node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
9,786
3
Embrace,_extend,_and_extinguish:embrace extend extinguish embrace extend extinguish eee also known embrace extend exterminate phrase u.s. department justice found used internally microsoft describe strategy entering product categories involving widely used standards extending standards proprietary capabilities using differences strongly disadvantage competitors strategy phrase embrace extend first described outside microsoft 1996 article new york times titled tomorrow world wide web microsoft pc king wants reign internet writer john markoff said rather merely embrace extend internet company critics fear microsoft intends engulf phrase embrace extend also appears facetious motivational song anonymous microsoft employee interview steve ballmer new york times variation embrace extend extinguish first introduced united states v. microsoft antitrust trial vice president intel steven mcgeady used phrase explain microsoft vice president paul maritz statement 1995 meeting intel described microsoft strategy kill html extending strategy three phases microsoft claims original strategy anti-competitive rather exercise discretion implement features believes customers want older variant phrase embrace extend innovate j allard 1994 memo windows next killer application internet paul maritz executives microsoft memo starts background internet general proposes strategy turn windows next killer app internet browser wars companies besides microsoft introduced proprietary non–standards-compliant extensions example 1995 netscape implemented font tag among html extensions without seeking review standards body rise internet explorer two companies became locked dead heat out-implement non–standards-compliant features 2004 prevent repeat browser wars resulting morass conflicting standards browser vendors apple inc. safari mozilla foundation firefox google inc. google chrome opera software opera browser formed web hypertext application technology working group whatwg create open standards complement world wide web consortium microsoft refused join citing group lack patent policy reason
[ 8584, 4011, 5612, 5677, 7983, 6098, 5078, 8923, 124 ]
Test
9,787
0
Praat:praat praat talk free computer software package speech analysis phonetics designed continues developed paul boersma david weenink university amsterdam run wide range operating systems including various versions unix linux mac microsoft windows 2000 xp vista 7 8 10 program supports speech synthesis including articulatory synthesis
[ 6144, 3874, 3533, 6797, 7983, 5492, 823, 2045 ]
Test
9,788
3
Approximate_computing:approximate computing approximate computing computation technique returns possibly inaccurate result rather guaranteed accurate result used applications approximate result sufficient purpose one example situation search engine exact answer may exist certain search query hence many answers may acceptable similarly occasional dropping frames video application go undetected due perceptual limitations humans approximate computing based observation many scenarios although performing exact computation requires large amount resources allowing bounded approximation provide disproportionate gains performance energy still achieving acceptable result accuracy example k -means clustering algorithm allowing 5 loss classification accuracy provide 50 times energy saving compared fully accurate classification key requirement approximate computing approximation introduced non-critical data since approximating critical data e.g. control operations lead disastrous consequences program crash erroneous output several strategies used performing approximate computing approximate computing used variety domains applications error-tolerant multimedia processing machine learning signal processing scientific computing etc google using approach tensor processing units tpu custom asic main issue approximate computing identification section application approximated case large scale applications common find people holding expertise approximate computing techniques enough expertise application domain vice versa order solve problem programming paradigms proposed common clear role separation application programmer application domain expert approaches allow spread common optimizations approximate computing techniques
[ 1801, 9345, 10469 ]
Test
9,789
7
Sqoop:sqoop sqoop command-line interface application transferring data relational databases hadoop sqoop supports incremental loads single table free form sql query well saved jobs run multiple times import updates made database since last import imports also used populate tables hive hbase exports used put data hadoop relational database sqoop got name sql-to-hadoop sqoop became top-level apache project march 2012 informatica provides sqoop-based connector version 10.1 pentaho provides open-source sqoop based connector steps sqoop import sqoop export etl suite pentaho data integration since version 4.5 software microsoft uses sqoop-based connector help transfer data microsoft sql server databases hadoop couchbase inc. also provides couchbase server-hadoop connector means sqoop
[ 10377, 8460, 7567, 1296, 6161, 10134, 1047, 11030, 8217, 11161, 6555, 8860, 3877, 10661, 11303, 5677, 1327, 7983, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 9286, 4944, 1363, 8408, 9179, ...
Validation
9,790
9
Envoy_(WordPerfect):envoy wordperfect computing envoy proprietary portable document file format marketed wordperfect corporation created competitor acrobat pro introduced tumbleweed communications corporation 1993 shipped wordperfect office march 1994 envoy file could created use special printer driver wordperfect resulting document could viewed separate viewer application envoy distributable viewer also worked web browser plugin unlike adobe pdf file format publicly documented envoy failed make headway pdf largely unused reported success reading envoy documents printing postscript envoy distributable viewer converting postscript file pdf postscript file also viewed directly using viewer ghostscript
[ 3974, 10352, 3921, 8627, 8628 ]
Test
9,791
4
Rootkit:rootkit rootkit collection computer software typically malicious designed enable access computer area software otherwise allowed example unauthorized user often masks existence existence software term rootkit concatenation root traditional name privileged account unix-like operating systems word kit refers software components implement tool term rootkit negative connotations association malware rootkit installation automated attacker install obtained root administrator access obtaining access result direct attack system i.e exploiting known vulnerability privilege escalation password obtained cracking social engineering tactics like phishing installed becomes possible hide intrusion well maintain privileged access key root administrator access full control system means existing software modified including software might otherwise used detect circumvent rootkit detection difficult rootkit may able subvert software intended find detection methods include using alternative trusted operating system behavioral-based methods signature scanning difference scanning memory dump analysis removal complicated practically impossible especially cases rootkit resides kernel reinstallation operating system may available solution problem dealing firmware rootkits removal may require hardware replacement specialized equipment term rootkit root kit originally referred maliciously modified set administrative tools unix-like operating system granted root access intruder could replace standard administrative tools system rootkit intruder could obtain root access system whilst simultaneously concealing activities legitimate system administrator first-generation rootkits trivial detect using tools tripwire compromised access information lane davis steven dake wrote earliest known rootkit 1990 sun microsystems sunos unix operating system lecture gave upon receiving turing award 1983 ken thompson bell labs one creators unix theorized subverting c compiler unix distribution discussed exploit modified compiler would detect attempts compile unix codice_1 command generate altered code would accept user correct password additional backdoor password known attacker additionally compiler would detect attempts compile new version compiler would insert exploits new compiler review source code codice_1 command updated compiler would reveal malicious code exploit equivalent rootkit first documented computer virus target personal computer discovered 1986 used cloaking techniques hide brain virus intercepted attempts read boot sector redirected elsewhere disk copy original boot sector kept time dos-virus cloaking methods became sophisticated advanced techniques including hooking low-level disk int 13h bios interrupt calls hide unauthorized modifications files first malicious rootkit windows nt operating system appeared 1999 trojan called ntrootkit created greg hoglund followed hackerdefender 2003 first rootkit targeting mac os x appeared 2009 stuxnet worm first target programmable logic controllers plc 2005 sony bmg published cds copy protection digital rights management software called extended copy protection created software company first 4 internet software included music player silently installed rootkit limited user ability access cd software engineer mark russinovich created rootkit detection tool rootkitrevealer discovered rootkit one computers ensuing scandal raised public awareness rootkits cloak rootkit hid user file starting sys soon russinovich report malware appeared took advantage vulnerability affected systems one bbc analyst called public relations nightmare sony bmg released patches uninstall rootkit exposed users even serious vulnerability company eventually recalled cds united states class-action lawsuit brought sony bmg greek wiretapping case 2004-05 also referred greek watergate involved illegal telephone tapping 100 mobile phones vodafone greece network belonging mostly members greek government top-ranking civil servants taps began sometime near beginning august 2004 removed march 2005 without discovering identity perpetrators intruders installed rootkit targeting ericsson axe telephone exchange according ieee spectrum first time rootkit observed special-purpose system case ericsson telephone switch rootkit designed patch memory exchange running enable wiretapping disabling audit logs patch commands list active processes active data blocks modify data block checksum verification command backdoor allowed operator sysadmin status deactivate exchange transaction log alarms access commands related surveillance capability rootkit discovered intruders installed faulty update caused sms texts undelivered leading automated failure report generated ericsson engineers called investigate fault discovered hidden data blocks containing list phone numbers monitored along rootkit illicit monitoring software modern rootkits elevate access rather used make another software payload undetectable adding stealth capabilities rootkits classified malware payloads bundled malicious example payload might covertly steal user passwords credit card information computing resources conduct unauthorized activities small number rootkits may considered utility applications users example rootkit might cloak cd-rom-emulation driver allowing video game users defeat anti-piracy measures require insertion original installation media physical optical drive verify software legitimately purchased rootkits payloads many uses instances rootkits provide desired functionality may installed intentionally behalf computer user least five types rootkit ranging lowest level firmware highest privileges least privileged user-based variants operate ring 3 hybrid combinations may occur spanning example user mode kernel mode user-mode rootkits run ring 3 along applications user rather low-level system processes number possible installation vectors intercept modify standard behavior application programming interfaces apis inject dynamically linked library .dll file windows .dylib file mac os x processes thereby able execute inside target process spoof others sufficient privileges simply overwrite memory target application injection mechanisms include kernel-mode rootkits run highest operating system privileges ring 0 adding code replacing portions core operating system including kernel associated device drivers operating systems support kernel-mode device drivers execute privileges operating system many kernel-mode rootkits developed device drivers loadable modules loadable kernel modules linux device drivers microsoft windows class rootkit unrestricted security access difficult write complexity makes bugs common bugs code operating kernel level may seriously impact system stability leading discovery rootkit one first widely known kernel rootkits developed windows nt 4.0 released phrack magazine 1999 greg hoglund kernel rootkits especially difficult detect remove operate security level operating system thus able intercept subvert trusted operating system operations software antivirus software running compromised system equally vulnerable situation part system trusted rootkit modify data structures windows kernel using method known direct kernel object manipulation dkom method used hide processes kernel mode rootkit also hook system service descriptor table ssdt modify gates user mode kernel mode order cloak similarly linux operating system rootkit modify system call table subvert kernel functionality common rootkit creates hidden encrypted filesystem hide malware original copies files infected operating systems evolving counter threat kernel-mode rootkits example 64-bit editions microsoft windows implement mandatory signing kernel-level drivers order make difficult untrusted code execute highest privileges system kernel-mode rootkit variant called bootkit infect startup code like master boot record mbr volume boot record vbr boot sector way used attack full disk encryption systems example attack disk encryption evil maid attack attacker installs bootkit unattended computer envisioned scenario maid sneaking hotel room victims left hardware bootkit replaces legitimate boot loader one control typically malware loader persists transition protected mode kernel loaded thus able subvert kernel example stoned bootkit subverts system using compromised boot loader intercept encryption keys passwords recently alureon rootkit successfully subverted requirement 64-bit kernel-mode driver signing windows 7 modifying master boot record although malware sense something user n't want certain vista loader windows loader software work similar way injecting acpi slic system licensed internal code table ram-cached version bios boot order defeat windows vista windows 7 activation process vector attack rendered useless non-server versions windows 8 use unique machine-specific key system used one machine many antivirus companies provide free utilities programs remove bootkits rootkits created type ii hypervisors academia proofs concept exploiting hardware virtualization features intel vt amd-v type rootkit runs ring -1 hosts target operating system virtual machine thereby enabling rootkit intercept hardware calls made original operating system unlike normal hypervisors load operating system load operating system promoting virtual machine hypervisor rootkit make modifications kernel target subvert however mean detected guest operating system example timing differences may detectable cpu instructions subvirt laboratory rootkit developed jointly microsoft university michigan researchers academic example virtual machine–based rootkit vmbr blue pill software another 2009 researchers microsoft north carolina state university demonstrated hypervisor-layer anti-rootkit called hooksafe provides generic protection kernel-mode rootkits windows 10 introduced new feature called device guard takes advantage virtualization provide independent external protection operating system rootkit-type malware firmware rootkit uses device platform firmware create persistent malware image hardware router network card hard drive system bios rootkit hides firmware firmware usually inspected code integrity john heasman demonstrated viability firmware rootkits acpi firmware routines pci expansion card rom october 2008 criminals tampered european credit card-reading machines installed devices intercepted transmitted credit card details via mobile phone network march 2009 researchers alfredo ortega anibal sacco published details bios-level windows rootkit able survive disk replacement operating system re-installation months later learned laptops sold legitimate rootkit known absolute computrace absolute lojack laptops preinstalled many bios images anti-theft technology system researchers showed turned malicious purposes intel active management technology part intel vpro implements out-of-band management giving administrators remote administration remote management remote control pcs involvement host processor bios even system powered remote administration includes remote power-up power-down remote reset redirected boot console redirection pre-boot access bios settings programmable filtering inbound outbound network traffic agent presence checking out-of-band policy-based alerting access system information hardware asset information persistent event logs information stored dedicated memory hard drive accessible even os pc powered functions require deepest level rootkit second non-removable spy computer built around main computer sandy bridge future chipsets ability remotely kill restore lost stolen pc via 3g hardware rootkits built chipset help recover stolen computers remove data render useless also present privacy security concerns undetectable spying redirection management hackers might gain control rootkits employ variety techniques gain control system type rootkit influences choice attack vector common technique leverages security vulnerabilities achieve surreptitious privilege escalation another approach use trojan horse deceiving computer user trusting rootkit installation program benign—in case social engineering convinces user rootkit beneficial installation task made easier principle least privilege applied since rootkit explicitly request elevated administrator-level privileges classes rootkits installed someone physical access target system rootkits may also installed intentionally owner system somebody authorized owner e.g purpose employee monitoring rendering subversive techniques unnecessary malicious rootkit installations commercially driven pay-per-install ppi compensation method typical distribution installed rootkit takes active measures obscure presence within host system subversion evasion standard operating system security tools application programming interface apis used diagnosis scanning monitoring rootkits achieve modifying behavior core parts operating system loading code processes installation modification drivers kernel modules obfuscation techniques include concealing running processes system-monitoring mechanisms hiding system files configuration data uncommon rootkit disable event logging capacity operating system attempt hide evidence attack rootkits theory subvert operating system activities perfect rootkit thought similar perfect crime one nobody realizes taken place rootkits also take number measures ensure survival detection cleaning antivirus software addition commonly installing ring 0 kernel-mode complete access system include polymorphism changing signature hard detect stealth techniques regeneration disabling turning anti-malware software installing virtual machines may easier researchers discover analyze fundamental problem rootkit detection operating system subverted particularly kernel-level rootkit trusted find unauthorized modifications components actions requesting list running processes list files directory trusted behave expected words rootkit detectors work running infected systems effective rootkits defect camouflage run lower user-mode privileges detection software kernel computer viruses detection elimination rootkits ongoing struggle sides conflict detection take number different approaches including looking virus signatures e.g antivirus software integrity checking e.g digital signatures difference-based detection comparison expected vs. actual results behavioral detection e.g monitoring cpu usage network traffic kernel-mode rootkits detection considerably complex requiring careful scrutiny system call table look hooked functions malware may subverting system behavior well forensic scanning memory patterns indicate hidden processes unix rootkit detection offerings include zeppoo chkrootkit rkhunter ossec windows detection tools include microsoft sysinternals rootkitrevealer avast antivirus sophos anti-rootkit f-secure radix gmer windowsscope rootkit detectors prove effective ultimately contribute ineffectiveness malware authors adapt test code escape detection well-used tools detection examining storage suspect operating system operational miss rootkits recognised checking software rootkit active suspicious behavior suppressed conventional anti-malware software running rootkit operational may fail rootkit hides effectively best reliable method operating-system-level rootkit detection shut computer suspected infection check storage booting alternative trusted medium e.g rescue cd-rom usb flash drive technique effective rootkit actively hide presence running behavioral-based approach detecting rootkits attempts infer presence rootkit looking rootkit-like behavior example profiling system differences timing frequency api calls overall cpu utilization attributed rootkit method complex hampered high incidence false positives defective rootkits sometimes introduce obvious changes system alureon rootkit crashed windows systems security update exposed design flaw code logs packet analyzer firewall intrusion prevention system may present evidence rootkit behaviour networked environment antivirus products rarely catch viruses public tests depending used extent even though security software vendors incorporate rootkit detection products rootkit attempt hide antivirus scan stealth detector may notice rootkit attempts temporarily unload system signature detection fingerprinting still find combined approach forces attackers implement counterattack mechanisms retro routines attempt terminate antivirus programs signature-based detection methods effective well-published rootkits less specially crafted custom-root rootkits another method detect rootkits compares trusted raw data tainted content returned api example binaries present disk compared copies within operating memory operating systems in-memory image identical on-disk image results returned file system windows registry apis checked raw structures underlying physical disks—however case former valid differences introduced operating system mechanisms like memory relocation shimming rootkit may detect presence difference-based scanner virtual machine latter commonly used perform forensic analysis adjust behaviour differences detected difference-based detection used russinovich rootkitrevealer tool find sony drm rootkit code signing uses public-key infrastructure check file modified since digitally signed publisher alternatively system owner administrator use cryptographic hash function compute fingerprint installation time help detect subsequent unauthorized changes on-disk code libraries however unsophisticated schemes check whether code modified since installation time subversion prior time detectable fingerprint must re-established time changes made system example installing security updates service pack hash function creates message digest relatively short code calculated bit file using algorithm creates large changes message digest even smaller changes original file recalculating comparing message digest installed files regular intervals trusted list message digests changes system detected monitored—as long original baseline created malware added more-sophisticated rootkits able subvert verification process presenting unmodified copy file inspection making code modifications memory reconfiguration registers later compared white list expected values code performs hash compare extend operations must also protected—in context notion immutable root-of-trust holds first code measure security properties system must trusted ensure rootkit bootkit compromise system fundamental level forcing complete dump virtual memory capture active rootkit kernel dump case kernel-mode rootkit allowing offline forensic analysis performed debugger resulting dump file without rootkit able take measures cloak technique highly specialized may require access non-public source code debugging symbols memory dumps initiated operating system always used detect hypervisor-based rootkit able intercept subvert lowest-level attempts read memory—a hardware device one implements non-maskable interrupt may required dump memory scenario virtual machines also make easier analyze memory compromised machine underlying hypervisor rootkits avoid infecting virtual machines reason manual removal rootkit often difficult typical computer user number security-software vendors offer tools automatically detect remove rootkits typically part antivirus suite microsoft monthly windows malicious software removal tool able detect remove classes rootkits also windows defender offline remove rootkits runs trusted environment operating system starts antivirus scanners bypass file system apis vulnerable manipulation rootkit instead access raw file system structures directly use information validate results system apis identify differences may caused rootkit experts believe reliable way remove re-install operating system trusted media antivirus malware removal tools running untrusted system may ineffective well-written kernel-mode rootkits booting alternative operating system trusted media allow infected system volume mounted potentially safely cleaned critical data copied off—or alternatively forensic examination performed lightweight operating systems windows pe windows recovery console windows recovery environment bartpe live distros used purpose allowing system cleaned even type nature rootkit known manual repair may impractical re-installing operating system applications safer simpler quicker like much malware used attackers many rootkit implementations shared easily available internet uncommon see compromised system sophisticated publicly available rootkit hides presence unsophisticated worms attack tools apparently written inexperienced programmers rootkits available internet originated exploits academic proofs concept demonstrate varying methods hiding things within computer system taking unauthorized control often fully optimized stealth rootkits sometimes leave unintended evidence presence even rootkits used attack often effective rootkits keylogging features gameguard installed part online commercial games system hardening represents one first layers defence rootkit prevent able install applying security patches implementing principle least privilege reducing attack surface installing antivirus software standard security best practices effective classes malware new secure boot specifications like unified extensible firmware interface designed address threat bootkits even vulnerable security features offer utilized server systems remote server attestation using technologies intel trusted execution technology txt provide way verifying servers remain known good state example microsoft bitlocker encryption data-at-rest verifies servers known good state bootup privatecore vcage software offering secures data-in-use memory avoid bootkits rootkits verifying servers known good state bootup privatecore implementation works concert intel txt locks server system interfaces avoid potential bootkits rootkits
[ 3072, 2049, 5636, 10245, 10756, 3595, 9227, 9233, 9746, 9242, 9761, 9762, 2084, 3620, 7207, 9256, 9771, 3629, 7222, 10297, 3643, 5179, 7739, 3135, 1088, 4165, 10835, 3163, 6241, 107, 10348, 6254, 7794, 1143, 10872, 10875, 1660, 4732, 1150, ...
Test
9,792
4
Sparse_binary_polynomial_hashing:sparse binary polynomial hashing sparse binary polynomial hashing sbph generalization bayesian spam filtering match mutating phrases well single words sbph way generating large number features incoming text automatically using statistics determine weights features terms predictive values spam/nonspam evaluation
[ 8747 ]
Train
9,793
7
C-RAN:c-ran c-ran cloud-ran sometimes referred centralized-ran architecture cellular networks first introduced china mobile research institute april 2010 beijing china 9 years disclosed patent applications filed u.s. companies simply speaking c-ran centralized cloud computing-based architecture radio access networks supports 2g 3g 4g future wireless communication standards name comes four c main characteristics c-ran system clean centralized processing collaborative radio real-time cloud radio access network traditional cellular radio access networks ran consist many stand-alone base stations bts bts covers small area whereas group bts provides coverage continuous area bts processes transmits signal mobile terminal forwards data payload mobile terminal core network via backhaul bts cooling back haul transportation backup battery monitoring system limited spectral resources network operators 'reuse frequency among different base stations cause interference neighbouring cells several limitations traditional cellular architecture first bts costly build operate moore law helps reduce size power electrical system supporting facilities bts improved quite well second bts added system improve capacity interference among bts severe bts closer using frequency third users mobile traffic bts fluctuates called 'tide effect result average utilization rate individual bts pretty low however processing resources shared bts therefore bts designed handle maximum traffic average traffic resulting waste processing resources power idle times 1g 2g cellular networks base stations all-in-one architecture analog digital power functions housed single cabinet large refrigerator usually base station cabinet placed dedicated room along necessary supporting facilitates power backup battery air conditioning environment surveillance backhaul transmission equipment rf signal generated base station rf unit propagates pairs rf cables antennas top base station tower mounting points all-in-one architecture mostly found macro cell deployments 3g distributed base station architecture introduced ericsson nokia huawei leading telecom equipment vendors architecture radio function unit also known remote radio head rrh separated digital function unit baseband unit bbu fiber digital baseband signals carried fiber using open base station architecture initiative obsai common public radio interface cpri standard rrh installed top tower close antenna reducing loss compared traditional base station rf signal travel long cable base station cabinet antenna top tower fiber link rrh bbu also allows flexibility network planning deployment placed hundreds meters kilometres away modern base stations use decoupled architecture c-ran may viewed architectural evolution distributed base station system takes advantage many technological advances wireless optical communications systems example uses latest cpri standard low cost coarse dense wavelength division multiplexing cwdm/ dwdm technology mmwave allow transmission baseband signal long distance thus achieving large scale centralised base station deployment applies recent data centre network technology allow low cost high reliability low latency high bandwidth interconnect network bbu pool utilises open platforms real-time virtualisation technology rooted cloud computing achieve dynamic shared resource allocation support multi-vendor multi-technology environments c-ran architecture following characteristics distinct cellular architectures kt telecom operator republic korea introduced cloud computing center ccc system 3g wcdma/hspa 4g lte/lte-a network 2011 2012 concept ccc basically c-ran sk telecom also deployed smart cloud access network scan advanced-scan 4g lte/lte-a network korea later 2012 2014 airvana commscope introduced onecell c-ran-based small cell system designed enterprises public spaces one major alternative solution addressing similar challenges ran small size all-in-one outdoor bts thanks achievements semiconductor industry functionality bts including rf baseband processing mac processing package level processing implemented volume 50 litres makes system small weatherproof reduces difficulty bts site choice construction eliminates air conditioning requirement thus reduces operational costs however bts still working readily make use collaboration algorithms reduce interference neighboring btss also relatively hard upgrade repair all-in-one bts units usually mounted near antenna processing units less-protected environments also implies higher failure rate compared c-ran rru deployed outdoors advantage cloud ran lies ability implement lte-advanced features coordinated multipoint comp low latency multiple radio heads however economic benefit improvements comp negated higher backhaul costs operators main competition small cell c-ran occurs two deployment scenarios outdoor hotspot coverage indoor coverage one promising evolution paths future cellular network architecture c-ran attracted high academic research interest meanwhile native support cooperative radio capability built c-ran architecture also enables many advanced algorithms hard implement cellular networks including cooperative multi-point transmission/receiving network coding etc october 2011 wireless world research forum 27 hosted germany china mobile invited give c-ran presentation august 2012 ieee c-ran 2012 workshop hosted kunming china crc press published book green communications theoretical fundamentals algorithms applications 11th chapter c-ran green ran framework december 2012 ieee globalcom 2012 conference international workshop cloud based-stations large-scale cooperative communications hosted california usa european committee frame project 7 sponsors currently addressing many problems related cellular network architecture evolution many projects taken c-ran one future cellular network architectures like mobile cloud network project
[ 2273, 5321, 10303 ]
Validation
9,794
9
Volatile_(computer_programming):volatile computer programming computer programming particularly c c++ c java programming languages volatile keyword indicates value may change different accesses even appear modified keyword prevents optimizing compiler optimizing away subsequent reads writes thus incorrectly reusing stale value omitting writes volatile values primarily arise hardware access memory-mapped i/o reading writing memory used communicate peripheral devices threading different thread may modified value despite common keyword behavior codice_1 differs significantly programming languages easily misunderstood c c++ type qualifier like codice_2 property type furthermore c c++ work threading scenarios use discouraged java c property variable indicates object variable bound may mutate specifically intended threading programming language separate keyword codice_3 threading usage codice_1 keyword exists c consequently c++ codice_1 keyword intended operations codice_1 variables atomic establish proper happens-before relationship threading specified relevant standards c c++ posix win32 volatile variables threadsafe vast majority current implementations thus usage codice_1 keyword portable synchronization mechanism discouraged many c/c++ groups example code sets value stored codice_11 codice_12 starts poll value repeatedly changes codice_13 static int foo void bar void optimizing compiler notice code possibly change value stored codice_11 assume remain equal codice_12 times compiler therefore replace function body infinite loop similar void bar_optimized void however codice_11 might represent location changed elements computer system time hardware register device connected cpu code would never detect change without codice_1 keyword compiler assumes current program part system could change value far common situation prevent compiler optimizing code codice_1 keyword used static volatile int foo void bar void modification loop condition optimized away system detect change occurs generally memory barrier operations available platforms exposed c++11 preferred instead volatile allow compiler perform better optimization importantly guarantee correct behaviour multi-threaded scenarios neither c specification c11 c++ specification c++11 specifies multi-threaded memory model volatile may behave deterministically across oses/compilers/cpus following c programs accompanying assemblies demonstrate codice_1 keyword affects compiler output compiler case gcc observing assembly code clearly visible code generated codice_1 objects verbose making longer nature codice_1 objects fulfilled codice_1 keyword prevents compiler performing optimization code involving volatile objects thus ensuring volatile variable assignment read corresponding memory access without codice_1 keyword compiler knows variable need reread memory use writes memory location thread process according c++11 iso standard volatile keyword meant use hardware access use inter-thread communication inter-thread communication standard library provides codice_24 templates java programming language also codice_1 keyword used somewhat different purpose applied field java qualifier codice_1 provides following guarantees using codice_1 may faster lock work situations range situations volatile effective expanded java 5 particular double-checked locking works correctly c codice_1 ensures code accessing field subject thread-unsafe optimizations may performed compiler clr hardware following types marked volatile reference types single boolean byte sbyte int16 uint16 int32 uint32 char enumerated types underlying type byte sbyte int16 uint16 int32 uint32 excludes value structs well primitive types double int64 uint64 decimal basically codice_1 shorthand calling codice_30 codice_31 methods special effect methods disable optimizations usually performed c compiler jit compiler cpu methods work follows codice_35 part fortran 2003 standard although earlier version supported extension making variables codice_1 function also useful finding aliasing related bugs integer volatile defined volatile following two lines code identical write i**2 loads variable memory multiplies value times write i*i loads variable twice memory multiplies values always drilling memory volatile fortran compiler precluded reordering reads writes volatiles makes visible threads actions done thread vice versa use volatile reduces even prevent optimization
[ 2529, 10145, 5029, 8262, 5911, 5165, 5677, 655, 2226, 3767, 3960, 3321, 380, 2045, 2620 ]
None
9,795
9
HP-GL:hp-gl hp-gl short hewlett-packard graphics language often written hpgl printer control language created hewlett-packard hp hp-gl primary printer control language used hp plotters introduced plotter hp-8972 1977 became standard almost plotters hewlett-packard printers also usually support hp-gl/2 addition pcl language formed series two letter codes mnemonics followed optional parameters instance arc drawn page sending string codice_1 means arc absolute parameters place center arc absolute coordinates 100,100 page starting angle 50 degrees measured counter-clockwise fourth optional parameter used specifies far arc continues defaults 5 degrees first introduced hp-gl contained following commands formats typical hp-gl files start setup commands followed long string graphics commands file ascii text file format instance coordinate system based smallest units one hp plotters could support set 25 µm i.e 40 units per millimeter 1016 per inch coordinate space positive negative floating point numbers specifically ±2 original hp-gl language support definition line width parameter determined pens loaded plotter advent first inkjet plotters line width pens specified within hp-gl files set printer would know line width print pen cumbersome error-prone process hewlett-packard graphics language/2 aka hp-gl/2 definition line width introduced language allowed elimination step also among improvements binary file format defined allowed smaller files shorter file transfer times minimal resolution reduced.. hp-gl related agl graphics language extension basic programming language agl implemented hewlett-packard minicomputers simplify controlling plotter agl commands describe desired graphics plotting function computer relays several hp-gl instructions plotter
[ 6594, 8765, 11074, 5384, 7849, 6830, 8628, 4121, 8763, 8733 ]
Test
9,796
0
Semantic_parsing:semantic parsing semantic parsing task converting natural language utterance logical form machine-understandable representation meaning semantic parsing thus understood extracting precise meaning utterance applications semantic parsing include machine translation question answering code generation phrase first used 1970 yorick wilks basis machine translation programs working semantic representations shallow semantic parsing concerned identifying entities utterance labelling roles play shallow semantic parsing sometimes known slot-filling frame semantic parsing since theoretical basis comes frame semantics wherein word evokes frame related concepts roles slot-filling systems widely used virtual assistants conjunction intent classifiers seen mechanisms identifying frame evoked utterance popular architectures slot-filling largely variants encoder-decoder model wherein two recurrent neural networks rnns trained jointly encode utterance vector decode vector sequence slot labels type model used amazon alexa spoken language understanding system deep semantic parsing also known compositional semantic parsing concerned producing precise meaning representations utterances contain significant compositionality shallow semantic parsers parse utterances like show flights boston dallas classifying intent list flights filling slots source destination boston dallas respectively however shallow semantic parsing parse arbitrary compositional utterances like show flights boston anywhere flights juneau deep semantic parsing attempts parse utterances typically converting formal meaning representation language early semantic parsers used highly domain-specific meaning representation languages later systems using extensible languages like prolog lambda calculus lambda dependency-based compositional semantics λ-dcs sql python java alexa meaning representation language abstract meaning representation amr work used exotic meaning representations like query graphs semantic graphs vector representations modern deep semantic parsing models either based defining formal grammar chart parser utilizing rnns directly translate natural language meaning representation language examples systems built formal grammars cornell semantic parsing framework stanford university semantic parsing execution sempre word alignment-based semantic parser wasp datasets used training statistical semantic parsing models divided two main classes based application used question answering via knowledge base queries used code generation standard dataset question answering via semantic parsing air travel information system atis dataset contains questions commands upcoming flights well corresponding sql another benchmark dataset geoquery dataset contains questions geography u.s. paired corresponding prolog overnight dataset used test well semantic parsers adapt across multiple domains contains natural language queries 8 different domains paired corresponding λ-dcs expressions popular datasets code generation include two trading card datasets link text appears cards code precisely represents cards one constructed linking card texts java snippets linking hearthstone card texts python snippets ifttt dataset uses specialized domain-specific language short conditional commands django dataset pairs python snippets english japanese pseudocode describing robocup dataset pairs english rules representations domain-specific language understood virtual soccer-playing robots
[ 3617, 6274, 3748, 8421, 1737, 8554, 5677, 10413, 2831, 10577, 11538, 10517, 5399, 7164 ]
Test
9,797
7
Distributed_manufacturing:distributed manufacturing distributed manufacturing also known distributed production cloud producing local manufacturing form decentralized manufacturing practiced enterprises using network geographically dispersed manufacturing facilities coordinated using information technology also refer local manufacture via historic cottage industry model manufacturing takes place homes consumers within maker movement diy culture small scale production consumers often using peer peer resources referred distributed manufacturing consumers download digital designs open design repository website like youmagine thingiverse produce product low costs distributed network 3d printing services 3d hubs home open-source 3-d printer reprap primary attribute distributed manufacturing ability create value geographically dispersed locations via manufacturing example shipping costs could minimized products built geographically close intended markets also products manufactured number small facilities distributed wide area customized details adapted individual regional tastes manufacturing components different physical locations managing supply chain bring together final assembly product also considered form distributed manufacturing digital networks combined additive manufacturing allow companies decentralized geographically independent distributed production cloud manufacturing call attention conjunction commons-based peer production distributed manufacturing techniques self-reinforced fantasy system eternal growth overcome development economies scope civil society play important role contributing raising whole productive structure higher plateau sustainable customised productivity true many issues problems threats rise due large democratization means production especially regarding physical ones instance recyclability advanced nanomaterials still questioned weapons manufacturing could become easier mention implications counterfeiting intellectual property might maintained contrast industrial paradigm whose competitive dynamics economies scale commons-based peer production distributed manufacturing could develop economies scope advantages scale rest cheap global transportation economies scope share infrastructure costs intangible tangible productive resources taking advantage capabilities fabrication tools following neil gershenfeld “ least developed parts world need advanced technologies ” commons-based peer production distributed manufacturing may offer necessary tools thinking globally act locally response certain problems needs well supporting individual personal manufacturing social economic benefits expected result development local production economies particular humanitarian development sector becoming increasingly interested distributed manufacturing overcome supply chain challenges last mile distribution
[ 1048, 11117 ]
Validation
9,798
0
Julius_(software):julius software julius speech recognition engine specifically high-performance two-pass large vocabulary continuous speech recognition lvcsr decoder software speech-related researchers developers perform almost real-time computing rtc decoding current personal computers pcs 60k word dictation task using word trigram 3-gram context-dependent hidden markov model hmm major search methods fully incorporated also modularized carefully independent model structures various hmm types supported shared-state triphones tied-mixture models number mixtures states phones standard formats adopted cope free modeling toolkit main platform linux unix workstations works windows julius free open-source software released revised bsd style software license julius developed part free software toolkit japanese lvcsr research since 1997 work continued continuous speech recognition consortium csrc japan 2000 2003 rev.3.4 grammar-based recognition parser named julian integrated julius julian modified version julius uses hand-designed type finite-state machine fsm termed deterministic finite automaton dfa grammar language model used build kind voice command system small vocabulary various spoken dialog system tasks run julius recognizer needs language model acoustic model language julius adopts acoustic models hidden markov model toolkit htk ascii format pronunciation dictionary htk-like format word 3-gram language models arpa standard format forward 2-gram reverse 3-gram trained speech corpus reversed word order although julius distributed japanese models voxforge project working create english acoustic models use julius speech recognition engine recently april 2018 thanks effort mozilla foundation 350 hours spoken english audio corpus made available new english envr-v5.4 open source speech model released alongside polish plpl-v7.1 models available sourceforge
[ 1890, 5380, 9320, 9898, 5356, 6797, 6223, 7983, 5492, 823, 6362, 10557, 2045, 3998, 9151 ]
Test
9,799
3
Sound_Blaster_X-Fi:sound blaster x-fi sound blaster x-fi lineup sound cards creative technology sound blaster series series launched august 2005 lineup pci sound cards served introduction x-fi audio processing chip models ranging xtrememusic lower end platinum fatal1ty fps elite pro top range top-end elite pro model aimed musicians bundled x-fi external i/o box offering phono preamp inputs turntables high-impedance input guitars inch mic input headphone output line-in full size midi i/o well optical rca coaxial digital inputs outputs remote control platinum fatal1ty fps models offer front-panel drive-bay control unit remote control base model supplied without accessories top model claimed 109 db signal-to-noise ratio elite pro model uses higher-end dac 116 db claimed bottom two models feature 2 mb onboard x-ram top models offer 64 mb x-ram designed use games store sound samples improved gaming performance launch reviews support creative claims higher performance however even top-end 64 mb equipped model falling slightly behind older audigy cards october 2006 saw minor rebranding x-fi xtrememusic edition fact highly capable gaming card offers hardware decoding eax support replaced xtremegamer model revised model featured half-width pcb non-gold-plated connectors optical instead digital digital i/o module jack lacked connector users wishing purchase separate x-fi i/o box functionality otherwise market segment occupied xtrememusic moved downwards introduction cheaper 'xtreme audio 'xtreme audio notebook products despite x-fi label products x-fi line using emu20k1 chip ca20k1 older chip similar audigy se sb live cards ca0106-wbtlf thus lacking hardware acceleration 3d sound eax sound effects gaming content creation features i/o extensibility x-fi models new product introduced x-fi 'xtremegamer fatal1ty pro identical function fatal1ty fps made affordable unbundling i/o panel remote control 2007 creative technology unveiled pci express x1 expresscard/34 versions sound blaster x-fi xtreme audio consumer electronics show creative yet release pcie versions emu-based x-fi cards adapting ca20k1 chip pcie proved troublesome company reporting design difficulties latency problems delays 2008 x-fi titanium series announced using revised ca20k2 chip featured integraded risc processor safeguarding pcie-induced latencies ddr sdram interface place sdram integrated high definition audio architecture uaa component products included fatal1ty cards 64 mb x-ram optional i/o drive bay regular titanium 16 mb x-ram 109 db snr spec former unlike pci cards cards use software-based dolby digital live 5.1 encoding 2010 titanium hd added lineup featuring new dac 122 db snr rca audio outputs dropping support windows xp addition pci pcie internal sound cards creative also released external usb-based solution named x-mod november 2006 x-mod listed category rest x-fi lineup stereo device marketed improve music playing laptop computers lower specifications internal offerings external products use x-fi name include usb-based sound blaster x-fi hd sound blaster x-fi surround 5.1 pro sound blaster x-fi go pro internal hardware components different various usages needs gaming surround audiophile standards audio processor x-fi powerful time release offering extremely robust sample rate conversion src engine addition enhanced internal sound channel routing options greater 3d audio enhancement capabilities significant portion audio processing unit devoted resampling engine src engine far capable previous creative sound card offerings limitation major thorn creative side digital audio sampled 44.1 khz standard doubt related cd-da sound cards often designed process audio 48 khz 44.1 khz audio must resampled 48 khz creative previous cards dsps operated 48 khz audio dsp able process affect poor resampling implementation introduces artifacts audio heard measured higher intermodulation distortion within higher frequencies generally 16 khz x-fi resampling engine produces near-lossless-quality result far exceeding known audio card dsp available time release functionality used simple audio playback several features card technology claims improve clarity digital music digital analysis supported x-fi models including xtreme audio x-mod sound blaster x-fi presents following features usually implemented aid x-fi dsp software xtreme audio model since release x-fi caused several unsolved problems sound glitches various motherboards creative labs states primary function restore portions sound lost compression compression meant digital file-size reduction achieved digital audio data compression technologies like example mp3 rather idea reverse effects dynamic range compression analog technique used production 1990s newer audio cds exception classical music recordings make sound louder volume level setting found subjectively louder cds get airplay sell better achieve loudness without introducing strong distortion points signal volume reaches maximum compressed means case reduced volume whole signal multiplied factor maximum volume reached music whole louder maximum volume points mostly transients pronounced since whole process done final audio cd recorded effect equally present uncompressed audio files created cd lossless compressed audio made cd well lossy compressed audio cd transients typically found percussive sounds plosive consonants voice recordings first milliseconds so-called attack phase non-percussive instrument sounds tend somewhat muffled dynamic range compression undo effect uses multiband compander compressor/expander dynamically adjusted compression/expansion main function detect transients increase relative volume level consequence enabling signal altered whether result improves upon input audio purely matter perception depend type audio played cmss-3d recreates realistic surround sound audio source puts right center action whether using multichannel speakers headphones cmss-3d dsp feature provides audio enhancement requires creative proprietary drivers supported linux os depending equipment used cmss-3d 3 variants enabling setting apply special filtering algorithms order improve localization sound sources located close listener enabling setting apply special filtering algorithms order improve localization sound sources located listener environmental audio extensions designed enabled game developers within game enhance simulated-reality user experiencing example ringing game-world swords sound differently depending whether protagonist currently game-world temple vault game-world open field also 8 built-in eax effects enabled user smart volume management compressor evens dynamic range given source quieter sounds louder loud sounds quiet best used circumstances noise disturbance might issue late night instance otherwise generally preferable disabled render sound less dynamic instance lessening impact loud parts movies also making music sound less lively function divides music ten frequency bands adjusted using sliders multiple volume adjustments different inputs outputs system master volume affects settings default recommended value 50 sources actually equates 0 db amplification none 100 value causes 16 db amplification many creative previous sound cards x-fi supports soundfonts additionally audio creation mode card allows use eax midi playback via use controllers setting controls dd sound encoder setting dolby digital bitstream dts sound instead although creative slow embrace 64-bit drivers x-fi lineup x86-64 architecture based operating systems supported microsoft windows 7 includes basic driver support many x-fi series cards many x-fi features however require software applications provided creative order utilize full capabilities hardware september 24 2007 creative labs released closed source unsupported beta driver providing linux 64-bit os support following sound blaster x-fi series sound cards open-source driver available oss v4 build 1013 datasheets provided creative enable alsa driver development november 6 2008 creative finally released driver gpl license supports x86 well x86-64 architectures listed support area may 15 2009 communications creative suse developer takashi iwai finally got mergeable version x-fi driver august 31 2009 driver snd-ctxfi included release alsa 1.0.21 support creative sound blaster x-fi titanium hd added january 25 2012 alsa v1.0.25 release driver support i/o front panel ir documentation part missing xtreme audio different chipset stayed unsupported longer time currently supported advanced linux alsa driver modules might require installation additional packages alternative repositories x-fi mb pure software solution windows system requirement thus provide linux support entry-level model x-fi series sound blaster x-fi xtreme audio actually emu20k1 chip re-branded audigy se using family chips ca0106-wbtlf even drivers thus x-fi–related processing performed software also lacks basic hardware acceleration like sb live 24-bit audigy se budget soundblaster models x-fi xtreme audio use drivers rest x-fi family lacks asio games recognize x-fi capable hardware device hardware profile resembles older live audigy cards x-fi mb software solution enables basic x-fi features computers integrated audio x-fi device requires degree driver support audio hardware manufacturer x-fi mb commonly bundled motherboards computer systems comparable x-fi xtremeaudio bundled asus asrock motherboards x-fi mb sold x-fi supreme fx actually standard analog devices integrated hd audio codec paired x-fi mb x-fi features implemented entirely software hardware vendors sell x-fi mb solution simply sound blaster x-fi integrated sound x-fi mb available different versions e.g x-fi mb x-fi mb2 x-fi mb3 x-fi mb5 current version available select laptops desktops x-fi mb5 non-oem version x-fi mb3 sold creative labs works compatible motherboard sound chips realtek x-fi mb3 provides effective software version full x-fi card also provided version alchemy works non-creative sound cards restore legacy eax effects
[ 2368, 6971, 10369, 10371, 10363, 7820, 2221, 3791, 2383, 593, 6415, 8561, 8625, 10359, 10360, 4699 ]
Test
9,800
4
GingerMaster:gingermaster gingermaster malware affects android operating system version 2.3 first detected august 2011 gingermaster android malware contains root exploit packaged within infected app application launched android device acquires root privileges device accesses sensitive data gingermaster steals data
[ 11266, 10756, 901, 7739, 2538, 2259, 2041, 7515 ]
Test
9,801
7
Cloud-based_quantum_computing:cloud-based quantum computing cloud-based quantum computing invocation quantum emulators simulators processors cloud increasingly cloud services looked method providing access quantum processing quantum computers achieve massive computing power initiating quantum physics processing power users allowed access quantum-powered computers internet known quantum computing within cloud ibm connected small quantum computer cloud allows simple programs built executed cloud many people academic researchers professors schoolkids already built programs run many different quantum algorithms using program tools consumers hoped use fast computing model financial markets build advanced ai systems use methods allow people outside professional lab institution experience learn phenomena technology cloud-based quantum computing used several contexts
[ 10116, 1480, 11209, 74, 8554, 3573, 2680, 3323, 2781 ]
None
9,802
4
Backup_(software):backup software backup backup utility made apple mac os x available apple mobileme formerly .mac collection internet services backup used connection either user online mobileme idisk macintosh cd-rw dvd-r drive make safe archival copies critical files folders release icloud backup longer available release macos sierra longer works initial versions backup regarded feature-sparse frequently unstable however november 5 2003 apple released backup 2.0 added new features offered greater reliability predecessors backup 2 allowed creation archive copies important data overall basic feature set backup software apple introduced backup 3 paris expo september 20 2005 along upgrades .mac version offered backup settings ability back mail databases 2006 worldwide developers conference apple announced development time machine new backup application included mac os x v10.5 leopard time machine complete backup solution thus ability completely replace backup general backup solution mac users mobileme released july 11 2008 .mac discontinued backup continued available mobileme users software re-branded mobileme backup version 3.2 release
[ 11521, 2819, 1796, 3719, 4615, 10888, 11402, 9100, 5647, 10512, 1042, 8852, 9109, 7318, 4888, 5784, 3228, 11037, 2207, 1439, 3366, 811, 3371, 5292, 1710, 6700, 7983, 8877, 1074, 10036, 3766, 2232, 9912, 11257, 9406, 6849, 9025, 4933, 713, ...
Test
9,803
2
WiperSoft:wipersoft wipersoft anti-spyware program developed wiper software designed help users protect computers threats adware browser hijackers worms potentially unwanted programs pups currently available microsoft windows wipersoft launched 2015 available free program home users users able use scan removal functions without buy subscription 2016 re-released new modern design improved detection removal functionalities user-friendly interface year wipersoft also became paid program wipersoft saw big increase downloads sales 2017 reportedly used 1 million users 120 different countries tested softpedia 2017 rated 100 clean wipersoft primarily anti-spyware program comes two versions free wipersoft offers users scan computers spyware paid wipersoft features include spyware detection removal help desk services custom fix according wiper software program detect remove threats like potentially unwanted programs adware browser hijackers questionable toolbars browser add-ons detected potential threats automatically deleted users option keeping installed program also undo changes made detected threats change homepage default search engine program currently available microsoft windows users popular browsers google chrome mozilla firefox internet explorer opera supported program also available 10 languages
[ 8584, 9771, 877, 6797, 7983, 5935, 10392, 2041 ]
Test
9,804
9
ALGOL_58:algol 58 algol 58 originally known ial one family algol computer programming languages early compromise design soon superseded algol 60 according john backus zurich acm-gamm conference two principal motives proposing ial provide means communicating numerical methods procedures people b provide means realizing stated process variety machines ... algol 58 introduced fundamental notion compound statement restricted control flow tied identifier scope way algol 60 blocks bauer attributes name bottenbruch coined term algorithmic language algorithmische sprache 1957 least germany proposals universal language association computing machinery acm also german gesellschaft für angewandte mathematik und mechanik society applied mathematics mechanics gamm decided organize joint meeting combine meeting took place may 27 june 2 1958 eth zurich attended following people language originally proposed called ial international algebraic language according perlis rejected 'unspeakable pompous acronym algol suggested instead though officially adopted year later publication following meeting still used name ial end 1958 zmmd-group built working algol 58 compiler z22 computer zmmd abbreviation zürich rutishauser worked münchen workplace bauer samelson mainz location z22 computer darmstadt workplace bottenbruch algol 58 saw implementation effort ibm effort competition fortran soon abandoned also implemented dartmouth college lgp-30 implementation soon evolved algol 60 implementation burroughs 220 called balgol evolved along lines well retained much algol 58 original character algol 58 primary contribution later languages used basis jovial mad neliac algo also used 1959 publish algorithms cacm beginning trend using algol notation publication continued many years
[ 512, 9345, 5496, 1931, 4492, 6414, 10510, 5521, 6036, 3736, 10400, 1702, 428, 5806, 9008, 3765, 7479, 1976, 5946, 9019, 7612, 10043, 10684, 10047, 10560, 963, 8262, 1864, 3529, 1610, 5961, 11212, 8397, 5585, 11219, 5588, 7894, 1016, 4057, ...
None
9,805
7
Digital_transaction_management:digital transaction management digital transaction management dtm category cloud services designed digitally manage document-based transactions dtm removes friction inherent transactions involve people documents data create faster easier convenient secure processes dtm goes beyond content document management include e-signatures authentication non-repudiation enabling co-browsing customer business document transfer certification secure archiving goes beyond records management variety meta-processes around managing electronic transactions documents associated dtm standards proposed managed xdtm standard association aragon research estimated ye 2016 70 large enterprises dtm initiative underway fully implemented
[ 4194 ]
Train
9,806
2
Software_appliance:software appliance software appliance software application combined enough operating system jeos run optimally industry-standard hardware typically server virtual machine software distribution firmware implements computer appliance virtual appliances subset software appliances main distinction packaging format specificity target platform virtual appliance virtual machine image designed run specific virtualization platform software appliance often packaged generally applicable image format e.g. live cd supports installations physical machines multiple types virtual machines installing software appliance virtual machine packaging image creates virtual appliance software appliances several benefits traditional software applications installed top operating system software appliance packaged virtual machine format virtual appliance allowing run within virtual machine container virtual appliance could built using either standard virtual machine format open virtualization format ovf format specific particular virtual machine container example vmware virtualbox amazon ec2 software appliance packaged live cd image allowing run real hardware addition types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine image formats focus lowest common denominator instead i.e. iso images supported virtual machine platforms commercial software appliances typically sold subscription service pay-as-you-go alternative approach software service customers receive service maintenance application vendor eliminating requirement manage multiple maintenance streams licenses service contracts cases application vendor may install software appliance piece hardware prior delivery customer thereby creating computer appliance cases primary value customer remains simplicity purchase deployment maintenance
[ 9377, 8998, 7656, 6058, 3885, 7983, 4432, 2417, 11410, 467, 9562, 1150 ]
Test
9,807
2
Billix:billix billix live usb live cd supports multiple linux distributions including several special purpose distributions billix designed toolkit unix linux system administrators configured supports several distributions also following programs included
[ 6371, 6436, 5363, 5397, 823, 7483, 4637, 1150, 831 ]
Test
9,808
9
Active_Scripting:active scripting active scripting formerly known activex scripting technology used windows implement component-based scripting support based ole automation part com allows installation additional scripting engines form com modules active scripting technologies first released 1996 release microsoft internet explorer 3.0 august 1996 internet information services 3.0 products december 1996 usual applications active scripting include active server pages asp server scripts internet explorer windows script host wsh scripts automating routine tasks including use login scripts registry manipulation like administrative uses include windows management instrumentation active directory service interfaces active scripting also used general-purpose scripting database programming text-processing rapid prototyping application macro/scripting programming applications use active scripting main automation method others macro facility components available use via api one may opt add language and/or tool available default like programming microsoft excel perl rexx rather visual basic applications vba transferring data terminal emulator word processor way spreadsheet dissimilar macro tools none many uses active scripting addition windows similar functionality unix shell scripts well incremental improvement upon batch files command.com windows nt style shell scripts cmd.exe way vbscript replacement qbasic last available supplementary disc windows 95 majority languages used active scripting mentioned glue languages perl commonly used third-party script engine interfaces active scripting engines public developer create applications programmable active scripting languages well engines additional languages active scripting engines available several languages popular include windows cscript.exe command line wscript.exe running gui main means implementation installed active script languages clicking icon running command line script run dialogue etc default run plain text file containing code windows script file .wsf xml file contain one script one language addition elements executed windows script host third-party shell take command version 10 configured direct interoperability script host installed engines wsh engine based take command language reportedly development software securecrt use wsh functionality allow automation means installed scripting engine script host related components engines able integrated called windows applications like component active scripting regarded complete longer active development microsoft however technology still supported microsoft sustaining engineering team responsible bug fixes security enhancements furthermore scripting engines continue shipped future releases microsoft windows iis originally .net framework scripting technology separate scripting ide called visual studio applications vsa interfaces technology also available via active scripting allowing even .net-unaware applications scripted using .net languages vsa also meant replace visual basic applications however entire technology deprecated version 2.0 .net framework leaving clear upgrade path applications desiring active scripting support although scripts created c vbscript visual basic .net .net languages compiled executed run-time via libraries installed part standard .net runtime microsoft also introduced windows powershell expose applications via powershell cmdlets powershell providers
[ 11270, 5643, 4624, 537, 6171, 540, 9245, 3102, 7713, 9762, 8227, 8740, 1577, 10281, 10282, 2101, 10808, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 4178, 10839, 8281, 603, 9819, 3170, 11371, 622, 9839, 9328, 4210, 7796, 1656, 6265, ...
None
9,809
4
WAP_billing:wap billing wap billing mechanism consumers buy content wireless application protocol wap sites charged directly mobile phone bill alternative payment mechanism debit credit cards premium sms billing using wap billing consumers buy mobile content without registering service entering username password user clicks link agrees make purchase download content wap billing particularly associated downloading mobile entertainment content like ringtones mobile games wallpapers commentators suggested could compete premium sms leading payment channel mobile content wap billing works wap-enabled mobile phones gprs 3g wireless connection customer initiates wap session content service provider browsing wap page example wap site hoster obtains visitor ’ msisdn without visitor register specific wap gateway service information provided integration operator msisdn lookup service consumers confirm purchase clicking ‘ confirm purchase ’ link mobile phone wap billing platform informs wap application completed purchase transaction consumers redirected content purchased purchases recorded billed directly via mobile phone bill using msisdn attempts made create single cross-operator wap billing platform support purchase products mobile network markets like ireland wap billing available across o2 vodafone mobile operators via msidsn forwarding wap billing available mobile aggregators operating irish market case case business model basis unlike uk market benefits cited wap billing include ability sell minors lack credit card bank account improved customer experience including ‘ single click ’ purchases transactions completed without consumers send receive text message remember shortcodes claimed wap billing also reduces possibility fraud paying mobile content another benefit cited wap billing assertion users experience ‘ browse buy ’ experience used via pc internet wap billing lacks transparency customer act signing contract handing money human reading understanding writing least typing something thus also indirectly proving legitimate customer reduced single touch even child pet occasionally touches screen may trigger purchase often customer n't notice 've actually paid something bought subscription look phone bill afterwards silently start billing single click inviting malicious apps malicious embedded ads misuse wap billing form clickjacking triggered hard stop cancel payment normally three entities involved claim money thus service indirectly paid phone bill makes complicated deny payment claim money back 2013 federal trade commission settled jesta digital llc concerning unauthorized wap billing charges
[ 4609, 5875, 7044, 10141 ]
Test
9,810
2
Rebel_Code:rebel code rebel code linux open source revolution technology book glyn moody published 2001 describes evolution significance free software open source movements many interviews notable hackers review guardian stephen poole wrote open source movement might effect reducing price people willing pay products also highlighted inconsistency free cost open source price publishers asking book chris douce wrote book important addition genre writing undoubtedly become termed 'pop-computing also wrote book raised interesting questions regarding relationship technology culture lot early design decisions linux kernel determined microprocessors sean jewett wrote rebel code despite flaws must read using linux helps put perspective decisions made early sheds light revolution come
[ 6352, 823 ]
None
9,811
2
IBM_Basic_Programming_Support:ibm basic programming support ibm basic programming support/360 bps originally called special support set standalone programs system/360 mainframes minimum 8 kib memory bps developed ibm general products division endicott new york package included assemblers iocs compilers sorts utilities governing control program bps components introduced series product announcements 1964 1965 bps came two versions — strictly card system tape based system contrary stated goals kept small supervisor permanently resident programming languages available assembler rpg fortran iv subset tape fortran required 16 kib memory also two versions bps assembler tape version enhanced capabilities bps also disk counterpart called bos also required 8 kib memory supported disks ibm 2311 group responsible bps/bos went develop dos/360 tos/360 supposed interim solution became evident os/360 would large run 16 kib systems
[ 1219, 868, 1386, 10508, 7983, 10040, 789, 3960, 3323, 3359 ]
Test
9,812
2
List_of_Xbox_Live_games_on_Windows_10:list xbox live games windows 10 list xbox live enabled games windows 10 currently planned released windows 10 operating systems windows store application first wave windows 10 xbox games announced xbox wire march 2015 xbox live enabled games windows 10 made available windows store order released windows 10 xbox live enabled game developer needs member id xbox xbox live enabled titles identifiable marketplace green banner running across top game page icon reads xbox live
[ 4356, 11524, 5643, 6797, 782, 1935, 10900, 11546, 11549, 7970, 8355, 1832, 6827, 3890, 10931, 8757, 4289, 9033, 10957, 4051, 11221, 342, 11605, 9434, 11103, 10338, 740, 617, 8681, 5746, 1148, 2943 ]
Test
9,813
2
Dynamic_Data_Exchange:dynamic data exchange computing dynamic data exchange dde technology interprocess communication used early versions microsoft windows os/2 dde allowed programs manipulate objects provided programs example cell embedded microsoft excel spreadsheet respond user actions affecting objects internally dde implemented terms windows message-passing architecture left vulnerable malformed third-party programs dde partially superseded object linking embedding ole currently maintained windows systems sake backwards compatibility dynamic data exchange first introduced 1987 release windows 2.0 method interprocess communication one program could communicate control another program somewhat like sun rpc remote procedure call time method communication operating system client applications windows messaging layer dde extended protocol allow peer-to-peer communication among client applications via message broadcasts dde runs via message broadcasts vulnerable window-management code pump messages problem considered design dde dde predates pre-emptive multitasking moreover code managing window handle respond dde broadcast initiator dde must distinguish expected unexpected responses dde interlocutors usually express information seek terms hierarchical string keys example cell microsoft excel known dde application name application could organize information groups known topic topic could serve individual pieces data item example user wanted pull value microsoft excel contained spreadsheet called book1.xls cell first row first column application would excel topic book1.xls item r1c1 internal changes cell due excel actions would signaled reverse calling application via additional message broadcasts common use dde custom-developed applications control off-the-shelf software example custom in-house application might use dde open microsoft excel spreadsheet fill data opening dde conversation excel sending dde commands feature mainly superseded component object model suite technologies microsoft used dde internally since release windows 95 example excel exposes extensive ole automation object model recommended method communicating excel technique however still use particularly distribution financial data dde also primary method interprocess communication internals sas programming language dde require operating system components conventional windows gui program also little-used alternative programs seeking minimize dependencies wonderware developed extension dde called netdde could used initiate maintain network connections needed dde conversations dde-aware applications running different computers network transparently exchange data dde conversation interaction client server applications netdde could used along dde dde management library ddeml applications codice_1 netdde library files microsoft licensed basic netbios frames protocol version product inclusion various versions windows windows workgroups windows xp addition wonderware also sold enhanced version netdde customers included support tcp/ip technology extensively used scada field basic windows applications using netdde clipbook viewer winchat microsoft hearts netdde still included windows server 2003 windows xp service pack 2 although disabled default removed entirely windows vista however prevent existing versions netdde installed functioning later versions windows
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 603, 2145, 8301, 1656, 5754, 9340, 639, 5761, 9348, 5765, 10886, 2183, 5259, 1676, 653, 6797, 3224, 4771, 7846, 10414, 8391, 214, 9943, 9434, 278...
Validation
9,814
2
SDSF:sdsf system display search facility sdsf component ibm mainframe operating system z/os interactive user interface allows users administrators view control various aspects mainframe operation system resources information displayed sdsf includes batch job output unix processes scheduling environments status external devices printers network lines sdsf primarily used access batch system log files dumps field-developed program offering sdsf known spool display search facility word spool changed system became program product late 1980s z/os release 9 sdsf supports rexx interface allowing batch programs use sdsf facilities support includes stem variables containing sdsf-originated information prior z/os release 10 sdsf supported use jes2 jes3 although isv products phoenix software international tone software available similar functionality jes3 beyond z/os release 10 sdsf fully supports jes3 including new commands jds ods display data/sets job output jes3 jobs release z/os v1r13 sdsf came packed interesting features like cursor sensitive sort point shoot sort extensive support oper logs rexx java programmed environments sdsf organized collection panels panel displays information specific aspect mainframe operations panels currently provided st panel sdsf supports following commands batch job commands translated jes2 jes3 command performs desired function
[ 3916, 7053, 7983, 5492, 6678, 4535, 2168 ]
Test
9,815
4
Armitage_(computing):armitage computing armitage graphical cyber attack management tool metasploit project visualizes targets recommends exploits free open source network security tool notable contributions red team collaboration allowing shared sessions data communication single metasploit instance armitage written supported raphael mudge armitage gui front-end metasploit framework developed raphael mudge goal helping security professionals better understand hacking help realize power metasploit originally made cyber defense exercises since expanded user base penetration testers armitage scriptable red team collaboration tool built top metasploit framework armitage user may launch scans exploits get exploit recommendations use advanced features metasploit framework meterpreter
[ 9320, 939, 5612, 5677, 7983, 1429, 7228, 2558 ]
None
9,816
9
Metamath:metamath metamath formal language associated computer program proof checker archiving verifying studying mathematical proofs several databases proved theorems developed using metamath covering standard results logic set theory number theory algebra topology analysis among others july 2019 set proved theorems using metamath one largest bodies formalized mathematics containing particular proofs 71 100 theorems formalizing 100 theorems challenge making third hol light isabelle coq mizar proofpower lean nqthm acl2 nuprl least 17 proof verifiers databases use metamath format metamath language metalanguage suitable developing wide variety formal systems metamath language specific logic embedded instead simply regarded way prove inference rules asserted axioms proven later applied largest database proved theorems follows conventional zfc set theory classic logic databases exist others created metamath language design focused simplicity language employed state definitions axioms inference rules theorems composed handful keywords proofs checked using one simple algorithm based substitution variables optional provisos variables must remain distinct substitution made set symbols used constructing formulas declared using codice_1 codice_2 variable symbols statements example grammar formulas specified using combination codice_3 floating variable-type hypotheses codice_4 axiomatic assertion statements example axioms rules inference specified codice_4 statements along codice_6 codice_7 block scoping optional codice_8 essential hypotheses statements example using one construct codice_4 statements capture syntactic rules axiom schemas rules inference intended provide level flexibility similar higher order logical frameworks without dependency complex type system theorems derived rules inference written codice_10 statements example note inclusion proof codice_10 statement abbreviates following detailed proof essential form proof elides syntactic details leaving conventional presentation metamath proof steps use single substitution rule simple replacement variable expression proper substitution described works predicate calculus proper substitution metamath databases support derived construct instead one built metamath language substitution rule makes assumption logic system use requires substitutions variables correctly done detailed example algorithm works steps 1 2 theorem codice_12 metamath proof explorer set.mm depicted left let explain metamath uses substitution algorithm check step 2 logical consequence step 1 use theorem codice_13 step 2 states conclusion theorem codice_13 theorem codice_13 states theorem would never appear cryptic form textbook literate formulation banal two quantities equal one replace one operation check proof metamath attempts unify one way unifying metamath uses premise codice_13 premise states consequence previous computation metamath knows substituted premise becomes thus step 1 therefore generated turn step 1 unified codice_17 codice_17 definition number codice_19 states codice_20 unification simply matter constants straightforward problem variables substitute verification finished two steps proof codice_12 correct metamath unifies check syntactical rules respected fact type codice_22 thus metamath check also typed codice_22 metamath program original program created manipulate databases written using metamath language text command line interface written c. read metamath database memory verify proofs database modify database particular adding proofs write back storage prove command enables users enter proof along mechanisms search existing proofs metamath program convert statements html tex notation example output modus ponens axiom set.mm many programs process metamath databases particular least 17 proof verifiers databases use metamath format metamath website hosts several databases store theorems derived various axiomatic systems databases .mm files associated interface called explorer allows one navigate statements proofs interactively website user-friendly way databases use hilbert system formal deduction though requirement metamath proof explorer recorded set.mm main far largest database 23,000 proofs main part july 2019 based classical first-order logic zfc set theory addition tarski-grothendieck set theory needed example category theory database maintained twenty years first proofs set.mm dated august 1993 mainly work norman megill also proofs made contributors database contains developments among fields set theory ordinals cardinals recursion equivalents axiom choice continuum hypothesis ... construction real complex number systems order theory graph theory abstract algebra linear algebra general topology real complex analysis hilbert spaces number theory elementary geometry metamath proof explorer references many text books used conjunction metamath thus people interested studying mathematics use metamath connection books verify proved assertions match literature database develops mathematics constructive point view starting axioms intuitionistic logic continuing axioms constructive set theory database develops mathematics quine new foundations set theory database starts higher-order logic derives equivalents axioms first-order logic zfc set theory metamath website hosts databases associated explorers nonetheless noteworthy database peano.mm written robert solovay formalizes peano arithmetic database nat.mm formalizes natural deduction database miu.mm formalizes mu puzzle based formal system miu presented gödel escher bach metamath website also hosts older databases maintained anymore hilbert space explorer presents theorems pertaining hilbert space theory merged metamath proof explorer quantum logic explorer develops quantum logic starting theory orthomodular lattices metamath generic concept proof namely tree formulas connected inference rules specific logic embedded software metamath used species logic different hilbert-style logics sequents-based logics even lambda calculus however metamath provides direct support natural deduction systems noted earlier database nat.mm formalizes natural deduction metamath proof explorer database set.mm instead use set conventions allow use natural deduction approaches within hilbert-style logic using design ideas implemented metamath raph levien implemented small proof checker mmverify.py 500 lines python code ghilbert similar though elaborate language based mmverify.py levien would like implement system several people could collaborate work emphasizing modularity connection small theories using levien seminal works many implementations metamath design principles implemented broad variety languages juha arpiainen implemented proof checker common lisp called bourbaki marnix klooster coded proof checker haskell called hmm although use overall metamath approach formal system checker coding also implement new concepts mel o'cat designed system called mmj2 provides graphic user interface proof entry initial aim mel o'cat allow user enter proofs simply typing formulas letting mmj2 find appropriate inference rules connect metamath contrary may enter theorems names may enter formulas directly mmj2 also possibility enter proof forward backward metamath allows enter proof backward moreover mmj2 real grammar parser unlike metamath technical difference brings comfort user particular metamath sometimes hesitates several formulas analyzes meaningless asks user choose mmj2 limitation longer exists also project william hale add graphical user interface metamath called mmide paul chapman turn working new proof browser highlighting allows see referenced theorem substitution made
[ 3876, 4612, 4791, 11083, 6797, 2062, 7983, 7185, 11026, 10460, 823, 8924, 4446, 735 ]
None
9,817
4
Secure_Computing_Corporation:secure computing corporation secure computing corporation scc public company developed sold computer security appliances hosted services protect users data mcafee acquired company 2008 company also developed filtering systems used governments iran saudi arabia blocks citizens accessing information internet 1984 research group called secure computing technology center sctc formed honeywell minneapolis minnesota centerpiece sctc work security-evaluated operating systems nsa work included secure ada target sat logical coprocessing kernel lock designed meet stringent a1 level trusted computer systems evaluation criteria tcsec next several years secure computing morphed small defense contractor commercial product vendor largely investment community much less interested purchasing security goods defense contractors commercial product vendors especially vendors growing internet space secure computing became publicly traded company 1995 following pattern internet-related startups stock price tripled first day opened 16 share closed 48 price peaked around 64 next several weeks collapsed following year ranged roughly 3 20 afterward company purchased mcafee company headquarters moved san jose california 1998 though bulk workforce remained twin cities roseville employees completed move st. paul minnesota february 2006 several sites exist largely result mergers secure computing consisted several merged units one oldest enigma logic inc. started around 1982 bob bosen founder claims created first security token provide challenge-response authentication bosen published computer game trs-80 home computer 1979 called 80 space raiders used simple challenge response mechanism copy protection people used mechanism encouraged repackage remote authentication bosen started enigma logic filed patents 1982–83 patent issued united kingdom 1986 ultimately challenge portion challenge response eliminated produce one-time password token similar securid product enigma logic merged secure computing corporation 1996 secure computing acquired smartfilter product line purchasing webster network strategies producer webtrack product 1996 acquisition included domain name webster.com eventually sold publishers webster dictionary shortly acquiring webster/smartfilter product secure computing merged border network technologies canadian company selling borderware firewall border network technologies boasted excellent product highly developed set sales channels said sales channels major inducement merger although plan completely merge borderware product sidewinder offer single product existing users products never quite succeeded 1998 borderware business unit sold new company borderware technologies inc. formed one original borderware founders time mergers yielded highly distributed company offices minnesota florida california two three ontario proved unwieldy company scaled back offices minnesota california 2002 company took gauntlet firewall product network associates 2003 secure computing acquired n2h2 makers bess web filtering package consolidation bess smartfilter bess referred smartfilter bess edition company literature acquisition cyberguard announced august 2005 approved january 2006 year earlier cyberguard attempted acquire secure computing proposal rejected largest merger secure computing time resulted addition several product lines including three classes firewalls content protocol filtering systems enterprise-wide management system controlling products several offices also added including cyberguard main facility deerfield beach florida well webwasher development office paderborn germany snapgear development office brisbane australia 2006 company merged atlanta-based ciphertrust developer email security solutions merger announced july 2006 completed august 2006 july 30 2008 secure computing announced intention sell safeword authentication product line aladdin knowledge systems leaving company business focused web/mail security firewalls sale concluded later year september 22 2008 mcafee announced intention acquire secure computing acquisition completed long afterwards combined company formed world largest dedicated security company time trustedsource reputation system secure computing obtained part ciphertrust acquisition key technology company enabling product lines global intelligence capability based behavioral analysis traffic patterns company email web firewall devices hosted services well numerous oem partners trustedsource derived real-time reputation scores ips urls domains mail/web content based variety data mining/analysis techniques support vector machine random forest term-frequency inverse-document frequency tfidf classifiers company flagship web security product line secure web appliance formerly known webwasher provided anti-malware protection trustedsource reputation-enabled url filtering controls content caching ssl scanning capabilities june 2008 secure computing launched secure web protection service in-the-cloud hosted web security service provided similar set features secure web appliance without requiring on-premises equipment software company flagship email security product line secure mail appliance formerly known ironmail provided trustedsource reputation-enabled anti-spam data-leakage protection dlp encryption anti-malware capabilities company flagship firewall product formerly known sidewinder renamed mcafee firewall enterprise mcafee sold sidewinder forcepoint january 2016 years secure computing antecedent organizations offered following major lines firewall products sidewinder firewall incorporated technical features high-assurance lock system including type enforcement technology later applied selinux however interaction secure computing open source community spotty due company ownership patents related type enforcement sidewinder never really tried achieve a1 tcsec rating earn eal-4+ common criteria rating along sidewinder gauntlet one earliest application layer firewalls developed large customer base united states department defense gauntlet originally developed trusted information systems tis commercial version tis firewall toolkit early open source firewall package developed darpa contract opennet initiative studied filtering software used governments block access citizens found secure computing smartfilter program heavily used iranian saudi governments according secure computing use software iran without consent—u.s sanctions prohibit american companies dealings iran—and 2005 company said actively working stop illegal use response company jonathan zittrain co-director harvard law school berkman center internet society stated fact remains software use extended period time 've seen secure computing software turn iran 've seen saudi arabia well 2001 new york times reported secure computing one ten companies competing saudi government contract software block citizens access websites deemed offensive company already deal saudis due expire 2003 defense secure computing always stated control customers use product sold according opennet initiative 2007 report saudi government censorship extensively covers religious social content though sites relating opposition groups regional political human rights issues also targeted governments united arab emirates oman sudan tunisia also actively use smartfilter tunisian government goes far redirect blocked pages fake error 404 page hide fact blocking software used tunisian government generally recognized poor record comes right free expression
[ 5506, 3467, 8976, 10772, 4760, 3487, 11175, 3885, 10801, 823, 704, 3520, 8904, 8661, 1634, 4067, 5860, 998, 8172, 3825, 125, 2558 ]
Test
9,818
7
Cvent:cvent cvent inc. privately held software-as-a-service saas company specializes market-leading meetings events hospitality management technology company offers web-based software meeting site selection online event registration event management email marketing web surveys company owned private equity firm vista equity partners cvent founded september 1999 reggie aggarwal year received 17 million venture capital grew staff 125 employees following dot-com bubble burst september 11 attacks cvent faced near-bankruptcy forced cut 80 staff company became profitable 2003 2011 cvent growing 50 year received 136 million funding new enterprise associates july 2011 time largest investment u.s. software company since 2007 june 13 2012 cvent announced acquisition austin-based startup crowdtorch previously known seed labs 4.2 million seven days later announced acquisition portland-based application developer crowdcompass 10 million cvent filed s-1 u.s. securities exchange commission july 8 2013 proposing initial public offering 5.6 million shares went public new york stock exchange august 9 2013 initial price 21 company raised 117.6 million received market capitalization billion dollars ipo referenced regards use jobs act enabled company quickly offer ipo 2016 company acquired venture capital company vista equity partners usd 1.65 billion ashok trivedi co-founder mastech digital igate early investor company june 5 2018 cvent announced acquired kapow online booking platform venues experiences june 10 2019 cvent announced acquired mobile event technology provider doubledutch july 2000 cvent introduced first saas product web-based tool event planners manage invitations collect registration fees 2006 introduced product conducting online surveys followed introduction cvent supplier network two years later supplier network free online marketing place connects meeting planners venues services 2009 company began offering professional services app development tool crowdtorch launched 2009 cvent also produces destination guide free online 8,000-page travel guide designed meeting planners information 800 different destinations strategic meetings management helps users manage budgets
[ 3220 ]
Test
9,819
6
Special_folder:special folder microsoft windows special folder folder presented user interface abstract concept instead absolute folder path synonymous term shell folder sometimes used instead special folders make possible application ask operating system appropriate location certain kinds files found independently version user language windows used windows server 2003 earlier folder like start menu different name non-english versions windows example german versions windows xp startmenü however starting windows vista versions windows use english named folders display different names windows explorer windows 10 user switch another display language names special folders change windows uses concept special folders present contents storage devices connected computer fairly consistent way frees user deal absolute file paths often change operating system versions even individual installations idea evolved time new special folders added every version windows post introduction windows 95 microsoft compatible windows software logo requires application make use special folders locations locate appropriate folders documents application settings stored special folder either reference physical file system directory reference virtual folder former case analogous environment variables — fact many environment variables set user session defined special folders set point virtual folders actually exist file system instead presented windows explorer tree folders user navigate known shell namespace windows xp systems root namespace desktop virtual folder contains documents computer network places network neighborhood windows 95 98 recycle bin virtual folders virtual folders like desktop accompanying special folder reference directory physical file system windows explorer displays combined contents virtual folder associated file system folder user seen figure 1 shows folder view windows xp explorer desktop virtual folder four standard virtual folders seen well additional folder folder desktop real folder located desktop directory user profile third-party programs add virtual folders windows explorer following tables list file system virtual folders available windows vista os version special folder introduced given well items like userprofile windir windows environment variables notes notes
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 601, 603, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 10...
Validation
9,820
2
BLIS/COBOL:blis/cobol blis/cobol discontinued operating system unusually written cobol system gain reasonably wide acceptance optimised compile business applications written cobol blis available range data general nova data general eclipse 16-bit minicomputers marketed information processing inc. ipi regularly exhibited product national computer conference 1970s 80s priced us 830 10,000 depending number supported users features 1977 ipi boasted 100 operational installations system worldwide 1985 version ibm pc existed called pc-blis originally operating systems written assembly language particular processor family processors non-assembler operating systems comparatively slow easier revision repair one reasons c programming language low-level features resemble assembly language ways early intent use writing operating systems similar goals led ibm development pl/s high-level nature cobol created problems operating system development partially addressed blis since deliberately optimized cobol
[ 477, 1952, 2179, 8262, 6503, 7983, 1776, 3323, 2045 ]
Test
9,821
3
SISNE_plus:sisne plus sisne plus ms-dos clone created itautec scopus tecnologia brazil prior end market reserve 1991 time forbid importation electronic equipment software general use widespread use ms-dos importations allowed sisne plus os discontinued
[ 9166 ]
None
9,822
3
Terrorpods:terrorpods terrorpods 1987 shooting game simple business simulation psygnosis originally developed amiga atari st later ported commodore 64 zx spectrum amstrad cpc msx casts player industrial spy science fiction future assigned halt evil empire production fearsome war machines called terrorpods win game player must manage colonies specialised industries produce terrorpod fighting enemy forces like traditional shooting game appearance terrorpods conceived rejected design psygnosis cover artist roger dean martian fighters jeff wayne musical version war worlds player views action terrorpods cockpit dsv defence strategy vehicle consumes fuel travels around game world world ten colonies player must defend trade minerals enemy forces comprise destructible terrorpods spoilers roaming world indestructible mothership hovers overhead periodically shoots player player prime objective set resource trading ten colonies building mineral resources build one-tenth terrorpod five minerals fuel detonite quanza zenite aluma former four used fuel weapons latter required build terrorpod parts colonies tend specialise exportation single mineral player buy cheap profit player must sell cheaply bought resources another colony contact colony trading player must dispatch trading drover vehicle drive dsv drover useful unlike dsv consume fuel travelling spoilers steal minerals colonies shot phaser cannon consumes little fuel terrorpods attack colonies repelled destroyed phaser destroy terrorpods player must use missiles require precious detonite work player taken aim terrorpod lines making crosshair shift around seconds player must realign successful hit colony destroyed terrorpod player repair mineral-consuming energy beam game ends player gathered parts build terrorpod terrorpods originally released amiga atari st included inside game box foldout poster drawn tim white depicting three terrorpods excavating minerals icy surface colian game later released commodore 64 zx spectrum amstrad cpc msx versions removed resource management aspects original turning game straight-up shooter terrorpods earned positive reviews atari st user called superb praising high fidelity graphics sound tense strategic gameplay terrorpods review lazy game reviews
[ 9006 ]
None
9,823
8
Web_information_system:web information system web-based information displays many benefits multimedia technology using today fast broadband connection possible stream sophisticated content computer anywhere world advantage many people information received read wherever whenever convenient crucial factor busy executive significant amount interactive multimedia content delivered via internet web information system web-based information system information system uses internet web technologies deliver information services users information systems/applications software system whose main purpose publish maintain data using hypertext-based principles web information system usually consists one web applications specific functionality-oriented components together information components non-web components web browser typically used front-end whereas database back-end
[ 2901, 119 ]
None
9,824
4
Tarpit_(networking):tarpit networking tarpit also known teergrube german word tarpit service computer system usually server purposely delays incoming connections technique developed defense computer worm idea network abuses spamming broad scanning less effective therefore less attractive take long concept analogous tar pit animals get bogged slowly sink surface like swamp tom liston developed original tarpitting program labrea protect entire network tarpit run single machine machine listens address resolution protocol requests go unanswered indicating unused addresses replies requests receives initial syn packet scanner sends syn/ack response open socket prepare connection fact forget connection sending syn/ack however remote site sends ack gets ignored believes 3-way-handshake complete starts send data never reaches destination connection time since system believes dealing live established connection conservative timing instead try retransmit back-off retransmit etc quite later versions labrea also added functionality reply incoming data using raw ip packets sockets resources tarpit server bogus packets request sending site slow keep connection established waste even time scanner one possible avenues considered battle bulk-spam one time mandate small fee every submitted mail introducing artificial cost negligible impact legitimate use long fee small enough automated mass-scale spam would instantly become unattractive tarpitting could seen similar technically much less complex approach cost spammer would measured terms time efficiency rather money authentication procedures increase response times users attempt invalid passwords smtp authentication exception however server-to-server smtp transfers spam injected require authentication various methods discussed implemented smtp tarpits systems plug mail transfer agent mta i.e mail server software sit front proxy one method increases transfer time mails seconds delaying initial greeting message greet delay idea matter legitimate mail takes little longer deliver due high volume make difference spammers downside mailing lists legitimate mass-mailings explicitly whitelisted suffer email systems sendmail 8.13+ implement stronger form greet delay form pauses connection first established listens traffic detects traffic prior greeting violation rfc 2821 closes connection since many spammers write smtp implementations specification reduce number incoming spam messages another method delay known spammers e.g using blacklist see spamming dnsbl openbsd integrated method core system since openbsd 3.3 special-purpose daemon spamd functionality firewall pf redirect known spammers tarpit ms exchange tarpit senders send invalid address exchange smtp connector connected authentication system subtle idea greylisting simple terms rejects first connection attempt previously-unseen ip address assumption spammers make one connection attempt attempts short period time send message whereas legitimate mail delivery systems keep retrying longer period retry eventually allowed without impediments finally elaborate method tries glue tarpits filtering software together filtering e-mail realtime transmitted adding delays communication response filter spam likeliness indicator example spam filter would make guess line every x bytes received likely message going spam likely mta delay transmission smtp consists requests mostly four-letter words mail replies minimally three-digit numbers last line reply number followed space preceding lines followed hyphen thus determining message attempted send spam mail server reply tarpit waits fifteen seconds lines long delays allowed smtp humans sometimes send mail manually test mail servers ties smtp sending process spammer computer limit amount spam send linux kernel patched allow tarpitting incoming connections instead usual dropping packets implemented iptables addition tarpit target packet inspection matching features applied tarpit targets applied targets server determine given mail message spam e.g addressed spam trap trusted users reports server may decide ip address responsible submitting message deserves tarpitting cross-checking available dnsbls help avoid including innocent forwarders tarpit database daemon exploiting linux libipq check remote address incoming smtp connections database spamcannibal gpl software designed around idea stockade similar project implemented using freebsd ipfirewall one advantage tarpitting ip level regular tcp connections handled mta stateful although mta n't use much cpu sleeps still uses amount memory required hold state connection opposite labrea-style tarpitting stateless thus gaining advantage reduced cost spammer box however noted making use botnets spammers externalize computer-resource costs known tarpitted connection may generate significant amount traffic towards receiver sender considers connection established tries send retransmit actual data practice given current average computer botnet size reasonable solution drop suspicious traffic completely without tarpitting way tcp syn segments retransmitted whole http https requests well ms exchange two successful commercial implementations tar pit idea first developed turntide philadelphia-based startup company acquired symantec 2004 28 million cash turntide anti spam router contains modified linux kernel allows play various tricks tcp traffic varying tcp window size grouping various email senders different traffic classes limiting bandwidth class amount abusive traffic reduced particularly abusive traffic coming single sources easily identified high traffic volume symantec acquisition canadian startup company called mailchannels released traffic control software uses slightly different approach achieve similar results traffic control semi-realtime smtp proxy unlike turntide appliance applies traffic shaping network layer traffic control applies traffic shaping individual senders application layer approach results somewhat effective handling spam traffic originating botnets allows software slow traffic individual spam zombies rather requiring zombie traffic aggregated class
[ 1273, 4883, 8343, 1305, 10906, 2041, 5407, 8224, 9256, 10924, 9909, 823, 5437, 10696, 8535, 6363, 9569, 6246, 6762, 10105 ]
None
9,825
9
Charles_Brenner_(mathematician):charles brenner mathematician charles hallam brenner american mathematician originator forensic mathematics father joel lee brenner professor mathematics mother frances hallam brenner city councilor briefly mayor palo alto california uncle charles brenner md psychiatrist brenner received b.s stanford university 1967 ph.d. university california los angeles ucla 1984 brenner participated implementation apl\360 apl\1130 implemented transpose rotate primitive functions recently brenner specializes use mathematics dna analysis principal areas interest achievement mathematics forensic dna kinship rare haplotype matching dna mixtures couple haplotype papers recently showed haplotypes must much rarer much rarer sample frequency reference population sample brenner ’ symbolic kinship program example assess identification evidence based dna profiles anonymous body arbitrary set presumed relatives widely used mass victim identification projects including identifying 1/3 identified world trade center bodies brenner played key role resolution larry hillblom inheritance case resulting four amerasian children receiving 50 million
[ 9993, 1783, 1178, 8987, 667, 10668, 4921, 9019, 1099, 7630, 2519, 1883, 11099, 11625, 4331, 2670, 8695, 505, 3323 ]
Validation
9,826
2
IPod_Touch_(6th_generation):ipod touch 6th generation sixth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 6g ipod touch 6 ipod touch 2015 ipod 6 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 5th generation becoming first major update ipod lineup two half years released online apple store july 15 2015 along minor upgrades ipod nano ipod shuffle ipod touch 6th generation officially discontinued apple may 28 2019 release successor ipod touch 7th generation support end 6th generation long discontinuation incompatible ios 13 sixth-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode sixth-generation ipod touch ships ios 8.4 released june 30 2015 along apple music play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come sixth-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist sixth-generation ipod touch supports ios 9 released september 2015 ios 10 released september 2016 ios 11 released september 2017 ios 12 released september 2018 sixth-generation ipod touch support ios 12 made first ipod touch model support five major versions ios far ios 8 ios 12 sixth-generation ipod touch supported latest version apple mobile operating system ios 13 sixth-generation ipod touch features apple a8 apple m8 motion co-processor chipset 64-bit architecture chip ipad mini 4 apple tv 4th gen iphone 6 homepod slightly underclocked 1.1 ghz iphone 6 6 plus clocked 1.4 ghz ipad mini 4 clocked 1.5 ghz due small battery 1gb lpddr3 ram twice amount previous generation ipod touch apple metal graphics technology also compatible ipod touch 6th generation ipod touch features 8mp rear isight camera video record 1080p 30fps 120fps slow-motion mode records 720p camera also supports burst mode led flash unlike 5th-generation version rear camera 6th-generation ipod touch lacks sapphire crystal lens front camera unchanged previous generation 1.2mp sensor record video 720p first ipod touch available 128 gb storage partially filling void left behind ipod classic offered 160 gb storage time discontinued exterior design sixth-generation ipod touch largely identical predecessor exception ipod touch loop button removed available silver gold space gray pink blue product red version available apple stores apple online store although color shade slightly different previous generation sixth-generation ipod touch comes lightning charging cable model also comes earpods without remote mic ipod touch compatible apple airpods wireless headphones announced september 7th 2016 apple special event along iphone 7 released late december 2016 also compatible earpods lightning connector came time iphone 7 remote functions active nate ralph cnet praised device camera quality noted ipod touch exceptional performance criticized middling battery life small display stated considered largely redundant due smartphones tablets sascha segan pcmag also noted poor battery life stated ipod touch still best option anyone would prefer handheld media player n't require intimate relationship cellular carrier
[ 10755, 9732, 1549, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 576, 8783, 4180, 10838, 1623, 3672, 3681, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 8842, 5784, 1177, 4251, 3228, 2207, 4...
Validation
9,827
9
Graphics_Layout_Engine:graphics layout engine graphics layout engine gle graphics scripting language designed creating publication quality graphs plots diagrams figures slides gle supports various graph types function plots histograms bar graphs scatter plots contour lines color maps surface plots simple flexible set graphing commands complex output created relying gle scripting language full featured subroutines variables logic control gle relies latex text output supports mathematical formula graphs figures gle output formats include eps ps pdf jpeg png gle software dates back early 90 still active development currently gle development hosted sourceforge gle available major operating systems including microsoft windows mac os x unix included gnu/linux distributions debian fedora suse gle licensed bsd license qgle gle user interface licensed gpl license
[ 9192, 9320, 5612, 6797, 3791, 5492, 8628, 9780, 823 ]
Validation
9,828
1
Document-oriented_database:document-oriented database document-oriented database document store computer program designed storing retrieving managing document-oriented information also known semi-structured data document-oriented databases one main categories nosql databases popularity term document-oriented database grown use term nosql xml databases subclass document-oriented databases optimized work xml documents graph databases similar add another layer relationship allows link documents rapid traversal document-oriented databases inherently subclass key-value store another nosql database concept difference lies way data processed key-value store data considered inherently opaque database whereas document-oriented system relies internal structure document order extract metadata database engine uses optimization although difference often moot due tools systems conceptually document-store designed offer richer experience modern programming techniques document databases contrast strongly traditional relational database rdb relational databases generally store data separate tables defined programmer single object may spread across several tables document databases store information given object single instance database every stored object different every eliminates need object-relational mapping loading data database central concept document-oriented database notion document document-oriented database implementation differs details definition general assume documents encapsulate encode data information standard format encoding encodings use include xml yaml json bson well binary forms like pdf microsoft office documents ms word excel documents document store roughly equivalent programming concept object required adhere standard schema sections slots parts keys generally programs using objects many different types objects objects often many optional fields every object even class look different document stores similar allow different types documents single store allow fields within optional often allow encoded using different encoding systems example following document encoded json second document might encoded xml two documents share structural elements one another also unique elements structure text data inside document usually referred document content may referenced via retrieval editing methods see unlike relational database every record contains fields leaving unused fields empty empty 'fields either document record example approach allows new information added records without requiring every record database share structure document databases typically provide additional metadata associated stored along document content metadata may related facilities datastore provides organizing documents providing security implementation specific features core operations document-oriented database supports documents similar databases terminology perfectly standardized practitioners recognize crud documents addressed database via unique key represents document key simple identifier id typically string uri path key used retrieve document database typically database retains index key speed document retrieval cases key required create insert document database another defining characteristic document-oriented database beyond simple key-to-document lookup used retrieve document database offers api query language allows user retrieve documents based content metadata example may want query retrieves documents certain field set certain value set query apis query language features available well expected performance queries varies significantly one implementation another likewise specific set indexing options configuration available vary greatly implementation document store varies key-value store theory values key-value store opaque store essentially black boxes may offer search systems similar document store may less understanding organization content document stores use metadata document classify content allowing instance understand one series digits phone number another postal code allows search types data instance phone numbers containing 555 would ignore zip code 55555 document databases typically provide mechanism updating editing content metadata document either allowing replacement entire document individual structural pieces document document database implementations offer variety ways organizing documents including notions sometimes organizational notions vary much logical vs physical e.g disk memory representations document-oriented database specialized key-value store another nosql database category simple key-value store document content opaque document-oriented database provides apis query/update language exposes ability query update based internal structure document difference may moot users need richer query retrieval editing apis typically provided document databases modern key-value stores often include features working metadata blurring lines document stores search engines aka information retrieval systems like elasticsearch provide enough core operations documents fit definition document-oriented database relational database data first categorized number predefined types tables created hold individual entries records type tables define data within record fields meaning every record table overall form administrator also defines relationships tables selects certain fields believe commonly used searching defines indexes key concept relational design data may repeated normally placed table instances related column selected group together foreign key design known database normalization example address book application generally need store contact name optional image one phone numbers one mailing addresses one email addresses canonical relational database tables would created rows predefined fields bit data contact table might include first_name last_name image columns phone_number table might include country_code area_code phone_number type home work etc. phone_number table also contains foreign key column contact_id holds unique id number assigned contact created order recreate original contact database engine uses foreign keys look related items across group tables reconstruct original data contrast document-oriented database may internal structure maps directly onto concept table fields relationships generally n't exist predefined concepts instead data object placed single document stored database single entry address book example document would contain contact name image contact info single record entry accessed key allows database retrieve return document application additional work needed retrieve related data returned single object key difference document-oriented relational models data formats predefined document case cases sort document stored database documents change type form time one wishes add country_flag contact field added new documents inserted effect database existing documents already stored aid retrieval information database document-oriented systems generally allow administrator provide hints database look certain types information work similar fashion indexes relational case also offer ability add additional metadata outside content document instance tagging entries part address book allows programmer retrieve related types information like address book entries provides functionality similar table separates concept categories data physical implementation tables classic normalized relational model objects database represented separate rows data inherent structure beyond given retrieved leads problems trying translate programming objects associated database rows problem known object-relational impedance mismatch document stores closely cases directly map programming objects store often marketed using term nosql xml databases document-oriented databases
[ 5632, 8201, 2062, 2068, 1049, 5658, 9245, 9248, 10793, 5677, 10286, 2045, 8762, 4155, 11324, 11327, 9286, 2632, 9290, 8269, 7248, 8788, 10326, 7767, 5210, 8291, 10340, 4200, 8808, 2669, 6775, 7288, 3705, 1146, 3196, 2688, 1156, 9863, 3219, ...
None
9,829
2
TSS_(operating_system):tss operating system ibm time sharing system tss/360 discontinued early time-sharing operating system designed exclusively special model system/360 line mainframes model 67 made available trial basis limited set customers 1967 never officially released supported product ibm tss pioneered number novel features later appeared popular systems mvs tss migrated system/370 303x systems despite many advances novel capabilities tss failed meet expectations eventually canceled tss/370 used basis port unix ibm mainframe tss/360 also inspired development tss-8 operating system tss/360 one first implementations tightly-coupled symmetric multiprocessing pair model 67 mainframes shared common physical memory space ran single copy kernel application code i/o operation launched one processor could end cause interrupt model 67 used standard 360 instruction called test set implement locks code critical sections also implemented virtual memory virtual machines using position-independent code tss/360 included early implementation table driven scheduler user-configured table whose columns parameters current priority working set size number timeslices used date kernel would refer table calculating new priority thread later appeared systems diverse honeywell cp-v ibm z/os standard operating system software time tss/360 customers general motors research laboratories given full access entire source operating system code development tools user-developed improvements patches frequently incorporated official source code tss/360 suffered performance reliability problems lack compatibility os/360 although issues eventually addressed ibm attempted develop tss aggressive schedule large staff programmers compete multics 1967 become evident tss/360 suffering kinds delays os/360 february 1968 time share 30 eighteen s/360-67 sites attempting run tss conference ibm announced via blue letter tss/360 decommitted great blow time-sharing community decision temporarily reversed tss/360 officially canceled 1971 however tss/360 continued quietly available time existing tss/360 customers interim measure tss/360 canceled ibm put primary efforts time sharing option tso time-sharing monitor os/360 several groups developed less ambitious successful time sharing systems s/360-67 notably cp-67 ibm cambridge scientific center early virtual machine monitor evolved vm/370 mts university michigan orvyl stanford university ibm also provided tss/370 prpq migration path existing tss/360 customers went multiple releases tss provides users command-line interface users interact command system command format consists codice_1 command name one eight characters without imbedded blanks operands optional depending command must separated command name least one blank multiple operands separated tab characters commas command lines continued typing hyphen end line continued typing continuation beginning next line multiple commands written line separating semicolons comments allowed command lines separated command semicolon included single quotes operands either positional keyword format keyword=value system commands divided seven categories tss provided early implementation position-independent code ability different processes run single copy executable possibly mapped different virtual addresses process system/360 programs typically contain modifiable data working storage address constants adcons fields containing addresses code data tss virtual addresses differ process running program tss language processors place adcons working storage separate section code called prototype control section psect program loaded dynamic loader makes copy psect relocates adcons reflect virtual addresses assigned within current process therefore user program unique copy psect called program executed general register 13 contains address psect current process address used references variable data addresses
[ 6529, 2179, 4996, 6148, 10883, 10508, 7053, 8077, 9361, 6675, 9468, 789, 5397, 9619, 11539, 11673, 9370, 6557, 3359, 10273, 421, 7848, 6442, 1323, 7983, 8879, 7217, 9139, 10803, 6325, 7477, 7733, 8502, 10040, 5562, 573, 3650, 1219, 964, 8...
Validation
9,830
0
Racter:racter racter artificial intelligence computer program generates english language prose random racter short raconteur written william chamberlain thomas etter existence program revealed 1983 book called policeman beard half constructed described composed entirely program according chamberlain introduction book program apparently ran cp/m machine written compiled basic z80 micro 64k ram version program allegedly wrote book released general public sophistication claimed program likely exaggerated could seen investigation template system text generation however 1984 mindscape inc. released interactive version racter developed inrac corporation dos amiga apple ii computers published racter similar chatterbot basic program released mindscape far less sophisticated anything could written fairly sophisticated prose policeman beard commercial version racter could likened computerized version mad libs game fill blanks advance plug text template produce surrealistic tale commercial program attempted parse text inputs identifying significant nouns verbs would regurgitate create conversations plugging input user phrase templates combined along modules conjugated english verbs contrast text policeman beard apart edited large amount output would product chamberlain specialized templates modules included commercial release program pc magazine described policeman beard scenes surprising frankness reflective concluded book whimsical wise sometimes fun computer gaming world described racter diversion another dimension might best seen paying price ticket try buy
[ 6208, 7780 ]
Test
9,831
9
LeJOS:lejos lejos firmware replacement lego mindstorms programmable bricks different variants software support original robotics invention system nxt ev3 includes java virtual machine allows lego mindstorms robots programmed java programming language includes also icommand.jar allows communicate via bluetooth original firmware mindstorm often used teaching java first-year computer science students lejos-based robot jitter flew around international space station december 2001 according official website name lejos conceived josé solórzano based acronym java operating system jos name another operating system rcx legos spanish word lejos lejos originally conceived tinyvm developed josé solórzano late 1999 started hobby open source project later forked known today lejos many contributors joined project provided important enhancements among brian bagnall jürgen stuber paul andrews later took project josé essentially retired august 20 2006 original lejos rcx discontinued 3.0 release soon afterwards icommand library control nxt bluetooth-enabled computer via lcp released library made use standard lego firmware library later superseded lejos nxj 0.8 january 2007 full port new lego mindstorms nxt released firmware replacement far faster x15 rcx version memory available menu system bluetooth support using bluecove library allows access many nxt features 2008 versions 0.5 0.6 0.7 released addition numerous improvements core classes eclipse plugin released along new version tutorial 2009 2 major releases 0.8 0.85 may 2011 0.9 released broadly speaking releases concentrated improvements navigation algorithms well support numerous 3rd party sensors eclipse plug-in 2013 development began port lego mindstorms ev3 brick 2014 0.5 0.6 alpha versions released 2015 beta versions 0.9 0.9.1 released since november 2014 lejos used slightly adapted version also open-source project open roberta lejos nxj provides support access robot i²c ports allows access standard sensors motors ultrasonic distance sensor touch sensor sound sensor light sensor companies mindsensors hitechnic extended basic set providing advanced sensors actuators multiplexers lejos nxj includes java apis products taking advantage object-oriented structure java developers lejos nxj able hide implementation details sensors actuators behind multiple interfaces allows robotics developer work high-level abstractions without worry details like hexadecimal addresses hardware components project includes implementations commonly used feedback controller pid controller kalman filter noise reduction algorithm lejos nxj also provides libraries support abstract functions navigation mapping behavior based robotics simple lejos program since first alpha release lejos nxj 2007 project consistently active following core development team relatively small group contributions accepted members community several interfaces third party sensors actuators contributed members outside core team platform used university robotics courses undergraduate research projects platform robotics research lejos nxj java project builds wealth functionality inherent java platform lejos nxj plugins two leading java ides eclipse netbeans robotics developers take advantage standard functionality ide code completion refactoring testing frameworks well point-and-click implementation nxj functions compiling linking uploading wealth java open source projects apache math likewise available nxj robotics developer
[ 352, 9665, 6338, 2179, 10537, 5612, 5677, 5872, 10964, 2045 ]
Test
9,832
4
Trojan.Win32.FireHooker:trojan.win32.firehooker trojan.win32.firehooker trojan win32/firehooker definition kaspersky labs trojan downloader trojan dropper trojan spy created windows platform first known detection goes back september 2015 according avv trend micro malware requires main component successfully perform intended routine .dll-file name xul.dll file-size 5120 bytes file dropped dns blocking installer additional installers bundled dnsblockers xul.dll known mozilla firefox dll loads order come action following apis dll-file
[ 7809, 131, 10756, 10166, 10392, 1242, 858, 127 ]
None
9,833
4
Cyber_Security_Task_Force:cyber security task force cyber security task force organized department public safety emergency preparedness canada jane billings assistant deputy minister current cyber security task force secretariat
[ 6323, 2558 ]
Test
9,834
5
WebSocket:websocket websocket computer communications protocol providing full-duplex communication channels single tcp connection websocket protocol standardized ietf rfc 6455 2011 websocket api web idl standardized w3c websocket distinct http protocols located layer 7 osi model depend tcp layer 4 although different rfc 6455 states websocket designed work http ports 80 443 well support http proxies intermediaries thus making compatible http protocol achieve compatibility websocket handshake uses http upgrade header change http protocol websocket protocol websocket protocol enables interaction web browser client application web server lower overhead half-duplex alternatives http polling facilitating real-time data transfer server made possible providing standardized way server send content client without first requested client allowing messages passed back forth keeping connection open way two-way ongoing conversation take place client server communications done tcp port number 80 443 case tls-encrypted connections benefit environments block non-web internet connections using firewall similar two-way browser-server communications achieved non-standardized ways using stopgap technologies comet browsers support protocol including google chrome microsoft edge internet explorer firefox safari opera unlike http websocket provides full-duplex communication additionally websocket enables streams messages top tcp tcp alone deals streams bytes inherent concept message websocket port 80 full-duplex communication attainable using comet channels however comet implementation nontrivial due tcp handshake http header overhead inefficient small messages websocket protocol aims solve problems without compromising security assumptions web websocket protocol specification defines codice_1 websocket codice_2 websocket secure two new uniform resource identifier uri schemes used unencrypted encrypted connections respectively apart scheme name fragment codice_3 supported rest uri components defined use uri generic syntax using browser developer tools developers inspect websocket handshake well websocket frames websocket first referenced tcpconnection html5 specification placeholder tcp-based socket api june 2008 series discussions led michael carter resulted first version protocol known websocket name websocket coined ian hickson michael carter shortly thereafter collaboration whatwg irc chat room subsequently authored inclusion html5 specification ian hickson announced cometdaily blog michael carter december 2009 google chrome 4 first browser ship full support standard websocket enabled default development websocket protocol subsequently moved w3c whatwg group ietf february 2010 authored two revisions ian hickson protocol shipped enabled default multiple browsers rfc finalized ian fette december 2011 secure version websocket protocol implemented firefox 6 safari 6 google chrome 14 opera 12.10 internet explorer 10 detailed protocol test suite report lists conformance browsers specific protocol aspects older less secure version protocol implemented opera 11 safari 5 well mobile version safari ios 4.2 blackberry browser os7 implements websockets vulnerabilities disabled firefox 4 5 opera 11 establish websocket connection client sends websocket handshake request server returns websocket handshake response shown example client request like http line ends codice_4 must extra blank line end server response handshake starts http request/response allowing servers handle http connections well websocket connections port connection established communication switches bidirectional binary protocol conform http protocol addition codice_5 headers client sends codice_6 header containing base64-encoded random bytes server replies hash key codice_7 header intended prevent caching proxy re-sending previous websocket conversation provide authentication privacy integrity hashing function appends fixed string codice_8 guid value codice_6 header decoded base64 applies sha-1 hashing function encodes result using base64 connection established client server send websocket data text frames back forth full-duplex mode data minimally framed small header followed payload websocket transmissions described messages single message optionally split across several data frames allow sending messages initial data available complete length message unknown sends one data frame another end reached marked fin bit extensions protocol also used multiplexing several streams simultaneously instance avoid monopolizing use socket single large payload important security perspective validate origin header connection establishment process server side expected origins avoid cross-site websocket hijacking attacks might possible connection authenticated cookies http authentication better use tokens similar protection mechanisms authenticate websocket connection sensitive private data transferred websocket websocket protocol client implementations try detect user agent configured use proxy connecting destination host port uses http connect method set persistent tunnel websocket protocol unaware proxy servers firewalls features http-compatible handshake thus allowing http servers share default http https ports 80 443 websocket gateway server websocket protocol defines ws // wss // prefix indicate websocket websocket secure connection respectively schemes use http upgrade mechanism upgrade websocket protocol proxy servers transparent work fine websocket others prevent websocket working correctly causing connection fail cases additional proxy server configuration may required certain proxy servers may need upgraded support websocket unencrypted websocket traffic flows explicit transparent proxy server without websockets support connection likely fail encrypted websocket connection used use transport layer security tls websocket secure connection ensures http connect command issued browser configured use explicit proxy server sets tunnel provides low-level end-to-end tcp communication http proxy websocket secure client websocket server case transparent proxy servers browser unaware proxy server http connect sent however since wire traffic encrypted intermediate transparent proxy servers may simply allow encrypted traffic much better chance websocket connection succeed websocket secure used using encryption free resource cost often provides highest success rate since would travelling secure tunnel mid-2010 draft version hixie-76 broke compatibility reverse proxies gateways including eight bytes key data headers advertising data codice_10 header data forwarded intermediates could lead protocol failure recent drafts e.g. hybi-09 put key data codice_6 header solving problem
[ 513, 6657, 10242, 9736, 9229, 2579, 1556, 3604, 6171, 9757, 10269, 7713, 35, 10791, 9770, 7212, 10284, 559, 4658, 4661, 3639, 10808, 2106, 3643, 9275, 64, 1095, 5707, 10834, 6231, 8281, 6747, 10341, 1128, 7784, 1642, 9841, 115, 9843, 3191...
None
9,835
2
OS4000:os4000 os4000 proprietary operating system introduced gec computers limited 1977 successor gec dos range gec 4000 series 16-bit later 32-bit minicomputers os4000 developed late 1990s support-only mode since first operating systems gec 4000 series cos core operating system dos disk operating system basically single-user multi-tasking operating systems designed developing running process control type applications os4000 first released around 1977 reused many parts dos added multi-user access os4000 jcl command-line interpreter batch processing os4000 hierarchical filesystem although on-disk format similar non-hierarchical dos filesystem os4000 jcl based cambridge university phoenix command interpreter os4000 rel 3 arrived around 1980 included linked-os — support linked os4000 operating systems enable multi-node systems constructed main customer central computing service university college london euclid multi-node system consisting hub file server multiple rim multi-access compute server systems provided service 100 simultaneous users linked-os also used construct fail-over process control systems higher resilience os4000 rel 4 arrived around 1983 upped maximum number user modules 150 mainly university college london euclid system together enhanced batch processing system also included support gec 4090 processor introduced 32-bit addressing mode os4000 rel 5 introduced modified version os4000 filesystem called cfsx order allow easier use larger disks initial rel 5 supported cfsx filesystem support original cfs1 filesystem reintroduced well quite quickly os4000 rel 6 introduced support dual processor systems gec 4190d os4000 developed uk gec computers borehamwood offices elstree way gec computers dunstable development centre woodside estate dunstable architecture os4000 heavily based around architecture platform runs gec 4000 series minicomputers rather unusual platform includes feature called nucleus combination hardware firmware based kernel altered program control means many features typically found operating system kernels need included os4000 underlying platform performs functions instead operating system consequently provision running privileged mode code platform—all os4000 operating system code runs processes nucleus supports 256 processes schedules automatically using fixed priority scheme os4000 lives entirely within processes set system tables used configure nucleus access system tables granted processes need alter configuration nucleus e.g load new programs processes adjust nucleus scheduling time-shared processes etc system tables tell nucleus processes permitted communicate updated processes created destroyed e.g users login logout i/o performed directly processes system tables identify processes access peripherals handle peripheral interrupts example device driver disk controller process responsible issuing commands nucleus disk controller handling interrupts passed back disk controller via nucleus system tables explicitly state process access disk controller system tables grant device driver access peripherals event process stopping crashing nucleus looks owner process system tables informs owner process take decision let system continue running without process take system like unix panic take action reload and/or restart process functions filesystems store allocation terminal drivers timing services etc also exist separate processes nucleus implements segmented memory system processes access memory segments defined system tables maintained os4000 os4000 provides memory system handles store-resident memory virtual memory backed disk known overlay overlaying performed segment level os4000 also inherited grouped segments dos group segments overlaid retrieved single group feature little used os4000 process may use mixture resident overlayable segments although process performing real-time tasks would normally designed use resident segments os4000 supports fully mixed set process scheduling within system hard real-time processes soft real-time time-shared background given os4000 also includes full program development test/debug facilities made os4000 ideal developing deploying real-time applications process control high speed time data communications within one system os4000 uses proprietary filesystem filesystem extent based variable block size — different files created different blocksizes ranging 256 bytes 16,384 bytes 256-byte multiples filesystem hierarchical components limited 8 characters codice_1 period used component separator os4000 jcl limits characters file path components upper case letters numbers file path starts context pointer name refers position filesystem followed zero catalogues equivalent unix directories ending filename disk system contains separate independent filesystem volume name disk name top level catalogue master catalogue must one disk mounted volume name codice_2 contains specific files required os4000 larger systems usually additional disks containing user files data files etc although coexist codice_2 disk space permitting users given set initial context pointers point catalogue filesystem users see filesystem hierarchies initial context pointers systems usually configured unprivileged users see users files system files except system executables held codice_4 convention area called codice_5 available users enables transfer/sharing files files os4000 filesystem typed means filesystem hold several different types file understands contents structured common logical files contain record structure split sequential random files random files records length enable seeking record numbers finally text binary files distinguished mainly prevent applications expect textual data accidentally using binary file results set logical file types identified three letters e.g logical sequential text lst logical file types lst lsb lrt lrb converse logical files physical files accessed block time known physical random binary prb files file types pst psb prt also exist theory capabilities prb generally used additionally logical indexed sequential lis filetype isam file always appears sorted key field byte stream byt filetype added rel 6.5 better support os4000 nfs server filetype cat used hold catalogues —it actually lsb file modified filesystem addition files catalogues 3 types symbolic links references ref created point another file catalogue creator ref see initial context pointer either filesystem another filesystem disk pointers odp similar references created point file catalogue seen initial context pointers creating odp privileged operation available system manager support unix style symlinks arbitrary text stored catalogue added rel 6.5 better support os4000 nfs server symlinks created visible nfs clients os4000 also provides non-hierarchical temporary filesystem supports exactly types file permanent filesystems except cat ref odp symlinks file contents stored dedicated temporary filing disk regions file metadata stored memory logged user private temporary filing name space seen logged user even another logged user username user temporary files deleted user logs implicitly system rebooted temporary filenames start percent codice_6 ampersand codice_7 limited 8 characters following shows short multi-access login session case user codice_8 logged issued codice_9 command session left timeout inactivity user logs os4000 jcl command interpreter codice_10 loaded user codice_11 process started reads commands terminal number system commands built codice_10 case command n't built executable binary files loaded codice_13 process run text jcl files opened processed directly codice_10 user normally also gets codice_15 process privileged used load trusted debugging programs real-time process control accounts half os4000 systems deployed systems steel production accounts significant proportion earlier real-time process control systems upgraded dos os4000 x.25 packet switches account significant proportion systems although earlier gec x.25 packet switches ran special operating system called nos cut operating system halfway dos os4000 civil command control systems e.g fire service control systems interfacing emergency telephone operator fire stations prestel uk public videotex systems used many countries many private viewdata systems multi-user minicomputers used many education research establishments os4000 ported gec series 63 minicomputer known os6000 required addition software nucleus emulation feature gec series 63 hardware gec computers dropped os6000 source code given daresbury laboratory main user continued keep step os4000 releases lifetime two gec series 63 systems
[ 2179, 10499, 10883, 394, 1147, 1804, 3978, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 5293, 3374, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6...
Test
9,836
6
OpenAFS:openafs openafs open-source implementation andrew distributed file system afs afs originally developed carnegie mellon university developed commercial product transarc corporation subsequently acquired ibm linuxworld 15 august 2000 ibm announced plans release version commercial afs product ibm public license became openafs today openafs actively developed wide range operating system families including aix mac os x darwin hp-ux irix solaris linux microsoft windows freebsd netbsd openbsd openafs foundation established may 20 2013 non-profit organization dedicated fostering stability growth openafs governance project split board elders consider issues strategic direction gatekeepers control source repository although legal entity owns openafs source code copyright many files attributed ibm source covered ipl however several files tree covered university vanity licenses applicable licenses listed file source repository called openafs/doc/license contributors last five years made significant improvements implementation afs3 protocol without breaking interoperability ibm/transarc releases since announcement written several large development projects integrated 64-bit ms-windows support ms-windows 7 support apple-mac os x v10.4-v10.9 support demand attach fileserver many development projects various stages completion following several prominent examples existing user base includes small single server cells well large multinational deployments spanning academia private research laboratories government commercial entities small snapshot deployed afs cells found reviewing contents cellservdb file distributed openafs
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 7789, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1...
Test
9,837
1
Metadatabase:metadatabase metadatabase database model 1 metadata management 2 global query independent databases 3 distributed data processing word metadatabase addition dictionary originally metadata common term referring simply data data tags keywords markup headers however technology concept metadata extended also include data knowledge representation information models e.g. relations entities-relationships objects application logic e.g. production rules analytic models e.g. simulation optimization mathematical algorithms case analytic models also referred modelbase classes metadata integrated modeling ontology give rise stable set meta-relations tables metadata individual models interpreted metadata entered tables models inserted retrieved updated deleted manner ordinary data ordinary relational database users also formulate global queries requests processing local databases metadatabase using globally integrated metadata metadatabase structure implemented open technology relational databases metadatabase technology developed rensselaer polytechnic institute troy new york group faculty students see references end article starting late 1980s main contribution includes extension concept metadata metadata management original approach designing database metadata applications conceptual results continue motivate new research new applications level particular design openness scalability tied particular ontology proposed requires reverse-representation application models order save meta-relations theory ontology neutral proven industrial applications however needs development establish field open technology requirement reverse-representation common global information integration technology way facilitate metadatabase approach distribute core portion local site allow peer-to-peer translation fly
[ 7802, 2901, 9286, 10471 ]
Test
9,838
2
IBM_System_Management_Facilities:ibm system management facilities ibm system management facility smf component ibm z/os mainframe computers providing standardised method writing records activity file data set use z/os term smf provides full instrumentation baseline activities running ibm mainframe operating system including i/o network activity software usage error conditions processor utilization etc one prominent components z/os uses smf ibm resource measurement facility rmf rmf provides performance usage instrumentation resources processor memory disk cache workload virtual storage xcf coupling facility rmf technically priced extra cost feature z/os bmc sells competing alternative cmf smf forms basis many monitoring automation utilities smf record numbered type e.g smf 120 smf 89 installations great control much little smf data collect records written software ibm products generally record type 128 higher record types subtypes example type 70 subtype 1 records written rmf record cpu activity list common smf record types major record types especially created rmf continue evolve rapid pace release z/os brings new fields different processor families coupling facility levels also change data model smf record data two ways two ways declared use one used time order fallback alternative data periodically dumped sequential files example tape drives using ifasmfdp smf dump utility ifasmfdl using log streams ifasmfdp also used split existing smf sequential files copy files two dump programs produce output involve changes smf records elaboration chain changing jcl call new dump utility
[ 7, 3966, 6678, 2168, 9977, 7162, 3323, 10652, 5598 ]
Test
9,839
2
Windows_Subsystem_for_Linux:windows subsystem linux windows subsystem linux wsl compatibility layer running linux binary executables elf format natively windows 10 windows server 2019 may 2019 wsl 2 announced introducing important changes real linux kernel subset hyper-v features since june 2019 wsl 2 available windows 10 customers windows insider program including home edition first release wsl provides linux-compatible kernel interface developed microsoft containing linux kernel code run gnu user space top ubuntu opensuse suse linux enterprise server debian kali linux user space might contain bash shell command language native gnu/linux command-line tools sed awk etc programming language interpreters ruby python etc even graphical applications using x11 server host side architecture redesigned wsl 2 linux kernel running lightweight virtual machine environment introduced anniversary update august 2 2016 ubuntu image available fall creators update released october 17 2017 moved installation process linux distributions windows store introduced suse images wsl available 64 bit versions windows 10 version 1607 also available windows server 2019 microsoft announced wsl 2 may 6th 2019 features completely new vm-based backend based subset hyper-v features lieu prior system call adaptation layer planned release windows insider program june 2019 microsoft first foray achieving unix-like compatibility windows began microsoft posix subsystem superseded windows services unix via mks/interix eventually deprecated release windows 8.1 technology behind windows subsystem linux originated unreleased project astoria enabled android applications run windows 10 mobile first made available windows 10 insider preview build 14316 whereas microsoft previous projects third-party cygwin focused creating unique unix-like environments based posix standard wsl aims native linux compatibility instead wrapping non-native functionality win32 system calls prior systems utilized wsl initial design wsl 1 leveraged nt kernel executive serve linux programs special isolated minimal processes known pico processes attached kernel mode pico providers dedicated system call exception handlers distinct vanilla nt process opting reutilize existing nt implementations wherever possible though wsl via initial design much faster arguably much popular brethren unix-on-windows projects windows kernel engineers found difficulty trying increase wsl performance syscall compatibility trying reshape existing nt kernel recognize operate correctly linux api microsoft ignite conference 2018 microsoft engineers gave high-level overview new lightweight hyper-v vm technology containerization virtualized kernel could make direct use nt primitives host 2019 microsoft announced completely redesigned wsl architecture wsl 2 using lightweight vm technology hosting actual customized linux kernel images claiming full syscall compatibility microsoft envisages wsl primarily tool developers – especially web developers work open source projects wsl uses fewer resources typical virtual machine prior wsl direct way run linux software windows environment also allowing users use windows apps linux tools set files lxss manager service service charge interacting subsystem drivers way bash.exe confused shells provided linux distributions launches linux processes well handling linux system calls binary locks execution linux processes invoked particular user go linux instance usually first invoked process init applications closed instance closed codice_1 command used manage distributions windows subsystem linux command-line list available distributions set default distribution uninstall distributions command also used run linux binaries windows command prompt windows powershell codice_1 replaces codice_3 deprecated windows 10 1803 later run codice_4 command wsl using powershell example using codice_5 command command prompt wsl 1 design featured hardware emulation virtualization unlike projects colinux makes direct use host file system parts hardware network web servers example accessed interfaces ip addresses configured host shares restrictions use ports require administrative permissions ports already occupied applications guarantees interoperability certain locations system folders configurations whose access/modification restricted even running root sudo shell instance elevated privileges must launched order get sudo give real root privileges allow access wsl 1 capable running linux software 32-bit binaries require specific linux kernel services implemented wsl due lack real linux kernel wsl 1 kernel modules device drivers ca n't run wsl 2 however makes use live virtualized linux kernel instances possible run graphical gui applications mozilla firefox installing x11 server within windows host environment vcxsrv xming although without caveats lack audio support hardware acceleration resulting poor graphics performance support opencl cuda also implemented currently although planned future releases microsoft stated wsl 1 oriented development applications desktop environment production servers recommending use virtual machines hyper-v kubernetes azure purposes benchmarks wsl 1 performance often near native linux ubuntu debian intel clear linux linux distributions i/o tests bottleneck wsl redesigned wsl 2 backend claimed microsoft offer twenty-fold increases speed certain operations compared wsl 1 version 2 introduces changes architecture microsoft opted virtualization highly optimized subset hyper-v features order run provided kernel underlying distributions promising performance equivalent wsl 1 backwards compatibility mind developers n't need change anything published distributions even version exists new wsl global configuration way 1 ini file named codice_6 located user folder distribution installation resides inside ext4-formatted filesystem inside virtual disk host file system transparently accessible 9p protocol users microsoft promised 20 times read/write performance wsl 1
[ 11270, 9735, 2568, 5643, 4624, 6674, 537, 8729, 540, 9245, 3102, 9762, 8227, 6180, 8740, 1577, 10281, 2101, 10812, 3648, 582, 8262, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 1632, 3170, 8296, 622, 1647, 4210, 779...
None
9,840
2
8.3_filename:8.3 filename 8.3 filename also called short filename sfn filename convention used old versions dos versions microsoft windows prior windows 95 windows nt 3.5 also used modern microsoft operating systems alternate filename long filename compatibility legacy programs filename convention limited fat file system similar 8.3 file naming schemes also existed earlier cp/m trs-80 atari data general digital equipment corporation minicomputer operating systems 8.3 filenames limited eight characters directory specifier followed optionally filename extension consisting period codice_1 three characters systems support 8.3 filenames excess characters ignored file name extension codice_1 present significance codice_3 codice_4 equivalent furthermore systems file directory names uppercase although systems use 8.3 standard usually case-insensitive hence codice_5 equivalent name codice_6 however non-8.3 operating systems almost modern operating systems accessing 8.3 file systems including dos-formatted diskettes also including modern memory cards networked file systems underlying system may alter filenames internally preserve case avoid truncating letters names example case vfat vfat variant fat extended directory format introduced windows 95 windows nt 3.5 allowed mixed-case unicode long filenames lfns addition classic 8.3 names using multiple 32-byte directory entry records long filenames way one recognised old 8.3 system software valid directory entry maintain backward-compatibility legacy applications dos windows 3.1 fat vfat filesystems 8.3 filename automatically generated every lfn file still renamed deleted opened although generated name e.g codice_7 may show little similarity original ntfs filesystems generation 8.3 filenames turned 8.3 filename obtained using kernel32.dll function getshortpathname although compulsory algorithm creating 8.3 name lfn windows uses following convention ntfs file system used windows nt family supports lfns natively 8.3 names still available legacy applications optionally disabled improve performance situations large numbers similarly named files exist folder iso 9660 file system mainly used compact discs similar limitations basic level 1 additional restriction directory names contain extensions characters notably hyphens allowed filenames level 2 allows filenames 31 characters compatible classic amigaos classic mac os filenames 2001 microsoft antitrust case names micros~1 micros~2 humorously used refer companies might exist proposed split microsoft legacy technology used wide range products devices standard interchanging information compact flash cards used cameras vfat lfn long filenames introduced windows 95/98/me retained compatibility vfat lfn used nt-based systems windows nt/2k/xp uses modified 8.3 shortname filename contains lowercase letters combination lowercase basename uppercase extension vice versa special characters fits within 8.3 limits vfat entry created windows nt later versions xp instead two bits byte 0x0c directory entry used indicate filename considered entirely partially lowercase specifically bit 4 means lowercase extension bit 3 lowercase basename allows combinations codice_33 codice_34 codice_35 operating systems support creates backward-compatibility filename mangling problem older windows versions 95 98 see all-uppercase filenames extension used therefore change capitalization file transported usb flash drive cause problems operating systems exhibit case-insensitive filename behavior dos windows current 2.6 versions linux recognize extension reading mount option shortname determines whether feature used writing directory table special type file represents directory file directory stored within represented 32-byte entry table entry records name extension attributes archive directory hidden read-only system volume date time creation address first cluster file/directory data finally size file/directory legal characters dos filenames include following excludes following ascii characters dos filenames oem character set code 0xe5 first byte see makes troubles extra-ascii characters used directory entries root directory region subdirectories following format sometimes may desirable convert long filename short filename example working command prompt simple rules followed attain correct 8.3 filename find sure sfn 8.3 names files directory use codice_49 shows short names one long names codice_50 shows short names original dir listing format windows nt-based operating systems command prompt codice_51 applets accept long filenames wildcard characters question mark asterisk '* long filenames spaces need escaped i.e enclosed single double quotes starting windows vista console commands powershell applets perform limited pattern matching allowing wildcards filename subdirectory file path silently substituting first matching directory entry example codice_52 change current directory codice_53
[ 2432, 3330, 5514, 6797, 11149, 3856, 2193, 6289, 8976, 532, 8988, 6813, 9762, 5413, 5158, 7847, 10149, 1193, 5293, 7983, 9907, 52, 1844, 6712, 4409, 6587, 9533, 576, 3522, 4170, 6476, 589, 7244, 9420, 5969, 6358, 5975, 2395, 1509, 10087, ...
Test
9,841
7
Rich_web_application:rich web application rich web application originally called rich internet application ria installable internet application web application many characteristics desktop application software concept closely related single-page application may allow user interactive features drag drop background menu wysiwyg editing etc html5 current standard delivering rich web applications supported major browsers adobe flash manipulates vector raster graphics provide animation text drawings still images supports bidirectional streaming audio video capture user input via mouse keyboard microphone camera flash contains object-oriented language called actionscript supports automation via javascript flash language jsfl flash content may displayed various computer systems devices using adobe flash player available free charge common web browsers mobile phones electronic devices using flash lite apache flex formerly adobe flex software development kit sdk development deployment cross-platform rias based adobe flash platform initially developed macromedia acquired adobe systems flex donated adobe apache software foundation 2011 java applets used create interactive visualizations present video three dimensional objects media java applets appropriate complex visualizations require significant programming effort high level language communications applet originating server javafx software platform creating delivering rias run across wide variety connected devices current release javafx 11 sept 2018 enables building applications desktop browser mobile phones comes 3d support tv set-top boxes gaming consoles blu-ray players platforms planned java fx runs plug-in java applet via webstart silverlight proposed microsoft another proprietary alternative technology widely accepted instance lacks support many mobile devices examples application video streaming events including 2008 summer olympics beijing 2010 winter olympics vancouver 2008 conventions major political parties united states silverlight also used netflix instant video streaming service silverlight longer active development supported microsoft edge microsoft recent browser rias could use xforms enhance functionality using xml xslt along xhtml css javascript also used generate richer client side ui components like data tables resorted locally client without going back server mozilla internet explorer browsers support terms rich client rich internet application introduced white paper march 2002 macromedia adobe though concept existed number years earlier names including remote scripting microsoft april 1999 x internet forrester research october 2000 rich web application rias present indexing challenges web search engines adobe flash content least partially indexable security improve application software example use sandboxes automatic updates extensions remain subject vulnerabilities access often much greater native web applications security purposes rias run client portions within special isolated area client desktop called sandbox sandbox limits visibility access file-system operating system client application server side connection approach allows client system handle local activities reformatting forth thereby lowering amount frequency client-server traffic especially versus client-server implementations built around so-called thin clients november 2011 number announcements demonstrated decline demand rich internet application architectures based plug-ins order favor html5 alternatives adobe announced flash would longer produced mobile tv refocusing efforts adobe air pundits questioned continued relevance even desktop described beginning end research motion rim announced would continue develop flash playbook decision questioned commentators rumors state microsoft abandon silverlight version 5 released combination announcements proclaiming end line browser plug-ins
[ 6657, 5636, 9229, 2579, 1556, 10270, 9770, 7212, 10284, 559, 4658, 4661, 3639, 64, 5707, 10834, 6231, 6747, 7784, 1642, 9834, 115, 9843, 4728, 124, 1664, 10910, 8351, 7340, 9908, 11449, 4797, 9408, 11466, 7885, 4310, 4822, 5849, 8923, 636...
Test
9,842
4
Attic_(backup_software):attic backup software attic deduplicating backup software various unix-like operating systems attic development began 2010 accepted debian august 2013 attic available pip notably part debian ubuntu arch slackware attic offers efficient deduplicated compressed optionally encrypted authenticated backups backup includes metadata like owner/group permissions posix acls extended file attributes handles special files also like hardlinks symlinks devices files etc internally represents files archive stream metadata similar tar unlike tools git borg project created extensive documentation internal workings attic uses rolling hash implement global data deduplication compression defaults zlib encryption aes via openssl authenticated hmac 2015 attic forked borg support open faster paced development according developers many issues attic fixed fork backward compatibility original program lost non-reversible upgrade process exists borg 1.0.0 released 5 march 2016 borg 1.1.0 released 7 october 2017 2018 borg active development many contributors attic developed stable releases available various linux distributions debian ubuntu fedora opensuse others ports collection various bsd derivatives project provides pre-built binaries linux freebsd macos
[ 6049, 9025, 6119, 6280, 8554, 1358, 7663, 7983, 5492, 11221, 823 ]
Train
9,843
5
ELinks:elinks elinks free text-based console web browser unix-like operating systems began late 2001 experimental fork petr baudiš links web browser hence e name since e come stand enhanced extended 1 september 2004 baudiš handed maintainership project danish developer jonas fonseca citing lack time interest desire spend time coding rather reviewing organising releases 17 march 2017 openbsd removed elinks ports tree citing concerns security issues lack responsiveness developers
[ 513, 6657, 9736, 2579, 6171, 9245, 9757, 7713, 3110, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 3191, 119, 4728, 637, 1664, 2182, 3218, 8854, 8857, 10910, 8351, 4777, 7340, ...
None
9,844
2
FreeNAS:freenas freenas free open-source network-attached storage nas software based freebsd openzfs file system licensed terms bsd license runs commodity x86-64 hardware freenas supports windows macos unix clients various virtualization hosts xenserver vmware using smb afp nfs iscsi ssh rsync ftp/tftp protocols advanced freenas features include full-disk encryption plug-in architecture third-party software freenas supports openzfs filesystem provides data integrity checking prevent data corruption enable point time snapshotting replication several levels redundancy including striping mirroring striped mirrors raid 1+0 three levels raidz freenas managed comprehensive web interface supplemented minimal shell console handles essential administrative functions web interface supports storage pool configuration user management sharing configuration system maintenance embedded system appliance freenas boots usb flash device sata dom image configured using usb flash/cd-rom bootable installer freenas operating system fully independent storage disks allowing configuration database encryption keys backed restored fresh installation os separation also allows freenas system upgrades performed web interface freenas project started october 2005 olivier cochard-labbé based m0n0wall embedded firewall freebsd 6.0 volker theile joined project july 2006 became project lead april 2008 september 2009 development team concluded project release .7 due complete rewrite order accommodate modern features plug-in architecture volker theile decided project best reimplemented using debian linux shifted development efforts interim corenas project eventually openmediavault continues project lead cochard-labbé responded community objections debian version freenas resumed activity project oversaw transfer freenas user ixsystems developers daisuke aoyama michael zoon continued developing freenas 7 nas4free project meanwhile ixsystems rewrote freenas new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 plug-in architecture arrived freenas 8.2 freenas versioning synchronized freebsd clarity freenas 8.3 introduced full-disk encryption freebsd 9.1-based freenas 9.1 brought updated plug-in architecture compatible trueos warden jail management framework freenas 9.1 also first version freenas use community-supported openzfs v5000 feature flags freenas 9.2 based freebsd 9.2 included performance improvements introduced rest api remote system administration freenas 9.3 based freebsd 9.3 introduced zfs-based boot device initial setup wizard high-performance in-kernel iscsi server freenas 9.10 based freebsd 10.3-rc3 brought end freenas/freebsd synchronized naming introduced graphite monitoring support experimental support bhyve hypervisor october 2015 ten years original freenas release freenas 10 alpha released providing preview would become freenas corral ga march 15 2017 freenas corral introduced new graphical user interface command-line interface underlying middleware container management system virtual machine management system freenas corral departs freenas providing nas functionality also hyper-converged functionality thanks integrated virtual machine support however april 12 2017 ixsystems announced freenas corral would instead relegated 'technology preview citing issues general instability lack feature parity 9.10 jails iscsi etc users experiencing lower performance expected departure project lead instead decision made revert existing 9.10 code bring corral features 9.10.3 may 2017 ix systems announced freenas 11 would imminently released based 9.10 included features update freebsd operating system virtual machine management updates jails new beta user interface along lines corral based angular js 8.0 reimplementation freenas moved project m0n0bsd/m0n0wall/php-based architecture one based freebsd nanobsd embedded build system python programming language django web application framework dōjō toolkit javascript library also used lighttpd web server replaced nginx freenas 8.2 terminated successor 9.10.2 known freenas corral retained nginx web server zfs-based boot device freenas replaces django/dōjō web application framework original one freenas 11 implemented new interface using angular js features plugins shown 11.0 branch
[ 2051, 6153, 10761, 1049, 4636, 9762, 1071, 9784, 5177, 8266, 5710, 7249, 9306, 1118, 607, 8816, 9343, 2180, 2212, 3237, 684, 3248, 1718, 7863, 5819, 7871, 11459, 7364, 9927, 8395, 8909, 6864, 8404, 10455, 6361, 8410, 6371, 5356, 9452, 115...
Test
9,845
9
David_J._Farber:david j. farber david j. farber born april 17 1934 professor computer science noted major contributions programming languages computer networking currently distinguished professor co-director cyber civilization research center keio university japan farber graduated stevens institute technology 1956 began 11-year career bell laboratories helped design first electronic switching system ess-1 snobol programming languages subsequently held industry positions rand corporation scientific data systems followed academic positions university california irvine university delaware irvine research work focused creating world first operational distributed computer system member electrical engineering department university delaware helped conceive organize major american research networks csnet nsfnet national research education network nren helped create nsf/darpa-funded gigabit network test bed initiative served chairman gigabit test bed coordinating committee farber subsequently appointed alfred fitler moore professor telecommunication systems university pennsylvania also held appointments professor business public policy wharton school business faculty associate annenberg school communication served chief technologist us federal communications commission 2000–2001 leave university farber founding editor icannwatch serves board advisers context relevant liquid information company farber aaas fellow ieee fellow acm fellow recipient 1995 sigcomm award lifelong contributions computer communications served board directors electronic frontier foundation electronic privacy information center advisory board board trustees internet society member presidential advisory committee high performance computing communications information technology next generation internet runs large 25,000+ readership mailing list called interesting-people 2012 memory son established joseph m. farber prize stevens institute technology recognizes graduating senior majoring one disciplines college arts letters displays keen interest concern civil liberties importance preserving protecting human rights august 3 2013 farber inducted pioneers circle internet hall fame elected aaas fellow council american association advancement science 2018
[ 8262, 10569, 3178, 11659, 6352, 8373, 1783, 472 ]
Validation
9,846
2
Reference_monitor:reference monitor operating systems architecture reference monitor concept defines set design requirements reference validation mechanism enforces access control policy subjects e.g. processes users ability perform operations e.g. read write objects e.g. files sockets system properties reference monitor captured acronym neat means example windows 3.x 9x operating systems built reference monitor whereas windows nt line also includes windows 2000 windows xp designed contain reference monitor although clear properties tamperproof etc ever independently verified level computer security intended provide claim reference validation mechanism satisfies reference monitor concept correctly enforce system access control policy must invoked mediate security-sensitive operations must tampered undergone complete analysis testing verify correctness abstract model reference monitor widely applied type system needs enforce access control considered express necessary sufficient properties system making security claim according ross anderson reference monitor concept introduced james anderson influential 1972 paper peter denning 2013 oral history stated james anderson credited concept paper scott graham presented 1972 conference systems evaluated b3 trusted computer system evaluation criteria tcsec must enforce reference monitor concept
[ 4067, 3624, 8302, 7983, 8976, 2558 ]
Test
9,847
1
PhpSQLiteAdmin:phpsqliteadmin phpsqliteadmin name two independent web applications written php managing sqlite databases phpsqliteadmin web-based client leverages php scripting sqlite file-database system provide simple way users create databases create tables query data using non-industry-standard sqlite syntax
[ 5546, 8644 ]
Validation
9,848
2
BOOPSI:boopsi boopsi basic object oriented programming system intuition object-oriented programming system amigaos extends amigaos windowing environment intuition object-oriented subsystem allowing hierarchy object classes every class defines single gui widget interface event boopsi made easier developers create system widgets create standardized graphical user interfaces magic user interface reaction examples complete widget toolkits built boopsi toolkits become popular amiga software programmers generate maintain graphical user interfaces object-oriented design brings advantages straightforward coupling objects objects example programmer may link numerical input field sliding control user adjusts sliding control numerical value input field changes automatically boopsi officially introduced amigaos 2.0 extended later releases
[ 1664, 8832, 1666, 3462, 8582, 6797, 2062, 5264, 2193, 9491, 1812, 2197, 3734, 9236, 9245, 10654, 3233, 9249, 4387, 3876, 9762, 11559, 9128, 4777, 8618, 2603, 5165, 5677, 3631, 432, 6062, 8114, 8115, 692, 8369, 11442, 576, 1347, 1348, 8644...
None
9,849
3
King_Kong_2:_Yomigaeru_Densetsu:king kong 2 yomigaeru densetsu game unofficially re-released english south korean company zemina 1987 킹콩ii king kong ii
[ 10931, 9006 ]
None
9,850
4
Tanium:tanium tanium privately held endpoint security systems management company based emeryville california founded 2007 father son david hindawi orion hindawi co-founders management company bigfix orion named ceo february 2016 david serves executive chairman
[ 7306 ]
Test
9,851
3
Loongson:loongson loongson family general-purpose mips64 cpus developed institute computing technology ict chinese academy sciences cas china chief architect professor formerly called godson loongson result public–private partnership blx ic design corporation founded 2002 ict jiangsu zhongyi group based beijing blx focuses designing 64-bit loongson general-purpose embedded processors together developing software tools reference platforms stmicroelectronics fabricates markets loongson chips blx fabless current loongson instruction set mips64 internal microarchitecture independently developed ict early implementations family lacked four instructions patented mips technologies avoid legal issues 2007 deal reached mips technologies ict stmicroelectronics bought mips license loongson thus processor promoted mips-based mips-compatible instead mips-like june 2009 ict licensed mips32 mips64 architectures directly mips technologies august 2011 loongson technology corp. ltd. licensed mips32 mips64 architectures mips technologies inc. continued development mips-based loongson cpu cores first revision loongson architecture loongson1 godson-232 core pure 32-bit cpu running clock speed 266 mhz fabricated 0.18 micron cmos process 8 kb data cache 8 kb instruction cache 64-bit floating-point unit capable 200 double-precision mflops intended embedded applications point sale pos systems high performance 64-bit architecture needed loongson 2 adds 64-bit ability loongson architecture initially running 500 mhz later revisions godson 2e produced run 1 ghz godson 2f released market early 2008 ran 1.2 ghz 65 nm loongson 3 godson-3 able run clock speed near 1 ghz 4 cpu cores ~15 w first 8 cores later 40 w april 2010 loongson 3a released ddr2/3 dram support 2017 loongson released latest version 3a cpu 3a3000 one domestic cpu china loongson 3a3000 commercialized recently exhibition nanjing 2017 based loongson 3a3000 motherboard developers computer quietly debut 3a3000 loongson latest cpu model 2017 using loongisa instruction set designed quad-core 64-bit clocked 1.5 ghz power consumption 30w performance frequency 1.5ghz 3a3000 single-threaded performance significantly behind intel amd products 3a3000 one-third intel i5 4460 3.2g two versions loongson-3b godson-3b first featuring 32 nm 6-core processor second version 28 nm 8-core processor version clocked 1.2 ghz 1.5 ghz loongson-3b exceptional energy efficiency terms performance per watt executing 192 gflops using 40 watts cpu core 64 kb l1 cache 128 kb l2 cache cores share common 8 mb l3 cache helps reduce cache miss rate ict launched loongson-3b-based six-core desktop solution technical specifications desktop solution uses optimized version fedora 13 lot software ported available kingsoft wps office suite manufacturer states user experience desktop solution significantly improved loongson-3a based predecessor results benchmark test conducted april 2014 available loongson 3 adds 200 new instructions loongson 2 addition specific benefit speeding intel x86 cpu emulation cost 5 total die area new instructions help emulation performance example qemu known example new instructions reduce impact executing x86/cisc-style instructions mips pipeline added improvements qemu ict loongson-3 achieves average 70 performance executing native binaries running x86 binaries nine benchmarks unlike processors intel advanced micro devices via technologies loongson directly support x86 instruction set processor main operating system linux theory os mips support also work example windows ce ported loongson-based system minimal effort 2010 lemote ported android distribution loongson platform many operating systems work loongson gnu compiler collection gcc main compiler software development loongson platform ict also ported open64 loongson ii platform open source applications linux platform ported little effort common open-source applications including openoffice.org mozilla firefox pidgin mplayer applications written java platform supported .net applications unofficial port mono common language runtime available online march 2006 €100 loongson ii computer design called longmeng dragon dream announced lemote june 2006 computex'2006 yellowsheepriver announced municator ysr-639 small form factor computer based 400 mhz loongson 2 currently loongson boxes come 667 mhz godson 2e processor 800 mhz godson 2f processor sold china cny 1599 us 200 cny 1800 respectively without monitor mouse keyboard two manufacturers announced loongson 2f products sale outside china loongson insiders revealed new model based loongson 3a quad-core laptop developed expected launch august 2011 similar design macbook pro apple inc. carry linux operating system default september 2011 lemote announced yeeloong-8133 13.3 laptop featuring 900 mhz quad-core loongson-3a/2gq cpu 26 december 2007 china revealed first loongson based supercomputer performance 1 tflops peak performance 350 gflops measured linpack hefei designated kd-50-i supercomputer designed joint team led chen guoliang computer science technology department university science technology china ict secondary contractor kd-50-i first chinese built supercomputer utilize domestic chinese cpus total 336 loongson-2f cpus nodes interconnected ethernet size computer roughly equivalent household refrigerator cost less rmb800,000 approximately 120,000 80,000 20 april 2010 ustc announced successful development loongson 3a based kd-60-1 new supercomputer cluster standard blade servers total 80 quad-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 56 compared kd-50-i system similar performance 26 december 2012 ustc announced successful development loongson 3b based kd-90-1 new supercomputer cluster standard blade servers total 10 octo-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 62 compared kd-60 system similar performance high-performance dawning 6000 projected speed one quadrillion operations per second incorporate loongson processor core dawning 6000 currently jointly developed institute computing technology chinese academy sciences dawning information industry company li guojie chairman dawning information industry company director academician institute computing technology said research development dawning 6000 expected completed two years topstar also released pair mini-atx based motherboards teb-6040m teb-5040 development first loongson chip started 2001 25 june 2008 hu weiwu chief designer loongson processors gave keynote speech isca 2008 held beijing topic speech research development godson processors 2010 january jiangsu province plans buy 1.5 million loongson pcs
[ 3457, 4098, 7938, 8327, 8711, 11405, 398, 783, 6926, 11282, 7699, 7445, 410, 4124, 10780, 6815, 8481, 1915, 5028, 6057, 426, 938, 3883, 4269, 8237, 7983, 9132, 5681, 10675, 1461, 1463, 823, 3511, 10303, 321, 4673, 7234, 709, 6981, 3911, ...
Test
9,852
6
Disc_spanning:disc spanning disc spanning feature cd dvd burning software automatically spreads large amount data across many data discs data set size exceeds storage capacity individual blank disc advantage user need split files directories two blank disc sized pieces hand software may may support slicing single large file order span disc spanners divide numerous files smaller one blank disc capacity across many discs disc spanning works well cd media many applications spanning dvd media fails often lack reliable dvd data disc spanning odd disc spanning used extensively older 3.5 5.25 floppy discs users assume every operating system perform disc spanning media built function incorrect disc spanning schemes include small program reassemble data set structure source machine program could written first disc every disc set use disc spanning cases make files unreadable file-system therefore bounded use program later restore data many users n't want bound solutions use simple disc spanning instead simple disc spanning solution groups files media grouped based size one drawback system files bigger target media burnt drive simple powerful simple calculation would many cd/dvd/bd/hd dvds bunch files need simple grouping displayed like disc1 -- 99 4,479mib br directory br -- dir1 br -- file1 br br disc2 -- 98 4,468mib br directory br -- dir2 br -- file2 br br disc3 -- 45 2,130mib br -- dir3 br etc ... br
[]
Test
9,853
3
Boulder_Dash:boulder dash boulder dash video game released 1984 first star software atari 8-bit computers numerous versions sequels series numerous interactive platforms including apple ii msx zx spectrum commodore 64 colecovision nes bbc micro acorn electron ibm pc amstrad cpc amiga mac os platforms also influenced games rocks-and-diamonds genre repton addition rather direct clones emerald mine original boulder dash created canadian developers peter liepa chris gray october 28 1983 acquired first star software owns rights game intellectual property including registered trademark boulder dash game protagonist called rockford must dig caves collecting gems diamonds reach exit within time limit avoiding various types dangerous creatures well obstacles like falling rocks constant danger crushed trapped avalanche killed underground explosion january 1 2018 first star software name website owned bbg entertainment gmbh also purchased intellectual property rights pertaining games including boulder dash ii computing said bright colorful animation coupled breezy story line make game momentary diversion compute favorably reviewed boulder dash construction kit noting sample game much difficult original boulder dash mean machines gave game boy port boulder dash score 90 praising one finest video games ever written describing game one buy soon possible noting faithfulness original commodore 64 version publication reviewed nes version favourably stating extremely impressive title one greatest games ever written given 92 rating zx spectrum version placed ninth sinclair top 100 speccy games time ever journalist stuart campbell ign reviewed virtual console release commodore 64 version although graphics sound found dated enjoyed game stating still feels fresh 1984 concluded stating though n't look like much boulder dash rocks
[ 4705, 9219, 10931, 9006 ]
Test
9,854
4
Return-to-libc_attack:return-to-libc attack return-to-libc attack computer security attack usually starting buffer overflow subroutine return address call stack replaced address subroutine already present process ’ executable memory bypassing no-execute bit feature present ridding attacker need inject code first example attack wild contributed alexander peslyak bugtraq mailing list 1997 posix-compliant operating systems c standard library codice_1 commonly used provide standard runtime environment programs written c programming language although attacker could make code return anywhere codice_1 likely target almost always linked program provides useful calls attacker codice_3 function used execute shell commands non-executable stack prevent buffer overflow exploitation however prevent return-to-libc attack return-to-libc attack existing executable code used hand attacks call preexisting functions stack-smashing protection prevent obstruct exploitation may detect corruption stack possibly flush compromised segment ascii armoring technique used obstruct kind attack ascii armoring system libraries e.g libc addresses contain null byte 0x00 commonly done placing first 0x01010101 bytes memory pages 16 mb dubbed ascii armor region every address including value contains least one null byte makes impossible emplace code containing addresses using string manipulation functions codice_4 however technique work attacker way overflow null bytes stack program large fit first 16 mib protection may incomplete technique similar another attack known return-to-plt instead returning libc attacker uses procedure linkage table plt functions loaded binary e.g codice_5 etc. address space layout randomization aslr makes type attack extremely unlikely succeed 64-bit machines memory locations functions random 32-bit systems aslr provides little benefit since 16 bits available randomization defeated brute force matter minutes
[ 7556, 1820, 7983, 5040, 5176, 1474, 4423, 5065, 1103, 1106, 3283, 4562, 8787, 9432, 7135, 6754, 3323, 3708, 2558 ]
None
9,855
4
Imperva:imperva imperva cyber security software services company provides protection enterprise data application software company headquartered redwood shores california imperva originally named webcohort founded 2002 shlomo kramer amichai shulman mickey boodaei following year company shipped first product securesphere web application database protection web application firewall 2004 company changed name imperva 2011 imperva went public listed new york stock exchange nyse impv 2014 company acquired remaining shares incapsula cloud security gateway startup named skyfence real-time mainframe security auditing agents tomium software 2016 imperva published free scanner designed detect devices infected vulnerable mirai botnet february 2017 imperva sold skyfence forcepoint 40 million february 2017 imperva purchased camouflage data masking company august 2017 imperva named chris hylen former ceo citrix getgo new president ceo imperva former ceo anthony bettencourt resigned chairman board directors february 2018 august 2018 imperva acquired prevoty runtime application self-protection rasp security company also 2018 imperva identified bug popular web browser google chrome allowing attackers steal information via html tags audio video files 2019 imperva acquired private equity firm thoma bravo
[ 6916, 2118, 3112, 2409, 331, 5371, 8176, 4883, 10772, 2134, 3867, 8668, 2558, 3807 ]
Train
9,856
4
James_Hall_III:james hall iii james w. hall iii born 1958 former united states army warrant officer signals intelligence analyst germany sold eavesdropping code secrets east germany soviet union 1983 1988 hall convicted espionage july 20 1989 fined 50,000 given dishonorable discharge serving 40-year sentence activities united states disciplinary barracks fort leavenworth kansas released september 2011 hall assigned nsa field station berlin teufelsberg one premier listening posts cold war 1982 1985 spied east germany soviet union 1983 1988 hall betrayed hundreds military secrets includes project trojan worldwide electronic network ability pinpoint armored vehicles missiles aircraft recording signal emissions wartime complete national sigint requirements list nsrl 4258-page document nsa activities government requirements sigint capabilities country hall sometimes spent two hours workday reproducing classified documents provide soviets east germans concerned putting regular duty time consistently worked late complete regular assignments used shopping bags smuggle originals documents photocopied frankfurt flat help east berlin associate using illegal income hall paid cash brand new volvo new truck also made large payment home took flying lessons said given military colleagues least six conflicting stories explain lavish life style 1986 hall stationed fort monmouth new jersey returning germany passed promotion sergeant first class year hall also applying appointment warrant officer part routine background investigation associated warrant appointment one supervisors major hall time staff sergeant commented investigator found strange hall could drive car volvo major could n't afford major went explain asked hall apparent disparity hall responded wealthy aunt died left large trust received 30,000 annually major found story plausible reiterated investigators visit investigators thanked major information told already knew trust hall co-workers fully taken duplicity unusual activities never drew much attention returning germany us traveled vienna austria meet soviet handler co-workers wondered would re-enlist become warrant officer several times conveying dissatisfaction army life course warrant officer rank allowed greater access classified material 1977–1981 tour detachment schneeberg intelligence gathering outpost vii corps 326th asa army security agency company west german-czechoslovakian border cold war hall generally good working relationship peers considered peers average analyst would sometimes erupt become upset trivial day-to-day problems however part considered sociable colleague also quickly picked working knowledge german language james also met future wife worked local restaurant bischofsgruen popular tourist town majority detachment soldiers lived hall eventually arrested december 21 1988 savannah georgia bragging undercover fbi agent period six years sold top secret intelligence data east germany soviet union time hall believed speaking soviet contact conversation claimed motivated money told fbi agent posing soviet intelligence officer n't terribly short money decided n't ever want worry next dollar coming 'm anti-american wave flag much anybody else case hall apparently began based tip manfred severin code-named canna clay stasi instructor acted translator courier james hall rejected german staatschutz cia army foreign counterintelligence fca eventually sponsored big tip james hall james hall apprehended severin exfiltrated west family arrest hall said many indicators visible around involved questionable activity hall activities inflicted grave damage u.s. signals intelligence considered perpetrator one costly damaging breaches security long cold war hall confessed giving handlers information us military liaison mission usmlm tank photography new year eve 1984 march 24 1985 inspection tour soviet military facilities ludwigslust german democratic republic us army major arthur d. nicholson jr. unarmed member usmlm shot death soviet sentry jailhouse interview first ever author kristie macrakis designated treasonous bastard cold war spy fbi also arrested hüseyin yıldırım turk served conduit hall east german intelligence officers hall received 100,000 payments reunification germany july 24 1992 almost documents hall copied handed stasi 13,088 pages total given back nsa federal commissioner stasi records joachim gauck later president germany ordered federal ministry interior us government pressure without consulting informing german parliamentary intelligence oversight committee prerequisite giving files away required law hundred pages retained kept top secret gauck well director agency hansjörg geiger later claimed remember ordered return documents agents place us government military worked mole either kgb russian foreign intelligence service svr include
[ 11544, 5183 ]
Test
9,857
3
Mongoose-V:mongoose-v mongoose-v 32-bit microprocessor spacecraft onboard computer applications radiation-hardened expanded 10–15 mhz version mips r3000 cpu mongoose-v developed synova inc. melbourne florida usa support nasa goddard space flight center mongoose-v processor first flew nasa earth observing-1 eo-1 satellite launched november 2000 functioned main flight computer second mongoose-v controlled satellite solid-state data recorder mongoose-v requires 5 volts packaged 256-pin ceramic quad flatpack cqfp examples spacecraft use mongoose-v include
[ 7234, 2503, 7527, 426, 5642, 6250, 1776, 8508, 10974 ]
None
9,858
4
Jericho_Forum:jericho forum jericho forum international group working define promote de-perimeterisation initiated david lacey royal mail grew loose affiliation interested corporate cisos chief information security officers discussing topic summer 2003 initial meeting hosted cisco officially founded january 2004 declared success merged open group industry consortium security forum 2014 created founding members claimed one else appropriately discussing problems surrounding de-perimeterisation felt need create forum define solve consistently issues one earlier outputs group position paper entitled jericho forum commandments set principles describe best survive de-perimeterised world jericho forum consisted user members vendor members originally user members allowed stand election december 2008 relaxed allowing either vendor user members eligible election day-to-day management provided open group jericho forum foundations uk nearly initial members worked corporates global responsibilities involvement grew europe north america asia pacific initial focus defining problem de-perimeterisation forum moved onto focussing defining solution delivered publication collaboration oriented architecture coa paper coa framework paper next focus jericho forum securely collaborating clouds involves applying coa concepts emerging cloud computing paradigm basic premise collaborative approach essential gain value cloud final major piece jericho forum work 2009 around identity culminating 2011 publication identity entitlement access management commandments final months jericho forum contributed thinking debate around smart data handed security forum within open group continue jericho forum declared success sunsetted london conference opengroup 29 october 2013 video jericho forum work identity carried global identity foundation not-for-profit organisation working define components global digital identity ecosystem identity commandments directly translating principles behind identity 3.0
[ 9954, 9513, 8975, 6834, 9113 ]
Validation
9,859
5
Zcoin:zcoin zcoin cryptocurrency aimed using cryptography provide better privacy users compared cryptocurrencies bitcoin late 2014 poramin insom student masters security informatics johns hopkins university wrote paper implementing zerocoin protocol cryptocurrency matthew green faculty member project create standalone cryptocurrency implementing zerocoin protocol named moneta 28 september 2016 zcoin xzc first cryptocurrency implement zerocoin protocol launched poramin insom team roger ver tim lee zcoin initial investors poramin also set exchanged named satang convert thai baht zcoin directly 20 february 2017 malicious coding attack zerocoin protocol created 370,000 fake tokens perpetrators sold 400 bitcoins 440,000 zcoin team announced single-symbol error piece code allowed attacker create zerocoin spend transactions without corresponding mint unlike ethereum dao event developers opted destroy coins attempt reverse happened newly generated ones april 2018 cryptographic flaw found zerocoin protocol allowed attackers steal destroy create zcoins zcoin cryptocurrency team acknowledging flaw stated high difficulty performing attacks low probability giving economic benefit attacker september 2018 zcoin introduced dandelion protocol hides origin ip address sender without using onion router tor virtual private network vpn october 2018 unknown user uploaded banned video zcoin blockchain order avoid thai government censorship november 2018 zcoin conducted world first large-scale party elections thailand democrat party using interplanetary file system ipfs december 2018 zcoin implemented merkle tree proof mining algorithm deters usage application-specific integrated circuit asic mining coins memory intensive miners allows ordinary users use central processing unit cpu graphics card mining enable egalitarianism coin mining month zcoin released academic paper proposing lelantus protocol remove need trusted setup hides origin amount coins transaction 30 july 2019 zcoin formally departed zerocoin protocol adopting new protocol called sigma prevents counterfeit privacy coins inflating coin supply achieved removing feature called trusted setup zerocoin protocol
[ 9248, 3713, 8706, 3462, 8262, 8554, 1776, 1908, 8916, 11612, 4280, 1435, 764, 2045, 4827, 1087 ]
None
9,860
5
Simple_Sensor_Interface_protocol:simple sensor interface protocol simple sensor interface ssi protocol simple communications protocol designed data transfer computers user terminals smart sensors ssi protocol application layer protocol osi model ssi protocol developed jointly nokia vaisala suunto ionific mermit university oulu currently ssi developed within mimosa project part european union framework programmes research technological development ssi protocol used point-to-point communications uart networking nanoip applications ssi also provides polling sensors streaming sensor data rfid sensor tags ssi specifies memory map sensor data criteria ssi protocol development sample implementation ssi protocol msp430 microcontrollers published open source august 2006 nokia ssi message consists 2-byte header n -byte payload header consists one byte address wildcard 0x3f ascii one byte message/command type different possible values message/command type presented ssi v1.2 command base group commands used find configure sensor units utilizing ssi-protocol group commands used read sensor data infrequently data streaming purposes defined commands point-to-point messaging ssi done ssi/uart ssi uart message consists 3-byte uart header ssi message payload optional cyclic redundancy check checksum use checksum defined ssi message/command type lower case commands indicating use crc header consists start byte 0xfe 2-byte total length message 2-byte bitwise negation length help identify frame start ssi networking variable environment done using nanoip typical case using ssi individual message important nanoudp simplified udp defined nanoip used message format individual messages important nanotcp used provides flow control retransmission cost message size increase network traffic nanoudp message consists 5-byte nanoudp header n -byte message payload optional 2-byte crc checksum header consists one protocol byte 2-byte message length total length including header crc 1-byte source port 1-byte destination port number destination port number 0x28 ssi messages
[ 6403, 9987, 1030, 3847, 9992, 6544, 1297, 3218, 8211, 11413, 5270, 6681, 5402, 5021, 3742, 2206, 5405, 10271, 10274, 1955, 9381, 10924, 562, 2996, 9909, 7478, 7865, 4797, 3006, 4543, 3133, 5437, 5439, 7360, 7364, 11332, 2887, 8265, 2509, ...
Test
9,861
3
K1810VM86:k1810vm86 k1810vm86 soviet 16-bit microprocessor clone intel 8086 cpu binary pin compatible developed 1982 1985 original k1810vm86 supported clock frequency 5 mhz 8 mhz allowed later k1810vm86m к1810вм86m corresponding intel 8086-2 k1810vm86 manufactured plastic 40-pin dual in-line package kr1810vm86 кр1810вм86 40-pin ceramic dual in-line package km1810vm86 км1810вм86 commercial version m1810vm86 м1810вм86 military version clone related intel 8088 8-bit bus manufactured k1810vm88 also plastic ceramic packages k1810vm86 manufactured n-mos process family consists following chips brevity table lists chip variants plastic dip prefix кр listed separately variants ceramic dip prefix км commercial version prefix м military version additionally many devices k580 series could used k1810 series well unlike earlier kr580vm80a popular soviet union little used elsewhere k1810vm86 widely used throughout eastern bloc due one first 16-bit microprocessors available among one x86 instruction set allowing run ms-dos examples personal computers built based k1810vm86 8-bit bus variant k1810vm88 cmos versions equivalent intel 80c86 named kr1834vm86 кр1834вм86 developed kiev 1989 1990 manufactured minsk kr1835vm86 кр1835вм86 original kr1810vm86 still shown price list 2 february 2018 kvazar plant kiev together various support chips k580 k1810 series newer cmos versions appear longer production clone intel 80c286 manufactured name kr1847vm286 кр1847вм286 apparently see widespread use processors x86 instruction set designed soviet union much later 1875vd1t 1875вд1т equivalent intel 80c186 1875vd2t 1875вд2т equivalent intel 80386extb
[ 11169, 1058, 6659, 5348, 2503, 6957, 9166, 1776, 1425, 7538, 499, 6453, 6806, 2874 ]
Validation
9,862
4
Marc_Maiffret:marc maiffret marc maiffret chief technology officer beyondtrust security compliance management company maiffret joined beyondtrust way acquisition eeye digital security co-founded 1998 along firas bushnaq maiffret created one first vulnerability management web application firewall products date deployed worldwide numerous product awards maiffret credited discovering first major vulnerability discoveries microsoft software leads beyondtrust ’ advanced research labs responsible identifying new trends enterprise security benefit beyondtrust product roadmap maiffret left eeye three-year period served chief security architect fireeye returned eeye july 2010 brief time away eeye maiffret also founded invenio security eventually merged veteran consulting firm digitrust group digitrust maiffret managed company professional services division including network security consulting managed security services maiffret also responsible helping expand firm ’ internal research development efforts maiffret known running eeye top security research team nearly 10 years present well discovering critical microsoft security vulnerabilities code red maiffret accepted three invitations testify united states congress matters national cybersecurity critical security threats posed public private infrastructures named one people magazine magazine ’ 30 people 30 featured cover stories details los angeles times entrepreneur magazine usa today addition numerous television appearances maiffret featured mtv ’ true life 'm hacker october 1999 marc guest speaker episode 91 security leo laporte steve gibson influential industry marc spoken variety conferences including issa los angeles infosec 2011 featured several publications including cnn fox news security week sc magazine pc world computer world marc 'chameleon hacking group 'rhino9 marc also known 'sn1per hacking group no|d august 22 2013 yahoo news reported maiffret prompting hackers support raising 10,000 reward khalil shreateh august 20 maiffret stated already raised 9,000 efforts including 2,000 contributed hackers alike denounced facebook actions maiffret said sitting palestine research five-year-old laptop looks like half broken something might help big way
[ 11051, 3852, 11320, 5563, 4956 ]
Test
9,863
3
Qualcomm:qualcomm qualcomm incorporated american multinational semiconductor telecommunications equipment company designs markets wireless telecommunications products services derives revenue chipmaking bulk profit patent licensing businesses company headquarter located san diego california united states 224 worldwide locations parent company qualcomm incorporated qualcomm number wholly owned subsidiaries qualcomm cdma technologies qct sells qualcomm ’ products services including chipsets qualcomm technology licensing qtl responsible patent licensing business qualcomm technologies inc. qti operates nearly qualcomm r activities qualcomm created july 1 1985 seven former linkabit employees led dr. irwin jacobs company named qualcomm “ quality communications. ” started contract research development center largely government defense projects qualcomm merged omninet 1988 raised 3.5 million funding order produce omnitracs satellite communications system trucking companies qualcomm grew eight employees 1986 620 employees 1991 due demand omnitracs 1989 qualcomm 32 million revenues 50 percent omnitracs contract schneider national omnitracs profits helped fund qualcomm research development code-division multiple access cdma technologies cell phone networks qualcomm operating loss 1990s due investment cdma research obtain funding company filed initial public offering september 1991 raising 68 million additional 486 million raised 1995 sale 11.5 million shares second funding round done raise money mass manufacturing cdma-based phones base-stations equipment us-based cellular networks announced would adopt cdma standard company 383 million annual revenue 1995 814 million 1996 1991 qualcomm acquired eudora email client software pc could used omnitracs system acquisition associated widely used email client company little-known time 1998 qualcomm restructured leading 700-employee layoff cell-phone manufacturing business also spun-off order focus higher-margin patents business following year qualcomm fastest growing stock market 2,621 percent growth one year 2000 qualcomm grown 6,300 employees 3.2 billion revenues 670 million profit 39 percent sales cdma technology followed licensing 22 wireless 22 products 17 around time qualcomm established offices europe asia pacific latin america 2001 65 percent qualcomm revenues originated outside united states 35 percent coming south korea 2005 paul e. jacobs son qualcomm founder dr. irwin jacobs appointed qualcomm new ceo whereas irwin jacobs focused cdma patents paul jacobs refocused much qualcomm new research development projects related internet things qualcomm announced steven mollenkopf would succeed paul jacobs ceo december 2013 mollenkopf said would expand qualcomm focus wireless technology cars wearable devices new markets european commission fined qualcomm €997 million abuse dominant market position january 24 2018 march 16 2018 qualcomm removed executive chairman paul jacobs broached long-shot bid buyout earlier week 2018 qualcomm filed lawsuit intel several meet-and-confers exchanges written correspondence may 18 intel appeared willing cooperate offering 'limited supplemental production technical materials relating relevant components designed 2018 iphone models exchange qualcomm agreement limited production would satisfy certain requests document subpoena us federal court filing states court us march 15 2019 ruled apple must indemnify qualcomm infringing three patents related mobile technologies jury ruled apple pay 31 million chip maker 1.41 per iphone used company ’ technology without authorization fiscal year 2018 qualcomm reported loss us 4.86 billion annual revenue us 22.7 billion increase 2 previous fiscal cycle qualcomm shares traded 51 75 per share market capitalization end fiscal 2018 valued us 105 billion company ranked 133rd fortune 500 list largest united states corporations revenue qualcomm pioneered commercialization cdmaone is-95 standard wireless cellular communications following cdma2000 early standard third-generation 3g mobile today company leading patent holder advanced 3g mobile technologies including cdma2000 1xev-do evolutions wcdma higher-speed variant known hspa evolutions td-scdma well patents 4g license streams patents inventions related products major component qualcomm business june 2011 qualcomm announced would release set application programming interfaces geared give web-based applications deeper links hardware beginning 1991 qualcomm participated development globalstar satellite system along loral space communications uses low earth orbit leo satellite constellation consisting 44 active satellites system used voice telephony via hand-held satellite phones asset tracking data transfer using mobile satellite modems system designed normal is-95 system used satellite bent pipe repeater transfer cellular signals handset terrestrial base station unlike iridium system routes phone calls satellites globalstar satellite must always able see handset base station establish connection therefore coverage earth poles satellite orbits also coverage locations large globalstar base stations view locations south atlantic example globalstar hardware manufactured qualcomm like satellite phone networks globalstar went bankrupt 1999 bought group investors currently running system january 2017 apple announced 1 billion lawsuit qualcomm overcharging chips failing pay 1 billion rebates qualcomm however rejected accusations calling claims baseless week apple lawsuit qualcomm shares dropped federal trade commission accused company demanding excessive royalties technologies essential industry standards qualcomm sued group shareholders wake aforementioned ftc ruling apple lawsuit january 4 2019 ftc trial began judge lucy koh united states district court northern district california january 24 2018 european commission announced €997 million fine 1.2 billion 4.9 2017 turnover qualcomm violating antitrust laws means deals apple january 14 2019 apple coo jeff williams said apple wanted use qualcomm modems iphone xs xr qualcomm refused sell apple sued licensing practices leading apple using intel modems instead april 16 2019 opening arguments begun suit two companies settled apple pay unspecified amount enter six-year patent licensing agreement multi-year agreement qualcomm provide hardware company intel concurrently announced would longer develop 5g modems mobile devices later announced july 2019 would sell majority smartphone modem business apple 1 billion april 2006 dispute reliance communications qualcomm royalty fees cost qualcomm approximately 11.7b market capitalization july 2007 reliance qualcomm decided settle matter agreed expand use cdma technology india june 2007 u.s. international trade commission blocked import new cell phone models based particular qualcomm microchips found qualcomm microchips infringe patents owned broadcom broadcom also initiated patent litigation u.s. courts issue issue software designed extend battery life chips users make out-of-network calls october itc administrative judge made initial ruling qualcomm violated broadcom patent covering feature commission later affirmed decision sprint nextel corp. using software patch qualcomm get around u.s. government agency ban new phones qualcomm chips august 2007 judge rudi brewster held qualcomm engaged litigation misconduct withholding relevant documents lawsuit brought broadcom qualcomm employees lied involvement july 2009 south korea antitrust watchdog fined qualcomm record won260bn 207m unfair business practices related chipset sales sparking strong protests company fair trade commission accused qualcomm abusing dominant position korean market cdma mobile phone chips charging higher royalties handset makers bought modem chips competitors offering rebates customers bought products mainly us group regulator said statement 2009 qualcomm broadcom entered settlement multi-year patent agreement ending litigation companies 2012 federal probe launched company ’ compliance foreign corrupt practices act bars companies well individuals bribing foreign officials gain business 2014 china anti-monopoly regulator announced qualcomm suspected overcharging abusing market position february 2015 china moved fine qualcomm record 975 million tactics government claimed hurt consumers july 16 2015 european commission announced opened two antitrust investigations qualcomm behavior field baseband chipsets consumer devices july 2016 group women filed class-action gender discrimination lawsuit qualcomm alleging firm discriminated women science technology engineering mathematics areas class 3,400 employees suit settled august 2017 firm agreed pay 19.5 million plaintiff law firm said company also institute significant changes policies practices help eliminate gender disparities foster equal employment opportunity going forward march 2017 south korea found qualcomm prevented samsung selling chips phone makers current umts air interfaces part based qualcomm patents royalties patents represent significant part qualcomm revenue followed series patent-related lawsuits antitrust complaints spearheaded broadcom us 2006 broadcom started series patent-related lawsuits antitrust complaints qualcomm get broadcom regarded fair terms access w-cdma technologies broadcom soon joined nokia others complaints also filed european commission 2007 european commission launched inquiry qualcomm possible abusing dominant position market third-generation phones complaints first lodged 2005 leading handset manufacturers ericsson nokia nec panasonic texas instruments october 2008 nokia announced make one-time payment 2.29 billion us qualcomm part patent agreement company chinese tdscdma 3g technology developed primarily avoid qualcomm licensing fees although qualcomm claims chinese technology still infringes many qualcomm patents qchat push-to-talk ptt technology qchat software application developed qualcomm internet services qis division qualcomm part qualcomm wireless internet group qis offers set software products content enablement services support accelerate growth wireless data market qualcomm developed qchat provide reliable method instant connection two-way communication users different locations operating within type network architecture prior existence cellular personal communications services networks type communication limited private land mobile radio system lmr technology used public safety utility service agencies lmr limitations specifically usage restricted geographic coverage area use disparate frequency bands qchat application developed brew platform ptt communication technology 3g networks qchat handsets server software allow users connect instantaneously qchat users anywhere world push button addition qchat enables one-to-one private one-to-many group calls 3g networks qchat uses standard voice internet protocol voip technologies voip voice delivery mechanism uses internet protocol manage delivery voice information voice information sent digital form ip-based data networks including cdma discrete packets rather traditional circuit-switched protocols used public switched telephone network pstn qchat users 3g wireless devices connect worldwide either private group calls push button qchat uses voice internet protocol voip technologies allow subscribers communicate using ptt button handset instead making standard cellular call qchat calls created combining separate point-to-point connections ip endpoint process managed qchat applications server deployed carrier ip-based wide area network wan initiate call user presses ptt button receives immediate indication whether call recipient available caller begin speaking immediately recipient unavailable caller simply hear negative response tone instead busy signal voicemail october 16 2006 sprint nextel announced agreement qualcomm use qchat provide high performance push-to-talk services customers nationwide sprint pcs network using cdma2000 1xev-do revision technology qchat able inter-operate iden push-to-talk handsets nextel national network sprint phones supporting qchat technology released starting april 2008 trial business customers kansas colorado sprint announced nextel direct connect devices powered qchat available 40 markets june 2008 ending production new qchat devices november 2009 supported models included august 2016 computer security company check point found several serious security problems qualcomm chips bug called quadrooter ability let hackers read information android phones even worse hackers full access affected user installs app exploits one vulnerabilities according check point affects 900 million android users affected phones include recent android phones check point published scan tool android users blackberry developing repair tool qualcomm released fixes four issues three included android updates top google phones time publication bug
[ 10248, 8714, 1038, 1550, 11282, 9244, 7199, 5664, 7200, 6178, 9255, 3117, 8237, 1083, 10813, 10303, 5185, 3140, 2117, 11333, 9828, 1638, 6268, 638, 6783, 11391, 644, 6276, 10884, 1674, 7820, 11405, 5262, 146, 659, 11418, 8865, 4259, 8355, ...
Validation
9,864
9
Space-cadet_keyboard:space-cadet keyboard space-cadet keyboard keyboard designed john l. kulp used lisp machines massachusetts institute technology mit inspired several still-current jargon terms field computer science influenced design emacs inspired knight keyboard developed knight tv system used mit incompatible timesharing system symbolics-labeled version shown used lm-2 symbolics repackaged version mit cadr later symbolics systems used greatly simplified keyboard symbolics keyboard retained basic layout commonly used function modifier keys space-cadet keyboard space-cadet keyboard equipped seven modifier keys four keys bucky bits three shift keys called labeled top introduced earlier knight keyboard introduced keyboard group row thus allowing easy pressing several modifier keys via chording example could pressed fingers one hand pressing another key hand many keys three symbols accessible via shift keys letter symbol top greek letter front example key l two-way arrow ↔ top greek letter lambda λ front pressing key right hand playing appropriate chord left hand shift keys user could get following results might addition typed combination keys keyboard possible type 8,000 different characters allowed user type complicated mathematical text also thousands single-character commands disposal many users willing memorise command meanings many characters reduced typing time attitude shaped interface emacs compare use key vi due convenient position key adm-3a terminal users however thought many bucky bits overkill objected design grounds keyboard require three four hands operate result emacs making frequent use multiple modifiers easy space-cadet keyboard substantially harder use modern keyboards whose layout generally follows model ibm pc keyboard modifier keys grouped together thus harder press together also reason emacs uses m- prefix describing key presses m- stood space-cadet keyboard emacs ported pcs key used place keyboard included key limited application support also included four roman numeral keys allowed easy interaction lists four fewer choices
[ 10104, 8993, 1147, 10253 ]
Test
9,865
9
GNU_Common_Lisp:gnu common lisp gnu common lisp gcl gnu project ansi common lisp compiler evolutionary development kyoto common lisp produces native object code first generating c code calling c compiler gcl implementation choice several large projects including mathematical tools maxima axiom hol88 acl2 gcl runs eleven different architectures linux freebsd solaris mac os x microsoft windows gcl remains active development stable releases 2014-10-28 prerelease development followed using git revision control system
[ 10752, 2050, 11269, 2062, 9231, 9749, 8728, 4633, 4122, 3618, 8226, 2105, 6201, 6717, 8258, 8771, 10822, 5703, 1613, 9299, 3674, 3675, 7267, 8293, 3176, 2666, 2667, 8304, 5751, 7805, 2180, 6797, 9877, 4779, 5803, 2225, 8883, 7867, 4799, 7...
Test
9,866
9
Andrew_Appel:andrew appel andrew wilson appel born 1960 eugene higgins professor computer science princeton university new jersey especially well-known compiler books modern compiler implementation ml series well compiling continuations also major contributor standard ml new jersey compiler along david macqueen john h. reppy matthias blume others one authors rog-o-matic andrew appel son mathematician kenneth appel proved four-color theorem 1976 appel gained a.b summa cum laude physics princeton university 1981 ph.d. computer science carnegie-mellon university 1985 became acm fellow 1998 due research programming languages compilers 1981 appel developed better approach n-body problem linearithmic instead quadratic time july 2005 july 2006 visiting researcher institut national de recherche en informatique et en automatique inria rocquencourt france sabbatical princeton university andrew appel campaigns issues related interaction law computer technology testified penalty phase microsoft antitrust case 2002 opposed introduction computerized voting machines deemed untrustworthy 2007 received attention purchased number voting machines purpose investigating security
[ 1952, 6817, 8587, 5783, 10584, 10395, 8924 ]
Test
9,867
1
Oracle_Enterprise_Manager:oracle enterprise manager oracle enterprise manager oem em set web-based tools aimed managing software hardware produced oracle corporation well non-oracle entities oracle enterprise manager includes three releases oracle enterprise manager database control oldest arguably best-known release aims manage oracle databases originated java client able configure manage databases oracle application server also web-interface manage application server managing lots databases application servers according oracle corporation preferably grid solution one could use oracle enterprise manager grid control manage multiple instances oracle deployment platforms recent edition also allows management monitoring platforms microsoft .net microsoft sql server netapp filers bea weblogic others partners organizations build extensions oracle enterprise manager make available enterprise manager users via oracle hosted web site called oracle enterprise manager extensibility exchange system monitoring features include monitoring functionality supports detection notification impending problems monitors oracle database instances oracle real application clusters oracle application server farms clusters oem grid control comes set performance health metrics allow monitoring technology components applications application servers databases well back-end components rely hosts operating systems storage architecture oem grid control three distinct components oma runs target host collects information hardware operating system applications run target oms runs one two servers collects data generated omas oms pulls information omas aggregates collections repository oms also acts user-interface — generating web-pages database administrators view status systems services omr comprises instance oracle database stores data collected oms installers make omr highly available fault-tolerant running oracle rac instance across multiple nodes plug-ins omas customise manipulate data presented oem extending data omas collect administrators customize analysis data management packs look specific collections data display system performance release oem allows design configuration custom plug-ins monitor application desired omas collect data using custom-built plug-in transmit results xml format back oms stores analyzes data desired oracle enterprise manager continues expand monitoring scope offering management plug-ins non-oracle components oracle-developed developed partnership third-party vendors example plug-ins veritas storage foundation vmware vsphere emc clariion available key features oem grid control oracle release since 13c oracle enterprise manager performs much activity intelligent agents oracle corporation refers oracle management agents run autonomous proxy processes managed node perform execution monitoring tasks oracle enterprise manager communicating using hypertext transfer protocol http https default upon installation oma enables several packs change management performance tuning diagnostics configuration management without regard customer licensed users need de-select unlicensed packs installing agent target database oem uses default codice_1 schema oracle database super-administrator account/repository utility programs codice_2 codice_3 carry actual functions oem also provides command-line alternative emcli em command line interface verbs provide functionality ui-based em
[ 11136, 6433, 4194, 5956, 10340, 8871, 10553, 4233, 4490, 6993, 11030, 9112, 9177, 1755, 4797 ]
Test
9,868
4
Tunneling_protocol:tunneling protocol computer networks tunneling protocol communications protocol allows movement data one network another involves allowing private network communications sent across public network internet process called encapsulation tunneling involves repackaging traffic data different form perhaps encryption standard hide nature traffic run tunnel tunneling protocol works using data portion packet payload carry packets actually provide service tunneling uses layered protocol model osi tcp/ip protocol suite usually violates layering using payload carry service normally provided network typically delivery protocol operates equal higher level layered model payload protocol tunneling protocol may example allow foreign protocol run network support particular protocol running ipv6 ipv4 another important use provide services impractical unsafe offered using underlying network services providing corporate network address remote user whose physical network address part corporate network users also use tunneling sneak firewall using protocol firewall would normally block wrapped inside protocol firewall block http firewall policy specifically exclude kind wrapping trick function get around intended firewall policy set interlocked firewall policies another http-based tunneling method uses http connect method/command client issues http connect command http proxy proxy makes tcp connection particular server port relays data server port client connection creates security hole connect-capable http proxies commonly restrict access connect method proxy allows connections specific ports 443 https example network layer network layer generic routing encapsulation gre protocol running ip ip protocol number 47 often serves carry ip packets rfc 1918 private addresses internet using delivery packets public ip addresses case delivery payload protocols payload addresses incompatible delivery network also possible establish connection using data link layer layer 2 tunneling protocol l2tp allows transmission frames two nodes tunnel encrypted default relies tcp/ip protocol chosen determine level security ssh uses port 22 enable data encryption payloads transmitted public network internet connection thereby providing vpn functionality ipsec end-to-end transport mode also operate tunneling mode trusted security gateway understand particular protocol stack imposed tunneling network engineers must understand payload delivery protocol sets secure shell ssh tunnel consists encrypted tunnel created ssh protocol connection users may set ssh tunnels transfer unencrypted traffic network encrypted channel example microsoft windows machines share files using server message block smb protocol non-encrypted protocol one mount microsoft windows file-system remotely internet someone snooping connection could see transferred files mount windows file-system securely one establish ssh tunnel routes smb traffic remote fileserver encrypted channel even though smb protocol contains encryption encrypted ssh channel travels offers security ssh connection established tunnel starts ssh listening port remote local host connections forwarded specified address port originating opposing remote local previously host tunneling tcp- encapsulating payload ppp tcp-based connection ssh port forwarding known tcp-over-tcp induce dramatic loss transmission performance problem known tcp meltdown virtual private network software may instead use protocol simpler tcp tunnel connection however often problem using openssh port forwarding many use cases entail tcp-over-tcp tunneling meltdown avoided openssh client processes local client-side tcp connection order get actual payload sent sends payload directly tunnel tcp connection server side openssh server similarly unwraps payload order wrap routing final destination naturally wrapping unwrapping also occurs reverse direction bidirectional tunnel ssh tunnels provide means bypass firewalls prohibit certain internet services long site allows outgoing connections example organization may prohibit user accessing internet web pages port 80 directly without passing organization proxy filter provides organization means monitoring controlling user sees web users may wish web traffic monitored blocked organization proxy filter users connect external ssh server create ssh tunnel forward given port local machine port 80 remote web server access remote web server users would point browser local port nowiki http //localhost/ /nowiki ssh clients support dynamic port forwarding allows user create socks 4/5 proxy case users configure applications use local socks proxy server gives flexibility creating ssh tunnel single port previously described socks free user limitations connecting predefined remote port server application n't support socks proxifier used redirect application local socks proxy server proxifiers proxycap support ssh directly thus avoiding need ssh client recent versions openssh even allowed create layer 2 layer 3 tunnels ends enabled tunneling capabilities creates codice_1 layer 3 default codice_2 layer 2 virtual interfaces ends connection allows normal network management routing used used routers traffic entire subnetwork tunneled pair codice_2 virtual interfaces function like ethernet cable connecting ends connection join kernel bridges
[ 10242, 1030, 6152, 11, 8211, 6681, 6682, 10271, 6689, 9251, 3620, 2085, 7208, 3629, 7214, 8238, 562, 1586, 9269, 11321, 3133, 5181, 6719, 6723, 8265, 4687, 1618, 10341, 10344, 3695, 4723, 5749, 2679, 4729, 10873, 5251, 649, 1164, 3218, 93...
Test
9,869
6
Live_File_System:live file system live file system term microsoft uses describe packet writing method creating discs windows vista later allows files added incrementally media discs use udf file system live file system option used default autoplay formatting/erasing cd/dvd -r -rw older windows versions support reading latest udf versions users create dvd/cds windows vista using udf 2.50 may readable systems including windows xp older pre-mac os 10.5 apple systems unless third-party udf reader driver installed ensure compatibility disks created windows vista udf 2.01 lower selected
[ 9762, 6797, 2221, 6062, 7290, 5119 ]
Test
9,870
5
Phase-fired_controller:phase-fired controller phase-fired control pfc also called phase cutting phase angle control method power limiting applied ac voltages works modulating thyristor scr triac thyratron gated diode-like devices conduction predetermined phase applied waveform phase-fired control pfc often used control amount voltage current power power supply feeds load create average value output supply dc output time base importance deciding pulse supply value pulsed continuous pfc differs pulse-width modulation pwm addresses supplies output modulated waveform sinusoidal ac waveform national grid outputs becomes important supply pulse correct position modulation cycle known value achieved example controller could turn peak waveform base cycle time base taken consideration phase-fired controllers take name fact trigger pulse output certain phase input modulation cycle essence pfc controller synchronise modulation present input phase-fired controllers use thyristors solid state switching devices control elements thyristor-based controllers may utilise gate turn-off gto thyristors allowing controller decide switch output turn rather wait waveform return zero phase-fired controller like buck topology switched-mode power supply able deliver output maximum equal present input minus losses occurring control elements provided modulation cycle predictable repetitive national grid ac mains obtain output lower input phase-fired control simply switches given phase angle input modulation cycle triggering device conduction phase angle greater 0 degrees point modulation cycle starts fraction total energy within cycle present output achieve boost -like effect pfc designs must derated maximum present input higher nominal output requirements supply first turned operating nominal conditions controller continually delivering less 100 input boost required controller delivers percentage closer 100 maximum input available derating mains powered phase-fired controllers important often used control resistive loads heating elements time resistance heating elements increase account phase-fired control must able provide degree extra voltage draw heating current element way achieving purposely design supply require less 100 input modulation cycle elements first put place progressively opening supply towards delivering 100 input modulation cycle elements age common application dimmer switches domestic lighting control industrial applications previously extremely expensive heavy multi-tapped transformers used supplies elements corresponding winding tap connected element produce desired temperature limited temperature resolution number tap combinations available often find way controllers designed equipment electric ovens furnaces modern usually high power equipment transformer replaced phase-fired controllers connecting load directly mains resulting substantially cheaper lighter system however method usually limited use equipment would unrealistic without removal mains transformer means load electrical continuity input industrial ovens furnaces input often national grid ac electrically referenced ground controller output referenced ground user need contact earth one output terminals risk receiving electrical shock many high-power items equipment running three-phase 415 v high current inputs enclosure framework present earthed grounded serious risk must carefully assessed first patent phase-fired controllers derives 1912 however realization first possible 1920s mercury-arc valve rectifiers control grids became available however method voltage regulation common time limitations mercury arc valves became widespread invention solid-state thyristors end 1950s burst-fired controllers
[]
Test
9,871
9
Syntax_(programming_languages):syntax programming languages computer science syntax computer language set rules defines combinations symbols considered correctly structured document fragment language applies programming languages document represents source code markup languages document represents data syntax language defines surface form text-based computer languages based sequences characters visual programming languages based spatial layout connections symbols may textual graphical documents syntactically invalid said syntax error.when designing syntax language designer starts writing examples legal illegal strings trying figure general rules examples syntax therefore refers form contrasted semantics – meaning processing computer languages semantic processing generally comes syntactic processing however cases semantic processing necessary complete syntactic analysis done together concurrently compiler syntactic analysis comprises frontend semantic analysis comprises backend middle end phase distinguished computer language syntax generally distinguished three levels distinguishing way yields modularity allowing level described processed separately often independently first lexer turns linear sequence characters linear sequence tokens known lexical analysis lexing second parser turns linear sequence tokens hierarchical syntax tree known parsing narrowly speaking thirdly contextual analysis resolves names checks types modularity sometimes possible many real-world languages earlier step depends later step – example lexer hack c tokenization depends context even cases syntactical analysis often seen approximating ideal model parsing stage divided two parts parse tree concrete syntax tree determined grammar generally far detailed practical use abstract syntax tree ast simplifies usable form ast contextual analysis steps considered form semantic analysis adding meaning interpretation syntax alternatively informal manual implementations syntactical rules would difficult awkward describe implement formally levels generally correspond levels chomsky hierarchy words regular language specified lexical grammar type-3 grammar generally given regular expressions phrases context-free language cfl generally deterministic context-free language dcfl specified phrase structure grammar type-2 grammar generally given production rules backus–naur form bnf phrase grammars often specified much constrained grammars full context-free grammars order make easier parse lr parser parse dcfl linear time simple lalr parser even simpler parser efficient parse grammars whose production rules constrained principle contextual structure described context-sensitive grammar automatically analyzed means attribute grammars though general step done manually via name resolution rules type checking implemented via symbol table stores names types scope tools written automatically generate lexer lexical specification written regular expressions parser phrase grammar written bnf allows one use declarative programming rather need procedural functional programming notable example lex-yacc pair automatically produce concrete syntax tree parser writer must manually write code describing converted abstract syntax tree contextual analysis also generally implemented manually despite existence automatic tools parsing often implemented manually various reasons – perhaps phrase structure context-free alternative implementation improves performance error-reporting allows grammar changed easily parsers often written functional languages haskell scripting languages python perl c c++ example codice_1 syntactically valid lisp program assuming 'add function exists else name resolution fails adding 1 1 however following invalid note lexer unable identify first error – knows producing token left_paren remainder program invalid since word rule begins second error detected parsing stage parser identified list production rule due token match thus give error message general may ambiguous type errors undeclared variable errors sometimes considered syntax errors detected compile-time usually case compiling strongly-typed languages though common classify kinds error semantic errors instead example python code contains type error adds string literal integer literal type errors kind detected compile-time detected parsing phrase analysis compiler uses separate rules allow integerliteral integerliteral stringliteral integerliteral though likely compiler use parsing rule allows expressions form literaloridentifier literaloridentifier error detected contextual analysis type checking occurs cases validation done compiler errors detected runtime dynamically typed language type determined runtime many type errors detected runtime example python code syntactically valid phrase level correctness types b determined runtime variables types python values whereas disagreement whether type error detected compiler called syntax error rather static semantic error type errors detected program execution time always regarded semantic rather syntax errors syntax textual programming languages usually defined using combination regular expressions lexical structure backus–naur form grammatical structure inductively specify syntactic categories nonterminals terminal symbols syntactic categories defined rules called productions specify values belong particular syntactic category terminal symbols concrete characters strings characters example keywords define let void syntactically valid programs constructed language different equivalent grammars equivalent regular expressions lexical levels different phrase rules generate language using broader category grammars lr grammars allow shorter simpler grammars compared restricted categories grammar may require longer grammars rules different equivalent phrase grammars yield different parse trees though underlying language set valid documents simple grammar defined using notation regular expressions extended backus–naur form describes syntax s-expressions data syntax programming language lisp defines productions syntactic categories expression atom number symbol list grammar specifies following decimal digits upper- lower-case characters parentheses terminal symbols following examples well-formed token sequences grammar 'codice_2 'codice_3 'codice_4' grammar needed specify programming language classified position chomsky hierarchy phrase grammar programming languages specified using type-2 grammar i.e. context-free grammars though overall syntax context-sensitive due variable declarations nested scopes hence type-1 however exceptions languages phrase grammar type-0 turing-complete languages like perl lisp specification implementation language allows constructs execute parsing phase furthermore languages constructs allow programmer alter behavior parser combination effectively blurs distinction parsing execution makes syntax analysis undecidable problem languages meaning parsing phase may finish example perl possible execute code parsing using codice_5 statement perl function prototypes may alter syntactic interpretation possibly even syntactic validity remaining code colloquially referred perl parse perl code must executed parsing modify grammar strongly even perl parse perl undecidable similarly lisp macros introduced codice_6 syntax also execute parsing meaning lisp compiler must entire lisp run-time system present contrast c macros merely string replacements require code execution syntax language describes form valid program provide information meaning program results executing program meaning given combination symbols handled semantics either formal hard-coded reference implementation syntactically correct programs semantically correct many syntactically correct programs nonetheless ill-formed per language rules may depending language specification soundness implementation result error translation execution cases programs may exhibit undefined behavior even program well-defined within language may still meaning intended person wrote using natural language example may possible assign meaning grammatically correct sentence sentence may false following c language fragment syntactically correct performs operation semantically defined p null pointer operations p- real p- im meaning simpler example syntactically valid semantically defined uses uninitialized variable even though compilers programming languages e.g. java c would detect uninitialized variable errors kind regarded semantic errors rather syntax errors quickly compare syntax various programming languages take look list hello world program examples
[ 5635, 3462, 8582, 6536, 1931, 2316, 1552, 10387, 3221, 6933, 5399, 1277, 1435, 7580, 8221, 1952, 5537, 1956, 805, 3876, 4516, 5415, 4777, 428, 5677, 1203, 9780, 7479, 10560, 963, 6596, 7237, 7876, 8262, 8773, 5449, 5833, 9290, 10435, 1056...
Train
9,872
2
Gamin:gamin gamin monitoring system files directories independently implements subset fam file alteration monitor running service allows detection modifications file directory gam_server functions daemon gamin word gamin french also female form gamine refers boy gamin project built earlier project called marmot french means child brat linux gamin uses inotify dnotify monitor filesystem activity freebsd gamin uses kqueue/kevent native freebsd kernel event notification mechanism case kqueue one major drawback compared inotify inotify filename-based monitoring facility kqueue uses file descriptors identification monitored files freebsd gam_server open file monitored directory issue monitoring directories many files stored system could easily reach kernel limits maximum file descriptor count kern.maxfiles kern.maxfilesperproc
[ 2432, 11394, 2955, 6413, 10255, 8848, 3859, 7450, 6813, 1822, 11293, 6691, 6694, 8621, 7983, 9908, 823, 708, 3015, 4177, 2021, 4459, 5492, 2044 ]
Validation
9,873
2
Knopperdisk:knopperdisk knopperdisk operating system specifically designed usb pen drive floppy disks knopperdisk fairly minimal text system used rescue disk although usb pen drive version software packages installed used different purposes despite similarity name knoppix based gentoo linux
[ 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920, 8177, 9074,...
Test
9,874
2
Windows_Imaging_Format:windows imaging format windows imaging format wim file-based disk image format developed microsoft help deploy windows vista subsequent versions windows operating system family well windows fundamentals legacy pcs like disk image formats wim file contains set files associated filesystem metadata however unlike sector-based formats iso vhd wim file-based fundamental unit information wim file primary advantages file-based hardware independence single-instance storage file referenced multiple times filesystem tree since files stored inside single wim file overhead opening closing many individual files reduced cost reading writing many thousands individual files local disk negated hardware software-based disk caching well sequential reading writing data wim files contain multiple disk images referenced either numerical index unique name due use single-instance storage successive disk image common previous images added wim file less new data added wim also split spanned multiple parts .swm extension wim images made bootable windows boot loader supports booting windows within wim file windows setup dvd windows vista later use wim files case boot.wim contains bootable version windows pe installation performed setup files held install.wim imagex command-line tool used create edit deploy windows disk images windows imaging format distributed part free windows automated installation kit waik starting windows vista windows setup uses waik api install windows first distributed prototype imagex build 6.0.4007.0 main.030212-2037 allowed microsoft oem partners experiment imaging technology developed parallel longhorn alpha prototypes first introduced milestone 4 longhorn project used later builds longhorn build 6.0.5384.4 added significant advantages previous versions like read-only read/write folder mounting capabilities splitting multiple image files swm wim filter driver latest lzx compression algorithms used since pre-rc release candidates windows vista deployment image service management tool dism tool introduced windows 7 windows server 2008 r2 perform servicing tasks windows installation image online image i.e one user running offline image within folder wim file features include mounting unmounting images querying installed device drivers offline image adding device driver offline image possible repair dism image using either windows installation cd windows update windows server 2012 windows 8 dism incorporated majority imagex functions imagex still needed image capture however dism deprecated imagex windows 8 since april 30 2012 open source library handling wim format available library used unix-like systems well windows thanks project gnu/linux distributions imagex clone called wimlib-imagex allows mounting wim images managing read/write like file system wim images basically using lzx compression algorithm accessed using file archivers like 7-zip operating systems might support format still possible convert .wim images commonly used iso image using windows assessment deployment kit windows
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 11301, 1577, 3114, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 7254, 10839, 603, 9819, 3170, 10857, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, ...
Validation
9,875
9
Multiple_dispatch:multiple dispatch multiple dispatch multimethods feature programming languages function method dynamically dispatched based run time dynamic type general case attribute one arguments generalization single dispatch polymorphism function method call dynamically dispatched based derived type object method called multiple dispatch routes dynamic dispatch implementing function method using combined characteristics one arguments developers computer software typically organize source code named blocks variously called subroutines procedures subprograms functions methods code function executed calling – executing piece code references name transfers control temporarily called function function execution completed control typically transferred back instruction caller follows reference function names usually selected descriptive function purpose sometimes desirable give several functions name often perform conceptually similar tasks operate different types input data cases name reference function call site sufficient identifying block code executed instead number type arguments function call also used select among several function implementations conventional i.e. single-dispatch object-oriented programming languages invoking method sending message smalltalk calling member function c++ one arguments treated specially used determine potentially many methods name applied many languages special argument indicated syntactically example number programming languages put special argument dot making method call codice_1 codice_2 would produce roar whereas codice_3 would produce cheep contrast languages multiple dispatch selected method simply one whose arguments match number type function call special argument owns function/method carried particular call common lisp object system clos early well-known example multiple dispatch working languages discriminate data types compile time selecting among alternatives occur act creating alternative functions compile time selection usually referred overloading function programming languages defer data type identification run time i.e. late binding selection among alternative functions must occur based dynamically determined types function arguments functions alternative implementations selected manner referred generally multimethods run time cost associated dynamically dispatching function calls languages distinction overloading multimethods blurred compiler determining whether compile time selection applied given function call whether slower run time dispatch needed estimate often multiple dispatch used practice muschevici et al studied programs use dynamic dispatch analyzed nine applications mostly compilers written six different languages common lisp object system dylan cecil multijava diesel nice results show 13–32 generic functions use dynamic type one argument 2.7–6.5 use dynamic type multiple arguments remaining 65–93 generic functions one concrete method overrider thus considered use dynamic types arguments study reports 2–20 generic functions two 3–6 three concrete function implementations numbers decrease rapidly functions concrete overriders multiple dispatch used much heavily julia multiple dispatch central design concept origin language collecting statistics muschevici average number methods per generic function found julia standard library uses double amount overloading languages analyzed muschevici 10 times case binary operators data papers summarized following table dispatch ratio codice_4 average number methods per generic function choice ratio codice_5 mean square number methods better measure frequency functions large number methods degree specialization dos average number type-specialized arguments per method i.e. number arguments dispatched theory multiple dispatching languages first developed castagna et al. defining model overloaded functions late binding yielded first formalization problem covariance contravariance object-oriented languages solution problem binary methods distinguishing multiple single dispatch may made clearer example imagine game among user-visible objects spaceships asteroids two objects collide program may need different things according hit language multiple dispatch common lisp might look like common lisp example shown similarly methods explicit testing dynamic casting used presence multiple dispatch traditional idea methods defined classes contained objects becomes less appealing—each collide-with method attached two different classes one hence special syntax method invocation generally disappears method invocation looks exactly like ordinary function invocation methods grouped classes generic functions julia built-in multiple dispatch central language design julia version example might look like collide_with x :asteroid :asteroid ... deal asteroid hitting asteroid collide_with x :asteroid :spaceship ... deal asteroid hitting spaceship collide_with x :spaceship :asteroid ... deal spaceship hitting asteroid collide_with x :spaceship :spaceship ... deal spaceship hitting spaceship perl 6 like past versions uses proven ideas languages type systems shown offer compelling advantages compiler-side code analysis powerful user-side semantics via multiple dispatch multimethods multisubs since operators subroutines also multiple dispatched operators along usual type constraints also constraints allow making specialized subroutines subset mass real 0 ^..^ inf role stellar-object class asteroid stellar-object class spaceship stellar-object str destroyed obliterated destroyed mangled str damaged « damaged 'collided 'was damaged » multi sub infix « » stellar-object stellar-object b a.mass b.mass proto sub collide stellar-object stellar-object multi sub collide b b multi sub collide b b multi sub collide b multi sub collide spaceship spaceship b == b multi sub collide asteroid mass asteroid mass b spaceship enterprise .= new mass 1 :name 'the enterprise collide asteroid.new mass .1 enterprise collide enterprise spaceship.new mass .1 collide enterprise asteroid.new mass 1 collide enterprise spaceship.new mass 1 collide asteroid.new mass 10 asteroid.new mass 5 languages support multiple dispatch language definition syntactic level python often possible add multiple dispatch using library extension example module multimethods.py provides clos-style multimethods python without changing underlying syntax keywords language multimethods import dispatch game_objects import asteroid spaceship game_behaviors import asfunc ssfunc safunc collide dispatch collide.add_rule asteroid spaceship asfunc collide.add_rule spaceship spaceship ssfunc collide.add_rule spaceship asteroid safunc def aafunc b collide.add_rule asteroid asteroid aafunc collide thing1 thing2 functionally similar clos example syntax conventional python using python 2.4 decorators guido van rossum produced sample implementation multimethods simplified syntax multimethod asteroid asteroid def collide b multimethod asteroid spaceship def collide b goes define multimethod decorator peak-rules package provides multiple dispatch syntax similar example later replaced pyprotocols reg library also supports multiple predicate dispatch c dynamic dispatch must implemented manually form often enum used identify subtype object dynamic dispatch done looking value function pointer branch table simple example c typedef void *collisioncase void void collision_aa void /* handle asteroid-asteroid collision */ void collision_as void /* handle asteroid-spaceship collision */ void collision_sa void /* handle spaceship-asteroid collision */ void collision_ss void /* handle spaceship-spaceship collision*/ typedef enum thing collisioncase collisioncases num_thing_types num_thing_types void collide thing thing b int main void c object system library c support dynamic dispatch similar clos fully extensible need manual handling methods dynamic message methods dispatched dispatcher cos faster objective-c example cos // classes defclass asteroid // data members endclass defclass spaceship // data members endclass // generics defgeneric _bool collide_with _1 _2 // multimethods defmethod _bool collide_with asteroid asteroid endmethod defmethod _bool collide_with asteroid spaceship endmethod defmethod _bool collide_with spaceship asteroid endmethod defmethod _bool collide_with spaceship spaceship endmethod // example use int main void c++ natively supports single dispatch though adding multi-dispatch considered methods working around limit analogous use either visitor pattern dynamic cast library pointer-to-method lookup table class thing class asteroid public thing class spaceship public thing thing :collisionhandlermap thing :collisioncases const std :uint32_t asteroid :cid typeid asteroid .hash_code const std :uint32_t spaceship :cid typeid spaceship .hash_code void asteroid :initcases void spaceship :initcases int main yomm2 library provides fast orthogonal implementation open multimethods syntax declaring open methods inspired proposal native c++ implementation library requires user registers classes used virtual arguments sub-classes require modifications existing code methods implemented ordinary inline c++ functions overloaded passed pointer limit number virtual arguments arbitrarily mixed non-virtual arguments library uses combination techniques compressed dispatch tables perfect integer hash implement method calls constant time mitigating memory usage dispatching call open method single virtual argument takes 15-30 time calling ordinary virtual member function modern optimizing compiler used asteroids example implemented follows using yorel :yomm2 :virtual_ class thing class asteroid public thing class spaceship public thing register_class thing register_class spaceship thing register_class asteroid thing declare_method void collidewith virtual_ thing virtual_ thing define_method void collidewith thing left thing right define_method void collidewith asteroid left asteroid right define_method void collidewith asteroid left spaceship right define_method void collidewith spaceship left asteroid right define_method void collidewith spaceship left spaceship right int main stroustrup mentions design evolution c++ liked concept multimethods considered implementing c++ claims unable find efficient sample implementation comparable virtual functions resolve possible type ambiguity problems states although feature would still nice approximately implemented using double dispatch type based lookup table outlined c/c++ example low priority feature future language revisions many object-oriented programming languages natively supports single dispatch however possible emulate open multimethods library function d. openmethods library example // declaration matrix plus virtual matrix virtual matrix // override two densematrix objects method matrix _plus densematrix densematrix b // override two diagonalmatrix objects method matrix _plus diagonalmatrix diagonalmatrix b language single dispatch java multiple dispatch emulated multiple levels single dispatch interface collideable class asteroid implements collideable class spaceship implements collideable run time codice_6 checks one levels also used also multi-parameter type classes haskell scala used emulate multiple dispatch
[ 8582, 2062, 9877, 9245, 10013, 10145, 11555, 3876, 5031, 11688, 5165, 5677, 10670, 11574, 6969, 6074, 10555, 6718, 10819, 8262, 5833, 11219, 2392, 10841, 11610, 2011, 11227, 11488, 11361, 10083, 6502, 10729, 2666, 3051, 7148, 8554, 10347, 107...
Test
9,876
7
Open_Grid_Services_Infrastructure:open grid services infrastructure open grid services infrastructure ogsi published global grid forum ggf proposed recommendation june 2003 intended provide infrastructure layer open grid services architecture ogsa ogsi takes statelessness issues along others account essentially extending web services accommodate grid computing resources transient stateful web services groups started integrate approaches capturing state web services resource framework wsrf release gt4 open source tool kit migrating back pure web services implementation rather ogsi via integration wsrf ogsi former set extensions web services provide stateful interactions -- would say point obsolete jay unger said model used globus toolkit 3.0 replaced wsrf ws-security broader set web services standards ogsa focuses specific service definition areas execution components execution modeling grid data components information virtualization still important role play evolution standards open source tool kits like globus
[ 11353, 5956, 158, 7935 ]
Test
9,877
9
Common_Lisp_Object_System:common lisp object system common lisp object system clos facility object-oriented programming part ansi common lisp clos powerful dynamic object system differs radically oop facilities found static languages c++ java clos inspired earlier lisp object systems mit flavors commonloops although general either originally proposed add-on clos adopted part ansi standard common lisp adapted lisp dialects eulisp emacs lisp basic building blocks clos classes methods instances classes generic functions clos provides macros define codice_1 codice_2 codice_3 instances created function codice_4 classes multiple superclasses list slots member variables c++/java parlance special metaclass slots allocated class instances class share slot instance slot name value slot accessed name using function codice_5 additionally special generic functions defined write read values slots slot clos class must unique name clos multiple dispatch system means methods specialized upon required arguments oo languages single-dispatch meaning methods specialized first argument another unusual feature methods belong classes classes provide namespace generic functions methods methods defined separately classes special access e.g self protected class slots methods clos grouped generic functions generic function object callable like function associates collection methods shared name argument structure specialized different arguments since common lisp provides non-clos classes structures built-in data types numbers strings characters symbols ... clos dispatch works also non-clos classes clos also supports dispatch individual objects eql specializers clos default support dispatch common lisp data types example dispatch work fully specialized array types types introduced codice_6 however common lisp implementations provide metaobject protocol allows generic functions provide application specific specialization dispatch rules dispatch clos also different oo languages dispatch mechanism works runtime adding removing methods thus may lead changed effective methods even generic function called arguments runtime changing method combination also may lead different effective methods example like oo systems dynamic languages clos enforce encapsulation slot accessed using codice_5 function via optionally auto-generated accessor methods access via codice_5 know name slot cl programmers use language package facility declare functions data structures intended export apart normal primary methods also codice_9 codice_10 codice_11 auxiliary methods former two invoked prior primary method particular order based class hierarchy codice_11 method control whether primary method executed additionally programmer specify whether possible primary methods along class hierarchy called one providing closest match standard method-combination provides primary around methods explained method-combinations method types new simple complex method-combinations method types defined clos allows multiple inheritance default order methods executed multiple inheritance correct programmer may resolve diamond inheritance problems specifying order method combinations clos dynamic meaning contents also structure objects modified runtime clos supports changing class definitions on-the-fly even instances class question already exist well changing class membership given instance codice_13 operator clos also allows one add redefine remove methods runtime circle-ellipse problem readily solved clos oop design patterns either disappear qualitatively simpler clos prototype language classes must defined objects instantiated members class outside ansi common lisp standard widely implemented extension clos called metaobject protocol mop mop defines standard interface underpinnings clos implementation treating classes slot-descriptions generic-functions methods instances metaclasses allows definition new metaclasses modification clos behavior flexibility clos mop prefigures aspect-oriented programming later developed engineers gregor kiczales mop defines behavior whole object system set protocols defined terms clos thus possible create new object-systems extending changing provided clos functionality book art metaobject protocol describes use implementation clos mop various common lisp implementations slightly different support meta-object protocol closer project aims provide missing features flavors successor new flavors object system mit lisp machine large parts lisp machine operating systems many applications use flavors new flavors flavors introduced multiple inheritance mixins among features flavors mostly obsolete though implementations common lisp exist flavors using message passing paradigm new flavors introduced generic functions commonloops successor loops xerox interlisp-d commonloops implemented common lisp portable implementation called portable commonloops pcl first implementation clos pcl widely ported still provides base clos implementation several common lisp implementations pcl implemented mostly portable common lisp system dependent parts power expressivity clos well historical availability tinyclos simplified portable clos implementation written gregor kiczales use scheme clos-like mop-based object systems become de facto norm lisp dialect implementations well finding way languages oop facilities
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 5677, 3119, 1591, 2105, 6201, 3132, 6717, 6718, 8258, 8771, 10819, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 3176, 2666, 2667, 10347, 5751, 7805, 2691, 1159, 9865, ...
Test
9,878
8
Win–loss_analytics:win–loss analytics win–loss analytics involves identifying analyzing reasons visitor website n't persuaded engage desired action conversion information allows web teams improve website navigation content identify individuals likely convert improve marketing efforts determining one person engaged desired action another long topic interest sales measurement conversion always possible sales data contrast marketing mostly concerned targeting masses results marketing traditionally difficult accurately measure internet much easier marketers collect data analysis evaluation order understand demonstrate effectiveness ineffectiveness efforts make changes improve thus yielding best result specific marketing campaign win-loss analytics web analytics tools existed since early days internet ubiquitous tools provide bird eye view website traffic information gathered allows webmasters make informed decisions making changes order improve website win–loss analytics tools track individual perspectives visitor uncovering visitor products qualified well persuaded n't convert win loss programs typically focus different elements buying process including gathering buyer feedback solution sold whether product service buyer perception effectiveness sales representative sales team buyer perceptions selling vendor overall firm reputation long-term financial viability price categories broken greater detail refined feedback example questions product service might include intuitiveness user interface effectiveness specific features functionality
[ 3688, 6576 ]
Validation
9,879
0
EXtended_WordNet:extended wordnet extended wordnet project university texas dallas funded national science foundation aims improve wordnet semantically parsing glosses thus making information contained definitions available automatic knowledge processing systems freely available bsd style license although updated since november 2004 recent version based wordnet 2.0 still remains useful resource database available set four xml files one verbs adverbs nouns adjectives following information extracted glosses example following information available synset excellent first-class fantabulous gloss word sense disambiguation parse tree logic form gloss first tagged using brill tagger glosses parsed using charniak parser in-house collins style parser parsed gloss assigned level quality page currently available
[ 416, 1072, 9288, 479 ]
Test
9,880
6
The_Unarchiver:unarchiver unarchiver proprietary freeware data decompression utility supports formats archive utility formerly known bomarchivehelper built-in archive unpacker program macos also handle filenames various character encodings created using operating system versions use character encodings latest version requires mac os x lion higher unarchiver compress files corresponding command line utilities codice_1 codice_2 run microsoft windows linux macos
[ 6022, 10121, 1420, 6797, 1940, 3222, 3114, 10027, 7983, 823, 6713, 576, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 11614, 1631, 3296, 9953, 5858, 6759, 7529, 4459, 237, 1646, 8304, 7667, 6389, 4089, 894, 10623 ]
None
9,881
9
GFA_BASIC:gfa basic gfa basic dialect basic programming language frank ostrowski name derived company gfa systemtechnik gmbh distributed software mid-1980s 1990s enjoyed popularity advanced basic dialect mostly superseded several programming languages official support ended early 2000s gfa basic developed frank ostrowski gfa systemtechnik gmbh later gfa software german company kiel düsseldorf gfa acronym gesellschaft für automatisierung company automation gave name software first gfa basic version released 1986 mid late 1980s became popular atari st home computer range since atari st basic shipped primitive later ports commodore amiga dos windows marketed version 2.0 popular release gfa basic offered many advanced features compared alternatives gfa basic 3.0 included improvements like support user-defined structures agglomerated data types final released version 3.6 around 2002 gfa software ceased gfa basic activities shut mailinglist website 2005 due missing official support availability gfa basic user community took support installed communication infrastructure version 2.0 popular release gfa basic modern programming language time line numbers used one line equivalent one command greatly simplify maintenance long listings ide even allowed code folding reasonable range structured programming commands — procedures local variables parameter passing value reference loop constructs etc modularization rudimentary making gfa basic 2.0 best suited small medium-sized projects gfa basic interpreter compact reasonably fast shipped runtime could distributed freely one programs compiler made available execution speed could increased approximately factor 2 gfa basic allowed extreme optimisations execution speed supporting direct assembler-level calls even ability embed sections assembler code directly within basic source code gfa basic integrated neatly gem tos atari st operating system providing menus dialog boxes mouse control see wimp interface although source code usually stored tokenized version save room disk pieces code could also saved ascii form made possible set reusable libraries tokenized source files benefit ways — instance gfa basic allowed users include binary data basic code via inline statement could even integrated gfa assembler allow users develop machine code programs inside inline statements order accelerate particular areas program also meant basic interpreter later compiler n't need tokenise program loaded would significant load-time overhead larger gfa basic programs written editions gfa manual printed black ink red paper attempt thwart photocopying bootlegging effectiveness tactic questionable manual returned usual black-on-white format complaints colour blind users proliferation re-typed copies internet gfa basic microsoft windows included thorough implementation windows api calls although product number technical advantages popular products combination easy language robust architecture fast compiled reliable code n't achieve great success windows market software professionals wanted high-performance code tended stay technical languages regard basics inferior professionals n't problem basic number well-established software tool vendors microsoft borland actively promoting new visual programming systems visual basic allowed users create windows dialog boxes populated standard components text buttons frame outlines help drag-and-drop interface object-oriented editing one advantages gfa basic windows compiler sold separately could create stand-alone .exe files also included relatively easy option creating dynamic link library .dll files windows allowed user write test routines within gfa basic export functions windows .dll file access pre-compiled functions within tools programs visual basic 3.0 unable produce compiled code feature allowed gfa basic used number-crunching add-on product visual basic writing high-speed routines applications database sorting media signal processing would impractical then-current version visual basic gfa basic company recognition product recognition factors companies microsoft borland united states market simple text-based code creation system lacked exciting new visual user interfaces better-known competitors although gfa basic windows developed include support visual basic components use gfa technical visual basic without large marketing budget clear reason journalists write gfa basic windows remained comparatively obscure product éric chahi wrote game editor gfa basic create game another world including scene design game scripting game engine polygon rendering music done assembler editor used make ports game including consoles collector edition windows released 2006 dashboard sustainability coded mostly gfa basic source 500kb plus 100kb assembly mainly accessing 32-bit windows functions
[ 5635, 3718, 7691, 1805, 6797, 9997, 786, 11412, 22, 3736, 3481, 797, 3233, 11683, 5925, 8101, 4136, 7849, 10666, 8494, 303, 7343, 7983, 11315, 315, 7355, 7486, 7870, 4160, 4674, 963, 8262, 10750, 712, 9166, 847, 1879, 92, 11229, 2915, 9...
Test
9,882
2
Device_mapper:device mapper device mapper framework provided linux kernel mapping physical block devices onto higher-level virtual block devices forms foundation logical volume manager lvm software raids dm-crypt disk encryption offers additional features file system snapshots device mapper works passing data virtual block device provided device mapper another block device data also modified transition performed example case device mapper providing disk encryption simulation unreliable hardware behavior article focuses device mapper implementation linux kernel device mapper functionality also available netbsd dragonfly bsd applications like lvm2 enterprise volume management system evms need create new mapped devices talk device mapper via codice_1 shared library turn issues ioctls codice_2 device node configuration device mapper also examined configured interactivelyor shell scriptsby using utility two userspace components source code maintained alongside lvm2 source functions provided device mapper include linear striped error mappings well crypt multipath targets example two disks may concatenated one logical volume pair linear mappings one disk another example crypt target encrypts data passing specified device using linux kernel crypto api following mapping targets available following linux kernel features projects built top device mapper
[ 2051, 4616, 3082, 5139, 6675, 7187, 10776, 25, 10780, 4637, 10785, 3618, 9762, 6180, 5158, 7217, 8242, 9266, 9784, 10809, 576, 4161, 10817, 8772, 6213, 8268, 589, 593, 10333, 97, 6244, 5222, 10856, 8298, 4207, 7794, 7285, 9335, 2168, 1147...
Validation
9,883
7
Shared_disk_architecture:shared disk architecture shared disk architecture sd distributed computing architecture disks accessible cluster nodes contrasts shared nothing architecture nodes sole access distinct disks multiple processors access disks directly via intercommunication network every processor local memory shared disk two advantages shared memory firstly processor memory memory bus bottleneck secondly system offers simple way provide degree fault tolerance
[ 4817, 9782 ]
Train
9,884
4
Trusted_third_party:trusted third party cryptography trusted third party ttp entity facilitates interactions two parties trust third party third party reviews critical transaction communications parties based ease creating fraudulent digital content ttp models relying parties use trust secure interactions ttps common number commercial transactions cryptographic digital transactions well cryptographic protocols example certificate authority ca would issue digital identity certificate one two parties next example ca becomes trusted-third-party certificates issuance likewise transactions need third party recordation would also need third-party repository service kind another 'trusted means system need trusted act interests option either involuntarily act interest 'trusted also means way verify system operating interests hence need trust corollary system verified operate interests would need trust shown operate interests one would use suppose alice bob wish communicate securely – may choose use cryptography without ever met bob alice may need obtain key use encrypt messages case ttp third party may previously seen bob person otherwise willing vouch key typically identity certificate belongs person indicated certificate case bob discussions third person often called trent trent gives alice uses send secure messages bob alice trust key bob trusts trent discussions simply assumed valid reasons course issue alice bob able properly identify trent trent someone impersonating trent arrange trustable third parties type unsolved problem long motives greed politics revenge etc. perform supervise work done entity provide potential loopholes necessary trust may leak problem perhaps unsolvable one ancient notorious large impersonal corporations make promises accuracy attestations correctness claimed public-key-to-user correspondence e.g. certificate authority part public key infrastructure changes little many environments strength trust weak weakest link infrastructure trusted ca breached whole chain trust broken 2011 incident ca diginotar broke trust dutch governments pki textbook example weaknesses system effects bruce schneier pointed 2013 mass surveillance disclosures third party fact ever trusted pgp cryptosystem includes variant ttp form web trust pgp users digitally sign identity certificates instructed confident person public key belong together key signing party one way combining get-together certificate signing nonetheless doubt caution remain sensible users careless signing others certificates trusting humans organizational creations risky example financial matters bonding companies yet find way avoid losses real world outside cryptography law many places makes provision trusted third parties upon whose claims one may rely instance notary public acts trusted third party authenticating acknowledging signatures documents ttp role cryptography much least principle certificate authority partially fills notary function attesting identity key owner whether party mentally aware apparent free duress certificate authority attest date signature
[ 513, 1315, 7075, 517, 7368, 3178, 10831, 9744, 9690, 6098, 503, 8634, 8283 ]
Test
9,885
4
IObit_Malware_Fighter:iobit malware fighter iobit malware fighter introduced 2004 anti-malware anti-virus program microsoft windows operating system windows xp later designed remove protect malware including trojans rootkits ransomware iobit malware fighter freeware version run alongside user existing anti-virus solution paid edition product comes anti-virus protection version 6 released 2018 product includes bitdefender engine commercial version along anti-malware engine new features latest release include improved user interface safe box feature protect specific folders unauthorized access mbr guard protects malicious attacks goldeneye/petya cryptocurrency mining scripts 2010 first beta iobit malware fighter 1.0 released public 2013 iobit malware fighter 2 released version iobit debuted cloud security component user upload file cloud determine whether malicious 2015 version 3 released 2016 version 4 added bitdefender anti-virus engine commercial edition 2017 version 5 released among new features anti-ransomware component version 6 released may 2018
[ 10756, 2213, 106, 6797, 7983, 1970, 10166, 7515, 9791 ]
Test