node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
9,886
4
Warshipping:warshipping warshipping using physical package delivery service deliver attack vector target concept first described 2008 def con hacking convention robert graham david maynor part talk entitled “ bringing sexy back breaking style ” included various penetration testing methods implementation iphone box modified include larger battery powered jailbroken iphone first-generation iphone chosen attack based reported run-time 5 days coupled external battery whereas newer 3g iphones era would reportedly run 1½ days social engineering security pretext described would trick recipient believing iphone order explain shipment advancement low-power electronics thanks part maker culture greatly increased effectiveness methodology credible method attacking networks 2019 ibm x-force red coined name “ warshipping ” described attack platform included several low-cost components could combined shipped targets controlled remotely 2-3 weeks solar component also described allow devices run indefinitely aspects modern warshipping attack include following increasing use large online retailers contributes relevancy attack 2019 united states postal service reports deliver 484.8 million mailpieces per day name analogy wardriving wardialling
[ 3323, 9732, 7222 ]
None
9,887
2
Process_management_(computing):process management computing process management integral part modern-day operating system os os must allocate resources processes enable processes share exchange information protect resources process processes enable synchronization among processes meet requirements os must maintain data structure process describes state resource ownership process enables os exert control process modern operating system one instance program loaded memory time example one user could executing program user separate copies program loaded memory programs possible one copy loaded memory several users shared access execute program-code program said re-entrant processor instant executing one instruction one program several processes sustained period time assigning process processor intervals remainder become temporarily inactive number processes executed period time instead time called concurrent execution multiprogramming multitasking os system executing many processes concurrently multiprogramming requires processor allocated process period time de-allocated appropriate moment processor de-allocated execution process must done way restarted later easily possible two possible ways os regain control processor program ’ execution order os perform de-allocation allocation stopping one process starting restarting another process called context switch context change many modern operating systems processes consist many sub-processes introduces concept thread thread may viewed sub-process separate independent sequence execution within code one process threads becoming increasingly important design distributed client–server systems software run multi-processor systems common trait observed among processes associated computer programs alternate cpu cycles i/o cycles portion time required cpu cycles process executed i.e occupying cpu time required i/o cycles process using processor instead either waiting perform input/output actually performing input/output example reading writing file disk prior advent multiprogramming computers operated single-user systems users systems quickly became aware much time computer allocated single user processor idle user entering information debugging programs example computer scientists observed overall performance machine could improved letting different process use processor whenever one process waiting input/output uni-programming system n users execute programs individual execution times ... total time service n processes consecutively n users would however process consumes cpu cycles i/o cycles time process actually uses cpu small fraction total execution time process process time process spends using cpu br total execution time process i.e time cpu cycles plus i/o cycles carried executed completion process fact usually sum processor time used n processes rarely exceeds small fraction time execute one processes therefore uni-programming systems processor lay idle considerable proportion time overcome inefficiency multiprogramming implemented modern operating systems linux unix microsoft windows enables processor switch one process x another whenever x involved i/o phase execution since processing time much less single job runtime total time service n users multiprogramming system reduced approximately operating systems need ways create processes simple system designed running single application e.g. controller microwave oven may possible processes ever needed present system comes general-purpose systems however way needed create terminate processes needed operation four principal events cause process created operating system booted typically several processes created foreground processes interacts human user perform work background processes associated particular users instead specific function example one background process may designed accept incoming e-mails sleeping day suddenly springing life incoming e-mail arrives another background process may designed accept incoming request web pages hosted machine waking request arrives service request process creation unix linux done fork clone system calls several steps involved process creation first step validation whether parent process sufficient authorization create process upon successful validation parent process copied almost entirely changes unique process id parent process user-space new process gets user space many reasons process termination operating system ’ principal responsibility controlling execution processes includes determining interleaving pattern execution allocation resources processes one part designing os describe behaviour would like process exhibit simplest model based fact process either executed processor thus process may considered one two states running running operating system creates new process process initially labeled running placed queue system running state process portion exists main memory waits queue opportunity executed period time currently running process interrupted moved running state running state making processor available different process dispatch portion os select queue running processes one waiting processes transfer processor chosen process relabeled running state running state execution either begun new process resumed process interrupted earlier time model identify design elements os although two-state process management model perfectly valid design operating system absence blocked state means processor lies idle active process changes cpu cycles i/o cycles design make efficient use processor three-state process management model designed overcome problem introducing new state called blocked state state describes process waiting i/o event take place case i/o event mean use device signal another process three states model instant process one one three states single processor computer one process running state one instant many processes ready blocked states states associated queue processes processes entering system must go initially ready state processes enter running state via ready state processes normally leave system running state three states process occupies space main memory reason transitions one state another might obvious may clear three state model sufficient describe behavior processes given events extend model allow possible events sophisticated design particular use portion hard disk emulate main memory called virtual memory requires additional states describe state processes suspended main memory placed virtual memory disk course processes future time resumed transferred back main memory medium level scheduler controls events process suspended running ready blocked state giving rise two states namely ready suspend blocked suspend running process suspended becomes ready suspend blocked process suspended becomes blocked suspend process suspended number reasons significant arises process swapped memory memory management system order free memory processes common reasons process suspended one suspends execution debugging program system monitoring processes five-state process management model consider following transitions described next sections process system represented data structure called process control block pcb process descriptor linux performs function traveller passport pcb contains basic information job including process identification process uniquely identified user ’ identification pointer connecting descriptor process status indicates current status process ready running blocked ready suspend blocked suspend process state contains information needed indicate current state job accounting contains information used mainly billing purposes performance measurement indicates kind resources process used long contemporary processors incorporate mode bit define execution capability program processor bit set kernel mode user mode kernel mode also commonly referred supervisor mode monitor mode ring 0 kernel mode processor execute every instruction hardware repertoire whereas user mode execute subset instructions instructions executed kernel mode called kernel privileged protected instructions distinguish user mode instructions example i/o instructions privileged application program executes user mode perform i/o instead must request os perform i/o behalf system may logically extend mode bit define areas memory used processor kernel mode versus user mode mode bit set kernel mode process executing processor access either kernel user partition memory however user mode set process reference user memory space frequently refer two classes memory user space system space kernel supervisor protected space general mode bit extends operating system protection rights mode bit set user mode trap instruction also called supervisor call instruction instruction sets mode bit branches fixed location system space since system code loaded system space system code invoked via trap os completed supervisor call resets mode bit user mode prior return parts os critical correct operation execute kernel mode software generic system software application programs execute user mode fundamental distinction usually irrefutable distinction operating system system software part system executing kernel supervisor state called kernel nucleus operating system kernel operates trusted software meaning designed implemented intended implement protection mechanisms could covertly changed actions untrusted software executing user space extensions os execute user mode os rely correctness parts system software correct operation os hence fundamental design decision function incorporated os whether needs implemented kernel implemented kernel execute kernel supervisor space access parts kernel also trusted software parts kernel function implemented execute user mode access kernel data structures however advantage normally require limited effort invoke function kernel-implemented functions may easy implement trap mechanism authentication time call usually relatively expensive kernel code runs fast large performance overhead actual call subtle important point two techniques program executing user mode request kernel services operating systems designed one two facilities first assume user process wishes invoke particular target system function system call approach user process uses trap instruction idea system call appear ordinary procedure call application program os provides library user functions names corresponding actual system call stub functions contains trap os function application program calls stub executes trap instruction switches cpu kernel mode branches indirectly os table entry point function invoked function completes switches processor user mode returns control user process thus simulating normal procedure return message passing approach user process constructs message describes desired service uses trusted send function pass message trusted os process send function serves purpose trap carefully checks message switches processor kernel mode delivers message process implements target functions meanwhile user process waits result service request message receive operation os process completes operation sends message back user process distinction two approaches important consequences regarding relative independence os behavior application process behavior resulting performance rule thumb operating system based system call interface made efficient requiring messages exchanged distinct processes case even though system call must implemented trap instruction even though trap relatively expensive perform efficient message passing approach generally higher costs associated process multiplexing message formation message copying system call approach interesting property necessarily os process instead process executing user mode changes kernel mode executing kernel code switches back user mode returns os call hand os designed set separate processes usually easier design gets control machine special situations kernel simply collection functions executed users processes kernel mode even procedure-based operating system usually find necessary include least system processes called daemons unix handle situation whereby machine otherwise idle scheduling handling network
[ 2560, 9224, 6155, 6675, 7187, 10776, 25, 4637, 9762, 4643, 6180, 5158, 7217, 10803, 9784, 10809, 576, 2625, 6221, 3160, 10333, 97, 11363, 6760, 10856, 8298, 9835, 7285, 4727, 2168, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10...
None
9,888
2
Xpeak:xpeak xpeak standard device management based xml platform agnostic initially focused financial applications restricted serves purpose apis like cen/xfs j/xfs restricted one operating system language since works client/server model using xml way homogenise communication application device services flexibility allows different parts whole business implemented different languages application various devices implemented java c++ still others device firmware designed based experiences cen/xfs j/xfs javapos instead using standards organization uses open source model develop architecture tools used project like base complete open source software solution named xpeaker way updated quickly openly users using internet means communication rather meetings requiring physical presence xpeak follows open source model participation project totally free moderated r open source foundation participated equal parts sun microsystems intecna initial code contribution responsibility cashware one leading companies devices connectivity use standards cen/xfs j/xfs xpeaker collection software projects integrally developed cashware philosophy open source commercialized dual license xpeaker public license commercial licence xpeaker includes following elements eclipse plugin permits made high level api access xpeak services xpeaking permits access said services different programming languages java c c++ c pascal
[ 5609, 9665, 479 ]
Test
9,889
9
ARITH-MATIC:arith-matic arith-matic extension grace hopper a-2 programming language developed around 1955 arith-matic originally known a-3 renamed marketing department remington rand univac
[ 1864, 4483, 5277, 8262 ]
Test
9,890
1
BrandZ:brandz brandz brand equity database managed marketing firm millward brown holds data 650,000 consumers professionals across 31 countries comparing 23,000 brands database used estimate brand valuations year since 2006 used generate list top 100 global brands credibility interbrand brandz league tables cast doubt article written marketing week mark ritson lack clear definitions valuation dates companies methodology raise questions subjectivity involved brand valuations part multinational advertising groups interbrand kantar millward brown also suffer risk objectivity transparency objectivity two requirements iso 10668 standard monetary brand valuations
[ 2901 ]
None
9,891
9
WSFN_(programming_language):wsfn programming language wsfn stands nothing interpreted programming language controlling robots created li-chen wang designed small possible tiny language similar wang earlier effort palo alto tiny basic wsfn first published dr. dobb journal september 1977 language consists primarily single-letter commands tell robot move certain directions commands perform tests basic mathematical operations grouped named macros produce complex programs original version also included code simulated robot cursor vdm-1 display graphically cromemco dazzler display today known turtle graphics extended wsfn implementation created atari 8-bit family home computers written harry stewart published atari program exchange 1981 addition supporting turtle graphics adds number commands control graphics sound capabilities platform offered beginner language emphasis graphics wsfn consists number single-letter commands control movement turtle commands repeated prefixing number instance codice_1 moves turtle forward one step codice_2 moves 25 steps codice_3 codice_4 make turtle turn one unit right left respectively also reset point codice_5orth step sizes turn units defined robot hardware set one pixel 45 degrees turtle graphics versions missing robot versions computer versions codice_6 returns turtle home center screen codice_7 clears previous drawing thus one draw square string instructions set drawing color black clears screen fills current color sets color white homes turtle resets turtle point north draws series four lines 25 steps long rotating 90 degrees one result white square lower-left corner center screen lists commands surrounded parentheses create macros instance square drawn placing code draw one side square inside parentheses calling four times macros called within macros instance code draws series eight squares offset 45 degrees rotating around center screen macros assigned name using codice_8efine command extended wsfn used codice_9 instead code defines macro named x clear screen reset drawing another z draws square uses draw rotating square example wsfn rudimentary math capabilities consisting single accumulator codice_10 incremented decremented codice_11 codice_12 letter codice_10 placed anywhere number could appear one make series squares grow larger incrementing accumulator 5 times step side-effect syntax codice_14 would set accumulator zero performs decrement instruction number likewise codice_15 doubles value accumulator program control equally rudimentary consisting number commands handled if/then/else structures basic form codice_16est command follows one two paths accumulator greater equal zero instance command causes turtle turn 90 degrees left accumulator non-zero 45 right zero variations codice_16 branching construct include codice_18 randomly jumps first second branch 50 time codice_19ensor tests contact sensor robot triggered extended wsfn modified codice_19 return color front turtle allowing hit detection previous drawing added codice_21dge test jumps right side macro turtle hit edge drawing area original wsfn lacks equivalent codice_21 instead wraps drawing area turtle re-appears opposite side screen extended wsfn supports style playfield wrapping option uses one-letter commands recursive syntax wsfn code exceedingly cryptic example wsfn program draw sierpiński curves note definition macro includes calls within key aspect wsfn concept language highly recursive nature makes programming self-similar patterns like fractals easy accomplish lines code key concept extended wsfn keyboard always active even macros running allows keyboard input interrupt running programs using technique one make macros moving turtle certain ways assign letters keyboard perform movements pressing different keys succession aided adding codice_23ait command places give user time respond drawing takes place original dr. dobbs article extended wsfn manual
[ 9714, 7691, 1029, 8262 ]
Test
9,892
2
SciTech_SNAP:scitech snap scitech snap system neutral access protocol operating system portable dynamically loadable native-size 32-bit/64-bit device driver architecture scitech snap defines architecture loading operating system neutral binary device driver type hardware device graphics controller audio controller scsi controller network controller scitech snap drivers source code portable different microprocessor platforms binary drivers operating system portable within particular microprocessor family snap drivers originally developed intel 386+ cpu 32-bit operating system environment supported cpu introduction snap 3.0 native binary snap drivers available 32-bit powerpc cpus 64-bit x86-64 cpus 2002-08-27 scitech software inc. announced intention release scitech snap driver development kit 2006-11-16 scitech software inc. announced ceased development snap device driver technology favor new line web business logic technologies scitech also announced would begin looking buyer scitech snap december 2008 alt richmond inc. closed acquisition scitech software ’ snap technology plans scitech software 2008 create opensnap open source version driver technology therefore longer option unless alt richmond decides pick may 2015 arca noae llc announced reached agreement alt richmond inc. license source code snap graphics os/2 scitech display doctor 6.5 included replacement video driver windows 95 higher works hardware supported sdd sdd 7 driver renamed scitech nucleus graphics driver nucleus graphics driver later incorporated scitech snap graphics snap 3 nucleus renamed snap scitech snap graphics version 2 also included vbetest/lite vesa bios extensions vbe compliance test version 8.00 later removed scitech snap graphics 3 scitech snap 3 dos opengl tests scitech display doctor 7 beta found gactrl driver control center windows version scitech snap graphics maintained user interface found sdd 7 beta first product scitech snap line provides accelerated graphics scitech snap graphics ported dos os/2 microsoft windows ce nt 2000 xp qnx smx sunos/solaris port minix linux time rtos-32 unununium os operating systems supported hardware included video processors 3dfx 3dlabs alliance semiconductor amd geode gx2 ark logic ati chips technologies cirrus logic cyrix ibm integraphics intel matrox neomagic number nine nvidia oak philips rendition s3 sigma designs silicon motion sis tseng labs trident via weitek well video card supporting vbe 1.2 higher although scitech snap graphics offer standalone vbe driver snap driver accelerates applications using vbe calls via scitech snap graphics driver snap graphics windows also accelerate vbe 3 calls dos programs run windows dos box scitech also offer scitech snap graphics pe personal edition scitech site allows registered users download snap driver hardware operating system specified users user account download two drivers per week driver generated service run six months scitech snap graphics pe tools gactrl gamode gaoption gaperf dos tools included gldirect tests included windows driver similar scitech snap graphics provides os-independent audio drivers ported windows nt 4.0 supported hardware include ac'97 intel hda hda support modem function designed provide easy access attached display order program directly via i²c simply read monitor edid record
[ 11634, 8700, 6797, 823 ]
None
9,893
1
MonetDB:monetdb monetdb open-source column-oriented database management system developed centrum wiskunde informatica cwi netherlands designed provide high performance complex queries large databases combining tables hundreds columns millions rows monetdb applied high-performance applications online analytical processing data mining geographic information system gis resource description framework rdf text retrieval sequence alignment processing data mining projects 1990s required improved analytical database support resulted cwi spin-off called data distilleries used early monetdb implementations analytical suite data distilleries eventually became subsidiary spss 2003 turn acquired ibm 2009 monetdb current form first created 2002 doctoral student peter boncz professor martin l. kersten part 1990s magnum research project university amsterdam initially called simply monet french impressionist painter claude monet first version open-source software license modified version mozilla public license released september 30 2004 monetdb version 4 released open-source domain many extensions code base added monetdb/cwi team included new sql frontend supporting standard monetdb introduced innovations layers dbms storage model based vertical fragmentation modern cpu-tuned query execution architecture often gave monetdb speed advantage algorithm typical interpreter-based rdbms one first database systems tune query optimization cpu caches monetdb includes automatic self-tuning indexes run-time query optimization modular software architecture 2008 follow-on project called x100 monetdb/x100 started evolved vectorwise technology vectorwise acquired actian corporation integrated ingres database sold commercial product 2011 major effort renovate monetdb codebase started part code monetdb 4 kernel xquery components frozen monetdb 5 parts sql layer pushed kernel resulting changes created difference internal apis transitioned monetdb instruction language mil monetdb assembly language mal older no-longer maintained top-level query interfaces also removed first xquery relied monetdb 4 never ported version 5 experimental jaql interface support removed october 2014 release july 2015 release monetdb gained support read-only data sharding persistent indices release deprecated streaming data module datacell also removed main codebase effort streamline code addition license changed mozilla public license version 2.0 monetdb architecture represented three layers set optimizers front-end top layer providing query interface sql sciql sparql interfaces development queries parsed domain-specific representations like relational algebra sql optimized generated logical execution plans translated monetdb assembly language mal instructions passed next layer middle back-end layer provides number cost-based optimizers mal bottom layer database kernel provides access data stored binary association tables bats bat table consisting object-identifier value columns representing single column database monetdb internal data representation also relies memory addressing ranges contemporary cpus using demand paging memory mapped files thus departing traditional dbms designs involving complex management large data stores limited memory query recycling architecture reusing byproducts operator-at-a-time paradigm column store dbms recycling makes use generic idea storing reusing results expensive computations unlike low-level instruction caches query recycling uses optimizer pre-select instructions cache technique designed improve query response times throughput working self-organizing fashion authors cwi database architectures group composed milena ivanova martin kersten niels nes romulo goncalves best paper runner acm sigmod 2009 conference work query recycling monetdb one first databases introduce database cracking database cracking incremental partial indexing and/or sorting data directly exploits columnar nature monetdb cracking technique shifts cost index maintenance updates query processing query pipeline optimizers used massage query plans crack propagate information technique allows improved access times self-organized behavior database cracking received acm sigmod 2011 j.gray best dissertation award number extensions exist monetdb extend functionality database engine due three-layer architecture top-level query interfaces benefit optimizations done backend kernel layers monetdb/sql top-level extension provides complete support transactions compliance standard monetdb/gis extension monetdb/sql support simple features access standard open geospatial consortium ogc sciql sql-based query language science applications arrays first class citizens sciql allows monetdb effectively function array database sciql used european union planetdata teleios project together data vault technology providing transparent access large scientific data repositories data vaults map data distributed repositories sciql arrays allowing improved handling spatio-temporal data monetdb sciql extended human brain project data vault database-attached external file repository monetdb similar sql/med standard data vault technology allows transparent integration distributed/remote file repositories designed scientific data data exploration mining specifically remote sensing data support geotiff earth observation fits astronomy miniseed seismology netcdf formats data stored file repository original format loaded database lazy fashion needed system also process data upon ingestion data format requires result even large file repositories efficiently analyzed required data processed database data accessed either monetdb sql sciql interfaces data vault technology used european union teleios project aimed building virtual observatory earth observation data data vaults fits files also used processing astronomical survey data int photometric h-alpha survey iphas monetdb sam/bam module efficient processing sequence alignment data aimed bioinformatics research module sam/bam data loader set sql udfs working dna data module uses popular samtools library monetdb/rdf sparql-based extension working linked data adds support rdf allowing monetdb function triplestore development linked open data 2 project monetdb/r module allows udfs written r executed sql layer system done using native r support running embedded another application inside rdbms case previously monetdb.r connector allowed using monetdb data sources process r session newer r integration feature monetdb require data transferred rdbms r session reducing overhead improving performance feature intended give users access functions r statistical software in-line analysis data stored rdbms complements existing support c udfs intended used in-database processing similarly embedded r udfs monetdb database support udfs written python/numpy implementation uses numpy arrays python wrappers c arrays result limited overhead providing functional python integration speed matching native sql functions embedded python functions also support mapped operations allowing user execute python functions parallel within sql queries practical side feature gives users access python/numpy/scipy libraries provide large selection statistical/analytical functions following release remote driver r monetdb.r r udfs monetdb monetdb/r authors created embedded version monetdb r called monetdblite distributed r package removing need manage database server required previous r integrations dbms runs within r process eliminating socket communication serialisation overhead greatly improving efficiency idea behind deliver sqlite-like package r performance in-memory optimized columnar store number former extensions deprecated removed stable code base time notable examples include xquery extension removed monetdb version 5 jaql extension streaming data extension called data cell
[ 5632, 3, 7684, 6536, 10389, 5151, 5794, 5546, 4781, 10286, 7983, 10413, 7868, 6780, 5833, 5450, 462, 6479, 2901, 86, 7767, 4058, 3045, 6629, 1383, 8554, 5612, 10734, 10737, 9714, 6131, 1142, 6775, 3323, 3196, 2045 ]
None
9,894
4
Opal_Storage_Specification:opal storage specification opal storage specification set specifications features data storage devices disk drives enhance security example defines way encrypting stored data unauthorized person gains possession device see data specification self-encrypting drives sed specification published trusted computing group storage workgroup opal ssc security subsystem class implementation profile storage devices built opal ssc encompasses functions radboud university researchers indicated november 2018 hardware encryption including opal implementations security vulnerabilities
[ 704, 9569, 8900, 5384, 2416, 9137, 7794, 9055, 1400, 8668, 4221, 127 ]
Test
9,895
9
Richard_Bird_(computer_scientist):richard bird computer scientist richard simpson bird born 1943 london supernumerary fellow computation lincoln college oxford england former director oxford university computing laboratory oxford university department computer science bird research interests lie algorithm design functional programming known regular contributor journal functional programming author introduction functional programming using haskell books name associated bird-meertens formalism calculus deriving programs specifications functional programming style previously bird university reading
[ 4392, 219, 3876, 1783 ]
Test
9,896
1
AutoFetch:autofetch autofetch mechanism automatically tuning object-relational mapping queries ali ibrahim william cook university texas developed idea autofetch including implementation hibernate followed later implementation ebean autofetch uses program state typically call stack classify queries means autofetch tune query depending called example data access api codice_1 tuned differently depending callers method autofetch automatically gathers profiling information developers need manually try gather information apply performance optimizations code autofetch monitor object graph usage usage changes tuning query change suit reduces code maintenance issues developers maintains optimal performance usage changes time autofetch collects object graph usage queries executed collects 'profile information later used automatically tune query subsequent executions orm query tuned determining automatically adding correct prefetch directives query improves performance application reducing lazy loading orms support partial objects autofetch also tune query including properties application uses rather properties autofetch profiling also used select optimal query strategies array fetching object graph use known uneven typically weighted first object graphs list could lead much efficient higher performing object graph traversal currently possible current techniques employed orm tools
[ 5040, 5987, 6860, 9467 ]
None
9,897
2
Secure_operating_system:secure operating system secure operating system may refer
[ 125, 9646 ]
Test
9,898
0
VoxForge:voxforge voxforge free speech corpus acoustic model repository open source speech recognition engines voxforge set collect transcribed speech create free gpl speech corpus use open source speech recognition engines speech audio files 'compiled acoustic models use open source speech recognition engines julius isip sphinx htk note htk distribution restrictions voxforge used librivox source audio data since 2007
[ 6362, 10557, 9798 ]
None
9,899
2
Musix_GNU+Linux:musix gnu+linux musix gnu+linux live cd dvd linux distribution ia-32 processor family based debian contains collection software audio production graphic design video editing general purpose applications initiator co-director project marcos germán guglielmetti musix gnu+linux one gnu/linux distributions recognized free software foundation primarily available sites distributing free software excluding non-free information practical use musix developed team argentina spain mexico brazil main language used development discussion documentation spanish however musix community users speak spanish portuguese english musix 0.x 1.0 rx versions released 2005 2008 musix 1.0 r6 last stable release dvd musix 1.0 r2r5 last stable release cd live-cd system 1350 software packages runs directly cd/dvd without need install anything pc installed pc relatively easily desired minutes like knoppix kanotix live-dvd 1.0 r3 test5 2279 software packages programs include rosegarden ardour musicians inkscape vectorial design gimp manipulation images cinelerra video editing blender 3d animation desktop light 18 mb ram x.org based icewm/rox-filer unique feature multiple pinboards ordered general purpose apps help office root/admin midi internet graphics audio pinboards arrays desktop backgrounds icons small version kde desktop installed default live-cd version live-dvd full kde version supporting several languages musix 2.0 developed using live-helper scripts debian-live project first alpha version musix 2.0 released 2009-03-25 including two realtime-patched linux-libre kernels 2009-05-17 first beta version musix 2.0 released final musix gnu+linux 2.0 version cd dvd usb launched november 2009 daniel vidal suso comesaña carlos sanchiavedraz joseangon musix developers version presented palau firal de congressos de tarragona españa suso comesaña quite similar linux-version developed brazilian music teacher gilberto andré borges named adriane musixbr version fork derived knoppix 6.1 adriane
[ 5380, 8837, 7435, 4493, 10127, 2321, 10257, 5397, 9366, 4887, 10394, 10016, 673, 3618, 3745, 10530, 9253, 10149, 11305, 7854, 2864, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 8033, 2914, 485, 3685, 9064, 4841...
Test
9,900
4
National_Security_Operations_Center:national security operations center national security operations center nsoc directorate k part united states national security agency responsible current operations time-sensitive signals intelligence sigint reporting united states sigint system usss one two centers watching directorate v ntoc assesses threats nsoc operations center 24 hours day 7 days week basis providing total situational awareness across nsa/css enterprise foreign signals intelligence information assurance maintains cognizance national security information needs monitors unfolding world events 1969 u.s. navy ec-121 patrol plane shot sea japan ensuing hours nsa leaders raced office office gather information necessary assemble coordinated response agency national leadership incident demonstrated need dedicated watch center respond breaking world events center established 1968 national sigint watch center nswc renamed national sigint operations center nsoc 1973 nerve center nsa got current name 1996 september 11 2001 attacks nsoc mission broadened watch center operations center today
[ 1986, 6344, 7887, 7119, 7893, 8726, 3356 ]
None
9,901
4
General_Data_Protection_Regulation:general data protection regulation general data protection regulation eu 2016/679 gdpr regulation eu law data protection privacy individual citizens european union eu european economic area eea also addresses transfer personal data outside eu eea areas gdpr aims primarily give control individuals personal data simplify regulatory environment international business unifying regulation within eu superseding data protection directive 95/46/ec regulation contains provisions requirements pertaining processing personal data individuals formally called data subjects gdpr inside eea applies enterprise established eea or—regardless location data subjects citizenship—that processing personal information data subjects inside eea controllers personal data must put place appropriate technical organisational measures implement data protection principles business processes handle personal data must designed built consideration principles provide safeguards protect data example using pseudonymization full anonymization appropriate use highest-possible privacy settings default datasets publicly available without explicit informed consent used identify subject without additional information must stored separately personal data may processed unless processing done lawful basis specified regulation unless data controller processor received unambiguous individualized affirmation consent data subject data subject right revoke consent time processor personal data must clearly disclose data collection declare lawful basis purpose data processing state long data retained shared third parties outside eea data subjects right request portable copy data collected processor common format right data erased certain circumstances public authorities businesses whose core activities centre around regular systematic processing personal data required employ data protection officer dpo responsible managing compliance gdpr businesses must report data breaches within 72 hours adverse effect user privacy cases violators gdpr may fined €20 million 4 annual worldwide turnover preceding financial year case enterprise whichever greater gdpr adopted 14 april 2016 became enforceable beginning 25 may 2018 gdpr regulation directive directly binding applicable provide flexibility certain aspects regulation adjusted individual member states gdpr 2016 eleven chapters concerning general provisions principles rights data subject duties data controllers processors transfers personal data third countries supervisory authorities cooperation among member states remedies liability penalties breach rights miscellaneous final provisions regulation applies data controller organisation collects data eu residents processor organisation processes data behalf data controller like cloud service providers data subject person based eu certain circumstances regulation also applies organisations based outside eu collect process personal data individuals located inside eu regulation apply processing data person purely personal household activity thus connection professional commercial activity recital 18 according european commission personal data information relates identified identifiable individual directly identify individual information need consider whether individual still identifiable take account information processing together means reasonably likely used either person identify individual.the precise definitions terms personal data processing data subject controller processor stated article 4 regulation regulation purport apply processing personal data national security activities law enforcement eu however industry groups concerned facing potential conflict laws questioned whether article 48 gdpr could invoked seek prevent data controller subject third country laws complying legal order country law enforcement judicial national security authorities disclose authorities personal data eu person regardless whether data resides eu article 48 states judgement court tribunal decision administrative authority third country requiring controller processor transfer disclose personal data may recognised enforceable manner unless based international agreement like mutual legal assistance treaty force requesting third non-eu country eu member state data protection reform package also includes separate data protection directive police criminal justice sector provides rules personal data exchanges national european international levels single set rules apply eu member states member state establish independent supervisory authority sa hear investigate complaints sanction administrative offences etc sas member state co-operate sas providing mutual assistance organising joint operations business multiple establishments eu single sa lead authority based location main establishment main processing activities take place lead authority act one-stop shop supervise processing activities business throughout eu articles 46–55 gdpr european data protection board edpb co-ordinate sas edpb replace article 29 data protection working party exceptions data processed employment context national security still might subject individual country regulations articles 2 2 88 gdpr unless data subject provided informed consent data processing one purposes personal data may processed unless least one legal basis article 6 states lawful purposes informed consent used lawful basis processing consent must explicit data collected purpose data used article 7 defined article 4 consent must specific freely-given plainly-worded unambiguous affirmation given data subject online form consent options structured opt-out selected default violation gdpr consent unambiguously affirmed user addition multiple types processing may bundled together single affirmation prompt specific use data individual permissions freely-given recital 32 data subjects must allowed withdraw consent time process must harder opt article 7 3 data controller may refuse service users decline consent processing strictly necessary order use service article 7 4 consent children defined regulation less 16 years old although option member states individually make low 13 years old article 8 1 must given child parent custodian verifiable article 8 consent processing already provided data protection directive data controller re-obtain consent processing documented obtained compliance gdpr requirements recital 171 article 12 requires data controller provides information 'data subject concise transparent intelligible easily accessible form using clear plain language particular information addressed specifically child right access article 15 data subject right gives citizens right access personal data information personal data processed data controller must provide upon request overview categories data processed article 15 1 b well copy actual data article 15 3 furthermore data controller inform data subject details processing purposes processing article 15 1 data shared article 15 1 c acquired data article 15 1 g data subject must able transfer personal data one electronic processing system another without prevented data controller data sufficiently anonymised excluded data de-identified remains possible link individual question providing relevant identifier practice however providing identifiers challenging case apple siri voice transcript data stored personal identifier manufacturer restricts access online behavioural targeting relies heavily device fingerprints challenging capture send verify data 'provided data subject data 'observed behaviour included addition data must provided controller structured commonly used standard electronic format right data portability provided article 20 gdpr right forgotten replaced limited right erasure version gdpr adopted european parliament march 2014 article 17 provides data subject right request erasure personal data related one number grounds within 30 days including noncompliance article 6 1 lawfulness includes case f legitimate interests controller overridden interests fundamental rights freedoms data subject require protection personal data see also google spain sl google inc. v agencia española de protección de datos mario costeja gonzález able demonstrate compliance gdpr data controller must implement measures meet principles data protection design default article 25 requires data protection measures designed development business processes products services measures include pseudonymising personal data controller soon possible recital 78 responsibility liability data controller implement effective measures able demonstrate compliance processing activities even processing carried data processor behalf controller recital 74 data collected data subjects must clearly informed extent data collection legal basis processing personal data long data retained data transferred third-party and/or outside eu automated decision-making made solely algorithmic basis data subjects must informed privacy rights gdpr including right revoke consent data processing time right view personal data access overview processed right obtain portable copy stored data right erasure data certain circumstances right contest automated decision-making made solely algorithmic basis right file complaints data protection authority data subject must also provided contact details data controller designated data protection officer applicable data protection impact assessments article 35 conducted specific risks occur rights freedoms data subjects risk assessment mitigation required prior approval data protection authorities required high risks article 25 requires data protection designed development business processes products services privacy settings must therefore set high level default technical procedural measures taken controller make sure processing throughout whole processing lifecycle complies regulation controllers also implement mechanisms ensure personal data processed unless necessary specific purpose report european union agency network information security elaborates needs done achieve privacy data protection default specifies encryption decryption operations must carried locally remote service keys data must remain power data owner privacy achieved report specifies outsourced data storage remote clouds practical relatively safe data owner cloud service holds decryption keys gdpr refers pseudonymisation process required data stored alternative option complete data anonymisation transform personal data way resulting data attributed specific data subject without use additional information example encryption renders original data unintelligible process reversed without access correct decryption key gdpr requires additional information decryption key kept separately pseudonymised data another example pseudonymisation tokenisation non-mathematical approach protecting data rest replaces sensitive data non-sensitive substitutes referred tokens tokens extrinsic exploitable meaning value allow specific data fully partially visible processing analytics sensitive information kept hidden tokenisation alter type length data means processed legacy systems databases may sensitive data length type also requires much fewer computational resources process less storage space databases traditionally-encrypted data pseudonymisation privacy-enhancing technology recommended reduce risks concerned data subjects also help controllers processors meet data protection obligations recital 28 records processing activities must maintained include purposes processing categories involved envisaged time limits records must made available supervisory authority request article 30 article 33 states data controller legal obligation notify supervisory authority without undue delay unless breach unlikely result risk rights freedoms individuals maximum 72 hours becoming aware data breach make report individuals notified high risk adverse impact determined article 34 addition data processor notify controller without undue delay becoming aware personal data breach article 33 however notice data subjects required data controller implemented appropriate technical organisational protection measures render personal data unintelligible person authorised access encryption article 34 article 37 requires appointment data protection officer processing carried public authority except courts independent judicial authorities acting judicial capacity processing operations involve regular systematic monitoring data subjects large scale processing large scale special categories data personal data relating criminal convictions offences articles 9 article 10 data protection officer dpo —a person expert knowledge data protection law practices—must designated assist controller processor monitoring internal compliance regulation designated dpo current member staff controller processor role outsourced external person agency service contract case processing body must make sure conflict interest roles interests dpo may hold contact details dpo must published processing organisation example privacy notice registered supervisory authority dpo similar compliance officer also expected proficient managing processes data security including dealing cyberattacks critical business continuity issues around holding processing personal sensitive data skill set required stretches beyond understanding legal compliance data protection laws regulations dpo must maintain living data inventory data collected stored behalf organization details function role data protection officer given 13 december 2016 revised 5 april 2017 guideline document organisations based outside eu must also appoint eu-based person representative point contact gdpr obligations article 27 distinct role dpo although overlap responsibilities suggest role also held designated dpo eu representative eu-based designee “ ambassador ” non-eu establishment data controller data processor subject general data protection regulation gdpr eu natural individual moral corporation person play role eu representative eu representative controller ’ processor ’ contact person vis-à-vis european privacy supervisors data subjects matters relating processing ensure compliance gdpr purpose representation enable european data protection supervisory authorities ensure compliance gdpr able control supervise activities non-eu establishments subject gdpr respective representatives eu non-eu establishments subject gdpr obliged designate eu representative worth reiterating fact non-eu establishment shall subject gdpr regularly undertakes one following activities offering goods services irrespective whether payment data subject required data subjects eu and/or b monitoring behaviour data subjects eu far behaviour takes place within eu provision concerns company offers goods services online eu customers uses cookies similar technologies track eu data subjects establishments must comply gdpr thus obliged designate eu representative however non-eu establishment exempted designating eu representative processing occasional include large scale processing special categories data referred article 9 1 gdpr processing personal data relating criminal convictions offences referred article 10 gdpr processing unlikely result risk rights freedoms natural persons taking account nature context scope purposes processing non-eu public authorities bodies equally exempted foreign company subject gdpr refuses designate eu representative required former infringing gdpr runs risk imposed administrative fine ten million euros 10 000 000 eur 2 percent company ’ total worldwide annual turnover preceding financial year whichever higher ignorance gdpr would excuse intentional negligent willful blindness character infringement failure designate eu representative may rather constitute aggravating factors reasons foreign companies haste designate respective eu representatives eu-based data protection specialized companies rendered things easier european data protection specialized companies offer cheap efficient representation services especially data privacy day-to-day activity like heads state designate ambassadors letters credence non-eu establishment must issue duly signed document letter accreditation designating given individual company eu representative said designation given writing gdpr art 27 1 eu-based data protection companies already draft letters accreditation would simply forward interested companies sign send post besides definitions criminal offence according national law following article 83 gdpr following sanctions imposed within gdpr distinct difference business consumer b2c business business b2b marketing gdpr six equally valid grounds process personal data two relevant direct b2b marketing consent legitimate interest recital 47 gdpr states processing personal data direct marketing purposes may regarded carried legitimate interest using legitimate interest basis b2b marketing involves ensuring key conditions met additionally article 6.1 f gdpr states processing lawful necessary purposes legitimate interests pursued controller third-party except interests overridden interests fundamental rights freedoms individual require protection personal information particular individual child therefore companies continue use marketing data purposes b2b engagement long appropriate steps taken ensure data aligned specific objective campaign one phrase used correct marketing correct person part companies need keep marketing databases crm date order carry valid legitimate balance checks eu commission stated unified data privacy laws create extraordinary opportunities motivating innovation businesses within europe also organization willing business european states already running business european states commission aims companies maintain communications build regulation supporting relationships ensure best data practices legitimate balance checks following cases covered regulation conversely entity precisely enterprise engaged economic activity covered gdpr economic activity defined broadly european union competition law proposal new regulation gave rise much discussion controversy. ref name= taylor wessing 9/2016 dpo burden /ref thousands amendments proposed area gdpr consent number implications businesses record calls matter practice typical disclaimer considered sufficient gain assumed consent record calls additionally recording commenced caller withdraw consent agent receiving call must able stop previously started recording ensure recording get stored professionals expect compliance gdpr require additional investment overall 80 percent surveyed expected gdpr-related spending least usd 100,000. ref name= babel 7/11/2017 high cost gdpr /ref concerns echoed report commissioned law firm baker mckenzie found around 70 percent respondents believe organizations need invest additional budget/effort comply consent data mapping cross-border data transfer requirements gdpr total cost eu companies estimated around €200 billion us companies estimate 41.7 billion argued smaller businesses startup companies might financial resources adequately comply gdpr unlike larger international technology firms facebook google regulation ostensibly meant target first foremost lack knowledge understanding regulations also concern lead-up adoption counter-argument companies made aware changes two years prior coming effect therefore enough time prepare regulations including whether enterprise must data protection officer criticized potential administrative burden unclear compliance requirements although data minimisation requirement pseudonymisation one possible means regulation provide guidance constitutes effective data de-identification scheme grey area would considered inadequate pseudonymisation subject section 5 enforcement actions also concern regarding implementation gdpr blockchain systems transparent fixed record blockchain transactions contradicts nature gdpr many media outlets commented introduction right explanation algorithmic decisions legal scholars since argued existence right highly unclear without judicial tests limited best gdpr garnered support businesses regard opportunity improve data management mark zuckerberg also called positive step internet called gdpr-style laws adopted us consumer rights groups european consumer organisation among vocal proponents legislation supporters attributed passage whistleblower edward snowden free software advocate richard stallman praised aspects gdpr called additional safeguards prevent technology companies manufacturing consent academic experts participated formulation gdpr wrote law consequential regulatory development information policy generation gdpr brings personal data complex protective regulatory regime said ideas contained within gdpr entirely european new gdpr ’ protections found – albeit weaker less prescriptive forms – u.s. privacy laws federal trade commission settlements companies despite least two years prepare many companies websites changed privacy policies features worldwide directly prior gdpr implementation customarily provided email notifications discussing changes criticised resulting fatiguing number communications experts noted reminder emails incorrectly asserted new consent data processing obtained gdpr took effect previously-obtained consent processing valid long met regulation requirements phishing scams also emerged using falsified versions gdpr-related emails also argued gdpr notice emails may actually sent violation anti-spam laws march 2019 provider compliance software found many websites operated eu member state governments contained embedded tracking ad technology providers deluge gdpr-related notices also inspired memes including surrounding privacy policy notices delivered atypical means ouija board star wars opening crawl suggesting santa claus naughty nice list violation recording excerpts regulation former bbc radio 4 shipping forecast announcer blog gdpr hall shame also created showcase unusual delivery gdpr notices attempts compliance contained egregious violations regulation requirements author remarked regulation lot nitty gritty in-the-weeds details lot information comply also acknowledged businesses two years comply making responses unjustified research indicates approximately 25 software vulnerabilities gdpr implications since article 33 emphasizes breaches bugs security experts advise companies invest processes capabilities identify vulnerabilities exploited including coordinated vulnerability disclosure processes effective date international websites began block eu users entirely including instapaper unroll.me tribune publishing-owned newspapers chicago tribune los angeles times redirect stripped-down versions services case national public radio usa today limited functionality and/or advertising order remove liabilities companies klout several online video games ceased operations entirely coincide implementation citing gdpr burden continued operations especially due business model former sales volume online behavioural advertising placements europe fell 25–40 25 may 2018 facebook subsidiaries whatsapp instagram well google llc targeting android immediately sued max schrems non-profit noyb hours midnight 25 may 2018 use forced consent schrems asserts companies violated article 7 4 presenting opt-ins data processing consent individualized basis requiring users consent data processing activities including strictly necessary forbidden using services following journalistic investigation liviu dragnea romanian data protection authority anspdcp used gdpr request demand information rise project sources april 3 2019 google fined record £44m failing comply gdpr cnil france data protection office found google guilty breaking eu privacy rules failing acquire adequate consent users regarding data used personalised advertising regulator also found google n't provide clear easily accessible information consumers regarding data collection retention mass adoption new privacy standards international companies cited example brussels effect phenomenon wherein european laws regulations used global baseline due gravitas u.s. state california passed california consumer privacy act 28 june 2018 taking effect 1 january 2020 grants rights transparency control collection personal information companies similar means gdpr critics argued laws need implemented federal level effective collection state-level laws would varying standards would complicate compliance 9 april 2019 u.s. senators deb fischer mark warner introduced deceptive experiences online users reduction detour act would make unlawful u.s. technology companies 100 million monthly active users use deceptive ambiguous user interface patterns seeking consent collect personal information eu digital single market strategy relates digital economy activities related businesses people eu part strategy gdpr nis directive apply 25 may 2018 proposed eprivacy regulation also planned applicable 25 may 2018 delayed several months eidas regulation also part strategy united kingdom scheduled leave european union 2019 uk granted royal assent data protection act 2018 23 may 2018 contains equivalent regulations protections uk leaves eu become third country purposes transfer personal data outside eu may require adequacy decision european commission suitability uk data protection framework appropriate safeguards may allow transfers take place chapter v currently august 2018 uk government view 'legally-binding data protection agreement eu uk would appropriate 'adequacy finding agreement would include uk information commissioner taking part 'one stop shop mechanism seat european data protection board april 2019 uk information commissioner office ico issued proposed code practice social networking services used minors enforceable gdpr also includes restrictions like streak mechanisms order discourage social media addiction use data processing interests american bar association published 2018 gdpr applies extraterritorially eu commission basis article 45 gdpr determined following countries offer adequate level data protection address new regulation retention disposition applications developed updated since data protection addresses much traditional records management several software solutions emerged include vast array issues facing information professionals
[ 2818, 4995, 1930, 5002, 8204, 5133, 3599, 1169, 3858, 10002, 5524, 5404, 11164, 7328, 9248, 3111, 3495, 3880, 9260, 3629, 8623, 6455, 11319, 11581, 10050, 4678, 7623, 970, 1104, 5200, 5461, 1368, 2779, 4194, 1251, 7781, 362, 4330, 3692, 5...
None
9,902
2
Software_remastering:software remastering software remastering software development recreates system software applications incorporating customizations intent copied run elsewhere off-label usage remastered codebase continue parallel ongoing upstream software development fork remastered version term comes remastering media production similarly distinguished mere copying remastering popularized klaus knopper creator knoppix free software foundation promotes universal freedom recreate distribute computer software example funding projects like gnu project remastered linux bsd opensolaris operating system distributions common copy protected also allowance operating systems grow application taking snapshot installing onto bootable media thumb drive virtual machine hypervisor since 2001 1000 computer operating systems arisen download internet global community linux providers pushes practice remastering developer switching project overtaking merging sharing internet distributions start remastered version another distribution evidenced announcements made distrowatch notably remastering sls linux forked slackware remastering red hat linux helped fork yellow dog linux mandriva turbolinux remastering debian distribution ubuntu started remastered linux mint team might involve critical system software extent customizations made remastering trivial change default setting distribution subsequent provision acquaintance installation media remastered version becomes public becomes distribution microsoft windows also modified remastered various utilities exist combine windows updates device drivers original windows cd/dvd installation media process known slipstreaming remastering distro remastering software applied inside live operating system clone installation package remastering necessarily require remastering software facilitates process example application remastered acquiring modifying recompiling original source code many video games modded upgrading additional content levels features notably counter-strike remastered half-life went marketed commercial product software remastering creates application rebuilding code base software objects existing master repository mastering process assembles distribution release version remaster process subtraction modification addition master repository similarly modified makefile orchestrates computerized version application amount unneeded code cut wanted minimum removes unwanted features original publisher maintainer needs new features added evolves software remastered version may consider feature original bug provides modified copy feature works better way published software remaster maintains integrity named product derived adherence shared software repository modifications intention maintaining good name needing approval approval happen name repository option become master creator published software remaster work evolve software must least arrange maintenance support channels updating user documentation providing forum internet relay chat line wiki providing intent maintain version life usefulness remastering centers around reputation product distribution process requires official sanctioned version differs attitude much free software many cases name product cheap plentiful stable guarantees liabilities offered permission inherently granted redistribution modified version name original repository master creative flavors spins may already offered original producers remaster production supports additional software outside supports new mixture software original repository keeps modifications original masters outside master repository software remastering tolerated maintainers master repository free software modifications encouraged social conventions mklivecd runs linux machine make bootable portable media image linux system works linux distribution probably needs installed first remaster personalized version pclinuxos created according needs individual created using mklivecd script applied installation official flavors pclinuxos official remaster include software components official repository version control community remaster may contain software components outside reference pclinuxos derived pclinuxos based pclinuxos intended distribution several third-party distributions years though may mention connection follow strict guidelines concerning quality maintainability distribution channels subject approval officiating members forum pclinuxos gnome edition example community remaster unity linux intended base platform acts distribution template ensures interoperability packages upon one encouraged remaster new gnu/linux os distributions linux mint remastering tool called mintconstructor creating distributions based linux mint creating iso files also package manager uses .mint files linux mint based ubuntu linux distribution ubuntu based debian distribution linux mint also offers debian edition provide example meeting kind codebase challenges goes remastering branch two distributions gentoo linux uses catalyst user installs configures runs gets one big archive-formatted file /var/tmp/catalyst/builds configuration options target machine architecture development version stamp differentiation stamp example version hardened extra security user must provide catalyst snapshot portage tree point target profile branch portage tree portage tree hierarchy directories oriented names categories packages package managers use normal everyday maintenance software fedora linux uses revisor enable user compose customized installation live media arch linux uses archiso remaster arch installation target machine rare hardware internet connection cases modified deployment occur multiple times remastered isos bootable also used system rescue demonstrations arch setup task testing new software installed rollout custom installation onto many machines etc arch linux wiki also gives procedure manually archiso automatically involves copying portions installation iso using linux commands mount mkdir chroot mksquashfs arch package manager pacman mx linux uses mx-snapshot gui tool remaster live installation single .iso file quickly conveniently cloned image bootable disk usb-thumbdrive maintaining settings way installation conveniently migrated distributed new hard-disk usb-thumbdrive requiring next administrative effort since advanced method copying file system developed antix-linux utilizing bind-mounts performs heavy lifting snapshot also serves essentially complete convenient backup installation examples section show historical operational aspects software remastering occurred microsoft windows 98lite remastering tool windows 95 windows 98 windows without internet explorer written shane brooks written response microsoft claim antitrust proceedings ie integrated windows removed without breaking features 98lite created 1998 original release windows 98 necessity since time brooks slower laptop computer ran windows 95 operating system fine windows 98 simply slow brooks liked stability windows 98 offered well new features need internet explorer browser original 98lite simple dos based installer ran windows 98 installation installer made modifications fresh installation windows preventing installation internet explorer active desktop installation first release 98lite required user extract certain files windows 95 disk 98lite uses windows 95 shell second program called shell swap swapped explorer shell windows 95 explorer contain web features 98 explorer therefore considerably faster lightweight designed existing installations windows 98 original 98lite designed new installation windows third program converted required components addable removable options version 2.0 98lite three programs merged combined single program ie remover combined components converter making ie uninstallable reinstallable add/remove programs control panel applet components user could also choose windows 95 shell keep internet explorer installed user three installation options sleek option allowed user install 98lite windows 95 shell like original release user could choose chubby used windows 98 shell active desktop features disabled final option overweight installed 98lite windows 98 shell nothing disabled internet explorer still removed version 3.0 added support windows 98 second edition upgraded version windows 98 internet explorer 5.0 made 98lite 1.0 2.0 obsolete current 4.x line many improvements including bugfixes support windows installing version directx 98lited windows requires least temporary presence pc health otherwise directx refuses install finishing installation attempt error message directx copy required file revenge mozilla another free application removes internet explorer windows 98 restores windows 95 explorer.exe two versions one original windows 98 release another win98 se version windows longer supported updated also company spun lite-pc produces windows 98 installations small enough easily fit embedded microchips small 8mb using 98eos also many free alternatives mindows nano98 provide either smaller file sizes broad functionality creator 98lite also built similar tool windows 2000 windows xp called 2000-xplite removes windows components intended removable includes out-of-box experience internet explorer outlook express windows media player others 2000-xplite also allows tweaks operating system enhance performance 2000-xplite use text interface 98lite like 98lite 2000-xplite installs windows components removes unwanted components installation nlite designed remove unwanted windows 2000 windows xp 32 64 bit windows server 2003 system components create cut-down customized installation cds nlite built dino nuhagić free personal use purchase options available september 2014 beta-version windows 7 later publicly released user chooses wanted 'functionality options nlite attempts warn user removing dependent components creation custom installer also lets users add device drivers integrate service packs windows updates well remove drivers obsolete unwanted hardware remove unwanted language keyboard options unwanted applications allows customization installation process including product key entry administrator password regional settings creating user account names options normally set control panel installation well numerous 'tweaks various degrees 'unattended installation also possible end installer creation process nlite burn installation direct cd create .iso image later use also option saving loading previous session choices .txt format speed checking modification custom installation required since custom installer contain unwanted components lead smaller installation package faster installation considerable benefit staff still using manual 'roll approach without benefit microsoft sysprep software-minimized cds also allow windows system installed hard disks 512 mb size hfslip open source command line hotfix service pack slipstreaming tool designed update windows 2000 windows xp windows server 2003 installation sources addition hotfixes service packs hfslip slipstreams microsoft updates internet explorer directx 9.0c windows media player windows media codecs also integrates third-party device driver updates including driverpacks hfslip slipstreams replaces original files newer versions found updates microsoft download center hfslip places hotfixes non-standard required special installation procedure svcpack folder installed automatically near end windows setup may 2010 hfslip longer developed main website taken autostreamer free slipstreaming tool windows xp integrate service pack windows xp installation cd-rom image main interface autostreamer wizard guides user slipstreaming process according pc world simplifies once-intimidating chore slipstreaming windows xp cd—producing xp sp2 cd sp1 even vintage original xp cd driverpacks project open source project started wim leers jeff herre leers released first pack 2005 collections device drivers called driverpacks exist cpu chipsets cpu graphics/video ethernet mass storage/removable/usb audio/sound wireless wi-fi/wlan hardware driverpacks base tool integrates driverpacks one uniform windows installation cd works every piece hardware needs additional device drivers installation compatible windows versions based nt 5.1 32-bit kernel windows 2000 windows xp windows server 2003 windows vista windows 7 vlite windows vista 32 64 bit version nlite create cut-down customized installation cd bootable usb stick people reported success using vlite windows 7 vlite fully compatible windows 7 intended support windows 7 sept. 2014 ntlite released support windows 7 later ntlite software tool creator nlite support windows 7 windows 8 windows 8.1 windows 10. ntlite also prevents components installed remove already-installed system using paid version win toolkit create cut-down customized installation cd bootable usb stick windows 7 later versions
[ 3073, 2051, 9353, 6797, 912, 9253, 10149, 4775, 3496, 823, 10192, 10839, 9693, 10084, 4074, 6634, 10860, 5618, 2943 ]
None
9,903
2
Microsoft_Push_Notification_Service:microsoft push notification service microsoft push notification service commonly referred mpns mobile service developed microsoft allows developers send push data servers windows phone applications mpns natively supported applications target windows phone 8 operating system microsoft announced windows notification service windows 8 windows phone 8.1 2011 effectively replacing mpns service mpns used applications installed windows phone 8.1 source code migrated microsoft silverlight application modified target windows phone 8.1 already registered use mpns upgrade mpns natively designed use windows phone 8 applications implement service allows developers send toast notifications well update tile image flip notification text application windows metro start screen tile accomplished developers sending post messages mpns server network request relevant content user typically must allow data notifications received application register mpns notification data mpns implemented send notification data using encrypted channel developer purchases ssl certificate third-party provider uploads private key certificate data microsoft developer portal account otherwise mpns implemented send notification data using unencrypted channel applications utilize unencrypted channels rate size limitations notification requests content updated displayed device limits lifted purchasing ssl certificate switching utilize mpns encryption mpns consists servers internal interfaces maintain store channel uri identifiers device information authenticate post requests received developer servers enqueue deliver requested data mobile devices application registers data notifications receives unique channel uri identifiers mpns network identifier used application developer third-party server reference device particular data delivery request sent mobile device receives channel uri identifier sent developer server stored server sends post message mpns network data delivery channel uri identifier included within message payload along data deliver parameter options specified mpns network authenticate identifier enqueue data delivery mobile device
[ 8262, 11559, 9448, 7983, 7701 ]
Validation
9,904
4
JASBUG:jasbug jasbug security bug disclosed february 2015 affecting core components microsoft windows operating system vulnerability dated back 2000 affected supported editions windows server 2003 windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows rt windows 8.1 windows server 2012 r2 windows rt 8.1 vulnerability allows hackers remotely take control windows devices connect active directory domain jasbug registered common vulnerabilities exposures system industrial control systems cyber emergency response team part department homeland security issued ics-alert-15-041-01 warning control systems owners expedite applying critical jasbug fixes microsoft released two patches ms15-011 ms15-014 address jasbug day vulnerability disclosed fixes took microsoft year develop deploy due complexity jasbug vulnerability time disclosure 300 million computers believed vulnerable exploit jasbug disclosed public microsoft part patch tuesday february 10th 2015 vulnerability initially reported microsoft january 2014 jeff schmidt founder jas global advisors microsoft publicly announced security vulnerability garnered name jasbug reference role jas global advisors played discovering exploit 2014 jas global advisors working engagement internet corporation assigned names numbers icann organization governing standards internet research potential technical issues surrounding rollout new generic top level domains gtlds internet working research jas global advisors business partner simmachines uncovered vulnerability applying big data analytical techniques large technical data sets jasbug principally affects business government users home users less likely affected jasbug use domain-configured computers white house cybersecurity advisor michael daniel spoke importance addressing jasbug meeting information security privacy advisory board national institute standards technology office management budget department homeland security immediately took steps fix vulnerability federal networks suzanne e. spaulding serving secretary national protection programs directorate nppd department homeland security mentioned jasbug february 2015 house representatives hearing touched potential effect dhs funding hiatus aftermath jasbug various government agencies updated technical specifications mitigate exploit risks example united states department veteran affairs decided may 2015 unapprove use windows server 2003 based jasbug risks according microsoft exploit takes advantage group policy receives applies policy data domain-joined system connects domain controller one likely exploitation flaw involves deceiving user domain-configured system network controlled hacker despite potential effect indication jasbug vulnerability ever used cyberhackers access corporate government computers jasbug affects windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows rt windows rt 8.1 windows server 2003 also affected jasbug patch platform microsoft indicated feasible build fix version jasbug also affects windows xp windows 2000 patch made available operating systems longer supported microsoft unlike high-profile vulnerabilities like heartbleed shellshock gotofail poodle jasbug design problem implementation problem making type vulnerability unusual much difficult fix fix required microsoft re-engineer core components operating system add several new features including additional hardening group policy feature organizations use centrally manage windows systems applications user settings active directory environments microsoft able fix jasbug flaw windows server 2003 systems noting architecture properly support fix provided update exist windows server 2003 systems making infeasible build fix windows server 2003 unpatched unpatchable platforms may vulnerable jasbug security firms like symantec recommend organizations use intrusion prevention systems ips monitor network activity possible malicious jasbug traffic
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 6797, 4240, 2709, 1688, 2717, 9375, 9395, 8886, 3789, 5325, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 7418, 281...
Train
9,905
5
Archie_(search_engine):archie search engine archie tool indexing ftp archives allowing people find specific files considered first internet search engine original implementation written 1990 alan emtage postgraduate student mcgill university montreal bill heelan studied concordia university montreal worked mcgill university time archie service began project students volunteer staff mcgill university school computer science 1987 peter deutsch systems manager school emtage heelan asked connect school computer science internet earliest versions archie written alan emtage simply contacted list ftp archives regular basis contacting roughly month waste many resources remote servers requested listing listings stored local files searched using unix grep command name derives word archive without v. alan emtage said contrary popular belief association archie comics despised despite early internet search technologies jughead veronica named characters comics anarchie one earliest graphical ftp clients named ability perform archie searches archie developed tool mass discovery concept simple developers populated engine servers databases anonymous ftp host directories used find specific file titles since list plugged searchable database websites bill heelan peter deutsch wrote script allowing people log search collected information using telnet protocol host archie.mcgill.ca 132.206.2.3 later efficient front- back-ends developed system spread local tool network-wide resource popular service available multiple sites around internet collected data would exchanged neighbouring archie servers servers could accessed multiple ways using local client archie xarchie telnetting server directly sending queries electronic mail later via world wide web interface zenith fame archie search engine accounted 50 montreal internet traffic 1992 emtage along peter deutsch financial help mcgill university formed bunyip information systems world first company expressly founded dedicated providing internet information services licensed commercial version archie search engine used millions people worldwide bill heelan followed bunyip soon together bibi ali sandro mazzucato part so-called archie group group significantly updated archie database indexed web-pages work search engine ceased late 1990s legacy archie server still maintained active historic purposes poland university warsaw interdisciplinary centre mathematical computational modelling
[ 7138, 7364, 3110, 11112, 5492, 119, 3191, 3961 ]
Test
9,906
7
StorSimple:storsimple storsimple privately held company based santa clara california marketing cloud storage storsimple funded venture capital index ventures redpoint ventures ignition partners mayfield fund total 31.5 million founded 2009 former cisco systems brocade communications systems executives ursheet parikh guru pangal storsimple marketed cloud storage gateway computer appliance called cloud-integrated storage cis approach claimed integrate primary storage data deduplication automated tiered storage data across local cloud storage data compression encryption significantly faster data backup disaster recovery times storsimple certified microsoft windows server 2008 vmware integrated cloud storage amazon google microsoft rackspace 2012 storsimple considered forefront genre appliance iscsi interface using 10 gigabit ethernet used serial ata disks well solid-state drives april 2012 storsimple announced replacement 2u 5010 2.5tb raw capacity 7010 5tb raw models 5020 2tb raw capacity 7020 4tb 5520 10tb 4u 7520 20tb october 16 2012 microsoft agreed acquire storsimple finalized november 15 acquisition microsoft integrated storsimple azure product suite refreshed hardware launching 8100 8600 on-premise fixed-configuration storage arrays 2014 8100 offered 10tb 40tb locally depending data compression data de-duplication 200tb maximum capacity inclusive azure cloud storage 8600 offered 40tb 100tb locally 500tb inclusive cloud storage like predecessors appliances combined solid state standard disk drives virtualised version platform running virtual machine azure cloud initially marketed 1100 re-branded 8010 2015 replaced 8020 offering 64tb maximum compared predecessor ’ 30tb
[ 6153, 4236, 10893, 911, 1935, 4623, 8592, 2965, 2328, 4377, 8986, 6307, 6565, 9766, 5159, 6444, 8495, 3121, 6834, 7863, 7352, 3773, 2496, 4289, 11201, 1224, 8520, 4429, 7248, 1362, 467, 9682, 6367, 4194, 11646, 5732, 10090, 3819, 7660, 21...
Validation
9,907
2
86-DOS:86-dos 86-dos discontinued operating system developed marketed seattle computer products scp intel 8086-based computer kit initially known qdos quick dirty operating system name changed 86-dos scp started licensing operating system 1980 86-dos command structure application programming interface imitated digital research cp/m operating system made easy port programs latter system licensed purchased microsoft developed ms-dos pc dos 86-dos created sales seattle computer products 8086 computer kit demonstrated june 1979 shipped november languishing due absence operating system software scp could sell board microsoft standalone disk basic-86 microsoft developed prototype scp hardware scp wanted offer 8086-version cp/m digital research announced release date uncertain first time digital research lagged behind hardware developments two years earlier slow adapt cp/m new floppy disk formats hard disk drives april 1980 scp assigned 24-year-old tim paterson develop substitute cp/m-86 using cp/m-80 manual reference paterson modeled 86-dos architecture interfaces adapted meet requirements intel 8086 16-bit processor easy partially automated source-level translatability many existing 8-bit cp/m programs porting either dos cp/m-86 equally difficult eased fact intel already published method could used automatically translate software intel 8080 processor cp/m designed new 8086 instruction set time made number changes enhancements address saw cp/m shortcomings cp/m cached file system information memory speed required user force update disk removing user forgot disk would become corrupt paterson took safer slower approach updating disk operation cp/m pip command copied files supported several special file names referred hardware devices printers communication ports paterson built names operating system device files program could use gave copying program intuitive name copy rather implementing cp/m file system drew microsoft standalone disk basic-86 file allocation table fat file system mid-1980 scp advertised 86-dos priced 95 owners 1290 8086 board 195 others touted software ability read zilog z80 source code cp/m disk translate 8086 source code promised minor hand correction optimization needed produce 8086 binaries october 1980 ibm developing would become original ibm personal computer cp/m far popular operating system use time ibm felt needed cp/m order compete ibm representatives visited digital research discussed licensing digital research licensing representative dorothy kildall née mcewen hesitated sign ibm non-disclosure agreement although nda later accepted digital research would accept ibm proposal 250,000 exchange many copies ibm could sell insisting usual royalty-based plan later discussions ibm bill gates gates mentioned existence 86-dos ibm representative jack sams told get license microsoft purchased non-exclusive license 86-dos seattle computer products december 1980 25,000 may 1981 hired tim paterson port system ibm pc used slower less expensive intel 8088 processor specific family peripherals ibm watched developments daily submitting 300 change requests accepted product wrote user manual july 1981 month pc release microsoft purchased rights 86-dos scp 50,000 met ibm main criteria looked like cp/m easy adapt existing 8-bit cp/m programs run notably thanks trans command would translate source files 8080 8086 machine instructions microsoft licensed 86-dos ibm became pc dos 1.0 license also permitted microsoft sell dos companies deal spectacularly successful scp later claimed court microsoft concealed relationship ibm order purchase operating system cheaply scp ultimately received 1 million settlement payment digital research founder gary kildall examined pc dos found duplicated cp/m programming interface wanted sue ibm time claimed pc dos product however digital research attorney believe relevant law clear enough sue nonetheless kildall confronted ibm persuaded offer cp/m-86 pc exchange release liability controversy continued surround similarity two systems perhaps sensational claim came jerry pournelle said kildall personally demonstrated dos contained cp/m code entering command dos displayed kildall name pournelle never revealed command nobody come forward corroborate story 2004 book kildall says used encrypted message demonstrate manufacturers copied cp/m say found message dos instead kildall memoir source book pointed well-known interface similarity paterson insists 86-dos software original work denied referring otherwise using cp/m code writing 2004 book appeared sued authors publishers defamation court ruled summary judgment defamation occurred book claims opinions based research provably false following list commands supported 86-dos 1982 ibm asked microsoft release version dos compatible hard disk drive pc dos 2.0 almost complete rewrite dos march 1983 little 86-dos remained enduring element 86-dos primitive line editor edlin remained editor supplied microsoft versions dos june 1991 release ms-dos 5.0 included text-based user interface editor called ms-dos editor based qbasic edlin still used contemporary machines since emulated dos environment windows 10 32 bit seattle computer products 86-dos supported fat12 filesystem range 8-inch 5.25-inch floppy disk drives s-100 floppy disk controller hardware manufactured cromemco tarbell electronics north star computers western digital fd1771-based cromemco tarbell boards supported one-sided single-density soft-sectored drives tarbell double-density board utilizing fd1791 supported well later scp offered advanced floppy disk controllers like disk master series 86-dos take advantage fat id byte bios parameter block bpb later dos versions distinguish different media formats instead different drive letters hard-coded time compilation associated different physical floppy drives sides densities meant depending type disk addressed certain drive letter recognized correctly concept later emulated flexibility driver.sys dos 3.x later versions two logical format variants 86-dos 12-bit fat format existed — original format 16-byte directory entries later format since 86-dos 0.42 32-byte directory entries second one logically compatible fat12 format known since release ms-dos pc dos ms-dos still mount volumes absence bpb falls back retrieve fat id fat entry design fat file system clust 0cluster 0 choose among hard-coded disk geometry profiles formats volume formatted ms-dos would otherwise supported systems typically also formats id located first byte logical sector 1 — volume second sector physical cylinder-head-sector chs address 0/0/2 logical block addressing lba address 1 — since ms-dos assumes single reserved sector boot sector 86-dos reserved sectors area significantly larger whole tracks therefore prototypical fat id located elsewhere disk making impossible ms-dos retrieve even would hard-coded disk profile associated would take larger reserved sectors region 86-dos account cp/m 2 floppy media readable rdcpm 86-dos offer specific support fixed disks third-party solutions form hard disk controllers corresponding i/o system extensions 86-dos available companies like tallgrass technologies making hard disks accessible similar superfloppies within size limits fat12 file system various oem versions ms-dos 1.2x 2.x supported number similar 8.0 fat12 floppy disk formats well although identical supported 86-dos disk formats supported one last versions developed tim paterson microsoft ms-dos 1.25 march 1982 scp gazelle computer scp controller cromemco 16fdc controller default version supported ms-dos-compatible variants 8.0 formats single reserved sector could built provide two extra drive letters read write floppies previous scp 86-dos 8.0 disk formats since 0.42 well 1984 seattle computer products released oem version ms-dos 2.0 scp s-100 computer scp-500 disk master floppy controller added support 5.25 dd/1s 180 kb dd/2s 360 kb fat12 formats supported older formats well although possibly parameters modified compared ms-dos 1.25
[ 6148, 2055, 10257, 6675, 7187, 10776, 25, 8729, 4637, 9762, 5158, 7217, 9784, 10809, 576, 8262, 10333, 97, 8298, 8301, 9840, 7285, 9335, 2168, 1147, 3197, 1150, 4735, 2179, 10883, 6797, 7317, 9366, 6296, 7325, 9887, 5293, 3248, 178, 9907,...
Validation
9,908
5
GNOME_Web:gnome web gnome web called epiphany 2012 free open-source lightweight web browser based webkitgtk developed gnome linux unix-like systems browser forked galeon 2002 developers disagreements galeon growing complexity since developed part gnome core applications uses gnome technology settings applicable follows gnome human interface guidelines gnome web originally used mozilla gecko version 2.28 starting version 2.20 september 2007 switched webkitgtk due technical problems gecko change allows relatively small developer community maintain sufficient level modern web standards support features gnome web includes best integration gnome reuse gnome configuration settings built-in integration gnome keyring securely store passwords first-class support new linux technologies like major gtk versions wayland small package size 2mb debian ubuntu full multimedia support using gstreamer reader mode/reading mode since v3.30 september 2018 mouse gestures smart bookmarks web application integration user desktop management page support google safe browsing since v3.28 2018-03 gnome web default web browser elementary os recommended excellent web application integration security benefits related marco pesenti gritti initiator galeon originally developed epiphany 2002 fork galeon fork occurred divergent aims gritti rest galeon development team new features gritti regarded galeon monolithic design number user-configurable features factors limiting galeon maintainability user base expansion rest galeon developers wanted see features added time gnome project created gnome human interface guidelines promoted simplification user interfaces galeon oriented towards power users developers saw implementation guidelines unacceptable result gritti created new browser based galeon codebase non-mission-critical features removed intended epiphany comply fully gnome human interface guidelines simple user-interface epiphany theme settings uses gnome settings specified gnome control center gritti explained motivations galeon continued fork lost momentum due remaining developers failure keep new features changes mozilla introduced galeon development finally stalled developers decided work set extensions bring galeon advanced features epiphany instead epiphany early philosophy included commitment creating web browser specifically gnome gritti ended work epiphany project gnome team led xan lopez christian persch jean-françois rameau direct project gritti died cancer 23 may 2015 promote epiphany default web browser linux distributions gnome default desktop environment distros offer firefox instead minimalist distributions epiphany installed gnome meta-package packages group first version epiphany released december 24 2002 epiphany initially used gecko layout engine mozilla project display web pages provided gnome integrated graphical user interface gecko instead mozilla xul interface development process epiphany mainly focused numerous small usability improvements notable new text entry widget first appeared 1.8 stable version series new widget supported icons inside text area reduced amount screen space needed present information improved gnome integration second major milestone version 1.0 epiphany development 2.14 release first epiphany release followed gnome version numbering also featured network awareness using networkmanager smart bookmarks-related improvements possibility compiled xulrunner latter critical previously epiphany could use firefox mozilla/seamonkey layout engine provider could installed alongside one browsers xulrunner support made possible install epiphany sole web browser system development process suffered major problems related gecko backend address issues july 2007 epiphany team added support webkit alternative rendering engine epiphany backend development advanced epiphany team announced would stop using gecko rendering engine proceed using webkit size development team complexity porting whole browser new backend caused epiphany re-release version 2.22 bugfixes instead actual development code browser development remained stagnant project team announced epiphany 2.26 would final gecko-based version eventually september 2009 webkit-powered epiphany 2.28 released part gnome 2.28 gnome 3.4 release epiphany renamed web however name epiphany still used internally development bug tracking source code package remains epiphany-browser debian-based distros epiphany redhat-based distros gnome web based webkit browser engine provides support html 4 xhtml css 1 2 substantial degree implementation html5 css 3 features web inspector html javascript debugging tool npapi including adobe flash icedtea-web plug-ins support web reuses gnome frameworks settings therefore user interface theme gnome default theme network settings gnome networkmanager configuration printing gnome printing system settings gsettings gnome default applications settings used internet media types handling built-in preference manager web designed present user basic browser-specific settings advanced configuration done stand-alone gsettings configurator tools gnome default dconf command line dconf-editor graphical follows gnome human interface guidelines follows platform-wide design changes example web 3.4 release menu application-wide actions moved gnome shell top panel application menu menubar replaced super menu button triggers display window-specific menu entries browsers feature hierarchical folder-based bookmark system web uses categorized bookmarks single bookmark web exist multiple categories web browsers gnome computer software special category includes bookmarks yet categorized another innovative concept supported web though originally galeon smart bookmarks take single argument specified address bar textbox toolbar bookmarks along browsing history accessed address bar find-as-you-type manner gnome web extensible official third-party extensions version 3.6 plug-in system called web extensions package distributed developers gnome web contained official extensions version 3.8 system removed due problems stability maintainability popular extensions ad blocking moved core application instead since gnome 3.2 released september 2011 web allows creating application launchers web applications subsequent invocation launcher brings plain site-specific browser single instance web limited one domain off-site links opening normal browser launcher created way accessible desktop limited gnome shell instance may used unity used ubuntu feature facilitates integration desktop world wide web goal web developers similar features found windows version google chrome purpose mozilla foundation previously developed standalone application mozilla prism superseded project chromeless web applications managed within epiphany main instance applications deleted page accessible special uri applications approach supposed temporary solution common gnome-wide application management intended implemented gnome 3.4 rolled since gnome 3.26 web support firefox sync allows users sync bookmarks history passwords open tabs firefox sync shared copy firefox web user signs firefox sync since gnome 3.28 gnome web support google safe browsing help prevent users visiting malicious websites component gnome desktop environment web neither software hardware dependencies beyond gnome platform though gnome project list minimum system requirements states gnome 3 run modern computer gnome web run many hardware platforms including i386 amd64 several instruction set architectures reviewing webkit-powered epiphany 2.28 september 2009 ryan paul ars technica said epiphany quite snappy gnome 2.28 scores 100/100 acid3 test using webkit help differentiate epiphany firefox shipped default browser major linux distributors reviewing epiphany 2.30 july 2010 jack wallen described efficient different noted problem crashes first started working epiphany crashed sites visited little research little debugging realized issue javascript epiphany current release strange reason n't like javascript way around disable javascript yes means lot features wo n't work lot sites – also means sites load faster wo n't prone issues like crashing browser wallen concluded positively browser although epiphany n't fully replaced chrome firefox one-stop-shop browser use much would previously small footprint fast startup clean interface march 2011 veronica henry reviewed epiphany 2.32 saying fair would hard sell primary desktop browser users fact n't even setting let designate default browser instance need fire lighting-fast browser quick surfing epiphany trick noted though still use firefox primary browser lately seems run snail pace one first things noticed epiphany quickly launches subsequent page loads system equally fast henry criticized epiphany short list extensions singling lack firebug deficiency web instead supports web inspector offered webkit engine similar functionality april 2012 ryan paul ars technica used web example criticism gnome 3.4 design decisions aside poor initial discoverability panel menu model works reasonably well simple applications ... unfortunately n't scale well complex applications best example approach pose difficulties gnome default web browser ... application functionality split across two completely separate menus constitute usability improvement addressed later versions single unified menu october 2016 review bertel king jr. noted makeuseof later versions offer best integration find gnome shell lacks add-ons found mainstream browsers users like minimalism speed tab isolation prevents one misbehaving site crashing entire browser
[ 513, 6657, 9736, 10255, 2579, 6171, 2076, 9757, 7713, 6691, 3110, 6694, 10791, 9770, 559, 2611, 4661, 3639, 10808, 3643, 9275, 64, 3649, 5707, 4177, 10834, 5205, 6231, 8281, 6747, 6237, 1642, 9834, 9841, 115, 9843, 3189, 3191, 119, 4728, ...
None
9,909
5
Simple_Mail_Transfer_Protocol:simple mail transfer protocol simple mail transfer protocol smtp communication protocol electronic mail transmission internet standard smtp first defined 1982 updated 2008 extended smtp additions protocol variety widespread use today mail servers message transfer agents use smtp send receive mail messages proprietary systems microsoft exchange ibm notes webmail systems outlook.com gmail yahoo mail may use non-standard protocols internally use smtp sending receiving email outside systems smtp servers commonly use transmission control protocol port number 25 user-level email clients typically use smtp sending messages mail server relaying typically submit outgoing email mail server port 587 465 per rfc 8314 retrieving messages imap pop3 standard proprietary servers also often implement proprietary protocols e.g. exchange activesync various forms one-to-one electronic messaging used 1960s users communicated using systems developed specific mainframe computers computers interconnected especially u.s. government arpanet standards developed permit exchange messages different operating systems smtp grew standards developed 1970s smtp traces roots two implementations described 1971 mail box protocol whose implementation disputed discussed rfcs sndmsg program according ray tomlinson bbn invented tenex computers send mail messages across arpanet fewer 50 hosts connected arpanet time implementations include ftp mail mail protocol 1973 development work continued throughout 1970s arpanet transitioned modern internet around 1980 jon postel proposed mail transfer protocol 1980 began remove mail reliance ftp smtp published november 1981 also postel smtp standard developed around time usenet one-to-many communication network similarities smtp became widely used early 1980s time complement unix unix copy program uucp mail better suited handling email transfers machines intermittently connected smtp hand works best sending receiving machines connected network time use store forward mechanism examples push technology though usenet newsgroups still propagated uucp servers uucp mail transport virtually disappeared along bang paths used message routing headers sendmail released 4.1cbsd right one first mail transfer agents implement smtp time bsd unix became popular operating system internet sendmail became common mta mail transfer agent popular smtp server programs include postfix qmail novell groupwise exim novell netmail microsoft exchange server oracle communications messaging server message submission smtp-auth introduced 1998 1999 describing new trends email delivery originally smtp servers typically internal organization receiving mail organization outside relaying messages organization outside time went smtp servers mail transfer agents practice expanding roles become message submission agents mail user agents relaying mail outside organization e.g company executive wishes send email trip using corporate smtp server issue consequence rapid expansion popularity world wide web meant smtp include specific rules methods relaying mail authenticating users prevent abuses relaying unsolicited email spam work message submission originally started popular mail servers would often rewrite mail attempt fix problems example adding domain name unqualified address behavior helpful message fixed initial submission dangerous harmful message originated elsewhere relayed cleanly separating mail submission relay seen way permit encourage rewriting submissions prohibiting rewriting relay spam became prevalent also seen way provide authorization mail sent organization well traceability separation relay submission quickly became foundation modern email security practices protocol started purely ascii text-based deal well binary files characters many non-english languages standards multipurpose internet mail extensions mime developed encode binary files transfer smtp mail transfer agents mtas developed sendmail also tended implemented 8-bit-clean alternate send eight strategy could used transmit arbitrary text data 8-bit ascii-like character encoding via smtp mojibake still problem due differing character set mappings vendors although email addresses still allowed ascii 8-bit-clean mtas today tend support 8bitmime extension permitting binary files transmitted almost easily plain text recently smtputf8 extension created support utf-8 text allowing international content addresses non-latin scripts like cyrillic chinese many people contributed core smtp specifications among jon postel eric allman dave crocker ned freed randall gellens john klensin keith moore email submitted mail client mail user agent mua mail server mail submission agent msa using smtp tcp port 587 mailbox providers still allow submission traditional port 25 msa delivers mail mail transfer agent mail transfer agent mta often two agents instances software launched different options machine local processing done either single machine split among multiple machines mail agent processes one machine share files processing multiple machines transfer messages using smtp machine configured use next machine smart host process mta smtp server right boundary mta uses domain name system dns look mail exchanger record mx record recipient domain part email address right mx record contains name target host based target host factors mta selects exchange server see article mx record mta connects exchange server smtp client message transfer occur single connection two mtas series hops intermediary systems receiving smtp server may ultimate destination intermediate relay stores forwards message gateway may forward message using protocol smtp hop formal handoff responsibility message whereby receiving server must either deliver message properly report failure final hop accepts incoming message hands mail delivery agent mda local delivery mda saves messages relevant mailbox format sending reception done using one multiple computers diagram mda depicted one box near mail exchanger box mda may deliver messages directly storage forward network using smtp protocol local mail transfer protocol lmtp derivative smtp designed purpose delivered local mail server mail stored batch retrieval authenticated mail clients muas mail retrieved end-user applications called email clients using internet message access protocol imap protocol facilitates access mail manages stored mail post office protocol pop typically uses traditional mbox mail file format proprietary system microsoft exchange/outlook lotus notes/domino webmail clients may use either method retrieval protocol often formal standard smtp defines message transport message content thus defines mail envelope parameters envelope sender header except trace information body message std 10 define smtp envelope std 11 define message header body formally referred internet message format smtp connection-oriented text-based protocol mail sender communicates mail receiver issuing command strings supplying necessary data reliable ordered data stream channel typically transmission control protocol tcp connection smtp session consists commands originated smtp client initiating agent sender transmitter corresponding responses smtp server listening agent receiver session opened session parameters exchanged session may include zero smtp transactions smtp transaction consists three command/reply sequences besides intermediate reply data server reply either positive 2xx reply codes negative negative replies permanent 5xx codes transient 4xx codes reject permanent failure client send bounce message server received drop positive response followed message discard rather delivery initiating host smtp client either end-user email client functionally identified mail user agent mua relay server mail transfer agent mta smtp server acting smtp client relevant session order relay mail fully capable smtp servers maintain queues messages retrying message transmissions resulted transient failures mua knows outgoing mail smtp server configuration relay server typically determines server connect looking mx mail exchange dns resource record recipient domain name mx record found conformant relaying server instead looks record relay servers also configured use smart host relay server initiates tcp connection server well-known port smtp port 25 connecting msa port 587 main difference mta msa connecting msa requires smtp authentication smtp delivery protocol normal use mail pushed destination mail server next-hop mail server arrives mail routed based destination server individual user addressed protocols post office protocol pop internet message access protocol imap specifically designed use individual users retrieving messages managing mail boxes permit intermittently-connected mail server pull messages remote server demand smtp feature initiate mail queue processing remote server see remote message queue starting pop imap unsuitable protocols relaying mail intermittently-connected machines designed operate final delivery information critical correct operation mail relay mail envelope removed remote message queue starting feature smtp permits remote host start processing mail queue server may receive messages destined sending turn command feature however deemed insecure extended etrn command operates securely using authentication method based domain name system information email client needs know ip address initial smtp server given part configuration usually given dns name server deliver outgoing messages behalf user server administrators need impose control clients use server enables deal abuse example spam two solutions common use system isp smtp server allow access users outside isp network precisely server may allow access users ip address provided isp equivalent requiring connected internet using isp mobile user may often network normal isp find sending email fails configured smtp server choice longer accessible system several variations example organisation smtp server may provide service users network enforcing firewalling block access users wider internet server may perform range checks client ip address methods typically used corporations institutions universities provided smtp server outbound mail use internally within organisation however bodies use client authentication methods described user mobile may use different isps connect internet kind usage restriction onerous altering configured outbound email smtp server address impractical highly desirable able use email client configuration information need change modern smtp servers typically require authentication clients credentials allowing access rather restricting access location described earlier flexible system friendly mobile users allows fixed choice configured outbound smtp server smtp authentication often abbreviated smtp auth extension smtp order log using authentication mechanism server accessible wider internet enforce kinds access restrictions known open relay generally considered bad practice worthy blacklisting communication mail servers generally uses standard tcp port 25 designated smtp mail clients however generally n't use instead using specific submission ports mail services generally accept email submission clients one port 2525 others may used individual providers never officially supported internet service providers block outgoing port 25 traffic customers anti-spam measure reason businesses typically configure firewall allow outgoing port 25 traffic designated mail servers typical example sending message via smtp two mailboxes alice theboss located mail domain example.com localhost.com reproduced following session exchange example conversation parts prefixed c server client respectively labels part exchange message sender smtp client establishes reliable communications channel message receiver smtp server session opened greeting server usually containing fully qualified domain name fqdn case smtp.example.com client initiates dialog responding codice_1 command identifying command parameter fqdn address literal none available client notifies receiver originating email address message codice_2 command also return bounce address case message delivered example email message sent two mailboxes smtp server one recipient listed cc header fields corresponding smtp command codice_3 successful reception execution command acknowledged server result code response message e.g. 250 ok transmission body mail message initiated codice_4 command transmitted verbatim line line terminated end-of-data sequence sequence consists new-line cr lf single full stop period followed another new-line since message body contain line period part text client sends two periods every time line starts period correspondingly server replaces every sequence two periods beginning line single one escaping method called dot-stuffing server positive reply end-of-data exemplified implies server taken responsibility delivering message message doubled communication failure time e.g due power shortage sender received 250 reply must assume message delivered hand receiver decided accept message must assume message delivered thus time span agents active copies message try deliver probability communication failure occurs exactly step directly proportional amount filtering server performs message body often anti-spam purposes limiting timeout specified 10 minutes codice_5 command ends session email recipients located elsewhere client would codice_5 connect appropriate smtp server subsequent recipients current destination queued information client sends codice_1 codice_2 commands added seen example code additional header fields message receiving server adds codice_9 codice_10 header field respectively clients implemented close connection message accepted codice_11 last two lines may actually omitted causes error server trying send codice_12 reply original smtp protocol supported unauthenticated unencrypted ascii text communications susceptible man middle attacks spoofing spamming requiring encode binary data transmission number optional extensions specify various mechanisms address problems clients learn server supported options using codice_13 greeting exemplified instead original codice_1 example clients fall back codice_1 server support smtp extensions modern clients may use esmtp extension keyword codice_16 query server maximum message size accepted older clients servers may try transfer excessively sized messages rejected consuming network resources including connect time network links paid minute users manually determine advance maximum size accepted esmtp servers client replaces codice_1 command codice_13 command thus smtp2.example.com declares accept fixed maximum message size larger 14,680,064 octets 8-bit bytes simplest case esmtp server declares maximum codice_16 immediately receiving codice_13 according however numeric parameter codice_16 extension codice_13 response optional clients may instead issuing codice_2 command include numeric estimate size message transferring server refuse receipt overly-large messages original smtp supports transport textual data therefore binary data needs encoded text transfer decoded leading increased size transit 8bitmime command developed alleviate limitation standardized 1994 obsoleted 2011 corresponding new std 71 facilitates transparent exchange e-mail messages containing octets outside seven-bit ascii character set prior availability 8bitmime implementations mail user agents employed several techniques cope seven-bit limitation binary-to-text encodings including ones provided mime utf-7 however workarounds inflates required amount data transmission non-ascii text non-esmtp servers allowed sending 8-bit characters risky send data server whose 8-bit capabilities unknown on-demand mail relay odmr smtp extension standardized allows intermittently-connected smtp server receive email queued connected original smtp supports email addresses composed ascii characters inconvenient users whose native script latin based use diacritic ascii character set limitation alleviated via extensions enabling utf-8 address names introduced experimental codice_24 command later superseded introduced codice_25 command extensions provide support multi-byte non-ascii characters email addresses diacritics language characters greek chinese current support limited strong interest broad adoption related rfcs countries like china large user base latin ascii foreign script mail delivery occur plain text encrypted connections however communicating parties might know advance party ability use secure channel smtp authentication often abbreviated smtp auth describes mechanism client log using authentication mechanism supported server mainly used submission servers authentication mandatory multiple rfcs exist provide different variations mechanism update smtp extensions describe starttls command enables server tell client supports encrypted communications client request upgrade secure channel starttls effective passive observation attacks since starttls negotiation happens plain text active attacker trivially remove starttls command attack sometimes called striptls client would think server send starttls header support starttls server would think client respond starttls header thus support starttls note starttls also defined imap pop3 rfcs protocols serve different purposes smtp used communication message transfer agents imap pop3 end clients message transfer agents electronic frontier foundation maintains starttls everywhere list similarly https everywhere list allows relying parties discover others supporting secure communication without prior communication newer 2018 called smtp mta strict transport security mta-sts aims addresses problem active adversary defining protocol mail servers declare ability use secure channels specific files server specific dns txt records relying party would regularly check existence record cache amount time specified record never communicate insecure channels record expires note mta-sts records apply smtp traffic mail servers communications end client mail server protected http strict transport security https april 2019 google mail announced support mta-sts number protocols allows secure delivery messages fail due misconfigurations deliberate active interference leading undelivered messages delivery unencrypted unauthenticated channels smtp tls reporting describes reporting mechanism format sharing statistics specific information potential failures recipient domains recipient domains use information detect potential attacks diagnose unintentional misconfigurations april 2019 google mail announced support smtp tls reporting original design smtp facility authenticate senders check servers authorized send behalf result email spoofing possible commonly used email spam phishing occasional proposals made modify smtp extensively replace completely one example internet mail 2000 neither made much headway face network effect huge installed base classic smtp instead mail servers use range techniques including domainkeys identified mail sender policy framework dmarc dnsbls greylisting reject quarantine suspicious emails
[ 10242, 11269, 1030, 10248, 8202, 10254, 9233, 8211, 9747, 6681, 6682, 5659, 10269, 10271, 8224, 6177, 6689, 9251, 2596, 2085, 10786, 7208, 44, 7214, 3631, 6704, 8238, 562, 1075, 1586, 2101, 4660, 5685, 9269, 11321, 5179, 3133, 574, 1086, ...
Test
9,910
2
Windows_Preinstallation_Environment:windows preinstallation environment windows preinstallation environment also known windows pe winpe lightweight version windows used deployment pcs workstations servers troubleshooting operating system offline intended replace ms-dos boot disks booted via usb flash drive pxe ipxe cd-rom hard disk traditionally used large corporations oems preinstall windows client operating systems pcs manufacturing widely available free charge via windows automated installation kit waik winpe originally intended used pre-installation platform deploying microsoft windows operating systems specifically replace dos respect winpe following uses package used developer testing recovery cd/dvd system administrators many customized winpe boot cds packaged third-party applications different uses available volunteers via internet package also used base forensics investigation either capture disk image run analysis tools without mounting available disks thus changing state version 2.0 introduced number improvements extended availability winpe customers corporate enterprise customers downloading installing microsoft windows automated installation kit waik originally designed built small team engineers microsoft windows deployment team including vijay jayaseelan ryan burkhardt richard bond following versions known exist windows recovery environment winre set tools based windows pe help diagnose recover serious errors may preventing windows booting successfully windows installed along windows vista later may booted hard disks optical media operating system installation disc pxe e.g windows deployment services copy windows included installation media aforementioned operating systems successor recovery console windows features include starting windows server 2012 following additional options added windows 10 adds following volumes encrypted bitlocker mounted recovery key available windows recovery environment also installed hard drive partition oems customized additional tools separate system recovery tool restoring computer back original state windows vista sp1 users create bootable cd containing recovery environment microsoft diagnostics recovery toolset dart sold part microsoft desktop optimization pack yet another toolset based windows pe performs diagnostic recovery offline copy windows manage files edit windows registry uninstall previously installed windows updates scan system malware restore deleted files
[ 2568, 11283, 4637, 9762, 11301, 6697, 1581, 582, 1098, 7754, 10839, 8798, 10338, 8296, 5225, 11368, 8299, 7796, 6265, 8315, 636, 1150, 639, 641, 651, 6797, 10896, 9874, 2196, 10900, 6297, 7840, 9377, 4771, 2213, 3250, 5300, 6340, 10957, 3...
None
9,911
3
Processor_register:processor register computer architecture processor register quickly accessible location available computer central processing unit cpu registers usually consist small amount fast storage although registers specific hardware functions may read-only write-only registers typically addressed mechanisms main memory may cases assigned memory address e.g dec pdp-10 ict 1900 almost computers whether load/store architecture load data larger memory registers used arithmetic operations manipulated tested machine instructions manipulated data often stored back main memory either instruction subsequent one modern processors use either static dynamic ram main memory latter usually accessed via one cache levels processor registers normally top memory hierarchy provide fastest way access data term normally refers group registers directly encoded part instruction defined instruction set however modern high-performance cpus often duplicates architectural registers order improve performance via register renaming allowing parallel speculative execution modern x86 design acquired techniques around 1995 releases pentium pro cyrix 6x86 nx586 amd k5 common property computer programs locality reference refers accessing values repeatedly holding frequently used values registers improve performance makes fast registers caches meaningful allocating frequently used variables registers critical program performance register allocation performed either compiler code generation phase manually assembly language programmer registers normally measured number bits hold example 8-bit register 32-bit register 64-bit register even instruction sets registers operate various modes breaking storage memory smaller ones 32-bit four 8-bit one instance multiple data vector one dimensional array data loaded operated upon time typically implemented adding extra registers map memory bigger one processors ability execute single instruction multiple data called vector processors processor often contains several kinds registers classified according content instructions operate hardware registers similar occur outside cpus architectures sparc mips first last register integer register file pseudo-register way hardwired always return zero read mostly simplify indexing modes overwritten alpha also done floating-point register file result register files commonly quoted one register many actually usable example 32 registers quoted 31 fit within definition register following table shows number registers several mainstream cpu architectures note x86-compatible processors stack pointer esp counted integer register even though limited number instructions may used operate contents similar caveats apply architectures although listed architectures different almost basic arrangement known von neumann architecture first proposed hungarian-american mathematician john von neumann also noteworthy number registers gpus much higher cpus number registers available processor operations performed using registers significant impact efficiency code generated optimizing compilers strahler number expression tree gives minimum number registers required evaluate expression tree
[ 4098, 1029, 7173, 9739, 8716, 4112, 2066, 7699, 5655, 4121, 10779, 8732, 10781, 10786, 6181, 2599, 8231, 3630, 4144, 6705, 7218, 8761, 2620, 2623, 2113, 7234, 2115, 8773, 3142, 585, 74, 2638, 1103, 7760, 2647, 602, 7770, 604, 3164, 5725, ...
None
9,912
2
List_of_typefaces_included_with_macOS:list typefaces included macos list fonts contains every font shipped mac os x 10.0 macos 10.14 including shipped language-specific updates apple primarily korean chinese fonts fonts shipped mac os x 10.5 please see apple documentation following system fonts added yosemite least following system fonts added el capitan least following system fonts added sierra high sierra added several system fonts additional weights existing system fonts new fonts provided mojave number fonts also provided imovie ilife idvd apple applications hidden folders sole use applications reason fonts hidden unknown licensing issues suggested cause however may easily installed use applications copying library directories installing third-party font notable hidden fonts macos include bank gothic bodoni century gothic century schoolbook garamond several cuts lucida monotype twentieth century
[ 11521, 2819, 1796, 7171, 3719, 4615, 10888, 11402, 9100, 5647, 10512, 1042, 9109, 1686, 7318, 3228, 11037, 2207, 1439, 1699, 166, 811, 3371, 5292, 1710, 6700, 8877, 4657, 1074, 10036, 3766, 2232, 9529, 11257, 9406, 10432, 1729, 6849, 4933, ...
Validation
9,913
3
Qualcomm_Snapdragon:qualcomm snapdragon snapdragon suite system chip soc semiconductor products mobile devices designed marketed qualcomm technologies inc snapdragon central processing unit cpu uses arm risc instruction set single soc may include multiple cpu cores adreno graphics processing unit gpu snapdragon wireless modem hexagon digital signal processor dsp qualcomm spectra image signal processor isp software hardware support smartphone global positioning system gps camera video audio gesture recognition ai acceleration snapdragon semiconductors embedded devices various systems including android windows phone netbooks also used cars wearable devices devices addition processors snapdragon line includes modems wi-fi chips mobile charging products first snapdragon product made available consumer device manufacturers qsd8250 released december 2007 included first 1 ghz processor mobile phones qualcomm introduced krait microarchitecture second generation snapdragon socs 2011 allowing processor core adjust speed based device needs 2013 consumer electronics show qualcomm introduced first snapdragon 800 series renamed prior models 200 400 600 series several new iterations introduced since snapdragon 805 810 615 410 qualcomm re-branded modem products snapdragon name december 2014. asus hp lenovo begun selling laptops snapdragon-based cpus running windows 10 name always connected pcs marking entry pc market qualcomm arm architecture qualcomm announced developing scorpion central processing unit cpu november 2007 snapdragon system chip soc announced november 2006 included scorpion processor well semiconductors also included qualcomm first custom hexagon digital signal processor dsp according qualcomm spokesperson named snapdragon snap dragon sounded fast fierce following month qualcomm acquired airgo networks undisclosed amount said airgo 802.11a/b/g 802.11n wi-fi technology would integrated snapdragon product suite early versions scorpion processor core design similar cortex-a8 first snapdragon shipments qsd8250 november 2007 according cnet snapdragon claim fame first 1 ghz mobile processor smartphones time using 500 mhz processors first generation snapdragon products supported 720p resolution 3d graphics 12-megapixel camera november 2008 15 device manufacturers decided embed snapdragon semiconductors consumer electronics products november 2008 qualcomm announced would also compete intel netbook processor market dual-core snapdragon system-on-chips planned late 2009 demonstrated snapdragon processor consumed less power intel chips announced around time claimed would also cost less released month qualcomm introduced snapdragon-based prototype netbook called kayak used 1.5 ghz processors intended developing markets may 2009 java se ported optimized snapdragon november 2009 computex taipei show qualcomm announced qsd8650a addition snapdragon product suite based 45 nanometer manufacturing processes featured 1.2 ghz processor lower power consumption prior models late 2009 smartphone manufacturers announced would using snapdragon socs acer liquid metal htc hd2 toshiba tg01 sony ericsson xperia x10 lenovo announced first netbook product using snapdragon socs december according pc world mobile devices using snapdragon better battery life smaller size using socs june 2010 snapdragon chips embedded 20 available consumer devices incorporated 120 product designs development apple dominant market position smartphones time incorporate snapdragon products success snapdragon therefore relied competing android phones google nexus one htc incredible challenging apple market position android devices end taking market share iphone predominantly used snapdragon unconfirmed widely circulated report speculating apple going start using snapdragon socs verizon-based iphones 2012 apple still using ax semiconductor designs support windows phone 7 operating systems added snapdragon october 2010 2011 snapdragon embedded hewlett packard webos devices 50 market share 7.9 billion smartphone processor market 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips embedded 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm release competing 64-bit product despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung stop using snapdragon galaxy s6 flagship phone galaxy note 5 phablet snapdragon chips also used android-based smartwatches snapdragon products also used virtual reality products vehicles like maserati quattroporte cadillac xts applications june 2010 qualcomm began sampling third generation snapdragon products two dual-core 1.2 ghz system chips soc called mobile station modem msm 8260 8660 8260 gsm umts hspa+ networks 8660 cdma2000 evdo networks november qualcomm announced msm8960 lte networks early 2011 qualcomm announced new processor architecture called krait used arm v7 instruction set based qualcomm processor design processors called s4 feature named asynchronous symmetrical multi-processing asmp meaning processor core adjusted clock speed voltage based device activity order optimize battery usage prior models renamed s1 s2 s3 distinguish generation s4-based generation snapdragon socs began shipping product manufacturers msm8960 february 2012 benchmark tests anandtech msm8960 better performance processor tested overall system benchmark 8960 obtained score 907 compared 528 658 galaxy nexus htc rezound respectively quadrant benchmark test assesses raw processing power dual-core krait processor score 4,952 whereas quad-core tegra 3 4,000 quad-core version apq8064 made available july 2012 first snapdragon soc use qualcomm adreno 320 graphics processing unit gpu adoption snapdragon contributed qualcomm transition wireless modem company one also produces wider range hardware software mobile devices july 2011 qualcomm acquired certain assets gesturetek order incorporate gesture recognition intellectual property snapdragon socs mid-2012 qualcomm announced snapdragon software development kit sdk android devices uplinq developer conference sdk includes tools facial recognition gesture recognition noise cancellation audio recording november qualcomm acquired assets epos development order integrate stylus gesture recognition technology snapdragon products also collaborated microsoft optimize windows phone 8 snapdragon semiconductors 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips powered 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm rush competing 64-bit solution despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung ditching snapdragon galaxy s6 flagship phone entry-level 200 series expanded six new processors using 28 nanometer manufacturing dual quad-core options june 2013 entry-level snapdragon 210 intended low-cost phones announced september 2014 qualcomm first attempt 64-bit system chip created new in-house architecture later models showed better thermal performance especially compared snapdragon models launched 2015 like snapdragon 820 early 2016 qualcomm launched snapdragon 820 arm 64-bit quad-core processor using in-house designed kryo cores qualcomm launched updated snapdragon 821 later year higher clock speeds slightly better performance snapdragon 820 family uses samsung 14-nanometer finfet process qualcomm also released qualcomm snapdragon neural processing engine sdk first ai acceleration smartphones qualcomm announced octa-core snapdragon 835 soc november 17 2016 released following year used kryo 280 cores built using samsung 10-nanometer finfet process initial launch due samsung role manufacturing chip mobile division also acquired initial inventory chip means phone maker able manufacture products containing snapdragon 835 samsung released flagship device year galaxy s8 computex 2017 may qualcomm microsoft announced plans launch snapdragon-based laptops running windows 10 partnered hp lenovo asus release slim portables 2-in-1 devices powered snapdragon 835 december 2017 qualcomm announced octa-core snapdragon 845 uses 10-nanometer manufacturing process earlier snapdragon 835 introduced new processor architecture kryo 385 designed better battery life photography use artificial intelligence apps early 2018 qualcomm introduced 7 series sits 6 8 series terms pricing performance 700 launched octa-core models snapdragon 710 712 using kryo 360 processor architecture built 10-nanometer manufacturing process following year 2019 qualcomm released new variants mobile processors snapdragon 855 replacing 845 snapdragon 855 competes high end system chip solutions like apple a12 kirin 980 snapdragon 855 features kryo 485 cores built tsmc 7-nanometer process along snapdragon 730 730g replacing 710 712 newer 730 730g feature kryo 460 cores built samsung 8-nanometer process snapdragon system chip products typically include graphics processing unit gpu global positioning system gps cellular modem integrated single package software included operates graphics video picture-taking 19 different snapdragon processors 400 600 800 product families spanning low high-end respectively well wi-fi mobile charging products components include adreno graphics processing qualcomm hexagon dsp processors using qualcomm s4 processor architecture addition smartphones 400 series used smart watches 602a intended electronics cars current snapdragon naming scheme implemented snapdragon 800 family announced 2013 consumer electronics show prior models renamed 200 400 600 series new snapdragon 600 also released mid-year embedded new android devices 400 family entry-level 600 mass-market mid-range 800 family high-end flagship phones snapdragon 805 released november 410 intended low-cost phones developing nations announced following month january 2014 qualcomm introduced modified version snapdragon 600 called 602a intended in-car infotainment screens backup cameras driver assistance products quad-core snapdragon 610 eight-core 615 announced february 2014 snapdragon 808 810 announced april 2014 snapdragon 835 announced november 2017 first qualcomm soc built 10 nm architecture qualcomm new flagship chip 2018 845 announced december 2017 according qualcomm 845 25-30 faster 835 february 2015 qualcomm re-branded stand-alone modem products snapdragon name distinguished socs using x designation x7 x12 modem first snapdragon modem 5g networks x50 announced late 2016 followed 2gbs x24 modem 7 nanometer manufacturing process announced february 2018 according cnet phones growing us market share ranked highly cnet reviews due responsiveness snapdragon socs also used windows phones phones entering market mid-2013 lg g2 first phone market using snapdragon 800 august 2013 2017 660 630 replaced 653 626 mid-range models several chips 400 product family revved february 2017 qualcomm introduced snapdragon x20 intended 5g cell phone networks two new chips 802.11ax commercial wi-fi networks followed addition 636 600 product family october qualcomm said would 40 percent faster 630 august 2018 snapdragon 632 439 429 released new soc aimed mid-range devices moto g6 play huawei honor 7a nokia 5 december 2018 qualcomm announced 8cx snapdragon tech summit 2018 8cx qualcomm first soc specifically designed always connected pc acpc platform unlike qualcomm past acpc socs respective mobile socs higher tdp qualcomm also showcased snapdragon x50 5g modem snapdragon 855 qtm052 mmwave antenna module february 2019 qualcomm announced snapdragon x55 5g modem qtm525 mmwave antenna module qet6100 envelope tracker new qat3555 antenna impedance tuner benchmark tests snapdragon 800 processor pc magazine found processing power comparable similar products nvidia benchmarks snapdragon 805 found adreno 420 gpu resulted 40 percent improvement graphics processing adreno 330 snapdragon 800 though slight differences processor benchmarks benchmarks snapdragon 801 inside htc one found bump around benchmark improvements 800 2015 samsung decision use snapdragon 810 galaxy s6 significant detrimental impact snapdragon revenues reputation benchmark tests ars technica confirmed rumors 810 under-performed lower-end models overheating issues qualcomm spokesperson said tests done early versions 810 n't ready commercial use updated version released found moderately improve thermal throttling gpu clock speeds memory latency memory bandwidth tested commercial product xiaomi mi note pro additionally 820/821 835 845 performed substantially better qualcomm led industry sustained gpu performance perf/w release 820 release apple a12
[ 3585, 7170, 8196, 8719, 4624, 8720, 11282, 9235, 11289, 4124, 9244, 1057, 38, 4139, 8237, 9774, 2097, 5681, 8250, 8253, 7745, 7234, 7235, 7747, 2635, 5721, 99, 8812, 11374, 10361, 6268, 638, 644, 4228, 10884, 9863, 11396, 8842, 5262, 146,...
Test
9,914
9
Partial_application:partial application computer science partial application partial function application refers process fixing number arguments function producing another function smaller arity given function formula_1 might fix 'bind first argument producing function type formula_2 evaluation function might represented formula_3 note result partial function application case function takes two arguments partial application sometimes incorrectly called currying related distinct concept intuitively partial function application says fix first arguments function get function remaining arguments example function div x x div parameter x fixed 1 another function div div 1 1/y function inv returns multiplicative inverse argument defined inv 1/ practical motivation partial application often functions obtained supplying arguments function useful example many languages function operator similar codice_1 partial application makes easy define functions example creating function represents addition operator 1 bound first argument languages ml haskell functions defined curried form default supplying fewer total number arguments referred partial application languages first-class functions one define codice_2 codice_3 codice_4 perform currying partial application explicitly might incur greater run-time overhead due creation additional closures haskell use efficient techniques scala implements optional partial application placeholder e.g returns incrementing function scala also support multiple parameter lists currying e.g clojure implements partial application using codice_5 function defined core library c++ standard library provides codice_6 return function object result partial application given arguments given function java codice_7 partially applies function first argument perl 6 codice_8 method creates new function fewer parameters python standard library module codice_9 includes codice_5 function allowing positional named argument bindings returning new function xquery argument placeholder codice_11 used non-fixed argument partial function application simply-typed lambda calculus function product types λ partial application currying uncurrying defined note codice_2 codice_4 codice_2
[ 4769, 3876, 5031, 6775, 7386, 8554, 5677, 11610, 1936, 10581, 5783, 10616, 3705, 6074, 5917 ]
Test
9,915
9
AMPL:ampl mathematical programming language ampl algebraic modeling language describe solve high-complexity problems large-scale mathematical computing i.e. large-scale optimization scheduling-type problems developed robert fourer david gay brian kernighan bell laboratories ampl supports dozens solvers open source commercial software including cbc cplex fortmp gurobi minos ipopt snopt knitro lgo problems passed solvers nl files ampl used 100 corporate clients government agencies academic institutions one advantage ampl similarity syntax mathematical notation optimization problems allows concise readable definition problems domain optimization many modern solvers available neos server formerly hosted argonne national laboratory currently hosted university wisconsin madison accept ampl input according neos statistics ampl popular format representing mathematical programming problems ampl features mix declarative imperative programming styles formulating optimization models occurs via declarative language elements sets scalar multidimensional parameters decision variables objectives constraints allow concise description problems domain mathematical optimization procedures control flow statements available ampl support re-use simplify construction large-scale optimization problems ampl allows separation model data ampl supports wide range problem types among ampl invokes solver separate process advantages interaction solver done well-defined nl interface ampl available many popular 32- 64-bit operating systems including linux mac os x unix windows translator proprietary software maintained ampl optimization llc however several online services exist providing free modeling solving facilities using ampl free student version limited functionality free full-featured version academic courses also available ampl used within microsoft excel via solverstudio excel add-in ampl solver library asl allows reading nl files provides automatic differentiation open-source used many solvers implement ampl connection table present significant steps ampl history transportation problem george dantzig used provide sample ampl model problem finds least cost shipping schedule meets requirements markets supplies factories partial list solvers supported ampl
[ 9345, 515, 6797, 1039, 6160, 10641, 9376, 7593, 7983, 8113, 4019, 823, 6718, 5830, 329, 4042, 587, 2901, 9431, 479, 5347, 5612, 1133, 5492, 8057, 2045 ]
Test
9,916
7
Service-oriented_middleware:service-oriented middleware service-oriented middleware som aids distributed object middleware dom systems concept services service context number objects behavior objects use predefined interface make service available systems/services som defines communication protocols services provides location- migration-transparent access services thus supporting simple integration services beyond platform boundaries one example som sun oracle jini system called apache river project architectures belonging field web services also belong category middleware
[ 9665 ]
Test
9,917
3
Quarth:quarth besides arcade version also ports game msx2 built-in scc chip famicom game boy—home releases used quarth name worldwide exception game boy color release europe konami gb collection vol 2 game renamed generic title block game unknown reasons quarth released konami net i-mode service block quarth updated block quarth dx 2001 released without dx suffix 2005 made globally available konami net licensing many i-mode services offered mobile operators europe example available o2 uk o2 ireland telefónica spain 2005 konami also included game nintendo ds title emulated version game released 2006 playstation 2 japan part oretachi geasen zoku sono -series quarth combination tetris -style gameplay fixed shooter space invaders tradition player focus falling blocks action geometrical rather arranging blocks together make row disappearing blocks spaceship positioned bottom screen shoots blocks upwards make falling block pattern squares rectangles blocks arranged properly shape destroyed player awarded points based shape size blocks continue drop top screen various incomplete shapes level progresses blocks drop greater speed frequency also various power-ups could located increase ship speed among bonuses game continues blocks reach dotted line bottom screen whereupon player ship quarthed crushed flat like arcade games game featured multi-player mode arcade demonstrated via split screen player 1 left player 2 right game boy multiplayer required game boy link cable player able view fields game boys msx2 famicom versions two different 2-player modes mode players worked together game mode b arcade split-screen game generally acclaimed many online reviewers though nintendo life gave 6/10
[ 3075, 10855, 10316, 9006, 10931 ]
Validation
9,918
0
Parse_Thicket:parse thicket parse thicket graph represents syntactic structure paragraph text natural language processing parse thicket includes parse tree sentence paragraph plus arcs relations words syntactic parse thickets constructed constituency parse trees dependency parse trees relations link parse trees within parse thicket assess similarity texts question candidate answers parse thickets generalized image parse thicket coreferences entity-entity links shown solid red rhetoric/speech act relations shown dotted red etap parser tree visualization software used compute generalization two parse thickets one needs find maximum common sub-graph sub-thicket
[ 7780 ]
None
9,919
2
Abnormal_end:abnormal end abend also ab normal end abend abnormal termination software program crash usage derives error message ibm os/360 ibm zos operating systems usually capitalized may appear abend common abend 0c7 data exception abend 0cb division zero abends could soft allowing automatic recovery hard terminating activity errors crashes novell netware network operating system usually called abends communities netware administrators sprung around internet abend.org term jocularly claimed derived german word abend meaning evening
[ 903, 8551, 2571, 6319, 5520, 5744, 3474, 7795, 5748, 8852, 11444, 3450, 3323, 10333, 1694, 3615 ]
Test
9,920
3
VM2000:vm2000 vm 2000 hypervisor fujitsu formerly siemens nixdorf informationssysteme designed specifically use bs2000 operating system ebcdic-based operating system allows multiple images bs2000 linux operate s-series computer based ibm system/390 architecture also supports bs2000 linux microsoft windows x86-based sq-series mainframes additionally virtualize bs2000 guests sr- sx-series mainframes based mips sparc respectively
[ 7234, 2179, 36, 9766, 3431, 1707, 823, 6797, 7983, 9137, 3443, 10837, 1399, 3323, 10108, 1503 ]
None
9,921
2
Application_binary_interface:application binary interface computer software application binary interface abi interface two binary program modules often one modules library operating system facility program run user abi defines data structures computational routines accessed machine code low-level hardware-dependent format contrast api defines access source code relatively high-level hardware-independent often human-readable format common aspect abi calling convention determines data provided input read output computational routines examples x86 calling conventions adhering abi may may officially standardized usually job compiler operating system library author however application programmer may deal abi directly writing program mix programming languages achieved using foreign function calls abis cover details complete abi intel binary compatibility standard ibcs allows program one operating system supporting abi run without modifications system provided necessary shared libraries present similar prerequisites fulfilled abis standardize details c++ name mangling exception propagation calling convention compilers platform require cross-platform compatibility embedded-application binary interface eabi specifies standard conventions file formats data types register usage stack frame organization function parameter passing embedded software program use embedded operating system compilers support eabi create object code compatible code generated compilers allowing developers link libraries generated one compiler object code generated another compiler developers writing assembly language code may also interface assembly generated compliant compiler eabis designed optimize performance within limited resources embedded system therefore eabis omit abstractions made kernel user code complex operating systems example dynamic linking avoided allow smaller executables faster loading fixed register usage allows compact stacks kernel calls running application privileged mode allows direct access custom hardware operation without indirection calling device driver widely used eabis include powerpc arm eabi2 mips eabi
[ 1922, 6403, 8966, 6664, 9353, 3349, 4887, 3102, 671, 1952, 7071, 10145, 1444, 1445, 6180, 4264, 3241, 5165, 7983, 5040, 2481, 6268, 435, 2995, 823, 5432, 825, 3386, 1724, 10813, 5824, 10176, 7234, 6596, 4424, 585, 5065, 8012, 10971, 477, ...
None
9,922
4
Dasient:dasient dasient internet security company headquartered sunnyvale california founded 2008 launched first product june 2009 dasient acquired twitter january 2012 dasient provides cloud-based anti-malware services protecting businesses web-based malware malvertising dasient web malware analysis platform uses dynamic behavioral-based engine based sophisticated algorithms anomaly detection technology defend latest attacks using up-to-date intelligence malware platform includes system highly instrumented virtual machines simulate actual users would experience visiting particular web page viewing specific online ad company founded former google personnel neil daswani shariq rizvi former mckinsey strategy consultant ameet ranadive dasient named network world one ten startups watch 2010 company received seed funding mike maples ex-verisign ceo stratton sclavos ex-3com/palm chairman eric benhamou february 2011 announced google ventures invested dasient dasient acquired twitter january 2012
[ 7304, 10602, 10059, 5072, 7515, 3485, 7359 ]
None
9,923
2
Android_Beam:android beam android beam feature android mobile operating system allows data transferred via near field communication nfc allows rapid short-range exchange web bookmarks contact info directions youtube videos data android beam introduced 2011 android version 4.0 ice cream sandwich improved google acquired bump 2017 computerworld included android beam list once-trumpeted features quietly faded away observing despite admirable marketing effort beam never quite worked particularly well numerous systems sharing stuff proved simpler reliable android beam discontinued android q present second android q beta google pixel 3 android beam activated placing devices back back content shared displayed screen content able sent screen shrink display tap beam top tapping screen sends content one device sound play devices near able beam data sent confirmation tone play negative tone play failed content shrink screen indicating beaming complete sharing one direction device sending content get content receiving device activate android beam devices must support nfc near field communication enabled addition passing lock-screen logging android 4.1 jelly bean devices use android beam send photos videos bluetooth android beam uses nfc enable bluetooth devices instantly pair disable bluetooth complete automatically devices works android devices version 4.1 beaming specific content app allowed control content sent adding android beam support app specify data beaming app open receiving device receiving device app open application page play store beam refers extension android beam samsung first used galaxy iii phones uses near-field communication establish wi-fi direct connection two devices data transfer instead bluetooth connection results faster transfer speeds devices feature beam beam limited devices beam support wi-fi direct nfc htc one samsung galaxy iii external links google play story nfc basics
[ 5892, 7722, 9610, 1074, 8413 ]
Validation
9,924
4
SSH_Communications_Security:ssh communications security ssh communications security oyj cybersecurity company focusing encryption access control according company products secure privileged access management credentials ssh keys server passwords data-in-transit focus particularly ssh key management one products company privx on-demand access manager aimed securing machine-to-machine communication large organizations replacing permanent access keys customers include many major financial institutions retailers technology companies company founded 1995 tatu ylönen designed first version secure shell ssh protocol software parts still today included openssh continues work company full-time current ceo kaisa olkkonen company listed nasdaq nordic since 2000
[ 7364, 10341, 10631, 2932, 11357, 7327 ]
None
9,925
4
Bup:bup bup backup system written python uses several formats git capable handling large files like operating system images block-based deduplication optional par2-based error correction bup development began 2010 accepted debian year bup uses git packfile format writing packfiles directly avoiding garbage collection bup available source notably part following distributions
[ 2304, 9025, 6280, 8554, 1358, 7983, 823, 2045 ]
Validation
9,926
9
Domain-specific_language:domain-specific language domain-specific language dsl computer language specialized particular application domain contrast general-purpose language gpl broadly applicable across domains wide variety dsls ranging widely used languages common domains html web pages languages used one pieces software mush soft code dsls subdivided kind language include domain-specific markup languages domain-specific modeling languages generally specification languages domain-specific programming languages special-purpose computer languages always existed computer age term domain-specific language become popular due rise domain-specific modeling simpler dsls particularly ones used single application sometimes informally called mini-languages line general-purpose languages domain-specific languages always sharp language may specialized features particular domain applicable broadly conversely may principle capable broad application practice used primarily specific domain example perl originally developed text-processing glue language domain awk shell scripts mostly used general-purpose programming language later contrast postscript turing complete language principle used task practice narrowly used page description language design use appropriate dsls key part domain engineering using language suitable domain hand – may consist using existing dsl gpl developing new dsl language-oriented programming considers creation special-purpose languages expressing problems standard part problem-solving process creating domain-specific language software support rather reusing existing language worthwhile language allows particular type problem solution expressed clearly existing language would allow type problem question reappears sufficiently often pragmatically dsl may specialized particular problem domain particular problem representation technique particular solution technique aspects domain domain-specific language created specifically solve problems particular domain intended able solve problems outside although may technically possible contrast general-purpose languages created solve problems many domains domain also business area examples business areas include domain-specific language somewhere tiny programming language scripting language often used way analogous programming library boundaries concepts quite blurry much like boundary scripting languages general-purpose languages domain-specific languages languages often declared syntaxes grammars specific goals design implementation domain-specific language one visual diagramming language created generic eclipse modeling system programmatic abstractions eclipse modeling framework textual languages instance command line utility grep regular expression syntax matches patterns lines text sed utility defines syntax matching replacing regular expressions often tiny languages used together inside shell perform complex programming tasks line domain-specific languages scripting languages somewhat blurred domain-specific languages often lack low-level functions filesystem access interprocess control functions characterize full-featured programming languages scripting otherwise many domain-specific languages compile byte-code executable code various kinds media objects graphviz exports postscript gif jpeg etc. csound compiles audio files ray-tracing domain-specific language like pov compiles graphics files computer language like sql presents interesting case deemed domain-specific language specific specific domain sql case accessing managing relational databases often called another application sql keywords functions many scripting languages often thought language right perhaps prevalence database manipulation programming amount mastery required expert language blurring line many domain-specific languages exposed apis accessed programming languages without breaking flow execution calling separate process thus operate programming libraries domain-specific languages expand time include full-featured programming tools complicates question whether language domain-specific good example functional language xslt specifically designed transforming one xml graph another extended since inception allow particularly 2.0 version various forms filesystem interaction string date manipulation data typing model-driven engineering many examples domain-specific languages may found like ocl language decorating models assertions qvt domain-specific transformation language however languages like uml typically general-purpose modeling languages summarize analogy might useful little language like knife used thousands different ways cutting food cutting trees domain-specific language like electric drill powerful tool wide variety uses specific context namely putting holes things general purpose language complete workbench variety tools intended performing variety tasks domain-specific languages used programmers looking current workbench realize need better drill find particular domain-specific language provides exactly dsls implemented via independent interpreter compiler known external domain specific languages well known examples include latex awk separate category known embedded internal domain specific languages typically implemented within host language library tend limited syntax host language though depends host language capabilities several usage patterns domain-specific languages many domain-specific languages used one way dsl code embedded host language may special syntax support regexes sed awk perl javascript may passed strings adopting domain-specific language approach software engineering involves risks opportunities well-designed domain-specific language manages find proper balance domain-specific languages important design goals contrast general-purpose languages programming idioms methods imposed programmers handle common development tasks e.g general purpose programming languages rarely support idioms domain-specific languages describe e.g examples domain-specific languages include html logo pencil-like drawing verilog vhdl hardware description languages matlab gnu octave matrix programming mathematica maple maxima symbolic mathematics specification description language reactive distributed systems spreadsheet formulas macros sql relational database queries yacc grammars creating parsers regular expressions specifying lexers generic eclipse modeling system creating diagramming languages csound sound music synthesis input languages graphviz grgen software packages used graph layout graph rewriting gml scripting language used gamemaker studio domain-specific language targeted novice programmers easily able learn programming language serves blend multiple languages including delphi c++ basic lack structures data types features full-fledged programming language many built-in functions sandboxed purpose easy portability language primarily serves make easy anyone pick language develop game unix shell scripts give good example domain-specific language data organization manipulate data files user input many different ways domain abstractions notations include streams stdin stdout operations streams redirection pipe abstractions combine make robust language describe flow organization data language consists simple interface script running controlling processes perform small tasks tasks represent idioms organizing data desired format tables graphs charts etc tasks consist simple control-flow string manipulation mechanisms cover lot common usages like searching replacing string files counting occurrences strings frequency counting even though unix scripting languages turing complete differ general purpose languages practice scripting languages used weave together small unix tools grep ls sort wc coldfusion associated scripting language another example domain-specific language data-driven websites scripting language used weave together languages services java .net c++ sms email email servers http ftp exchange directory services file systems use websites coldfusion markup language cfml includes set tags used coldfusion pages interact data sources manipulate data display output cfml tag syntax similar html element syntax erlang open telecom platform originally designed use inside ericsson domain-specific language language offers platform libraries create finite state machines generic servers event managers quickly allow engineer deploy applications support libraries shown industry benchmarks outperform languages intended mixed set domains c c++ language officially open source downloaded website filtermeister programming environment programming language based c specific purpose creating photoshop-compatible image processing filter plug-ins filtermeister runs photoshop plug-in load execute scripts compile export independent plug-ins although filtermeister language reproduces significant portion c language function library contains features used within context photoshop plug-ins adds number specific features useful specific domain template feature mediawiki embedded domain-specific language whose fundamental purpose support creation inclusion reference mediawiki pages mediawiki pages much interest domain-specific languages improve productivity quality software engineering domain-specific language could possibly provide robust set tools efficient software engineering tools beginning make way development critical software systems software cost reduction toolkit example toolkit suite utilities including specification editor create requirements specification dependency graph browser display variable dependencies consistency checker catch missing cases well-formed formulas specification model checker theorem prover check program properties specification invariant generator automatically constructs invariants based requirements newer development language-oriented programming integrated software engineering methodology based mainly creating optimizing using domain-specific languages complementing language-oriented programming well forms domain-specific languages class compiler writing tools called metacompilers metacompiler useful generating parsers code generators domain-specific languages metacompiler compiles domain-specific metalanguage specifically designed domain metaprogramming besides parsing domain-specific languages metacompilers useful generating wide range software engineering analysis tools meta-compiler methodology often found program transformation systems metacompilers played significant role computer science computer industry include meta-ii descendant treemeta unreal unreal tournament unveiled language called unrealscript allowed rapid development modifications compared competitor quake using id tech 2 engine id tech engine used standard c code meaning c learned properly applied unrealscript optimized ease use efficiency similarly development recent games introduced specific languages one common example lua scripting various business rules engines developed automating policy business rules used government private industry ilog oracle policy automation dtrules drools others provide support dsls aimed support various problem domains dtrules goes far define interface use multiple dsls within rule set purpose business rules engines define representation business logic human-readable fashion possible allows subject matter experts developers work understand representation business logic rules engines provide approach simplifying control structures business logic example using declarative rules decision tables coupled alternatives programming syntax favor dsls statistical modelers developed domain-specific languages bugs jags stan languages provide syntax describing bayesian model generate method solving using simulation generate object handling services based interface description language domain-specific language javascript web applications html documentation c++ high-performance code etc done cross-language frameworks apache thrift google protocol buffers gherkin language designed define test cases check behavior software without specifying behavior implemented meant read used non-technical users using natural language syntax line-oriented design tests defined gherkin must implemented general programming language steps gherkin program acts syntax method invocation accessible non-developers prominent examples domain-specific languages include advantages disadvantages
[ 515, 5635, 9735, 9224, 16, 1552, 6161, 5651, 1051, 3613, 6182, 5165, 4656, 5680, 9780, 1591, 8763, 6717, 10819, 7749, 8262, 1095, 5703, 9286, 9299, 3159, 3675, 2140, 7777, 7780, 11367, 4200, 6249, 2666, 8810, 5228, 3698, 9330, 9331, 119, ...
None
9,927
2
Junos_OS:junos os junos os formally juniper network operating system freebsd-based operating system used juniper networks hardware routers operating system used juniper routing switching security devices juniper offers software development kit sdk partners customers allow additional customization biggest competitor junos cisco systems ios junos os formerly branded juniper junos commonly referred simply junos though general brand name juniper networks including product lines junos fusion key benefits junos os include junos provides single code base across juniper platforms juniper issued new release junos every 90 days since 1998 junos supports variety routing protocols introduction srx j-series past version 9.3 platforms also supports flow mode includes stateful firewalling nat ipsec flexible routing policy language used controlling route advertisements path selection junos generally adheres industry standards routing mpls operating system supports high availability mechanisms standard unix graceful restart junos operating system primarily based linux freebsd linux running bare metal freebsd running qemu virtual machine freebsd unix implementation customers access unix shell execute normal unix commands junos runs juniper hardware systems juniper acquired netscreen integrated screenos security functions junos network operating system junos cli text-based command interface configuring troubleshooting monitoring juniper device network traffic associated supports two types command modes functions operational mode include control cli environment monitoring hardware status display information network data passes though hardware configuration mode used configuring juniper router switch security device adding deleting modifying statements configuration hierarchy juniper developer network jdn juniper networks provides junos sdk customers 3rd-party developers want develop applications junos-powered devices juniper networks routers switches service gateway systems provides set tools application programming interfaces apis including interfaces junos routing firewall filter ui traffic services functions juniper networks also employs junos sdk internally develop parts junos many junos applications openflow junos traffic services 2016 juniper maintains market share ethernet switching 16.9 market share enterprise routing 16.1 juniper generated 2,353 million revenue routing 858 million switching 318 million security 2016 juniper revenue stems americas 2,969 million europe middle east africa 1,238 million asia 783 million combining rest annual revenue 2016
[ 4611, 10761, 2061, 9743, 6675, 8725, 4636, 10291, 1080, 5177, 6207, 9279, 3651, 7748, 8266, 7249, 9306, 607, 5220, 1126, 9320, 9844, 11383, 633, 8316, 9343, 10883, 6276, 2181, 4745, 9366, 7319, 2201, 3742, 2212, 3752, 684, 6834, 1718, 581...
Test
9,928
3
EFM32:efm32 efm32 gecko mcus family energy-friendly mixed-signal 32-bit microcontroller integrated circuits energy micro silicon labs based arm cortex-m cpus including cortex-m0+ cortex-m3 cortex-m4 efm32 microcontrollers majority functionality available deep sleep modes sub-microamp current consumption enabling energy efficient autonomous behavior cpu sleeping efm32 combines quick wakeups efficient processing reduce impact cpu code needs executed good example deep sleep peripheral efm32 low energy sensor interface lesense capable duty-cycling inductive capacitive resistive sensors autonomously operating deep sleep mode another important aspect gecko mcus peripherals direct connection allowing communicate without cpu wake intervention interconnect known peripheral reflex system prs significant functionality available lower stop shutoff energy modes stop mode includes analog comparators watchdog timers pulse counters ic links external interrupts shutoff mode 20–100 na current consumption depending product applications access gpio reset real-time counter rtc retention memory efm32 family consists number sub-families ranging efm32 zero gecko based arm cortex-m0+ higher performing efm32 giant gecko wonder gecko based cortex-m3 cortex-m4 respectively efm32 technology also foundation efr32 wireless geckos portfolio sub-ghz 2.4 ghz wireless system chip soc devices product families important advantage efm32 mcu portfolio energy efficiency energy efficiency stems autonomous operations deep sleep modes low active sleep currents fast wakeup times together characteristics reduce integrated energy power time lifetime application efm32 devices also constructed reduce development cycles variety products smart metering industrial applications pin/software compatible scalable across wide application requirements compatible multiple development platforms additionally mcu architecture common fundamental piece wireless gecko portfolio efr32 software hardware pin/package compatibility efm32 products offer simplified pathway wireless applications efm32 mcu family critical features useful iot applications major architectural features low-energy modes design peripheral reflex system prs gives developers peripheral interconnect system eight triggers handle task execution without cpu intervention low level mcu broken eight categories core memory clock management energy management serial interfaces i/o ports timers triggers analog interfaces security modules terms core cpu efm32 mcus integrate arm cortex-m series technology spanning cortex-m0+ cortex-m4 enable gecko mcu operation take advantage ultralow power architecture applications operate main input clock rate 4 mhz 48 mhz reduce need external electronic components efm32 integrates low frequency ultralow frequency clocks well mcus also integrate internal voltage regulators simplified compact system designs addition cpu clock rate flexibility specific applications efm32 portfolio offers broad range memory resource options application storage flash application execution ram needs rtos implementation devices include internal flash memory low 4 kb high 1024 kb ram low 2 kb high 128 kb enable applications sense control communicate single low-power microcontroller efm32 mcus contain complete analog digital interfaces serial digital interfaces include usart low energy uart i2c usb timer triggers block mcu includes cryotimer low energy pulse counter pcnt backup real-time-counter rtc analog modules include adcs dacs operational amplifiers analog comparators applications demand heightened security protections efm32 mcus offer various hardware crypto engines cyclic redundancy check crc general i/o mcus feature 93 gpio pins several variants feature lcd controllers quickly design develop build test efm32 applications developers various resources available free integrated development environment ide performance analysis tools configuration tools utilities flexible compilers development platforms software stacks reference code design examples app notes training videos whitepapers silicon labs simplicity studio free eclipse-based development platform graphical configuration tools energy-profiling tools wireless network analysis tools demos software examples documentation technical support community forums also includes flexible compiler tool options including gcc arm keil iar embedded workbench third-party tools two popular development tools within simplicity studio ide advanced energy monitor aem network debugger called “ packet trace ” advanced energy monitor efm32 tool allows developers energy profiling application running also allows direct code correlation optimize hardware design software network debugger tool allows developers using wireless gecko mcus trace network traffic packets throughout nodes network efm32 supported multiple third-party real-time operating system rtos software libraries drivers stacks rtos solutions enabled efm32s micro-controller operating systems uc/os micrium freertos gnu chopstx embos segger mbed os arm october 2016 silicon labs acquired micrium addition iot-critical middleware stacks tcp/ip micrium provides certified commercial-grade rtos enables embedded iot designs handle task management real time important mcu applications even essential wireless applications example projects found micrium website efm32 starter kits available evaluation purposes gain familiarity portfolio starter kit contains sensors peripherals help illustrate device capabilities well serve starting point application development using simplicity studio software also grants access kit information ability program starter kit demos code examples starter kits contain eeprom board ids enable automated setup kit connected simplicity studio ide efm32 kits arm mbed-enabled kits support arm mbed right box supported simplicity studio development tools community forums featuring giant gecko mcu 1024 kb flash 93 gpio efm32 giant gecko starter kit shown one latest starter kit offerings efm32 family efm32 starter kits include efm32 designed achieve high degree autonomous operation low-energy modes multiple ultralow energy modes available turning energy usage significantly reducing power consumption achieve power energy-efficiency features efm32 products utilize ultralow active idle power fast wakeup processing times important ability intelligently interact peripherals sensors autonomously without waking cpu consuming power active run mode efm32 consumes 114 µa/mhz running real-life code 32 mhz 3v supply also mode process time matters one main benefits 32-bit mcu working power consumption however maximum clock speed silicon labs carefully designs efm32s optimize performance low power together designing maximum clock speed 48 mhz mcus faster clocks 100 mhz+ range inevitably consume power active mode beyond energy savings run mode efm32 ideal low duty cycle applications take advantage operating lower energy states lower energy states outlined section em1 sleep em2 deep sleep em3 stop em4 shutoff autonomous peripherals peripheral reflex system lesense core technologies come play lower energy modes autonomous peripheral feature ensures peripheral devices operate without waking cpu also extensive direct memory address dma support 16 channels depending efm32 peripheral reflex system boosts capability autonomous peripherals allowing flexible configuration create complex powerful interconnections bypass cpu lesense unique efm32 feature allows mcu monitor 16 sensors deep sleep mode efm32 resistive sensing capacitive sensing inductive sensing mode needed efm32 wake deep sleep engage cpu less two microseconds adc sensing applications temperature demonstration wonder gecko mcu standard temperature thermistor setting adc sample thermistor every second 1 hz rate equates 1.3 ua average current real world would equate 220 ma-hr cr2032 coin cell battery lasting close 20 years application could implemented lesense preset thresholds instead using regular time interval adc samples case lesense irregular triggers threshold trigger rate 1 hz would still produce average current 1.5 ua equates 16.85-year battery life low-energy pulse counter metrology using low energy pulse counter efm32 could also used pulsed sensing applications example magnetic hall effect sensor efm32 convert rotational position quantified speed flow rate common situation water heat flow metering efm32 used stop mode em3 count pulses calculate flow operating power consumption state could low 650 na 3vdc significant positive implications battery-operated meters efm32 microcontroller family one two products energy micro efr4d draco soc radios gecko mbed compiler available https //developer.mbed.org/compiler/ nav
[ 7170, 11395, 3467, 6925, 10767, 8720, 1170, 7445, 9366, 666, 5786, 4508, 9371, 4773, 38, 9638, 682, 4139, 2862, 11054, 2224, 11314, 7604, 11447, 9913, 8253, 5823, 6207, 8383, 7234, 7235, 9155, 10945, 2635, 5963, 9163, 6607, 7631, 5457, 25...
Train
9,929
4
User_activity_monitoring:user activity monitoring field information security user activity monitoring uam monitoring recording user actions uam captures user actions including use applications windows opened system commands executed checkboxes clicked text entered/edited urls visited nearly every on-screen event protect data ensuring employees contractors staying within assigned tasks posing risk organization user activity monitoring software deliver video-like playback user activity process videos user activity logs keep step-by-step records user actions searched analyzed investigate out-of-scope activities need uam rose due increase security incidents directly indirectly involve user credentials exposing company information sensitive files 2014 761 data breaches united states resulting 83 million exposed customer employee records 76 breaches resulting weak exploited user credentials uam become significant component infrastructure main populations users uam aims mitigate risks contractors used organizations complete information technology operational tasks remote vendors access company data risks even malicious intent external user like contractor major security liability 70 regular business users admitted access data necessary generalized accounts give regular business users access classified company data makes insider threats reality business uses generalized accounts administrator accounts heavily monitored due high profile nature access however current log tools generate “ log fatigue ” admin accounts log fatigue overwhelming sensation trying handle vast amount logs account result many user actions harmful user actions easily overlooked thousands user actions compiled every day according verizon data breach incident report “ first step protecting data knowing access it. ” today ’ environment “ lack oversight control among employees access confidential sensitive information. ” apparent gap one many factors resulted major number security issues companies companies use uam usually separate necessary aspects uam three major components visual forensics involves creating visual summary potentially hazardous user activity user action logged recorded user session completed uam created written record visual record whether screen-captures video exactly user done written record differs siem logging tool captures data user-level system level –providing plain english logs rather syslogs originally created debugging purposes textual logs paired corresponding screen-captures video summaries using corresponding logs images visual forensics component uam allows organizations search exact user actions case security incident case security threat i.e data breach visual forensics used show exactly user everything leading incident visual forensics also used provide evidence law enforcement investigate intrusion user activity alerting serves purpose notifying whoever operates uam solution mishap misstep concerning company information real-time alerting enables console administrator notified moment error intrusion occurs alerts aggregated user provide user risk profile threat ranking alerting customizable based combinations users actions time location access method alerts triggered simply opening application entering certain keyword web address alerts also customized based user actions within application deleting creating user executing specific commands user behavior analytics add additional layer protection help security professionals keep eye weakest link chain monitoring user behavior help dedicated software analyzes exactly user session security professionals attach risk factor specific users and/or groups immediately alerted red flag warning high-risk user something interpreted high-risk action exporting confidential customer information performing large database queries scope role accessing resources ’ accessing forth uam collects user data recording activity every user applications web pages internal systems databases uam spans access levels access strategies rdp ssh telnet ica direct console login etc.… uam solutions pair citrix vmware environments uam solutions transcribe documented activities user activity logs uam logs match video-playbacks concurrent actions examples items logged names applications run titles pages opened urls text typed edited copied/pasted commands scripts uam uses screen-recording technology captures individual user actions video-like playback saved accompanied user activity log playbacks differ traditional video playback screen scraping compiling sequential screen shots video like replay user activity logs combined video-like playback provides searchable summary user actions enables companies read also view exactly particular user company systems companies employees raised issue user privacy aspect uam believe employees resist idea actions monitored even done security purposes reality uam strategies address concerns possible monitor every single user action purpose uam systems snoop employee browsing history uam solutions use policy-based activity recording enables console administrator program exactly ’ monitored many regulations require certain level uam others require logs activity audit purposes uam meets variety regulatory compliance requirements hipaa iso 27001 sox pci etc.… uam typically implemented purpose audits compliance serve way companies make audits easier efficient audit information request information user activity met uam unlike normal log siem tools uam help speed audit process building controls necessary navigate increasingly complex regulatory environment ability replay user actions provides support determining impact regulated information security incident response uam two deployment models appliance-based monitoring approaches use dedicated hardware conduct monitoring looking network traffic software-based monitoring approaches use software agents installed nodes accessed users commonly software requires installation agent systems servers desktops vdi servers terminal servers across users want monitor agents capture user activity reports information back central console storage analysis solutions may quickly deployed phased manner targeting high-risk users systems sensitive information first allowing organization get running quickly expand new user populations business requires
[ 1251, 1829, 10245, 2901, 5722, 5371, 5373 ]
Test
9,930
2
Shell_account:shell account shell account user account remote server traditionally running unix operating system gives access shell via command-line interface protocol telnet ssh shell accounts made first accessible interested members public internet service providers netcom usa panix world digex although rare instances individuals access shell accounts employer university used file storage web space email accounts newsgroup access software development shell providers often found offer shell accounts low-cost free shell accounts generally provide users access various software services including compilers irc clients background processes ftp text editors nano email clients pine shell providers may also allow tunneling traffic bypass corporate firewalls
[ 7364, 10341, 8998, 11112, 9868, 9839, 8432, 11442, 5492, 10933, 3030, 823, 1304, 7325 ]
None
9,931
2
Redox_(operating_system):redox operating system redox unix-like microkernel operating system written programming language rust language strong focus safety stability high performance redox aims secure usable free redox inspired prior kernels operating systems minix plan 9 bsd similar gnu bsd ecosystem memory-safe language modern technology free open-source software distributed mit license redox operating system designed highly secure reflected several design decisions redox full-featured operating system providing packages memory allocator file system display manager core utilities etc together make functional operating system redox relies ecosystem software written rust members project redox supports command-line interface cli programs including redox supports graphical user interface gui programs including redox created jeremy soller first published 20 april 2015 github since developed actively contributions 40 developers second anniversary redox appearing github version 0.2.0 released
[ 3587, 2179, 4998, 7561, 6675, 7187, 5397, 6300, 10016, 9762, 11180, 7983, 5049, 10813, 9151, 8262, 2761, 5067, 7889, 11221, 5976, 9176, 477, 2786, 10851, 5356, 5363, 5492, 11123, 8700, 9343 ]
Test
9,932
3
Computer_architecture:computer architecture computer engineering computer architecture set rules methods describe functionality organization implementation computer systems definitions architecture define describing capabilities programming model computer particular implementation definitions computer architecture involves instruction set architecture design microarchitecture design logic design implementation first documented computer architecture correspondence charles babbage ada lovelace describing analytical engine building computer z1 1936 konrad zuse described two patent applications future projects machine instructions could stored storage used data i.e stored-program concept two early important examples term “ architecture ” computer literature traced work lyle r. johnson frederick p. brooks jr. members machine organization department ibm ’ main research center 1959 johnson opportunity write proprietary research communication stretch ibm-developed supercomputer los alamos national laboratory time known los alamos scientific laboratory describe level detail discussing luxuriously embellished computer noted description formats instruction types hardware parameters speed enhancements level “ system architecture ” – term seemed useful “ machine organization. ” subsequently brooks stretch designer started chapter 2 book planning computer system project stretch ed w. buchholz 1962 writing brooks went help develop ibm system/360 called ibm zseries line computers “ architecture ” became noun defining “ user needs know ” later computer users came use term many less-explicit ways earliest computer architectures designed paper directly built final hardware form later computer architecture prototypes physically built form transistor–transistor logic ttl computer—such prototypes 6800 pa-risc—tested tweaked committing final hardware form 1990s new computer architectures typically built tested tweaked—inside computer architecture computer architecture simulator inside fpga soft microprocessor both—before committing final hardware form discipline computer architecture three main subcategories types computer architecture following types used bigger companies like intel count 1 computer architecture purpose design computer maximizes performance keeping power consumption check costs low relative amount expected performance also reliable many aspects considered includes instruction set design functional organization logic design implementation implementation involves integrated circuit design packaging power cooling optimization design requires familiarity compilers operating systems logic design packaging instruction set architecture isa interface computer software hardware also viewed programmer view machine computers understand high-level programming languages java c++ programming languages used processor understands instructions encoded numerical fashion usually binary numbers software tools compilers translate high level languages instructions processor understand besides instructions isa defines items computer available program—e.g data types registers addressing modes memory instructions locate available items register indexes names memory addressing modes isa computer usually described small instruction manual describes instructions encoded also may define short vaguely mnemonic names instructions names recognized software development tool called assembler assembler computer program translates human-readable form isa computer-readable form disassemblers also widely available usually debuggers software programs isolate correct malfunctions binary computer programs isas vary quality completeness good isa compromises programmer convenience easy code understand size code much code required specific action cost computer interpret instructions complexity means hardware needed decode execute instructions speed computer complex decoding hardware comes longer decode time memory organization defines instructions interact memory memory interacts design emulation software emulators run programs written proposed instruction set modern emulators measure size cost speed determine particular isa meeting goals computer organization helps optimize performance-based products example software engineers need know processing power processors may need optimize software order gain performance lowest price require quite detailed analysis computer organization example sd card designers might need arrange card data processed fastest possible way computer organization also helps plan selection processor particular project multimedia projects may need rapid data access virtual machines may need fast interrupts sometimes certain tasks need additional components well example computer capable running virtual machine needs virtual memory hardware memory different virtual computers kept separated computer organization features also affect power consumption processor cost instruction set micro-architecture designed practical machine must developed design process called implementation implementation usually considered architectural design rather hardware design engineering implementation broken several steps cpus entire implementation process organized differently often referred cpu design exact form computer system depends constraints goals computer architectures usually trade standards power versus performance cost memory capacity latency latency amount time takes information one node travel source throughput sometimes considerations features size weight reliability expandability also factors common scheme depth power analysis figures keep power consumption low maintaining adequate performance modern computer performance often described ipc instructions per cycle measures efficiency architecture clock frequency since faster rate make faster computer useful measurement older computers ipc counts low 0.1 instructions per cycle simple modern processors easily reach near 1 superscalar processors may reach three five ipc executing several instructions per clock cycle counting machine language instructions would misleading varying amounts work different isas instruction standard measurements count isa actual machine language instructions unit measurement usually based speed vax computer architecture many people used measure computer speed clock rate usually mhz ghz refers cycles per second main clock cpu however metric somewhat misleading machine higher clock rate may necessarily greater performance result manufacturers moved away clock speed measure performance factors influence speed mix functional units bus speeds available memory type order instructions programs two main types speed latency throughput latency time start process completion throughput amount work done per unit time interrupt latency guaranteed maximum response time system electronic event like disk drive finishes moving data performance affected wide range design choices — example pipelining processor usually makes latency worse makes throughput better computers control machinery usually need low interrupt latencies computers operate real-time environment fail operation completed specified amount time example computer-controlled anti-lock brakes must begin braking within predictable short time brake pedal sensed else failure brake occur benchmarking takes factors account measuring time computer takes run series test programs although benchmarking shows strengths n't choose computer often measured machines split different measures example one system might handle scientific applications quickly another might render video games smoothly furthermore designers may target add special features products hardware software permit specific benchmark execute quickly n't offer similar advantages general tasks power efficiency another important measurement modern computers higher power efficiency often traded lower speed higher cost typical measurement referring power consumption computer architecture mips/w millions instructions per second per watt modern circuits less power required per transistor number transistors per chip grows transistor put new chip requires power supply requires new pathways built power however number transistors per chip starting increase slower rate therefore power efficiency starting become important important fitting transistors single chip recent processor designs shown emphasis put focus power efficiency rather cramming many transistors single chip possible world embedded computers power efficiency long important goal next throughput latency increases clock frequency grown slowly past years compared power reduction improvements driven end moore law demand longer battery life reductions size mobile technology change focus higher clock rates power consumption miniaturization shown significant reductions power consumption much 50 reported intel release haswell microarchitecture dropped power consumption benchmark 30-40 watts 10-20 watts comparing processing speed increase 3 ghz 4 ghz 2002 2006 seen focus research development shifting away clock frequency moving towards consuming less power taking less space
[ 8198, 6155, 8207, 2066, 25, 27, 6180, 6181, 8231, 2105, 2113, 8259, 8262, 6221, 2137, 10333, 97, 6243, 4201, 6250, 119, 129, 2179, 10382, 6296, 2201, 8352, 2224, 178, 6329, 2237, 4286, 2241, 2243, 8388, 2248, 8396, 10455, 8410, 219, 221...
Test
9,933
7
MeshBox:meshbox meshbox item computer hardware used provide large scale wireless broadband networks manufactured locustworld devices designed co-operate meshboxes within range passing internet service one box next air reaches final destination coverage area mesh typically measured square miles square kilometres originally released bootable cd-rom called meshap based openap open source software system implemented system image fit within small 32mb compactflash card system functions expanded beyond creating wireless networks provide set-top box services mp3 audio video streaming connection remote windows terminal servers pcs web browsing connection peer-to-peer networks instant messaging file exchange
[ 9098, 2797, 10270 ]
Validation
9,934
9
Marc_Auslander:marc auslander marc alan auslander american computer scientist known contributions pl/8 compiler spent entire career ibm thomas j. watson research center yorktown heights ny auslander received bachelor arts degree mathematics princeton university 1963 joined ibm year 1991 named ibm fellow retired 2004 continues affiliated ibm fellow emeritus 1996 auslander elected national academy engineering contributions reduced instruction set computing risc systems 1999 named acm fellow ieee fellow contributions risc 1970 1972 auslander served chairman acm sigops authored 19 scientific papers holds 14 u.s. patents
[ 3323 ]
Train
9,935
0
Distributional_semantics:distributional semantics distributional semantics research area develops studies theories methods quantifying categorizing semantic similarities linguistic items based distributional properties large samples language data basic idea distributional semantics summed so-called distributional hypothesis linguistic items similar distributions similar meanings distributional hypothesis linguistics derived semantic theory language usage i.e words used occur contexts tend purport similar meanings underlying idea word characterized company keeps popularized firth distributional hypothesis basis statistical semantics although distributional hypothesis originated linguistics receiving attention cognitive science especially regarding context word use recent years distributional hypothesis provided basis theory similarity-based generalization language learning idea children figure use words 've rarely encountered generalizing use distributions similar words distributional hypothesis suggests semantically similar two words distributionally similar turn thus tend occur similar linguistic contexts whether suggestion holds significant implications data-sparsity problem computational modeling question children able learn language rapidly given relatively impoverished input also known problem poverty stimulus distributional semantics favor use linear algebra computational tool representational framework basic approach collect distributional information high-dimensional vectors define distributional/semantic similarity terms vector similarity different kinds similarities extracted depending type distributional information used collect vectors topical similarities extracted populating vectors information text regions linguistic items occur paradigmatic similarities extracted populating vectors information linguistic items items co-occur note latter type vectors also used extract syntagmatic similarities looking individual vector components basic idea correlation distributional semantic similarity operationalized many different ways rich variety computational models implementing distributional semantics including latent semantic analysis lsa hyperspace analogue language hal syntax- dependency-based models random indexing semantic folding various variants topic model distributional semantic models differ primarily respect following parameters distributional semantic models use linguistic items context also referred word space vector space models compositional distributional semantic models extension distributional semantic models characterize semantics entire phrases sentences achieved composing distributional representations words sentences contain different approaches composition explored discussion established workshops semeval simpler non-compositional models fail capture semantics larger linguistic units ignore grammatical structure logical words crucial understanding distributional semantic models applied successfully following tasks
[ 7780, 7910, 11206, 10577, 4468, 5781, 7577, 7230 ]
Validation
9,936
3
Double_Tools_for_DoubleSpace:double tools doublespace double tools doublespace software utility released 1993 menlo park-based company addstor inc utility functioned add-on disk compression software doublespace supplied ms-dos 6.0 adding number features available standard version double tools utilities worked microsoft windows providing graphical view control panel compressed drives computer utilities supplied ms-dos operated dos-mode double tools also contained number disk checking rescue/recovery utilities included utilities called silent tools one unique features time capability defragment doublespace compressed drive background features including background defragmentation capability required user let double tools replace standard compression driver ms-dos dblspace.bin one developed addstor claimed 100 compatible doublespace microsoft real-time compression interface introduced ms-dos 6.0 driver added number extra features use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed features provided double tools ability compressed removable media auto-mounted used instead user manually although capability later introduced standard version doublespace found ms-dos 6.2 double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools another interesting function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer
[ 1801, 6506, 6797, 9166, 7983 ]
Test
9,937
5
Nortel_Discovery_Protocol:nortel discovery protocol nortel discovery protocol ndp data link layer osi layer 2 network protocol discovery nortel networking devices certain products avaya ciena device topology information may graphically displayed network management software nortel discovery protocol origin synoptics network management protocol sonmp developed synoptics wellfleet communications merger 1994 protocol rebranded bay network management protocol bnmp protocol analyzers referenced bay discovery protocol bdp four years later 1998 bay networks acquired nortel renamed nortel discovery protocol ieee 802.1ab link layer discovery protocol supported nortel equipment standards based vendor-neutral protocol supports multi-vendor environments
[ 9603, 1284, 11321, 11286, 1303, 7865, 3580, 10175 ]
Test
9,938
2
OSEK:osek osek offene systeme und deren schnittstellen für die elektronik kraftfahrzeugen english open systems interfaces electronics motor vehicles standards body produced specifications embedded operating system communications stack network management protocol automotive embedded systems also produced related specifications osek designed provide standard software architecture various electronic control units ecus throughout car supported popular ssl/tls libraries wolfssl optimal security measures osek founded 1993 german automotive company consortium bmw robert bosch gmbh daimlerchrysler opel siemens volkswagen group university karlsruhe 1994 french cars manufacturers renault psa peugeot citroën similar project called vdx vehicle distributed executive joined consortium therefore official name osek/vdx osek open standard published consortium founded automobile industry parts osek standardized iso 17356 documents current osek standard specifies interfaces multitasking functions—generic i/o peripheral access—and thus remains architecture dependent osek systems expected run chips without memory protection features osek implementation usually configured compile-time number application tasks stacks mutexes etc statically configured possible create run time osek recognizes two types tasks/threads/compliance levels basic tasks enhanced tasks basic tasks never block run completion coroutine enhanced tasks sleep block event objects events triggered tasks basic enhanced interrupt routines static priorities allowed tasks first first fifo scheduling used tasks equal priority deadlocks priority inversion prevented priority ceiling i.e priority inheritance specification uses iso/ansi-c-like syntax however implementation language system services specified application binary interface abi also specified comment two claims contradictory 1 static priorities allowed tasks 2 uses priority ceiling states protocol works temporarily raising priorities tasks certain situations thus requires scheduler supports dynamic priority scheduling according german version entry namely scheduling configured two different ways br preemptive scheduling task always preempted means higher priority task. br non-preemptive scheduling task preempted prefixed compile-time points cooperative scheduling br mixed mode also possible autosar consortium reuses osek specifications operating system backwards compatible superset osek os also covers functionality osektime communication module derived osek com osektime specifies standard optional time-triggered real-time operating systems used osektime triggered callbacks run higher priority osek tasks
[ 352, 7234, 7983, 10964, 9366, 8700, 6207 ]
Train
9,939
4
Ngrep:ngrep ngrep network grep network packet analyzer written jordan ritter command-line interface relies upon pcap library gnu regex library ngrep supports berkeley packet filter bpf logic select network sources destinations protocols also allows matching patterns regular expressions data payload packets using gnu grep syntax showing packet data human-friendly way ngrep open source application source code available download ngrep site sourceforge compiled ported multiple platforms works many unix-like operating systems linux solaris illumos bsd aix also works microsoft windows ngrep similar tcpdump ability look regular expression payload packet show matching packets screen console allows users see unencrypted traffic passed network putting network interface promiscuous mode ngrep appropriate bpf filter syntax used debug plain text protocols interactions like http smtp ftp dns among others search specific string pattern using grep regular expression syntax ngrep also used capture traffic wire store pcap dump files read files generated sniffer applications like tcpdump wireshark ngrep various options command line arguments ngrep man page unix-like operating systems show list available options examples assumed eth0 used network interface ngrep -l -q -d eth0 -i ^get |^post tcp port 80 ngrep -l -q -d eth0 -i user-agent tcp port 80 ngrep -l -q -d eth0 -i udp port 53 capturing raw network traffic interface requires special privileges superuser privileges platforms especially unix-like systems ngrep default behavior drop privileges platforms running specific unprivileged user like tcpdump also possible use ngrep specific purpose intercepting displaying communications another user computer entire network privileged user running ngrep server workstation connected device configured port mirroring switch router gateway connected device used network traffic capture lan man wan watch unencrypted information related login id passwords urls content websites viewed network
[ 6797, 5397, 5270, 11413, 6177, 10788, 1064, 1580, 10924, 7983, 9909, 823, 700, 9665, 7364, 2887, 6345, 842, 10705, 6997, 7895, 5469, 5470, 9440, 8432, 381, 2292, 3323, 2045 ]
Test
9,940
9
Psake:psake psake domain-specific language build automation tool written powershell create builds using dependency pattern similar rake msbuild intends simplify build language compared msbuild scripting build script consists tasks task function define dependencies task functions following example psake script psake executes task functions enforces dependencies tasks since psake written real programming language xml lot freedom flexibility build scripts use features powershell .net framework within build output running psake script shown
[ 9926, 7983, 11221, 3573, 479 ]
Validation
9,941
5
HTTP_message_body:http message body http message body data bytes transmitted http transaction message immediately following headers case http/0.9 headers transmitted request/response message consists following request/status line headers must end cr lf carriage return followed line feed empty line must consist cr lf whitespace optional http message body data article defines could response web server message body content example text hello world
[ 6629, 7965, 3052, 11674, 119, 2901, 53, 1206, 10004, 10452, 10938, 4095, 5724, 4797, 479 ]
Validation
9,942
1
Intelligent_database:intelligent database 1980s databases viewed computer systems stored record-oriented business data manufacturing inventories bank records sales transactions database system expected merge numeric data text images multimedia information expected automatically notice patterns data stored late 1980s concept intelligent database put forward system manages information rather data way appears natural users goes beyond simple record keeping term introduced 1989 book intelligent databases kamran parsaye mark chignell setrag khoshafian harry wong concept postulated three levels intelligence systems high level tools user interface database engine high level tools manage data quality automatically discover relevant patterns data process called data mining layer often relies use artificial intelligence techniques user interface uses hypermedia form uniformly manages text images numeric data intelligent database engine supports two layers often merging relational database techniques object orientation twenty-first century intelligent databases become widespread e.g hospital databases call patient histories consisting charts text x-ray images mouse clicks many corporate databases include decision support tools based sales pattern analysis
[ 2688, 9481, 10505, 10258, 10518, 4376, 9112, 7968, 290, 1314, 7461, 8742, 5550, 5808, 10418, 9527, 3768, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 8518, 9286, 72, 853, 2901, 9177, 987, 860, 9183, 11362, 10471, 8808, 6383, 4598, 9079, 268...
Validation
9,943
2
Active_Template_Library:active template library active template library atl set template-based c++ classes developed microsoft intended simplify programming component object model com objects com support microsoft visual c++ allows developers create variety com objects ole automation servers activex controls atl includes object wizard sets primary structure objects quickly minimum hand coding com client side atl provides smart pointers deal com reference counting library makes heavy use curiously recurring template pattern com objects also created microsoft foundation classes mfc leads larger binaries require support dlls atl hand lightweight alternative situations graphical user interface parts mfc required atl version 7 visual studio 2003 directly succeeded version 3 visual studio 6.0 number mfc classes like cstring made available atl precisely moved atlmfc common layer shared libraries atl version 7 also introduced attributes c++ attempt provide something similar cli attributes however particularly successful deemphasized atl version 8 visual studio 2005 various wizards longer generate default version 7 also introduced new string conversion classes july 28 2009 microsoft released patch atl fix bug could allow activex controls created using atl vulnerable remote code execution security flaw since visual studio 2013 atl code visual c++ 2013 static eliminating dll atl includes many raii classes simplify management com types commonly used classes include although formally part atl microsoft visual c++ also includes additional c++ raii classes simplify management com types compiler com support classes used replacement combination atl includes note visual studio 2012 compiler com support classes include safearray wrapper
[ 10243, 9234, 1043, 3102, 1055, 2083, 8227, 1577, 2603, 4143, 9263, 8246, 8771, 4173, 4178, 9813, 10841, 603, 5743, 8303, 8304, 9848, 1656, 5754, 9340, 5761, 1666, 9348, 5765, 10886, 2183, 5259, 653, 6797, 3224, 4771, 7846, 10414, 214, 482...
Test
9,944
9
PyMC3:pymc3 pymc3 python package bayesian statistical modeling probabilistic machine learning focuses advanced markov chain monte carlo variational fitting algorithms rewrite scratch previous version pymc software unlike pymc2 used fortran extensions performing computations pymc3 relies theano automatic differentiation also computation optimization dynamic c compilation pymc3 together stan popular probabilistic programming tools pymc3 open source project developed community fiscally sponsored numfocus pymc3 used solve inference problems several scientific domains including astronomy molecular biology crystallography chemistry ecology psychology previous versions pymc also used widely example climate science public health neuroscience parasitology theano announced plans discontinue development 2017 pymc3 team decided 2018 develop new version pymc named pymc4 pivot tensorflow probability computational backend new version beta pymc3 continue primary target development efforts theano backend supported pymc3 team extended period time pymc3 implements non-gradient-based gradient-based markov chain monte carlo mcmc algorithms bayesian inference stochastic gradient-based variational bayesian methods approximate bayesian inference
[ 5380, 5129, 7945, 3980, 2317, 6797, 7950, 11406, 5397, 2457, 7326, 7983, 6962, 6718, 5830, 5703, 4808, 5833, 5450, 2000, 11221, 2652, 10848, 4840, 8554, 5356, 5612, 7924, 3960, 2045 ]
Test
9,945
3
Socket_G2:socket g2 socket g2 also known rpga 988b intel cpu socket used line mobile core i7 successor core 2 line also several mobile core i5 core i3 processors based intel sandy bridge architecture like predecessor socket g1 systems run dual-channel memory mode data rates 1600 mhz opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets socket g2 cpus also known fcpga988 socket processors pin compatible ppga988 although nearly motherboards using socket intended mobile products like laptops desktop boards using exist supermicro example produced number mini itx motherboards using qm77 chipset rpga 989 sockets shown left take socket socket g1 rpga988a socket socket g2 rpga988b supported memory see also
[ 3588, 5901, 5523, 4886, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 4805, 7110, 8394, 3403, 4427, 5073, 4179, 3798, 4185, 7002, 10715, 11484, 9570, 10468, 613, 8552, 1260, 4717, 10225, ...
Test
9,946
6
Cd_(command):cd command command also known change directory command-line shell command used change current working directory various operating systems used shell scripts batch files command implemented operating unix dos ibm os/2 metacomco tripos amigaos bare path given cd implied microsoft windows reactos linux ms-dos available versions 2 later dr dos 6.0 also includes implementation commands command also available open source ms-dos emulator dosbox efi shell named hp mpe/ix command analogous stratus openvos command system call affects command operating systems defined posix command line shells windows usually use windows api change current working directory whereas unix systems calls posix c function means command executed new process created migrate directory case commands ls instead shell executes command new process created child process inherits directory parent process created command inherits parent process directory objective command cd never achieved windows powershell microsoft object-oriented command line shell scripting language executes command cmdlet within shell process however since powershell based .net framework different architecture previous shells powershell cmdlets like etc run shell process course true legacy commands still run separate process directory logical section file system used hold files directories may also contain directories command used change subdirectory move back parent directory move way back root directory move given directory consider following subsection unix filesystem shows user home directory represented file three subdirectories user current working directory home directory entering command codice_3 followed might produce following transcript user games directory similar session dos though concept home directory may apply depending specific version would look like dos maintains separate working directories lettered drive also concept current working drive command used change working directory working drive another lettered drive typing drive letter command changes working drive e.g alternatively switch may used change working drive drive working directory one step modern versions windows simulate behaviour backwards compatibility cmd.exe note executing command line arguments different effects different operating systems example executed without arguments dos os/2 windows current working directory displayed equivalent unix codice_4 executed without arguments unix user returned home directory executing command within script batch file also different effects different operating systems dos caller current directory directly altered batch file use command unix caller current directory altered script invocation command unix script usually executed within subshell file transfer protocol respective command spelled control stream available client command-line programs clients also changing working directory locally numerical computing environments matlab gnu octave include codice_5 function similar functionality command also pertains command-line interpreters various application software
[ 515, 9733, 9735, 2568, 521, 6664, 6674, 10771, 532, 8729, 7196, 9762, 2599, 8236, 9780, 5703, 5706, 3659, 2637, 4174, 7266, 5220, 8301, 1647, 9839, 8306, 4727, 5754, 5759, 8834, 2181, 5256, 6281, 6797, 4750, 10387, 2198, 4248, 6812, 7325,...
None
9,947
3
SV-328:sv-328 sv-328 8-bit home computer introduced spectravideo june 1983 business-targeted model spectravideo range sporting rather crowded full-travel keyboard numeric keypad 80 kb ram 64 kb available software remaining 16 kb video memory respectable amount time keyboard ram machine identical little brother sv-318 sv-328 design msx standard based spectravideo msx-compliant successor 328 sv-728 looks almost identical immediately noticeable differences larger cartridge slot central position fit msx standard cartridges lighter shaded keyboard msx badging reference operating system microsoft extended basic confused msx basic although marketing time claimed microsoft extended msx stood back sv-318 sv-328 adapters permit connect peripherals tape drive sv-903 cvbs monitor joysticks however super expander unit options available
[ 1121, 6889, 1515, 780, 3788, 3406, 2383, 1776, 7983, 9006, 9998, 4409, 1403, 2811 ]
Test
9,948
2
CFEngine:cfengine cfengine open-source configuration management system written mark burgess primary function provide automated configuration maintenance large-scale computer systems including unified management servers desktops consumer industrial devices embedded networked devices mobile smartphones tablet computers cfengine project began 1993 way author mark burgess post-doctoral fellow royal society oslo university norway get work done automating management small group workstations department theoretical physics like many post-docs phd students burgess ended task managing unix workstations scripting fixing problems users manually scripting took much time flavours unix significantly different scripts maintained multiple platforms drowning exception logic discussing problems colleague burgess wrote first version cfengine configuration engine published internal report presented cern computing conference gained significant attention wider community able hide platform differences using domain-specific language year later burgess finished post-doc decided stay oslo took job lecturing oslo university college realized little research done configuration management set applying principles scientific modelling understanding computer systems short space time developed notion convergent operators remains core cfengine 1998 burgess wrote computer immunology paper usenix/lisa98 conference laid manifesto creating self-healing systems reiterated years later ibm form autonomic computing started research effort led major re-write cfengine 2 added features machine learning anomaly detection secure communications 1998 2004 cfengine grew adoption along popularity linux computing platform time mark burgess developed promise theory model distributed cooperation self-healing automation 2008 five years research cfengine 3 introduced incorporated promise theory way make cfengine simpler powerful time according burgess significant re-write project date cfengine 3 also integrated knowledge management discovery mechanisms—allowing configuration management scale automate enterprise-class infrastructure june 2008 company cfengine formed collaboration author mark burgess oslo university college oslo innovation centre order support users cfengine april 2009 company launched first commercial version cfengine cfengine enterprise enterprise version downloaded free 25 agents clients february 2011 company received first round funding ferd capital company offices oslo norway mountain view california usa cfengine provides operating system-independent interface unix-like host configuration requires expert knowledge deal peculiarities different operating systems power perform maintenance actions across multiple hosts cfengine used windows hosts well widely used managing large numbers unix hosts run heterogeneous operating systems e.g solaris linux aix tru64 hp-ux shortly inception cfengine inspired field research automated configuration management cfengine project claims attempt place problem configuration management scientific framework author mark burgess developed range theoretical tools results talk problem written several text books monographs explaining one main ideas cfengine changes computer configuration carried convergent manner means change operation made agent character fixed point rather describing steps needed make change cfengine language describes final state one wants end agent ensures necessary steps taken end policy compliant state thus cfengine run whatever initial state system end predictable result cfengine supports item statistical compliance policy meaning system never guarantee exactly ideal desired state rather one approaches converges towards desired state best-effort rate determined ratio frequency environmental change rate cfengine execution cfengine used large small companies well many universities governmental institutions sites large 40,000 machines reported linkedin sites several thousand hosts running cfengine common according statistics cfengine probably several million computers run cfengine around world users 100 countries registered
[ 4802, 5255, 5612, 10222, 7983, 7124, 5397, 2966, 823, 1304, 1083, 8892, 8671 ]
None
9,949
2
Android_Q:android q android q upcoming tenth major release 17th version android mobile operating system currently public beta final release android q scheduled release q3 2019 google released first beta android q march 13 2019 exclusively pixel phones including first generation pixel pixel xl devices support extended due popular demand total six beta release-candidate versions released final release currently scheduled third quarter 2019 beta program expanded release beta 3 may 7 2019 beta available 14 partner devices 11 oems twice many devices compared android pie beta beta access removed huawei mate 20 pro may 21 2019 due u.s. government sanctions later reverted given access back may 31 google released beta 4 june 5 2019 finalized android q apis sdk api level 29 dynamic system updates dsu also included beta 4 dynamic system update allows android q devices temporarily install gsi generic system image try newer version android top current android version users decide end testing chosen gsi image simply reboot device boot back normal device android version google released beta 5 july 10 2019 final api 29 sdk well latest optimizations bug fixes google released beta 6 final release candidate testing august 7 2019 android q introduces revamped full-screen gesture system gestures swiping either side edge display go back swiping go home screen swiping holding access overview swiping diagonally bottom corner screen activate google assistant swiping along gesture bar bottom screen switch apps support gestures mandatory oems free add gestures alongside core gestures legacy three-key navigation style remains supported use edge swiping gesture back command noted potentially causing conflicts apps utilize sidebar menus functions accessible swiping api used apps opt handling back gesture within specific areas screen sensitivity control added adjusting size target area activate gesture google later stated drawer widget would support peeked long-pressing near edge screen swiped open feature known bubbles used present content supported apps pop-up overlays similarly overlay-based chat heads feature facebook messenger apps spawn bubbles via notifications example use cases feature include chat messaging apps reminders ongoing tasks updates bubbles designed replace existing overlay permission deprecated due security due use clickjacking malware performance concerns go edition forbids use overlay permissions entirely sideloaded apps automatically lose overlay permission 30 seconds apps play store lose overlay permission time device rebooted android q includes system-level dark theme third-party apps automatically engage dark theme mode active platform optimizations made foldable smartphones including app continuity changing modes changes multi-window mode allow apps run simultaneously rather actively-used app running others considered paused additional support multiple displays direct share succeeded sharing shortcuts allows apps return lists direct targets sharing combination app specific contact use within share menus unlike direct share apps publish targets advance polled runtime improving performance several major security privacy changes present q apps restricted users access location data actively used foreground also new restrictions launching activities background apps major change storage access permissions known scoped storage supported q become mandatory apps beginning next major android release 2020 apps allowed access files external storage created preferably contained within app-specific directory audio image video files contained within music pictures videos directories file may accessed via user intervention storage access framework apps must new read privileged phone state permission order read non-resettable device identifiers imei number
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 10284, 5677, 1083, 10303, 6212, 69, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 11391, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3782, 8907, 2259, 37...
Train
9,950
4
Honeynet_Project:honeynet project honeynet project international security research organization dedicated investigating latest attacks developing open source security tools improve internet security learning hackers behave honeynet project began 1999 small mailing list group people time group expanded officially dubbed honeynet project june 2000 project includes dozens active chapters around world including brazil indonesia greece india mexico iran australia ireland many united states honeynet project focuses three primary goals honeynet project volunteers collaborate security research efforts covering data analysis approaches unique security tool development gathering data attackers malicious software use project research provides critical additional information motives attacking communicate attack systems actions compromising system information provided know enemy whitepapers project blog posts scan month forensic challenges project uses normal computers without known vulnerabilities monitors network attacks
[ 1315, 9319, 9256, 7798, 4956 ]
Validation
9,951
3
Ishido:_The_Way_of_Stones:ishido way stones ishido way stones puzzle video game released 1990 accolade developed publishing international designed michael feinberg programmed ian gilman michael sandige game producer brad fregger brodie lockard designer shanghai computer game contributed graphics ishido puzzle board game consisting set 72 stones game board 96 squares every stone two attributes color symbol six colors six symbols stone set thus creating 36 unique stones since stone comes pair therefore 72 stones stone set primary objective ishido place 72 stones onto board 96 squares challenge arises stones must placed adjacent others match either color symbol board begins fill objective easily accomplished valuable move 4-way stone placed midst four others two matched color two matched symbol ishido comes 6 differently themed stone sets 5 different game boards variety oriental chimes sound effects ishido originally released macintosh 1990 ports ms-dos amiga game boy sega genesis year atari lynx famicom disk system versions published 1991 microsoft entertainment pack contained adaptation ishido called stones genesis port game involved copyright trial sega v. accolade actual physical board game version ishido published japan ascii 1992 compute called macintosh version ishido addictive ... peaceful encounter oriental flavor new york times wrote one deceptively simple games like go gradually reveal subtleties ... engrossing computer gaming world called game remarkably complex entertainment resource pleasant surprises magazine liked ishido vga graphics concluded would please novice experienced strategy game players atari lynx version game reviewed 1992 dragon 181 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars entertainment weekly gave game b+ ishido rated 'five mice macuser entered macuser game hall fame also pc magazine best strategy game year award 1990 reviewing ishido re-release 1995 macuser gave 4 5 mice integrated ishido oracle way ask questions ancient chinese book changes ching first user poses question meditate upon playing game attain 4-way match ishido utilizing algorithm authentic yarrow stalk method consulting oracle obtains answer original translation ching used wilhelm/baynes anthony translations primary sources written game michael feinberg original ishido game published publishing international limited edition hand-made walnut slip box following year 1990 accolade published first mass-market version ishido came 20-page booklet legend ishido began story fictional written michael feinberg nevertheless many believed ishido actually ancient game recently re-discovered
[ 5762, 8484, 9166, 4856, 4152, 9627, 95 ]
Validation
9,952
3
Macintosh_Quadra_950:macintosh quadra 950 macintosh quadra 950 also sold additional software workgroup server 95 personal computer designed manufactured sold apple computer inc. march 1992 october 1995 replaced quadra 900 introduced several months earlier increasing cpu clock rate 68040 cpu improving graphics support two computers otherwise identical including price macintosh processor upgrade card installed computer known power macintosh 950 1993 950 overtaken performance less expensive quadra 800 840av newer quadras addition interleaved ram well enhanced video system scsi bus however compact mini-tower case offered less expansion capability 950 due mid-tower case allowing 6 slots supported kept continued production server market outliving 800 840av 950 discontinued apple n't offer another 6-slot macintosh power macintosh 9600 1997 quadra 950 replaced powerpc-based power macintosh 9500 may 1995 sales continuing october last macintosh quadra sold apple one last 68k models discontinued due high ram capacity large number nubus slots workgroup server 95 succeeded workgroup server 9150 logic board five nubus slots processor direct slot due positioning pds possible use one nubus slots pds card installed nubus-90 standard partially supported allowing cards run 20 mhz two slots provide 25 watts power instead usual 15 watts logic board 1 mb on-board video ram 4 simm slots allow upgrading 2 mb 950 includes key limit access various subsystems depending computer use environment key switch three positions labelled secure position immediately cuts power prevented computer powered position allows computer operate normally secure position intended use server – power always applied position computer lost power immediately starts power restored also position disables keyboard mouse floppy disk drive workgroup server 95 models include workgroup server pds card provides three capabilities two scsi controllers two internal scsi connectors plus one external connector dms scsi control chip reduces i/o load main cpu 128 kb sram used l2 cache three additional slots provide ability expand l2 cache 512 kb quadra 950 announced march 18 dealers receiving machines around may 18 introduced may 18 1992 introduced march 22 1993
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 3167, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 7305, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 3241, 6314, 7869, ...
None
9,953
6
7-Zip:7-zip 7-zip free open-source file archiver utility used place groups files within compressed containers known archives developed igor pavlov first released 1999 7-zip uses 7z archive format read write several archive formats program used command-line interface command p7zip graphical user interface also features shell integration 7-zip source code gnu lgpl license unrar code however gnu lgpl unrar restriction states developers permitted use code reverse-engineer rar compression algorithm default 7-zip creates 7z-format archives codice_1 file extension archive contain multiple directories files container format security size reduction achieved using stacked combination filters consist pre-processors compression algorithms encryption filters core 7z compression uses variety algorithms common bzip2 ppmd lzma2 lzma developed pavlov lzma relatively new system making debut part 7z format lzma uses lz-based sliding dictionary 4 gb size backed range coder native 7z file format open modular file names stored unicode 2011 toptenreviews found 7z compression least 17 better zip 7-zip site since 2002 reported compression ratio results dependent upon data used tests usually 7-zip compresses 7z format 30–70 better zip format 7-zip compresses zip format 2–10 better zip-compatible programs 7z file format specification distributed program source code doc subdirectory 7-zip supports number compression non-compression archive formats packing unpacking including zip gzip bzip2 xz tar wim utility also supports unpacking apm arj chm cpio deb flv jar lha/lzh lzma mslz office open xml onepkg rar rpm smzip swf xar z archives cramfs dmg fat hfs iso mbr ntfs squashfs udf vhd disk images 7-zip supports zipx format unpacking support since least version 9.20 released late 2010 7-zip open msi files allowing access meta-files within along main contents microsoft cab lzx compression nsis lzma installer formats opened similarly microsoft executable programs .exes self-extracting archives otherwise contain archived content e.g. setup files may opened archives compressing zip gzip files 7-zip uses deflate encoder may achieve higher compression lower speed common zlib deflate implementation 7-zip deflate encoder implementation available separately part advancecomp suite tools decompression engine rar archives developed using freely available source code unrar program licensing restriction creation rar compressor 7-zip v15.06 later support extraction files rar5 format backup systems use formats supported archiving programs 7-zip e.g. android backups codice_2 format extracted archivers 7-zip 7-zip comes file manager along standard archiver tools file manager toolbar options create archive extract archive test archive detect errors copy move delete files open file properties menu exclusive 7-zip file manager default displays hidden files follow windows explorer policies tabs show name modification time original compressed sizes attributes comments 4dos codice_3 format going one directory root drives removable internal appear going shows list four options 7-zip lzma sdk originally dual-licensed gnu lgpl common public license additional special exception linked binaries december 2 2008 sdk placed igor pavlov public domain two command-line versions provided 7z.exe using external libraries standalone executable 7za.exe containing built-in modules compression/decompression support limited 7z zip gzip bzip2 z tar formats 64-bit version available support large memory maps leading faster compression versions support multi-threading 7za.exe version 7-zip available unix-like operating systems including linux freebsd macos freedos openvms amigaos 4 morphos p7zip project 7-zip supports self-extracting archives including executable installer 7-zip vulnerable arbitrary code execution dll hijacking load run dll named uxtheme.dll folder executable file 7-zip 16.03 release notes say installer sfx modules added protection dll preloading attack versions 7-zip prior 18.05 contain arbitrary code execution vulnerability module extracting files rar archives cve-2018-10115 vulnerability fixed 30 april 2018 snapfiles.com 2012 rated 7-zip 4.5 stars 5 noting interface additional features fairly basic compression ratio outstanding techrepublic 2009 justin james found detailed settings windows file manager integration appreciated called compression-decompression benchmark utility neat though archive dialog settings confound users concluded 7-zip fits nice niche built-in windows capabilities features paid products able handle large variety file formats process 2002 2016 7-zip downloaded 410 million times sourceforge alone software received awards 2007 sourceforge.net granted community choice awards technical design best project 2013 7-zip received tom hardware elite award due superiority speed compression ratio
[ 3969, 4870, 6022, 10121, 1420, 2193, 9874, 1940, 5397, 3222, 8214, 9880, 9121, 546, 292, 3366, 3114, 10027, 6062, 7983, 2864, 5682, 8114, 950, 823, 6713, 2755, 11076, 1352, 4296, 2251, 1101, 4174, 8909, 10317, 4561, 722, 8147, 10575, 1083...
Train
9,954
4
De-perimeterisation:de-perimeterisation information security de-perimeterisation removal boundary organisation outside world de-perimeterisation protecting organization systems data multiple levels using mixture encryption secure computer protocols secure computer systems data-level authentication rather reliance organization network boundary internet successful implementation de-perimeterised strategy within organization implies perimeter outer security boundary removed metaphorically de-perimeterisation similar historic dismantling city walls allow free flow goods information achieve shift city states nation states creation standing armies city boundaries extended surround multiple cities de-perimeterisation coined jon measham former employee uk ’ royal mail research paper subsequently used jericho forum royal mail founding member claims made removal border include freeing business-to-business transactions reduction cost ability company agile taken furthest extent organisation could operate securely directly internet operating without hardened border frees organizations collaborate utilizing solutions based collaboration oriented architecture framework recently term used context result entropy deliberate activities individuals within organizations usurp perimeters often well-intentioned reasons latest jericho forum paper named collaboration oriented architecture refers trend de-perimeterisation problem problem br traditional electronic boundary corporate ‘ private ’ network internet breaking trend called de-perimeterisation variations term used describe aspects de-perimeterisation
[ 9858, 8998, 9513, 3629, 9113, 5373 ]
Test
9,955
3
SPARCstation:sparcstation sparcstation sparcserver sparccenter product lines series sparc-based computer workstations servers desktop desk side pedestal rack-based form factor configurations developed sold sun microsystems first sparcstation sparcstation 1 also known sun 4/60 introduced 1989 series popular introduced sun-4c architecture variant sun-4 architecture previously introduced sun 4/260 thanks part delay development modern processors motorola sparcstation series successful across entire industry last model bearing sparcstation name sparcstation 20 workstation series replaced sun ultra series 1995 next sun server generation sun enterprise line introduced 1996 desktop deskside sparcstations sparcservers model number essentially identical systems difference systems designated servers usually headless configured without graphics card monitor sold server rather desktop os license example sparcstation 20 sparcserver 20 almost identical motherboard cpu case design hardware specifications desktop sparcstations sparcservers shipped either pizzabox lunchbox enclosures significant departure earlier sun competing systems time sparcstation 1 2 4 5 10 20 pizzabox machines sparcstation slc elc integrated sun monochrome monitor enclosures sparcstation ipc ipx sparcclassic sparcclassic x sparcstation lx lunchbox machines sparcserver models ending 30 70 housed deskside pedestal enclosures respectively 5-slot 12-slot vmebus chassis models ending 90 sparccenter 2000 came rackmount cabinet enclosures sparcserver 1000 design large rack-mountable desktop unit later versions sparcstation series sparcstation 10 20 could configured multiprocessor systems based mbus high-speed bus systems could accept one two single dual central processing units packaged mbus modules launch sparcserver 600mp series sparcstation/server models also assigned sun 4-series model numbers later models received s-prefix model numbers models listed within category approximately chronological order note configurations supported sun microsystems various third-party processor upgrades available sparcstation/server systems instance 80 mhz weitek power μp sparcstation 2 ipx ross hypersparc mbus modules rated clock speeds 200 mhz mentioned models listed sparcstations also available sparcserver configuration vice versa cs6400 developed outside group working cooperatively rather competitively sun microsystems result although sold cray research “ cray superserver 6400 ” components sun oem part numbers machine documented sun system handbook 1996 cray research bought silicon graphics cs6400 development group sold sun released 64-processor sun ultra enterprise 10000 “ starfire ” following year
[ 3328, 9090, 9731, 4479, 1801, 4235, 1809, 4241, 2710, 1818, 8863, 7072, 9343, 8994, 11426, 36, 1316, 10789, 11553, 1707, 2731, 5677, 6187, 3247, 11440, 6322, 2871, 4664, 442, 4285, 6464, 7104, 6338, 9665, 10051, 10436, 3911, 1480, 8007, 4...
None
9,956
0
Co-occurrence_network:co-occurrence network co-occurrence networks generally used provide graphic visualization potential relationships people organizations concepts biological organisms like bacteria entities represented within written material generation visualization co-occurrence networks become practical advent electronically stored text compliant text mining way definition co-occurrence networks collective interconnection terms based paired presence within specified unit text networks generated connecting pairs terms using set criteria defining co-occurrence example terms b may said “ co-occur ” appear particular article another article may contain terms b c. linking b b c creates co-occurrence network three terms rules define co-occurrence within text corpus set according desired criteria example stringent criteria co-occurrence may require pair terms appear sentence co-occurrence networks created given list terms dictionary relation collection texts text corpus co-occurring pairs terms called “ neighbors ” often group “ neighborhoods ” based interconnections individual terms may several neighbors neighborhoods may connect one another least one individual term may remain unconnected individual terms within context text mining symbolically represented text strings real world entity identified term normally several symbolic representations therefore useful consider terms represented one primary symbol several synonymous alternative symbols occurrence individual term established searching known symbolic representations term process augmented nlp natural language processing algorithms interrogate segments text possible alternatives word order spacing hyphenation nlp also used identify sentence structure categorize text strings according grammar example categorizing string text noun based preceding string text known article graphic representation co-occurrence networks allow visualized inferences drawn regarding relationships entities domain represented dictionary terms applied text corpus meaningful visualization normally requires simplifications network example networks may drawn number neighbors connecting term limited criteria limiting neighbors might based absolute number co-occurrences subtle criteria “ probability ” co-occurrence presence intervening descriptive term quantitative aspects underlying structure co-occurrence network might also informative overall number connections entities clustering entities representing sub-domains detecting synonyms etc working applications co-occurrence approach available public internet pubgene example application addresses interests biomedical community presenting networks based co-occurrence genetics related terms appear medline records website namebase example human relationships inferred examining networks constructed co-occurrence personal names newspapers texts ozgur et al. networks information also used facilitate efforts organize focus publicly available information law enforcement intelligence purposes called open source intelligence osint related techniques include co-citation networks well analysis hyperlink content structure internet analysis web sites connected terrorism
[ 8440, 7780, 7599 ]
Test
9,957
3
F-1_Spirit_(series):f-1 spirit series top formula one racing game developed published konami released msx japan europe 1987 game engine similar konami road fighter also features konami custom sound chip called konami scc five-channel chip compliments three-channel psg chip msx computer system words sound custom chip brings five voices three voices psg sound chip system great msx1 graphics go one first rom msx sound feature together 3d spinoff f-1 spirit 3d special f-1 spirit way formula-1 extended racing game konami released msx third-person racing game features many different types cars everything starts stock cars moving rally cars formula 3 main goal finish first place formula 1 king class racing six types races stock race rally f3 race f3000 race endurance race finally f1 races 16 tracks initially player race stock rally f3 races player win races accumulate points allow play new races player finish race first place receive nine points gets eight points finishes second etc player finish 10th later score points 16 different tracks f1 cars player wins races able play tracks f1 car category complete game win 16 f1 tracks grand total 21 tracks first races easiest ones cars slow enemies drive well player classify new tracks difficulty increase f1 cars insanely fast need great agility win f1 tracks even though look impossible control first practice master formula 1 cars win races enough always show skills multi player mode difficulty level set race track selected number laps variable field includes ready made custom made cars player select engine tires suspension avoiding slower cars player come lap crucial race bump cars side boards obstacles damage car every track pit lane labeled letters pit fuel repair car top speed decrease engine damaged make lose time every lap pit stop hold key speed car repairs fuel intake slower though fuel consumption determined rpm meter real cars car consumes fuel accelerate f1 tracks first race unless ace driver win f1 race try memorize curve play race several times know brake accelerate unlicensed sega master system port released zemina year f1 스피리트 similar game chequered flag released arcades 1988 special version original f-1 spirit a1 spirit way formula-1 released pack-in panasonic joy handle game controller chief differences features futuristic vehicles instead racing cars different passwords e.g panasonic see ending demo bugfixes full successor game released 1988 msx2+ spec unlike original game uses scaling-based third-person graphics like pole position like focuses specifically f-1 racing addition free run grand prix modes two player battle mode difficulty level set free run number settings number laps variable cars custom made body color car engine tires suspension brakes gear wings modified released three floppy disks game konami ever developed msx2+ spec game featured special cable allowed two msx2+ computers linked via second joystick port cable sold separately name je700 multiplayer link cable also reverse-engineered enthusiasts use games another thing makes game special uses msx-music fm-pac yamaha ym2413 opll sound chip originally sold separately built various models msx2+ msx turbor computers game konami used particular sound chip konami games enhanced music use konami scc sound chip even games distributed floppy disk often accompanied scc rom cartridge like snatcher sd snatcher original music composed goro kin supposedly pseudonym similar product f-1 sensation released family computer 1993 contains many features though battle mode dropped based around 1992 formula one season released north america world circuit series europe spirit f-1 released game boy 1991 top-viewed racing game like original players compete formula 3 formula 3000 formula 1 25 different tracks around world featured playable according class rise class tracks become longer forcing pit stops racers become faster turns change simple low angle corners require slight trajectory elbow corners require skill turn without losing speed later re-released first volume konami gb collection japan europe although renamed konami racing versions collection 2004 unlicensed remake original f-1 spirit released brain games chiefly 2004 retro remakes competition context developed successor team road fighter remake remake retains much gameplay content original changed physics number sound graphical improvements latter make game resemble titles f-1 grand prix online leaderboards ported windows mac os x linux even arm devices binary versions windows os x provided .deb provided ubuntu debian linux flavors oses general source code game available well
[ 10695, 8232, 4524, 3788, 9006, 10576, 5265, 6449, 3348, 11221, 823, 7832, 1340 ]
Validation
9,958
4
Organisation-based_access_control:organisation-based access control computer security organization-based access control orbac access control model first presented 2003 current approaches access control rest three entities subject action object control access policy specifies subject permission realize action object orbac allows policy designer define security policy independently implementation chosen method fulfill goal introduction abstract level security policy defined organization thus specification security policy completely parameterized organization possible handle simultaneously several security policies associated different organizations model restricted permissions also includes possibility specify prohibitions obligations three abstract entities roles activities views abstract privileges defined abstract privileges concrete privileges derived orbac context sensitive policy could expressed dynamically furthermore orbac owns concepts hierarchy organization role activity view context separation constraints
[ 1792, 5573, 8838, 4912, 2737, 210, 8210, 10580, 10968, 7260, 2558 ]
Test
9,959
3
IXP1200:ixp1200 ixp1200 network processor fabricated intel corporation processor originally digital equipment corporation dec project development since late 1996 parts dec digital semiconductor business acquired intel 1998 part out-of-court settlement end lawsuits company launched patent infringement processor transferred intel dec design team retained design completed intel samples processor available intel partners since 1999 general sample availability late 1999 processor introduced early 2000 166 200 mhz 232 mhz version introduced later processor later succeeded ixp2000 xscale-based family developed entirely intel processor intended replace general-purpose embedded microprocessors specialized application-specific integrated circuit asic combinations used network routers.the ixp1200 designed mid-range high-end routers high-end models processor could combined others increase capability performance router ixp1200 integrates strongarm sa-1100-derived core six microengines risc microprocessors instruction set optimized network packet workloads strongarm core performed non-real-time functions microengines manipulated network packets processor also integrates static random access memory sram synchronous dynamic random access memory sdram controllers pci interface ix bus interface ixp1200 contains 6.5 million transistors measures 126 mm fabricated 0.28 µm complementary metal–oxide–semiconductor cmos process three levels interconnect packaged 432-ball enhanced ball grid array ebga ixp1200 fabricated dec former hudson massachusetts plant
[ 704, 6730, 7755, 4622, 8625, 499, 1972, 10548, 8795, 6971, 1085, 3294, 6911 ]
Test
9,960
9
NewtonScript:newtonscript newtonscript prototype-based programming language created write programs newton platform heavily influenced self programming language modified suited needs mobile embedded devices august 3 1993 apple unveiled apple newton messagepad device 640 kb ram 4 mb rom running 20 mhz acorn risc machine main intention behind newton project develop device capable replacing computer portable limited battery memory developers looking programming language capable meeting challenges developers looked c++ language realized lacked flexibility started focusing prototype based languages impressed smalltalk self concurrently apple developing another dynamic programming language called dylan strong candidate newton platform however self dylan dropped consideration nascent stage proper integration instead team headed walter r smith developed new language called newtonscript influenced dynamic language like smalltalk prototype model based like self although newtonscript heavily influenced self differences languages differences arose due three perceived problems self syntax also modified allow text-based programming style opposed self widespread use gui environment programming allowed newton programs developed computer running toolkit programs would compiled downloaded newton device running one advantages newtonscript prototype based inheritance reduced memory usage key consideration 128 kb newton prototype gui object could actually stored rom need copy default data functions working memory unlike class based languages creation object involves memory allocated attributes newtonscripts use prototype inheritance allowed allocated memory fields like _proto _parent instead creating whole new object _proto _parent signifies whether object using prototype parent inheritance example illustrate concept developer might create new button instance button uses default font accessing font slot i.e. property member variable return value actually stored rom button instance ram value font slot prototype inheritance chain followed value found developer changes button font setting font slot new value override prototype override value stored ram newtonscript differential inheritance therefore made efficient use newton expensive flash ram storing bulk default data code pda cheaper much larger rom views objects created newton view system created run-time render views template blueprint views created protos blueprint template view elements newtonscript code libraries frame slot frame dynamic collection slots one element fram called slot slot made name value value type worthwhile note objects newtonscript frames soup entry related collection frames/ data entry individual frame soup frame heap ram allocated dynamically newtonscript base view main view application consisting variables methods used application advantages disadvantages cancellation newton project apple 1998 mainstream developments newtonscript stopped however features used newtonscript would continue inspire programming models languages prototype-based object model self newtonscript used javascript popular visible language use concept far newtonscript also one conceptual ancestors together smalltalk self act1 lisp lua general-purpose programming language called io implements differential inheritance model used newtonscript conserve memory
[ 2304, 9345, 1954, 3462, 6502, 8262, 4777, 3051, 2383, 10198, 1591 ]
None
9,961
7
Princh:princh princh danish software company founded 2014 developing cloud printing solutions company headquartered city aarhus denmark based idea sharing economy princh building global network printers via smartphone web app users locate printer nearby get directions go print pay print job solution available native mobile apps android ios well web desktop solutions businesses libraries app connects network printer owners users around world princh supports types printable files company founded 2014 first months headquarters located navitas building harbor aarhus early 2015 company signed investment deal private investor allowing princh move bigger offices expand team company currently based southern part aarhus princh printing service officially launched june 23 2015 present princh solution consists printers multitude locations print shops libraries hotels universities conference centers princh popular printing solution among libraries found denmark sweden germany norway princh app users able locate nearest printer denmark currently around 500 printing locations user printer user chooses document printed opens ios shares android princh point document uploaded princh cloud user selects desired nearby printer entering printer id number scanning qr-code located top printer pays credit card preferred payment option print job carried printer owners get access personal control panel set print prices monitor princh activity business installing princh free printer owners princh gets small fee per print job
[ 662 ]
Test
9,962
7
Distributed_object_middleware:distributed object middleware distributed object middleware dom type infrastructure allows remote access remote objects transparently based remote procedure call rpc mechanism dom systems also enable objects different platforms interact example corba examples dom systems include microsoft distributed component object model dcom enterprise javabeans ejb sun microsystems oracle corporation
[ 9441, 9665, 10024, 7067, 3517 ]
Test
9,963
4
AEGIS_SecureConnect:aegis secureconnect aegis secureconnect simply 'aegis former name network authentication system used ieee 802.1x networks developed meetinghouse data communications inc. system renamed cisco secure services client meetinghouse acquired cisco systems aegis protocol 802.1x supplicant i.e handles authentication wired wireless networks use wpa-psk wpa-radius certificate-based authentication commonly installed along network interface card nic vpn drivers
[ 6904, 6834, 4435, 10332 ]
None
9,964
3
ARM_architecture:arm architecture arm previously advanced risc machine originally acorn risc machine family reduced instruction set computing risc architectures computer processors configured various environments arm holdings develops architecture licenses companies design products implement one architecturesincluding systems-on-chips soc systems-on-modules som incorporate memory interfaces radios etc also designs cores implement instruction set licenses designs number companies incorporate core designs products processors risc architecture typically require fewer transistors complex instruction set computing cisc architecture x86 processors found personal computers improves cost power consumption heat dissipation characteristics desirable light portable battery-powered devicesincluding smartphones laptops tablet computers embedded systems supercomputers consume large amounts electricity arm could also power-efficient solution arm holdings periodically releases updates architecture architecture versions armv3 armv7 support 32-bit address space pre-armv3 chips made arm holdings formed used acorn archimedes 26-bit address space 32-bit arithmetic architectures 32-bit fixed-length instructions thumb version supports variable-length instruction set provides 32- 16-bit instructions improved code density older cores also provide hardware execution java bytecodes newer ones one instruction javascript released 2011 armv8-a architecture added support 64-bit address space 64-bit arithmetic new 32-bit fixed-length instruction set 100 billion arm processors produced arm widely used instruction set architecture instruction set architecture produced largest quantity currently widely used cortex cores older classic cores specialized securcore cores variants available include exclude optional capabilities british computer manufacturer acorn computers first developed acorn risc machine architecture arm 1980s use personal computers first arm-based products coprocessor modules bbc micro series computers successful bbc micro computer acorn computers considered move relatively simple mos technology 6502 processor address business markets like one soon dominated ibm pc launched 1981 acorn business computer abc plan required number second processors made work bbc micro platform processors motorola 68000 national semiconductor 32016 considered unsuitable 6502 powerful enough graphics-based user interface according sophie wilson processors tested time performed 4 mbit/second bandwidth testing available processors finding lacking acorn decided needed new architecture inspired papers berkeley risc project acorn considered designing processor visit western design center phoenix 6502 updated effectively single-person company showed acorn engineers steve furber sophie wilson need massive resources state-of-the-art research development facilities wilson developed instruction set writing simulation processor bbc basic ran bbc micro 6502 second processor convinced acorn engineers right track wilson approached acorn ceo hermann hauser requested resources hauser gave approval assembled small team implement wilson model hardware official acorn risc machine project started october 1983 chose vlsi technology silicon partner source roms custom chips acorn wilson furber led design implemented similar efficiency ethos 6502 key design goal achieving low-latency input/output interrupt handling like 6502 6502 memory access architecture let developers produce fast machines without costly direct memory access dma hardware first samples arm silicon worked properly first received tested 26 april 1985 first arm application second processor bbc micro helped developing simulation software finish development support chips vidc ioc memc sped cad software used arm2 development wilson subsequently rewrote bbc basic arm assembly language in-depth knowledge gained designing instruction set enabled code dense making arm bbc basic extremely good test arm emulator original aim principally arm-based computer achieved 1987 release acorn archimedes 1992 acorn queen award technology arm arm2 featured 32-bit data bus 26-bit address space 27 32-bit registers eight bits program counter register available purposes top six bits available 26-bit address space served status flags bottom two bits available program counter always word-aligned used setting modes address bus extended 32 bits arm6 program code still lie within first 64 mb memory 26-bit compatibility mode due reserved bits status flags arm2 transistor count 30,000 compared motorola six-year-older 68000 model around 40,000 much simplicity came lack microcode represents one-quarter one-third 68000 like cpus day including cache simplicity enabled low power consumption yet better performance intel 80286 successor arm3 produced 4 kb cache improved performance late 1980s apple computer vlsi technology started working acorn newer versions arm core 1990 acorn spun design team new company named advanced risc machines ltd. became arm ltd parent company arm holdings plc floated london stock exchange nasdaq 1998 new apple-arm work would eventually evolve arm6 first released early 1992 apple used arm6-based arm610 basis apple newton pda 1994 acorn used arm610 main central processing unit cpu riscpc computers dec licensed armv4 architecture produced strongarm 233 mhz cpu drew one watt newer versions draw far less work later passed intel part lawsuit settlement intel took opportunity supplement i960 line strongarm intel later developed high performance implementation named xscale since sold marvell transistor count arm core remained essentially throughout changes arm2 30,000 transistors arm6 grew 35,000 2005 98 mobile phones sold used least one arm processor 2010 producers chips based arm architectures reported shipments 6.1 billion arm-based processors representing 95 smartphones 35 digital televisions set-top boxes 10 mobile computers 2011 32-bit arm architecture widely used architecture mobile devices popular 32-bit one embedded systems 2013 10 billion produced arm-based chips found nearly 60 percent world ’ mobile devices arm holdings primary business selling ip cores licensees use create microcontrollers mcus cpus systems-on-chips based cores original design manufacturer combines arm core parts produce complete device typically one built existing semiconductor fabrication plants fabs low cost still deliver substantial performance successful implementation arm7tdmi hundreds millions sold atmel precursor design center arm7tdmi-based embedded system arm architectures used smartphones pdas mobile devices range armv5 armv7-a used low-end midrange devices armv8-a used current high-end devices 2009 manufacturers introduced netbooks based arm architecture cpus direct competition netbooks based intel atom according analyst firm ihs isuppli 2015 arm integrated circuits may 23 laptops arm holdings offers variety licensing terms varying cost deliverables arm holdings provides licensees integratable hardware description arm core well complete software development toolset compiler debugger software development kit right sell manufactured silicon containing arm cpu soc packages integrating arm core designs include nvidia tegra first three generations csr plc quatro family st-ericsson nova novathor silicon labs precision32 mcu texas instruments omap products samsung hummingbird exynos products apple a4 a5 a5x freescale i.mx fabless licensees wish integrate arm core chip design usually interested acquiring ready-to-manufacture verified semiconductor intellectual property core customers arm holdings delivers gate netlist description chosen arm core along abstracted simulation model test programs aid design integration verification ambitious customers including integrated device manufacturers idm foundry operators choose acquire processor ip synthesizable rtl verilog form synthesizable rtl customer ability perform architectural level optimisations extensions allows designer achieve exotic design goals otherwise possible unmodified netlist high clock speed low power consumption instruction set extensions etc. arm holdings grant licensee right resell arm architecture licensees may freely sell manufactured product chip devices evaluation boards complete systems merchant foundries special case allowed sell finished silicon containing arm cores generally hold right re-manufacture arm cores customers arm holdings prices ip based perceived value lower performing arm cores typically lower licence costs higher performing cores implementation terms synthesizable core costs hard macro blackbox core complicating price matters merchant foundry holds arm licence samsung fujitsu offer fab customers reduced licensing costs exchange acquiring arm core foundry in-house design services customer reduce eliminate payment arm upfront licence fee compared dedicated semiconductor foundries tsmc umc without in-house design services fujitsu/samsung charge two- three-times per manufactured wafer low mid volume applications design service foundry offers lower overall pricing subsidisation licence fee high volume mass-produced parts long term cost reduction achievable lower wafer pricing reduces impact arm nre non-recurring engineering costs making dedicated foundry better choice companies designed chips arm cores include amazon.com annapurna labs subsidiary analog devices apple appliedmicro macom technology solutions atmel broadcom cypress semiconductor freescale semiconductor nxp semiconductors huawei maxim integrated nvidia nxp qualcomm renesas samsung electronics st microelectronics texas instruments xilinx february 2016 arm announced built arm cortex technology licence often shortened built cortex boc licence licence allows companies partner arm make modifications arm cortex designs design modifications shared companies semi-custom core designs also brand freedom example kryo 280 companies current licensees built arm cortex technology include qualcomm companies also obtain arm architectural licence designing cpu cores using arm instruction sets cores must comply fully arm architecture companies designed cores implement arm architecture include apple appliedmicro broadcom cavium marvell nvidia qualcomm samsung electronics arm holdings provides list vendors implement arm cores design application specific standard products assp microprocessor microcontrollers arm cores used number products particularly pdas smartphones computing examples microsoft first generation surface surface 2 apple ipads asus eee pad transformer tablet computers several chromebook laptops others include apple iphone smartphone ipod portable media player canon powershot digital cameras nintendo switch hybrid 3ds handheld game consoles tomtom turn-by-turn navigation systems 2005 arm holdings took part development manchester university computer spinnaker used arm cores simulate human brain arm chips also used raspberry pi beagleboard beaglebone pandaboard single-board computers small inexpensive consume little power 32-bit arm architecture armv7-a implementing aarch32 see section armv8 widely used architecture mobile devices since 1995 arm architecture reference manual primary source documentation arm processor architecture instruction set distinguishing interfaces arm processors required support instruction semantics implementation details may vary architecture evolved time version seven architecture armv7 defines three architecture profiles although architecture profiles first defined armv7 arm subsequently defined armv6-m architecture used cortex m0/m0+/m1 subset armv7-m profile fewer instructions except m-profile 32-bit arm architecture specifies several cpu modes depending implemented architecture features moment time cpu one mode switch modes due external events interrupts programmatically original subsequent arm implementation hardwired without microcode like much simpler 8-bit 6502 processor used prior acorn microcomputers 32-bit arm architecture 64-bit architecture part includes following risc features compensate simpler design compared processors like intel 80286 motorola 68020 additional design features used arm includes integer arithmetic operations add subtract multiply versions architecture also support divide operations arm supports 32-bit × 32-bit multiplies either 32-bit result 64-bit result though cortex-m0 m0+ m1 cores n't support 64-bit results arm cores also support 16-bit × 16-bit 32-bit × 16-bit multiplies divide instructions included following arm architectures registers r0 r7 across cpu modes never banked registers r8 r12 across cpu modes except fiq mode fiq mode distinct r8 r12 registers r13 r14 banked across privileged cpu modes except system mode mode entered exception r13 r14 registers generally contain stack pointer return address function calls respectively aliases current program status register cpsr following 32 bits almost every arm instruction conditional execution feature called predication implemented 4-bit condition code selector predicate allow unconditional execution one four-bit codes causes instruction always executed cpu architectures condition codes branch instructions though predicate takes four 32 bits instruction code thus cuts significantly encoding bits available displacements memory access instructions avoids branch instructions generating code small codice_1 statements apart eliminating branch instructions preserves fetch/decode/execute pipeline cost one cycle per skipped instruction standard example conditional execution subtraction-based euclidean algorithm c programming language loop arm assembly loop effectively transformed coded avoids branches around codice_2 codice_3 clauses codice_4 codice_5 equal neither codice_6 instructions executed eliminating need conditional branch implement codice_7 check top loop example codice_8 less equal used one ways thumb code provides dense encoding remove four-bit selector non-branch instructions another feature instruction set ability fold shifts rotates data processing arithmetic logical register-register move instructions example c statement could rendered single-word single-cycle instruction results typical arm program denser expected fewer memory accesses thus pipeline used efficiently arm processor also features rarely seen risc architectures pc-relative addressing indeed 32-bit arm pc one 16 registers pre- post-increment addressing modes arm instruction set increased time early arm processors arm7tdmi example instruction store two-byte quantity arm7 earlier implementations three-stage pipeline stages fetch decode execute higher-performance designs arm9 deeper pipelines cortex-a8 thirteen stages additional implementation changes higher performance include faster adder extensive branch prediction logic difference arm7di arm7dmi cores example improved multiplier hence added arm architecture pre-armv8 provides non-intrusive way extending instruction set using coprocessors addressed using mcr mrc mrrc mcrr similar instructions coprocessor space divided logically 16 coprocessors numbers 0 15 coprocessor 15 cp15 reserved typical control functions like managing caches mmu operation processors one arm-based machines peripheral devices usually attached processor mapping physical registers arm memory space coprocessor space connecting another device bus turn attaches processor coprocessor accesses lower latency peripherals—for example xscale interrupt controller—are accessible ways memory coprocessors cases chip designers integrate hardware using coprocessor mechanism example image processing engine might small arm7tdmi core combined coprocessor specialised operations support specific set hdtv transcoding primitives modern arm processors include hardware debugging facilities allowing software debuggers perform operations halting stepping breakpointing code starting reset facilities built using jtag support though newer cores optionally support arm two-wire swd protocol arm7tdmi cores represented jtag debug support represented presence embeddedice debug module arm7 arm9 core generations embeddedice jtag de facto debug standard though architecturally guaranteed armv7 architecture defines basic debug facilities architectural level include breakpoints watchpoints instruction execution debug mode similar facilities also available embeddedice halt mode monitor mode debugging supported actual transport mechanism used access debug facilities architecturally specified implementations generally include jtag support separate arm coresight debug architecture architecturally required armv7 processors improve arm architecture digital signal processing multimedia applications dsp instructions added set signified e name armv5te armv5tej architectures e-variants also imply new instructions common digital signal processor dsp architectures include variations signed multiply–accumulate saturated add subtract count leading zeros introduced armv6 architecture precursor advanced simd also known neon jazelle dbx direct bytecode execution technique allows java bytecode executed directly arm architecture third execution state instruction set alongside existing arm thumb-mode support state signified j armv5tej architecture arm9ej-s arm7ej-s core names support state required starting armv6 except armv7-m profile though newer cores include trivial implementation provides hardware acceleration improve compiled code-density processors since arm7tdmi released 1994 featured thumb instruction set state tdmi indicates thumb feature state processor executes thumb instruction set compact 16-bit encoding subset arm instruction set thumb instructions directly mapped normal arm instructions space-saving comes making instruction operands implicit limiting number possibilities compared arm instructions executed arm instruction set state thumb 16-bit opcodes less functionality example branches conditional many opcodes restricted accessing half cpu general-purpose registers shorter opcodes give improved code density overall even though operations require extra instructions situations memory port bus width constrained less 32 bits shorter thumb opcodes allow increased performance compared 32-bit arm code less program code may need loaded processor constrained memory bandwidth unlike processor architectures variable length 16- 32-bit instructions cray-1 hitachi superh arm thumb instruction sets exist independently embedded hardware game boy advance typically small amount ram accessible full 32-bit datapath majority accessed via 16-bit narrower secondary datapath situation usually makes sense compile thumb code hand-optimise cpu-intensive sections using full 32-bit arm instructions placing wider instructions 32-bit bus accessible memory first processor thumb instruction decoder arm7tdmi arm9 later families including xscale included thumb instruction decoder includes instructions adopted hitachi superh 1992 licensed arm arm smallest processor families cortex m0 m1 implement 16-bit thumb instruction set maximum performance lowest cost applications thumb-2 technology introduced arm1156 core announced 2003 thumb-2 extends limited 16-bit instruction set thumb additional 32-bit instructions give instruction set breadth thus producing variable-length instruction set stated aim thumb-2 achieve code density similar thumb performance similar arm instruction set 32-bit memory thumb-2 extends thumb instruction set bit-field manipulation table branches conditional execution time arm instruction set extended maintain equivalent functionality instruction sets new unified assembly language ual supports generation either thumb arm instructions source code versions thumb seen armv7 processors essentially capable arm code including ability write interrupt handlers requires bit care use new if-then instruction permits four successive instructions execute based tested condition inverse compiling arm code ignored compiling thumb generates actual instruction example armv7 chips support thumb instruction set chips cortex-a series cortex-r series arm11 series support arm instruction set state thumb instruction set state chips cortex-m series support thumb instruction set thumbee erroneously called thumb-2ee arm documentation marketed jazelle rct runtime compilation target announced 2005 first appearing cortex-a8 processor thumbee fourth instruction set state making small changes thumb-2 extended instruction set changes make instruction set particularly suited code generated runtime e.g jit compilation managed execution environments thumbee target languages java c perl python allows jit compilers output smaller compiled code without impacting performance new features provided thumbee include automatic null pointer checks every load store instruction instruction perform array bounds check special instructions call handler addition utilises thumb-2 technology thumbee provides access registers r8-r15 jazelle/dbx java vm state held handlers small sections frequently called code commonly used implement high level languages allocating memory new object changes come repurposing handful opcodes knowing core new thumbee state 23 november 2011 arm holdings deprecated use thumbee instruction set armv8 removes support thumbee vfp vector floating point technology fpu floating-point unit coprocessor extension arm architecture implemented differently armv8 – coprocessors defined provides low-cost single-precision double-precision floating-point computation fully compliant ansi/ieee std 754-1985 standard binary floating-point arithmetic vfp provides floating-point computation suitable wide spectrum applications pdas smartphones voice compression decompression three-dimensional graphics digital audio printers set-top boxes automotive applications vfp architecture intended support execution short vector mode instructions operated vector element sequentially thus offer performance true single instruction multiple data simd vector parallelism vector mode therefore removed shortly introduction replaced much powerful neon advanced simd unit devices arm cortex-a8 cut-down vfplite module instead full vfp module require roughly ten times clock cycles per float operation pre-armv8 architecture implemented floating-point/simd coprocessor interface floating-point and/or simd units found arm-based processors using coprocessor interface include fpa fpe iwmmxt implemented software trapping could implemented hardware provide functionality vfp opcode-compatible debian gnu/linux derivatives ubuntu armhf arm hard float refers armv7 architecture including additional vfp3-d16 floating-point hardware extension thumb-2 software packages cross-compiler tools use armhf vs. arm/armel suffixes differentiate advanced simd extension aka neon mpe media processing engine combined 64- 128-bit simd instruction set provides standardized acceleration media signal processing applications neon included cortex-a8 devices optional cortex-a9 devices neon execute mp3 audio decoding cpus running 10 mhz run gsm adaptive multi-rate amr speech codec 13 mhz features comprehensive instruction set separate register files independent execution hardware neon supports 8- 16- 32- 64-bit integer single-precision 32-bit floating-point data simd operations handling audio video processing well graphics gaming processing neon simd supports 16 operations time neon hardware shares floating-point registers used vfp devices arm cortex-a8 cortex-a9 support 128-bit vectors execute 64 bits time whereas newer cortex-a15 devices execute 128 bits time projectne10 arm first open-source project inception acquired older project known mbed tls ne10 library set common useful functions written neon c compatibility library created allow developers use neon optimisations without learning neon also serves set highly optimised neon intrinsic assembly code examples common dsp arithmetic image processing routines source code available github security extensions marketed trustzone technology armv6kz later application profile architectures provides low-cost alternative adding another dedicated security core soc providing two virtual processors backed hardware based access control lets application core switch two states referred worlds reduce confusion names capability domains order prevent information leaking trusted world less trusted world world switch generally orthogonal capabilities processor thus world operate independently using core memory peripherals made aware operating world core may use provide access control secrets code device typically rich operating system run less trusted world smaller security-specialized code trusted world aiming reduce attack surface typical applications include drm functionality controlling use media arm-based devices preventing unapproved use device practice since specific implementation details proprietary trustzone implementations publicly disclosed review unclear level assurance provided given threat model immune attack open virtualization open source implementation trusted world architecture trustzone amd licensed incorporated trustzone technology secure processor technology enabled products amd apus include cortex-a5 processor handling secure processing fact cortex-a5 trustzone core included earlier amd products enabled due time constraints samsung knox uses trustzone purposes detecting modifications kernel security extension marketed trustzone armv8-m technology introduced armv8-m architecture armv6 arm architecture supports no-execute page protection referred xn execute never large physical address extension lpae extends physical address size 32 bits 40 bits added armv7-a architecture 2011 physical address size larger 44 bits cortex-a75 cortex-a65ae armv8-r armv8-m sub-architectures announced armv8-a sub-architecture share features armv8-a n't include 64-bit aarch64 instructions announced october 2011 armv8-a often called armv8 armv8-r also available represents fundamental change arm architecture adds optional 64-bit architecture e.g cortex-a32 32-bit armv8-a cpu armv8-a cpus support 64-bit unlike armv8-r named aarch64 associated new a64 instruction set aarch64 provides user-space compatibility armv7-a 32-bit architecture therein referred aarch32 old 32-bit instruction set named a32 thumb instruction set referred t32 64-bit counterpart armv8-a allows 32-bit applications executed 64-bit os 32-bit os control 64-bit hypervisor arm announced cortex-a53 cortex-a57 cores 30 october 2012 apple first release armv8-a compatible core apple a7 consumer product iphone 5s appliedmicro using fpga first demo armv8-a first armv8-a soc samsung exynos 5433 used galaxy note 4 features two clusters four cortex-a57 cortex-a53 cores big.little configuration run aarch32 mode aarch32 aarch64 armv8-a makes vfpv3/v4 advanced simd neon standard also adds cryptography instructions supporting aes sha-1/sha-256 finite field arithmetic aarch64 introduced armv8-a included subsequent versions armv8-a aarch64 included armv8-r armv8-m 32-bit architectures december 2014 armv8.1-a update incremental benefits v8.0 announced enhancements fell two categories changes instruction set changes exception model memory translation instruction set enhancements included following enhancements exception model memory translation system included following january 2016 armv8.2-a announced enhancements fell four categories scalable vector extension sve new extension armv8 allowing implementation choices vector lengths scale 128 2048 bits complementary extension replace neon 512-bit variant already implemented supercomputer based arm cpu prototype sve variant aims world highest-performing supercomputer goal beginning full operations around 2021 see arm holdings supercomputers e.g crays fujitsus sve optional extension armv8.2-a architecture newer supported gcc 8 compiler october 2016 armv8.3-a announced enhancements fell six categories armv8.3-a architecture supported least gcc 7 compiler armv8.4-a adds e.g sha3 sha512 sm3 sm4 crypto extensions improved virtualization support memory partitioning monitoring mpam capabilities new secure el2 state activity monitors dot product sdot udot instructions armv8.5-a adds e.g memory tagging extension mte branch target indicators bti reduce ability attacker execute arbitrary code random number generator instructions – providing deterministic true random numbers conforming various national international standards august 2 2019 google announced android would adopt memory tagging extension mte 2019 arm announced scalable vector extension 2 sve2 transactional memory extension tme sve2 builds sve scalable vectorization increased fine-grain data level parallelism dlp allow work done per instruction sve2 aims bring benefits wider range software including dsp multimedia simd code currently use neon llvm/clang 9.0 gcc 10.0 development codes updated support sve2 tme brings support hardware transactional memory htm hardware lock elision tle tme aims bring scalable concurrency increase coarse-grain thread level parallelism tlp allow work done per thread llvm/clang 9.0 gcc 10.0 development codes updated support tme platform security architecture psa architecture-agnostic security framework evaluation scheme intended help secure internet things iot devices built system-on-a-chip soc processors introduced arm 2017 annual techcon event first used arm cortex-m processor cores intended microcontroller use psa includes freely available threat models security analyses demonstrate process deciding security features common iot products psa also provides freely downloadable application programming interface api packages architectural specifications open-source firmware implementations related test suites psa certified offers multi-level security evaluation scheme chip vendors os providers iot device makers first 32-bit arm-based personal computer acorn archimedes ran interim operating system called arthur evolved risc os used later arm-based systems acorn vendors acorn machines also unix port called risc ix neither confused risc/os contemporary unix variant mips architecture 32-bit arm architecture supported large number embedded real-time operating systems including 32-bit arm architecture primary hardware environment mobile device operating systems previously discontinued 32-bit arm architecture supported risc os multiple unix-like operating systems including windows applications recompiled arm linked winelib wine project run 32-bit 64-bit arm linux freebsd compatible enough operating systems x86 binaries e.g specially compiled arm demonstrated arm using qemu wine linux work full speed capability winelib
[ 6151, 6158, 10254, 4112, 2066, 2073, 6171, 2081, 6178, 6180, 6181, 38, 8231, 2088, 8233, 10277, 4139, 44, 8237, 2094, 10284, 4144, 2097, 2105, 8250, 8253, 6207, 10303, 2113, 8266, 8268, 4188, 99, 10361, 6266, 6268, 8322, 2179, 4228, 8327,...
None
9,965
4
Free_Haven_Project:free project free project formed 1999 group massachusetts institute technology students aim develop secure decentralized system data storage group work led collaboration united states naval research laboratory develop tor funded darpa project early work focused anonymous storage system free designed ensure privacy security readers publishers contrasts free anonymous publishing services emphasize persistence rather accessibility free distributed peer-to-peer system designed create servnet consisting servnet nodes hold fragments shares documents divided using rabin information dispersal algorithm publisher file contents determined one piece shares stored servnet along unique public key recover recreate file client broadcasts public key find fragments sent client along anonymous routes greater security free periodically moves location shares nodes function similar freenet greater focus persistence ensure unpopular files disappear mechanisms enable persistence however also cause problems inefficiency referral- recommendation-based metatrust reputation system built servnet attempts ensure reciprocity information value holding node operators accountable although nodes remain pseudonymous communication facilitated operators anonymous email tor developed us naval research laboratory free project secure government communications initial funding us office naval research darpa tor deployed 2003 third generation deployed onion routing designs 2005 electronic frontier foundation provided additional funding free project 2006 tor project incorporated non-profit organization
[ 8640, 9762, 7652, 10726, 8331, 82, 9240 ]
None
9,966
4
Multi-party_authorization:multi-party authorization multi-party authorization mpa process protect telecommunications network data center industrial control system undesirable acts malicious insider inexperienced technician acting alone mpa requires second authorized user approve action allowed take place pro-actively protects data systems undesirable act existing methods protect data systems malicious insider include auditing job rotation separation duties auditing reactive method meant discover fact job rotation separation duties limiting techniques meant minimize prolonged access sensitive data systems order limit undesirable acts contrast mpa pro-active solution advantage mpa methods protect undesirable acts malicious insider inexperienced operator mpa pro-active prevents data systems compromise single entity acting alone mpa prevents initial undesirable act rather dealing breach compromise fact multi-party authorization technology secure vulnerable sensitive activities data sources attack compromised insider acting alone somewhat analogous weapons systems require two individuals turn two different keys order enable system one person alone another example consider access lock box bank access requires multiple parties one lock box owner another bank official individuals act together access lock box neither could alone mpa like manner ensures second set eyes reviews approves activity involving critical sensitive data systems action takes place multi-party authorization suitable wide variety applications mpa implemented protect type sensitive data electronic form activity within network infrastructure computerized control system electronic health record example data record could protected mpa multi-party authorization provides pro-active protection undesirable acts inexperienced technician malicious insider us patent 7,519,826 issued april 14 2009 near real time multi-party task authorization access control businessedge nov 25 2009 protecting malicious insider multi party authorization
[ 7368, 11507, 11244 ]
None
9,967
7
Distributed_social_network:distributed social network distributed social network federated social network internet social networking service decentralized distributed across distinct providers something like email social networks fediverse consists multiple social websites users site communicate users involved sites societal perspective one may compare concept social media public utility social website participating distributed social network interoperable sites federation communication among social websites technically conducted social networking protocols software used distributed social networking generally portable easily adopted various website platforms distributed social networks contrast social network aggregation services used manage accounts activities across multiple discrete social networks social networking service providers used term broadly describe provider-specific services distributable across different websites typically added widgets plug-ins add-ons social network functionality implemented users websites distributed social network projects generally develop software protocols software generally free open source protocols generally open free open standards oauth authorization openid authentication ostatus federation activitypub federation protocol xrd metadata discovery portable contacts protocol wave federation protocol extensible messaging presence protocol xmpp aka jabber opensocial widget apis microformats like xfn hcard atom web feeds—increasingly referred together open stack—are often cited enabling technologies distributed social networking electronic frontier foundation eff u.s. legal defense organization advocacy group civil liberties internet endorses distributed social network model one plausibly return control choice hands internet user allow persons living restrictive regimes conduct activism social networking sites also choice services providers may better equipped protect security anonymity world wide web consortium w3c main international standards organization world wide web launched new social activity july 2014 develop standards social web application interoperability
[ 546, 10242, 2948, 7368, 6750, 11164, 78, 11408, 756, 534, 119, 5433, 124, 574 ]
Test
9,968
4
Evil_twin_(wireless_networks):evil twin wireless networks evil twin fraudulent wi-fi access point appears legitimate set eavesdrop wireless communications evil twin wireless lan equivalent phishing scam type attack may used steal passwords unsuspecting users either monitoring connections phishing involves setting fraudulent web site luring people attacker snoops internet traffic using bogus wireless access point unwitting web users may invited log attacker server prompting enter sensitive information usernames passwords often users unaware duped well incident occurred users log unsecured non-https bank e-mail accounts attacker intercepts transaction since sent equipment attacker also able connect networks associated users credentials fake access points set configuring wireless card act access point known hostap hard trace since shut instantly counterfeit access point may given ssid bssid nearby wi-fi network evil twin configured pass internet traffic legitimate access point monitoring victim connection simply say system temporarily unavailable obtaining username password
[ 6466, 4517, 8264, 7850, 4620, 119, 794, 2430 ]
None
9,969
9
Daniel_G._Bobrow:daniel g. bobrow daniel gureasko bobrow 29 november 1935 – 20 march 2017 american computer scientist created oft-cited artificial intelligence program student earned phd. worked bbn technologies bbn research fellow intelligent systems laboratory palo alto research center born new york city earned bs rpi 1957 sm harvard 1958 phd mathematics mit supervision marvin minsky 1964 bbn developer tenex bobrow president american association artificial intelligence aaai chair cognitive science society editor-in-chief journal artificial intelligence shared 1992 acm software systems award work interlisp acm fellow aaai fellow
[ 4992, 10752, 11269, 2438, 3334, 5751, 6919, 7048, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 5420, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, ...
Test
9,970
7
Chromebook:chromebook chromebook laptop tablet running linux-based chrome os operating system devices primarily used perform variety tasks using google chrome browser applications data residing cloud rather machine chromebooks released since late 2017 also run android apps chromebooks run linux apps first chromebooks sale acer inc. samsung began shipping june 15 2011 addition laptop models desktop version called chromebox introduced may 2012 all-in-one device called chromebase introduced january 2014 lg electronics october 2012 simon phipps writing infoworld said chromebook line probably successful linux desktop/laptop computer 've seen date january november 2013 1.76 million chromebooks sold us business-to-business channels march 2018 chromebooks made 60 computers purchased schools usa april 2017 electronic frontier foundation accused google using chromebooks collect data mine school children personal information including internet searches without parents consent two years eff filed federal complaint company first chromebooks sale acer inc. samsung announced google i/o conference may 2011 began shipping june 15 2011 lenovo hewlett packard google entered market early 2013 december 2013 samsung launched samsung chromebook specifically indian market employed company exynos 5 dual core processor critical reaction device initially skeptical reviewers new york times technology columnist david pogue unfavorably comparing value proposition chromebooks fully featured laptops running microsoft windows operating system complaint dissipated later reviews machines acer samsung priced lower february 2013 google announced began shipping chromebook pixel higher-spec machine high-end price tag january 2015 acer announced first big screen chromebook acer chromebook 15 fhd 15.6-inch display besides laptops devices run chrome os well desktop version called chromebox introduced may 2012 samsung chromebase all-in-one device introduced january 2014 lg electronics march 2018 acer google announced first chromebook tablet chromebook tab 10 device expected compete lower-priced apple ipad tablet education market tab 10 display—9.7-inch 2048 x 1536 resolution—was ipad device included stylus neither device included keyboard may 2016 google announced would make android apps available chromebooks via google play application distribution platform time google play access scheduled asus chromebook flip acer chromebook r 11 recent chromebook pixel chromebooks slated time partnering google samsung released chromebook plus chromebook pro early 2017 first chromebooks come play store pre-installed february 2017 review verge reported plus arm processor handled android apps much better intel-based pro said android apps chrome os still beta much unfinished experience number chrome os systems supporting android apps either stable beta channel increasing may 2018 google announced would make linux desktop apps available chromebooks via virtual machine code-named crostini initial hardware partners chromebook development included acer adobe asus freescale hewlett-packard later hp inc. lenovo qualcomm texas instruments toshiba intel samsung dell chromebooks ship google chrome os operating system uses linux kernel google chrome web-browser integrated media-player enabling developer mode allows installation linux distributions chromebooks crouton script allows installation linux distributions chrome os running operating systems simultaneously chromebooks include seabios turned install boot linux distributions directly limited offline capability fast boot-time chromebooks primarily designed use connected internet signed google account instead installing traditional applications word processing instant messaging users add web apps chrome web store google claims multi-layer security architecture eliminates need anti-virus software support many usb devices cameras mice external keyboards flash drives included utilizing feature similar plug-and-play operating systems like prototype cr-48 chromebooks specialized keyboard complete buttons opening controlling multiple browser-windows well web search button replaces caps lock key caps lock activated pressing alt+search analysis samsung series 5 components ifixit june 2011 estimated total cost 334.32 representing us 322.12 materials us 12.20 labor initial retail price us 499.99 also pays retail margins shipping marketing research development profit margins chromebooks quite thin requiring large production run make profit chromebooks designed used connected internet users able access google applications gmail google calendar google keep google drive offline mode chromebooks also come built-in local music-player photo editor pdf- microsoft office document-viewer functional without internet access apps offline support include amazon cloud reader new york times app angry birds google play video content available offline using extension chrome browser chromebooks except first three boot help coreboot fast-booting bios integration android chrome announced 2016 anticipated drive design form factor future chromebooks including expected first chrome os tablet first two commercially available chromebooks samsung series 5 acer ac700 unveiled may 11 2011 google i/o developer conference begin selling online channels including amazon best buy united states united kingdom france germany netherlands italy spain starting june 15 2011 however acer ac700 available early july first machines sold 349 499 depending model 3g option google also offered monthly payment scheme business education customers 28 20 per user per month respectively three-year contract including replacements upgrades verizon offers models equipped 3g/4g lte connectivity 100–200 mb free wireless data per month two years google early marketing efforts relied primarily hands-on experience giving away samsung machines 10 cr-48 pilot program participants along title chromebook guru lending chromebooks passengers virgin america flights end september 2011 google launched chrome zone store within store inside currys pc world superstore london store google-style look feel splashes color around retail store front concept later changed broader in-store google shop expanded beyond pc world tottenham court road addition marketing strategies google chrome created several chromebook minis demonstrate ease use simplicity devices comical manner example question back chromebook asked implied refer data backup instead shows two hands pushing chromebook back end table followed statement n't back chromebook showing data stored web article published zdnet june 2011 entitled five chromebook concerns businesses steven j. vaughan-nichols faulted devices lack virtual private network capability supporting wi-fi security methods particular wi-fi protected access ii wpa2 enterprise extensible authentication protocol-transport layer security eap-tls cisco lightweight extensible authentication protocol leap also noted file manager work need use undocumented crosh shell accomplish basic tasks setting secure shell ssh network connection well serious deficiencies documentation one first customer reviews city orlando florida reported initial testing 600 chromebooks part broader study related accessing virtual desktops early indications show potential value reducing support costs end users indicated chromebook easy travel starts quickly one stated need stay connected emergencies take chrome traveling business would still take laptop orlando plan continue use chromebooks november 21 2011 google announced price reductions chromebooks since wi-fi-only samsung series 5 reduced 349 3g samsung series 5 reduced 449 acer ac700 reduced 299 updated series 5 550 chromebox first chrome os desktop machines released samsung may 2012 two lowest cost chromebooks emerged later fall 249 samsung series 3 199 acer c7 following february google introduced costly machine chromebook pixel starting price 1299 models released may 2012 include 100 gb–1.09 tb google drive cloud storage 12 gogo wifi passes january 2013 acer chromebook sales driven heavy internet users educational institutions platform represented 5-10 percent company us shipments according acer president jim wong called numbers sustainable contrasting low windows 8 sales blamed slump market wong said company would consider marketing chromebooks developed countries well corporations noted although chrome os free license hardware vendors required greater marketing expenditure windows offsetting licensing savings first 11 months 2013 1.76 million chromebooks sold united states representing 21 us commercial business-to-business laptop market period 2012 chromebooks sold 400,000 units negligible market share january 2015 silviu stahie noted softpedia chromebooks eating microsoft market share said microsoft engaged silent war actually losing fighting enemy insidious cunning actually hurting company anything else enemy called chromebooks using linux ... sign things slowing microsoft really needs win soon wants remain relevant 2015 chromebooks sales volume companies us second windows based devices android tablets overtaking apple devices 2014 chromebook sales u.s. b2b channels increased 43 percent first half 2015 helping keep overall b2b pc tablet sales falling .. sales google os-equipped android chrome devices saw 29 percent increase 2014 propelled chromebook sales apple devices declined 12 percent windows devices fell 8 percent education market chromebooks notable success competing low cost hardware software upkeep simplicity machines could drawback markets proven advantage school districts reducing training maintenance costs january 2012 even commercial sales flat google placed nearly 27,000 chromebooks schools across 41 states us including one-on-one programs allocate computer every student south carolina illinois iowa august 2012 500 school districts united states europe using device 2016 chromebooks represented 58 percent 2.6 million mobile devices purchased u.s. schools 64 percent market outside u.s. contrast sales apple tablets laptops u.s. schools dropped year 19 percent compared 52 percent 2012 helping spur chromebook sales google classroom app designed teachers 2014 serves hub classroom activities including attendance classroom discussions homework communication students parents however concerns privacy within context education market chromebooks school officials schools issuing chromebooks students affirmed students right privacy using school-issued chromebooks even home online offline activity monitored school using third-party software pre-installed laptops electronic frontier foundation complained google violating privacy students enabling synchronisation function within google chrome chrome sync default allowing web browsing histories data students including under-13 stored google servers potentially used purposes authorised educational purposes point contention fact users school-issued chromebooks change settings measure protect privacy administrator issued laptops change eff claims violates student privacy pledge already signed google 2014 eff staff attorney nate cardozo stated minors n't tracked used guinea pigs data treated profit center google wants use students data 'improve google products needs get express consent parents march 2018 chromebooks made 60 computers used schools cnet writer alfred ng cited superior security main reason level market adoption hardware generation linux kernel version products inferred code name corresponding video game series december 7 2010 press briefing google announced chrome os pilot program pilot experiment first chromebook cr-48 chrome notebook prototype test chrome os operating system modified hardware device minimal design black completely unbranded although made inventec rubberized coating device named chromium-48 unstable isotope metallic element chromium participants named cr-48 test pilots google distributed 60,000 cr-48 chrome notebooks december 2010 march 2011 free participants return asked feedback suggestions bug reports cr-48 intended testing retail sales cr-48 hardware design broke convention replacing certain keys shortcut keys function keys replacing caps lock key dedicated search key changed back caps lock os keyboard settings google addressed complaints operating system offers little functionality host device connected internet demonstrated offline version google docs announced 3g plan would give users 100 mb free data month additional paid plans available verizon device usb port capable supporting keyboard mouse ethernet adapter usb storage printer chrome os offers print stack adding hardware outside previously mentioned items likely cause problems operating system self knowing security model users instead encouraged use secure service called google cloud print print legacy printers connected desktop computers connect hp eprint kodak hero kodak esp epson connect printer google cloud print service cloud aware printer connection cr-48 prototype laptop gave reviewers first opportunity evaluate chrome os running device ryan paul ars technica wrote machine met basic requirements web surfing gaming personal productivity falls short intensive tasks praised google approach security wondered whether mainstream computer users would accept operating system whose application browser thought chrome os could appeal niche audiences people need browser companies rely google apps web applications operating system decidedly full-fledged alternative general purpose computing environments currently ship netbooks paul wrote chrome os advantages found software environments without sacrifice native applications reviewing cr-48 december 29 2010 kurt bakke conceivably tech wrote chromebook become frequently used family appliance household 15 second startup time dedicated google user accounts made go-to device quick searches email well youtube facebook activities device replace five notebooks house one gaming two kids two general use biggest complaint heard lack performance flash applications ongoing testing wolfgang gruener also writing conceivably tech said cloud computing cellular data speeds unacceptable lack offline ability turns cr-48 useless brick connected difficult use chromebook everyday device give used mac/windows pc surely enjoy dedicated cloud computing capabilities occasionally cr-48 features intel atom 455 single-core processor 512 kb cache hyperthreading enabled also features 2 gb removable ddr3 memory single so-dimm integrated chipset graphics 66 watt-hour battery found intel nm10 chipset get hot operation due lack proper heatsink fixed production chromebooks launched google february 2013 chromebook pixel high-end machine chromebook family laptop unusual 3:2 display aspect ratio touch screen featuring debut highest pixel density laptop faster cpu predecessors intel core i5 exterior design described wired austere rectangular block aluminum subtly rounded edges second pixel featuring lte wireless communication twice storage capacity shipped arrival april 12 2013 machine received much media attention many reviewers questioning pixel value proposition compared similarly priced windows machines macbook air 2017 google launched pixelbook replace chromebook pixel like chromebook pixel pixelbook 3:2 aspect ratio touchscreen high pixel density display.. unlike original chromebook pixel like second generation pixelbook excludes option lte instead implements google instant tethering automatically tethers pixelbook pixel phone mobile connection reviewing samsung series 5 specifications scott stein cnet unimpressed machine 12-inch screen 16 gb onboard storage chrome os might lighter windows xp 'd still prefer media storage space price could also get wi-fi amd e-350-powered ultraportable running windows 7 hand mg siegler techcrunch wrote largely favorable review praising improvements speed trackpad sensitivity cr-48 prototype well long battery life fact models priced ipad june 2011 ifixit dismantled samsung series 5 concluded essentially improved cr-48 rated 6/10 repairability predominantly case opened change battery ram chip soldered motherboard ifixit noted mostly-plastic construction felt little cheap plus side stated screen easy remove components including solid-state drive would easy replace ifixit kyle wiens wrote series 5 fixes major shortfalls cr-48 adds polish necessary strike lust heart broad consumer base sleek looks 8+ hours battery life optimized performance may 2012 samsung introduced chromebook series 5 550 wi-fi model expensive 3g model reviews generally questioned value proposition dana wollman engadget wrote chromebook keyboard put thousand-dollar ultrabooks shame offered better display quality many laptops selling twice much price seems exist vacuum—a place tablet apps n't growing sophisticated transformer-like win8 tablets n't way n't solid budget windows machines choose joe wilcox betanews wrote price performance compares choices chromebook crumbles many potential buyers noted new models sell predecessors price-performance ratio quite favorable compared macbook air specs plenty lower-cost options october 2012 series 3 chromebook introduced san francisco event samsung chromebook xe303 device cheaper thinner lighter chromebook 550 google marketed series 3 computer everyone due simple operating system chrome os affordable price target markets included students first-time computer users well households looking extra computer lower price proved watershed reviewers new york times technology columnist david pogue reversed earlier thumbs-down verdict chromebook writing 250 changes everything price half ipad even less ipad mini ipod touch ’ getting laptop wrote chromebook many things people use computers laptops playing flash videos opening microsoft office documents words google correct asserts chromebook perfect schools second computers homes businesses deploy hundreds machines cnet review series 3 chromebook even favorable saying machine largely delivered computer students additional computer household—especially users already using google web applications like google docs google drive gmail got workable standout hardware battery life good switches quickly 249 price tag means much commitment 550 samsung series 5 550 arrived may review subtracted points performance fine many tasks power users accustomed couple dozen browser tabs open steer clear chromebook 3 distinct distinguished similarly named samsung series 3 several respects newer released 2016 different architecture intel celeron n3050 instead exynos 5 dual arm cortex thinner 0.7 less expensive 100 less series 3 remaining full implementation chromeos hp first chromebook largest chromebook market time pavilion 14 chromebook launched february 3 2013 intel celeron 847 cpu either 2gb 4gb ram battery life long 4 hours larger form factor made friendly all-day use hp introduced chromebook 11 october 8 2013 us december 2013 google hp recalled 145,000 chargers due overheating sales halted resuming redesigned charger following month hp chromebook 14 announced september 11 2013 intel haswell celeron processor usb 3.0 ports 4g broadband updated version chromebook lineup announced september 3 2014 11-inch models included intel processor 14-inch models featured fanless design powered nvidia tegra k1 processor hp chromebooks available several colors two types desktop computers also run chrome os classed small form-factor pcs chromeboxes typically feature power switch set ports local area network usb dvi-d displayport audio chromebooks chromeboxes employ solid-state memory support web applications require external monitor keyboard pointing device chromebase all-in-one chrome os device first model released lg electronics integrated screen speakers 1.3-megapixel webcam microphone suggested retail price 350 company unveiled product january 2014 international ces las vegas chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth via usb port
[ 4096, 8719, 3600, 5649, 7700, 9244, 10780, 10284, 8237, 3633, 5681, 10820, 2635, 4683, 11343, 3664, 4180, 8285, 2658, 4194, 5749, 8821, 4217, 9863, 7816, 6797, 5262, 7822, 6800, 11408, 7833, 8858, 10393, 7841, 2213, 1203, 7354, 2237, 7359, ...
Test
9,971
4
Uncomplicated_Firewall:uncomplicated firewall uncomplicated firewall ufw program managing netfilter firewall designed easy use uses command-line interface consisting small number simple commands uses iptables configuration ufw available default ubuntu installations 8.04 lts gufw intended easy intuitive graphical user interface managing uncomplicated firewall supports common tasks allowing blocking pre-configured common p2p individual ports gufw designed ubuntu also available debian-based distributions arch linux anywhere python gtk+ ufw available
[ 2049, 2563, 550, 10790, 8753, 569, 5178, 9279, 2118, 3654, 1107, 4192, 9324, 8816, 3189, 119, 10872, 5755, 6797, 1172, 3243, 1708, 3245, 10433, 4814, 9423, 10451, 6364, 5343, 5860, 7913, 10987, 8943, 5369, 1273, 9983, 1792, 9496, 8476, 64...
Test
9,972
6
Root_directory:root directory computer file system primarily used unix unix-like operating systems root directory first top-most directory hierarchy likened trunk tree starting point branches originate root file system file system contained disk partition root directory located filesystem top file systems mounted system boots use example physical file cabinet separate drawers file cabinet represented highest level sub-directories file system system prompt room file cabinet may represented root directory directories may inside root directory go directories least file system operating systems files placed inside root directory well sub-directories one may envision placing paper files anywhere room file cabinet within room unix abstracts nature tree hierarchy entirely unix unix-like systems root directory denoted codice_1 slash sign though root directory conventionally referred codice_1 directory entry name name empty part initial directory separator character codice_1 filesystem entries including mounted filesystems branches root dos os/2 microsoft windows partition drive letter assignment labeled codice_4 particular partition c common root directory dos os/2 windows support abstract hierarchies partitions mountable within directory another drive though rarely seen possible dos command codice_5 since first added dos achieved windows versions well contexts also possible refer root directory containing mounted drives although contain files directly exist file system instance linking local file using file uri scheme syntax form codice_6 codice_7 standard prefix third 'codice_1 represents root local system unix-like operating systems process idea root directory processes system actual root directory changed calling chroot system call typically done create secluded environment run software requires legacy libraries sometimes simplify software installation debugging chroot meant used enhanced security processes inside break freebsd offers stronger jail system call enables operating-system-level virtualization also serves security purposes restrict files process may access subset file system hierarchy unix systems support directory root directory normally /.. points back inode however changed point super-root directory remote trees mounted example two workstations pcs2a pcs2b connected via connectnodes uunite startup script /../pcs2b could used access root directory pcs2b pcs2a
[ 2432, 3328, 8837, 8328, 6797, 2193, 5138, 10387, 5397, 6167, 2974, 11680, 6049, 9762, 10149, 7983, 11568, 5425, 9141, 10422, 4919, 954, 188, 700, 8639, 3522, 451, 8772, 4423, 2762, 4298, 7244, 5840, 5969, 10068, 8918, 10839, 9946, 9694, 8...
Test
9,973
2
Linux/RK:linux/rk linux/rk implementation resource kernel based linux developed real-time multimedia systems laboratory carnegie mellon university linux/rk consists two major components linux kernel subsystem called portable resource kernel resource kernel provides timely guaranteed enforced access physical resources applications main function operating system kernel multiplex available system resources across multiple requests several applications traditional non-realtime kernel allocates time-multiplexed resource application based fairness metrics certain period resource kernel application request reservation certain amount resource kernel guarantee requested amount available application guarantee resource allocation gives application knowledge amount currently available resources qos manager application optimize system behavior computing best qos obtained available resources
[ 823 ]
Test
9,974
7
Elastic_cloud_storage:elastic cloud storage elastic cloud cloud computing offering provides variable service levels based changing needs elasticity attribute applied cloud services states capacity performance given cloud service expand contract according customer requirements potentially changed automatically consequence software-driven event worst reconfigured quickly customer infrastructure management team elasticity described one five main principles cloud computing rosenburg mateos cloud service manning 2011 cloud computing first described gillet kapor 1996 however first practical implementation consequence strategy leverage amazon excess data center capacity amazon pioneers commercial use technology primarily interested providing “ public ” cloud service whereby could offer customers benefits using cloud particularly utility-based pricing model benefit suppliers followed suit range cloud-based models offering elasticity core component suppliers offering service element public cloud service due perceived weaknesses security least lack proven compliance many organizations particularly financial public sectors slow adopters cloud technologies wary organizations achieve benefits cloud computing adopting private cloud technologies obvious weaknesses two five main principles cloud computing abrogated elasticity utility-based payments alternative form elastic cloud offered vendors emc ibm whereby service based around enterprise infrastructure still retains elements elasticity potential bill consumption elasticity cloud computing ability organization adjust storage requirements terms capacity processing respect operational requirements following benefits operational benefits services acquired quickly meaning evolving requirements business addressed almost immediately giving organization potential agility advantage properly implemented elastic system provision/de-provision according application demands particular business activity spikes provision enabled match demand capacity re-allocated research development r projects r activities longer hindered requirement secure capex budget prior project starting capability simply provisioned cloud released end exercise testing deployment large-scale projects size test needs performed prior final rollout taking advantage elasticity cloud creating full-scale avatar proposed production system realistic data traffic volumes provisioned released needed expensive resources allocated normally apply context customer applying least servers part cloud infrastructure specifically business performance reasons decided invest solid-state storage opposed spinning platters instances due activity spikes less critical process may need moved high-performance resources traditional storage server specification customer elected own/lease hardware select specify servers specifically tuned meet likely needs operation i.e. directly controlling cost/benefit equation utility based payments course key cost driver process notion pay consume acceptable many organizations hardware capacity sourced internally organizations need over-provision applies much traditional outsourcing capex-related expenditure in-house servers cloud platform – heart cloud storage system ability manage hyperscale object storage hadoop distributed files system hdfs elastic storage capability particularly well suited hyperscale hadoop environments capability rapidly respond changing circumstances priorities essential
[ 4194, 5666, 6153, 3819, 9995, 7248, 3993, 3323 ]
Test
9,975
9
Seymour_Papert:seymour papert seymour aubrey papert february 29 1928 – july 31 2016 south african-born american mathematician computer scientist educator spent career teaching researching mit one pioneers artificial intelligence constructionist movement education co-inventor wally feurzeig cynthia solomon logo programming language born jewish family papert attended university witwatersrand receiving bachelor arts degree philosophy 1949 followed phd mathematics 1952 went receive second doctorate also mathematics university cambridge 1959 supervised frank smithies papert worked researcher variety places including st. john college cambridge henri poincaré institute university paris university geneva national physical laboratory london becoming research associate mit 1963 held position 1967 became professor applied math made co-director mit artificial intelligence laboratory founding director professor marvin minsky 1981 also served cecil ida green professor education mit 1974 1981 papert worked learning theories known focusing impact new technologies learning general schools learning organizations particular mit papert went create epistemology learning research group mit architecture machine group later became mit media lab developer theory learning called constructionism built upon work jean piaget constructivist learning theories papert worked piaget university geneva 1958 1963 one piaget protégés piaget said one understands ideas well papert papert rethought schools work based theories learning papert used piaget work development logo programming language mit created logo tool improve way children think solve problems small mobile robot called logo turtle developed children shown use solve simple problems environment play main purpose logo foundation research group strengthen ability learn knowledge papert insisted simple language program children learn—like logo—can also advanced functionality expert users part work technology papert proponent knowledge machine one principals one laptop per child initiative manufacture distribute children machine developing nations papert also collaborated construction toy manufacturer lego logo-programmable lego mindstorms robotics kits named groundbreaking 1980 book became political activist opposition parents began anti-apartheid activity says father said know someone talented seymour would throw life away ‘ schwartzes ’ derogatory yiddish expression black people ” subsequently chose self exile leading figure revolutionary socialist circle around socialist review living london 1950s papert also prominent activist south african apartheid policies university education papert married dona strauss later androula christofides henriques papert third wife mit professor sherry turkle together wrote influential paper epistemological pluralism revaluation concrete final 24 years papert married suzanne massie russian scholar author pavlovsk life russian palace land firebird papert aged 78 received serious brain injury struck motor scooter 5 december 2006 crossing street colleague uri wilensky attending 17th international commission mathematical instruction icmi study conference hanoi vietnam underwent emergency surgery remove blood clot french hospital hanoi transferred complex operation swiss air ambulance bombardier challenger jet boston massachusetts moved hospital closer home january 2007 developed sepsis damaged heart valve later replaced 2008 returned home could think communicate clearly walk almost unaided still complicated speech problems receipt extensive rehabilitation support rehabilitation team used principles experiential hands-on learning pioneered papert died home blue hill maine july 31 2016 papert work used researchers fields education computer science influenced work uri wilensky design netlogo collaborated study knowledge restructurations well work andrea disessa development dynaturtles 1981 papert along several others logo group mit started logo computer systems inc. lcsi board chair 20 years working lcsi papert designed number award-winning programs including logowriter lego/logo marketed lego mindstorms also influenced research idit harel caperton coauthoring articles book constructionism chairing advisory board company mamamedia also influenced alan kay dynabook concept worked kay various projects papert guggenheim fellowship 1980 marconi international fellowship 1981 software publishers association lifetime achievement award 1994 smithsonian award computerworld 1997 papert called marvin minsky greatest living mathematics educator mit president l. rafael reif summarized papert lifetime accomplishments mind extraordinary range creativity seymour papert helped revolutionize least three fields study children make sense world development artificial intelligence rich intersection technology learning stamp left mit profound today mit continues expand reach deepen work digital learning particularly grateful seymour groundbreaking vision hope build ideas open doors learners ages around world
[ 4992, 10752, 11269, 3334, 5751, 6919, 7048, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 4774, 5031, 9128, 5803, 2225, 10547, 11255, 311, 2105, 7867, 3389, 6717, 4799, 5569, 6594, 8771, 4550, ...
Validation
9,976
3
Visual_Instruction_Set:visual instruction set visual instruction set vis simd instruction set extension sparc v9 microprocessors developed sun microsystems five versions vis vis 1 vis 2 vis 2+ vis 3 vis 4 vis 1 introduced 1994 first implemented sun ultrasparc microprocessor 1995 fujitsu sparc64 gp microprocessors 2000 vis 2 first implemented ultrasparc iii subsequent ultrasparc sparc64 microprocessors implement instruction set vis 3 first implemented sparc t4 microprocessor vis 4 first implemented sparc m7 microprocessor vis instruction toolkit like intel mmx sse mmx 8 registers shared fpu stack sparc processors 32 registers also aliased double-precision 64-bit floating point registers simd instruction set extensions risc processors vis strictly conforms main principle risc keep instruction set concise efficient design different comparable extensions cisc processors mmx sse sse2 sse3 sse4 3dnow sometimes programmers must use several vis instructions accomplish operation done one mmx sse instruction kept mind fewer instructions automatically result better performance vis re-uses existing sparc v9 64-bit floating point registers hold multiple 8 16 32-bit integer values respect vis similar design mmx simd architectures sse/sse2/altivec vis includes number operations primarily graphics support integers include 3d 2d conversion edge processing pixel distance four ways use vis code
[ 2821, 1798, 4491, 6924, 4237, 4241, 6038, 9369, 9500, 4386, 9126, 2088, 9391, 1461, 4664, 8120, 8506, 1085, 8125, 8126, 833, 7234, 9665, 9541, 3142, 2638, 5326, 977, 2514, 5844, 9428, 10837, 8795, 2655, 1122, 7270, 3431, 7783, 10985, 9964...
Test
9,977
2
Support_programs_for_OS/360_and_successors:support programs os/360 successors article discusses support programs included available os/360 successors ibm categorizes programs utilities others service aids boundaries always consistent obvious many programs match types utility software following lists describe programs associated os/360 successors dos tpf vm utilities included many programs designed ibm users group share modified extended ibm versions originally written user programs usually invoked via job control language jcl tend use common jcl dd identifiers os z/os operating systems data sets idcams access method services generates modifies virtual storage access method vsam non-vsam datasets idcams introduced along vsam os/vs access method reference derives initial vsam replaces access methods mindset os/vs idcams probably functionality utility programs performing many functions vsam non-vsam files following example illustrates use idcams copy dataset disk dataset 80-byte records system choose block size output example sysin control cards coming in-stream file instead point sequential file pds member containing control cards temporary data-set wish example using sysin files would something like iebcompr compares records sequential partitioned data sets iebcompr utility used compare two sequential partitioned datasets data set comparison performed logical record level therefore iebcompr commonly used verify backup copy data set correct exact match original processing iebcompr compares record data set one one records unequal iebcompr lists following information sysout comparing sequential data sets iebcompr considers data sets equal following conditions met partitioned data sets iebcompr considers data sets equal following conditions met ten unequal comparisons encountered processing iecompr terminates appropriate message note iebcompr flexible user-friendly compare program ca n't restrict comparison certain columns ca n't ignore differences white space n't tell record difference occurs halts 10 differences hand fast present ibm mainframes useful exact match expected comparing load modules reblocked checking copy worked properly comparisons programs reports ispf superc isrsupc compare program often used instead iebcopy copies compresses merges partitioned data sets also select exclude specified members copy operation rename replace members tasks iebcopy perform include following iebcopy utility required job control statements copy follows mydd1 mydd2 dd statements names chosen user partitioned input output data sets respectively defaults sysut1 sysut2 use valid ddname two dd statements ddnames specified utility control statements tell iebcopy name input output data sets need one dd statement pds compressed iebdg 'data generator creates test datasets consisting patterned data control statements define fields records created including position length format initialization performed iebdg use existing dataset input change fields specified control statements example replacing name field random alphabetic text contents field may varied record example rotating characters alphanumeric field left right subsequent record example iebedit selectively copies portions jcl example iebedit program example data set xxxxx.yyyyy.zzzzz contain job include steps named step5 step10 step15 iebedit routine copies selected steps job onto sysut2 output file example internal reader syntax edit statement codice_1 specifies name input job edit statement applies edit statement must apply separate job start specified without type stepname job statement job steps specified job included output default start omitted one edit statement provided first job encountered input data set processed start omitted edit statement first statement processing continues next job statement found input data set codice_2 specifies contents output data set values coded codice_3 specifies output consist job statement job step specified stepname parameter steps follow job step job steps preceding specified step omitted operation position default codice_4 specifies output data set contain job statement job steps specified stepname parameter codice_5 specifies output data set contain job statement job steps belonging job except steps specified stepname parameter codice_6 specifies names job steps want process codice_7 single job step name list step names separated commas sequential range steps separated hyphen example stepa-stepe combination may used one namelist one step name specified entire namelist must enclosed parentheses coded type=position stepname specifies first job step placed output data set job steps preceding step copied output data set coded type=include type=exclude stepname specifies names job steps included excluded operation example stepname= stepa stepf-stepl stepz indicates job steps stepa stepf stepl stepz included excluded operation stepname omitted entire input job whose name specified edit statement copied job name specified first job encountered processed codice_8 specifies message data set include listing output data set default resultant output listed message data set see info iebgener copies records sequential dataset creates partitioned dataset tasks iebgener perform include following example iebgener program copy one dataset another straight copy tasks sort program often faster iebgener thus many mainframe shops make use option automatically routes tasks sort icegener program instead iebgener systems possible send email batch job directing output codice_9 external writer systems technique follows also possible attach files sending email mainframe iebimage manipulates several types definitions aka images ibm 3800 laser printing subsystem ibm 4248 printer common uses forms control buffers fcbs character arrangement tables character definitions images forms printed output along text company logos printed page print 'graybar pages alternating gray white horizontal backgrounds match previous greenbar paper utility many different forms logos could stored images printed needed using standard blank paper thus eliminating need stock many preprinted forms need operators stop printer change paper iebisam unloads loads copies prints isam datasets extracted ibm manual sc26-7414-08 z/os dfsmsdfp utilities iebisam program longer distributed starting z/os v1r7 isam data sets longer processed created opened copied dumped isam data sets still use must converted vsam key-sequenced data sets prior z/os v1r7 could use access method services allocate vsam key-sequenced data set copy isam data set iebptpch print punch prints punches records sequential partitioned dataset tasks iebptpch perform include following empty dataset check dataset checked empty rc=4 else 0 read records 2495 tape cartridge reader changes records sequential dataset member partitioned dataset replaced compatible iebupdte iebupdte update incorporates changes sequential partitioned datasets unix codice_10 utility similar program uses different input format markers e..g insert ... mvs becomes ... unix patch programmers pronounce i.e.b up-ditty iebupdte utility used maintain source libraries functions iebupdte perform include following iebupdte commonly used distribute source libraries tape dasd iebupdte uses job control statements required ieb-type utilities exceptions follow job control used ieupdte follows iefbr14 dummy program normally inserted jcl desired action allocation deletion datasets example iefbr14 step calling sequence os/360 contained return address register 14 branch register 14 would thus immediately exit program however executing program operating system would allocate deallocate datasets specified dd statements commonly used quick way set remove datasets consisted initially single instruction branch register 14 mnemonic used ibm assembler br hence name ief br 14 ief course prefix os/360 job management subsystem single instruction program error — n't set return code hence second instruction added clear return code would exit correct status additional error reported fixed ibm two instruction program error due iefbr14 program link-edited reenterable simultaneously usable one caller hackers taken iefbr14 changed br 14 instruction br 15 thereby creating shortest loop world register 15 contains address iefbr14 module br 15 instruction would simply re-invoke module forever utilities normally used systems programmers maintaining operation system rather programmers application work system ickdsf device support facility installs initializes maintains dasd either operating system standalone assign alternate tracks defective tracks iehdasdr “ direct access storage dump restore ” older program found current z/os manuals dumps datasets disk printer backup restores backups iehdasdr removed mvs/xa iehinitt initialize tape initializes tapes writing tape labels multiple tapes may labeled one run utility ibm standard ascii labels may written example iehinitt program example label 3 tapes 3490 magnetic tape unit tape receive ibm standard label volser incremented one tape labeled tape rewound unloaded labeled update ttr links type iv supervisor call svc routines sys1.svclib applicable os/vs2 later iehlist utility used list entries partitioned dataset pds directory list contents volume table contents vtoc iehlist utility used list entries contained one following example iehlist program job produce formatted listing pds directory pds named xxxx.yyyy.zzzz example iehlist program list vtoc similar iehmove moves copies collections data however dfsms system managed storage environments common ibm recommend using iehmove utility move differs copy following move original data set deleted scratched tasks iehmove perform include following surface iehmove may seen redundant iebgener iebcopy utilities however iehmove powerful main advantage using iehmove need specify space dcb information new data sets iehmove allocates information based existing data sets another advantage iehmove copy move groups data sets well entire volumes data ease moving groups data sets volumes iehmove utility generally favored systems programmers sample iehmove job dd statements iehmove sysprint sysin refer dasd magnetic tape volumes instead individual data sets however referencing volumes pose problem since specifying codice_11 gains exclusive access volume therefore iehmove job runs entire volume datasets unavailable users acceptable private volumes tape mountable dasd volumes unacceptable public volumes sysut1 dd statement specifies dasd volume three work data set required iehmove allocated must specify unit volume information dd statement iehmove one first systems developed pl/s example three sequential data sets seqset1 seqset2 seqset3 moved one disk volume three separate disk volumes three receiving volumes mounted required iehmove source data sets cataloged space allocated iehmove iehprogm builds maintains system control data also used renaming scratching deleting data set tasks iehprogm perform include following cataloging select format smf records tape errors programs run control operating system format direct access volumes assign alternate tracks dump restore direct access volumes assign alternate tracks recover replace data load forms control buffer fcb universal character set ucs buffer printer utility program ibm documents service aids diagnosis manuals original os/360 service aids names beginning ifc im* ibm changed naming convention hm* os/vs1 am* os/vs2 ibm change ifc convention initializes sys1.logrec data set summarizes prints records sys1.logrec error recording data set traces selected system events svc i/o interruptions generates jcl needed apply ptf and/or applies ptf functions program subsumed smp verifies and/or replaces instructions and/or data load module program object formats prints object modules load modules program objects csect identification records maps load modules functions program subsumed imblist stand-alone program format print system job queue applicable mvs format print system job queue applicable mvs formats prints dumps tso swap data set gtf trace data stand-alone program produce high-speed low-speed dump main storage sort/merge utility program sorts records file specified order merge pre-sorted files frequently used often commonly used application program mainframe shop modern sort/merge programs also select omit certain records summarize records remove duplicates reformat records produce simple reports sort/merge important enough multiple companies selling sort/merge package ibm mainframes ibm original os/360 sort/merge program 360s-sm-023 program name ierrco00 alias sort supported ibm first-generation direct-access storage devices dasd tapes 2400 support second-generation disk drives provided ibm program products 5734-sm1 later 5740-sm1 dfsort alias iceman also sort sort frequently executed stand-alone program normally reads input file identified dd codice_12 writes sorted output file identified dd codice_13 also often called another application via cobol codice_14 verb calls pl/i codice_15 routines may use either codice_12 codice_13 files passed records sorted caller and/or pass sorted records back caller one time operation sort directed control statements largely compatible among various ibm third-party sort programs codice_14 codice_19 statement defines sort keys — fields data sorted merged statement identifies position length data type key codice_20 statement describes format length records input file statements allow user specify records included excluded sort specify transformations performed data keys combination ebcdic ascii character data zoned packed-decimal signed unsigned fixed-point binary hexadecimal floating-point keys located anywhere record contiguous sorting specified combination ascending descending sequence key os/360 sort program ierrco00 operates dividing input data sections sorting section main memory writing sorted section intermediate datasets either direct-access storage devices dasd magnetic tape final merge phases merge sections produce sorted output sort uses one number techniques distributing sections among secondary storage devices usually sort choose optimal technique overridden user sort three techniques used intermediate storage tape two disk tape techniques disk techniques os/360 linkage editor available several configurations dfsmsdfp added binder alternatives load modules option program objects linkage editor creates replaces load modules partitioned data set combination control cards object modules load modules rename replace control section csect perform several miscellaneous functions originally available several configurations depending storage requirement e level linkage editor longer available f level linkage editor known simply linkage editor z/os linkage editor present compatibility binder performs functions linkage editor addition supports new format program object functional equivalent load module partitioned data set extended pdse many additional capabilities programming language used computer shop one associated compilers translate source program machine-language object module object module compiler must processed linkage editor iewl create executable load module igycrctl common example compiler compiler current ibm enterprise cobol z/os product several previous ibm cobol compilers years different names many compilers various programming languages assembler e intended os/360 running small machines assembler f intended normal os/360 installations assembler xf system assembler os/vs1 os/vs2 replacing assembler e f although fully compatible ibm soon made assembler xf system assembler dos vm well assembler h assembler h version 2 program product assemblers generally faster assemblers e f xf although fully compatible ibm high level assembler hlasm essentially new version assembler h version 2 assembler ibm supports z/os z/vm replaces older assemblers although fully compatible system modification program smp vehicle installing service os/360 successors replacing e.g. stand-alone assembly link edit imaptfle jobs originally optional facility mandatory mvs/sp later program product version smp/e included recent systems e.g. z/os
[ 10883, 7, 909, 7053, 8213, 1952, 8737, 4645, 9639, 1323, 7217, 8502, 1219, 6342, 8262, 7881, 8393, 8272, 477, 868, 6503, 9838, 3443, 2168 ]
Train
9,978
2
History_of_RISC_OS:history risc os risc os computer operating system developed acorn computers arm-based acorn archimedes range originally released 1987 soon followed next version became completed made available april 1989 released earliest version a5000 1991 contained series new features 1996 risc os shipped 500,000 systems. released riscos ltd rol july 1999 based continued development rol march 1999 licensed rights risc os element 14 renamed acorn eventually new owner pace micro technology according company 6,400 copies rom sold production ceased mid-2005. launched may 2001 rol subscription scheme allowing users access latest os updates upgrades released soft-loadable rom images separate rom boot os stored loaded boot time shipped may 2002 following november 2002 final release june 2004 rol released rom based month dubbed play risc os gui convention calling three mouse buttons 'select 'menu 'adjust rol sold 500th adjust rom early 2006. released october 2002 castle technology acorn clone iyonix pc separate evolution based upon ncos work done pace set-top boxes october 2006 castle announced source sharing license plan elements shared source initiative ssi managed risc os open ltd rool risc os 5 since released fully free open source apache 2.0 license older longer maintained risc os 6 older not. also announced october 2006 rol next generation stream operating system first product launched name continuation select scheme beta-version available 2007 free download subscribers select scheme april 2009 final release shipped latest release risc os rol shipped december 2009 os designed united kingdom acorn 32-bit arm based acorn archimedes released first version 1987 arthur operating system first public release os arthur 1.20 june 1987 bundled desktop graphical user interface gui mostly comprises assembly language software modules desktop module written features colour-scheme typically described technicolour graphical desktop runs top command-line driven operating system owes much acorn earlier mos operating system bbc micro range 8-bit microcomputers arthur originally conceived intended deliver similar functionality operating system bbc master series computers mos reaction fact advanced operating system research project arx would ready time archimedes arthur project team led paul fellows given five months develop entirely ground up—with directive make like bbc micro intended stop-gap operating system acorn development arx could completed however latter delayed time eventually dropped became apparent arthur development could extended window manager full desktop environment also small enough run first 512k machines floppy disc whereas arx required 4 megabytes hard drive os development carried using prototype arm-based system connected bbc computer moving onto prototype acorn archimedes a500 arthur multitasking operating system offered support adding application-level cooperative multitasking version operating system released externally internally development desktop window management continued addition cooperative multitasking system invented neil raine used memory management hardware swap-out one task bring another call-and-return wimp-poll call applications obliged make get messages desktop transformed single-application-at-a-time system one could operate full multi-tasking desktop transformation took place version 1.6 though made public released name change arthur risc os version 2.0 software made arthur 1.2 run risc os 2 later underneath desktop original arthur os core api interfaces modular structures remain heart versions titles work however used undocumented features side effects cases apis became deprecated 2011 business insider listed arthur one ten operating systems time forgot next version became completed made available april 1989 risc os rapid development arthur 1.2 failure arx project first release called arthur 2 renamed risc os 2 first sold risc os 2.00 april 1989 operating system implements co-operative multitasking limitations multi-threaded uses adfs file system floppy hard disc access initially ran 512 kb set roms wimp interface offers standard features fixes many bugs hindered arthur lacks virtual memory extensive memory protection applications protected many functions implemented 'modules full access memory time release main advantage os rom booted quickly easy crash impossible permanently break os software high performance due much system written arm assembly language os designed users mind rather os designers organised relatively small kernel defines standard software interface extension modules required conform much system functionality implemented modules coded rom though supplanted evolved versions loaded ram among kernel facilities general mechanism named callback handler allows supervisor module perform process multiplexing facility used module forming part standard editor program provide terminal emulator window console applications approach made possible advanced users implement modules giving risc os ability pre-emptive multitasking slightly updated version risc os 2.01 released later support arm3 processor shipped acorn archimedes a540 acorn r225/r260 introduced number new features including multitasking filer operations applications fonts rom limit number open windows ability move windows screen safe shutdown pinboard arm3 support grouping icon bar icons 128 tasks ability read ms-dos format discs use named hard discs improved configuration also included way multiple windows change settings risc os 3.00 released earliest version a5000 1991 almost four times size risc os 2 runs 2 mb rom improves multitasking also places popular base applications rom risc os 3.00 several bugs replaced risc os 3.1 months later upgraded roms supplied cost postage risc os 3.1 released later sold built a3010 a3020 a4000 a4 later a5000 models also made available replacement roms a5000 earlier archimedes machines last risc os version suitable machines three variants released risc os 3.10 base version risc os 3.11 included slight update fixes serial port issues risc os 3.19 german translation risc os 3.50 sold 1994 first risc pcs due different hardware architecture risc pc including arm 6 processor 16- 24-bit colour different io chip iomd risc os 3.50 made available older archimedes series arm2 3 machines risc os 3.5 somewhat shoehorned 2 mb footprint moved rom applications risc os 3.1 onto hard drive proved unpopular later moved back rom version introduced issues backward compatibility particularly games risc os 3.60 followed 1995 os features much improved hard disk access networking enhanced include tcp/ip standard addition acorn existing proprietary econet system hardware support also improved risc pcs could use arm7 processors acorn a7000 machine arm7500 processor also supported risc os 3.6 twice size risc os 3.5 shipping 4 mb two rom chips risc os 3.70 released 1996 primary changes os support strongarm processor made available upgrade risc pc required extensive code changes due strongarm split data instruction cache harvard architecture 32-bit interrupt modes risc os 3.71 small update released support hardware acorn a7000+ arm7500fe processor fe offered hardware support floating point mathematics usually emulated one risc os software modules risc os 3.60 also formed foundation ncos shipped acorn netchannel ncs acorn officially halted work areas except set-top boxes january 1999 company renamed element 14 14th element periodic table silicon new goal become purely silicon design business like previous successful spin arm acorn 1990 risc os development halted development os 4.0 riscpc 2 phoebe 2100 whose completion also cancelled beta version os 3.8 ursula original riscpc previously released developers project code names phoebe hardware ursula software chandler graphics processor chip taken names characters tv series friends phoebe ursula twin sisters series led number rescue efforts try keep acorn desktop computer business alive acorn held discussions many interested parties eventually agreed exclusively licence risc os riscos ltd formed consortium dealers developers end-users pace purchased rights use develop ncos also number projects bring advantages risc operating system platforms creation rox desktop provide risc os-like interface unix linux systems separate work pace resulted code fork continued subsequent licensing agreement castle technology causing much community debate time debate remains ongoing 2011 march 1999 new company called riscos ltd founded licensed rights risc os element 14 eventually new owner pace micro technology continued development os 3.8 releasing risc os 4 july 1999 whilst hardware support phoebe needed core improvements risc os 3.80 could finished released included according company 6,400 copies risc os 4.02 rom sold production ceased mid-2005 1999 2000 riscos ltd also released versions risc os 4 support several additional hardware platforms microdigital mico microdigital omega riscstation r7500 castle kinetic riscpc 2003 version risc os 4 released support millipede graphics alphalock podule risc os 4 also available various hardware emulators operating systems september 2003 virtualacorn released commercial emulator virtualrpc included copy risc os 4.02 december 2008 riscos ltd made 4.02 available non-commercial emulators £5 product called virtually free may 2001 company launched risc os select subscription scheme allowing users access latest os updates upgrades released soft-loadable rom images separate rom boot os stored loaded boot time providing soft-loads physical rom costs eliminated updates able delivered accelerated speed frequency also allowed company subsidise retail price rom releases generally culmination last select upgrades extra minor changes may 2002 final release select 1 shipped included november 2002 final release select 2 shipped included june 2004 final release select 3 shipped included also june 2004 riscos ltd released rom based version 4.39 dubbed risc os adjust name play risc os gui convention calling three mouse buttons 'select 'menu 'adjust riscos ltd sold 500th adjust rom early 2006 features introduced 4.39 include user customization graphical user interface release select scheme made risc os six branding mentioned a9home released 2006 uses version 4.42 adjust 32 developed supports 32-bit addressing modes found later arm architectures october 2006 shortly castle technology announced shared source initiative riscos ltd announced risc os six next generation stream operating system first product launched risc os six name continuation select scheme select 4 beta-version risc os 6 preview 1 select 4i1 available 2007 free download subscribers select scheme present subscribers whose subscription renewed 30 may 2004 since lapsed risc os six brought portability stability internal structure improvements including full 26/32-bit neutrality highly modularised legacy hardware specific features abstracted code separated easier future maintenance development teletext support device interrupt handler software-based graphics operations real-time clock mouse pointer cmos ram support hardware timer support abstracted kernel separate modules legacy components like vidc driver obsolete functionality bbc micro abstracted aif transient utility executable checking introduced also protect rogue software graphics acceleration modules may provided sm501 graphics chip a9home viewfinder agp podule cards april 2008 final release select 4 shipped included select 4 releases initially compatible acorn risc pc a7000 machines riscstation r7500 microdigital omega mico computers officially supported company test machines available requires proprietary software code rights lack detailed technical information microdigital omega also cited another reason support hardware difficult april 2009 final release select 5 shipped included final release risc os riscos ltd select 6i1 shipped december 2009 includes risc os 5 separate evolution castle technology ltd based upon work done pace ncos based set top boxes risc os 5 written support castle iyonix pc acorn-compatible runs intel xscale arm processor although wealth software updated older applications run risc os 5 via emulator called aemulor since armv5 xscale processor support 26-bit addressing modes likewise risc os 5 ported run properly new cpu abstraction graphics hardware interfaces created allow example use standard graphics cards instead acorn vidc chip july 2003 castle technology ltd bought head licence risc os pace micro october 2006 castle technology ltd announced plan release elements risc os 5 source sharing license shared source initiative ssi joint venture castle risc os open limited rool newly formed software development company aims accelerate development encourage uptake os custom dual license released source freely available may modified redistributed without royalty non-commercial use commercial usage incur per-unit license fee castle ssi made phased releases source code starting may 2007 october 2008 enough source released build almost complete iyonix rom image late 2011 possible build complete rom images published sources full source code available tarballs cvs web interface cvs archive addition prebuilt images available stable releases development nightly builds rool maintains shared source tree builds international developer community non-profit basis support encourage development rool castle intend provide risc os consultancy clients requiring embedded arm solutions already major market os ports risc os 5 available a7000/a7000+ riscpc rpcemu omap3 beagleboard derivatives omap4 pandaboard pandaboard es am5728 titanium raspberry pi xscale iyonix october 2018 risc os 5 re-licensed apache 2.0 license
[ 1668, 3722, 2574, 11539, 3350, 38, 10029, 7983, 11184, 10548, 823, 1849, 4679, 1741, 9166, 9044, 477, 1501, 1377, 8551, 9964, 8429, 10862, 5492, 1790 ]
None
9,979
2
Developer_Certificate_of_Origin:developer certificate origin developer certificate origin dco introduced 2004 linux foundation enhance submission process software used linux kernel shortly sco–linux disputes dcos often used alternative contributor license agreement cla instead signed legal contract dco affirmation source code submitted originated developer developer permission submit code proponents dco content reduces barriers entry introduced cla
[ 4011, 823 ]
Validation
9,980
5
ARP_cache:arp cache arp cache collection address resolution protocol entries mostly dynamic created ip address resolved mac address computer effectively communicate ip address arp cache disadvantage potentially used hackers cyber attackers arp cache helps attackers hide behind fake ip address beyond fact arp caches may help attackers may also prevent attacks distinguish ing low level ip ip based vulnerabilities
[ 5437 ]
Validation
9,981
9
ModernPascal:modernpascal modern pascal closed source cross-platform interpreter compiler runtime environment command line server-side networking applications modern pascal applications written pascal/object pascal run within modern pascal runtime microsoft windows linux os x freebsd solaris dos/32 operating systems work hosted supported 3f llc partner mp solutions llc modern pascal provides blocking i/o api technology commonly used operating system applications modern pascal coderunner contains built-in library allow applications act web server without software apache http server iis modern pascal invented 2000 ozz nixon also co-developing dxjavascript alexander baronovski ozz inspired kylix project 1999 met borland pascal team shared programming language modern pascal ozz ported commercial socket suite dxsock kylix started developing modern pascal run pascal scripts microsoft windows linux os x 2002 version 1.1 released modern pascal v1.1 capable running turbo pascal dos syntax last version using variants internally variable code instances version 1.1 introduced support built-in rtl units allowing developers extend language grammar support crt/display tcp/ip socket calls 2005 version 1.2 released modern pascal v1.2 available 64bit platforms native 64bit binaries internal support 64bit numbers memory addresses 2007 version 1.3 released modern pascal v1.3 added cross-platform support dynamic libraries .so .dylib .dll first version capable developing native windows gui applications along linux qt gui applications supporting external libraries language longer limited command line web server script engine role 2008 version 1.4 released modern pascal v1.4 fork internally called declan decisioning language use credit financial industry version 1.4 also introduced tdataset compatibility borland delphi compiler along ability connect databases via built-in odbc support allows modern pascal leverage almost sql database engines command line web solutions 2009 version 1.5 released modern pascal v1.5 redesign parser phase lexicon first version modern pascal started incorporate syntax popular languages like += -= *- /= c/javascript version 1.5 available native apache module windows linux os x 2010 version 1.6 released modern pascal v1.6 incorporates built-in rtl units ciphers compressions hashs version truly focused migrating applications web needed built support common ciphers hashes compression algorithms used restful applications 2011 version 1.7 released modern pascal v1.7 redesign apache module release forward modern pascal longer built apache module modern pascal celerity introduced inspired design coldfusion ntier back end web servers means future release fastcgi isapi even old cgi nsapi interfaces could deployed version 1.7 also introduced old pascal 3.0 feature called chaining slightly modern style 2013 version 1.8 released modern pascal v1.8 introduced support delphi-like classes smart records unions self instantiation version 1.8 first version modern pascal started truly become pascal dialect 2014 version 1.9 built released public modern pascal v1.9 used develop developip large scale public web site 2015 version 2.0 begun modern pascal 2.0 fork lape previous versions fast efficient fast enough larger customers current benchmarks show v2.0 processing 100 million instructions second roughly 8 times faster version 1.9 much faster alternative pascal script engines july 2015 modern pascal 2.0 enters final private beta cycle team actively porting code snippets old applications 2.0 publishing code github 2017 version 2.0 released public includes native dbase iii+ iv v vii clipper foxpro support past 24 months development 3f ported github source 17 bbses including quickbbs tpboard hermes binkp fidonet protocol multiple tossers adventure game studio 1984 custom micro solutions inc. accounting point sale software web ria applications 3f also introduced transparent support extended ascii ansi utf8 graphics modern pascal command line interface allows create run dos like applications using pascal decades free pascal source code implement run wide range business classes command utilities modern pascal celerity allows create similar solutions stand-alone middleware backend engine combined apache module celerity used create wide range web script solutions modern pascal coderunner allows create standalone networking tools including web servers email servers chat servers coderunner manages tcp communications code even tls/ssl developer simply focus happens connection established program game.loot.example uses math const maxprobability=1000 type function looter.choose loottype var begin end function looter.asstring l loottype string begin end procedure looter.free begin end // must listed implementation // procedure looter.init begin end var begin end output replaced original code sample something easier read/follow run turbo pascal syntax hello world program modernpascal coded normal pascal hello world program helloworld begin end modernpascal also supports brief pascal execute statements without formality writeln 'hello world pascal speak reusable collection methods referred unit languages often call modules libraries modern pascal built-in units handle display environment calls like file system i/o sockets networking tcp binary data buffers classes objects cryptography functions data streams regular expression collections logging configuration files using ini csv sdf similar csv formats databases odbc built-in dbase clipper foxpro core functions modern pascal operates without requiring third-party libraries modern pascal optionally require openssl achieve tls/ssl listeners clients modern pascal operates using single thread model using blocking i/o calls celerity coderunner self-threading engines allowing modern pascal support tens thousands concurrent connections design single thread instance code means used build highly reliable applications design goal modern pascal application skill level programmer able operate without fear memory leak variable collision threads etc approach allows scaling number cpu cores machine running negative approach increase thread switching contexts however modern pascal tested base dell laptop handling 50,000 concurrent connections/scripts
[ 1952, 225, 865, 5154, 9762, 10506, 5612, 6797, 8524, 7983, 10924, 9714, 9780, 3413, 11221, 823, 4439, 5663 ]
Train
9,982
8
Masterseek:masterseek masterseek corp. b2b business-to-business search engine founded denmark 1999 masterseek encompasses 175 million business profiles 346 million websites 450 million contacts 216 million linkedin members thus making masterseek largest commercial database world masterseek founded denmark rasmus refer 1999 denmark headquarters located bredgade 29 dk-1260 kbh k also current headquarters new york city 82 wall street according executives masterseek utilizes business model based annual business subscription fee usd 149 return subscribers receive full editing control corporate profile content advertising control widgets embedded video among factors june 2008 accountancy firm horwart international approximated raw market value masterseek company 150 million company remains privately owned also june 2008 sold 10 authorized stocks range foreign investors company announced january 31 2009 company offering limited number shares sale order raise 4–6 million order gain listing swedish marketplace aktietorget founder refer also announced plans ipo october 2009 signed swedish-based company thenberg kinde fondkommission ab financing july 11 2016 masterseek announced company planning getting listed nasdaq listing nasdaq provide capital expansion rapidly growing markets latin america africa asia doney law firm assisting listing nasdaq capital market june 2008 company stated 50 million company profiles 75 countries handled 90,000 b2b searches daily company stated 82 million profiles march 21 2011 average 300,000 new profiles added monthly 2017 company stated 178 million company profiles october 30 2008 announced masterseek acquired b2b search engine accoona search engine fairly successful united states china exclusive partnership china daily august 3 2006 time dubbed accoona one 50 best websites illustrating search engine used artificial intelligence understand meaning keyword queries accoona run difficulties gone defunct early october 2008 withdrawing ipo making possible masterseek acquire data technology masterseek bought remaining search engine codes domain name assets accoona integrated masterseek re-launched usa china launched europe january 2009 accoona information also integrated masterseek search engine masterseek search engine relies web crawlers automatically collect sort company details internet searches look company profiles contact information descriptions products services searches global national regional involved local markets hits listed relevance according search terms different search options including specific product search company searches people searches results displayed languages search engine also offers masterrank point system ranking corporate websites july 5 2007 masterseek announced cosponsors team csc denmark cycling team beginning team involvement tour de france masterseek name began displayed team apparel week tour start london global investor alerts issued public warning alerting masterseek corp. cold-calling potential customers offering unauthorised illegal financial services also multiple reports masterseek engine crawling profiles individuals illegally violating privacy fair use policies services like linkedin create publicly publish profiles individuals without consent providing control editing profiles owners profiles thus violating civil criminal laws multiple jurisdictions around world
[]
Train
9,983
4
Norton_360:norton 360 norton 360 developed symantec “ all-in-one ” security suite combined online protection performance tuning thing distinguished suite norton internet security inclusion optimization problem-solving tools norton 360 distributed boxed copy download preinstalled computers oem software norton 360 discontinued cut overhauled norton line mid-2014 features carried successor norton security symantec announced project genesis february 7 2006 genesis would differ symantec consumer security products incorporating file backup performance optimization tools antivirus capabilities firewall phishing protection real-time heuristics also planned windows vista compatibility major aspect genesis genesis slated release september may 2005 microsoft announced windows live onecare security suite similar functionalities slated release 2006 genesis renamed norton 360 may 31 2006 feature set confirmed—it would functionalities norton internet security—with file backup performance tools phishing protection real-time heuristics public beta test planned summer 2006 final release date set end 2006 day mcafee announced falcon security suite similar functionalities norton 360 onecare however dates delayed onecare launched summer 2006 falcon entered public beta testing viewed norton 360 response microsoft antivirus software onecare however release onecare saw symantec lagging behind rivals mark bregman symantec vice president claimed upcoming norton 360 intended compete onecare stating somehow left wrong impression market place windows live onecare microsoft falcon mcafee nothing symantec first public beta delivered november 2006 compatible windows xp second beta subsequently released december 20 2006 adding compatibility windows vista build 6000 100,000 people tested software symantec began distribution retailers february 2007 version 1.0 released february 26 2007 version first symantec product use sonar detect zero-day viruses monitors applications malicious behavior taking action needed backup restore functionality allowed users back files online hard drive cd dvd performance optimization tools allowed users clear web browser history temporary files disk defragmenter bundled part optimization tools phishing protection integrates internet explorer warning users fraudulent sites windows xp 300 megahertz processor 256 megabytes ram 300 mb hard disk space required vista 800 mhz processor 512 mb ram 300 mb hard disk space required reviews cited norton 360 low resource usage relative norton internet security 2007 phishing protection pc magazine found phishing protection feature effective blocking access fraudulent sites internet explorer 7 firefox 2 however reviewers highlighted lack manual control advanced users cnet noted lack phishing protection browsers internet explorer mozilla firefox cnet also highlighted lack wireless network tools notifying users someone uninvited joins network help encrypting wireless signals pc magazine criticized antispam filter version 1.0 finding blocked half spam mail five percent false positive rate version 2.0 released march 3 2008 backup feature inscribe data blu-ray hd dvd discs multiple installations norton 360 also managed centralized location backing files online user control amount bandwidth norton uses registry cleaner bundled performance tools allowing user remove invalid entries phishing protection firefox added supplementing phishing protection norton identity safe stores login credentials websites network map allows users view status norton installations networked computers view basic information computer system requirements remain version 1.0 pc magazine found spam filter inaccurate 25 percent false positive rate cnet encountered problems installing version 2.0 legacy machines version 3.0 released march 4 2009 version uses codebase norton internet security 2009 earlier versions symantec rewrote code specifically norton 360 version 3.0 incorporates norton safe web offered standalone service earlier safe web integrates firefox internet explorer toolbar blocking access fraudulent malware hosting sites toolbar also includes search box routing search queries typed box ask.com search engine toolbar share code ask.com toolbar classified spyware mcafee trend micro antivirus vendors due criticism search functionality symantec announced ask.com search box would hidden future releases version 3.0 capability back files flash drive introduced release files stored flash drive copied another computer without norton 360 installed norton also creates virtual drive windows explorer allowing users browse backup files stored locally online users restore individual files using drag-and-drop technique version 3.0 retain previous versions files skips files open another program startup application manager included release allowing users control programs start login complement application manager norton measure impact programs login time pc magazine highlighted version 3.0 inaccurate spam filter misfiling half valid mail spam pc magazine also noted support session symantec technician used shareware application malwarebytes anti-malware remove malware computer referring online norton program controversy raised fact technician misleadingly referred program symantec product version 4.0 released february 17 2010 version adds many new security features found norton internet security 2010 version 4 also features gui change prominent colors match gold black sunburst norton internet security widely criticized antispam replaced far effective brightmail according symantec gives 20 better results require training version 5.0 released february 2011 offers improved performance virus detection also provides updated versions sonar version 3 system insight download insight supports internet explorer firefox browsers also supports following clients qq chat msn messenger chat limewire p2p msn explorer browser e-mail chat opera browser outlook e-mail thunderbird e-mail windows mail e-mail chrome browser bittorrent p2p aol browser yahoo messenger chat safari browser filezilla file manager outlook express e-mail features new enhanced interface realistic icons animations also includes norton widgets platform integrates symantec online services directly ui also new version reputation scan gives user clear insight loaded applications files safeweb facebook scans links wall verify safety links norton recovery tools added scanner interface start menu folder help restoring highly infected system backup restore functionality also improved passmark performance test 011 rated norton 360 5.0 fastest lightest all-in-one suite featured metered broadband modes easily remembers logins personal info protecting online identity theft version norton released september 5 2012 together newest norton antivirus norton internet security products described version-less symantec press release alluding automatic updates always keep software latest version specific version reference anywhere description software software compatible windows 8 version norton 360 features enhancements social networking protection anti-scam capabilities stronger networking defenses norton also introduced extra tune disk optimizer version 21 norton security suite released september 4 2013 together newest norton antivirus norton internet security products norton 360 antivirus solution developed sonar technology claims able detect threat block remove thanks three five layers shields threat monitoring threat removal network defense last one dealing online threats actually reach user ’ computer protection also granted analyzing behavior known menaces another important aspect derives stealth capabilities five shields work silently background performing scans updates back-ups automatically need whatsoever care important files browser protection download insight keen eye dangerous applications warning user eventual threats running computer version 22 released september 22 2014 release marketed norton security 2015 however norton 360 users able update v22 even norton retiring norton 360 brand appearance software identical norton security 2015 except product name top-left corner april 2019 symantec released new norton 360 emphasis new old legacy norton 360 remains retired product new norton 360 step norton security basically got replaced new product main change reflects besides security protection norton 360 provides secure vpn online privacy dark web monitoring powered lifelock safecam help block pc webcam takeovers new norton 360 comes several editions two standalone three bundle lifelock options norton 360 available norton 360 standard norton 360 premier edition norton 360 multi-device premier edition functions standard edition difference comes 25 gb online storage versus 2 gb included standard edition norton 360 multi-device actually three products one subscription norton 360 premier edition norton internet security mac® norton mobile security comparison norton 360 editions norton one shows features os coverage norton 360- gold edition credit card type 5 unique sets alpha-numeric key data reverse sold instructions go online install installation page norton 360 software sold purchased subscription stated period e.g one year software e.g firewall antivirus automatically disabled end subscription period unless new subscription purchased special edition norton 360 premier edition branded norton security suite available free pc customers comcast xfinity internet service difference norton 360 premier edition norton security suite latter include online storage feature norton internet security mac also available free comcast xfinity customers major version updates norton security suite typically occur 1 month norton 360 windows 8 consumer preview released february 29 2012 symantec announced norton antivirus internet security well newest norton 360 version 6 compatible windows 8 symantec compliance fbi whitelisted magic lantern keylogger developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting magic lantern concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response magic lantern needed court order deploy like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order norton internet security windows versions criticized uninstalling completely leaving unnecessary files registry entries versions prior 3.0 also installed separate liveupdate program updates norton-branded software user must uninstall norton internet security liveupdate component manually liveupdate component purposely left behind update norton-branded products present symantec developed norton removal tool remove registry keys values along files folders uninstaller must run twice initially computer restart requiring second restart uninstallation remove subscription data preserved prevent users installing multiple trial copies norton 360 version 2.0 installed users encountered incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid windows registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole senior director product management acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits may hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions norton 360 comes one-year subscription activated upon installation valid three home computers expiration subscription blocks access program updates shuts antivirus firewall well tools bundled password manager user saved passwords also inaccessible users often understand completely exposed pcs become infected viruses
[ 2049, 2563, 10756, 9757, 550, 10790, 1581, 8753, 569, 5178, 9279, 9791, 2118, 3163, 8283, 8816, 4722, 10872, 127, 6797, 1172, 10903, 10392, 6297, 2213, 3243, 1708, 8368, 10935, 704, 10433, 4814, 8398, 9423, 10451, 6364, 5860, 10987, 8943, ...
Train
9,984
7
GridPP:gridpp gridpp collaboration particle physicists computer scientists united kingdom cern manage maintain distributed computing grid across uk primary aim providing resources particle physicists working large hadron collider experiments cern funded uk science technology facilities council collaboration oversees major computing facility called tier1 rutherford appleton laboratory ral along four tier 2 organisations scotgrid northgrid southgrid londongrid formerly lt2 tier 2s geographically distributed composed computing clusters multiple institutes 2012 gridpp infrastructure spans 18 uk institutions major partner uk national grid initiative part european grid infrastructure original gridpp plan drawn late 2000 provide uk contribution lhc computing grid europeandatagrid project european grid infrastructure drive behind projects provide researchers working lhc experiments suitable computing resources extend use technology communities first gridpp proposal accepted pparc time uk funding council responsible funding particle physics related projects collaboration officially began 1 september 2001 £17m funding first phase gridpp 2001 2004 collaboration built uk testbed working prototype grid linked similar systems around world preparation use production infrastructure analysed real data wide variety experiments run around world different institutions 2004 extended till september 2007 bring proposed lhc switch date 2007 gridpp fully functioning production service lhc switch still year away september 2007 received extension stfc receiving £30m funding march 2011 gridpp fourth phase 2011–2014 received funding science technology facilities council stfc support lhc experiments users late 2011 project providing 29,000 cpus 25,000tb storage worldwide grid infrastructure uk universities institutions researchers working lhc members 2011 list follows scotgrid based across 3 main sites primarily supports on-going research within field particle physics entire environment monitored maintained developed dedicated teams site ensure fully operational system available end user communities londongrid joint collaboration 5 institutes london region provide high performance computing resources high energy physics community gridpp supports many disciplines projects list different experiments projects actively use gridpp resources gridpp originally created support experiments based cern using lhc 4 main experiments supported alongside experiments lhc gridpp also supports international high energy physics experiments include gridpp european grid infrastructure efforts supports many non-physics research disciplines
[ 1776, 10116, 5956, 1862 ]
Test
9,985
2
NCR_VRX:ncr vrx vrx acronym virtual resource executive proprietary operating system ncr criterion series later v-8000 series mainframe computers manufactured ncr corporation 1970s 1980s replaced b3 operating system originally distributed century series inherited many features b4 operating system high-end ncr century series computers vrx upgraded late 1980s 1990s become vrx/e use ncr 9800 series computers edward d. scott managed development team 150 software engineers developed vrx tom tang director engineering ncr responsible development entire criterion family computers product line achieved 1b revenue 300m profits ncr
[ 10065, 2179, 7983 ]
Test