developed countries 1989 1991 first electronic waste recycling system implemented switzerland beginning collection old refrigerators gradually expanding cover devices organisation swico handles programme partnership retailers first publication report recycling computers electronic waste published front page new york times april 14 1993 columnist steve lohr detailed work advanced recovery inc. small recycler trying safely dismantle computers even waste landfilled several companies emerged early 1990s chiefly europe national 'take back laws compelled retailers use schemes set many countries capacity deal sheer quantity e-waste generated hazardous nature began export problem developing countries without enforced environmental legislation cheaper cost recycling computer monitors us ten times china demand asia electronic waste began grow scrap yards found could extract valuable substances copper iron silicon nickel gold recycling process waste electrical electronic equipment directive weee directive became european law february 2003 covers aspects recycling types appliance followed electronic waste recycling act enshrined californian law january 2005 2000s saw large increase sale electronic devices growth waste stream 2002 e-waste grew faster type waste eu caused investment modern automated facilities cope influx redundant appliances e-cycling e-waste initiative united states environmental protection agency epa refers donations reuse shredding general collection used electronics generically term refers process collecting brokering disassembling repairing recycling components metals contained used discarded electronic equipment otherwise known electronic waste e-waste e-cyclable items include limited televisions computers microwave ovens vacuum cleaners telephones cellular phones stereos vcrs dvds anything cord light takes kind battery investment e-cycling facilities increasing recently due technology ’ rapid rate obsolescence concern improper methods opportunities manufacturers influence secondary market used reused products higher metal prices also recycling taking place controversy around methods stems lack agreement preferred outcomes world markets lower disposable incomes consider 75 repair reuse valuable enough justify 25 disposal debate certification standards may leading better definitions though civil law contracts governing expected process still vital contracted process poorly defined e-cycling e-waste disposal occurring processing reuse repair equipment recovery metals may unethical illegal e-scrap many kinds transported overseas developing countries processing transported repaired and/or recycled processing less valuable e-scrap becomes e-waste/pollution another point view net environmental cost must compared include mining refining extraction waste pollution cost new products manufactured replace secondary products routinely destroyed wealthier nations economically repaired older obsolete products example negative impacts e-waste pollution groundwater become serious areas surrounding china ’ landfills water must shipped away however mining new metals even broader impacts groundwater either thorough e-cycling processing domestic processing overseas repair help environment avoiding pollution e-cycling theoretically sustainable alternative disposing e-waste landfills addition e-cycling allows reclamation potential conflict minerals like gold wolframite requires less mined lessens potential money flow militias exploitative actors third-world profit mining supporters one form required e-cycling legislation argue e-cycling saves taxpayers money financial responsibility would shifted taxpayer manufacturers advocates simple legislation landfill bans e-waste argue involving manufacturers reduce cost consumers reuse value lost resulting costs passed consumers new products particularly affecting markets hardly afford new products theorized manufacturers take part e-cycling would motivated use fewer materials production process create longer lasting products implement safer efficient recycling systems theory sharply disputed never demonstrated critics e-cycling vocal advocates according reason foundation e-cycling raises product waste management costs e-waste consumers limits innovation part high-tech companies also believe e-cycling facilities could unintentionally cause great harm environment critics claim e-waste ’ occupy significant portion total waste according european study 4 waste electronic another opposition e-cycling many problems posed disassembly process costly dangerous heavy metals electronic products composed little 1–5 original cost materials retrieved final problem people find identity fraud common regards disposal electronic products programs legislated creating winners losers among e-cyclers different locations processes may difficult distinguish criticism e-cycling practice criticism specific legislated means proposed enhance hefty criticism often lobbed reuse based recyclers people think recycling electronic waste reality actually exported developing countries like china india nigeria instance free recycling drives recyclers may staying true word selling e-waste overseas parts brokers studies indicate 50–80 300,000 400,000 tons 270,000 360,000 tonnes e-waste sent overseas approximately 2 million tons 1.8 million tonnes per year go u.s. landfills although possible circumstances best way e-cycle upcycle e-waste hand electronic products question generally manufactured repaired warranty nations anti-reuse recyclers depict primitive reuse-based e-recyclers believe fair-trade incentives export markets lead better results domestic shredding continued debate export-friendly e-cycling increased regulation practice european union debate regarding export e-waste resulted significant amendment weee directive january 2012 view significantly diminishing export weee untreated e-waste debate strasburg meps stated 53 million tonnes weee generated 2009 18 collected recycling remainder exported sent landfill amendment voted unanimous 95 representatives removed re-use repair refurbishmet aspect directive placed emphasis upon recycling recovery precious metals base metals changes went placing burden upon registered exporters prove used equipment leaving europe fit purpose currently pieces government legislation number grassroots efforts contributed growth e-cycling processes emphasize decreased exports increased reuse rates electronic waste recycling act passed california 2003 requires consumers pay extra fee certain types electronics collected money redistributed recycling companies qualified properly recycle products state legislates e-waste kind consumer fee states efforts focus producer responsibility laws waste disposal bans study shown per capita recovery greater one type legislated program e.g california versus ordinary waste disposal bans e.g massachusetts though recovery greatly increased states use either method september 2006 dell developed nation ’ first completely free recycling program furthering responsibilities manufacturers taking e-cycling manufacturers retailers best buy sony samsung also set recycling programs program accept televisions expensive used electronic item unpopular markets must deal televisions valuable computers cherry picked another step taken recyclers ’ pledge true stewardship sponsored computer takeback campaign signed numerous recyclers promising recycle responsibly grassroots efforts also played big part issue community organizations formed help responsibly recycle e-waste grassroots campaigns basel computer takeback campaign co-coordinated grassroots recycling network silicon valley toxics coalition study shown difference recycling methods pledge data available demonstrate difference management pledge non-pledge companies though assumed risk making false claims prevent pledge companies wrongly describing processes many people believe u.s. follow european union model regards management e-waste refers concept extended producer responsibility started sweden 1990 program directive forces manufacturers take responsibility e-cycling also demands manufacturers mandatory take-back places bans exporting e-waste developing countries british columbia 20 epr programs recycling regulation legislation stops e-waste put landfills recycles instead 80 programs canada 2013 another longer-term solution computers composed less dangerous products many people disagree data provided show people agree european model based agreement measured outcomes experience-based scientific method e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie ghana multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie ways ensure hardware destroyed also private data hard drive customer data stolen lost misplaced contributes ever-growing number people affected identity theft cause corporations lose money image company holds secure data banks law firms pharmaceuticals credit corporations also risk company public image hurt could cause consumers use services could cost millions business losses positive public relation campaigns cost data breaches varies widely ranging 90 50,000 hipaa new hitech amendment came american recovery revitalization act 2009 per customer record depending whether breach “ low-profile ” “ high-profile ” company non-regulated highly regulated area banking medical institutions. ” also major backlash consumer data breach company supposed trusted protect private information organization consumer info file must law red flags clarification act 2010 written information protection policies procedures place serve combat mitigate detect vulnerable areas could result identity theft united states department defense published standard recyclers individuals may meet order satisfy hipaa requirements countries developed standards aimed businesses purpose ensuring security data contained 'confidential computer media nist 800-88 us standard data remenance hmg cesg is5 baseline enhanced uk government protocol data destruction national association information destruction naid international trade association companies providing information destruction services suppliers products equipment services destruction companies also eligible membership naid mission promote information destruction industry standards ethics member companies companies follow guidelines naid also meet federal epa local dep regulations typical process computer recycling aims securely destroy hard drives still recycling byproduct typical process effective computer recycling asset disposal information security alliance adisa publishes adisa asset disposal security standard covers phases e-waste disposal process collection transportation storage sanitization disposal facility also conducts periodic audits disposal vendors | [
1056,
3009,
6658,
10691,
1477,
8678,
5384,
11368,
2282,
11534,
9086,
403,
2867,
2773,
7579,
1083,
6494,
831
] | None |
9,500 | 3 | FMA_instruction_set:fma instruction set fma instruction set extension 128 256-bit streaming simd extensions instructions x86 microprocessor instruction set perform fused multiply–add fma operations two variants fma3 fma4 instructions almost identical functionality compatible contain fused multiply–add fma instructions floating-point scalar simd operations fma3 instructions three operands fma4 ones four fma operation form round · b c round function performs rounding allow result fit within destination register many significant bits fit within destination four-operand form fma4 allows b c four different registers three-operand form fma3 requires register b c three-operand form makes code shorter hardware implementation slightly simpler four-operand form provides programming flexibility see xop instruction set discussion compatibility issues intel amd incompatibility intel fma3 amd fma4 due companies changing plans without coordinating coding details amd changed plans fma3 fma4 intel changed plans fma4 fma3 almost time history summarized follows different compilers provide different levels support fma4 | [
3586,
9092,
2821,
1798,
4491,
4108,
4237,
5645,
6924,
9996,
5649,
7313,
10383,
6038,
9111,
9369,
7963,
2719,
5883,
2088,
2094,
9391,
8120,
8506,
2237,
1085,
8125,
8126,
833,
7234,
9541,
3142,
1998,
5326,
977,
2514,
3537,
2516,
5844,
9428,... | Test |
9,501 | 3 | Rastan_(video_game):rastan video game released rastan outside japan fantasy-themed side-scrolling action game originally released arcades 1987 taito later ported various platforms player controls barbarian warrior embarked quest slay dragon way dragon lair rastan must fight hordes enemy monsters based mythical creatures chimeras harpies controls rastan consists eight-way joystick two buttons attacking jumping using joystick combination either buttons player determine height rastan jumps well direction swings weapon including downwards jumping game uses health gauge system along limited lives although certain obstacles falling body water crushed spiked ceiling instantly kill rastan regardless much health left total six rounds consisting three areas outdoor scene castle scene throne room player must confront stage boss backgrounds outdoor areas feature broad landscapes changing sunlight effects detail game bosses names according msx2 version order appearance consist player pick item touching well new weapons striking current one weapons power-ups picked rastan equipped limited time rastan picks equipable item icon appear lower right corner screen indicator item effect wears rastan wield one weapon time consists mace axe fireball-shooting sword addition standard sword well one type protector shield mantle body armor items necklace ring worn time also jewels gives bonus points well potion bottles restore deplete player health depending color rare golden sheep head restore rastan health completely used thief murderer otherwise could survive difficult times sit beside listen story days filled adventure succeeded obtaining consent princess ceim exchange dragon head kingdom treasures started quest dragon lair journey begun moment lose must hurry seem cursed dragon expected kill dragon situation getting serious afford die yet regret making promise late withdraw one still alive hang dragon come right away cut head obtaining princess treasures left kingdom ceim search country ruler part long story becoming king chance 'll tell adventurous stories rastan saga japanese version features opening sequence player starts game explains purpose rastan journey included export versions simply titled rastan also japanese version player completes stage round victory screen text pertaining storyline overseas versions generic victory screen generic text brave fighter cleared difficult stage. however overseas versions feature different attract sequence shows items obtained player along effect rastan saga far fewer bats bat swarm sequences castle level 1 rastan rastan initially ported various 8-bit home computers europe commodore 64 zx spectrum amstrad cpc imagine software 1987 zx spectrum version awarded 9/10 july 1988 issue sinclair placed number 54 sinclair top 100 list taito imported imagine c64 version united states releasing alongside two additional versions ibm pc apple iigs ported novalogic previously unreleased version atari st discovered demo form 1988 taito developed conversions msx2 japan master system north america europe ports featured redesigned level layouts master system version replacing boss characters well rastan released formation esrb one two known games sega master system feature frontal female nudity miracle warriors in-game sprites illustrations instruction manual depict several female enemy monsters topless fully nude version later ported game gear released exclusively japan august 9 1991 rastan saga emulation rastan arcade game included taito legends vol 1 released playstation 2 xbox windows pc 2006 game followed two sequels rastan saga ii also known two names nastar europe nastar warrior north america rastan also made appearance another taito game titled champion wrestler miracle rastan saffire corporation developed game barbarian released name warrior blade rastan vs. barbarian japan taito published game region game nothing rastan saga dispute title change game released playstation 2 also country get nintendo gamecube version release cancelled north america europe due poor sales indie game völgarr viking developed crazy viking studios windows os x linux xbox one dreamcast described kickstarter page based rastan | [
8709,
4043,
8492,
6797,
10316,
2159,
1776,
4690,
6390,
823,
5275,
1693,
4894
] | None |
9,502 | 4 | Commercial_Product_Assurance:commercial product assurance commercial product assurance cpa cesg approach gaining confidence security commercial products intended supplant approaches common criteria cc cct mark uk government use cpa developed auspices uk government cesg uk national technical authority nta information security cesg also produce architectural patterns cover good practices common business problems looks use cpa product current architectural patterns include comparison schemes | [
8904,
2122,
4595
] | None |
9,503 | 1 | Aria_(storage_engine):aria storage engine aria storage engine mariadb mysql relational database management systems goal make crash-safe alternative myisam yet transactional plans add proper support database transactions point future long-term goal aria default transactional non-transactional storage engine mariadb development since 2007 first announced michael monty widenius blog aria used internal temporary tables mariadb community-developed branch mysql database led widenius aria shipped mysql percona server included tokudb release mariadb maria project hosted launchpad aria initially named maria reference monty youngest child renamed aria 2010 avoid confusion main database developed mariadb aria maria without also pleasant musical term aria similar myisam purpose crash-safe alternative myisam aria support foreign keys currently transactions aria supports non-partitioned aria tables consist three physical files .frm file contains table definition file exists storage engines write data disk .mad file contains data .mai file contains indexes three table formats available aria tables page format available transactional tables fixed dynamic formats used myisam mainly implemented compatibility however myisam compressed format available aria order set table format one use row_format option create table alter table command | [
11392,
8195,
10632,
10258,
10389,
7453,
1950,
7339,
9010,
6721,
5964,
5198,
7506,
9687,
10459,
6245,
7654,
8295,
8683,
2413,
7022,
3188,
4598,
10873,
2810
] | None |
9,504 | 4 | Messaging_Layer_Security:messaging layer security messaging layer security mls security layer end-to-end encrypting messages groups size two many built ietf mls working group designed efficient practical secure security properties mls include message confidentiality message integrity authentication membership authentication asynchronicity forward secrecy post-compromise security scalability idea born 2016 first discussed unofficial meeting ietf 96 berlin attendees wire mozilla cisco initial ideas based pairwise encryption secure 1:1 group communication 2017 academic paper introducing asynchronous ratcheting trees published university oxford setting focus efficient encryption schemes first bof took place february 2018 ietf 101 london founding members mozilla facebook wire google twitter university oxford inria | [
6834
] | Test |
9,505 | 2 | Management_features_new_to_Windows_Vista:management features new windows vista windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement windows setup process completely rewritten deployment mechanisms support per-application remote desktop sessions new diagnostic health monitoring tools range new group policy settings covering many features new windows vista areas interest include major changes task scheduler well addition subsystem unix applications provides posix-compatible environment applications part operating system setup process windows vista completely rewritten image-based setup based windows preinstallation environment winpe version 2.0 amongst features runs entire setup process graphical environment opposed text-based environments previous versions visually user interface resembles windows vista using cleartype fonts aero visual style enabling use mouse prior copying setup image users graphically resize partitions support loading third-party disk drivers improved whereas windows xp supported loading drivers floppy disks setup environment initially loading windows vista additionally supports loading drivers usb firewire storage devices cds dvds within main setup wizard microsoft aimed reduce amount time setup takes complete setup significantly faster windows xp thus windows vista installed little 20 minutes especially notable considering windows vista install three times size predecessor end setup process windows vista automatically downloads applies security device-driver updates windows update new windows recovery environment winre detects fixes startup related problems accessed pressing f8 startup system boots winre interface offers various tests well recovery failure detection tools winre automatically detects blue screen errors registry damage tries repair system get running quickly windows recovery environment tools significantly expanded take advantage new graphical setup environment toolbox presented user offering access repair functions system restore new memory diagnostic tool access complete pc backup restore images access command prompt multiple command prompts spawned command-line tools available command prompts spawned time setup pressing shift+f10 new diagnostic utility dubbed startup repair later automatic repair formerly system recovery troubleshooter wizard designed repair issues may negatively affect windows startup process damaged missing boot system files incompatible drivers issues result damaged hardware startup repair checks corruption operating system components boot configuration data disk file system metadata master boot record windows registry microsoft stated utility intended repair eighty percent issues package manager part windows vista servicing stack replaces previous package installer codice_1 update installer codice_2 microsoft delivers updates windows vista files resources package manager windows update control panel item turn windows features use windows vista servicing stack package manager also install updates offline windows image including updates boot-critical device drivers language packs windows vista introduced component-based servicing cbs architecture installation servicing deployment windows vista uses hardware-independent image windows imaging format wim image file contains necessary bits operating system contents copied target system system specific software device drivers applications installed configured afterwards reduces time taken installation windows vista corporations author image files using wim format might include applications organization wants deploy also multiple images kept single image file target multiple scenarios ability used microsoft include editions windows vista disc install proper version based provided product key addition initial configuration locale settings account names etc supplied xml answer files automate installation microsoft provides tool called imagex support creation custom images edit images created also used generate image running installation including data applications backup purposes wim images also controlled using windows system image manager used edit images create xml answer files unattended installations sysprep also included part windows vista hal-independent also included windows vista improved version files settings transfer wizard known windows easy transfer allows settings inherited previous installations user state migration tool allows migrating user accounts large automated deployments clickonce deployment technology smart client applications enables self-updating windows-based applications installed run minimal user interaction fashion require administrator access activex installer service optional component included business enterprise ultimate editions provides method network administrators domain authorize installation upgrade specific activex controls operating standard user activex components listed group policy installed without user account control consent dialog displayed windows vista includes number self-diagnostic features help identify various problems possible suggest corrective actions event logging subsystem windows vista also completely overhauled rewritten around xml allow applications precisely log events event viewer also rewritten take advantage new features large number different types event logs monitored including administrative operational analytic debug log types instance selecting application logs node scope pane reveals numerous new subcategorized event logs including many labeled diagnostic logs event logs configured automatically forwarded systems running windows vista windows server 2008 event logs also remotely viewed computers multiple event logs centrally logged managed single computer event logs filtered one criteria custom views created one events categorizing advanced filtering allows viewing logs related certain subsystem issue certain component events also directly associated tasks via redesigned event viewer windows error reporting improved significantly windows vista importantly new set public apis created reporting failures application crashes hangs developers create custom reports customize reporting user interface new apis documented msdn architecture windows error reporting revamped focus reliability user experience wer report errors even process bad state example process encountered stack exhaustions peb/teb corruptions heap corruptions etc windows xp process terminated silently without generating error report conditions new feature called problem reports solutions also added control panel applet keeps record system application errors issues well presents probable solutions problems remote desktop protocol 6.0 incorporates support application-level remoting improved security tls 1.0 support connections via ssl gateway improved remoting devices support .net remoting including support remoting windows presentation foundation applications wmi scripting 32-bit color support dual-monitor support network level authentication remote assistance helps troubleshooting remotely full-fledged standalone application use help support center windows messenger based windows desktop sharing api two administrators connect remote computer simultaneously also session automatically reconnects restarting computer also supports session pausing built-in diagnostics xml-based logging reworked use less bandwidth low-speed connections nat traversals also supported session established even user behind nat device remote assistance configurable using group policy supports command-line switches custom shortcuts deployed windows vista also includes windows remote management winrm microsoft ’ implementation ws-management standard allows remote computers easily managed soap-based web service winrm allows obtaining data including wmi management information local remote computers running windows xp windows server 2003 winrm installed computers windows server 2008 ws-management protocol implementations operating systems using winrm scripting objects along compatible command-line tools winrm winrs allows administrators remotely run management scripts winrm session authenticated minimize security risks windows vista includes microsoft management console 3.0 mmc introduced several enhancements including support writing .net snap-ins using windows forms running multiple tasks parallel addition snap-ins present ui different thread operation runs thus keeping snap-in responsive even computationally intensive task new mmc interface includes support better graphics well featuring task pane shows actions available snap-in selected task scheduler windows firewall also thoroughly configurable management console print management enables centralized installation management printers organization allows installation network-attached printers group clients simultaneously provides continually updated status information printers print servers also supports finding printers needing operator attention filtering display printers based error conditions out-of-paper also send e-mail notifications run scripts printer encounters error condition windows vista includes around 2400 group policy settings allow administrators specify configuration connected groups computers especially domain windows vista supports multiple local group policy objects allows setting different levels local group policy individual users new xml based policy definition file format known admx introduced admx files contain configuration settings individual group policy objects gpo domain based gpos admx files centrally stored computers domain retrieve configure using file replication service used replicate files configured system remote location group policy service longer attached winlogon service rather runs service group policy event messages logged system event log group policy uses network location awareness refresh policy configuration soon network configuration change detected new categories policy settings include power management device installations security settings internet explorer settings printer settings among others group policy settings also need used enable two way communication filtering windows firewall default enables incoming data filtering printer settings used install printers based network location whenever user connects different network available printers updated new network group policy settings specify printer available network also printer settings used allow standard users install printers group policy also used specifying quality service qos settings device installation settings used prevent users connecting external storage devices means prevent data theft windows vista improves folder redirection introducing ability independently redirect 10 user profile sub-folders network location windows xp application data desktop documents pictures start menu folders redirected file server also management console snap-in windows vista allow users configure folder redirection clients running windows vista windows xp windows 2000 redesigned task scheduler based management console used automate management configuration tasks already number preconfigured system-level tasks scheduled run various times addition time-based triggers task scheduler also supports calendar event-based triggers starting task particular event logged event log even multiple events occurred also several tasks triggered event configured run either simultaneously pre-determined chained sequence series actions instead create multiple scheduled tasks tasks also configured run based system status idle pre-configured amount time startup logoff specified time tasks triggered xpath expression filtering events windows event log tasks also delayed specified time triggering event occurred repeat event occurs actions need done task fails also configured several actions defined across various categories applications components task scheduler keeps history log execution details tasks features task scheduler include several new command-line tools included windows vista several existing tools also updated tools windows resource kit built-in operating system services unix renamed subsystem unix-based applications included enterprise ultimate editions windows vista network file system nfsv3 client support also included however utilities sdk required downloaded separately also server components sfu product line namely server nfs user name mapping server nis password synchronization etc included windows vista supports scripting automation capabilities using windows powershell object-oriented command-line shell released microsoft included operating system also wmi classes expose controllable features operating system accessed scripting languages 13 new wmi providers included addition dhtml coupled scripting languages even powershell used create desktop gadgets gadgets also created configuration various aspects system | [
2568,
3723,
8080,
2193,
6674,
9874,
3351,
4248,
537,
9114,
6812,
8988,
929,
9762,
4771,
10020,
11683,
7847,
1577,
10026,
2603,
1581,
2221,
1844,
1077,
9780,
7863,
9910,
11572,
6972,
6462,
319,
960,
1348,
8391,
1098,
10828,
4174,
5969,
328... | Test |
9,506 | 5 | Van_Jacobson_TCP/IP_Header_Compression:van jacobson tcp/ip header compression van jacobson tcp/ip header compression data compression protocol described rfc 1144 specifically designed van jacobson improve tcp/ip performance slow serial links van jacobson compression reduces normal 40 byte tcp/ip packet headers 3-4 bytes average case saving state tcp connections ends link sending differences header fields change makes big difference interactive performance low speed links although anything processing delay inherent dialup modems van jacobson header compression also vj compression header compression option versions ppp versions serial line internet protocol slip vj compression often called cslip compressed slip | [
1030,
8432,
8627,
5531,
8669
] | Test |
9,507 | 2 | Unix_philosophy:unix philosophy unix philosophy originated ken thompson set cultural norms philosophical approaches minimalist modular software development based experience leading developers unix operating system early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy unix philosophy emphasizes building simple short clear modular extensible code easily maintained repurposed developers creators unix philosophy favors composability opposed monolithic design unix philosophy documented doug mcilroy bell system technical journal 1978 later summarized peter h. salus quarter-century unix 1994 award-winning unix paper 1974 ritchie thompson quote following design considerations preface 1984 book unix programming environment brian kernighan rob pike bell labs give brief description unix design unix philosophy authors write goal book communicate unix programming philosophy october 1984 brian kernighan rob pike published paper called program design unix environment paper criticize accretion program options features found newer unix systems 4.2bsd system v explain unix philosophy software tools performing one general function authors contrast unix tools cat larger program suites used systems mcilroy head bell labs computing sciences research center inventor unix pipe summarized unix philosophy follows beyond statements also emphasized simplicity minimalism unix programming conversely mcilroy criticized modern linux software bloat remarking adoring admirers fed linux goodies disheartening state obesity contrasts earlier approach taken bell labs developing revising research unix stated mcilroy generally accepted throughout unix community unix programs always expected follow concept dotadiw one thing well limited sources acronym dotadiw internet discussed length development packaging new operating systems especially linux community patrick volkerding project lead slackware linux invoked design principle criticism systemd architecture stating attempting control services sockets devices mounts etc. within one daemon flies face unix concept one thing well book art unix programming first published 2003 eric s. raymond american programmer open source advocate summarizes unix philosophy kiss principle keep simple stupid provides series design rules 1994 mike gancarz member team designed x window system drew experience unix well discussions fellow programmers people fields depended unix produce unix philosophy sums nine paramount precepts richard p. gabriel suggests key advantage unix embodied design philosophy termed worse better simplicity interface implementation important attributes system—including correctness consistency completeness gabriel argues design style key evolutionary advantages though questions quality results example early days unix used monolithic kernel means user processes carried kernel system calls user stack signal delivered process blocked long-term i/o kernel done signal delayed possibly long time maybe indefinitely i/o completed signal handler could executed process kernel mode sensitive kernel data stack kernel back-out system call store replay restart later assuming signal handler completes successfully cases ken thompson dennis ritchie favored simplicity perfection unix system would occasionally return early system call error stating done nothing—the interrupted system call error number 4 codice_1 today systems course call aborted order call signal handler could happen handful long-running system calls codice_2 codice_3 codice_4 codice_5 plus side made i/o system many times simpler design understand vast majority user programs never affected handle experience signals codice_6 would die right away one raised programs—things like shells text editors respond job control key presses—small wrappers could added system calls retry call right away codice_1 error raised thus problem solved simple manner 1981 article entitled truth unix user interface horrid published datamation norman criticized design philosophy unix lack concern user interface writing background cognitive science perspective then-current philosophy cognitive engineering focused end users comprehend form personal cognitive model systems -- case unix fail understand result disastrous mistakes losing hour worth work easy | [
10753,
657,
9747,
10387,
2599,
7975,
9511,
7983,
8499,
52,
9908,
950,
823,
4409,
7483,
701,
2109,
7872,
3522,
4433,
9298,
8020,
477,
8414,
10590,
6369,
1256,
237,
4589,
5357,
5492,
11255,
11262
] | Validation |
9,508 | 3 | PlayStation_Now:playstation playstation ps cloud gaming subscription service developed sony interactive entertainment service allows members stream playstation 2 playstation 3 playstation 4 games playstation 4 pc playstation 2 playstation 4 games also available download playstation 4 non-playstation devices need dualshock 3 4 xinput-compatible controller xbox game pad use service members intend stream games sony recommends players 5 mbps internet connection achieve good performance playstation announced january 7 2014 2014 consumer electronics show ces sony presented demos last us puppeteer playable ps bravia tvs playstation vita closed beta began united states january 28 ps3 may 19 extended ps4 implement service sony created single motherboard equivalent 8 ps3 console units server rack allow games function opposed software emulation due architectural complexity playstation launched open beta united states canada ps4 july 31 2014 ps3 september 18 2014 ps vita ps tv october 14 2014 support select 2014 bravia tvs coming later year gamescom 2014 sce announced ps would arrive europe 2015 united kingdom first european country access service december 24 2014 sony announced playstation would expand electronic brands ces 2015 sony confirmed playstation would arrive north america ps4 full release january 13 2015 march 7 2015 revealed playstation accessible europe official beta invites europe started going ps4 owners april 15 2015 february 17 2017 sony announced would discontinue playstation playstation 3 playstation vita playstation tv sony bravia televisions modeled 2013–15 sony blu-ray players samsung televisions august 15 2017 september 20 2018 sony announced users playstation 4 would able download playstation 2 playstation 4 games offered via service sony started gradually roll new feature subscribers playstation 3 games however able downloaded playstation 3 architecture different playstation 4 january 23 2019 sony announced service would launching spain italy portugal norway denmark finland sweden later year beta countries launched early february full service launched march 12 2019 currently playstation 2 playstation 3 playstation 4 games service streamed playstation 4 pc 2019 750 games available 300 available download playstation 4 new games added every month 7-day free trial three pricing options north america subscription service 19.99 one month 44.99 3 months 99.99 12 months two pricing options france germany belgium netherlands luxembourg €14.99 one month €99.99 12 months playstation includes access online multiplayer playstation 3 playstation 4 games playstation currently available austria belgium canada denmark finland france germany ireland italy japan luxembourg netherlands norway portugal spain sweden switzerland united states qatar united kingdom | [
10368,
643,
9091,
3077,
11398,
10761,
6797,
6799,
10900,
10270,
10782,
6311,
9512,
7722,
684,
9262,
306,
1587,
1091,
9543,
10056,
6909,
5067,
6732,
10316,
3152,
6738,
4951,
6873,
859,
4060,
8413,
607,
359,
231,
8937,
9063,
3824,
5746,
702... | Test |
9,509 | 5 | Collaber:collaber collaber collaboration software built eclipse software rcp collaber features include file sharing task management shared calendar group discussion contains tools like address book backup tool calendar chat discussion database file tool tasks notepad picture polls shared folder wiki web links tool collaber 1.1 released completely new architecture enable users download account information anywhere device functionality collaber appears similar microsoft groove unlike groove limited microsoft windows platform collaber supported microsoft windows mac os x linux even though originally designed p2p architecture similar microsoft groove switched client server model appears better reliability compared p2p model collaber client automatically synchronized collaber server connects internet changes done workspace sent members synchronized users collaber install number systems installations always stay sync see data system without manual intervention concept workspace core working collaber users create workspace workspace 15 built tools tools data inside tool shared members workspace collaber developed vimukti technologies based hyderabad india | [
8640,
2465,
2658,
11208,
4171,
5612,
823,
6797,
6998,
1687,
11446,
3583
] | Validation |
9,510 | 3 | Realms_of_Darkness:realms darkness realms darkness fantasy video game developed strategic simulations released 1986 developed apple ii commodore 64 object game completion seven different quests 30 dungeon levels exploration several cities shops wilderness areas ssi sold 9,022 copies realms darkness north america computer gaming world called game moderate interest described graphics quests puzzles mediocre stated game might suitable beginner computer rpgs compute called realms darkness well-planned product several interesting features previously implemented fantasy game fantasy gamers want take look game reviewed 1987 dragon 122 patricia lesser role computers column lesser felt game combines excitement danger menu-driven fantasy role-playing game flexibility thought-provoking requirements text-adventure game game revisited dragon 124 reviewers stated realms darkness enjoyable despite mediocre graphics ’ immerse secrets many many hours | [] | Validation |
9,511 | 5 | Zephyr_(protocol):zephyr protocol created mit part project athena zephyr designed instant messaging protocol application-suite heavy unix background using one thing well philosophy unix made several separate programs working together make complete messaging system zephyr irc first widely used ip-based instant-messaging systems zephyr invention ciarán anthony dellafera time employee digital equipment corporation visiting research scientist project athena design originated solution reverse remote procedure call rpc problem service providers servers client–server system locate communicate service users initial concept emerged conversations ciarán michael r. gretzinger another systems engineer project athena early 1986 mid late 1986 ciarán distilled problem two specific issues ability locate users distributed computing environment known today presence detection ability deliver scalable light-weight authentic messages distributed computing environment zephyr development team mark w. eichin robert s. french david c. jedlinsky john t. kohl william e. sommerfeld responsible creation initial code-base subsequent releases issued throughout late 1980s zephyr still use today university environments carnegie mellon iowa state university maryland college park brown university mit largely replaced modern popular instant messenger systems xmpp mit currently operates zephyr xmpp zephyr uses udp datagrams sent ports 2102 2103 2104 incompatible routers nat reports internal ip address returning datagrams incorrectly routed sites deployed zephyr using kerberos 4 authentication exclusively though late 2007 sites including iowa state deployed zephyr using kerberos 5 | [
10242,
5251,
3460,
5382,
3847,
649,
4746,
1036,
9868,
11408,
3218,
9365,
10005,
11413,
3610,
5402,
3228,
5531,
3742,
10271,
3105,
9507,
9380,
2085,
9381,
3751,
3752,
1962,
10924,
9519,
562,
2996,
9909,
8758,
1467,
10171,
3133,
3006,
4797,
... | Test |
9,512 | 3 | PlayStation_2_models:playstation 2 models many revisions playstation 2 ps2 history 2000 2013 internal construction others involving substantial external changes colloquially known among ps2 hardware hackers v0 v1 v2 ... v18 region receives different model number example v18 released north america scph-90001 australia scph-90002 hong kong scph-90006 final digit region code bearing hardware many games dvds restricted certain regions system software displays different languages ps2 primarily differentiated models original fat case design slimline models introduced end 2004 2010 television incorporating ps2 introduced three original ps2 launch models scph-10000 scph-15000 scph-18000 sold japan lacked expansion bay later ps2 models models instead included pcmcia slot scph-10000 scph-15000 built-in dvd movie playback instead relied encrypted playback software copied memory card included cd-rom normally ps2 execute encrypted software memory card see ps2 independence exploit v3 substantially different internal structure subsequent revisions featuring several interconnected printed circuit boards v4 everything except power supply unified onto one board v5 introduced minor internal changes difference v6 sometimes called v5.1 v5 orientation power/reset switch board connector reversed prevent use no-solder modchips v5 also introduced reliable laser ones used previous models v7 v8 included minor revisions v6 also scph-30001 50001 90001 models beginning model scph-500xx i.link port removed infrared receiver added use remote control dvd playback leaving controller ports free external receiver ps2 standard color matte black several different variations color produced different quantities regions including ceramic white light yellow metallic blue aqua metallic silver navy star blue opaque blue astral blue opaque black midnight black pearl white sakura purple satin gold satin silver snow white super red transparent blue ocean blue also limited edition color pink distributed regions including oceania parts asia small playstation logo front disc tray could rotated 90 degrees order logo right way vertical horizontal console orientations feature also used slimline consoles playstation 3 september 2004 sony unveiled third major hardware revision v12 model number scph-700xx available late october 2004 smaller thinner quieter older versions includes built-in ethernet port markets also integrated modem due thinner profile contain 3.5 expansion bay therefore support internal hard disk drive also lacks internal power supply similar gamecube modified multitap expansion removal expansion bay criticized limitation due existence titles final fantasy xi require use hdd official ps2 linux also requires expansion bay function currently modified multitap sold stores however also compatible older versions also added support multiple memory cards games third-party connectors soldered unit giving hard drive support due still containing necessary i/o controllers firmware process involved requiring user solder 39 ide pinouts directly board two special aftermarket kit created make mod easier consumer first hd connect simply board sat attached back console communication wires taped ps2 air vents drive power one 5 v usb headers second expensive option hd combo included replacement case room hard drive certain modchips enable use usb hard drive mass storage device two sub-versions scph-700xx one old emotion engine ee graphics synthesizer gs chips newer unified ee+gs chip otherwise identical sub-versions variously referred v12 models v11.5 older v12 newer model v12 older v13 newer model v12 model first released black silver edition available united kingdom germany australia united arab emirates gcc countries france italy south africa north america limited edition pink console also became available march 2007 v12 v13 succeeded v14 scph-7500x contains different asics previous revisions chips copyright date 2005 compared 2000 2001 earlier models also different lens compatibility issues different number playstation games even ps2 games addon add hdd support newer 7500x onward models called hdpro created limited success beginning 2005 found black slimline console power transformers manufactured august december 2004 defective could overheat units recalled sony replaced 2005 model later hardware revisions better compatibility playstation games metal gear solid vr missions operates silver models however new japanese slim models issues playing playstation games first ps2 revisions 2006 sony released new hardware revisions v15 model numbers scph-7700x scph-7700x v15 first released japan september 15 2006 including silver edition release japan released north america europe parts world new revision uses integrated unified ee+gs chip redesigned asic different laser lens updated bios updated drivers july 2007 sony started shipping revision slimline playstation 2 scph-7900x featuring reduced weight 600 grams compared 900 g scph-7700x achieved reduction parts unit also uses smaller motherboard well custom asic houses ee gs rdram ac adaptor weight reduced 250 g previous 350 g. another refinement slimline playstation 2 scph-9000x released japan november 22 2007 well cosmetic changes design hardware overhauled incorporating power supply console like original fat playstation 2 revisions also increases total weight scph-9000x series consoles manufactured third quarter 2008 last revision playstation 2 changes made indicated date code 8c incorporate revised bios disables exploit present older models allowed homebrew applications launched memory card sony also manufactured consumer device called psx used digital video recorder dvd burner addition playing ps2 games device released japan december 13 2003 first sony product include xrossmediabar interface sell well japan released anywhere else psx featured one usb port memory stick card reader two playstation 2 memory card slots released 2010 sony bravia kdl22px300 22 inch 56 cm 720p television incorporates playstation 2 console four hdmi ports 720p tv also includes bravia internet video access allowing users access streaming services youtube on-demand television released europe although maximum resolution 720p/1366×768 1080p input sources used displayed | [
4098,
643,
9091,
3077,
11398,
10761,
6799,
9508,
6311,
684,
306,
1587,
1091,
9543,
10056,
6732,
10316,
6738,
6873,
859,
4060,
5215,
607,
1121,
359,
8937,
1515,
1776,
3824,
5746,
7028,
7801,
8316,
6781
] | None |
9,513 | 4 | Collaboration-oriented_architecture:collaboration-oriented architecture collaboration oriented architecture coa computer system designed collaborate use services systems outside operators control collaboration oriented architecture often use service oriented architecture deliver technical framework collaboration oriented architecture ability collaborate systems based jericho forum principles commandments bill gates craig mundie microsoft clearly articulated need people work outside organizations secure collaborative manner opening keynote rsa security conference february 2007 successful implementation collaboration oriented architecture implies ability successfully inter-work securely internet typically mean resolution problems come de-perimeterisation term collaboration oriented architectures defined developed meeting jericho forum meeting held hsbc 6 july 2007 key elements qualify security architecture collaboration oriented architecture follows working collaborative multi-sourced environment implies need authentication authorization accountability must interoperate exchange outside locus area control | [
9113,
9858,
9954
] | Test |
9,514 | 8 | DAML-S:daml-s darpa agent markup language services daml-s semantic markup language describing web services related ontologies daml-s built top daml+oil daml-s superseded owl-s | [
1481,
10020
] | None |
9,515 | 0 | Reification_(linguistics):reification linguistics reification natural language processing refers natural language statement transformed actions events become quantifiable variables example john chased duck furiously transformed something like another example would sally said john mean could expressed something like representations allow one use tools classical first-order predicate calculus even statements due use tense modality adverbial constructions propositional arguments e.g sally said x etc. would seemed intractable advantage predicate calculus better understood simpler complex alternatives higher-order logics modal logics temporal logics etc exist better automated tools e.g automated theorem provers model checkers manipulating reified forms used purposes besides application first-order logic one example automatic discovery synonymous phrases reified forms sometimes called quasi-logical forms existential variables sometimes treated skolem constants natural language constructs admit uniform translation first order logic see donkey sentence examples discussion | [
7780
] | None |
9,516 | 3 | King_&_Balloon:king amp balloon player controls two green men orange cannon stationed parapet castle fires fleet hot-air balloons cannon king moves slowly back forth ground balloons return fire dive toward balloon reaches ground sit king walks time lifts player must shoot balloon free king parachute safely ground times two diving balloons combine form single larger one awards extra points splits apart hit cannon destroyed collision balloons shots replaced brief delay effect number remaining lives one life lost whenever balloon carries king top screen game ends lives lost galaxian round number stops increasing round 48 king speaks captured help rescued thank carried away bye bye balloons make droning sound aliens galaxian released previous year cannon shots also make sound player ship galaxip game original japanese version game king speaks english heavy japanese accent saying herupu help sankyū thank baibai bye bye u.s. version game features different voice king without japanese accent rare glitch game psp port game namco museum battle collection sometimes glitch happen overlapping continue option repeatedly reaches level 72 far away limit press 1p start glitch level 72 game encounter glitch rendering high score z another glitch features split second opening animation play level resulting blank screen copyright info level ca n't played sounds repeated synth drone must press start quit game quitting level 72 king balloon later featured namco museum encore playstation japan-only release made north american console debut namco museum battle collection psp player could choose king voice original japanese later u.s. version unlocking manic settings also appeared namco museum virtual arcade xbox 360 well namco museum megamix wii | [
11522,
3533,
9006,
8942,
1776,
10287,
10931,
8663
] | Test |
9,517 | 4 | Lincoln_D._Faurer:lincoln d. faurer lieutenant general lincoln d. faurer february 7 1928 – november 7 2014 united states air force officer served director national security agency chief central security service 1981 1985 faurer born february 7 1928 medford massachusetts graduated central high school philadelphia 1945 attended cornell university graduated united states military academy west point new york 1950 bachelor science degree commission second lieutenant received master science degree engineering management rensselaer polytechnic institute new york 1964 faurer completed national war college fort lesley j. mcnair washington d.c. 1968 concurrently earned master degree international affairs george washington university also washington d.c. graduation united states military academy faurer attended flying schools goodfellow air force base texas vance air force base oklahoma received pilot wings august 1951 completed b-29 pilot training randolph air force base texas january 1952 assigned 308th bombardment wing forbes air force base kansas may 1952 moved wing hunter air force base georgia april 1953 september 1955 faurer flew weather reconnaissance flights wb-29s 56th weather reconnaissance squadron yokota air base japan aerial observer training james connally air force base texas faurer returned forbes air force base may 1956 rb-47 aircraft commander 320th strategic reconnaissance squadron may 1958 transferred headquarters 90th strategic reconnaissance wing also forbes chief training procedures section faurer began career missile space fields august 1959 assigned headquarters 2nd air force barksdale air force base louisiana serving successively operations officer missile section guided missiles operations officer chief missile branch training division directorate operations barksdale associated 2nd air force growing inventory intercontinental ballistic missiles atlas e f titan ii minuteman i. faurer attended graduate engineer management program rensselaer polytechnic institute june 1963 july 1964 graduation assigned defense intelligence agency washington d.c. directorate scientific technical intelligence served technical intelligence officer development engineer later chief space systems division missiles space office july 1967 upon graduation national war college july 1968 faurer named director current operations 14th aerospace force ent air force base colorado served commander 16th surveillance squadron shemya air force base alaska august 1969 september 1970 appointed commander 71st missile warning wing mcguire air force base new jersey faurer assigned director j-2 united states southern command canal zone july 1971 june 1973 transferred headquarters u.s. air force washington d.c. duty deputy assistant chief staff intelligence may 1974 faurer returned defense intelligence agency deputy director intelligence july 1976 became vice director production assigned director j-2 u.s. european command vaihingen west germany august 1977 moved brussels belgium august 1979 deputy chairman north atlantic treaty organization military committee became director national security agency april 1981 faurer military decorations awards include air force distinguished service medal defense superior service medal oak leaf cluster legion merit meritorious service medal joint service commendation medal oak leaf cluster air force commendation medal oak leaf cluster faurer also presented national intelligence medal achievement recognition service national intelligence community faurer promoted lieutenant general september 1 1979 date rank retired april 1 1985 faurer president corporation open systems not-for-profit industry research center promotion osi isdn international communications standards 1986 1991 served chairman association intelligence officers consults national security issues 1990s linc faurer also served board directors aegis research corporation rosslyn later falls church virginia chairman board directors national cryptologic museum foundation october 2014 faurer died november 7 2014 buried arlington national cemetery | [
6017,
8726,
1189,
1838,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
7145,
2419,
6005,
6136,
766
] | Test |
9,518 | 4 | George_Hotz:george hotz george francis hotz born october 2 1989 alias geohot american hacker creative consumer known unlocking iphone allowing phone used wireless carriers contrary apple intentions developed limera1n jailbreak tool bootrom exploit ios also noted technical efforts publicity reverse engineering playstation 3 video game console subsequently sued settling sony september 2015 working vehicle automation machine learning company comma.ai attended bergen county academies magnet public high school hackensack new jersey attended academy engineering design technology hotz alumnus johns hopkins center talented youth program hotz also briefly attended rochester institute technology carnegie mellon university august 2007 seventeen-year-old george hotz became first person reported carrier-unlock iphone according hotz blog traded second unlocked 8 gb iphone terry daidone founder certicell nissan 350z three 8 gb iphones september 2007 anonymous group achieved software-only unlocking method complement hotz hardware-based unlocking method july 13 2010 hotz announced discontinuation jailbreaking activities citing demotivation technology unwanted personal attention nevertheless continued release new software-based jailbreak techniques october 2010 december 2009 hotz announced initial intentions breach security sony playstation 3 five weeks later january 22 2010 announced performed first theoretical achievement consists initial read write access machine system memory well hypervisor level access machine cpu january 26 2010 hotz released exploit public march 28 2010 sony responded announcing intention release playstation 3 firmware update would remove otheros feature models feature already absent newer slim revisions machine july 13 2010 never achieved method reading installing modifying software ps3 hotz posted message twitter account stating abandoned efforts trying crack ps3 due system security extreme difficulty december 29 2010 notable hacking group fail0verflow known reverse engineering security models found consumer electronics devices performed academic presentation 27th chaos communications congress technical conference accomplishments playstation 3 presented methods 'd devised successfully penetrated device security model yielding root signing encryption keys keys essential element full even minimally usable breach capable installing running new software playstation 3 unit january 2 2011 hotz posted copy root keys playstation 3 website keys later removed website result legal action sony fail0verflow hotz response continued publication ps3 exploit information sony filed january 11 2011 application temporary restraining order tro us district court northern california january 14 2011 hotz appeared interview g4 loop explained involvement playstation 3 root keys console published sony initiated litigation george hotz predecessor playstation 3 hacking group known fail0verflow hotz published commentary case including song disaster sony sony turn demanded social media sites including youtube hand ip addresses people visited geohot social pages videos latter case watched video 'documents reproducing records usernames ip addresses posted published comments response video paypal granted sony access geohot paypal account judge case granted sony permission view ip addresses everyone visited geohot.com april 2011 revealed sony hotz settled lawsuit court condition hotz would never resume hacking work sony products end april 2011 anonymous hacker broke playstation network stole personal information 77 million users hotz denied responsibility attack said running homebrew exploring security devices cool hacking someone else server stealing databases user info cool led 2011 playstation network incident time sony aware compromised accounts system june 2014 hotz published root exploit software hack samsung galaxy s5 devices used us market exploit built around linux kernel cve-2014-3153 discovered hacker pinkie pie involves issue futex subsystem turn allows privilege escalation exploit known towelroot designated one-click android rooting tool hacking community designed installed quickly like app rooting hacks typically uploaded nearby pc cable necessitated rebooting device special set key presses although originally released verizon galaxy s5 root exploit made compatible android devices available time example tested found work galaxy s5 nexus 5 galaxy s4 active updates continued applied root exploit increase capabilities devices running android updates android operating system closed source exploit samsung officially responded towelroot exploit releasing updated software designed immune exploit addition made meaningful side income public donations solicited exploits hotz employed facebook google june 27 2011 zdnet freelance reporter emil protalinski reported according facebook spokesman hotz hired company unknown role however according cnet article actually employed since may confirmed facebook january 2012 hotz longer employed facebook july 16 2014 google hired hotz work software security auditing team called project zero hopes find zero-day vulnerabilities nsa hotz worked project zero 5 months developed qira open source program dynamically analysing application binaries january 2015 vicarious.com hired hotz develop ai algorithms worked 7 months hotz founded ai startup comma.ai september 2015 interview bloomberg hotz revealed company building vehicular automation technology based artificial intelligence algorithms hotz built working self-driving 2016 acura ilx demonstrated i-280 video resulting cease desist letter california department motor vehicles hotz wanted sell technology tesla motors meeting ceo elon musk tesla later released statement website citing corrections bloomberg article stressing autopilot system developed in-house vision chip component mobileye instead one separate autopilot system manufactured mobileye suggested bloomberg reporter ashlee vance tesla ceo elon musk offered advice hotz self-driving car project december 2015 interview october 27 2016 nhtsa informed hotz product legally required comply federal motor vehicle safety standards requested information would confirm compliance day later george hotz tweeted shenzhen comma one cancelled kristen lee stated jalopnik nhtsa simply trying open dialog commented instead got worst attitude possible silicon valley try regulate us thought leaders ’ take ball go home comma.ai open sourced self driving car software called openpilot november 30 2016 emphasizing intended use research without warranty september 14th 2018 comma.ai announced hotz would become head research team project appointed riccardo biasini new ceo company left march 2019 returned may 2019 become president hotz finalist 2004 isef competition portland oregon project mapping robot recognition included interviews today show larry king hotz finalist 2005 isef competition project googler continuing robots hotz competed school highly successful titanium knights battlebots team hotz competed 2007 intel international science engineering fair science competition high school students 3d imaging project entitled want holodeck received awards prizes several categories including 20,000 intel scholarship travelled sweden speak project stockholm international youth science seminar hotz received considerable attention mainstream media including interviews today show fox cnn nbc cbs g4 abc cnbc articles several magazines newspapers websites including forbes bbc march 2008 pc world magazine listed hotz one top 10 overachievers 21 august 2013 hotz attended def con carnegie mellon plaid parliament pwning ppp ppp placed first def con capture flag ctf tournament later 2013 hotz also competed csaw 2013 working alone hotz took first place pseudonym tomcr00se august 2014 hotz competed part carnegie mellon plaid parliament pwning win def con ctf tournament second year row team also def con crack tournament south southwest 2019 hotz discussed simulation theory announced plans create church dedicated helping society break simulation | [
1024,
5636,
5138,
4117,
8726,
535,
9761,
4644,
4133,
1608,
3657,
8779,
2130,
1622,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
161,
684,
9904,
9395,
8886,
7359,
1222,
3789,
4304,
9424,
8918,
4314,
9435,
4830,
... | Validation |
9,519 | 5 | OSCAR_protocol:oscar protocol oscar open system communication realtime aol proprietary instant messaging presence information protocol used aol aim instant messaging system icq despite name specifications protocol remain proprietary aol gone great lengths keep competitors namely microsoft xmpp cerulean studios implementing compatible clients proprietary messaging systems 2002 aol signed contract apple inc. allowing use oscar well aol code libraries ichat application allowed ichat users interact icq aim users directly deal also permitted users apple .mac service log aim network using .mac email addresses carried apple mobileme service oscar protocol used separately aol network fact aol expands general concept oscar adding systems service side buddy lists icons well features file transfers using bonjour march 6 2006 aol released aim sdk launched developer website allowing developers build plugins aim triton build custom clients connect oscar protocol point however released information protocol march 5 2008 aol released portions oscar protocol documentation google also provided ability sign aim network via google talk client built gmail packets sent oscar encapsulated manner 16-bit integers sent network unsigned big endian see endianness 32-bit integers 8-bit integers bytes special frame layer protocol flap container encloses every packet carries information packet size channel number sequence within almost every packet sent channel 2 packets contain snac simple network atomic communication always either one zero contained packet therefore contain need length | [
10242,
5251,
3460,
5382,
8582,
4746,
1036,
11408,
5784,
3610,
3228,
10271,
3105,
9511,
1962,
5677,
8758,
1467,
10173,
6208,
1218,
8644,
6982,
6855,
2760,
8262,
1738,
2892,
3284,
4318,
3812,
4068,
6628,
9572,
488,
4457,
8554,
10470,
3959,
... | Test |
9,520 | 2 | Xenocara:xenocara xenocara openbsd build infrastructure project customised x.org server utilises dedicated _x11 user default drop privileges perform privilege separation accordance openbsd least privilege policy patches applying rather important security protection provided upstream benefit unix-like systems linux however care apply maintain unfortunately happened date release 6.9 x.org used imake recent modularised versions switched gnu autotools xenocara uses bsd make designed ease building maintenance modularised x.org within openbsd cvs tree first appeared openbsd 4.2 released openbsd different build system repositories x cvs since completely retired favour xenocara apart x.org xenocara builds several projects including window managers fvwm cwm | [
1668,
9223,
10631,
2825,
3465,
1932,
274,
7702,
10105,
4398,
6702,
7983,
2245,
1993,
8778,
3404,
11086,
5970,
5084,
7139,
1637,
4071,
5230,
1785,
8954
] | Test |
9,521 | 8 | Influenster:influenster influenster product discovery reviews platform consumers influenster uses social media analytics measure users ’ influence social media influenster launched 2010 ios app influenster launched 2014 android app launched 2015 january 2018 influenster community consists 4 million users influenster platform consisting 11 million reviews 880,000 new reviews generated month products represent 100k consumer brands 1.7 million product pages users review ask/answer questions upload photos/videos based user impact score supplied demographic information invited influenster campaigns influenster runs variety different types campaigns generally involve sending invited users complimentary product service sample discuss social media sampling user asked complete final market-research survey influenster offers coupons offers partner retailers brands users access product discovery experience platform uses facebook twitter instagram youtube tumblr foursquare google+ multi-platform blog widget friend referrals determine impact score impact points largely calculated based number followers friends user given social network influenster allows users unlock expert lifestyle badges completing survey questions interests behaviors writing reviews products answering users questions sharing influenster product pages across social media channels badges part gamification system reward specific types users invites specific influenster campaigns matching demographic primary business model influenster involves brands working influenster voxbox virtualvox campaigns voxbox virtualvox campaigns brands offer complimentary products digital rewards influenster users meet brand product-specific criteria 2016 influenster raised 8 million financing ebates leading online cashback shopping service | [] | Test |
9,522 | 0 | Aravind_Joshi:aravind joshi aravind krishna joshi august 5 1929 – december 31 2017 henry salvatori professor computer cognitive science computer science department university pennsylvania joshi defined tree-adjoining grammar formalism often used computational linguistics natural language processing joshi studied pune university indian institute science awarded electrical engineering diisc communication engineering respectively joshi graduate work done electrical engineering department university pennsylvania awarded phd 1960 became professor penn co-founder co-director institute research cognitive science april 21 2005 joshi awarded franklin institute benjamin franklin medal computer cognitive science franklin institute citation states awarded medal fundamental contributions understanding language represented mind developing techniques enable computers process efficiently wide range human languages advances led new methods computer translation | [
1890,
7780,
7724,
3059,
1783
] | Test |
9,523 | 4 | Comodo_Mobile_Security:comodo mobile security comodo mobile security cms mobile application provided free comodo group protects android devices viruses worms scripts also features sms call blocking software process manager data apps backup data traffic monitor anti-theft feature allows users recover lost stolen devices first security app comodo specialists internet security android platform comodo mobile security requires android 2.2 cms 1.2 cms 2.4 br cms 2.4 released january 2014 major enhancements cms 2.4 include cms 2.5 cms 2.5 released june 2014 new features enhancements cms 2.7 cms 2.7 released december 2014 changes comodo mobile security 2.7 june 17 2013 av-test labs released test results 30 android mobile security products conducted may 2013 using android 4.2.2 comodo mobile security 2.0 scored 5.5 6 protection perfect 6 usability av-test two testing categories january 2015 av-test labs released test results 30 android mobile security products conducted january 2015 using android 5.0.1 comodo mobile security 2.7 scored 5.5 6 protection perfect 6 usability av-test two testing categories softonic.com reviewed comodo mobile security 1.1 january 2012 gave 9 10 stars rating excellent rosemary hattersley pc advisor gave comodo mobile security 1.2 3 ½ 5 stars wrote “ smartphone app good all-rounder offering initial health check plus ‘ anti-theft ’ tools guise remote lock wipe device location plus alert someone changes sim phone free | [
2049,
7809,
131,
1417,
4374,
1052,
156,
1949,
2721,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8615,
6834,
4403,
10166,
1083,
704,
9537,
7362,
10308,
4421,
202,
1355,
5069,
10574,
10708,
2005,
11225,
1242,
2907,
8668,
2654,
9055... | None |
9,524 | 4 | Rogue_DHCP:rogue dhcp rogue dhcp server dhcp server network administrative control network staff network device modem router connected network user may either unaware consequences actions may knowingly using network attacks man middle kind computer viruses malicious software found set rogue dhcp especially classified category clients connect network rogue legal dhcp server offer ip addresses well default gateway dns servers wins servers among others information provided rogue dhcp differs real one clients accepting ip addresses may experience network access problems including speed issues well inability reach hosts incorrect ip network gateway addition rogue dhcp set provide default gateway ip address machine controlled misbehaving user sniff traffic sent clients networks violating network security policies well user privacy see man middle vmware virtual machine software also act rogue dhcp server inadvertently run client machine joined network vmware act rogue dhcp server handing random ip addresses clients around network end result large portions network cut internet rest domain without access rogue dhcp servers stopped means intrusion detection systems appropriate signatures well multilayer switches configured drop packets one common methods deal rogue dhcp servers called dhcp snooping dhcp snooping drops dhcp messages dhcp server trusted rogue dhcp servers detected using software manual examination perusing scapy package python | [
1121,
71,
2996,
4119,
6456,
5245,
4863
] | Test |
9,525 | 2 | Virtual_DOS_machine:virtual dos machine virtual dos machines vdm refer technology allows running 16-bit/32-bit dos 16-bit windows programs already another operating system running controlling hardware virtual dos machines operate either exclusively typical software emulation methods e.g dynamic recompilation rely virtual 8086 mode intel 80386 processor allows real mode 8086 software run controlled environment catching operations involve accessing protected hardware forwarding normal operating system exceptions operating system perform emulation resume execution dos software vdms generally also implement support running 16- 32-bit protected mode software dos extenders conform dos protected mode interface dpmi dos program running inside vdm needs access peripheral windows either allow directly rarely present dos program virtual device driver vdd emulates hardware using operating system functions vdm systematically emulations intel 8259a interrupt controllers 8254 timer chips 8237 dma controller etc january 1985 digital research together intel previewed concurrent dos 286 1.0 version concurrent dos capable running real mode dos programs 80286 protected mode method devised b-1 stepping processor chips however may 1985 stopped working c-1 subsequent processor steppings shortly digital research release product although e-1 stepping intel started address issues august 1985 digital research 8086 emulation mode worked utilizing undocumented loadall processor instruction slow practical microcode changes e-2 stepping improved speed early implementation seen predecessor actual virtual dos machines eventually concurrent dos 286 reworked potential desktop operating system become flexos 286 industrial use 1986 also licenced ibm 4680 os 1986 intel 80386 virtual 8086 mode became available samples since october 1985 quantities since june 1986 digital research switched use run real mode dos programs virtual dos machines protected mode concurrent dos 386 1.0 february 1987 flexos 386 1.0 june 1987 however architecture multiuser multitasking protected mode operating systems dos-based concurrent dos 386 later developed become multiuser dos since 1991 real/32 since 1995 flexos 386 later became 4690 os 1993 contrast protected mode operating systems dos default real-mode operating system switching protected mode virtual 86 mode behalf memory managers dos extenders order provide access extended memory map memory first megabyte accessible normal dos programs dos-based vdms appeared microsoft windows/386 2.01 september 1987 dos-based virtual dos machines also present windows 3.0 3.1x windows workgroups 3.1x running 386 enhanced mode well windows 95 98 98 se one characteristics solutions running top dos memory layout shown inside virtual dos machines virtual instances dos system dos driver configuration run multitasker loaded requests handled protected mode passed system domain executed underlying dos system similar windows 3.x 386 enhanced mode architecture emm386 3.xx novell dos 7 caldera opendos 7.01 dr-dos 7.02 later also uses dos-based vdms support pre-emptive multitasking multiple dos applications emm386 /multi option used component development digital research novell since 1991 codename vladivar originally separate device driver krnl386.sys instead module emm386 primarily developed next major version dr dos released novell dos 7 1994 also used never released dr dos panther star trek project 1992/1993 vdms called mvdm multiple virtual dos machine used os/2 2.0 later since 1992 os/2 mvdms considerably powerful ntvdm example block devices supported various dos versions booted os/2 mvdm os/2 1.x dos box based dos 3.0 os/2 2.x mvdms emulate dos 5.0 seamless integration windows 3.1 later win32s applications os/2 concept looking similar surface seamless integration xp mode based windows virtual pc windows 7 redirector guest vdm ntvdm allows access disks os/2 nt host applications guest use named pipes communication host ntvdm system component ia-32 editions windows nt family since 1993 allows execution 16-bit windows 16-bit 32-bit dos applications included 64-bit versions windows nt 32-bit user-mode executable forms basis single dos windows 3.x environment called ntvdm.exe order execute dos programs ntvdm loads ntio.sys turn loads ntdos.sys executes modified command.com order run application passed ntvdm command-line argument 16-bit real-mode system files stripped derivations ms-dos 5.0 equivalents io.sys msdos.sys command.com hard-wired assumptions fat file system removed using invalid opcode 0xc4 0xc4 bop 32-bit ntvdm handle requests originally ntdos reported dos version 30.00 programs soon changed report version 5.00 int 21h/ah=30h 5.50 int 21h/ax=3306h allow programs run unmodified holds true even newest releases windows many additional ms-dos functions commands introduced ms-dos versions 6.x windows 9x missing 16-bit applications run thread within single preemptively multithreaded 32-bit ntvdm process 16-bit processes default cooperatively multitasked respect unless run separate memory space option checked run box application shortcut file ntvdm emulates bios calls tables well windows 3.1 kernel 16-bit api stubs 32-bit wow translation layer thunks 16-bit api routines 32-bit dos emulation present dos protected mode interface dpmi 32-bit memory access layer converts necessary extended expanded memory calls dos functions windows nt memory calls wowexec.exe emulation layer emulates 16-bit windows windows 2000 windows xp added sound blaster 2.0 emulation 16-bit virtual device drivers dos block device drivers e.g. ram disks supported inter-process communication subsystems take place ole dde named pipes since virtual 8086 mode available non-x86-based processors specifically mips dec alpha powerpc ntvdm instead implemented full emulator versions nt using code licensed insignia softpc windows nt 3.51 80286 emulation available windows nt 4.0 486 emulation added following list commands part windows xp ms-dos subsystem january 2010 google security researcher tavis ormandy revealed serious security flaw windows nt vdm implementation allowed unprivileged users escalate privileges system level noted applicable security x86 versions windows nt kernel since 1993 included 32-bit versions windows nt 2000 xp server 2003 vista server 2008 windows 7 ormandy publish proof-of-concept exploit vulnerability prior microsoft release security patch workaround issue turn 16-bit application support prevented older programs written dos windows 3.1 running 64-bit versions windows affected since include ntvdm subsystem microsoft security patches applied affected operating systems vdm could safely reenabled limitation exists windows xp 16-bit subsystem earlier versions windows nt raised per-session limit gdi objects causes gdi handles shifted right two bits converting 32 16 bits result actual handle larger 14 bits consequently 16-bit applications happen served handle larger 16384 gdi system crash terminate error message x86-64 cpu virtual 8086 mode available sub-mode legacy mode running 16- 32-bit operating systems native 64-bit long mode ntvdm supported x86-64 windows including dos programs ntvdm uses vm86 ᴄᴘᴜ mode instead local descriptor table order enable 16‑bits segment required addressing aaarch64 microsoft ’ release full emulator incompatible instruction set like previous incompatible architecture way run use windows xp mode virtualization software use ntvdmx64 unofficial port older emulated implementation ntvdm provided nt 4 non-x86 platforms uses otvdm running 16 bits windows programs non virtualized way general vdm similar technologies satisfactorily run older dos games today computers emulation provided basic peripherals often implemented incompletely example sound emulation ntvdm limited nt-family versions windows update real screen times per second dos program writes emulate higher resolution graphics modes software mostly runs native speed host cpu timing loops expire prematurely either makes game run much fast causes software even notice emulated hardware peripherals wait long enough answer | [
6148,
7173,
6150,
11270,
3082,
5643,
8715,
4112,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
8241,
2101,
7733,
10812,
3648,
5697,
7234,
3142,
5702,
10310,
1098,
6730,
7754,
4173,
4174,
10828,
9808,
4178,
9813,
10839,
603,
9819,
1... | Test |
9,526 | 3 | Manchester_United_(video_game_series):manchester united video game series manchester united football video game series licensed manchester united highly popular early 1990s game series programmed krisalis ordered release date game series programmed codemasters ordered release date | [] | Validation |
9,527 | 1 | Data_source_name:data source name computing data source name dsn sometimes known database source name though data sources comprise repositories apart databases string associated data structure used describe connection data source commonly used connection odbc dsns also exist jdbc data access mechanisms term often overlaps connection string systems make distinction dsns connection strings term often used interchangeably dsn attributes may include limited system administrator client machine generally creates separate dsn relevant data source standardizing dsns offers level indirection various applications example apache/php iis/asp take advantage accessing shared data sources two kinds dsn exist broken software e.g. crystal reports microsoft excel php perl python ruby users submit crud create read update delete queries data source establishing connection dsn asp vbscript code open dsn connection might look like following dim databaseobject1 set databaseobject1 server.createobject adodb.connection databaseobject1.open dsn=example php using pear :db package open connection without external dsn dsn-less connection i.e. using connection string code might resemble following require_once db.php // dsn driver // username password host port database dsn mysql //john pass localhost:3306/my_db db db :connect dsn php pdo dsn mysql host=localhost dbname=example dbh new pdo dsn username password perl using perl dbi module driver syntax dsn attributes requirement dbi makes information except username password supplied single string argument dsn dbi pg database=finance host=db.example.com port= port dbh dbi- connect dsn 'username 'password | [
2432,
2688,
8582,
9481,
10505,
6417,
10518,
4376,
9112,
7968,
290,
1314,
11683,
7461,
8742,
5550,
9263,
5808,
10418,
3768,
3004,
9663,
4416,
5441,
11457,
8644,
8518,
72,
853,
2901,
4439,
9942,
9177,
987,
860,
9183,
865,
11362,
10471,
8808... | Test |
9,528 | 4 | Partitioning_cryptanalysis:partitioning cryptanalysis cryptography partitioning cryptanalysis form cryptanalysis block ciphers developed carlo harpes 1995 attack generalization linear cryptanalysis harpes originally replaced bit sums affine transformations linear cryptanalysis general balanced boolean functions demonstrated toy cipher exhibits resistance ordinary linear cryptanalysis susceptible sort partitioning cryptanalysis full generality partitioning cryptanalysis works dividing sets possible plaintexts ciphertexts efficiently-computable partitions distribution ciphertexts significantly non-uniform plaintexts chosen uniformly given block partition partitioning cryptanalysis shown effective linear cryptanalysis variants des crypton specific partitioning attack called mod n cryptanalysis uses congruence classes modulo integer partitions | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
4128,
4389,
10662,
169,
11185,
8627,
8628,
2357,
10806,
1847,
2110,
9541,
10315,
6863,
8273,
7635,
212,
9556,
10963,
11349,
2265,
7643,
9697,
8674,
229,
618,
1898,
881,
1654,
7161,
7034,... | Test |
9,529 | 2 | Podcast_Capture:podcast capture podcast capture introduced mac os x 10.5 leopard allows users record distribute podcasts software requires connection computer running mac os x server podcast producer users record input local remote audio video device capture screen activity choose existing file upload distribute | [
11521,
2819,
1796,
3719,
4615,
10888,
11402,
9100,
5647,
10512,
1042,
8852,
9109,
7318,
4888,
3228,
11037,
2207,
1439,
811,
3371,
5292,
1710,
6700,
7983,
8877,
1074,
10036,
3766,
2232,
9912,
11257,
9406,
6849,
4933,
713,
9418,
9035,
3790,
... | None |
9,530 | 4 | Yosemite_Server_Backup:yosemite server backup yosemite server backup cross-platform backup software developed barracuda networks inc. acquiring yosemite technologies barracuda networks released yosemite server backup first offering barracuda ware line products yosemite server backup software gained popularity among backup administrators used many big giants world ysb runs native 32- 64-bit systems back hard disks tapes microsoft windows support includes microsoft exchange microsoft sql server active directory yosemite server backup longer stand alone package sept. 30 2017 part barracuda backup | [
929,
3366,
6797,
1358,
5491,
11030
] | Validation |
9,531 | 4 | Piggyback_attack:piggyback attack piggyback attack active form wiretapping fact attacker gains access system via intervals inactivity another user ’ legitimate connection also called “ line attack ” piggyback-entry wiretapping security piggybacking actually someone tags along another person authorized gain entry restricted area pass something apply concept computer networks workstations | [] | Test |
9,532 | 4 | MARID:marid marid ietf working group applications area tasked propose standards email authentication 2004 name acronym authorization records d. lightweight mta authentication protocol lmap generic name set 'designated sender proposals discussed asrg fall 2003 including schemes attempt list valid ip addresses send mail domain lightweight lmap essentially stands crypto opposed domainkeys successor dkim march 2004 internet engineering task force ietf held bof proposals result meeting task force chartered marid working group microsoft caller-id proposal late highly controversial addition mix came following features working group decided postpone question rfc 2821 smtp identities i.e mail covered spf helo covered csv spf favour rfc 2822 identities covered caller-id later sender-id purported responsible address pra wg arrived point sender policies could split different scopes like 2821 mail 2822 pra marid spf2.0 syntax also allowed join different scopes one policy record sets permitted ips identical often case less week publication first mfrom mail draft wg terminated unilaterally leadership marid existed seven months rfcs published responsible ietf area director agreed sponsor publication unfinished marid discussions ietf experiments happened 2005 pre-marid spf sender id approved experimental rfcs latter certain degree result marid growing caller-id proposal ongoing disputes technical issues incompatibilities sender id resulted later appeals iesg iab | [
2848,
2887,
8202,
8332,
4272,
8337,
10578,
6517,
9909,
479
] | None |
9,533 | 3 | Write_(system_call):write system call write one basic routines provided unix-like operating system kernel writes data buffer declared user given device maybe file primary way output data program directly using system call destination identified numeric code data written instance piece text defined pointer size given number bytes codice_1 thus takes three arguments write call interface standardized posix specification data written file calling write function function prototype syntax codice_2 codice_3 signed data type defined codice_4 note codice_5 return unsigned value returns -1 error occurs must return signed value. br write function returns number bytes successfully written array may times less specified nbytes returns -1 exceptional condition encountered see section errors listed errors could encountered writing file errors macros listed errno.h write system call ordinary function spite close resemblance example linux x86 architecture system call uses instruction int 80h order transfer control kernel write system call counterpart read low level functions capable understanding bytes write used write records like classes thus higher level input-output functions like printf required often high-level interface preferred compared cluttered low-level interface functions call functions internally turn make calls write giving rise layered assembly functions use assembly higher level functions collect bytes data write required data file | [
2432,
3330,
5514,
5397,
8988,
6813,
10016,
9762,
5158,
1193,
52,
1844,
823,
3522,
7501,
593,
5969,
6358,
5975,
1509,
6126,
7663,
9840,
499,
3571,
7540,
246,
8438
] | Test |
9,534 | 8 | PeopleBrowsr:peoplebrowsr peoplebrowsr technology company provides enterprise government top level domain owners ability launch blockchain integrated social networks analyze engage members networks owner new tlds peoplebrowsr creator .ceo .best sold best sas july 2018 .kred peoplebrowsr works enterprise government tld owners multiple industries december 2008 launched deep search dashboard managing engaging social stream peoplebrowsr receiving analyzing indexing full twitter firehose since 2008 combination sources peoplebrowsr compiled trillion conversation datamine enables conduct analytics using kred influence measurement company combined trillion conversation datamine kred influencer analytics socialos network platform three tlds become leading social network provider organizations around world october 2011 company debuted kred measuring influence outreach social networks peoplebrowsr engaged research projects including development artificial intelligence new social networking platforms peoplebrowsr ceo jodee rich believes documenting history real time social networking platforms creating wealth data used help computers better understand human behavior way machines trained mine human data learn behavior rather taught think like humans june 2013 peoplebrowsr launched socialos set apis bridges existing networks enables new social networks rapidly rolled-out peoplebrowsr owns top level domains .ceo .kred formerly .best domains released late 2013 early 2014 powered company products socialos kred trillion conversation datamine june 2018 peoplebrowsr received approval icann internet corporation assigned names numbers sell besttld pty ltd subsidiary best sas paris based company led president cyril fremont strategic deal would leverage peoplebrowsr socialos technology besttld pty ltd owns .best top level domain distribution agreements godaddy 50 domain registrars november 2012 peoplebrowsr sued twitter proposed shutdown peoplebrowser access twitter firehose set occur november 30 2012 peoplebrowsr injunction prevent disconnection twitter firehose twitter attempted move case federal court may invalidated injunction march 2013 peoplebrowsr battle keep case within california court system thereby keeping injunction place twitter peoplebrowsr reached out-of-court settlement april 2013 | [] | Test |
9,535 | 9 | Luca_Cardelli:luca cardelli luca andrea cardelli frs italian computer scientist assistant director microsoft research cambridge uk cardelli well known research type theory operational semantics among contributions helped design modula-3 implemented first compiler non-pure functional programming language ml defined concept typeful programming helped develop polyphonic c experimental programming language born montecatini terme italy attended university pisa receiving phd university edinburgh 1982 joining microsoft research 1997 worked bell labs digital equipment corporation contributed unix software including vismon 2004 inducted fellow association computing machinery fellow royal society 2007 cardelli awarded senior aito ole-johan dahl kristen nygaard prize | [
10145,
6306,
1572,
8262,
5585,
9298,
5492,
4341,
4916,
1783,
11574,
5947,
11679
] | Test |
9,536 | 4 | Xor_DDoS:xor ddos xor ddos trojan malware hijacks windows macintosh systems uses launch ddos attacks reached loads 150+ gbps.this trojan created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data..it malicious computer program removed antiviruses like malware bytes microsoft security essentials norton mcafee webroot kaspersky sophos avast etc .it enables cyber-criminals spy steal sensitive data gain backdoor access system actions include deleting data blocking data modifying data copying data disrupting performance computers computer networks removed help windows security windows activated security blocks virus installing order gain access launches brute force attack order discover password secure shell services linux secure shell credentials acquired login successful uses root privileges run script downloads installs xor ddos believed asian origin based targets tend located asia several things noteworthy xor ddos built exclusively arm x86 systems appears programmed c/c++ | [
9282,
3395,
901,
2409,
2508,
10477,
10875,
4883,
7515,
3581,
9791
] | Validation |
9,537 | 4 | F-Secure:f-secure f-secure corporation formerly data fellows finnish cyber security privacy company based helsinki finland company 20 country offices presence 100 countries security lab operations helsinki finland kuala lumpur malaysia company develops sells antivirus password management endpoint security cyber security products services radar managed services vulnerability scanning rapid detection service flagship products company continues expand corporate market f-secure first established name data fellows petri allas risto siilasmaa 1988 data fellows trained computer users built customized databases three years later company launched first major software project developed first heuristic scanner antivirus products f-secure ’ first antivirus product windows pcs launched 1994 data fellows became f-secure 1999 f-secure first company developed anti-rootkit technology called blacklight 2005 june 2015 f-secure expanded enterprise market acquiring nsense danish company specializes security consultation vulnerability assessment purchase inverse path privately owned security italian consultancy experience avionics automative industrial control sectors february 2017 continues expansion cyber security services f-secure client security received av-test best protection award fifth time 2016 june 2018 f-secure acquired security company mwr infosecurity co-operation aalto university school science technology f-secure runs one semester course future virus analysts material available on-line media coverage magic lantern claims av vendors purposely leave backdoor products f-secure announced policy detecting spying programs f-secure corporation would like make known leave backdoors f-secure anti-virus products regardless source tools draw line every sample get regarding whether detect decision-making influenced technical factors nothing else within applicable laws regulations case meaning eu laws also adding detection program see might used terrorist activity benefit organized crime would like state record received queries regarding whether would guts detect something obviously made known violent mafia terrorist organization yes would | [
2049,
9732,
1052,
9246,
5665,
550,
2601,
6699,
9791,
10308,
4165,
7251,
2654,
2154,
10872,
4732,
9341,
127,
7809,
131,
150,
156,
2721,
2213,
6823,
3243,
6834,
704,
7362,
202,
10448,
11476,
1242,
1245,
9443,
6382,
9460,
3843,
5891,
7948,
... | Test |
9,538 | 8 | C10k_problem:c10k problem c10k problem problem optimising network sockets handle large number clients time name c10k numeronym concurrently handling ten thousand connections note concurrent connections requests per second though similar handling many requests per second requires high throughput processing quickly high number concurrent connections requires efficient scheduling connections words handling many requests per second concerned speed handling requests whereas system capable handling high number concurrent connections necessarily fast system one request deterministically return response within necessarily fixed finite amount time problem socket server optimisation studied number factors must considered allow web server support many clients involve combination operating system constraints web server software limitations according scope services made available capabilities operating system well hardware considerations multi-processing capabilities multi-threading model single threading model preferred concurrently aspect involves considerations regarding memory management usually operating system related strategies implied relate diverse aspects i/o management term coined 1999 dan kegel citing simtel ftp host cdrom.com serving 10,000 clients 1 gigabit per second ethernet year term since used general issue large number clients similar numeronyms larger number connections recently c10m 2010s early 2010s millions connections single commodity 1u server became possible 2 million connections whatsapp 24 cores using erlang freebsd 10–12 million connections migratorydata 12 cores using java linux common applications high number connections include pub/sub servers chat file servers web servers software-defined networking | [
865,
3237,
4485,
9224,
5815,
2060,
4589,
8691,
823
] | None |
9,539 | 2 | Segoe:segoe segoe typeface family fonts best known use microsoft company uses segoe online printed marketing materials including recent logos number products additionally segoe ui font sub-family used numerous microsoft applications may installed applications microsoft office 2007 windows live messenger 2009 adopted microsoft default operating system font beginning windows vista also used outlook.com microsoft web-based email service august 2012 microsoft unveiled new corporate logo typeset segoe replacing logo used previous 25 years segoe name registered trademark microsoft corporation although typeface originally developed monotype segoe designed steve matteson employment agfa monotype licensed microsoft use branding typeface user interface font designed friendly legible matteson created range weights italics humanist feel 2004 microsoft registered certain segoe segoe italic fonts original font designs european union trademark design office german font foundry linotype protested citing segoe ui similarity licensed frutiger family typefaces submission eu microsoft claimed linotype failed prove selling frutiger frutiger next prior 2004 eu rejected claims february 2006 eu revoked microsoft registration microsoft appeal decision microsoft still holds united states design patents various segoe based fonts period late 2004 six years agfa corporation monotype assets acquired ta associates company incorporated monotype imaging later august 2006 monotype imaging acquired linotype end 2006 linotype company challenged validity microsoft segoe patents wholly owned subsidiary monotype company originally licensed segoe microsoft several letters distinctly different forms segoe ui frutiger reflecting segoe ui different intended use low-resolution screen display rather airport signage frutiger however ulrich stiehl asserts many differences introduced later versions segoe ui – earlier versions segoe ui closer frutiger june 7 2005 scala electronic signage company unrelated typeface ff scala announced segoe removed infochannel product due licensing issues scala replaced segoe bitstream vera fonts november 2005 simon daniels program manager microsoft typography group stated original segoe fonts created microsoft existing monotype design licensed extensively extended customized meet requirements different processes apps devices april 2006 microsoft public relations spokesman asked named stated segoe original design developed agfa monotype monotype imaging 2000 2003 acquired original segoe fonts used develop extended family fonts retaining segoe name many new fonts received design patent protection united states segoe derived frutiger microsoft also current up-to-date license allows us distribute certain frutiger fonts connection microsoft products including office windows distinct differences segoe frutiger additionally unlike clone typefaces segoe family fonts metrically compatible frutiger used replacements united states copyright law abstract letter shapes functional text fonts copyrighted computer programming code font given copyright protection makes production distribution clone fonts possible early version segoe possibly evaluation version included certain versions suse linux longer ships part operating system segoe ui member segoe family used microsoft products user interface text well online user assistance material intended improve consistency users see text across languages distinguishable predecessor tahoma os x user interface font lucida grande rounder letters segoe ui produced monotype imaging light semibold versions segoe ui introduced windows 7 windows 8 8.1 10 segoe ui undergone number changes stylistic additions windows 8.1 segoe ui gained black black italic weights latin greek cyrillic scripts segoe ui optimized vista default cleartype rendering environment significantly less legible cleartype disabled except key user interface sizes 8 9 10 point segoe ui hinted bi-level rendering standard font size increased 9 point windows vista accommodate better layout readability languages windows vista version segoe ui version 5.00 contains complete unicode 4.1 coverage latin greek cyrillic arabic romans totaling 2843 glyphs regular weight segoe ui true cursive italic unlike oblique used frutiger helvetica members segoe family include one time microsoft also posted package called print ad microsoft dynamics business management solutions brief description microsoft downloads center package included truetype postscript type 1 beta versions segoe branding fonts along powerpoint templates marketing material windows phones also include customised version called segoe wp n designed clarity narrow enhance take cleartype microsoft released selawik metric-compatible segoe ui replacement symbols segoe ui symbols segoe mdl2 assets fallback sil ofl 2015 fonts used winjs winstrap selawik also one microsoft recommended fonts universal windows platform apps latin glyphs segoe segoe ui also found following microsoft font families malgun gothic korean microsoft jhenghei traditional chinese microsoft yahei simplified chinese gisha hebrew leelawadee thai windows 7 also found ebrima n'ko tifinagh vai khmer ui khmer lao ui lao microsoft new tai lue tai lue microsoft phagspa phags-pa microsoft tai le tai le fonts glyph shapes diverge significantly segoe ui frutiger/myriad model ways calligraphic gisha leelawadee capital narrower raised apex lowercase l tails capital serifs characteristics also seen segoe ui italic | [
7171,
6797,
11283,
4505,
4127,
2593,
4130,
7973,
3881,
4138,
4141,
4146,
4148,
8374,
9654,
1098,
1487,
3791,
3538,
5857,
8422,
9448,
1515,
364
] | Test |
9,540 | 2 | Runlevel:runlevel runlevel mode operation computer operating systems implement unix system v-style initialization conventionally seven runlevels exist numbered zero six sometimes used synonym one levels one runlevel executed startup run levels executed one another i.e runlevel 2 3 4 executed sequentially order runlevel defines state machine boot different runlevels typically assigned necessarily particular order single-user mode multi-user mode without network services started multi-user mode network services started system shutdown system reboot system states exact setup configurations varies operating systems linux distributions example runlevel 4 might multi-user gui no-server configuration one distribution nothing another runlevels commonly follow general patterns described article however distributions employ certain specific configurations standard practice computer enters runlevel zero halts enters runlevel six reboots intermediate runlevels 1–5 differ terms drives mounted network services started default runlevels typically 3 4 5 lower runlevels useful maintenance emergency repairs since usually n't offer network services particular details runlevel configuration differ widely among operating systems also among system administrators various linux distributions traditional script used version 7 unix first replaced runlevels systemd states major distributions although systemd used default major linux distributions runlevels still used means provided sysvinit project linux kernel booted program reads file determine behavior runlevel unless user specifies another value kernel boot parameter system attempt enter start default runlevel systems conforming linux standard base lsb need provide exact run levels given give meanings described may map level described different level provides equivalent functionality slackware linux uses runlevel 1 maintenance linux distributions runlevels 2 3 5 identically configured console services active runlevel 4 adds x window system starting solaris 10 smf service management facility used instead svr4 run levels latter emulated preserve compatibility legacy startup scripts aix follow system v r4 svr4 runlevel specification runlevels 0 9 available well c h 0 1 reserved 2 default normal multi-user mode runlevels 3 9 free defined administrator runlevels c h allow execution processes runlevel without killing processes started another runlevels true runlevels used tell init command enter maintenance mode system enters maintenance mode another runlevel system console used terminal | [
7804,
5985,
9665,
516,
4581,
9444,
5000,
4011,
823,
10318,
7983,
1399,
1304,
4218,
2811,
700,
2399
] | Test |
9,541 | 3 | AES_instruction_set:aes instruction set advanced encryption standard instruction set integrated many processors purpose instruction set improve speed well resistance side-channel attacks applications performing encryption decryption using advanced encryption standard aes often implemented instructions implementing single round aes along special version last round slightly different method aes-ni intel advanced encryption standard new instructions aes-ni first major implementation aes-ni extension x86 instruction set architecture microprocessors intel amd proposed intel march 2008 following intel processors support aes-ni instruction set several amd processors support aes instructions aes support unprivileged processor instructions also available latest sparc processors t3 t4 t5 m5 forward latest arm processors sparc t4 processor introduced 2011 user-level instructions implementing aes rounds instructions addition higher level encryption commands armv8-a processor architecture announced 2011 including arm cortex-a53 a57 previous v7 processors like cortex a5 7 8 9 11 15 also user-level instructions implement aes rounds august 2012 ibm announced then-forthcoming power7+ architecture would aes support commands architectures directly compatible aes-ni commands implement similar functionality ibm z9 later mainframe processors support aes single-opcode km kmc aes ecb/cbc instructions via ibm cryptoexpress hardware single-instruction aes versions therefore easier use intel ni ones may extended implement algorithms based aes round functions whirlpool hash function via x86 cpus amd geode marvell kirkwood arm mv_cesa linux use driver-based accelerated aes handling instead see crypto api linux following chips supporting aes hardware acceleration support aes instruction set programming information available arm architecture reference manual armv8 armv8-a architecture profile aes-ni performance analyzed patrick schmid achim roos found impressive results handful applications already optimized take advantage intel aes-ni capability performance analysis using crypto++ security library showed increase throughput approximately 28.0 cycles per byte 3.5 cycles per byte aes/gcm versus pentium 4 acceleration modern compilers emit aes instructions much security cryptography software supports aes instruction set including following core infrastructure | [
1024,
2567,
3084,
4108,
5645,
5649,
4128,
2088,
2094,
10806,
4664,
1085,
2110,
9281,
7234,
3142,
8266,
10315,
8273,
11349,
8795,
1119,
2655,
1122,
7783,
618,
4204,
8820,
1654,
4217,
9863,
4237,
7313,
658,
660,
1173,
6804,
8855,
9369,
2719... | Test |
9,542 | 5 | Mail_(Unix):mail unix mail command-line email client unix unix-like operating systems electronic mail start m. douglas mcilroy writes article research unix reader annotated excerpts programmer ’ manual 1971-1986 mail command included first released version research unix first edition unix version mail capable send append messages mailboxes users unix system helped managing reading mailbox current user 1978 kurt shoens wrote completely new version mail bsd2 referred berkeley mail although initially installed /usr/ucb/mail earlier unix mail still available /bin/mail modern unix linux systems commands mail mail and/or mailx invoke descendant berkeley mail much later base standardization mail program opengroup posix standardized variant mailx | [
515,
9733,
9735,
3976,
4750,
8975,
5397,
2198,
6812,
7847,
4398,
7983,
823,
1336,
4279,
7356,
965,
8522,
3659,
9298,
7255,
9946,
6369,
6120,
4850,
9459,
5492,
9204,
6138,
5759
] | Test |
9,543 | 3 | Cellius:cellius cellius 株式会社セリウス kabushiki-gaisha seriusu located shibuya tokyo computer game developer founded 2007 venture sony bandai namco holdings aim company help take share microsoft corp. nintendo co. sony hopes company make losses made quarter two financial year 'father playstation ken kutaragi announced ceo bandai namco holdings holds 51 company sony holds 49 company plans use sony cell microprocessor heart playstation 3 playstation 3 games games mobile phones personal computers project ridge racer game playstation vita panned critics | [
10368,
643,
9091,
3077,
10761,
6799,
9508,
6311,
9512,
684,
306,
1587,
1091,
6732,
10316,
6738,
6873,
859,
4060,
607,
359,
8937,
3824,
5746,
7028,
7801,
8316,
6781
] | None |
9,544 | 4 | Ntopng:ntopng ntopng computer software monitoring traffic computer network designed high-performance low-resource replacement ntop name derived ntop next generation ntopng open-source software released gnu general public license gplv3 software source code versions available operating systems unix linux bsd mac os x windows binary versions available centos ubuntu os x demo binary available windows limits analysis 2,000 packets ntopng engine written programming language c++ optional web interface written lua ntopng relies redis key-value server rather traditional database takes advantage ndpi protocol detection supports geolocation hosts able display real-time flow analysis connected hosts explanation run ntopng executable set dns mode decode dns responses resolve numeric ips use fifth network interface operate daemon mode use redis server running local host operate verbose mode | [
4777,
5612,
6797,
7983,
7347,
5492,
11221,
9142,
823
] | Test |
9,545 | 4 | Packet_capture_appliance:packet capture appliance packet capture appliance standalone device performs packet capture packet capture appliances may deployed anywhere network however commonly placed entrances network i.e internet connections front critical equipment servers containing sensitive information general packet capture appliances capture record network packets full header payload however appliances may configured capture subset network ’ traffic based user-definable filters many applications especially network forensics incident response critical conduct full packet capture though filtered packet capture may used times specific limited information gathering purposes network data packet capture appliance captures depends appliance installed network two options deploying packet capture appliances network one option connect appliance span port port mirroring network switch router second option connect appliance inline network activity along network route traverses appliance similar configuration network tap information captured stored packet capture appliance rather passing another device connected via span port packet capture appliance may receive record ethernet/ip activity ports switch router connected inline packet capture appliances captures network traffic traveling two points traffic passes cable packet capture appliance connected two general approaches deploying packet capture appliances centralized decentralized centralized approach one high-capacity high-speed packet capture appliance connects data-aggregation point advantage centralized approach one appliance gain visibility network ’ entire traffic approach however creates single point failure attractive target hackers additionally one would re-engineer network bring traffic appliance approach typically involves high costs decentralized approach place multiple appliances around network starting point entry proceeding downstream deeper network segments workgroups advantages include network re-configuration required ease deployment multiple vantage points incident response investigations scalability single point failure – one fails others combined electronic invisibility approach practically eliminates danger unauthorized access hackers low cost cons potential increased maintenance multiple appliances past packet capture appliances sparingly deployed oftentimes point entry network packet capture appliances deployed effectively various points around network conducting incident response ability see network data flow various vantage points indispensable reducing time resolution narrowing parts network ultimately affected placing packet capture appliances entry point front work group following path particular transmission deeper network would simplified much quicker additionally appliances placed front workgroups would show intranet transmissions appliance located entry point would able capture packet capture appliances come capacities ranging 500 gb 192 tb organizations extremely high network usage would use upper ranges capacities organizations would well served capacities 1 tb 4 tb good rule thumb choosing capacity allow 1 gb per day heavy users 1 gb per month regular users typical office 20 people average usage 1 tb would sufficient 1 4 years ratio 100/0 means simplex traffic real links even traffic full packet capture appliances capture record ethernet/ip activity filtered packet capture appliances capture subset traffic based set user-definable filters ip address mac address protocol unless using packet capture appliance specific purpose covered filter parameters generally best use full packet capture appliances otherwise risk missing vital data particularly using packet capture network forensics cybersecurity purposes paramount capture everything packet captured spot packet gone forever impossible know ahead time specific characteristics packets transmissions needed especially case advanced persistent threat apt apts hacking techniques rely success network administrators knowing work thus solutions place counteract intelligent packet capture uses machine learning filter reduce amount network traffic captured traditional filtered packet capture relies rules policies manually configured capture potentially malicious traffic intelligent packet capture uses machine learning models including features cyber threat intelligence feeds scientifically target capture threatening traffic machine learning techniques network intrusion detection traffic classification anomaly detection used identify potentially malicious traffic collection packet capture appliances encrypt captured data saving disk others considering breadth information travels network internet connection least portion could considered sensitive encryption good idea situations measure keep captured data secure encryption also critical element authentication data purposes data/network forensics sustained captured speed rate packet capture appliance capture record packets without interruption error long period time different peak capture rate highest speed packet capture appliance capture record packets peak capture speed maintained short period time appliance ’ buffers fill starts losing packets many packet capture appliances share peak capture speed 1 gbit/s actual sustained speeds vary significantly model model packet capture appliance permanent storage ideal network forensics permanent record-keeping purposes data captured overwritten altered deleted drawback permanent storage eventually appliance becomes full requires replacement packet capture appliances overwritable storage easier manage reach capacity start overwriting oldest captured data new however network administrators run risk losing important capture data gets overwritten general packet capture appliances overwrite capabilities useful simple monitoring testing purposes permanent record necessary permanent non-overwritable recording must network forensics information gathering businesses use gigabit ethernet speed networks continue time business intends use one centralized packet capture appliance aggregate network data would probably necessary use 10 gbe packet capture appliance handle large volume data coming network effective way use multiple 1 gbit/s inline packet capture appliances placed strategically around network need re-engineer gigabit network fit 10 gbe appliance since packet capture appliances capture store large amount data network activity including files emails communications could become attractive targets hacking packet capture appliance deployed length time incorporate security features protect recorded network data access unauthorized parties deploying packet capture appliance introduces many additional concerns security cost securing may outweigh benefits best approach would packet capture appliance built-in security features security features may include encryption methods “ hide ” appliance ’ presence network example packet capture appliances feature “ electronic invisibility ” stealthy network profile requiring using ip mac addresses though face connecting packet capture appliance via span port appears make secure packet capture appliance would ultimately still connected network order allow management data retrieval though accessible via span link appliance would accessible via management link despite benefits ability control packet capture appliance remote machine presents security issue could make appliance vulnerable packet capture appliances allow remote access robust system place protect unauthorized access one way accomplish incorporate manual disable switch toggle allows user physically disable remote access simple solution effective doubtful hacker would easy time gaining physical access appliance order flip switch final consideration physical security network security features world moot someone simply able steal packet capture appliance make copy ready access data stored encryption one best ways address concern though packet capture appliances also feature tamperproof enclosures | [
9440,
7411,
2558
] | Test |
9,546 | 0 | Pragmatic_mapping:pragmatic mapping pragmatic mapping — term current use linguistics computing cognitive psychology related fields — process given abstract predicate symbol comes associated action dynamic index particular logical object icon logical object may thing person relation event situation string conceivable level complexity relatively simple example conventional — successful appropriate mundanely “ true ” — linking proper name person conventional designation three parts process succeeds abstract symbol used represent something else name entire signifying predication instance something else represented symbol whatever signified act using symbol conventional way represent whatever usually represents act signifying pragmatic mapping process material argument imagined one comes associated predicate purports succeeds predicate must appropriate true mundane sense relative logical object predication may simple naming act complex representation consisting many distinct propositions many associated clauses instance say jesse james american outlaw name jesse james purports certain historical person may know shot another individual named robert ford may know movie featuring brad pitt jesse james released september 2007 select theaters across america pragmatic mapping name jesse james complete i.e. succeeds mapped onto certain individual actually shot robert ford nothing importance changes pragmatic mapping process turns jesse james robert ford figments someone ’ imagination excepting course truth value propositions include logical object name jesse james ordinary conversation human communication general demonstrated logically mathematically meaning utterly dependent true appropriate pragmatic mapping symbols conventional logical objects infants depend exemplification mapping relations acquire languages meaningful linguistic representations proved depend mappings | [
1890
] | Test |
9,547 | 3 | Double_fault:double fault x86 architecture double fault exception occurs processor encounters problem trying service pending interrupt exception example situation double fault would occur interrupt triggered segment interrupt handler resides invalid processor encounters problem calling double fault handler triple fault generated processor shuts double faults happen due kernel bugs rarely caused user space programs modern protected mode operating system unless program somehow gains kernel access viruses also low-level dos programs processors like powerpc sparc generally save state predefined reserved machine registers double fault situation another exception happens processor still using contents registers process exception sparc processors four levels registers i.e 4-window register system | [
10016,
2987,
7983,
1776,
5457,
5823,
499,
11539,
1399,
7770,
8700,
6078,
1247
] | Validation |
9,548 | 4 | Len_Sassaman:len sassaman leonard harris sassaman 1980 – july 3 2011 advocate privacy maintainer mixmaster anonymous remailer code operator randseed remailer sassaman graduated hill school 1998 sassaman employed security architect senior systems engineer anonymizer phd candidate katholieke universiteit leuven belgium researcher computer security industrial cryptography cosic research group led bart preneel david chaum bart preneel advisors sassaman well-known cypherpunk cryptographer privacy advocate worked network associates pgp encryption software member shmoo group contributor openpgp ietf working group gnu privacy guard project frequently appeared technology conferences like def con sassaman co-founder codecon along bram cohen co-founder hotpets workshop roger dingledine tor thomas heydt-benjamin co-author zimmermann–sassaman key-signing protocol age 21 organizer protests following arrest russian programmer dmitry sklyarov february 11 2006 fifth codecon sassaman proposed returning speaker noted computer scientist meredith l. patterson q presentation married couple worked together several research collaborations including critique privacy flaws olpc bitfrost security platform proposal formal methods analysis computer insecurity february 2011 meredith patterson current startup osogato aims commercialize patterson support vector machine-based query example research sassaman patterson announced osogato first product downloadable music recommendation tool superhappydevhouse 21 san francisco 2009 dan kaminsky presented joint work sassaman patterson black hat las vegas showing multiple methods attacking x.509 certificate authority infrastructure using techniques team demonstrated attacker could obtain certificate clients would treat valid domains attacker control sassaman reported died july 3 2011 patterson reported husband death suicide presentation given kaminsky 2011 black hat briefings revealed testimonial honor sassaman permanently embedded bitcoin block chain | [
2050,
2275,
2818,
517,
11,
149,
8283,
4956,
5373,
1087
] | Test |
9,549 | 3 | KERNAL:kernal kernal commodore name rom-resident operating system core 8-bit home computers original pet 1977 followed extended strongly related versions used successors vic-20 commodore 64 plus/4 c16 c128 commodore 8-bit machines kernal consists low-level close-to-the-hardware os routines roughly equivalent bios ibm pc compatibles contrast basic interpreter routines also located rom well higher-level device-independent i/o functionality user-callable via jump table whose central oldest part reasons backwards compatibility remains largely identical throughout whole 8-bit series kernal rom occupies last 8 kb 8-bit cpu 64 kb address space e000- ffff jump table modified point user-written routines example rewriting screen display routines display animated graphics copying character set ram use jump table new small computers time adventure international games published vic-20 cartridge example software uses kernal use jump table games memory dumped disk loaded commodore 64 run without modification kernal initially written commodore pet john feagans introduced idea separating basic routines operating system developed several people notably robert russell added many features vic-20 c64 simple yet characteristic example using kernal given following 6502 assembly language subroutine written ca65 assembler format/syntax code stub employs codice_1 routine whose address found address codice_2 65490 send text string default output device e.g. display screen kernal known kernel inside commodore since pet days 1980 robert russell misspelled word kernal notebooks commodore technical writers neil harris andy finkel collected russell notes used basis vic-20 programmer manual misspelling followed along stuck according early commodore myth reported writer/programmer jim butterfield among others word kernal acronym maybe likely backronym standing keyboard entry read network link fact makes good sense considering role berkeley softworks later used naming core routines gui os 8-bit home computers geos kernal surprisingly kernal implemented device-independent i/o api entirely dissimilar unix plan-9 nobody actually exploited far publicly known whereas one could reasonably argue everything file latter systems others could easily claim everything gpib-device former due limitations 6502 architecture time opening i/o channel requires three system calls first typically sets logical filename codice_3 system call second call codice_4 establishes gpib/ieee-488 device address communicate finally codice_5 called perform actual transaction application used codice_6 codice_7 system calls set application current input output channels respectively applications may number concurrently open files system-dependent limit e.g. c64 allows ten files opened thereafter codice_8 codice_1 prove useful actually conducting input output respectively codice_10 closes channel observe system call exists create i/o channel devices created destroyed dynamically normal circumstances likewise means exists seeking performing i/o control functions ioctl unix indeed kernal proves much closer plan-9 philosophy application would open special command channel indicated device conduct meta out-of-band transactions example delete scratch file disk user typically open resource called codice_11 device 8 9 channel 15 per established convention commodore 8-bit world channel 15 represents command channel peripherals relying message-passing techniques communicate commands results including exceptional cases example commodore basic might find software unlike following device numbers per established documentation restricted range 0,16 however limitation came specific adaptation ieee-488 protocol effect applies external peripherals relevant kernal system calls vectored programmers intercept system calls implement virtual devices address range 32,256 conceivably one load device driver binary memory patch kernal i/o vectors moment forward new virtual device could addressed far capability never publicly known utilized presumably two reasons 1 kernal provides means dynamically allocating device ids 2 kernal provides means loading relocatable binary image thus burden collisions i/o space memory space falls upon user platform compatibility across wide range machines falls upon software author nonetheless support software functions could easily implemented desired logical filename formats tends depend upon specific device addressed common device used course floppy disk system uses format similar codice_12 flag sorts directory listing indicating desire overwrite file already exists unused otherwise optional physical disk unit number 0 1 dual-drive systems 0 single-disk units like 1541 et al. defaults 0 left unspecified codice_13 resource name 16 characters length characters allowed except certain special characters codice_14 optional comma-separated list attributes flags example user wants overwrite program file called codice_15 might see filename like codice_16 used conjunction device 8 9 meanwhile filename rs-232 driver device 2 consists simply four characters encoded binary format devices keyboard device 0 cassette device 1 display interface device 3 printer device 4 5 require filenames function either assuming reasonable defaults simply needing | [
2179,
11494,
1515,
8494,
7983,
6129,
7281,
5363,
6675,
9756,
4764,
477
] | None |
9,550 | 4 | Doxing:doxing doxing dox abbreviation documents doxxing internet-based practice researching broadcasting private identifying information especially personally identifying information individual organization methods employed acquire information include searching publicly available databases social media websites like facebook hacking social engineering closely related internet vigilantism hacktivism doxing may carried various reasons including aid law enforcement business analysis risk analytics extortion coercion inflicting harm harassment online shaming vigilante justice doxing neologism evolved brief history comes spelling alteration abbreviation docs documents refers compiling releasing dossier personal information someone essentially doxing revealing publicizing records individual previously private difficult obtain term dox derives slang dropping dox according wired writer mat honan old-school revenge tactic emerged hacker culture 1990s hackers operating outside law era used breach opponent anonymity means expose opponents harassment legal repercussions consequently doxing often comes negative connotation vehicle revenge via violation privacy doxware cryptovirology attack invented adam young developed moti yung carries doxing extortion via malware first presented west point 2003 attack rooted game theory originally dubbed non-zero sum games survivable malware attack summarized book malicious cryptography follows attack differs extortion attack following way extortion attack victim denied access valuable information pay get back attack presented victim retains access information disclosure discretion computer virus doxware converse ransomware ransomware attack originally called cryptoviral extortion malware encrypts victim data demands payment provide needed decryption key doxware cryptovirology attack attacker malware steals victim data threatens publish unless fee paid anyone harvest information internet individuals particular structure place doxing meaning someone may seek kind information related target basic web search yield results social media platforms like facebook twitter myspace linkedin offer wealth private information many users high levels self-disclosure i.e sharing photos place employment phone number email address low levels security also possible derive person name home address cell-phone number services reverse phone lookup social engineering used extract information government sources phone companies addition tactics doxxer may use methods harvest information include information search domain name location searching based individual ip address people exposed doxing may targeted harassment methods harassment person fake signups mail pizza deliveries swatting dispatching armed police house spoofed tips hacker may obtain individual dox without making information public hacker may look information order extort coerce known unknown target also hacker may harvest victim information order break internet accounts take social media accounts victim may also shown details proof doxed order intimidate perpetrator may use fear intimidation gain power victim order extort coerce doxing therefore standard tactic online harassment used people associated 4chan gamergate vaccine controversies ethics doxing journalists matters assert issues public interest area much controversy many authors argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes st. louis cardinals lost 1985 world series umpire denkinger became victim two st. louis disc jockeys publicly revealed telephone number home address 1990s anti-abortion activists secured abortion providers personal information home addresses phone numbers photographs posted hit list ruled courts immediate incitement violence site legend explained black font working greyed-out name wounded strikethrough fatality website included blood-dripping graphics celebrated providers deaths incited others kill injure remaining providers list 1993 2016 eight abortion providers killed anti-abortion terrorists starting march 2006 chinese internet phenomenon human flesh search engine (人肉搜索)shares much common doxing specifically refers distributed sometimes deliberately crowdsourced searches similar kinds information use digital media term dox entered mainstream public awareness media attention attracted anonymous internet-based group hacktivists pranksters make frequent use doxing well related groups like antisec lulzsec washington post described consequences innocent people incorrectly accused wrongdoing doxed nightmarish december 2011 anonymous exposed detailed information 7,000 members law enforcement response investigations hacking activities november 2014 anonymous began releasing identities members ku klux klan relation local klan members ferguson missouri making threats shoot anyone provoked protesting shooting michael brown anonymous also hijacked group twitter page resulted veiled threats violence members anonymous november 2015 major release information kkk planned discredited information released prematurely anonymous denied involvement november 5 2015 guy fawkes night anonymous released official list supposed currently unverified kkk members sympathizers following 2013 boston marathon bombing vigilantes reddit wrongly identified number people suspects notable among misidentified bombing suspects sunil tripathi student reported missing bombings took place body reported tripathi found rhode island providence river april 25 2013 reported rhode island health department cause death immediately known authorities said suspect foul play family later confirmed tripathi death result suicide reddit general manager erik martin later issued apology behavior criticizing online witch hunts dangerous speculation took place website journalists journal news westchester county new york accused doxing gun owners region story paper published december 2012 newsweek came fire writer leah mcgrath goodman claimed revealed identity anonymous creator bitcoin satoshi nakamoto though source sleuthing primarily public record heavily criticized doxing users reddit satoshi nakamoto case brought doxing greater attention particularly platforms twitter users questioned ethics doxing journalism many twitter users condemned doxing journalism wherein argued practice seemingly acceptable professional journalists wrong anyone else users discussed effect popularization concept doxing could journalism public interest raising questions journalism concerning public private figures many users argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes march 2015 former major league baseball mlb pitcher curt schilling used doxing identify several people responsible twitter troll posts obscene sexually explicit comments teenaged daughter one person suspended community college another lost part-time job new york yankees december 2015 minneapolis city councilwoman alondra cano used twitter account publish private cellphone numbers e-mail addresses critics wrote involvement black lives matter rally 2016 fox business news anchor lou dobbs revealed address phone number jessica leeds one women accused american presidential candidate donald trump inappropriate sexual advances dobbs later apologized july 2016 wikileaks released 300,000 e-mails called erdoğan emails initially thought damaging turkish president recep tayyip erdoğan included leak michael best uploaded turkish citizens personal information databases wikileaks promoted came forward say mistake site uploaded information took files removed due privacy concerns included spreadsheets private sensitive information appears every female voter 79 81 provinces turkey including home addresses private information sometimes including cellphone numbers november 2016 politico editor michael hirsh resigned publishing home address white nationalist richard b. spencer facebook july 2017 united states presidential advisory commission election integrity established may 2017 u.s. president donald trump investigate controversial allegation voter fraud published 112-page document unredacted emails public comment work included critics supporters commission commission included personal details critics names emails phone numbers home addresses commenters wrote white house expressed concern publication personal information one person writing release voter data period despite person name email address published commission act drew criticism theresa lee staff attorney american civil liberties union voting rights project stated cavalier attitude toward public personal information especially concerning given commission request sensitive data every registered voter country white house defended publication personal information noting everyone warned might happen however former deputy secretary labor chris lu stated regardless legality white house moral obligation protect sensitive data saying whether legal disclose personal information clearly improper responsible white house would federal agencies often solicit release public comments proposed legislation regulations.gov designated public comments includes detailed set guidelines explaining submit comments type personal information collected information may used stating agencies may require include personal information name email address comment form securities exchange commission instance warns commenters 'submit information wish make available publicly another agency federal trade commission tells commenters published comments include commenter last name state/country well entire text comment please include sensitive confidential information however white house appear issued public guidelines warnings many emails sent marc lotter press secretary mike pence stated public comments similar individuals appearing commission make comments providing name making comments commission ’ federal register notice asking public comments website make clear information 'including names contact information sent email address may released october 3 2018 jackson cosko house fellow democratic party arrested u.s. capitol police uscp allegedly posted private identifying information several senators wikipedia according uscp personal information republican senators lindsey graham mike lee orrin hatch anonymously posted wikipedia week thursday september 27 2018 information included home addresses phone numbers three lawmakers senate judiciary committee alleged doxing occurred hearing supreme court nominee judge brett kavanaugh cosko initially charged witness tampering threats interstate communications unauthorized access government computer identity theft second degree burglary unlawful entry cosko fired arrest worked democratic rep. sheila jackson lee d-tx sen. dianne feinstein d-calif sen. maggie hassan d-n.h. former sen. barbara boxer d-calif convicted six charges cosko faces 20 years prison june 2019 sentenced judge thomas f. hogan four years prison | [
4753,
1970,
3858,
4945,
8978,
3350,
857,
7515,
4956,
1087,
3774,
3711
] | Test |
9,551 | 3 | Socket_FP3:socket fp3 socket fp3 µbga906 cpu socket laptops released june 2014 amd mobility apu products codenamed kaveri kaveri -branded products combine steamroller crystal series gcn uvd 4.2 vce 2 video acceleration amd trueaudio audio acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate fp3 package supports two different voltage levels vddp rail 1.05 v nominal setting gfx link support pci express 3.x data rate 0.95 v setting maximum data rate supported gfx link pci express 2.x desktop counterpart socket fm2+ | [
3586,
9475,
3588,
8452,
9092,
10375,
3464,
4872,
5645,
398,
6033,
7058,
10260,
2719,
4767,
2463,
2850,
7712,
9122,
1322,
2094,
11183,
1329,
6705,
3892,
8629,
9400,
6978,
11331,
9157,
3783,
11080,
2764,
7247,
7122,
9427,
7132,
2525,
9057,
... | Test |
9,552 | 0 | Parallel_text:parallel text parallel text text placed alongside translation translations parallel text alignment identification corresponding sentences halves parallel text loeb classical library clay sanskrit library two examples dual-language series texts reference bibles may contain original languages translation several translations ease comparison study origen hexapla greek sixfold placed six versions old testament side side famous example rosetta stone large collections parallel texts called parallel corpora see text corpus alignments parallel corpora sentence level prerequisite many areas linguistic research translation sentences split merged deleted inserted reordered translator makes alignment non-trivial task four main corpora types distinguished noisy parallel corpus contains bilingual sentences perfectly aligned poor quality translations nevertheless contents bilingual translations specific document comparable corpus built non-sentence-aligned untranslated bilingual documents documents topic-aligned quasi-comparable corpus includes heterogeneous non-parallel bilingual documents may may topic-aligned rarest parallel corpora corpora contain translations document two languages aligned sentence level least large corpora used training sets machine translation algorithms usually extracted large bodies similar sources databases news articles written first second languages describing similar events however extracted fragments may noisy extra elements inserted corpus extraction techniques differentiate bilingual elements represented corpora monolingual elements represented one corpus order extract cleaner parallel fragments bilingual elements comparable corpora used directly obtain knowledge translation purposes high-quality parallel data difficult obtain however especially under-resourced languages field translation studies bitext merged document composed source- target-language versions given text bitexts generated piece software called alignment tool bitext tool automatically aligns original translated versions text tool generally matches two texts sentence sentence collection bitexts called bitext database bilingual corpus consulted search tool concept bitext shows certain similarities translation memory generally salient difference bitext translation memory translation memory database segments matched sentences stored way totally unrelated original context original sentence order lost bitext retains original sentence order however implementations translation memory translation memory exchange tmx standard xml format exchanging translation memories computer-assisted translation cat programs allow preserving original order sentences bitexts designed consulted human translator machine small alignment errors minor discrepancies would cause translation memory fail importance original 1988 article harris also posited bitext represents translators hold source target texts together mental working memories progress however hypothesis followed | [
384,
3748,
7780,
6655,
9645,
7599,
538,
7164,
5214,
479
] | None |
9,553 | 4 | Operation_Cyber_Condition_Zebra:operation cyber condition zebra operation cyber condition zebra network operations campaign conducted united states navy deny network intrusion establish adequate computer network defense posture provide defense-in-depth warfighting capability operation specifies perimeter security legacy networks deny intrusions data infiltration firewalls maintained risk assessment formal adjudication legacy application waiver requests legacy networks shut quickly possible enterprise networks nmci established name analogue term material condition zebra standard configuration equipment systems set warship provide greatest degree subdivision tightness ship set immediately automatically general quarters sounded | [
2558
] | None |
9,554 | 8 | EndChan:endchan endchan internet imageboard different conversation threads users post names anonymously opened 2015 became popular similar website 8chan taken offline august 2019 endchan describes anonymous image-board promotes ideas identity according guardian august 2019 three terrorists posted far-right manifestos imageboard 8chan within six months website taken offline host server alternatives popular 8chan include older imageboard 4chan well variety others seen much popularity time endchan new website lack reputation attracted former 8chan users websites posting advertisements attract users 8chan one message endchan describes situation driven exile le monde saying website many 8chan users taken refuge endchan twitter reported large influx 8ch refugees ... hit us drastically chang ed pace site operates sic causing add extra global moderator user name philip manshaus name perpetrator shooting attack mosque bærum norway posted messages endchan shortly attack board initially misidentified 4chan 8chan media nature websites rather individual existence criticized enabling promoting terrorism manshaus messages referred three shootings six months preceding caused shut-down 8chan praising attackers suggesting would attack endchan twitter account announced attack manshaus thread politics board said denounce violence quickly taken moderators also explained manifesto posted manshaus thread deleted shooting prompted website enter radar internet extremism researchers | [
82
] | None |
9,555 | 4 | City_ID:city id city id cequint first-generation caller mobile identification service city id displays city state country associated caller telephone number partnership mobile network operators city id service available many devices alltel u.s. cellular verizon wireless city state information determined referencing area code exchange npa-nxx calling party telephone number using database stored locally mobile phone database updated new area codes exchanges introduced city id application integrated firmware mobile phones providing city state country information phone application native display incoming call screen call logs outgoing call screen city state information provided city id service based area code exchange phone registered land-line phones information reliable method determining phone originating calling office switch exchange mobile phones information potentially less useful mobile phones often operate outside originally registered area code exchange area city id integrated many android devices partnership several mobile network operators service offers 15-day free trial subscription fee required continue service software pre-installed integrated firmware users remove disable unless root privileges e.g rooted phone application manager settings application used force stop application according cequint way disable city id select “ ” end free trial ends 15 days receive initial free trial notification select “ remind later ” press back end key similar action trial expired message appear incoming call 10 times please sure select “ ” upon first expiration message disable city id city id pre-installed many brew successor os brewmp devices partnership several mobile network operators brew brewmp phones usually obvious branding like android blackberry phones cheaper feature phones north america often brew-based mobile phones media center allow removal pre-installed city id application | [
6386
] | Test |
9,556 | 4 | Linear_cryptanalysis:linear cryptanalysis cryptography linear cryptanalysis general form cryptanalysis based finding affine approximations action cipher attacks developed block ciphers stream ciphers linear cryptanalysis one two widely used attacks block ciphers differential cryptanalysis discovery attributed mitsuru matsui first applied technique feal cipher matsui yamagishi 1992 subsequently matsui published attack data encryption standard des eventually leading first experimental cryptanalysis cipher reported open community matsui 1993 1994 attack des generally practical requiring 2 known plaintexts variety refinements attack suggested including using multiple linear approximations incorporating non-linear expressions leading generalized partitioning cryptanalysis evidence security linear cryptanalysis usually expected new cipher designs two parts linear cryptanalysis first construct linear equations relating plaintext ciphertext key bits high bias whose probabilities holding space possible values variables close possible 0 1 second use linear equations conjunction known plaintext-ciphertext pairs derive key bits purposes linear cryptanalysis linear equation expresses equality two expressions consist binary variables combined exclusive-or xor operation example following equation hypothetical cipher states xor sum first third plaintext bits block cipher block first ciphertext bit equal second bit key formula_1 ideal cipher linear equation relating plaintext ciphertext key bits would hold probability 1/2 since equations dealt linear cryptanalysis vary probability accurately referred linear approximations procedure constructing approximations different cipher basic type block cipher substitution-permutation network analysis concentrated primarily s-boxes nonlinear part cipher i.e operation s-box encoded linear equation small enough s-boxes possible enumerate every possible linear equation relating s-box input output bits calculate biases choose best ones linear approximations s-boxes must combined cipher actions permutation key mixing arrive linear approximations entire cipher piling-up lemma useful tool combination step also techniques iteratively improving linear approximations matsui 1994 obtained linear approximation form formula_2 apply straightforward algorithm matsui algorithm 2 using known plaintext-ciphertext pairs guess values key bits involved approximation set values key bits right-hand side referred partial key count many times approximation holds true known plaintext-ciphertext pairs call count partial key whose greatest absolute difference half number plaintext-ciphertext pairs designated likely set values key bits assumed correct partial key cause approximation hold high bias magnitude bias significant opposed magnitude probability procedure repeated linear approximations obtaining guesses values key bits number unknown key bits low enough attacked brute force | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
4128,
4389,
10662,
169,
11185,
8627,
2357,
10806,
1847,
9528,
2110,
9156,
9541,
10315,
6863,
8273,
7635,
212,
10963,
11349,
2265,
7643,
9697,
8674,
229,
618,
1898,
881,
1654,
7161,
7034,... | Test |
9,557 | 2 | System_time:system time computer science computer programming system time represents computer system notion passage time sense time also includes passing days calendar system time measured system clock typically implemented simple count number ticks transpired since arbitrary starting date called epoch example unix posix-compliant systems encode system time unix time number seconds elapsed since start unix epoch 1 january 1970 00:00:00 ut exceptions leap seconds systems implement 32-bit 64-bit versions windows api windows 9x windows nt provide system time systemtime represented year/month/day/hour/minute/second/milliseconds value filetime represented count number 100-nanosecond ticks since 1 january 1601 00:00:00 ut reckoned proleptic gregorian calendar system time converted calendar time form suitable human comprehension example unix system time seconds since beginning epoch translates calendar time 9 september 2001 01:46:40 ut library subroutines handle conversions may also deal adjustments timezones daylight saving time dst leap seconds user locale settings library routines also generally provided convert calendar times system times closely related system time process time count total cpu time consumed executing process may split user system cpu time representing time spent executing user code system kernel code respectively process times tally cpu instructions clock cycles generally direct correlation wall time file systems keep track times files created modified and/or accessed storing timestamps file control block inode file directory first-generation personal computers keep track dates times included systems ran cp/m operating system well early models apple ii bbc micro commodore pet among others add-on peripheral boards included real-time clock chips on-board battery back-up available ibm pc xt ibm first widely available pc came equipped date/time hardware built motherboard prior widespread availability computer networks personal computer systems track system time respect local time make allowances different time zones current technology modern computers keep track local civil time many household personal devices vcrs dvrs cable tv receivers pdas pagers cell phones fax machines telephone answering machines cameras camcorders central air conditioners microwave ovens microcontrollers operating within embedded systems raspberry pi arduino similar systems always internal hardware keep track time many controller systems operate without knowledge external time require information typically initialize base time upon rebooting obtaining current time external source time server external clock prompting user manually enter current time system clock typically implemented programmable interval timer periodically interrupts cpu starts executing timer interrupt service routine routine typically adds one tick system clock simple counter handles periodic housekeeping tasks preemption etc returning task cpu executing interruption following tables illustrate methods retrieving system time various operating systems programming languages applications values marked system-dependent may differ across implementations dates given gregorian proleptic gregorian calendar dates note resolution implementation measurement time imply precision measurements example system might return current time value measured microseconds actually capable discerning individual clock ticks frequency 100 hz 10 ms | [
2432,
515,
3462,
8582,
5000,
6281,
6797,
2062,
8976,
1435,
2168,
9245,
9762,
3876,
7076,
428,
7341,
10413,
7983,
2045,
692,
823,
1849,
4409,
11075,
8260,
8644,
8262,
4423,
8524,
2512,
3922,
4441,
3675,
11229,
5348,
10470,
10344,
8298,
151... | Test |
9,558 | 4 | Commentary_on_Edward_Snowden's_disclosure:commentary edward snowden disclosure commentary edward snowden disclosure part reactions global surveillance disclosures made edward snowden june 8 2013 director national intelligence dni james r. clapper denounced reckless disclosures intelligence community measures used keep americans safe condemned leaks done huge grave damage u.s. intelligence capabilities later month u.s. president barack obama dismissive snowden saying 'm going scrambling jets get 29-year-old hacker early august obama said snowden patriot americans would better remained unaware nsa surveillance activities snowden revealed obama also said called thorough review surveillance operations mr. snowden made leaks ... preference think american people preference would lawful orderly examination laws thoughtful fact-based debate would lead us better place august 4 chairman joint chiefs staff martin dempsey said weekly abc interview show week snowden caused us considerable damage intelligence architecture adversaries changing way communicate september dni clapper acknowledged snowden may done public service started needed debate balance privacy security loath give credit happened egregious think clear conversations generated debate actually probably needed happen said unfortunate n't happen time ago good side january 29 2014 dni clapper gave public testimony session senate intelligence committee asked snowden accomplices return purloined nsa documents clapper asked whether word accomplices referred journalists clapper spokesperson shawn turner responded director clapper referring anyone assisting edward snowden threaten national security unauthorized disclosure stolen documents related lawful foreign intelligence collection programs late june 2013 former us president jimmy carter said obviously violated laws america responsible think invasion human rights american privacy gone far ... think secrecy surrounding invasion privacy excessive think bringing public notice probably long term beneficial earlier month former vice president dick cheney suggested snowden might spy working chinese government former u.s. intelligence officials speculated chinese russian intelligence agents might gleaned additional classified material snowden view shared former russian agents snowden however told journalist glenn greenwald july never gave information either government never took anything laptops stewart baker former nsa general counsel early 1990s said july 18 2013 hearing afraid hyped distorted press reports orchestrated edward snowden allies may cause us – nations – construct new restraints intelligence gathering restraints leave us vulnerable another security disaster former cia nsa chief general michael hayden late june 2013 welcomed public debate balance privacy security leaks provoked convinced american people know exactly balance privacy security know comfortable feel september 2013 hayden stressed indisputable legality nsa called snowden troubled young man albeit morally arrogant tremendous degree also said prospects russia suspect end like rest defectors went old soviet union isolated bored lonely depressed -- ended alcoholics speaking university connecticut april 23 2014 former u.s. secretary state hillary clinton insinuated found snowden motives suspicious emerged absconded material puzzled protections whistle-blowers concerned wanted part american debate could said struck as—i honest you—as sort odd would flee china hong kong controlled china would go russia—two countries difficult cyberrelationships put mildly clinton added think turning lot material—intentionally unintentionally—drained gave kinds information big countries networks terrorist groups like hard time thinking somebody champion privacy liberty taken refuge russia putin authority reactions snowden disclosures among members congress initially largely negative speaker house john boehner senators dianne feinstein bill nelson called snowden traitor several senators representatives joined calling snowden arrest prosecution representative thomas massie one members congress question constitutional validity government surveillance programs suggest snowden granted immunity prosecution senators ted cruz rand paul offered tentative support snowden saying reserving judgment snowden information surveillance programs snowden motives known senator paul said think history looks going contrast behavior james clapper national intelligence director edward snowden mr. clapper lied congress defiance law name security mr. snowden told truth name privacy paul later called snowden civil disobedient like martin luther king jr. faced life imprisonment representative john lewis made comparisons snowden gandhi saying leaker appealing higher law senator bill nelson edward snowden amounts act treason similar comments also made rep. peter t. king rep. john boehner sen. dianne feinstein july 25 us senate committee appropriations unanimously adopted amendment senator lindsey graham fiscal year 2014 department state foreign operations related programs appropriations bill would seek sanctions country offers asylum snowden response information release snowden rep. justin amash r-mich. rep. john conyers d-mich. proposed amendment national defense authorization act curtail nsa gathering storage personal records house rejected narrow margin 205–217 amash subsequently told fox news snowden whistle-blower told us need know sunday abc interview show week rep. dutch ruppersberger d-maryland united states house select committee intelligence asked raddatz efforts thwarted trying get information members congress replied ... ince incident occurred snowden 've three different hearings members democratic caucus republican caucus general alexander come deputy chris inglis ask questions people relates information continue 're trying get american public know going ... better educate caucus democratic caucus 're trying declassify much u.s senator john mccain r-az said august 11 edition fox news sunday snowden become hero young americans reminded jason bourne character mccain attributed generation change lack confidence federal government right kind generational change said young americans trust government gordon humphrey conservative republican senator new hampshire 1979–1991 expressed support snowden glenn greenwald revealed humphrey former member senate foreign relations committee contact snowden via email humphrey told snowden provided leaked information would put harms way intelligence agent believe done right thing exposing regard massive violation united states constitution humphrey cited snowden courageous whistle-blower tom mcclintock r-calif came favor amnesty snowden saying think would best american government granted amnesty get back america answer questions without threat prosecution ... good laws sharing secrets broke laws hand broke good reason laws used direct contravention 4th amendment rights americans arizona senator john mccain criticized politicians voted favor patriot act outraged nsa spying phone calls saying passed patriot act passed specific provisions act allowed program take place enacted operation members congress know voting think responsibility lot government glenn greenwald one journalists received documents praised snowden done service revealing surveillance american public john cassidy new yorker called snowden hero said revealing colossal scale us government eavesdropping americans people around world snowden performed great public service outweighs breach trust may committed cnn columnist douglas rushkoff also called snowden leak act heroism amy davidson writing new yorker thankful overdue conversation privacy limits domestic surveillance american political commentators public figures noam chomsky chris hedges michael moore cornel west glenn beck ref name= michael moore/glenn beck /ref matt drudge alex jones andrew napolitano oliver stone michael savage stephen walt praised snowden exposing secret government surveillance commentators critical snowden methods motivations jeffrey toobin example denounced snowden grandiose narcissist deserves prison writing new yorker toobin argued programs exposed illegal therefore snowden whistleblower toobin questioned whether government function employees contractors take upon sabotage programs ’ like editors bloomberg news argued government ought prosecute snowden media focus snowden took attention away issues u.s. government surveillance interpretations patriot act foreign intelligence surveillance act fisa court actions really matters greenwald accused media u.s. focusing edward snowden instead wrongdoing director national intelligence james r. clapper u.s. officials op-ed author alex berenson argued federal government flown representative hong kong ask snowden give testimony front u.s. congress offer fair criminal trial view preventing unintended disclosures classified information countries cybersecurity scholar peter singer divided material disclosed snowden three categories smart useful espionage enemies united states legally questionable activities involved us citizens backdoors fudging policy/law un-strategic stupid actions targeting american allies huge blowback us standing us business postulated differing ways people viewed snowden could explain polarizing singer also spoke double legacy nsa revelations released snowden one hollowed american ability operate effectively ensuring future internet way would hope would huge long-term consequences second hammer-blow american technology companies cloud computing industry example recent estimate 'll lose 36 billion worth business surveys conducted news outlets professional polling organizations found american public opinion divided snowden disclosures polled canada europe supportive snowden respondents u.s june 2013 emnid survey 50 percent germans polled considered snowden hero 35 percent would hide homes october 2013 67 percent canadians polled considered snowden hero 60 percent uk respondents april 2014 uk yougov poll 46 percent british people thought newspapers reporting materials given snowden good society 22 percent thought bad society 31 percent n't know january 1 2014 editorial board new york times praised snowden whistleblower wrote favor granting clemency arguing snowden may broken law done country great service bringing abuses nsa light someone reveals government officials routinely deliberately broken law wrote person face life prison hands government times cast doubt claim made snowden critics damaged national security concluded request president obama discontinue vilification snowden give incentive return home article garnered unusual amount blowback editorial responses multiple media outlets guardian called pardon editorial coincidentally published day saying snowden allowed return home dignity january 4 2014 article peter baker new york times laid polarization opinions throughout u.s. impetus toward clemency gained public reaction snowden revelations yet despite growing backlash government surveillance baker noted calls leniency made little headway white house justice department national security establishment september 2016 editorial board washington post characterized issue whether snowden deserved presidential pardon complicated question president answer editors post credited snowden necessary reforms brought revelations en masse collection telephone data nsa stressed snowden separate leak information agency prism program basically defensible intelligence operations reasons face trial saying snowden hurt credibility avatar freedom accepting asylum russia editors post dismissed calls human-rights organizations clemency snowden noble purposes policy changes resulting leaks urged president pardon snowden despite post responsible publishing leaked material according guardian editorial stunned many american journalists glenn greenwald one journalists snowden initially leaked classified documents characterized post editorial act journalistic treachery cowardice noting post accepted pulitzer prize publishing snowden leaks concerning prism operations mentioned editorial amnesty international met edward snowden moscow mid july 2013 organization said disclosed patently public interest whistleblower actions justified exposed unlawful sweeping surveillance programmes unquestionably interfere individual ’ right privacy states attempt stop person revealing unlawful behaviour flouting international law freedom expression fundamental right widney brown senior director amnesty feared snowden would great risk human rights violations forcibly transferred united states urged country return snowden us michael bochenek director law policy amnesty international deplored us pressure governments block snowden asylum attempts saying unassailable right enshrined international law human rights watch said snowden able raise issue nsa mass surveillance without facing espionage charges would left united states first place human rights watch writes country snowden seeks asylum consider claim fairly protect rights international law recognizes revealing official secrets sometimes justified public interest navi pillay united nations high commissioner human rights said snowden case shown need protect persons disclosing information matters implications human rights well importance ensuring respect right privacy transparency international international association lawyers nuclear arms vereinigung deutscher wissenschaftler awarded snowden german whistleblowerpreis 2013 humanist union awarded fritz bauer prize 2013 daniel ellsberg whistleblower leaker top-secret pentagon papers 1971 stated interview cnn thought snowden done incalculable service country leaks might prevent united states becoming surveillance state said snowden acted sort courage patriotism soldier battle op-ed following morning ellsberg added american history important leak edward snowden release nsa material ... including pentagon papers ray mcgovern retired cia officer turned political activist agreed ellsberg added time today 'm feeling much hopeful democracy feeling time yesterday william binney whistleblower disclosed details nsa mass surveillance activities said snowden performed really great public service begin exposing programs making government sense publicly accountable 're snowden cited conversation reliable source allegations us hacking china binney felt transitioning whistle-blower traitor thomas drake former senior executive nsa whistleblower said feels extraordinary kinship snowden magnificent act civil disobedience exposing inner workings surveillance state public interest truly wikileaks founder julian assange hailed snowden hero exposed one serious events decade – creeping formulation mass surveillance state charges snowden revealed assange released statement asking people step forward stand snowden following president obama assurances changes planned nsa surveillance program assange said written statement obama validated edward snowden role whistle-blower shamai leibowitz leaked details fbi operation said legal threats smear campaign snowden grave mistake government really wanted keep secrets coming would well let man conscience go live life country october 2013 four us whistleblowers activists visited moscow present snowden award truth-telling titled sam adams award integrity intelligence thomas drake one presenters told reporters event us unchained constitution banning real law using secret law secret interpretations law explained snowden escape us ensure chance freedom claiming us made snowden stateless revoking passport russia leading temporary asylum country drake praised russia saying actually recognized international law granted political asylum | [
208,
1169,
6344,
3495
] | None |
9,559 | 3 | Kathryn_S._McKinley:kathryn s. mckinley kathryn s. mckinley american computer scientist noted research compilers runtime systems computer architecture also known leadership broadening participation computing mckinely co-chair cra-w 2011 2014 mckinley received b.a computer science engineering rice university 1985 went earn m.s computer science rice university 1990 ph.d computer science rice university 1992 joined department computer science university massachusetts amherst assistant professor 1993 promoted associate professor 1999 2001 moved university texas austin associate professor 2005 promoted professor 2010 endowed professor computer science 2011 moved microsoft research principal researcher currently senior research scientist google mckinley married scotty strahan three boys cooper dylan wyatt strahan colleagues introduced first general purpose model optimization framework based dependences cache line reuse improving cache locality dense matrix algorithms using loop permutation loop reversal fusion distribution mckinley advisor ken kennedy showed use model introduce parallelism locality eliminate false sharing work selected 2014 ics 25th anniversary volume mckinley phd student emery d. berger colleagues introduced hoard c/c++ memory allocator widely used applications apple os x hoard limits contention caused multiple threads allocate free memory time avoids false sharing due memory allocation time hoard enforces provable bounds total amount fragmentation mckinley leader dacapo research group spanned nine institutions funded nsf itr 2000-2006 project produced number innovative virtual machine technologies open source tools open source benchmarks new methodologies evaluating managed runtimes benchmarking methodologies efforts led stephen m. blackburn dacapo java benchmark suite evaluation methodologies widely used academia industry evaluate java analysis optimization testing technologies blackburn cheng mckinley first perform apples-to-apples comparison garbage collection algorithms showed free-list allocators give substantial amounts locality even though require less memory compared copying algorithms allocate contemporaneous objects contiguously work sigmetrics 2014 test time award based insight blackburn mckinley designed new class garbage collectors named mark-region immix mark-region collector manages memory hierarchically using fixed sized blocks consisting lines contiguous object allocation may cross lines noblocks immix collection mixes line marking object copying single pass design delivers substantial performance benefits due smaller heap footprints improvements locality phd student michael bond received acm sigplan outstanding doctoral dissertation award 2008 february 14 2013 mckinley testified house committee science space technology subcommittee research spoke academic industry government computing research ecosystem driving innovation economic advances almost fields 2008 named acm fellow notable awards include | [
8545,
9932,
5074,
468,
3512,
3871
] | Test |
9,560 | 9 | Comparison_of_JavaScript_engines:comparison javascript engines following tables compare standards support notable javascript/ecmascript engines used web browsers see list ecmascript engines full list | [
1409,
259,
8068,
3462,
6791,
1802,
6154,
10507,
8854,
4378,
8605,
7455,
6176,
1698,
5031,
3761,
1203,
11060,
438,
4920,
1470,
5311,
2880,
7871,
9152,
4171,
5067,
11087,
339,
84,
4822,
4056,
9561,
603,
8923,
8289,
482,
5219,
7396,
487,
5... | Test |
9,561 | 9 | Unobtrusive_JavaScript:unobtrusive javascript unobtrusive javascript general approach use javascript web pages though term formally defined basic principles generally understood include javascript historically reputation clumsy language unsuitable serious application development largely due inconsistent implementations language document object model dom various browsers widespread use buggy copy-and-paste code runtime errors common difficult debug programmers ever tried fix long script behaved less way supposed scripts often failed completely browsers web developers promoting graceful degradation since 1994 recent emergence standards-compliant browsers javascript frameworks high-quality debugging tools made organized scalable javascript code possible emergence ajax interfaces made desirable whereas javascript reserved relatively simple non-critical tasks form validation decorative novelties used write large complex codebases often part site core functionality run time errors unpredictable behavior longer minor annoyances fatal flaws advocates unobtrusive javascript see part larger web standards movement much demand cross-browser compatibility driven increasing emphasis standardized markup style increasing demand rich internet applications driving movement toward better practices use javascript concept unobtrusiveness relation javascript programming coined 2002 stuart langridge article unobtrusive dhtml power unordered lists article langridge argues way keep javascript code including event handlers outside html stuart langridge since expanded upon thought book article format authors tried refine define essential elements unobtrusive paradigm david flanagan seminal javascript definitive guide says specific formula three main goals web standards project describes four benefits unobtrusive dom scripting javascript manifesto paris web conference 2007 christian heilmann identified seven rules unobtrusive javascript traditionally javascript often placed inline together html document markup example following typical way register javascript event handler html purpose html markup describe document structure programmatic behavior combining two negatively impact site maintainability like combining content presentation javascript behavior created referenced html harder use maintain example setting handlers several events single element setting event handler several elements using event delegation unobtrusive solution register necessary event handlers programmatically rather inline rather adding codice_2 attribute explicitly relevant element simply identified example codice_3 codice_4 means markup script runs page first loaded browser look relevant element set accordingly unobtrusive javascript add little possible global object global namespace environment runs scripts may override variable function created global namespace lead unexpected failures difficult debug javascript built-in explicit namespace mechanism desired effects easy produce using language facilities flanagan suggests use developer domain name dotted segments reversed single global name publish likely unique style developed java language variables functions objects kinds defined within namespace objects usually recommended use closures within namespace isolate become private variables functions well export public interface module functionality code could followed directly following module public methods could invoked either way follows way module-writer code contained private unique namespace interfere intrude upon code time writing event listener detects loading html page adds relevant listeners events page well behaviors required solve problem separating javascript functionality html markup use client-side javascript libraries jquery mootools prototype simplify process help ensure individual browser browser version implementation details hidden catered keeping javascript default namespace helps ensure unobtrusive possible sense criterion unobtrusive javascript often cited ensure added behavior degrades gracefully browsers unexpected configurations user may disabled javascript altogether requirement basic tenet web accessibility ensure javascript-enhanced websites usable people abilities disabilities users whatever computing platform get equal access site information functionality sometimes extra work involved achieving web accessibility optional extra many countries example uk equality act 2010 refer explicitly website accessibility makes illegal discriminate people disabilities applies anyone providing service public private voluntary sectors lot effort may put designing implementing slick client-side user interface unobtrusive javascript remain unobtrusive user without client-side scripting find access published information meet goal often necessary implement equivalent albeit clunkier server-side functionality available without use javascript take example webpage thumbnail images need javascript behaviours full-size images appear front page mouse rolled clicked first server-side markup ensure relevant full-size image served users without javascript click thumbnail case basic html markup may look like following thumbnail work without javascript unobtrusive javascript case page-load could find codice_5 elements class codice_6 remove page dom could find images class codice_7 attach codice_8 codice_9 event handler specified in-line provide slick behaviour example invoked event handler may send ajax request server full-size image add codice_10 page dom invoking existing css appears front existing content may become partially greyed codice_10 need close button perhaps visual 'spinner show data loading etc finally ajax data arrives handler hides spinner inserts full-size image new codice_10 display way client-side functionality depends javascript function function succeeds begins removing basic manual behavior goes add client-side scripted behavior script fails whatever reason manual behavior remains place remains functional though essence unobtrusive javascript concept added separate behavior layer advocates paradigm generally subscribe number related principles | [
1152,
6403,
8068,
3462,
6791,
522,
1802,
6154,
8854,
8605,
6176,
1698,
803,
5031,
5677,
1203,
438,
4920,
1470,
5311,
2880,
7871,
5067,
339,
10581,
4056,
9560,
8923,
8289,
482,
9195,
5101,
10991,
124,
10739,
5622,
10744,
7802,
2556,
6397
] | None |
9,562 | 2 | Bitnami:bitnami bitnami library installers software packages web applications development stacks well virtual appliances bitnami sponsored bitrock company founded 2003 seville spain daniel lopez ridruejo erica brescia bitnami stacks used installing software linux windows mac os x solaris vmware acquired bitnami may 15th 2019 bitnami stacks available web applications wordpress drupal joomla redmine abantecart prestashop magento mediawiki many others addition application stacks include software required run application example wordpress stack include wordpress well mysql database manage data apache web server serve pages openssl library basic cryptographic functions phpmyadmin administer mysql bitnami installers released apache license 2.0 using automated cloud computing management bitnami offers users automated application deployments open source server apps oracle cloud amazon ec2 azure google cloud platform servers since july 2009 bitnami also offers ready-to-run virtual machines contain minimal configured linux operating system bitnami offers open source applications modules xampp package developed apache friends distinct difference installation bitnami installers native installs e.g rpms debs linux installed way prevent interference existing software libraries multiple applications installed web server considerations resolving conflicts specific ports must made february 13 2009 bitnami announced release enano cms web stack unique according bitnami enano cms project stack module first externally developed february 2010 bitnami announced release bitnami cloud hosting service allows deploying bitnami stacks amazon ec2 cloud automatic monitoring backups may 15 2019 vmware announced intent acquire bitnami | [
4194,
6153,
5067,
4236,
3182,
1935,
5198,
9806,
11410,
1813,
11221,
823,
1150
] | Test |
9,563 | 2 | Bank_switching:bank switching bank switching technique used computer design increase amount usable memory beyond amount directly addressable processor used configure system differently different times example rom required start system diskette could switched longer needed video game systems bank switching allowed larger games developed play existing consoles bank switching originated minicomputer systems many modern microcontrollers microprocessors use bank switching manage random-access memory non-volatile memory input-output devices system management registers small embedded systems technique common 8-bit microcomputer systems bank-switching may also used work around limitations address bus width hardware constraint prevents straightforward addition address lines control-oriented microprocessors use bank-switching technique access internal i/o control registers limits number register address bits must used every instruction unlike memory management paging data exchanged mass storage device like disk storage data remains quiescent storage memory area currently accessible processor although may accessible video display dma controller subsystems computer bank switching considered way extending address bus processor external register example processor 16-bit external address bus address 2 65536 memory locations external latch added system could used control two sets memory devices 65536 addresses could accessed processor could change set current use setting clearing latch bit latch set cleared processor several ways particular memory address may decoded used control latch processors separately-decoded i/o addresses output address may decoded several bank-switching control bits could gathered register approximately doubling available memory spaces additional bit register external bank-selecting latch register directly connected program counter processor automatically change state program counter overflows detected external latch since program counter internal register processor extra memory seamlessly available programs internal registers processor remain original length processor directly span bank-switched memory example incrementing internal register instead processor must explicitly bank-switching operation access large memory objects limitations generally bank-switching system one block program memory common banks matter bank currently active part address space one set memory locations used area would used hold code manages transitions banks also process interrupts often single database spans several banks need arises move records banks sorting one bank accessible time would necessary move byte twice first common memory area perform bank switch destination bank actually move byte destination bank computer architecture dma engine second cpu bank access restrictions differ whichever subsystem transfer data directly banks used unlike virtual memory scheme bank-switching must explicitly managed running program operating system processor hardware automatically detect data currently mapped active bank required application program must keep track memory bank holds required piece data call bank-switching routine make bank active however bank-switching access data much faster example retrieving data disk storage processors 16-bit addressing 8080 z80 6502 6809 etc commonly used early video game consoles home computers directly address 64 kb systems memory divide address space number blocks could dynamically mapped parts larger address space bank switching used achieve larger address space organizing memory separate banks 64kb blocks various sizes switched via bank select registers similar mechanisms cromemco first microcomputer manufacturer use bank switching supporting 8 banks 64kb systems using bank switching caution required order corrupt handling subroutine calls interrupts machine stack contents memory temporarily switched cpu inaccessible processor could used hardware video display dma i/o devices etc cp/m-80 3.0 released 1983 z80-based trs-80s model 4 model ii supported bank switching allow use 64k memory 8080 z80 processor could address bank switching allowed extra memory functions added computer design without expense incompatibility switching processor wider address bus example c64 used bank switching allow full 64kb ram still provide rom memory-mapped i/o well atari 130xe could allow two processors 6502 antic access separate ram banks allowing programmers make large playfields graphic objects without using memory visible cpu microcontrollers microprocessors significant input/output hardware integrated on-chip may use bank switching example access multiple configuration registers on-chip read/write memory example pic microcontroller allows short instruction words save space routine program execution cost extra instructions required access relatively infrequently used registers used system configuration start-up 1985 companies lotus intel introduced expanded memory specification ems 3.0 use ibm pc compatible computers running ms-dos microsoft joined versions 3.2 1986 4.0 1987 specification became known lotus-intel-microsoft ems lim ems form bank switching technique allows 640 kb ram defined original ibm pc architecture letting appear piecewise 64 kb window located upper memory area 64 kb divided four 16 kb pages independently switched computer games made use though ems obsolete feature nowadays emulated later microsoft windows operating systems provide backwards compatibility programs later extended memory specification xms also obsolete standard principle simulating bank switching memory 1 mb called extended memory directly addressable real mode x86 processors ms-dos runs xms allows extended memory copied anywhere conventional memory boundaries banks fixed every way works like bank switching ems perspective program uses later versions ms-dos starting circa version 5.0 included emm386 driver simulates ems memory using xms allowing programs use extended memory even written ems microsoft windows emulates xms also programs require bank switching also used video game consoles atari 2600 instance could address 4 kb rom later 2600 game cartridges contained bank switching hardware order permit use rom thus allow sophisticated games via program code equally important larger amounts game data graphics different game stages nintendo entertainment system contained modified 6502 cartridges sometimes contained megabit rom addressed via bank switching called multi-memory controller game boy cartridges used chip called mbc memory bank controller offered rom bank switching also cartridge sram bank switching even access peripherals infrared links rumble motors bank switching still used later game systems several sega mega drive cartridges 4mb size required use technique 4mb maximum address size gp2x handheld gamepark holdings uses bank switching order control start address memory offset second processor types computer video displays related technique double buffering may used improve video performance case processor updating contents one set physical memory locations video generation hardware accessing displaying contents second set processor completed update signal video display hardware swap active banks transition visible screen free artifacts distortion case processor may access memory video display hardware bank-switched parts video memory two banks video memory contain slightly different images rapidly cycling page-flipping create animation visual effects processor might otherwise slow carry directly bank switching later supplanted segmentation many 16-bit systems turn gave way paging memory management units embedded systems however bank switching still often used simplicity low cost often better adaptation contexts general purpose computing | [
9739,
6797,
11539,
7445,
2201,
8732,
8494,
7983,
5040,
4409,
7999,
6210,
9166,
2383,
5840,
5457,
6499,
7269,
3050,
8301,
10351,
1776,
6129,
7281,
499,
7282,
7284,
2811,
5503
] | Test |
9,564 | 2 | DNF_(software):dnf software dnf dandified yum next-generation version yellowdog updater modified yum package manager .rpm-based distributions dnf introduced fedora 18 default package manager fedora since version 22 perceived deficiencies yum dnf intended address include poor performance high memory usage slowness iterative dependency resolution dnf uses libsolv external dependency resolver dnf performs package management tasks top rpm supporting libraries dnf originally written python efforts way port c move functionality python code new libdnf library libdnf already used packagekit linux distribution-agnostic package system abstraction library even though library dnf features dnf default package manager fedora since version 22 released may 2015 libdnf library used package backend packagekit dnf also available alternate package manager mageia linux since version 6 may become default sometime future | [
11525,
2310,
10760,
2955,
7947,
7181,
9487,
2448,
788,
1813,
8213,
10900,
6680,
8476,
5670,
4775,
6828,
6446,
7983,
1842,
823,
2872,
6583,
59,
3131,
5819,
190,
10172,
3649,
10817,
9671,
5067,
3918,
463,
3667,
6227,
7293,
6361,
2010,
2401,... | Test |
9,565 | 9 | Kyma_(sound_design_language):kyma sound design language kyma visual programming language sound design used musicians researchers sound designers kyma user programs multiprocessor dsp graphically connecting modules screen macintosh windows computer kyma characteristics object-oriented functional programming languages basic unit kyma sound object note traditional music notation sound defined sound atom ii unary transform sound iii n-ary transform s.. s..s sounds sound atom source audio like microphone input noise generator unary transform modifies argument example lowpassfilter might take running average input n-ary transform combines two sounds mixer example defined sum inputs first version kyma computed digital audio samples macintosh 512k written smalltalk programming language 1986 carla scaletti champaign illinois may 1987 scaletti partitioned kyma graphics sound generation engines ported sound generation code digital signal processor called platypus designed lippold haken kurt j. hebel cerl sound group 1987 scaletti presented paper kyma demonstrated live digital sound generation platypus international computer music conference identified electronic synthesis pioneer bob moog technology watch conference report keyboard magazine one new language acknowledges distinction sound synthesis composition kyma music composition language macintosh views elements piece music structure single sound structure entire composition objects composed university illinois urbana-champaign eliminated funding plato laboratory 1989 scaletti hebel formed symbolic sound corporation order continue developing kyma digital audio signal processing hardware | [
8544,
9210,
2691,
7172,
8393,
5037,
6797,
7535,
8958,
3665,
7571,
6933,
9783,
7769,
6810,
7550
] | None |
9,566 | 3 | Palamedes_(video_game):palamedes video game palamedes puzzle game requiring player match dice holding dice top screen using b button player change number his/her dice throw dice using button matches dice top screen wipes target dice screen player play solitaire mode computer another player tournament mode ai opponents six sides numbers dice making attempt match numbers screen eliminating challenge ports game published nes msx fm towns game boy hot-b japan-only sequel palamedes 2 star twinkles released 1991 nes hot-b featured basic gameplay elements original play field scrolling opposite direction release famitsu magazine scored game boy version game 22 40 | [
10931,
9006
] | Test |
9,567 | 2 | Vidix:vidix vidix video interface *nix portable programming interface unix-like operating systems allows video card drivers running user space directly access framebuffer direct graphics access extension x window system nick kurshev author vidix writes motivation creating interface resolve issue reported vladimir dergachev rfc alternative kernel multimedia api dergachev noted existing multimedia interfaces hard-coded device suggested driver developers would flexibility layer abstraction vidix born alternative linux kernel-based drivers mplayer project long time vidix lived within mplayer project later lived within mplayerxp project fork mplayer kurshev time linux many unix-like operating systems lacked quality drivers video subsystems almost technical documentation video hardware non-disclosure agreements time many programmers code drivers blindly developers became interested using vidix players asked kurshev separate mplayer project vidix became alternative set device drivers based idea direct hardware access similar microsoft directx drivers mapped accelerated video memory avoid colour-space conversion software scaling side players x window system includes direct rendering infrastructure provides similar functionality broad hardware support kurshev continued develop vidix 2007 version 1.0.0 software released | [
10016,
4902,
3883,
5867,
7983,
5397,
823,
2943
] | Test |
9,568 | 3 | Delay_insensitive_circuit:delay insensitive circuit delay-insensitive circuit type asynchronous circuit performs digital logic operation often within computing processor chip instead using clock signals global control signals sequencing computation delay-insensitive circuit determined data flow data flows one circuit element another using handshakes sequences voltage transitions indicate readiness receive data readiness offer data typically inputs circuit module indicate readiness receive acknowledged connected output sending data encoded way receiver detect validity directly data safely received receiver explicitly acknowledge allowing sender remove data thus completing handshake allowing another datum transmitted delay-insensitive circuit therefore need provide clock signal determine starting time computation instead arrival data input sub-circuit triggers computation start consequently next computation initiated immediately result first computation completed main advantage circuits ability optimize processing activities take arbitrary periods time depending data requested function example process variable time completion would mathematical division recovery data data might cache delay-insensitive di class robust asynchronous circuit delay models makes assumptions delay wires gates model transitions gates wires must acknowledged transitioning condition stops unseen transitions occurring di circuits transition input gate must seen output gate subsequent transition input allowed happen forces input states sequences become illegal example gates must never go state inputs one entry exit state seen output gate although model robust practical circuits possible due lack expressible conditionals di circuits instead quasi-delay-insensitive model smallest compromise model yet capable generating useful computing circuits reason circuits often incorrectly referred delay-insensitive quasi delay-insensitive | [
2339
] | Test |
9,569 | 4 | Symantec:symantec symantec corporation commonly known symantec american software company headquartered mountain view california united states company provides cybersecurity software services symantec fortune 500 company member p 500 stock-market index company also development centers pune chennai bengaluru india october 9 2014 symantec declared would split two independent publicly traded companies end 2015 one company would focus security information management january 29 2016 symantec sold information-management subsidiary named veritas technologies symantec acquired 2004 carlyle group name symantec portmanteau words syntax semantics technology august 9 2019 broadcom announced would acquiring enterprise security software division symantec 10.7 billion dollars usd attempted purchase whole company founded 1982 gary hendrix national science foundation grant symantec originally focused artificial intelligence-related projects including database program hendrix hired several stanford university natural language processing researchers company first employees among barry greenstein professional poker player developer word processor component within q hendrix also hired jerry kaplan entrepreneur author consultant build in-ram database q 1984 became clear advanced natural language database system symantec developed could ported dec minicomputers pc left symantec without product expertise natural language database query systems technology result later 1984 symantec acquired another smaller software startup company c e software founded denis coleman gordon eubanks headed eubanks c e software developed combined file management word processing program called q question answer merged company retained name symantec eubanks became chairman vern raburn former president original symantec remained president combined company new symantec combined file management word processing functionality c e planned added advanced natural language query system designed gary hendrix engineered dan gordon set new standards ease database query report generation natural language system named intelligent assistant turner chose name q symantec flagship product large part name lent use short easily merchandised logo brett walter designed user interface q brett walter director product management q released november 1985 1986 vern raburn gordon eubanks swapped roles eubanks became ceo president symantec raburn became chairman subsequent change raburn little involvement symantec years time eubanks added chairmanship roles slow start sales q fall 1985 spring 1986 turner signed new advertising agency called elliott/dickens embarked aggressive new advertising campaign came six pack program symantec employees regardless role went road training selling dealer sales staff nationwide united states turner named six pack employees work six days week see six dealerships per day train six sales representatives per store stay friends free motel 6 simultaneously promotion run jointly sofsell symantec exclusive wholesale distributor united states first year q market promotion successful encouraging dealers try q time symantec advised jim lally john doerr — board members symantec stage — kleiner perkins caufield byers symantec would cut expenses grow revenues enough achieve cash flow break-even kpcb would back company raising venture capital accomplish management team worked salary reduction schedule chairman ceo would take zero pay vice presidents would take 50 pay cut employees pay cut 15 two employees laid eubanks also negotiated sizable rent reduction office space company leased days original symantec expense reductions combined strong international sales q enabled company attain break-even significantly increased traction q re-launch grew symantec revenues substantially along early success q international markets uniquely german version shipped three weeks united states version first software world supported german natural language following turner placed emphasis establishing international sales distribution multiple language versions q initial shipment 1985 rod turner negotiated publishing agreement david whitney symantec second product turner named noteit annotation utility lotus 1-2-3 evident turner noteit would confuse dealer channel launched symantec name symantec built interest stage q yet shipped low price utility would initially attractive dealer channel demand built turner felt product marketed unique brand name turner gordon e. eubanks jr. chairman symantec corporation agreed form new division symantec eubanks delegated choice name turner turner chose name turner hall publishing new division symantec devoted publishing third-party software hardware objective division diversify revenues accelerate growth symantec turner chose name turner hall publishing using last name dottie hall director marketing communications order convey sense stable long established company turner hall publishing first offering note-it notation utility add-in lotus 1-2-3 developed david whitney licensed symantec second product turner hall card 256k ram half slot memory card initially made inexpensively increase available memory symantec flagship product q turner hall division also marketed card standalone product turner hall third product also 1-2-3 add-in sqz lotus 1-2-3 spreadsheet compression utility developed chris graham synex systems summer 1986 eubanks turner recruited tom byers digital research expand turner hall publishing product family lead turner hall effort winter 1986–87 turner hall publishing division achieved success noteit turner hall card sqz popularity products contributing relatively small portion revenues symantec conveyed impression symantec already diversified company indeed many industry participants impression symantec acquired turner hall publishing 1987 byers recruited ted schlein turner hall product group assist building product family marketing revenues q symantec early launch international marketplace combined turner hall publishing generated market presence scale enabled symantec make first merger/acquisition february 1987 breakthrough software maker timeline project management software dos first time symantec acquired business revenues inventory customers eubanks chose change nothing breakthrough software six months actual merger logistics started summer 1987 turner appointed eubanks general manager timeline business unit turner made responsible successful integration company symantec ongoing growth business p l heavy emphasis placed making minimum disruption eubanks turner soon acquisition timeline/breakthrough software eubanks reorganized symantec structuring company around product-centric groups development quality assurance technical support product marketing functions general manager profit loss responsibility sales finance operations centralized functions shared structure lent well symantec growth mergers acquisitions eubanks made turner general manager new timeline product group simultaneously q product group made tom byers general manager turner hall product group turner continued build lead company international business marketing whole company timeline product group turner drove strong marketing promotion sales programs order accelerate momentum 1989 merger successful—product group morale high timeline development continued apace increased sales marketing efforts applied built timeline clear market lead pc project management software dos q timeline product groups healthily profitable profit stream merger success set stage subsequent merger acquisition activity company indeed funded losses product groups subsequently acquired 1989 eubanks hired john laing vp worldwide sales turner transferred international division laing eubanks also recruited bob dykes executive vice president operations finance anticipation upcoming ipo july 1989 symantec ipo may 1990 symantec announced intent merge acquire peter norton computing developer various utilities dos turner appointed product group manager norton business made responsible merger p l responsibility ted schlein made product group manager q business peter norton group merger logistical effort began immediately companies sought approval merger august 1990 symantec concluded purchase—by time combination companies already complete symantec consumer antivirus data management utilities still marketed norton name time merger symantec built upon turner hall publishing presence utility market introducing symantec antivirus macintosh sam symantec utilities macintosh sum two products already market leaders mac success made norton merger strategic symantec already begun development dos-based antivirus program one year merger norton management team decided enter antivirus market part felt antivirus market entailed great deal ongoing work stay ahead new viruses team felt microsoft would unlikely find effort attractive would lengthen viability market symantec turner decided use norton name obvious reasons became norton antivirus turner norton team launched 1991 time merger norton revenues approximately 20 25 combined entity 1993 led turner norton product group revenues grown approximately 82 symantec total one time symantec also known development tools particularly think pascal think c symantec c++ enterprise developer visual cafe packages popular macintosh ibm pc compatible platforms product lines resulted acquisitions made company late 1980s early 1990s businesses living videotext acquisition consistently unprofitable symantec losses diverted expenditures away q windows timeline windows development efforts critical period 1988 1992 symantec exited business late-1990s competitors metrowerks microsoft borland gained significant market share 1996 symantec corporation alleged misleading financial statements violation gaap 1999 april 2009 symantec led ceo john w. thompson former vp ibm time thompson african-american leading major us technology company succeeded april 2009 company long-time symantec executive enrique salem salem symantec completed acquisition verisign certificate authority business dramatically increasing share market salem abruptly fired 2012 disappointing earnings performance replaced steve bennett former ceo intuit ge executive january 2013 bennett announced major corporate reorganization goal reducing costs improving symantec product line said sales marketing high costs provide quality outcomes concluded system broken robert enderle cio.com reviewed reorganization noted bennett following general electric model product-focused instead customer-focused concluded eliminating middle management removes large number highly paid employees tactically improve symantec bottom line reduce skills needed ensure high-quality products long term march 2014 symantec fired steve bennett ceo position named michael brown interim president chief executive including interim ceo symantec 3 ceos less two years september 25 2014 symantec announced appointment michael brown president chief executive officer brown served company interim president chief executive officer since march 20 2014 mr. brown served member company board directors since july 2005 following acquisition veritas software corporation mr. brown served veritas board directors since 2003 july 2016 symantec introduced solution help carmarkers protect connected vehicles zero-day attacks symantec anomaly detection automotive iot solution manufacturers uses machine learning provide in-vehicle security analytics greg clark assumed position ceo august 2016 november 2016 symantec announced intent acquire identity theft protection company lifelock 2.3 billion august 2017 symantec announced agreed sell business unit verifies identity websites thoma bravo acquisition thoma bravo plans merge symantec business unit web certification company digicert january 4 2018 symantec bt formerly british telecom announced partnership provides new endpoint security protection may 2018 symantec initiated internal audit address concerns raised former employee causing delay annual earnings report august 2018 symantec announced hedge fund starboard value put forward five nominees stand election symantec board directors symantec 2018 annual meeting stockholders followed schedule 13d filing starboard showing accumulated 5.8 stake symantec september 2018 symantec announced three nominees starboard joining symantec board two immediate effect including starboard managing member peter feld one following 2018 annual meeting stockholders may 9 2019 symantec announced ceo greg clark businessman stepping immediate effect board member rick hill previously put forward starboard appointed interim president ceo vincent pilette also joined symantec new cfo august 9 2019 broadcom announced would acquiring enterprise software division symantec 10.7 billion dollars usd attempted purchase whole company norton family products remain symantec portfolio october 9 2014 symantec declared company would separate two independent publicly traded companies end 2015 symantec continue focus security new company established focusing information management symantec confirmed january 28 2015 information management business would called veritas technologies corporation marking return veritas name august 2015 symantec agreed sell veritas private equity group led carlyle group 8 billion sale completed february 2016 turned veritas privately owned company 2015 symantec norton product line includes norton security norton small business norton family norton mobile security norton online backup norton360 norton utilities norton computer tune 2012 pctools iantivirus rebranded norton product name iantivirus released mac app store also 2012 norton partner portal relaunched support sales consumers throughout emea technologies 1993 symantec acquired act contact software international symantec sold act saleslogix 1999 time world popular crm application windows macintosh december 16 2004 veritas software symantec announced plans merger veritas valued 13.5 billion largest software industry merger date symantec shareholders voted approve merger june 24 2005 deal closed successfully july 2 2005 july 5 2005 first day business u.s. offices new combined software company result merger symantec includes storage- availability-related products portfolio namely veritas file system vxfs veritas volume manager vxvm veritas volume replicator vvr veritas cluster server vcs netbackup nbu backup exec enterprise vault ev january 29 2016 symantec sold veritas technologies carlyle group august 16 2005 symantec acquired sygate security software firm based fremont california 200 staff november 30 2005 sygate personal firewall products discontinued january 29 2007 symantec announced plans acquire altiris april 6 2007 acquisition completed altiris specializes service-oriented management software allows organizations manage assets also provides software web services security systems management products established 1998 altiris headquartered lindon utah november 5 2007 symantec announced acquisition vontu leader data loss prevention dlp solutions 350 million january 17 2008 symantec announced spinning application performance management apm business i3 product line vector capital precise software solutions took development product management marketing sales apm business launching independent company september 17 2008 august 18 2008 symantec announced signing agreement acquire pc tools agreement pc tools would maintain separate operations financial terms acquisition disclosed may 2013 symantec announced discontinuing pc tools line internet security software december 2013 symantec announced discontinuing retiring entire pc tools brand offering non expiring license pc tools performance toolkit pc tools registry mechanic pc tools file recover pc tools privacy guardian users active subscription december 4 2013 april 18 2008 symantec completed acquisition appstream inc. “ appstream ” nonpublic palo alto california-based provider endpoint virtualization software appstream acquired complement symantec endpoint management virtualization portfolio strategy october 9 2008 symantec announced intent acquire gloucester-based messagelabs spun star internet 2007 boost software-as-a-service saas business symantec purchased online messaging web security provider 695 million cash acquisition closed november 17 2008 april 29 2010 symantec announced intent acquire pgp corporation guardianedge acquisitions closed june 4 2010 provided access established encryption key management technologies symantec customers may 19 2010 symantec signed definitive agreement acquire verisign authentication business unit included secure sockets layer ssl certificate public key infrastructure pki verisign trust verisign identity protection vip authentication services acquisition closed august 9 2010 august 2012 symantec completed rebranding verisign ssl certificate service renaming verisign trust seal norton secured seal acquired october 10 2010 rulespace web categorisation product first developed 1996 categorisation automated using symantec refers automated categorization system acs used base content filtering many uk isp may 19 2011 symantec announced acquisition clearwell systems approximately 390 million january 17 2012 symantec announced acquisition cloud email-archiving company liveoffice acquisition price 115 million last year symantec joined cloud storage backup sector enterprise vault.cloud cloud storage enterprise vault solutions addition cloud messaging solution symantec instant messaging security cloud ims.cloud symantec stated acquisition would add information governance products allowing customers store information on-premises symantec data centers march 2 2012 symantec completed acquisition odyssey software odyssey software main product athena device management software extended microsoft system center solutions adding ability manage support control mobile embedded devices smartphones ruggedized handhelds symantec completed acquisition nukona provider mobile application management mam april 2 2012 acquisition agreement symantec nukona announced march 20 2012 may 2014 symantec acquired nitrodesk provider touchdown market-leading third-party eas mobile application june 13 2016 announced symantec acquired blue coat 4.65 billion august 9 2004 company announced discovered error calculation deferred revenue represented accumulated adjustment 20 million arrival year 2010 triggered bug symantec endpoint symantec reported malware intrusion protection updates date greater december 31 2009 11:59pm considered 'out date company created distributed workaround issue march 2010 reported symantec antivirus symantec client security prone vulnerability might allow attacker bypass on-demand virus scanning permit malicious files escape detection january 2011 multiple vulnerabilities symantec products could exploited denial-of-service attack thereby compromise system reported products involved symantec antivirus corporate edition server symantec system center november 12 2012 vulnerability bulletin united states computer emergency readiness team us-cert reported following vulnerability older versions symantec antivirus system decomposer engine symantec endpoint protection sep 11.0 symantec endpoint protection small business edition 12.0 symantec antivirus corporate edition savce 10.x symantec scan engine sse 5.2.8 properly perform bounds checks contents cab archives allows remote attackers cause denial service application crash possibly execute arbitrary code via crafted file problem relates older versions systems patch available us-cert rated seriousness vulnerability 9.7 10-point scale decomposer engine component scanning system opens containers compressed files scanner evaluate files within january 2012 james gross filed lawsuit symantec distributing fake scareware scanners purportedly alerted users issues computers gross claimed scan errors problems corrected prompted scanner purchase symantec app remove rest gross claimed bought app speed computer remove detected viruses hired digital forensics expert back claim symantec denied allegations said would contest case symantec settled 11 million fund 9 1 million eligible customers representing overpaid amount app case dismissed court january 17 2012 symantec disclosed network hacked hacker known yama tough obtained source code symantec software hacking indian government server yama tough released parts code threatened release according chris paden symantec spokesman source code taken enterprise products five six years old september 25 2012 affiliate hacker group anonymous published source code norton utilities symantec confirmed part code stolen earlier leak included code 2006 versions norton utilities pcanywhere norton antivirus february 2012 reported verisign network data hacked repeatedly 2010 breaches disclosed publicly noted sec filing october 2011 verisign provide information whether breach included certificate authority business acquired symantec late 2010 oliver lavery director security research ncircle asked rhetorically trust site using verisign ssl certificates without clarity logical answer february 17 2012 details exploit pcanywhere posted exploit would allow attackers crash pcanywhere computers running windows symantec released hotfix issue twelve days later according mandiant symantec security products used new york times detected one 45 pieces malware installed chinese hackers newspaper network three-month period late 2012 symantec responded advanced attacks like ones new york times described following article http //nyti.ms/tztr5z underscore important companies countries consumers make sure using full capability security solutions advanced capabilities e ndpoint offerings including unique reputation-based technology behavior-based blocking specifically target sophisticated attacks turning signature-based anti-virus components e ndpoint solutions alone enough world changing daily attacks threats encourage customers aggressive deploying solutions offer combined approach security anti-virus software alone enough february 2015 symantec found guilty two counts patent infringement suit intellectual ventures inc ordered pay 17 million compensation damages september 2016 decision reversed appeal federal circuit september 18 2015 google notified symantec latter issued 23 test certificates five organizations including google opera without domain owners knowledge symantec performed another audit announced additional 164 test certificates mis-issued 76 domains 2,458 test certificates mis-issued domains never registered google requested symantec update public incident report proven analysis explaining details failures company asked report certificates issued certificate transparency log henceforth symantec since reported implementing certificate transparency ssl certificates google insisted symantec execute security audit third party maintain tamper-proof security audit logs march 24 2017 google stated lost confidence symantec latest incident improper certificate issuance google says millions existing symantec certificates become untrusted google chrome next 12 months according google symantec partners issued least 30,000 certificates questionable validity several years symantec disputes number google said symantec failed comply industry standards could provide audits showing necessary documentation google ryan sleevi said symantec partnered cas crosscert korea electronic certificate authority certisign certificatadora digital certsuperior s. de r. l. de c.v. certisur s.a. follow proper verification procedures leading misissuance certificates following discussions google required symantec migrate symantec-branded certificate issuance operations non-symantec-operated “ managed partner infrastructure ” deal announced whereby digicert acquired symantec website security business september 2017 google announced starting chrome 66 chrome remove trust symantec-issued certificates issued prior june 1 2016 google stated december 1 2017 symantec transition issuance operation publicly-trusted certificates digicert infrastructure certificates issued old symantec infrastructure date trusted chrome google predicted toward end october 2018 release chrome 70 browser would omit trust symantec old infrastructure certificates issued affecting certificates chaining symantec roots mozilla firefox planned distrust symantec-issued certificates firefox 63 released october 23 2018 delivered change firefox 64 released december 11 2018 apple also plan distrust symantec root certificates | [
2049,
2050,
9217,
6148,
517,
9221,
6153,
535,
1052,
5665,
550,
2601,
6699,
3116,
3629,
5165,
7725,
8752,
10283,
1592,
10297,
3643,
9791,
10303,
9282,
10308,
4165,
11333,
10828,
10831,
4183,
3161,
5210,
8283,
1629,
2654,
9824,
7780,
9317,
... | None |
9,570 | 3 | Socket_4:socket 4 socket 4 presented 1993 first cpu socket designed early p5 pentium microprocessors socket 4 5-volt socket pentium socket 4 intel switched 3.3-volt-powered socket 5 socket 4 support special pentium overdrive allows running 120 mhz 60 mhz pentium 133 mhz 66 mhz pentium socket 4 replaced socket 5 1996 | [
5901,
8851,
4246,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
2874,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
10468,
613,
8552,
1260,
4717,
10225,
371,
9592,
8... | None |
9,571 | 2 | Linux_DM_Multipath:linux dm multipath dm-multipathing dm-mpio provides input-output i/o fail-over load-balancing using multipath i/o within linux block devices utilizing device-mapper multipathd daemon provides host-side logic use multiple paths redundant network provide continuous availability higher-bandwidth connectivity host server block-level device dm-mpio handles rerouting block i/o alternate path event path failure dm-mpio also balance i/o load across available paths typically utilized fibre channel fc iscsi san environments dm-mpio based device mapper provides basic framework maps one block device onto another utilizing linux dm-mpio datacenter operating systems multipath solutions key components path management must considered dm-mpio started patch set created joe thornber later maintained alasdair g kergon red hat included mainline linux kernel version 2.6.12 released june 17 2005 dm-mpio linux consists kernel components user-space components configuration file /etc/multipath.conf makes many dm-mpio features user-configurable multipath command kernel daemon multipathd use information found file file consulted configuration multipath devices changes must made prior running multipath command changes file afterwards require multipath executed multipath.conf five sections | [
823,
7983,
7863,
9882,
10237
] | Validation |
9,572 | 4 | Numbuster:numbuster numbuster phone community users access via mobile phone client web application developed numbuster ltd allows users find contact details phone number exchange information numbers users block calls messages client available android windows phone numbuster developed numbuster ltd privately held company founded evgeny gnutikov ilya osipov others project launched moscow business school graduates android web site february 2014 september 2014 100 000 users russia cis first launched july–august 2014 numbuster accelerated biggest startup accelerator france numa paris service global telephone directory social call-blocking functionality allows users find name unknown caller whether ’ person business also rate comment thus adding value service helping users community get information apart users block phone number in-app im sms chat available september 2014 numbuster available 13 languages english russian arabic german french chinese italian portuguese spanish polish ukrainian japanese korean upon release numbuster gathered positive feedback russian bloggers media including publication leading news web-site | [
10242,
5251,
5382,
4746,
1036,
11408,
3228,
10271,
3105,
11170,
10660,
9511,
1962,
7983,
9519,
8758,
1467,
6208,
1601,
1218,
2760,
2892,
8413,
4318,
3812,
4068,
6628,
7928,
10748
] | Validation |
9,573 | 9 | Cognitive_dimensions_of_notations:cognitive dimensions notations cognitive dimensions cognitive dimensions notations design principles notations user interfaces programming languages described researchers thomas r.g green marian petre dimensions used evaluate usability existing information artifact heuristics guide design new one cognitive dimensions designed provide lightweight approach analyse quality design rather in-depth detailed description provide common vocabulary discussing many factors notation ui programming language design also cognitive dimensions help exploring space possible designs design maneuvers changes intended improve design along one dimension thomas green originally defined 14 cognitive dimensions addition new dimensions sometimes proposed hci research field different levels adoption refinement candidate dimensions include creative ambiguity notation encourage interpreting several meanings element indexing elements guide finding specific part synopsis gestalt view whole annotated structure unevenness creation paths easier others bias expressed ideas developed artifact authors identify four main user activities interactive artifacts incrementation creation transcription modification exploratory design activity best served different trade-off usability dimension example high viscosity resistance change harmful modification exploration activities less severe one-off tasks performed transcription incrementation design maneuver change made designer notation design alter position within particular dimension dimensions created pairwise independent design altered one dimension keeping second one constant usually results trade-off dimensions modification increasing usability notation one dimension keeping second one constant typically reduce usability third dimension reflects assumption framework perfect interface trade-offs fundamental part usability design example design maneuver reducing viscosity notation adding abstraction mechanisms done incorporating style sheets abstraction represent common styling attributes items document notation item document defined individual style design maneuver made editor changes style sheet modify items eliminating repetition viscosity present need change style individual item | [
2691,
9573,
8262,
8430,
8693
] | Test |
9,574 | 4 | Personal,_Inc.:personal inc personal also referred personal.com personal inc. consumer personal data service identity management system individuals aggregate manage reuse data merged digi.me august 2017 business europe business model empowering people data combined company called digi.me one product lines collaborative data management information security solution workplace called teamdata spun new company result merger personal founded 2009 washington dc management team built map network location data mapping platform acquired nokia/navteq 2006 personal first online consumer-facing company named ambassador privacy design technical business legal commitments providing users control data store personal service called “ life management platform ” economist “ personal encrypted cloud service ” time user-centric approach data company associated infomediary model originated 1999 john hagel iii mark singer well vendor relationship management vrm model developed doc searls personal raised 30m funding develop platform products leading investors steve case ’ revolution ventures grotech ventures allen company ted leonsis neil ashe jonathan miller bill miller legg mason esther dyson edventures eric c. anderson company received recognition user agreement called owner data agreement acted like reverse license agreement data shared registered parties emphasized data ownership resides user doc searls wrote owner data agreement “ precedent modeled new legal position vendors intermediaries. ” personal early embrace “ small data ” defines “ big data benefit individuals. ” term “ small data ” may originally coined jeremie miller sing.ly mentioned talk web 2.0 summit november 2011 cited intention economy 2011 personal part first group companies join personal data ecosystem consortium startup circle small data meetup group also formed new york city bringing together technology legal business experts exchange ideas user-centric user-driven models internet products services personal included case studies ctrl-shift forrester regarding personal data stores personal identity management 2011 personal received innovator spotlight award privacy identity innovation conference pii2011 participated technology showcase pii2012 2012 techhive named personal one top five apps web services sxsw personal 2013 campus technology innovators award lone star college july 2013 personal included list executive travel magazine favorite travel apps 2013 may/june issue 2013 personal also included part nyu govlab open data 500 named j. walter thompson one 100 things watch 2014 2015 national law journal named company chief policy officer general counsel joshua p. galper one 50 cybersecurity privacy trailblazers personal platform privacy- security-by-design platform individuals manage reuse data information fill app 1-click form-filling solution web mobile logins checkouts forms data vault app served main cloud-based repository user data personal helped individuals take control benefit information knowing information data vault remained legally could used without permission personal spent two years building personal platform launching data vault product beta november 2011 following privacy design principles personal enabled users see share sensitive data files stored data vault information encrypted could decrypted user password users could choose know passwords vault personal store user passwords – therefore could reset without deleting user sensitive data files stored vault personal apps services linked user private data vault data vault featured automatic synchronization data files added device logged personal also featured “ secure share ” function created live private network allowing registered users share access data files exchange encrypted keys without risk transmitting data files non-secure direct means also allowed users immediately update data across network revoke access choose fast company called data vault “ tool simplify lives. ” personal launched android app november 30 2011 ios data vault app released may 7 2012 personal officially launched application programming interface apis october 2 2012 mashery business apis conference review cnet highlighted challenges getting people trust new service sensitive data spending time required entering enough data make useful data vault launched november 2011 mashable posed question “ never fill form ” world economic forum february 2013 report highlighted possibility saving 10 billion hours globally “ improv ing delivery public private sector services ” automated form-filling tools specifically citing personal fill app january 2013 personal launched fill beta web bookmarklet automatic form-filling june 11 2014 personal released fill web extension announced publishing index 140,000 1-click online forms www.fillit.com company also announced mobile version product launch later year according story tech cocktail launch personal “ web extension mobile app able support 1,200 different types reusable data even enabling unlock confidential information complete longer forms including patient registrations job applications event registrations school admissions insurance bank applications government forms. ” november 2014 mobile version fill launched could autofill mobile forms using apis personal form portal ultimately indexed 500,000 forms three components together allowed data captured reused across forms 1 form graph mapped individual form fields personal ontology 2 semantic layer determined data required form e.g one field vs. three fields u.s. telephone number 3 correlations graph helped individuals match specific data form without looking data value e.g knowing phone number mobile phone number address billing address person uses middle name first name forms initial public offering facebook may 2012 media interest question monetary value personal data whether tools services might emerge help consumers monetize data personal frequently cited company could potentially offer service articles pieces focusing subject appeared new york times adweek mit technology review cnn national public radio company co-founder ceo shane green quoted saying “ average american consumer would soon able realize 1,000 per year ” granting limited anonymous access data marketers figure never supported green company may 2016 personal shifted product focus teamdata focuses problem securing collaboratively managing data workplace onboardly included new collaborative teamdata solution list top 10 apps keep team track part top 50 list time best content marketing tools teamdata separate business | [
8413,
9063
] | Test |
9,575 | 9 | XOTcl:xotcl xotcl object-oriented extension tool command language created gustaf neumann uwe zdun derivative mit otcl xotcl based dynamic object system metaclasses influenced clos class method definitions completely dynamic xotcl provides language support design patterns via filters decorator mixins | [
9345,
8262,
6826,
3183,
5395,
692,
8628,
3193,
2556
] | Test |
9,576 | 4 | Signature:signature signature sign handwritten often stylized depiction someone name nickname even simple x mark person writes documents proof identity intent writer signature signatory signer similar handwritten signature signature work describes work readily identifying creator signature may confused autograph chiefly artistic signature lead confusion people autograph signature people public eye keep signatures private whilst fully publishing autograph traditional function signature permanently affix document person ’ uniquely personal undeniable self-identification physical evidence person personal witness certification content specified part document example role signature many consumer contracts solely provide evidence identity contracting party also provide evidence deliberation informed consent many countries signatures may witnessed recorded presence notary public carry additional legal force legal documents illiterate signatory make mark often x occasionally personalized symbol long document countersigned literate witness countries illiterate people place thumbprint legal documents lieu written signature united states signatures encompass marks actions sorts indicative identity intent legal rule unless statute specifically prescribes particular method making signature may made number ways include mechanical rubber stamp facsimile signature may made purported signatory alternatively someone else duly authorized signatory acting signer presence signatory direction may make signature many individuals much fanciful signatures normal cursive writing including elaborate ascenders descenders exotic flourishes much one would find calligraphic writing example final k john hancock famous signature us declaration independence loops back underline name kind flourish also known paraph paraphe term meaning flourish initial signature french paraph used graphology analyses several cultures whose languages use writing systems alphabets share western notion signatures per se signing one name results written product different result writing one name standard way languages write sign involves written characters also see calligraphy special signature machines called autopens capable automatically reproducing individual signature typically used people required sign lot printed matter celebrities heads state ceos recently members congress united states begun signature made truetype font file allows staff members congressman office easily reproduce correspondence legislation official documents east asian languages chinese japanese korean people traditionally use stamp-like objects known name-seals name carved tensho script seal script lieu handwritten signature government agencies require professional persons official reviewers sign originals copies originals authenticate personally viewed content united states prevalent architectural construction plans intent prevent mistakes fraud practice known effective e-mail newsgroup usage another type signature exists independent one language users set one lines custom text known signature block automatically appended messages text usually includes name contact information sometimes quotations ascii art shortened form signature block including one name often distinguishing prefix used simply indicate end post response web sites also allow graphics used note however type signature related electronic signatures digital signatures technical nature directly understandable humans wikipedia online wiki-based encyclopedia edited volunteers contributors sign comments talk pages username username holder right digitally affix signature signature painting work art always important item assessment art fake signatures sometimes added enhance value painting added fake painting support authenticity notorious case signature johannes vermeer fake supper emmaus made art-forger han van meegeren however fact painters signatures often vary time particularly modern contemporary periods might complicate issue signatures painters take artistic form may less value determining forgeries term signature also used mean characteristics give object piece information identity—for example shape coca-cola bottle rock music heavy metal music electric guitarists develop unique tone sound using particular settings guitar amp effects units modifications guitar pickups called signature sound wrestling wwe wrestlers known distinctive signature finishing moves golf courses signature hole aesthetically pleasing photogenic hole makes particular course unique analogy word signature may used refer characteristic expression process thing example climate phenomenon known enso el niño characteristic modes different ocean basins often referred signature icie collier signatory indicates party agreement especially international treaty convention e.g brazil signatory convention biological diversity british law appearance signatures names may protected copyright law united states copyright law titles names c ... mere variations typographic ornamentation lettering coloring eligible copyright however appearance signatures names may protected copyright law uniform commercial code §1-201 37 united states generally defines signed using symbol executed adopted present intention adopt accept writing uniform commercial code §3-401 b negotiable instruments states signature may made manually means device machine ii use name including trade assumed name word mark symbol executed adopted person present intention authenticate writing | [
7075,
7429,
4935,
298,
5674,
9164,
5200,
2936,
1557,
7124,
9334,
1496,
5433,
10207,
1821,
3231
] | Test |
9,577 | 0 | American_National_Corpus:american national corpus american national corpus anc text corpus american english containing 22 million words written spoken data produced since 1990 currently anc includes range genres including emerging genres email tweets web data included earlier corpora british national corpus annotated part speech lemma shallow parse named entities anc available linguistic data consortium fifteen million word subset corpus called open american national corpus oanc freely available restrictions use anc website corpus annotations provided according specifications iso/tc 37 sc4 linguistic annotation framework using freely provided transduction tool anc2go corpus user-chosen annotations provided multiple formats including conll iob format xml format conformant xml corpus encoding standard xces usable british national corpus xaira search engine uima-compliant format formats suitable input wide variety concordance software plugins import annotations general architecture text engineering gate also available anc differs corpora english richly annotated including different part speech annotations penn tags claws5 claws7 tags shallow parse annotations annotations several types named entities additional annotations added parts corpus become available often contributions projects unlike on-line searchable corpora due copyright restrictions allow access individual sentences entire anc available enable research involving example development statistical language models full-text linguistic annotation anc annotations automatically produced unvalidated 500,000 word subset called manually annotated sub-corpus masc annotated approximately 20 different kinds linguistic annotations hand-validated manually produced include penn treebank syntactic annotation wordnet sense annotation framenet semantic frame annotations among others like oanc masc freely available use downloaded anc site linguistic data consortium also distributed part-of-speech tagged form natural language toolkit anc sub-corpora differ similar corpora primarily range linguistic annotations provided inclusion modern genres appear resources like british national corpus also initial target use corpora development statistical language models full data annotations available thus differing corpus contemporary american english coca available selectively web browser continued growth oanc masc relies contributions data annotations computational linguistics corpus linguistics communities proceedings 48th annual meeting association computational linguistics uppsala sweden | [
416,
5667,
8323,
5639,
3721,
4971,
5903,
7599,
10160,
5778,
3127,
6174,
5214
] | None |
9,578 | 9 | Hoc_(programming_language):hoc programming language hoc acronym high order calculator interpreted programming language used 1984 book unix programming environment demonstrate build interpreters using yacc hoc developed brian kernighan rob pike glorified interactive calculator basic functionality evaluate floating-point numerical expressions e.g. 1+2*sin 0.7 variables added conditionals loops user-defined functions simple io using syntax resembling c. improved hoc interpreter included eighth edition research unix 1985 generally adopted commercial unix systems linux distributions instead earlier calculator languages dc bc become widespread systems hoc survived continued evolve part plan 9 operating system several improved versions hoc released free software bell labs individuals see list hoc used primary scripting language neuron simulator following simple example interactive calculator session hoc text represents hoc output simple example functions flow control | [
6369,
8262,
8522,
4433,
9714,
5492,
823
] | Test |
9,579 | 9 | Gnash_(software):gnash software gnash media player playing swf files gnash available standalone player desktop computers embedded devices well plugin several browsers part gnu project free open-source alternative adobe flash player developed gameswf project gnash first announced late 2005 software developer john gilmore project maintainer rob savoye main developer web site gnash located free software foundation gnu savannah project support server gnash supports swf v7 features swf v8 v9 however swf v10 supported writing free software flash player priority gnu project time prior launch gnash gnu project asked people assist gplflash project majority previous gplflash developers moved gnash project existing gplflash codebase refocused towards supporting embedded systems primary distribution terms gnash gnu gpl however since gnash started using codebase gameswf project public domain code developed gnash project might useful gameswf placed public domain adobe provides outdated version 11.2 official player linux ia-32 amd64 developer preview release binary-only form gnash however compiled executed many architectures including x86 arm mips powerpc also supports bsd-based operating systems early port risc os never macromedia/adobe flash support beyond flash 3 exist well early port beos flash support terminated version 4 development port amigaos 4.1 also recently begun port haiku operating system also exists gnash requires one agg cairo opengl rendering contrast gnu projects typically written c gnash written c++ programming language gameswf heritage gnash play swf files version 7 80 actionscript 2.0 goal gnash developers compatible possible proprietary player including behavior bad actionscript code however gnash offers special features available adobe player possibility extend actionscript classes via shared libraries sample extensions include mysql support file system access security reasons extension mechanism must compiled-in explicitly enabled via configuration files gnash supports playback flv videos allows playing flv files youtube myspace showmedo similar websites older files sound – newer files without playing sound flv support requires ffmpeg gstreamer installed system free-software programs mplayer vlc media player players windows based ffdshow directshow codecs play back flv format file specially downloaded piped version 0.8.8 released 22 august 2010 rob savoye announced gnash work youtube videos version 0.8.8 gpu support pushed ahead proprietary adobe flash player linux flash 10.2 came hardware acceleration built gnash still suffers high cpu usage flashblock plugin installed user turning flash support case-by-case needed basis youtube video controls full screen mode functioning although version 0.8.8 bug cause youtube display invalid parameters many popular flash games work gnash 0.8.8 cygnal gnash project flash media server-compatible audio video server handles negotiating copyright metadata exchange well streaming content need handle many thousands simultaneous network connection support running large gnu/linux clusters support handling multiple streams differing content well multicast stream single data source due patent issues surrounding mp3 fact flv on2 closed formats one main goals project support free codes free protocols primary way things optional support mp3 flv on2 vp6 vp7 playing existing flash content flv vp6 vp7 codecs included ffmpeg users use ffmpeg plugin gstreamer 0.10 use proprietary codecs gnash successfully run microsoft windows darwin os x irix solaris beos os/2 haiku gnash also run following 64-bit systems powerpc itanium ultrasparc amd64 gnash ported windows plugin works best firefox 1.0.4 newer work mozilla-based browser however newer browsers plugin may become unstable inoperative newer gnash binaries windows include plugin currently newer working gnash plugin windows project financially supported commercial company lulu.com july 2010 march 2012 lead developer reported donations barely enough pay hosting project web one problem project difficulty finding developers current developers never installed adobe flash player fear anyone ever installed adobe flash player time accepted agreement modify reverse engineer flash player therefore gnash project 6 active developers november 2010 generic clauses however may national anticompetition laws used normal software license agreements may 2 2012 court justice european union ruled case c-406/10 sas institute inc v world programming ltd functionality computer program covered copyright european union contractual provisions null void forbid observing studying testing computer program order reproduce behavior second program holds long source code object code copied | [
2050,
1028,
2062,
9245,
3618,
2603,
5165,
5677,
3631,
576,
7234,
8258,
8771,
10822,
5703,
1112,
3674,
2658,
5743,
8303,
2673,
8304,
9848,
5754,
7292,
5759,
1664,
1666,
2180,
4230,
9865,
6285,
6797,
7309,
3731,
3734,
3744,
4265,
4777,
1144... | Test |
9,580 | 8 | Comparison_of_web_server_software:comparison web server software web server software allows computers act web servers first web servers supported static files html images commonly allow embedding server side applications web application frameworks include simple http servers example django framework provides codice_1 php built-in server generally intended use initial development production server require robust http front-end one servers listed | [
1920,
4485,
3462,
7430,
9229,
7567,
7695,
1937,
11154,
7443,
1556,
8350,
10016,
7457,
3746,
8994,
2596,
3237,
9125,
11682,
7338,
9387,
44,
558,
9647,
10800,
11439,
4658,
2485,
11189,
6714,
64,
9281,
9665,
10622,
8644,
1991,
11134,
595,
13... | None |
9,581 | 3 | Omega2_(computer):omega2 computer omega2 personal single-board computer created toronto-based startup company called onion released kickstarter advertised world smallest linux server system combines tiny form factor power-efficiency arduino power flexibilities raspberry pi identified fcc identifier 2ajvp-omega2 runs linux kernel based lightweight operating system embedded system called openwrt soc planned shipped end november 2016 omega2 next generation old product onion makes omega original omega based qualcomm atheros ar9331 mips architecture soc runs full linux operating system designed embedded system sold 19.99 company discontinued development omega replaced successor omega2 using another soc chip mediatek mt7688 also metal cover chip also drastically cut price 5 later increased 7.5 beginning 2017 onion already attracted crowdfunding 850,000 omega2 greatly exceeded initial goal 440,000 omega2 comes two versions basic omega2 omega2 plus omega2 cpu based mips architecture running 580 mhz clock speed equipped 64 mb ram 16 mb flash memory omega2 plus similar omega2 except 128 mb ram 32 mb memory microsd slot sold 9 usd system comes small pcb footprint dual-in-line 16x2mm pins board runs 3.3 volts power average power consumption 0.6w devices intended headless computers graphical interfaces embedded systems | [
1537,
3585,
2308,
11396,
6925,
1682,
11282,
405,
666,
5019,
4124,
6178,
8237,
7983,
9266,
823,
3511,
1849,
8250,
9913,
1728,
10945,
6978,
7234,
10820,
6981,
11080,
11337,
2635,
2383,
5339,
2524,
2784,
1377,
2788,
3300,
5356,
2285,
9964,
1... | None |
9,582 | 3 | CLMUL_instruction_set:clmul instruction set carry-less multiplication clmul extension x86 instruction set used microprocessors intel amd proposed intel march 2008 made available intel westmere processors announced early 2010 mathematically instruction implements multiplication polynomials finite field gf 2 bitstring formula_1 represents polynomial formula_2 clmul instruction also allows efficient implementation closely related multiplication larger finite fields gf 2 traditional instruction set one use instructions improve speed applications block cipher encryption galois/counter mode depends finite field gf 2 multiplication another application fast calculation crc values including used implement lz77 sliding window deflate algorithm zlib pngcrush instruction computes 128-bit carry-less product two 64-bit values destination 128-bit xmm register source may another xmm register memory immediate operand specifies halves 128-bit operands multiplied mnemonics specifying specific values immediate operand also defined presence clmul instruction set checked testing one | [
9092,
2821,
3973,
4491,
4108,
4237,
5645,
6924,
5649,
7313,
4886,
6038,
9111,
9369,
7963,
9500,
2719,
5883,
2088,
2094,
9391,
8120,
8506,
2237,
1085,
5309,
8125,
833,
6978,
7234,
5444,
8126,
3142,
9541,
11080,
2764,
1998,
5326,
977,
2514,... | Test |
9,583 | 8 | Automated_Logic_Corporation:automated logic corporation automated logic corporation located kennesaw georgia united states manufactures building automation systems several technological innovations include webctrl® building automation system environmental index™ tool thermographic color floor plans time-lapse™ graphics fault detection diagnostics fdd eikon uniquely powerful universal programming tool i/o hardware including controllers routers webctrl bacnet native browser-based building automation system users fully access buildings schedules setpoints trends alarms control functions virtually computer anywhere world users also control buildings webctrl wireless devices tablets cell phones webctrl supports multiple languages simultaneously includes powerful spreadsheet-based reporting tool native bacnet system webctrl interfaces lonworks modbus many protocols provide integrated solution building control needs webctrl certified bacnet testing laboratory bacnet advanced workstation software automated logic systems installed commercial office buildings industrial plants critical mission facilities healthcare facilities educational facilities government complexes hospitality/entertainment venues retail locations worldwide products sold international network dealers design engineer install support automated logic products automated logic corporation acquired carrier corporation parent united technologies corporation 2004 founding member bacnet manufacturers association automated logic one first offer products using industry ’ standard protocol – bacnet | [] | Train |
9,584 | 7 | Skillhive:skillhive skillhive enterprise social software collaborative software designed assessing finding sharing developing expertise within organizations professional associations skillhive used various purposes competence-based management development knowledge management talent management organizational learning innovation skillhive targeted medium large sized businesses organizations operating dynamic environment continuous learning knowledge sharing experts vital skillhive built concept called swarm work swarm work defined way working aims imitate swarm intelligence form collective intelligence enable decentralized groups self-organize effectively work together towards common goal without need central coordination skillhive provided software service saas cloud on-demand service software servers data maintained service provider customer gets right receive use service since need download install software saas services like skillhive seen easy deploy skilllhive web browser based works operating systems supported up-to-date web browsers service developed using html5 javascript css php technologies enables scale different mobile devices like tablets smartphones skillhive provides advanced programming interface api enables integrate information systems human resource systems intranets skillhive linkedin integration enables transfer profile information including photos cv information service skillhive developed intunex ltd finnish technology company founded janne ruohisto 2008 intunex received innovation product development fund tekes 2010 intunex launched first commercial version skillhive called xtune 2011 skillhive received awards including association finnish elearning centre interactive learning award eeemeli – best collaboration application 2012 hr tech europe finalist 2012 | [
4194,
467,
8644,
3462
] | Test |
9,585 | 4 | InMage:inmage inmage computer software company based us india markets product line called scout uses continuous data protection cdp backup replication scout consists two product lines host-offload line uses software agent protected servers fabric line uses agent fibre channel switch fabric software protects volume block level tracking write changes allows local remote protection policies first version product released 2002 scout features capacity optimized cdp repository continuous approach allows near zero backup windows point time restores second level rpos within datacenter across datacenters target volume kept updated either synchronously asynchronously based product line retention logs allow point time recovery user specified retention window scout also features application failover support disaster recovery 6.2 release scout supported microsoft windows linux solaris aix hp ux also supports vmware xenserver hyper-v solaris zones server virtualization platforms server application failover supported microsoft windows application failover supports microsoft exchange blackberry enterprise server microsoft sql server file servers microsoft sharepoint oracle mysql among others 6.2 release series supports clustered non clustered operation scout integrates traditional tape backup software enable longer term retention tape scout integrates microsoft vss apis sql exchange hyper-v consistent snapshots also integrates oracle db2 mysql postgresql consistency apis inmage founded 2001 dr. murali rajagopal kumar malvalli sv systems microsoft corporation acquired inmage 2014 | [
4356,
11524,
1801,
6153,
6797,
782,
1935,
10900,
11030,
1304,
1049,
11549,
7970,
3366,
1832,
6827,
7983,
3890,
8757,
823,
9655,
4289,
9033,
10957,
1358,
4051,
11221,
11605,
11103,
10338,
617,
8681,
5612,
7022
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.