node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
9,586 | 5 | Random-access_channel:random-access channel random-access channel rach shared channel used wireless terminals access mobile network tdma/fdma cdma based network call set-up bursty data transmission whenever mobile wants make mo mobile originating call schedules rach rach transport-layer channel corresponding physical-layer channel prach since rach shared probability two mobiles transmit time transmissions collide medium air granted access network happens limit number mobiles transmitting one rach time slot defined gsm standard collision happens mobile waits random period time transmits rach rach uses gsm 51 frame multiframe structure uplink transmit information mostly ts1 used high capacity gsm cell areas ts2 ts4 ts6 also used rach leaving ts0 mainly used broadcast frequency random-access channel like mobile phone networks also used openairmesh network cluster heads mesh routers key feature random-access channel messages scheduled compared example dedicated channel umts assigned exclusively one user time certainty single device makes connection attempt one time collisions result | [
11181
] | Test |
9,587 | 9 | Conditional_compilation:conditional compilation computer programming conditional compilation compilation implementing methods allow compiler produce differences executable program produced controlled parameters provided compilation technique commonly used differences needed run software different platforms different versions required libraries hardware many programming languages support conditional compilation typically compiler directives define undefine certain variables directives test variables modify compilation accordingly example using actual language compiler may set define macintosh undefine pc code may contain c languages similar syntax done using ifdef directive similar procedure using name conditional comment used microsoft internet explorer version 5 9 interpret html code also similar proprietary mechanism adding conditional comments within jscript known conditional compilation | [
1952,
3491,
8262,
5896,
8680,
8874,
5612,
2804,
4151,
3960,
10684,
603,
10620,
2045
] | Validation |
9,588 | 4 | Backscatter_(email):backscatter email backscatter also known outscatter misdirected bounces blowback collateral spam incorrectly automated bounce messages sent mail servers typically side effect incoming spam recipients messages see form unsolicited bulk email spam solicited recipients substantially similar delivered bulk quantities systems generate email backscatter may listed various email blacklists may violation internet service providers terms service backscatter occurs worms spam messages often forge sender addresses instead simply rejecting spam message misconfigured mail server sends bounce message forged address normally happens mail server configured relay message after-queue processing step example antivirus scan spam check fails time antivirus scan spam check done client already disconnected cases normally possible reject smtp transaction since client would time waiting antivirus scan spam check finish best thing case silently drop message rather risk creating backscatter measures reduce problem include avoiding need bounce message rejections initial smtp connection stage cases sending bounce messages addresses reliably judged forged cases sender verified thus ignoring message i.e. dropping authors spam viruses wish make messages appear originate legitimate source fool recipients opening message often use web-crawling software scan usenet postings message boards web pages legitimate email addresses due design smtp mail recipient mail servers receiving forged messages simple standard way determine authenticity sender accept email connection phases checking refuse e.g. software determines message likely spam use potentially forged sender address attempt good-faith effort report problem apparent sender mail servers handle undeliverable messages four fundamentally different ways backscatter occurs bounce method used sender information incoming email unrelated third party every step control worms spam messages helps reduce backscatter common approaches section also reduce problem initial smtp connection mailservers range checks often reject email 5xx error code sending server still connected rejecting message connection-stage way usually cause sending mta generate local bounce message non-delivery notification ndn local authenticated user reasons rejection include mail transfer agents mtas forward mail avoid generating backscatter using transparent smtp proxy mail servers sending email bounce messages use range measures judge whether return address forged preventing backscatter desirable also possible reduce impact filtering many spam filtering systems include option attempt detect reject backscatter email spam addition systems using schemes bounce address tag validation tag outgoing email way allows reliably detect incoming bogus bounce messages | [
2848,
5249,
8224,
1667,
10696,
2409,
6762,
113,
8337,
6261,
3350,
9909,
2041,
10906,
3549
] | None |
9,589 | 2 | Enterprise_Objects_Framework:enterprise objects framework enterprise objects framework commonly simply eof introduced next 1994 pioneering object-relational mapping product nextstep openstep development platforms eof abstracts process interacting relational database mapping database rows java objective-c objects largely relieves developers writing low-level sql code eof enjoyed niche success mid-1990s among financial institutions attracted rapid application development advantages next object-oriented platform since apple inc merger next 1996 eof evolved fully integrated part webobjects application server also originally next many core concepts eof re-emerged part core data abstracts underlying data formats allow based non-sql stores early 1990s next computer recognized connecting databases essential businesses yet also potentially complex every data source different data-access language api driving costs learn use vendor product next engineers wanted apply advantages object-oriented programming getting objects talk relational databases two technologies different solution create abstraction layer insulating developers writing low-level procedural code sql specific data source first attempt came 1992 release database kit dbkit wrapped object-oriented framework around database unfortunately nextstep time powerful enough dbkit serious design flaws next second attempt came 1994 enterprise objects framework eof version 1 complete rewrite far modular openstep compatible eof 1.0 first product released next using foundation kit introduced autoreleased objects developer community development team time four people jack greenfield rich williamson linus upson dan willhite eof 2.0 released late 1995 refined architecture introducing editing context point development team consisted dan willhite craig federighi eric noyau charly kleissner eof achieved modest level popularity financial programming community mid-1990s would come emergence world wide web concept web applications clear eof could help companies plug legacy databases web without rewriting data addition frameworks state management load balancing dynamic html generation next able launch first object-oriented web application server webobjects 1996 eof core 2000 apple inc. merged next officially dropped eof standalone product meaning developers would unable use create desktop applications forthcoming mac os x would however continue integral part major new release webobjects webobjects 5 released 2001 significant fact frameworks ported native objective-c programming language java language critics change argue power eof side effect objective-c roots eof lost beauty simplicity third-party tools eogenerator help fill deficiencies introduced java mainly due loss categories objective-c code base re-introduced modifications desktop application developers core data part apple cocoa api release mac os x tiger april 2005 enterprise objects provides tools frameworks object-relational mapping technology specializes providing mechanisms retrieve data various data sources relational databases via jdbc jndi directories mechanisms commit data back data sources mechanisms designed layered abstract approach allows developers think data retrieval commitment higher level specific data source data source vendor central mapping model file eomodel build visual tool — either eomodeler eomodeler plug-in xcode mapping works follows build data models based existing data sources build data models scratch use create data structures tables columns joins data source result database records transposed java objects advantage using data models applications isolated idiosyncrasies data sources access separation application business logic database logic allows developers change database application accesses without needing change application eof provides level database transparency seen tools allows model used access different vendor databases even allows relationships across different vendor databases without changing source code power comes exposing underlying data sources managed graphs persistent objects simple terms means organizes application model layer set defined in-memory data objects tracks changes objects reverse changes demand user performs undo command time save changes application data archives objects underlying data sources designing enterprise objects developers leverage object-oriented feature known inheritance customer object employee object example might inherit certain characteristics generic person object name address phone number kind thinking inherent object-oriented design relational databases explicit support inheritance however using enterprise objects build data models reflect object hierarchies design database tables support inheritance also designing enterprise objects map multiple tables particular views database table enterprise object analogous often known object-oriented programming business object — class models physical conceptual object business domain e.g customer order item etc. makes eo different objects instance data maps data store typically enterprise object contains key-value pairs represent row relational database key basically column name value row database said eo properties persist beyond life particular running application precisely enterprise object instance class implements com.webobjects.eocontrol.eoenterpriseobject interface enterprise object corresponding model called eomodel defines mapping class object model database schema however enterprise object n't explicitly know model level abstraction means database vendors switched without affecting developer code gives enterprise objects high degree reusability despite common origins two technologies diverged technology retaining subset features original objective-c code base adding new features eof supports custom sql shared editing contexts nested editing contexts pre-fetching batch faulting relationships features original objective-c implementation supported core data core data also provide equivalent eomodelgroup—the nsmanagedobjectmodel class provides methods merging models existing models retrieving merged models bundles core data supports fetched properties multiple configurations within managed object model local stores store aggregation data given entity may spread across multiple stores customization localization property names validation warnings use predicates property validation features original objective-c implementation supported java implementation | [
2819,
9123,
9286,
10470,
3080,
8201,
7307,
5677,
10413,
8303,
8304,
10478,
119,
11257,
9467,
7806
] | None |
9,590 | 9 | OGNL:ognl object-graph navigation language ognl open-source expression language el java using simpler expressions full range supported java language allows getting setting properties defined setproperty getproperty methods found javabeans execution methods java classes also allows simpler array manipulation aimed used java ee applications taglibs expression language ognl created luke blanshard drew davidson ognl technology ognl development continued opensymphony closed 2011 ognl developed part apache commons ognl began way map associations front-end components back-end objects using property names associations gathered features drew davidson created key-value coding language kvcl luke blanshard reimplemented kvcl using antlr started using name ognl technology reimplemented using java compiler compiler javacc ognl uses java reflection introspection address object graph runtime application allows program change behavior based state object graph instead relying compile time settings also allows changes object graph due ability create change executable code ognl capable introducing critical security flaws framework uses multiple apache struts 2 versions vulnerable ognl security flaws october 2017 recommended version struts 2 2.5.13 users urged upgrade latest version older revisions documented security vulnerabilities — example struts 2 versions 2.3.5 2.3.31 2.5 2.5.10 allow remote attackers execute arbitrary code | [
8262,
1095,
1258,
5612,
5677,
10573,
7983,
5682,
11354,
10559
] | Validation |
9,591 | 4 | PUM.bad.proxy:pum.bad.proxy pum.bad.proxy form malware known registry hack unauthorized alteration windows registry file specifically redirects lan settings within internet explorer popular web browser commonly installed default web browser microsoft windows first spotted users malwarebytes anti-malware security software 22 january 2011 reported malwarebytes software 200 times first day alone name assigned malwarebytes anti-malware specific name unique virus hack pum defines potentially unwanted modification bad.proxy defines modification ability search alert user potentially unwanted modifications added malware bytes november 2010 likely first day users began reporting pum.bad.proxy first day hack existed rather first time malware bytes could alert user vulnerability also fact proxy server often active malware bytes alerts user presence may indicate remnant virus hack malicious software previously removed quarantined hack alters proxy server address settings redirect web access requests back computer internal lan address 127.0.0.1 effectively cutting computer access internet origin method propagation currently unknown altered registry setting affects users internet explorer including recent version internet explorer 9 browsers firefox depend upon specific windows registry item proxy address port settings affected registry value hkey_current_user\software\microsoft\windows\currentversion\internet settings\proxyserver value set 127.0.0.1 computer internal address network card various port numbers reported | [
3072,
6786,
7044,
10245,
10756,
9356,
6797,
9233,
8978,
4863,
4883,
278,
10392,
1690,
3867,
10141,
5281,
6520,
2213,
8998,
9256,
939,
7983,
1970,
3643,
6588,
7739,
9791,
1088,
3320,
8386,
3395,
4165,
2508,
5078,
7515,
3941,
107,
877,
4725... | Validation |
9,592 | 3 | Socket_3:socket 3 socket 3 series cpu sockets various x86 microprocessors sometimes found alongside secondary socket designed math coprocessor chip case 487 socket 3 resulted intel creation lower voltage microprocessors upgrade socket 2 rearranged pin layout socket 3 237-pin low insertion force lif zero insertion force zif 19×19 pin grid array pga socket suitable 3.3 v 5 v 25–50 mhz intel 486 sx 486 dx 486 dx2 486 dx4 486 overdrive pentium overdrive processors well amd am486 am5x86 cyrix cx5x86 processors | [
5901,
6415,
8851,
4246,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
2874,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
1260,
4717,
10225,
... | Test |
9,593 | 2 | Microsoft_Management_Console:microsoft management console microsoft management console mmc component windows 2000 successors provides system administrators advanced users interface configuring monitoring system management console host component object model components called snap-ins microsoft administration tools implemented mmc snap-ins third parties also implement snap-ins using mmc application programming interfaces published microsoft developer network web site snap-ins registered codice_1 codice_2 registry keys snap-in combined mmc called management saved console file .msc extension launched using syntax codice_3 prolific mmc component computer management appears administrative tools folder control panel system security category view computer management actually consists collection mmc snap-ins including device manager disk defragmenter internet information services installed disk management event viewer local users groups except home editions windows shared folders tools computer management also pointed another windows machine altogether allowing monitoring configuration computers local network user access mmc snap-ins common use include | [
11270,
5643,
13,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2603,
2101,
10812,
3648,
10310,
8265,
1098,
7754,
7244,
4173,
4174,
10828,
9808,
4178,
10839,
603,
9819,
8798,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
1087... | Validation |
9,594 | 4 | Greynet:greynet within context corporate organizational networks greynet grayware elusive networked computer application downloaded installed end user systems without express permission network administrators often without awareness cognition deeply embedded organization ’ network fabric applications may marginal use user inevitably consume system network resources addition greynet applications often open door end use systems become compromised additional applications security risks malware computer workstations become connected internet variety programs proliferated offer ability extend communications gather deliver information serve needs marketing concerns among first emerge instant messaging clients icq aol instant messenger msn messenger developments technology added video capability webcam units worked together take advantage available bandwidth single small network corporate environments growth greynets takes advantage software hardware developments informal networks appearing provide variety streaming media content supplied modified end users emerging category podcasting users generate content widespread download portable mp3 players problem greynet programs fourfold first greynet programs create network security risks causing broad vectors malware dissemination second create privacy issues network opening large holes information leakage third greynet programs create compliance issues computer network creating invisible parallel communications network fourth create issues local machines consumption local system resources possible operating system program stability concerns things increase network administration time costs added corporate work environment loss meaningful production time due non-work related distractions greynet applications individual network environment policies may vary non-existent full lockdown end user system privileges see risks liabilities section instant messaging detailed overview threats risks solutions problems prevalent greynet programs public im dealing security aspects greynets led emergence specific administrative software packages monitor control traffic well enhancement security suites adware clients among first prevalent specific administrative software packages products secure networks threats borne im p2p networks products first introduced 2002 protect 10 15 u.s. corporations | [
939,
877,
7983,
8978,
10392,
7515
] | Train |
9,595 | 8 | Platial:platial platial collaborative user generated cartographic website founded 2004 di-ann eisnor jake olsen jason wilson platial inc. headquartered portland oregon platial used hundreds thousands people globally share associate relevant content geographic places interest platial claims 25 web map widgets used 10,000 sites october 18 2007 platial acquired frappr another social mapping website increasing total user-generated locations 100 million february 27 2010 platial announced service would closing within days geographic information science literature concept 'platial refers place-based studies parallel use 'spatial space-based coordinate-system oriented studies | [
735,
119
] | None |
9,596 | 9 | Discriminator:discriminator distributed computing discriminator typed tag field present omg idl discriminated union type value definitions determines union member selected current union instance unlike conventional programming languages offering support unions discriminator idl identical selected field name example idl union type definition effective value register type may contain ax selected field discriminator value may either b stored memory separately therefore idl logically separates information currently selected field name union effective value information current discriminator value example discriminator value may anything following b c well characters belonging idl codice_1 type since codice_2 branch specified example register type allows use remaining characters well microsoft interface definition language also supports tagged unions allowing choose discriminator via attribute enclosing structure function | [
10465,
347,
8262,
1407
] | Test |
9,597 | 3 | Cylinder_1024:cylinder 1024 cylinder 1024 first cylinder hard disk inaccessible original ibm pc compatible hardware specification interrupt 13h uses cylinder-head-sector addressing boot time bios many old pcs could access first 1024 cylinders numbered 0 1023 chs addressing defines 10 bits cylinder count 2^10=1024 problem operating systems x86 platform bios must able load bootloader entire kernel image memory must therefore located first 1024 cylinders disk older versions microsoft windows resolved necessitating operating system installed first partition partly bug users linux operating system traditionally created /boot partition reside within first 1024 cylinders disk containing little kernel bootloader | [
6118,
2762,
1515,
6797,
7983,
6129,
499,
4563,
823
] | None |
9,598 | 3 | Palm_VIIx:palm viix palm viix personal digital assistant made palm inc device featured antenna used wireless data communication connectivity provided mobitex network defunct palm.net service web clipping applications used network process data cost service 14.95 per month allowed limited number web pages viewed palm viix succeeded original palm vii replaced palm i705 | [
2308,
10500,
6790,
3606,
8982,
6178,
5164,
7983,
9013,
694,
5318,
11337,
9037,
2258,
1621,
4832,
4449,
2285,
1776,
2420,
8952
] | None |
9,599 | 3 | HP_2100:hp 2100 hp 2100 series 16-bit minicomputers produced hewlett-packard hp mid-1960s early 1990s tens thousands machines series sold twenty-five year lifetime making hp fourth largest minicomputer vendor 1970s design started data systems inc dsi originally known dsi-1000 hp purchased company 1964 merged dymec division original model 2116a built using integrated circuits magnetic-core memory released 1966 next four years several new versions released including sub-models c different types memory expansion 2115 2114 cost-reduced versions 2116 models replaced hp 2100 series 1971 21mx series 1974 magnetic-core memory replaced semiconductor memory models also packaged hp 2000 combining 2100-series machine optional components order run basic programming language multi-user time sharing fashion hp time-shared basic popular 1970s many early basic programs written platform notably seminal star trek popular early home computer era people computer company published programs hp 2000 format introduction hp 3000 1974 provided high-end competition 2100 series entire line renamed hp 1000 1977 positioned real-time computers greatly redesigned version introduced 1979 1000 l-series using cmos large scale integration chips introducing desk-side tower case model first version break backward compatibility previous 2100-series expansion cards final upgrade a-series new processors capable 1 mips performance final a990 released 1990 hp formed dynac 1956 act development shop projects main company would normally undertake original logo simply hp logo turned upside forming something approximating dy learning westinghouse owned trademark name 1958 changed dymec company brought in-house 1959 become dymec division november 1967 renamed palo alto division dymec originally made variety products hp family time became primarily integrator building test equipment similar systems used hp 1964 kay magleby paul stoft began experimenting use pdp-5 pdp-8 computers act controllers complex test systems however felt machines would require changes truly suit needs time digital equipment corporation dec still small company takeover target however david packard found ken olsen difficult deal plans went nowhere looking another design could purchase packard led five-person data systems inc. dsi detroit dsi owned union carbide packard asked union carbide came computer company hp labs manager barney oliver replied n't demand answer question bill hewlett initially refused consider development minicomputer packard reframed instrument controller deal approved dsi purchased 1964 initially set dymec four original five employees dsi number employees coming hp instrumentation divisions computer group later moved offices cupertino california building purchased varian associates becoming cupertino division led magleby new division completed design 2116a demonstrated 7–10 november 1966 joint computer conference san francisco one earliest 16-bit minis hit market notable unusual new instrumentation computer highly expandable design real-time support system featured oversized cabinet held 16 expansion cards could expanded 48 cards external expansion cage system launched 20 different instrumentation cards including counters nuclear scalers electronic thermometers digital voltmeters ac/ohms converters data amplifiers input scanners additional set added input/output devices like tape drives printers punched cards paper tape peripherals real-time service provided card slot assigned fixed interrupt vector called appropriate device driver machine entered market quickly became clear selling much rapidly business data processing market originally targeted instrumentation market led introduction 2115a 1967 removed much expansion capabilities make lower-cost offering commercial users simplified version shipped 2114a 1968 eight slots leaving room power supply incorporated main chassis 2115 2114 also lacked extensive dma control 2116 removed mathematical operations ran slightly slower speeds original models using core memory hardwired cpu november 1968 company released 2000a timeshare system later known hp 2000/access based 2116b 2116a expanded 8k core memory running hp time-shared basic used separate 2114 terminal server t-s basic allowed multiple user accounts created 16 users logged newer models 2000 b f used newer versions underlying cpu introduced models used low-end versions cpu terminal server 2000f instance used 2100s main cpu primary storage controller 2100a acted terminal server b c f models dual-processor last version 2000f 2100s 2100a cpu used 2100a connected 32 serial terminals via serial multiplexer interfaces spite relatively high costs — 2000f cost 105,000 1974 — first minicomputer offer time-shared basic made popular early-to-mid 1970s hp 2000 series introduced 1969 sold june 1978 supported 1985 versions many seminal basic games written ported platform notable among mike mayfield star trek 1971 popularity made dialect basic lingua franca many basic listings normally provided format people computer company published programs hp 2000 format 32 users largest configuration hp-2000 part university timesharing life used coursework much somewhat later case decsystem-20 1970s lineup constantly improved new models remained compatible software expansion original 2116 early 1970 fred allard formerly ampex memory core division asked design new magnetic-core memory system systems rather continue purchasing ampex using newer 18 mil cores 22 mil using single sense/inhibit line able fit 8 kw memory onto single expansion card used starting 2116c models 1971 updated 2100a replaced entire existing 211x lineup overall system similar earlier models continued based core memory physically resembled 2114 power supply built-in limited internal expansion however cpu rebuilt microcode could user-programmed added hardware multiply divide added simple memory protection system caused high-priority interrupt triggered two-channel dma controller provided higher throughput optional floating-point unit also available front panel buttons illuminated small incandescent lamps burned use use switched-mode power supply allowed chassis significantly smaller earlier models 1972 hp shipped 4,500 minis making one largest companies market year merged mountain view division made magnetic tape drives cupertino division create data systems division dsd time hp 3000 project serious trouble february 1973 packard sent paul ely take division sales 2100 series remained strong 6000th shipped august 1973 8000th february 1974 10,000th february 1975 declared obsolete 1978 1972 division decided move 4kbit sram memory chips place core twice fast contemporary low-cost core much smaller allowing 32kword machines built 2114-like form factor time made decision 4kbit srams actually available experimental machines using core 2100 series used initially replaced 1kbit sram first appeared 4k parts would available time rest machine upgraded company canvassed various manufacturers found aggressively developing 4k parts particular intel mostek motorola texas instruments suggesting parts would available quantity late 1974 using memories expansion chassis like earlier systems meant room much memory megaword range however cpu use 15-bit addresses limited size 32kwords address desire larger systems hp developed dynamic mapping system dms dms expanded address format 15 20 bits allowing maximum 1,048,576 words dramatic expansion original system changes led 1974 introduction first 21mx series machines stood 21-m processor 21-x memory memory control systems separated cpu order provide flexibility case chosen 4k parts changed production proved useful practice machines shipped memories using either motorola texas instruments parts could mixed single machine higher density system based 16-pin mostek parts could supported replacing normal 21-x/2 controller 21-x/1 entire 2100 series replaced 1974 first 21mx series machines using highest-density parts new machines could support 1.2 mb largest models cpu upgraded 1976 new models became 21mx e-series original models retroactively became 21mx m-series main difference e e used clever timing improve speed twice m. wider variety machine styles released part 21mx series including smaller systems four slots larger ones 9 14 slots 21mx series featured memory management unit semiconductor memory expandable 1,048,576 words one megaword bit displays front panel buttons used small red light-emitting diodes leds instead burnout-prone incandescent bulbs used earlier versions 21mx ran hp rte real time operating system os started refrigerator-sized 19-inch rackmount systems lights switches front panels last models would use 1-chip processor fit desk using console terminal rather front panel new l series models hp-ib interface ability hp systems time blinking led lights removed front panel despite customer demands real-time ability hp r efforts using installable real-time card rte-a os good real-time operations rte 21mx important reason computer hard kill many companies use real-time operations take measurements control processes — turn pump heater valve speed slow motor etc end 1977 entire line renamed hp 1000 becoming hp 1000 m-series hp 1000 e-series next year hp 1000 f-series introduced e-series added floating point unit 1978 success line propelled hp become fourth largest manufacturer minicomputer space trailing dec ibm data general 1980 hp 1000 l-series introduced used new processor based hp large scale integration silicon sapphire process additionally expansion cards also equipped processors allowed access main memory conduct input/output without bothering cpu although made expansion cards incompatible earlier models first time also greatly improved overall performance models lacked memory management unit l-series turn replaced 1982 hp 1000 a-series included new lightning cpu design reached 1 mips even faster magic cpu 3 mips wide variety different models produced including desk-side towers variety different size rack-mount systems low-end a400 model introduced 1986 final high-end a990 released 1990 addressable 32 mb ram 2000 2100 desginations reused hp 2100 designed era ram form magnetic core memory falling dollars pennies per bit implementing processor registers using transistors small-scale integration remained expensive favored designs registers storage ram turn influenced instruction set architecture isa use memory-memory memory-accumulator design basic concept first widely introduced seminal 12-bit pdp-8 spawned many similar designs like 2100 2100 addresses 15-bits long allowing total 32k 16-bit words memory 64kb modern terms smallest addressable unit memory 16-bit word instructions fetch single 8-bit byte address broken two parts 5 significant bits refer one 32 pages 10 least significant bits displacement pointing single word within 1,024-word page dms system 21mx series upper 5 bits instead used select one 32 registers holds 12 bits least significant 10 bits register placed front original 10-bit displacement produce 20-bit address two significant bits used implement memory protection processing handled two b registers 16 bits wide registers also accessible memory locations 0 1 respectively means one load value accumulator using normal register-save operation instance codice_1 load value register memory location 1 thereby copying value b addition b registers cpu also includes register holds current memory address register holds value address p register used program counter automatically incremented every instruction also used base address memory accesses see calculated placed m. also two one-bit registers overflow extend additionally 16-bit witch /d isplay register used input output front panel certain areas memory reserved special purposes like locations 0 1 used accumulators additional words lowest 64-locations memory used direct memory access dma vectored interrupts see later models highest 64 words available memory reserved boot loader original instruction set contained 68 70 instructions 68 instructions standard instruction set 16 bits long execute one memory cycle 16 clock cycles although indirect addressing codice_2 use 36 cycles conditional branching done conditional skip-over-one instruction one instruction normally jump instruction stack subroutines instead first memory location routine reserved return address written location codice_3 instruction means internal support re-entrant code support added via user implemented stack three basic styles instructions isa memory references register references input/output certain models extended isa add-on hardware adding instance floating point instructions additional integer math memory instructions would fall three basic categories memory instructions use four bits instruction two special flags total six bits 16-bit word leaves room 10-bit address instruction stored least significant bits lsbs 0 9 bit 15 set indicates indirect addressing instead direct direct mode address instruction address operand indirect mode address pointer another memory location contained address operand one could set bit 15 location well allowing indirection required depth ending one locations 0 bit 15 addition direct/indirect mode bit 10 instruction controls z/c flag set 0 means address upper five bits zero lower 10 value instruction allows fast access z ero page first 1,024 words memory set 1 address constructed combining 10 bits instruction top 5 bits p register c urrent page memory allowing memory accessed 32 pages 1024 words thus 2,048 words addressed given time 1,024 within page zero another 1,024 within page instruction performing reference register instructions require address thus free bits work used pack four eight instructions single memory word used properly significantly speed operations total 39 register operations included broken shift-and-rotate instructions alter-and-skip instructions indicated bit 10 bit 11 indicates whether applied register b two general classes register instructions shift-and-rotate group alter-and-skip first used basic bitwise manipulation values register four instructions per word although two instructions middle always codice_4 clear e skip a/b zero second group eight instructions perform increments registers conditional branch normally used implement loops input/output instructions normally communicate accumulators instruction format starts bits 1000 significant bits followed single bit indicating register use a=0 b=1 followed 1 h/c flag bit three bits instruction remaining six bits i/o device id channel allowing 64 devices device numbers used system i/o initiated clearing flag bit codice_5 setting c bit using codice_6 hardware notices pattern begins operation operation complete device sets flag bit program loads resulting data card using codice_7 instruction sends card codice_8 actual data transfer normally accomplished using interrupt system memory locations 4 63 decimal hold addresses routines jump interrupt fired providing 60 interrupt levels location 4 7 hard-wired power failures parity check errors later models memory protection errors locations 8 user-accessible interrupt vectors mapped i/o channel arranged priority order i/o device 13 produced interrupt cpu jumps location memory location 13 masked higher-priority interrupt 1 12 another key feature 2100 series separate direct memory access controller uses cycle stealing access memory cpu using times performing internal calculations instance using feature lengthy i/o processes completed cpu works problems system set sending instruction dma controller using i/o commands dma controller channel 6 initially sent instruction containing number i/o device wants use dma whether input write memory device output read memory device starting location memory data number words setup code often installed one interrupt vectors automating process dms separate tables cpu dma system dma load data separate parts extended memory hp supplied three-pass assembler machine using column-delimited format first area left line code label start column 1 present next comes instruction mnemonic parameters rest line used comment assembler allows basic mathematical expressions written directly instead using mnemonics also includes number pseudo-instructions like codice_9 set base address program addition assembler associated linker machines initially shipped fortran 66 compiler operating system i/o drivers time additional languages added including basic algol fortran iv fortran 77 hp ported implementations agl platform added commands basic produce graphics graphics terminals plotters similar expansion fortran called graphics/1000 2100s normally used real time executive operating system rte short several versions rte released different versions machine rte-ii 2114-2116 rte-iii 2100s rte-iv 21mx series rte-a series operating system shell even late 1970s primitive single-level file system file manager fmgr example command run fortran compiler would follows meaning run f77 program using special characters distinguish source file object executable files hp 1000 also one minicomputers restricted file names five characters rather six common time made porting even writing programs challenge later rte-a hp 1000 provided conventional directory structure 16.4 file names made ru command optional tods test oriented disk system developed technician hp board repair center improve turn-around time center used load diagnostics central repository opposed loading individual paper tapes tods also used hp 2116 thru 21mx-f series test systems missiles phoenix 9206b harpoon 9500d-354 tomahawk many others early test sets 9500a evolving 9500d followed ats automated test system specific hp test systems 9500d-a46 minuteman launch component test set ats-e35 peacekeeper/minuteman launch component test set hp 8580/8542 microwave ana/asa automatic network analyzer automated spectrum analyzer ran tods tdrss microwave transponder test set used tods large system also mtos magnetic tape operating system similar tods hp 9810 9820 9830 desktop computers use slow serialized ttl version 2116 cpu although ultimately use operating system application software instead relying user-friendly rom-based interpreters basic work powered integrated keyboards displays rather disks standard terminals 1975 hp introduced bpc one world first 16-bit microprocessors using hp nmos-ii process bpc usually packaged ceramic hybrid module emc ioc chips added extended math i/o instructions hybrid developed heart new 9825 desktop computer later 9845 workstation added mmu chip forerunners personal computers technical workstations major differences original 2116 architecture bpc microprocessor completely redesigned i/o structure removal multiple levels indirect addressing provision stack register subroutine call return elimination multiple indirection made additional bit available memory word containing indirect address allowing maximum memory capacity increased 32k 16-bit words 64k bpc also added input allowing current page relative location current instruction rather power-of-two aligned page bpc used wide range hp computers peripherals test equipment discontinued late 1980s poland manufactured hp 2114b clone since 1973 polish clones called prototype 1973 pilot production 17 machines 1975-1977 production series 150 machines 1978-1987 czechoslovakia produced hp 1000 compatible clones designated 4300 4500 4700 4900 1000 units delivered vendors aritma prague development zpa čakovice zpa trutnov 1973 1990 computers served power plants including nuclear ones industry military universities etc. high reliability real-time features operating systems dos/adt several versions unix oldest hybrid adt7000 1974 composed digital adt4000 analog adt3000 parts digital part interesting customers adt4316 1976 16k words ferrite core memory adt4500 1978 4m words semiconductor ram adt 4900 designed single-board computer mass production start czechoslovak people army used adt based momi 1 momi 2 mobile minicomputers built container carried tatra 148 truck | [
512,
1029,
4742,
7173,
5384,
1801,
6664,
9739,
6033,
7188,
8732,
1952,
9762,
6821,
1192,
10796,
7983,
7858,
1461,
8501,
9911,
9402,
1469,
2811,
2241,
2243,
11075,
5450,
477,
3680,
2019,
8551,
5358,
9714,
3061,
3960,
3323
] | Test |
9,600 | 4 | SpySubtract:spysubtract spysubtract name anti-spyware application microsoft windows developed intermute maintained trend micro new name trend micro anti-spyware came effect version 3.0 previous versions trend micro branding trend micro anti-spyware later discontinued november 30 2007 replaced trend micro antivirus plus antispyware 2008 program shareware available download 30-day trial previously spysubtract often pre-installed new desktop notebook computers | [
6797,
7983,
11313,
7515,
127
] | Test |
9,601 | 7 | Yottaa:yottaa yottaa web mobile optimization services company based waltham massachusetts main product platform helps website conversions well performance security featured publications include xconomy techcrunch boston globe wall street journal yottaa founded 2009 boston coach wei tsinghua university mit alumnus robert buffone studied applied mathematics suny brockport prior yottaa wei founded served chairman nexaweb apart office boston yottaa opened office beijing described anti-lean startup due rather big global team inception coach wei served ceo 2009 late 2014 continues executive chairman robert buffone serve company cto respectively vick viren vaishnavi acts ceo since late 2014 series round 2010 yottaa raised 4 million venture funding general catalyst partners stata venture partners cambridge west ventures build acceleration platform 2012 yottaa named raymie stata former cto yahoo board directors series b round 2012 company raised additional 9 million expand platform technology include monitoring security features following round yottaa masstlc award innovative technology year cloud beating likes acquia basho technologies 16 million raised 2013 round led intel capital also attracting funding previous investors expand sales marketing operations attract enterprise customers equity issuance december 2014 yottaa received 10.45 million early 2015 yottaa moved offices boston waltham massachusetts yottaa developed web mobile optimization platform providing cloud services improve website speed visibility device company initial target group mid-sized enterprises smes yottaa aiming sell platform software service yottaa platform combines adaptive content delivery network dynamic site acceleration web analytics internet security yottaa deals problem website speed software optimization problem instead dealing problem bits movement different places require code changes yottaa platform named context intelligence identifies user location browser device interaction web content sort application content delivery thus modifying web content match end user browsing context context intelligence comprises several components adaptivecdn delivery component appsequencing neutralizing ad-blocking software ensuring websites speed reduced instanton accelerating component contextsafe provides security platform impactanalytics offers web analytics | [
10368,
6851,
3941,
6576,
3187,
467,
2428,
8735
] | Test |
9,602 | 7 | Univa:univa univa privately held software company develops workload management products manage applications services containers univa software-defined computing infrastructure workload orchestration solutions enable companies scale computer resources across on-premises cloud computing hybrid systems company based chicago offices canada germany univa develops sells supports univa grid engine software univa version grid engine workload distributed resource management technology univa announced january 2011 hired personnel formerly working oracle sun microsystems grid engine development october 2 2014 univa roll new version grid engine new functionality improved scalability performance resource control small large clusters october 22 2013 univa announced acquired intellectual property copyrights trademarks pertaining grid engine technology oracle would support oracle grid engine customers univa announced navops may 2016 new business unit products enable enterprises easily migrate cloud hybrid cloud navops launch migrates hpc workload cloud univa offers consulting services installation tuning configuration products univa founded 2004 name univa corporation carl kesselman ian foster steve tuecke time primarily known providing open source products technical support based around globus toolkit september 17 2007 company announced would merge austin texas-based united devices operate new name univa ud company operated univa ud formally dropping ud returning common use univa corporation leadership current ceo gary tyreman univa announced january 17 2011 hired principal founding engineers grid engine team oct 22 2013 univa announced acquired intellectual property well copyrights trademarks pertaining grid engine technology oracle take supporting oracle grid engine customers june 2014 technical partnership racing point f1 team formerly sahara force india univa announced may 2016 univa announced new business unit navops product line based grid engine cluster workload scheduling technology originally sun microsystems later acquired univa oracle navops line differs univa grid engine enables enterprises easily migrate cloud hybrid could increase efficiencies run containers scale march 2018 univa open sources navops launch née unicloud project tortuga apache 2.0 license | [
11353,
1185,
4194,
9665,
5956,
10597,
1480,
4011,
1806,
4463,
2064,
2710,
3449,
8702
] | Test |
9,603 | 5 | Virtual_Link_Aggregation_Control_Protocol:virtual link aggregation control protocol virtual lacp vlacp avaya extension link aggregation control protocol provide layer 2 handshaking protocol detect end-to-end failure two physical ethernet interfaces allows switch detect unidirectional bi-directional link failures irrespective intermediary devices enables link recovery less one second vlacp far-end failures detected allows link aggregation trunk fail properly end-to-end connectivity guaranteed certain links internet aggregation group remote link failure detected change propagated partner port | [
1284,
7049,
9937,
5490,
1303,
3580,
10175
] | Train |
9,604 | 5 | EGL_(API):egl api egl interface khronos rendering apis opengl opengl es openvg underlying native platform windowing system egl handles graphics context management surface/buffer binding rendering synchronization enables high-performance accelerated mixed-mode 2d 3d rendering using khronos apis egl managed non-profit technology consortium khronos group acronym egl initialism starting egl version 1.2 refers khronos native platform graphics interface prior version 1.2 name egl specification opengl es native platform graphics interface x.org development documentation glossary defines egl embedded-system graphics library | [
4902,
7978,
5612,
7983,
10480,
5171,
6069,
8438,
1849,
11322,
10971,
2045
] | Test |
9,605 | 2 | Angry_Birds_(video_game):angry birds video game angry birds later remarketed angry birds classic 2009 casual puzzle video game developed rovio entertainment inspired primarily sketch stylized wingless birds game first released ios maemo devices december 2009 since time 12 million copies game purchased ios app store prompted developer design versions touchscreen-based smartphones notably android symbian windows phone blackberry 10 devices series since expanded include titles dedicated video game consoles pcs sequel angry birds 2 released july 2015 ios android gameplay revolves around players using slingshot launch birds pigs stationed around various structures goal destroying pigs playing field players advance game new types birds become available special abilities activated player rovio mobile supported angry birds numerous free updates add additional game content company also released stand-alone holiday promotional versions game angry birds game eventually praised critics success leveraging combination addictive gameplay comical style low price viable franchise long-term potential profit game popularity led release angry birds games personal computers gaming consoles created market merchandise featuring angry birds characters 2016 feature-length animated film several seasons television cartoons angry birds series combined tally 2 billion downloads across platforms january 2014 including special editions release original game called one mainstream games 2010 one great runaway hits 2010 largest mobile app success world seen 2011 angry birds player controls flock multi-colored birds attempting retrieve eggs stolen group hungry green pigs stage gameplay enemy pigs sheltered structures made various materials wood glass stone resembling children toy building blocks objective game eliminate pigs level using slingshot players launch limited set birds goal either striking enemy pigs directly damaging surrounding structures causing blocks collapse squash pigs player must set angle force bird travel pulling back slingshot using intuitive touch-controls mobile versions launch process quick casual visible trajectory data player simply selects point x-y field behind launch post virtual slingshot released various stages game additional objects tnt crates rocks incorporated structures power-ups may used enhance birds attack hard-to-reach pigs also levels players unlock bonus levels collecting golden eggs several different types birds used game distinguished color shape earliest levels basic red bird red available player advances game additional types birds become available birds effective particular materials special abilities may activated player bird airborne example yellow bird chuck speeds blue bird fragments three birds blues black bird bomb explodes white bird matilda drop egg-shaped projectile pink bird stella trap objects bubbles green bird hal boomerangs back giant red bird named terence similar original red bird damage structures smaller counterparts orange bird bubbles expands inflates pigs also vary hardiness relative size small pigs weaker easily vanquished direct hits debris damaged structures larger pigs able withstand damage succumbing defeat addition pigs wear hats armor making even resistant damage level starts quantity types firing order birds predetermined pigs eliminated last bird launched level completed next level unlocked birds run pigs defeated level incomplete must repeated points scored pig defeated well damage destruction structures hefty bonus points awarded unused birds upon completing level players receive one two three stars depending score received players encouraged repeat previously beaten levels full three stars n't awarded order fully master earn full three star rating early 2009 rovio staff began reviewing proposals potential games one proposal came senior game designer jaakko iisalo form simulated screenshot featuring angry-looking birds visible legs wings picture gave clue type game played staff liked characters team elected design game around early 2009 physics games crush castle popular flash-based web games rovio team inspired games development angry birds staff realized birds needed enemy time swine flu epidemic news staff made birds enemies pigs angry birds studio 52nd produced game initial release game sell many copies angry birds featured app uk app store february 2010 quickly reached no.1 reached 1 spot paid apps chart us app store middle 2010 stayed 275 days initial cost develop angry birds estimated exceed €100,000 including costs subsequent updates ios version rovio partnered distributor chillingo publish game app store chillingo claimed participated final game polishing adding visible trajectory lines pinch zoom pigs grunts birds somersaults landing since rovio self-published almost later ports game exception psp version produced license abstraction games rovio began writing new versions game devices new issues came light team began working version android systems observed large number configurations device types versions android software number combinations software version processor speed even user interfaces significantly larger ios version ultimately team settled minimum set requirements even though left nearly 30 types android phones unable run game including newly released phones released october 15 2010 one month initial release android rovio mobile began designing lite version game devices early 2010 rovio began developing version angry birds facebook project became one company largest development taking year company understood challenges transplanting game concept social platforms mobile/gaming systems march 2011 interview rovio peter vesterbacka said ’ take experience works one environment one ecosystem force-feed onto another like zynga ’ take farmville throw mobile see sticks titles successful mobile ones ’ built ground platform facebook version incorporate social-gaming concepts in-game purchases entered beta-testing april 2011 game became officially available facebook february 2012 improvements game include ability synchronize player progress across multiple devices example player completes level android phone log copy game android tablet see statistics level progress initial ios version game included single episode entitled poached eggs contained three themed chapters 21 levels time time rovio released free upgrades include additional content new levels new in-game objects even new birds updates released incorporated game full version offered download platform application store first update released february 11 2010 added new episode called mighty hoax containing two new chapters 21 levels updates released april 6 2010 added golden eggs feature placed hidden golden eggs throughout game would unlock bonus content found new episode called danger initially contained single chapter 15 levels two later updates added two chapters danger 15 levels big setup episode released july 18 2010 added new chapter 15 levels additional golden egg levels big setup later given two chapters 15 levels fifth episode called ham 'em high launched december 23 2010 celebration game first year ios app store ham 'em high contained 15 american old west-themed levels single chapter updates february 4 2011 march 18 2011 added one new 15-level chapter ham 'em high also introduced mighty eagle new bird may used per hour clear uncompleted levels mighty eagle also used previously completed levels without once-per-hour limit play mini-game called total destruction player attempts destroy much scenery possible standard birds mighty eagle achieving 100 destruction earns player mighty eagle feather level mighty eagle offered one-time in-game purchase initially available ios app store customers itunes accounts pre-linked credit cards late 2011 rovio also added mighty eagle chrome app version game rovio begun testing android update called bad piggy bank elisa wireless service finland t-mobile allows users charge in-app purchases mighty eagle mobile phone bills service went live android release version 2.2.0 august 2012 using google play transaction system allows mobile billing credit cards allowing android phones wifi-only tablets unlock features version also added powerups facebook version added option pay remove ads allowing android players enjoy game ad-free ios players sixth episode mine dine released june 16 2011 15 new mining-themed levels new golden egg august 24 2011 update expanded mine dine two 15-level chapters seventh update birdday party released december 11 2011 commemorate second anniversary first release ios version itunes app store included 15 new birthday cake-theme levels well updated graphics addition elements spin-off games scoring graphic seen angry birds rio introduction orange bird first appeared angry birds seasons update later released android microsoft windows eighth update released initially ios march 20 2012 lead-up release angry birds space new update included animated tutorial enhanced gameplay new ui graphics first 15 levels surf turf angry birds facebook -exclusive episode see another 15 levels added later ios version receiving power-ups first seen facebook version october 9 2012 final chapter surf turf released along new episode called bad piggies released advertise new rovio game bad piggies another update released december 11 2012 3rd anniversary game release 15 new levels birdday party 15 new levels bad piggies second set 15 levels birdday party introduced pink bird game 15 levels later released bad piggies episode march 7 2013 day final 15 levels released angry birds became free app week apple app store march 14 2013. became instant hit top free app charts app store march 18 2013 app returned normal price 0.99 june 17 2013 rovio teased facebook page red main protagonist game would receive ability new episode june 26 2013 rovio released youtube video uncovering three new facts episode would called red mighty feathers update would come july angry birds app icon would receive new design july 3 2013 update released fifteen levels all-new game play instead knocking pigs castles player goal keep pigs stealing egg leaving playing field pigs arrive waves complicated vehicles available bird red whose new ability target nearest pig score three stars awarded completing three objectives one try first objective finish level without getting egg stolen second pop pigs level third use fewer equal certain number birds clear level people skeptical new gameplay rovio later announced would add levels episode based original level style september 16 2013 rovio added 15 levels episode using original style levels include manual targeting red bird november 26 2013 rovio added 30-level episode called short fuse transforms bomb explosions highly-destructive electrical pulses adds powerup transforms bird bomb bird 3 different potions change pigs december 11 2013 rovio added 15 levels episode birdday party cake 4 celebrate fourth birthday march 4 2014 15 levels added short fuse power-up icons updated july 22 2014 15-level episode called flock favorites inspired fans favorite episodes poached eggs danger mine dine bad piggies red mighty feathers short fuse surf turf added november 23 2014 partnership red apple inc. update app released exclusive ios update added special red -themed golden egg level red power red mighty feathers episode stand-alone power-up purchased used indefinitely 1 use per level 100 money went global fund end aids purchase available december 7 2014 december 11 2014 honor angry birds 5th birthday episode 30 user-inspired levels added june 23 2015 flock favorites added 15 levels inspired previous episodes december 11 2015 honor angry birds 6th birthday new 15 levels added birdday party december 11 2016 honor angry birds seventh birthday 15 levels added birdday party may 16 2017 dual virtual currency system added game currency earned throughout gameplay accrued in-app purchases used purchase power-ups in-game items since initial release nokia n900 multimedia internet device apple iphone ipod touch mobile digital devices rovio released versions angry birds additional devices ipad-exclusive version angry birds hd released ipad mobile digital device april 2010 august 2010 angry birds made available palm pre phone running palm webos operating system app catalog online store symbian^3 phones received version game october 2010 initially includes poached eggs mighty hoax episodes angry birds works kindle fire kindle fire hd may 2010 rovio announced plans version devices using google android operating system beta version released android market google play september 2010 full android version game first released instead getjar october 2010 though subsequently released android market within days rovio officials noted getjar global reach android market getjar availability smartphone platforms including symbian would make cross-platform promotion game easier unlike previous versions angry birds android free ad-supported application paid applications n't available android nations update called bad piggy bank enabled players buy in-game ads october 2010 microsoft suggested one websites windows phone version angry birds development rovio complained microsoft asked permission make statement noting time committed design windows phone version although rovio asked microsoft revise site remove references game windows phone version ultimately released june 2011 near end 2010 rovio stated developing new ports game time devices outside mobile phone market january 2011 three ports launched first sony announced release angry birds playstation portable handheld system form playstation mini game includes nearly 200 levels original game version also playable playstation 3 next rovio announced release windows version game january 4 2011 available sale exclusively intel appup center included 195 levels launch plans exclusive features available smartphone versions one day windows version released mac app store launched one first offerings version angry birds ports angry birds also proposed wii nintendo ds systems former becoming realized angry birds trilogy see 3d-enhanced version game proposed release lg optimus 3d october 2011 popularity angry birds helped spread game devices initially designed gaming machines barnes noble announced future update nook color e-reader let android-based device run applications including port angry birds june 2011 rovio announced plans partner roku include version angry birds new model internet-connected set-top box roku 2 xs may 2011 in-browser html5 version angry birds released beta form game uses webgl canvas distributed chrome web store use google chrome web browser runs webgl- canvas-enabled browser features exclusive content played chrome exclusive levels so-called chrome bombs version includes offline playability features 60 fps gameplay selection graphics settings accommodate variety hardware capabilities october 2011 nokia world 2011 announced angry birds would come preloaded nokia asha series series 40 touch handsets aimed emerging markets india china south africa december 2011 rovio released angry birds hd angry birds seasons hd angry birds rio hd blackberry playbook tablet research motion january 2012 angry birds released devices using bada os february 2012 angry birds made official debut facebook known angry birds friends since may 23 2012 version launched two chapters original game along exclusive surf turf chapter facebook version adds number new power-up items maximum two use per level example power potion power-up formerly known super seeds make launched bird larger thus powerful king sling power-up makes slingshot stronger able launch birds higher faster power-ups purchased in-game given friends also play game surf turf would later included original mobile versions game starting ios facebook version features weekly tournaments among friends top 3 winners earning free in-game bird coins used purchase power-ups unique green day themed episode facebook version game however removed december 2012 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds two spin-off games angry birds seasons angry birds rio playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respective consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals trilogy also ported wii wii u almost year later motion controlled version game also released samsung smart tv app reviews angry birds mostly acclaimed critics chris holt macworld called game addictive clever challenging puzzler pocket gamer keith andrew said angry birds nugget puzzling purity dished relish aplenty jonathan liu wired news wrote going maximum number stars certainly adds lot replay value fairly extensive game reviews first versions game use touch-screen playstation 3/psp version windows version also positive disagreement different interfaces greenwald pc magazine review playstation network version said control scheme platforms good 're nearly satisfying touch-screen controls found smartphone versions playstation 3 version appeared blocky unpleasant like smartphone screen blown hdtv size conversely greg miller ign preferred analog control setup psp version saying offered tiny variances control n't feel like get fat finger screen giving game positive review miller concluded denying angry birds fun could use polish – sharper visuals better price smoother action damien mcferrin british website electric pig reviewed pc version saying mouse-driven control method showcases many distinct advantages finger-focused counterpart angry birds also described critically impossible understand playing rules criteria game critic chris schiller eurogamer.net contemptuous attitude towards players keeping frustrated enough switch play something else instead angry birds became top-selling paid application apple uk app store february 2010 reached top spot us app store weeks later remained october 2010 since release free limited version angry birds downloaded 11 million times apple ios full-featured paid version downloaded nearly 7 million times september 2010 android version game downloaded 1 million times within first 24 hours release even though site crashed one point due load 2 million downloads first weekend rovio receives approximately us 1 million per month revenue advertising appears free android version according rovio players logged 5 million hours game time day across platforms series 200 million monthly active users may 2012 november 2010 digital trends stated 36 million downloads angry birds one mainstream games right msnbc video game news blog written n game app comes close following christian science monitor remarked angry birds one great runaway hits 2010 december 2010 honor one-year anniversary release angry birds rovio mobile announced game downloaded 50 million times 12 million ios devices 10 million android january 2014 angry birds series reached 2 billion downloads including angry birds angry birds seasons angry birds rio angry birds space angry birds star wars ii angry birds go christmas day 2011 alone 6.5 million copies various angry birds games downloaded across supported platforms history apple app store angry birds holds record days top paid apps chart spent total 275 days no.1 position angry birds rio no.1 total 23 days ranking ninth list apple itunes rewind list popular itunes store media 2011 angry birds top-selling paid iphone/ipod app app store free version fourth-most downloaded game two special-edition versions angry birds seasons angry birds rio also ranked top 10 paid iphone/ipod apps ipad-exclusive angry birds hd versions top-selling top-downloaded ipad apps year mattel also made board games based app called angry birds knock wood angry birds thin ice angry birds mega smash february 2010 angry birds nominee best casual game award 6th annual international mobile gaming awards barcelona spain september 2010 ign named angry birds fourth best iphone game time april 2011 angry birds best game app app year uk appy awards 2011 webby awards angry birds awarded best game handheld devices | [
9408,
10080,
3300,
9605,
231,
9063,
8937,
3626,
6539,
2285,
6797,
1776,
10480,
1619,
57,
1083,
8413
] | None |
9,606 | 3 | TIM-600:tim-600 tim-600 important pc computer system series tim microcomputers mihajlo pupin institute-belgrade developed 1987-1988 see ref.lit 1 2 6 based intel microprocessor types 80386 80387 word-length 32 bits basic cycle time 20 mhz operating system unix v.3 ref.lit. 3 6 computer system tim-600 exposed munich international computer exhibition september 1988 fig.1 tim designers tim-600 architecture based three system buses 32 16 8-bits respectively cpu performs 5,000.000 simple operations per second primary memory ram 8 x 2 mb capacity max eight tim terminals equipment units max connected rs-232c centronics types interface used line printers also possibilities connections two hard disks well magnetic cassettes diskettes tim-600 uses programming languages c++ fortran cobol basic pascal data base management performed informix oracle software ref.lit 4 5 6 computer system tim-600 used business data processing many offices serbia example public health scientific organizations process automation industrial production road traffic control banks military government services etc | [
6859,
8524,
10635,
7983,
7665,
10356,
3960
] | Test |
9,607 | 4 | List_of_computer_security_certifications:list computer security certifications credentialing process establishing qualifications licensed professionals organizational members organizations assessing background legitimacy computer security information security fields number tracks professional take demonstrate qualifications four sources categorizing many credentials licenses certifications quality acceptance vary worldwide security credentials well-known high quality examples like master degree field accredited school cissp microsoft certification controversial list many dozens lesser known credentials organizations addition certification obtained taking courses and/or passing exams case cissp others noted demonstrating experience and/or recommended given reference existing credential holder award certificates also given winning government university industry sponsored competitions including team competitions contests scope note article certification credentialing individuals include certification organizations classified computer systems authorizing accrediting approval bodies authorities meeting prescribed set safeguards | [
5636,
10756,
9356,
8462,
3473,
5010,
8978,
10392,
5373,
5246,
4892,
5404,
2975,
2213,
8613,
8998,
939,
3629,
9646,
7855,
1970,
6834,
5433,
7739,
316,
3262,
9791,
10307,
3525,
7368,
9160,
1493,
9688,
6105,
7515,
8668,
10717,
357,
3941,
637... | Test |
9,608 | 9 | B32_Business_Basic:b32 business basic b32 business basic competitor data general business basic written murray haszard 1986 ran data general eclipse mv line computers initially ported unix 1989 dos 1991 b32 software company developed supported b32 business basic original site auckland new zealand supplemented sales support centre blue ash ohio b32 interpreter highly compatible data general business basic dgbb also enhanced extended language many ways like dgbb b32 could access data general infos ii database could use dgbb lock server improved version b32 twice fast number crunching string manipulation disk i/o many internal restrictions dgbb removed b32 allowed 32,767 line numbers 65,535 later versions compared dgbb 9,999 b32 allowed memory programs simultaneous locks files open language enhancements included high-speed internal sort routine do-while blocks ability step backwards indexed file debugging facilities also significantly improved dgbb b32 allowed programs run full cursor positioning attribute support non-data general terminals even programs data general control sequences hard-coded b32 carried arithmetic quad precision i.e 64-bit emulated triple precision double precision versions dgbb runtime avoided subtle incompatibilities two versions dgbb unix dos b32 emulated commonly used system calls data general aos/vs rdos operating systems including implementing symbolic links sco xenix dos 1991 features war b32 one competitors transoft universal business basic saw major improvements b32 language b32 added bluebird business basic emulation mode made line numbers optional added subroutine calls name parameter passing transoft greater financial resources b32 effective marketing purchased b32 1992 dos unix versions b32 discarded universal business basic ran operating systems eclipse mv version b32 continued sold mv line lasted b32 software staff blue ash moved transoft atlanta georgia office new zealand staff went found binary research | [
6787,
5492,
8999
] | Train |
9,609 | 2 | Windows_RSS_Platform:windows rss platform windows rss platform included internet explorer 7 later windows vista later platform exposes feed handling management windows applications rss support internet explorer built windows rss platform windows rss platform consists three components start | [
10243,
10769,
9234,
1043,
6171,
1055,
7713,
2083,
8227,
1577,
10282,
4143,
9263,
11316,
1077,
8246,
10808,
1098,
4174,
9808,
4178,
9813,
8281,
603,
2145,
9328,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
651,
5259,
653,
3224,
4771,
7... | Test |
9,610 | 2 | Android_Jelly_Bean:android jelly bean android jelly bean tenth version android codename given three major point releases android mobile operating system developed google spanning versions 4.1 4.3.1 operating systems run android 4.3/4.4 asus nexus 7 2013 first three 4.1 unveiled google i/o developer conference june 2012 focusing performance improvements designed give operating system smoother responsive feel improvements notification system allowing expandable notifications action buttons internal changes two releases made jelly bean name october 2012 july 2013 respectively including 4.2—which included optimizations multi-user support tablets lock screen widgets quick settings screen savers 4.3—contained improvements updates underlying android platform jelly bean versions longer supported google statistics issued google indicate 3.2 android devices accessing google play run jelly bean android 4.1 jelly bean first unveiled google i/o developer conference june 27 2012 focus delightful improvements platform user interface along improvements google search experience platform knowledge graph integration new digital assistant google unveiling asus-produced nexus 7 tablet unveiling nexus q media player jelly bean work made optimizing operating system visual performance responsiveness series changes referred project butter graphical output triple buffered vsync used across drawing operations cpu brought full power touch input detected—preventing lag associated inputs made processor low-power state changes allow operating system run full 60 frames per second capable hardware following 4.1 two android releases made jelly bean codename releases focused primarily performance improvements changes android platform contained relatively user-facing changes alongside android 4.1 google also began decouple apis services android new system-level component known google play services serviced google play store allows addition certain forms functionality without distribute upgrade operating system addressing infamous fragmentation problems experienced android ecosystem attendees google i/o conference given nexus 7 tablets pre-loaded android 4.1 galaxy nexus smartphones could upgraded 4.1 google announced intent release 4.1 updates existing nexus devices motorola xoom tablet mid-july android 4.1 upgrade released general public gsm galaxy nexus models july 10 2012 late 2012 following official release jelly bean number third-party android oems began prepare distribute updates 4.1 existing smartphones tablets including devices acer htc lg motorola samsung sony toshiba august 2012 nightly builds aftermarket firmware cyanogenmod based 4.1 branded cyanogenmod 10 began released selected devices including nexus devices nexus galaxy nexus samsung galaxy galaxy ii galaxy tab 2 7.0 motorola xoom asus transformer october 29 2012 google unveiled android 4.2 dubbed sweeter tasting jelly bean alongside accompanying launch devices nexus 4 nexus 10 firmware updates nexus 7 galaxy nexus released november 2012 android 4.3 subsequently released july 24 2013 via firmware updates galaxy nexus 2012 nexus 7 nexus 4 nexus 10 visually jelly bean interface reflects refinement holo appearance introduced android 4.0 default home screen jelly bean received new features ability shortcuts widgets home screen page re-arrange fit item moved resized notification system also improved addition expandable actionable notifications individual notifications display additional content action buttons call back message missed call accessible dragging open notification two finger gesture notifications also disabled individually per-app android 4.2 added additional features user interface lock screen swiped left display widget pages swiped right go camera pane quick settings toggles feature often seen oem android skins also added notification area—accessible either swiping two fingers phones swiping top-right edge screen tablets pressing button top-right corner notifications pane previous browser application officially deprecated 4.2 favor google chrome android 4.2 also adds gesture typing keyboard redesigned clock app new screen saver system known daydreams tablets android 4.2 also supports multiple users promote consistency device classes android tablets use expanded version interface layout home screen used phones default centered navigation keys status bar across top changes took effect small tablets nexus 7 4.1 larger tablets 4.2 small tablets android optimized primarily use portrait vertical orientation giving apps expanded versions layouts used phones used landscape horizontal orientation apps adjust widescreen-oriented layouts seen larger tablets large tablets navigation buttons previously placed bottom-left bar along bottom screen clock notification area bottom-right developers 4.1 also added new accessibility apis expanded language support bi-directional text support user-supplied keymaps support managing external input devices video game controllers support multichannel usb gapless audio new media routing api low-level access hardware software audio video codecs dns-based service discovery pre-associated service discovery wi-fi android beam also used initiate bluetooth file transfers near-field communication android 4.2 added rewritten bluetooth stack changing previous bluez stack gpl originated qualcomm rewritten broadcom open source stack called bluedroid new stack initially considered immature promised several forward-looking benefits including improved support multiple displays support miracast native right-to-left support updated developer tools accessibility improvements zooming gestures number internal security improvements always-on vpn support app verification new nfc stack added time android 4.3 consisted low-level changes including bluetooth low energy avrcp support selinux opengl es 3.0 new digital rights management drm apis ability apps read notifications vp8 encoder improvements android 4.3 also included hidden privacy feature known app ops allowed users individually deny permissions apps however feature later removed android 4.4.2 google spokesperson stated feature experimental could prevent certain apps functioning correctly used certain ways concept revisited basis redesigned notifications system android 6.0 | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
10284,
5677,
1083,
6212,
69,
2630,
8262,
4683,
4685,
11343,
3664,
8280,
8285,
2658,
8821,
11391,
11396,
1670,
9863,
7816,
5262,
10393,
8858,
7835,
673,
8870,
1191,
11430,
1203,
7359,
1728,
9923,
... | Train |
9,611 | 3 | Penryn_(microarchitecture):penryn microarchitecture intel tick-tock cycle 2007/2008 tick shrink core microarchitecture 45 nanometers cpuid model 23 core 2 processors used code names penryn socket p wolfdale lga 775 yorkfield mcm lga 775 also sold celeron pentium xeon processors xeon brand wolfdale-dp harpertown code names used lga 771 based mcms two four active wolfdale cores architectural improvements 65 nanometer core 2 cpus include new divider reduced latency new shuffle engine sse4.1 instructions enabled new single-cycle shuffle engine maximum l2 cache size per chip increased 4 6 mb l2 associativity increased 16-way 24-way cut-down versions 3 mb l2 also exist commonly called penryn-3m wolfdale-3m well yorkfield-6m respectively single-core version penryn listed penryn-l separate model like merom-l version penryn-3m model one active core processors core microarchitecture categorized number cores cache size socket combination unique code name product code used across number brands instance code name allendale product code 80557 two cores 2 mb l2 cache uses desktop socket 775 marketed celeron pentium core 2 xeon different sets features enabled mobile desktop processors come two variants differ size l2 cache specific amount l2 cache product also reduced disabling parts production time wolfdale-dp quad-core processors except dunnington qc multi-chip modules combining two dies 65 nm processors product code shared processors different dies specific information one used derived stepping model 23 cpuid 01067xh intel started marketing stepping full 6 mib reduced 3 mib l2 cache time giving identical cpuid values steppings new sse4.1 instructions stepping c1/m1 bug fix version c0/m0 specifically quad core processors used stepping e0/r0 adds two new instructions xsave/xrstor replaces earlier steppings mobile processors stepping c0/m0 used intel mobile 965 express santa rosa refresh platform whereas stepping e0/r0 supports later intel mobile 4 express montevina platform model 29 stepping a1 cpuid 106d1h adds l3 cache well six instead usual two cores leads unusually large die size 503 mm² february 2008 found way high-end xeon 7400 series dunnington | [
3459,
5380,
3973,
8325,
9095,
5386,
4108,
9741,
5649,
7313,
5523,
6804,
8851,
4886,
9111,
3352,
5883,
6175,
2088,
2604,
10669,
9391,
6192,
10675,
4276,
1461,
10548,
2237,
5309,
8125,
8126,
7105,
6339,
5444,
9541,
1998,
2638,
977,
5073,
58... | Validation |
9,612 | 2 | Windows_Advanced_Rasterization_Platform:windows advanced rasterization platform windows advanced rasterization platform warp software rasterizer component directx graphics runtime windows 7 later available windows vista windows server 2008 platform update windows vista warp used compatible hardware available kernel mode applications headless environment remote rendering direct2d/directwrite remote desktop connection clients warp full-featured direct3d 10.1 renderer device performance par current low-end graphics cards intel gma 3000 running multi-core cpus achieve level rendering performance warp employs advanced techniques just-in-time compilation x86 machine code support advanced vector extensions sse2 sse4.1 warp supports direct3d 11 runtime compatible feature levels 10_1 10_0 9_3 9_2 9_1 direct3d 11.1 runtime warp additionally supports feature levels 11_0 11_1 windows 8 warp provides functionality microsoft basic render driver replaces kernel-mode vga driver windows 8.1 warp updated support feature level 11_1 tiled resources windows 10 warp updated support direct3d 12 feature level 12_1 direct3d 12 warp also replaces reference rasterizer | [
5761,
10243,
9348,
5765,
10886,
2183,
9609,
5386,
651,
5259,
653,
6797,
6927,
9234,
1043,
3224,
5401,
5913,
5119,
11546,
10654,
1055,
4384,
8607,
8609,
2083,
4771,
8227,
2854,
7846,
10024,
1577,
10026,
10029,
10414,
4143,
9263,
11570,
8246,... | Test |
9,613 | 7 | Deutsche_Börse_Cloud_Exchange_AG:deutsche börse cloud exchange ag deutsche börse cloud exchange ag dbce joint venture established may 2013 deutsche börse ag zimory gmbh operates international marketplace buying selling cloud resources users marketplace either cover additional storage computing requirements offer iaas capacities begin february 2016 dbce publicly announced discontinuing operations march 2016 website www.cloud.exchange following message deutsche börse cloud exchange discontinues operations dear visitor shareholders deutsche börse cloud exchange decided cease operations marketplace evaluating business model approach company ended registration new users marketplace january 18 existing contracts fulfilled expire accordance individual agreements public marketplace scheduled retired march 2016 thank interest cooperation support please contact us directly case questions dbce team vendor-agnostic iaas marketplace dbce functions neutral intermediary cloud providers cloud users marketplace providers offer infrastructure resources cpu storage ram service side buyers opportunity search buy subsequently use appropriate iaas offers providers access marketplace reserved companies open private individuals marketplace dbce platform worldwide iaas resources compared purchased used paid standardized basis makes individual offers providers directly comparable creating transparency buyer 2013 dbce established joint venture deutsche börse ag zimory gmbh beginning 2014 marked beta launch cloud marketplace various providers already linked services marketplace official launch marketplace may 20 2015 start five providers various european countries offered iaas resources via dbce contrast marketplaces cloud services dbce seeks make available vendor-agnostic cloud resources procured via marketplace means system behind trading platform offers central interface api standard cloud technologies enables provision purchased resources independent technologies used customers therefore enables companies liberate proprietary systems order guarantee quality security services dbce cooperation tüv rheinland developed special testing procedure providers prerequisite access marketplace existing suppliers marketplace annual review various parameters conducted including performance services offered well modifications storage location servers marketplace based consistent standardization concept addition standardized seek buy procedure agreements buyers dbce standardized well intended accelerate normally drawn-out contract negotiations providers users cloud sector dbce acts controlling entity thus ensures certain security compliance procedures always upheld services traded via marketplace also standardized order enable comparison individual provider offers storage available blocks 100 gigabytes memory gibibytes compute resources dbce introduced performance unit pu dbce differentiates cloud providers different cpu offers normally difficult compare dbce specifies pu defined standard cpu offers marketplace means matter provider buyer procuring cpu resources via marketplace pu always delivers comparable performance independent underlying hardware dbce 49 employees comprising experts cloud computing industry financial sector members management board deutsche börse cloud exchange ag randolf roth maximilian ahrens | [
4429
] | Test |
9,614 | 8 | CakePHP:cakephp cakephp open-source web framework follows model–view–controller mvc approach written php modeled concepts ruby rails distributed mit license cakephp uses well-known software engineering concepts software design patterns convention configuration model–view–controller active record association data mapping front controller cakephp started april 2005 polish programmer michal tatarynowicz wrote minimal version rapid application development framework php dubbing cake published framework mit license opened online community developers december 2005 l. masters g. j. woodworth founded cake software foundation promote development related cakephp version 1.0 released may 2006 one project inspirations ruby rails using many concepts community since grown spawned several sub-projects october 2009 project manager woodworth developer n. abele resigned project focus projects including lithium web framework previously part cakephp project remaining development team continued focus original roadmap previously defined cake software foundation operates annual conference focusing cakephp called cakefest initially held bi-annual event 2008 | [
1920,
3462,
5255,
3080,
8582,
1034,
6154,
2062,
2576,
148,
1812,
6941,
9245,
10526,
2465,
7074,
8739,
3876,
4777,
7210,
2348,
5165,
7983,
4529,
7987,
692,
8883,
5048,
6074,
190,
6338,
9666,
2372,
8644,
1353,
4171,
210,
595,
84,
11221,
4... | Test |
9,615 | 4 | Index_of_coincidence:index coincidence cryptography coincidence counting technique invented william f. friedman putting two texts side-by-side counting number times identical letters appear position texts count either ratio total normalized dividing expected count random source model known index coincidence ic short index coincidence provides measure likely draw two matching letters randomly selecting two letters given text chance drawing given letter text number times letter appears length text chance drawing letter without replacement appearances 1 text length 1 product two values gives chance drawing letter twice row one find product letter appears text sum products get chance drawing two kind probability normalized multiplying coefficient typically 26 english express index coincidence ic given letter-frequency distribution summation n length text n n frequencies integers c letters alphabet c 26 monocase english sum n necessarily n products count number combinations n elements taken two time actually counts pair twice extra factors 2 occur numerator denominator formula thus cancel n occurrences -th letter matches remaining occurrences letter total letter pairs entire text 1/ c probability match pair assuming uniform random distribution characters null model see thus formula gives ratio total number coincidences observed total number coincidences one would expect null model expected average value ic computed relative letter frequencies source language letters alphabet equally probable expected index would 1.0 actual monographic ic telegraphic english text around 1.73 reflecting unevenness natural-language letter distributions sometimes values reported without normalizing denominator example english values may called κ kappa-plaintext rather ic κ kappa-random used denote denominator expected coincidence rate uniform distribution alphabet english index coincidence useful analysis natural-language plaintext analysis ciphertext cryptanalysis even ciphertext available testing plaintext letter identities disguised coincidences ciphertext caused coincidences underlying plaintext technique used cryptanalyze vigenère cipher example repeating-key polyalphabetic cipher arranged matrix coincidence rate within column usually highest width matrix multiple key length fact used determine key length first step cracking system coincidence counting help determine two texts written language using alphabet technique used examine purported bible code causal coincidence count texts distinctly higher accidental coincidence count texts different languages texts using different alphabets gibberish texts see imagine alphabet two letters b suppose language letter used 75 time letter b used 25 time two texts language laid side side following pairs expected overall probability coincidence 62.5 56.25 aa 6.25 bb consider case messages encrypted using simple monoalphabetic substitution cipher replaces b vice versa overall probability coincidence situation 62.5 6.25 aa 56.25 bb exactly unencrypted plaintext case effect new alphabet produced substitution uniform renaming original character identities affect whether match suppose one message say second encrypted using substitution cipher b → b following pairs expected probability coincidence 37.5 18.75 aa 18.75 bb noticeably lower probability same-language same-alphabet texts used evidently coincidences likely frequent letters text principle applies real languages like english certain letters like e occur much frequently letters—a fact used frequency analysis substitution ciphers coincidences involving letter e example relatively likely two english texts compared coincidence count higher english text foreign-language text used easily imagined effect subtle example similar languages higher coincidence count dissimilar languages also n't hard generate random text frequency distribution similar real text artificially raising coincidence count nevertheless technique used effectively identify two texts likely contain meaningful information language using alphabet discover periods repeating keys uncover many kinds nonrandom phenomena within among ciphertexts expected values various languages description introduction use index coincidence related general concept correlation various forms index coincidence devised delta i.c given formula effect measures autocorrelation single distribution whereas kappa i.c used matching two text strings although applications constant factors formula_4 formula_5 ignored general situations considerable value truly indexing i.c value expected null hypothesis usually match uniform random symbol distribution every situation expected value correlation 1.0 thus form i.c expressed ratio number coincidences actually observed number coincidences expected according null model using particular test setup foregoing easy see formula kappa i.c formula_5 common aligned length two texts b bracketed term defined 1 formula_8-th letter text matches formula_8-th letter text b otherwise 0 related concept bulge distribution measures discrepancy observed i.c null value 1.0 number cipher alphabets used polyalphabetic cipher may estimated dividing expected bulge delta i.c single alphabet observed bulge message although many cases repeating key used better techniques available practical illustration use i.c. suppose intercepted following ciphertext message suspecting english plaintext encrypted using vigenère cipher normal a–z components short repeating keyword consider ciphertext stacked number columns example seven key size happens assumed number columns letters within single column enciphered using key letter effect simple caesar cipher applied random selection english plaintext characters corresponding set ciphertext letters roughness frequency distribution similar english although letter identities permuted shifted constant amount corresponding key letter therefore compute aggregate delta i.c columns delta bar around 1.73 hand incorrectly guessed key size number columns aggregate delta i.c around 1.00 compute delta i.c assumed key sizes one ten see key size likely five actual size five would expect width ten also report high i.c. since columns also corresponds simple caesar encipherment confirm stack ciphertext five columns try determine likely key letter column considered separately performing trial caesar decryption entire column 26 possibilities a–z key letter choosing key letter produces highest correlation decrypted column letter frequencies relative letter frequencies normal english text correlation n't need worry normalizing readily computed formula_11 observed column letter frequencies formula_12 relative letter frequencies english try best-fit key letters reported codice_1 recognize actual word using vigenère decryption produces plaintext one obtains word divisions restored obvious positions codice_2 evidently null characters used pad final group transmission entire procedure could easily packaged automated algorithm breaking ciphers due normal statistical fluctuation algorithm occasionally make wrong choices especially analyzing short ciphertext messages | [
8674,
4007,
6599,
3629,
5487,
6928,
1105,
9617,
1941
] | Test |
9,616 | 8 | Varnish_(software):varnish software varnish http accelerator designed content-heavy dynamic web sites well apis contrast web accelerators squid began life client-side cache apache nginx primarily origin servers varnish designed http accelerator varnish focused exclusively http unlike proxy servers often support ftp smtp network protocols varnish used websites including wikipedia online newspaper sites new york times guardian gulf news hindu corriere della sera social media content sites facebook twitter reddit spotify vimeo tumblr 2012 5 top 10,000 sites web used software project initiated online branch norwegian tabloid newspaper verdens gang architect lead developer danish independent consultant poul-henning kamp well-known freebsd core developer management infrastructure additional development originally provided norwegian linux consulting company linpro support management development varnish later spun separate company varnish software varnish free open source software available two-clause bsd license commercial support available varnish software amongst others version 1.0 varnish released 2006 varnish 2.0 2008 varnish 3.0 2011 varnish 4.0 2014 varnish 5.0 2016 varnish 6.0 march 2018 varnish stores data virtual memory leaves task deciding stored memory gets paged disk operating system helps avoid situation operating system starts caching data moved disk application varnish heavily threaded client connection handled separate worker thread configured limit number active worker threads reached incoming connections placed overflow queue queue reaches configured limit incoming connections rejected principal configuration mechanism varnish configuration language vcl domain-specific language dsl used write hooks called critical points handling request policy decisions left vcl code making varnish configurable adaptable http accelerators vcl script loaded translated c compiled shared object system compiler loaded directly accelerator thus reconfigured without restart number run-time parameters control things maximum minimum number worker threads various timeouts etc command-line management interface allows parameters modified new vcl scripts compiled loaded activated without restarting accelerator order reduce number system calls fast path minimum log data stored shared memory task monitoring filtering formatting writing log data disk delegated separate application varnish designed reduce contention threads minimum authors claim performance good system pthreads implementation additionally slow malloc implementation like ones microsoft windows msvcrt may add unnecessary contention thereby limit performance hence general recommendation running varnish linux unix based environments varnish cache speed information delivery factor several hundred ensure proper operation performance varnish exposes metrics monitored following areas varnish cache ships monitoring logging tools one used varnishstat gives detailed snapshot varnish ’ current performance provides access in-memory statistics cache hits misses resource consumption threads created running varnishstat command line returns continuously updating list available varnish metrics -1 flag added varnishstat exit printing list one time varnishstat used standalone tool spot-check health cache order graph metrics time correlate statistics across infrastructure set alerts problems may arise monitoring services integrate varnish collect varnishstat metrics varnishlog tool used debug tune varnish configuration provides detailed information individual request varnish supports load balancing using round robin random director per-backend weighting basic health-checking backends also available varnish cache also features | [
2060,
6797,
11539,
2339,
3237,
7983,
9909,
823,
64,
7364,
9926,
1223,
4561,
9306,
4186,
865,
9320,
6894,
5492,
4725,
2045
] | Test |
9,617 | 4 | Frequency_analysis:frequency analysis cryptanalysis frequency analysis also known counting letters study frequency letters groups letters ciphertext method used aid breaking classical ciphers frequency analysis based fact given stretch written language certain letters combinations letters occur varying frequencies moreover characteristic distribution letters roughly almost samples language instance given section english language samp e /samp samp /samp samp /samp samp /samp common samp z /samp samp q /samp samp x /samp rare likewise samp th /samp samp er /samp samp /samp samp /samp common pairs letters termed bigrams digraphs samp ss /samp samp ee /samp samp tt /samp samp ff /samp common repeats nonsense phrase etaoin shrdlu represents 12 frequent letters typical english language text ciphers properties natural language plaintext preserved ciphertext patterns potential exploited ciphertext-only attack simple substitution cipher letter plaintext replaced another particular letter plaintext always transformed letter ciphertext instance occurrences letter samp e /samp turn letter samp x /samp ciphertext message containing numerous instances letter samp x /samp would suggest cryptanalyst samp x /samp represents samp e /samp basic use frequency analysis first count frequency ciphertext letters associate guessed plaintext letters samp x /samp ciphertext anything else suggests samp x /samp corresponds samp e /samp plaintext certain samp /samp samp /samp also common english samp x /samp might either also unlikely plaintext samp z /samp samp q /samp less common thus cryptanalyst may need try several combinations mappings ciphertext plaintext letters complex use statistics conceived considering counts pairs letters bigrams triplets trigrams done provide information cryptanalyst instance samp q /samp samp u /samp nearly always occur together order english even though samp q /samp rare suppose eve intercepted cryptogram known encrypted using simple substitution cipher follows example uppercase letters used denote ciphertext lowercase letters used denote plaintext guesses samp x /samp samp /samp used express guess ciphertext letter samp x /samp represents plaintext letter samp /samp eve could use frequency analysis help solve message along following lines counts letters cryptogram show samp /samp common single letter samp xl /samp common bigram samp xli /samp common trigram samp e /samp common letter english language samp th /samp common bigram samp /samp common trigram strongly suggests samp x /samp samp /samp samp l /samp samp h /samp samp /samp samp e /samp second common letter cryptogram samp e /samp since first second frequent letters english language samp e /samp samp /samp accounted eve guesses samp e /samp samp /samp third frequent letter tentatively making assumptions following partial decrypted message obtained using initial guesses eve spot patterns confirm choices samp /samp moreover patterns suggest guesses samp rtate /samp might samp state /samp would mean samp r /samp samp /samp similarly samp atthattmze /samp could guessed samp atthattime /samp yielding samp /samp samp /samp samp z /samp samp /samp furthermore samp heve /samp might samp /samp giving samp v /samp samp r /samp filling guesses eve gets turn guesses suggest still others example samp remara /samp could samp remark /samp implying samp /samp samp k /samp relatively straightforward deduce rest letters eventually yielding plaintext point would good idea eve insert spaces punctuation example gold-bug eve guesses correct would always case however variation statistics individual plaintexts mean initial guesses incorrect may necessary backtrack incorrect guesses analyze available statistics much depth somewhat simplified justifications given example also possible plaintext exhibit expected distribution letter frequencies shorter messages likely show variation also possible construct artificially skewed texts example entire novels written omit letter samp e /samp altogether — form literature known lipogram first known recorded explanation frequency analysis indeed kind cryptanalysis given 9th century al-kindi arab polymath manuscript deciphering cryptographic messages suggested close textual study qur'an first brought light arabic characteristic letter frequency use spread similar systems widely used european states time renaissance 1474 cicco simonetta written manual deciphering encryptions latin italian text arabic letter frequency detailed study letter word frequency analysis entire book qur'an provided intellaren articles several schemes invented cryptographers defeat weakness simple substitution encryptions included disadvantage attempts defeat frequency counting attacks increases complication enciphering deciphering leading mistakes famously british foreign secretary said rejected playfair cipher even school boys could cope successfully wheatstone playfair shown attachés could never learn rotor machines first half 20th century example enigma machine essentially immune straightforward frequency analysis however kinds analysis attacks successfully decoded messages machines frequency analysis requires basic understanding statistics plaintext language problem solving skills performed hand tolerance extensive letter bookkeeping world war ii wwii british americans recruited codebreakers placing crossword puzzles major newspapers running contests could solve fastest several ciphers used axis powers breakable using frequency analysis example consular ciphers used japanese mechanical methods letter counting statistical analysis generally ibm card type machinery first used world war ii possibly us army sis today hard work letter counting analysis replaced computer software carry analysis seconds modern computing power classical ciphers unlikely provide real protection confidential data frequency analysis described fiction edgar allan poe gold-bug sir arthur conan doyle sherlock holmes tale adventure dancing men examples stories describe use frequency analysis attack simple substitution ciphers cipher poe story encrusted several deception measures literary device anything significant cryptographically | [
8674,
11241,
3694,
5487,
6223,
1105,
6578,
8978,
2580,
1941,
9615,
3323
] | None |
9,618 | 9 | FarCry_CMS:farcry cms farcry cms popular open-source content management system cfml built farcry core addition standard cms features menu management system administration page layout customization farcry features also include farcry framework actively maintained daemon internet consultants | [
4512,
5314,
8739,
9666,
102,
5612,
3469,
7983,
4529,
148,
7862,
3895,
5048,
9144,
4507
] | Test |
9,619 | 2 | IBM_8100_DPCX:ibm 8100 dpcx dpcx distributed processing control executive operating system ibm 8100 small computer system ibm hoped would help installed base ibm 3790 customers migrate 8100 dppx operating system mainly deployed support word processing system distributed office support facility dosf derived earlier ibm 3730 word processing system like dppx written pl/s-like pl/ds language applications including much dosf however written interpreted language compiled using system/370 assembler macro facility 8100/dpcx/dosf system first type distributed system connect ibm distributed office support system disoss running data host later versions disoss relied sna distribution system snads eventually became peer-to-peer communication documents complied document interchange architecture dia document content architecture dca types distributed system gained disoss support – scanmaster displaywriter 5520 office system | [
2179,
4996,
6148,
10883,
7053,
11673,
6557,
3359,
10273,
6442,
7983,
9139,
6325,
573,
8640,
1219,
964,
6342,
8262,
863,
3938,
5603,
868,
3429,
5220,
6503,
9829,
375,
2168,
3323,
2172,
2813
] | Test |
9,620 | 2 | Workgroup_(computer_networking):workgroup computer networking workgroup microsoft term peer-to-peer local area network computers running microsoft operating systems workgroup may share files printers internet connection workgroup contrasts domain computers rely centralized authentication | [
2432,
8640,
7847,
651,
6797,
238,
7983,
8080,
601
] | Train |
9,621 | 2 | Carrier_Grade_Linux:carrier grade linux carrier grade linux cgl set specifications detail standards availability scalability manageability service response characteristics must met order linux kernel-based operating system considered carrier grade i.e ready use within telecommunications industry term particularly applicable telecom converges technically data networks commercial off-the-shelf commoditized components blade servers carrier-grade term public network telecommunications products require 5 nines 6 nines 99.999 99.9999 percent availability translates downtime per year 30 seconds 6 nines 5 minutes 5 nines term 5 nines usually associated carrier-class servers 6 nines usually associated carrier-class switches primary motivation behind cgl effort present open architecture alternative closed proprietary software proprietary hardware systems currently used telecommunication systems proprietary systems monolithic hardware software applications integrated tightly operate well unit however hard maintain scale telecommunications companies utilize services vendor even relatively minor enhancements system cgl seeks progressively reduce eliminate dependence proprietary systems provide path easy deployment scalability utilizing cheap cots systems assemble telecommunications system cgl effort started open source development lab cgl working group specification combined linux foundation latest specification release cgl 5.0 several cgl-registered linux distributions exist including montavista wind river systems red flag linux osdl cglwg defines three main types applications carrier-grade linux support — gateways signaling servers management | [
4616,
3082,
5139,
10780,
10785,
6180,
8242,
9266,
4161,
8772,
6213,
8268,
589,
593,
3168,
6244,
5222,
10856,
4207,
7802,
5244,
4734,
11391,
7812,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
1694,
2723,
11428,
8364,
10933,
5815,
5822,
5824,
... | Test |
9,622 | 9 | Trace_scheduling:trace scheduling trace scheduling optimization technique developed josh fisher used compilers computer programs compiler often rearranging generated machine instructions faster execution improve program performance increases ilp instruction level parallelism along important execution path statically predicting frequent execution path trace scheduling one many known techniques trace sequence instructions including branches including loops executed input data trace scheduling uses basic block scheduling method schedule instructions entire trace beginning trace highest frequency adds compensation code entry exit trace compensate effects order execution may result large increases code sizes poor erratic performance program behavior varies significantly input trace scheduling originally developed long instruction word vliw machines form global code motion works converting loop long straight-line code sequence using loop unrolling static branch prediction process separates unlikely code adds handlers exits trace goal common case executed sequential set instructions without branches | [
8262,
6818,
2620,
5948
] | Test |
9,623 | 9 | Unreferenced_variable:unreferenced variable unreferenced variable source code computer program variable defined never used may result harmless waste memory many compilers detect variables allocate storage i.e. optimize away storage generally also issuing warning coding guideline documents consider unreferenced variable symptom potential coding fault hand unreferenced variables used temporary placeholders indicate expected future developments code c example j unreferenced variable | [
1952,
2045
] | Test |
9,624 | 4 | Corporate_Emergency_Access_System:corporate emergency access system corporate emergency access system ceas credentialing program united states company critical employees event disaster serious emergency employees show ceas id cards first responders admitted business location ceas helps businesses mitigate damage loss resulting allowing rapid access restricted areas ceas helps businesses mitigate damage loss allowing critical employees rapid access restricted areas allows rapidly recover essential operations retrieve assets securities valuables vital records computer hardware critical equipment core systems also conduct damage assessments ceas developed new york state 1990s business network emergency resources not-for-profit organization pioneered emergency-identification-card-based capability ceas access system adopted boston cambridge massachusetts chester county philadelphia pennsylvania erie nassau suffolk counties new york new york city baltimore stamford connecticut order businesses enroll ceas local municipalities must adopt ceas program receive id cards local authorities implement ceas following emergency immediate threats life stabilized participating businesses select pre-determined number employees receive ceas access id cards based total employee population | [] | Test |
9,625 | 2 | XigmaNAS:xigmanas xigmanas network-attached storage nas server software dedicated management web interface written php free software terms simplified bsd license xigmanas continuation original freenas code developed 2005 late 2011 released name nas4free 22 march 2012 name changed xigmanas july 2018 sourceforge elected “ 'community choice project month ” twice august 2015 march 2017 respectively xigmanas embedded open-source nas software distribution based latest release freebsd developed original freenas 7 code updated work current latest freebsd releases however xigmanas preserves freenas ’ original m0n0wall/php architecture introduces experimental support arm architecture xigmanas supports sharing across windows apple unix-like systems includes zfs v5000 software raid 0,1,5 disk encryption s.m.a.r.t email reports etc. following protocols smb samba active directory domain controller ad ftp nfs tftp afp rsync unison file synchronizer iscsi initiator target hast carp bridge upnp bittorrent configurable web interface xigmanas installable almost boot media including livecd optionally small usb flash drive config storage necessary x86-64 x86-32 computer platforms version 10.3 version 11.0 xigmanas longer supports x86-32 version 10.3 still getting updates xigmanas installed compact flash usb flash drive ssd hard drive bootable devices supports advanced formatted drives using 4 kb sectors booted livecd liveusb software distribution currently distributed iso image .iso ~370 mb usb flash drive image .img ~320 mb format source form special small footprint embedded image also available .img ~150 mb preferred method embedded installation onto usb stick compact flash card cf hard disk hdd/ssd xigmanas designed xigmanas os load system memory eliminating system writes drive flash devices energy efficient updating process done webgui browser downloading installing new firmware image original freenas project derives m0n0wall freenas 0.7 branch end-of-life 'd late 2011 freenas name legally acquired ixsystems inc starting version 8.x new ixsystems developers rewrote freenas legacy freenas 0.7 longer available download legacy freenas 0.7 code unable developed longer name name change necessary founder freenas olivier cochard-labbé donated original freenas source code nas4free project support former developers namely daisuke aoyama michael zoon carries original freenas code base freenas 8.x.y software fork original freenas new rewritten code-base continuing old branded name 2018 project applied xigmanas trademark order protect brand prior release v11.2 | [
6153,
10761,
4636,
1071,
9784,
5177,
8266,
5710,
7249,
9306,
1118,
607,
9320,
3181,
8816,
7794,
9844,
9343,
6273,
2180,
2193,
2197,
2199,
2212,
684,
3248,
1718,
7863,
5819,
11459,
708,
7364,
9927,
8395,
8909,
6864,
8404,
10455,
6361,
8410... | Test |
9,626 | 9 | Second-generation_programming_language:second-generation programming language second-generation programming language 2gl generational way categorize assembly languages term coined provide distinction higher level machine independent third-generation programming languages 3gl cobol earlier first-generation programming languages machine code second-generation programming languages following properties second-generation languages sometimes used parts kernels device drivers sometimes used video games graphics programs intensive programs modern programs second generation assembly languages rarely used second generation languages may advantages mainly speed programming low level assembly language downsides downsides requirements programmers lead decline assembly vast majority programs written third-generation programming language fourth-generation programming language assembly main advantage speed degraded fact well written c code often fast even faster hand written assembly second generation languages perhaps significant place computing history long time second generation assembly languages good option development many machines nes commodore 64 second generation languages represented massive step away tradition programmers conforming needs machine first step towards machine accommodating programmer phenomenon would repeated subsequent programming language generations | [
9345,
2691,
9224,
5651,
5527,
3613,
4770,
5680,
305,
2045,
9780,
1591,
4410,
191,
10819,
8262,
9926,
4042,
5845,
477,
7395,
4838,
9330,
9331,
2556,
7421
] | Validation |
9,627 | 3 | Shanghai_(video_game):shanghai video game shanghai computerized version mahjong solitaire published activision 1986 amiga atari st atari 8-bit family commodore 64 ibm pc macintosh apple iigs master system shanghai originally programmed brodie lockard winning game tiles reveal three-dimensional blinking eye dragon behind game screen macintosh master system versions show animated dragon spitting fire shanghai sold 500,000 copies 1991 computer gaming world december 1986 published varying opinions gregg williams stated could n't believe activision wasted resources putting charles ardai called probably best game year info gave amiga version four-plus stars five stating program ought illegal impossible play 'just one game describing gameplay swift deceptively simple magazine warned plan spending lot time one gave commodore 64 version three-plus stars five describing shanghai fanatically addictive criticizing user interface graphics magazine concluded 'll find hard quit compute reviewed game favorably reporting shanghai mania proportions beginning fear health 1988 dragon gave game 5 5 stars 1996 computer gaming world declared shanghai 146th-best computer game ever released dragon magazine also gave atari lynx version 5 stars may 1992 issue robert jung ign gave game score 10 10 review cvg magazine reviewed game march 1991 issue giving score 84 100 sequel shanghai ii dragon eye published 1990 ms-dos ports released macintosh fm towns msx pc-98 sharp x68000 windows sega genesis super nes genesis version re-released wii virtual console pal regions november 27 2009 north america january 11 2010 later delisted end 2013 | [
8484,
2984,
9006,
9166,
4856,
6129,
9951,
4152,
95
] | Train |
9,628 | 2 | DioneOS:dioneos dioneos pronounced /djoneos/ multitasking preemptive real-time operating system system designed texas instruments msp430x microcontrollers target microcontroller platform limited resources i.e system clock frequency tens mhz memories amount tens hundreds kb system adapted conditions providing compact efficient image efficiency term means minimization additional cpu load caused system usage according definition system effective consumes less cpu time execution internal parts e.g threads management dioneos system intended autonomic devices user interface limited functions core functionality provided system environment building multitasking firmware means standard well known concepts e.g semaphores timers etc. target domain application system graphic user interface texas instruments company manufactures wide range microcontrollers use msp430 core depending version chip contains different amount flash memory ram e.g msp430f2201 1kb/128b correspondingly msp430f5438 256kb/16kb size memory exceeds 64 kb limit 16 bits addressing insufficient due constraint chips larger memory equipped extended core msp430x version processor wider registers 20 bits new instructions processing compilation programmer selects type memory model 'near 'far used flash ram memories choice determines accessible memory range hence flash 64 kb limit programmed 'far model must used dioneos supports 'far model code modules large firmware uses extended flash developed run system control system uses 'near memory model data segments firmware started dioneos system consists threads executed pseudo-parallel way thread unique priority used ordering threads important least one thread priority value defines precedence running others dioneos system thread one following states one core processor one thread running state thread highest priority threads waiting state change thread state caused system handles 16 threads including idle one lowest priority idle thread always ready run never switched 'waiting state permitted call functions would block inside thread idle thread used determine total system load dioneos system provides stated 'threads management chapter firmware consists pseudo-parallel threads thread context contains core registers processor last execution address private stack switch threads system saves context stopped thread recovers context one run state saving makes possible breaking thread execution continuation even thread executed note preemption followed context switch may happen moment even system function called thread although may happen unexpected location executed code thread work distorted due system context saving thread point view switch done background context switch critical operation system time execution determines effective system context switch dioneos system optimized short time important parts written assembler switch done 12–17 μs f=25 mhz dioneos system context switch initiated interrupt service routine property useful moving event handling thread commonly implemented two-layer architecture context switch measured signaling point isr thread recovery takes 10us f=25 mhz dioneos system dioneos multiple configuration options affects features inserted compiled image system lot source code switches gathered configuration file altered developer firmware means possible control additional testing parts enabled system built version provides detection unusual conditions run-time information helps debugging process errors found eliminated extra features disabled full performance system example fragment configuration file | [
10883,
6276,
9366,
7319,
2201,
10030,
4668,
6207,
5823,
321,
10561,
1221,
9927,
6985,
9162,
2383,
341,
3197,
477,
10590,
6624,
5603,
5220,
1253,
1126,
1776,
10482,
2804,
11383,
2045
] | None |
9,629 | 8 | Service_choreography:service choreography service choreography form service composition interaction protocol several partner services defined global perspective idea underlying notion service choreography summarised follows dancers dance following global scenario without single point control run-time participant service choreography executes part according behavior participants choreography role specifies expected messaging behavior participants play terms sequencing timing messages consume produce choreography describes sequence conditions data exchanged two participants order meet useful purpose service choreography better understood comparison another paradigm service composition service orchestration one hand service choreographies logic message-based interactions among participants specified global perspective service orchestration hand logic specified local point view one single participant called orchestrator service orchestration language bpel example specification service orchestration e.g bpel process file workflow deployed service infrastructure example bpel execution engine like apache ode deployment service orchestration specification transforms workflow composite service sense service choreography orchestrations two flips coin one hand roles service choreography extracted service orchestrations process called projection projection possible realize skeletons i.e incomplete service orchestrations used baselines realize web services participate service choreography hand already existing service orchestrations may composed service choreographies service choreographies executed enacted service choreography enacted participants execute roles unlike service orchestration service choreographies run engine service infrastructure “ happen roles executed logic service choreography specified global point view thus realized one single service like service orchestration key question much research choreography seeks answer suppose global choreography constructed describes possible interactions participants collaboration conditions choreography need obey guaranteed collaboration succeeds succeeds means emergent behaviour results collaboration enacted participant acting independently according skeleton exactly follows choreography skeletons originally projected case choreography said realizable general determining realizability choreography non-trivial question particularly collaboration uses asynchronous messaging possible different participants send messages simultaneously ambit specifications concerning web services following specifications focused defining languages model service choreographies moreover omg specification bpmn version 2.0 includes diagrams model service choreographies academic proposals service choreography languages include moreover number service choreography formalisms proposed based web service choreography ws-choreography specification w3c defining xml-based business process modeling language describes collaboration protocols cooperating web service participants services act peers interactions may long-lived stateful orchestration another term similar still different meaning main effort get choreography w3c web services choreography working group closed 10 july 2009 leaving ws-cdl candidate recommendation many presentations w3c workshop web services 11–12 april 2001 pointed need common interface composition language help address choreography web services architecture requirements working draft created web services architecture working group also lists idea web service choreography capabilities critical success factor support several different top-level goals nascent web services architecture problem choreography great interest industry time efforts wscl web service conversation language wsci web service choreography interface submitted w3c published technical notes moreover complementary efforts launched june 2002 intalio sun bea sap released joint specification named web services choreography interface wsci specification also submitted w3c note august 2002 w3c since formed new working group called web services choreography working group within web services activity wsci specification one primary inputs web services choreography working group published candidate recommendation ws-cdl version 1.0 november 9th 2005 xlang wsfl wsci longer supported standard organization companies bpel replaced xlang wsfl wsci superseded ws-cdl upcoming business process modeling notation version 2.0 introduce diagrams specifying service choreographies academic field put forward service choreography languages example let dance bpel4chor map service choreographies specify message-based interactions among participants global perspective way programming languages grouped programming paradigms service choreography languages grouped styles several active research projects topic service choreography | [
9665,
2501,
4107,
2418,
6007,
5210,
3323,
479
] | Validation |
9,630 | 4 | Storm_botnet:storm botnet storm botnet storm worm botnet also known dorf botnet ecard malware remotely controlled network zombie computers botnet linked storm worm trojan horse spread e-mail spam height september 2007 storm botnet running anywhere 1 million 50 million computer systems accounted 8 malware microsoft windows computers first identified around january 2007 distributed email subjects 230 dead storm batters europe giving well-known name botnet began decline late 2007 mid-2008 reduced infecting 85,000 computers far less infected year earlier december 2012 original creators storm still n't found storm botnet displayed defensive behaviors indicated controllers actively protecting botnet attempts tracking disabling specifically attacking online operations security vendors researchers attempted investigate security expert joe stewart revealed late 2007 operators botnet began decentralize operations possible plans sell portions storm botnet operators reportedly powerful enough force entire countries internet estimated capable executing instructions per second world top supercomputers united states federal bureau investigation considered botnet major risk increased bank fraud identity theft cybercrimes first detected internet january 2007 storm botnet worm so-called storm-related subject lines infectious e-mail employed initially 230 dead storm batters europe later provocative subjects included chinese missile shot usa aircraft u.s. secretary state condoleezza rice kicked german chancellor angela merkel suspected information security professionals well-known fugitive spammers including leo kuvayev may involved operation control storm botnet according technology journalist daniel tynan writing robert x. cringely pseudonym great portion fault existence storm botnet lay microsoft adobe systems sources state storm worm primary method victim acquisition enticing users via frequently changing social engineering confidence trickery schemes according patrick runald storm botnet strong american focus likely agents working support within united states experts however believe storm botnet controllers russian pointing specifically russian business network citing storm software mentions hatred moscow-based security firm kaspersky lab includes russian word buldozhka means bulldog botnet zombie network comprises computers running microsoft windows operating system infected computer becomes known bot bot performs automated tasks—anything gathering data user attacking web sites forwarding infected e-mail—without owner knowledge permission estimates indicate 5,000 6,000 computers dedicated propagating spread worm use e-mails infected attachments 1.2 billion virus messages sent botnet september 2007 including record 57 million august 22 2007 alone lawrence baldwin computer forensics specialist quoted saying cumulatively storm sending billions messages day could double digits billions easily one methods used entice victims infection-hosting web sites offers free music artists beyoncé knowles kelly clarkson rihanna eagles foo fighters r. kelly velvet revolver signature-based detection main defense computer systems virus malware infections hampered large number storm variants back-end servers control spread botnet storm worm automatically re-encode distributed infection software twice hour new transmissions making difficult anti-virus vendors stop virus infection spread additionally location remote servers control botnet hidden behind constantly changing dns technique called ‘ fast flux ’ making difficult find stop virus hosting sites mail servers short name location machines frequently changed rotated often minute minute basis storm botnet operators control system via peer-to-peer techniques making external monitoring disabling system difficult central command-and-control point storm botnet shut botnet also makes use encrypted traffic efforts infect computers usually revolve around convincing people download e-mail attachments contain virus subtle manipulation one instance botnet controllers took advantage national football league opening weekend sending mail offering football tracking programs nothing infect user computer according matt sergeant chief anti-spam technologist messagelabs terms power botnet utterly blows supercomputers away add 500 top supercomputers blows away 2 million machines frightening criminals access much computing power much estimated 10 -20 total capacity power storm botnet currently used computer security expert joe stewart detailed process compromised machines join botnet attempts join botnet made launching series exe files said machine stages usually named sequence game0.exe game5.exe similar continue launching executables turn typically perform following stage compromised system connect botnet fast flux dns makes tracking process exceptionally difficult code run windir \system32\wincom32.sys windows system via kernel rootkit connections back botnet sent modified version edonkey/overnet communications protocol storm botnet variants employ variety attack vectors variety defensive steps exist well storm botnet observed defending attacking computer systems scanned storm virus-infected computer systems online botnet defend ddos counter-attacks maintain internal integrity certain points time storm worm used spread botnet attempted release hundreds thousands versions onto internet concentrated attempt overwhelm defenses anti-virus malware security firms according joshua corman ibm security researcher first time remember ever seeing researchers actually afraid investigating exploit researchers still unsure botnet defenses counterattacks form automation manually executed system operators try attach debugger query sites reporting knows punishes instantaneously secureworks chunk ddos-ed distributed-denial-of-service attacked researcher network every time hear investigator trying investigate 're automatically punished knows investigated punishes fights back corman said spameater.com well sites 419eater.com artists 419 deal 419 spam e-mail fraud experienced ddos attacks temporarily rendering completely inoperable ddos attacks consist making massed parallel network calls target ip addresses overloading servers capacities preventing responding requests anti-spam anti-fraud groups spamhaus project also attacked webmaster artists 419 said website server succumbed attack increased 100mbit similar attacks perpetrated dozen anti-fraud site hosts jeff chan spam researcher stated terms mitigating storm challenging best impossible worst since bad guys control many hundreds megabits traffic evidence may control hundreds gigabits traffic enough force countries internet storm botnet systems also take steps defend locally victims computer systems botnet compromised systems creates computer process windows machine notifies storm systems whenever new program processes begin previously storm worms locally would tell programs—such anti-virus anti-malware software simply run however according ibm security research versions storm also simply fool local computer system run hostile program successfully fact anything programs including av exes dlls sys files also software p2p applications bearshare edonkey appear run successfully even though n't actually anything far less suspicious process gets terminated suddenly outside said richard cohen sophos compromised users related security systems assume security software running successfully fact september 17 2007 republican party website united states compromised used propagate storm worm botnet october 2007 botnet took advantage flaws youtube captcha application mail systems send targeted spam e-mails xbox owners scam involving winning special version video game halo 3 attack methods include using appealing animated images laughing cats get people click trojan software download tricking users yahoo geocities service download software claimed needed use geocities geocities attack particular called full-fledged attack vector paul ferguson trend micro implicated members russian business network well-known spam malware service christmas eve 2007 storm botnet began sending holiday-themed messages revolving around male interest women titles find christmas tail twelve girls christmas mrs. claus tonight photos attractive women described attempt draw unprotected systems botnet boost size holidays security updates protection vendors may take longer distributed day e-mails christmas strippers distributed storm botnet operators immediately began sending new infected e-mails claimed wish recipients happy new year 2008 january 2008 botnet detected first time involved phishing attacks major financial institutions targeting barclays halifax around october 15 2007 uncovered portions storm botnet variants could sale done using unique security keys encryption botnet internet traffic information unique keys allow segment sub-section storm botnet communicate section matching security key however may also allow people detect track block storm botnet traffic future security keys unique lengths signatures computer security vendor sophos agreed assessment partitioning storm botnet indicated likely resale services graham cluley sophos said storm use encrypted traffic interesting feature raised eyebrows lab likely use cybercriminals lease portions network misuse would n't surprise network used spamming distributed denial-of-service attacks malicious activities security experts reported storm broken malware market form ready-to-use botnet-making spam kit world could see sharp rise number storm related infections compromised computer systems encryption seems affect systems compromised storm second week october 2007 onwards meaning computer systems compromised time frame remain difficult track block within days discovery segmenting storm botnet spam e-mail new subsection uncovered major security vendors evening october 17 security vendors began seeing new spam embedded mp3 sound files attempted trick victims investing penny stock part illegal pump-and-dump stock scam believed first-ever spam e-mail scam made use audio fool victims unlike nearly storm-related e-mails however new audio stock scam messages include sort virus storm malware payload simply part stock scam january 2008 botnet detected first time involved phishing attacks customers major financial institutions targeting banking establishments europe including barclays halifax royal bank scotland unique security keys used indicated f-secure segments botnet leased september 25 2007 estimated microsoft update windows malicious software removal tool msrt may helped reduce size botnet 20 new patch claimed microsoft removed storm approximately 274,372 infected systems 2.6 million scanned windows systems however according senior security staff microsoft 180,000+ additional machines cleaned msrt since first day likely home user machines notably incorporated daily operation 'storm botnet indicating msrt cleaning may symbolic best late october 2007 reports indicated storm botnet losing size internet footprint significantly reduced size brandon enright university california san diego security analyst estimated botnet late october fallen size approximately 160,000 compromised systems enright previous estimated high july 2007 1,500,000 systems enright noted however botnet composition constantly changing still actively defending attacks observation 're researcher hit pages hosting malware much… automated process automatically launches denial service attack said added research caused storm botnet attack knocked part uc san diego network offline computer security company mcafee reported saying storm worm would basis future attacks craig schmugar noted security expert discovered mydoom worm called storm botnet trend-setter led usage similar tactics criminals one derivative botnet dubbed celebrity spam gang due use similar technical tools storm botnet controllers unlike sophisticated social engineering storm operators use entice victims however celebrity spammers make use offers nude images celebrities angelina jolie britney spears cisco systems security experts stated report believe storm botnet would remain critical threat 2008 said estimated size remained millions early 2008 storm botnet also found business competition black hat economy form nugache another similar botnet first identified 2006 reports indicated price war may underway operators botnets sale spam e-mail delivery following christmas new year holidays bridging 2007-2008 researchers german honeynet project reported storm botnet may increased size 20 holidays messagelabs intelligence report dated march 2008 estimates 20 spam internet originates storm storm botnet sending spam two years decline late 2008 one factor — account making less interesting creators maintain botnet — may stormfucker tool made possible take control parts botnet april 28 2010 mcafee made announcement so-called rumors stormbot 2 verified mark schloesser tillmann werner felix leder german researchers lot work analyzing original storm found around two-thirds new functions copy paste last storm code base thing missing p2p infrastructure perhaps tool used p2p bring original storm honeynet blog dubbed stormbot 2 | [
3072,
7809,
10756,
11146,
3724,
3852,
6797,
3347,
4883,
2325,
278,
9087,
5373,
3867,
8735,
10657,
6520,
4648,
9256,
939,
3629,
46,
7983,
6834,
10875,
1337,
10297,
1979,
3643,
7739,
7996,
9791,
704,
8640,
9154,
9537,
9664,
8133,
11583,
148... | Test |
9,631 | 1 | Graph_database:graph database computing graph database gdb database uses graph structures semantic queries nodes edges properties represent store data key concept system graph edge relationship graph relates data items store collection nodes edges edges representing relationships nodes relationships allow data store linked together directly many cases retrieved one operation graph databases hold relationships data priority querying relationships within graph database fast perpetually stored within database relationships intuitively visualized using graph databases making useful heavily inter-connected data graph databases part nosql databases created address limitations existing relational databases graph model explicitly lays dependencies nodes data relational model nosql database models link data implicit connections graph databases design allow simple fast retrieval complex hierarchical structures difficult model relational systems graph databases similar 1970s network model databases represent general graphs network-model databases operate lower level abstraction lack easy traversal chain edges underlying storage mechanism graph databases vary depend relational engine “ store ” graph data table although table logical element therefore approach imposes another level abstraction graph database graph database management system physical devices data actually stored others use key-value store document-oriented database storage making inherently nosql structures graph databases based non-relational storage engines also add concept tags properties essentially relationships pointer another document allows data elements categorized easy retrieval en masse retrieving data graph database requires query language sql designed manipulation data relational system therefore “ elegantly ” handle traversing graph single graph query language universally adopted way sql relational databases wide variety systems often tightly tied one product standardization efforts occurred leading multi-vendor query languages like gremlin sparql cypher addition query language interfaces graph databases accessed application programming interfaces apis graph databases differ graph compute engines graph databases technologies translations relational oltp databases hand graph compute engines utilized olap bulk analysis graph databases attracted considerable attention 2000s due successes major technology corporations using proprietary graph databases introduction open-source graph databases graph databases portray data viewed conceptually accomplished transferring data nodes relationships edges graph within graph databases based graph theory set objects either node edge labeled-property graph model represented set nodes relationships properties labels nodes data relationships named store properties represented key/value pairs nodes labelled grouped edges representing relationships two qualities always start node end node directed making graph directed graph relationships also properties useful providing additional metadata semantics relationships nodes direct storage relationships allows constant-time traversal popular form graph model 2018 model popular graph database october 2018 neo4j rdf graph model addition information represented separate node example imagine scenario user add name property person represented distinct node graph labeled-property graph model would done addition name property node person however rdf user add separate node called 'hasname connecting original person node specifically rdf graph model composed nodes arcs rdf graph notation statement represented node subject node object arc predicate node may left blank literal and/or identified uriref arc may also identified uriref literal node may two types plain untyped typed plain literal lexical form optionally language tag typed literal made string uriref identifies particular datatype blank node may used accurately illustrate state data data uri used open graph protocol used facebook allow web page functionality object facebook semantic web multiple types graphs categorized gartner suggests five broad categories graphs execution queries within graph database localized portion graph search irrelevant data making advantageous real-time big data analytical queries consequently graph database performance proportional size data needed traversed staying relatively constant despite growth data stored graph databases powerful tool graph-like queries example computing shortest path two nodes graph graph-like queries performed graph database natural way example graph diameter computations community detection graphs flexible meaning allows user insert new data existing graph without loss application functionality need designer database plan extensive details databases future use-cases underlying storage mechanism graph databases vary depend relational engine “ store ” graph data table although table logical element therefore approach imposes another level abstraction graph database graph database management system physical devices data actually stored others use key-value store document-oriented database storage making inherently nosql structures one nosql database utilizes method arangodb arangodb native multi-model database supports graphs one data models stores graphs holding edges nodes separate collections documents node would represented document store edges link two different nodes hold special attributes inside document _from _to attributes data lookup performance dependent access speed one particular node another index-free adjacency enforces nodes direct physical ram addresses physically point adjacent nodes results fast retrieval native graph system index-free adjacency move type data structures find links nodes directly-related nodes graph stored cache one nodes retrieved making data look-up even faster first time user fetches node however advantage comes cost index-free adjacency sacrifices efficiency queries use graph traversals native graph databases use index-free adjacency process crud operations stored data since edgar f. codd 1980 paper relational model relational databases de facto industry standard large-scale data storage systems however relational model requirement strict schema data normalization imposed limitations relationships queried increasing amount data needing processed became additional problem posed relational model traditionally databases designed relational model relational model data normalized support acid transactions data normalization process removes duplicate data within database goal data normalization preserve data consistency relational model enforces acid transactions separating data many tables relational models enforce heavy data normalization order guarantee consistency one relational model design motivation achieve fast row-by-row access problems arise need form complex relationships stored data although relationships analyzed relational model complex queries performing many join operations many different attributes several tables required working relational models foreign key constraints also considered retrieving relationships causing additional overhead compared relational databases graph databases often faster associative data sets map directly structure object-oriented applications scale naturally large data sets typically need costly join operations costly means executed databases non-optimal designs logical physical levels depend less rigid schema marketed suitable manage ad hoc changing data evolving schemas conversely relational database management systems typically faster performing operation large numbers data elements permitting manipulation data natural structure despite graph databases advantages recent popularity relational databases recommended graph model sole reason replace already placed well-designed relational database benefit utilizing graph database becomes relevant evidence performance improvement orders magnitude lower latency relational model gathers data together using information data example one might look users whose phone number contains area code 311 would done searching selected datastores tables looking selected phone number fields string 311 time consuming process large tables relational databases offer concept database index allows data like stored smaller subtable containing selected data unique key primary key record part phone numbers indexed search would occur smaller index table gathering keys matching records looking main data table records keys generally tables physically stored look-ups keys fast relational databases inherently contain idea fixed relationships records instead related data linked storing one record unique key another record data example table containing email addresses users might hold data item called codice_1 contains primary key user record associated order link users email addresses system first looks selected user records primary keys looks keys codice_1 column email table likely index extracts email data links user email records make composite records containing selected data operation termed join computationally costly depending complexity query number joins indexing various keys system may search multiple tables indexes gather lots information sort match together contrast graph databases directly store relationships records instead email address found looking user key codice_1 column user record contains pointer directly refers email address record selected user pointer followed directly email records need search email table find matching records eliminate costly join operations example one searches email addresses users area code 311 engine would first perform conventional search find users 311 retrieve email addresses following links found records relational database would first find users 311 extract list pk perform another search records email table pk link matching records together types common operations graph database theory least significantly faster true value graph approach becomes evident one performs searches one level deep example consider search users subscribers table linking users users 311 area code case relational database first search users area code 311 search subscribers table users finally search users table retrieve matching users contrast graph database would search users 311 follow back-links subscriber relationship find subscriber users avoids several searches look-ups memory usage involved holding temporary data multiple records needed construct output technically sort look-up completed log n 1 time time proportional logarithm size data contrast relational version would multiple log n look-ups plus time needed join data records relative advantage graph retrieval grows complexity query example one might want know movie submarines actor movie actor played lead gone wind first requires system find actors gone wind find movies find actors movies lead gone wind find movies finally filtering list descriptions containing submarine relational database require several separate searches movies actors tables another search submarine movies finding actors movies comparing large collected results contrast graph database would simply walk gone wind clark gable gather links movies gather links movies actors follow links actors back list movies resulting list movies searched submarine done via one search properties add another layer abstraction structure also improves many common queries properties essentially labels applied record cases edges well example one might label clark gable actor would allow system quickly find records actors opposed director camera operator labels edges allowed one could also label relationship gone wind clark gable lead performing search people lead actor movie gone wind database would produce vivien leigh olivia de havilland clark gable equivalent sql query would rely added data table linking people movies adding complexity query syntax sorts labels may improve search performance certain circumstances generally useful providing added semantic data end users relational databases well suited flat data layouts relationships data one two levels deep example accounting database might need look line items invoices given customer three-join query graph databases aimed datasets contain many links especially well suited social networking systems friends relationship essentially unbounded properties make graph databases naturally suited types searches increasingly common online systems big data environments reason graph databases becoming popular large online systems like facebook google twitter similar systems deep links records illustrate imagine relational model two different tables people friend people table contains two columns person_id person_name similarly friend tables two columns well person_id friend_id person_id foreign key people table case searching jack friends would result following sql query select p2.person_name people p1 join friend p1.person_id == friend.person_id join people p2 p2.person_id == friend.friend_id p1.person_name 'jack query may translated -- match ee person friend-with friend ee.name jack return ee friend prefix foaf http //xmlns.com/foaf/0.1/ select name foaf person prefix foaf http //xmlns.com/foaf/0.1/ select name foaf name jack select people.name examples simple illustration basic relationship query condense idea relational models query complexity increases total amount data comparison graph database query easily able sort relationship graph present results also results indicate simple condensed declarative queries graph databases necessarily provide good performance comparison relational databases graph databases offer intuitive representation data relational databases offer better results set operations needed pre-history graph databases mid-1960s navigational databases ibm ims supported tree-like structures hierarchical model strict tree structure could circumvented virtual records graph structures could represented network model databases late 1960s codasyl defined cobol 1959 defined network database language 1969 labeled graphs could represented graph databases mid-1980s logical data model several improvements graph databases appeared early 1990s accelerating late 1990s endeavors index web pages mid-late 2000s commercial atomicity consistency isolation durability acid graph databases neo4j oracle spatial graph became available 2010s commercial acid graph databases could scaled horizontally became available sap hana brought in-memory columnar technologies graph databases also 2010s multi-model databases supported graph models models relational database document-oriented database became available orientdb arangodb marklogic starting 7.0 version time graph databases various types become especially popular social network analysis advent social media companies following list graph databases | [
5632,
8201,
2062,
6161,
2068,
5658,
9245,
9248,
10793,
5677,
10286,
1594,
4155,
11324,
8262,
9286,
2632,
9290,
8269,
7248,
8788,
10326,
7767,
8291,
9828,
10340,
8808,
8810,
2669,
3705,
7802,
1146,
3196,
2688,
7816,
3219,
10389,
151,
4255,
... | None |
9,632 | 7 | HighQ_(software):highq software highq privately owned software service saas company providing cloud-based secure file sharing team collaboration social networking software enterprise customers customers legal banking corporate sectors well government life sciences highq founded london 2001 university friends ajay patel veenay shah company offices uk london australia sydney netherlands amsterdam germany frankfurt usa new york r operation india ahmedabad january 2016 highq raised first ever investment round 50m morgan stanley goldman sachs one peak partners help accelerate company expansion us market one top 10 biggest funding rounds europe first quarter 2016 july 2019 thomson reuters announced acquisition highq press release highq included one watch 2013 sunday times tech track 100 league table ranked 74th 2014 tech track 100 league table ranked 32nd among uk ’ top 100 smes sunday times heathrow sme export track 100 2016 highq ranked deloitte technology fast 500 emea 2011 2013 ranked deloitte technology fast 50 uk 2013 highq major clients include barclays linklaters lex mundi clifford chance osborne clarke clyde co allen overy highq clients include 21 top 25 uk law firms including uk magic circle law firms 45 top 100 uk law firms highq offers file sharing extranet collaboration project management virtual data room enterprise social networking knowledge sharing publishing solutions three products cover different aspects use cases highq collaborate highq publisher highq dataroom primary product highq collaborate provides secure document exchange enterprise social collaboration client extranets knowledge portals organisations summer 2013 highq released new mobile-optimised version collaborate saw redesign existing modules added features including responsive design microblogging private messaging centralised notifications enhanced people profiles highq publisher integrated digital marketing publishing platform supports various publishing formats channels including publications videos events microsites email campaigns highq dataroom virtual data room product aimed primarily law firms banks corporations help users exchange transactional information clients partners outside company | [
5202,
467,
245
] | Test |
9,633 | 3 | IBM_System_9000:ibm system 9000 system 9000 s9000 family microcomputers ibm consisting system 9001 9002 9003 first member family system 9001 laboratory computer introduced may 1982 ibm instruments computer system model 9000 renamed system 9001 1984 system 9000 family name system 9002 multi-user general-purpose business computer introduced last member family system 9003 industrial computer introduced 1985 members system 9000 family find much commercial success entire family discontinued 2 december 1986 system 9000 based around motorola 68000 microprocessor motorola versabus system bus members ibm csos real-time operating system os stored read-only memory system 9002 could also run multi-user microsoft xenix os suitable business use supported four users three versions system 9000 9001 benchtop lab model 9002 desktop model without laboratory-specific features 9003 manufacturing process control version modified suitable factory environments system 9002 9003 based system 9001 based around 8mhz motorola 68000 motorola versabus system bus system 9000 one used versabus input/output ports included three rs-232c serial ports ieee-488 instrument port bidirectional 8-bit parallel port laboratory data acquisition analog-to-digital converters could attached i/o ports available user input could via user-definable 10-key touch panel integrated crt display 57-key user-definable keypad 83-key model f keyboard touch panel keypad designed controlling experiments system 9000 members ibm real-time operating system called csos computer system operating system 128kb read-only memory rom multi-tasking operating system could extended loading components disk ibm also offered microsoft xenix system 9002 required least 640kb main memory versabus card containing memory management unit machines shipped 128kb main memory standard 5mb could added system using memory boards plugged versabus board could contain 1mb installed 256kb increments system 9000 developed ibm instruments inc. ibm subsidiary established 1980 focused selling scientific technical instruments well computer equipment designed control log process instruments originally introduced ibm instruments computer system model 9000 may 1982 long name led referred computer system 9000 cs-9000 cs/9000 cs9000 originally cs9000 available scientific instrument users offered customers wanted use purposes cs9000 unsuccessful niche cheaper ibm personal computer adequate many instrumentation tasks ibm larger general-purpose computers used demanding tasks ibm repositioned cs9000 february 21 1984 family computers renaming system 9000 consisted system 9001 9002 9001 renamed cs9000 retained focus instrumentation market 9002 general-purpose business computer ran ibm csos microsoft xenix operating systems supported one four users 9002 unsuccessful business market due lack business application software support software developers ibm ibm finally introduced new model system 9003 april 1985 computer-aided manufacturing computer also unsuccessful result manufacturing system 9000 family stopped january 1986 remained limited availability discontinued 2 december 1986 reasons cited failure system 9000 poor performance high price led ibm pc used price concern 32-bit microcomputers used performance mattered ibm closed instrument division january 1987 reassigning approximately 150 employees worked positions noting obscurity 1982 release byte january 1983 called system 9000 ibm 'secret computer stated quiet way one exciting new arrivals today microcomputer scene magazine speculated changes would natural candidate business general-purpose computer later review member brandeis university chemistry department criticized several aspects hardware software praised sophisticated basic ibm customer service reviewer concluded cs-9000 fast powerful laboratory computer affordable 1983 ads dealers referred ibm 9000 multi-user micro although name ibm computer system 9000 also advertised ibm also informally referred ibm 9000 | [
6787,
7269,
6311,
5450,
6187,
780,
6378,
5006,
8792,
9455,
10040,
9397,
9366,
3960,
3323,
2399
] | None |
9,634 | 1 | View_(SQL):view sql database view result set stored query data database users query would persistent database collection object pre-established query command kept database dictionary unlike ordinary base tables relational database view form part physical schema result set virtual table computed collated dynamically data database access view requested changes applied data relevant underlying table reflected data shown subsequent invocations view nosql databases views way query data views provide advantages tables function programming provide abstraction database view another parallel functions database users manipulate nested views thus one view aggregate data views without use views normalization databases second normal form would become much difficult views make easier create lossless join decomposition rows base table lack defined ordering rows available view appear default sorting view relational table relational model defines table set rows since sets ordered — definition — neither rows view therefore order clause view definition meaningless sql standard allow order clause subquery create view command refused create table statement however sorted data obtained view way table — part query statement view nevertheless dbms oracle database abide sql standard restriction database practitioners define views read-only updatable database system determine reverse mapping view schema schema underlying base tables view updatable insert update delete operations performed updatable views read-only views support operations dbms map changes underlying base tables view update done key preservation systems support definition instead triggers views technique allows definition logic execution place insert update delete operation views thus database systems implement data modifications based read-only views however instead trigger change read-only updatable property view various database management systems extended views read-only subsets data particularly materialized views pre-executed non-virtual views commonly used data warehousing give static snapshot data may include data remote sources accuracy materialized view depends frequency trigger mechanisms behind updates materialized views introduced oracle database ibm db2 provides so-called materialized query tables mqts purpose microsoft sql server introduced 2000 version indexed views store separate index table entire data postgresql implemented materialized views 9.3 release view equivalent source query queries run views query modified example exists view named accounts_view content follows application could run simple query rdbms takes simple query replaces equivalent view sends following query optimizer optimizer removes unnecessary fields complexity example necessary read address since parent invocation make use sends query sql engine processing | [
10632,
8201,
8979,
2068,
10389,
4630,
7446,
2456,
1049,
5658,
5403,
9112,
10137,
11030,
4255,
9248,
9631,
1447,
2344,
4263,
7080,
10793,
10413,
10286,
9397,
5051,
3004,
1341,
7612,
7868,
10048,
5953,
6850,
11324,
2246,
6470,
2632,
9286,
929... | None |
9,635 | 2 | Resource_Access_Control_Facility:resource access control facility racf usually pronounced rack-eff short resource access control facility ibm software product security system provides access control auditing functionality z/os z/vm operating systems racf introduced 1976 main features racf establishes security policies rather permission records set permissions file patterns — set permissions even files yet exist permissions used file object created later time racf continuously evolved support modern security features digital certificates/public key infrastructure services ldap interfaces case sensitive ids/passwords latter reluctant concession promote interoperability systems unix linux underlying zseries z systems hardware works closely racf example digital certificates protected within tamper-proof cryptographic processors major mainframe subsystems especially db2 version 8 use racf provide multi-level security mls primary competitors acf2 topsecret produced ca technologies | [
7,
4242,
3477,
2080,
2083,
2087,
7983,
7733,
4663,
823,
5433,
6651,
10170,
5568,
2558,
10058,
10831,
6098,
6750,
2143,
8670,
2274,
6888,
1012,
5492,
2168,
3323,
125,
3966
] | Test |
9,636 | 9 | Alexander_Repenning:alexander repenning dr. alexander repenning director scalable game design project computer science professor founder agentsheets inc. member center lifelong learning design university colorado boulder repenning inventor drag drop blocks programming research interests include computer science education end-user programmable agents human-computer interaction artificial intelligence repenning teaches educational game design usa asia europe worked research development asea brown boveri research xerox parc apple computer hewlett packard repenning creator agentsheets agentcubes cyberlearning tools used game design computational science applications director scalable game design project using agentsheets leads effort reinvent computer science education public schools game design starting middle school level 10,000 students funding national science foundation itest ce21 programs google scalable game design project conducting largest us study computer science education middle school level including inner city schools remote rural areas native american communities results indicate students across genders ethnicities highly motivated learn computer science game design also learn essential computational thinking skills acquire skills game design later leverage stem simulation creation repenning theoretical contributions include pedagogical framework called zones proximal flow combining vygotsky ’ zone proximal development csikszentmihalyi ’ state flow agentsheets work received numerous awards including gold medal mayor paris “ innovative application education world wide web ” www5 invitation association computing machinery showcase agentsheets one “ best best innovators ” acm1 conference repenning telluride tech festival honoree contributions computer science education previous honorees include vint cerf recognized one fathers internet alan kay recognized one pioneers object-oriented programming repenning served advisor national academy sciences european commission japanese ministry education organization economic co-operation development oecd white house office science technology policy ostp national science foundation reviewer research funding organizations usa canada europe asia chaired conferences end-user programming kids invited give talks guest lectures workshops keynote addresses nationally including stanford mit media lab university colorado numerous international conferences beyond academic recognition repenning work also featured tv news radio newspapers popular press including wired magazine switzerland repenning selected one 100 digital shapers | [] | Validation |
9,637 | 2 | Perf_(Linux):perf linux perf sometimes called perf_events perf tools originally performance counters linux pcl performance analyzing tool linux available linux kernel version 2.6.31 userspace controlling utility named codice_1 accessed command line provides number subcommands capable statistical profiling entire system kernel userland code supports hardware performance counters tracepoints software performance counters e.g hrtimer dynamic probes example kprobes uprobes 2012 two ibm engineers recognized perf along oprofile one two commonly used performance counter profiling tools linux interface perf utility kernel consists one syscall done via file descriptor mmapped memory region unlike lttng older versions oprofile service daemons needed functionality integrated kernel perf utility dumps raw data mmapped buffer disk buffer becomes filled according r. vitillo lbnl profiling performed perf involves low overhead architectures provide support hardware counters include x86 powerpc64 ultrasparc iii iv arm v5 v6 v7 cortex-a8 -a9 alpha ev56 superh usage last branch records branch tracing implementation available intel cpus since pentium 4 available patch since version 3.14 linux kernel mainline released march 31 2014 perf also supports running average power limit rapl power consumption measurements available feature certain intel cpus perf natively supported many popular linux distributions including red hat enterprise linux since version 6 released 2010 debian since squeeze version released 2011 perf used several subcommands documentation perf detailed 2014 example document events explain aliases often external tools used get names codes events perf tools also profile based true wall-clock time perf subsystem linux kernels 2.6.37 3.8.8 rhel6 kernel 2.6.32 contained security vulnerability cve-2013-2094 exploited gain root privileges local user problem due incorrect type used 32-bit int instead 64-bit event_id verification code path | [
4616,
3082,
5139,
9244,
10780,
10785,
3618,
6180,
8242,
9266,
4161,
10817,
8772,
6213,
3142,
8268,
589,
593,
2658,
6244,
5222,
7270,
10856,
4207,
5244,
4734,
11391,
7812,
8326,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
6813,
1694,
11424,
... | Test |
9,638 | 3 | Atmel_ARM-based_processors:atmel arm-based processors atmel arm-based processors microcontrollers microprocessors integrated circuits microchip technology previously atmel based various 32-bit arm processor cores in-house designed peripherals tool support arm licenses core design series 32-bit processors arm manufacture complete silicon products intellectual property ip arm processors risc reduced instruction set computing similar microchip ’ avr 8-bit products later adoption risc architecture whereas avr architecture used harvard architecture exclusively arm cores harvard cortex-m3 others von neumann architecture arm7tdmi semiconductor companies microchip take arm cores use consistent set instructions register naming add peripheral circuits adcs analog digital converters clock management serial communications usart spi i2c lin usb ethernet lcd camera touch controllers microchip made efforts adapt advanced peripherals power management used little power operate independently without cpu core powered sleepwalking also provided dma external interfaces memories increasing data throughput minimal processor intervention microchip sells mcus microcontroller units internal flash memory mpus microprocessor units use external memory addition chips microchip offers demo boards website distribution channels digi-key farnell ineltek arrow avnet future electronics mouser microchip arm-based products meant specific applications sam4cp used smart-grid energy meters microcontrollers internal program memory well conventional internal registers ram microchip arm mcus range sam d10 series 14 pins 144-pin sam s70 sam e70 products sam4s sam4n sam3s sam3n sam7s 64-pin families pin-compatible ic footprints except usb device though voltage level compatible sam family microchip consists four different sub series sam d10 sam d11 sam d20 sam d21 devices based arm cortex-m0+ processor offer different pin memory feature combinations devices pin- code-compatible share peripherals like event system sercom module arduino zero board uses atsamd21g18 chip 2009 atmel announced atsam3u line flash-based microcontrollers based arm cortex-m3 processor higher end evolution sam7 microcontroller products top clock speed range 100 mhz come variety flash sizes summer 2009 parts still sampling development board recently made available december 2009 atsam3s line announced features several enhancements lower power operation bill materials cost reduction market watchers observe cortex-m3 products competition atmel avr32 uc3a products microcontrollers largely identical peripherals hardware technology flash-based similar clock speeds dense 16/32 bit risc instruction sets atsam4 based arm cortex-m4 core sam4e includes fpu floating-point unit sam4c includes dual-core arm cortex-m4 one core fpu based arm cortex-m7 core wide variety at91 flash-based microcontrollers based arm7tdmi cores chips top clock speed range 60 mhz come variety flash sizes peripheral sets at91sam9xe flash-based microcontrollers based arm926ej-s cores top clock speed range 200 400 mhz come variety flash sizes somewhat resemble flash-equipped at91sam9260 chips microchip introduced at91sam9 processors using arm926ej-s core armv5tej architecture first broad market follow highly successful at91rm9200 processor processors improved predecessor using less power incorporating newer powerful arm core providing variety chips different peripheral sets clocked 200 mhz run twice speed processors include series based arm cortex-a5 core integrated development environments amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer example microchip documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set microchip additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official microchip arm documents | [
7170,
10767,
8720,
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
11314,
8250,
8253,
6207,
7745,
7234,
7235,
7747,
2635,
99,
7269,
8812,
11374,
7281,
10361,
638,
11395,
644,
8842,
146,
659,
1170,
7833,
666,
5786,
9371,
4258,
4773,
... | Test |
9,639 | 2 | IEFBR14:iefbr14 iefbr14 ibm mainframe utility program runs ibm mainframe environments derived os/360 including z/os placeholder returns exit status zero similar true command unix-like systems os/360 derived mainframe systems programs never specify files usually called datasets directly instead reference indirectly job control language jcl statements invoke programs data definition codice_1 statements include disposition codice_2 parameter indicates file managed — whether new file created old one re-used whether file deleted upon completion retained etc iefbr14 created codice_1 statements create delete files easily without program run due certain peculiarity job management system always requires initiator actually execute program even program effectively null statement program used jcl actually need use files cause creation deletion — codice_4 specification work thus simple do-nothing program needed fill role iefbr14 thus used create delete data set using jcl secondary reason run iefbr14 unmount devices usually tapes disks left mounted previous job perhaps error job jcl job ended error either event system operators would often need demount devices started task – codice_5 – often provided purpose simply entering command system console would run started task consisted one step however due design job management dealloc must actually exist system procedure library sys1.proclib lest start command fail also started tasks must single jobstep started task control stc module within job management component operating system accepts single-step jobs fails multi-step jobs without exception least z/os branching execute another program would cause calling program evaluated syntax errors point ief derives convention mainframe computers programs supplied ibm grouped together function creator group shared three-letter prefix os/360 first letter almost always programs produced job management group including iefbr14 used prefix ief common prefixes included ieb dataset utility programs ieh system utility programs iew program linkage loading major components still iea operating system supervisor iec input/output supervisor explained br 14 essential function program simply return operating system portion program name often mnemonic — example iebupdte dataset utility ieb applied updates updte source code files iehinitt system utility ieh initialized init magnetic tape labels explained usage name br14 comes ibm assembler-language instruction branch address register 14 convention used return subroutine early users os/360 familiar ibm assembler language would recognized example jcl would //iefbr14 job acct 'delete dataset msgclass=j class=a //step0001 exec pgm=iefbr14 //deldd dd dsn=xxxxx.yyyyy.zzzzz // disp= mod delete delete unit=dasd create partitioned data set //tzzz84r job notify= sysuid msgclass=x //step01 exec pgm=iefbr14 //dd1 dd dsn=tkol084.demo disp= new catlg delete // dcb= recfm=fb lrecl=80 blksize=80 dsorg=po // space= trk 1,1,1 rlse // unit=sysda iefbr14 consisted initially single instruction branch register 14 mnemonic used ibm assembler br hence name ief br 14 br 14 identically equivalent bcr 15,14 branch always mask 15 always address contained general purpose register 14 br pseudo instruction bcr 15 system assembler accepts many cases pseudo-instructions logical equivalents canonical system/360 instructions canonical instance br 14 bcr 15,14 linkage convention os/360 descendants requires program invoked register 14 containing address return control complete register 15 containing address called program loaded memory completion program loads return code register 15 branches address contained register 14 initially iefbr14 coded characteristics mind iefbr14 initially used dummy control section one simply returned caller executable module original version program alter register 15 original application placeholder certain load modules generated sysgen system generation executable program per se since iefbr14 always invoked functional equivalent canonical balr 14,15 instruction return code register 15 always non-zero later second instruction added clear return code would exit determinant status namely zero initially programmers using properties job control language anyway indeterminate return code problem however subsequently programmers indeed using properties determinate status became mandatory modification iefbr14 way impact original use placeholder machine code modified program equivalent machine code eliminating br clarity makes perfect sense os/360 initiator initially attaches job-step task using attach macro-instruction svc 42 unwinding effect attach macro type 2 svc instruction must complementary instruction namely exit macro necessarily type 1 svc instruction svc 3 trombetta michael finkelstein sue carolyn 1985 os jcl utilities addison wesley page 152 | [
10786,
11656,
5397,
2168,
9977,
3323,
477
] | None |
9,640 | 4 | Wireless_security:wireless security wireless security prevention unauthorized access damage computers data using wireless networks include wi-fi networks common type wi-fi security includes wired equivalent privacy wep wi-fi protected access wpa wep notoriously weak security standard password uses often cracked minutes basic laptop computer widely available software tools wep old ieee 802.11 standard 1997 superseded 2003 wpa wi-fi protected access wpa quick alternative improve security wep current standard wpa2 hardware support wpa2 without firmware upgrade replacement wpa2 uses encryption device encrypts network 256-bit key longer key length improves security wep enterprises often enforce security using certificate-based system authenticate connecting device following standard 802.1x many laptop computers wireless cards pre-installed ability enter network mobile great benefits however wireless networking prone security issues hackers found wireless networks relatively easy break even use wireless technology hack wired networks result important enterprises define effective wireless security policies guard unauthorized access important resources wireless intrusion prevention systems wips wireless intrusion detection systems wids commonly used enforce wireless security policies risks users wireless technology increased service become popular relatively dangers wireless technology first introduced hackers yet time latch new technology wireless networks commonly found work place however many security risks associated current wireless protocols encryption methods carelessness ignorance exists user corporate level hacking methods become much sophisticated innovative wireless access hacking also become much easier accessible easy-to-use windows- linux-based tools made available web charge organizations wireless access points installed feel need address wireless security concerns in-stat mdr meta group estimated 95 corporate laptop computers planned purchased 2005 equipped wireless cards issues arise supposedly non-wireless organization wireless laptop plugged corporate network hacker could sit parking lot gather information laptops and/or devices even break wireless card–equipped laptop gain access wired network anyone within geographical network range open unencrypted wireless network sniff capture record traffic gain unauthorized access internal network resources well internet use information resources perform disruptive illegal acts security breaches become important concerns enterprise home networks router security activated owner deactivates convenience creates free hotspot since 21st-century laptop pcs wireless networking built see intel centrino technology n't need third-party adapter pcmcia card usb dongle built-in wireless networking might enabled default without owner realizing thus broadcasting laptop accessibility computer nearby modern operating systems linux macos microsoft windows make fairly easy set pc wireless lan base station using internet connection sharing thus allowing pcs home access internet base pc however lack knowledge among users security issues inherent setting systems often may allow others nearby access connection piggybacking usually achieved without wireless network operator knowledge may even without knowledge intruding user computer automatically selects nearby unsecured wireless network use access point wireless security aspect computer security however organizations may particularly vulnerable security breaches caused rogue access points employee trusted entity brings wireless router plugs unsecured switchport entire network exposed anyone within range signals similarly employee adds wireless interface networked computer using open usb port may create breach network security would allow access confidential materials however effective countermeasures like disabling open switchports switch configuration vlan configuration limit network access available protect network information contains countermeasures must applied uniformly network devices due availability low cost use wireless communication technologies increases domains beyond originally intended usage areas e.g m2m communication industrial applications industrial applications often specific security requirements hence important understand characteristics applications evaluate vulnerabilities bearing highest risk context evaluation vulnerabilities resulting vulnerability catalogs industrial context considering wlan nfc zigbee available wireless networks common organizations individuals many laptop computers wireless cards pre-installed ability enter network mobile great benefits however wireless networking prone security issues hackers found wireless networks relatively easy break even use wireless technology hack wired networks result important enterprises define effective wireless security policies guard unauthorized access important resources wireless intrusion prevention systems wips wireless intrusion detection systems wids commonly used enforce wireless security policies relatively dangers wireless technology first introduced effort maintain communication high effort intrude always higher variety risks users wireless technology increased service become popular technology commonly available today great number security risks associated current wireless protocols encryption methods carelessness ignorance exists user corporate level hacking methods become much sophisticated innovative wireless modes unauthorised access links functions data variable respective entities make use program code exist full scope model threat extent prevention relies known modes methods attack relevant methods suppression applied methods however new mode operation create new options threatening hence prevention requires steady drive improvement described modes attack snapshot typical methods scenarios apply violation security perimeter corporate network come number different methods intents one methods referred “ accidental association ” user turns computer latches wireless access point neighboring company overlapping network user may even know occurred however security breach proprietary company information exposed could exist link one company especially true laptop also hooked wired network accidental association case wireless vulnerability called mis-association mis-association accidental deliberate example done bypass corporate firewall result deliberate attempts wireless clients lure connecting attacker aps “ malicious associations ” wireless devices actively made attackers connect company network laptop instead company access point ap types laptops known “ soft aps ” created cyber criminal runs software makes his/her wireless network card look like legitimate access point thief gained access he/she steal passwords launch attacks wired network plant trojans since wireless networks operate layer 2 level layer 3 protections network authentication virtual private networks vpns offer barrier wireless 802.1x authentications help protection still vulnerable hacking idea behind type attack may break vpn security measures likely criminal trying take client layer 2 level ad hoc networks pose security threat ad hoc networks defined peer peer networks wireless computers access point types networks usually little protection encryption methods used provide security security hole provided ad hoc networking ad hoc network bridge provides networks usually corporate environment unfortunate default settings versions microsoft windows feature turned unless explicitly disabled thus user may even know unsecured ad hoc network operation computer also using wired wireless infrastructure network time providing bridge secured organizational network unsecured ad hoc connection bridging two forms direct bridge requires user actually configure bridge two connections thus unlikely initiated unless explicitly desired indirect bridge shared resources user computer indirect bridge may expose private data shared user computer lan connections shared folders private network attached storage making distinction authenticated private connections unauthenticated ad-hoc networks presents threats already familiar open/public unsecured wifi access points firewall rules may circumvented case poorly configured operating systems local settings non-traditional networks personal network bluetooth devices safe hacking regarded security risk even barcode readers handheld pdas wireless printers copiers secured non-traditional networks easily overlooked personnel narrowly focused laptops access points identity theft mac spoofing occurs hacker able listen network traffic identify mac address computer network privileges wireless systems allow kind mac filtering allow authorized computers specific mac ids gain access utilize network however programs exist network “ sniffing ” capabilities combine programs software allow computer pretend mac address hacker desires hacker easily get around hurdle mac filtering effective small residential soho networks since provides protection wireless device air 802.11 device air freely transmits unencrypted mac address 802.11 headers requires special equipment software detect anyone 802.11 receiver laptop wireless adapter freeware wireless packet analyzer obtain mac address transmitting 802.11 within range organizational environment wireless devices air throughout active working shift mac filtering provides false sense security since prevents casual unintended connections organizational infrastructure nothing prevent directed attack man-in-the-middle attacker entices computers log computer set soft ap access point done hacker connects real access point another wireless card offering steady flow traffic transparent hacking computer real network hacker sniff traffic one type man-in-the-middle attack relies security faults challenge handshake protocols execute “ de-authentication attack ” attack forces ap-connected computers drop connections reconnect hacker soft ap disconnects user modem connect using password one extract recording event man-in-the-middle attacks enhanced software lanjack airjack automate multiple steps process meaning required skill done script kiddies hotspots particularly vulnerable attack since little security networks denial-of-service attack dos occurs attacker continually bombards targeted ap access point network bogus requests premature successful connection messages failure messages and/or commands cause legitimate users able get network may even cause network crash attacks rely abuse protocols extensible authentication protocol eap dos attack little expose organizational data malicious attacker since interruption network prevents flow data actually indirectly protects data preventing transmitted usual reason performing dos attack observe recovery wireless network initial handshake codes re-transmitted devices providing opportunity malicious attacker record codes use various cracking tools analyze security weaknesses exploit gain unauthorized access system works best weakly encrypted systems wep number tools available launch dictionary style attack possibly accepted security keys based model security key captured network recovery network injection attack hacker make use access points exposed non-filtered network traffic specifically broadcasting network traffic “ spanning tree ” 802.1d ospf rip hsrp hacker injects bogus networking re-configuration commands affect routers switches intelligent hubs whole network brought manner require rebooting even reprogramming intelligent networking devices caffe latte attack another way defeat wep necessary attacker area network using exploit using process targets windows wireless stack possible obtain wep key remote client sending flood encrypted arp requests assailant takes advantage shared key authentication message modification flaws 802.11 wep attacker uses arp responses obtain wep key less 6 minutes three principal ways secure wireless network ready designed system prevent fraudulent usage wireless communication protect data functions wirelessly communicating computers entities however system qualifying taken measures whole according common understanding shall seen state art system qualifying international consensus specified iso/iec 15408 wireless intrusion prevention system wips concept robust way counteract wireless security risks however wips exist ready designed solution implement software package wips typically implemented overlay existing wireless lan infrastructure although may deployed standalone enforce no-wireless policies within organization wips considered important wireless security july 2009 payment card industry security standards council published wireless guidelines pci dss recommending use wips automate wireless scanning protection large organizations range wireless security measures varying effectiveness practicality simple ineffective method attempt secure wireless network hide ssid service set identifier provides little protection anything casual intrusion efforts one simplest techniques allow access known pre-approved mac addresses wireless access points contain type mac id filtering however attacker simply sniff mac address authorized client spoof address typical wireless access points provide ip addresses clients via dhcp requiring clients set addresses makes difficult casual unsophisticated intruder log onto network provides little protection sophisticated attacker ieee 802.1x ieee standard authentication mechanisms devices wishing attach wireless lan wired equivalent privacy wep encryption standard original encryption standard wireless since 2004 ratification wpa2 ieee declared deprecated often supported seldom never default modern equipment concerns raised security early 2001 dramatically demonstrated 2005 fbi yet 2007 t.j. maxx admitted massive security breach due part reliance wep payment card industry took 2008 prohibit use even allowed existing use continue june 2010 wi-fi protected access wpa wpa2 security protocols later created address problems wep weak password dictionary word short character string used wpa wpa2 cracked using long enough random password e.g 14 random letters passphrase e.g 5 randomly chosen words makes pre-shared key wpa virtually uncrackable second generation wpa security protocol wpa2 based final ieee 802.11i amendment 802.11 standard eligible fips 140-2 compliance encryption schemes client network knows keys read traffic wi-fi protected access wpa software/firmware improvement wep regular wlan-equipment worked wep able simply upgraded new equipment needs bought wpa trimmed-down version 802.11i security standard developed ieee 802.11 replace wep tkip encryption algorithm developed wpa provide improvements wep could fielded firmware upgrades existing 802.11 devices wpa profile also provides optional support aes-ccmp algorithm preferred algorithm 802.11i wpa2 wpa enterprise provides radius based authentication using 802.1x wpa personal uses pre-shared shared key psk establish security using 8 63 character passphrase psk may also entered 64 character hexadecimal string weak psk passphrases broken using off-line dictionary attacks capturing messages four-way exchange client reconnects deauthenticated wireless suites aircrack-ng crack weak passphrase less minute wep/wpa crackers airsnort auditor security collection still wpa personal secure used ‘ good ’ passphrases full 64-character hexadecimal key information however erik tews man created fragmentation attack wep going reveal way breaking wpa tkip implementation tokyo pacsec security conference november 2008 cracking encryption packet 12–15 minutes still announcement 'crack somewhat overblown media august 2009 best attack wpa beck-tews attack partially successful works short data packets decipher wpa key requires specific wpa implementations order work addition wpav1 tkip wids eap may added alongside also vpn-networks non-continuous secure network connections may set 802.11-standard vpn implementations include pptp l2tp ipsec ssh however extra layer security may also cracked tools anger deceit ettercap pptp ike-scan ikeprobe ipsectrace ikecrack ipsec-connections stands temporal key integrity protocol acronym pronounced tee-kip part ieee 802.11i standard tkip implements per-packet key mixing re-keying system also provides message integrity check avoid problems wep wpa-improvement ieee 802.1x standard already improved authentication authorization access wireless wired lans addition extra measures extensible authentication protocol eap initiated even greater amount security eap uses central authentication server unfortunately 2002 maryland professor discovered shortcomings next years shortcomings addressed use tls enhancements new version eap called extended eap available several versions include eap-md5 peapv0 peapv1 eap-mschapv2 leap eap-fast eap-tls eap-ttls mschapv2 eap-sim eap-versions include leap peap eap leap stands lightweight extensible authentication protocol protocol based 802.1x helps minimize original security flaws using wep sophisticated key management system eap-version safer eap-md5 also uses mac address authentication leap secure thc-leapcracker used break cisco ’ version leap used computers connected access point form dictionary attack anwrap asleap finally crackers capable breaking leap peap stands protected extensible authentication protocol protocol allows secure transport data passwords encryption keys without need certificate server developed cisco microsoft rsa security eaps types extensible authentication protocol implementations based eap framework framework established supports existing eap types well future authentication methods eap-tls offers good protection mutual authentication client network authenticated using certificates per-session wep keys eap-fast also offers good protection eap-ttls another alternative made certicom funk software convenient one need distribute certificates users yet offers slightly less protection eap-tls solutions include newer system authentication ieee 802.1x promises enhance security wired wireless networks wireless access points incorporate technologies like often also routers built thus becoming wireless gateways one argue layer 2 layer 3 encryption methods good enough protecting valuable data like passwords personal emails technologies add encryption parts communication path still allowing people spy traffic gained access wired network somehow solution may encryption authorization application layer using technologies like ssl ssh gnupg pgp similar disadvantage end-to-end method may fail cover traffic encryption router level vpn single switch encrypts traffic even udp dns lookups end-to-end encryption hand service secured must encryption turned often every connection must also turned separately sending emails every recipient must support encryption method must exchange keys correctly web web sites offer https even browser sends ip addresses clear text prized resource often access internet office lan owner seeking restrict access face nontrivial enforcement task user authenticate router newest rigorous security implement wlan today 802.11i rsn-standard full-fledged 802.11i standard uses wpav2 however require newest hardware unlike wpav1 thus potentially requiring purchase new equipment new hardware required may either aes-wrap early version 802.11i newer better aes-ccmp-equipment one make sure one needs wrap ccmp-equipment 2 hardware standards compatible wpa2 wifi alliance branded version final 802.11i standard primary enhancement wpa inclusion aes-ccmp algorithm mandatory feature wpa wpa2 support eap authentication methods using radius servers preshared key psk number wpa wpa2 networks increasing number wep networks decreasing security vulnerabilities wep wpa2 found least one security vulnerability nicknamed hole196 vulnerability uses wpa2 group temporal key gtk shared key among users bssid launch attacks users bssid named page 196 ieee 802.11i specification vulnerability discussed order exploit performed gtk must known attacker unlike 802.1x 802.11i already additional security-services tkip wpav1 wpav2 may work cooperation eap wids stands wlan authentication privacy infrastructure wireless security standard defined chinese government strong form security combined server software hardware software card token use internal identity code combined user entered pin create powerful algorithm frequently generate new encryption code server time synced card token secure way conduct wireless transmissions companies area make usb tokens software tokens smart cards even make hardware versions double employee picture badge currently safest security measures smart cards usb tokens however expensive next safest methods wpa2 wpa radius server one three provide good base foundation security third item list educate employees contractors security risks personal preventive measures also task keep company workers knowledge base up-to-date new dangers cautious employees educated much lower chance anyone accidentally cause breach security locking laptop bring wide open home access point extend mobile range employees need made aware company laptop security extends outside site walls well includes places coffee houses workers vulnerable last item list deals 24/7 active defense measures ensure company network secure compliant take form regularly looking access point server firewall logs try detect unusual activity instance large files went access point early hours morning serious investigation incident would called number software hardware devices used supplement usual logs usual safety measures practical cases apply specialized wall paint window film room building significantly attenuate wireless signals keeps signals propagating outside facility significantly improve wireless security difficult hackers receive signals beyond controlled area enterprise within parking lots dos attacks easy detect however lot difficult stop even detection three common ways stop dos attack black holing one possible way stopping dos attack situation drop ip packets attacker good long-term strategy attackers change source address quickly may negative effects done automatically attacker could knowingly spoof attack packets ip address corporate partner automated defenses could block legitimate traffic partner cause additional problems validating handshake involves creating false opens setting aside resources sender acknowledges firewalls address syn floods pre-validating tcp handshake done creating false opens whenever syn segment arrives firewall sends back syn/ack segment without passing syn segment target server firewall gets back ack would happen legitimate connection would firewall send original syn segment server originally intended firewall n't set aside resources connection syn segment arrives handling large number false syn segments small burden rate limiting used reduce certain type traffic amount reasonably dealt broadcasting internal network could still used limited rate example subtle dos attacks good attack aimed single server keeps transmission lines least partially open communication rate limiting frustrates attacker legitimate users helps fully solve problem dos traffic clogs access line going internet nothing border firewall help situation dos attacks problems community stopped help isp organizations whose computers taken bots used attack firms increasing number mobile devices 802.1x interfaces security mobile devices becomes concern open standards kismet targeted towards securing laptops access points solutions extend towards covering mobile devices also host based solutions mobile handsets pda 802.1x interface security within mobile devices fall three categories wireless ips solutions offer wireless security mobile devices mobile patient monitoring devices becoming integral part healthcare industry devices eventually become method choice accessing implementing health checks patients located remote areas types patient monitoring systems security reliability critical influence condition patients could leave medical professionals dark condition patient compromised order implement 802.11i one must first make sure router/access point well client devices indeed equipped support network encryption done server radius ads nds ldap needs integrated server computer local network access point router integrated authentication server remote server ap's/routers integrated authentication servers often expensive specifically option commercial usage like hot spots hosted 802.1x servers via internet require monthly fee running private server free yet disadvantage one must set server needs continuously set server server client software must installed server software required enterprise authentication server radius ads nds ldap required software picked various suppliers microsoft cisco funk software meetinghouse data open-source projects software includes client software comes built-in windows xp may integrated os using following software remote authentication dial user service radius aaa authentication authorization accounting protocol used remote network access radius originally proprietary later published isoc documents rfc 2138 rfc 2139 idea inside server act gatekeeper verifying identities username password already pre-determined user radius server also configured enforce user policies restrictions well record accounting information connection time purposes billing today almost full wireless network coverage many urban areas infrastructure wireless community network consider future internet already place one could roam around always connected internet nodes open public due security concerns nodes encrypted users n't know disable encryption many people consider proper etiquette leave access points open public allowing free access internet others think default encryption provides substantial protection small inconvenience dangers open access fear may substantial even home dsl router density access points even problem limited number channels available partly overlap channel handle multiple networks places many private wireless networks example apartment complexes limited number wi-fi radio channels might cause slowness problems according advocates open access points n't involve significant risks open wireless networks public hand countries including germany persons providing open access point may made partially liable illegal activity conducted via access point also many contracts isps specify connection may shared persons | [
7426,
4,
7557,
10756,
5387,
9356,
6797,
9744,
9745,
7828,
794,
3742,
10656,
420,
165,
4517,
3752,
9640,
939,
1067,
3629,
11435,
2996,
10806,
823,
5433,
5437,
2430,
1608,
841,
8264,
10058,
10574,
4691,
10451,
4053,
8022,
10329,
8922,
8283,... | None |
9,641 | 3 | Compatibility_card:compatibility card compatibility card expansion card computers allows hardware emulation another device popular macintosh systems allowed emulate windows pcs via nubus pci apple computer made many cards including compatibility card apple iie later orange micro made end 1990s greater application availability made cards obsolete besides pc compatibility cards others existed 3do blaster pcs | [
6797,
4047,
8625,
6130,
9686,
4220
] | None |
9,642 | 5 | Mutt_(email_client):mutt email client mutt text-based email client unix-like systems originally written michael elkins 1995 released gnu general public license version 2 later version mutt slogan mail clients suck one sucks less mutt supports mail storing formats notably mbox maildir protocols pop3 imap etc. also includes mime support notably full pgp/gpg s/mime integration mutt originally designed mail user agent mua relied locally accessible mailbox sendmail infrastructure according mutt homepage though written scratch mutt initial interface based largely elm mail client new mutt message scoring threading capabilities support fetching sending email via various protocols pop3 imap smtp added later however mutt still relies external tools composing filtering messages mutt hundreds configuration directives commands allows changing key bindings making keyboard macros complex actions well colors layout interface variants concept known hooks many settings changed based criteria current mailbox outgoing message recipients also many patches extensions available add functionality nntp support sidebar similar often found graphical mail clients mutt fully controlled keyboard support mail conversation threading meaning one easily move around long discussions mailing lists new messages composed external text editor default unlike pine embeds editor known pico mutt capable efficiently searching mail stores calling mail indexing tools notmuch many people recommend mutt used way alternatively users search mail stores mutt calling grep via bash script mutt often used security professionals security-conscious users smaller attack surface compared clients ship web browser rendering engine javascript interpreter relation transport layer security mutt configured trust certificates first use use older less secure versions transport layer security protocol | [
1664,
2050,
9986,
3462,
3465,
1297,
3218,
9747,
5397,
11418,
8094,
7983,
1075,
2101,
9909,
3015,
10956,
10450,
6231,
7255,
9690,
8283,
9451,
5612,
10861,
9459,
3578,
8443,
7036,
2045
] | Validation |
9,643 | 2 | FLEX_(operating_system):flex operating system flex single-tasking operating system developed technical systems consultants tsc west lafayette indiana motorola 6800 1976 original version 8 floppy disks smaller version 5.25 floppies called mini-flex also later ported motorola 6809 version called flex9 versions text-based intended use display devices ranging printing terminals like teletype model 33 asr smart terminals graphic displays supported tsc software hardware manufacturers supported elementary graphics pointing devices disk-based operating system using 256-byte sectors soft-sectored floppies disk structure used linkage bytes sector indicate next sector file free list directory structure much simplified result tsc others provided several programming languages including basic two flavors standard extended tokenizing version extended basic called pre-compiled basic forth c fortran pascal tsc also wrote version flex smoke signal dos california hardware manufacturer smoke signal broadcasting version used forward back linkage bytes sector increased disk reliability expense compatibility speed later tsc introduced multitasking multi-user unix-like uniflex operating system required dma disk controllers 8 disk sold small numbers several tsc computer languages ported uniflex early 1980s flex offered compusense ltd operating system 6809-based dragon 64 home computer following list commands supported different versions flex operating system | [
6675,
7187,
10776,
25,
8729,
4637,
9762,
5158,
7217,
9784,
10809,
576,
10333,
97,
5220,
8298,
7285,
9335,
2168,
1147,
3197,
1150,
2179,
10883,
6797,
9366,
6296,
7325,
9887,
3248,
6837,
8388,
9932,
5840,
1750,
7382,
8410,
5853,
1253,
5363,... | Test |
9,644 | 9 | Thomas_E._Kurtz:thomas e. kurtz thomas eugene kurtz born february 22 1928 retired dartmouth professor mathematics computer scientist along colleague john g. kemeny set motion revolutionary concept making computers freely available college students library books implementing concept time-sharing dartmouth college mission allow non-expert users interact computer co-developed basic programming language beginners all-purpose symbolic instruction code dartmouth time sharing system 1963 1964 native oak park illinois united states kurtz graduated knox college 1950 awarded ph.d. degree princeton university 1956 advisor john tukey joined mathematics department dartmouth college year taught statistics numerical analysis 1983 kurtz kemeny co-founded company called true basic inc. market true basic updated version language kurtz also served council chairman trustee educom well trustee chairman nercomp pierce panel president scientific advisory committee kurtz also served steering committees conduit project ccuc conferences instructional computing 1974 american federation information processing societies gave award kurtz kemeny national computer conference work basic time-sharing 1991 computer society honored kurtz ieee computer pioneer award 1994 inducted fellow association computing machinery 1951 kurtz first experience computing came summer session institute numerical analysis university california los angeles interests included numerical analysis statistics computer science ever since graduated 1950 obtained bachelor degree majoring mathematics 1956 age 28 went acquire phd princeton university thesis problem multiple comparisons mathematical statistics kurtz composed first computer program 1951 working computers ucla institute numerical analysis performed feat finishing grad school one year tuition princeton university 1963 1964 kurtz kemeny developed first version dartmouth time-sharing system time-sharing system university use basic language 1966 1975 kurtz served director kiewit computation center dartmouth 1975 1978 director office academic computing 1980 1988 kurtz director computer information systems program dartmouth ground-breaking multidisciplinary graduate program develop leaders industry subsequently kurtz returned teaching full-time professor mathematics emphasis statistics computer science part dartmouth time-sharing system kemeny kurtz created basic programming language first basic program ran may 1 1964 4 a.m. neither kemeny kurtz thought start something grand merely hoped would help students learn something computers using pair made certain invention immediately dispersed public made real money dartmouth college copyrighted basic however made basic available free anyone wanting use name language originated kurtz ’ wish simple acronym meant something well kurtz states “ wanted word simple simple-minded basic one. ” basic along books published earned lot positive feedback example “ second edition basic programming gives thorough description basic useful beginner also experienced programmer. ” “ overall evaluation basic programming ideal individual wishes program minimum effort equal value group classroom instruction. ” theme basic average computer user stressed kurtz open letter reiterates upon past statements basic invented give students simple programming language easy learn current languages time dedicated professionals went say basic people want dedicate lives programming repetition idea kurtz accentuates even success language wrote would remain implemented masses specialists basic standards created 1980s ecma ansi versions released 1986 1987 respectively basic popularity skyrocketed 1975 pair youngsters harvard dormitory bill gates paul allen created version basic viable one earliest personal computers gates allen ’ version became prominent iterations basic road basic long one kemeny kurtz forged darsimco – dartmouth simplified code – dartmouth ’ inaugural attempt making computing language 1956 however darsimco soon became obsolete language fortran manifested 1962 kemeny dartmouth undergraduate sidney marshall created language dope dartmouth oversimplified programming experiment direct predecessor basic dope little used kurtz preferred trying implement successful languages fortran algol kurtz experience dartmouth algol 30 lgp-30 convinced devising subsets languages quite practical led adopt kemeny ’ notion creating new language entirely although basic widely regarded success many computing professionals thought poor choice larger complicated programs larger programs became confusing messy used “ go ” statement jump one line program another criticism original language unstructured made difficult split programs separate parts improve readability basic structured also hindered ability debug modify parts code limited use larger companies hence largely remained language used smaller programs 1983 response proliferation street basics group graduating dartmouth students persuaded kemeny kurtz offer dartmouth version language commercial product first offering company true basic inc. based dartmouth basic 7 featured modern programming constructs “ if..then..else do..loop exit ” company described product “ simple elegant powerful true basic. “ upon kemeny advice true basic limited single os computer system “ today versions true basic available dos mac os windows unix linux systems ” kurtz retired dartmouth college 1993 continued develop maintain true basic | [
10400,
11328,
11075,
5317,
4492,
823,
5492,
1783,
8057,
11229
] | Test |
9,645 | 0 | Reverso_(language_tools):reverso language tools reverso website specializing online translation aids language services include online dictionaries translation context spell checking conjugation tools softissimo inc. active since 1998 aim providing online translation linguistic tools corporate mass markets 2013 released reverso context bilingual dictionary tool based big data machine learning algorithms 2016 reverso acquired fleex service learning english via subtitled movies based content netflix fleex expanded also include video content youtube ted talks custom video files 2018 released new mobile app combines translations learning activities reverso suite online linguistic services 40 million users comprises various types language web apps tools translation language learning tools support many languages including english french hebrew spanish italian russian since founding reverso provided machine translation tools automated translation texts various languages including neural machine translation reverso context online mobile application combining big data large multilingual corpora allow users search translations context texts sourced mainly films books governmental documents allowing users see idiomatic usages translations well synonyms voice output reverso context app also provides language-learning features flashcards based words example sentences reverso context mobile app 4.7 ranking google play app store reverso also released browser extensions chrome firefox incorporate features reverso context web browsing reverso website also provides collaborative bilingual dictionaries various pairs languages use crowd sourcing allow users submit new entries provide feedback also tools conjugation verbs various language spell checking tools written multilingual grammar guides language learners reverso online localize service translates documents websites preserving layout february 2018 revealed translations reverso translation web site returned antisemitic results much nicer returning dachau much nicer auschwitz results prompted international league racism anti-semitism threaten reverso legal actions reverso answered twitter controversial content would removed one month time | [
7918,
9552,
735,
7164,
6655
] | Test |
9,646 | 2 | Security-focused_operating_system:security-focused operating system list operating systems specifically focused security general-purpose operating systems may secure practice without specifically security-focused similar concepts include security-evaluated operating systems achieved certification auditing organization trusted operating systems provide sufficient support multilevel security evidence correctness meet particular set requirements operating systems engineered around object-capabilities security paradigm instead system deciding access request granted bundling authority designation makes impossible request anything legitimate starting windows server 2008 windows server added installation option called server core traditional graphical user interface installed administration windows server 2008 rely windows command prompt roles components installed individually option reduces windows server footprint result reduced demand system resources reduced number components could potentially exploited via potential security vulnerabilities later windows server 2016 microsoft introduced nano server installation option even reduced footprint headless support locally connected keyboard monitor nano server windows server 1709 constantly updated sibling windows server 2016 installed container | [
2560,
516,
5636,
10756,
5644,
5139,
9237,
10780,
4637,
3618,
2084,
6184,
9257,
3629,
1584,
9266,
1083,
7739,
10813,
9791,
10817,
8772,
8787,
2134,
89,
3162,
2143,
2658,
6244,
107,
6763,
2671,
3700,
5245,
125,
5246,
11391,
7812,
8326,
9356... | Test |
9,647 | 8 | IBM_HTTP_Server:ibm http server ibm http server ihs web server based apache software foundation http server runs aix hp-ux linux solaris jade windows nt ibm z/os available download use free charge without ibm support http server also included ibm websphere application server distribution packages default web console administration port 8008 ibm administration port 2001 license agreement ibm http server ibm international license agreement non-warranted programs ilan | [
225,
865,
9580,
11693,
8976,
6993,
823,
1304,
2168,
3966
] | Test |
9,648 | 7 | Snappii:snappii snappii sometimes stylized snappii cloud-based codeless platform rapid mobile app development largely businesses enterprises 2015 company helped produce 26,000 mobile apps 29 different industries 17 languages snappii-produced apps include starbucks location finder public safety app college campuses mobile pdf form uploader snappii used ios android devices snappii founded 2010 alex bakman also serves ceo snappii platform launched 2011 primarily tool iphone app creation company ipad android app creation systems still beta november 2011 2012 snappii added compatibility support android devices also 2012 customers created 6,000th app using snappii platform 2015 snappii released series new features ranging audio video support enhanced charting capabilities also announced new offer called 5 weeks- 5k-guaranteed app guarantees customers custom native app within five weeks 5,000 august 2015 company raised 250,000 investor funding 2015 snappii platform produced around 26,000 applications 17 languages companies 29 different industries snappii offers cloud-based codeless platform developing business enterprise mobile applications ios android devices users including non-programmers create apps using wysiwyg formatting rather source code snappii also create custom native apps clients whether client opts create app enlists help snappii programmers must pay monthly hosting fee snappii helped develop apps companies 29 different industries including health care construction public safety retail oil gas others features snappii platform include audio video support charting capabilities ability upload pdf forms via pdf form manager app | [
4194,
6539,
9732,
8627
] | Test |
9,649 | 3 | LGA_1366:lga 1366 lga 1366 also known socket b intel cpu socket socket supersedes intel lga 775 socket high-end performance desktop segments also replaces server-oriented lga 771 socket j entry level superseded lga 2011 lga stands land grid array socket 1,366 protruding pins touch contact points underside processor cpu accesses three channels ddr3 memory via processor internal memory controller socket 1366 socket b uses qpi connect cpu reduced-function northbridge serves mainly pci-express controller slower dmi used connect intel recent northbridge southbridge components comparison intel socket 1156 socket h moves qpi link pci-express controller onto processor using dmi interface single-component chipset called pch serves traditional southbridge functions difference pin number mostly reflection number memory channels served november 2008 intel released core i7 first processor requiring socket lga 1366 socket processors discontinued sometime 2012 superseded lga 2011 socket 14 november 2011 supporting sandy bridge e-series processors accompanying lga 1156 discontinued time replaced lga 1155 socket b processors following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable processors using socket lower static load limit previous models using lga 775 available reference heat sinks include circular design heatpipe design chipsets support lga 1366 intel x58 desktop 3400 3420 3450 5500 5520 7500 server | [
3588,
3973,
5901,
5523,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
4537,
7105,
6339,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
2525,
9570,
10468,
613,
8552,
1260,
4717,
10225,
... | None |
9,650 | 4 | CloudPassage:cloudpassage cloudpassage company provides automation platform delivered via software service improves security private public hybrid cloud computing environments cloudpassage headquartered san francisco cloudpassage founded carson sweet talli somekh vitaliy geraymovych 2010 company used cloud computing big data analytics implement security monitoring control platform called halo cloudpassage spent year stealth developing halo technology coming stealth mode closed beta january 2011 june 2012 company launched commercial product included configuration security monitoring network microsegmentation two-factor authentication privileged access management 2013 cloudpassage expanded halo support large enterprises advanced security compliance requirements product called halo enterprise first round venture funding company raised 6.5 million april 2012 cloudpassage raised 14 million financing round led tenaya capital february 2014 cloudpassage announced raised 25.5 million funding led shasta ventures total company invested 30 million technology raised approximately 88 million capital cloudpassage platform provides cloud workload security compliance systems hosted public private cloud infrastructure environments including hybrid cloud multi-cloud workload hosting models flagship product company offers called halo halo secures virtual servers public private hybrid cloud infrastructures provides file integrity monitoring fim also administering firewall automation vulnerability monitoring network access control security event alerting assessment halo platform also provides security applications privileged access management software vulnerability scanning multifactor authentication log-based ids december 2013 cloudpassage set six servers microsoft windows linux operating systems combinations popular programs invited hackers attempt hack servers top prize 5,000 winning hacker novice completed task four hours cloudpassage programmed servers use basic default security settings show vulnerable cloud computing programs security threats may 2011 gigaom named cloudpassage list top 50 cloud innovators month eweek recognized cloudpassage one 16 hot startup companies flying radar sc magazine named cloudpassage industry innovator virtualization cloud security category 2012 also 2012 wall street journal named cloudpassage runner information security category technology innovation awards cloudpassage large-scale security program halo best security solution 2014 siia codie awards | [
4194,
6372,
6797,
467,
823
] | None |
9,651 | 3 | Monopoly_(1985_video_game):monopoly 1985 video game monopoly 1985 multi-platform video game based board game monopoly released amiga amstrad cpc bbc micro commodore 64 ms-dos msx tatung einstein thomson mo thomson zx spectrum published leisure genius title one many inspired property game contains similar gameplay board game based various physical tasks replaced automation digital representations computer shopper praised game graphics animation deemed excellent value spectrum thought game excellent conversion board game sinclair user wrote game boring one issue amiga power deemed sound conversion albeit expensive source material another publication said competent arguably quite pointless | [
7536,
9166,
9006
] | Test |
9,652 | 3 | Mundial_de_Fútbol:mundial de fútbol mundial de fútbol football sports game released amstrad cpc zx spectrum msx ms-dos platforms created 1990 opera soft due internal problems company released celebration 1990 fifa world cup simulation show upper view goals upper lower parts screen players reached tough scroll | [
9166,
9006
] | Validation |
9,653 | 0 | Quack.com:quack.com quack.com early voice portal company domain name later used quack ipad search application aol founded 1998 steven woods jeromy carriere alex quilici pittsburgh pennsylvania usa based voice portal infrastructure company named quackware quack first company try create voice portal consumer-based destination site consumers could access information voice alone also complete transactions quackware launched beta phone service 1999 allowed consumers purchase books sites amazon cds sites cdnow answering short set questions quack followed set information services movie listings inspired expanding upon moviefone news weather stock quotes concept introduced series lookalike startups including tellme networks raised money internet startup history similar concept quack received venture funding 1999 moved operations mountain view silicon valley california 1999 deal lycos announced may 2000 september 2000 quack acquired 200 million america online aol moved onto netscape campus left netscape team quack attacked canadian press representative canadian brain drain us internet bubble focusing recruiting efforts university waterloo hiring 50 engineers waterloo less 10 months quack competitor tellme networks raised enormous funds became highly competitive market 2000 emergence dozen additional competitors 12-month period following acquisition america online effort led ted leonsis bring quack aol interactive quack voice service became aolbyphone one aol web properties along mapquest moviefone others quack secured several patents underlie technical challenges delivering interactive voice services constructing voice portal required integrations innovations speech recognition speech generation also databases application specification constraint-based reasoning artificial intelligence computational linguistics quack name derived company goal providing voice-based services broadly quick ubiquitous access consumer knowledge patents assigned quack.com include system method voice access internet-based information system method advertising internet voice portal recognizing axiom interactive voice systems one must know set possible answers question asking system method determining one web site information another web site quack.com spoofed simpsons march 2002 episode blame lisa comquaak sign replaced another equally crazy telecom company name july 2010 quack.com became focus new aol ipad application web search experience product delivers web results blends picture video twitter results enables preview web results go site search within result flip results pages making full use ipad touch screen features ipad app free via itunes support discontinued 2012 | [] | Test |
9,654 | 2 | Meiryo:meiryo decided new japanese font needed current ones mainly ms gothic ms mincho incompatible microsoft cleartype subpixel rendering technology meiryo intended increase legibility characters lcd screens cleartype available windows latin fonts since release windows xp october 2001 however unlike latin fonts use cleartype hinting system sizes japanese fonts distributed windows included embedded bitmap versions fonts small sizes although fonts using hinted cjk glyphs exist arial unicode ms distributed windows prior vista meiryo ui version uses condensed kana reduced line height compared meiryo introduced windows 7 also available update windows vista windows server 2008 similar ms gothic meiryo ui fonts bundled meiryo ttc files respective weights meiryo ui update also available windows vista windows server 2008 meiryo designed enhanced version verdana regarded highly readable font font baseline raised slightly improve readability mixing latin cjk texts meiryo glyphs kanji kana also height-to-width ratio 95:100 previous japanese fonts distributed windows embedded bitmap glyphs used whenever font size set around 9 points unlike previous fonts designed cjk environments meiryo contains embedded bitmaps improve readability small font sizes without using embedded bitmaps truetype hinting language used stroke-reduction similar technology used mingliu pmingliu versions 5.03 meiryo developed comply jis x 0213:2004 also use newest set personal name characters provided japanese minister justice addition contains opentype tables jis78 jis83 jis90 forms legacy usages meiryo supports following opentype layout features cyrillic greek han ideographic kana latin scripts nalt afrc dnom dlig frac fwid hwid hkna ital jp78 jp83 jp90 numr qwid ruby sinf zero smcp c2sc liga sups twid vkna vrt2 vert kern meiryo also contains glyphs normally accessible without font editor glyphs include circled 00 51–100 negative circled 00 21–100 a–z a–z kana rounded square-enclosed characters negative rounded square-enclosed characters 2x2 cjk words italic version meiryo provides italicized glyphs latin alphabet written japanese traditionally italicized microsoft windows meiryo distributed two truetype collection files regular bold glyphs stored separate files file also contains italic variant font stated earlier font included windows vista operating system windows xp font become available free charge obtaining japanese version microsoft visual c 2008 express edition electing install microsoft silverlight runtime downloading installing japanese cleartype fonts windows xp microsoft also makes meiryo available windows xp meiryo also distributed japanese version microsoft office 2008 mac microsoft office 2010 microsoft office 2013 japanese characters meiryo designed c g inc. eiichi kōno also redesigned johnston font used london underground new johnston latin characters designed matthew carter british-born creator verdana font visibly similar characters verdana font designed combination japanese latin font experts microsoft strived create font written english japanese could present well together side-by-side screen american tom rickner ascender corporation extensive programming font hinting meiryo rickner helped create first truetype fonts apple font hinting microsoft ’ georgia verdana fonts according rickner meiryo one first japanese fonts created computer screen took two years create engineer font name comes japanese word meiryō means clarity referring cleartype making text written meiryo appear clearer screen japanese spelling taken english pronunciation actual japanese spelling katakana according eiichi kōno name chosen exotic-sounding pronunciation compactness although proportional font font name contain p indicate windows font lists tokyo type directors club awarded 2007 type design prize eiichi kōno c g inc satoru akamoto takeharu suzuki yukiko ueda matthew carter meiryo font | [
2593,
4130,
9539,
7973,
8422,
1098,
4138,
2221,
4141,
1487,
6797,
3538,
4146,
4148,
8374,
4127
] | None |
9,655 | 2 | Hyper-V:hyper-v microsoft hyper-v codenamed viridian formerly known windows server virtualization native hypervisor create virtual machines x86-64 systems running windows starting windows 8 hyper-v superseded windows virtual pc hardware virtualization component client editions windows nt server computer running hyper-v configured expose individual virtual machines one networks hyper-v first released alongside windows server 2008 available without additional charge since windows server 2012 windows 8 standalone windows hyper-v server free command line interface beta version hyper-v shipped certain x86-64 editions windows server 2008 finalized version released june 26 2008 delivered windows update hyper-v since released every version windows server microsoft provides hyper-v two channels hyper-v server 2008 released october 1 2008 consists windows server 2008 server core hyper-v role windows server 2008 roles disabled limited windows services hyper-v server 2008 limited command-line interface used configure host os physical hardware software menu driven cli interface freely downloadable script files simplify configuration addition hyper-v server supports remote access via remote desktop connection however administration configuration host os guest virtual machines generally done network using either microsoft management consoles another windows computer system center virtual machine manager allows much easier point click configuration monitoring hyper-v server hyper-v server 2008 r2 edition windows server 2008 r2 made available september 2009 includes windows powershell v2 greater cli control remote access hyper-v server requires cli configuration network interfaces windows firewall also using windows vista pc administer hyper-v server 2008 r2 fully supported hyper-v implements isolation virtual machines terms partition partition logical unit isolation supported hypervisor guest operating system executes must least one parent partition hypervisor instance running supported version windows server 2008 later virtualization software runs parent partition direct access hardware devices parent partition creates child partitions host guest oss parent partition creates child partitions using hypercall api application programming interface exposed hyper-v. child partition access physical processor handle real interrupts instead virtual view processor runs guest virtual address depending configuration hypervisor might necessarily entire virtual address space depending vm configuration hyper-v may expose subset processors partition hypervisor handles interrupts processor redirects respective partition using logical synthetic interrupt controller synic hyper-v hardware accelerate address translation guest virtual address-spaces using second level address translation provided cpu referred ept intel rvi formerly npt amd child partitions direct access hardware resources instead virtual view resources terms virtual devices request virtual devices redirected via vmbus devices parent partition manage requests vmbus logical channel enables inter-partition communication response also redirected via vmbus devices parent partition also virtual devices redirected reaches parent partition gain access physical devices parent partitions run virtualization service provider vsp connects vmbus handles device access requests child partitions child partition virtual devices internally run virtualization service client vsc redirect request vsps parent partition via vmbus entire process transparent guest os virtual devices also take advantage windows server virtualization feature named enlightened i/o storage networking graphics subsystems among others enlightened i/o specialized virtualization-aware implementation high level communication protocols like scsi allows bypassing device emulation layer takes advantage vmbus directly makes communication efficient requires guest os support enlightened i/o currently following operating systems support enlightened i/o allowing therefore run faster guest operating systems hyper-v operating systems need use slower emulated hardware hyper-v role available x86-64 variants standard enterprise datacenter editions windows server 2008 later well pro enterprise education editions windows 8 later windows server installed regardless whether installation full core installation addition hyper-v made available part hyper-v server operating system freeware edition windows server either way host computer needs following amount memory assigned virtual machines depends operating system number cpus assigned virtual machine also depends os also maximum number concurrently active virtual machines following table lists supported guest operating systems windows 10 pro rs5 windows server 2019 fedora 8 9 unsupported however reported run third-party support freebsd 8.2 later guests provided partnership netapp citrix includes emulated paravirtualized modes operation well several hyperv integration services windows 10 home support hyper-v desktop virtualization vdi products third-party companies quest software vworkspace citrix xendesktop systancia applidis fusion ericom powerterm webconnect provide ability host centrally manage desktop virtual machines data center giving end users full pc desktop experience guest operating systems enlightened i/o hypervisor-aware kernel windows server 2008 later server versions windows vista sp1 later clients offerings citrix xenserver novell able use host resources better since vsc drivers guests communicate vsps directly vmbus non- enlightened operating systems run emulated i/o however integration components include vsc drivers available windows server 2003 sp2 windows vista sp1 linux achieve better performance july 20 2009 microsoft submitted hyper-v drivers inclusion linux kernel terms gpl microsoft required submit code discovered incorporated hyper-v network driver gpl-licensed components statically linked closed-source binaries kernels beginning 2.6.32 may include inbuilt hyper-v paravirtualization support improves performance virtual linux guest systems windows host environment hyper-v provides basic virtualization support linux guests box paravirtualization support requires installing linux integration components satori inputvsc drivers xen-enabled linux guest distributions may also paravirtualized hyper-v. microsoft officially supported suse linux enterprise server 10 sp1/sp2 x86 x64 manner though xen-enabled linux able run february 2008 red hat microsoft signed virtualization pact hypervisor interoperability respective server operating systems enable red hat enterprise linux 5 officially supported hyper-v. hyper-v windows server 2012 windows server 2012 r2 changes support list follows hyper-v like microsoft virtual server windows virtual pc saves guest os single virtual hard disk file supports older .vhd format well newer .vhdx older .vhd files virtual server 2005 virtual pc 2004 virtual pc 2007 copied used hyper-v old virtual machine integration software equivalents hyper-v integration services must removed virtual machine migrated guest os configured started using hyper-v guest os detect changes virtual hardware installing hyper-v integration services installs five services improve performance time adding new guest video network card drivers hyper-v virtualize audio hardware windows 8.1 windows server 2012 r2 possible work around issue connecting virtual machine remote desktop connection network connection use audio redirection feature windows 8.1 windows server 2012 r2 add enhanced session mode provides redirection without network connection optical drives virtualized guest vm read-only officially hyper-v support host/root operating system optical drives pass-through guest vms result burning discs audio cds video cd/dvd-video playback supported however workaround exists using iscsi protocol setting iscsi target host machine optical drive talked standard microsoft iscsi initiator microsoft produces iscsi target software alternative third party products used cpus without second level address translation slat installation wddm accelerated graphics drivers primary os cause dramatic drop graphic performance occurs graphics drivers access memory pattern causes translation lookaside buffer flushed frequently cache thrashing windows server 2008 microsoft officially supported hyper-v default vga drivers support windows aero higher resolutions rotation multi-monitor display however unofficial workarounds available certain cases older non-wddm graphics drivers sometimes cause performance issues though drivers always install smoothly windows server intel integrated graphics cards cause tlb flushing even wddm drivers nvidia graphics drivers experience problems long windows aero turned 3d applications running windows server 2008 r2 microsoft added support second level address translation hyper-v since slat required run hyper-v windows server problem continue occur non-slat cpu used accelerated graphics drivers however slat required run hyper-v client versions windows 8 hyper-v windows server 2008 support live migration guest vms live migration defined maintaining network connections uninterrupted services vm migration physical hosts instead hyper-v server 2008 enterprise datacenter editions supports quick migration guest vm suspended one host resumed another host operation happens time takes transfer active memory guest vm network first host second host however release windows server 2008 r2 live migration supported use cluster shared volumes csvs allows failover individual vm opposed entire host failover seems node hyper-v server vm fails vm running failed node may migrate live nodes independently vms lun running nodes share lun failed node hyper-v clustering hyper-v nodes vms. see also cluster shared volumes windows server 2012 implementation hyper-v version 3.0 introduced many new features increase vm mobility including ability execute simultaneous live migrations windows server 2008 r2 supported live migrating single vm time significantly increasing time required carry administrative tasks draining node scheduled maintenance real limiting factor hardware network bandwidth available windows server 2012 also supports new shared nothing live migration option traditional shared storage required order complete migration also referred “ live system migration ” shared nothing live migration move running vm storage one hyper-v host another without perceived downtime live migration different host os versions possible although soon addressed windows server 2012 r2 windows server 2012 also introduced ability use simple smb shares shared storage option conjunction new scale file services role server 2012 highly available environments alleviating need expensive sans particularly useful low budget environments without need sacrifice performance due many new improvements smb3 stack windows server 2012 fully support live migration vms running smb shares whether live live system migration hyper-v windows server 2012 also supports ability migrate running vm storage whereby active virtual machines storage moved one infrastructure another without vm workload affected reducing limitations associated vm mobility introduction windows server 2012 r2 smb 3.0 introduced transport option live migration either clustered non-clustered virtualization hosts enables hyper-v live migration leverage additional benefits smb 3.0 brings smb multichannel smb direct conjunction rdma nics increased live migration performance windows xp frequently accesses cpu apic task-priority register tpr interrupt request level changes causing performance degradation running guests hyper-v. microsoft fixed problem windows server 2003 later intel adds tpr virtualization flexpriority vt-x intel core 2 stepping e onwards alleviate problem amd similar feature amd-v uses new register purpose however means guest use different instructions access new register amd provides driver called amd-v optimization driver installed guest network card teaming link aggregation supported nic manufacturer supplied drivers support nic teaming however windows server 2012 thus version hyper-v included supports software nic teaming hyper-v management tools compatible windows vista home basic home premium windows 7 home premium home basic starter hyper-v 2012 managed windows 8 windows server 2012 successors hyper-v uses vt-x intel amd-v amd x86 virtualization since hyper-v native hypervisor long installed third-party software use vt-x amd-v. instance intel haxm android device emulator used android studio microsoft visual studio run hyper-v installed 64-bit skus windows 8 pro enterprise later come special version hyper-v called client hyper-v. windows server 2012 introduced many new features hyper-v. windows server 2012 r2 microsoft introduced another set new features hyper-v windows server 2016 windows 10 1607 adds hyper-v windows server 2019 windows 10 1809 adds | [
1540,
6150,
11270,
2058,
3082,
5643,
4624,
18,
1560,
537,
540,
3102,
9762,
8227,
6692,
8740,
1577,
10281,
2101,
7733,
10812,
10302,
3648,
5697,
582,
1094,
5702,
10310,
1098,
7754,
8266,
4173,
4174,
10828,
7248,
9808,
4178,
4695,
10839,
60... | Test |
9,656 | 0 | Yseop:yseop yseop pronounced easy-op privately held multinational computer software company offices new york oxford uk lyon bogota dallas paris company commercialises artificial intelligence powered natural language generation software yseop compose flagship solution automates writing written reports financial services business intelligence marketing writes english spanish french german dutch japanese yseop commercializes natural language generation nlg software applies reasoning data turns written recommendations reports speed 3,000 pages per second software also used write newspaper stories data explain motivation context behind numbers date yseop software write english spanish french german premise self-service nlg software market yseop software used across variety industries financial industry including example société générale factset insurance 2014 tom austin vice president fellow gartner cited yseop narrative science automated insights part smart machine technological revolution promise one disruptive changes ever 2014 yseop also listed one top 10 innovative startups france electronic business group digital innovation summit paris 2015 yseop honored leading vendor—digital solutions financial advisors 2015 myprivatebanking research 2015 economist featured yseop one front cover articles 2016 ventana research named yseop software one innovative us year 2016 2019 future finance partnership deloitte granted societe generale innovative initiative year award digitization management control processes based yseop platform https //www.businesswire.com/news/home/20190410005068/fr/ research development yseop technology began 20 years ago team mathematical lab called ens cachan france yseop first commercialized product middleware end 2008 opened american subsidiary dallas texas 2012 yseop founded alain kaeser john rauscher sold start-up called sunopsis oracle 2006 competing companies yseop composein nlg industry include narrative science firm based chicago automated insights firm based durham north carolina retresco based berlin germany united robots sweden arria nlg yseop software suite also competes indirectly ibm watson | [
2440,
6576,
6695
] | Test |
9,657 | 3 | Java_processor:java processor java processor implementation java virtual machine jvm hardware words java bytecode makes instruction set abstract machine becomes instruction set concrete machine today popular form high-level language computer architecture many java processors available including | [
9665,
8868,
7173,
5612,
5872,
6322,
7421
] | Validation |
9,658 | 3 | Sorcerian:sorcerian first game developed nihon falcom fifth dragon slayer line games originally released nec pc-8801 1987 later ported personal computer platforms nec pc-9801 nec pc-88va sharp x1 turbo msx2 released title dragon slayer v sorcerian english version ms-dos pcs published sierra entertainment 1990 ports atari st commodore amiga apple iigs macintosh platforms announced released 1997 falcom released sorcerian forever microsoft windows-based pcs 2000 falcom released sorcerian original remake sorcerian microsoft windows-based pcs addition console versions sorcerian somewhat differing content pc counterparts developed version mega drive developed sega version pc engine cd developed victor musical industries version dreamcast developed victor interactive software mega drive version re-released wii virtual console september 16 2008 ios version released january 20 2012 sorcerian side-scrolling action-rpg player create ten characters four members present party time character highly customizable four different classes/races fighter wizard elf dwarf 60 possible jobs/occupations ranging clown exorcist available perform strengths weaknesses affecting seven primary attributes strength intelligence protection magic resistance vitality dexterity karma different ways well different equipment limitations player choose fifteen different scenarios quests play order choice party must battle enemies perform tasks within given levels clear scenario moving onto another scenario choice player controls entire party time four members running line jumping sequence attacking unison party members follow behind manner similar options arcade shooter gradius 1985 sorcerian also employs class-based puzzles using high-strength character force open doors characters default starting age 16 time player begins new scenario year passes additional time passes towns character goes training enchants items characters age different rates depending race humans reaching old age 60 dwarves 100 elves 200 upon reaching old age every year passes character die permanently random time also “ advance time ” speed flow time another new feature sorcerian episodic format extended across various expansion packs besides default fifteen scenarios come game number additional scenario packs released aging system created additional scenario packs mind number add-on expansion packs containing new scenarios developed pc-8801 version sorcerian falcom companies soundtrack original sorcerian composed yuzo koshiro mieko ishikawa reiko takebayashi hideya nagata takahito abe falcom-developed additional scenarios handled solely ishikawa music original sorcerian arranged kenji kawai pc engine cd release rob atesalp ken allen composed mt-32 midi-compatible arrangement soundtrack sierra entertainment english version game soundtrack releases sorcerian include 1990 famicom tsūshin famitsu reviewed sega mega drive genesis version game giving generally positive score 27 40 computer gaming world reviewed pc dos version october 1991 issue noted interesting feature two liked game division many miniquests stating instead usual long adventure one sports fifteen separate small quests allows certain amount variety however disliked magic system stated action arcade style typical japanese game find irksome noted hack-and-slash puzzles solved along way magazine concluded sorcerian good change pace comfortable arcade action 2008 game designer hideki kamiya listed sorcerian among favorite games time citing one games influenced work production platinumgames title scalebound kamiya said inspired sorcerian well hydlide 3 noted influence sorcerian nowiki /nowiki fantasy theme gigantic monsters different scenarios expansive possibilities tons adventures enemies hydra boss lots amazing dragons version sorcerian ios base game includes 5 free scenarios maximum party size 5 characters pay versions include 10 extra scenarios maximum party size 10 characters part sorcerian 25th anniversary 2012-12-06 2012-12-20 sorcerian ios released free 3 in-game items 10000gold revival lv3 x2 magic item x3 free registering aeriagames member gets revival lv3 x3 in-game items | [
770,
3113,
10217,
6797,
9166,
6129,
10931,
11443,
11575,
1596
] | Train |
9,659 | 3 | Deus_Ex_Machina_(video_game):deus ex machina video game deus ex machina video game designed created mel croucher published automata uk zx spectrum october 1984 later converted popular 8-bit formats game first accompanied fully synchronised soundtrack featured narration celebrity artists music cast included ian dury jon pertwee donna bailey frankie howerd e.p thompson croucher also composed music andrew stagg coded original spectrum version colin jones later known author/publisher colin bradshaw-jones programmer commodore 64 version game charts life defect formed machine conception growth evolution eventually death progression loosely based seven ages man shakespeare play like includes many quotations parodies despite critical acclaim time game conform conventions packaging pricing required distributors retailers game sold mail-order direct public subsequently gained cult status underground art game game name latin expression deus ex machina literally meaning god machine players game take control defected machine taken form human body players would experience different stages life way cell senile old considered visual-audio entertainment although game sound separated audio cassette tape needs played alongside game length audio cassette 46 minutes also length game although game could played without audio cassette would make easier understand help soundtrack soundtrack includes songs musical compositions also voices famous actors game comes full transcript speech could times played without audio deus ex machina zx spectrum 1984 mobygames retrieved 2018-12-11 croucher retrospectively viewed game disappointment saying sold game sensible price wanted put lovely poster nice packaging double vinyl gatefold result price £15 compared usual £8 meant sales low game broke even 2010 game included one titles book 1001 video games must play die re-imagining game went production 2010 title deus ex machina 2 design creation croucher new cast led sir christopher lee programmer chyna whyne machine chris madin defect joaquim de almeida defect police original ian dury session vocals 2014 croucher released book game history making new game book entitled deus ex machina best game never played life game sequel eventually released 2015 2018 rights automata uk games transferred company subvert ltd | [
9006
] | Test |
9,660 | 2 | Criticism_of_desktop_Linux:criticism desktop linux criticism desktop linux history comment perceived shortcomings linux operating system installed desktop computers criticisms questioned plethora choice usefulness desktop systems also multi-media playback audio development linux based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used relatively desktop laptop computers linus torvalds expressed intended linux kernel used desktop operating systems argues android widely used comes pre-installed new phones linux distributions would need bundled new computers gain market share linux criticized number reasons including lack user-friendliness steep learning curve inadequate desktop use lacking support exotic hardware relatively small games library lacking native versions widely used applications missing gui api standardization critics believe linux ever gain large share desktop market may 2009 preston gralla contributing editor computerworld.com believed linux never important desktop/notebook users even though felt simple straightforward use low usage indicative low importance desktop market essay luxury ignorance open-source horror story eric s. raymond stated lack usability many open-source linux tools lack manuals lack thought users experience james donald princeton university analyzed shared library concepts several operation systems 2003 paper titled improved portability shared libraries worried lack windows application compatibility group equivalent desktop linux criticized late 2010 missed opportunity become significant force desktop computing pc world executive editor robert strohmeyer commented although linux exceptional security stability well great performance usability time desktop linux succeed missed nick farrell writing techeye felt release windows vista missed opportunity grab significant market share critics indicated linux fail desktop due geeky hard use obscure praise distributions strohmeyer saying best-known distribution ubuntu received high marks usability every major player technology press laid blame failure open-source community strohmeyer named fierce ideology open-source community large responsible farrell stated biggest killer putting penguin software desktop linux community think apple fanboys completely barking role models sanity loudmouthed open sauce religious loonies like many fundamentalists totally inflexible – waving gnu handed god richard stallman accusation over-zealous advocacy dealt previously 2006 dominic humphries stated aims linux community desktop market-share popularity linux best operating system made community choice applications free software development offers led people criticize linux confusing new users past well large number choices linux desktop operating systems although argued choice one key strengths linux tony mobily editor free software magazine identified problems server roots linux article 2009 software installation gnu/linux still broken – path fixing august 2014 debconf portland also linus torvalds voiced unhappiness binary application packaging linux distro ecosystem lack strong api standards multimedia criticised example adobe systems development blog penguin.swf discusses complicated linux audio infrastructure analysis welcome jungle nearly one dozen actively supported systems called audio jungle pulseaudio main developer lennart poettering stated difficult programmers know audio api use purpose linux past criticized lack driver support however largely due manufacturers supporting linux system n't 2004 ati started development linux drivers major adoption linux servers android encouraged driver development linux wireless driver support problem area linux one time many drivers missing users required use solutions ndiswrapper utilizes drivers made windows operating system broadcom particularly criticized releasing drivers issue also worked around extracting proprietary firmware use linux broadcom since released free open-source drivers linux kernel eliminating issues modern broadcom chipsets problem largely fixed recent years fairly large number drivers adding support wireless cards available today however many features still missing drivers mostly due manufacturers providing specifications documentation thus forcing developers reverse engineer cards | [
2560,
5644,
5139,
9237,
10780,
4637,
3618,
9257,
1584,
9266,
2109,
10817,
8772,
2134,
3162,
2658,
6244,
6763,
11391,
7812,
8326,
6797,
10382,
657,
2195,
9882,
6301,
1694,
10933,
4803,
6352,
3289,
3802,
10464,
1761,
4841,
7920,
7938,
4360,
... | Test |
9,661 | 1 | Schema_migration:schema migration software engineering schema migration also database migration database change management refers management incremental reversible changes relational database schemas schema migration performed database whenever necessary update revert database schema newer older version migrations performed programmatically using schema migration tool invoked specified desired schema version tool automates successive application reversal appropriate sequence schema changes brought desired state schema migration tools aim minimize impact schema changes existing data database despite preservation data general guaranteed schema changes deletion database column destroy data i.e values stored column rows table deleted instead tools help preserve meaning data reorganize existing data meet new requirements since meaning data often encoded configuration tools usually needs manual intervention schema migration allows fixing mistakes adapting data requirements change essential part software evolution especially agile environments see applying schema migration production database always risk development test databases tend smaller cleaner data better understood everything else fails amount data small enough human process production databases usually huge old full surprises surprises come many sources reasons migration process needs high level discipline thorough testing sound backup strategy developing software applications backed database developers typically develop application source code tandem evolving database schema code typically rigid expectations columns tables constraints present database schema whenever needs interact one version database schema code developed considered fully compatible version source code software testing developers may mock presence compatible database system unit testing level testing higher e.g integration testing system testing common developers test application local remote test database schematically compatible version source code test advanced applications migration subject migration testing schema migration technology data models longer need fully designed up-front capable adapted changing project requirements throughout software development lifecycle teams software developers usually use version control systems manage collaborate changes made versions source code different developers develop divergent relatively older newer branches source code make changes additions development supposing software development interacts database every version source code associated least one database schema compatible good software testing practice schema migrations performed test databases ensure schema compatible source code streamline process schema migration tool usually invoked part automated software build prerequisite automated testing phase schema migration tools said solve versioning problems database schemas version control systems solve versioning problems source code practice many schema migration tools actually rely textual representation schema changes files containing sql statements version history schema changes effectively stored alongside program source code within vcs approach ensures information necessary recover compatible database schema particular code branch recoverable source tree another benefit approach handling concurrent conflicting schema changes developers may simply use usual text-based conflict resolution tools reconcile differences schema migration tooling could seen facility track history evolving schema developers longer need remove entire test database order create new test database scratch e.g using schema creation scripts ddl generation tools generation test data costs lot time developers avoid regenerating test data small non-destructive changes schema | [
2688,
2819,
9481,
6154,
10505,
10518,
4376,
1816,
9112,
7968,
290,
1314,
7461,
8742,
5550,
5808,
10418,
3768,
3004,
9663,
4416,
5441,
11457,
8518,
9286,
72,
10573,
853,
2901,
9942,
9177,
987,
860,
10459,
9183,
11362,
10471,
8808,
9079,
26... | Test |
9,662 | 3 | Oil's_Well:oil well oil well computer game published sierra on-line 1983 game written atari 8-bit family thomas j. mitchell oil well similar 1982 arcade game anteater re-themed drilling oil instead hungry insectivore ports released 1983 apple ii commodore 64 1984 colecovision ibm pc booter 1985 msx sharp x1 version improved visuals without mitchell involvement released ms-dos 1990 player attempts manage oil drilling operation collect oil done moving drill head maze using four directional control buttons head trailed pipeline connecting base subterranean creatures populate maze head destroy creatures pipeline vulnerable player traverses maze pipe grows longer pressing button quickly retracts head player advance eight different levels ahoy stated commodore version graphics sounds serviceable gameplay experience unique ... recommended infoworld called ibm pcjr version clever basic game early 1980s u.s. gaming magazine computer games awarded oil well 1984 golden floppy award excellence category maze game year despite already clone anteater several additional clones borrowed theme oil well pipeline run commodore 64 1990 oilmania atari st 1991 | [
9166,
9006
] | Test |
9,663 | 1 | Locks_with_ordered_sharing:locks ordered sharing databases transaction processing term locks ordered sharing comprises several variants two phase locking 2pl concurrency control protocol generated changing blocking semantics locks upon conflicts one variant identical strict commitment ordering sco | [
2688,
9481,
10505,
10258,
7446,
10518,
4376,
9112,
5658,
7581,
7968,
290,
1314,
7461,
8742,
5550,
5808,
10418,
9527,
3768,
3004,
9661,
4416,
2369,
5441,
11457,
3398,
8518,
72,
2901,
9942,
9177,
987,
860,
9183,
11362,
10471,
8808,
6383,
90... | Test |
9,664 | 4 | Kelihos_botnet:kelihos botnet kelihos botnet also known hlux botnet mainly involved spamming theft bitcoins kelihos botnet first discovered around researchers originally suspected found new version either storm waledac botnet due similarities modus operandi source code bot analysis botnet showed instead new 45,000-infected-computer-strong botnet capable sending estimated spam messages day microsoft took botnet operation codenamed operation b79 time microsoft filed civil charges dominique alexander piatti dotfree group sro 22 john doe defendants suspected involvement botnet issuing 3,700 subdomains used botnet charges later dropped microsoft determined named defendants intentionally aid botnet controllers january 2012 new version botnet discovered one sometimes referred kelihos.b version 2 consisting estimated 110,000 infected computers month microsoft pressed charges russian citizen andrey sabelnikov former security professional alleged creator kelihos botnet sourcecode second version botnet shut several privately owned firms sinkholing – technique gave companies control botnet cutting original controllers following shutdown second version botnet new version surfaced early 2 april though disagreement research groups whether botnet simply remnants disabled version 2 botnet new version altogether version botnet currently consists estimated 70,000 infected computers kelihos.c version mostly infects computers facebook sending users website malicious download links clicked trojan horse named fifesoc downloaded turns computer zombie part botnet 24 november 2015 kelihos botnet event occurred causing widespread false positives blacklisted ips ″november 24 2015 widespread false positives earlier today large scale kelihos botnet event occurred large scale many email installations seeing excess 20 kelihos spam see inbound email volume jump volume much 500 n't unusual thing normally cbl/xbl successfully dealing large scale kelihos spam spikes like often daily years email allegedly us federal reserve saying something restrictions u.s. federal wire ach online payments notice fraudulent attached excel spreadsheet .xls contained macro instructions downloader download windows executable virus likely dyreza dridex malware detection rules initially deployed cbl unfortunately insufficiently detailed listed number ip addresses error.″ affidavit unsealed february 5 2018 showed apple ’ unexpected role bringing russian spam king justice peter levashov allegedly ran kelihos botnet alias “ severa ” renting access spammers cybercriminals despite levashov ’ significant efforts anonymity court records show federal agents surveilling icloud account since may 20th 2016 funneling back crucial information may led arrest standing federal icloud warrant would given authorities running tab ip addresses used log account could easily tipped vacation barcelona spain arrested request us law enforcement extradited united states prosecution kelihos botnet so-called peer-to-peer botnet individual botnet nodes capable acting command-and-control servers entire botnet traditional non-peer-to-peer botnets nodes receive instructions work limited set servers – servers removed taken botnet longer receive instructions therefore effectively shut peer-to-peer botnets seek mitigate risk allowing every peer send instructions entire botnet thus making difficult shut first version botnet mainly involved denial-of-service attacks email spam version two botnet added ability steal bitcoin wallets well program used mine bitcoins spam capacity allows botnet spread sending malware links users order infect trojan horse though later versions mostly propagate social network sites particular facebook comprehensive list kelihos spam found following research paper february 2 2018 united states department justice announced russian national extradited spain arraigned connecticut charges stemming alleged operation kelihos botnet peter yuryevich levashov 37 also known pyotr levashov petr levashov peter severa petr severa sergey astakhov st. petersburg detained april 7 2017 barcelona arrested spanish authorities based upon criminal complaint arrest warrant issued united states district connecticut 3 february 2018 pleaded guilty charges wire email fraud hacking identity theft conspiracy appearing federal judge u.s. state connecticut remains detention september 2018 peter yuryevich levashov pleaded guilty | [
1024,
3072,
10756,
535,
9761,
4644,
4133,
4648,
3116,
46,
10297,
3643,
7739,
1087,
1608,
3657,
8779,
81,
8789,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
3724,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
10952,
3789,
4304,
10457,
4314... | Test |
9,665 | 7 | Sun_Microsystems:sun microsystems sun microsystems inc. american company sold computers computer components software information technology services created java programming language solaris operating system zfs network file system nfs sparc sun contributed significantly evolution several key computing technologies among unix risc processors thin client computing virtualized computing sun founded february 24 1982 height sun headquarters santa clara california part silicon valley former west campus agnews developmental center april 20 2009 announced oracle corporation would acquire sun 7.4 billion deal completed january 27 2010 sun products included computer servers workstations built risc-based sparc processor architecture well x86-based amd opteron intel xeon processors sun also developed storage systems suite software products including solaris operating system developer tools web infrastructure software identity management applications technologies included java platform nfs general sun proponent open systems particularly unix also major contributor open-source software evidenced 1 billion purchase 2008 mysql open-source relational database management system various times sun manufacturing facilities several locations worldwide including newark california hillsboro oregon linlithgow scotland however time company acquired oracle outsourced manufacturing responsibilities initial design became sun first unix workstation sun-1 conceived andy bechtolsheim graduate student stanford university palo alto california bechtolsheim originally designed sun workstation stanford university network communications project personal cad workstation designed around motorola 68000 processor advanced memory management unit mmu support unix operating system virtual memory support built first ones spare parts obtained stanford department computer science silicon valley supply houses february 24 1982 scott mcnealy andy bechtolsheim vinod khosla stanford graduate students founded sun microsystems bill joy berkeley primary developer berkeley software distribution bsd joined soon counted one original founders sun name derived initials stanford university network sun profitable first quarter july 1982 1983 sun known producing 68k-based systems high-quality graphics computers dec vax run 4.2bsd licensed computer design manufacturers typically used build multibus-based systems running unix unisoft sun initial public offering 1986 stock symbol sunw sun workstations later sun worldwide symbol changed 2007 java sun stated brand awareness associated java platform better represented company current strategy sun logo features four interleaved copies word sun form rotationally symmetric ambigram designed professor vaughan pratt also stanford initial version logo orange sides oriented horizontally vertically subsequently rotated stand one corner re-colored purple later blue dot-com bubble sun began making much money shares rose dramatically also began spending much hiring workers building genuine demand much web start-up companies anticipating business would never happen 2000 bubble burst sales sun important hardware division went free-fall customers closed shop auctioned high-end servers several quarters steep losses led executive departures rounds layoffs cost cutting december 2001 stock fell 1998 pre-bubble level 100 kept falling faster many tech companies year later dipped 10 tenth even 1990 bounced back 20 mid-2004 sun closed newark california factory consolidated manufacturing hillsboro oregon 2006 rest newark campus put market 2004 sun canceled two major processor projects emphasized high instruction-level parallelism operating frequency instead company chose concentrate processors optimized multi-threading multiprocessing ultrasparc t1 processor codenamed niagara company also announced collaboration fujitsu use japanese company processor chips mid-range high-end sun servers servers announced april 17 2007 m-series part sparc enterprise series february 2005 sun announced sun grid grid computing deployment offered utility computing services priced us 1 per cpu/hour processing per gb/month storage offering built upon existing 3,000-cpu server farm used internal r 10 years sun marketed able achieve 97 utilization august 2005 first commercial use grid announced financial risk simulations later launched first software service product january 2005 sun reported net profit 19 million fiscal 2005 second quarter first time three years followed net loss 9 million gaap basis third quarter 2005 reported april 14 2005 january 2007 sun reported net gaap profit 126 million revenue 3.337 billion fiscal second quarter shortly following news announced kohlberg kravis roberts kkr would invest 700 million company sun engineering groups bangalore beijing dublin grenoble hamburg prague st. petersburg tel aviv tokyo trondheim 2007–2008 sun posted revenue 13.8 billion 2 billion cash first-quarter 2008 losses 1.68 billion revenue fell 7 12.99 billion sun stock lost 80 value november 2007 november 2008 reducing company market value 3 billion falling sales large corporate clients sun announced plans lay 5,000 6,000 workers 15–18 work force expected save 700 million 800 million year result moves also taking 600 million charges may 11 2009 following shareholders held 100,000 common shares sun 9.50 per share offered oracle received amounts indicated acquisition closed first decade sun history company positioned products technical workstations competing successfully low-cost vendor workstation wars 1980s shifted hardware product line emphasize servers storage high-level telecom control systems operational support systems service predominantly used sun equipment sun originally used motorola 68000 family central processing units sun-1 sun-3 computer series sun-1 employed 68000 cpu sun-2 series 68010 sun-3 series based 68020 later sun-3x using 68030 1987 company began using sparc risc processor architecture design computer systems starting sun-4 line sparc initially 32-bit architecture sparc v7 introduction sparc v9 architecture 1995 added 64-bit extensions sun developed several generations sparc-based computer systems including sparcstation ultra sun blade series workstations sparcserver netra enterprise sun fire line servers early 1990s company began extend product line include large-scale symmetric multiprocessing servers starting four-processor sparcserver 600mp followed 8-processor sparcserver 1000 20-processor sparccenter 2000 based work done conjunction xerox parc 1995 company introduced sun ultra series machines equipped first 64-bit implementation sparc processors ultrasparc late 1990s transformation product line favor large 64-bit smp systems accelerated acquisition cray business systems division silicon graphics 32-bit 64-processor cray superserver 6400 related sparccenter led 64-bit sun enterprise 10000 high-end server otherwise known starfire september 2004 sun made available systems ultrasparc iv first multi-core sparc processor followed ultrasparc iv+ september 2005 revisions higher clock speeds 2007 cpus used powerful enterprise class high-end cc-numa servers developed sun sun fire e25k november 2005 sun launched ultrasparc t1 notable ability concurrently run 32 threads execution 8 processor cores intent drive efficient use cpu resources particular importance data centers increasing need reduce power air conditioning demands much comes heat generated cpus t1 followed 2007 ultrasparc t2 extended number threads per core 4 8 sun open sourced design specifications t1 t2 processors via opensparc project 2006 sun ventured blade server high density rack-mounted systems market sun blade distinct sun blade workstation april 2007 sun released sparc enterprise server products jointly designed sun fujitsu based fujitsu sparc64 vi later processors m-class sparc enterprise systems include high-end reliability availability features later t-series servers also badged sparc enterprise rather sun fire april 2008 sun released servers ultrasparc t2 plus smp capable version ultrasparc t2 available 2 4 processor configurations first coolthreads cpu multi-processor capability made possible build standard rack-mounted servers could simultaneously process massive 256 cpu threads hardware sun sparc enterprise t5440 considered record industry since 2010 development sun machines based sparc architecture including new sparc t-series servers sparc t3 t4 chips done part oracle corporation hardware division late 1980s sun also marketed intel 80386-based machine sun386i designed hybrid system running sunos time supporting dos applications remained market brief time follow-up 486i upgrade announced prototype units ever manufactured sun brief first foray x86 systems ended early 1990s decided concentrate sparc retire last motorola systems 386i products move dubbed mcnealy wood behind one arrowhead even sun kept hand x86 world release solaris pc compatibles began shipping 1993 1997 sun acquired diba inc. followed later acquisition cobalt networks 2000 aim building network appliances single function computers meant consumers sun also marketed network computer term popularized eventually trademarked oracle javastation diskless system designed run java applications although none business initiatives particularly successful cobalt purchase gave sun toehold return x86 hardware market 2002 sun introduced first general purpose x86 system lx50 based part previous cobalt system expertise also sun first system announced support linux well solaris 2003 sun announced strategic alliance amd produce x86/x64 servers based amd opteron processor followed shortly sun acquisition kealia startup founded original sun founder andy bechtolsheim focusing high-performance amd-based servers following year sun launched opteron-based sun fire v20z v40z servers java workstation w1100z w2100z workstations september 12 2005 sun unveiled new range opteron-based servers sun fire x2100 x4100 x4200 servers designed scratch team led bechtolsheim address heat power consumption issues commonly faced data centers july 2006 sun fire x4500 x4600 systems introduced extending line x64 systems support solaris also linux microsoft windows january 22 2007 sun announced broad strategic alliance intel intel endorsed solaris mainstream operating system mission critical unix xeon processor-based systems contributed engineering resources opensolaris sun began using intel xeon processor x64 server line starting sun blade x6250 server module introduced june 2007 may 5 2008 amd announced operating system research center osrc expanded focus include optimization sun opensolaris xvm virtualization products amd based processors although sun initially known hardware company software history began founding 1982 co-founder bill joy one leading unix developers time contributed vi editor c shell significant work developing tcp/ip bsd unix os sun later developed software java programming language acquired software staroffice virtualbox mysql sun used community-based open-source licensing major technologies support products open source technologies gnome-based desktop software called java desktop system originally code-named madhatter distributed solaris operating system one point linux sun supported java enterprise system middleware stack linux released source code solaris open-source common development distribution license via opensolaris community sun positioning includes commitment indemnify users software intellectual property disputes concerning software offers support services variety pricing bases including per-employee per-socket 2006 report prepared eu unu-merit stated sun largest corporate contributor open source movements world according report sun open source contributions exceed combined total next five largest commercial contributors sun best known unix systems reputation system stability consistent design philosophy sun first workstation shipped unisoft v7 unix later 1982 sun began providing sunos customized 4.1bsd unix operating system workstations late 1980s tapped sun help develop next release branded unix 1988 announced would purchase 20 stake sun unix system v release 4 svr4 jointly developed sun sun used svr4 foundation solaris 2.x became successor sunos 4.1.x later retrospectively named solaris 1.x mid-1990s ensuing unix wars largely subsided sold unix interests relationship two companies significantly reduced 1992 sun also sold interactive unix operating system acquired bought interactive systems corporation eastman kodak company popular unix variant pc platform major competitor market leader sco unix sun focus interactive unix diminished favor solaris sparc x86 systems dropped product 2001 sun dropped solaris 2.x version numbering scheme solaris 2.6 release 1997 following version branded solaris 7 first 64-bit release intended new ultrasparc cpus based sparc v9 architecture within next four years successors solaris 8 solaris 9 released 2000 2002 respectively following several years difficult competition loss server market share competitors linux-based systems sun began include linux part strategy 2002 sun supported red hat enterprise linux suse linux enterprise server x64 systems companies canonical ltd. wind river systems montavista also supported versions linux sun sparc-based systems 2004 cultivated reputation one microsoft vocal antagonists sun entered joint relationship resolving various legal entanglements two companies receiving us 1.95 billion settlement payments sun supported microsoft windows x64 systems announced collaborative agreements microsoft including plans support virtualization environments 2005 company released solaris 10 new version included large number enhancements operating system well novel features previously unseen industry solaris 10 update releases continued next 8 years last release sun microsystems solaris 10 10/09 following updates released oracle new license agreement final release solaris 10 1/13 previously sun offered separate variant solaris called trusted solaris included augmented security features multilevel security least privilege access model solaris 10 included many capabilities trusted solaris time initial release solaris 10 11/06 included solaris trusted extensions give remaining capabilities needed make functional successor trusted solaris releasing solaris 10 source code opened cddl free software license developed open contributing opensolaris community sxce used svr4 .pkg packaging supported opensolaris releases used ips following acquisition sun oracle opensolaris continued develop open illumos illumos distributions oracle corporation continued develop opensolaris next solaris release changing back license proprietary released oracle solaris 11 november 2011 java platform developed sun james gosling early 1990s objective allowing programs function regardless device used sparking slogan write run anywhere wora objective entirely achieved prompting riposte write debug everywhere java regarded largely hardware- operating system-independent java initially promoted platform client-side applets running inside web browsers early examples java applications hotjava web browser hotjava views suite however since java successful server side internet platform consists three major parts java programming language java virtual machine jvm several java application programming interfaces apis design java platform controlled vendor user community java community process jcp java object-oriented programming language since introduction late 1995 became one world popular programming languages java programs compiled byte code executed jvm regardless environment java apis provide extensive set library routines apis evolved standard edition java se provides basic infrastructure gui functionality enterprise edition java ee aimed large software companies implementing enterprise-class application servers micro edition java used build software devices limited resources mobile devices november 13 2006 sun announced would licensing java implementation gnu general public license released java compiler jvm time february 2009 sun entered battle microsoft adobe systems promoted rival platforms build software applications internet javafx development platform music video applications builds java programming language 1999 sun acquired german software company star division office suite staroffice sun later released openoffice.org gnu lgpl sissl sun industry standards source license openoffice.org supported microsoft office file formats though perfectly available many platforms primarily linux microsoft windows mac os x solaris used open source community principal differences staroffice openoffice.org staroffice supported sun available either single-user retail box kit per-user blocks licensing enterprise included wider range fonts document templates commercial quality spellchecker staroffice also contained commercially licensed functions add-ons openoffice.org either replaced open-source free variants present packages native support opendocument format 2007 sun announced sun xvm virtualization datacenter automation product suite commodity hardware sun also acquired virtualbox 2008 earlier virtualization technologies sun like dynamic system domains dynamic reconfiguration specifically designed high-end sparc servers logical domains supports ultrasparc t1/t2/t2 plus server platforms sun marketed sun ops center provisioning software datacenter automation client side sun offered virtual desktop solutions desktop environments applications could hosted datacenter users accessing environments wide range client devices including microsoft windows pcs sun ray virtual display clients apple macintoshes pdas combination supported devices variety networks supported lan wan public internet virtual desktop products included sun ray server software sun secure global desktop sun virtual desktop infrastructure sun acquired mysql ab developer mysql database 2008 us 1 billion ceo jonathan schwartz mentioned blog optimizing performance mysql one priorities acquisition february 2008 sun began publish results mysql performance optimization work sun contributed postgresql project java platform sun contributed supported java db sun offered software products software development infrastructure services many developed house others came acquisitions including tarantella waveset technologies seebeyond vaau sun acquired many netscape non-browser software products part deal involving netscape merger aol software products initially offered iplanet brand sun-netscape alliance ended re-branded sun one sun open network environment sun java system sun middleware product branded java enterprise system jes marketed web application serving communication calendaring directory identity management service-oriented architecture sun open esb software suites available free charge systems running solaris red hat enterprise linux hp-ux windows support available optionally sun developed data center management software products included solaris cluster high availability software grid management package called sun grid engine firewall software sunscreen network equipment providers telecommunications customers sun developed sun netra high-availability suite sun produced compilers development tools sun studio brand building developing solaris linux applications sun entered software service saas market zembly social cloud-based computing platform project kenai open-source project hosting service sun sold storage systems complement system offerings also made several storage-related acquisitions june 2 2005 sun announced would purchase storage technology corporation storagetek us 4.1 billion cash 37.00 per share deal completed august 2005 2006 sun introduced sun storagetek 5800 system first application-aware programmable storage solution 2008 sun contributed source code storagetek 5800 system bsd license sun announced sun open storage platform 2008 built open source technologies late 2008 sun announced sun storage 7000 unified storage systems codenamed amber road transparent placement data systems solid-state drives ssd conventional hard drives managed zfs take advantage speed ssds economy conventional hard disks storage products included sun fire x4500 storage server sam-qfs filesystem storage management software sun marketed sun constellation system high-performance computing hpc even introduction sun constellation system 2007 sun products use many top500 systems supercomputing centers sun hpc clustertools product set message passing interface mpi libraries tools running parallel jobs solaris hpc clusters beginning version 7.0 sun switched implementation mpi open mpi donated engineering resources open mpi project sun participant openmp language committee sun studio compilers tools implemented openmp specification shared memory parallelization 2006 sun built tsubame supercomputer june 2008 fastest supercomputer asia sun built ranger texas advanced computing center tacc 2007 ranger peak performance 500 tflops 6th powerful supercomputer top500 list november 2008 sun announced opensolaris distribution integrated sun hpc products others notable sun employees included john gilmore whitfield diffie radia perlman marc tremblay sun early advocate unix-based networked computing promoting tcp/ip especially nfs reflected company motto network computer coined john gage james gosling led team developed java programming language jon bosak led creation xml specification w3c sun staff published articles company blog site staff encouraged use site blog aspect work personal life restrictions placed staff commercially confidential material jonathan i. schwartz one first ceos large companies regularly blog postings frequently quoted analyzed press 2005 sun microsystems one first fortune 500 companies instituted formal social media program sun sold oracle corporation 2009 5.6b sun staff asked share anecdotes experiences sun web site containing videos stories photographs 27 years sun made available september 2 2009 october sun announced second round thousands employees laid blamed partially delays approval merger transaction completed early 2010 january 2011 oracle agreed pay 46 million settle charges submitted false claims us federal government agencies paid kickbacks systems integrators february 2011 sun former menlo park california campus sold announced would become headquarters facebook sprawling facility built around enclosed courtyard nicknamed sun quentin september 1 2011 sun india legally became part oracle delayed due legal issues indian court | [
2051,
4107,
8207,
2073,
26,
4123,
8227,
36,
4144,
50,
58,
2106,
4166,
8266,
2123,
4172,
10325,
6230,
10327,
4189,
2143,
10340,
2149,
8295,
8301,
8303,
125,
6278,
8327,
4235,
6284,
6285,
4239,
4241,
155,
2208,
8353,
2215,
6322,
4285,
633... | None |
9,666 | 9 | ColdSpring_Framework:coldspring framework coldspring web application framework coldfusion application programming language based java spring framework originally created dave ross chris scott framework provides dependency injection inversion control aspect-oriented programming design pattern capabilities effort make configuration dependencies coldfusion components cfcs easier manage noted strength coldspring ability provide complementary services applications frameworks coldspring deeply embedded within core model-glue framework since model-glue 2.0 also fusebox since 5.0 ships coldspring-specific lexicon reverse coldspring ships connection points model-glue mach-ii unit testing framework cfcunit coldspring historically long development release cycle compared coldfusion frameworks coldspring first mentioned dave ross released pre-alpha version february 9 2005 interest found quickly within coldfusion community support group formed around software later 2005 coldspring framework web site eventually release candidate released june 2 2006 coldspring 1.0 finally released three days cfunited dave ross scheduled speak topic 1.2 release included changes make working beans especially using xml bean factory much easier including creating bean aliases including bean configuration files creating collections within configuration file fixes | [
1920,
3462,
8582,
3469,
2062,
9614,
2576,
9618,
148,
1812,
4507,
6941,
9245,
10526,
4512,
8739,
3876,
4777,
5165,
4529,
7987,
692,
8883,
7862,
3895,
5048,
9144,
6074,
190,
5314,
8644,
1353,
595,
84,
4056,
6493,
102,
8554,
8691,
3705,
11... | None |
9,667 | 2 | LinuxFund:linuxfund linux fund organization raising money making donations free open source software foss projects since 1999 irs 501 c 3 status granted linux fund august 2007 allowing direct solicitations individuals charitable foundations prior receiving 501 c 3 letter principal funding source affinity credit card program credit cards bearing graphic tux linux penguin visa cards currently offered usa us bank linux fund founded peak 1999 high-tech boom affinity credit card mbna gave away first t-shirt summer 1999 linuxworld expo summer 2000 grants developers program begun years surviving dot-com bubble organization fell stagnation june 2005 investigating reports website newsforge jay lyman revealed organization actively distributing funds foss projects lyman reported funds mbna cards continued flow organization 126,155.29 growing bank then-executive-director jerritt collord told lyman gotten burned largely one-man organization sitting idle lackluster success open oregon technology center fall 2005 founding directors met decided clean organizational backlog start funding foss projects june 2005 bank america bought mbna april 2007 bank america gave linux fund notice affinity mastercard program would discontinued effective june 30 2007 july 1 2007 us bank released linux fund visa card august 2007 irs granted linux fund 501 c 3 status may 2009 open hardware foundation joined linux fund prior cancellation bank america linux fund supporting 10 different projects including debian wikimedia foundation blender software free geek freenode openssh typical grant 500/month renewable 6 12-month commitments linux fund also given lump-sum donations order 1,000– 5,000 project funding frozen briefly bank america canceled usa mastercard agreement funding since resumed new us bank visa card current projects include mix open-source software hardware projects including gnash inkscape lives open graphics project 2005 debian project leader branden robinson thanked linux fund continued support debian project noted benefit long-term grants foss projects funding ... enable us bit forward planning debian runs entirely donations ... steady predictable flow revenue help us feel comfortable long-range resource planning linux fund deserves thanks credit pioneering new funding models free software community scott rainey michael dexter iris oren benjamin cox candace ramcharan dan carrere | [
3082,
5139,
10780,
10785,
6180,
8242,
9266,
6213,
8268,
5222,
10856,
4734,
7812,
4238,
10382,
2195,
2711,
9882,
1694,
2723,
10933,
5815,
5822,
1736,
2762,
8909,
8410,
10971,
8928,
1761,
2278,
233,
10482,
2294,
8439,
2809,
4360,
792,
10016,
... | None |
9,668 | 3 | Direction_flag:direction flag direction flag flag controls left-to-right right-to-left direction string processing stored flags register x86-compatible cpus bit number 10 flag used determine direction 'forward 'backward several bytes data copied one place memory another direction important mainly original data position memory target data position overlap | [
6596,
9158,
585,
9739,
9996,
5040,
5234,
499,
372,
3699,
9331,
9911,
7421,
602,
1915,
477
] | None |
9,669 | 3 | Darwin_Core:darwin core darwin core often abbreviated dwc extension dublin core biodiversity informatics meant provide stable standard reference sharing information biological diversity terms described standard part larger set vocabularies technical specifications development maintained biodiversity information standards tdwg formerly known taxonomic databases working group tdwg darwin core body standards includes glossary terms contexts might called properties elements fields columns attributes concepts intended facilitate sharing information biological diversity providing reference definitions examples commentaries darwin core primarily based taxa occurrence nature documented observations specimens samples related information included standard documents describing terms managed set terms extended new purposes terms used simple darwin core specification one particular way use terms share data taxa occurrences simply-structured way likely meant someone suggest formatting data according darwin core term definition commentaries meant promote consistent use terms across applications disciplines evolving commentaries discuss refine expand translate definitions examples referred links comments attribute term approach documentation allows standard adapt new purposes without disrupting existing applications meant clear separation terms defined standard applications make use example though data types constraints provided term definitions recommendations made restrict values appropriate practice darwin core decouples definition semantics individual terms application terms different technologies xml rdf simple csv text files darwin core provides separate guidelines encode terms xml text files darwin core originally created z39.50 profile z39.50 biology implementers group zbig supported funding usa national science foundation award name darwin core first coined allen allison first meeting zbig held university kansas 1998 commenting profile conceptual similarity dublin core darwin core profile later expressed xml schema document use distributed generic information retrieval digir protocol tdwg task group created revise darwin core ratified metadata standard officially released 9 october 2009 though ratified tdwg/biodiversity information standards standard since darwin core numerous previous versions production usage published standard contains history details versions leading current standard | [
6955,
140,
3052,
1752,
479
] | Test |
9,670 | 5 | XML_Configuration_Access_Protocol:xml configuration access protocol xml configuration access protocol xcap application layer protocol allows client read write modify application configuration data stored xml format server xcap maps xml document sub-trees element attributes http uris components directly accessed clients using http protocol xcap server used xcap clients store data like buddy lists presence policy combination sip presence server supports publish subscribe notify methods provide complete sip simple server solution following operations supported via xcap protocol client-server interaction operations executed following items xcap addressing mechanism based xpath provides ability navigate around xml tree following applications provided xcap using specific auid application unique id xcap protocol based following ietf standards rfc4825 rfc4826 rfc4827 rfc5025 application org.openmobilealliance.pres-rules standard added | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
479,
5471,
5472,
1... | Test |
9,671 | 2 | Pkgsrc:pkgsrc pkgsrc package source package management system unix-like operating systems forked freebsd ports collection 1997 primary package management system netbsd since evolved independently 1999 support solaris added followed support operating systems pkgsrc currently contains 22,000 packages includes popular open-source software native package manager netbsd smartos minix 3 portable across 23 different operating systems including aix various bsd derivatives hp-ux irix linux macos solaris qnx multiple ways install programs using pkgsrc pkgsrc bootstrap contains traditional ports collection utilizes series makefiles compile software source another method install pre-built binary packages via pkg_add pkg_delete tools high-level utility named pkgin also exists designed automate installation removal update binary packages manner similar debian advanced packaging tool several vendors including joyent subsidiary samsung provide binary packages popular operating systems including macos linux october 3 1997 netbsd developers alistair crooks hubert feyrer created pkgsrc based freebsd ports system intended support netbsd packages collection officially released part netbsd 1.3 january 4 1998 dragonfly bsd used pkgsrc official package system version 1.4 2006 3.4 2013 2017-09-12 commit message policy accommodates dvcs established project netbsd foundation provides official pre-built binary packages multiple combinations netbsd pkgsrc releases occasionally certain operating systems well 2018 several vendors provide pre-built binary packages several platforms | [
10760,
7181,
8213,
6680,
9245,
9762,
5155,
5670,
7722,
5677,
1071,
1080,
3131,
3649,
10817,
8778,
3667,
6227,
9324,
8816,
1138,
2168,
7293,
9343,
1668,
6797,
10900,
10394,
8347,
4775,
6828,
11442,
5819,
6333,
190,
8909,
4302,
2259,
5335,
... | Test |
9,672 | 1 | Catalog_server:catalog server catalog server provides single point access allows users centrally search information across distributed network words indexes databases files information across large network allows keywords boolean searches need provide comprehensive searching service intranet extranet even internet catalog server standard solution | [
245
] | Test |
9,673 | 3 | Last_Armageddon:last armageddon described antithesis dragon quest fantasy series introductory story deals life organisms humans animals wiped mysterious force music game considered representative hiroharu hayama early works composer japanese video games late 1980s early 1990s hayama often used music make games feel spooky dark game sequel armageddon gaiden released sega cd 1994 working designs planned release game north america side story armageddon 1995 localization cancelled due demise sega cd system humans breathed toxin-filled air earth surface became one earth kept dissolving history humanity ended dominion planet returned demons mutant creatures depend oxygen survive therefore able breathe air use land meanwhile army robots wage world war iv demons order conquer known makai demon world robots came planet wave energy created explosion turned world wasteland much later game concurrent themes including adolf hitler war creating perfect race people destruction humanity year 1999 revealed player inside one robot main bases demons gain dominion humans old planet robots impose millennium logic dictatorial force throughout makai playing robots option open player therefore player must take advantage mutant army crush robot invaders game builds theme impending world domination machines popularized famously terminator series gameplay similar final fantasy featuring turn-based fights viewed third-person perspective demon soldiers enemies may cast magic spells physical attacks magic attacks ability inflict poison damage player creatures creature poisoned player must spare creature magic points order cure affected monster spell letting creature remain poisoned certain amount time eventually lead death game plays like role-playing video game graves fallen demons home base remind player situation game player first starts game go right experienced monsters lie stadium-shaped power station southeastern corner map take foursome level 5-10 characters order defeat robots inside dome characters advance level monster images change slightly time characters advance levels 17 34 maximum possible levels monsters look completely slimy fusion cells get ugly two groups four monsters player controls daytime group nighttime group becomes night game daytime group becomes inactive nighttime group takes however hp/mp replenishment group becomes inactive next morning night phase although monsters use healing spells cure conditions like poisoning known way cure hp game via items spread throughout dungeons game using magic spell nintendo family computer version lacks monster encyclopedia exists versions game none background music game resemble pc engine fm towns version likely famicom version developed different company also four different people worked soundtrack two versions existed fm towns version large memory version normal levels animation small memory version slightly reduced levels animation fm towns version also comes series three cd-roms requires 1 megabyte ram low memory version 2 megabytes ram high memory version one character equipped powerful sword azotto person pre-determined game 3.5 floppy disk needed save game purchased separately game pc engine version 3d maps shown flat two-dimensional dungeons goblins orcs equipped swords unlike versions transition time daytime night time characters eliminated pc engine version leading immediate swap characters | [
5436,
9166,
9006
] | Test |
9,674 | 3 | Knight_Orc:knight orc knight orc standard text adventure game limited graphics platforms level 9 released 1987 comes short novella peter mcbride sign orc explaining background story night heavy drinking friends grindleguts orc awakes find strapped horse joust human knight friends nowhere seen must somehow escape predicament get even grindleguts must survive world hostile humans seeking revenge tormentors first chapter game switches science fiction setting grindleguts revealed malfunctioning non-player character futuristic massively multiplayer online role-playing game using power transitioning fantasy reality convinces several bots join escapes simulated reality facility sinclair user say knight orc ordinary adventure oh multi-user adventure ... players simulated one nice touch little bits added end descriptions tell players 'somewhere male voice cries anyone got spare treasure ... location descriptions exquisite make absence graphics ... humour worked text like something douglas adams novel quick-fire enjoyable never droll ... high spot game interactive characters ... characters goal complete one thing common hate orcs ... technically pawn may superior plot enjoyment atmosphere knight orc wins hands computer gaming world stated graphics waste disk space puzzles uneven however excellent parser virtues resulted average game computer magazine said disappointing atari magazine page 6 said excellent value money atari 8-bit version | [
9006,
10931,
9166,
8542
] | Test |
9,675 | 7 | Carrier_cloud:carrier cloud cloud computing carrier cloud class cloud integrates wide area networks wan attributes communications service providers ’ carrier grade networks enable deployment highly demanding applications cloud contrast classic cloud computing focusses data center address network connecting data centers cloud users may result unpredictable response times security issues business critical data transferred internet advent virtualization technology cost effective computing hardware well ubiquitous internet connectivity enabled first wave cloud services starting first years 21st century many businesses organizations hesitated move demanding applications on-premises dedicated hardware private public clouds response communications service providers started 2010/2011 time frame develop carrier clouds address perceived weaknesses existing cloud services weaknesses cited vary often include performance availability security service level agreements slas enable deployment time-sensitive business critical applications cloud carrier cloud designed match even exceed characteristics on-premises deployments therefore carrier cloud characterized following items carrier clouds encompass data centers different network tiers wide area networks connect multiple data centers well cloud users links data centers used instance failover overflow backup geographic diversity carrier clouds set public private hybrid clouds carrier cloud federates cloud entities using single management system orchestrate manage monitor data center network resources single system | [
10368,
4194,
10020,
5321,
4429,
5749,
8471,
7865
] | None |
9,676 | 4 | Theta_Networks:theta networks theta networks new jersey based telecommunication solutions company founded 2005 company develops deep packet inspection-based software used monitoring optimization subscriber management security mobile networks theta networks major supplier nokia siemens networks ericsson motorola orange china mobile assisted china mobile olympic games recently theta networks also working china mobile monitoring support new td-scdma networks theta solutions reassembles finds relationships subscriber application sessions open systems interconnection layer 7 using deep packet inspection cross packet inspection cross session inspection technology applied mobile use wap mms sms http dns streaming technology theta networks also offers virusguardmax dpi-based network security product company offices new jersey south america china theta networks company works france partner also recently established partnerships australia russia | [
5875,
10417,
939,
2887
] | Train |
9,677 | 4 | Fault_tolerance:fault tolerance fault tolerance property enables system continue operating properly event failure one faults within components operating quality decreases decrease proportional severity failure compared naively designed system even small failure cause total breakdown fault tolerance particularly sought high-availability life-critical systems ability maintaining functionality portions system break referred graceful degradation fault-tolerant design enables system continue intended operation possibly reduced level rather failing completely part system fails term commonly used describe computer systems designed continue less fully operational perhaps reduction throughput increase response time event partial failure system whole stopped due problems either hardware software example another field motor vehicle designed continue drivable one tires punctured structure able retain integrity presence damage due causes fatigue corrosion manufacturing flaws impact within scope individual system fault tolerance achieved anticipating exceptional conditions building system cope general aiming self-stabilization system converges towards error-free state however consequences system failure catastrophic cost making sufficiently reliable high better solution may use form duplication case consequence system failure catastrophic system must able use reversion fall back safe mode similar roll-back recovery human action humans present loop highly fault-tolerant system might continue level performance even though one components failed example building backup electrical generator provide voltage wall outlets even grid power fails system designed fail safe fail-secure fail gracefully whether functions reduced level fails completely way protects people property data injury damage intrusion disclosure computers program might fail-safe executing graceful exit opposed uncontrolled crash order prevent data corruption experiencing error similar distinction made failing well failing badly fail-deadly opposite strategy used weapon systems designed kill injure targets even part system damaged destroyed system designed experience graceful degradation fail soft used computing similar fail safe operates reduced level performance component failures example building may operate lighting reduced levels elevators reduced speeds grid power fails rather either trapping people dark completely continuing operate full power computing example graceful degradation insufficient network bandwidth available stream online video lower-resolution version might streamed place high-resolution version progressive enhancement example computing web pages available basic functional format older small-screen limited-capability web browsers enhanced version browsers capable handling additional technologies larger display available fault-tolerant computer systems programs considered robust designed continue operation despite error exception invalid input instead crashing completely software brittleness opposite robustness resilient networks continue transmit data despite failure links nodes resilient buildings infrastructure likewise expected prevent complete failure situations like earthquakes floods collisions system high failure transparency alert users component failure occurred even continues operate full performance failure repaired imminent complete failure anticipated likewise fail-fast component designed report first point failure rather allow downstream components fail generate reports allows easier diagnosis underlying problem may prevent improper operation broken state single fault condition situation one means protection hazard defective single fault condition results unavoidably another single fault condition two failures considered one single fault condition source offers following example redundancy provision functional capabilities would unnecessary fault-free environment consist backup components automatically kick one component fails example large cargo trucks lose tire without major consequences many tires one tire critical exception front tires used steer generally carry less load total four 16 less likely fail idea incorporating redundancy order improve reliability system pioneered john von neumann 1950s two kinds redundancy possible space redundancy time redundancy space redundancy provides additional components functions data items unnecessary fault-free operation space redundancy classified hardware software information redundancy depending type redundant resources added system time redundancy computation data transmission repeated result compared stored copy previous result current terminology kind testing referred 'in service fault tolerance testing isftt short providing fault-tolerant design every component normally option associated redundancy brings number penalties increase weight size power consumption cost well time design verify test therefore number choices examined determine components fault tolerant example component passes tests car occupant restraint system normally think primary occupant restraint system gravity vehicle rolls undergoes severe g-forces primary method occupant restraint may fail restraining occupants accident absolutely critical safety pass first test accidents causing occupant ejection quite common seat belts pass second test cost redundant restraint method like seat belts quite low economically terms weight space pass third test therefore adding seat belts vehicles excellent idea supplemental restraint systems airbags expensive pass test smaller margin another excellent long-term example principle put practice braking system whilst actual brake mechanisms critical particularly prone sudden rather progressive failure case necessarily duplicated allow even balanced application brake force wheels would also prohibitively costly double-up main components would add considerable weight however similarly critical systems actuating brakes driver control inherently less robust generally using cable rust stretch jam snap hydraulic fluid leak boil develop bubbles absorb water thus lose effectiveness thus modern cars footbrake hydraulic brake circuit diagonally divided give two smaller points failure loss either reducing brake power 50 causing much dangerous brakeforce imbalance straight front-back left-right split hydraulic circuit fail completely relatively rare occurrence failsafe form cable-actuated parking brake operates otherwise relatively weak rear brakes still bring vehicle safe halt conjunction transmission/engine braking long demands line normal traffic flow cumulatively unlikely combination total foot brake failure need harsh braking emergency likely result collision still one lower speed would otherwise case comparison foot pedal activated service brake parking brake less critical item unless used one-time backup footbrake cause immediate danger found nonfunctional moment application therefore redundancy built per se typically uses cheaper lighter less hardwearing cable actuation system suffice happens hill use footbrake momentarily hold vehicle still driving find flat piece road stop alternatively shallow gradients transmission shifted park reverse first gear transmission lock engine compression used hold stationary need include sophistication first bring halt motorcycles similar level fail-safety provided simpler methods firstly front rear brake systems entirely separate regardless method activation cable rod hydraulic allowing one fail entirely whilst leaving unaffected secondly rear brake relatively strong compared automotive cousin even powerful disc sports models even though usual intent front system provide vast majority braking force overall vehicle weight central rear tyre generally larger grippier rider lean back put weight therefore allowing brake force applied wheel locks cheaper slower utility-class machines even front wheel use hydraulic disc extra brake force easier packaging rear usually primitive somewhat inefficient exceptionally robust rod-actuated drum thanks ease connecting footpedal wheel way importantly near impossibility catastrophic failure even rest machine like lot low-priced bikes first years use point collapse neglected maintenance basic characteristics fault tolerance require addition fault-tolerant systems characterized terms planned service outages unplanned service outages usually measured application level hardware level figure merit called availability expressed percentage example five nines system would statistically provide 99.999 availability fault-tolerant systems typically based concept redundancy spare components address first fundamental characteristic fault tolerance three ways implementations raid redundant array independent disks except raid 0 examples fault-tolerant storage device uses data redundancy lockstep fault-tolerant machine uses replicated elements operating parallel time replications element state inputs provided replication outputs expected outputs replications compared using voting circuit machine two replications element termed dual modular redundant dmr voting circuit detect mismatch recovery relies methods machine three replications element termed triple modular redundant tmr voting circuit determine replication error two-to-one vote observed case voting circuit output correct result discard erroneous version internal state erroneous replication assumed different two voting circuit switch dmr mode model applied larger number replications lockstep fault-tolerant machines easily made fully synchronous gate replication making state transition edge clock clocks replications exactly phase however possible build lockstep systems without requirement bringing replications synchrony requires making internal stored states started fixed initial state reset state alternatively internal state one replica copied another replica one variant dmr pair-and-spare two replicated elements operate lockstep pair voting circuit detects mismatch operations outputs signal indicating error another pair operates exactly way final circuit selects output pair proclaim error pair-and-spare requires four replicas rather three tmr used commercially fault-tolerant design advantages obvious many disadvantages hardware fault tolerance sometimes requires broken parts taken replaced new parts system still operational computing known hot swapping system implemented single backup known single point tolerant represents vast majority fault-tolerant systems systems mean time failures long enough operators time fix broken devices mean time repair backup also fails helps time failures long possible specifically required fault-tolerant system fault tolerance notably successful computer applications tandem computers built entire business machines used single-point tolerance create nonstop systems uptimes measured years fail-safe architectures may encompass also computer software example process replication data formats may also designed degrade gracefully html example designed forward compatible allowing new html entities ignored web browsers understand without causing document unusable difference fault tolerance systems rarely problems instance western electric crossbar systems failure rates two hours per forty years therefore highly fault resistant fault occur still stopped operating completely therefore fault tolerant | [
6406,
6281,
2314,
1049,
2592,
8226,
8229,
8998,
6014,
10111,
1722,
10429,
2623,
8259,
9285,
1606,
1990,
2887,
1993,
3529,
2558,
7753,
11081,
3923,
10835,
2901,
7802,
11604,
8408,
8025,
2395,
2012,
7004,
1891,
8808,
8810,
5999,
5363,
6003,
... | Test |
9,678 | 7 | BioPharm_(US_company):biopharm us company biopharm systems american privately owned consulting managed services provider msp headquartered san mateo california focuses life sciences industry company specializes implementation integration migration upgrade private cloud hosting oracle clinical trial management system drug safety pharmacovigilance clinical data warehousing analytics clinical data management electronic data capture systems founded 1995 president ceo alex sefanov around corner oracle ’ headquarters silicon valley biopharm headquartered california offices united states united kingdom mr. sefanov founded company personal savings working consultant several major biotechnology pharmaceutical companies inspired start firm working closely oracle first clinical trial software application oracle clinical biopharm offers various hosting options dedicated hosting shared hosting software service saas data center san jose disaster recovery data center near sacramento biopharm services include implementing integrating client applications systems well providing validation training application support services company complies relevant regulations including title 21 cfr part 11 | [
6514,
467
] | None |
9,679 | 0 | Sture_Allén:sture allén sture allén born 31 december 1928 swedish retired professor computational linguistics university gothenburg permanent secretary swedish academy 1986 1999 born gothenburg elected chair 3 swedish academy 1980 also member norwegian academy science letters | [
1890,
5699
] | Test |
9,680 | 9 | Defunctionalization:defunctionalization programming languages defunctionalization refers compile-time transformation eliminates higher-order functions replacing single first-order apply function technique first described john c. reynolds 1972 paper definitional interpreters higher-order programming languages reynolds observation given program contains finitely many function abstractions assigned replaced unique identifier every function application within program replaced call apply function function identifier first argument apply function job dispatch first argument perform instructions denoted function identifier remaining arguments one complication basic idea function abstractions may reference free variables situations defunctionalization must preceded closure conversion lambda lifting free variables function abstraction passed extra arguments apply addition closures supported first-class values becomes necessary represent captured bindings creating data structures instead single apply function dispatch function abstractions program various kinds control flow analysis including simple distinctions based arity type signature employed determine function may called function application site specialized apply function may referenced instead alternately target language may support indirect calls function pointers may efficient extensible dispatch-based approach besides use compilation technique higher-order functional languages defunctionalization studied particularly olivier danvy collaborators way mechanically transforming interpreters abstract machines defunctionalization also related technique object-oriented programming representing functions function objects alternative closures example given olivier danvy translated haskell given tree datatype defunctionalize following program defunctionalize replacing higher-order functions codice_1 codice_2 codice_3 value codice_4 datatype instead calling directly introduce codice_5 function interprets datatype | [
2595,
10246,
9714,
10581,
5783,
10616,
10013
] | Test |
9,681 | 5 | TDM-to-packet_conversion:tdm-to-packet conversion tdm-to-packet conversion process converting digital signal tdm format typically 64 kbit/second signal encoded mu-law a-law compression packets typically rtp packets carrying packet network internet conversion process may include recoding different codec silence suppression comfort noise generation tricks decrease bandwidth requirement improve perceived voice quality result note conversion signal tunnelling unlike tdm ip aims transporting tdm signal unchanged across ip network see also voice ip | [
3168,
9381
] | Validation |
9,682 | 7 | Virtual_private_cloud:virtual private cloud virtual private cloud vpc on-demand configurable pool shared computing resources allocated within public cloud environment providing certain level isolation different organizations denoted users hereafter using resources isolation one vpc user users cloud vpc users well public cloud users achieved normally allocation private ip subnet virtual communication construct vlan set encrypted communication channels per user vpc previously described mechanism providing isolation within cloud accompanied vpn function allocated per vpc user secures means authentication encryption remote access organization vpc resources introduction described isolation levels organization using service effect working 'virtually private cloud cloud infrastructure shared users hence name vpc vpc commonly used context cloud infrastructure service context infrastructure provider providing underlying public cloud infrastructure provider realizing vpc service infrastructure may different vendors amazon web services launched amazon virtual private cloud 26 august 2009 allows amazon elastic compute cloud service connected legacy infrastructure ipsec virtual private network connection aws vpc free use however users charged virtual private networks vpn use ec2 rds instances running vpc also purchased using reserved instances however limitation resources guaranteed google cloud platform resources provisioned connected isolated virtual private cloud vpc across gcp regions gcp vpcs global resources subnets within vpc zonal resources allows connect zones regions without use additional networking complexity data travels encrypted transit rest google ’ global private network identity management policies security rules allow private access google storage big data analytics managed services vpcs google cloud platform leverage security google data centers microsoft azure offers possibility setting vpc using virtual networks | [
1539,
6153,
526,
4623,
10265,
5662,
5666,
9766,
39,
5159,
3121,
5681,
10820,
4683,
590,
1102,
7248,
5202,
4194,
5732,
5749,
2170,
4236,
10893,
3742,
6307,
2217,
9906,
7352,
4289,
3269,
1224,
6367,
2795,
3819,
253,
8446,
8451,
272,
2328,
... | None |
9,683 | 1 | Variable_data_publishing:variable data publishing variable-data publishing vdp also known database publishing term referring output variable composition system systems produce electronically viewable hard-copy print output variable-data publishing term today often distinguishes output destined electronic viewing rather destined hard-copy print e.g variable data printing essentially techniques employed perform variable-data publishing utilized variable data printing difference interpretation output variable-data printing may interpreted produce various print streams page-description files e.g afp/ipds postscript pcl variable-data publishing produces electronically viewable files commonly seen forms pdf html xml variable-data composition involves use data conditionally variable-data may simple address block salutation however document textual content—including words sentences paragraphs pages entire document words make little much document composer desires variable data may also used exhibit various images logos products membership photos variable-data used build rule-based design schemes including fonts colors page formats possibilities vast variable-data tools available today make possible perform variable-data composition nearly every stage document production however level control achieved varies based upon far document production process variable-data tool deployed example variable-data insertion occurs prior output ... likely text flow layout altered nearly much control would available time initial document composition many organizations produce multiple forms output aka multi-channel output document ensures published content available recipients via form access method might require multi-channel output utilized integrity output channels often becomes important variable-data publishing may performed everything personal computer mainframe system however speed practical output volumes achieved directly affected computer power utilized term variable-data publishing likely offshoot term variable-data printing first introduced printing industry frank romano professor emeritus school print media college imaging arts sciences rochester institute technology however concept merging static document elements variable document elements predates term seen various implementations ranging simple desktop 'mail merge complex mainframe applications financial banking industry past term vdp closely associated digital printing machines however past 3 years application technology spread web pages emails mobile messaging | [
1760,
6830,
8627,
8628,
9183,
479
] | Validation |
9,684 | 4 | Firewalls_and_Internet_Security:firewalls internet security firewalls internet security repelling wily hacker 1994 book william r. cheswick steve bellovin helped define concept network firewall describing detail one first major firewall deployments book influenced formation perimeter security model became dominant network security architecture mid-1990s 2003 second edition came adding aviel d. rubin authors | [
3941,
3845,
8998,
939,
18,
4435
] | None |
9,685 | 3 | ARM_Cortex-R:arm cortex-r arm cortex-r family 32-bit risc arm processor cores licensed arm holdings cores optimized hard real-time safety-critical applications cores family implement arm real-time r profile one three architecture profiles two application profile implemented cortex-a family microcontroller profile implemented cortex-m family arm cortex-r family microprocessors currently consists arm cortex-r4 f arm cortex-r5 f arm cortex-r7 f arm cortex-r8 f arm cortex-r52 f arm cortex-r family arm cores implementing r profile arm architecture profile designed high performance hard real-time safety critical applications similar profile applications processing adds features make fault tolerant suitable use hard real-time safety critical applications real time safety critical features added include arm holdings neither manufactures sells cpu devices based designs rather licenses core designs interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation cortex-r suitable use computer-controlled systems low latency and/or high level safety required example hard real-time safety critical application would modern electronic braking system automobile system needs fast responsive plethora sensor data input also responsible human safety failure system could lead severe injury loss life examples hard real-time and/or safety critical applications include | [
7170,
10767,
8720,
11282,
9235,
11289,
1057,
38,
4139,
2097,
11314,
8253,
6207,
7745,
7234,
7235,
7747,
2635,
8268,
99,
7269,
8812,
11374,
7281,
10361,
1660,
638,
11395,
644,
8842,
146,
659,
1170,
9366,
7833,
666,
5786,
9371,
4258,
4773,
... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.