node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
9,686 | 2 | NuBus:nubus nubus pron 'new bus 32-bit parallel computer bus originally developed mit standardized 1987 part numachine workstation project first complete implementation nubus done western digital numachine lisp machines inc. lmi lambda nubus later incorporated lisp products texas instruments explorer used main expansion bus apple computer next longer widely used outside embedded market early microcomputer buses like s-100 often connections pins microprocessor power rails meant change computer architecture generally led new bus well looking avoid problems future nubus designed independent processor general architecture details i/o handling among many advanced features era nubus used 32-bit backplane 8- 16-bit busses common seen making bus future-proof generally believed 32-bit systems would arrive near future 64-bit buses beyond would remain impractical excessive addition nubus agnostic processor buses point conformed signalling data standards machine plugged big little endian instance nubus made assumptions meant nubus card could plugged nubus machine long appropriate device driver order select proper device driver nubus included id scheme allowed cards identify host computer startup meant user n't configure system bane bus systems point instance isa driver configured card memory required interrupts used nubus required configuration making one first examples plug-and-play architecture downside flexibility made nubus much simpler user device driver authors made things difficult designers cards whereas simple bus systems easily supported handful input/output chips designed used cpu mind nubus every card computer convert everything platform-agnostic nubus world typically meant adding nubus controller chip bus i/o chips card increasing costs trivial exercise today one newer buses require 1980s nubus considered complex expensive nubus became standard 1987 ieee 1196 version used standard 96-pin three-row connector running system 10 mhz clock maximum burst throughput 40 mb/s average speeds 10 20 mb/s later addition nubus 90 increased clock rate 20 mhz better throughput burst increasing 70 mb/s average 30 mb/s nubus first developed commercially western digital numachine first used production product licensee lisp machines inc. lmi-lambda lisp machine project development group sold western digital texas instruments 1984 technology incorporated ti explorer also lisp machine 1986 texas instruments used nubus s1500 multiprocessor unix system later texas instruments symbolics developed lisp machine nubus boards ti microexplorer symbolics macivory based lisp supporting microprocessors nubus boards co-processor lisp machines apple macintosh line mac ii mac quadras nubus also selected apple computer use macintosh ii project plug-n-play nature fit well mac philosophy ease-of-use used macintosh ii series made professional-level mac lineup late 1980s upgraded nubus 90 starting macintosh quadras used mid-1990s early quadras supported 20 mhz rate two cards talking since motherboard controller upgraded later addressed nubus implementation 660av 840av models improved nubus controller used first generation power macintosh 6100 7100 8100 models later power mac models adopted intel pci bus apple nubus implementation used pin socket connectors back card rather edge connectors phillips screws inside case cards use making much easier install cards apple computers also supplied always-on +5 v trickle power supply tasks watching phone line computer turned apparently part unapproved nubus standard nubus also selected next computer line machines used different physical pcb layout nubus appears seen little use outside roles apple switched pci mid 1990s nubus quickly disappeared | [
4741,
6283,
5520,
7824,
10104,
7830,
6807,
408,
799,
8480,
7842,
2723,
7844,
1576,
9641,
6187,
7211,
8625,
8893,
5058,
5829,
3911,
4807,
4810,
5457,
10833,
8534,
989,
9952,
11627,
6510,
6130,
5619,
6258,
3445,
5368,
377,
7806
] | Test |
9,687 | 1 | Percona_Server_for_MySQL:percona server mysql percona server mysql distribution mysql relational database management system created percona percona server mysql open source relational database management system rdbms free fully compatible drop replacement oracle mysql software includes number scalability availability security backup features available mysql commercial enterprise edition software includes xtradb enhanced distribution innodb storage engine developers aim retain close compatibility official mysql releases focusing performance increased visibility server operations | [
11392,
8195,
8582,
10258,
5397,
10389,
7453,
1950,
9503,
7339,
7983,
9010,
823,
6721,
5964,
5198,
2130,
7506,
10459,
6245,
8295,
8683,
5612,
2413,
7022,
3188,
10873,
2810,
2045
] | Test |
9,688 | 4 | Cyberwarfare:cyberwarfare cyberwarfare broad term describing use technological force within cyberspace ‘ cyberwarfare ’ imply scale protraction violence typically associated term ‘ war ’ significant debate among experts regarding definition cyberwarfare even thing exists term ‘ cyberwarfare ’ misnomer date offensive cyber actions could described ‘ war ’ offensive cyber actions estonia 2007 georgia 2008 iran 2010 north korea occurred context international relations resulting condemnation denial sides cyberwarfare may meet typical definition term war however many states including united states united kingdom russia india china israel iran north korea vietnam active cyber operations offensive defensive operations states explore use cyber operations combine capabilities likelihood physical confrontation violence playing result part cyber operation increased however meeting scale protracted nature war unlikely thus ambiguity remains first instance kinetic force used response cyber-attack resulting loss human life observed may 5 2019 israel defense forces targeted destroyed building associated on-going cyber-attack 'cyberwarfare used board context denote interstate use technological force within computer networks information stored shared communicated online term warfare significant differences term 'war invokes ideas scale protraction cyberwarfare also distinct closely related 'cyber espionage 'cyber terrorism 'cyber crime term definition remain subject debate absolute definition widely agreed paulo shakarian colleagues put forward following definition drawing various works including clausewitz definition war war continuation politics means cyberwarfare extension policy actions taken cyberspace state actors non-state actors significant state direction support constitute serious threat another state security action nature taken response serious threat state security actual perceived definitions focus act penetrating states computer network infrastructure businesses organisations within target nation former us national coordinator security infrastructure protection counter-terrorism richard a. clarke defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption majority scholars military governments use definition refer state state-sponsored actors actors provided significant direction support state definitions may include non-state actors terrorist groups companies political ideological extremist groups terrorist hacktivists transnational criminal organizations depending context work debate whether term 'cyberwarfare accurate eugene kaspersky founder kaspersky lab concludes cyberterrorism accurate term cyberwar states today attacks clueless strike cyber-war cyberterrorism howard schmidt former cyber security coordinator obama administration said cyberwar ... think terrible metaphor think terrible concept winners environment experts take issue possible consequences linked warfare analogy ron deibert canada citizen lab warned militarization cyberspace militaristic responses may appropriate although date even serious cyber attacks disrupted large parts nations electrical grids 230,000 customers ukraine 2015 affected access medical care thus endangering life nhs wannacry 2017 lead military action oxford academic lucas kello proposed new term – unpeace – denote highly damaging cyber actions whose non-violent effects rise level traditional war actions neither warlike peacelike although non-violent thus acts war damaging effects economy society may greater even armed attacks term closely related concept grey zone come prominence recent years describing actions fall traditional threshold war term 'cyberwarfare distinct term 'cyber war cyber warfare includes techniques tactics procedures may involved cyber war discussed term war inherently refers large scale action typically protracted period time may include objectives seeking utilize violence aim kill cyber war could accurately describe protracted period back-and-forth cyber attacks including combination traditional military action nations date action known occurred although tit-for-tat military-cyber actions occurred june 2019 united states launched cyber attack iranian weapons systems retaliation shooting us drone strait hormuz cyber warfare present multitude threats towards nation basic level cyber attacks used support traditional warfare example tampering operation air defences via cyber means order facilitate air attack aside hard threats cyber warfare also contribute towards soft threats espionage propaganda eugene kaspersky founder kaspersky lab equates large-scale cyber weapons flame nettraveler company discovered biological weapons claiming interconnected world potential equally destructive traditional espionage act war cyber-espionage generally assumed ongoing major powers despite assumption incidents cause serious tensions nations often described attacks example cyber attacks 25 espionage based computers satellites coordinate activities vulnerable components system could lead disruption equipment compromise military systems c4istar components responsible orders communications could lead interception malicious replacement power water fuel communications transportation infrastructure may vulnerable disruption according clarke civilian realm also risk noting security breaches already gone beyond stolen credit card numbers potential targets also include electric power grid trains stock market mid-july 2010 security experts discovered malicious software program called stuxnet infiltrated factory computers spread plants around world considered first attack critical industrial infrastructure sits foundation modern economies notes new york times stuxnet extremely effective delaying iran nuclear program development nuclear weaponry came high cost first time became clear could cyber weapons defensive could offensive large decentralization scale cyberspace makes extremely difficult direct policy perspective non-state actors play large part cyberwar space state actors leads dangerous sometimes disastrous consequences small groups highly skilled malware developers able effectively impact global politics cyber warfare large governmental agencies major aspect ability lies willingness groups share exploits developments web form arms proliferation allows lesser hackers become proficient creating large scale attacks small handful skillful enough manage addition thriving black markets kinds cyber weapons buying selling cyber capabilities highest bidder without regard consequences computing denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make machine network resource unavailable intended users perpetrators dos attacks typically target sites services hosted high-profile web servers banks credit card payment gateways even root nameservers dos attacks may limited computer-based methods strategic physical attacks infrastructure devastating example cutting undersea communication cables may severely cripple regions countries regards information warfare ability federal government united states admits electric power grid susceptible cyberwarfare united states department homeland security works industries identify vulnerabilities help industries enhance security control system networks federal government also working ensure security built next generation smart grid networks developed april 2009 reports surfaced china russia infiltrated u.s. electrical grid left behind software programs could used disrupt system according current former national security officials north american electric reliability corporation nerc issued public notice warns electrical grid adequately protected cyber attack china denies intruding u.s. electrical grid one countermeasure would disconnect power grid internet run net droop speed control massive power outages caused cyber attack could disrupt economy distract simultaneous military attack create national trauma iranian hackers possibly iranian cyber army pushed massive power outage 12 hours 44 81 provinces turkey holding 40 million people istanbul ankara among places suffering blackout howard schmidt former cyber-security coordinator us commented possibilities possible hackers gotten administrative computer systems utility companies says n't linked equipment controlling grid least developed countries schmidt never heard grid hacked june 2019 russia said electrical grid cyber-attack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid cyber propaganda effort control information whatever form takes influence public opinion form psychological warfare except uses social media fake news websites digital means 2018 sir nicholas carter chief general staff british army stated kind attack actors russia form system warfare seeks de-legitimise political social system military strength based jowell o'donnell 2006 state propaganda deliberate systematic attempt shape perceptions manipulate cognitions direct behavior achieve response furthers desired intent propagandist p. 7 internet phenomenal means communication people get message across huge audience opens window evil terrorist organizations use medium brainwash people suggested restricted media coverage terrorist attacks would turn decrease number terrorist attacks occur afterwards cowen 2006 2017 wannacry petya notpetya cyber attacks masquerading ransomware caused large-scale disruptions ukraine well u.k. ’ national health service pharmaceutical giant merck maersk shipping company organizations around world attacks also categorized cybercrimes specifically financial crime negatively affects company group idea cyber pearl harbor debated scholars drawing analogy historical act war others used cyber 9/11 draw attention nontraditional asymmetric irregular aspect cyber action state number reasons nations undertake offensive cyber operations cyber security expert adviser nato advocates states take cyber warfare seriously viewed attractive activity many nations times war peace offensive cyber operations offer large variety cheap risk-free options weaken countries strengthen positions considered long-term geostrategic perspective cyber offensive operations cripple whole economies change political views agitate conflicts within among states reduce military efficiency equalize capacities high-tech nations low-tech nations use access critical infrastructures blackmail u.s. general keith b. alexander first head uscybercom told senate armed services committee computer network warfare evolving rapidly mismatch technical capabilities conduct operations governing laws policies cyber command newest global combatant sole mission cyberspace outside traditional battlefields land sea air space attempt find necessary neutralize cyberattacks defend military computer networks alexander sketched broad battlefield envisioned computer warfare command listing kind targets new headquarters could ordered attack including traditional battlefield prizes – command-and-control systems military headquarters air defense networks weapons systems require computers operate one cyber warfare scenario cyber shockwave wargamed cabinet level former administration officials raised issues ranging national guard power grid limits statutory authority distributed nature internet based attacks means difficult determine motivation attacking party meaning unclear specific act considered act war examples cyberwarfare driven political motivations found worldwide 2008 russia began cyber attack georgian government website carried along georgian military operations south ossetia 2008 chinese 'nationalist hackers attacked cnn reported chinese repression tibet jobs cyberwarfare become increasingly popular military four branches united states military actively recruit cyber warfare positions potential targets internet sabotage include aspects internet backbones web internet service providers varying types data communication mediums network equipment would include web servers enterprise information systems client server systems communication links network equipment desktops laptops businesses homes electrical grids financial networks telecommunication systems also deemed vulnerable especially due current trends computerization automation politically motivated hacktivism involves subversive use computers computer networks promote agenda potentially extend attacks theft virtual sabotage could seen cyberwarfare – mistaken hacktivists use knowledge software tools gain unauthorized access computer systems seek manipulate damage material gain cause widespread destruction draw attention cause well-publicized disruptions select targets anonymous hacktivist groups often portrayed media cyber-terrorists wreaking havoc hacking websites posting sensitive information victims threatening attacks demands met however hacktivism politically motivated change world use fundamentalism groups like anonymous divided opinion methods cyber attacks including ransomeware used generate income states use techniques generate significant sources income evade sanctions perhaps simultaneously harming adversaries depending targets tactic observed august 2019 revealed north korea generated 2 billion fund weapons program avoiding blanket sanctions levied united states united nations european union computer hacking represents modern threat ongoing global conflicts industrial espionage presumed widely occur typical type crime underreported extent known according mcafee george kurtz corporations around world face millions cyberattacks day attacks n't gain media attention lead strong political statements victims type crime usually financially motivated examinations issue cyberwarfare achieving profit personal gain still institutes companies like university cincinnati kaspersky security lab trying increase sensibility topic researching publishing new security threats number countries conduct exercise increase preparedness explore strategy tactics operations involved conducting defending cyber attacks nations typically done form war games cooperative cyber defence centre excellence ccdce part north atlantic treaty organisation nato conducted yearly war game called locked shields since 2010 designed test readiness improve skills strategy tactics operational decision making participating national organisations locked shields 2019 saw 1200 participants 30 nations compete red team vs. blue team exercise war game involved fictional country berylia experiencing deteriorating security situation number hostile events coincide coordinated cyber attacks major civilian internet service provider maritime surveillance system attacks caused severe disruptions power generation distribution 4g communication systems maritime surveillance water purification plant critical infrastructure components ccdce describe aim exercise maintain operation various systems intense pressure strategic part addresses capability understand impact decisions made strategic policy level ultimately france winner locked shields 2019 european union conduct cyber war game scenarios member states partner nations improve readiness skills observe strategic tactical decisions may affect scenario well war games serve broader purpose explore options improve skills cyber war games targeted preparing specific threats 2018 sunday times reported uk government conducting cyber war games could blackout moscow types war games move beyond defensive preparedness previously described onto preparing offensive capabilities used deterrence 'war approximately 120 countries developing ways use internet weapon target financial markets government computer systems utilities foreign policy magazine puts size china hacker army anywhere 50,000 100,000 individuals diplomatic cables highlight us concerns china using access microsoft source code 'harvesting talents private sector boost offensive defensive capabilities 2018 cyberattack marriott hotel chain collected personal details roughly 500 million guests known part chinese intelligence-gathering effort also hacked health insurers security clearance files millions americans hackers suspected working behalf ministry state security country communist-controlled civilian spy agency information exactly chinese use root spies recruit intelligence agents build rich repository americans ’ personal data future targeting 2008 article culture mandala bulletin centre east-west cultural economic studies jason fritz alleges chinese government 1995 2008 involved number high-profile cases espionage primarily use decentralized network students business people scientists diplomats engineers within chinese diaspora defector belgium purportedly agent claimed hundreds spies industries throughout europe defection australia chinese diplomat chen yonglin said 1,000 country 2007 russian executive sentenced 11 years passing information rocket space technology organization china targets united states included 'aerospace engineering programs space shuttle design c4isr data high-performance computers nuclear weapon design cruise missile data semiconductors integrated circuit design details us arms sales taiwan china continues held responsible string cyber-attacks number public private institutions united states india russia canada france chinese government denies involvement cyber-spying campaigns administration maintains position china threat rather victim increasing number cyber-attacks reports china cyber warfare capabilities yet confirmed chinese government according fritz china expanded cyber capabilities military technology acquiring foreign military technology fritz states chinese government uses new space-based surveillance intelligence gathering systems anti-satellite weapon anti-radar infrared decoys false target generators assist quest support informationization military increased education soldiers cyber warfare improving information network military training built virtual laboratories digital libraries digital campuses informationization hope prepare forces engage different kind warfare technically capable adversaries many recent news reports link china technological capabilities beginning new 'cyber cold war response reports cyberattacks china united states amitai etzioni institute communitarian policy studies suggested china united states agree policy mutually assured restraint respect cyberspace would involve allowing states take measures deem necessary self-defense simultaneously agreeing refrain taking offensive steps would also entail vetting commitments operation shady rat ongoing series cyber attacks starting mid-2006 reported internet security company mcafee august 2011 china widely believed state actor behind attacks hit least 72 organizations including governments defense contractors department information technology created indian computer emergency response team cert-in 2004 thwart cyber attacks india year 23 reported cyber security breaches 2011 13,301 year government created new subdivision national critical information infrastructure protection centre nciipc thwart attacks energy transport banking telecom defence space sensitive areas executive director nuclear power corporation india npcil stated february 2013 company alone forced block ten targeted attacks day cert-in left protect less critical sectors high-profile cyber attack 12 july 2012 breached email accounts 12,000 people including officials ministry external affairs ministry home affairs defence research development organisation drdo indo-tibetan border police itbp government-private sector plan overseen national security advisor nsa shivshankar menon began october 2012 intends beef india cyber security capabilities light group experts findings india faces 470,000 shortfall experts despite country reputation software powerhouse february 2013 information technology secretary j. satyanarayana stated nciipc finalizing policies related national cyber security would focus domestic security solutions reducing exposure foreign technology steps include isolation various security agencies ensure synchronised attack could succeed fronts planned appointment national cyber security coordinator month significant economic physical damage india related cyber attacks 26 november 2010 group calling indian cyber army hacked websites belonging pakistan army others belong different ministries including ministry foreign affairs ministry education ministry finance pakistan computer bureau council islamic ideology etc attack done revenge mumbai terrorist attacks 4 december 2010 group calling pakistan cyber army hacked website india top investigating agency central bureau investigation cbi national informatics center nic begun inquiry july 2016 cymmetria researchers discovered revealed cyber attack dubbed 'patchwork compromised estimated 2500 corporate government agencies using code stolen github dark web examples weapons used exploit sandworm vulnerability cve-2014-4114 compiled autoit script uac bypass code dubbed uacme targets believed mainly military political assignments around southeast asia south china sea attackers believed indian origin gathering intelligence influential parties defence cyber agency indian military agency responsible cyberwarfare expected become operational november 2019 chinese blamed cybersecurity company f-secure labs found malware nanhaishu targeted philippines department justice sent information infected machine server chinese ip address malware considered particularly sophisticated nature introduced phishing emails designed look like coming authentic sources information sent believed relating south china sea legal case russia still part soviet union 1982 portion trans-siberia pipeline within territory exploded allegedly due computer malware implanted pirated canadian software central intelligence agency malware caused scada system running pipeline malfunction farewell dossier provided information attack wrote compromised computer chips would become part soviet military equipment flawed turbines would placed gas pipeline defective plans would disrupt output chemical plants tractor factor caused monumental nonnuclear explosion fire ever seen space however soviet union blame united states attack russian south ossetian georgian azerbaijani sites attacked hackers 2008 south ossetia war russian-led cyberattacks br claimed russian security services organized number denial service attacks part cyber-warfare countries notably 2007 cyberattacks estonia 2008 cyberattacks russia south ossetia georgia azerbaijan one identified young russian hacker said paid russian state security services lead hacking attacks nato computers studying computer sciences department defense information tuition paid fsb july 2009 series coordinated denial service attacks major government news media financial websites south korea united states many thought attack directed north korea one researcher traced attacks united kingdom security researcher chris kubecka presented evidence multiple european union united kingdom companies unwittingly helped attack south korea due w32.dozer infections malware used part attack companies used attack partially owned several governments complicating attribution july 2011 south korean company sk communications hacked resulting theft personal details including names phone numbers home email addresses resident registration numbers 35 million people trojaned software update used gain access sk communications network links exist hack malicious activity believed part broader concerted hacking effort ongoing tensions korean peninsula south korea defense ministry stated south korea going improve cyber-defense strategies hopes preparing possible cyber attacks march 2013 south korea major banks – shinhan bank woori bank nonghyup bank – well many broadcasting stations – kbs ytn mbc – hacked 30,000 computers affected one biggest attacks south korea faced years although remains uncertain involved incident immediate assertions north korea connected threatened attack south korea government institutions major national banks traditional newspapers numerous times – reaction sanctions received nuclear testing continuation foal eagle south korea annual joint military exercise united states north korea cyber warfare capabilities raise alarm south korea north korea increasing manpower military academies specializing hacking current figures state south korea 400 units specialized personnel north korea 3,000 highly trained hackers portrays huge gap cyber warfare capabilities sends message south korea step strengthen cyber warfare command forces therefore order prepared future attacks south korea united states discuss deterrence plans security consultative meeting scm scm plan developing strategies focuses accelerating deployment ballistic missiles well fostering defense shield program known korean air missile defense april 2007 estonia came cyber attack wake relocation bronze soldier tallinn largest part attacks coming russia official servers authorities russia attack ministries banks media targeted attack estonia seemingly small baltic nation effective nation run online estonia implemented e-government bank services political elections taxes done online attack really hurt estonia economy people estonia least 150 people injured first day due riots streets 2013 french minister defense mr jean-yves le drian ordered creation cyberarmy representing 4th national army corp along ground naval air forces french ministry defense protect french european interests soil abroad contract made french firm eads airbus identify secure main elements susceptible cyber threats 2016 france thus built largest cyberarmy europe planned 2600 cyber-soldiers 440 million euros investment cybersecurity products new army corp. additional 4400 reservists constitute heart army 2019 2013 germany revealed existence 60-person computer network operation unit german intelligence agency bnd announced seeking hire 130 hackers new cyber defence station unit march 2013 bnd president gerhard schindler announced agency observed five attacks day government authorities thought mainly originate china confirmed attackers far accessed data expressed concern stolen information could used basis future sabotage attacks arms manufacturers telecommunications companies government military agencies shortly edward snowden leaked details u.s. national security agency cyber surveillance system german interior minister hans-peter friedrich announced bnd would given additional budget 100 million euros increase cyber surveillance capability 5 total internet traffic germany 20 total traffic maximum amount allowed german law netherlands cyber defense nationally coordinated ncsc dutch ministry defense laid cyber strategy 2011 first focus improve cyber defense handled joint branch jivc improve intel operations intel community netherlands including military intel organization mivd set joint sigint cyber unit jscu ministry defense furthermore setting offensive cyber force called defensie cyber command dcc operational end 2014 january 2017 sweden armed forces subjected cyber-attack caused shutdown so-called caxcis system used military exercises according crowdstrike 2014 2016 russian apt fancy bear used android malware target ukrainian army rocket forces artillery distributed infected version android app whose original purpose control targeting data d-30 howitzer artillery app used ukrainian officers loaded x-agent spyware posted online military forums attack claimed crowdstrike successful 80 ukrainian d-30 howitzers destroyed highest percentage loss artillery pieces army percentage never previously reported would mean loss nearly entire arsenal biggest artillery piece ukrainian armed forces according ukrainian army number incorrect losses artillery weapons way reported losses nothing stated cause 2014 russians suspected use cyber weapon called snake ouroboros conduct cyber attack ukraine period political turmoil snake tool kit began spreading ukrainian computer systems 2010 performed computer network exploitation cne well highly sophisticated computer network attacks cna december 23 2015 blackenergy malware used cyberattack ukraine powergrid left 200,000 people temporarily without power mining company large railway operator also victims attack mi6 reportedly infiltrated al qaeda website replaced instructions making pipe bomb recipe making cupcakes october 2010 iain lobban director government communications headquarters gchq said uk faces real credible threat cyber attacks hostile states criminals government systems targeted 1,000 times month attacks threatened uk economic future countries already using cyber assaults put pressure nations 12 november 2013 financial organisations london conducted cyber war games dubbed 'waking shark 2 simulate massive internet-based attacks bank financial organisations waking shark 2 cyber war games followed similar exercise wall street iran victim predator several cyberwarfare operations iran considered emerging military power field september 2010 iran attacked stuxnet worm thought specifically target natanz nuclear enrichment facility 500-kilobyte computer worm infected least 14 industrial sites iran including natanz uranium-enrichment plant although official authors stuxnet ’ officially identified stuxnet believed developed deployed united states israel worm said advanced piece malware ever discovered significantly increases profile cyberwarfare 2006 war hezbollah israel alleges cyber-warfare part conflict israel defense forces idf intelligence estimates several countries middle east used russian hackers scientists operate behalf result israel attached growing importance cyber-tactics became along u.s. france couple nations involved cyber-war planning many international high-tech companies locating research development operations israel local hires often veterans idf elite computer units richard a. clarke adds israeli friends learned thing two programs working two decades september 2007 israel carried airstrike syria dubbed operation orchard u.s. industry military sources speculated israelis may used cyberwarfare allow planes pass undetected radar syria following us president donald trump decision pull iran nuclear deal may 2018 cyber warfare units united states israel monitoring internet traffic iran noted surge retaliatory cyber attacks iran security firms warned iranian hackers sending emails containing malware diplomats work foreign affairs offices us allies employees telecommunications companies trying infiltrate computer systems august 15 2012 11:08 local time shamoon virus began destroying 35,000 computer systems rendering inoperable virus used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well staged according christina kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident realize security budget spent ics gets pwnd virus noted behavior differing malware attacks due destructive nature cost attack recovery us defense secretary leon panetta called attack cyber pearl harbor known years later biggest hack history intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password ceo khalid al- falih attackers also referenced portion shamoon malware proof pastie according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner march 2018 american republican fundraiser elliott broidy filed lawsuit qatar alleging qatar government stole leaked emails order discredit viewed impediment plan improve country standing washington may 2018 lawsuit named mohammed bin hamad bin khalifa al thani brother emir qatar associate ahmed al-rumaihi allegedly orchestrating qatar cyber warfare campaign broidy litigation revealed cybercriminals targeted broidy targeted many 1,200 individuals also well-known enemies qatar senior officials u.a.e. egypt saudi arabia bahrain hackers almost always obscured location activity traced telecommunication network qatar united arab emirates launched several cyber-attacks past targeting dissidents ahmed mansoor emirati citizen jailed sharing thoughts facebook twitter given code name egret state-led covert project called raven spied top political opponents dissidents journalists project raven deployed secret hacking tool called karma spy without requiring target engage web links cyberwarfare united states part american military strategy proactive cyber defence use cyberwarfare platform attack new united states military strategy makes explicit cyberattack casus belli traditional act war 2013 cyberwarfare first time considered larger threat al qaeda terrorism many u.s. intelligence officials 2017 representative mike rogers chairman u.s. house permanent select committee intelligence instance said cyber war country americans n't know necessarily winning got huge challenges comes cybersecurity u.s. government security expert richard a. clarke book cyber war may 2010 defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption economist describes cyberspace fifth domain warfare william j. lynn u.s. deputy secretary defense states doctrinal matter pentagon formally recognized cyberspace new domain warfare become critical military operations land sea air space 2009 president barack obama declared america digital infrastructure strategic national asset may 2010 pentagon set new u.s. cyber command uscybercom headed general keith b. alexander director national security agency nsa defend american military networks attack countries systems eu set enisa european union agency network information security headed prof. udo helmbrecht plans significantly expand enisa capabilities united kingdom also set cyber-security operations centre based government communications headquarters gchq british equivalent nsa u.s. however cyber command set protect military whereas government corporate infrastructures primarily responsibility respectively department homeland security private companies february 2010 top american lawmakers warned threat crippling attack telecommunications computer networks sharply rise according lipman report numerous key sectors u.s. economy along nations currently risk including cyber threats public private facilities banking finance transportation manufacturing medical education government dependent computers daily operations 2009 president obama stated cyber intruders probed electrical grids economist writes china plans winning informationised wars mid-21st century note countries likewise organizing cyberwar among russia israel north korea iran boasts world second-largest cyber-army james gosler government cybersecurity specialist worries u.s. severe shortage computer security specialists estimating 1,000 qualified people country today needs force 20,000 30,000 skilled experts july 2010 black hat computer security conference michael hayden former deputy director national intelligence challenged thousands attendees help devise ways reshape internet security architecture explaining guys made cyberworld look like north german plain january 2012 mike mcconnell former director national intelligence national security agency president george w. bush told reuters news agency u.s. already launched attacks computer networks countries mcconnell name country u.s. attacked according sources may iran june 2012 new york times reported president obama ordered cyber attack iranian nuclear enrichment facilities august 2010 u.s. first time warned publicly chinese military use civilian computer experts clandestine cyber attacks aimed american companies government agencies pentagon also pointed alleged china-based computer spying network dubbed ghostnet revealed research report last year pentagon stated people liberation army using information warfare units develop viruses attack enemy computer systems networks units include civilian computer professionals commander bob mehal monitor pla buildup cyberwarfare capabilities continue develop capabilities counter potential threat united states department defense sees use computers internet conduct warfare cyberspace threat national security united states joint forces command describes attributes cyberspace technology emerging instrument power societies becoming available country opponents may use attack degrade disrupt communications flow information low barriers entry coupled anonymous nature activities cyberspace list potential adversaries broad furthermore globe-spanning range cyberspace disregard national borders challenge legal systems complicate nation ability deter threats respond contingencies february 2010 united states joint forces command released study included summary threats posed internet little investment cloaked veil anonymity adversaries inevitably attempt harm national interests cyberspace become main front irregular traditional conflicts enemies cyberspace include states non-states range unsophisticated amateur highly trained professional hackers cyberspace enemies target industry academia government well military air land maritime space domains much way airpower transformed battlefield world war ii cyberspace fractured physical barriers shield nation attacks commerce communication indeed adversaries already taken advantage computer networks power information technology plan execute savage acts terrorism also influence directly perceptions u.s. government american population 6 october 2011 announced creech afb drone predator fleet command control data stream keylogged resisting attempts reverse exploit past two weeks air force issued statement virus posed threat operational mission 21 november 2011 widely reported u.s. media hacker destroyed water pump curran-gardner township public water district illinois however later turned information false inappropriately leaked illinois statewide terrorism intelligence center according foreign policy magazine nsa tailored access operations tao unit successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china 24 november 2014 sony pictures entertainment hack release confidential data belonging sony pictures entertainment spe june 2015 united states office personnel management opm announced target data breach targeting records many four million people later fbi director james comey put number 18 million washington post reported attack originated china citing unnamed government officials 2016 jeh johnson united states secretary homeland security james clapper u.s. director national intelligence issued joint statement accusing russia interfering 2016 united states presidential election new york times reported obama administration formally accused russia stealing disclosing democratic national committee emails u.s. law 50 u.s.c.title 50 – war national defense chapter 15 – national security subchapter iii accountability intelligence activities must formal presidential finding prior authorizing covert attack u.s. vice president joe biden said american news interview program meet press united states respond new york times noted biden comment seems suggest mr. obama prepared order — already ordered — kind covert action december 29 united states imposed extensive sanctions russia since cold war expelling 35 russian diplomats united states united states used cyberattacks tactical advantage afghanistan 2014 barack obama ordered intensification cyberwarfare north korea missile program sabotaging test launches opening seconds 2016 president barack obama authorized planting cyber weapons russian infrastructure final weeks presidency response moscow alleged interference 2016 presidential election march 2017 wikileaks published 8,000 documents cia confidential documents codenamed vault 7 dated 2013–2016 include details cia software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux global perspective countries actors engaged cyber warfare see george washington university-based national security archive cyberwar map kill switch bill br 19 june 2010 united states senator joe lieberman i-ct introduced bill called protecting cyberspace national asset act 2010 co-wrote senator susan collins r-me senator thomas carper d-de signed law controversial bill american media dubbed kill switch bill would grant president emergency powers parts internet however three co-authors bill issued statement instead bill narrowed existing broad presidential authority take telecommunications networks rise cyber warfighting domain led efforts determine cyberspace used foster peace example german civil rights panel runs campaign cyberpeace − control cyberweapons surveillance technology militarization cyberspace development stockpiling offensive exploits malware measures cyberpeace include policymakers developing new rules norms warfare individuals organizations building new tools secure infrastructures promoting open source establishment cyber security centers auditing critical infrastructure cybersecurity obligations disclose vulnerabilities disarmament defensive security strategies decentralization education widely applying relevant tools infrastructures encryption cyberdefenses topics cyber peacekeeping cyber peacemaking also studied researchers way restore strengthen peace aftermath cyber traditional warfare cyber counter-intelligence measures identify penetrate neutralize foreign operations use cyber means primary tradecraft methodology well foreign intelligence service collection efforts use traditional methods gauge cyber capabilities intentions one hardest issues cyber counterintelligence problem attribution unlike conventional warfare figuring behind attack difficult however defense secretary leon panetta claimed united states capability trace attacks back sources hold attackers accountable october 2011 journal strategic studies leading journal field published article thomas rid cyber war take place argued politically motivated cyber attacks merely sophisticated versions sabotage espionage subversion – unlikely cyber war occur future various parties attempted come international legal frameworks clarify acceptable none yet widely accepted tallinn manual published 2013 academic non-binding study international law particular jus ad bellum international humanitarian law apply cyber conflicts cyber warfare written invitation tallinn-based nato cooperative cyber defence centre excellence international group approximately twenty experts 2009 2012 shanghai cooperation organisation members include china russia defines cyberwar include dissemination information harmful spiritual moral cultural spheres states september 2011 countries proposed un secretary general document called international code conduct information security contrast united states approach focuses physical economic damage injury putting political concerns freedom speech difference opinion led reluctance west pursue global cyber arms control agreements however american general keith b. alexander endorse talks russia proposal limit military attacks cyberspace june 2013 barack obama vladimir putin agreed install secure cyberwar-hotline providing direct secure voice communications line us cybersecurity coordinator russian deputy secretary security council need directly manage crisis situation arising ict security incident white house quote ukrainian professor international law alexander merezhko developed project called international convention prohibition cyberwar internet according project cyberwar defined use internet related technological means one state political economic technological information sovereignty independence another state professor merezhko project suggests internet ought remain free warfare tactics treated international landmark states internet cyberspace common heritage mankind february 2017 rsa conference microsoft president brad smith suggested global rules – digital geneva convention – cyber attacks ban nation-state hacking civilian aspects economic political infrastructures also stated independent organization could investigate publicly disclose evidence attributes nation-state attacks specific countries furthermore said technology sector collectively neutrally work together protect internet users pledge remain neutral conflict aid governments offensive activity adopt coordinated disclosure process software hardware vulnerabilities documentaries br videos articles | [
5636,
10756,
3092,
8726,
10777,
2084,
3629,
1083,
7228,
7739,
9791,
1088,
10309,
7759,
4689,
1111,
8288,
612,
107,
3698,
7798,
8824,
5245,
5246,
3711,
7809,
9345,
5764,
3207,
9356,
6797,
5780,
150,
10392,
10909,
9375,
1189,
2213,
6312,
78... | Test |
9,689 | 2 | Nanolinux:nanolinux nanolinux open source free lightweight linux distribution requires 14 mb disk space including tiny versions common desktop applications several games based core version tiny core linux distribution uses busybox nano-x instead x.org fltk 1.3.x default gui toolkit slwm super-lightweight window manager included applications mainly based fltk nanolinux includes several lightweight applications including distribution also includes several games tuxchess checkers nxeyes mastermind sudoku blocks support truetype fonts utf-8 also provided nanolinux distributed live cd iso images installation flash disk hard disk documented wiki pages minimal configuration live cd version without swapfile requires 64 mb ram 14 mb disk space | [
516,
8837,
7435,
10127,
2321,
4887,
10394,
673,
3745,
10530,
9253,
10149,
11305,
7854,
11568,
2738,
4790,
439,
56,
8248,
59,
7483,
3903,
4673,
2375,
4039,
5067,
8907,
1110,
9693,
2914,
6371,
485,
3685,
9064,
4841,
6890,
7913,
7020,
10860,... | Validation |
9,690 | 4 | Trust_on_first_use:trust first use trust first use tofu trust upon first use tufu security model used client software needs establish trust relationship unknown not-yet-trusted endpoint tofu model client try look endpoint identifier usually kind public key local trust database identifier exists yet endpoint client software either prompt user determine client trust identifier simply trust identifier given record trust relationship trust database different identifier received subsequent connections endpoint client software consider untrusted tofu approach used connecting arbitrary unknown endpoints trusted third party certificate authority example ssh protocol designed issue prompt first time client connects unknown not-yet-trusted endpoint implementations tofu found http public key pinning browsers always accept first public key returned server http strict transport security browsers obey redirection rule duration 'age directive single largest strength tofu-style model human must initially validate every interaction common application model use ssh-rpc 'bot users computers whereby public keys distributed set computers automated access centralized hosts tofu aspect application forces sysadmin trusted user validate remote server identity upon first connection largest weakness tofu-style model human must initially validate every interaction scale infinitely quickly scale beyond capabilities group people using managing computers need trusted secure protocols people tend approve without verification mention increased surface area human error compromise security scalability use proposed daniel gultsch developer xmpp client conversations call blind trust verification consists checking key first contact check user made manual check key changed first known formal use term tofu tufu cmu researchers dan wendlandt david andersen adrian perrig research paper perspectives improving ssh-style host authentication multi-path probing published 2008 usenix annual technical conference moxie marlinspike mentioned perspectives term tofu def con 18 proceedings reference comments made dan kaminsky panel discussion open letter call action audience suggestion raised implying superiority ssh public key infrastructure pki model ssl/tls pki model whereby moxie replied topics trust validation non-repudiation fundamental work field cryptography digital security | [
3616,
8674,
7075,
517,
10341,
10631,
4746,
11,
7212,
9642,
10831,
11345,
4863,
2169,
9884,
4063
] | Test |
9,691 | 7 | Autodesk_Gameware:autodesk gameware autodesk gameware discontinued middleware software suite developed autodesk suite contained tools enable designers create game lighting character animation low level path finding high-level ai advanced user interfaces july 12 2017 autodesk removed scaleform beast humanik navigation online store announced ending support products gameware suite consisted following modules beast content pipeline tool used advanced global illumination dynamic character relighting beast developed sold swedish games lighting technology company illuminate labs acquired autodesk 2010 beast used make light maps shadow maps point clouds advanced global illumination beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects beast built-in integration gamebryo lightspeed epic unreal engine evolution several in-house game engines march 2010 unity technologies announced next version unity would feature built-in beast lightmapping global illumination shelf api available projects working beast ready integration beast api programming interface designed make easy possible create beast integration game engine beast used games mirror edge crimecraft mortal kombat vs. dc universe alpha protocol new beast presented gdc 2010 san francisco new version beast features two entirely new modules called distribeast ernst distribeast extremely fast easy use distribution engine managing render farms ernst real-time visualizer allows artists explore control lighting set-up without run complete bake | [
8122,
3141,
8454,
8071,
2826,
3210,
11306,
2293,
4182,
6486,
5914,
5083,
1916
] | Validation |
9,692 | 5 | Tsunami_UDP_Protocol:tsunami udp protocol tsunami udp protocol udp-based protocol developed high-speed file transfer network paths high bandwidth-delay product protocols needed standard tcp perform well paths high bandwidth-delay products tsunami effects file transfer chunking file numbered blocks 32 kb communication client server applications flows low bandwidth tcp connection bulk data transferred udp | [
609,
10924,
8905,
11413
] | Test |
9,693 | 2 | Knoppix:knoppix knoppix operating system based debian designed run directly cd dvd live cd usb flash drive live usb one first kind operating system knoppix developed named linux consultant klaus knopper starting program loaded removable medium decompressed ram drive decompression transparent on-the-fly although knoppix primarily designed used live cd also installed hard disk like typical operating system computers support booting usb devices load knoppix live usb flash drive memory card two main editions traditional compact-disc 700 megabytes edition dvd 4.7 gigabytes maxi edition main edition two language-specific editions english german knoppix mostly consists free open source software also includes proprietary software long fulfils certain conditions knoppix used copy files easily hard drives inaccessible operating systems quickly safely use linux software live cd used instead installing another os 1000 software packages included cd edition 2600 packages included dvd edition nine gigabytes stored dvd compressed form packages include minimum hardware requirements knoppix prior knoppix 3.8.2 documents settings user created would disappear upon reboot lack persistence made necessary save documents directly hard drive partition network removable media usb flash drive also possible set persistent home directory documents settings written user home directory would automatically redirected hard drive removable media could automatically mounted bootup single file knoppix.img cached rewritable media used simulate file system files written later use allowed user transparently write home directory union mount support added version 3.8.1 unionfs later replaced aufs 5.1.0 improve stability union mount allowed virtual updates data read-only cd/dvd media storing changes separate writable media representing combination two single storage device writable media could memory ramdisk hard disk usb flash drive etc means user could modify software installed knoppix system using apt install update software storage device containing changes needed present whenever knoppix started else original data disc would used knoppix would scan available storage devices persistent home directory default user could dictate specific location boot option see codice_1 carrying knoppix cd usb flash drive user could environment programs settings data available computer could run knoppix functionality available knoppix 5.1.1 cd release 5.3.1 dvd release subsequently live cd paradigm transformed portable operating systems run external storage using knoppix live cd one use boot options also known 'cheatcodes override default setting automatic hardware detection fails example user may wish boot plain console proceed without scsi support knoppix allows user enter one cheat codes prompt booting user enter cheat code press key timeout knoppix boot default options example set language french rather default one would type codice_2 knoppix 32-bit debian linux based distro recent releases including latest version 7.6 also equipped 64-bit kernel dvd edition automatically boot 64-bit computers using boot option codice_3 manually command-line prompt codice_4 boot 32-bit kernel neither pae 64-bit applications supported knoppix system memory 4 gb used 64-bit kernel dvd edition knoppix also loaded onto usb flash drive flash-knoppix knoppix system knoppix live system starts runs factor 5 faster usb flash disk cd dvd besides experimental uefi support provided usb flash drive rather dvd media 32-bit uefi firmware boot 32-bit kernel 64-bit uefi firmware boot 64-bit kernel text interface uefi similar bios one also press key f2 f3 access information boot options knoppix one first live cd linux distributions gain popularity several factors contribute popularity knoppix knoppix works fairly large number pcs laptops automatic hardware detection cope hardware sometimes drivers used optimal knoppix difficulty recognizing cards made 1998 motherboards bios made 2002 cases manual configuration codes entered boot time overcome problems automatic detection pc enough ram run kde included programs legacy knoppix earlier 6.0 boots limited twm session instead window running twm session default xterm table right shows version history major releases april 2008 version 4 5.1.1 knoppix split dvd maxi edition 9 gb software cd light edition developed parallel knoppix 5.1.1 cd editions contained selection graphical environments including twm window manager kde 3 — feature-complete desktop environment default knoppix 5.3.1 earlier development done traditional 5.x versions knoppix 6.0.1 adriane 1.1 cd-edition complete rebuild scratch lxde made default desktop environment edition contains substantially reduced software collection order easily fit cd knoppix 6.2.1 release cd dvd editions adriane 1.2 cd-edition knoppix 6.7.1 last cd version stable touchpad drivers june 2013 march 2019 knoppix 7.2 recent release cd edition 2018 software become outdated libc6 2.17 library longer suffices installation several modern packages 7.x version range known instabilities touchpads version 7.2 still remains recent cd version knoppix wide distribution knoppix 8.0.0 edition released cebit 2017 knoppix 8.1.0 released september 2017 first public release 8.x series version 8.0.0 dual boot choice three different desktops lxde default option kde gnome versions 8.2.0 newer 8.2.x 8.5.x available knoppix mirrors knoppix 8.5 dvd version available download exclusive bundled physical edition linux-magazin linux-user version 8.5 longer includes systemd replaced elogind spectre meltdown kernel vulnerabilities mitigated adriane knoppix variation intended blind visually impaired people used entirely without vision oriented output devices released third quarter 2007 live cd adriane knoppix named adriane knopper wife klaus knopper developer knoppix adriane visual impairment assisting klaus development software name adriane also backronym audio desktop reference implementation networking environment adriane knoppix intended blind also beginners ’ know much computers uses suse blinux screen reader phoneme generator speech engine normal output | [
3073,
4611,
6150,
3079,
2064,
3089,
4113,
8209,
10257,
10774,
8727,
4123,
4637,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
7228,
8248,
8254,
9276,
4673,
6213,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
... | Test |
9,694 | 6 | My_Documents:documents documents commonly recognized name special folder microsoft windows even though starting windows vista called documents actual name folder might different language installed copy windows english folder supposed personal area users store personal non-shared documents however many software developers ignored convention result folder become dumping ground application data files containing settings saved games users delete move organize files without causing unwanted behavior software windows xp contained subfolders pictures music videos starting windows vista subfolders moved documents made siblings microsoft first introduced documents folder windows 95 oem service release 2 standard location storing user-created files folder located root directory boot volume shortcut displayed directly user desktop windows nt family operating systems set documents folder user profile folder windows xp earlier path codice_1 alias codice_2 boot volume user later change physical location documents however documents windows explorer file dialog boxes n't appear absolute path addition translation display name folder might change depending owner folder example user logged windows xp later user account look personal folders user account b via windows explorer instead documents b documents seen customization achieved using codice_3 file windows vista made many changes folder dropping name stored codice_4 regardless windows language windows explorer however shows different display name depending chosen language instance english copy windows shows documents french copy shows mes documents german copy shows eigene dokumente changed eigene dateien windows xp additionally pictures music videos longer stored within called pictures music video siblings folder supposed personal area users store personal non-shared documents users supposed sole authority stored folder creating renaming moving deleting contents folder supposed impact proper execution installed software however many software developers ignored convention result folder become dumping ground application data files containing settings saved games example users delete move organize files without causing unwanted behavior software option either live chaos simply store files elsewhere windows 98 introduced two additional folders prefix music pictures present windows server 2003 default unless enabled using start menu customization installing windows media player 10 11 windows xp adds videos folder windows media player uses store video files shown media library windows vista prefix removed three folders expelled called documents addition user folders added contacts downloads favorites links saved games searches windows 10 adds onedrive windows 7 public user folder recorded tv library added libraries list installing visio 2003 adds nowiki shapes /nowiki folder windows machines operate part windows server domain administrators configure location documents special folders group policy corporate desktop deployments commonly redirect documents folder file server | [
7106,
6088,
4298,
4074,
2027,
461,
6797,
8080,
8976,
9972,
10388,
9819,
10751
] | None |
9,695 | 4 | Malicious_Software_Removal_Tool:malicious software removal tool microsoft windows malicious software removal tool freely distributed virus removal tool developed microsoft microsoft windows operating system first released january 13 2005 on-demand anti-virus tool on-demand means lacks real-time protection scans computer specific widespread malware tries eliminate infection automatically distributed microsoft windows computers via windows update service also separately downloaded program usually updated second tuesday every month commonly called patch tuesday distributed via windows update point runs automatically background reports malicious software found alternatively users manually download tool microsoft download center records results log file located windir \debug\mrt.log run manually times users start mrt.exe using windows command prompt run command start menu released tool configured report anonymized data infections microsoft detected reporting behavior disclosed tool eula disabled desired june 2006 microsoft report company claimed tool removed 16 million instances malicious software 5.7 million 270 million total unique windows computers since release january 2005 report also stated average tool removes malicious software 1 every 311 computers runs microsoft claims software removed password stealer threats 859,842 machines august 2013 malicious software removal tool deleted old vulnerable versions tor client order end spread sefnit botnet mined bitcoins without host owner approval later engaged click fraud approximately two million hosts cleaned october although slightly less half estimated infections rest suspected machines presumably automatic windows updates enabled manually run since support windows 2000 ended july 13 2010 microsoft stopped distributing tool windows 2000 users via windows update last version tool could run windows 2000 4.20 released may 14 2013 starting version 5.1 released june 11 2013 support windows 2000 dropped altogether although windows xp support ended april 8 2014 microsoft announced updates windows xp version malicious software removal tool would provided july 14 2015 | [
2309,
1417,
2443,
6797,
8978,
537,
3482,
5799,
5673,
7983,
7473,
5173,
1087,
5057,
10828,
5082,
7515,
3935,
11248
] | Validation |
9,696 | 2 | Mark_Galassi:mark galassi mark galassi physicist computer scientist contributor free software movement born manhattan grew france italy currently lives santa fe new mexico works space science applications group los alamos national laboratory research scientist los alamos worked mark galassi involved gnu project since 1984 designed gnu scientific library together james theiler contributed free software projects gnome dominion also currently board chair vice president software freedom conservancy studied liceo classico giuseppe parini graduating 1983 completed ba physics reed college 1986 completed ph.d. physics 1992 institute theoretical physics stony brook martin roček also worked tektronix cygnus solutions part red hat working guile ecos | [
1026,
2050,
5644,
2581,
10780,
3618,
6691,
2109,
10817,
10822,
5703,
8263,
589,
4177,
8787,
3674,
8304,
7793,
3189,
2180,
7812,
8326,
8848,
657,
2195,
6808,
1694,
6302,
8354,
8364,
1717,
5833,
6352,
3802,
4831,
10464,
1761,
4841,
9455,
84... | None |
9,697 | 4 | Piling-up_lemma:piling-up lemma cryptanalysis piling-up lemma principle used linear cryptanalysis construct linear approximation action block ciphers introduced mitsuru matsui 1993 analytical tool linear cryptanalysis piling-up lemma allows cryptanalyst determine probability equality holds x binary variables bits either 0 1 let p denote probability true equals one certain happen equals zero happen first consider piling-up lemma two binary variables formula_2 formula_3 consider due properties xor operation equivalent x x 0 x x 1 mutually exclusive events say must make central assumption piling-up lemma binary variables dealing independent state one effect state others thus expand probability function follows express probabilities p p ½ ε ½ ε ε probability biases — amount probability deviates ½ thus probability bias ε xor sum 2εε formula extended x follows note ε zero one binary variables unbiased entire probability function unbiased — equal ½ related slightly different definition bias formula_8 fact minus two times previous value advantage formula_9 adding random variables amounts multiplying 2nd definition biases practice x approximations s-boxes substitution components block ciphers typically x values inputs s-box values corresponding outputs simply looking s-boxes cryptanalyst tell probability biases trick find combinations input output values probabilities zero one closer approximation zero one helpful approximation linear cryptanalysis however practice binary variables independent assumed derivation piling-up lemma consideration kept mind applying lemma automatic cryptanalysis formula | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
4128,
4389,
10662,
169,
11185,
2357,
10806,
1847,
9528,
2110,
9541,
10315,
6863,
8273,
7635,
212,
9556,
10963,
11349,
2265,
7643,
8674,
229,
618,
1898,
881,
1654,
7161,
7034,
892
] | Test |
9,698 | 6 | Lost_cluster:lost cluster lost clusters occur file deleted directory listing file allocation table fat still shows clusters allocated file | [
8129
] | None |
9,699 | 2 | Utmp:utmp utmp wtmp btmp variants utmpx wtmpx btmpx files unix-like systems keep track logins logouts system files regular text files rather binary format needs edited specially crafted programs implementation fields present file differ depending system libc version defined utmp.h header file wtmp btmp format exactly like utmp except null value username indicates logout associated terminal actual user name located finding preceding login terminal furthermore value terminal name username shutdown reboot indicates system shutdown reboot respectively files set given pam module pam_unix.so pam_sss.so set application performing operation e.g mingetty /bin/login sshd obligation program record utmp information utmpx wtmpx extensions original utmp wtmp originating sun microsystems utmpx specified posix utmp wtmp btmp files never part official unix standard single unix specification utmpx corresponding apis part systems create different newer files utmpx variants deprecated/obsoleted former formats always case linux example uses utmpx structure place older file structure depending system files may commonly found different places non-exhaustive list linux solaris hp-ux freebsd 9.0 introduced new files adding support utmpx different commands allow users consult information stored files including show current system users last show last logged users lastb show last failed login attempts linux-specific | [
9665,
5492,
5397,
823,
5435,
2143
] | Test |
9,700 | 2 | QuickDraw:quickdraw quickdraw 2d graphics library associated application programming interface api core part classic mac os operating system initially written bill atkinson andy hertzfeld quickdraw still existed part libraries mac os x largely superseded modern quartz graphics system mac os x v10.4 quickdraw officially deprecated mac os x v10.5 applications using quickdraw make use added 64-bit support mac os x v10.8 quickdraw header support removed operating system applications using quickdraw still run os x 10.8 macos 10.12 however current versions xcode macos sdk contain header files compile programs quickdraw grounded apple lisa lisagraf early 1980s designed fit well pascal-based interfaces development environments early apple systems addition quickdraw raster graphics system defines pixel basic unit graphical information contrast vector graphics systems graphics primitives defined mathematical terms rasterized required display resolution raster system requires much less processing power however prevailing paradigm time quickdraw developed quickdraw defined key data structure graphics port grafport logical drawing area graphics could drawn obvious on-screen object corresponding grafport window entire desktop view could grafport off-screen ports could also exist grafport defined coordinate system quickdraw resolution 16 bits giving 65,536 unique vertical horizontal locations numbered -32,767 extreme left top +32,767 extreme right bottom window usually set top left corner content area located 0,0 associated grafport window content area include window frame drop shadow title bar quickdraw coordinates referred infinitely thin lines pixel locations actual pixel drawn space immediate right coordinate made easier programmers avoid graphical glitches caused off-by-one errors macintosh pixels square grafport default resolution 72 pixels per inch chosen match conventions established printing industry 72 points per inch quickdraw also contained number scaling mapping functions quickdraw maintained number global variables per process chief among current port originally simplified api since operations pertained current port os developed use global state also made quickdraw much harder integrate modern design approaches multi-threading pre-emptive multitasking address problems carbon api bridge mac os 9 mac os x added additional parameters routines allowing opaque storage thread information new non-polled event structure everything seen classic mac os screen drawn quickdraw library quite low level primitive objects draw objects except text may drawn using pen rectangular dimensions pattern color note pen rectangular axis-aligned diagonal lines end thicker horizontal vertical ones shapes may drawn filled framed using pattern color filled arc forms wedge text may drawn installed font variety stylistic variations size color depending selected font stored text scaled variety ways truetype fonts scale smoothly size whereas bitmap fonts usually scale well important feature quickdraw support transfer modes governed destination pixel value related previous value color object drawn set attributes pen text drawing associated grafport regions key data structure quickdraw define arbitrary set pixels rather like bitmap compressed form rapidly manipulated complex ways regions combined union subtracted difference xored form regions used within grafport clipping drawn filled framed like shape series framed shapes connected lines may combined region region need consist contiguous set pixels disconnected regions possible common although regions could allow powerful graphic manipulations limited current implementation restricts maximum region data storage size sixteen bit value practical general-purpose drawing composition tool practical use high resolution also restricted regions underpin rest quickdraw permitting clipping arbitrary shapes essential implementation multiple overlapping windows invented bill atkinson regions patented separate invention apple region specified initial creation opening region drawing various quickdraw shapes closing region hidden routines construct region quickdraw commands executed bitmaps may also converted regions bitmaps may made regions painting filling region graphics port internal structure region storage length bounding rectangle opaque apple-published documents available though mechanism outlined patent regions implemented using vertical horizontal compression region stored series horizontal scan lines rasters contains vertical coordinate followed list horizontal inversion coordinates inversion point thought toggling inclusion region points first point turns region second turns compression achieved storing line differentially line contains differences previous line rather full set inversion points finally identical adjacent scan lines efficiently encoded simply skipping way commonly used region rounded corner rectangle efficiently encoded complex operations region composition image clipping may done without requiring either extensive processor cycles large amounts memory original systems executing quickdraw code used processors operating 8 megahertz clock rates systems 128 kilobytes writable memory regions bound specific orientation ninety degree rotation region would require detailed reverse engineering structure extensive coding general rotation impractical compared rotating original source boundary description simply creating new region however api includes conversion routines bitmaps bitmaps may also rotated using well known methods various degrees image degradation depending upon angle chosen storage processor cycles available operation complexity algorithm apple recently carbon api defined regions opaque structure program compilation options series graphics calls quickdraw recorded structure called picture saved memory played back time reproducing graphics sequence playback time picture may placed new coordinates scaled picture saved disk form defines apple pict format entire bitmap pixmap referring color images may copied one grafport another scaling clipping known blitting copybits name function operation basis animation sprite-like effects mac quickdraw provides similar blitting function designed implement scrolling within grafport image port shifted new location without scaling clipping desired graphics primitive operation vectored stdprocs series function pointers stored grafport limited polymorphism permits individual operations overridden replaced custom functions allowing printer drivers intercept graphics commands translate suitable printer operations way quickdraw rendered using postscript fact enabled macintosh practically invent desktop publishing similar subclass window data structure began associated grafport thus basically making windows exchangeable grafport convenient could source programming errors quickdraw started life lisagraf part apple lisa development macintosh initially simplified later extended originally quickdraw grafports supported bit depth 1 one bit per pixel black white suited built-in screen early macintosh fixed size 512×342 pixels limited color supported using crude planar model allowing quickdraw drive types dot-matrix printer used multi-colored ribbons applications supported feature 1987 macintosh ii developed launched designed conventional three-box design computer monitor keyboard separate monitor separate larger original mac video architecture necessarily change addition mac ii took macintosh black-and-white full color apple also decided time support seamless desktop spanning multiple monitors industry first thus color quickdraw significant extension original quickdraw created original architecture lacked much provision expandability using series hacks apple developers managed make addition color new video architecture virtually seamless developers end users color quickdraw introduced new data structures including gdevices represent attached video card/monitor new color grafport cgrafport structure handle color well pixmaps instead bitmaps multiple bits-per-pixel images one hacks compatibility used new structure exactly size old one data members place additional handles pointers color structures place bitmap fields upper two bits rowbytes field pressed use flags distinguish grafport cgrafport always zero old-style grafports bitmap could never feasibly wide ever set bits use two high bits would come back haunt quickdraw later forced maximum row width 4,095 32-bit pixmaps became problematic high-resolution graphics work later development carbon eliminated limitation fully backward compatible palette manager also added color quickdraw managed arbitration colors indexed video devices graphics primitives operations remained either unchanged would operate color else new color versions black white apis added initially color quickdraw capable operating 1 2 4 8-bit video cards available time soon however 24-bit video cards appeared so-called true color quickdraw updated support 32 bits per pixel reality 24 bits 8 unused color data 32-bit quickdraw architecture always allowed however new apis necessary color data structures allowed color depth 1 2 4 8 15 24 bits yielding 2 4 16 256 32,768 16,777,216 colors respectively 4 16 256 scales grey quickdraw took care managing resampling colors available color depths actual video hardware transfer offscreen image buffers including optionally dithering images lower depth improve image quality set color sampling utilities also added programmers could generate optimal color palettes use indexed video devices architecture quickdraw always allowed creation grafports associated bitmaps pixmaps offscreen graphics could composed memory without visible immediately screen pixels could transferred offscreen ports screen using quickdraw blitting function copybits offscreen compositing workhorse games graphics-intensive applications however advent 32-bit quickdraw offscreen worlds created set hand programmer within application involving three separate fairly complex data structures cgrafport pixmap gdevice indexed devices color look-up table inverse could error prone 32-bit quickdraw os support handling added offscreen graphics world gworld video buffer pixmap gworld could stored main memory available unused parts video ram copying screen could optimized speed avoiding need transfer large amount pixel data across main memory bus advent quicktime quickdraw gained ability deal compressed raster data jpeg quicktime image compression manager integrated closely quickdraw particular image decompression calls full-fledged quickdraw drawing calls picture recorded compressed data would saved part picture display picture later drawn image compression manager also added integration colorsync color matching apart back-end changes optimize new processor architectures powerpc quickdraw remained largely unchanged throughout rest life classic mac os quickdraw gx quickdraw 3d shared quickdraw name able interoperate quickdraw pixmap picture data structures otherwise completely separate functionality mac os x quickdraw became part carbon api 2005 release mac os x 10.4 quickdraw officially deprecated 2010 macpaint 1.3 source code release computer history museum historical version quickdraw source code became available | [
1152,
4741,
1542,
137,
3598,
143,
2319,
5520,
4114,
10512,
11037,
6048,
11171,
3367,
3241,
7849,
7983,
8114,
9778,
8628,
11574,
1592,
10173,
576,
713,
9418,
9035,
213,
9430,
3167,
6377,
4844,
1389,
8303,
5619,
2676,
8700,
7163,
3324,
3197... | Test |
9,701 | 9 | Trait_(computer_programming):trait computer programming computer programming trait concept used object-oriented programming represents set methods used extend functionality class traits provide set methods implement behaviour class require class implement set methods parameterize provided behaviour inter-object communication traits somewhat object-oriented protocol interface mixin interface may define one behaviors via method signatures trait defines behaviors via full method definitions i.e. includes body methods contrast mixins include full method definitions may also carry state member variable traits usually n't hence object defined trait created composition methods used classes without requiring multiple inheritance case naming collision one trait used class method name programmer must explicitly disambiguate one methods used class thus manually solving diamond problem multiple inheritance different composition methods object-oriented programming conflicting names automatically resolved scoping rules whereas mixins composed using inheritance operation traits offer much wider selection operations including traits composed following ways traits come originally programming language self supported following programming languages example uses trait enhance classes allows simulating aspects multiple inheritance trait rust declares set methods type must implement rust compilers require traits explicated ensures safety generics rust also helps avoid major problems templates c++ // type must ord trait // operations done fn get_max ord option simplify tedious repeated implementation traits like codice_3 codice_4 codice_5 used request compilers generate certain implementations automatically derivable traits include codice_6 codice_7 codice_3 codice_9 codice_10 codice_11 codice_12 codice_4 codice_14 | [
3462,
8582,
6154,
10510,
9245,
11688,
5165,
5677,
6074,
10555,
6718,
8644,
7292,
7889,
11610,
476,
2666,
8554,
7148,
3442,
3705,
2556
] | Test |
9,702 | 0 | Automatic_acquisition_of_sense-tagged_corpora:automatic acquisition sense-tagged corpora knowledge acquisition bottleneck perhaps major impediment solving word sense disambiguation wsd problem unsupervised learning methods rely knowledge word senses barely formulated dictionaries lexical databases supervised learning methods depend heavily existence manually annotated examples every word sense requisite met handful words testing purposes done senseval exercises therefore one promising trends wsd research using largest corpus ever accessible world wide web acquire lexical information automatically wsd traditionally understood intermediate language engineering technology could improve applications information retrieval ir case however reverse also true web search engines implement simple robust ir techniques successfully used mining web information employed wsd direct way using web corpora enhance wsd performance automatic acquisition sense-tagged corpora fundamental resource feed supervised wsd algorithms although far commonplace wsd literature number different effective strategies achieve goal already proposed strategies automatic extraction examples train supervised learning algorithms reviewed far best explored approach mine web word sense disambiguation results certainly encouraging however several open research issues related use web examples wsd besides automatic acquisition examples web wsd experiments profited web clear however research opportunities remain largely unexplored instance little known use lexical information extracted web knowledge-based wsd systems also hard find systems use web-mined parallel corpora wsd even though already efficient algorithms use parallel corpora wsd | [
7599,
538,
5781,
119
] | Test |
9,703 | 3 | Thexder:thexder thexder player controls fighter robot able transform jet originally released 1985 nec pc-8801 platform japan game arts licensed thexder square order develop conversion nintendo entertainment system nes game console 1987 game arts also developed thexder conversion msx platform game licensed sierra entertainment release united states 1987 sierra ported game multiple platforms including ibm pc tandy color computer 3 apple ii apple iigs apple macintosh tandy 1000 computer became company best-selling title 1987 1988 activision released game europe commodore amiga 1990 game sold one million copies worldwide thexder quickly became best-selling hit selling 500,000 copies pc8801 platform popular japan despite home market success thexder garnered little attention abroad initially conversion msx best selling platform brazil many east european countries became international hit compute praised apple iigs version thexder computer first true arcade game excellent play value dollar 1988 games machine gave amiga version 74 score 1991 dragon gave macintosh pc/ms-dos versions game 4 5 stars game went sell one million copies worldwide becoming game arts biggest selling title 1987 thexder considered important breakthrough title run-and-gun shooter game genre paving way titles contra metal slug | [
576,
8937,
9773,
9006,
2159,
9166,
10931,
2943
] | Test |
9,704 | 4 | WeProtect:weprotect weprotect styled weprotect global alliance led uk government founded baroness joanna shields supported 84 countries 24 technology companies 20 civil society organisations weprotect mission stop global crime online child sexual abuse exploitation 22 july 2013 then-prime minister david cameron made speech regarding proliferation accessibility child abuse images internet cracking online pornography prime minister announced new uk-us taskforce would created lead global alliance biggest internet companies tackle indecent images children online joanna shields prime minister advisor digital industries would head initiative working uk us governments law enforcement agencies technology industry maximise international efforts october 2013 announced damian green hmg minister policing criminal justice victims would travelling us joanna shields formalise arrangements task force meet us attorney general leading internet companies 18 november 2013 prime minister hosted internet safety summit 10 downing street joanna shields discuss done block child abuse content protect children harmful material online participants including leading search engines internet service providers national crime agency internet watch foundation nspcc discussed rid internet child sexual abuse exploitation summit internet safety communiqué issued setting agreed-upon action 13 december 2013 policing minister damian green us acting assistant attorney general mythili raman joanna shields launched first meeting us-uk taskforce counter online child exploitation ’ next year chair taskforce joanna shields responsible bringing together experts government industry law enforcement academia sides atlantic combat child sexual exploitation crimes internet reduce volume indecent images children online april 2014 home office minister damian green addressed nspcc child safety conference government work stamp online sexual exploitation revealed government working major industry players google microsoft pilot make even tougher pedophiles share child abuse images also told conference google launched programme embed engineers internet watch foundation speech encouraged internet companies innovate order fight online child sexual exploitation announced joanna shields would leading industry solutions event part us-uk taskforce event would bring together experts across technology sector come innovative solutions end sharing indecent images interacting adults children sexual purposes online may 2014 industry solutions event weprotect 2014 took place grey inn london attendance 67 technology specialists innovators 48 world leading technology companies event led national crime agency ceop home office delivered brandfuel facilitated pa consulting solutions event started hackathon leading internet technology cyber intelligence companies working develop breakthrough technology concepts could assist prevention investigation online child abuse protection victims event successfully laid foundation new model collaboration across industry harnessing diverse range technical skills knowledge experience tackle sharing indecent images grooming children sexual purposes uk prime minister hosted weprotect global summit london december 2014 summit gathered government leaders leading technology companies civil society organisations galvanise action end online child sexual exploitation home secretary opened summit speaking scale abuse uk combat prime minister keynote speaker second day alongside raft measures technical innovations tackle use internet view share indecent images prime minister announced uk would work unicef develop new global child protection fund uk would making £50 million contribution fund five-year period keith bristow director general national crime agency also spoke summit addressed need law enforcement civil society technology industry work together minimise risk children maximise risk offenders joanna shields prime minister digital adviser spoke importance technology industry using talents skills capacity innovation tackle online child exploitation also delivered report milestones industry partners course 2014 attendees also heard executives microsoft google ey visa presented contributions weprotect pledged continue developing concepts emerged may workshop including blocking viewing illegal material browser level internet interaction risk scoring victim identification tool system children report self-generated indecent images also announced united arab emirates would hosting another conference 2015 ensure global response comes fruition end summit four ambitious statements action published date signed 50 countries 20 companies 10 civil society organisations follow-up weprotect industry event took place september 2015 speaking event uk minister internet safety security baroness joanna shields delivered message continued support initiative vital importance broad global coalition willing coming together share information collaborate best protect children online industry delegates also heard representatives weprotect initiative including google facebook microsoft milestones achieved companies preventing sexual abuse images appearing search results identifying online grooming detecting removing videos children abused 16–17 november 2015 united arab emirates hosted second weprotect global summit abu dhabi may 2016 weprotect founder baroness joanna shields announced weprotect merged global alliance child sexual abuse online “ create first time single organisation influence expertise resources transform online child sexual exploitation dealt worldwide ” july 2016 weprotect global alliance launched new fund end violence children united nations deliver global program capacity capability initial donation £40 million uk government fund hosted unicef weprotect global alliance board responsible advising prioritize activities maximum impact may 2017 press conference rome pontifical gregorian university collaboration centre child protection institute psychology partnership weprotect global alliance telefono azzurro announced 3–6 october 2017 would host world congress entitled 'child dignity digital world announced invitation-only congress brings together distinguished academic experts business leaders leaders civil society high-level politicians religious representatives across globe provides historic opportunity set global agenda fight online sexual child abuse child protection digital world leadership advisory board | [
7547,
10446
] | Test |
9,705 | 4 | Xceedium:xceedium xceedium inc. network security software company providing privileged identity access management solutions subsequently acquired ca technologies software used control manage risks privileged users privileged accounts admin root etc privileged credentials passwords certificates digital keys etc pose systems data xceedium inc. founded 2000 david van david cheung company split lucid technologies group company created 1995 company developed software internal use provided consultants secure remote access sensitive customer systems software became core technology xceedium gatekeeper product xceedium products aimed mid-large sized enterprises vertical market segments including banking financial services retail telecom healthcare energy government agencies marketed product global partner network xceedium headquarters originally located jersey city new jersey relocated northern virginia march 2011 initial funding venture-backed company came arrowpath venture partners nationwide mutual capital xceedium private venture capital backed company funding arrowpath venture partners nationwide mutual capital june 2012 xceedium closed 12 million financing led arrowpath venture partners bringing total capital raised 25m xceedium acquired ca technologies august 2015 xceedium gatekeeper first product designed company initially built out-of-band in-band kvm remote control gatekeeper software updated provide network-based access control session recording/playback later gatekeeper cloakware password authority product acquired irdeto integrated form xceedium xsuite main capabilities xceedium xsuite role-based access control command filtering white/black list user containment prevents ssh based leapfrogging rdp hopping unauthorized nodes session monitoring/policy violation alerting session recording playback privileged password vaulting management xceedium xsuite platform enabled organizations apply principle least privilege holds systems individuals granted access resources commands absolutely necessary required task according company xsuite limited access privileged users systems commands explicitly authorized role-based access control also monitored activities privileged users sent alerts individuals attempted violate policy system recorded privileged user sessions telnet rdp ssh vnc provided mechanism replay recorded session investigations forensics xsuite cloud amazon web services aws introduced extension xsuite platform provided privileged identity access management standalone aws implementations hybrid architectures include infrastructure nodes e.g. servers network devices storage devices security systems running aws amazon elastic compute cloud ec2 private clouds virtual machines traditional single os/hardware scenarios following acquisition xceedium ca xceedium xsuite integrated ca product range ca privileged access manager | [
10341,
11112,
939,
7248,
210,
10835,
10747
] | Validation |
9,706 | 3 | HP_Serviceguard:hp serviceguard hp serviceguard formerly known mc/serviceguard high-availability cluster software produced hp runs hp-ux linux serviceguard existed since 1990 hp claims first high availability solution unix linux port called sg/lx existed since 1999 briefly suspended reintroduced june 2012 | [
5384,
823,
9455,
5492,
3927,
1304
] | Test |
9,707 | 3 | Micro-operation:micro-operation computer central processing units micro-operations also known micro-ops μops detailed low-level instructions used designs implement complex machine instructions sometimes termed macro-instructions context usually micro-operations perform basic operations data stored one registers including transferring data registers registers external buses central processing unit cpu performing arithmetic logical operations registers typical fetch-decode-execute cycle step macro-instruction decomposed execution cpu determines steps series micro-operations execution micro-operations performed control cpu control unit decides execution performing various optimizations reordering fusion caching various forms μops long basis traditional microcode routines used simplify implementation particular cpu design perhaps sequencing certain multi-step operations addressing modes recently μops also employed different way order let modern cisc processors easily handle asynchronous parallel speculative execution traditional microcode one table lookups equivalent done locate appropriate μop-sequence based encoding semantics machine instruction decoding translation step however instead rigid μop-sequences controlling cpu directly microcode-rom μops dynamically buffered rescheduling executed buffering means fetch decode stages detached execution units feasible traditional microcoded hard-wired design allows degree freedom regarding execution order makes extraction instruction level parallelism normal single-threaded program possible provided dependencies checked etc. opens analysis therefore also reordering code sequences order dynamically optimize mapping scheduling μops onto machine resources alus load/store units etc. happens μop-level sub-operations different machine macro instructions may often intermix particular μop-sequence forming partially reordered machine instructions direct consequence out-of-order dispatching microinstructions several macro instructions however micro-op fusion aims fact complex microinstruction may replace simpler microinstructions certain cases typically order minimize state changes usage queue reorder buffer space therefore reducing power consumption micro-op fusion used modern cpu designs execution optimization gone even processors translate many machine instructions series μops also opposite appropriate combine certain machine instruction sequences compare followed conditional jump complex μop fits execution model better thus executed faster less machine resources involved also known macro-op fusion another way try improve performance cache decoded micro-operations macroinstruction executed processor directly access decoded micro-operations special cache instead decoding execution trace cache found intel netburst microarchitecture pentium 4 widespread example technique size cache may stated terms many thousands micro-operations store kμops | [
7173,
6151,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
2638,
3175,
8815,
9330,
6268,
3197,
1677,
7313,
6804,
6815,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
2237,
4286,
2241,
63... | Validation |
9,708 | 8 | Webtrends:webtrends webtrends private company headquartered portland oregon united states provides digital analytics optimization software related digital marketing e-commerce provides services approximately 2,000 companies w. glen boyd eli shapira founded company 1993 e.g software netiq bought 2001 2001-2005 interval netiq released new version webtrends reporting center version 5.0 october 31 2007 three corporate vice presidents ceo asked resign although initial speculation company quickly sold largest competitor later reports indicated change signaled long-term move february 2014 company hired joe davis new ceo may 2014 company moved headquarters pacific first center u.s. bancorp tower downtown portland 2009 webtrends launched transit ad campaign revolving around whether cyclists pay road tax ad asked cyclists pay road tax drivers cycling community reacted strongly ad strident opinion sides debate aim campaign demonstrate ability company web analytics track resulting online commentary around issue webtrends acquired clickshift automated optimization product online advertising december 2006 webtrends acquired seattle based widemile provider multivariate testing targeting july 30 2009 product rebranded relaunched webtrends optimize day acquisition made public webtrends acquired san francisco based transpond maker social microsites applications distributed web facebook august 10 2010 product rebranded webtrends apps time announcement later rebranded webtrends social webtrends acquired reinvigorate culver city ca based media temple ventures reinvigorate developed real time analytics web product visit heat mapping technologies product rebranded webtrends reinvigorate later discontinued webtrends offers variety web analytics products services focus collection presentation user behavior data websites mobile device applications new york times described company offerings products analyze spending web site visitors core product webtrends analytics available software software service saas models years webtrends released number saas products including webtrends segments webtrends optimize action center webtrends streams webtrends ads 2012 integration deal linked webtrends hootsuite 2013-released email remarketing tool helps online marketers deal in-the-moment data abandonment virtual shopping carts potential customers february 2015 webtrends completed worldwide rollout webtrends explore ad-hoc analytics application 2016 webtrends announced would release new analytics product webtrends infinity analytics year later sold oracle software utilizes log file analysis page tagging log analysis reads files web server records transactions via page tagging parameter name-value pairs appended either automatically javascript tag manual hand-coding query string gif image resides data collection server visitor loads page browser browser sends request data collection server may load gif image data collection server receives request logs parameters included query string gif image software analyzes organizes captured data reports configured 'profile reports viewable various means commonly web-based graphic user interface scheduled emailed export report pdf csv format collected data also viewed via raw log file delivery rest odbc queries products utilize webtrends data extraction api web-based report presentation interface highly configurable allowing webtrends administrator specify information analyzed presented available viewing 2008 new york times already owned international herald tribune used webtrends analyze visitors iht site arrived data collection process facilitated finding importance search engines | [
6576,
467,
10804,
8627,
1943
] | None |
9,709 | 2 | Recovery_Console:recovery console recovery console feature windows 2000 windows xp windows server 2003 operating systems provides means administrators perform limited range tasks using command line interface primary function enable administrators recover situations windows boot far presenting graphical user interface recovery console used provide way access hard drive emergency command prompt recovery console accessed either original installation media used install windows also installed hard drive added ntldr menu however relying latter risky requires computer boot point ntldr loads recovery console simple command-line interpreter cli many available commands closely resemble commands normally available codice_1 namely codice_2 codice_3 codice_4 forth recovery console administrator filesystem access recovery console default severely limited administrator using recovery console read-only access volumes except boot volume even boot volume access root directory windows system directory e.g \winnt changed changing security policies enable read/write access complete file system including copying files removable media i.e floppy drives although appears list commands available using codice_9 command many articles recovery console including authored microsoft codice_10 command available protocol stacks loaded way connect shared folder remote computer implied | [
11270,
2568,
5643,
4624,
6674,
537,
8729,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
9791,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
1647,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10... | Test |
9,710 | 0 | Requirements_Modeling_Framework:requirements modeling framework requirements modeling framework rmf open-source software framework working requirements based reqif standard rmf consists core allowing reading writing manipulating reqif data user interface allowing inspect edit request data rmf first currently open-source reference implementation reqif standards noteworthy fact rmf already deployed prostep reqif implementor forum order ensure interoperability commercial implementation since 2011 reports german international press rmf rmf development name pror since 2009 scope deploy research project collaborative efforts quickly developed research project verde resulting significant acceleration development point data model based rif predecessor reqif june 2011 proposal created transform code eclipse foundation project proposal adopted november 2011 part migration eclipse foundation conversion rif current version reqif 1.0.1 spring 2012 deploy verde opted research projects nevertheless rmf keeps evolving within framework research project advance formal mind free extensions pror name pror essentials developed currently neither version 0.14 0.13 integrated latest version eclipse neither pror rmf version 0.10.0 remains reasons unknown version 0.13 release folder version 0.14 latest folder integrated eclipse version mars.2 release 4.5.2 rmf core allows storing writing validating manipulating reqif files manipulation data implemented programmatically using emf pror additionally enables interactive creation inspecting editing reqif models requirements presented configurable tables links requirements created via drag drop context menus pror designed integration eclipse-based tools extension point available makes possible integrate available renderers editors react drag drop events outside part deploy advance integration event-b models developed topcased -project suggested integrated rmf integrations proposed implemented prototype | [
9345,
4483,
8581,
9224,
1801,
4107,
5774,
5245,
5404,
10909,
10658,
939,
7983,
8122,
11457,
8262,
9926,
3529,
9932,
10061,
5585,
11474,
2901,
9688,
731,
7775,
11487,
7780,
2283,
5612,
9714,
2804,
2294,
119,
10617,
5373,
2558,
511
] | Test |
9,711 | 5 | Network-based_Call_Signaling:network-based call signaling network-based call signaling ncs profile media gateway control protocol mgcp use packetcable applications voice-over-ip network implementing ncs designed according media gateway control protocol architecture interconnecting packet network traditional public switched telephone network pstn architecture physically decomposes functionality providing complete end-to-end multimedia telecommunication sessions several discrete components notably media gateway mg located customer premises performs physical translation analog voice video streams packetized digital data media gateway controller mgc centralized server controls typically many media gateways manages complexity call setup resource negotiation call routing tear-down addition architecture also uses signaling gateways traditional telecommunication channels ss7-based networks like mgcp ncp device control protocol defining interaction mgc also called call agent media gateways one layer packetcable suite specifications relies upon companion protocol specifications provide complete end-to-end telecommunication functionality network-based call signaling modification media gateway control protocol mgcp ncs provides packetcable profile application programming interface mgci corresponding protocol mgcp controlling voice-over-ip voip embedded clients external call control elements embedded client network element provides mgci functions provide connection control endpoint control auditing status reporting use system model naming conventions modification mgcp ncs profile include following ncs aims supporting packetcable-embedded clients functionality present mgcp 1.0 protocol superfluous ncs removed contains extensions modifications mgcp however mgcp architecture mgcp constructs relevant embedded clients preserved ncs ncs protocol contains minor simplifications mgcp 1.0 | [
7681,
5843
] | Test |
9,712 | 4 | Google_Safe_Browsing:google safe browsing google safe browsing blacklist service provided google provides lists urls web resources contain malware phishing content google chrome safari firefox vivaldi gnome web browsers use lists google safe browsing service checking pages potential threats google also provides public api service google also provides information internet service providers sending e-mail alerts autonomous system operators regarding threats hosted networks according google september 2017 3 billion internet devices protected service google maintains safe browsing lookup api privacy drawback urls looked hashed server knows urls api users looked safe browsing update api hand compares 32-bit hash prefixes url preserve privacy chrome firefox safari browsers use latter safe browsing also stores mandatory preferences cookie computer google safe browsing conducts client-side checks website looks suspicious sends subset likely phishing social engineering terms found page google obtain additional information available google servers whether website considered malicious logs including ip address one cookies kept two weeks tied safe browsing requests made device websites carrying ads infected might blacklisted google safe browsing even website malware request removal blacklist requires webmaster create google webmaster tool account take several days removed | [
4096,
8719,
3600,
7700,
9244,
10284,
3633,
4683,
11343,
3664,
8285,
2658,
4722,
115,
8821,
7816,
5262,
6800,
11408,
10393,
8858,
7841,
1203,
9908,
7359,
196,
3269,
3782,
7370,
10445,
3795,
1240,
8413,
9949,
6367,
236,
9970,
7926,
3836,
58... | Test |
9,713 | 4 | Webroot:webroot webroot inc. private american company provides internet security consumers businesses company founded boulder colorado us headquartered broomfield colorado us operations san mateo san diego globally australia austria ireland japan united kingdom international headquarter located dublin ireland webroot founded 1997 steven thomas launched webroot first commercial product trace removal agent called webroot window washer investors include venture capital firms technology crossover ventures accel partners mayfield 2002 webroot launched spyware blocking removal product called webroot spy sweeper company introduced antivirus protection launch spy sweeper antivirus 2006 october 2007 webroot antivirus antispyware desktop firewall released added firewall protection feature webroot entered enterprise market 2004 launch webroot spy sweeper enterprise combined spy sweeper technology enables administrators deploy antispyware protection across entire network october 2008 webroot launched first consumer security suite webroot internet security essentials united states international release security suite followed early 2009 august 2009 webroot appointed new president ceo former ceo wily technology may 2010 webroot announced plans open international headquarters dublin ireland july 2010 webroot internet security complete 2011 released including antivirus antispyware protection firewall capabilities online back-up password management licensed lastpass protection identity theft credit card monitoring us customers september 2010 webroot opened regional office leidschendam netherlands primarily aimed distributing webroot enterprise security-as-a-service saas products businesses webroot mobile security android launched april 5 2011 smartphones tablets free basic version paid premium version app designed protect viruses apps threats delivered via web browsing threats created mobile devices lost secureanywhere products launched october 4 2011 mobile security offerings expanded include ios mobile operating system october 2011 webroot launched new generation products using prevx cloud technology included three basic products windows secureanywhere antivirus essentials complete 2012 security android ios mobile devices february 2012 products businesses added july 2014 webroot announced brightcloud security services new portfolio services enterprise-class businesses including integration next-generation firewalls siems september 2017 webroot appointed new president ceo former ceo lancope mike potts february 7 2019 carbonite inc. announced entered definitive agreement acquire webroot march 26 2019 carbonite closed acquisition webroot purchase price 618.5 million cash november 2007 webroot acquired uk-based email systems ems announced provider security software-as-a-service saas market december 2009 webroot announced partnership virtual private network software provider anchorfree version without advertisements anchorfree vpn software protection via webroot antivirus antispyware software produced march 2010 webroot announced acquisition swedish corporate internet security company email systems scandinavia ess july 2010 webroot acquired san diego california-based web content classification security services provider brightcloud adding web reputation content classification technology existing products november 2010 webroot acquired uk cloud-based anti-malware company prevx july 2011 partnership struck global distribution firm tech data making webroot products available tech data network 125,000 channel partners 100 countries around world july 2013 webroot rsa security formed partnership enhance firms real-time phishing detection september 2016 webroot acquired assets cyberflow analytics company applying data science network anomaly detection february 2019 webroot announced acquired carbonite march 2019 carbonite confirmed purchase av-comparatives gave nine vendors including webroot highest award july 2012 anti-phishing test webroot took 9th place among 18 products tested efficacy blocking phishing websites av-comparatives performance test october 2012 webroot best pcmark score lightest impact 20 products tested windows 7 64-bit machine webroot worst results 20 products tested av-comparatives september 2012 file detection test malicious software terms malware detection rates false alarms webroot detected less 80 percent viral samples much worse 94.4 percent rate second-lowest detecting product webroot inappropriately flagged 210 clean files raising many false positives 19 products tested combined according av-comparatives results misses confirmed several tests also vendor pc magazine awarded webroot secureanywhere 19 times editor choice security product year highest award given security software programs pc magazine test 2013 webroot found pc magazine staff best score malware blocking tests malware removal tests speed scans installation speed 2014 test pcmag found webroot detection rate 89 percent overall malware cleanup score 6.6 points tops among products tested using malware collection gartner listed webroot visionary quadrant 2014 assessment endpoint protection platforms 2014 passmark software software hardware performance benchmarking company benchmarked webroot secureanywhere business endpoint protection webroot secureanywhere antivirus using 13 performance metrics tests webroot products found outperform competitors variety metrics including scan times cpu usage others earning highest overall score tests november 2016 evaluation mobile security products android av-test given webroot secureanywhere mobile product protection score 3.5 6 placing near bottom 26 products evaluated test terms protection malware detection latest android malware real-time detection latest android malware discovered last 4 weeks scores industry average score october 2017 av-comparatives performed head-to-head comparison products vipre webroot webroot secureanywhere product able achieve 86.4 protection rate compared vipre cloud 100 rate test performed using test set 316 live malicious urls found field january 2018 test 84 various android antimalware apps av-comparatives webroot security premier detected 99.7 antimalware samples placing 30 tested apps showed better detection rates | [
10496,
2049,
4994,
131,
5891,
7809,
1417,
8703,
3981,
10637,
3732,
8724,
4374,
4247,
1052,
156,
6431,
5536,
2721,
5924,
2213,
550,
423,
1318,
2601,
6823,
2859,
3243,
6699,
8493,
8614,
8615,
6834,
4403,
9523,
10166,
7103,
704,
9537,
7362,
... | Test |
9,714 | 9 | Interpreter_(computing):interpreter computing computer science interpreter computer program directly executes instructions written programming scripting language without requiring previously compiled machine language program interpreter generally uses one following strategies program execution early versions lisp programming language dartmouth basic would examples first type perl python matlab ruby examples second ucsd pascal example third type source programs compiled ahead time stored machine independent code linked run-time executed interpreter and/or compiler jit systems systems smalltalk contemporary versions basic java may also combine two three interpreters various types also constructed many languages traditionally associated compilation algol fortran cobol c/c++ interpretation compilation two main means programming languages implemented mutually exclusive interpreting systems also perform translation work like compilers terms interpreted language compiled language signify canonical implementation language interpreter compiler respectively high level language ideally abstraction independent particular implementations interpreters used early 1952 ease programming within limitations computers time e.g shortage program storage space native support floating point numbers interpreters also used translate low-level machine languages allowing code written machines still construction tested computers already existed first interpreted high-level language lisp lisp first implemented 1958 steve russell ibm 704 computer russell read john mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions programs written high level language either directly executed kind interpreter converted machine code compiler assembler linker cpu execute compilers assemblers generally produce machine code directly executable computer hardware often optionally produce intermediate form called object code basically machine specific code augmented symbol table names tags make executable blocks modules identifiable relocatable compiled programs typically use building blocks functions kept library object code modules linker used combine pre-made library files object file application form single executable file object files used generate executable file thus often produced different times sometimes even different languages capable generating object format simple interpreter written low level language e.g assembly may similar machine code blocks implementing functions high level language stored executed function entry look table points code however interpreter written high level language typically uses another approach generating walking parse tree generating executing intermediate software-defined instructions thus compilers interpreters generally turn source code text files tokens may may generate parse tree may generate immediate instructions stack machine quadruple code means basic difference compiler system including built separate linker generates stand-alone machine code program interpreter system instead performs actions described high level program compiler thus make almost conversions source code semantics machine level i.e program changed interpreter conversion work every time statement function executed however efficient interpreter much translation work including analysis types similar factored done first time program module function even statement run thus quite akin compiler works however compiled program still runs much faster circumstances part compilers designed optimize code may given ample time especially true simpler high level languages without many dynamic data structures checks type-checks traditional compilation executable output linkers .exe files .dll files library see picture typically relocatable run general operating system much like object code modules difference relocation done dynamically run time i.e program loaded execution hand compiled linked programs small embedded systems typically statically allocated often hard coded flash memory often secondary storage operating system sense historically interpreter-systems self-contained editor built becoming common also compilers often called ide although programmers prefer use editor choice run compiler linker tools manually historically compilers predate interpreters hardware time could support interpreter interpreted code typical batch environment time limited advantages interpretation software development cycle programmers make frequent changes source code using compiler time change made source code must wait compiler translate altered source files link binary code files together program executed larger program longer wait contrast programmer using interpreter lot less waiting interpreter usually needs translate code worked intermediate representation translate thus requiring much less time changes tested effects evident upon saving source code reloading program compiled code generally less readily debugged editing compiling linking sequential processes conducted proper sequence proper set commands reason many compilers also executive aid known make file program make file lists compiler linker command lines program source code files might take simple command line menu input e.g make 3 selects third group set instructions issues commands compiler linker feeding specified source code files compiler converts source code binary instruction specific processor architecture thus making less portable conversion made developer environment binary distributed user machines executed without translation cross compiler generate binary code user machine even different processor machine code compiled interpreted program distributed source code needs translated final machine takes time makes program distribution independent machine architecture however portability interpreted source code dependent target machine actually suitable interpreter interpreter needs supplied along source overall installation process complex delivery monolithic executable since interpreter part need installed fact interpreted code easily read copied humans concern point view copyright however various systems encryption obfuscation exist delivery intermediate code bytecode similar effect obfuscation bytecode could decoded decompiler disassembler main disadvantage interpreters interpreted program typically runs slower compiled difference speeds could tiny great often order magnitude sometimes generally takes longer run program interpreter run compiled code take less time interpret total time required compile run especially important prototyping testing code edit-interpret-debug cycle often much shorter edit-compile-run-debug cycle interpreting code slower running compiled code interpreter must analyze statement program time executed perform desired action whereas compiled code performs action within fixed context determined compilation run-time analysis known interpretive overhead access variables also slower interpreter mapping identifiers storage locations must done repeatedly run-time rather compile time various compromises development speed using interpreter execution speed using compiler systems lisps allow interpreted compiled code call share variables means routine tested debugged interpreter compiled thus benefit faster execution routines developed many interpreters execute source code stands convert compact internal form many basic interpreters replace keywords single byte tokens used find instruction jump table interpreters pbasic interpreter achieve even higher levels program compaction using bit-oriented rather byte-oriented program memory structure commands tokens occupy perhaps 5 bits nominally 16-bit constants stored variable-length code requiring 3 6 10 18 bits address operands include bit offset many basic interpreters store read back tokenized internal representation interpreter might well use lexical analyzer parser compiler interpret resulting abstract syntax tree example data type definitions latter toy interpreter syntax trees obtained c expressions shown box interpretation used sole method execution even though interpreter interpreted directly executed program needed somewhere bottom stack code interpreted definition machine code cpu execute spectrum possibilities interpreting compiling depending amount analysis performed program executed example emacs lisp compiled bytecode highly compressed optimized representation lisp source machine code therefore tied particular hardware compiled code interpreted bytecode interpreter written c compiled code case machine code virtual machine implemented hardware bytecode interpreter compiling interpreters sometimes also called compreters bytecode interpreter instruction starts byte therefore bytecode interpreters 256 instructions although may used bytecodes may take multiple bytes may arbitrarily complicated control tables necessarily ever need pass compiling phase dictate appropriate algorithmic control flow via customized interpreters similar fashion bytecode interpreters threaded code interpreters similar bytecode interpreters instead bytes use pointers instruction word points function instruction sequence possibly followed parameter threaded code interpreter either loops fetching instructions calling functions point fetches first instruction jumps every instruction sequence ends fetch jump next instruction unlike bytecode effective limit number different instructions available memory address space classic example threaded code forth code used open firmware systems source language compiled f code bytecode interpreted virtual machine spectrum interpreting compiling another approach transform source code optimized abstract syntax tree ast execute program following tree structure use generate native code just-in-time approach sentence needs parsed advantage bytecode ast keeps global program structure relations statements lost bytecode representation compressed provides compact representation thus using ast proposed better intermediate format just-in-time compilers bytecode also allows system perform better analysis runtime however interpreters ast causes overhead bytecode interpreter nodes related syntax performing useful work less sequential representation requiring traversal pointers overhead visiting tree blurring distinction interpreters bytecode interpreters compilation just-in-time compilation jit technique intermediate representation compiled native machine code runtime confers efficiency running native code cost startup time increased memory use bytecode ast first compiled adaptive optimization complementary technique interpreter profiles running program compiles frequently executed parts native code techniques decades old appearing languages smalltalk 1980s just-in-time compilation gained mainstream attention amongst language implementers recent years java .net framework modern javascript implementations matlab including jits self-interpreter programming language interpreter written programming language interpret example basic interpreter written basic self-interpreters related self-hosting compilers compiler exists language interpreted creating self-interpreter requires implementation language host language may another programming language assembler first interpreter system bootstrapped new versions interpreter developed language way donald knuth developed tangle interpreter language web industrial standard tex typesetting system defining computer language usually done relation abstract machine so-called operational semantics mathematical function denotational semantics language may also defined interpreter semantics host language given definition language self-interpreter well-founded define language self-interpreter tells reader expressiveness elegance language also enables interpreter interpret source code first step towards reflective interpreting important design dimension implementation self-interpreter whether feature interpreted language implemented feature interpreter host language example whether closure lisp-like language implemented using closures interpreter language implemented manually data structure explicitly storing environment features implemented feature host language less control programmer interpreter different behavior dealing number overflows realized arithmetic operations delegated corresponding operations host language languages elegant self-interpreter lisp prolog much research self-interpreters particularly reflective interpreters conducted scheme programming language dialect lisp general however turing-complete language allows writing interpreter lisp language lisp programs lists symbols lists xslt language xslt programs written xml sub-domain meta-programming writing domain-specific languages dsls clive gifford introduced measure quality self-interpreter eigenratio limit ratio computer time spent running stack n self-interpreters time spent run stack self-interpreters n goes infinity value depend program run book structure interpretation computer programs presents examples meta-circular interpretation scheme dialects examples languages self-interpreter forth pascal microcode commonly used technique imposes interpreter hardware architectural level computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units well specialized processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers network processors graphics processing units hardware microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family | [
10752,
5634,
5635,
7173,
9733,
6664,
9224,
7691,
9739,
9231,
1552,
4112,
11287,
3613,
9245,
5154,
5160,
3629,
5677,
3120,
9780,
2105,
2620,
6717,
11326,
4160,
2626,
8258,
8262,
5703,
6228,
8280,
3675,
7780,
5733,
4201,
8301,
3182,
10352,
... | Validation |
9,715 | 4 | Messaging_security:messaging security messaging security program provides protection companies messaging infrastructure programs includes ip reputation-based anti-spam pattern-based anti-spam administrator defined block/allow lists mail antivirus zero-hour malware detection email intrusion prevention | [
9345,
8998,
4972,
6262,
8343,
7515,
4287
] | Test |
9,716 | 3 | H.E.R.O.:h.e.r.o h.e.r.o standing helicopter emergency rescue operation video game written john van ryzin published activision atari 2600 march 1984 ported apple ii atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum sega released version game sg-1000 console japan 1985 gameplay identical sega changed backpack helicopter jetpack player uses helicopter backpack tools rescue victims trapped deep mine mine made multiple screens using flip screen style player assumes control roderick hero sometimes styled r. hero one-man rescue team miners working mount leone trapped roderick reach player equipped backpack-mounted helicopter unit allows hover fly along helmet-mounted laser limited supply dynamite level consists maze mine shafts roderick must safely navigate order reach miner trapped bottom backpack limited amount power player must reach miner power supply exhausted mine shafts may blocked cave-ins magma require dynamite clear helmet laser also destroy cave-ins slowly dynamite unlike cave-in magma lethal touched later levels include walls magma openings alternate open closed requiring skillful navigation mine shafts populated spiders bats unknown creatures deadly touch creatures destroyed using laser dynamite deep mines flooded forcing players hover safely water later levels monsters strike water mine sections illuminated lanterns lantern somehow destroyed layout section becomes invisible exploding dynamite lights mine brief time points scored cave-in cleared creature destroyed player reaches miner points awarded rescue along amount power remaining backpack remaining stick dynamite extra lives awarded every 20,000 points scored review colecovision port electronic games wrote activision wisely used superior graphics cv units provide breathtaking underground panorama concluded congrats activision h.e.r.o real champion june 1987 issue zzap 64 julian rignall wrote—of c64 version— hero looks awful sounds terrible plays absolutely beautifully h.e.r.o included retrogaming compilation activision anthology 1985 analog computing published clone called r.o.t.o atari 8-bit family | [
10931,
9006,
11311
] | Train |
9,717 | 5 | X.21:x.21 x.21 sometimes referred x21 interface specification differential communications introduced mid-1970s itu-t. x.21 first introduced means provide digital signaling interface telecommunications carriers customers equipment includes specifications dte/dce physical interface elements alignment call control characters error checking elements call control phase circuit switching services test loops x.21 used v.11 provides synchronous data transmission rates 600 bit/s 10 mbit/s also variant x.21 used select legacy applications “ circuit switched x.21 ” x.21 normally found 15-pin d-sub connector capable running full-duplex data transmissions signal element timing clock provided carrier telephone company responsible correct clocking data x.21 primarily used europe japan example scandinavian datex german datex-l circuit switched networks 1980s article based x.21 foldoc x.21 pinouts used | [
2802
] | Test |
9,718 | 0 | Dan_Roth:dan roth dan roth eduardo d. glandt distinguished professor computer information science university pennsylvania roth got b.a summa cum laude mathematics technion israel ph.d computer science harvard university 1995 taught university illinois urbana-champaign 1998 2017 moving university pennsylvania roth fellow american association advancement science aaas association computing machinery acm association advancement artificial intelligence aaai association computational linguistics acl roth ’ research focuses computational foundations intelligent behavior develops theories systems pertaining intelligent behavior using unified methodology heart idea learning central role intelligence work centers around study machine learning inference methods facilitate natural language understanding pursued several interrelated lines work span multiple aspects problem fundamental questions learning inference interact study range natural language processing nlp problems developing advanced machine learning based tools natural language applications roth made seminal contribution fusion learning reasoning machine learning weak incidental supervision machine learning inference approaches natural language understanding roth worked probabilistic reasoning including complexity probabilistic lifted inference constrained conditional models ilp formulations nlp problems constraints-driven learning part-based constellation methods object recognition response based learning developed nlp information extraction tools used broadly researchers commercially including ner coreference resolution wikification srl esl text correction roth editor-in-chief journal artificial intelligence research jair | [
1783,
679
] | Validation |
9,719 | 7 | The_Business_Cloud:business cloud business cloud api enabled self-service platform developed domo provides array services like data connection data visualization domo inc. founded 2010 josh james also co-founded web analytics software company omniture 1996 took public 2006 domo launched domo appstore 1000 apps social mobile capabilities 2016 appstore creates network business apps ecosystem companies single integrated business cloud decision came domo announced 131 million round funding blackrock according company concept behind business cloud connect smaller clouds relating apps functional areas business single business cloud allows self-service social features customers business cloud offered free service claimed world first business cloud domo appstore one core services free package includes domo features functionality including domo platform domo apps visualizations alerts company directories org charts profiles tasks domo mobile business cloud allows customers leverage preferred cloud well on-premises software monitor aspects business routine company supported 500 million fund investors world | [] | None |
9,720 | 5 | TCPware:tcpware tcpware third party layered product published process software llc add tcp/ip capabilities openvms need product may seem obvious today back early 1990s digital equipment corporation published vms known time internal policy favoring product called decnet meanwhile many vms users governments large corporations universities discovering tcp/ip based internet required third party software enable connectivity today hp tcpip services openvms putting pressure products like tcpware one reason tcpware faded use two tcpware apis called telnet library ftp library modules allow relatively inexperienced programmer use high level language write software connect across internet useful work also quite bit legacy software relies modules good reason rewite lower packet library level | [
5384,
9909
] | Test |
9,721 | 4 | EMCO_Software:emco software emco software development company founded 2001 headquartered reykjavik iceland develops network management software used automation remote administration network audit remote software deployment network monitoring permissions audit power management tasks corporate networks addition commercial products company also offers set freeware utilities system management network administration emco provides commercial solutions freeware tools automation network administration tasks remote management windows computers company products implemented windows desktop applications graphical user interface designed installed servers administrator desktops used centralized network management staff working applications must administrative access network computers order manage remotely emco products rely microsoft network infrastructure perform remote management operations thus allowing management computers within local network remote management access computers via internet provided company offers multiple freeware tools utilities used automation several typical network management tasks system problems troubleshooting free network applications designed network administrators need collect information perform certain operations remote computers free system utilities used administration staff individual users resolve number problems personal computers company offers freeware commercial tools used monitor state network hosts devices company offers two types remote deployment solutions types allow installing uninstalling applications windows computers across local network use different deployment approaches functional differences | [
7411,
8692,
4174
] | None |
9,722 | 4 | Cisco_Systems_VPN_Client:cisco systems vpn client cisco systems vpn client software application connecting virtual private networks based internet key exchange version 1 july 29 2011 cisco announced end life product product updates released july 30 2012 support ceased july 29 2014 support page documentation links taken july 30 2016 replaced obsolete status notification software free often installed university business computers accordance site-license corporate licenses administrators allowed freely distribute software users within network open-source vpnc client connect vpns supported official client vpn client 4.9.01.0230 beta added support mac os x 10.6 stable version 4.9.01.0180 appears lack support 4.9.00.0050 explicitly support versions mac os x later 10.5 vpn client 5.0.07.0290 added support 64-bit versions windows vista windows 7 client uses profile configuration files .pcf store vpn passwords either hashed type 7 stored plaintext vulnerability identified passwords easily decoded using software online services work around issues network administrators advised use mutual group authentication feature use unique passwords n't related important network passwords | [
10889,
8211,
11162,
10908,
3742,
9764,
4268,
7983,
10417,
6834,
7859,
2228,
823,
3777,
2884,
5959,
8265,
11468,
7376,
11606,
2136,
9048,
6490,
6364,
5084,
10210,
9318,
8039,
11248,
5749,
3322
] | None |
9,723 | 3 | AlphaStation:alphastation alphastation name given series computer workstations produced 1994 onwards digital equipment corporation later compaq hp name suggests alphastations based dec alpha 64-bit microprocessor supported operating systems alphastations comprise tru64 unix formerly digital unix openvms windows nt alphabios arc firmware workstations also run various versions linux bsd operating systems alpha workstations produced dec include dec 2000 axp decpc axp 150 dec 3000 axp digital personal workstation -series au -series codename miata multia vx40/41/42 alpha xl/alpha xlt line member alcor family swappable daughterboard pentium processor transform dec celebris xl line xp900 onwards alphastation models simply workstation configurations corresponding alphaserver model | [
5384,
9742,
8976,
2452,
10104,
408,
8474,
8732,
6942,
799,
7983,
823,
7234,
3142,
8390,
6352,
11604,
3945,
10220,
5873,
499,
3445,
5368
] | Test |
9,724 | 2 | IBM_Software_Configuration_and_Library_Manager:ibm software configuration library manager ibm software configuration library manager sclm ibm software product component ispf first introduced version 3 ispf upgrade previous component called lmf library management facility introduced version 2 ispf component mvs os/390 z/os operating systems/platforms sclm consists two products library manager configuration manager provides following functions | [
1668,
909,
7053,
7983,
7666,
4919,
2168,
3323,
2172
] | Test |
9,725 | 5 | SIMPLE_(military_communications_protocol):simple military communications protocol standard interface multiple platform link evaluation simple military communications protocol defined nato standardization agreement stanag 5602 simple defines communications protocol provide means geographically national international separated tactical data link tdl equipment c4isr c2 non-c2 test facilities exchange environment data tdl messages order conduct detailed tdl interoperability io testing intended provide specifications common standard interconnect ground rigs types simulation integration facilities simple allows transmission m-series j-series messages ip-based protocols previously j-series messages could sent using link 16 protocol however link 16 radio protocol frequency range limits exchange information within line-of-sight use flexible bearer protocols ip makes easier exchange j-series data particularly simulations integration however simple limited use simulation integration finding applications beyond original purpose wherever transmission j-series data amenable radio protocols link 16 simple standard specifies distributed transfer simulated scenario/synthetic environment using ieee distributed interactive simulation dis protocols dis government/industry initiative define infrastructure linking simulations various types multiple locations create realistic complex virtual worlds simulation highly interactive activities new protocol data unit pdu definition dis pdu added baseline protocol support exchange dis pdus simulated entities content simple dis pdu packet related dis pdus defined ieee 1278.1 standard transmitter signal pdu fields require translation simple standard consists several elements simple application layer protocol designed independent transport layer run using following transport layer protocols simple method exchanging tdl messages take host generated message traffic mids/jtids terminal interface repackage transmission across simple network receiving simple node extracts tdl message traffic received packet presents host interface received mids/jtids terminal development simple resulted requirement february 1996 ad hoc working group ahwg nato common interoperability standards ncis testing single interface standard support interconnection nato resources | [
2948,
10924,
6861,
3629,
10833,
11413,
10748,
7388
] | Validation |
9,726 | 2 | XAML_Browser_Applications:xaml browser applications xaml browser applications xbap pronounced ex-bap windows presentation foundation .xbap applications hosted run inside web browser firefox internet explorer hosted applications run partial trust sandbox environment given full access computer resources like opening new network connection saving file computer disk wpf functionality available hosted environment intended protect computer malicious applications however also run full trust mode client changing permission starting xbap html page seamless security installation prompt although one perceives application running browser actually runs out-of-process executable presentationhost.exe managed virtual machine initial release .net framework 3.0 xbaps ran internet explorer release .net framework 3.5 sp1 includes xbap extension also run mozilla firefox xbap applications certain restrictions .net features use since run partial trust restricted set permission granted internetzone application nearly standard wpf functionality however around 99 available xbap application therefore wpf ui features available starting february 2009 xbap applications longer function run internet attempting run xbap cause browser present generic error message option exists internet explorer 9 used allow applications run must done care increases potential attack surface security vulnerabilities xbap | [
10624,
4231,
1802,
7947,
10506,
9229,
11154,
1556,
3224,
3997,
4384,
10020,
11559,
10026,
2603,
7212,
10284,
9263,
4658,
2485,
1468,
4797,
1347,
1348,
8644,
11466,
5067,
7629,
3920,
3921,
5593,
5849,
7515,
9434,
6366,
865,
2145,
7784,
9834,... | Test |
9,727 | 4 | Low_Orbit_Ion_Cannon:low orbit ion cannon low orbit ion cannon loic open-source network stress testing denial-of-service attack application written c loic initially developed praetox technologies later released public domain hosted several open source platforms loic performs dos attack used multiple individuals ddos attack target site flooding server tcp udp packets intention disrupting service particular host people used loic join voluntary botnets software inspired creation independent javascript version called js loic well loic-derived web version called low orbit web cannon enable dos web browser security experts quoted bbc indicated well-written firewall rules filter traffic ddos attacks loic thus preventing attacks fully effective least one instance filtering udp icmp traffic blocked loic attack internet service providers provide less bandwidth customers order provide guaranteed service levels customers firewall rules sort likely effective implemented point upstream application server internet uplink words easy cause isp drop traffic destined customer sending greater amount traffic allowed customer link filtration occurs customer side traffic traverses link stop service provider dropping excess traffic destined customer loic attacks easily identified system logs attack tracked ip addresses used loic used anonymous group spawned /b/ board 4chan project chanology attack websites church scientology successfully attack recording industry association america website october 2010 used anonymous operation payback december 2010 attack websites companies organizations opposed wikileaks retaliation shutdown file sharing service megaupload arrest four workers members anonymous launched ddos attack upon websites universal music group company responsible lawsuit megaupload united states department justice united states copyright office federal bureau investigation mpaa warner music group riaa well hadopi afternoon january 19 2012 loic general attack hoped retaliate anonymous members believed harmed digital freedoms loic application named ion cannon fictional weapon many sci-fi works video games particular namesake command conquer series downloading using loic personal servers means stress-testing perfectly legal least united states using program perform ddos attack someone else could considered felony computer fraud abuse act 1986 cfaa charge could land someone 20 years imprisonment fine | [
3462,
2060,
6797,
4883,
11413,
5402,
4133,
8998,
939,
10924,
1965,
7983,
823,
953,
4027,
7102,
1088,
2754,
9282,
6347,
2508,
4558,
6735,
11351,
2018,
10852,
7526,
2409,
3573,
3581,
3711
] | None |
9,728 | 9 | KiXtart:kixtart kixtart closed source free-format scripting language windows described logon script processor enhanced batch scripting language official website name portmanteau kick start kixtart developed ruud van velsen microsoft netherlands provided careware development started 1991 provide login scripting microsoft lan manager environment rich built-in functionality easy scripting provides access adsi ado wmi etc language used display information set environment variables start programs connect network drives read edit registry change current drive directory much kixforms user create gui kixtart read windows product id development kixtart logon scripting language started 1991 later versions released dates kixtart 2001 kixtart 2010 | [
4771,
5287,
2183,
8588,
6797,
7343,
5968,
7983,
9780,
5622,
9276
] | None |
9,729 | 1 | SQLObject:sqlobject sqlobject python object-relational mapper sql database python objects experiencing community popularity forms part many applications e.g. turbogears similar ruby rails activerecord operation uses class definitions form table schemas utilizes language reflection dynamism useful sqlobject supports number common database backends included distribution mysql postgresql sqlite sybase sql server maxdb microsoft sql server firebird first version sqlobject publicly released october 2002 | [
3080,
5546,
8554,
5612,
9389,
5806,
7022,
7983,
9467,
10250,
3763,
10413,
2901,
11030,
11338,
8539
] | None |
9,730 | 9 | SISC:sisc sisc r5rs scheme implementation includes full number tower hygienic macros proper tail recursion first class continuations sisc short second interpreter scheme code reference predecessor lisc lightweight interpreter scheme code sisc free software dual-licensed mozilla public license gnu general public license version 2 developed scott g. miller matthias radestock sisc depends sun microsystems java programming language platform runtime environment allows sisc provide many extensions libraries networking exception handling module system java foreign function interface sisc website claims performs faster scheme interpreter based java virtual machine jvm like gnu guile scheme suitable embedding larger programs guile designed inclusion c programs sisc designed jvm | [
9665,
10083,
8262,
5612,
5677,
7983,
2804,
2585,
10012,
2045
] | None |
9,731 | 3 | Sun_Ultra_series:sun ultra series sun ultra series discontinued line workstation server computers developed sold sun microsystems comprising two distinct generations original line introduced 1995 discontinued 2001 generation partially replaced sun blade 2000 line replaced sun java workstation—an amd opteron system—in 2004 sync transition x86-64-architecture processors 2005 ultra brand later revived launch ultra 20 ultra 40 albeit confusion since longer based ultrasparc processors original ultra workstations ultra enterprise later sun enterprise servers ultrasparc-based systems produced 1995 2001 replacing earlier sparcstation sparccenter/sparcserver series respectively introduced 64-bit ultrasparc processor later versions lower-cost pc-derived technology pci ata buses initial ultra 1 2 models retained sbus predecessors original ultra range sold dot com boom became one biggest selling series computers ever developed sun microsystems many companies organisations—including sun itself—relying sun ultra products years successor products released ultra brand revived 2005 launch ultra 20 ultra 40 x86-64-architecture x64-based ultra systems remained sun portfolio five years last one intel xeon-based ultra 27 retired june 2010 thereby concluding history sun workstation vendor sparc-based ultra 3 mobile workstation laptop released 2005 well would prove short-lived design retired next year release coincide rest line brand already moved x86 additionally new ultra 25 ultra 45 desktop ultrasparc iiii-based systems introduced 2006 october 2008 sun discontinued effectively ending production sparc architecture workstations original ultra/enterprise series later replaced sun blade workstation sun fire server ranges note enterprise 220r ultra 60 motherboard rack-mountable server chassis hot-swappable power supplies similarly enterprise 420r ultra 80 motherboard server chassis intervening time gap sun workstations named sun blade sun java workstation a60 ultra-3 rebadged tadpole sparcle 550 650 mhz viper 1.2 ghz laptops a61 ultra-3 physically different based naturetech 888p 550/650 mhz mesostation 999 1.28 ghz two lines unrelated systems otherwise | [
3328,
9090,
1801,
4235,
1809,
4241,
2710,
26,
1818,
8863,
7072,
9343,
8994,
1316,
10789,
1707,
2731,
5677,
3247,
6322,
2995,
2871,
4664,
4285,
6464,
7104,
6338,
9665,
10436,
3911,
1480,
8007,
2895,
3919,
597,
3285,
10327,
10200,
2269,
547... | None |
9,732 | 2 | IPhone:iphone iphone line smartphones designed marketed apple inc. generations iphone use apple ios mobile operating system software first-generation iphone released june 29 2007 multiple new hardware iterations new ios releases released since user interface built around device multi-touch screen including virtual keyboard iphone wi-fi connect cellular networks iphone take photos play music send receive email browse web send receive text messages record notes perform mathematical calculations receive visual voicemail shooting video also became standard feature iphone 3gs functionality video games reference works social networking enabled downloading mobile apps apple app store contained 2.2 million applications available iphone apple released twelve generations iphone models accompanied one twelve major releases ios operating system first-generation iphone gsm phone established design precedents button placement persisted throughout releases screen size maintained next four iterations iphone 3g added 3g network support followed iphone 3gs improved hardware iphone 4 metal chassis higher display resolution front-facing camera iphone 4s improved hardware voice assistant siri iphone 5 featured taller 4-inch display apple newly introduced lightning connector 2013 apple released iphone 5s improved hardware fingerprint reader lower-cost iphone 5c version 5 colored plastic casings instead metal followed larger iphone 6 iphone 6 plus models featuring displays iphone 6s introduced following year featured hardware upgrades support pressure-sensitive touch inputs well iphone se—which featured hardware 6s smaller form factor 5s 2016 apple unveiled iphone 7 iphone 7 plus add water resistance improved system graphics performance new rear dual-camera setup plus model new color options removing 3.5 mm headphone jack found previous models iphone 8 iphone 8 plus released 2017 adding glass back improved screen camera iphone x released alongside iphone 8 iphone 8 plus highlights near bezel-less design improved camera new facial recognition system named face id home button therefore touch id september 2018 apple released 3 new iphones iphone xs upgraded version since discontinued iphone x iphone xs max larger variant series biggest display iphone xr lower end version iphone x first-generation iphone described revolutionary game-changer mobile phone industry subsequent iterations iphone also garnered praise iphone one widely used smartphones world success credited helping apple become one world valuable publicly traded companies november 1 2018 total 2.2 billion iphones sold development become iphone began 2004 apple started gather team 1,000 employees including jonathan ive designer behind imac ipod work highly confidential project purple apple ceo steve jobs steered original focus away tablet apple eventually revisited form ipad towards phone apple created device secretive collaboration cingular wireless became mobility time—at estimated development cost us 150 million thirty months according steve jobs word imac therefore ipod iphone ipad stands internet individual instruct inform inspire apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola among deficiencies rokr e1 firmware limited storage 100 itunes songs avoid competing apple ipod nano cingular gave apple liberty develop iphone hardware software in-house even paid apple fraction monthly service revenue iphone 3g exchange four years exclusive us sales 2011 jobs unveiled iphone public january 9 2007 macworld 2007 convention moscone center san francisco two initial models 4 gb model priced us 499 8 gb model us 599 requiring two-year contract went sale united states june 29 2007 6:00 pm local time hundreds customers lined outside stores nationwide passionate reaction launch iphone resulted sections media dubbing 'jesus phone following successful release us first generation iphone made available uk france germany november 2007 ireland austria spring 2008 july 11 2008 apple released iphone 3g twenty-two countries including original six apple released iphone 3g upwards eighty countries territories apple announced iphone 3gs june 8 2009 along plans release later june july august starting us canada major european countries june 19 many would-be users objected iphone cost 40 users household incomes us 100,000 back original first generation iphone made aluminum black plastic accent iphone 3g 3gs feature full plastic back increase strength gsm signal iphone 3g available 8 gb black model black white option 16 gb model iphone 3gs available colors regardless storage capacity iphone 4 aluminosilicate glass front back stainless steel edge serves antennas first available black white version announced released april 2011 10 months later users iphone 4 reported dropped/disconnected telephone calls holding phones certain way became known antennagate january 11 2011 verizon announced media event reached agreement apple would begin selling cdma iphone 4 verizon said would available pre-order february 3 release set february 10 february 2011 verizon iphone accounted 4.5 iphone ad impressions us millennial media mobile ad network 2007 2011 apple spent 647 million advertising iphone us tuesday september 27 apple sent invitations press event held october 4 2011 10:00 cupertino headquarters announce details next generation iphone turned iphone 4s 1 million 4s models sold first 24 hours release october 2011 due large volumes iphone manufactured high selling price apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia american carrier c spire wireless announced would carrying iphone 4s october 19 2011 january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 production price iphone 4s estimated ihs isuppli october 2011 188 207 245 16 gb 32 gb 64 gb models respectively labor costs estimated 12.50 30 per unit workers iphone assembly line making 1.78 hour february 2012 comscore reported 12.4 us mobile subscribers used iphone approximately 6.4 million iphones active us alone september 12 2012 apple announced iphone 5 4-inch display predecessors 3.5-inch screen device comes 326 pixels per inch found iphone 4 4s iphone 5 soc a6 processor chip 22 smaller iphone 4s a5 twice fast doubling graphics performance predecessor device 18 thinner iphone 4s measuring 20 lighter july 6 2013 reported apple talks korean mobile carrier sk telecom release next generation iphone lte advanced technology july 22 2013 company suppliers said apple testing larger screens iphone ipad apple asked prototype smartphone screens larger four inches also asked screen designs new tablet device measuring slightly less 13 inches diagonally said september 10 2013 apple unveiled two new iphone models highly anticipated press event cupertino iphone 5c mid-range-priced version handset designed increase accessibility due price available five colors green blue yellow pink white made plastic iphone 5s comes three colors black white gold home button replaced fingerprint scanner touch id phones shipped september 20 2013 september 9 2014 apple revealed iphone 6 iphone 6 plus event cupertino devices larger screen predecessor 4.7 5.5 inches respectively 2016 apple unveiled iphone 7 7 plus added water dust resistance improved system graphics performance new dual-camera setup plus model new color options featured removal 3.5 mm headphone jack iphone september 12 2017 apple officially unveiled iphone 8 8 plus features new glass design camera improvements true tone display wireless charging improved system performance also unveiled iphone x features near bezel-less design facial recognition feature dubbed face id facial tracking used animojis oled screen highest pixel density iphone new telephoto lens works better low light conditions improved cameras ar september 12 2018 apple officially unveiled iphone xs xs max xr steve jobs theater apple park xs xs max feature improved super retina display dolby vision hdr10 support xs max featuring larger 6.5 display improved cameras smart hdr a12 bionic chip iphone xs xs max ip68 water liquid dust resistant allow devices submerged 2 meters duration 30 minutes iphone xr retained ip67 certification found first-generation iphone x also features ips lcd display instead oled displays found higher end models iphone xs/xs max ip68 certifications tested using various liquids chlorinated-water salt water tea wine beer juices apple also announced fourth generation apple watch apple watch series 4 apple sold 6.1 million first generation iphone units five quarters sales fourth quarter 2008 temporarily surpassed research motion rim blackberry sales 5.2 million units briefly made apple third largest mobile phone manufacturer revenue nokia samsung however income deferred recorded sales grew steadily thereafter end fiscal year 2010 total 73.5 million iphones sold 2010 iphone market share barely 4 cell phones however apple pulled 50 total profit global cellphone sales generated apple sold 14.1 million iphones third quarter 2010 representing 91 unit growth year-ago quarter well ahead idc latest published estimate 64 growth global smartphone market september quarter apple sales surpassed research motion 12.1 million blackberry units sold recent quarter ended august 2010 united states market alone third quarter 2010 9.1 million android-powered smartphones shipped 43.6 market apple ios number two phone operating system 26.2 5.5 million iphones sold made popular single device march 2 2011 ipad 2 launch event apple announced sold 100 million iphones worldwide result success iphone sales volume high selling price headlined iphone 4s apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia samsung galaxy ii proved popular iphone 4s parts europe iphone 4s dominant united states january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 eight largest phone manufacturers q1 2012 according horace dediu asymco apple samsung combined take 99 industry profits htc took remaining 1 rim lg sony ericsson motorola nokia suffered losses apple earning 73 cents every dollar earned phone makers industry profits grew 5.3 billion first quarter 2010 14.4 billion first quarter 2012 quadruple profits 2007 apple managed increase share profits due increasing carrier subsidies high selling prices iphone negative effect wireless carriers mobility verizon sprint seen ebitda service margins drop sold increasing number iphones quarter ended march 31 2012 apple sales iphone alone 22.7 billion exceeded total microsoft businesses 17.4 billion fourth quarter 2012 iphone 5 iphone 4s best-selling handsets sales 27.4 million 13 smartphones worldwide 17.4 million units respectively samsung galaxy iii third 15.4 million according strategy analytics data impressive performance given iphone portfolio premium pricing adding galaxy iii global popularity appears peaked galaxy iii touted iphone-killer press released samsung led worldwide sales smartphones apple iphone line still managed top samsung smartphone offerings united states 21.4 share 37.8 market respectively ios grew 3.5 37.8 android slid 1.3 fall 52.3 share continued top popularity iphone despite growing android competition also attributed apple able deliver ios updates air android updates frequently impeded carrier testing requirements hardware tailoring forcing consumers purchase new android smartphone get latest version os however 2013 apple market share fallen 13.1 due surging popularity android offerings apple announced september 1 2013 iphone trade-in program would implemented 250 specialty stores us program become available customers must valid contract must purchase new phone rather simply receive credit used later date significant part program goal increase number customers purchase iphones apple stores rather carrier stores september 20 2013 sales date iphone 5s 5c models longest ever queue observed new york city flagship apple store addition prominent queues san francisco us canada however locations throughout world identified anticipation corresponding consumers apple also increased production gold-colored iphone 5s additional one-third due particularly strong demand emerged apple decided introduce gold model finding gold seen popular sign luxury product among chinese customers apple released opening weekend sales results 5c 5s models showing all-time high product sales figures ninemillion handsets sold—the previous record set 2012 fivemillion handsets sold opening weekend 5 model first time apple simultaneously launched two models inclusion china list markets contributed record sales result apple also announced 200 million devices running ios 7 update making fastest software upgrade history apple store located christiana mall newark delaware us claimed highest iphones sales figures november 2013 store high sales results due absence sales tax state delaware finalization deal apple china mobile world largest mobile network announced late december 2013 multi-year agreement provides iphone access 760 million china mobile subscribers first quarter 2014 apple reported sold 51million iphones all-time quarterly record compared 47.8million year-ago quarter iphone upgrade program 24-month program designed consumers able get latest iphone every year without paying whole price up-front program consists low monthly payments consumers gradually pay iphone 24-month period opportunity switch upgrade new iphone 12 months payment passed 12 months passed consumers trade current iphone new one payments transferred old device new device program restarts new 24-month period additional features program include unlocked handsets means consumers free pick network carrier want two-year applecare+ protection includes hardware repairs software support coverage two incidents accidental damage criticism program includes potential endless cycle payments huffington post damon beres writing complete full 24-month payment cycle 're stuck outdated phone upgrade every 12 months 'll never stop owing apple money iphones additionally program limited iphone hardware cell phone service network operator included release iphone handset manufacturers nokia motorola enjoying record sales cell phones based fashion brand rather technological innovation smartphone market dominated time blackberry os windows mobile devices staid corporate-led smartphone paradigm focused enterprise needs phones time designed around carrier business limits conservative regards bandwidth usage battery life phones sold large number models often segmented marketing strategy confusing customers sapping engineering resources example phones marketed business often deliberately stripped cameras ability play music games apple approach deliberately simplify product line offering one model year customers making expensive high-end product apple marketing developing success ipod campaigns allowed phone become mass-market product many buyers launch day market research found unusually technology product iphone users disproportionately female ars technica noted 2012 apple avoided 'patronizing marketing female customers practice used often sell low-quality high-priced products many competitors then-ceo research motion mike lazaridis pried open iphone impression mac stuffed cellphone used much memory processing power smartphones market time capacitive touchscreen consumer-friendly design iphone fundamentally changed mobile industry steve jobs proclaiming 2007 phone communication tool way life dominant mobile operating systems time symbian blackberry os windows mobile designed handle additional tasks beyond communication basic functions operating systems never focused applications developers due infighting among manufacturers well complexity developing low-memory hardware never developed thriving ecosystem like apple app store android google play iphone os renamed ios 2010 designed robust os capabilities multitasking graphics order meet future consumer demands many services provided mobile carriers often extensively customized devices meanwhile apple decision base os os x unexpected benefit allowing os x developers rapidly expand ios development rival manufacturers forced spend software development costs catch iphone iphone success led decline sales high-end fashion phones business-oriented smartphones vertu blackberry well nokia nokia realised limitations operating system symbian attempted develop advanced system maemo without success ultimately agreed technology-sharing deal takeover microsoft prior iphone handsets viewed largely cheap disposable lures massively subsidized snare subscribers lock using carriers proprietary services however according wired apple retained complete control design manufacturing marketing iphone meaning carrier would control software updates extension security patches contrast google allowed carriers oems dictate pace upgrades pre-load phones software top android result many android oems often lag months behind google release next iteration android although nexus pixel devices guaranteed two years operating system updates third addition year security however apple supported older iterations iphones four years december 2017 reports apple using policy slowing speed older iphones issuing operating system upgrades spurred allegations firm using tactic prompt users older iphones buy newer models iphone 4 iphone models well ios devices manufactured exclusively foxconn based taiwan 2011 tim cook became ceo company apple changed outsourcing strategy first time increasing supply partners iphone 4s 2012 first model manufactured simultaneously two stand-alone companies foxconn well pegatron also based taiwan although foxconn still responsible larger share production pegatron orders slowly increased company tasked producing part iphone 5c line 2013 30 iphone 6 devices 2014 6 plus model produced solely foxconn touchscreen first five generations 9 cm 3.5 liquid crystal display scratch-resistant glass one iphone 5 four inches capacitive touchscreen designed bare finger multiple fingers multi-touch sensing screens first three generations resolution 320×480 hvga 163 ppi iphone 4 iphone 4s resolution 640×960 326 ppi 4-inch models 640×1136 326 ppi 4.7-inch models 750×1334 326 ppi 5.5-inch models 1080×1920 401 ppi 5.8-inch model x 1125×2436 458 ppi initial models using twisted-nematic tn lcds starting iphone 4 technology changed in-plane switching ips lcds iphone 5 model screen results aspect ratio approximately 16:9 iphone x first iphone use oled display near bezel-less screen ≈19.5:9 aspect ratio touch gesture features iphone based technology originally developed fingerworks gloves styli prevent necessary electrical conductivity although capacitive styli used iphone finger-touch screen iphone 3gs later also feature fingerprint-resistant oleophobic coating iphone minimal hardware user interface models featuring five buttons physical menu button situated directly display called home button primary function close active app navigates home screen interface earlier models included rounded square reminiscent shape icons home screen however new models include apple fingerprint recognition feature touch id use home button fingerprint sensor symbol iphone x later n't home button instead face id facial recognition authentication method multi-function sleep/wake button located top device serves unit power button also controls phone calls call received pressing sleep/wake button silences ringtone pressed twice transfers call voicemail situated left spine volume adjustment controls iphone 4 two separate circular buttons increase decrease volume earlier models house two switches single plastic panel known rocker switch could reasonably counted either one two buttons directly volume controls ring/silent switch engaged mutes telephone ringing alert sounds new sent emails text messages push notifications camera shutter sounds voice memo sound effects phone lock/unlock sounds keyboard clicks spoken auto-corrections switch mute alarm sounds clock application countries regions mute camera shutter voice memo sound effects buttons except home made plastic original first generation iphone metal later models touchscreen furnishes remainder user interface software update january 2008 allowed first-generation iphone use cell tower wi-fi network locations trilateration despite lacking gps hardware since iphone 3g generation iphone employs a-gps operated united states since iphone 4s generation device also supports glonass global positioning system operated russia since iphone 8 supports galileo iphone 6s 6s plus introduced 2015 feature 3d touch displays allows screen recognize hard pressed using pressure sensitive multi-touch technology subsequent iphones exception iphone se iphone xr feature example technology used lightly pressing screen preview photograph pressing take iphones feature number sensors used adjust screen based operating conditions enable motion-controlled games location-based services unlock phone authenticate purchases apple pay among many things proximity sensor deactivates display touchscreen device brought near face call done save battery power prevent inadvertent inputs user face ears ambient light sensor adjusts display brightness saves battery power prevents screen bright dark 3-axis accelerometer senses orientation phone changes screen accordingly allowing user easily switch portrait landscape mode photo browsing web browsing music playing support upright left right widescreen orientations unlike ipad iphone rotate screen turned upside-down home button screen unless running program specifically designed 3.0 update added landscape support still applications email introduced shaking unit form input generally undo functionality accelerometer also used control third-party apps notably games also used fitness tracking purposes primarily pedometer starting iphone 5s functionality included m7 motion coprocessor subsequent revisions embedded chip magnetometer built-in since iphone 3gs used measure strength direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure-eight motion since iphone 3gs iphone also features compass app unique time release showing compass points direction magnetic field beginning iphone 4 apple smartphones also include gyroscopic sensor enhancing perception moved previous iphone models contained chip capable receiving radio signals however apple fm radio feature switched antenna connected chip later iterations iphone starting iphone 7 however contain radio chips campaign called free radio phone started encourage cellphone manufacturers apple enable radio phones manufacture reasons cited radio drains less power useful emergency 2016 fort mcmurray wildfire 2017 iphone models starting iphone 5s excluding iphone 5c featured apple fingerprint recognition sensor used unlocking device authenticating apple pay purchases since iphone 6 using touch id located home button touch id replaced face id starting iphone x included iphone 6 later excluding iphone se barometer used determine air pressure elevation device starting iphone x facial recognition sensor named truedepth camera system featured used unlocking device authenticating purchases using face id also used animojis ar bottom iphone speaker left dock connector microphone right additional loudspeaker screen serves earpiece phone calls iphone 4 includes additional microphone top unit noise cancellation switches placement microphone speaker base unit—the speaker right volume controls located left side iphone models slider ipod application 3.5 mm trrs connector headphones located top left corner device first five generations original 4s time moved bottom left corner headphone socket first-generation iphone recessed casing making incompatible headsets without use adapter subsequent generations eliminated problem using flush-mounted headphone socket cars equipped auxiliary jack allow handsfree use iphone driving substitute bluetooth iphone 7 later 3.5 mm headphone jack instead headsets must connect iphone bluetooth use apple lightning port replaced 3.5 mm headphone jack traditional headsets use lightning 3.5 mm headphone jack adapter included iphone 7 iphone x plugs lightning port apple headset multipurpose button near microphone play pause music skip tracks answer end phone calls without touching iphone third-party headsets designed iphone also include microphone control button current headsets also provide volume controls compatible recent models fourth ring audio jack carries extra information built-in bluetooth 2.x+edr supports wireless earpieces headphones requires hsp profile stereo audio added 3.0 update hardware supports a2dp non-sanctioned third-party solutions exist iphone officially support obex file transfer protocol lack profiles prevents iphone users exchanging multimedia files pictures music videos bluetooth-enabled cell phones composite component video 576i stereo audio output dock connector using adapter sold apple iphone 4 also supports 1024×768 vga output without audio hdmi output stereo audio via dock adapters iphone support voice recording 3.0 software update iphone features internal rechargeable lithium-ion battery like ipod unlike mobile phones time launch battery user-replaceable iphone charged connected computer syncing across included usb dock connector cable similar charging ipod alternatively usb ac adapter wall charger also included connected cable charge directly ac outlet models iphone support wireless charging apple runs tests preproduction units determine battery life apple website says battery life designed retain 80 original capacity 400 full charge discharge cycles comparable ipod batteries battery life early models iphone criticized several technology journalists insufficient less apple claims also reflected j. d. power associates customer satisfaction survey gave battery aspects iphone 3g lowest rating two five stars battery malfunctions dies prematurely phone returned apple replaced free still warranty warranty lasts one year purchase extended two years applecare battery replacement service pricing made known buyers day product launched similar apple third parties replace batteries ipods foundation taxpayer consumer rights consumer advocate group sent complaint apple fee consumers pay battery replaced apple reduced price out-of-warranty iphone battery replacement 29 since july 2007 third-party battery replacement kits available much lower price apple battery replacement program kits often include small screwdriver instruction leaflet many newer ipod models battery first generation iphone soldered therefore soldering iron required install new battery iphone 3g uses different battery fitted connector easier replace iphone x features different battery two battery cells adhesive pull tabs adhered sides instead folded top therefore making repairs little difficult patent filed corporation published late july 2013 revealed development new iphone battery system uses location data combination data user habits moderate handsets power settings accordingly apple working towards power management system provide features ability estimate length time user away power source modify energy usage detection function adjusts charging rate best suit type power source used december 28 2017 amidst many complaints older iphone models slowing new ones released apple released communication customers website acknowledging effect old batteries iphone performance company offered 29 battery replacements solution first-generation iphone iphone 3g fixed-focus 2.0-megapixel camera back digital photos optical zoom flash autofocus natively support video recording video recording possible first-generation iphone iphone 3g via third-party app available app store jailbreaking iphone os 2.0 introduced geotagging photos iphone 3gs 3.2-megapixel camera autofocus auto white balance auto macro 10 cm manufactured omnivision camera also capture 640×480 vga resolution video 30 frames per second video cropped iphone directly uploaded youtube services iphone 4 introduced 5.0-megapixel camera 2592×1936 pixels record video 720p resolution considered high-definition also backside-illuminated sensor capture pictures low light led flash stay lit recording video first iphone natively high dynamic range photography iphone 4 also second camera front take vga photos record sd video saved recordings may synced host computer attached email supported sent mms iphone 4s camera shoot 8-mp stills 1080p video accessed directly lock screen triggered using volume-up button shutter trigger built-in gyroscope stabilize image recording video iphone 5 iphone 4s running ios 6 later take panoramas using built-in camera app iphone 5 also take still photos recording video camera iphone 5 reportedly shows purple haze light source frame although consumer reports said prone purple hazing photos shot bright light source predecessor several android phones fine cameras ... five model generations phone configured bring camera app quickly pressing home key twice iphones running also accessed lock screen directly iphone 5s features true tone flash two led lights white amber improve white balance adjusted 1,000 combinations image sensor 15 percent larger previous model iphone 6 6 plus include phase detection autofocus 6 plus optical image stabilization models shoot 1080p videos 60 frames per second release ios 8 iphone 4s later models shoot time-lapse videos capability switch frame rates automatically recording increases time iphone 6s 6s plus outfitted 12 megapixel camera 4k hd video capability front-facing camera upgraded 5 megapixels user may change resolution 4k 1080p settings iphone se features 12 mp camera found iphone 6s iphone 6s plus models 4k video capability front camera 1.2 mp iphone 7 features optical image stabilization rear camera feature previously exclusive plus models 7 plus first iphone feature dual-lens cameras 12 mp models 7 mp front-facing camera second camera iphone 7 plus telephoto lens enables 2× optical zoom 10× digital zoom rear cameras 7 7 plus f/1.8 aperture also new quad-led true tone flash brighter compared predecessors iphone 8 camera remains largely predecessor features larger sensor newer color filter camera also record 4k 60 24 frames per second slow-mo 1080p 240 frames per second new camera system also enables portrait lighting defines light scene also features quad-led true tone flash 2× better light uniformity slow sync iphone x camera almost iphone 8 camera telephoto lens aperture f/2.4 optical image stabilization front camera also portrait mode portrait lighting due new truedepth camera system iphone xs xs max xr updated 12mp 1/2.55 sensor size 1.4 μm pixel size xs series telephoto lens lower end xr one lens iphone initially released two options internal storage size 4 8gb september 5 2007 apple discontinued 4gb models february 5 2008 apple added 16gb model iphone 3g available 8 16gb released 2008 iphone 3gs came 16 32gb variants remained available 8gb september 2012 three years launch iphone 4 available 16 32gb variants well 8gb variant sold alongside iphone 4s reduced price point iphone 4s available three sizes 16 32 64gb iphone 5 5s available three sizes iphone 4s 16 32 64gb.. lower-cost iphone 5c model initially available 16 32gb models 8gb model added later iphone 6 6s available three sizes launch 16 64 128gb iphone se available 16 64gb variants launch iphone 7 7 plus released apple changed base model storage capacity 16 32gb iphone 7 7 plus configurations 32 128 256gb storage apple doubled storage iphone 6s 6s plus two configurations 32 128gb well iphone se six months later iphone 8 8 plus x changed base model capacity 64gb retaining 256gb storage option iphone xs xs max introduced 512gb storage option addition existing 64 256 gb options iphone xr comes three storage options 64 128 256gb gsm models iphone use sim card identify gsm network sim sits tray inserted slot top device sim tray ejected paper clip sim ejector tool simple piece die-cut sheet metal included iphone 3g 3gs united states models elsewhere world iphone models shipped sim ejector tool fabricated alloy dubbed liquidmetal countries iphone usually sold sim lock prevents iphone used different mobile network gsm iphone 4 features microsim card located slot right side device cdma model iphone 4 cdma-only cell phone use sim card sim card slot iphone 4s activated cdma carrier however sim card slot rely sim card activation cdma network cdma-activated iphone 4s usually carrier-approved roaming sim preloaded sim slot time purchase used roaming certain carrier-approved international gsm networks sim slot locked use roaming sim card provided cdma carrier case verizon example one request sim slot unlocked international use calling support number requesting international unlock account good standing past 60 days method unlocks iphone 4s use international carriers iphone 4s unlocked way reject non international sim cards mobility t-mobile usa example iphone 5 later iphones use nano-sim order save space internally iphone xs xs max xr added esim support addition nano-sim therefore support dual sim functionality iphones well many devices apple small disc bottom headphone jack changes white red contact water iphone 3g later models also similar indicator bottom dock connector apple warranties cover water damage employees examine indicators approving warranty repair replacement however adoption water resistance feature iphone practice longer use apple iphone indicators exposed mobile phones manufacturers carry protected location beneath battery behind battery cover indicators triggered routine use owner sweat steam bathroom light environmental moisture criticism led apple change water damage policy iphones similar products allowing customers request internal inspection phone verify internal liquid damage sensors triggered iphone models include written documentation dock connector usb cable first generation 3g iphones also came cleaning cloth first generation iphone includes stereo headset earbuds microphone plastic dock hold unit upright charging syncing iphone 3g includes similar headset plus sim eject tool first generation model requires paperclip iphone 3gs includes sim eject tool revised headset adds volume buttons functional previous iphone versions iphone 3g 3gs compatible dock sold separately first generation model dock versions include usb power adapter wall charger allows iphone charge ac outlet iphone 3g iphone 3gs sold north america japan colombia ecuador peru include ultracompact usb power adapter september 2014 launch iphone 6 apple announced apple pay mobile payment system feature aimed revolutionize way users pay uses nfc chip touch id fingerprint scanner face id iphone x later apple wallet app dedicated secure element chip encrypted payment information make purchases participating stores physical online iphone models haptic engine vibrate notification alert incoming call etc iphone models iphone 4s use eccentric rotating mass motor iphone 4s uses linear resonant actuator vibrator usually uses less power creates quieter vibration however iphone 5 5c 5s uses eccentric rotating mass motor unsure apple decided switch back however iphone 6 6 plus uses linear resonant actuator vibrator iphone 6s uses taptic engine vibration haptic feedback works similar eccentric rotating mass motor iphone runs operating system known ios formerly iphone os variant darwin operating system core found macos also included core animation software component mac os x v10.5 leopard together graphics hardware iphone 3gs opengl es 2.0 responsible interface motion graphics iphone comes set bundled applications developed apple supports downloading third-party applications app store apple provides free updates operating system iphone either wirelessly itunes major new updates historically accompanied new models size operating system depends version ios 8 required 4.5 gb successor required 1.3 gb interface based around home screen graphical list available applications iphone applications normally run one time starting iphone 4 primitive version multitasking came play users could double click home button select recently opened applications however apps never ran background starting ios 7 though apps truly multitask open application runs background use although functionality still available making call listening music home screen accessed hardware button screen iphone 8 earlier iphone x later models require swipe original iphone contained following apps messages sms mms messaging calendar photos camera youtube stocks maps google maps weather voice memos notes clock calculator settings itunes store app store introduced iphone 3gs iphone 4 compass facetime gamecenter added ios 4 4.1 respectively ios 5 reminders newsstand added ipod application split separate music videos applications ios 6 added passbook well updated version maps relies data provided tomtom well sources youtube longer came pre-installed application ios 8 added health app ios 9 replaced newsstand passbook news wallet ios 10 introduces home ios 11 added files ios 12 introduces measure app uses ar technology measure objects things available devices a9 chip newer docked base screen four icons phone mail safari internet music delineate iphone main purposes january 15 2008 apple released software update 1.1.3 allowing users create web clips home screen icons resemble apps open user-defined page safari update iphone users rearrange place icons holding icon moving desired location start shaking nine adjacent home screens accessed horizontal swipe users also add delete icons dock every home screen home screen holds twenty icons first-generation iphone 3g 4 4s home screen iphone 5 holds twenty-four icons due larger screen display dock holds four icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs could removed since ios 10 update 3.0 update adds system-wide search known spotlight left first home screen almost input given touch screen understands complex gestures using multi-touch iphone interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object unlike previous scrollable views user pressed control move view downwards ios user pushes upwards moving plank wood floating water creating impression user directly manipulating content displayed screen user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder iphone allows audio conferencing call holding call merging caller id integration cellular network features iphone functions example music playing call received music fades fades back call ended proximity sensor shuts screen touch-sensitive circuitry iphone brought close face save battery prevent unintentional touches iphone support video calling videoconferencing versions prior fourth generation one camera opposite side screen iphone 4 supports video calling using either front back camera wi-fi feature apple calls facetime voice control introduced iphone 3gs allows users say contact name number iphone dial first two models support voice dialing third-party applications iphone includes visual voicemail countries feature allowing users view list current voicemail messages on-screen without call voicemail unlike systems messages listened deleted non-chronological order choosing message on-screen list music ringtone feature introduced united states september 5 2007 users create custom ringtones songs purchased itunes store small additional fee ringtones three 30 seconds long part song fade pause half second five seconds looped loop continuously customizing done itunes apple garageband software 4.1.1 later available mac os x third-party tools release ios 6 released september 19 2012 apple added features enable user options decline phone call person calling user reply message set reminder call back later time layout music library similar ipod iphone sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 3gs volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist iphone supports gapless playback like fifth-generation ipods introduced 2005 iphone play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback iphone allows users purchase download songs itunes store directly iphone feature originally required wi-fi network since 2012 used cellular data network iphone includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken iphone camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc internet access available iphone connected local area wi-fi wide area gsm edge network second-generation 2g wireless data standards iphone 3g introduced support third-generation umts hsdpa 3.6 iphone 4s introduced support hsupa networks 14.4 mbit/s support hsdpa 7.2 introduced iphone 3gs networks accessible iphone models include 1xrtt represented 1× status bar gprs shown gprs status bar edge shown capital e status bar umts ev-do shown 3g faster version umts 4g shown 4g symbol status bar lte shown lte status bar 5g evolution supported areas implemented stylized larger 5g reduced size capital e. 5ge uses 4x4 mimo doubling number antennas 256-qam three-way carrier aggregation true 5g expected iphone 2020 release introduced 3g july 2004 late 2007 steve jobs stated still widespread enough us chipsets energy efficient enough included iphone support 802.1x authentication system commonly used university corporate wi-fi networks added 2.0 version update default iphone ask join newly discovered wi-fi networks prompt password required alternatively join closed wi-fi networks manually iphone automatically choose strongest network connecting wi-fi instead edge available similarly iphone 3g onwards prefer 3g 2g wi-fi either wi-fi bluetooth 3g iphone 3g onwards deactivated individually airplane mode disables wireless connections overriding preferences however airplane mode one explicitly enable wi-fi and/or bluetooth modes join continue operate one networks cellular network transceivers remain safari iphone native web browser displays pages similar mac windows counterparts web pages may viewed portrait landscape mode device supports automatic zooming pinching together spreading apart fingertips screen double-tapping text images safari allow file downloads except predefined extensions iphone support flash still popular iphone introduced consequently uk advertising standards authority adjudicated advertisement claiming iphone could access parts internet withdrawn current form grounds false advertising rare public letter april 2010 apple ceo steve jobs outlined reasoning behind absence flash iphone ipad iphone supports svg css html canvas bonjour google chrome introduced ios june 26 2012 opera mini also available maps application access google maps map satellite hybrid form also generate directions two locations providing optional real-time traffic information iphone announcement jobs demonstrated feature searching nearby starbucks locations placing prank call one single tap support walking directions public transit street view added version 2.2 software update voice-guided navigation iphone 3gs iphone 4 orient map digital compass apple also developed separate application view youtube videos iphone streams videos encoding using h.264 codec simple weather stock quotes applications also tap internet iphone users access internet frequently variety places according google 2008 iphone generated 50 times search requests mobile handset according deutsche telekom ceo rené obermann average internet usage iphone customer 100 megabytes 30 times use average contract-based consumer customers nielsen found 98 iphone users use data services 88 use internet china iphone 3g iphone 3gs built distributed without wi-fi introduction verizon iphone january 2011 issue using internet phone brought public attention two us carriers internet phone could used simultaneously networks whereas verizon networks support use separately however 2014 verizon announced iphone 6 6 plus would allow simultaneous voice data lte network t-mobile sprint enabled calls wi-fi verizon soon text input iphone implements virtual keyboard touchscreen automatic spell checking correction predictive word capabilities dynamic dictionary learns new words keyboard predict word user typing complete correct accidental pressing keys near presumed desired key keys somewhat larger spaced farther apart landscape mode supported limited number applications touching section text brief time brings magnifying glass allowing users place cursor middle existing text virtual keyboard accommodate 21 languages including character recognition chinese alternative characters accents example letters alphabets languages emoji typed keyboard pressing letter two seconds selecting alternative character popup 3.0 update brought support cut copy pasting text well landscape keyboards applications iphone 4s siri allows dictation since ios 8 third party keyboards distributed app store allowed previously available jailbroken iphones iphone also features email program supports html email enables user embed photos email message pdf word excel powerpoint attachments mail messages viewed phone yahoo offers free push-email service iphone imap although push-imap pop3 mail standards also supported including microsoft exchange kerio connect first versions iphone firmware accomplished opening imap exchange server apple also licensed microsoft activesync supports platform including push email release iphone 2.0 firmware iphone sync email account settings apple mail application microsoft outlook microsoft entourage manually configured device email program access almost imap pop3 account text messages presented chronologically mailbox format similar mail places text recipients together replies text messages displayed speech bubbles similar ichat recipient name iphone built-in support email message forwarding drafts direct internal camera-to-email picture sending support multi-recipient sms added 1.1.3 software update support mms added 3.0 update original first generation iphone us september 25 2009 wwdc 2007 june 11 2007 apple announced iphone would support third-party web applications using ajax share look feel iphone interface october 17 2007 steve jobs open letter posted apple hot news weblog announced software development kit sdk would made available third-party developers february 2008 iphone sdk officially announced released march 6 2008 apple town hall facility free download apple registration allows developers develop native applications iphone ipod touch test iphone simulator however loading application onto real device possible paying apple developer connection membership fee developers free set price applications distributed app store receive 70 share developers also opt release application free pay costs release distribute application beyond membership fee app store launched release ios 2.0 july 11 2008 update free iphone users owners older ipod touches required pay us 10 developer submitted application app store apple holds firm control distribution apple halt distribution applications deems inappropriate example rich us 1000 program simply demonstrated wealth user apple criticized banning third-party applications enable functionality apple want iphone 2008 apple rejected podcaster allowed iphone users download podcasts directly iphone claiming duplicated functionality itunes apple since released software update grants capability netshare another rejected app would enabled users tether iphone laptop desktop using cellular network load data computer many carriers iphone later globally allowed tethering apple officially supported upgrade ios 3.0 mobility relative latecomer united states cases carrier charges extra tethering iphone sdk released third parties permitted design web apps would run safari unsigned native applications also available jailbroken phones ability install native applications onto iphone outside app store supported apple stated reason native applications could broken software update apple stated design software updates specifically break native applications perform sim unlocking apple passed 60 billion app downloads 140 billion app downloads app store app store 2.2million apps iphone original iphone described revolutionary game-changer mobile phone industry credited helping make apple one world valuable publicly traded companies 2011 newer iterations also received praise called best phone iphone attracts users ages besides consumer use iphone also adopted business purposes starting iphone 4s apple added accessibility feature optimize function iphone hearing aids apple released program made iphone hearing aids hearing aids deliver power-efficient high-quality digital audio experience allow user manage hearing aid right iphone made iphone hearing aids also feature live listen live listen iphone acts remote microphone sends sound made iphone hearing aid live listen help user hear conversation noisy room hear someone speaking across room braille displays ios program announced apple coinciding release iphone 3gs ipad ipod touch 3rd generation program added support 50 bluetooth wireless braille displays work ios box user needs pair keyboard device start using navigate ios device voiceover without additional software ios supports braille tables 25 languages iphone lets user know alert sent variety notice methods delivers visual vibrating alerts incoming phone facetime calls new text messages new sent mail calendar events users set led light flash incoming calls alerts incoming calls display photo caller users choose different vibration patterns even create iphone enlarge text make accessible vision-impaired users accommodate hearing-impaired users closed captioning external tty devices iphone 3gs also features white black mode voiceover screen reader zooming impaired vision mono audio limited hearing one ear apple regularly publishes voluntary product accessibility templates explicitly state compliance us regulation section 508 release ios 9 iphones users ability choose two different screen view options user choose standard view zoomed view iphone placed standard view setting icons normal size text remains zoomed view option icons screen text become slightly larger enables user customized appearance potentially help users read screen easier assistivetouch helps adapt multi-touch screen ios device user unique physical needs great assistance difficulty gestures like pinch one make accessible tap finger user create gestures customize layout assistivetouch menu user trouble pressing home button set activated onscreen tap gestures like rotate shake available even ios device mounted wheelchair guided access helps people autism attention sensory challenges stay focused task app hand guided access parent teacher therapist limit ios device stay one app disabling home button limit amount time spent app user restrict access keyboard touch input certain areas screen 21 different iphone models produced models bold current flagship devices apple filed 200 patent applications related technology behind iphone lg electronics claimed design iphone copied lg prada woo-young kwak head lg mobile handset r center said press conference consider apple copied prada phone design unveiled presented design award prize september 2006 conversely iphone also inspired share high-tech clones september 3 1993 infogear filed us trademark phone march 20 1996 applied trademark iphone phone registered march 1998 iphone registered 1999 since phone mark abandoned infogear trademarks cover communications terminals comprising computer hardware software providing integrated telephone data communications personal computer functions 1993 filing computer hardware software providing integrated telephone communication computerized global information networks 1996 filing 2000 infogear filed infringement claim owners iphones.com domain name owners iphones.com domain name challenged infringement claim northern district court california june 2000 cisco systems acquired infogear including iphone trademark september 2000 cisco systems settled owners iphones.com allowed owners keep iphones.com domain name along intellectual property rights use designation iphones.com domain name sale cellular phones cellular phones internet access wap phones handheld pdas storage devices computer equipment hardware/software digital cameras hardware/software intellectual property rights granted owners iphones.com domain name cisco systems september 2000 october 2002 apple applied iphone trademark united kingdom australia singapore european union canadian application followed october 2004 new zealand application september 2006 october 2006 singapore australian applications granted september 2006 company called ocean telecom services applied iphone trademark united states united kingdom hong kong following filing trinidad tobago ocean telecom trademark applications use exactly wording new zealand application apple assumed ocean telecom applying behalf apple canadian application opposed august 2005 canadian company called comwave applied trademark three months later comwave selling voip devices called iphone since 2004 shortly steve jobs january 9 2007 announcement apple would selling product called iphone june 2007 cisco issued statement negotiating trademark licensing apple expected apple agree final documents submitted night january 10 2007 cisco announced filed lawsuit apple infringement trademark iphone seeking injunction federal court prohibit apple using name february 2007 cisco claimed trademark lawsuit minor skirmish money interoperability february 2 2007 apple cisco announced agreed temporarily suspend litigation held settlement talks subsequently announced february 20 2007 reached agreement companies allowed use iphone name exchange exploring interoperability security consumer business communications products october 22 2009 nokia filed lawsuit apple infringement gsm umts wlan patents nokia alleges apple violating ten nokia patents since iphone initial release december 2010 reuters reported iphone ipad users suing apple inc. applications passing user information third-party advertisers without permission makers applications textplus4 paper toss weather channel dictionary.com talking tom cat pumpkin maker also named co-defendants lawsuit august 2012 apple smartphone patent lawsuit u.s. samsung world largest maker smartphones however december 6 2016 scotus reversed decision awarded nearly 400 million apple returned case federal circuit court define appropriate legal standard define article manufacture smartphone could case screen design patents relate march 2013 apple patent wraparound display revealed around april 20 2011 hidden unencrypted file iphone ios devices widely discussed media alleged file labeled consolidated.db constantly stores iphone user movement approximating geographic locations calculated triangulating nearby cell phone towers technology proven inaccurate times file released june 2010 update apple ios4 may contain almost year worth data previous versions ios stored similar information file called h-cells.plist f-secure discovered data transmitted apple twice day postulate apple using information construct global location database similar ones constructed google skyhook wardriving nevertheless unlike google latitude application performs similar task android phones file dependent upon signing specific eula even user knowledge stated 15,200 word-long terms conditions iphone apple partners licensees may collect use share precise location data including real-time geographic location user apple computer device file also automatically copied onto user computer synchronized iphone open-source application named iphonetracker turns data stored file visual map made available public april 2011 file erased without jailbreaking phone encrypted apple gave official response web site april 27 2011 questions submitted users associated press others apple clarified data small portion crowd-sourced location database cache wi-fi hotspots cell towers downloaded apple iphone making location services faster gps therefore data represent locations iphone volume data retained error apple issued update ios version 4.3.3 4.2.8 cdma iphone 4 reduced size cache stopped backed itunes erased entirely whenever location services turned upload apple also selectively disabled system services cell network search regardless july 2014 report state-owned china central television labeled iphone national security concern frequent locations feature found settings location services stores commonly visited locations locally device feature said help accuracy gps apple maps since log information locations user frequently visited however feature also keeps track number times user location dates exact times media outlets publicized instructions disabled concerned users revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq access user data iphones blackberrys android phones respectively read almost smartphone information including sms location emails notes according article new york times titled signaling post-snowden era new iphone locks n.s.a apple developed new encryption method ios 8 described deep apple could longer comply government warrants asking customer information extracted devices throughout 2015 prosecutors united states argued u.s. government able compel decryption iphone contents 2015 san bernardino attack fbi recovered iphone 5c issued one shooters employer icloud backups phone month half shooting shooters destroyed personal phones u.s. government attempted obtain court order writs act compelling apple produce ipsw file would allow investigators brute force device passcode tim cook responded company website outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users february 19 apple communicated journalists password apple id iphone changed within day government obtaining preventing apple producing workaround would target older devices see fbi–apple encryption dispute graykey manufactured grayshift unlock iphones even disabled countermeasure apple implemented usb restricted mode apple privacy policy addresses requests government agencies access customers data apple never worked government agency country create 'backdoor products services also never allowed government access servers never 2015 electronic frontier foundation awarded apple five five stars commend ing apple strong stance regarding user rights transparency privacy apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renderes user data device cryptographically inaccessible apple tightly controls certain aspects iphone according jonathan zittrain emergence closed devices like iphone made computing proprietary early versions microsoft windows hacker community found many workarounds disallowed apple make difficult impossible obtain warranty service jailbreaking allows users install apps available app store modify basic functionality sim unlocking allows iphone used different carrier network however united states apple void iphone warranty unless show problem component failure linked installation placement after-market item unauthorized applications federal trade commission magnuson-moss warranty act 1975 users set restrictions parental controls apps downloaded used within iphone restrictions area requires password iphone normally prevents access media player web features unless also activated phone authorized carrier july 3 2007 jon lech johansen reported blog successfully bypassed requirement unlocked iphone features combination custom software modification itunes binary published software offsets others use unlike first generation iphone iphone 3g must activated store countries makes iphone 3g difficult impossible hack need in-store activation well huge number first-generation iphone ipod touch users upgrading iphone os 2.0 caused worldwide overload apple servers july 11 2008 day iphone 3g iphone os 2.0 updates well mobileme released update devices required connect apple servers authenticate causing many devices temporarily unusable users o2 network united kingdom however buy phone online activate via itunes previous model even required vendors usually offer activation buyer convenience us apple begun offer free shipping iphone 3g iphone 3gs available reversing in-store activation requirement best buy walmart also sell iphone iphone operating system designed run software apple-approved cryptographic signature restriction overcome jailbreaking phone involves replacing iphone firmware slightly modified version enforce signature check may circumvention apple technical protection measures apple statement united states copyright office response electronic frontier foundation eff lobbying dmca exception kind hacking claimed jailbreaking iphone would copyright infringement due necessary modification system software however 2010 jailbreaking declared officially legal united states dmca jailbroken iphones may susceptible computer viruses incidents reported ios android 2.3.3 'gingerbread may set dual boot jailbroken iphone help openiboot idroid 2007 2010 2011 developers released series tools called jailbreakme used security vulnerabilities mobile safari rendering jailbreak device allows users install compatible software device instead app store apps exploits quickly fixed ios updates apple theoretically flaws could also used malicious purposes july 2011 apple released ios 4.3.5 4.2.10 cdma iphone fix security vulnerability certificate validation following release iphone 5s model group german hackers called chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image verification spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token iphones still sold sim lock restricts use phone one particular carrier common practice subsidized gsm phones unlike gsm phones however phone officially unlocked entering code locked/unlocked state maintained apple servers per imei set iphone activated iphone initially sold us network sim lock place various hackers found methods unlock phone specific network although sprint t-mobile verizon authorized iphone carriers united states unlocked iphones used carriers example unlocked iphone may used t-mobile network us unlocked iphone compatible t-mobile voice network may able make use 3g functionality i.e mobile web e-mail etc. quarter original first generation iphones sold us registered apple speculates likely shipped overseas unlocked lucrative market iphone 3g worldwide release march 26 2009 united states began selling iphone without contract though still sim-locked network up-front purchase price iphone units often twice expensive bundled contracts outside united states policies differ especially us territories insular areas like guam gta teleguam exclusive carrier iphone since introduction none four us carriers sprint t-mobile verizon presence area since 2013 docomo pacific ended gta exclusivity starting iphone 5 beginning april 8 2012 began offering factory sim unlock option apple calls whitelisting allowing used carrier phone supports iphone owners reported verizon 4g lte phones come factory unlocked discovery verizon announced 4g lte phones including iphones would remain unlocked due regulations fcc placed 700 mhz c-block spectrum used verizon united kingdom o2 ee 3 vodafone tesco mobile sell device subsidised contracts use pay go locked network initially though usually unlocked either certain period contract length passed small fee exception 3 network unlock device time charge however current versions iphone available purchase sim-free apple store apple online store consequently unlocked use gsm network iphones purchased full retail price apple store online apple.com come unlocked allows customer selection carriers iphones sold canada purchased mobile carries telus rogers bell locked respective networks unlocking required visiting carrier store paying unlocking fee third party methods unlock iphones existed highly unreliable sometimes rendered phones unusable however 2017 crtc abolished sim-locking required mobile devices sold december 1 2017 come unlocked crtc also mandated carriers must offer unlocking services existing devices free consumers regardless whether purchased phone three major carriers australia optus telstra vodafone offer legitimate unlocking cost iphone devices current prior models internationally policies vary many carriers sell iphone unlocked full retail price 2003 four years iphone officially introduced trademark ifone registered mexico communications systems services company ifone apple tried gain control brandname mexican court denied request case began 2009 mexican firm sued apple supreme court mexico upheld ifone rightful owner held apple iphone trademark violation brazil brand iphone registered 2000 company called gradiente eletrônica s.a. igb eletrônica s.a according filing gradiente foresaw revolution convergence voice data internet time brazil final battle brandname concluded 2008 december 18 2012 igb launched line android smartphones tradename exclusive rights local market february 2013 brazilian patent trademark office known instituto nacional da propriedade industrial issued ruling gradiente eletrônica apple owned iphone mark brazil iphone term registered gradiente 2000 7 years apple release first iphone decision came three months gradiente eletrônica launched lower-cost smartphone using iphone brand june 2014 apple second time right use brandname brazil court ruling determined gradiente registration exclusive rights brand although gradiente intended appeal decision apple use freely brand without paying royalties brazilian company philippines solid group launched myphone brand 2007 stylized my|phone solid broadband filed trademark application brand apple later filed trademark case intellectual property office philippines ipophl solid broadband myphone confusingly similar iphone may likely deceive cause confusion among consumers apple lost trademark battle solid group 2015 decision made ipo director nathaniel arevalo also reportedly said unlikely consumers would confused iphone myphone case giant trying claim territory entitled great prejudice local 'pinoy phone merchant managed obtain significant foothold mobile phone market marketing sale innovative products distinctive trademark arevalo later added | [
7171,
10755,
5637,
6,
1549,
7182,
4623,
5647,
7697,
3602,
4114,
5138,
11289,
3610,
7706,
2076,
7199,
8735,
1057,
1576,
3626,
4139,
6186,
3629,
6700,
9262,
1074,
3634,
7730,
8754,
7222,
11319,
9784,
1083,
2107,
8253,
8767,
576,
7745,
10303... | Test |
9,733 | 2 | Env:env env shell command unix unix-like operating systems used either print list environment variables run another utility altered environment without modify currently existing environment using env variables may added removed existing variables may changed assigning new values practice env another common use often used shell scripts launch correct interpreter usage environment typically changed version codice_1 bundled gnu coreutils written richard mlynarik david mackenzie print list environment variables simply run env without arguments clear environment creating new environment without existing environment variables new shell launch x application xcalc appear different display note use env often unnecessary since shells support setting environment variables front command env may also used hashbang line script allow interpreter looked via path example code simple python script example /usr/bin/env full path env command environment altered note possible specify interpreter without using env giving full path python interpreter problem approach different computer systems exact path may different instead using env example interpreter searched located time script run makes script portable also increases risk wrong interpreter selected searches match every directory executable search path also suffers problem path env binary may also different per-machine basis | [
515,
9735,
3976,
521,
5256,
6281,
6664,
4750,
8975,
11663,
4369,
10387,
5397,
2198,
6812,
7196,
4001,
6138,
2599,
7847,
8236,
4398,
7983,
11442,
1336,
8504,
7356,
451,
1987,
965,
2245,
8517,
9542,
5706,
3659,
8522,
1741,
10967,
9946,
8675... | None |
9,734 | 5 | Service_discovery:service discovery service discovery automatic detection devices services offered devices computer network service discovery protocol sdp network protocol helps accomplish service discovery service discovery aims reduce configuration efforts users service discovery requires common language allow software agents make use one another services without need continuous user intervention many service discovery protocols including | [
514,
10242,
4107,
11413,
7837,
10274,
10402,
10020,
9381,
168,
425,
5677,
2996,
7361,
8404,
1878,
6750,
4457,
7018,
10229,
7928
] | None |
9,735 | 9 | Sed:sed sed stream editor unix utility parses transforms text using simple compact programming language sed developed 1973 1974 lee e. mcmahon bell labs available today operating systems sed based scripting features interactive editor ed editor 1971 earlier qed quick editor 1965–66 sed one earliest tools support regular expressions remains use text processing notably substitution command popular alternative tools plaintext string manipulation stream editing include awk perl first appearing version 7 unix sed one early unix commands built command line processing data files evolved natural successor popular grep command original motivation analogue grep g/re/p substitution hence g/re/s foreseeing special-purpose programs command would also arise g/re/d mcmahon wrote general-purpose line-oriented stream editor became sed syntax sed notably use codice_1 pattern matching codice_2 substitution originated ed precursor sed common use time regular expression syntax influenced languages notably ecmascript perl later powerful language awk developed functioned cousins allowing powerful text processing done shell scripts sed awk often cited progenitors inspiration perl influenced perl syntax semantics notably matching substitution operators gnu sed added several new features including in-place editing files super-sed extended version sed includes regular expressions compatible perl another variant sed minised originally reverse-engineered 4.1bsd sed eric s. raymond currently maintained rené rebe minised used gnu project gnu project wrote new version sed based new gnu regular expression library current minised contains extensions bsd sed feature-rich gnu sed advantage fast uses little memory used embedded systems version sed provided minix sed line-oriented text processing utility reads text line line input stream file internal buffer called pattern space line read starts cycle pattern space sed applies one operations specified via sed script sed implements programming language 25 commands specify operations text input line running script sed ordinarily outputs pattern space line modified script begins cycle next line end-of-script behaviors available sed options script commands e.g codice_3 delete pattern space codice_4 quit codice_5 add next line pattern space immediately thus sed script corresponds body loop iterates lines stream loop loop variable current line number implicit maintained sed sed script either specified command line codice_6 option read separate file codice_7 option commands sed script may take optional address terms line numbers regular expressions address determines command run example codice_8 would run codice_3 delete command second input line printing lines second codice_10 would delete lines beginning space separate special buffer hold space may used sed commands hold accumulate text cycles sed command language two variables hold space pattern space goto-like branching functionality nevertheless language turing-complete esoteric sed scripts exist games sokoban arkanoid chess tetris main loop executes line input stream evaluating sed script line input lines sed script pattern-action pair indicating pattern match action perform recast conditional statement main loop working variables pattern space hold space input output streams default actions copy line pattern space print pattern space implicit possible write terse one-liner programs example sed program given print first 10 lines input stop following example shows typical common use sed substitution usage indeed original motivation sed versions sed expression must preceded codice_6 indicate expression follows codice_12 stands substitute codice_13 stands global means matching occurrences line would replaced regular expression i.e pattern searched placed first delimiting symbol slash replacement follows second symbol slash codice_1 conventional symbol originating character search ed could used make syntax readable occur pattern replacement useful avoid leaning toothpick syndrome substitution command originates search-and-replace ed implements simple parsing templating codice_15 provides pattern matching saving text via sub-expressions codice_16 either literal text format string containing characters codice_17 entire match special escape sequences codice_18 codice_19 n th saved sub-expression example codice_20 replaces occurrences cat dog cats dogs without duplicating existing codice_21 1st saved sub-expression regexp codice_18 format string substitutes output besides substitution forms simple processing possible using 25 sed commands example following uses command delete lines either blank contain spaces example uses following regular expression metacharacters sed supports full range regular expressions complex sed constructs possible allowing serve simple highly specialised programming language flow control example managed use label colon followed string branch instruction codice_29 instruction codice_29 followed valid label name move processing block following label unix sed often used filter pipeline program generatedata generates data sed makes small change replacing x example often useful put several sed commands one command per line script file codice_31 use codice_7 option run commands codice_33 file number commands may placed script file using script file also avoids problems shell escaping substitutions script file may made directly executable command line prepending shebang line containing sed command assigning executable permission file example file codice_31 created contents file may made executable current user codice_35 command chmod u+x subst.sed file may executed directly command line codice_36 option introduced gnu sed allows in-place editing files actually temporary output file created background original file replaced temporary file example hello world script file e.g. script.txt invoked codice_37 inputfilename input text file script changes inputfilename line 1 hello world quits printing result sed exits input lines past line 1 read printed sole output hello world example emphasizes many key characteristics sed follow various sed scripts executed passing argument sed put separate file executed via codice_7 making script executable replace instance certain word file redacted irc password save result delete line containing word yourword address '/yourword/ delete instances word yourword delete two words file simultaneously express previous example one line entering command line one may join two commands via semicolon next example sed usually works one line removes newlines sentences second line starts one space consider following text sed script turn text following text note script affects input lines start space script explained expressed single line via semicolons simple limited sed sufficiently powerful large number purposes sophisticated processing powerful languages awk perl used instead particularly used transforming line way complicated regex extracting template replacement though arbitrarily complicated transforms principle possible using hold buffer conversely simpler operations specialized unix utilities grep print lines matching pattern head print first part file tail print last part file tr translate delete characters often preferable specific tasks designed carry specialized utilities usually simpler clearer faster general solution sed ed/sed commands syntax continue used descendent programs text editors vi vim analog ed/sed sam/ssam sam plan 9 editor ssam stream interface yielding functionality similar sed | [
515,
516,
3076,
9733,
6664,
521,
7196,
2599,
8236,
9780,
8262,
5706,
3659,
5711,
4690,
9298,
10855,
9839,
8306,
10866,
5759,
9345,
5256,
6281,
4750,
10387,
2198,
8854,
6812,
7847,
2739,
4279,
7356,
2245,
9926,
1741,
10967,
9946,
6369,
739... | Train |
9,736 | 5 | Firefox_4:firefox 4 mozilla firefox 4 version firefox web browser released march 22 2011 first beta made available july 6 2010 release candidate 2 base final version released march 18 2011 codenamed tumucumaque firefox last large release cycle mozilla team planned smaller quicker releases following browser vendors primary goals version included improvements performance standards support user interface one security update april 2011 4.0.1 version 4 browser made obsolete release firefox 5 june 2011 marked transition giving much less weight major version numbers 5 major version numbers used december year 5 6 7 8 9 compared 4 nearly decade firefox development 1 2 3 4 october 13 2006 brendan eich mozilla chief technology officer wrote plans mozilla 2 referring comprehensive iteration since creation overall platform firefox mozilla products run objectives incorporated versions 3.0 3.5 3.6 largest changes however deferred firefox 4.0 early may 2010 mozilla plans firefox 4.0 officially detailed blog post mike beltzner firefox director may 25 2011 firefox release manager wrote email firefox 5 security update firefox 4 confirming firefox 4 entered end life phase mozilla longer issue updates mozilla continued issue updates firefox 3.6 4 eol declaration one update 4.0.1 issued firefox 4 lifetime many looking copy version 4 directed version 6 run powerpc macintoshes mozilla firefox 4 includes many new features since version 3.6 firefox 4 brings new user interface new look designed make faster early mockups new interface windows mac os x linux first made available july 2009 new features include improved doorhanger notifications firefox panorama feature lets user visually group tabs application tabs redesigned extension manager jetpack extensions support integration firefox sync support multitouch displays many changes made user interface default tabs top window location bar area formerly occupied window title bar stop reload go buttons combined single button placed right side address bar button changes dynamically based upon current state page windows vista windows 7 menu bar hidden default common actions moved new firefox menu upper left hand corner browser users create persistent app tabs customize tab bar well bookmark navigation bars many features similar ones introduced google chrome firefox 4 based gecko 2.0 engine adds improves support html5 css3 webm webgl also includes new javascript engine jägermonkey better xpcom apis jägermonkey new javascript engine designed work alongside tracemonkey engine introduced firefox 3.5 improves performance compiling non-traceable javascript machine language faster execution firefox 4 first version firefox drop native support gopher protocol however continued support available add-on firefox 4 introduces audio api provides way programmatically access create audio data associated html5 audio element allows example visualize raw sound data use filters show audio spectrum firefox 4 longer relies underlying os text layout/shaping instead uses harfbuzz allows smart opentype layout/shaping consistent across different operating systems firefox 4 marked major change performance comparison former versions 3.6 3.5 browser made significant progress sunspider javascript tests well improvements supporting html5 since firefox 4.0 beta 5 hardware acceleration content enabled default windows vista windows 7 machines using direct2d os x using quartz basically cpu-only linux using xrender hardware acceleration compositing enabled default windows xp windows vista windows 7 machines using direct3d os x linux using opengl using hardware acceleration allows browser tap computer graphics processing unit lifting burden cpu speeding display web pages acceleration enabled certain graphics hardware drivers one performance optimizations moving application data single file omni.jar using new file format based java archive format previous versions used multiple files java archive format later versions file renamed omni.ja firefox 4 contains support track header emerging standard web privacy header signals user request web service web visitor tracking service disabled future privacy request may become legal requirement also introduced ability delete flash cookies subjecting deletion rules ordinary http cookies nightly builds marked 4.0a1pre february june 2008 renamed 3.1a1pre afterwards 22 march 2011 24-hour launch period firefox 4 received 7.1 million downloads counted verified mozilla foundation date 3 million people downloaded second release candidate browser later became final version result new version browser received 10 million downloads first day notwithstanding fell behind previous record established launch firefox 3 2008 8 million second-day downloads browser reported 8.75 million lack official representative guinness monitor numbers made record attained firefox 3 unofficially broken official launch date usage share firefox 4 1.95 0.34 higher previous day according analytics website statcounter comparison usage share internet explorer 9 march 22 0.87 released prior week march 14 potential factor firefox 4 ’ higher usage share latter supports windows 2000 xp two operating systems internet explorer 9 support also launch mozilla prompted existing customers upgrade browsers newer version something microsoft ’ applied users older versions internet explorer instead microsoft prompted users upgrade via windows update several weeks launch march 26 2011 firefox 4 ’ usage share exceeded 10-year-old discontinued internet explorer 6 first time also date browser ’ usage share higher versions safari opera older versions firefox exception firefox 3.6 reference internet explorer 9 ’ usage share first exceeded internet explorer 6 may 1 2011 48 days release internet explorer 9 became second used version internet explorer first time may 22 2011 69 days release according statcounter firefox 4 reached usage share peak 16.7 june 19 2011 date started decline due weekly trends release firefox 5 firefox 4 represents departure user interface layout behaviour previous versions users face issues negotiating changes documented release notes firefox button groups menus firefox 4 displayed default windows 7 windows vista operating systems displayed operating systems selecting toolbars view menu unchecking menu bar menu bar restored selecting options firefox button menu checking menu bar certain menu items page info import importing bookmarks browser data available firefox button menu remain available menu bar menu bar displayed temporarily pressing releasing alt key selecting menu bar command pressing alt key dismisses menu bar prompt save session tabs windows presented default firefox 3 session restored next start user selected save quit option firefox 4 sessions saved next start session available history menu new feature called on-demand session restore overwrites previous session exit without prompting user check whether saved session time viewing history menu item restore previous session available greyed restorable session available | [
6657,
2579,
6171,
7708,
9757,
7713,
10791,
9768,
9770,
559,
4661,
3639,
64,
9281,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
10860,
115,
9843,
119,
4728,
637,
1664,
6791,
6797,
11418,
10910,
8351,
7340,
1713,
9395,
9908,
7861,
11449,
4797... | None |
9,737 | 8 | Vanity_domain:vanity domain domain name system dns vanity domain domain name whose purpose express individuality person whose behalf registered contrasts domain names resolve organisation e.g company service organisation offers vanity domains may compared vanity car registration plates similarly identify owner individual someone relying another organisation services subdomain isp domain aliased individual user account vanity domain definitions include uses apply primarily regular domain names registered highest allowed level rather subdomains although technically speaking second-level domain actually subdomain top-level domain vanity domains operated behalf individuals typically offer full complement services organisational domain name rather host points would expected honour example dns record may contain mx record identifying mail server accepting e-mail domain may e-mail forwarding server record identifying shared web hosting service offering http may url redirection service well easily remembered vanity domains especially registered highest level allowed registrar offer advantage personal mobility continue associated person even person switches service providers top-level domain become part vanity url taking advantage countries ask proof residence register country-specific tlds top level domains allow user incorporate two three letters following dot using help spell desired name word phrase | [
7370,
5012,
2887
] | Test |
9,738 | 8 | Twig_(template_engine):twig template engine twig template engine php programming language syntax originates jinja django templates open source product licensed bsd license maintained fabien potencier initial version created armin ronacher symfony php framework comes bundled support twig default template engine since version 2 twig supported following integrated development environments text editors twig defines three kinds delimiters apostrophe escape character create iterative array associative array operators precedence less priority filters provide treatments expression place separated pipes example example demonstrates basic features twig | [
6338,
8644,
7847,
9320,
6154,
7658,
5612,
8846,
7983
] | Validation |
9,739 | 3 | Program_counter:program counter program counter pc commonly called instruction pointer ip intel x86 itanium microprocessors sometimes called instruction address register iar instruction counter part instruction sequencer processor register indicates computer program sequence processors pc incremented fetching instruction holds memory address points next instruction would executed processor incrementation precedes fetch pc points current instruction executed processors usually fetch instructions sequentially memory control transfer instructions change sequence placing new value pc include branches sometimes called jumps subroutine calls returns transfer conditional truth assertion lets computer follow different sequence different conditions branch provides next instruction fetched elsewhere memory subroutine call branches saves preceding contents pc somewhere return retrieves saved contents pc places back pc resuming sequential execution instruction following subroutine call typical central processing unit cpu pc digital counter origin term program counter may one many registers cpu hardware instruction cycle begins fetch cpu places value pc address bus send memory memory responds sending contents memory location data bus stored-program computer model executable instructions stored alongside ordinary data memory handled identically following fetch cpu proceeds execution taking action based memory contents obtained point cycle pc modified next instruction executed different one typically incremented next instruction one starting memory address immediately following last memory location current instruction like processor registers pc may bank binary latches one representing one bit value pc number bits width pc relates processor architecture instance “ 32-bit ” cpu may use 32 bits able address 2 units memory pc binary counter may increment pulse applied count input cpu may compute value load pc pulse load input identify current instruction pc may combined registers identify segment page approach permits pc fewer bits assuming memory units interest within current vicinity use pc normally increments assumes computer execute usually linear sequence instructions pc central von neumann architecture thus programmers write sequential control flow even algorithms sequential resulting “ von neumann bottleneck ” led research parallel computing including non-von neumann dataflow models use pc example rather specifying sequential steps high-level programmer might specify desired function low-level programmer might specify using combinatory logic research also led ways making conventional pc-based cpus run faster including modern high-level programming languages still follow sequential-execution model indeed common way identifying programming errors “ procedure execution ” programmer finger identifies point execution pc would high-level language essentially machine language virtual machine complex built hardware instead emulated interpreted software however new programming models transcend sequential-execution programming | [
7173,
6153,
2066,
7699,
5655,
10779,
8732,
10781,
6181,
7717,
8231,
10796,
3630,
6705,
7218,
2619,
2623,
2113,
7234,
3142,
585,
74,
2638,
10835,
3157,
9302,
602,
1122,
3175,
8815,
5744,
7281,
5234,
9331,
630,
8822,
6268,
3197,
7313,
663,
... | None |
9,740 | 2 | Bring_your_own_operating_system:bring operating system bring operating system byoos relates practice providing pc computers usually without internally installed disks users bring operating system commonly usb pen drives use supplied hardware operating system choice byoos made possible thanks ability create usb pen drives external storage devices 'live operating system images containing necessary drivers allow boot operation compatible computer bootable versions linux available 1993 2012 microsoft windows 8 enterprise edition followed introduced 'windows go functionality allow operating system boot run mass storage devices usb flash drives thus enabling byoos windows family operating system similar linux live cd/dvd allowing users bring operating system significant cost savings made organisations commonly many on-site users obliged provide computer hardware allow perform specific tasks longer need install hard drive computer upgrading maintaining many pc computers also become easier companies need supply users new pen drives containing operating system boot images rather re-image every pc latest build operating system thus eliminating upgrade costs users take usb devices containing version operating system around employees boot home computer usb stick exactly software environment use place work thus enabling employees work home exactly would office introduction cloud based storage means portable operating systems free need store data locally unbundling office application data user data drives containing operating systems key factor making byoos possible | [
1150,
823
] | Validation |
9,741 | 3 | Intel_Graphics_Technology:intel graphics technology intel graphics technology gt collective name series integrated graphics processors igps produced intel manufactured package die central processing unit cpu first introduced 2010 intel hd graphics intel iris graphics intel iris pro graphics igp series introduced 2013 models haswell processors high-performance versions hd graphics iris pro graphics first series incorporate embedded dram fourth quarter 2013 intel integrated graphics represented units 65 pc graphics processor shipments however percentage represent actual adoption number shipped units end systems outfitted discrete graphics cards introduction intel hd graphics intel integrated graphics built motherboard northbridge part intel hub architecture known intel extreme graphics intel gma part platform controller hub pch design northbridge eliminated graphics processing moved die central processing unit cpu previous intel integrated graphics solution intel gma reputation lacking performance features therefore considered good choice demanding graphics applications 3d gaming performance increases brought intel hd graphics made products competitive integrated graphics adapters made rivals nvidia ati/amd intel hd graphics featuring minimal power consumption important laptops capable enough pc manufacturers often stopped offering discrete graphics options low-end high-end laptop lines reduced dimensions low power consumption important intel hd iris graphics divided generations within generation divided 'tiers increasing performance denominated 'gtx label january 2010 clarkdale arrandale processors ironlake graphics released branded celeron pentium core hd graphics one specification 12 execution units 43.2 gflops 900 mhz decode h264 1080p video 40 fps direct predecessor gma_x4500 featured 10 eus 800 mhz lacked capabilities january 2011 sandy bridge processors released introducing second generation hd graphics sandy bridge celeron pentium intel hd core i3 either hd 2000 hd 3000 hd graphics 2000 3000 include hardware video encoding hd postprocessing effects 24 april 2012 ivy bridge released introducing third generation intel hd graphics ivy bridge celeron pentium intel hd core i3 either hd 2500 hd 4000 hd graphics 2500 4000 include hardware video encoding hd postprocessing effects low-power mobile cpus limited video decoding support none desktop cpus limitation 12 september 2012 haswell cpus announced four models integrated gpus 128 mb edram iris pro gt3e package cpu separate die manufactured different process intel refers level 4 cache available cpu gpu naming crystalwell linux support edram expected kernel version 3.12 making codice_1 driver aware capable using integrated iris pro graphics adopted apple late-2013 15-inch macbook pro laptops retina display first time history series discrete graphics cards although low-end model also included late-2013 21.5-inch imac november 2013 announced broadwell-k desktop processors aimed enthusiasts also carry iris pro graphics following models integrated gpu announced broadwell processors skylake line processors launched august 2015 retires vga support supporting multi-monitor setups three monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp 1.3 interfaces following models integrated gpu available announced skylake processors new features speed increases support 4k uhd premium drm encoded streaming services media engine full hardware acceleration 8- 10-bit hevc vp9 decode new features hdcp 2.2 support new features hdmi 2.0 support vp9 10-bit profile2 hardware decoder new features 10 nm gen 11 gpu microarchitecture two hevc 10-bit encode pipelines three 4k display pipelines 2x 5k60 1x 4k120 variable rate shading vrs beginning sandy bridge graphics processors include form digital copy protection digital rights management drm called intel insider allows decryption protected media within processor previously similar technology called protected audio video path pavp intel quick sync video intel hardware video encoding decoding technology integrated intel cpus name quick sync refers use case quickly transcoding syncing video example dvd blu-ray disc format appropriate example smartphone quick sync introduced gen 6 sandy bridge microprocessors 9 january 2011 graphics virtualization technology announced supported iris pro gpus hd 2500 hd 4000 gpus ivy bridge cpus advertised supporting three active monitors many users found work due chipsets supporting two active monitors many common configurations reason chipsets include two phase-locked loops plls pll generates pixel clock certain frequency used sync timings data transferred gpu displays therefore three simultaneously active monitors achieved hardware configuration requires two unique pixel clocks asrock z87- h87-based motherboards support three displays simultaneously asus h87-based motherboards also advertised support three independent monitors opencl 2.1 2.2 possible software update opencl 2.0 hardware broadwell+ future software updates mesa support direct3d 9.3 implemented gallium3d-style drivers mesa intel driver intel developed dedicated sip core implements multiple video decompression compression algorithms branded intel quick sync video implemented completely partially intel releases programming manuals intel hd graphics devices via open source technology center allows various open source enthusiasts hackers contribute driver development port drivers various operating systems without need reverse engineering | [
3459,
5380,
3973,
11524,
9095,
5386,
9611,
4108,
398,
5649,
5523,
6804,
8851,
2838,
4886,
3352,
9111,
2594,
6818,
10658,
9126,
10669,
9391,
10548,
1461,
1083,
2237,
5309,
7998,
10173,
8514,
6339,
5444,
1614,
1998,
2638,
5073,
11221,
344,
... | Validation |
9,742 | 3 | AlphaServer:alphaserver alphaserver name given series server computers produced 1994 onwards digital equipment corporation later compaq hp name suggests alphaservers based dec alpha 64-bit microprocessor supported operating systems alphaservers tru64 unix formerly digital unix openvms meditech magic windows nt earlier systems alphabios arc firmware enthusiasts provided alternative operating systems linux netbsd openbsd freebsd alphaserver models rebadged white enclosures digital servers windows nt server market so-called white box models comprised following part roadmap phase alpha- mips- pa-risc-based systems favor itanium-based systems hp recent alphaserver systems reached end general availability 27 april 2007 availability upgrades options discontinued 25 april 2008 approximately one year systems discontinued support recent alphaserver systems ds15a ds25 es45 es47 es80 gs1280 provided hp services 2008 systems scheduled reach end support sometime 2012 although hp stated event may delayed approximate chronological order following alphaserver models produced alphaserver 2100 briefly sold digital 2100 alphaserver brand introduced alphaserver sc supercomputer constructed set individual ds20l es40 es45 servers called nodes mounted racks every node connected every node using quadrics elan3 interconnect systems designed used primarily high-performance technical computing alphaserver sc45 supercomputer still ranked 6 world late november 2004 alphaserver gs1280 originally supported maximum 16 microprocessors october 2003 number microprocessors supported increased 64 supported memory capacity doubled 8 gb per microprocessor | [
5384,
9353,
8976,
2452,
408,
8474,
8732,
6942,
799,
6451,
823,
7234,
3142,
8390,
1480,
6352,
11604,
3945,
10220,
8944,
5873,
499,
3445,
10104,
9723
] | None |
9,743 | 2 | Walnut_Creek_CDROM:walnut creek cdrom walnut creek cdrom walnut creek california early provider freeware shareware free software cd-roms company founded august 1991 bob bruce one first commercial distributors free software cd-roms company produced hundreds titles cd-roms ran busiest ftp site internet ftp.cdrom.com many years early years popular products simtel shareware ms-dos cica shareware microsoft windows sunny archives aminet archives amiga january 1994 published collection 350 texts project gutenberg one first published ebook collections walnut creek developed close relationship freebsd unix-like open source operating system project inception 1993 company published freebsd cd-rom distributed ftp employed freebsd project founders jordan hubbard david greenman ran freebsd servers sponsored freebsd conferences published freebsd books including complete freebsd 1997 freebsd walnut creek successful product according bruce 1995 onwards walnut creek also official publisher slackware linux walnut creek also gained fame codice_1 subdirectory de facto distribution center doom -engine modification community time users gained access high-speed internet connections demand software physical media decreased dramatically company merged berkeley software design inc. bsdi 2000 focus engineering effort similar freebsd bsd/os operating systems soon bsdi acquired telenet system solutions inc. internet infrastructure server supplier software assets bsdi freebsd slackware bsd/os acquired wind river systems 2001 remainder company renamed ixsystems wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity 2002 freebsd mall inc. ixsystems server business acquired 2002 offmyserver reverted ixsystems name 2005 february 2007 ixsystems acquired freebsd mall walnut creek cdrom url time redirected simtel.net page found simtel shut march 15 2013 | [
7552,
5506,
1927,
4745,
10761,
2061,
6797,
657,
5397,
8725,
5534,
1316,
10149,
684,
4908,
1839,
7983,
1718,
1080,
9151,
9153,
3522,
3651,
7364,
7748,
10436,
9927,
8395,
9166,
850,
6361,
9306,
10202,
3551,
607,
9320,
873,
9452,
633,
8316
] | Train |
9,744 | 4 | Public_key_certificate:public key certificate cryptography public key certificate also known digital certificate identity certificate electronic document used prove ownership public key certificate includes information key information identity owner called subject digital signature entity verified certificate contents called issuer signature valid software examining certificate trusts issuer use key communicate securely certificate subject email encryption code signing e-signature systems certificate subject typically person organization however transport layer security tls certificate subject typically computer device though tls certificates may identify organizations individuals addition core role identifying devices tls sometimes called older name secure sockets layer ssl notable part https protocol securely browsing web typical public-key infrastructure pki scheme certificate issuer certificate authority ca usually company charges customers issue certificates contrast web trust scheme individuals sign keys directly format performs similar function public key certificate common format public key certificates defined x.509 x.509 general format constrained profiles defined certain use cases public key infrastructure x.509 defined nowiki rfc 5280 /nowiki tls updated replacement ssl server required present certificate part initial connection setup client connecting server perform certification path validation algorithm primary hostname domain name website listed common name subject field certificate certificate may valid multiple hostnames multiple websites certificates commonly called subject alternative name san certificates unified communications certificates ucc certificates contain field subject alternative name though many cas also put subject common name field backward compatibility hostnames contain asterisk certificate may also called wildcard certificate tls server may configured self-signed certificate case clients generally unable verify certificate terminate connection unless certificate checking disabled per applications ssl certificates classified three types- client certificates less common server certificates used authenticate client connecting tls service instance provide access control services provide access individuals rather devices client certificates contain email address personal name rather hostname also authentication usually managed service provider client certificates usually issued public ca provides server certificates instead operator service requires client certificates usually operate internal ca issue client certificates supported many web browsers services use passwords cookies authenticate users instead client certificates client certificates common rpc systems used authenticate devices ensure authorized devices make certain rpc calls s/mime protocol secure email senders need discover public key use given recipient get information email certificate publicly trusted certificate authorities provide email certificates commonly s/mime used communicating within given organization organization runs ca trusted participants email system certificates also used validate signatures programs ensure tampered delivery certificate identifying individual typically electronic signature purposes commonly used europe eidas regulation standardizes requires recognition self-signed certificate used sign certificates also sometimes called trust anchor certificate used sign certificates intermediate certificate must signed another intermediate certificate root certificate certificate used sign certificates instance tls/ssl server client certificates email certificates code signing certificates qualified certificates end-entity certificates certificate subject matches issuer signature verified public key types certificate self-signed self-signed certificates also often called snake oil certificates emphasize untrustworthiness common fields certificates certificates contain number fields listed note terms certificate x.509 representation certificate flat contains fields nested various structures within certificate european union electronic signatures legal documents commonly performed using digital signatures accompanying identity certificates largely signatures granted enforceability handwritten signatures eidas eu regulation x.509 trust model certificate authority ca responsible signing certificates certificates act introduction two parties means ca acts trusted third party ca processes requests people organizations requesting certificates called subscribers verifies information potentially signs end-entity certificate based information perform role effectively ca needs one broadly trusted root certificates intermediate certificates corresponding private keys cas may achieve broad trust root certificates included popular software obtaining cross-signature another ca delegating trust cas trusted within relatively small community like business distributed mechanisms like windows group policy certificate authorities also responsible maintaining up-to-date revocation information certificates issued indicating whether certificates still valid provide information online certificate status protocol ocsp and/or certificate revocation lists crls major software contains list certificate authorities trusted default makes easier end-users validate certificates easier people organizations request certificates know certificate authorities issue certificate broadly trusted particularly important https web site operator generally wants get certificate trusted nearly potential visitors web site policies processes provider uses decide certificate authorities software trust called root programs influential root programs browsers firefox generally use operating system facilities decide certificate authorities trusted instance chrome windows trusts certificate authorities included microsoft root program macos ios chrome trusts certificate authorities apple root program edge safari use respective operating system trust stores well available single os firefox uses mozilla root program trust store platforms mozilla root program operated publicly certificate list part open source firefox web browser broadly used outside firefox instance common linux root program many linux distributions like debian include package periodically copies contents firefox trust list used applications root programs generally provide set valid purposes certificates include instance cas may considered trusted issuing tls server certificates code signing certificates indicated set trust bits root certificate storage system common use certificates https-based web sites web browser validates https web server authentic user feel secure his/her interaction web site eavesdroppers web site claims security important electronic commerce practice web site operator obtains certificate applying certificate authority certificate signing request certificate request electronic document contains web site name company information public key certificate provider signs request thus producing public certificate web browsing public certificate served web browser connects web site proves web browser provider believes issued certificate owner web site example user connects codice_1 browser browser give certificate warning message user theoretically sure interacting codice_1 equivalent interacting entity contact email address listed public registrar example.com even though email address may displayed anywhere web site surety kind implied relationship purchaser certificate operator web site generator web site content may tenuous guaranteed best certificate guarantees uniqueness web site provided web site compromised hacked certificate issuing process subverted certificate provider opt issue three types certificates requiring degree vetting rigor order increasing rigor naturally cost domain validation organization validation extended validation rigors loosely agreed upon voluntary participants ca/browser forum certificate provider issue domain validation dv class certificate purchaser purchaser demonstrate one vetting criterion right administratively manage domain name certificate provider issue organization validation ov class certificate purchaser purchaser meet two criteria right administratively manage domain name question perhaps organization actual existence legal entity certificate provider publishes ov vetting criteria certificate policy acquire extended validation ev certificate purchaser must persuade certificate provider legal identity including manual verification checks human ov certificates certificate provider publishes ev vetting criteria certificate policy browsers generally offer users visual indication legal identity site presents ev certificate browsers show legal name domain use bright green color highlight change way user see legal identity owner verified web browser give warning user web site suddenly presents different certificate even certificate lower number key bits even different provider even previous certificate expiry date far future however change ev certificate non-ev certificate apparent green bar longer displayed certificate providers jurisdiction governments governments may freedom order provider generate certificate purposes law enforcement subsidiary wholesale certificate providers also freedom generate certificate web browsers come extensive built-in list trusted root certificates many controlled organizations may unfamiliar user organizations free issue certificate web site guarantee web browsers include root certificates accept genuine instance end users must rely developer browser software manage built-in list certificates certificate providers behave correctly inform browser developer problematic certificates uncommon incidents fraudulent certificates issued cases browsers detected fraud others time passed browser developers removed certificates software list built-in certificates also limited provided browser developer users degree applications free extend list special purposes company intranets means someone gains access machine install new root certificate browser browser recognize websites use inserted certificate legitimate provable security reliance something external system consequence public key certification scheme rely special setup assumption existence certificate authority spite limitations described certificate-authenticated tls considered mandatory security guidelines whenever web site hosts confidential information performs material transactions practice spite weaknesses described web sites secured public key certificates still secure unsecured http // web sites national institute standards technology nist computer security division provides guidance documents public key certificates | [
513,
7683,
517,
9744,
9745,
5666,
2083,
2090,
9271,
7736,
3643,
10300,
62,
7231,
9281,
3657,
1098,
10831,
5200,
11345,
8283,
7264,
1125,
10341,
106,
115,
119,
2169,
3707,
10882,
5764,
1157,
138,
9356,
1683,
1688,
11418,
9884,
3742,
3231,
... | Validation |
9,745 | 4 | Smart_card:smart card smart card chip card integrated circuit card icc physical electronic authorization device used control access resource typically plastic credit card sized card embedded integrated circuit many smart cards include pattern metal contacts electrically connect internal chip others contactless smart cards provide personal identification authentication data storage application processing applications include identification financial mobile phones sim public transit computer security schools healthcare smart cards may provide strong security authentication single sign-on sso within organizations several nations deployed smart cards throughout populations 1968 1969 helmut gröttrup jürgen dethloff filled several patents around identification card 1974 roland moreno patented secured memory card later dubbed smart card 1976 jürgen dethloff introduced known element called secret identify gate user usp 4105156 1977 michel ugon honeywell bull invented first microprocessor smart card two chips one microprocessor one memory 1978 patented self-programmable one-chip microcomputer spom defines necessary architecture program chip three years later motorola used patent cp8 time bull 1,200 patents related smart cards 2001 bull sold cp8 division together patents schlumberger subsequently combined internal smart card department cp8 create axalto 2006 axalto gemplus time world top two smart-card manufacturers merged became gemalto 2008 dexa systems spun schlumberger acquired enterprise security services business included smart-card solutions division responsible deploying first large-scale smart-card management systems based public key infrastructure pki first mass use cards telephone card payment french payphones starting 1983 télécarte microchips integrated french carte bleue debit cards 1992 customers inserted card merchant point-of-sale pos terminal typed personal identification number pin transaction accepted limited transactions paying small highway tolls processed without pin smart-card-based electronic purse systems store funds card readers need network connectivity entered european service mid-1990s common germany geldkarte austria quick wertkarte belgium proton france moneo netherlands chipknip chipper decommissioned 2001 switzerland cash norway mondex spain monedero 4b sweden cash decommissioned 2004 finland avant uk mondex denmark danmønt portugal porta-moedas multibanco private electronic purse systems also deployed marines corps usmc parris island allowing small amount payments cafeteria since 1990s smart cards subscriber identity modules sims used gsm mobile-phone equipment mobile phones widely used across world smart cards become common europay mastercard visa emv -compliant cards equipment widespread deployment led european countries united states started later deploying emv technology 2014 deployment still progress 2018 typically country national payment association coordination mastercard international visa international american express japan credit bureau jcb jointly plan implement emv systems historically 1993 several international payment companies agreed develop smart-card specifications debit credit cards original brands mastercard visa europay first version emv system released 1994 1998 specifications became stable emvco maintains specifications emvco purpose assure various financial institutions retailers specifications retain backward compatibility 1998 version emvco upgraded specifications 2000 2004 emv compliant cards first accepted malaysia 2005 later united states 2014 mastercard first company allowed use technology united states united states felt pushed use technology increase identity theft credit card information stolen target late 2013 one largest indicators american credit card information safe target made decision april 30 2014 would try implement smart chip technology order protect future credit card identity theft 2014 consensus america enough security measures avoid credit card theft smart chip necessary cost smart chip technology significant corporations want pay united states debate came online credit theft insecure enough united states invest technology adaptation emv increased significantly 2015 liability shifts occurred october credit card companies contactless smart cards require physical contact card reader becoming popular payment ticketing typical uses include mass transit motorway tolls visa mastercard implemented version deployed 2004–2006 u.s. visa current offering called visa contactless contactless fare collection systems incompatible though mifare standard card nxp semiconductors considerable market share us europe use contactless smart cards transport also grown use low cost chips nxp mifare ultralight paper/card/pet rather pvc reduced media cost used low cost tickets short term transport passes 1 year typically cost typically 10 pvc smart card larger memory distributed vending machines ticket offices agents use paper/pet less harmful environment traditional pvc cards greenpeace confidex see also transport/transit/id applications smart cards also introduced identification entitlement regional national international organizations uses include citizen cards drivers ’ licenses patient cards malaysia compulsory national id mykad enables eight applications 18 million users contactless smart cards part icao biometric passports enhance security international travel smart card may following generic characteristics since april 2009 japanese company manufactured reusable financial smart cards made paper contact smart cards contact area approximately comprising several gold-plated contact pads pads provide electrical connectivity inserted reader used communications medium smart card host e.g. computer point sale terminal mobile telephone cards contain batteries power supplied card reader iso/iec 7810 iso/iec 7816 series standards define chips financial cards used subscriber identity modules sims mobile phones programmed differently embedded different piece pvc chip manufacturers building demanding gsm/3g standards example although emv standard allows chip card draw 50 terminal cards normally well telephone industry 6 limit allows smaller cheaper financial card terminals communication protocols contact smart cards include t=0 character-level transmission protocol defined iso/iec 7816-3 t=1 block-level transmission protocol defined iso/iec 7816-3 contactless smart cards communicate powered reader rf induction technology data rates 106–848 kbit/s cards require proximity antenna communicate like smart cards contacts contactless cards internal power source instead use inductor capture incident radio-frequency interrogation signal rectify use power card electronics contactless smart media made pvc paper/card pet finish meet different performance cost durability requirements apdu transmission contactless interface defined iso/iec 14443-4 hybrid cards implement contactless contact interfaces single card dedicated modules/storage processing dual-interface cards implement contactless contact interfaces single card shared storage processing example porto multi-application transport card called andante uses chip contact contactless iso/iec 14443 type b interfaces ccid chip card interface device usb protocol allows smart card connected computer using standard usb interface allows smart card used security token authentication data encryption bitlocker typical ccid usb dongle may contain sim smart cards serve credit atm cards fuel cards mobile phone sims authorization cards pay television household utility pre-payment cards high-security identification access badges public transport public phone payment cards smart cards may also used electronic wallets smart card chip loaded funds pay parking meters vending machines merchants cryptographic protocols protect exchange money smart card machine connection bank needed holder card may use even owner examples proton geldkarte chipknip moneo german geldkarte also used validate customer age vending machines cigarettes best known payment cards classic plastic card roll-outs started 2005 u.s. asia europe followed 2006 contactless non-pin transactions cover payment range 5–50 iso/iec 14443 paypass implementation paypass implementations conform emv non-emv cards work like magnetic stripe cards common u.s. paypass magstripe visa msd cards hold maintain account balance payment passes without pin usually off-line mode security transaction greater magnetic stripe card transaction emv cards either contact contactless interfaces work normal emv card contact interface via contactless interface work somewhat differently card commands enabled improved features lower power shorter transaction times subscriber identity modules used mobile-phone systems reduced-size smart cards using otherwise identical technologies smart-cards authenticate identity sometimes employ public key infrastructure pki card stores encrypted digital certificate issued pki provider along relevant information examples include u.s. department defense dod common access card cac cards used governments citizens include biometric identification data cards provide superior two- three-factor authentication smart cards always privacy-enhancing subject may carry incriminating information card contactless smart cards read within wallet even garment simplify authentication however criminals may access data cards cryptographic smart cards often used single sign-on advanced smart cards include specialized cryptographic hardware uses algorithms rsa digital signature algorithm dsa today cryptographic smart cards generate key pairs board avoid risk one copy key since design usually n't way extract private keys smart card smart cards mainly used digital signatures secure identification common way access cryptographic smart card functions computer use vendor-provided pkcs 11 library microsoft windows cryptographic service provider csp api also supported widely used cryptographic algorithms smart cards excluding gsm so-called crypto algorithm triple des rsa key set usually loaded des generated rsa card personalization stage smart cards also made support national institute standards technology nist standard personal identity verification fips 201 turkey implemented first smart card driver license system 1987 turkey high level road accidents decided develop use digital tachograph devices heavy vehicles instead existing mechanical ones reduce speed violations since 1987 professional driver licenses turkey issued smart cards professional driver required insert driver license digital tachograph starting drive tachograph unit records speed violations driver gives printed report driving hours driver also monitored reported 1990 european union conducted feasibility study bevac consulting engineers titled feasibility study respect european electronic drivers license based smart-card behalf directorate general vii study chapter seven describes turkey experience argentina mendoza province began using smart card driver licenses 1995 mendoza also high level road accidents driving offenses poor record recovering fines smart licenses hold up-to-date records driving offenses unpaid fines also store personal information license type number photograph emergency medical information blood type allergies biometrics fingerprints stored chip card holder wishes argentina government anticipates system help collect 10 million per year fines 1999 gujarat first indian state introduce smart card license system 2005 issued 5 million smart card driving licenses people 2002 estonian government started issue smart cards named id kaart primary identification citizens replace usual passport domestic eu use 2010 1 million smart cards issued total population 1.3 million widely used internet banking buying public transport tickets authorization various websites etc start 2009 entire population belgium issued eid cards used identification cards contain two certificates one authentication one signature signature legally enforceable services belgium use eid authorization spain started issuing national id cards dni form smart cards 2006 gradually replaced older ones smart cards idea many bureaucratic acts could done online failure administration adapt still mostly requires paper documents personal presence august 14 2012 id cards pakistan replaced smart card third generation chip-based identity document produced according international standards requirements card 36 physical security features latest encryption codes smart card replaced nicop id card overseas pakistani smart cards may identify emergency responders skills cards like allow first responders bypass organizational paperwork focus time emergency resolution 2004 smart card alliance expressed needs enhance security increase government efficiency reduce identity fraud protect personal privacy establishing mandatory government-wide standard secure reliable forms identification emergency response personnel carry cards positively identified emergency situations widepoint corporation smart card provider fema produces cards contain additional personal information medical records skill sets 2007 open mobile alliance oma proposed new standard defining v1.0 smart card web server scws http server embedded sim card intended smartphone user non-profit trade association simalliance promoting development adoption scws simalliance states scws offers end-users familiar os-independent browser-based interface secure personal sim data mid-2010 simalliance reported widespread industry acceptance scws. ref name= http //www.simalliance.org/en t=/documentmanager/sfdoc.file.supply fileid=1279268442341 /ref oma maintaining standard approving v1.1 standard may 2009 v1.2 expected approved october 2012 smart cards also used identify user accounts arcade machines smart cards used transit passes integrated ticketing used many public transit operators card users may also make small purchases using cards operators offer points usage exchanged retailers benefits examples include singapore cepas ontario presto card hong kong octopus card london oyster card ireland leap card brussels mobib québec opus card san francisco clipper card auckland hop brisbane go card perth smartrider sydney opal card victoria myki however present privacy risk allow mass transit operator government track individual movement finland example data protection ombudsman prohibited transport operator helsinki metropolitan area council ytv collecting information despite ytv argument card owner right list trips paid card earlier information used investigation myyrmanni bombing uk department transport mandated smart cards administer travel entitlements elderly disabled residents schemes let residents use cards bus passes also used taxi concessionary transport one example smartcare go scheme provided ecebs uk systems use itso ltd specification schemes uk include period travel passes carnets tickets day passes stored value used pay journeys concessions school pupils students job seekers also supported mostly based itso ltd specification many smart transport schemes include use low cost smart tickets simple journeys day passes visitor passes examples include glasgow spt subway smart tickets made paper pet thinner pvc smart card e.g confidex smart media smart tickets supplied pre-printed over-printed printed demand smart cards used security token mozilla firefox web browser use smart cards store certificates use secure web browsing disk encryption systems veracrypt microsoft bitlocker use smart cards securely hold encryption keys also add another layer encryption critical parts secured disk gnupg well known encryption suite also supports storing keys smart card smart cards also used single sign-on log computers smart cards provided students schools colleges uses include smart health cards improve security privacy patient information provide secure carrier portable medical records reduce health care fraud support new processes portable medical records provide secure access emergency medical information enable compliance government initiatives e.g. organ donation mandates provide platform implement applications needed health care organization smart cards widely used encrypt digital television streams videoguard specific example smart card security worked malaysian government promotes mykad single system smart-card applications mykad started identity cards carried citizens resident non-citizens available applications include identity travel documents drivers license health information electronic wallet atm bank-card public toll-road transit payments public key encryption infrastructure personal information inside mykad card read using special apdu commands smart cards advertised suitable personal identification tasks engineered tamper resistant chip usually implements cryptographic algorithm however several methods recovering algorithm internal state differential power analysis involves measuring precise time electric current required certain encryption decryption operations deduce on-chip private key used public key algorithms rsa implementations symmetric ciphers vulnerable timing power attacks well smart cards physically disassembled using acid abrasives solvents technique obtain unrestricted access on-board microprocessor although techniques may involve risk permanent damage chip permit much detailed information e.g. photomicrographs encryption hardware extracted benefits smart cards directly related volume information applications programmed use card single contact/contactless smart card programmed multiple banking credentials medical entitlement driver license/public transport entitlement loyalty programs club memberships name multi-factor proximity authentication embedded smart cards increase security services card example smart card programmed allow contactless transaction also within range another device like uniquely paired mobile phone significantly increase security smart card governments regional authorities save money improved security better data reduced processing costs savings help reduce public budgets enhance public services many examples uk many using common open lasseo specification individuals better security convenience using smart cards perform multiple services example need replace one card wallet lost stolen data storage card reduce duplication even provide emergency medical information first main advantage smart cards flexibility smart cards multiple functions simultaneously id credit card stored-value cash card repository personal information telephone numbers medical history card easily replaced lost requirement pin form security provides additional security unauthorised access information others first attempt use illegally card would deactivated card reader second main advantage security smart cards electronic key rings giving bearer ability access information physical places without need online connections encryption devices user encrypt decrypt information without relying unknown therefore potentially untrustworthy appliances atms smart cards flexible providing authentication different level bearer counterpart finally information user smart cards provide parties useful devices customizing products services general benefits smart cards smart cards used electronic commerce internet though business model used current electronic commerce applications still use full potential electronic medium advantage smart cards electronic commerce use customize services example order service supplier deliver customized service user may need provide supplier profile boring time-consuming activity smart card contain non-encrypted profile bearer user get customized services even without previous contacts supplier plastic paper card chip embedded fairly flexible larger chip higher probability normal use could damage cards often carried wallets pockets harsh environment chip antenna contactless cards pvc cards crack break bent/flexed excessively however large banking systems failure-management costs offset fraud reduction production use disposal pvc plastic known harmful environment plastics alternative materials including chlorine free plastics paper available smart applications account holder computer hosts malware smart card security model may broken malware override communication input via keyboard output via application screen user application man-in-the-browser malware e.g. trojan silentbanker could modify transaction unnoticed user banks like fortis belfius belgium rabobank netherlands combine smart card unconnected card reader avoid problem customer enters challenge received bank website pin transaction amount reader reader returns 8-digit signature signature manually entered personal computer verified bank preventing point-of-sale-malware changing transaction amount smart cards also targets security attacks attacks range physical invasion card electronics non-invasive attacks exploit weaknesses card software hardware usual goal expose private encryption keys read manipulate secure data funds attacker develops non-invasive attack particular smart card model typically able perform attack cards model seconds often using equipment disguised normal smart card reader manufacturers may develop new card models additional information security may costly inconvenient users upgrade vulnerable systems tamper-evident audit features smart card system help manage risks compromised cards another problem lack standards functionality security address problem berlin group launched eridane project propose new functional security framework smart-card based point interaction poi equipment | [
2050,
6150,
9744,
1054,
32,
4128,
9762,
4644,
7207,
3629,
10801,
6708,
1083,
6203,
9281,
7234,
4679,
10831,
10325,
11349,
91,
107,
7794,
8839,
10378,
4235,
6797,
11405,
4760,
2215,
2221,
2737,
2228,
10943,
7368,
8904,
6350,
10962,
225,
22... | None |
9,746 | 4 | Spybot_–_Search_&_Destroy:spybot – search amp destroy spybot – search destroy spyware adware removal computer program compatible microsoft windows free paid versions dating back first adwares 2000 spybot scans computer hard disk and/or ram malicious software spybot-s written german software engineer patrick michael kolla distributed kolla irish company safer-networking limited development began 2000 kolla still student wrote small program deal aureate/radiate conducent timesink programs two earliest examples adware spybot – search destroy released freeware personal users featureful versions available purchase corporate technician users buy commercial version paid versions contain anti-virus component uses bitdefender engine addition spyware adware detection disinfection spybot-s repair registry winsock lsps activex objects browser hijackers bhos pups http cookies trackerware heavy duty homepage hijackers keyloggers lsp tracks trojans spybots revision kinds malware also delete tracking cookies spybot-s immunize function block installation spyware occurs e.g modifying hosts file secure file deleter included spybot-s originally intended replace compliment anti-virus programs prior v. 2.1 spybot +av detect common trojans rootkits free-standing rootkit finder rootalyzer available programs supplied attached spyware adware refuse run present newer versions spybot replace spyware binaries inert dummies designed fool programs simply check presence spyware file order detect recently created programs efficiently detection updates released weekly improvements added languages better heuristic algorithms updates downloaded installed within software variety mirrors spybot-s available versions windows starting windows 95 supplied translated many languages several skins instructions available website enable users design skins technical support currently supplied means internet forums support e-mails usual response time 24 hours versions spybot-s awards including world class 2003 awards pc magazine editor choice pc user top buy 1 recommended zdnet wall street journal guardian msnbc cnn reviewers although pc magazine initially rated highly 2003 rating declined poor 2008 dismal 2012 improving fair 2014 newer versions program ver 2.2.25 ver 2.4 issued 2014 received 5/5 rating techradar 2018 techradar considered spybot among 4 best anti-malware software available version 1.5 better compatibility previous versions wine software allows running windows programs linux restores compatibility windows 95 faulty 1.4 version 1.6 said safer networking scan several times faster version 1.5 version 2.4 released july 2014 reported 2009 several commercial security products required users uninstall freely available spybot installed run due stated incompatibility memory-resident immunizer teatimer spybot real-time protection application makers spybot-s came conflict norton internet security compatibility issues 2006 symantec recommended uninstalling spybot-s installing norton internet security according safer networking satisfactory explanation provided decision antivirus professional mary landesman suggests possible explanation may stem graphical glitch teatimer module confirmation dialog official explanation safer networking stated error caused bug program used build code result bug users difficulty enabling norton internet security make necessary changes critical registry areas allowing launch computer startup aside mary landesman like safer networking concluded two programs issue one another bug fixed 1.5 release kaspersky anti-virus kaspersky internet security since version 2009 force users uninstall spybot installation process although serious incompatibility yet known discussion concluded kaspersky forum said install spybot kaspersky seems reluctant fix issue despite receiving several complaints incompatibility products might occur spybot tries modify hosts-file selected user immunization kaspersky interpret attempt harmfully manipulate file circumvented immunizing hosts-file spybot trend micro officescan followed norton kaspersky mcafee simply removing spybot without warning notification afterwards immunisation feature spybot – search destroy caused internet explorer 8 start slower expected fix kb969897 resolved problem addressing certain security vulnerabilities issued microsoft 2009 several malicious programs designed look like anti-malware software similar user interfaces program file names actually install spyware programs known rogue antispyware one program spywarebot program known rogue antispyware program fraudulently impersonates various anti-malware software including spybot search destroy however lookalike unlike spybot requires payment | [
8064,
5636,
10756,
6797,
10392,
7965,
9121,
2213,
5935,
7983,
823,
7098,
9791,
2005,
3163,
2783,
1632,
877,
10872,
127
] | None |
9,747 | 5 | MH_Message_Handling_System:mh message handling system mh message handling system free open source e-mail client different almost mail reading systems instead single program made several different programs designed work command line provided shell unix-like operating systems another difference rather storing multiple messages single file messages separate file special directory taken together design choices mean easy natural script actions mail messages using normal shell scripting tools descendant mh continues developed name nmh designed unix philosophy mind mh composed separate programs codice_1 view message codice_2 see message titles codice_3 remove messages using codice_4 program possible select messages based sender example programs act different programs run separately different times communication arranged specially information mail currently selected stored files case codice_5 file user mh directory tree mh proposed r. stockton gaines norman shapiro developed bruce s. borden others rand corporation initial version mh created 1979 subsequently development taken marshall t. rose john l. romine working university california irvine last release mh 6.8.4 maintenance patch 6.8.3 release mh public domain nmh new mh current active version mh forked version mh 6.8.3 richard coleman working georgia institute technology incorporates lbl changes made mh late 80s van jacobson mike karels craig leres recent release nmh 1.7.1 march 7th 2018. nmh released bsd license performance mh much dependent file system features operating system runs every read message require starting separate program directory scan large directory file open data even accessed hand mailbox formats mbox use single file often require insertion removal data middle file messages read altered slow procedure cases mh much faster maildir storage format made popular qmail courier mail server improves upon several features first shown mh separate file per message separate directory per mail folder exploitation hardlinks advanced filesystem features improved performance space time mh inherently command line based system graphical interface original program xmh x window system application development xmh ceased similar tool called exmh developed tcl/tk last updated january 7 2004 exmh considered feature-complete little development beyond bug fixes emacs interface mh also provided mh-e project addition dedicated mh clients support mh mailboxes included several clients claws mail novell evolution mutt sylpheed | [
1664,
9986,
3465,
10387,
5397,
11418,
9507,
9642,
7983,
11442,
1075,
1844,
2101,
9909,
3015,
10956,
6231,
7255,
3551,
9451,
10861,
9459,
3578,
8443,
7036
] | None |
9,748 | 9 | Next_Byte_Codes:next byte codes next byte codes nbc simple language assembly language syntax used program lego mindstorms nxt programmable bricks command line compiler outputs nxt compatible machine code supported windows mac os linux maintained john hansen mindstorms developer program member nbc compiler released mozilla public license integrated development environment ide bricx command center nbc debugger developed sorosydotcom downloaded freeware | [
219,
10964,
477,
5790
] | None |
9,749 | 9 | R._Kent_Dybvig:r. kent dybvig r. kent dybvig professor computer science indiana university bloomington bloomington indiana research focuses programming languages principal developer optimizing chez scheme compiler runtime system initially released 1985 together daniel p. friedman long advocated use scheme language teaching computer science professor emeritus retired indiana university iu join cisco 2011 contributions practical theoretical aspects computing information technology particular design development chez scheme association computing machinery acm named dybvig distinguished member 2006 first year association awarded distinguished ranks | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
6673,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
6767,
5751,
7805,
1159,
9865,
9877,
10395,
5803,
2225,
6834,
7867,
4799,
... | Test |
9,750 | 4 | Harold_T._Martin_III:harold t. martin iii harold thomas martin iii born november 1964 former contractor booz allen hamilton accused stealing approximately 50 terabytes data national security agency nsa investigators reportedly difficulty determining martin engaged conventional espionage digital hoarding public reporting indicated united states government agencies apparently failed note effectively respond number issues martin security practices behaviors period 10 20 years martin earned bachelor degree economics math university wisconsin-madison 1989 master degree information systems george mason university 2004 time arrest martin pursuing phd computing university maryland baltimore county research area virtual interfaces exploration heterogeneous cloud computing architectures martin previously worked computer sciences corp tenacity solutions martin worked national security agency 2012 2015 including spending time elite tailored access operations unit albeit support capacity martin previously served surface warfare officer united states navy serving 1987 2000 including aboard uss seattle awarded kuwait liberation medal moved united states navy reserve first received access classified data 2015 still booz allen hamilton contractor transferred department defense office acquisition technology logistics l attempting trace source shadow brokers leak summer 2016 federal bureau investigation fbi alerted nsa internet post made martin allegedly communicated via twitter account hal_999999999 martin used twitter contact russian-based kaspersky lab cyber-security firm turn alerted national security agency federal bureau investigations used information provided kaspersky researchers obtain search warrant martin residence subsequently according united states department justice fbi discovered thousands pages terabytes data classified information martin residence personal vehicle including classified computer code martin reported stolen classified information simply walking secure workplaces possession prosecutors stated stolen classified information includes names covert intelligence officers according indictment martin stole materials central intelligence agency national security agency united states cyber command united states department defense national reconnaissance office according prosecutors evidence martin actually accessed files stole martin charged united states department justice willful retention national defense information martin entered plea guilty october 2016 hearing united states district court district maryland magistrate judge a. david copperthite sided prosecution agreeing martin flight risk would released pending trial fbi failure provide martin miranda warning led u.s. district court judge richard bennett rendering many martin statements inadmissible martin defense attorneys argued suffered mental health issues hoarding symptom martin agreed plead guilty december 2017 scheduled occur january 22 2018 martin pled guilty according court memorandum opinion dated december 3 2018 martin trial date scheduled june 17 2019 march 17 2019 martin agreed plead guilty willful retention national defense information deal called nine years prison three years supervised release fine 250,000 july 19 2019 martin sentenced nine years prison | [
7809,
10119,
7887,
8726,
8671
] | Test |
9,751 | 9 | PL/P:pl/p pl/p programming language acronym programming language prime computers mid-level programming language developed prime computer serve second primary system programming language fortran iv pl/p subset pl/i additions primos operating system prime 50 series computers written mostly pl/p later years certain primos modules written fortran iv primos early years rewritten pl/p pl/p widespread compiled programming language used commercial primos applications outpacing use prime c compiler cpl primos scripting language fortran iv compiler commercial applications | [
4998,
8262,
6056,
6675,
8502,
4409,
2045
] | Train |
9,752 | 2 | HiOS_(mobile_operating_system):hios mobile operating system hios customized version android mobile operating system developed hong kong based mobile phone company tecno mobile allows wide range user customization without requiring rooting mobile device operating system also bundled utility applications allow users free memory freeze applications limit data accessibility applications among others devices itel also part hiosu | [
2045,
8262
] | None |
9,753 | 4 | Quantum_Byzantine_agreement:quantum byzantine agreement byzantine fault tolerant protocols algorithms robust arbitrary types failures distributed algorithms advent popularity internet need develop algorithms require centralized control guarantee always working correctly byzantine agreement protocol essential part task article quantum version byzantine protocol works constant time described byzantine agreement protocol protocol distributed computing takes name problem formulated lamport shostak pease 1982 reference historical problem byzantine army divided divisions division led general following properties see proof impossibility result problem usually equivalently restated form commanding general loyal lieutenants general either loyal traitor lieutenants following properties failures algorithm protocol categorized three main types byzantine resilient byzantine fault tolerant protocol algorithm algorithm robust kinds failures mentioned example given space shuttle multiple redundant processors processors give incorrect data processors sets processors believed solution formulated byzantine fault tolerant protocol sketch asynchronous algorithm algorithm works two phases two types coin flipping protocols generate random coin assign integer range 0 n-1 player player allowed choose random id player formula_17 selects random number formula_18 every player formula_19 distributes using verifiable secret sharing scheme end phase players agree secrets properly shared secrets opened player formula_11 assigned value formula_21 requires private information channels replace random secrets superposition formula_22 state encoded using quantum verifiable secret sharing protocol qvss distribute state formula_23 since bad players collapse state prevent bad players encode state using quantum verifiable secret sharing qvss send player share secret verification requires byzantine agreement replacing agreement grade-cast protocol enough grade-cast protocol following properties using definitions informally graded broadcast protocol protocol designated player called “ dealer ” one broadcasts protocol p said achieve graded broadcast beginning protocol designated player called dealer holds value v end protocol every player formula_19 outputs pair formula_25 following properties hold formula_26 formula_38 verification stage qvss protocol guarantees good dealer correct state encoded possibly faulty dealer particular state recovered recovery stage note purpose byzantine quantum coin flip protocol recovery stage much simpler player measures share qvss sends classical value players verification stage guarantees high probability presence formula_38 faulty players good players recover classical value value would result direct measurement encoded state 2007 quantum protocol byzantine agreement demonstrated experimentally using four-photon polarization-entangled state shows quantum implementation classical byzantine agreement protocols indeed feasible | [
11612,
7085
] | Test |
9,754 | 7 | Keynote_Systems:keynote systems keynote systems u.s. based company specialized developing marketing software service technology measure test improve end user perspective performance websites online content applications services across browsers networks mobile devices keynote provided independent testing measurement monitoring mobile content applications services real devices across multiple mobile operator networks keynote systems merged dynatrace june 2015 headquartered san mateo california employing 300 people company went public nasdaq september 24 1999 company internet mobile monitoring products services ran proprietary software measured online business performance viewpoint geographically dispersed user base company claimed corporate customers including american express bp caterpillar disney ebay e*trade expedia microsoft sony ericsson sprint t-mobile verizon vodafone keynote systems founded founded 1995 launched ‘ keynote perspective ’ 1996 launched business 40 internet performance index 1997 globalized internet-performance metrics 1997 secured 4.7 million equity financing keynote releases first ever internet multi-page transactional measurement service 1999. launched streaming perspective product 2000 2001 keynote added google business 40 internet performance index 2002 keynote internetweek ’ ‘ best breed ’ award keynotes named 13th fastest growing north american tech company keynote acquires xaffire ’ insight service suite 2003 company offered buy back 7.5 million shares 33 percent 71.3 million 2004 keynote introduces performance authority email alerts warn public internet threats 2005 keynote zandan announce product-development marketing partnership 2007 keynote joined russell 3000 index keynote ’ voice perspective service named one top 25 innovations 2007 voip news 2008 keynote systems acquires french mobile company zandan keynote launched web site performance index 2008 olympics keynotes introduces kite keynote internet testing environment keynote launched mite mobile internet testing environment – desktop based mobile testing keynote systems gold mobile star award mobile application testing 2009 keynote systems introduces mobile application perspective 3.0 – real time operational monitoring text messaging keynote mite wons jolt product excellence award keynote systems earned ‘ fire ’ ratings forrester keynote releases transaction perspective 9.0 – support monitoring interactive flash silverlight web applications 2011 keynote systems acquired deviceanywhere august 2013 private equity firm thoma bravo acquired keynote systems 395 million june 2015 keynote systems merged dynatrace latter john van siclen acting ceo company acquired 14 companies | [
170,
467,
10427
] | None |
9,755 | 2 | Message_Maps:message maps message maps microsoft foundation class library message map facility microsoft windows implements polymorphism window classes using messaging facility due large number messages involved providing separate virtual function windows message results prohibitively large vtable mfc provides alternative switch statement used traditional windows programs handle messages sent window mapping messages member-functions may defined message handled window appropriate member function called automatically message-map facility designed similar virtual functions additional benefits possible c++ virtual functions message maps maps user action appropriate mfc class functions handle mfc class handle message member ccmdtarget i.e hierarchically derived ccmdtarget advantage message map action mapped one mfc class function similar handling messages sdk application using wndproc callback functions mfc help oops concepts | [
11574,
6797,
10654
] | Test |
9,756 | 2 | GEOS_(8-bit_operating_system):geos 8-bit operating system geos graphic environment operating system operating system berkeley softworks later geoworks originally designed commodore 64 version released 1986 enhanced versions geos later became available 1987 commodore 128 1988 apple ii family computers lesser-known version also released commodore plus/4 geos closely resembles early versions classic mac os includes graphical word processor geowrite paint program geopaint december 1987 survey commodore-dedicated magazine compute gazette found nearly half readers used geos many years commodore bundled geos redesigned cost-reduced c64 c64c peak geos third-most-popular microcomputer operating system world terms units shipped trailing ms-dos mac os besides original commodore 64 kernal geos-compatible software packages available berkeley softworks third parties including reasonably sophisticated desktop publishing application called geopublish spreadsheet called geocalc geopublish sophisticated aldus pagemaker geocalc sophisticated microsoft excel packages provide reasonable functionality berkeley softworks founder brian dougherty claimed company ran business using software commodore 8-bit computers several years written group programmers geos design team jim defrisco dave durran michael farr doug fults chris hawley clayton jung tony requist led dougherty cut teeth limited-resource video game machines atari 2600 geos revered could accomplish machines 64–128 kb ram memory 1–2 mhz 8-bit processing power unlike many pieces proprietary software c64 c128 geos takes full advantage many add-ons improvements available systems commodore 1351 mouse supported geos various ram expansion units geos 128 also fully supports c128 640×200 high-resolution vdc display mode compatible rgb monitor c64 version geos incorporates built-in fast loader called diskturbo significantly increases speed drive access slow 1541 geos first commodore software could use floppy disk swap space virtual memory geos 128 take advantage c128 enhanced burst mode conjunction 1571 1581 drives commodore version geos uses copy protection scheme renders users disks unbootable detects disk illegally duplicated via berkeley special geocable interface converter third-party interfaces connect standard rs-232 centronics printers commodore serial bus geos supports wide variety printers including hp pcl printers apple laserwriter ability print high-end printers major factor making geos desktop publishing platform apple ii version geos released freeware august 2003 commodore 64/128 versions followed february 2004 latest geos desktop suite ibm pc compatibles breadbox ensemble revivals seen omnigo handhelds brother geobook line laptop-appliances newdeal office package pcs related code found way earlier zoomer pdas creating unclear lineage palm inc. later work nokia used geos base operating system nokia communicator series switching epoc symbian august 19 2016 michael steil posted blog source code geos 2.0 commodore c64 fully reverse-engineered cc65 compiler suite reverse-engineered source code made available github dozens official third-party applications products produced geos among important popular following | [
576,
2179,
5384,
8136,
9549,
9166,
7983,
6675,
11539,
4764
] | Test |
9,757 | 5 | Firefox_2:firefox 2 mozilla firefox 2 version firefox web browser released october 24 2006 mozilla corporation firefox 2 uses version 1.8 gecko layout engine displaying web pages release contained many new features found firefox 1.5 including improved support scalable vector graphics svg javascript 1.7 well user interface changes march 22 2006 first alpha version firefox 2 bon echo alpha 1 released featured gecko 1.8.1 first time mozilla firefox 2.0.0.x final version officially supported windows nt 4.0 windows 98 windows although run windows 95 windows nt 3.51 using tweaks mac os x 10.5 support added october 18 2007 version 2.0.0.8 firefox 2.0 featured updates tabbed browsing environment extensions manager gui find search software update engines new session restore feature inline spell checking anti-phishing feature implemented google extension later merged program mozilla ended support firefox 2 december 18 2008 one article noted release firefox 2.0 october 2006 ie6 lion share browser market 77.22 internet explorer 7 climbed 3.18 firefox 2.0 0.69 softpedia article however noted july 2007 firefox 2.0 also expanding share constantly spite ie7 0.69 october 2006 firefox 2.0 accounting 11.07 market mozilla even sacrificed version 1.5 open source browser firefox 2.0 support cut end june firefox 1.5 dropped 2.85 firefox 2 began lose notable market share firefox 3 within 24 hours release firefox 3 usage rose 1 3 according net applications time period firefox 2 market share consistently dropped eventually surpassed firefox 3 2008 firefox 3.5 2009 general browser market firefox version greatest share early 2009 dropped 3 percent firefox 2.x end-of-lifed december 2008 roughly 26 months support firefox 3.6 supported longer gecko 1.8.1 browser core continued receive patches projects camino k-meleon seamonkey even official firefox releases ceased 2011 1.8.1 core become obsolete major websites dropped support employing newer technologies presentation complex scripting latter resource-intensive older core users stuck use noscript avoid problems scripts take long process cost losing site features beyond basic functionality services large user bases relegated browsers gecko 1.8.1 rendering engine using lightweight mobile versions sites alongside recommendations upgrade browser others recommend upgrade nevertheless still large number websites freely usable navigable firefox 2.0 equivalents alone many must still support older browsers like internet explorer 6 ie7 | [
6657,
9736,
2579,
6171,
7713,
3110,
10791,
9770,
559,
9780,
4661,
3639,
9275,
64,
9281,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
10860,
4722,
115,
9843,
3191,
119,
4728,
10872,
637,
1664,
641,
6791,
6797,
2196,
11418,
10910,
8351,
7340,... | Test |
9,758 | 4 | Sparrowiq:sparrowiq sparrowiq packet-based traffic analysis network performance monitoring solution provides network managers near real-time traffic visibility network usage based conversations applications users class service product developed solana networks ottawa ontario canada allow smaller businesses gain access flow-based network traffic monitoring solutions normally complex unaffordable sparrowiq awarded best new product ascii group june 2015 strong value award enterprise management associates 2013 sparrowiq key features | [] | Test |
9,759 | 2 | VAXELN:vaxeln vaxeln discontinued real-time operating system vax family computers produced digital equipment corporation dec maynard massachusetts rsx-11 vms dave cutler principal force behind development operating system cutler team developed product moving seattle washington area form decwest engineering group dec first engineering group outside new england initial target platforms vaxeln backplane interconnect computers model code-named scorpio time vax microcomputers vaxeln well way cutler spearheaded next project microvax -- first vax microcomputer although low-volume product compared new england-developed microvax ii microvax demonstrated set architectural decisions needed support single-board implementation vax computer family also provided platform embedded applications written vaxeln vaxeln team made decision first release use pascal language system programming language languages including c supported later releases system small focused development team built first product approximately 18 months vaxeln allowed developer write self-contained embedded system application would run vax later microvax hardware operating system present system debuted las vegas early 1980s variety amusing applications written development team ranging system composed played minuets robotic system played solved tower hanoi puzzle system originally supposed named elan executive local area network dec discovered last minute trademarked european country dec wished conduct business company holding trademark elan slovenian sports equipment manufacturer elan order avoid litigation dec quickly renamed vaxeln dropping much disgruntlement developers documentation marketing material already printed referring product elan samples posters prized many years members original team | [
1804,
273,
9366,
7076,
8876,
7983,
6448,
6837,
6846,
3650,
8262,
2507,
8524,
11604,
10590,
1253,
10475,
5363,
2045
] | Test |
9,760 | 2 | Soyombo_Linux:soyombo linux soyombo project based mongolian republic aimed create mongolian language distribution linux full support writing mongolian cyrillic traditional scripts mongolian including soyombo script clear script classical mongolian script discontinued | [
823
] | None |
9,761 | 4 | Mahdi_(malware):mahdi malware mahdi computer malware initially discovered february 2012 reported july year according kaspersky lab seculert israeli security firm discovered malware software used targeted cyber espionage since december 2011 infecting least 800 computers iran middle eastern countries mahdi named files used malware refers muslim figure | [
1024,
3072,
5636,
10245,
10756,
9233,
4117,
8726,
535,
4644,
4133,
9256,
3116,
3643,
7739,
9791,
1088,
4165,
1608,
3657,
8779,
4703,
8288,
8292,
107,
10875,
5245,
3711,
8320,
7809,
6786,
5764,
2187,
9356,
4240,
150,
1688,
10392,
1690,
271... | None |
9,762 | 6 | File_system:file system computing file system filesystem often abbreviated fs controls data stored retrieved without file system information placed storage medium would one large body data way tell one piece information stops next begins separating data pieces giving piece name information easily isolated identified taking name way paper-based information systems named group data called file structure logic rules used manage groups information names called file system many different kinds file systems one different structure logic properties speed flexibility security size file systems designed used specific applications example iso 9660 file system designed specifically optical discs file systems used numerous different types storage devices use different kinds media 2019 hard disk drives key storage devices projected remain foreseeable future kinds media used include ssds magnetic tapes optical discs cases tmpfs computer main memory random-access memory ram used create temporary file system short-term use file systems used local data storage devices others provide file access via network protocol example nfs smb 9p clients file systems virtual meaning supplied files called virtual files computed request procfs sysfs merely mapping different file system used backing store file system manages access content files metadata files responsible arranging storage space reliability efficiency tuning regard physical storage medium important design considerations advent computers term file system used describe method storing retrieving paper documents 1961 term applied computerized filing alongside original meaning 1964 general use file system consists two three layers sometimes layers explicitly separated sometimes functions combined logical file system responsible interaction user application provides application program interface api file operations — codice_1 codice_2 codice_3 etc. passes requested operation layer processing logical file system manage open file table entries per-process file descriptors layer provides file access directory operations security protection second optional layer virtual file system interface allows support multiple concurrent instances physical file systems called file system implementation third layer physical file system layer concerned physical operation storage device e.g disk processes physical blocks read written handles buffering memory management responsible physical placement blocks specific locations storage medium physical file system interacts device drivers channel drive storage device note applies file systems used storage devices file systems allocate space granular manner usually multiple physical units device file system responsible organizing files directories keeping track areas media belong file used example apple dos early 1980s 256-byte sectors 140 kilobyte floppy disk used track/sector map results unused space file exact multiple allocation unit sometimes referred slack space 512-byte allocation average unused space 256 bytes 64 kb clusters average unused space 32 kb size allocation unit chosen file system created choosing allocation size based average size files expected file system minimize amount unusable space frequently default allocation may provide reasonable usage choosing allocation size small results excessive overhead file system contain mostly large files file system fragmentation occurs unused space single files contiguous file system used files created modified deleted file created file system allocates space data file systems permit require specifying initial space allocation subsequent incremental allocations file grows files deleted space allocated eventually considered available use files creates alternating used unused areas various sizes free space fragmentation file created area contiguous space available initial allocation space must assigned fragments file modified becomes larger may exceed space initially allocated another allocation must assigned elsewhere file becomes fragmented operating systems system administrator may use disk quotas limit allocation disk space filename file name used identify storage location file system file systems restrictions length filenames file systems filenames case sensitive i.e. names codice_4 codice_5 refer file others filenames case sensitive i.e. names codice_4 codice_7 codice_5 refer three separate files modern file systems allow filenames contain wide range characters unicode character set however may restrictions use certain special characters disallowing within filenames characters might used indicate device device type directory prefix file path separator file type file systems typically directories also called folders allow user group files separate collections may implemented associating file name index table contents inode unix-like file system directory structures may flat i.e linear allow hierarchies directories may contain subdirectories first file system support arbitrary hierarchies directories used multics operating system native file systems unix-like systems also support arbitrary directory hierarchies example apple hierarchical file system successor hfs+ classic mac os fat file system ms-dos 2.0 later versions ms-dos microsoft windows ntfs file system windows nt family operating systems ods-2 on-disk structure-2 higher levels files-11 file system openvms bookkeeping information typically associated file within file system length data contained file may stored number blocks allocated file byte count time file last modified may stored file timestamp file systems might store file creation time time last accessed time file metadata changed time file last backed information include file device type e.g block character socket subdirectory etc owner user id group id access permissions file attributes e.g whether file read-only executable etc. file system stores metadata associated file—including file name length contents file location file folder hierarchy—separate contents file file systems store names files one directory one place—the directory table directory—which often stored like file many file systems put metadata file directory table rest metadata file completely separate structure inode file systems also store metadata associated one particular file metadata includes information unused regions—free space bitmap block availability map—and information bad sectors often information allocation group stored inside allocation group additional attributes associated file systems ntfs xfs ext2 ext3 versions ufs hfs+ using extended file attributes file systems provide user defined attributes author document character encoding document size image file systems allow different data collections associated one file name separate collections may referred streams forks apple long used forked file system macintosh microsoft supports streams ntfs file systems maintain multiple past revisions file single file name filename retrieves recent version prior saved version accessed using special naming convention filename 4 filename -4 access version four saves ago see comparison file systems metadata details file systems support kinds metadata cases file system may make use storage device used organize represent access data whether stored dynamically generated e.g procfs file systems include utilities initialize alter parameters remove instance file system include ability extend truncate space allocated file system directory utilities may used create rename delete directory entries also known dentries singular dentry alter metadata associated directory directory utilities may also include capabilities create additional links directory hard links unix rename parent links .. unix-like operating systems create bidirectional links files file utilities create list copy move delete files alter metadata may able truncate data truncate extend space allocation append move modify files in-place depending underlying structure file system may provide mechanism prepend truncate beginning file insert entries middle file delete entries file utilities free space deleted files file system provides undelete function also belong category file systems defer operations reorganization free space secure erasing free space rebuilding hierarchical structures providing utilities perform functions times minimal activity example file system defragmentation utilities important features file system utilities involve supervisory activities may involve bypassing ownership direct access underlying device include high-performance backup recovery data replication reorganization various data structures allocation tables within file system several mechanisms used file systems control access data usually intent prevent reading modifying files user group users another reason ensure data modified controlled way access may restricted specific program examples include passwords stored metadata file elsewhere file permissions form permission bits access control lists capabilities need file system utilities able access data media level reorganize structures provide efficient backup usually means effective polite users effective intruders methods encrypting file data sometimes included file system effective since need file system utilities know encryption seed effectively manage data risks relying encryption include fact attacker copy data use brute force decrypt data losing seed means losing data one significant responsibility file system ensure regardless actions programs accessing data structure remains consistent includes actions taken program modifying data terminates abnormally neglects inform file system completed activities may include updating metadata directory entry handling data buffered yet updated physical storage media failures file system must deal include media failures loss connection remote systems event operating system failure soft power failure special routines file system must invoked similar individual program fails file system must also able correct damaged structures may occur result operating system failure os unable notify file system power failure reset file system must also record events allow analysis systemic issues well problems specific files directories important purpose file system manage user data includes storing retrieving updating data file systems accept data storage stream bytes collected stored manner efficient media program retrieves data specifies size memory buffer file system transfers data media buffer runtime library routine may sometimes allow user program define record based library call specifying length user program reads data library retrieves data via file system returns record file systems allow specification fixed record length used writes reads facilitates locating n record well updating records identification record also known key makes sophisticated file system user program read write update records without regard location requires complicated management blocks media usually separating key blocks data blocks efficient algorithms developed pyramid structure locating records utilities language specific run-time libraries user programs use file system apis make requests file system include data transfer positioning updating metadata managing directories managing access specifications removal frequently retail systems configured single file system occupying entire storage device another approach partition disk several file systems different attributes used one file system use browser cache might configured small allocation size additional advantage keeping frantic activity creating deleting files typical browser activity narrow area disk interfering allocations files similar partition might created email another partition file system might created storage audio video files relatively large allocation one file systems may normally set read-only periodically set writable third approach mostly used cloud systems use disk images house additional file systems attributes within another host file system file common example virtualization one user run experimental linux distribution using ext4 file system virtual machine his/her production windows environment using ntfs ext4 file system resides disk image treated file multiple files depending hypervisor settings ntfs host file system multiple file systems single system additional benefit event corruption single partition remaining file systems frequently still intact includes virus destruction system partition even system boot file system utilities require dedicated access effectively completed piecemeal addition defragmentation may effective several system maintenance utilities virus scans backups also processed segments example necessary backup file system containing videos along files none added since last backup image files one easily spin differential images contain new data written master original image differential images used safety concerns disposable system quickly restored destroyed contaminated virus old image removed new image created matter seconds even without automated procedures quick virtual machine deployment since differential images quickly spawned using script batches file systems functional limit defines maximum storable data capacity within system functional limits best-guess effort designer based large storage systems right large storage systems likely become future disk storage continued increase near exponential rates see moore law years file systems kept reaching design limitations require computer users repeatedly move newer system ever-greater capacity file system complexity typically varies proportionally available storage capacity file systems early 1980s home computers 50 kb 512 kb storage would reasonable choice modern storage systems hundreds gigabytes capacity likewise modern file systems would reasonable choice early systems since complexity modern file system structures would quickly consume even exceed limited capacity early storage systems file system types classified disk/tape file systems network file systems special-purpose file systems disk file system takes advantages ability disk storage media randomly address data short amount time additional considerations include speed accessing data following initially requested anticipation following data may also requested permits multiple users processes access various data disk without regard sequential location data examples include fat fat12 fat16 fat32 exfat ntfs hfs hfs+ hpfs apfs ufs ext2 ext3 ext4 xfs btrfs iso 9660 files-11 veritas file system vmfs zfs reiserfs udf disk file systems journaling file systems versioning file systems iso 9660 universal disk format udf two common formats target compact discs dvds blu-ray discs mount rainier extension udf supported since 2.6 series linux kernel since windows vista facilitates rewriting dvds flash file system considers special abilities performance restrictions flash memory devices frequently disk file system use flash memory device underlying storage media much better use file system specifically designed flash device tape file system file system tape format designed store files tape self-describing form magnetic tapes sequential storage media significantly longer random data access times disks posing challenges creation efficient management general-purpose file system disk file system typically master file directory map used free data regions file additions changes removals require updating directory used/free maps random access data regions measured milliseconds system works well disks tape requires linear motion wind unwind potentially long reels media tape motion may take several seconds several minutes move read/write head one end tape consequently master file directory usage map extremely slow inefficient tape writing typically involves reading block usage map find free blocks writing updating usage map directory add data advancing tape write data correct spot additional file write requires updating map directory writing data may take several seconds occur file tape file systems instead typically allow file directory spread across tape intermixed data referred streaming time-consuming repeated tape motions required write new data however side effect design reading file directory tape usually requires scanning entire tape read scattered directory entries data archiving software works tape storage store local copy tape catalog disk file system adding files tape done quickly without rescan tape media local tape catalog copy usually discarded used specified period time point tape must re-scanned used future ibm developed file system tape called linear tape file system ibm implementation file system released open-source ibm linear tape file system — single drive edition ltfs-sde product linear tape file system uses separate partition tape record index meta-data thereby avoiding problems associated scattering directory entries across entire tape writing data tape erasing formatting tape often significantly time-consuming process take several hours large tapes many data tape technologies necessary format tape over-writing new data tape due inherently destructive nature overwriting data sequential media time take format tape typically tapes pre-formatted tape user need spend time preparing new tape use usually necessary write identifying media label tape use even automatically written software new tape used first time another concept file management idea database-based file system instead addition hierarchical structured management files identified characteristics like type file topic author similar rich metadata ibm db2 formerly known db2/400 db2 i5/os database file system part object based ibm operating system formerly known os/400 i5/os incorporating single level store running ibm power systems formerly known as/400 iseries designed frank g. soltis ibm former chief scientist ibm around 1978 1988 frank g. soltis team ibm rochester successfully designed applied technologies like database file system others like microsoft later failed accomplish technologies informally known 'fortress rochester basic aspects extended early mainframe technologies many ways advanced technological perspective projects n't pure database file systems use aspects database file system programs need either make multiple file system changes one changes fail reason make none changes example program installing updating software may write executables libraries and/or configuration files writing fails software left partially installed updated software may broken unusable incomplete update key system utility command shell may leave entire system unusable state transaction processing introduces atomicity guarantee ensuring operations inside transaction either committed transaction aborted system discards partial results means crash power failure recovery stored state consistent either software completely installed failed installation completely rolled back unusable partial install left system transactions also provide isolation guarantee meaning operations within transaction hidden threads system transaction commits interfering operations system properly serialized transaction windows beginning vista added transaction support ntfs feature called transactional ntfs use discouraged number research prototypes transactional file systems unix systems including valor file system amino lfs transactional ext3 file system txos kernel well transactional file systems targeting embedded systems tffs ensuring consistency across multiple file system operations difficult impossible without file system transactions file locking used concurrency control mechanism individual files typically protect directory structure file metadata instance file locking prevent tocttou race conditions symbolic links file locking also automatically roll back failed operation software upgrade requires atomicity journaling file systems one technique used introduce transaction-level consistency file system structures journal transactions exposed programs part os api used internally ensure consistency granularity single system call data backup systems typically provide support direct backup data stored transactional manner makes recovery reliable consistent data sets difficult backup software simply notes files changed since certain time regardless transactional state shared across multiple files overall dataset workaround database systems simply produce archived state file containing data point backup software backs interact directly active transactional databases recovery requires separate recreation database state file file restored backup software network file system file system acts client remote file access protocol providing access files server programs using local interfaces transparently create manage access hierarchical directories files remote network-connected computers examples network file systems include clients nfs afs smb protocols file-system-like clients ftp webdav shared disk file system one number machines usually servers access external disk subsystem usually san file system arbitrates access subsystem preventing write collisions examples include gfs2 red hat gpfs ibm sfs dataplow cxfs sgi stornext quantum corporation special file system presents non-file elements operating system files acted using file system apis commonly done unix-like operating systems devices given file names non-unix-like operating systems well device file system represents i/o devices pseudo-devices files called device files examples unix-like systems include devfs linux 2.6 systems udev non-unix-like systems tops-10 operating systems influenced full filename pathname file include device prefix devices containing file systems referred device prefix specifying device without anything following 1970s disk digital tape devices expensive early microcomputer users inexpensive basic data storage system devised used common audio cassette tape system needed write data user notified press record cassette recorder press return keyboard notify system cassette recorder recording system wrote sound provide time synchronization modulated sounds encoded prefix data checksum suffix system needed read data user instructed press play cassette recorder system would listen sounds tape waiting burst sound could recognized synchronization system would interpret subsequent sounds data data read complete system would notify user press stop cassette recorder primitive worked lot time data stored sequentially usually unnamed format although systems commodore pet series computers allow files named multiple sets data could written located fast-forwarding tape observing tape counter find approximate start next data region tape user might listen sounds find right spot begin playing next data region implementations even included audible sounds interspersed data flat file system subdirectories directory entries files stored single directory floppy disk media first available type file system adequate due relatively small amount data space available cp/m machines featured flat file system files could assigned one 16 user areas generic file operations narrowed work one instead defaulting work user areas special attributes associated files necessary define specific quota areas files could added groups long still free storage space disk early apple macintosh also featured flat file system macintosh file system unusual file management program macintosh finder created illusion partially hierarchical filing system top emfs structure required every file unique name even appeared separate folder ibm dos/360 os/360 store entries files disk pack volume directory pack called volume table contents vtoc simple flat file systems become awkward number files grows makes difficult organize data related groups files recent addition flat file system family amazon s3 remote storage service intentionally simplistic allow users ability customize data stored constructs buckets imagine disk drive unlimited size objects similar identical standard concept file advanced file management allowed able use nearly character including '/ object name ability select subsets bucket content based identical prefixes many operating systems include support one file system sometimes os file system tightly interwoven difficult separate file system functions needs interface provided operating system software user file system interface textual provided command line interface unix shell openvms dcl graphical provided graphical user interface file browsers graphical metaphor folder containing documents files nested folders often used see also directory folder unix-like operating systems create virtual file system makes files devices appear exist single hierarchy means systems one root directory every file existing system located somewhere unix-like systems use ram disk network shared resource root directory unix-like systems assign device name device files device accessed instead gain access files another device operating system must first informed directory tree files appear process called mounting file system example access files cd-rom one must tell operating system take file system cd-rom make appear such-and-such directory directory given operating system called mount point – might example /media /media directory exists many unix systems specified filesystem hierarchy standard intended specifically use mount point removable media cds dvds usb drives floppy disks may empty may contain subdirectories mounting individual devices generally administrator i.e root user may authorize mounting file systems unix-like operating systems often include software tools assist mounting process provide new functionality strategies coined auto-mounting reflection purpose linux supports numerous file systems common choices system disk block device include ext* family ext2 ext3 ext4 xfs jfs btrfs raw flash without flash translation layer ftl memory technology device mtd ubifs jffs2 yaffs among others squashfs common compressed read-only file system solaris earlier releases defaulted non-journaled non-logging ufs bootable supplementary file systems solaris defaulted supported extended ufs support file systems significant enhancements added time including veritas software corp. journaling vxfs sun microsystems clustering qfs sun microsystems journaling ufs sun microsystems open source poolable 128 bit compressible error-correcting zfs kernel extensions added solaris allow bootable veritas vxfs operation logging journaling added ufs sun solaris 7 releases solaris 10 solaris express opensolaris open source variants solaris operating system later supported bootable zfs logical volume management allows spanning file system across multiple devices purpose adding redundancy capacity and/or throughput legacy environments solaris may use solaris volume manager formerly known solstice disksuite multiple operating systems including solaris may use veritas volume manager modern solaris based operating systems eclipse need volume management leveraging virtual storage pools zfs macos formerly mac os x uses apple file system apfs recently replaced file system inherited classic mac os called hfs plus hfs+ apple also uses term mac os extended hfs+ hfs plus metadata-rich case-preserving usually case-insensitive file system due unix roots macos unix permissions added hfs plus later versions hfs plus added journaling prevent corruption file system structure introduced number optimizations allocation algorithms attempt defragment files automatically without requiring external defragmenter filenames 255 characters hfs plus uses unicode store filenames macos filetype come type code stored file metadata filename extension hfs plus three kinds links unix-style hard links unix-style symbolic links aliases aliases designed maintain link original file even moved renamed interpreted file system file manager code userland macos 10.13 high sierra announced june 5 2017 apple wwdc event uses apple file system solid-state drives macos also supported ufs file system derived bsd unix fast file system via nextstep however mac os x leopard macos could longer installed ufs volume pre-leopard system installed ufs volume upgraded leopard mac os x lion ufs support completely dropped newer versions macos capable reading writing legacy fat file systems 16 32 common windows also capable reading newer ntfs file systems windows order write ntfs file systems macos versions prior mac os x snow leopard third party software necessary mac os x 10.6 snow leopard later allow writing ntfs file systems non-trivial system setting change third party software exists automates finally macos supports reading writing exfat file system since mac os x snow leopard starting version 10.6.5 os/2 1.2 introduced high performance file system hpfs hpfs supports mixed case file names different code pages long file names 255 characters efficient use disk space architecture keeps related items close disk volume less fragmentation data extent-based space allocation b+ tree structure directories root directory located midpoint disk faster average access journaled filesystem jfs shipped 1999 pc-bsd desktop version freebsd inherits freebsd zfs support similarly freenas new graphical installer pc-bsd handle root zfs raid-z pool installs disk encryption using geli right start easy convenient gui way current pc-bsd 9.0+ 'isotope edition zfs filesystem version 5 zfs storage pool version 28 plan 9 bell labs treats everything file accesses objects file would accessed i.e. ioctl mmap networking graphics debugging authentication capabilities encryption services accessed via i/o operations file descriptors 9p protocol removes difference local remote files file systems plan 9 organized help private per-process namespaces allowing process different view many file systems provide resources distributed system inferno operating system shares concepts plan 9 windows makes use fat ntfs exfat live file system refs file systems last supported usable windows server 2012 windows server 2016 windows 8 windows 8.1 windows 10 windows boot windows uses drive letter abstraction user level distinguish one disk partition another example path c \windows represents directory windows partition represented letter c. drive c commonly used primary hard disk drive partition windows usually installed boots tradition become firmly ingrained bugs exist many applications make assumptions drive operating system installed c. use drive letters tradition using c drive letter primary hard disk drive partition traced ms-dos letters b reserved two floppy disk drives turn derived cp/m 1970s ultimately ibm cp/cms 1967 family fat file systems supported almost operating systems personal computers including versions windows ms-dos/pc dos os/2 dr-dos pc dos oem version ms-dos ms-dos originally based scp 86-dos dr-dos based digital research concurrent dos successor cp/m-86 fat file systems therefore well-suited universal exchange format computers devices type age fat file system traces roots back incompatible 8-bit fat precursor standalone disk basic short-lived mdos/midas project years file system expanded fat12 fat16 fat32 various features added file system including subdirectories codepage support extended attributes long filenames third parties digital research incorporated optional support deletion tracking volume/directory/file-based multi-user security schemes support file directory passwords permissions read/write/execute/delete access rights extensions supported windows fat12 fat16 file systems limit number entries root directory file system restrictions maximum size fat-formatted disks partitions fat32 addresses limitations fat12 fat16 except file size limit close 4 gb remains limited compared ntfs fat12 fat16 fat32 also limit eight characters file name three characters extension .exe commonly referred 8.3 filename limit vfat optional extension fat12 fat16 fat32 introduced windows 95 windows nt 3.5 allowed long file names lfn stored fat file system backwards compatible fashion ntfs introduced windows nt operating system 1993 allowed acl-based permission control features also supported ntfs include hard links multiple file streams attribute indexing quota tracking sparse files encryption compression reparse points directories working mount-points file systems symlinks junctions remote storage links exfat proprietary patent-protected file system certain advantages ntfs regard file system overhead exfat backward compatible fat file systems fat12 fat16 fat32 file system supported newer windows systems windows server 2003 windows vista windows 2008 windows 7 windows 8 recently support added windows xp exfat supported macos starting version 10.6.5 snow leopard support operating systems sparse since microsoft published specifications file system implementing support exfat requires license exfat file system fully supported macos windows hold files larger 4 gb prior introduction vsam os/360 systems implemented unusual hybrid file system system designed easily support removable disk packs information relating files one disk volume ibm terminology stored disk flat system file called volume table contents vtoc vtoc stores metadata file later hierarchical directory structure imposed introduction system catalog optionally catalog files datasets resident removable volumes catalog contains information relate dataset specific volume user requests access dataset offline volume suitable privileges system attempt mount required volume cataloged non-cataloged datasets still accessed using information vtoc bypassing catalog required volume id provided open request still later vtoc indexed speed access ibm conversational monitor system cms component vm/370 uses separate flat file system virtual disk minidisk file data control information scattered intermixed anchor record called master file directory mfd always located fourth block disk originally cms used fixed-length 800-byte blocks later versions used larger size blocks 4k access data record requires two levels indirection file directory entry called file status table fst entry points blocks containing list addresses individual records data as/400 successors consists system objects mapped system virtual address space single-level store many types as/400 objects defined including directories files found file systems file objects along types objects form basis as/400 support integrated relational database may advantageous necessary files different file system currently exist reasons include need increase space requirements beyond limits current file system depth path may need increased beyond restrictions file system may performance reliability considerations providing access another operating system support existing file system another reason cases conversion done in-place although migrating file system conservative involves creating copy data recommended windows fat fat32 file systems converted ntfs via convert.exe utility reverse linux ext2 converted ext3 converted back ext3 converted ext4 back ext3 ext4 converted btrfs converted back undo information deleted conversions possible due using format file data relocating metadata empty space cases using sparse file support migration disadvantage requiring additional space although may faster best case unused space media contain final file system example migrate fat32 file system ext2 file system first create new ext2 file system copy data file system delete fat32 file system alternative sufficient space retain original file system new one created use work area removable media takes longer backup data nice side effect hierarchical file systems files accessed means path branching list directories containing file different file systems different limits depth path file systems also limit length individual filename copying files long names located paths significant depth one file system another may cause undesirable results depends utility copying handles discrepancy | [
6155,
4111,
10257,
8214,
25,
8227,
6180,
8228,
10278,
10281,
44,
2095,
52,
2101,
6198,
58,
2107,
8254,
10310,
2120,
4170,
4173,
4174,
6221,
82,
4178,
10333,
97,
6243,
10340,
10341,
6248,
4201,
8298,
8301,
4210,
8306,
119,
2168,
6263,
62... | None |
9,763 | 7 | QuickSchools.com:quickschools.com maestro planning solutions early origins providing supply chain management software company founded early 2003 winning venture 2002 business plan writing competition competition organized mckinsey co supported malaysia largest venture capital company mavcap ministry finance malaysia publicity support garnered win company born 2006 maestro made exploratory move schools market via project premier malaysian private school kolej tuanku ja'afar maestro used optimalone platform injected supply chain ideas creation school management system project cross-fertilization ideas supply chain school management system recognized ktj different several school management systems evaluating time january 2008 maestro decided embark launching school administrative software online system subsequently branded quickschools.com fully online school management system small schools april 2009 maestro planning solutions raised 4.5 million malaysian ringgit venture capital funded dta growth capital malaysia financing support quickschool.com expansion us school market strengthen company r well sales marketing efforts also april 2009 maestro received grant 1.06 million malaysian ringgit spearhead r web 2.0 timetable scheduling software eventually part quickschools.com grant awarded mdec multimedia development corporation malaysia august 17 2009 quickschools released brand new version school management system based extensive feedback current user base approach software design decided upon best way forward focused improving user experience therefore attention give introducing simple user interface extensive feature hiding one key improvements allow users running minutes administrator simply registers his/her school website along custom domain school software automatically creates publishes fully functional school management system real time admin proceed 'invite teachers faculty test system another improvement involves 'livefeed feature creates notifications certain activities take place essential paradigm shift achieved way software reformats match user requirements features required specific school made available making software easy use makes barriers entry almost negligible quickschool long-term goal create software require technical support training release goes long way achieving system allows users log details inquiries parents guardians keep track contact details student applications also maintained along grades achieved entrance exams details picture subjects taken classes attended grades extra-curricular activities tracked student grading also done end term reports printed pdf parents track progress children daily basis makes hard student wants cut missing assignment plain tardy system sending parents e-mail notification soon teacher marks student late/absent schedules generated students teachers subjects classrooms flexible type information school wants track students foreign language character support arabic chinese currently available quickschools.com based maestro optimalone platform quickschools.com runs java ee backend front-end runs adobe flash previously macromedia flash use flash enables quickschools.com run many different browsers different operating systems also enables web2.0-style interface servers located 2 locations around world first location established malaysia january 2008 second location established seattle us august 2008 | [
8627
] | Validation |
9,764 | 4 | Check_Point_VPN-1:check point vpn-1 vpn-1 firewall vpn product developed check point software technologies ltd. vpn-1 stateful firewall also filters traffic inspecting application layer first commercially available software firewall use stateful inspection later 1997 check point registered u.s. patent 5,606,668 security technology among features included stateful inspection vpn-1 functionality currently bundled within check point perimeter security products product previously known firewall-1 sold integrated firewall vpn solution vpn-1 software installed separate operating system provides protocol stack file system process scheduling features needed product different commercial firewall products like cisco pix juniper firewalls firewall software part proprietary operating system although traditionally sold software vpn-1 also sold appliance form check point utm-1 starting 2006 power-1 appliances appliances run secureplatform operating system version r70 vpn-1 supports following operating systems previous versions check point firewall supported operating systems including solaris hp-ux aix see table version history section details vpn-1 running nokia platform ipso often called nokia firewall different product fact runs vpn-1 software platforms upon completing acquisition nokia security appliance business 2009 checkpoint started project named gaia aimed merging two different operating systems—secureplatform ipso—into one new os positioned finally replace existing operating systems point future april 17 2012 check point announced general availability gaia operating system part r75.40 release started pure firewall vpn product later features added licensed separately since began bundled default installations vpn-1 well smartdefense ips feature adds built-in stateful inspection inherent tcp/ip protocols checks normalization inspection common application protocols starting ngx r70 feature rebranded ips quality service floodgate-1 checkpoint implementation quality service qos supports bandwidth guaranteeing limiting per qos rule per connection also priority queuing done llq nevertheless rfc based qos implementation differentiated services ip precedence supported content inspection starting ngx r65 new feature introduced providing 2 services | [
2050,
10631,
10889,
4746,
8331,
9722,
8211,
8467,
1304,
3742,
4268,
7983,
7859,
2228,
3381,
8640,
9281,
5959,
8265,
3322,
11468,
7376,
6993,
2260,
11606,
2136,
9048,
6490,
8283,
6364,
5084,
8668,
3299,
7139,
9318,
8039,
4074,
11248,
5749,
... | None |
9,765 | 2 | Samsung_SGH-i550w:samsung sgh-i550w samsung sgh-i550w mobile phone samsung belongs infotainment class wi-fi 3.5g connectivity play various multimedia formats 3.2 megapixel camera runs s60 software 3rd edition feature pack 1 | [
7246
] | None |
9,766 | 7 | FUJITSU_Cloud_IaaS_Trusted_Public_S5:fujitsu cloud iaas trusted public s5 fujitsu cloud iaas trusted public s5 fujitsu cloud computing platform aims deliver standardized enterprise-class public cloud services globally offers infrastructure-as-a-service iaas fujitsu data centers provide computing resources employed on-demand suited customers needs service ensures high level reliability sufficient deployment mission-critical systems japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany fujitsu also launched windows azure powered global cloud platform partnership microsoft platform-as-a-service paas offering known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options interoperating services covering implementation migration applications system building systems operation support 2015 fujitsu launched next generation cloud service k5 deployed globally october 2018 fujitsu announced discontinuing k5 regions except japan october 16 2018 company stated hire 10,000 employees train use microsoft azure order address see industry-wide shortage cloud related skills help clients address execution gap provision services support operational efficiency digital co-creation multi-cloud management. ” fujitsu launched global cloud strategy april 2010 provision services platform offered trial basis 200 companies japan following month fujitsu announced general availability iaas service japan name on-demand virtual system service oviss starting 1 october 2010 part service global rollout launched australia name fujitsu global cloud platform fgcp february 2011 followed launches march 2011 singapore may 2011 united kingdom germany united states america july 2012 fujitsu added center western japan bring total number seven july 2013 fujitsu announced fujitsu cloud initiative globally also announced new name fujitsu cloud iaas trusted public s5 october 2018 fujitsu announced discontinuing k5 regions except japan basic component iaas trusted public s5 called virtual system consists firewall one multiple network segments customers host virtual machines signed customers deploy multiple systems within environment much like virtual data center iaas trusted public s5 employs templates allow customers quickly deploy virtual systems template consists firewall network segment definitions virtual servers os/middleware installed set allows quick selection example system three network zones pre-installed web server dmz application server secure zone database another secure zone virtual system includes firewall control access network segments internet intranet intranet connection communication virtual servers customers existing servers hosted fujitsu data center virtual servers chosen list pre-defined images operating system installed also additional software servers different computational resources offered operating systems offered globally include windows server 2008 windows server 2012 red hat enterprise linux centos ubuntu fujitsu claimed licensing issue prevents delivery microsoft office cloud service web based devices manner similar google docs virtual server system disk pre-defined size additional disks sizes configurable 10 gb 10 tb attached server running customers provision global ip addresses assign virtual servers similar amazon elastic ip address feature users provision manage virtual systems self-service portal also used initiate vpn connection virtual zone operations offered service portal also offered cloud api api xml-rpc based using ssl encrypt messages certificates authentication operations also possible multi-cloud api apache deltacloud fujitsu submitted cloud api specification distributed management task force open cloud standards incubator promote open standards cloud interoperability contributed dmtf cloud infrastructure management interface cimi standard july 2013 fujitsu demonstrated client using cimi manage system iaas trusted public s5 management developers conference servers physically located fujitsu tier iii data centers japan australia singapore uk us germany | [
1539,
526,
4623,
10265,
5662,
5666,
36,
9766,
39,
5159,
3121,
5681,
1079,
10820,
4683,
590,
1102,
7248,
5202,
10837,
4194,
5732,
5749,
2170,
4236,
10893,
6307,
2217,
1707,
9906,
7352,
9920,
4289,
3269,
1224,
6367,
225,
2795,
3819,
253,
... | Train |
9,767 | 3 | Texas_Instruments_AR7:texas instruments ar7 texas instruments ar7 ti-ar7 fully integrated single-chip adsl cpe access router solution ar7 combines mips32 processor dsp-based digital transceiver adsl analog front end 2007 ti sold dsl business infineon 2009 infineon technologies spins wireline division lantiq november 6 2009 lantiq announced became standalone company | [
7234,
6670,
2383,
5270,
2811
] | Validation |
9,768 | 8 | StatCounter:statcounter statcounter web traffic analysis website started 1999 access basic services free advanced services cost us 119 month statcounter based dublin ireland statistics statcounter used compute web usage share example statcounter used 0.9 websites statcounter statistics directly derived hits—as opposed unique visitors—from 3 million sites use statcounter resulting total hits 15 billion per month artificial weightings used correct sampling bias thus numbers statistics considered representative samples company founded aodhán cullen age 16 cullen received internet hero award 2008 eircom golden spider awards also named 2007 businessweek young european entrepreneur year 2008 company surpassed two million members globally | [
3971,
8584,
9736,
3978,
6539,
6797,
1943,
5150,
10814,
8639,
5442,
2259,
5078,
8281,
735,
4326,
487,
3688,
6133
] | Train |
9,769 | 5 | Hookflash:hookflash hookflash canadian company hookflash also name product family real-time communication people work together founders trent johnsen erik lagerway hookflash ipad first product ios app announced demo fall 2011 conference tested private release offers users hookflash-to-hookflash instant messaging voice calling conferencing video calling conferencing hookflash openpeer peer-to-peer network app also business telephony features like call transfer line hunting social network features like profiles activity data sources like linkedin sharing recorded conversations company announced ipad app free company operate freemium business model | [
8640,
10242,
6539,
9131
] | None |
9,770 | 5 | Epic_(web_browser):epic web browser epic privacy-centric web browser developed hidden reflex software product company founded alok bhardwaj based washington dc bangalore india chromium source code epic always private browsing mode exiting browser causes browsing data deleted even browsing little possible stored epic developers remove google tracking code binaries chromium source code compile clean executable blocks companies tracking users browser connection electronic privacy information center civil liberties group also known epic epic released august 29 2013 customized indian users browser integrated widgets social networking chat clients email facilities epic default configuration takes proactive approach ensuring session data cookies history cache removed upon exit browser includes proxy service enabled user discretion automatically enabled using search engine features preferring ssl connections always sending track header advance privacy however many implementations extension based part core browser code epic browser extension based feature implementation allow users extract import extensions chromium based browsers chrome extension developer mode ad user activity trackers blocked default epic browser prevents user tracking occur browser also blocks cryptocurrency miners running users system browsers fingerprinting protection blocks access image canvas font canvas audio context data webrtc ip address leaking blocked default well epic proxy service relay connections user 8 countries including united states united kingdom canada germany france netherlands india singapore company claims encrypted routes dns requests well supplementary services found chromium browser send data external servers address bar suggestion installation tracking removed epic reduce scope potential data leakage epic supports windows 7 later mac os x list web browsers | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
10791,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
9841,
115,
9843,
4728,
637,
1664,
2182,
10910,
8351,
7340,
9394,
9908,
185,
11449,
4797,
11466,
7885,
11469... | Test |
9,771 | 4 | Potentially_unwanted_program:potentially unwanted program potentially unwanted program pup potentially unwanted application pua software user may perceive unwanted used subjective tagging criterion security parental control products software may use implementation compromise privacy weaken computer security companies often bundle wanted program download wrapper application may offer install unwanted application cases without providing clear opt-out method antivirus companies define software bundled potentially unwanted programs include software displays intrusive advertising adware tracks user internet usage sell information advertisers spyware injects advertising web pages user looks uses premium sms services rack charges user practice widely considered unethical violates security interests users without informed consent unwanted software bundles install root certificate user device allows hackers intercept private data banking details without browser giving security warnings united states department homeland security advised removing insecure root certificate make computers vulnerable serious cyberattacks growing number open-source software projects expressed dismay third-party websites wrapping downloads unwanted bundles without project knowledge consent nearly every third-party free download site bundles downloads potentially unwanted software software developers security experts recommend people always download latest version official project website trusted package manager app store historically first big companies working potentially unwanted programs creating revenue came usa mid-2000s zango activities declined companies investigated cases indicted authorities invasive harmful installs major industry dedicated creating revenue foisting potentially unwanted programs grown among israeli software industry frequently referred download valley companies responsible large part download install tools place unwanted additional software users systems unwanted programs increased recent years one study 2014 classified unwanted programs comprising 24.77 total malware infections malware includes adware according google many programs include unwanted browser add-ons track websites user goes order sell information advertisers add advertising web pages five percent computer browser visits google-owned websites altered computer programs inject ads pages researchers identified 50,870 google chrome extensions 34,407 programs inject ads thirty-eight percent extensions 17 percent programs catalogued malicious software rest potentially unwanted adware-type applications google chrome extension developers sold extensions made third-party companies silently push unwanted updates incorporate previously non-existent adware extensions spyware programs install proxy server person computer monitors web traffic passing tracking user interests build profile sell profile advertisers superfish advertising injector creates root certificate computer operating system allowing tool inject advertising encrypted google search pages track history user search queries february 2015 united states department homeland security advised uninstalling superfish associated root certificate lenovo computers make computers vulnerable serious cyberattacks including interception passwords sensitive data transmitted browsers heise security revealed superfish certificate included bundled downloads number applications companies including say media lavasoft ad-aware web companion many companies use browser hijacking modify user home page search page force internet hits particular website make money advertisers companies steal cookies user browser hijacking connections websites logged performing actions using account without user knowledge consent like installing android apps users dial-up internet access use modems computer connect internet targeted fraudulent applications used security holes operating system dial premium numbers many android devices targeted malware use premium sms services rack charges users 2015 research emsisoft suggested free download providers bundled downloads potentially unwanted software download.com worst offender lowell heddings expressed dismay sadly even google top results open source freeware ads really terrible sites bundling crapware adware malware top installer december 2011 gordon lyon published strong dislike way download.com started bundling grayware installation managers concerns bundled software causing many people spread post social networks dozen media reports main problem confusion download.com-offered content software offered original authors accusations included deception well copyright trademark violation 2014 register us-cert warned via download.com foistware attacker may able download execute arbitrary code many open-source software developers expressed frustration dismay work packaged companies profit work using search advertising occupy first result search page increasingly pages offering bundled installers include unwanted software confuse users presenting bundled software official download page endorsed open source project early 2016 longer case ownership sourceforge transferred sourceforge media llc subsidiary bizx llc bizx sale removed devshare program means bundled installers longer available november 2013 gimp free image manipulation program removed download sourceforge citing misleading download buttons potentially confuse customers well sourceforge windows installer bundles third-party offers statement gimp called sourceforge useful trustworthy place develop host floss applications faces problem ads allow sites ... may 2015 gimp windows sourceforge project transferred ownership sourceforge editorial staff account adware downloads re-enabled happened developers nmap may 2015 sourceforge took control projects migrated hosting sites replaced project downloads adware-laden downloads gordon lyon lost control nmap sourceforge page sourceforge taking project page lyon stated far seem providing official nmap files long n't click fake download buttons n't caught trojaning nmap way gimp certainly n't trust one bit sourceforge pulling scheme cnet download.com tried back started circling drain videolan expressed dismay users searching product see search advertising websites offer bundled downloads include unwanted programs videolan lacks resources sue many companies abusing trademarks | [
3072,
3969,
6786,
11266,
7044,
10245,
510,
9351,
10756,
3595,
9356,
5261,
9233,
8978,
4863,
4883,
5245,
278,
1046,
10392,
4889,
1690,
2075,
3867,
10141,
5281,
2213,
8998,
9256,
939,
9771,
4013,
5935,
2864,
7983,
1970,
2739,
4403,
4659,
58... | None |
9,772 | 7 | G.ho.st:g.ho.st g.ho.st usually pronounced ghost trading name ghost inc. service name url company hosted computer operating system web desktop service name acronym global hosted operating system old url g.ho.st domain hack using são tomé príncipe .st country extension april 2010 ghost closed service due competition lack funding g.ho.st service provided web-based working environment mimicked classic desktop provided personal computer operating systems users able create save return working environment different physical computers mobile phones g.ho.st called virtual computer services considered operating systems traditional sense although sometimes referred web operating systems whilst include gui e.g desktop virtual file system application management security contain kernel interface physical hardware therefore use service operating system required supporting least web browser service run july 2009 software entered beta stage development remained stage beta launch near jerusalem attended quartet representative former uk prime minister tony blair company primary investor benchmark capital g.ho.st hosted amazon web services utilizing cloud computing backend delivering consumer version cloud computing according g.ho.st website longer accessible planned additionally offer commercial fully featured scalable private cloud file system ghost cloud file system cfs would run within customer amazon web services account business model would based surcharges ghost collected amazon company received growing press coverage relating technology israelis palestinians worked partners build company products time considered joint palestinian israeli technology startup company first company offer employee stock options palestinian territories march 3 2010 ghost.cc formed g.ho.st sent users following e-mail dear ghost user hope enjoying free ghost service regrettably changes marketplace mean longer economical us host ghost service closing service around march 15 instead focusing licensing selling technology larger companies advise migrate important folders files emails another secure place march 15 might like consider google docs microsoft skydrive files services gmail yahoo mail email instructions migrating data included really sorry inconvenience may cause grateful fantastic support community similar services | [
2945,
4194,
7364,
3690,
7248,
3833
] | Test |
9,773 | 3 | Fire_Hawk:_Thexder_-_The_Second_Contact:fire hawk thexder second contact fire hawk thexder second contact テグザー2 ファイアーホーク also known firehawk thexder 2 firehawk thexder ii video game developed published game arts msx2 ms-dos pc-8801 1989 sequel thexder japan ms-dos version later released sierra on-line one predicted furious arcade action high-resolution graphics 11 complete songs ... thexder ii looks set surpass success original game indeed well received upon release sold well japan usa | [
9166,
9703
] | Test |
9,774 | 3 | Project_Denver:project denver project denver codename microarchitecture designed nvidia implements armv8-a 64/32-bit instruction sets using combination simple hardware decoder software-based binary translation dynamic recompilation denver binary translation layer runs software lower level operating system stores commonly accessed already optimized code sequences 128 mb cache stored main memory denver wide in-order superscalar pipeline design makes suitable integration sips cores e.g gpu display controller dsp image processor etc one die constituting system chip soc project denver targeted mobile computers personal computers servers well supercomputers respective cores found integration tegra soc series nvidia initially denver cores available 28nm structure sizes tegra model t132 aka tegra k1 later updated denver 2 design worked 16nm structure sizes tegra model t186 aka tegra x2 2018 got published refined follow design codename carmel based armv8 64-bit variant arm-v8.2 10-way superscalar functional safety dual execution parity ecc got integrated tegra xavier soc offering total 8 cores 4 dual-core pairs carmel cpu core supports full advanced simd arm neon vfp vector floating point armv8.2-fp16 first published testings carmel cores integrated jetson agx development kit third party experts took place september 2018 indicated noticeably increased performance expected real world physical manifestation compared predecessors systems despite doubts used quickness test setup general particular implies carmel design found tegra model t194 tegra xavier designed 12 nm structure size dual-core denver cpu paired kepler-based gpu solution form tegra k1 dual-core 2.3 ghz denver-based k1 first used htc nexus 9 tablet released november 3 2014 note however quad-core tegra k1 using name n't based denver nvidia tegra x2 two denver2 armv8 64bit cores inside another four a57 armv8 64bit cores using coherent hmp heterogeneous multi-processor architecture approach pairs units parker-gpu tegra xavier pairing nvidia volta-gpu several special purpose accelerators 8 cpu cores carmel design design 4 carmel asic macro blocks 2 cores matched one crossbar 4 mib l3 memory existence project denver revealed 2011 consumer electronics show march 4 2011 q article ceo jen-hsun huang revealed project denver five-year 64-bit armv8-a architecture cpu development hundreds engineers already worked three half years also 32-bit arm instruction set armv7 backward compatibility project denver started stexar company colorado x86-compatible processor using binary translation similar projects transmeta stexar acquired nvidia 2006 according tom hardware engineers intel amd hp sun transmeta denver team extensive experience designing superscalar cpus out-of-order execution long instruction words vliw simultaneous multithreading smt according charlie demerjian project denver cpu may internally translate arm instructions internal instruction set using firmware cpu also according demerjian project denver originally intended support arm x86 code using code morphing technology transmeta changed armv8-a 64-bit instruction set nvidia could obtain license intel patents first consumer device shipping denver cpu cores google nexus 9 announced october 15 2014 tablet manufactured htc features dual-core tegra k1 soc nexus 9 also first 64-bit android device available consumers | [
3585,
4112,
11282,
9235,
11289,
1057,
38,
4139,
2097,
7218,
8253,
7745,
7747,
2635,
99,
8812,
10361,
638,
3203,
644,
8842,
146,
659,
7833,
666,
5786,
6815,
4258,
6818,
9913,
8383,
10945,
196,
4821,
2788,
2277,
8937,
9964,
1776,
6900,
63... | None |
9,775 | 4 | Péter_Szőr:péter szőr péter szőr 17 july 1970 – 12 november 2013 hungarian computer virus security researcher entrepreneur author born balatonfüred veszprém county szőr began interest computer viruses 1990 university pannonia graduate authored several virus-related books renowned work 2009 death worked mcafee antivirus firm working new solution stop viruses early 2004 péter szőr son daniel szőr spouse natalia nemeth may 2014 virus bulletin introduced péter szőr award given annually recognition best piece technical security research done year péter szőr died 12 november 2013 aged 43 | [
704,
5760,
131,
2213,
4441,
7739
] | None |
9,776 | 9 | DOORS_Extension_Language:doors extension language doors extension language dxl scripting language used extend functionality ibm rational doors programming language somewhat similar c c++ language specific doors syntax declaration forum discuss development addition specific reference manuals dxl scripts utilized help users doors much native doors gui written dxl dxl used client-server based doors classic used newer web-based doors next generation several ways use dxl rational doors dxl scripts usually stored extension dxl however use library files extension .inc print hello world following code used print hello world sodius dxl editor built top eclipse one tool provides option edit browse compile execute debug dxl scripts many open source free editors like notepad++ jedit support dxl custom properties | [
3323,
9780,
2045,
8262
] | Test |
9,777 | 3 | Input/output_base_address:input/output base address x86 architecture input/output base address first address range consecutive read/write addresses device uses x86 io bus base address sometimes called i/o port | [
6129,
2226,
4581
] | Train |
9,778 | 2 | Andy_Hertzfeld:andy hertzfeld andy hertzfeld born april 6 1953 american computer scientist inventor member original apple macintosh development team 1980s buying apple ii january 1978 went work apple computer august 1979 march 1984 designer macintosh system software since leaving apple co-founded three companies radius 1986 general magic 1990 eazel 1999 2002 helped mitch kapor promote open source software open source applications foundation hertzfeld worked google 2005 2013 2011 key designer circles user interface google+ graduating brown university computer science degree 1975 hertzfeld attended graduate school university california berkeley 1978 bought apple ii computer soon began developing software hired apple computer systems programmer 1979 developed apple silentype printer firmware wrote firmware sup r'terminal first 80-column card apple ii early 1980s invited high school friend artist susan kare join apple order help design would become standard macintosh icons first macintosh hertzfeld wrote icon editor font editor susan kare could design symbols used operating system hertzfeld member apple macintosh design team shakeup apple ii team hertzfeld request apple co-founder steve jobs added nearly two-year-old macintosh team february 1981 working bud tribble alongside bill atkinson burrell smith hertzfeld became primary software architect macintosh operating system considered revolutionary use graphical user interface gui jef raskin also made contributions hertzfeld business card apple listed title software wizard wrote large portions macintosh original system software including much rom code user interface toolbox number innovative components standard many graphic user interfaces like control panel scrapbook hertzfeld book revolution valley insanely great story mac made chronicles development macintosh launch since leaving apple 1984 hertzfeld co-founded three new companies – radius 1986 general magic 1990 eazel 1999 eazel helped create nautilus file manager linux gnome desktop volunteered open source applications foundation 2002 2003 writing early prototypes chandler information manager 1996 hertzfeld interviewed robert cringely television documentary triumph nerds interviewed cringely nerdtv 2005 early 2004 started folklore.org web site devoted collective storytelling contains dozens anecdotes development original macintosh stories collected o'reilly book revolution valley published december 2004 august 2005 hertzfeld joined google june 28 2011 google announced google+ latest attempt social networking hertzfeld key designer google+ circles component user interface entire project mistakenly claimed also worked picasa gmail profile image selector retired google july 2013 october 2018 investor startup spatial hertzfeld portrayed elden henson 2013 film jobs michael stuhlbarg 2015 film steve jobs steve jobs film herztfeld stated almost nothing like really happened ultimately said film n't aiming realism hertzfeld wife live palo alto california | [
9999,
4114,
10386,
6554,
4251,
9123,
11171,
823,
1592,
576,
8021,
6234,
8540,
4194,
9700,
2282,
1389,
11118,
2160,
5619,
511
] | Test |
9,779 | 5 | Internet_0:internet 0 internet 0 low-speed physical layer designed route 'ip anything developed mit center bits atoms neil gershenfeld raffi krikorian danny cohen invented number proposals labelled internet 2 name chosen emphasize designed slow inexpensive internetworking system forestall high-performance comparison questions fast effectively would enable platform pervasive computing -- everything building could network share data gathering actuation light switch could turn light bulb sending packet linked together user internet 0 originally minor expedient bit engineering support mit projects intended network buildings improve efficiency gather data control hvac systems heating ventilation air conditioning protocol works pretty well wide variety media wide utility multiple media protocol interested network theorists awakened burst academic papers started commercial interest simple inexpensive implementation still appeals hobbyists students new implementations found 2011 modern implementations mostly software small microcontrollers usually transistor transmit capacitors isolate transmitter receiver connector literally becomes major expense communication system simple inexpensive system embedded many devices allow data retrieval control via internet -- small devices used form internet things current largest deployment internet 0 venice biennale architecture exhibition year 2008 group led institute advanced architecture catalonia directed architect vicente guallart idea behind internet 0 provide general-purpose physical layer operates well many media similar morse code general-purpose layer 1 internet logically recursive application internet principle ubiquitous protocol layer 1 network pulse-position modulation internet 0 operates best segregated wire works many media tested radio frequency rf infrared ir ultrasonics optical dc ac power wiring even physical representations printed bar codes engraving key one main advantages approach routers become simple sensor pulse reshaper transmitter coupling reusable physical layer internet protocols enables network inexpensive nodes also addressable global internet design intent provide simple inexpensive system transmit data slowly many types media yet still connect devices internet connecting internet crucial part design much value networked device provided easy wide access higher layers internet 0 network usually serial line internet protocol slip internet protocol ip usually user datagram protocol udp rarely transmission control protocol tcp protocol layers chosen need minimum code keep expense computer low internet 0 implemented small avr microcontrollers existing implementations layers distinct small code important elegant design small translation device normally attaches local network internet 0 devices serial port pc acts gateway firewall internet devices talk directly without requiring server distributed architecture ensures central point failure address assignment cryptographic key initialization sometimes performed closing contact device master controller broadcast assignment message security via simplified encryption system internet 0 similar serial port running 9600 baud except sends data pulse-position modulation accepts 30 timing deviations medium broadcast half duplex software receiving devices examines ip address packet rejecting unwanted packets zero bit one-microsecond pulse center first half bit time one pulse second half bit time data sent 8 bit bytes byte preceded bit time two pulses 1 0 times ends bit time another two pulses variations stop bit-time optional dual-pulse bit times treated byte separators dual-pulse start stop bit times permit receiver synchronize beginnings bytes also measure baud rate sender synchronizing 8-bit bytes permits 9600 baud internet-0 connection easily translate standard low-speed 19,200 baud tcp/ip serial port baud rate measurement permits senders receivers use inexpensive low-precision oscillators ceramic resonators resistor-capacitor oscillators common interface uses power supply wiring device circuit small surface mounted capacitor ac mains wire dc power wire single digital pin small microcontroller switches high-power transistor briefly pulses normally generated software toggle digital i/o pin microcontroller received another capacitor microcontroller pin configured interrupt hardware timer gate internet 0 works many media given transmission medium usually competing preexisting physical layers reliable higher speed lower power usually flexible rarely inexpensive less surprising early exploration concept sun microsystems cisco systems schneider electric interested commercial deployment schneider eventually decided deploy zigbee low-powered radio protocol | [
5472,
9665,
8098,
4995,
4964,
11267,
1030,
8998,
682,
10924,
6834,
11413,
1849,
154
] | Validation |
9,780 | 9 | Scripting_language:scripting language scripting script language programming language special run-time environment automates execution tasks tasks could alternatively executed one-by-one human operator scripting languages often interpreted rather compiled primitives usually elementary tasks api calls language allows combined programs environments automated scripting include software applications web pages within web browser usage shells operating systems os embedded systems well numerous games scripting language viewed domain-specific language particular environment case scripting application also known extension language scripting languages also sometimes referred high-level programming languages operate high level abstraction control languages particularly job control languages mainframes term scripting language also used loosely refer dynamic high-level general-purpose languages perl powershell python tcl term script often used small programs thousand lines code languages domain-specific languages text-processing languages sed awk languages originally developed use within particular environment later developed portable domain-specific general-purpose languages conversely many general-purpose languages dialects used scripting languages article discusses scripting languages narrow sense languages specific environment spectrum scripting languages ranges small highly domain-specific languages general-purpose programming languages used scripting standard examples scripting languages specific environments include bash unix unix-like operating systems ecmascript javascript web browsers visual basic applications microsoft office applications lua language designed widely used extension language python general-purpose language also commonly used extension language ecmascript still primarily scripting language web browsers also used general-purpose language emacs lisp dialect lisp emacs editor visual basic applications dialect visual basic examples scripting language dialects general-purpose languages game systems notably second life virtual world trainz franchise railroad simulators extensively extended functionality scripting extensions linden scripting language trainzscript games like wesnoth variety actual games played players scripts written users typical scripting languages intended fast learn write either short source code files interactively read–eval–print loop repl language shell generally implies relatively simple syntax semantics typically script code written scripting language executed start finish script explicit entry point example uncommon characterise java scripting language lengthy syntax rules classes exist files directly possible execute java interactively source files contain definitions must invoked externally host application application launcher public class helloworld piece code intended print hello world nothing main declared helloworld class contrast python allows definition functions single file avoid functions altogether use imperative programming style even use interactively codice_1 one line python code prints hello world declarative statement like main required scripting language usually interpreted source code bytecode contrast software environment scripts written typically written compiled language distributed machine code form scripting languages may designed use end users program—end-user development—or may internal use developers write portions program scripting language scripting languages typically use abstraction form information hiding spare users details internal variable types data storage memory management scripts often created modified person executing also often distributed large portions games written scripting language early mainframe computers 1950s non-interactive instead using batch processing ibm job control language jcl archetype languages used control batch processing first interactive shells developed 1960s enable remote operation first time-sharing systems used shell scripts controlled running computer programs within computer program shell calvin mooers trac language generally credited inventing command substitution ability embed commands scripts interpreted insert character string script multics calls active functions louis pouzin wrote early processor command scripts called runcom ctss around 1964 stuart madnick mit wrote scripting language ibm cp/cms 1966 originally called processor command later named exec multics included offshoot ctss runcom also called runcom exec eventually replaced exec 2 rexx languages tcl lua specifically designed general-purpose scripting languages could embedded application languages visual basic applications vba provided strong integration automation facilities underlying system embedding general-purpose scripting languages instead developing new language application also obvious benefits relieving application developer need code language translator scratch allowing user apply skills learned elsewhere software incorporates several different scripting languages modern web browsers typically provide language writing extensions browser several standard embedded languages controlling browser including javascript dialect ecmascript xul scripting often contrasted system programming ousterhout dichotomy programming large programming small view scripting particularly glue code connecting software components language specialized purpose glue language pipelines shell scripting archetypal examples glue languages perl initially developed fill role web development considered use glue languages interfacing database web server substantial amount logic written script better characterized simply another software component glue glue languages especially useful writing maintaining glue language examples macro languages exposed operating system application components serve glue languages include visual basic applications wordbasic lotusscript corelscript hummingbird basic quickscript saxbasic winwrap basic tools like awk also considered glue languages language implemented windows script host engine vbscript jscript vba default windows third-party engines including implementations rexx perl tcl python xslt ruby modern pascal delphi c majority applications access use operating system components via object models functions devices like programmable calculators may also glue languages operating systems pdas windows ce may available native third-party macro tools glue applications together addition implementations common glue languages—including windows nt ms-dos unix shells rexx modern pascal php perl depending upon os version wsh default script engines vbscript jscript available programmable calculators programmed glue languages three ways example texas instruments ti-92 factory default programmed command script language inclusion scripting glue language lua ti-nspire series calculators could seen successor primary on-board high-level programming languages graphing calculators often basic variants sometimes lisp derivatives uncommonly c derivatives many cases glue together calculator functions—such graphs lists matrices etc third-party implementations comprehensive basic version may closer variants listed glue languages article available—and attempts implement perl rexx various operating system shells ti hp graphing calculators also mentioned pc-based c cross-compilers ti hp machines used conjunction tools convert c perl rexx awk well shell scripts perl modern pascal vbscript perl make possible write program glue language eventual implementation compiled program calculator major class scripting languages grown automation job control relates starting controlling behavior system programs sense one might think shells descendants ibm jcl job control language used exactly purpose many languages interpreters double command-line interpreters unix shell ms-dos codice_2 others applescript offer use english-like commands build scripts advent graphical user interfaces specialized kind scripting language emerged controlling computer languages interact graphic windows menus buttons human user would simulating actions user languages typically used automate user actions languages also called macros control simulated key presses mouse clicks well tapping pressing touch-activated screen languages could principle used control gui application practice use limited use needs support application operating system exceptions limitation gui scripting languages based recognizing graphical objects display screen pixels gui scripting languages depend support operating system application application specific languages split many different categories i.e standalone based app languages executable internal application specific languages postscript xml gscript widely distributed scripts respectively implemented adobe ms google among others include idiomatic scripting language tailored needs application user likewise many computer game systems use custom scripting language express programmed actions non-player characters game environment languages sort designed single application may superficially resemble specific general-purpose language e.g quakec modeled c custom features distinguish emacs lisp fully formed capable dialect lisp contains many special features make useful extending editing functions emacs application-specific scripting language viewed domain-specific programming language specialized single application number languages designed purpose replacing application-specific scripting languages embeddable application programs application programmer working c another systems language includes hooks scripting language control application languages may technically equivalent application-specific extension language application embeds common language user gets advantage able transfer skills application application generic alternative simply provide library often c library general-purpose language use control application without modifying language specific domain javascript began primarily still language scripting inside web browsers however standardisation language ecmascript made popular general-purpose embeddable language particular mozilla implementation spidermonkey embedded several environments yahoo widget engine applications embedding ecmascript implementations include adobe products adobe flash actionscript adobe acrobat scripting pdf files tcl created extension language come used frequently general-purpose language roles similar python perl ruby hand rexx originally created job control language widely used extension language well general-purpose language perl general-purpose language oraperl 1990 dialect consisting perl 4 binary oracle call interface compiled however since replaced library perl module dbd :oracle complex task-oriented applications may incorporate expose embedded programming language allow users control give functionality available user interface matter sophisticated example autodesk maya 3d authoring tools embed mel scripting language blender uses python fill role types applications need faster feature addition tweak-and-run cycles e.g game engines also use embedded language development allows prototype features faster tweak freely without need user intimate knowledge inner workings application rebuild tweak take significant amount time scripting languages used purpose range common famous lua python lesser-known ones angelscript squirrel ch another c compatible scripting option industry embed c/c++ application programs | [
9728,
5633,
5634,
515,
11269,
6150,
9735,
2568,
9224,
1549,
2062,
6674,
5651,
3604,
8729,
1565,
3613,
9245,
544,
9757,
8226,
2599,
5677,
5680,
9776,
2610,
6706,
564,
7219,
1591,
10296,
7738,
8251,
3132,
6718,
576,
6722,
10819,
8262,
2120,... | None |
9,781 | 4 | Retina-X_Studios:retina-x studios retina-x studios software manufacturer company develops computer cell phone monitoring applications focused computers smartphones tablets networks company founded 1997 based jacksonville florida united states company founded july 1997 primarily web consulting design company 2003 period developing monitoring products outside companies company began creating monitoring software products using brand name first software product named acespy released april 28 2003 may 2007 company developed released first monitoring software mobile phones named mobile-spy particularly windows mobile target audiences retina-x studios parents employers parents employers use legal monitoring software check teens staff internet use legal since juveniles responsibility parents company markets products spy applications parents review child messages call details without child knowledge cases ethical issues arise employees made aware monitoring tools personal emails intentionally accessed managers involved directly evaluating contents logging activities be/become biased towards person whose email reviewed using cell phones spying also increased due multiplication smart phones compromising one information possible spy apps people stalk easily company software need onetime access gadget software would run invisibly wrong use software overlooked hackers access online information parsed customer account lead privacy issues | [
8978,
1083,
2151
] | Test |
9,782 | 1 | Database_scalability:database scalability database scalability ability database handle changing demands adding/removing resources databases adopted host techniques cope initial history database scalability provide service ever smaller computers first database management systems ims ran mainframe computers second generation including ingres informix sybase rdb oracle emerged minicomputers third generation including dbase oracle ran personal computers period attention turned handling data demanding workloads one key software innovation late 1980s reduce update locking granularity tables disk blocks individual rows eliminated critical scalability bottleneck coarser locks could delay access rows even though directly involved transaction earlier systems completely insensitive increasing resources software limitations addressed attention turned hardware innovation occurred many areas first support multiprocessor computers involved allowing multiple processors handle database requests simultaneously without blocking evolved support multi-core processors much significant change involved allowing distributed transactions affect data stored separate computers using two-phase commit protocol establishing shared-nothing architecture still later oracle introduced shared-everything architecture provided full functionality multi-server clusters another innovation storing copies tables multiple computers database replication improved availability processing could continue copy even main system unavailable scalability particularly query/analysis requests could routed copy primary reached capacity early twenty-first century nosql systems gained favor relational databases workloads motivations included still greater scalability support documents non-relational data types often sacrificed strict acid consistency protocols guaranteed perfect consistency times favor eventual consistency ensured nodes would eventually return latest data even allowed transactions occasionally lost long system could handle sufficiently many requests prominent early system google bigtable/mapreduce developed 2004 achieved near-linear scalability across multiple server farms cost features multi-row transactions joins 2007 first newsql system h-store developed newsql systems attempt combine nosql scalability acid transactions sql interfaces database scalability three basic dimensions amount data volume requests size requests requests come many sizes transactions generally affect small amounts data may approach thousands per second analytic queries generally fewer may access data related concept elasticity ability system transparently add subtract capacity meet changing workloads vertical database scaling implies database system fully exploit maximally configured systems including typically multiprocessors large memories vast storage capacity systems relatively simple administer may offer reduced availability however single computer maximum configuration workloads expand beyond limit choices either migrate different still larger system rearchitect system achieve horizontal scalability horizontal database scaling involves adding servers work single workload horizontally scalable systems come functionality compromises application requires functionality migration vertically scaled system may preferable databases run individual hardware ranging capacity smartwatches supercomputers multiple transparently reconfigurable server farms databases also scaled vertically run 64-bit microprocessors multi-core cpus large smp multiprocessors using multi-threaded implementations fully exploiting hardware configuration requires variety locking techniques ranging locking entire database entire tables disk blocks individual table rows appropriate lock granularity depends workload smaller object locked less chance database requests blocking hardware idles typically row locks necessary support high volume transaction processing applications cost processing overhead manage larger number locks systems ensure query sees time-consistent view database locking data query examining prevent update modifying stalling work alternatively databases use multi-version read consistency avoid blocking read locks still providing consistent query results another potential bottleneck occur systems many requests attempt access data time example oltp systems many transactions may attempt insert data table time shared nothing system given moment inserts processed single server manages partition shard table possibly overwhelming rest system little many tables use sequence number primary key increases new inserted row index key also experience contention overheat processes inserts one solution reverse digits primary key spreads inserts table key across multiple parts database basic technique split large tables multiple partitions based ranges values key field example data year could held separate disk drive separate computer partitioning removes limits sizes single table replicated databases maintain copies tables databases multiple computers scaling technique particularly convenient seldom never-updated data transaction history tax tables variety approaches used scale beyond limits single computer hp enterprise nonstop sql uses shared nothing architecture neither data memory shared across server boundaries coordinator routes database requests correct server architecture provides near-linear scalability widely supported x/open xa standard employs global transaction monitor coordinate distributed transactions among semi-autonomous xa-compliant transaction resources oracle rac uses different model achieve scalability based shared-everything architecture approach incorporates shared disk approach allows multiple computers access disk cluster network-attached storage nas storage area networks sans coupled local area networks fibre channel technology enable configurations approach includes shared logical cache data cached memory server made available servers without requiring read data disk page moved server server satisfy requests updates generally happen quickly popular page updated multiple transactions little delay approach claimed support clusters containing 100 servers researchers question inherent limitations relational database management systems gigaspaces example contends space-based architecture required achieve performance scalability base one makes case extreme scalability within mainstream relational database technology | [
11136,
11393,
4614,
7816,
5772,
11024,
1049,
9883,
6433,
10675,
6850,
9286,
11343,
4817,
2901,
8539,
10340,
1638,
6124,
5999,
7802
] | Test |
9,783 | 9 | Comparison_of_audio_synthesis_environments:comparison audio synthesis environments software audio synthesis environments typically consist audio programming language may graphical user environment design/run language although many environments comparable abilities produce high-quality audio differences specialties draw users particular platform article compares noteworthy audio synthesis environments enumerates basic issues associated use audio synthesis environments comprise wide varying range software hardware configurations even different versions environment differ dramatically broad variability certain aspects different systems directly compared moreover levels comparison either difficult objectively quantify depend purely personal preference commonly considered subjective attributes comparison include attributes vary strongly depending tasks used evaluation common comparisons include audio software often slightly different sound compared others different ways implement basic building blocks sinewaves pink noise fft result slightly different aural characteristics although people course prefer one system sound another perhaps best output determined using sophisticated audio analyzers combination listener ears idea would arrive would agree pure sound possible interface audio system often significant influence creative flow user possible stable/mature systems listed fully featured enough able achieve enormous range sonic/compositional objectives made easy made difficult difficult boil brief comparative statement one issue may interface metaphors used e.g boxes-and-wires documents flow graphs hardware mixing desks interfaces language environment software hardware user interfaces | [
2691,
7172,
3462,
6797,
7571,
6933,
6810,
9245,
3876,
4777,
5677,
692,
823,
3665,
596,
7128,
7769,
9565,
10083,
3046,
6502,
9320,
10470,
8554,
9210,
2045,
7550
] | None |
9,784 | 2 | TvOS:tvos tvos operating system developed apple inc. 4th generation later apple tv digital media player tvos announced september 9 2015 apple september 2015 event alongside 4th generation apple tv october 29 2015 4th generation apple tv pre-orders began shipments began following week tvos initially based ios whereas system software 2nd 3rd generation apple tv based stripped-down versions ios 4th generation apple tv support third-party software via app store rumored prior apple september 2015 event held september 9 2015 october 30 2015 4th generation apple tv became available shipped tvos 9.0 november 9 2015 tvos 9.0.1 released primarily update address minor issues tvos 9.1 released december 8 2015 along os x 10.11.2 ios 9.2 watchos 2.1 along updates apple also updated remote apps ios watchos allowing basic remote functionality 4th generation apple tv previously said app worked past versions apple tv november 25 2015 facebook debuted sdk tvos allowing applications log facebook share facebook use facebook analytics way ios applications december 2 2015 twitter debuted login authentication service tvos – digits – allowing users log apps services simple unique code available online march 11 2016 pangu team announced twitter would creating new jailbreak tool apple tv 4 running tvos 9.0–9.0.1 would released following week june 13 2016 wwdc 2016 apple svp internet services eddy cue announced next major version tvos tvos 10. tvos 10 brings new functionality siri search enhancements single sign cable subscriptions dark mode new remote application controlling apple tv tvos 9 shipped several new features fourth generation apple tv one major features ability move interface new touchpad remote using multi-touch gestures introduced new app store users download install new applications apps games made available developers develop applications apple tv tvos tvos 9 adds support siri lets users multitude things cross-application search movie/tv show rewind fast forward name actor/director current movie skip back 15 seconds tvos added support application switcher apple tv application customization options cinematic screensavers control tv using included siri remote built-in support hdmi-cec tvos addition tvos allows user control apple tv many different ways include using included siri remote pairing third-party universal remote pairing mfi gamepad control games using remote app ios pairing bluetooth keyboard aid typing experience user tvos designed based ios tvos inherited many accessibility features ios macos tvos includes apple technologies voiceover zoom siri help blind impaired vision voiceover apple screen reader available 30 languages enables visually impaired users know visual display input responses on-screen prompts voiceover uses gestures similar apple products flicks taps rotor like apple products iphone three click sequence home button activate accessibility features apple tv tvos user activate voiceover without installation process one needs triple-click menu button siri remote apple tv guide user complete initial setup task non-trivial visually impaired comparable products market another accessibility feature increase contrast screen acts reducing transparency background elements movie tv show pages menu tabs parts operating system high-contrast also turned cursor better delineate focused content user also opt turn reduce motion screen actions moving app icons home screen launching apps visually simpler benefit reduce strain eyes tvos enables users watch movies audio descriptions shown screen movies audio descriptions displayed ad audio description icon itunes store tvos itunes macintosh windows pc pairing bluetooth keyboard tvos apple tv enables another accessibility feature also incorporation voiceover typing voiceover mirrors audio voice character pressed keyboard repeated entered apple tv designed work apple wireless keyboard apple magic keyboard work however almost brand bluetooth keyboard apple tv without tvos supports closed captioning deaf hard hearing experience tv episodes feature-length movies compatible episodes movies denoted cc closed captioning sdh subtitles deaf hard-of-hearing icon itunes store either apple tv itunes viewer customize captions episodes movies styles fonts conducive hearing and/or visual impairment touch surface siri remote customizable tracking set fast adjusts thumb movements made amplify distance relation far thumb moved glass touchpad conversely tracking set slow larger movements thumb touchpad tune distance traversed screen help people disabilities apple remote app ios devices allows control apple tv iphone ipad ipod touch ios remote app increases accessibility apple tv enabling switch control switch control unique apple technology enables navigation sequentially onscreen items perform specific actions selecting tapping dragging typing using third party bluetooth-enabled switch hardware made handicaps tvos ships all-new development tools developers tvos adds support all-new sdk developers build apps tv including apis included ios 9 metal also adds tvos app store allows users browse download install wide variety applications addition developers use interface inside application rather able use apple interface since tvos based ios easy port existing ios apps apple tv xcode making refinements app better suit larger screen apple provides xcode free charge registered apple developers develop new apple tv necessary make parallax image application icon order apple provides parallax exporter previewer development tools apple tv information new updates apple tv 2nd generation onwards published apple knowledge base ios 4.1 first version ios available apple tv 2nd generation included apple tv software 4.0 october 23 2011 apple tv 2nd generation received ios 5.0 software photo stream airplay mirroring iphone 4s ipad 2 nhl wall street journal slideshow themes netflix subtitles contrary rumors code found ios 5 release bring support bluetooth apps apple tv 2nd generation september 24 2012 apple tv 2nd generation onwards received ios 6.0 software update shared photo streams itunes account switching better airplay functionality trailers searching among smaller improvements september 20 2013 apple tv second generation onwards received ios 7.0 software update itunes radio airplay icloud september 18 2014 third generation apple tv received ios 8.0 software update redesigned ui family sharing peer-to-peer airplay tvos 9 operating system 95 based ios 9 adaptations made television interface announced september 9 2015 alongside new ipad pro iphone 6s tim cook took stage introduced tvos saying time apple tv gain modern os support apps future tv available apple tv 4th generation released october 2015 adds native sdk develop apps app store distribute support siri universal search across multiple apps operating systems developed apple inc | [
6155,
4114,
25,
6180,
6186,
4139,
8253,
8262,
2120,
6218,
8266,
6221,
2132,
4180,
10333,
97,
8303,
8304,
6264,
8315,
8316,
2179,
132,
10382,
6296,
2201,
4251,
6301,
2207,
2212,
171,
178,
6329,
4283,
8388,
10436,
2248,
8395,
4305,
2259,
... | None |
9,785 | 1 | Plant_DNA_C-values_Database:plant dna c-values database plant dna c-values database comprehensive catalogue c-value nuclear dna content diploids genome size data land plants algae database created prof. michael d. bennett dr. ilia j. leitch royal botanic gardens kew uk database originally launched angiosperm dna c-values database april 1997 essentially online version collected data lists published prof. bennett colleagues since 1970s release 1.0 inclusive plant dna c-values database launched 2001 subsequent releases 2.0 january 2003 3.0 december 2004 addition angiosperm dataset made available 1997 database expanded taxonomically several times includes data pteridophytes since 2000 gymnosperms since 2001 bryophytes since 2001 algae since 2004 see 1 update history note subset databases cited individually may contain different sets authors recent release database release 7.1 went live april 2019 contains data 12,273 species plants comprising 10,770 angiosperms 421 gymnosperms 303 pteridophytes 246 ferns fern allies 57 lycophytes 334 bryophytes 445 algae similar animal genome size database created 2001 dr. t. ryan gregory university guelph canada | [] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.