node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
9,986 | 5 | GNUMail:gnumail gnumail free open-source cross-platform e-mail client based gnustep cocoa official mail client gnustep also used étoilé inspired nextmail next mail.app predecessor apple mail gnumail based mail handling framework pantomime furthermore gnumail demonstrates possible develop cross platform programs gnustep cocoa | [
1664,
2050,
3465,
7307,
9747,
11418,
9642,
7983,
1075,
2101,
9909,
576,
3015,
3916,
10956,
7255,
6231,
8283,
10470,
9451,
5612,
10861,
8303,
8304,
9459,
3578,
8443,
7036,
7806
] | Test |
9,987 | 5 | SPDY:spdy spdy pronounced speedy deprecated open-specification networking protocol developed primarily google transporting web content spdy manipulates http traffic particular goals reducing web page load latency improving web security spdy achieves reduced latency compression multiplexing prioritization although depends combination network website deployment conditions name spdy trademark google acronym throughout process core developers spdy involved development http/2 including mike belshe roberto peon february 2015 google announced following recent final ratification http/2 standard support spdy would deprecated support spdy would withdrawn google removed spdy support google chrome 51 mozilla removed firefox 50 apple deprecated technology macos 10.14.4 ios 12.2. group developing spdy stated publicly working toward standardisation available internet draft first draft http/2 used spdy working base specification draft editing implementations spdy exist chromium mozilla firefox opera amazon silk internet explorer safari implementations chromium firefox open source software february 2015 google announced plans remove support spdy favor http/2 http/2 first discussed became apparent spdy gaining traction implementers like mozilla nginx showing significant improvements http/1.x call proposals selection process spdy chosen basis http/2 since number changes based discussion working group feedback implementers february 11 2016 google announced chrome would longer support spdy npn may 15 2016 anniversary rfc 7540 january 25 2019 apple announced spdy would deprecated favor http/2 would removed future releases goal spdy reduce web page load time achieved prioritizing multiplexing transfer web page subresources one connection per client required tls encryption nearly ubiquitous spdy implementations transmission headers gzip- deflate-compressed design contrast http headers sent human-readable text moreover servers may hint even push content instead awaiting individual requests resource web page spdy requires use ssl/tls tls extension alpn security also supports operation plain tcp requirement ssl security avoid incompatibility communication across proxy spdy replace http modifies way http requests responses sent wire means existing server-side applications used without modification spdy-compatible translation layer put place spdy effectively tunnel http https protocols sent spdy http requests processed tokenized simplified compressed example spdy endpoint keeps track headers sent past requests avoid resending headers changed must sent compressed ietf working group httpbis released draft http/2 spdy draft-mbelshe-httpbis-spdy-00 chosen starting point use within https spdy needs tls extension next protocol negotiation npn thus browser server support depends https library openssl 1.0.1 greater introduces npn patches add npn support also written nss tlslite spdy scheduled switch npn application-layer protocol negotiation alpn end 2014 security support provider interface sspi microsoft implemented npn extension tls implementation prevented spdy inclusion latest .net framework versions since spdy specification refined http/2 expected include spdy implementation one could expect microsoft release support http/2 finalized spdy versioned protocol control frames 15 dedicated bits indicate version session protocol approximately 7.1 websites support spdy fielded versions two popular web servers nginx apache major providers spdy traffic although latest version nginx removed spdy support compares adoption rate 8.1 newer http/2 protocol overtaken adoption spdy google services e.g google search gmail ssl-enabled services use spdy available google ads also served spdy-enabled servers brief history spdy support amongst major web players according w3techs spdy-enabled websites use nginx litespeed web server coming second | [
6657,
10242,
2579,
10271,
2083,
2085,
9770,
559,
562,
4661,
3639,
5178,
3643,
3133,
5181,
64,
9281,
11332,
8265,
5707,
4687,
10834,
6231,
6747,
10341,
10344,
1642,
9834,
115,
9843,
4725,
4728,
3707,
1664,
9860,
649,
9868,
3218,
9365,
1141... | Test |
9,988 | 9 | Java_EE_Connector_Architecture:java ee connector architecture java ee connector architecture jca java-based tool connecting application servers enterprise information systems eis part enterprise application integration eai solutions jdbc specifically used connect java ee applications databases jca generic architecture connection legacy systems jca developed java community process jsr 16 jca 1.0 jsr 112 jca 1.5 jsr 322 jca 1.6 j2ee version 1.3 requires application servers support jca version 1.0 j2ee version 1.4 requires application servers support jca version 1.5 java ee version 6 requires application servers support jca version 1.6 java ee connector architecture defines standard connecting compliant application server eis defines standard set system-level contracts java ee application server resource adapter system contracts defined version 1.0 java ee connector architecture described specification follows jca version 1.5 adds system contracts specification follows jca adapters built integrate various enterprise information system siebel systems sap ag great plains systems oracle applications etc siebel provides api integrate various platforms like java c++ .net visual basic etc java provides interface called 'java data bean jdb siebel adaptor provides data access via jdb api great plains systems provides interface called econnect integrate platforms sap provides interface java called sap java connector sap jco | [
1035,
3341,
11541,
5658,
10526,
10020,
3114,
5677,
2095,
4913,
6067,
4406,
2106,
3517,
3518,
6334,
3008,
10048,
10817,
4419,
11076,
11582,
1095,
3659,
10317,
3278,
847,
3920,
4174,
722,
4561,
2901,
5210,
3804,
4959,
4960,
1250,
10340,
3558,... | None |
9,989 | 4 | Mocana:mocana mocana founded 2002 san francisco-based company focuses embedded system security industrial control systems internet things iot one main products iot security platform high-performance ultra-optimized os-independent high-assurance security solution device class decoupling security implementation rest application development allows easier development software devices comprising internet things numerous independent networked devices communicate various ways mocana originally launched embedded systems security company recently company shifted focus protecting mobile devices apps data mocana introduced products 2004 focus embedded systems security year company launched embedded security suite software product secure communications networked devices february 2005 based menlo park california company joined freescale semiconductor developers alliance program delivered group first security software 2008 mocana cited example independent company could provide security smartphones mocana ceo adrian turner published article san jose mercury news risks associated non-pc networked devices new york times reported mocana researchers discovered could hack best-selling internet-ready hdtv model unsettling ease highlighted opportunity criminals intercept information like credit card billing details media outlets across u.s. cited point coverage risks associated advances technology mocana sponsored 7th workshop rfid security privacy university massachusetts 2011 launched mobile application protection platform 2011 support android apps added ios app support 2012 following series funding round 2012 total investment mocana 47 million new ceo james isaacs replaced turner september 2013 interim ceo peter graham replaced isaacs april 2016 april 2016 mocana spun mobile security business blue cedar networks william diotte replaced graham ceo may 2016 mocana iot security platform security software solution embedded systems software provides cryptographic controls e.g authentication confidentiality encryption device data integrity verification embedded devices applications company also offers customizable user agreements optional fips 140-2 validated crypto engines access application source code required product design based assumption many assurances security device operating system may compromised obviates necessity infallible systemwide security policies addition mocana offers consulting services evaluating advising security threats networked devices mocana security technology used airplane in-flight entertainment systems medical devices battlefield communications automobile firmware cell phone carrier networks mocana senior analyst robert vamosi cited 2011 piece bloomberg businessweek comparing tech companies approaches security mocana investors include trident capital 2012 intel capital 2011 shasta ventures southern cross venture partners symantec 2010 august 2012 series total 47 million raised official web site mocana.com | [] | None |
9,990 | 4 | Mushroom_Networks:mushroom networks mushroom networks inc. privately held company san diego california mushroom networks founded 2004 electrical computer engineer rene l. cruz cahit akin rajesh mishra spin-off university california san diego ucsd got support von liebig center mushroom networks also received initial funding support itu ventures los angeles investment firm company solely focuses networking products utilizing broadband bonding technology various configurations products provide end-user appearance larger bandwidth aggregating multiple network services load balancing and/or channel bonding mushroom networks developed broadband bonding extensive research development | [
3450,
10270
] | Validation |
9,991 | 2 | Chippewa_Operating_System:chippewa operating system chippewa operating system often called cos discontinued operating system cdc 6600 supercomputer generally considered first super computer world chippewa initially developed experimental system also deployed cdc 6000 machines chippewa rather simple job control oriented system derived earlier cdc 3000 later influenced kronos scope name system based chippewa falls research development center cdc wisconsin operating system control data corporation distinct preceded cray operating system also called cos cray | [
6529,
2179,
1031,
1480,
7432,
7497,
7983,
6675,
10458,
11356
] | None |
9,992 | 5 | Parallel_Line_Internet_Protocol:parallel line internet protocol parallel line internet protocol plip computer networking protocol direct computer-to-computer communications using parallel port normally used connections printer parallel line internet protocol provides link layer services internet protocol protocol used forming small local area networks large computer networks internet enabling computers without standard dedicated networking hardware ethernet older parallel port devices communicate internet protocol suite standards-based networking model software specification forming small large computer networks local area networks global communication systems internet usually implemented software hardware features use ethernet network interface cards cabling networking switches hubs early personal computers ethernet hardware included design bus adapters initially expensive solution use time standard parallel port typically used connection printer similar output device ports two computers connected so-called null-printer cable sometimes called laplink cable laplink cable connects five output pins parallel port five input pins opposing port direction due lack internal timing parallel ports synchronization implemented via software handshaking four five pins used data transfer one used synchronization logical values pins read written directly software via input output instruction method connect bidirectional data lines two devices order avoid lines active time status lines error slct papout ack busy one device connected data pins d0 d4 respectively transmission byte accomplished dividing two nibbles four bits nibble transmitted setting four data lines according four nibble bits toggling acknowledge line toggle indicates receiving host nibble ready read receiving host read nibble toggles synchronization line tell transmitter nibble read new one may sent hosts use toggle acknowledge lines indicate read write operation performed result host wait toggle host proceeding new operation example transfer nibble 0010 proceeds follows transmitter detects toggle procedure repeated next nibble internet protocol packets sent line encapsulating plip packets transmission line encapsulated packet following structure length checksum calculated second third field actual total length packet three length reported first two bytes packet analogous feature serial communications ports serial line internet protocol slip using null-modem cables allows transfer four bits time rather one generally works higher bitrates method based crynwr standard devised russ nelson ethernet may also used direct computer-to-computer communications method using ethernet crossover cable point-to-point connections usb host-to-host bridges cables also used transfer files two computers network necessary available | [
5472,
6082,
9860,
1893,
1030,
3847,
11332,
780,
8432,
1297,
5875,
5118,
7865,
2206,
2431
] | None |
9,993 | 9 | Robert_Bernecky:robert bernecky robert bob bernecky canadian computer scientist notable designer implementer apl apl career started i.p sharp associates ipsa 1971 bernecky first published apl work concerned speeding iota epsilon index-of membership primitives functions orders magnitude ipsa colleague roger hui dick lathwell eugene mcdonnell roger moore arthur whitney apl inventor ken iverson continued ipsa acquired reuters 1987-04-01 left reuters 1990 found snake island research works apl compiler parallel-processing technology day bernecky holds master science degree university toronto | [
8987,
9019,
1883,
8695,
9825,
11099,
11625,
1099,
4331,
10668,
2670,
3323,
7630,
2519,
4921,
505,
1178,
667
] | None |
9,994 | 1 | Database_System_Concepts:database system concepts database system concepts abraham silberschatz hank korth s. sudarshan best-selling textbook database systems often called sailboat book cover sailboats since first edition first edition cover number sailboats labelled names various database models boats sailing desert island towards tropical island wind pushes away prevents arrival book currently 7th edition released march 2019 copyright year 2020 previous editions released 2010 6th edition 2005 5th edition 2001 4th edition 1997 3rd edition 1991 2nd edition 1986 1st edition 1st 2nd editions book authored hank korth abraham silberschatz s. sudarshan co-author since third edition various editions book translated numerous languages including chinese korean portuguese spanish official website book db-book.com | [
10137,
10471
] | Test |
9,995 | 7 | Skytap:skytap skytap inc. private company based seattle washington offering public service cloud computing skytap cloud provides self-service access environments learning developing testing training running enterprise applications company founded illumita 2006 renamed 2008 skytap also product ibm offers public product enables enterprises migrate modernize core business applications ibm product also available la region countries ·argentina ·peru ·chile ·colombia illumita founded brian bershad hank levy steve gribble trio university washington professors done research virtualization cloud computing graduate student david richardson illumita changed name skytap 2008 launched first product skytap virtual lab april year skytap received early funding washington research foundation 2011 organization funded insight venture partners madrona venture group ignition partners bezos expeditions openview venture partners skytap virtual lab expanded scope renamed skytap cloud 2008 2011 skytap best vmworld award public/hybrid cloud computing technologies category skytap cloud company named annual top cloud computing provider lists deloitte geekwire seattle business magazine puget sound business journal march 2018 skytap added john ludeman leadership team svp engineering ludeman joined skytap 30 years engineering experience microsoft skytap cloud enterprise service purpose-built development testing complex applications users import existing virtualized applications build new applications cloud environments accessed modern web browser rest-based application programming interface api command-line interface cli application lifecycle management tool jenkins visual studio tfs etc skytap cloud uses browser-based interface system management hosts library pre-configured virtual machine images using either images imported vms users create sharable configurations one machines securely connect active machines via proprietary html5-based browser client | [
4194,
7317,
9974
] | None |
9,996 | 2 | Netwide_Assembler:netwide assembler netwide assembler nasm assembler disassembler intel x86 architecture used write 16-bit 32-bit ia-32 64-bit x86-64 programs nasm considered one popular assemblers linux nasm originally written simon tatham assistance julian hall maintained small team led h. peter anvin open-source software released terms simplified 2-clause bsd license nasm output several binary formats including coff omf a.out executable linkable format elf mach-o binary file .bin binary disk image used compile operating systems though position-independent code supported elf object files nasm also binary format called rdoff variety output formats allows retargeting programs virtually x86 operating system os also nasm create flat binary files usable write boot loaders read-only memory rom images various facets os development nasm run non-x86 platforms cross assembler powerpc sparc though generate programs usable machines nasm uses variant intel assembly syntax instead syntax also avoids features automatic generation segment overrides related assume directive used masm compatible assemblers hello world program dos operating system equivalent program linux example similar program microsoft windows 64-bit program apple os x inputs keystroke shows screen nasm principally outputs object files generally executable exception flat binaries e.g. .com inherently limited modern use translate object files executable programs appropriate linker must used visual studio link utility windows ld unix-like systems first release version 0.90 released october 1996 28 november 2007 version 2.00 released adding support x86-64 extensions development versions uploaded sourceforge.net instead checked project git repository binary snapshots available project web page search engine nasm documentation also available july 2009 version 2.07 nasm released simplified 2-clause bsd license previously nasm licensed lgpl led development yasm complete rewrite nasm new bsd license yasm offered support x86-64 earlier nasm also added support gnu assembler syntax relocatable dynamic object file format rdoff used developers test integrity nasm object file output abilities based heavily internal structure nasm essentially consisting header containing serialization output driver function calls followed array sections containing executable code data tools using format including linker loader included nasm distribution version 0.90 released october 1996 nasm supported output flat-format executable files e.g. dos com files version 0.90 simon tatham added support object-file output interface dos .obj files 16-bit code nasm thus lacked 32-bit object format address lack exercise learn object-file interface developer julian hall put together first version rdoff released nasm version 0.91 since initial version one major update rdoff format added record-length indicator header record allowing programs skip records whose format recognise support multiple segments rdoff1 supported three segments text data bss containing uninitialized data | [
5380,
6664,
6921,
9739,
6797,
5397,
9500,
1915,
7983,
5040,
823,
9911,
3386,
2811,
4928,
833,
6596,
9668,
585,
5065,
9166,
6868,
602,
477,
8037,
9320,
5356,
5234,
499,
372,
9331,
1399,
3323,
8700,
7421
] | Validation |
9,997 | 9 | ScriptBasic:scriptbasic scriptbasic scripting language variant basic source interpreter available c program lgpl license scriptbasic generates intermediary code interpreted runtime environment scriptbasic available windows unix mac os x may embedded programs well create standalone executable files runtime library linked executable available precompiled binaries setup.exe windows uninstall also supported dpkg rpm linux source code form language interpreter fully documented users guide available text html html help tex texi pdf formats scriptbasic developed since 1999 reached fairly matured state terms functions stability precompiled version available windows linux includes command line version standalone web server basic choice developers seek basic variant runs unix well windows mac os x intel basic embeddable option compile applications small footprint executable scriptbasic open interface module developers several external modules developed developer scriptbasic well developers include data base connection handling various database systems mysql postgresql odbc berkeley db others binding library curl png graphics gtk+ graphical user interface sockets regular expressions thread support data compression cgi scriptbasic also open interface preprocessor developers modules may act run-time also compile time thus making possible alter language currently single preprocessor delivers debugger functionality lets basic programmer run basic program line line examine variable contents set break points usual debugging features debugger supports command line version also web server implementation allowing full interactive debugging cgi applications basic architecture interpreter internally object oriented provides clean well documented interface embed interpreter application written c c++ whole source code extensively documented commented outstanding feature compared embeddable script language implementations slides html format english narration realaudio format also available get jump start learning architecture module preprocessor embedding developments scriptbasic supported forum | [
3718,
5896,
7691,
1805,
6797,
786,
11412,
22,
3736,
3481,
9881,
797,
3233,
11683,
5925,
8101,
4136,
10666,
8494,
303,
7343,
10033,
11315,
9780,
2485,
823,
1594,
315,
7355,
7486,
7870,
4160,
4674,
10750,
712,
847,
1879,
8539,
92,
11229,
... | None |
9,998 | 3 | Spectravideo:spectravideo spectravideo international svi american computer manufacturer software house originally called spectravision company founded harry fox 1981 company produced video games software vic-20 home computer atari 2600 home video game console computemate peripheral computers compatible microsoft msx ibm pc company ceased operations 1988 spectravision founded 1981 harry fox alex weiss distributor computer games contracting external developers write software main products gaming cartridges atari 2600 vcs colecovision commodore vic-20 also made world first ergonomic joystick quickshot late 1982 company renamed spectravideo due naming conflict oncommand hotel tv system called spectravision early 1980s company developed 11 games atari 2600 including several titles rarity chase chuckwagon mangia bumper bash titles available columbia house music club company first attempt computer add-on atari 2600 called spectravideo compumate membrane keyboard simple programmability spectravideo first real computers sv-318 sv-328 released 1983 powered z80 3.6 mhz differed amount ram sv-318 32kb sv-328 80kb total 16kb reserved video keyboard style main operating system residing rom version microsoft extended basic computer equipped floppy drive user option boot cp/m instead two computers precedent msx fully compatible standard though changes made design create msx minor system wide range optional hardware example adapter making possible run colecovision games svi may 1983 spectravideo went public sale 1 million shares stock 6.25 per share initial public offering underwritten brokerage d. h. blair co however spectravideo quickly ran trouble december 1983 stock fallen 75 cents per share march 1984 company agreed sell 60 stake hong kong-based bondwell holding deal would also required resignation president harry fox vice-president alex weiss deal set aside spectravideo unable restructure 2.6 million worth debt another deal fanon courier u.s.a. inc. would purchased 80 company struck july fanon courier deal similarly fell fox resigned president september bondwell holding purchasing half company stock installing bondwell vice-president christopher chan new president later computer spectravideo svi-728 made msx compatible svi-738 also msx compatible came built-in 360 kb 3.5 floppy drive last computer produced spectravideo svi-838 also known spectravideo x'press 16 pc msx2 device today spectravideo name used uk-based company called spectravideo plc formerly known ash newman company founded 1977 bought spectravideo brand name bondwell svi owner 1988 sell range logic3 branded products connection old spectravideo products | [
4257,
3075,
1958,
7051,
10093,
3406,
7983,
9006,
4337,
6129,
10931,
4409,
1403,
9947
] | Validation |
9,999 | 2 | Scott_Forstall:scott forstall scott forstall born 1969 american software engineer best known leading original software development team iphone ipad broadway producer best known co-producing tony award-winning fun home eclipsed wife spent career first next apple senior vice president svp ios software apple inc. 2007 october 2012 forstall grew middle-class family kitsap county washington second-born three boys registered-nurse mother jeanne engineer father tom forstall older brother bruce also senior software design engineer microsoft gifted student skills programming came easily difficult others forstall qualified advanced-placement science math class junior high school gained experience programming apple iie computers skipped forward year entering olympic high school bremerton washington early classmates recall immersion competitive chess history general knowledge occasion competing state level achieved 4.0 gpa earned position valedictorian position shared classmate molly brown would later become wife established goal designer high-tech electronics equipment proclaimed interview local newspaper enrolling stanford university graduated 1991 degree symbolic systems next year received master degree computer science also stanford time stanford forstall member phi kappa psi fraternity forstall joined steve jobs next 1992 stayed purchased apple 1997 forstall placed charge designing user interfaces reinvigorated macintosh line 2000 forstall became leading designer mac new aqua user interface known water-themed visual cues translucent icons reflections making rising star company promoted svp january 2003 period supervised creation safari web browser melton senior developer safari team credited forstall willing trust instincts team respecting ability develop browser secret 2005 jobs began planning iphone choice either shrink mac would epic feat engineering enlarge ipod jobs favored former approach pitted macintosh ipod team led forstall tony fadell respectively internal competition forstall fierce competition create ios decision enabled success iphone platform third-party developers using well-known desktop operating system basis allowed many third-party mac developers write software iphone minimal retraining forstall also responsible creating software developer kit programmers build iphone apps well app store within itunes 2006 forstall became responsible mac os x releases avie tevanian stepped company chief software technology officer named svp iphone software forstall received credit ran ios mobile software team like clockwork widely respected ability perform pressure spoken publicly apple worldwide developers conferences including talks mac os x leopard 2006 iphone software development 2008 later release iphone os 2.0 iphone 3g january 27 2010 apple 2010 ipad keynote wwdc 2011 forstall introduced ios 5 forstall also appears ios 5 video narrating three-quarters clip almost every major apple ios special event let talk iphone event launching iphone 4s took stage demonstrate phone siri voice recognition technology originally developed sri international aftermath release ios 6 september 19 2012 proved troubled period apple newly introduced maps application completely designed in-house apple criticized underdeveloped buggy lacking detail addition clock app used design based trademarked swiss railway clock apple failed license forcing apple pay swiss railways reported 21 million compensation october apple reported third-quarter results revenues profits grew less predicted second quarter row company missed analysts expectations october 29 2012 apple announced press release scott forstall leaving apple 2013 serve advisor ceo tim cook interim forstall duties divided among four apple executives design svp jonathan ive assumed leadership apple human interface team craig federighi became new head ios software engineering services chief eddy cue took responsibilities maps siri bob mansfield previously svp hardware engineering unretired oversee new technology group day john browett svp retail dismissed immediately six months job neither forstall apple executive commented publicly departure beyond initial press statement generally presumed forstall left position involuntarily information reasons departure therefore come anonymous sources cook aim since becoming ceo reported building culture harmony meant weeding people disagreeable personalities—people jobs tolerated even held close like forstall although former apple senior engineer michael lopp believes apple ability innovate came tension disagreement steve jobs referred decider final say products features ceo reportedly keeping strong personalities apple check always casting winning vote last word jobs death many executive conflicts became public forstall poor relationship ive mansfield could meeting unless cook mediated reportedly forstall ive cooperate level forced choose two cook reportedly chose retain ive since forstall collaborative forstall close referred mini-steve jobs jobs death left forstall without protector forstall also referred ceo-in-waiting fortune magazine book inside apple written adam lashinsky profile made unpopular apple forstall said responsible departure jean-marie hullot cto applications 2005 tony fadell svp hardware engineering 2008 fadell remarked interview bbc forstall firing justified got deserved jon rubinstein fadell predecessor svp hardware also strained relationship forstall jobs death 2011 reported forstall trying gather power challenge cook siri intelligent personal voice assistant forstall introduced september 2011 received mixed reception observers regarding flop forstall vigorously criticized new maps app introduced ios 6 received criticism inaccuracies apple standards according adam lashinsky fortune apple issued formal apology errors maps forstall refused sign long-standing practice apple forstall directly responsible individual maps refusal sign apology convinced cook forstall go forstall skeuomorphic design style strongly advocated former ceo steve jobs reported also controversial divided apple design team 2012 interview ive head hardware design refused comment ios user interface terms elements 're talking 'm really connected forstall make public appearances departure apple number years report december 2013 said concentrating travel advising charities providing informal advice small companies april 17 2015 forstall made first tweet revealed co-producer broadway version musical fun home first public appearance since departing apple 2012 june 7 2015 forstall-produced musical five awards tonys forstall reportedly working advisor snap inc. june 20 2017 forstall gave first public interview leaving apple interviewed computer history museum john markoff creation iphone 10th anniversary sales launch | [
10755,
9732,
1549,
5647,
7697,
11289,
6186,
6700,
1074,
9778,
9784,
8253,
576,
5194,
8783,
4180,
10838,
6234,
9826,
5733,
8806,
3691,
2676,
6264,
7806,
6783,
2686,
10878,
8842,
10386,
5784,
1177,
4251,
2207,
11430,
171,
2735,
3248,
4283,
... | Test |
10,000 | 2 | PUFFS_(NetBSD):puffs netbsd pass-to-userspace framework file system puffs netbsd kernel subsystem developed running filesystems userspace added netbsd 5.0 release ported dragonfly bsd 3.2 release netbsd 5.0 puffs includes refuse reimplementation libfuse high-level interface filesystems use low-level libfuse interface kernel fuse interface supported refuse netbsd 6.0 addresses limitation perfuse new compatibility layer emulates fuse kernel interface | [
1286,
1801,
274,
9762,
8998,
1071,
7983,
11698,
9671,
1993,
8909,
1361,
850,
7383,
4571,
1891,
7907,
1637,
10851,
2415,
8816,
2545,
11506,
5492,
2045,
9343
] | Test |
10,001 | 2 | INtime:intime intime pronounced time real time operation system rtos family based 32 bit rtos conceived run time-critical operations cycle-times low 50μs intime rtos runs single-core hyper-threaded multi-core x86 pc platform intel amd supports two binary compatible usage configurations intime windows intime rtos runs alongside microsoft® windows® intime distributed rtos intime runs stand-alone rtos like irmx predecessors intime real-time operating system like dosrmx irmx windows runs concurrently general-purpose operating system single hardware platform intime 1.0 originally introduced 1997 conjunction windows nt operating system since upgraded include support subsequent protected-mode microsoft windows platforms windows xp windows 10 intime also used stand-alone rtos intime binaries able run unchanged running stand-alone node intime rtos unlike windows intime run intel 80386 equivalent processor current versions windows operating system generally require least pentium level processor order boot execute spinning radisys 2000 development work intime continued tenasys corporation 2003 tenasys released version 2.2 intime notable features version 2.2 include | [
10561,
6797,
8976,
9366,
6207
] | Test |
10,002 | 4 | Spanish_Data_Protection_Agency:spanish data protection agency spanish data protection agency aepd agency government spain aepd established royal decree 428/1993 26 march amended organic law 15/1999 protection personal data amendment implemented directive 95/46/ec agency created context spanish constitution 1978 article 18.4 stating law shall restrict use informatics order protect honour personal family privacy spanish citizens well full exercise rights elaborated organic law 5/1992 aepd public law authority enjoying absolute independence public administration responsible response latter point aepd advocated aepd conducting anti-spam investigations since 2004 collaborating foreign agencies united states federal trade commission aepd come conflict google information gathered wi-fi networks google street view images taken asserting verified data location wifi networks identification owners personal data diverse nature communications names surnames messages associated accounts message services user codes passwords collected also demanded removal approximately 90 names search results claiming right forgotten google contesting actions | [
2818,
3880,
6344,
1930,
9260,
9901,
3599,
1169,
3858,
6455,
1368,
10207
] | Test |
10,003 | 4 | Duqu_2.0:duqu 2.0 duqu 2.0 version malware reported 2015 infected computers hotels austria switzerland sites international negotiations iran nuclear program economic sanctions malware infected kaspersky lab months without knowledge believed work unit 8200 kaspersky discovered malware symantec confirmed findings malware variant duqu duqu variant stuxnet software linked israel according guardian software used three zero-day exploits would required funding organization consistent government intelligence agency according kaspersky philosophy way thinking “ duqu 2.0 ” group generation ahead anything seen advanced persistent threats world | [
1024,
7809,
8320,
3843,
5636,
5764,
10502,
2187,
4240,
11152,
10132,
4117,
8726,
535,
1688,
2717,
9375,
1440,
5024,
9761,
4644,
4133,
5028,
11175,
297,
2857,
5547,
8489,
11052,
9518,
9904,
7601,
1970,
9395,
8886,
1337,
441,
1979,
4027,
10... | None |
10,004 | 5 | Variant_object:variant object variant objects context http objects served origin content server type transmitted data variation i.e uncompressed compressed different languages etc. http/1.1 1997–1999 introduces content/accept headers used http requests responses state variant data presented client server | [
225,
6629,
3052,
11674,
10452,
2581,
53,
119,
2901,
9941,
10938,
4797,
479
] | Test |
10,005 | 5 | Link_layer:link layer computer networking link layer lowest layer internet protocol suite networking architecture internet described rfc 1122 rfc 1123 link layer group methods communications protocols operate link host physically connected link physical logical network component used interconnect hosts nodes network link protocol suite methods standards operate adjacent network nodes local area network segment wide area network connection despite different semantics layering tcp/ip osi link layer sometimes described combination data link layer layer 2 physical layer layer 1 osi model however layers tcp/ip descriptions operating scopes application host-to-host network link detailed prescriptions operating procedures data semantics networking technologies rfc 1122 exemplifies local area network protocols ethernet ieee 802 framing protocols point-to-point protocol ppp belong link layer local area networking standards ethernet ieee 802 specifications use terminology seven-layer osi model rather tcp/ip model tcp/ip model general consider physical specifications rather assumes working network infrastructure deliver media level frames link therefore rfc 1122 rfc 1123 definition tcp/ip model discuss hardware issues physical data transmission set standards aspects textbook authors supported interpretation physical data transmission aspects part link layer others assumed physical data transmission standards considered communication protocols part tcp/ip model authors assume hardware layer physical layer link layer several adopt osi term data link layer instead link layer modified description layering predecessor tcp/ip model arpanet reference model rfc 908 1982 aspects link layer referred several poorly defined terms network-access layer network-access protocol well network layer next higher layer called internetwork layer modern text books network-interface layer host-to-network layer network-access layer occur synonyms either link layer data link layer often including physical layer link layer tcp/ip model descriptive realm networking protocols operate local network segment link host connected protocol packets routed networks link layer includes protocols define communication local on-link network nodes fulfill purpose maintaining link states local nodes local network topology usually use protocols based framing packets specific link types core protocols specified internet engineering task force ietf layer address resolution protocol arp reverse address resolution protocol rarp neighbor discovery protocol ndp facility delivering similar functionality arp ipv6 since advent ipv6 open shortest path first ospf considered operate link level well although ipv4 version protocol considered internet layer is-is rfc 1142 another link-state routing protocol fits layer considering tcp/ip model however developed within osi reference stack layer 2 protocol internet standard link layer tcp/ip model often compared directly combination data link layer physical layer open systems interconnection osi protocol stack although congruent degree technical coverage protocols identical link layer tcp/ip still wider scope principle different concept terminology classification may observed certain protocols address resolution protocol arp confined link layer tcp/ip model often said fit osi data link layer network layer general direct strict comparisons avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 another term sometimes encountered network access layer tries suggest closeness layer physical network however use misleading non-standard since link layer implies functions wider scope network access important link layer protocols used probe topology local network discover routers neighboring hosts i.e functions go well beyond network access | [
10242,
1030,
6670,
8211,
6681,
6682,
10271,
6689,
9251,
2085,
7208,
7214,
8238,
562,
1586,
9269,
11321,
3133,
5181,
6723,
8265,
4687,
98,
10341,
10344,
3695,
4723,
2679,
4729,
5251,
649,
7817,
9868,
3218,
9365,
11413,
152,
2206,
3742,
938... | Validation |
10,006 | 4 | Firefox_Monitor:firefox monitor firefox monitor online service developed mozilla launched september 25 2018 informs users email address passwords used leaked data breaches using database provided pwned | [
1664,
6791,
9736,
1295,
7951,
2836,
11418,
9757,
1713,
7861,
11449,
5054,
9152,
9281,
10057,
2893,
7889,
5078,
6231,
10078,
482,
1251,
10722,
3941,
8169,
10860,
6133,
7543,
4728,
5114,
8443,
637,
6143
] | None |
10,007 | 2 | Symobi:symobi symobi system mobile applications proprietary modern mobile real-time operating system developed german company miray software since 2002 partly cooperation research team prof. dr. uwe baumgarten technical university munich graphical operating system designed area embedded mobile systems also often used pcs end users field industry basis symobi message-oriented operating system µnos part based real-time microkernel sphere µnos offers communication message passing processes basic operating system service processes application processes using integrated process manager lowest level responsibility sphere microkernel implement enforce security mechanisms resource management real-time symobi additionally offers complete graphical operating system environment system services consistent graphical user interface well standard programs drivers symobi combines features different fields application one operating system modern operating system offers separated isolated processes light-weight threads dynamic libraries like windows linux unix example area mobile embedded operating systems low resource requirement support mobile devices resembles systems like windows ce symbianos palm os conventional real-time operating systems like qnx vxworks shares real-time ability support different processor architectures development sphere µnos symobi based ideas work konrad foikis michael haunreiter founders company miray software initiated schooldays even started studying computer science basic concept combine useful necessary features like real-time portability modern characteristics like microkernel inter-process communication etc form stable reliable operating system originally supposed serve basis different application programs developed foikis haunreiter studies 2000 konrad foikis michael haunreiter founded company miray software realised µnos suited far use cooperation tu munich already evolved two years later 2006 first official version symobi completed autumn year introduced professional circles systems exhibition single-core multi-core symobi suited hand-held products portable communicators internet appliances well consumer appliances set-top boxes home gateways games consoles furthermore used areas automotive control infotainment systems industrial control systems motion control process control point sale cashier systems ticket machines information terminals operating system stands real-time microkernel multi-processor ability furthermore portable therefore bound specific hardware platforms symobi inter-process communication guarantees security flexibility modern architecture runs low resource requirements processor system memory system offers java-vm area standard appliances operating system yet widely spread rudimentary posix support restricted hardware support drivers addition symobi open source operating system present offer office applications email functions web browser | [
2179,
5029,
7983,
7187,
9366
] | None |
10,008 | 9 | George_Necula:george necula george ciprian necula romanian computer scientist engineer google former professor university california berkeley research area programming languages software engineering particular focus software verification formal methods best known ph.d. thesis work first describing proof-carrying code work received 2007 sigplan influential popl paper award originally baia mare romania necula attended polytechnic university bucharest coming carnegie mellon university united states complete ph.d. programming languages researcher peter lee ph.d. thesis first describing proof-carrying code influential mechanism allow untrusted machine code run safely without performance overhead joined faculty university california berkeley 1998 recently necula work focused open-source analysis verification transformation tools c including c intermediate language cil ccured deputy c intermediate language cil simplified subset c programming language well set tools transforming c programs language several tools use cil way access c abstract syntax tree programs frama-c framework analyze c programs compcert c compiler proven coq necula fellow okawa foundation alfred p. sloan foundation see sloan fellowship received grace murray hopper award 2001 national science foundation career award 1999 acm sigops hall fame award 2006 | [
9019,
11099,
3267,
1316,
8262,
1613,
2798,
1236,
8987,
8924,
2045
] | Validation |
10,009 | 2 | Android_Eclair:android eclair android eclair codename android mobile operating system developed google fifth operating system android longer supported versions 2.0 2.1 unveiled october 26 2009 android 2.1 builds upon significant changes made android 1.6 donut default home screen eclair displays persistent google search bar across top screen camera app also redesigned numerous new camera features including flash support digital zoom scene mode white balance color effect macro focus photo gallery app also contains basic photo editing tools version also included addition live wallpapers allowing animation home-screen background images show movement speech-to-text first introduced replacing comma key android eclair inherits platform additions donut release ability search saved sms mms messages improved google maps 3.1.2 exchange support email app operating system also provides improved typing speed virtual keyboard along new accessibility calendar virtual private network apis internet browsing android eclair also adds support html5 refreshed browser ui bookmark thumbnails double-tap zoom | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
10284,
5677,
1083,
6212,
69,
2630,
8262,
4683,
4685,
11343,
3664,
8280,
8285,
2658,
8821,
11391,
1670,
7816,
5262,
10393,
8858,
7835,
673,
8870,
1191,
1203,
7359,
196,
3269,
3782,
8907,
2259,
379... | Test |
10,010 | 3 | Bomberman_(1983_video_game):bomberman 1983 video game nes/famicom release eponymous character bomberman robot must find way maze avoiding enemies doors leading maze rooms found rocks bomberman must destroy bombs items help improve bomberman bombs fire ability improves blast range bombs bomberman turn human escapes reaches surface game 50 levels total original home computer games basic different rules bomberman written 1980 purely serve tech demo hudson soft basic compiler basic version game given small-scale release japanese pcs 1983 european pcs following year bomberman known nes/famicom version released japan december 19 1985 north america 1987 hudson soft director research development shinichi nakamoto commented 1995 interview personally believe famicom version bomberman one version game version ported back msx following year bomberman special bomberman appearance game hudson soft re-used enemy graphic taken 1984 nes/famicom port broderbund lode runner early version bomberman famous design robotic anime-like character pink antenna game also released game boy game b mode game atomic punk 2004 version bomberman re-released game boy advance part famicom mini series japan classic nes series north america europe released year n-gage remake/update also released sony playstation entitled bomberman japan europe renamed bomberman party edition us version features port original version single-player game well revised updated version pre-rendered 3d graphics contemporary audio updated graphics audio also used multiplayer aspect game | [
9006,
6109,
10931,
599,
8925
] | Test |
10,011 | 9 | Name_binding:name binding programming languages name binding association entities data and/or code identifiers identifier bound object said reference object machine languages built-in notion identifiers name-object bindings service notation programmer implemented programming languages binding intimately connected scoping scope determines names bind objects – locations program code lexically one possible execution paths temporally use identifier codice_1 context establishes binding codice_1 called binding defining occurrence occurrences e.g. expressions assignments subprogram calls identifier stands bound occurrences called applied occurrences example static binding direct c function call function referenced identifier change runtime example dynamic binding dynamic dispatch c++ virtual method call since specific type polymorphic object known runtime general executed function dynamically bound take example following java code codice_3 interface codice_4 must refer subtype reference codice_5 codice_6 subtype codice_3 actual method referenced codice_8 known runtime c instance dynamic binding may call function pointed variable expression function pointer type whose value unknown actually gets evaluated run-time rebinding confused mutation consider following java code identifier codice_4 initially references nothing uninitialized rebound reference object linked list strings linked list referenced codice_4 mutated adding string list lastly codice_4 rebound codice_12 late static binding variant binding somewhere static dynamic binding consider following php example example php interpreter binds keyword codice_13 inside codice_14 class codice_15 call codice_16 produces string hello semantics codice_17 based late static binding result would bye beginning php version 5.3 late static binding supported specifically codice_17 changed codice_19 shown following block keyword codice_20 would bound runtime result call codice_16 would bye | [
386,
4231,
8587,
10510,
655,
6160,
9497,
11674,
8221,
10532,
5677,
11574,
1591,
10684,
1343,
8644,
8262,
2505,
8531,
10581,
5213,
11361,
10470,
8303,
369,
2936,
3705,
2045
] | Validation |
10,012 | 9 | GNU_Guile:gnu guile gnu ubiquitous intelligent language extensions gnu guile preferred extension language system gnu project features implementation programming language scheme first version released 1993 addition large parts scheme standards guile scheme includes modularized extensions many different programming tasks extending programs guile offers libguile allows language embedded programs integrated closely c language application programming interface api similarly new data types subroutines defined c api made available extensions guile guile used programs gnucash lilypond gnu guix guix system distribution guixsd gnu debugger guile scheme general-purpose high-level programming language whose flexibility allows expressing concepts fewer lines code would possible languages c. example hygienic macro system allows adding domain specific syntax-elements without modifying guile guile implements scheme standard r5rs r6rs several scheme requests implementation srfi many extensions core idea guile scheme developer implements critical algorithms data structures c c++ exports functions types use interpreted code application becomes library primitives orchestrated interpreter combining efficiency compiled code flexibility interpretation thus guile scheme languages implemented guile extended new data types subroutines implemented c api standard distribution offers modules portable operating system interface posix system calls scheduling foreign function interface s-expression based xml processing sxml sxpath sxslt http world wide web apis delimited continuations array programming functionality guile programs use facilities slib portable scheme library using continuations call/cc requirement scheme standard guile copies execution stack heap back foreign code may pointers scheme objects guile uses conservative boehm–demers–weiser bdw garbage collector guile manual gives details inception early history language brief summary follows success emacs free software community highly extensible customizable application via extension partly implementation language emacs lisp community began consider design strategy could apply rest gnu system tom lord initially began work embeddable language runtime named gnu extension language gel based aubrey jaffer scheme implementation scm turn based george carrette siod lord convinced richard stallman make gel official extension language gnu project based argument scheme cleaner lisp dialect emacs lisp gel could evolve implement languages runtime namely emacs lisp lord discovered gel naming conflict another programming language solicited suggestions new name several contributions several usenet newsgroups lord controversially chose guile suggestion lee thomas development guile gel public release extension language tcl gaining popularity pushed universal extension language stallman saw tcl underpowered extension language posted criticism comp.lang.tcl newsgroup initiated flamewar known tcl war since public announcement guile project coincided tcl debate become common misconception guile began reaction initial release guile development languished many years 2009–2010 saw major improvements guile 2.0 released 2011 new compiler infrastructure virtual machine implementation switch boehm–demers–weiser garbage collector many improvements guile scheme language major changes one goals guile allow languages used alongside scheme guile would effectively language-neutral runtime environment various attempts made past versions dialect scheme essentially differing c-like syntax translation emacs lisp tcl converter motivated tkwww something roughly resembling language logo version 2.0 project successfully transitioned compiler tower approach allowing definition compilers one language another typically higher-level one lower-level intermediate representation eventually virtual machine bytecode native machine code several past unfinished attempts replace supplement emacs emacs lisp elisp extension language guile parallel efforts supporting languages guile version 2.0 guile new attempt implementing elisp guile compiler tower replacing emacs elisp implementation libguile begun made significant progress google summer code projects guile-based emacs could offer better execution performance emacs lisp support new emacs lisp language features easily make guile libraries written programming languages available emacs lisp code allow writing emacs extensions programming languages supported guile remaining fully backward compatible existing emacs lisp code bases implementation reached stage guile emacs able reliably run emacs lisp code remaining problems possible problems involve different internal representation emacs lisp strings scheme strings difference emacs lisp scheme treat boolean false empty list objects emacs lisp macros integrating scheme emacs lisp designed concurrency portability guile platforms supported emacs concerns raised emacs community include relative sizes emacs guile communities whether would cause splitting community emacs extensible programming languages emacs lisp | [
10752,
2050,
9730,
4101,
11269,
2056,
2062,
9231,
7184,
2577,
1556,
9749,
8728,
4633,
4122,
3618,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
10822,
5703,
1613,
9299,
10841,
3674,
3675,
7267,
2660,
8293,
2666,
8304,
9330,
9843,
5751,
119,
7... | Test |
10,013 | 9 | Compile_time:compile time computer science compile time refers either operations performed compiler compile-time operations programming language requirements must met source code successfully compiled compile-time requirements properties program reasoned compilation compile time refers time duration statements written programming language checked errors operations performed compile time usually include syntax analysis various kinds semantic analysis e.g. type checks instantiation template code generation programming language definitions usually specify compile time requirements source code must meet successfully compiled example languages may stipulate amount storage required types variables deduced properties program reasoned compile time include range-checks e.g. proving array index exceed array bounds deadlock freedom concurrent languages timings e.g. proving sequence code takes allocated amount time compile time occurs link time output one compiled files joined together runtime program executed programming languages may necessary compilation linking occur runtime trade-off compile-time link-time many compile time operations deferred link-time without incurring extra run-time compile time also refer amount time required compilation | [
1409,
7173,
8582,
263,
393,
139,
10510,
4112,
9875,
1175,
11160,
8221,
6815,
1952,
8609,
6818,
7462,
9003,
2808,
2620,
4668,
5948,
1343,
10176,
8262,
6477,
10703,
9680,
7889,
2386,
6228,
3413,
8280,
5466,
11610,
4572,
3553,
11361,
8037,
1... | Validation |
10,014 | 7 | Data_Processing_Iran_Co.:data processing iran co. data processing iran company dpi computer technology consulting corporation headquartered tehran iran dpi currently largest technology provider iran dpi manufactures sells computer hardware software focus latter offers infrastructure services hosting services consulting services areas ranging mainframe computers nanotechnology company also offers series internet-related services namely dedicated servers colocation services web hosting services shared hosting shared mail dns recording domain registration services managed services including network services security solutions managed application services storage backup solutions monitoring reporting professional services dpi established 1959 regional branch ibm corporation company operated subsidiary 1981 ibm operations iran ceded iranian government 2001 dpi became private company listed tehran stock exchange company history dpi signed numerous technology-sharing agreements software companies including mindscape dataproducts hypercom current members board directors dpi | [
3323,
2887
] | None |
10,015 | 4 | Social_jacking:social jacking social jacking malicious technique tricking users clicking vulnerable buttons compromise showing false appearing pages mixture click jacking technique breach browser security social engineering may also referred user interface disguising method variant click jacking method original page vulnerable page loaded using iframe tag unnecessary contents webpage displayed iframe removed placing white background div tag elements using absolute positioning property using css thus unnecessary information displayed vulnerable page removed buttons links alone made visible user additional social engineering messages like click button get access get reward displayed iframe tag user made click visible button without knowing happens clicks button prevention methods quite tough user identifying analyzing webpages click anonymous links buttons social jacking easily implemented using google web toolkit design webpage using wysiwyg gui builder drag white background colored panel iframe window thus hiding unnecessary information revealing vulnerable buttons alone | [
7044,
3941,
4198,
3643,
7515
] | Test |
10,016 | 2 | User_space:user space modern computer operating system usually segregates virtual memory kernel space user space primarily separation serves provide memory protection hardware protection malicious errant software behaviour kernel space strictly reserved running privileged operating system kernel kernel extensions device drivers contrast user space memory area application software drivers execute term userland user space refers code runs outside operating system kernel userland usually refers various programs libraries operating system uses interact kernel software performs input/output manipulates file system objects application software etc user space process normally runs virtual memory space unless explicitly allowed access memory processes basis memory protection today mainstream operating systems building block privilege separation separate user mode also used build efficient virtual machines – see popek goldberg virtualization requirements enough privileges processes request kernel map part another process memory space case debuggers programs also request shared memory regions processes although techniques also available allow inter-process communication common way implementing user mode separate kernel mode involves operating system protection rings another approach taken experimental operating systems single address space software rely programming language semantics make sure arbitrary memory accessed – applications simply acquire references objects allowed access approach implemented jxos unununium well microsoft singularity research project | [
6153,
6155,
8214,
25,
6180,
8242,
8248,
59,
4161,
6213,
8268,
4173,
6221,
89,
10333,
97,
6244,
8296,
8298,
4207,
8304,
2168,
2179,
4238,
10382,
2193,
2194,
6296,
2201,
8344,
10407,
4268,
8364,
178,
2228,
10422,
4279,
6329,
8388,
2248,
6... | Validation |
10,017 | 4 | Korea_Internet_&_Security_Agency:korea internet amp security agency korea internet security agency 한국인터넷진흥원 kisa ministry science ict sub-organization dealing allocation maintenance south korea ipv4/ipv6 address space related whois information autonomous system numbers .kr country code top-level domain cctld also responsible cybersecurity internet within south korea runs korea computer emergency response team coordination center a.k.a krcert/cc private sector country roles include limited promotion safe internet usage internet culture detecting analyzing malware/virus web privacy protection operating root ca education internet cybersecurity various cybersecurity issues organization created july 2009 three different agencies merged one organization korea information security agency kisa national internet development agency nida korean international cooperation agency kiica kisa internet information security promotion organization korea aim improve global competitiveness korea ’ internet industry kisa set ‘ internet promotion ’ future ‘ information security ’ safety primary tasks focusing enhancing information security capacity korea ’ ict industry expanding global cooperative partnership based k-ict security development strategy krcert/cc internal division kisa csirt national responsibility focal point contact korea international cybersecurity incident handling cooperates interacts locally national cyber security center national intelligence service korea relevant stakeholders including local internet service providers cybersecurity vendors also interacts national csirts global cybersecurity vendors krcert/cc memberships asia pacific computer emergency response team apcert forum incident response security teams first kisa also 4 regional offices overseas located oman middle east region indonesia southeast asia costa rica latin america caribbean tanzania africa roles facilitate inter-governmental cooperation including b2b/b2g/g2b introduce talented korean cybersecurity enterprises global market | [
8204,
11510,
7515,
5469,
5470
] | Test |
10,018 | 3 | FS-A1WSX:fs-a1wsx panasonic fs-a1wsx last msx2+ made panasonic successor fs-a1wx incorporated changes like s-video output tape support color printer support improved a1 internal cockpit software kanji color word processor contrary msx2+ systems panasonic fs-a1 used z-80 compatible msx-engine t9769x could switched via software 6 mhz model supported 256 kb ram little soldering 512 kb also possible complicated modification | [
5128,
9006,
7983,
5265,
4409,
11261
] | None |
10,019 | 3 | LGA_1151:lga 1151 lga 1151 also known socket h4 intel microprocessor compatible socket comes two distinct versions first revision supports intel skylake kaby lake cpus second revision supports coffee lake cpus exclusively lga 1151 designed replacement lga 1150 known socket h3 lga 1151 1151 protruding pins make contact pads processor fully integrated voltage regulator i.e voltage regulator integrated cpu die introduced haswell broadwell moved motherboard motherboards first revision socket support solely ddr4 memory lesser number support ddr3 l memory least number slots ddr4 ddr3 l one memory type installed unidimm support enabling either type memory placed dimm rather separate ddr3 ddr4 dimms second revision socket motherboards support ddr4 memory skylake kaby lake coffee lake chipsets support vt-d intel rapid storage technology intel clear video technology intel wireless display technology appropriate cpu required motherboards lga 1151 socket support varying video outputs dvi hdmi 1.4 displayport 1.2 – depending model vga output optional since intel dropped support video interface starting skylake hdmi 2.0 4k 60 hz supported motherboards equipped intel ’ alpine ridge thunderbolt controller skylake kaby lake coffee lake chipsets support legacy conventional pci interface however motherboard vendors may implement using external chips 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable intel officially states skylake kaby lake integrated memory controllers imc support ddr3l memory modules rated 1.35 v ddr4 1.2 v led speculation higher voltages ddr3 modules could damage destroy imc processor meanwhile asrock gigabyte asus guarantee skylake kaby lake ddr3 motherboards support ddr3 modules rated 1.5 1.65v equivalent kaby lake chipset analogous h110 chipset four additional pch pci-e lanes kaby lake chipsets reserved implementing m.2 slot support intel optane memory otherwise corresponding kaby lake skylake chipsets practically light blue indicates difference comparable skylake kaby lake chipsets lga 1151 socket revised coffee lake generation cpus comes along intel 300-series chipsets physical dimensions remain unchanged updated socket re-assigns reserved pins adding power ground lines support requirements 6-core 8-core cpus new socket also relocates processor detection pin breaking compatibility earlier processors motherboards result desktop coffee lake cpus officially compatible 100 original skylake 200 kaby lake series chipsets similarly 300 series chipsets officially support coffee lake compatible skylake kaby lake cpus socket 1151 rev 2 sometimes also referred 1151-2 like kaby lake chipsets four additional pch pci-e lanes coffee lake chipsets reserved implementing m.2 slot support intel optane memory 22nm version h310 chipset h310c sold china motherboards based chipset support ddr3 memory well nowiki /nowiki yes however motherboards require bios update order support 9th gen coffee lake cpus nowiki ** /nowiki depends oem implementation | [
3588,
5901,
5649,
5523,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
4523,
2604,
2350,
6192,
8625,
9649,
4537,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
10715,
11484,
9057,
9570,
10468,
613,
1000,
8552,
1260,
4... | None |
10,020 | 8 | Web_service:web service term web service ws either web service web technology http — originally designed human-to-machine communication — used transferring machine-readable file formats xml json practice web service commonly provides object-oriented web-based interface database server utilized example another web server mobile app provides user interface end user many organizations provide data formatted html pages also provide data server xml json often web service allow syndication example wikipedia another application offered end user may mashup web server consumes several web services different machines compiles content one user interface asynchronous javascript xml ajax dominant technology web services developing combination http servers javascript clients plain old xml distinct soap w3c web services frequently used json well instead xml representational state transfer rest architecture well-behaved web services function internet scale 2004 document w3c sets following rest key distinguishing feature web services number web services use markup languages web api development web services emphasis moving simpler representational state transfer rest based communications restful apis require xml-based web service protocols soap wsdl support interfaces relation w3c web services w3c defined web service w3c web services may use soap http protocol allowing less costly efficient interactions internet via proprietary solutions like edi/b2b besides soap http web services also implemented reliable transport mechanisms like ftp 2002 document web services architecture working group defined web services architecture requiring standardized implementation web service term web service describes standardized way integrating web-based applications using xml soap wsdl uddi open standards internet protocol backbone xml data format used contain data provide metadata around soap used transfer data wsdl used describing services available uddi lists services available web service method communication two electronic devices network software function provided network address web service always concept utility computing many organizations use multiple software systems management different software systems often need exchange data web service method communication allows two software systems exchange data internet software system requests data called service requester whereas software system would process request provide data called service provider different software may use different programming languages hence need method data exchange n't depend upon particular programming language types software however interpret xml tags thus web services use xml files data exchange rules communication different systems need defined rules communication defined file called wsdl web services description language codice_1 extension proposals autonomous web services aws seek develop flexible web services rely strict rules directory called uddi universal description discovery integration defines software system contacted type data one software system needs one particular report/data would go uddi find systems contact receiving data software system finds systems contact would contact system using special protocol called soap simple object access protocol service provider system would first validate data request referring wsdl file process request send data soap protocol automated tools aid creation web service services using wsdl possible either automatically generate wsdl existing classes bottom-up model generate class skeleton given existing wsdl top-down model critics non-restful web services often complain complex based upon large software vendors integrators rather typical open source implementations also concerns performance due web services use xml message format soap/http enveloping transporting functional non-functional testing web services done help wsdl parsing regression testing performed identifying changes made upgrade software web service regression testing needs categorized three different ways namely changes wsdl changes code selective re-testing operations capture three needs three intermediate forms subset wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively three subset wsdls combined form combined wsdl cwsdl used regression testing web service help automated web service change management awscm performing selection relevant test cases construct reduced test suite old test suite web services testing also automated using several test automation tools like soap ui oracle application testing suite oats unified functional testing selenium etc work related capture visualization changes made web service visualization computation changes done form intermediate artifacts subset wsdl insight computation change impact helpful testing top-down development reduce regression testing awscm tool identify subset operations wsdl file construct subset wsdl | [
0,
9734,
7175,
8201,
4107,
7179,
8203,
9229,
8208,
1556,
10271,
545,
7713,
5669,
7212,
1069,
10284,
8751,
4658,
2106,
7742,
1095,
2119,
1097,
10313,
10829,
4688,
7248,
90,
5210,
1628,
7261,
11359,
4707,
7779,
8806,
1128,
7784,
9834,
9841,... | Test |
10,021 | 7 | Mesh_networking:mesh networking mesh network simply meshnet local network topology infrastructure nodes i.e bridges switches infrastructure devices connect directly dynamically non-hierarchically many nodes possible cooperate one another efficiently route data from/to clients lack dependency one node allows every node participate relay information mesh networks dynamically self-organize self-configure reduce installation overhead ability self-configure enables dynamic distribution workloads particularly event nodes fail turn contributes fault-tolerance reduced maintenance costs mesh topology may contrasted conventional star/tree local network topologies bridges/switches directly linked small subset bridges/switches links infrastructure neighbours hierarchical star-and-tree topologies well established highly standardized vendor-neutral vendors mesh network devices yet agreed common standards interoperability devices different vendors yet assured mesh networks relay messages using either flooding technique routing technique routing message propagated along path hopping node node reaches destination ensure paths available network must allow continuous connections must reconfigure around broken paths using self-healing algorithms shortest path bridging self-healing allows routing-based network operate node breaks connection becomes unreliable result network typically quite reliable often one path source destination network although mostly used wireless situations concept also apply wired networks software interaction mesh network whose nodes connected fully connected network fully connected wired networks advantages security reliability problems cable affect two nodes attached however networks number cables therefore cost goes rapidly number nodes increases shortest path bridging allows ethernet switches connected mesh topology allows paths active wireless mesh radio networks originally developed military applications every node could dynamically serve router every node way even event failure nodes remaining nodes could continue communicate necessary serve uplinks nodes early wireless mesh network nodes single half-duplex radio one instant could either transmit receive time accompanied development shared mesh networks subsequently superseded complex radio hardware could receive packets upstream node transmit packets downstream node simultaneously different frequency different cdma channel allowed development switched mesh networks size cost power requirements radios declined nodes could cost-effectively equipped multiple radios turn permitted radio handle different function instance one radio client access another backhaul services work field aided use game theory methods analyze strategies allocation resources routing packets | [
11267,
5382,
5767,
9095,
9478,
9098,
11399,
5132,
10646,
11165,
10399,
7200,
8608,
8736,
3751,
10288,
11696,
10675,
6719,
2117,
1733,
3016,
2511,
4691,
11094,
4952,
11483,
10206,
1503,
610,
6267
] | Validation |
10,022 | 2 | BioLinux:biolinux biolinux term used variety projects involved making access bioinformatics software linux platform easier using one following methods various projects similar aims linux systems unices selection given also overview canadian bioinformatics helpdesk newsletter details linux-based projects package repositories generally specific distribution linux bioinformatician using number linux variants prevalent bioinformatics work fedora freely-distributed version commercial red hat system red hat widely used corporate world offer commercial support training packages fedora core community supported derivative red hat popular amongst like red hat system n't require commercial support many users bioinformatics applications produced rpms red hat package format designed work fedora potentially also install red hat enterprise linux systems distributions mandriva suse use rpms packages may also work distributions debian another popular linux distribution use many academic institutions bioinformaticians made software packages available distribution deb format slackware one less used linux distributions popular better knowledge linux operating system prefer command line various guis available packages tgz tgx format widely known live distribution based slackware slax used base many bioinformatics distributions many linux packages compatible mac os x several projects attempt make easy install selected linux packages including bioinformatics software computer running mac os x source live dvds cds ideal way provide bioinformatics computing run cd/dvd drive means slower traditional hard disk installation limited ability configured however suitable providing ad hoc solutions linux access available may even used basis linux installation general linux distributions wide range official packages available usually include much way scientific support exceptions detailed gentoo linux provides 156 bioinformatics applications see gentoo sci-biology herd main tree form ebuilds build applications source code additional 315 packages gentoo science overlay testing although flexible system excellent community support requirement install source means gentoo systems often slow install require considerable maintenance possible reduce compilation time using central server generate binary packages hand fine tune run highest speed utilizing best processor example actually use sse avx avx2 cpu instructions binary-based distro usually provide binaries using i686 even i386 instruction sets freebsd linux distribution version unix similar ports like gentoo ebuilds caveats apply however also pre-complied binary packages available 60 biological sciences applications 're listed fresh ports site hundred bioinformatics packages provided part standard debian installation nebc bio-linux packages also installed standard debian system long bio-linux-base package also installed creates /usr/local/bioinf directory packages install software debian packages may also work ubuntu linux debian-derived installations providing support documentation important part biolinux project scientists specialists may quickly find answers specific problems support forums mailing lists also useful disseminate knowledge within research community resources linked | [
8837,
10149,
5096,
3791,
304,
2064,
9455,
10192,
788,
11126,
823
] | Test |
10,023 | 2 | IPhone_7:iphone 7 iphone 7 iphone 7 plus smartphones designed developed marketed apple inc tenth generation iphone announced september 7 2016 bill graham civic auditorium san francisco apple ceo tim cook released september 16 2016 succeeding iphone 6s iphone 6s plus flagship devices iphone series apple also released iphone 7 iphone 7 plus numerous countries worldwide throughout september october 2016 succeeded flagship devices iphone 8 iphone 8 plus september 22 2017 iphone x november 3 2017 iphone 7 overall design similar iphone 6s iphone 6 changes introduced included new color options matte black jet black water dust resistance new capacitive static home button revised antenna bands removal 3.5 mm headphone jack device internal hardware received upgrades including heterogeneous quad-core system-on-chip improved system graphics performance upgraded 12 megapixel rear-facing cameras optical image stabilization models additional telephoto lens exclusive iphone 7 plus provide enhanced 2x optical zoom capabilities reception iphone 7 mixed although reviewers noted improvements camera especially dual rear camera plus model also stated iphone 7 make significant changes display build quality competing flagship smartphones surpassed quality iphone 7 many reviews highlighted controversial removal 3.5 mm headphone jack critics argued change meant bolster licensing proprietary lightning connector sales apple wireless headphone products questioned effects change audio quality apple also mocked critics phil schiller statement drastic change required courage. ” iphone 7 subject several reported issues notably hissing noise heavy usage phones significant differences performance device variants apple released sales numbers iphone 7 multiple u.s. carriers reported high demand launch subsequent reports end 2016 stated apple reduced production models due sluggish sales decreasing demand though sales research first quarter 2017 placed devices best-selling smartphones world prior official announcement multiple aspects iphone 7 heavily rumored apple plans remove 3.5 mm headphone jack received significant media attention rumors included flush camera stereo speakers 256 gigabyte storage option larger 3,100 mah battery august 29 2016 invitations press event bill graham civic auditorium san francisco california september 7 2016 sent members media prompting immediate speculation iphone 7 upcoming announcement iphone 7 officially announced event pre-orders beginning september 9 general availability september 16 iphone 7 launched 30 new countries later september international rollouts throughout october november 2016 indonesia last country release iphone 7 7 plus availability starting march 31 2017 following apple research development investment country march 21 2017 apple announced iphone 7 red color finish white front part partnership product red highlight aids fundraising campaign launched march 24 2017 later discontinued announcement iphone 8 iphone 8 plus iphone x september 2017 september 2017 apple announced iphone 8 iphone 8 plus direct successors iphone 7 7 plus alongside iphone x iphone 7 exterior similar shape volume iphone 6 iphone 6s alongside existing silver gold rose gold colors device offered new colors matte black glossy jet black limited time red jet black color dark shade high-gloss black finish created multi-step process beginning anodization phase make surface casing porous aluminum oxide using machine sweep casing powdered compound absorbed aluminum oxide process concluded ultrafine particle bath additional finishing entire process takes less hour iphone 7 rated ip67 water dust resistant although tests resulted malfunctions specifically distorted speakers water exposure warranty cover water damage phone iphone 7 home button uses capacitive mechanism input rather physical push-button previous models meaning direct skin contact capacitive glove required operate device physical feedback provided via taptic engine vibrator button also pressure-sensitive iphone 7 retains 3d touch display system introduced iphone 6s providing pressure-sensitive touchscreen input iphone 7 feature 3.5 mm headphone jack replaced second speaker grille serves vent internal barometer lightning-to-3.5-mm-connector adapter well in-ear headphones use lightning connector bundled device adapter also sold separately accessory adapter also compatible iphone ipad ipod touch devices running ios 10 newer iphone 7 uses apple a10 fusion 64-bit system-on-chip consists two low-power cores two high-power cores two cores used point time a10 chip also features hexa-core graphics chip capable console-level gaming prior models iphone 7 available two sizes one 4.7-inch screen plus variant 5.5-inch screen displays identical sizes resolutions iphone 6s wider color gamut increased brightness screen-to-body ratio ~66 ~68 7 7 plus respectively device variants also contain new iteration apple motion coprocessor m10 unlike previous iphone models internal storage options iphone 7 begin 32 gb instead 16 gb max 256 gb iphone 7 plus offers 3 gb ram previous iphone 4.7-inch iphone 7 2 gb iphone 7 includes 12-megapixel rear-facing camera quad-led true tone flash aperture widened f/1.8 standard-size phone model adds optical image stabilization feature previously exclusive plus models iphone 7 plus includes second 12-megapixel telephoto lens used achieve 2× optical zoom 10× digital zoom front-facing camera upgraded 7-megapixel sensor automatic image stabilization iphone 7 originally shipped ios 10 pre-installed iphone 7 plus received exclusive portrait camera mode ios 10.1 software update camera mode capable producing bokeh effect using depth field analysis second camera dual-lens back iphone 7 plus iphone 7 originally came lightning-to-3.5-mm adapter although omitted starting september 12 2018 apple sells adapter independently well apple also unveiled several bluetooth wireless headphones ostensibly intended use iphone 7 including airpods wireless in-ear headphones three new beats headphone products four products utilize in-house wireless chip known apple w1 designed provide low-power bluetooth operation integration ios macos devices though still compatible bluetooth-supported devices reception iphone 7 mixed gordon kelly forbes noted rival smartphones samsung galaxy s7 increased battery life added water resistance predecessor retaining headphone jack iphone 7 camera photo quality improved still lagging behind phones already market including galaxy s7 nexus 6p kelly praised apple able extract improved brightness accurate color reproduction lcd display panel noting old technology also well behind rivals already moved sharper 1080p even 2k screens iphone 7 exterior reuses aging design iphone 6 iphone 6s criticized especially size device thick top/bottom bezels kelly writing iphone 7 plus simply far big smartphone 5.5-inch display nilay patel verge described devices full aggressive breaks convention despite design continuity previous models going far dubbing prototype next year rumored drastic iphone redesign disguised iphone 6 citing headphone jack removal felt attempt encourage use wireless headphones heterogeneous cpu home button redesign display quality considered improvement previous models albeit insane quad hd displays competing phones taptic engine considered first really valuable new ui concept 've seen phones years opposed gimmick 3d touch patel felt cameras devices step 6s terms performance praised dual-lens camera 7 plus enhancing phone camera functionality however panned lack editing features made use regards enhanced bluetooth audio support provided devices containing w1 chip argued apple took away established open standard favor new technologies instead making experience using new technologies better across board made every third-party wireless audio product second-class citizen apple ecosystem giving iphone 7 9 10 concluded devices legitimately among interesting opinionated powerful phones apple ever shipped confident expressions company vision long time ios 10 excellent cameras better performance phenomenal batteries last longer john mccann techradar wrote first time phablet-sized iphone 7 plus markedly better smaller model highlighted improved battery life praised camera calling plus dual cameras excellent point-and-shoot much improved low-light performance mccann wrote lack headphone jack initially frustrating noted positive step forward mobile industry despite short-term effects ... making noise criticism iphone 7 centered around removal headphone jack including inability use wired headphones included adapter charge device simultaneously particularly scathing article nilay patel verge wrote removing headphone jack ditching deeply established standard would user-hostile stupid goes list reasons removing port negative concluding one asking vote dollars gordon kelly forbes noted wireless audio technology immature moment bluetooth audio quality inferior lightning audio reliability still question removal headphone jack meant ’ pushed era pay decent headphones due need integrated dac and/or lightning licensing pointed company profit situation apple charging licensing fees millions headphone companies particular apple vice president phil schiller announced change mocked extensively online stating removing headphone jack took 'courage online petition created consumer group sumofus accuses apple planned obsolescence causing substantial electronic waste removing headphone jack reached 300,000 signatures users reported strange hissing noise heavy usage phone cnet reports faint buzzes hums coming backside daily telegraph speculates iphone 7 new a10 fusion processor source noise linking tweets compare phone hissing sound hearing fans spin loudly whenever mac ’ cpu gets used actual potential issue referred hissgate guardian reported october 2016 storage tests unbox therapy gsmarena showed 32 gb iphone 7 significantly slower 128 256 gb versions measuring data write speeds 341 mb/s 128 gb iphone 7 model versus 42 mb/s 32 gb model october 2016 network tests cellular insights showed models a1660 a1661 qualcomm modems significant performance edge models a1778 a1784 intel modems inspection modems also found qualcomm version ability use ultra hd voice turned likely level playing field qualcomm intel variants report concluded statement sure main reason behind apple decision source two different modem suppliers newest iphone bloomberg reported november 2016 tests researchers twin prime cellular insights shown two modems perform similarly u.s. cellular networks despite one modems technically capable faster connectivity apple spokeswoman trudy muller told publication every iphone 7 iphone 7 plus meets exceeds apple ’ wireless performance standards quality metrics reliability testing ... rigorous lab tests based wireless industry standards thousands hours real-world field testing extensive carrier partner testing data shows discernible difference wireless performance models bloomberg quoted analysts technology advisers stated apple ’ want one version get reputation better may impact fanboys may make consumers think twice buying apple phone especially think might purchasing sub-standard product similar manner now-discontinued samsung galaxy note 7 reports iphone 7 exploding emitting smoke september 2016 one device reportedly exploded transit another one malfunction caused battery blow internally another report iphone 7 emitting smoke melting published october 2016 iphone 7 7 slogan misunderstood translated certain languages phone slogan mainland china 7 hong kong slogan iphone 7 cantonese local language hong kong slogan could mistakenly interpreted penis tsat common slang term erect penis seven varies tone often used euphemism iphone 7 apple added software lock prevents individuals attempting replace home button users required go apple store repairs done recalibration button necessary step apple went iphone 5s 6 6s touch id functionality would get disabled return-to-home functionality still worked iphone 7 devices model numbers a1660 a1779 a1780 suffer problem show service message even cellular reception available apple repair devices free within two years first retail sale unit apple deliberately withheld pre-order sales numbers citing longer representative metric investors customers without releasing specific numbers t-mobile us stated iphone 7 broken carrier all-time record first-day pre-order sales following weekend t-mobile us stated iphone 7 biggest iphone launch ever nearly 4x compared next popular iphone september 14 2016 two days iphone 7 went sale apple announced due high demand sold jet black iphone 7 colors iphone 7 plus caused issues customers iphone upgrade program unable reserve new phones customer complaints class action lawsuit apple made changes ensure members program could get new phones soon possible may 2017 analytics research company strategy analytics announced iphone 7 iphone 7 plus best-selling smartphones worldwide first quarter 2017 selling 21.5 million 17.4 million units respectively initial u.s. sales iphone 7 four major wireless carriers announced trade-in deals deals monthly installment plan cost iphone 7 negated monthly credit consumers bill consumers cancel service carrier pay phone prior installment contract completion receive credits remaining months jacob kastrenakes verge noted deals effectively constituted return two-year phone contracts deals essentially lock carrier two years wake deals verizon announced seen increase sales release previous year iphone 6s said sales exceeded expectations t-mobile sprint announced huge increases sales t-mobile seeing demand roughly four times higher 7 6 december 2016 digitimes reported apple reduced production iphone 7 decreasing demand product initial surge interest waned reason cited consumers suppliers turning attention next year iphone model new report nikkei end december included details sales production iphone 7 report based data suppliers stated apple would trim production iphone 7 10 first quarter 2017 following sluggish sales nikkei reported apple previously trimmed production iphone 7 20 due accumulated inventory previous model new models sold sluggishly expected additionally report notes iphone 7 plus features two cameras back face remains popular shortage camera sensors curbed apple ability meet demand phones | [
10755,
9732,
1549,
5647,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
6186,
4139,
6700,
7211,
1074,
8754,
9784,
1083,
8253,
576,
1090,
8783,
4180,
10838,
1623,
3672,
10840,
9312,
3681,
9826,
8806,
3691,
2673,
6258,
10357,
6264,
... | None |
10,024 | 7 | Distributed_Component_Object_Model:distributed component object model distributed component object model dcom proprietary microsoft technology communication software components networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure addition com due extensive use dce/rpc distributed computing environment/remote procedure calls – specifically microsoft enhanced version known msrpc terms extensions added com dcom solve problems one key factors solving problems use dce/rpc underlying rpc mechanism behind dcom dce/rpc strictly defined rules regarding marshalling responsible freeing memory dcom major competitor corba proponents technologies saw one day becoming model code service-reuse internet however difficulties involved getting either technologies work internet firewalls unknown insecure machines meant normal http requests combination web browsers microsoft one point attempted failed head adding extra http transport dce/rpc called ncacn_http network computing architecture connection-oriented protocol later resurrected support microsoft exchange 2003 connection http dcom supported natively windows nt 4.0 windows 2000 windows xp windows server 2003 well windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 windows server 2012 windows server 2012 r2 windows server 2016 part initiative began microsoft part secure development lifecycle re-architect insecure code dcom saw significant security-focused changes windows xp service pack 2 comsource source code available along full complete documentation sufficient use also implement interoperable version dcom according documentation comsource comes directly windows nt 4.0 source code even includes source code windows nt registry service wine team also implementing dcom binary interoperability purposes currently interested networking side dcom provided msrpc restricted implementing ndr network data representation microsoft api committed making compatible possible msrpc tangramcom separate project wine focusing implementing dcom linux-based smartphones samba team also implementing dcom over-the-wire interoperability purposes unlike wine team currently interested binary-interoperability samba msrpc implementation far binary-interoperable microsoft msrpc | [
10243,
11270,
5643,
4624,
10769,
9234,
1043,
537,
540,
3102,
1055,
5665,
9762,
2083,
8227,
8740,
6694,
1577,
10281,
4143,
9263,
11316,
1077,
2101,
8246,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
9813,
10839,
603,
9819,
... | Test |
10,025 | 6 | Ncdu:ncdu ncdu ncurses disk usage disk utility unix systems name refers similar purpose du utility ncdu uses text-based user interface n curses programming library users navigate list using arrow keys delete files taking much space pressing 'd key version 1.09 later export file listing json format ncdu developed yoran heling learn c serve disk usage analyzer remote systems ssh | [
10341,
7983,
9204,
5492,
823,
2045
] | Validation |
10,026 | 2 | ActiveX:activex activex software framework created microsoft adapts earlier component object model com object linking embedding ole technologies content downloaded network particularly world wide web microsoft introduced activex 1996 principle activex dependent microsoft windows operating systems practice activex controls run windows also require client running x86-based computer activex controls contain compiled code activex still supported windows 10 internet explorer 11 activex supported default web browser microsoft edge different incompatible extension system compatible new chromium-based microsoft edge using ie mode activex one major technologies used component-based software engineering compared javabeans activex supports programming languages javabeans supports platforms activex supported many rapid application development technologies active template library delphi javabeans microsoft foundation class library qt visual basic windows forms wxwidgets enable application developers embed activex controls products many microsoft windows applications—including many microsoft internet explorer microsoft office microsoft visual studio windows media player—use activex controls build feature-set also encapsulate functionality activex controls embedded applications internet explorer also allows embedding activex controls web pages faced complexity ole 2.0 poor support com mfc microsoft simplified specification rebranded technology activex 1996 even simplification users still required controls implement six core interfaces response complexity microsoft produced wizards atl base classes macros c++ language extensions make simpler write controls starting internet explorer 3.0 1996 microsoft added support host activex controls within html content browser encountered page specifying activex control via codice_1 tag would automatically download install control little user intervention made web richer provoked objections since controls practice ran windows separate controls required supported platform one windows 3.1/windows nt 3.51 one windows nt/95 one macintosh f68k/powerpc security risks especially given lack user intervention microsoft subsequently introduced security measures make browsing including activex safer example activex controversial start microsoft claimed programming ease good performance compared java applets marketing materials critics activex quick point security issues lack portability making impractical use outside protected intranets activex security model relied almost entirely identifying trusted component developers using code signing technology called authenticode developers register verisign us 20 per year individuals 400 corporations sign contract promising develop malware identified code would run inside web browser full permissions meaning bug code potential security issue contrasts sandboxing already used java time october 1996 microsoft released beta version activex software development kit sdk macintosh including plug-in netscape navigator mac announced plan support activex solaris later year six months two beta releases later yet commercially available macintosh activex plugins 1997 ncompass labs cooperation microsoft released plug-in netscape navigator support activex documentation activex core technology resides open group may downloaded free despite microsoft previous efforts make activex cross-platform activex controls work platforms using activex controls implement essential functionality web page restricts usefulness south korea started remove technology public websites order make web site accessible platforms microsoft made significant effort push cross-platform aspect activex way publishing api ultimately cross-platform effort failed due activex controls written c c++ compiled intel x86 assembly language making executable windows machines call standard win32 apis microsoft dropped activex support windows store edition internet explorer 10 windows 8 2015 microsoft released microsoft edge replacement internet explorer support activex marked end technology microsoft web browser development may always possible use internet explorer execute activex content e.g. wine installation may user want microsoft developed large number products software platforms using activex objects still used e.g. websites still use asp | [
9216,
513,
10243,
11270,
8200,
5643,
9229,
4624,
10769,
9234,
1043,
1556,
6679,
537,
6171,
540,
7708,
3102,
1055,
5663,
7713,
9762,
2083,
8227,
8740,
1577,
10281,
2603,
7212,
10282,
10284,
4143,
9263,
4658,
2099,
8243,
1077,
2101,
8246,
1... | Test |
10,027 | 6 | PowerArchiver:powerarchiver powerarchiver proprietary file archiver microsoft windows developed conexware inc supports full read-write access several different archive formats including zip 7z tar additionally read-only decompression support includes rar ace various disk image formats evaluation version program remains functional 40 days personal licenses currently permitted free lifetime updates future versions software business license valid two major versions powerarchiver first public release made march 1999 advertised free archiving solution written borland delphi turned shareware june 2001 version 7 prior powerarchiver software known easyzip command line version microsoft outlook plugin also provided powerarchiver user interface translated 15 languages latest release powerarchiver fully supports windows 7 provides user option use ribbon gui featured microsoft office 2007 windows 7 users revert old-style toolbar wish 2011 softpedia gave five stars praising wide support various compressed file types ftp backup feature pointing lack complete support vhd files later 2013 download.com gave five stars | [
6022,
10121,
1420,
6797,
1940,
3222,
9880,
3114,
7983,
950,
6713,
2755,
11076,
1352,
4296,
10317,
10575,
4561,
722,
11614,
1631,
3296,
6240,
5858,
9953,
6759,
7529,
106,
4459,
237,
1646,
7667,
6389,
4089,
894,
10623
] | Test |
10,028 | 8 | Geliyoo:geliyoo geliyoo bilişim turkish multinational corporation specializing internet-related services products include search cloud computing software online advertising technologies geliyoo founded hakan atabaş graduated odtü fatih arslan m.s students texas tech university enhance search technologies turkey goal geliyoo developed team turkish engineers also geliyoo wants gain love turkish people leading field incorporated geliyoo privately held company april 5 2012 mission statement organize secure world information make globally accessible useful unofficial motto new technology geliyoo known €741,000 spent developed geliyoo without income ads till 2012 first award given two categories e-innovation e-telecommunication informatics association turkey geliyoo search web search engine company popular service geliyoo developed search engine crawler geliyoo spider geliyoobot/1.0 developed geliyoo first turkish search engine bot geliyoobot/1.0 builds searchable index geliyoo search engine webmaster wishes restrict information site available geliyoobot another well-behaved spider appropriate directives robots.txt file adding meta tag codice_1 web page geliyoo spider requests web servers identifiable user-agent string containing geliyoobot host address containing geliyoo.com geliyoo directory project gmoz gmoz.geliyoo.com original domain name multilingual open content directory world wide web links owned geliyoo constructed maintained community volunteer editors gmoz uses hierarchical ontology scheme organizing site listings listings similar topic grouped categories include smaller categories gmoz helps geliyoo search results geliyoo news free news aggregator provided operated geliyoo selecting up-to-date information thousands publications automatic aggregation algorithm service covers news articles appearing within past 30 days various news websites geliyoo maps web mapping service application technology provided geliyoo powers many map-based services including geliyoo maps website includes traffic offers street maps route planner traveling car geliyoo maps uses tom tom base maps geliyoo also develops first turkish web browser called geliyoo browser offers powerful browsing together built-in media downloading sharing features geliyoo browser based chromium technology platform supports torrent files tells geliyoo browser combines oracle java semantic web web 3.0 technologies | [
4194,
119
] | Test |
10,029 | 2 | Object_Linking_and_Embedding:object linking embedding object linking embedding ole proprietary technology developed microsoft allows embedding linking documents objects developers brought ole control extension ocx way develop use custom user interface elements technical level ole object object implements codice_1 interface possibly along wide range interfaces depending object needs ole allows editing application export part document another editing application import additional content example desktop publishing system might send text word processor picture bitmap editor using ole main benefit ole add different kinds data document different applications like text editor image editor creates compound file binary format document master file document makes reference changes data master file immediately affect document references called linking instead embedding ole also used transferring data different applications using drag drop clipboard operations ole 1.0 released 1990 evolution original dynamic data exchange dde concept microsoft developed earlier versions windows dde limited transferring limited amounts data two running applications ole capable maintaining active links two documents even embedding one type document within another ole servers clients communicate system libraries using virtual function tables vtbls vtbl consists structure function pointers system library use communicate server client server client libraries olesvr.dll olecli.dll originally designed communicate using wm_dde_execute message ole 1.0 later evolved become architecture software components known component object model com later dcom ole object placed clipboard embedded document visual representation native windows formats bitmap metafile stored well underlying data format allows applications display object without loading application used create object also allowing object edited appropriate application installed object packager component ole shipping windows 3.1 windows xp allows non-ole object packaged embedded ole client ole 2.0 next evolution ole sharing many goals version 1.0 re-implemented top com instead using vtbls directly new features ole automation drag-and-drop in-place activation structured storage monikers evolved ole 1 object names provided hierarchical object resource naming system similar urls uris independently invented windows merged two technologies supporting url moniker type moniker url scheme ole custom controls introduced 1994 replacement deprecated visual basic extension controls instead upgrading new architecture based ole particular container supported ole 2.0 could already embed ole custom controls although controls react events unless container supports ole custom controls usually shipped form dynamic link library .ocx extension 1996 interfaces controls except iunknown made optional keep file size controls would download faster called activex controls ole objects containers implemented top component object model objects implement interfaces export functionality ioleobject interface compulsory interfaces may also need implemented functionality exported interfaces required ease understanding follows terminology explained view status object whether object transparent opaque opaque solid background whether supports drawing specified aspect site object object representing location object container container supports site object every object contained follows list interfaces grouped object usually needs implement interfaces usually implemented ole object usually called ole container vice versa note following list indentation indicates interface inheritance non-indented interfaces derive iunknown opendoc technology tried compete ole microsoft competitors considered opendoc robust easier use however opendoc known problems opendoc allowed users view edit information across applications directly competition microsoft proprietary ole standard 1993 microsoft competitors established consortium called component integration laboratories cil develop opendoc open standard cross-platform linking embedding microsoft required ole compatibility condition microsoft certification application compatibility windows 95 microsoft initially announced applications using opendoc would deemed compatible ole would receive certification windows 95 microsoft later reversed decision said applications using opendoc might receive certification microsoft withheld specifications debugged versions ole released competing applications use microsoft object linking embedding ole objects limits interoperability objects widely supported programs viewing editing files e.g embedding files inside file tables charts spreadsheet application text document presentation file software understands ole object available object usually replaced picture bitmap representation object displayed | [
10243,
11270,
5643,
4624,
10769,
1043,
537,
540,
3102,
1055,
5663,
9762,
2083,
8227,
8740,
1577,
10281,
4143,
9263,
11316,
1077,
2101,
8246,
10812,
3648,
10310,
2632,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
9813,
10839,
603,
9819,
2145,
... | None |
10,030 | 2 | TRON_project:tron project tron acronym real-time operating system nucleus open architecture real-time operating system kernel design project started prof. dr. ken sakamura university tokyo 1984 project goal create ideal computer architecture network provide society needs industrial tron itron derivative one world used operating systems 2003 present billions electronic devices mobile phones appliances even cars although mainly used japanese companies garnered interest worldwide however dearth quality english documentation said hinder broader adoption tron project integrated t-engine forum 2010 today supported popular ssl/tls libraries wolfssl tron specify source code kernel instead set interfaces design guidelines creating kernel allows different companies create versions tron based specifications suited different microprocessors specification tron publicly available implementations proprietary discretion implementer tron framework defines complete architecture different computing units 1984 tron project officially launched 1985 nec announced first itron implementation based itron/86 specification 1986 tron kyogikai unincorporated tron association established hitachi announced itron implementation based itron/68k specification first tron project symposium held 1987 fujitsu announced itron implementation based itron/mmu specification mitsubishi electric announced itron implementation based itron/32 specification hitachi introduced gmicro/200 32bit microprocessor based tron vlsi cpu specification 2004 governor tokyo shintaro ishihara mentioned tron killed former minister international trade industry hashimoto time pressure united states story supported article website dedicated tron project citing microsoft lobbying result threat super-301 complete stop import based section 301 omnibus trade competitiveness act 1988 everything related tron led many companies dropping tron fear lose possibility export united states tron project administered tron association integrated t-engine forum 2010 tron project activities taken continued t-engine forum t-engine forum non-profit organization develops open specifications itron t-kernel ubiquitous id architecture chair t-engine forum dr. ken sakamura july 2011 266 members t-engine forum executive committee members includes top japanese giants like fujitsu hitachi ntt docomo denso a-level members involved design development specifications t-engine t-kernel ubiquitous id technology include companies esol nec yamaha corporation b-level members involved development product using t-engine specification t-kernel include companies like arm freescale mips technologies mitsubishi robert bosch gmbh sony corporation toshiba xilinx supporting members academic members involved forum include many universities university tokyo japan dalian maritime university china microscript programming language graphically-oriented high-level programming language created personal media corporation tron similar apple computer hypertalk intended mainly end users little programming experience yet also used development tool professional btron programmers port software tron variants easily quickly write device drivers hardware devices microscript based makes extensive use tron basic text editor basic figure editor | [
10883,
6276,
4486,
6419,
9366,
7319,
2201,
9628,
8355,
7983,
9137,
6207,
321,
10561,
1221,
8262,
9927,
6985,
9162,
9932,
341,
10590,
6624,
5603,
5220,
1253,
1126,
10482,
11383
] | Test |
10,031 | 9 | Programming_Computable_Functions:programming computable functions computer science programming computable functions pcf typed functional language introduced gordon plotkin 1977 based previous unpublished material dana scott considered extended version typed lambda calculus simplified version modern typed functional languages ml haskell fully abstract model pcf first given milner 1977 however since milner model essentially based syntax pcf considered less satisfactory ong 1995 first two fully abstract models employing syntax formulated 1990s models based game semantics hyland ong 2000 abramsky jagadeesan malacaria 2000 kripke logical relations o'hearn riecke 1995 time felt neither models completely satisfactory since effectively presentable however ralph loader demonstrated effectively presentable fully abstract model could exist since question program equivalence finitary fragment pcf decidable types pcf inductively defined context list pairs x σ x variable name σ type variable name duplicated one defines typing judgments terms-in-context usual way following syntactical constructs relatively straightforward semantics language scott model model model fully abstract pcf fully abstract language obtained adding parallel operator pcf p. 293 hyland ong 2000 reference | [
512,
10049,
6306,
3876,
1830,
11020,
5585,
3929
] | Test |
10,032 | 7 | SparkleShare:sparkleshare sparkleshare open-source cloud storage file synchronization client app default uses git storage backend sparkleshare comparable dropbox cloud storage provided user server hosted solution github advantage self-hosting user retains absolute control data simplest case self-hosting requires ssh git sparkleshare support android ios devices hold due lack developer resources | [
6565,
10341,
4490,
7983,
4623,
11221,
823,
8446
] | Test |
10,033 | 8 | CURL:curl curl pronounced 'curl computer software project providing library libcurl command-line tool curl transferring data using various protocols first released 1997 name stands client url original author lead developer swedish developer daniel stenberg libcurl free client-side url transfer library supporting cookies dict ftp ftps gopher http/1 http/2 support http post http put http proxy tunneling https imap kerberos ldap pop3 rtsp scp smtp library supports file uri scheme sftp telnet tftp file transfer resume ftp uploading http form-based upload https certificates ldaps proxies user-plus-password authentication libcurl library portable builds works identically many platforms including aix amigaos android beos blackberry tablet os blackberry 10 openvms darwin dos freebsd hp-ux hurd ios irix linux macos netbsd netware openbsd os/2 qnx neutrino risc os solaris symbian tru64 ultrix unixware microsoft windows libcurl library free thread-safe ipv6 compatible bindings available 40 languages including c/c++ java php python libcurl library support axtls gnutls mbed tls nss qsossl ibm schannel windows secure transport macos ios ssl/tls openssl wolfssl curl command-line tool getting sending data including files using url syntax since curl uses libcurl supports range common network protocols currently including http https ftp ftps scp sftp tftp ldap dap dict telnet file imap pop3 smtp rtsp last four versions newer 7.20.0 9 february 2010 curl supports https performs ssl certificate verification default secure protocol specified https curl connects remote server via https obtain remote server certificate check ca certificate store validity remote server ensure remote server one claims curl packages bundled ca certificate store file several options specify ca certificate -- cacert -- capath -- cacert option used specify location ca certificate store file windows platform ca certificate file specified curl look ca certificate file name “ curl-ca-bundle.crt ” following order curl return error message remote server using self-signed certificate remote server certificate signed ca listed ca cert file -k -- insecure option used skip certificate verification alternatively remote server trusted remote server ca certificate added ca certificate store file basic use curl involves simply typing curl command line followed url output retrieve curl defaults displaying output retrieves standard output specified system usually terminal window running command would systems display www.example.com source-code terminal window -o flag used store output file instead options change tool behavior available | [
517,
2568,
6674,
8729,
2083,
5670,
10791,
5677,
9780,
64,
9281,
4174,
9839,
1647,
113,
8834,
6281,
6797,
4248,
3744,
4771,
9380,
7847,
9909,
7356,
4797,
10428,
7364,
1741,
1750,
9946,
4850,
7411,
2804,
11509,
6396,
5380,
9997,
3856,
5397,... | Validation |
10,034 | 4 | Domain_Based_Security:domain based security domain based security abbreviated dbsy model-based approach help analyse information security risks business context provide clear direct mapping risks security controls needed manage variant approach used uk government hmg infosec standard no.1 technical risk-assessment method dbsy registered trade mark qinetiq ltd. dbsy developed late 1990s defence evaluation research agency dera model-based approach information assurance describes requirements security organisation taking account business needs supported model based around concept security domain represents logical place people work information using computer system connections security domains necessary support business activity hence focus information needs protection people work people exchange information model also describe physical environments people work system boundaries major system security measures placed systematic method applied model identify describe risks valuable information assets exposed specify security measures effective managing risks dbsy origins late 1990s developed defence evaluation research agency dera ministry defence mod initially called domain based approach developed alongside purple penelope support mod increasing need interconnections systems operating different security levels recognised risks associated connections directly related nature information exchange needed effective model understanding managing risks would need take account business needs information sharing also recognised controlled release information system handling secret information sometimes referred time 'down grading 'sanitisation adequately described existing models information security notably bell-lapadula biba associated information flow models information flow models found unhelpful understanding risks information shared people systems entirely trusted effective model understanding managing risks would need take account business needs exchanging information within outside organisation modelling technique applied major projects mod result experience graphical modelling techniques revised rigorous risk assessment method based concepts compromise paths developed approach security documentation project lifecycle also created domain based security conferences held qinetiq malvern june 2005 june 2006 promoting discussion could widely used defence commercial systems variant dbsy method subsequently developed incorporated uk government hmg infosec standard no.1 technical risk assessment method standard method used security risk assessments government information technology systems dbsy approach uses simple models represent requirements security organisation using two different related viewpoints infosec business model represents security aspects business infosec infrastructure model represents logical provision strong boundaries enforce separation combined make infosec architecture model model forms basis conducting systematic rigorous risk assessment infosec business model defines security domains connections model specifies limits information processed exchanged security domains forms set security requirements business particular connections explicitly modelled permitted required occur security domain characterised set information assets may valuable organisation well people work information applications services act behalf connections domains characterised nature interaction required interpersonal messages shared access database sensitivity integrity requirements information exchange model also represent kinds physical environment domain accessed infosec infrastructure model defines islands computing infrastructure required logically separate information exchanged except identifiable manageable points connection referred causeways island characterised strength separation islands people manage computing infrastructure infosec architecture model combines business infrastructure views showing security domains supported islands infrastructure connections security domains hosted different islands connections must supported appropriate causeway dbsy method uses rational risk framework describing risks information assets exposed similar kinds assets grouped together focus interest risk assessment process applied focus interest turn key factors determining risk particular focus interest risk framework applied systematic fashion organisation-specific infosec architecture model representing security-relevant features organisation business systems process set compromise paths systematically described relative effectiveness different countermeasures assessed dbsy differs risk management methods primary focus people business drivers organisation way business works rather technical security measures analyst required systematically define groups people pose threat ways might cause harm providing rigorous business-oriented framework concepts threat vulnerability aim understand analyse information security risks faced organisation especially risks appear conflict needs business efficiency across organisation dealings customers business partners | [
3360,
612,
5636,
11172,
7979,
11567,
11695,
8881,
4404,
5373
] | Test |
10,035 | 5 | Venturi_Transport_Protocol:venturi transport protocol venturi transport protocol vtp patented proprietary transport layer protocol designed transparently replace tcp order overcome inefficiencies design tcp related wireless data transport owned venturi wireless protocol employed various wireless broadband internet service providers verizon wireless unwired unwired calls venturi client application provides transparent vtp connectivity unwired optimizer order speed network overcome latency issues | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
5471,
5472,
10341,
... | Validation |
10,036 | 2 | System_Integrity_Protection:system integrity protection system integrity protection sip sometimes referred rootless security feature apple macos operating system introduced os x el capitan comprises number mechanisms enforced kernel centerpiece protection system-owned files directories modifications processes without specific entitlement even executed root user user root privileges sudo apple says root user significant risk factor system security especially systems single user account user also administrator system integrity protection enabled default disabled apple says system integrity protection necessary step ensure high level security one wwdc developer sessions apple engineer pierre-olivier martel described unrestricted root access one remaining weaknesses system saying piece malware one password vulnerability away taking full control device stated installations macos one user account necessarily carries administrative credentials means users grant root access program asks whenever user system prompted enters account password – martel says often weak non-existent – security entire system potentially compromised restricting power root unprecedented macos instance versions macos prior mac os x leopard enforce securelevel security feature originates bsd derivatives upon macos partially based system integrity protection comprises following mechanisms system integrity protection protects system files directories flagged protection happens either adding extended file attribute file directory adding file directory among protected directories symbolic links also protected although target directories protected preinstalled apple applications protected well kernel stops processes without specific entitlements modifying permissions contents flagged files directories also prevents code injection runtime attachment dtrace respect protected executables since os x yosemite kernel extensions drivers code-signed particular apple entitlement developers request developer id entitlement apple kernel refuses boot unsigned extensions present showing user prohibition sign instead mechanism called kext signing integrated system integrity protection system integrity protection disabled either wholly partly outside system partition end apple provides command-line utility executed terminal window within recovery system bootable macos installation disk adds boot argument device nvram applies setting installations el capitan macos sierra device upon installation macos installer moves unknown components within flagged system directories preventing write access system directories system file directory permissions maintained automatically apple software updates result permissions repair available disk utility corresponding operation reception system integrity protection mixed macworld expressed concern apple could take full control away users developers future releases move security policy macos slowly toward apple mobile operating system ios whereupon installation many utilities modifications requires jailbreaking applications drivers work full extent operated unless feature disabled either temporarily permanently ars technica suggested could affect smaller developers disproportionately larger ones may able work apple directly however also remarked far users including power users reason turn feature saying almost downsides | [
5636,
4615,
5647,
1042,
537,
5158,
6700,
4657,
1074,
9802,
10318,
5713,
3670,
4184,
2141,
4702,
2149,
8303,
6771,
2676,
6264,
9343,
3719,
5256,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
5280,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
94... | Test |
10,037 | 2 | APUS_Group:apus group apus group commonly termed apus founded june 2014 tao li chinese technology company specializing android development information services company main product apus user system also known apus launcher drawn 1 billion users globally 2016 along apus series products including apus user system apus booster+ apus browser apus message center apus flashlight etc covering 200 countries six continents according tao li ceo apus 90 percent users countries beyond china one world top 10 developers mobile applications name apus short perfect user system also refers bird species apodidae swift highly aerial bird family fastest fliers animal kingdom maximum speed june 2014 tao li founded apus group beijing month apus netted 100 million rmb series funding july 2 2014 apus launcher released google play 28 days later apus user group reached 10 million october 22 2014 apus announced 50 million user globally december 1 2014 apus published first apus global mobile application analysis report january 2015 apus picked 100 million usd series b funding become youngest unicorn companies market values usd 1 billion world january 2015 apus user group reached 100 million march 2015 apus user group reached 150 million named fifth developer world app annie may 2015 apus user group reached 300 million may 2015 apus browser released september 2015 apus announced ’ netted 250 million users globally apus user system apus launcher 510 million apus user system apus launcher apus series products time market value reached usd 1.5 billion september 2015 apus announced long-term partnership inmobi decision entry india market october 2015 apus announced entry japanese korean market december 2015 apus announced usd 45 million rs 300 crore indian mobile web companies march 2016 apus announced acquired 920 million downloads apus series products including apus user system apus booster apus browser apus browser turbo apus flashlight etc october 2016 forbes reported leading position apus group google play store praised apus group advanced business model successful monetization november 2016 apus announced fresh investment us 44 million india new research development center sales business development office gurgaon startup incubator | [
4685
] | Validation |
10,038 | 7 | IEEE_Cloud_Computing:ieee cloud computing ieee cloud computing global initiative launched ieee promote cloud computing big data related technologies provide expertise resources individuals enterprises involved cloud computing 2010 institute electrical electronics engineers ieee sponsored two cloud computing–specific conferences ieee cloud ieee cloudcom success two conferences ieee senior member ieee computer society past president steve diamond began urging organization take active role development cloud computing standards april 2011 support ieee future directions committee funding ieee new initiatives committee ieee cloud computing launched initiative designed follow multi-year plan includes focus across multiple tracks conferences education publications standards intercloud testbed web portal marketing public relations part initiative launch two new cloud computing standards development projects approved ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation siif growing need greater cloud computing interoperability federation ieee cloud computing focused development activities resources behind ieee p2302 standard ieee cloud computing continues pursue efforts provide cloud computing standards advancement cloud computing technologies educate users benefits cloud computing part ongoing effort offers variety activities products services including ieee cloud computing portal conferences events continuing education courses publications standards ieee intercloud testbed platform testing cloud computing interoperability ieee cloud computing portal serves online hub cloud computing resources site includes news information form ieee press releases well articles taken ieee third-party publications portal provides dedicated sections conferences events education careers publications standards ieee intercloud testbed innovations part mandate ieee cloud computing process developing global cloud computing standards april 2011 began working first ieee cloud computing standards ieee p2301 ieee p2302 ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation address cloud interoperability portability fragmentation ieee p2301 guide cloud portability interoperability profiles cpip working group formed february 24 2014 mandate develop guide cloud portability interoperability profiles completed guide advise cloud computing ecosystem participants cloud vendors service providers end users available standards-based choices areas like application portability management interoperability interfaces file formats operation conventions guide group choices multiple logical profiles organized address different cloud personalities john messina senior member national institute standards technology nist cloud computing program chair ieee p2301 guide cloud portability interoperability profiles working group april 4 2011 ieee p2302 draft standard intercloud interoperability federation working group formed finalized approved ieee p2302 define topology protocols functionality governance cloud-to-cloud interoperability federated operations ieee cloud computing also formed new ieee adaptive management cloud computing amcc study group december 16 2013 group purpose investigate management environments needed support dynamic nature cloud computing environments services provide customers consume services providers offering services also explore potential application adaptive policy-based management cloud based environments including adaptive management architectures environments adaptive security management auto-generation management policies business specifications auto-generation data support management functionality co-generation application management functionality joel fleck senior standards architect hp labs study group chair ieee cloud computing sponsors participates cloud computing-focused conferences events around world designed promote knowledge-sharing cloud computing events typically range one day week attract global audience conference event programs generally offer multiple educational tracks keynote speeches panel discussions roundtables led industry notables researchers engineers academics policymakers key stakeholders early january 2012 ieee cloud computing began partnering established conference develop matrix events targeted specific geographic regions ieee globecom 2013 held atlanta georgia co-located north america cloud congress initiative organizing additional cloud congresses european asia pacific latin america regions encourage greater focus cloud computing via existing well-established conference ieee signature conference computers software applications compsac ieee international conference cloud computing technology science ieee cloudcom ieee global communications conference exhibition industry forum globecom create new cloud computing-related events specific geographic regions ieee cloud computing offers continuing education courses e-learning modules videos conference section chapter talks participating societies organizations active ieee cloud computing include | [
4194,
3323
] | Test |
10,039 | 2 | Windows_Hardware_Error_Architecture:windows hardware error architecture windows hardware error architecture whea operating system hardware error handling mechanism introduced windows vista windows server 2008 successor machine check architecture mca previous versions windows architecture consists several software components interact hardware firmware given platform handle notify regarding hardware error conditions collectively components provide generic means discovering errors common error report format errors way preserving error records error event model based event tracing windows etw whea builds pci express advanced reporting provide detailed information system errors common reporting structure whea allows third-party software interact operating system react certain hardware events example new cpu added running system—a windows server feature known dynamic hardware partitioning—the hardware error component stack notified new processor installed unknown hardware errors windows 10 solved reverse engineering running scf scan | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9874,
1... | None |
10,040 | 2 | History_of_IBM_mainframe_operating_systems:history ibm mainframe operating systems history operating systems running ibm mainframes notable chapter history mainframe operating systems ibm long-standing position world largest hardware supplier mainframe computers arguably operating systems ibm supplied customers use early mainframes seldom innovative except virtual machine systems beginning cp-67 company well-known reputation preferring proven technology generally given potential users confidence adopt new ibm systems fairly quickly ibm current mainframe operating systems z/os z/vm z/vse z/tpf backward compatible successors operating systems introduced 1960s although course improved many ways ibm-supplied operating systems supplied others discussed notably used ibm mainframes ibm slow introduce operating systems general motors produced general motors os 1955 gm-naa i/o 1956 use ibm computers 1962 burroughs corporation released mcp general electric introduced gecos cases use customers fact first operating systems ibm computers written ibm customers wish expensive machines us 2m mid-1950s sitting idle operators set jobs manually wanted mechanism maintaining queue jobs operating systems described ran processor models suitable scientific engineering calculations users ibm computers applications manage without operating systems one ibm smaller computers ibm 650 introduced feature later became part os/360 processing interrupted random processing error hardware glitch machine could automatically resume last checkpoint instead requiring operators restart job manually beginning general motors research division produced gm-naa i/o ibm 701 1956 prototype gm operating system developed 1955 updated 701 successor 1960 ibm user association share took produced updated version share operating system finally ibm took project supplied enhanced version called ibsys ibm 7090 ibm 7094 computers ibsys required 8 tape drives fewer system one disk drives main components card-based job control language main user interface compilers fortran cobol assembler various utilities including sort program 1958 university michigan executive system adapted gm-naa i/o produce umes better-suited large number small jobs created students umes used 1967 replaced mts timesharing system bell labs produced besys sometimes referred bellmon used mid-1960s bell also made available others without charge formal technical support ibsys ibm produced ibm 709 7090 7094 computers tape-based operating system whose sole purpose compile fortran programs—in fact fms fortran compiler tape mit fernando corbató produced first experimental time-sharing systems ctss 1957 early 1960s using slightly modified ibm 704 ibm 7090 mainframes systems based proposal john mccarthy 1960s ibm laboratories created experimental time-sharing systems using standard mainframes hardware microcode modifications support virtual memory ibm m44/44x early 1960s cp-40 1964 1967 cp-67 1967 1972 company even released cp-67 without warranty technical support several large customers 1968 1972 cp-40 cp-67 used modified system/360 cpus m44/44x based ibm 7044 earlier generation cpu different internally experimental systems late incorporated system/360 series ibm announced 1964 encouraged company add virtual memory virtual machine capabilities system/370 mainframes operating systems 1972 1968 consulting firm called computer software systems used released version cp-67 set commercial time-sharing service company technical team included 2 recruits mit see ctss dick orenstein harold feinleib grew company renamed national css modified software increase number paying users could support system sufficiently different warranted new name vp/css vp/css delivery mechanism national css services early 1980s switched ibm vm/370 see universities produced three s/360 time-sharing operating systems late 1960s early 1960s ibm low-end high-end systems incompatible programs could easily transferred one another systems often used completely different peripherals e.g disk drives ibm concluded factors increasing design production costs hardware software level unsustainable reducing sales deterring customers upgrading 1964 company announced system/360 new range computers used peripherals could run programs ibm originally intended system/360 one batch-oriented operating system os/360 least two accounts ibm later decided also produce simpler batch-oriented operating system dos/360 system/360 operating systems complex previous ibm operating systems several reasons including made development os/360 system/360 software one largest software projects anyone attempted ibm soon ran trouble huge time cost overruns large numbers bugs problems magnified develop test system/360 operating systems real hardware ibm first develop basic programming support bps bps used develop tools needed develop dos/360 os/360 well first versions tools would supply operating systems compilers fortran cobol utilities including sort assembler needed build software ibm competitors took advantage delays os/360 system/360 announce systems aimed thought vulnerable parts ibm market prevent sales system/360 collapsing ibm released four stop-gap operating systems ibm announced s/360-67 also announced timesharing operating system tss/360 would use new virtual memory capabilities 360/67 tss/360 late unreliable ibm canceled time alternative operating system cp-67 developed ibm cambridge scientific center running well enough ibm offer without warranty timesharing facility large customers cp-67 would go become vm/370 eventually z/vm traumas producing system/360 operating systems gave boost emerging discipline software engineering attempt apply scientific principles development software management software projects frederick p. brooks senior project manager whole system/360 project given specific responsibility os/360 already long overdue wrote acclaimed book mythical man-month based problems encountered lessons learned project two os/360 preferred operating system higher-end system/360 machines dos/360 usual operating system less powerful machines provided set utility programs macro assembler compilers fortran cobol support rpg came later eventually pl/i subset supported useful range file organizations access methods help using sequential isam files could store either fixed-length variable-length records types could occupy one disk volume dos/360 also offered btam data communications facility primitive hard use today standards btam could communicate almost type terminal big advantage time hardly standardization communications protocols dos/360 significant limitations compared os/360 used control larger system/360 machines ibm expected dos/360 users would soon upgrade os/360 despite limitations dos/360 became world widely used operating system dos/360 ran well system/360 processors medium-sized organizations could afford better operating systems customers result descendant z/vse still widely used today 2005 os/360 included multiple levels support single api much shared code pcp stop-gap version could run one program time mft multiprogramming fixed number tasks mvt multiprogramming variable number tasks used least late 1970s good five years successors launched unclear whether divisions among pcp mft mvt arose mvt required much memory usable mid-range machines ibm needed release multiprogramming version os mft soon possible pcp mft mvt different approaches managing memory see provided similar facilities experience indicated advisable install os/360 systems less 256 kb memory common limitation 1960s installing mft customers would specify five partitions areas memory fixed boundaries application programs could run simultaneously mft version ii mft-ii raised limit 52 mvt considerably larger complex mft therefore used powerful system/360 cpus treated memory used operating system single pool contiguous regions could allocated required indefinite number simultaneous application programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough 1971 time sharing option tso use mvt added tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso communicated terminals using tcam telecommunications access method eventually replaced earlier queued telecommunications access method qtam tcam name suggests ibm hoped would become standard access method data communications fact tcam used almost entirely tso largely superseded vtam late 1970s onwards system/360 hardware operating systems designed processing batch jobs extreme cases might run hours result unsuitable transaction processing thousands units work per day takes 30 seconds minutes 1968 ibm released ims handle transaction processing 1969 released cics simpler transaction processing system group ibm staff developed customer ims available os/360 successors cics also available dos/360 successors many years type product known tp teleprocessing monitor strictly speaking tp monitors operating system components application programs managed application programs 1970s 1980s several third-party tp monitors competed cics notably taskmaster shadow intercomm ibm gradually improved cics point customers abandoned alternatives 1950s airlines expanding rapidly growth held back difficulty handling thousands bookings manually using card files 1957 ibm signed development contract american airlines development computerized reservations system became known sabre first experimental system went live 1960 system took booking functions 1964 cases using ibm 7090 mainframes early 1960s ibm undertook similar projects airlines soon decided produce single standard booking system pars run system/360 computers sabre early versions pars separation application operating system components software 1968 ibm divided pars application acp operating system later versions acp named acp tpf tpf transaction processing facility non-airline businesses adopted operating system handling large volumes online transactions latest version z/tpf ibm developed acp successors mid-1960s ibm standard operating systems dos/360 os/360 batch-oriented could handle large numbers short transactions quickly enough even transaction monitors ims cics run control standard general-purpose operating systems fast enough handling reservations hundreds flights thousands travel agents last public domain version acp hence last free version acp 9.2 distributed single mini-reel accompanying manual set two dozen manuals occupied perhaps 48 lineal inches shelf space could restored ibm 3340 disk drives would thereby provide fully functional acp system acp 9.2 intended primarily bank card mastercard et al financial applications could also utilized airlines reservation systems time acp become general-purpose os indeed acp incorporated hypervisor module chyr supported virtual os ... usually vs1 possibly also vs2 ... guest program development file maintenance could accomplished concurrently on-line functions instances production work run vs2 hypervisor including possibly ims db model 20 labeled part system/360 range could connected peripherals 16-bit machine entirely program-compatible members system/360 range three operating systems developed ibm labs germany different 360/20 configurations dps—with disks minimum memory required 12 kb tps—no disk tapes minimum memory required 8 kb cps—punched-card-based minimum memory required 4 kb direct successors since ibm introduced system/3 range small business computers 1969 system/3 different internal design 360/20 different peripherals ibm mainframes another processor used system/360 peripherals different internal design 360/44 designed scientific computation using floating point numbers geological meteorological analyses internal differences specialized type work designed 360/44 operating system ps/44 emulator missing system/360 instructions allowed model 44 run os/360 360/44 ps/44 direct successors system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly-priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory new operating systems distinguished predecessors presence /vs names vs stands virtual storage ibm avoided term virtual memory allegedly word memory might interpreted imply ibm computers could forget things today ibm mainframe operating systems except z/tpf descendants included system/370 advanced functions announcement z/tpf descendant acp system ibm initially developed support high-volume airline reservations applications dos/vs successor dos/360 addition virtual memory dos/vs provided enhancements dos/vs followed significant upgrades dos/vse vse/sp 1980s vse/esa 1991 z/vse 2005 os/vs1 successor mft offered similar facilities addition virtual memory ibm released fairly minor enhancements os/vs1 1983 1984 announced would os/vs1 tss/370 ibm system/370 operating systems modern descendants special real time operating system srtos programming rpq z06751 variant os/vs1 extended support real-time computing targeted industries electric utility energy management oil refinery applications os/vs2 release 1 svs replacement mvt virtual memory many changes retained overall structure 1974 ibm released described os/vs2 release 2 major rewrite upwards-compatible earlier os/vs2 svs new system noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses result new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ ... distinctive features mvs main catalog vsam catalog supported tightly-coupled multiprocessing 2 cpus share memory copy operating system included system resources manager renamed workload manager later versions allowed users load additional work system without reducing performance high-priority jobs ibm released several mvs upgrades mvs/se mvs/sp version 1 mvs/xa 1981 mvs/esa 1985 os/390 1996 currently z/os 2001 vm/370 combined virtual machine facility single-user system called conversational monitor system cms combination provided time-sharing allowing user run copy cms virtual machine combination direct descendant cp/cms virtual machine facility often used testing new software normal production work continued another virtual machine cms timesharing system widely used program development vm/370 followed series upgrades vm/sepp systems extensions program product vm/bsepp basic systems extensions program product vm/sp system product vm/sp hpo high performance option vm/xa extended architecture migration aid vm/xa sf extended architecture system facility vm/xa sp extended architecture system product vm/esa enterprise systems architecture z/vm ibm also produced optional microcode assists vm successors speed hypervisor emulation privileged instructions operating systems use behalf guest operating systems part 370/extended architecture ibm added start interpretive execution sie instruction allow speedup cp hypervisor time-sharing timesharing based idea computers much faster humans one human user reading computer displayed screen computer useful work another user large time-sharing systems hundreds even thousands simultaneous users memory required programs data generally adds much physical memory attached computer time-sharing systems solve problem various combinations virtual memory memory management technique programs made work memory available actually attached computer running programs code data may scattered several areas physical memory even placed disk needed main components ibm virtual memory system functioning properly virtual memory system keeps active pages real memory inactive ones disk allows efficient execution systems workload virtual machine techniques enable several operating systems guest operating systems software run computer thinks whole computer simulated whole computers called virtual machine operating system really controls computer usually called hypervisor two major components hypervisor | [
7173,
10757,
6664,
6157,
6675,
4630,
5658,
7217,
10803,
5172,
7733,
573,
2625,
8272,
5714,
9811,
8792,
9829,
6248,
9330,
2168,
2172,
3197,
2179,
10883,
3725,
9361,
9370,
4255,
6311,
7848,
10413,
8879,
10415,
9397,
3771,
4799,
6850,
1219,
... | Test |
10,041 | 6 | DiskXtender:diskxtender emc diskxtender also known dx automated policy-based file system-centric product migrating inactive data higher-cost storage lower-cost disk tape optical devices hierarchical storage management diskxtender produced emc corporation supported windows linux unix environments windows version dx implements file-system filter driver intercepts user mode i/o requests intercepted requests processed dx components necessary files fetched secondary storage media passed back calling applications otherwise processing necessary filter driver nothing simply passes request stack lower level drivers applications implement similar architecture terms file system filters include anti-virus file system replication software 2003 diskxtender one three information lifecycle management offerings emc emc acquired legato system remaining products emailxtender databasextender archive email databases correspondingly diskxtender intercepting i/o operating system capable detecting inactive data migrating data secondary and/or tertiary storage lower cost/gbs still maintaining transparency applications end users applications end users full visibility migrated data access requested migrated data either redirected users applications copied back production system various times rumors end life diskxtender related products | [
5492,
6797,
823
] | Test |
10,042 | 9 | Action_language:action language computer science action language language specifying state transition systems commonly used create formal models effects actions world action languages commonly used artificial intelligence robotics domains describe actions affect states systems time may used automated planning action languages fall two classes action description languages action query languages examples former include strips pddl language generalization strips propositional part pednault adl language b extension adding indirect effects distinguishing static dynamic laws language c adds indirect effects also assume every fluent automatically inertial also action query languages p q r. several different algorithms exist converting action languages particular action language c answer set programs since modern answer-set solvers make use boolean sat algorithms rapidly ascertain satisfiability implies action languages also enjoy progress made domain boolean sat solving action languages supplement definition state transition system set f fluents set v values fluents may take function mapping × f v set states state transition system | [
9345,
10819,
6182,
9926,
9224,
3529,
9385,
7851,
8430,
9494,
1591,
2680,
5081,
1051
] | None |
10,043 | 9 | Evaluation_strategy:evaluation strategy evaluation strategies used programming languages determine evaluate argument function call function also read operation method relation kind value pass function example call value/call reference specifies function application evaluates argument proceeds evaluation function body passes two capabilities function namely ability look current value argument modify via assignment statement notion reduction strategy lambda calculus similar distinct practical terms many modern programming languages converged call-by-value/call-by-reference evaluation strategy function calls c java languages especially lower-level languages c++ combine several notions parameter passing historically call value call name date back algol 60 language designed late 1950s call reference used pl/i fortran systems purely functional languages like haskell well non-purely functional languages like r use call need evaluation strategy specified programming language definition function specific implementation strict evaluation arguments function always evaluated completely function applied church encoding eager evaluation operators maps strict evaluation functions reason strict evaluation sometimes called eager existing programming languages use strict evaluation functions applicative order leftmost innermost evaluation refers evaluation strategy arguments function evaluated left right post-order traversal reducible expressions es applicative order call-by-value evaluation call value also referred pass value common evaluation strategy used languages different c scheme call value argument expression evaluated resulting value bound corresponding variable function frequently copying value new memory region function procedure able assign values parameters local variable assigned—that anything passed function call unchanged caller scope function returns call value single evaluation strategy rather family evaluation strategies function argument evaluated passed function many programming languages common lisp eiffel java use call value evaluate function arguments left-to-right evaluate functions arguments right-to-left others scheme ocaml c leave order unspecified cases term call value problematic value passed value variable understood ordinary meaning value implementation-specific reference value effect syntactically looks like call value may end rather behaving like call reference call sharing often depending subtle aspects language semantics reason passing reference often language technically provide value representation complicated data instead represents data structure preserving semblance value appearance source code exactly boundary drawn proper values data structures masquerading often hard predict c array strings special cases data structure name array treated value reference first element array struct variable name refers value even fields vectors maple vector special case table therefore data structure list gets rendered indexed exactly way value tcl values dual-ported value representation used script level language manages corresponding data structure one required modifications made via data structure reflected back value representation vice versa description call value value reference common understood call reference another term call sharing thus behaviour call value java visual basic call value c pascal significantly different c pascal calling function large structure argument cause entire structure copied except actually reference structure potentially causing serious performance degradation mutations structure invisible caller however java visual basic reference structure copied fast mutations structure visible caller call reference also referred pass reference evaluation strategy function receives implicit reference variable used argument rather copy value typically means function modify i.e assign variable used argument—something seen caller call reference therefore used provide additional channel communication called function calling function call-by-reference language makes difficult programmer track effects function call may introduce subtle bugs simple litmus test whether language supports call-by-reference semantics possible write traditional codice_1 function language many languages support call reference form another comparatively use default fortran ii early example call-by-reference language languages c++ php visual basic .net c realbasic default call value offer special syntax call-by-reference parameters c++ additionally offers call reference const call reference simulated languages use call value n't exactly support call reference making use references objects refer objects pointers objects representing memory addresses objects languages c ml rust use technique separate evaluation strategy—the language calls value—but sometimes referred call address also referred pass address ml references type- memory- safe like rust similar effect achieved call sharing passing object mutated used languages like java python ruby purely functional languages typically semantic difference two strategies since data structures immutable possibility function modify arguments typically described call value even though implementations frequently use call reference internally efficiency benefits following example demonstrates call reference e following example call address simulates call reference c void modify int p int* q int* r int main call sharing also referred call object call object-sharing evaluation strategy first named barbara liskov et al language clu 1974 used languages python iota java object references ruby javascript scheme ocaml applescript many others however term call sharing common use terminology inconsistent across different sources example java community say java call value call sharing implies values language based objects rather primitive types i.e values boxed said pass copy reference primitives boxed passing unboxed called function semantics call sharing differ call reference particular call value mutations arguments performed called routine visible caller call reference access given variables caller merely certain objects e.g variable passed possible simulate assignment variable callee scope however since function access object caller copy made mutations objects objects mutable within function visible caller may appear differ call value semantics mutations mutable object within function visible caller object copied cloned — shared example python lists mutable def f list f print outputs codice_2 codice_3 method modifies object called assignments within function noticeable caller languages passing variable means passing access actual object referred variable access original caller variable since rebound variable exists within scope function counterpart caller retains original binding compare python mutation code binds formal argument new object def f list f print outputs codice_4 statement codice_5 reassigns new list variable rather location references immutable objects real difference call sharing call value except object identity visible language use call sharing mutable objects alternative input/output parameters parameter assigned argument overwritten object identity changed object argument mutated although term widespread usage python community identical semantics languages java visual basic often described call value value implied reference object call copy-restore also referred copy-in copy-out call value result call value return —as termed fortran community special case call reference provided reference unique caller variant gained attention multiprocessing contexts remote procedure call parameter function call reference might accessible another thread execution contents may copied new reference function call returns updated contents new reference copied back original reference restored semantics call copy-restore also differ call reference two function arguments alias one another point variable caller environment call reference writing one affect call copy-restore avoids giving function distinct copies leaves result caller environment undefined depending aliased arguments copied back first—will copies made left-to-right order entry return reference passed callee uninitialized evaluation strategy may called call result partial evaluation evaluation may continue body function applied sub-expressions contain unbound variables evaluated function applications whose argument values known may reduced presence side-effects complete partial evaluation may produce unintended results reason systems support partial evaluation tend pure expressions expressions without side-effects within functions non-strict evaluation arguments function evaluated unless actually used evaluation function body church encoding lazy evaluation operators maps non-strict evaluation functions reason non-strict evaluation often referred lazy boolean expressions many languages use form non-strict evaluation called short-circuit evaluation evaluation returns soon determined unambiguous boolean result—for example disjunctive expression true encountered conjunctive expression false encountered forth conditional expressions also usually use lazy evaluation evaluation returns soon unambiguous branch result normal-order leftmost outermost evaluation evaluation strategy outermost redex always reduced applying functions evaluating function arguments contrast call name evaluate inside body unapplied function call name evaluation strategy arguments function evaluated function called—rather substituted directly function body using capture-avoiding substitution left evaluated whenever appear function argument used function body argument never evaluated used several times re-evaluated time appears see jensen device call-by-name evaluation occasionally preferable call-by-value evaluation function argument used function call name save time evaluating argument whereas call value evaluate regardless argument non-terminating computation advantage enormous however function argument used call name often slower requiring mechanism thunk early use algol 60 today .net languages simulate call name using delegates expression parameters latter results abstract syntax tree given function eiffel provides agents represent operation evaluated needed seed7 provides call name function parameters java programs accomplish similar lazy evaluation using lambda expressions codice_6 interface call need memoized variant call name function argument evaluated value stored subsequent uses argument side-effect free produces results call name saving cost recomputing argument haskell well-known language uses call-by-need evaluation evaluation expressions may happen arbitrarily far computation haskell supports side-effects mutation via use monads eliminates unexpected behavior variables whose values change prior delayed evaluation r arguments passed call-by-need r allows arbitrary side-effects call-by-need arguments lazy evaluation commonly used implementation strategy call-by-need semantics variations exist—for instance optimistic evaluation .net languages implement call need using type codice_7 call macro expansion similar call name uses textual substitution rather capture-avoiding substitution uncautious use macro substitution may result variable capture lead undesired behavior hygienic macros avoid problem checking replacing shadowed variables parameters full β-reduction function application may reduced substituting function argument function using capture-avoiding substitution time may done even within body unapplied function call future also referred parallel call name concurrent evaluation strategy value future expression computed concurrently flow rest program one promises value future needed main program blocks future value promise one promises finishes computing already completed strategy non-deterministic evaluation occur time creation future i.e expression given use future value similar call need value computed computation may deferred value needed may started value future needed local variable function returns computation may terminated part-way implemented processes threads creating future spawn one new processes threads promises accessing value synchronize main thread terminating computation future corresponds killing promises computing value implemented coroutine .net async/await creating future calls coroutine async function may yield caller turn yielded back value used cooperatively multitasking optimistic evaluation another variant call need function argument partially evaluated amount time may adjusted runtime evaluation aborted function applied using call need approach avoids runtime expense call need still retaining desired termination characteristics | [
256,
512,
3462,
6536,
1931,
4877,
6414,
655,
1936,
5521,
6160,
10510,
5911,
3736,
11674,
7580,
9245,
8479,
6306,
8738,
3876,
10616,
5677,
5806,
9008,
692,
3765,
5684,
7479,
8502,
2617,
10555,
10684,
963,
8644,
70,
8262,
5833,
1610,
5961,
... | Validation |
10,044 | 9 | Overhead_code:overhead code overhead code additional excess object code generated compiler provide machine code executed specific cpu code includes translations generic instructions listed cross-platform code tailored execution specific platform architecture example overhead code would code generated handle reference counting source code written high level language example cross-platform code coverage area standalone house space taken enclosures similarly overhead code part program listed source code however needed software operate properly | [
8037,
8262,
5612,
1776,
9330,
9490,
7421
] | Test |
10,045 | 2 | Android_Donut:android donut android donut fourth version open source android mobile operating system developed google longer supported among prominent features introduced update added support cdma smartphones additional screen sizes battery usage indicator text-to-speech engine public release donut—its official dessert-themed code name convention employed google designate major android versions—carriers quick follow roll customers form over-the-air ota update compatible smartphones | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
10284,
5677,
1083,
6212,
69,
8262,
4683,
4685,
11343,
3664,
8280,
8794,
8285,
2658,
8821,
11391,
1670,
7816,
5262,
10393,
8858,
7835,
673,
8870,
1191,
1203,
7359,
196,
3269,
3782,
8907,
2259,
379... | Test |
10,046 | 4 | Associated_Signature_Containers:associated signature containers associated signature containers asic specifies use container structures bind together one signed objects either advanced electronic signatures timestamp tokens one single digital container eidas-regulation associated signature container asic eidas data container used hold group file objects digital signatures and/or time assertions associated objects data stored asic zip format european commission implementing decision 2015/1506 8 september 2015 laid specifications relating formats advanced electronic signatures advanced seals recognised public sector bodies pursuant articles 27 37 eidas-regulation eu member states requiring advanced electronic signature advanced electronic signature based qualified certificate shall recognise xml cms pdf advanced electronic signature conformance level b lt level using associated signature container signatures comply following technical specifications technical specification asics updated standardized since april 2016 european telecommunications standards institute standard associated signature containers asic etsi en 319 162-1 v1.1.1 2016-04 updated standard required european commission implementing decision internal structure asic includes two folders electronic signature file would contain single cades object one xades signatures time assertion file would either contain one timestamp token conform ietf rfc 3161 whereas single evidence record would conform ietf rfc 4998 ietf rfc6283 one purposes electronic signature secure data attached modified done creating dataset combines signature signed data store detached signature separate resource utilize external process re-associate signature data advantageous use detached signatures prevents unauthorized modifications original data objects however risk detached signature become separated associated data happen association would lost therefore data would become inaccessible one widespread deployments asic standard estonian digital signature system use multiplatform windows linux macos osx software called digidoc using correct tool job always important using correct type asic container job hand also important container single file object associated signature time assertion file “ mimetype ” file specifies media type might also included container mimetype file included required first file asic container container type allow additional signatures added future used sign stored file objects long-term time-stamp tokens used asic archive manifest files used protect long-term time-stamp tokens tampering type container hold one signature time assertion files asic-e xades deals signature files asic-e cades deals time assertions files within asic containers apply file object sets file object might additional metadata information associated also protected signature asic-e container could designed prevent modification allow inclusion without causing damage previous signatures asic containers capable maintaining long-term availability integrity storing xades cades signatures use time-stamp tokens evidence record manifest files contained within containers asic containers must comply zip specification limitations applied zip container operates baseline requirements asic simple asic-s container also provides additional time assertion requirements additional elements may within meta-inf folder requires use “ signeddata ” variable include certificate revocation information container baselines asic-e container additional restrictions container complies asic-e baseline requirements along additional requirements restrictions use asic reduces risk electronic signature becoming separated data combining signature signed data container elements secured within asic easier distribute signature guarantee correct signature metadata used validation process also used associating time assertions including evidence records time-stamp tokens associated data | [
5200,
3921,
10801
] | Validation |
10,047 | 9 | Joseph_Henry_Wegstein:joseph henry wegstein joseph henry wegstein april 7 1922 washburn illinois august 16 1985 american computer scientist wegstein attended university illinois graduated master degree physics 1948 worked national bureau standards nist specialized standards automatic data processing particular technology fingerprint recognition participated conferences zurich 1958 paris 1960 developed programming languages algol 58 algol 60 respectively member codasyl committee involved development cobol language | [
512,
8262,
1610,
9804,
8813
] | None |
10,048 | 1 | ACID:acid computer science acid atomicity consistency isolation durability set properties database transactions intended guarantee validity even event errors power failures etc context databases sequence database operations satisfies acid properties perceived single logical operation data called transaction example transfer funds one bank account another even involving multiple changes debiting one account crediting another single transaction 1983 andreas reuter theo härder coined acronym acid shorthand atomicity consistency isolation durability building earlier work jim gray enumerated atomicity consistency durability left isolation characterizing transaction concept four properties describe major guarantees transaction paradigm influenced many aspects development database systems according gray reuter ims supported acid transactions early 1973 although term acid came later characteristics four properties defined reuter härder follows transactions often composed multiple statements atomicity guarantees transaction treated single unit either succeeds completely fails completely statements constituting transaction fails complete entire transaction fails database left unchanged atomic system must guarantee atomicity every situation including power failures errors crashes consistency ensures transaction bring database one valid state another maintaining database invariants data written database must valid according defined rules including constraints cascades triggers combination thereof prevents database corruption illegal transaction guarantee transaction correct referential integrity guarantees primary key foreign key relationship transactions often executed concurrently e.g. multiple transactions reading writing table time isolation ensures concurrent execution transactions leaves database state would obtained transactions executed sequentially isolation main goal concurrency control depending method used effects incomplete transaction might even visible transactions durability guarantees transaction committed remain committed even case system failure e.g. power outage crash usually means completed transactions effects recorded non-volatile memory following examples illustrate acid properties examples database table two columns b integrity constraint requires value value b must sum 100 following sql code creates table described create table acidtest integer b integer check b 100 series database operations atomic transaction either occur none occur series operations separated executed makes series operations indivisible guarantee atomicity prevents updates database occurring partially cause greater problems rejecting whole series outright words atomicity means indivisibility irreducibility alternatively may say logical transaction may made composed one several physical transactions unless component physical transactions executed logical transaction occurred – effects database say logical transaction consists transferring funds account account b logical transaction may composed several physical transactions consisting first removing amount account first physical transaction second transaction depositing said amount account b would want see amount removed account sure transferred account b unless transactions happened amount transferred account b transfer effects database occurred consistency general term demands data must meet validation rules previous example validation requirement b 100 validation rules must checked ensure consistency assume transaction attempts subtract 10 without altering b consistency checked transaction known b 100 transaction begins transaction removes 10 successfully atomicity achieved however validation check show b 90 inconsistent rules database entire transaction must cancelled affected rows rolled back pre-transaction state constraints triggers cascades every single change operation would checked way transaction committed similar issues may arise constraints may required data types b integers enter say value 13.5 transaction cancelled system may give rise alert form trigger if/when trigger written effect another example would integrity constraints would allow us delete row one table whose primary key referred least one foreign key tables demonstrate isolation assume two transactions execute time attempting modify data one two must wait completes order maintain isolation consider two transactions transfers 10 b. transfers 20 b combined four actions operations performed order isolation maintained although must wait consider happens fails halfway database eliminates effects sees valid data interleaving transactions actual order actions might consider happens fails modifying b step 4 time fails already modified restored value without leaving invalid database known write-write failure two transactions attempted write data field typical system problem would resolved reverting last known good state canceling failed transaction restarting interrupted transaction good state consider transaction transfers 10 b first removes 10 adds 10 b point user told transaction success however changes still queued disk buffer waiting committed disk power fails changes lost user assumes understandably changes persist processing transaction often requires sequence operations subject failure number reasons instance system may room left disk drives may used allocated cpu time two popular families techniques write-ahead logging shadow paging cases locks must acquired information updated depending level isolation possibly data may read well write ahead logging atomicity guaranteed copying original unchanged data log changing database allows database return consistent state event crash shadowing updates applied partial copy database new copy activated transaction commits many databases rely upon locking provide acid capabilities locking means transaction marks data accesses dbms knows allow transactions modify first transaction succeeds fails lock must always acquired processing data including data read modified non-trivial transactions typically require large number locks resulting substantial overhead well blocking transactions example user running transaction read row data user b wants modify user b must wait user transaction completes two phase locking often applied guarantee full isolation alternative locking multiversion concurrency control database provides reading transaction prior unmodified version data modified another active transaction allows readers operate without acquiring locks i.e. writing transactions block reading transactions readers block writers going back example user transaction requests data user b modifying database provides version data existed user b started transaction user gets consistent view database even users changing data one implementation namely snapshot isolation relaxes isolation property guaranteeing acid properties distributed transaction across distributed database single node responsible data affecting transaction presents additional complications network connections might fail one node might successfully complete part transaction required roll back changes failure another node two-phase commit protocol confused two-phase locking provides atomicity distributed transactions ensure participant transaction agrees whether transaction committed briefly first phase one node coordinator interrogates nodes participants reply prepared coordinator second phase formalize transaction | [
8195,
9224,
8201,
1034,
2068,
4630,
1049,
5658,
9248,
7202,
6184,
1577,
10793,
1579,
10286,
6709,
1594,
11324,
3648,
1606,
9286,
2632,
9290,
8788,
10326,
4183,
4696,
7767,
1636,
9828,
10340,
8295,
8808,
2669,
1136,
11377,
3188,
9335,
1146,
... | None |
10,049 | 9 | Robin_Milner:robin milner arthur john robin gorell milner 13 january 1934 – 20 march 2010 known robin milner a. j. r. g. milner british computer scientist turing award winner milner born yealmpton near plymouth england military family awarded scholarship eton college 1947 subsequently served royal engineers attaining rank second lieutenant enrolled king college cambridge graduating 1957 milner first worked schoolteacher programmer ferranti entering academia city university london swansea university stanford university 1973 university edinburgh co-founder laboratory foundations computer science lfcs returned cambridge head computer laboratory 1995 eventually stepped although still laboratory 2009 milner sicsa advanced research fellow held part-time chair computer science university edinburgh milner died heart attack 20 march 2010 cambridge wife lucy died shortly milner generally regarded made three major contributions computer science developed lcf one first tools automated theorem proving language developed lcf ml first language polymorphic type inference type-safe exception handling different area milner also developed theoretical framework analyzing concurrent systems calculus communicating systems ccs successor pi-calculus time death working bigraphs formalism ubiquitous computing subsuming ccs pi-calculus also credited rediscovering hindley–milner type system made fellow royal society distinguished fellow british computer society 1988 milner received acm turing award 1991 1994 inducted fellow acm 2004 royal society edinburgh awarded milner royal medal bringing public benefits global scale 2008 elected foreign associate national academy engineering fundamental contributions computer science including development lcf ml ccs pi-calculus see also publications robin milner dblp | [
6536,
7048,
11020,
11032,
415,
6306,
10668,
10031,
2482,
4916,
1976,
4799,
4800,
4930,
70,
8262,
3529,
5585,
3929,
7386,
1883,
4572,
7775,
7394,
9315,
11490,
11242,
2283,
2798,
10102,
1783,
511
] | Validation |
10,050 | 4 | Data_Protection_Officer:data protection officer data protection officer dpo ensures independent manner organization applies laws protecting individuals ’ personal data designation position tasks dpo within organization described articles 37 38 39 eu general data protection regulation gdpr according gdpr data protection officer shall directly report highest management level ’ mean dpo line managed level must direct access give advice senior managers making decisions personal data processing core responsibilities dpo include ensuring his/her organization aware trained relevant gdpr obligations conducting audits ensure compliance address potential issues proactively acting liaison his/her organization public regarding data privacy matters germany since 2001 dpo additional protections laid avoid companies discharge dpo simply job since may 2018 gdpr introduced similar protections across eu gdpr article 38 | [
2818,
3858,
9901
] | None |
10,051 | 3 | Silicon_Graphics:silicon graphics silicon graphics inc. later rebranded sgi historically known silicon graphics computer systems sgcs american high-performance computing manufacturer producing computer hardware software founded mountain view california november 1981 jim clark initial market 3d graphics computer workstations products strategies market positions developed significantly time early systems based geometry engine clark marc hannah developed stanford university derived clark broader background computer graphics geometry engine first very-large-scale integration vlsi implementation geometry pipeline specialized hardware accelerated inner-loop geometric computations needed display three-dimensional images much history company focused 3d imaging major supplier hardware software market silicon graphics reincorporated delaware corporation january 1990 mid late-1990s rapidly improving performance commodity wintel machines began erode sgi stronghold 3d market porting maya platforms major event process sgi made several attempts address including disastrous move existing mips platforms intel itanium well introducing linux-based intel ia-32 based workstations servers failed market mid-2000s company repositioned supercomputer vendor move also failed april 1 2009 sgi filed chapter 11 bankruptcy protection announced would sell substantially assets rackable systems deal finalized may 11 2009 rackable assuming name silicon graphics international remains silicon graphics inc. became graphics properties holdings inc. james h. clark left position electrical engineering associate professor stanford university found sgi 1982 along group seven graduate students research staff stanford kurt akeley david j brown tom davis rocky rhodes marc hannah herb kuta mark grossman along abbey silverstone others ed mccracken ceo silicon graphics 1984 1997 years sgi grew annual revenues 5.4 million 3.7 billion addition 3d graphic capabilities pcs ability clusters linux- bsd-based pcs take many tasks larger sgi servers ate sgi core markets porting maya linux mac os x microsoft windows eroded low end sgi product line response challenges faced marketplace falling share price ed mccracken fired sgi brought richard belluzzo replace belluzzo leadership number initiatives taken considered accelerated corporate decline one initiative trying sell workstations running windows nt called visual workstations instead ones ran irix company version unix put company even direct competition likes dell making difficult justify price premium product line unsuccessful abandoned years later sgi premature announcement migration mips itanium abortive ventures ia-32 architecture systems visual workstation line ex-intergraph zx10 range sgi 1000-series linux servers damaged sgi credibility market 1999 attempt clarify current market position graphics company silicon graphics inc. changed corporate identity sgi although legal name unchanged time sgi announced new logo consisting letters sgi proprietary font called sgi created branding design consulting firm landor associates collaboration designer joe stitzlein sgi continued use silicon graphics name workstation product line later re-adopted cube logo workstation models november 2005 sgi announced delisted new york stock exchange common stock fallen minimum share price listing exchange sgi market capitalization dwindled peak seven billion dollars 1995 120 million time delisting february 2006 sgi noted could run cash end year mid-2005 sgi hired alix partners advise returning profitability received new line credit sgi announced postponing scheduled annual december stockholders meeting march 2006 proposed reverse stock split deal de-listing new york stock exchange january 2006 sgi hired dennis mckenna new ceo chairman board directors mr. mckenna succeeded robert bishop remained vice chairman board directors may 8 2006 sgi announced filed chapter 11 bankruptcy protection u.s. subsidiaries part plan reduce debt 250 million two days later u.s. bankruptcy court approved first day motions use 70 million financing facility provided group bondholders foreign subsidiaries unaffected september 6 2006 sgi announced end development mips/irix line irix operating system production would end december 29 last orders would fulfilled march 2007 support products would end december 2013 sgi emerged bankruptcy protection october 17 2006 stock symbol point sgid.pk canceled new stock issued nasdaq exchange symbol sgic new stock distributed company creditors sgid common stockholders left worthless shares end year company moved headquarters mountain view sunnyvale earlier north shoreline headquarters occupied computer history museum newer amphitheater parkway headquarters sold google locations award-winning designs studios architecture april 2008 sgi re-entered visualization market sgi virtu range visualization servers workstations re-badged systems boxx technologies based intel xeon amd opteron processors nvidia quadro graphics chipsets running red hat enterprise linux suse linux enterprise server windows compute cluster server december 2008 sgi received delisting notification nasdaq market value minimum 35 million requirement 10 consecutive trading days also meet nasdaq alternative requirements minimum stockholders equity 2.5 million annual net income continuing operations 500,000 april 1 2009 sgi filed chapter 11 announced would sell substantially assets rackable systems 25 million sale ultimately 42.5 million finalized may 11 2009 time rackable announced adoption silicon graphics international global name brand bankruptcy court scheduled continuing proceedings hearings june 3 24 2009 july 22 2009 rackable acquisition vizworld magazine published series six articles chronicle downfall sgi hewlett packard enterprise acquired sgi november 2016 allowed hpe place top500 nasa ames research center pleiades sgi ice supercomputer portfolio sgi continuous presence high performance compute silicon graphics inc. second bankruptcy phase renamed graphics properties holdings inc. gphi june 2009 2010 gphi announced significant favorable ruling litigation ati technologies amd june 2010 following patent lawsuit originally filed silicon graphics inc. era following 2008 appeal ati validity '327 silicon graphics inc voluntary dismissal '376 patent lawsuit federal circuit upheld jury verdict validity gphi u.s. patent 6,650,327 furthermore found amd lost right challenge patent validity future proceedings january 31 2011 district court entered order permits amd pursue invalidity affirmative defense trial permit sgi accuse amd radeon r700 series graphics products infringement case april 18 2011 gphi amd entered confidential settlement license agreement resolved litigation matter immaterial amount provides immunity gphi patents alleged infringement amd products including components software designs april 26 2011 court entered order granting parties agreed motion dismissal final judgment 2011-11 gphi filed another patent infringement lawsuit apple inc. delaware involving patents original patent infringement case apple last november alleged violation u.s. patents 6,650,327 '327 '145 '881 2012 gphi filed lawsuit apple sony htc corp lg electronics inc. samsung electronics co. research motion ltd. allegedly violating patent relating computer graphics process turns text images pixels displayed screens affected devices include apple iphone htc evo4g lg thrill research motion torch samsung galaxy galaxy ii sony xperia play smartphones sgi first generation products starting iris integrated raster imaging system 1000 series high-performance graphics terminals based motorola 68000 family microprocessors later iris 2000 3000 models developed full unix workstations first entries 1000 series models 1000 1200 introduced 1984 graphics terminals peripherals connected general-purpose computer digital equipment corporation vax provide graphical raster display abilities used 8 mhz motorola 68000 cpus ram disk drives booted network via excelan exos/101 ethernet card controlling computer used pm1 cpu board variant board used stanford university sun workstation later sun-1 workstation sun microsystems graphics system composed gf1 frame buffer uc3 update controller dc3 display controller bp2 bitplane 1000-series machines designed around multibus standard later 1000-series machines 1400 1500 ran 10 mhz 1.5 mb ram 1400 73 mb st-506 disk drive 1500 474 mb smd-based disk drive xylogics 450 disk controller may used pm2 cpu pm2m1 ram board 2000 series usual monitor 1000 series ran 30 hz interlaced six beta-test units 1400 workstation produced first production unit sgi first commercial computer shipped carnegie-mellon university electronic imaging laboratory 1984 sgi rapidly developed machines workstations second product line — iris 2000 series first released august 1985 sgi began using unix system v operating system five models two product ranges 2000/2200/2300/2400/2500 range used 68010 cpus pm2 cpu module later turbo systems 2300t 2400t 2500t 68020s ip2 cpu module used excelan exos/201 ethernet card graphics hardware gf2 frame buffer uc4 update controller dc4 display controller bp3 bitplane main differences cpu ram weitek floating point accelerator boards disk controllers disk drives st-506 smd available could upgraded example 2400 2400t 2500 2500t larger chassis standard 6 19 eia rack space bottom two smd disk drives weighing approximately non-turbo models used multibus cpu communicate floating point accelerator turbos added ribbon cable dedicated 60 hz monitors used 2000 series height machines using motorola cpus reached iris 3000 series models 3010/3020/3030 3110/3115/3120/3130 30s full-size rack machines used graphics subsystem ethernet 2000s could also use 12 geometry engines first widespread use hardware graphics accelerators standard monitor 19 60 hz non-interlaced unit tilt/swivel base 19 30 hz interlaced 15 60 hz non-interlaced tilt/swivel base also available iris 3130 smaller siblings impressive time complete unix workstations 3130 powerful enough support complete 3d animation rendering package without mainframe support large capacity hard drives standards day two 300 mb drives streaming tape ethernet could centerpiece animation operation line formally discontinued november 1989 3500 systems shipped 2000 3000 models combined introduction iris 4d series sgi switched mips microprocessors machines powerful came powerful on-board floating-point capability 3d graphics became popular television film time systems responsible establishing much sgi reputation sgi produced broad range mips-based workstations servers 1990s running sgi version unix system v called irix included massive onyx visualization systems size refrigerators capable supporting 64 processors managing three streams high resolution fully realized 3d graphics october 1991 mips announced first commercially available 64-bit microprocessor r4000 sgi used r4000 crimson workstation irix 6.2 first fully 64-bit irix release including 64-bit pointers secure supply future generations mips microprocessors 64-bit r4000 sgi acquired company 1992 333 million renamed mips technologies inc. wholly owned subsidiary sgi 1993 silicon graphics sgi signed deal nintendo develop reality coprocessor rcp gpu used nintendo 64 n64 video game console deal signed early 1993 later made public august year console later released 1996 rcp developed sgi nintendo operations department led engineer dr. wei yen 1997 twenty sgi employees led yen left sgi founded artx later acquired ati technologies 2000 1998 sgi relinquished ownership mips technologies inc re-ipo fully divested 2000 late 1990s much industry expected itanium replace cisc risc architectures non-embedded computers sgi announced intent phase mips systems development new mips microprocessors stopped existing r12000 design extended multiple times 2003 provide existing customers time migrate itanium august 2006 sgi announced end production mips/irix systems end year mips/irix products longer generally available sgi second generation onyx reality engine machines sgi offered access high performance 3d graphics subsystems proprietary api known iris graphics language iris gl features added years iris gl became harder maintain cumbersome use 1992 sgi decided clean reform iris gl made bold move allowing resulting opengl api cheaply licensed sgi competitors set industry-wide consortium maintain opengl standard opengl architecture review board meant first time fast efficient cross-platform graphics programs could written day opengl remains real-time 3d graphics standard portable across variety operating systems opengl-es even runs many types cell phones main competitor direct3d microsoft runs microsoft windows-based machines consoles sgi part advanced computing environment initiative formed early 1990s 20 companies including compaq digital equipment corporation mips computer systems groupe bull siemens nec netpower microsoft santa cruz operation intent introduce workstations based mips architecture able run windows nt sco unix group produced advanced risc computing arc specification began unravel little year formation sgi crimson system fsn three-dimensional file system navigator appeared 1993 movie jurassic park movie twister protagonists seen using sgi laptop computer however unit shown actual working computer rather fake laptop shell built around sgi corona lcd flat screen display 1995 film congo also features sgi laptop computer used dr. ross laura linney communicate via satellite travicom hq purple lowercased sgi logo seen beginning opening credits hbo series silicon valley taken replaced google logo intro graphics progress google leased former sgi buildings 2003 headquarters mountain view ca purchased buildings outright 2006 eight consecutive years 1995–2002 films nominated academy award distinguished achievement visual effects created silicon graphics computer systems inexpensive pcs began graphics performance close expensive specialized graphical workstations sgi core business sgi shifted focus high performance servers digital video web many sgi graphics engineers left work computer graphics companies ati nvidia contributing pc 3d graphics revolution 1995 film toy story used silicon graphics indigo2 computers create scenes movie sgi promoter free software supporting several projects linux samba opening previously proprietary code xfs filesystem open64 compiler 1995 sgi purchased alias research kroyer films wavefront technologies deal totaling approximately 500 million merged companies alias|wavefront june 2004 sgi sold business later renamed alias/wavefront private equity investment firm accel-kkr 57.1 million october 2005 autodesk announced signed definitive agreement acquire alias 182 million cash february 1996 sgi purchased well-known supercomputer manufacturer cray research 740 million began use marketing names craylink sgi-developed technology integrated sgi server line three months later sold cray business systems division responsible cs6400 sparc/solaris server sun microsystems undisclosed amount acknowledged later sun executive significantly less 100 million many cray t3e engineers designed developed sgi altix numalink technology sgi sold cray brand product lines tera computer company march 31 2000 35 million plus one million shares sgi also distributed remaining interest mips technologies spin-off effective june 20 2000 september 2000 sgi acquired zx10 series windows workstations servers intergraph computer systems rumored 100 million rebadged sgi systems product line discontinued june 2001 another attempt sgi late 1990s introduce family intel-based workstations running windows nt red hat linux see also sgi visual workstation proved financial disaster shook customer confidence sgi ’ commitment mips-based line 1998 sgi announced future generations machines would based mips processors upcoming super-chip intel code-named merced later called itanium funding high-end processors reduced planned r10000 would last mips mainstream processor mips technologies would focus entirely embedded market success sgi would longer fund development cpu since failure arc found use machines plan quickly went awry early 1999 clear itanium going delivered late would nowhere near performance originally expected production delays increased mips existing r10000-based machines grew increasingly uncompetitive eventually forced introduce faster mips processors r12000 r14000 r16000 used series models 2002 2006 sgi first itanium-based system short-lived sgi 750 workstation launched 2001 sgi mips-based systems superseded launch itanium 2-based altix servers prism workstations time later unlike mips systems ran irix itanium systems used suse linux enterprise server sgi enhancements operating system sgi used transitive corporation quicktransit software allow old mips/irix applications run emulation new itanium/linux platform server market itanium 2-based altix eventually replaced mips-based origin product line workstation market switch itanium completed sgi exited market altix powerful computer world 2006 assuming computer defined collection hardware running single instance operating system altix 512 itanium processors running single instance linux cluster 20 machines eighth-fastest supercomputer faster supercomputers clusters none many flops per machine however recent supercomputers large clusters machines individually less capable sgi acknowledged 2007 moved away massive numa model clusters although sgi continued market itanium-based machines recent machines based intel xeon processor first altix xe systems relatively low-end machines december 2006 xe systems capable itanium machines measures e.g. power consumption flops/w density flops/m cost/flops xe1200 xe1300 servers used cluster architecture departure pure numa architectures earlier itanium mips servers june 2007 sgi announced altix ice 8200 blade-based xeon system 512 xeon cores per rack altix ice 8200 installed new mexico computing applications center 14336 processors ranked number 3 top500 list november 2007 conventional wisdom holds sgi core market traditionally hollywood visual effects studios fact sgi largest revenue always generated government defense applications energy scientific technical computing one case silicon graphics largest single sale ever united states postal services usps sgi servers powered artificial intelligence ai program mechanically read tag sort mail hand-written block number usps key mail centers rise cheap yet powerful commodity workstations running linux windows mac os x availability diverse professional software effectively pushed sgi visual effects industry niche markets sgi continued enhance line servers including supercomputers based sn architecture sn scalable node technology developed sgi mid-1990s uses cache-coherent non-uniform memory access cc-numa sn system processors memory bus- memory-controller coupled together entity called node usually single circuit board nodes connected high-speed interconnect called numalink originally marketed craylink internal bus instead access processors memory i/o devices done switched fabric links routers thanks cache coherence distributed shared memory sn systems scale along several axes cpu count increases memory capacity i/o capacity system bisection bandwidth allows combined memory nodes accessed single os image using standard shared-memory synchronization methods makes sn system far easier program able achieve higher sustained-to-peak performance non-cache-coherent systems like conventional clusters massively parallel computers require applications code written re-written explicit message-passing communication nodes first sn system known sn-0 released 1996 product name origin 2000 based mips r10000 processor scaled 2 128 processors smaller version origin 200 sn-00 scaled 1 4 later enhancements enabled systems large 512 processors second generation system originally called sn-1 later sn-mips released july 2000 origin 3000 scaled 4 512 processors 1,024-processor configurations delivered special order customers smaller less scalable implementation followed called origin 300 november 2002 sgi announced repackaging sn system name origin 3900 quadrupled processor area density sn-mips system 32 128 processors per rack moving fat tree interconnect topology january 2003 sgi announced variant sn platform called altix 3000 internally called sn-ia used intel itanium 2 processors ran linux operating system kernel time released world scalable linux-based computer supporting 64 processors single system node nodes could connected using numalink technology form sgi predictably termed superclusters february 2004 sgi announced general support 128 processor nodes followed 256 512 processor versions year april 2004 sgi announced sale alias software business approximately 57 million october 2004 sgi built supercomputer columbia broke world record computer speed nasa ames research center cluster 20 altix supercomputers 512 intel itanium 2 processors running linux achieved sustained speed 42.7 trillion floating-point operations per second teraflops easily topping japan famed earth simulator record 35.86 teraflops week later ibm upgraded blue gene/l clocked 70.7 teraflops july 2006 sgi announced sgi altix 4700 system 1,024 processors 4 tb memory running single linux system image 68k mips-based models also rebadged vendors including cdc tandem computers prime computer siemens-nixdorf sgi onyx sgi indy series systems used game development nintendo 64 | [
8704,
8711,
7176,
5141,
2071,
2073,
11293,
5156,
6697,
6187,
7215,
4144,
5686,
2620,
7234,
1606,
2638,
3662,
2651,
2652,
7263,
6243,
3172,
7269,
6247,
6250,
2155,
6252,
6253,
6256,
7286,
10871,
1149,
125,
2687,
2179,
4228,
4741,
6791,
986... | Validation |
10,052 | 2 | Apple_GS/OS:apple gs/os gs/os operating system developed apple computer apple ii personal computer uses prodos filing system provides facilities accessing file system controlling input/output devices loading running program files system allowing programs handle interrupts signals gs/os included component apple ii system software versions 4.0 6.0.1 gs/os unlike predecessor written entirely 16-bit code first true 16-bit operating system ii gs/os includes facility known file system translators fsts allows support multiple on-disk file systems manner transparent application programs feature found prodos microcomputer operating systems time usually used prodos file system one could booted gs/os also supports variety file systems including hierarchical file system used mac os file system translators addition prodos hfs include ms-dos high sierra/iso-9660 apple dos 3.3 pascal albeit read-only full read/write support planned never completed another advantage gs/os prodos 16 written 16-bit code 65816 processor used ii rather primarily 8-bit 6502 machine code take advantage ii unique features also extends prodos file system provide resource forks files similar used apple macintosh allows programs written flexible way big change previous versions prodos gs/os incorporates many features macintosh system 5 particular gs/os finder loadable fonts plug-in device drivers modem printer etc. command-line development environment called apw apple programmer workshop available much like macintosh programmer workshop | [
2179,
9732,
10755,
6023,
6539,
7307,
4114,
9762,
11171,
5413,
11430,
3241,
6186,
7983,
3248,
8114,
8754,
7991,
9784,
2363,
7483,
2365,
2366,
8767,
576,
11257,
11513,
8774,
9166,
5457,
213,
3286,
1623,
9308,
7133,
3167,
3681,
5093,
6377,
3... | Test |
10,053 | 2 | Nokia_N8:nokia n8 nokia n8 touchscreen-based smartphone developed nokia announced 27 april 2010 nokia n8 first device run symbian^3 mobile operating system company flagship device year released 30 september 2010 nokia online store released markets around world 1 october 2010 n8 3.5-inch amoled display 16 gigabytes mass memory features 12-megapixel camera second time camera megapixel count used first one sony ericsson satio 2009 xenon flash like nokia n82 large 1/1.83 ” sensor size larger point-and-shoot cameras time also 720p hd video recording pentaband 3.5g radio fm transmitter among connectivity features hdmi output usb on-the-go wi-fi 802.11 b/g/n n8 important device nokia bid increasing competition smartphone industry revamped symbian^3 software also important device delayed several times pushing release date several months negative impact company despite mixed views symbian software n8 hardware build camera quality well received many calling best camera phone n8 would also become nokia last flagship device running symbian due nokia lumia 800 2011 ran windows phone software n8 symbian successor nokia 808 pureview appeared 2012 previous flagship phone nseries n97 criticised initial firmware issues anssi vanjoki nokia executive vice president markets said interview software quality control would better n97 n97 reception highly negative tarnished company image market n8 first device feature symbian^3 operating system initially scheduled second quarter 2010 n8 pushed back third quarter finally released 30 september 2010 due 'final amendments n8 became product customer pre-orders nokia history point release sales q4 2010 estimated almost 4 million previous nokia phone focus photography n86 8mp 8-megapixel sensor become available june 2009 n8 second nokia capacitive touchscreen following x6 first multi-touch nokia n8 dual charging options allowing charged standard-pin nokia charger micro-usb port nokia n8 battery compartment internally contained thus battery entirely straightforwardly removable replaceable users nonetheless although procedure endorsed nokia possible correct tool careful handling change battery. bl-4d 1200 mah lithium-ion battery n8 first nokia smartphone device run symbian^3 operating system 7 february 2012 nokia belle update available n8 nokia suite august year nokia also started roll nokia belle refresh update update brought new features symbian smartphone like html 5 web apps support new set home screen widgets software function n8 smartphone anna operating system update gave communicator support usually reserved e-series devices also new push notification api corresponding app proprietary web browser latest version 7.4.2.6 belle v.111.030.0609 official firmware including video-capturing feature complemented mini hdmi port located top side phone normally mirrors phone screen allows applications built-in video player nokia big screen app selected games output content resolutions 720p corresponding cable provided retail box regions nokia mobile tv headset provides dvb-h tv applications developed using nokia qt framework highlight capabilities nokia n8 camera nokia created short film commuter october 2010 directed mchenry brothers starring dev patel ed westwick charles dance pamela anderson seven-minute film shot entirely phone 720p camera spanish promotion phone also created short video featuring luminescent puppets called www.techfashy.com/2014/11/nokia-launches-their-first-android_18.html love knot phone also used film drums death wo n't long music video using cellscope technology nokia also released another film called dot marketed world smallest stop-motion animation character device also appeared popular showtime tv show dexter bbc tv series hustle well film also phone sarah lund uses third series killing .. asian countries promoted differently fictional character pier roxas nokia project gener8 young rubicam philippines also appeared gma talk show startalk promote device nokia shorts 2011 competition involved 8 short films shot nokia n8 winner splitscreen love story independent film olive first feature-length film 90 minutes made entirely cell phone uses nokia n8 along old fashioned video camera attachment 35 mm lens made exclusively device trick audience realizing made nokia n8 | [
1537,
4609,
11271,
529,
10770,
5143,
2072,
5659,
8735,
4132,
40,
3626,
5677,
10802,
7220,
5175,
1083,
9292,
7246,
1615,
5201,
7253,
5211,
6748,
4704,
1121,
1633,
109,
6276,
3205,
9359,
659,
5274,
669,
6310,
167,
5290,
10410,
690,
7866,
... | Validation |
10,054 | 7 | Livedrive:livedrive livedrive online cloud backup sync storage service owned j2 global company provides users unlimited backup space 2,000 gb sync storage livedrive enables users access data mobile phones tablets currently livedrive apps ios android windows macos chrome os livedrive founded late 2008 andrew michael another investor company nicholas cowell may 2009 three months product launched business offered £100 million buy-out company turned offer stating wanted build company october 2009 livedrive entered us market place via distribution agreement lifeboat distribution international speciality software distribution security application lifecycle virtualization network infrastructure products april 2011 livedrive created april fools video falsely stated company storing files paper using qr codes story picked several press sources true story including cbs money watch february 10 2014 livedrive purchased j2 global livedrive part j2 business cloud services division includes efax evoice fusemail campaigner keepitsafe shutting hundreds user accounts “ excessive bandwidth/storage ” livedrive reported august 2014 facing legal action discontented customers september 2010 livedrive added personal music movie streaming accounts gave users ability listen music collections watch movies remote computer transcoding handled livedrive company also gave users ftp access unlimited versioning | [
6565,
10185,
6797,
4623,
7983,
10161,
5650,
2267
] | Validation |
10,055 | 4 | Argus_–_Audit_Record_Generation_and_Utilization_System:argus – audit record generation utilization system argus – audit record generation utilization system first implementation network flow monitoring ongoing open source network flow monitor project started carter bullard 1984 georgia tech developed cyber security carnegie mellon university early 1990s argus important contributor internet cyber security technology 30 years argus project focused developing aspects large scale network situational awareness network audit trail establishment support network operations netops performance security management motivated telco call detail record cdr argus attempts generate network metadata used perform large number network management tasks argus used many universities corporations government entities including us disa dod dhs ffrdcs gloriad top 100 internet security tool argus designed real-time situational awareness system data used track alarm alert wire-line network conditions data also used establish comprehensive audit network traffic described red book us dod ncsc-tg-005 supplementing traditional intrusion detection system ids based network security audit trail traditionally used historical network traffic measurement data network forensics network behavior anomaly detection nbad argus used extensively cybersecurity end-to-end performance analysis recently software-defined networking sdn research argus also topic network management standards development rmon 1995 ipfix 2001 argus composed advanced comprehensive network flow data generator argus monitor processes packets either capture files live packet data generates detailed network traffic flow status reports flows packet stream argus monitors network traffic data plane control plane management plane internet protocol ip traffic argus captures much packet dynamics semantics flow great deal data reduction store process inspect analyze large amounts network data efficiently argus provides reachability availability connectivity duration rate load good-put loss jitter retransmission data networks delay metrics network flows captures attributes available packet contents layer 2 addresses tunnel identifiers mpls gre ipsec etc ... protocol ids sap hop-count options l4 transport identification rtp detection host flow control indications etc ... argus implemented number packet dynamics metrics specifically designed cyber security argus detects human typing behavior flow particular interest key-stroke detection encrypted ssh tunnels argus generates producer consumer ratio pcr indicates whether network entity data producer and/or consumer important property evaluating potential node involved advanced persistent threat apt mediated exfiltration argus open source gpl project owned managed qosient llc ported operating systems many hardware accelerated platforms bivio pluribus arista tilera software portable many environments little modifications performance auditing entire enterprise internet activity accomplished using modest computing resources | [
5472,
5559,
9665,
10051,
1541,
9381,
939,
9868,
4303,
823,
3323,
5245,
3742
] | None |
10,056 | 3 | PlayStation_2_sales:playstation 2 sales sony playstation 2 best-selling video game console time console sold slightly 500,000 units first day november 2000 marked industry record fastest-selling game console sony planned ship 100,000 units per week remainder year total 1.3 million end year planned ship three million units end march following year sony shipped 10 million consoles north america may 2002 holiday 2002 sales strong 8.5 million units november december 24 previous year sony expected shipments 2003 slip previous years sony projected shipments 20 million versus 22.5 year sony shipped 60 million units september 2003 26.4 million units went north america 19.4 million europe vast majority remaining 14.2 went japan 2004 although console took hit holiday 2003 sales previous year lifetime sales reached 70 million november 29 2005 playstation 2 became fastest game console reach 100 million units shipped accomplishing feat within 5 years 9 months launch achievement occurred faster predecessor playstation took 9 years 6 months reach benchmark europe ps2 sold 6 million units 2006 3.8 million 2007 according estimates ea 2007 ps2 sold 3.97 million units us according npd group 816,419 units japan according enterbrain 2008 ps2 sold 480,664 units japan according enterbrain october 2008 system sold 21 million units japan 150 million units ps2 hardware sold worldwide end 2010 although gameinformer noted units sold retail companies playstation 2 shipments japan ended december 28 2012 week later january 4 2013 sony computer entertainment formally discontinued console last week availability japan december 24 december 30 2012 playstation 2 sold 2,078 units country 928 units week remarkably playstation 2 managed sell better japan week xbox 360 1,986 units well nintendo ds 704 units ps2 sold 158 million units worldwide january 2013 europe sold 56 million units january 2013 according sony computer entertainment europe north america sold 53.65 million units january 2013 japan ps2 sold 23.18 million units january 2013 according famitsu /enterbrain | [
643,
9091,
3077,
10761,
6799,
9508,
9512,
684,
306,
1587,
1091,
6732,
10316,
6873,
4060,
607,
359,
488,
8937,
3824,
5746,
7801,
8316,
6781
] | Test |
10,057 | 5 | Camino_(web_browser):camino web browser camino spanish word meaning path discontinued free open source gui-based web browser based mozilla gecko layout engine specifically designed os x operating system place xul-based user interface used mozilla-based applications camino used mac-native cocoa apis may 30 2013 camino project announced browser longer developed camino aim integrate well possible os x used aqua user interface integrated number os x services features keychain password management bonjour scanning available bookmarks across local network notable features included integrated pop-up blocker ad blocker tabbed browsing included overview feature allowing tabs viewed pages browser developed camino project community organization mike pinkerton technical lead camino project since dave hyatt moved safari team apple inc. mid-2002 late 2001 mike pinkerton vidur apparao started project within netscape prove gecko could embedded cocoa application early 2002 dave hyatt one co-creators firefox called phoenix joined team built chimera small lightweight browser wrapper around work chimera mythological beast parts taken various animals new browser represented early example carbon/c++ code interacting cocoa/objective-c code name must seemed apt first downloadable build chimera 0.1 released february 13 2002 early releases became popular due fast page-loading speeds compared then-dominant mac browser microsoft internet explorer version 5 omnigroup omniweb used cocoa text system rendering engine hyatt hired apple computer mid-2002 start work would become safari meanwhile chimera developers got small team together within netscape dedicated development qa put together netscape-branded technology preview january 2003 macworld conference however two days show aol management decided abandon entire project despite setback skeleton crew qa developers released camino 0.7 march 3 2003 name changed chimera camino legal reasons roots greek mythology chimera popular choice name hypermedia systems one first graphical web browsers called chimera researchers university california irvine also developed complete hypermedia system name spanish path road el camino real aka royal road name chosen continue navigator motif version 0.7 primarily netscape-driven release kept afloat end open source version 0.8 according lead developer pinkerton triumph open source open process people around world helped patches qa bug triage localization artwork evangelism march 2005 camino web site moved mozilla foundation domain mozilla.org camino project domain caminobrowser.org september 2005 pinkerton accepted position google worked closely google firefox team continued work camino twenty percent time camino 1.0 released february 14 2006 first browser mozilla family appear universal binary thanks largely efforts mark mentovai another camino developers camino 2.0 released november 18 2009 introduced many new interface features browser including movable tabs tab preview first camino release acid2-compliant release camino 2.1 2011 developers announced plans transition webkit future versions mozilla dropped support gecko embedding final release 2.1.2 released march 14 2012 may 30 2013 stuart morgan announced camino blog camino reached end longer developed camino 2.0 released november 18 2009 introduced many new interface features browser including moveable tabs tab preview first camino release acid2-compliant current release 2.1.2 scores 99/100 acid3 test camino current html5 support via html5 test standards testbed limited camino 2.1.2 available following languages | [
513,
6657,
9736,
2579,
6171,
2076,
9757,
7713,
3110,
10791,
9770,
559,
2611,
4661,
3639,
10808,
3643,
9275,
64,
9281,
5707,
10834,
5205,
6231,
8281,
2139,
6747,
6237,
2149,
1642,
9834,
10860,
8303,
9841,
115,
9843,
3191,
119,
4728,
637,
... | Validation |
10,058 | 5 | RADIUS:radius remote authentication dial-in user service radius networking protocol operating port 1812 provides centralized authentication authorization accounting aaa triple management users connect use network service radius developed livingston enterprises inc. 1991 access server authentication accounting protocol later brought internet engineering task force ietf standards broad support ubiquitous nature radius protocol often used internet service providers isps enterprises manage access internet internal networks wireless networks integrated e-mail services networks may incorporate modems digital subscriber line dsl access points virtual private networks vpns network ports web servers etc radius client/server protocol runs application layer use either tcp udp transport network access servers gateways control access network usually contain radius client component communicates radius server radius often back-end choice 802.1x authentication well radius server usually background process running unix microsoft windows server radius aaa protocol manages network access aaa stands authentication authorization accounting radius uses two packet types manage full aaa process access-request manages authentication authorization accounting-request manages accounting authentication authorization defined rfc 2865 accounting described rfc 2866 user machine sends request network access server nas gain access particular network resource using access credentials credentials passed nas device via link-layer protocol—for example point-to-point protocol ppp case many dialup dsl providers posted https secure web form turn nas sends radius access request message radius server requesting authorization grant access via radius protocol request includes access credentials typically form username password security certificate provided user additionally request may contain information nas knows user network address phone number information regarding user physical point attachment nas radius server checks information correct using authentication schemes pap chap eap user proof identification verified along optionally information related request user network address phone number account status specific network service access privileges historically radius servers checked user information locally stored flat file database modern radius servers refer external sources—commonly sql kerberos ldap active directory servers—to verify user credentials radius server returns one three responses nas 1 access reject 2 access challenge 3 access accept three radius responses may include reply-message attribute may give reason rejection prompt challenge welcome message accept text attribute passed user return web page authorization attributes conveyed nas stipulating terms access granted example following authorization attributes may included access-accept client configured use radius user client presents authentication information client might customizable login prompt user expected enter username password alternatively user might use link framing protocol point-to-point protocol ppp authentication packets carry information client obtained information may choose authenticate using radius client creates access- request containing attributes user name user password id client port id user accessing password present hidden using method based rsa message digest algorithm md5 accounting described rfc 2866 network access granted user nas accounting start radius accounting request packet containing acct-status-type attribute value start sent nas radius server signal start user network access start records typically contain user identification network address point attachment unique session identifier periodically interim update records radius accounting request packet containing acct-status-type attribute value interim-update may sent nas radius server update status active session interim records typically convey current session duration information current data usage finally user network access closed nas issues final accounting stop record radius accounting request packet containing acct-status-type attribute value stop radius server providing information final usage terms time packets transferred data transferred reason disconnect information related user network access typically client sends accounting-request packets receives accounting-response acknowledgement using retry interval primary purpose data user billed accordingly data also commonly used statistical purposes general network monitoring radius commonly used facilitate roaming isps example radius facilitates use realms identify radius server forward aaa requests processing realm commonly appended user user name delimited sign resembling email address domain name known postfix notation realm another common usage prefix notation involves prepending realm username using '\ delimiter modern radius servers allow character used realm delimiter although practice '\ usually used realms also compounded using prefix postfix notation allow complicated roaming scenarios example somedomain.com\username anotherdomain.com could valid username two realms although realms often resemble domains important note realms fact arbitrary text need contain real domain names realm formats standardized rfc 4282 defines network access identifier nai form 'user realm specification 'realm portion required domain name however practice always followed rfc 7542 replaced rfc 4282 may 2015 radius server receives aaa request user name containing realm server reference table configured realms realm known server proxy request configured home server domain behavior proxying server regarding removal realm request stripping configuration-dependent servers addition proxying server configured add remove rewrite aaa requests proxied time proxy chaining possible radius authentication/authorization accounting packets usually routed nas device home server series proxies advantages using proxy chains include scalability improvements policy implementations capability adjustments roaming scenarios nas proxies home server could typically managed different administrative entities hence trust factor among proxies gains significance inter-domain applications absence end end security radius adds criticality trust among proxies involved proxy chains explained roaming radius exposes users various security privacy concerns generally roaming partners establish secure tunnel radius servers ensure users credentials intercepted proxied across internet concern md5 hash built radius considered insecure radius packet data format shown right fields transmitted left right starting code identifier length authenticator attributes radius codes decimal assigned follows identifier field aids matching requests replies length field indicates length entire radius packet including code identifier length authenticator optional attribute fields authenticator used authenticate reply radius server used encrypting passwords length 16 bytes radius attribute value pairs avp carry data request response authentication authorization accounting transactions length radius packet used determine end avps radius extensible many vendors radius hardware software implement variants using vendor-specific attributes vsas microsoft published vsas vsa definitions many companies remain proprietary and/or ad-hoc nonetheless many vsa dictionaries found downloading source code open source radius implementations example freeradius openradius radius protocol transmits obfuscated passwords using shared secret md5 hashing algorithm particular implementation provides weak protection user credentials additional protection ipsec tunnels physically secured data-center networks used protect radius traffic nas device radius server additionally user security credentials part protected radius yet user-specific attributes tunnel-group ids vlan memberships passed radius may considered sensitive helpful attacker private sufficient identify individual client information well radsec protocol claims solve aforementioned security issues dial-up customers used nsfnet request proposal sent merit network 1991 consolidate various proprietary authentication authorization accounting systems among early respondents livingston enterprises early version radius written meeting early radius server installed unix operating system livingston enterprises acquired lucent together merit steps taken gain industry acceptance radius protocol companies offered radius server charge radius 1997 published rfc 2058 rfc 2059 current versions rfc 2865 rfc 2866 original radius standard specified radius stateless run user datagram protocol udp authentication envisaged radius support password authentication protocol pap challenge-handshake authentication protocol chap point-to-point protocol passwords hidden taking md5 hash packet shared secret xoring hash password original radius also provided 50 attribute value pairs possibility vendors configure pairs choice hop-by-hop security model rather end-to-end encryption meant several proxy radius servers use every server must examine perform logic pass data request exposes data passwords certificates every hop radius servers also ability stop access resources authorisation issued subsequent standards rfc 3576 successor rfc 5176 allowed radius servers dynamically change users authorization disconnect user entirely several commercial open-source radius servers exist features vary look users text files ldap servers various databases etc accounting records written text files various databases forwarded external servers etc snmp often used remote monitoring keep-alive checking radius server radius proxy servers used centralized administration rewrite radius packets fly security reasons convert vendor dialects diameter protocol intended replacement radius authentication authorization accounting aaa protocols use-cases two protocols since diverged diameter largely used 3g space radius used elsewhere one largest barriers diameter replace radius switches access points typically implement radius diameter diameter uses sctp tcp radius typically uses udp transport layer 2012 radius also use tcp transport layer tls security radius protocol currently defined following ietf rfc documents | [
10242,
7,
10271,
2080,
2083,
2085,
2087,
562,
4663,
3064,
3133,
5181,
8265,
4687,
1618,
2134,
10332,
6750,
2143,
1121,
1125,
10341,
10344,
10863,
4725,
5749,
9336,
649,
9868,
3218,
4242,
3732,
9365,
11413,
3742,
9380,
9381,
3751,
168,
375... | None |
10,059 | 3 | FlockDB:flockdb flockdb open-source distributed fault-tolerant graph database managing wide shallow network graphs initially used twitter store relationships users e.g followings favorites flockdb differs graph databases e.g neo4j designed multi-hop graph traversal rather rapid set operations unlike primary use-case redis sets since still process packaged outside twitter use code still rough hence stable release available yet flockdb posted github shortly twitter released gizzard framework uses query flockdb distributed datastore database licensed apache license | [
9922,
9631,
10602,
5677,
5072,
9245,
7347,
11221,
3705,
3485,
7359
] | None |
10,060 | 5 | CCSO_Nameserver:ccso nameserver ccso name-server ph protocol early form database search internet common form used look information telephone numbers email addresses today service largely replaced ldap used mainly early-to-middle 1990s name-server developed steve dorner university illinois urbana–champaign university computing communications services office ccso also exists outlook plugin standalone application known outlookph name-server directories frequently organized gopher hierarchies tools ph qi two components system ph client queried qi server ph protocol formally defined september 1998 however memo issued time references prior use unspecified period time date defines sixteen keywords used server side define record properties also defines clients access records server responses server give ph server communication takes place tcp port 105 commands response initially assumed us-ascii encoding historical reasons unless client explicitly asks 8-bit iso-8859-1 encoding result characters 0x20 0x7e initially sent server raw form characters present entries escaped using defined quoted-printable encoding initial request client text base keyword optionally followed one parameters defined server responds request following example response status request provided rfc memo command defined memo consists keyword followed needed one parameters key words separated spaces tabs end line line must terminated cr+lf style following commands command takes parameters simply asks server report status returns information server version mail domain contact password issues authentication methods list available entry fields server specified name names causes server log specified information current user id without login sets specified option server value used without parameters lists current server settings actual login/logout commands server alias must users ph alias logging allows user change entry view certain fields flag restricted access client normally uses one send password information login command sent one recognized server end session command closing connection distributed nameserver backed flat file database early 1990s indiana university software developer larry hughes implemented version qi called phd written perl backed relational database code distributed open-source license several years prior university transition ldap | [
6657,
8582,
7943,
9757,
10910,
3110,
10791,
10924,
9908,
4661,
10808,
5054,
10174,
9286,
10057,
6993,
4310,
5078,
6231,
10722,
494,
8443,
1520,
9843,
6133,
3191,
3961,
5114,
6651,
637
] | Test |
10,061 | 9 | Orthogonality_(programming):orthogonality programming computer programming orthogonality means operations change one thing without affecting others term most-frequently used regarding assembly instruction sets orthogonal instruction set orthogonality programming language means relatively small set primitive constructs combined relatively small number ways build control data structures language associated simplicity orthogonal design fewer exceptions makes easier learn read write programs programming language meaning orthogonal feature independent context key parameters symmetry consistency example pointer orthogonal concept example ibm mainframe vax highlights concept ibm mainframe two different instructions adding contents register memory cell another register statements shown first case contents codice_1 added contents memory cell result stored codice_1 second case contents codice_1 added contents another register codice_4 result stored codice_1 contrast set statements vax one statement addition case two operands codice_6 codice_7 registers memory cells combination instruction adds contents codice_6 contents codice_7 storing result codice_6 vax ’ instruction addition orthogonal instructions provided ibm hence easier programmer remember use one provided vax design c language may examined perspective orthogonality c language somewhat inconsistent treatment concepts language structure making difficult user learn use language examples exceptions follow though concept first applied programming language orthogonality since become recognized valuable feature design apis even user interfaces small set composable primitive operations without surprising cross-linkages valuable leading systems easier explain less frustrating use | [
9345,
11457,
4483,
9351,
10471,
3529,
11242,
2283,
4107,
11339,
7775,
9710,
4412,
6454,
10617,
3196,
1502,
511
] | Test |
10,062 | 3 | SimpleLinux:simplelinux simplelinux linux distribution uses lzma compression compress system files project started 2007 group malaysian developers simplelinux slackware-based distribution comes live cd persistence version installed medium simplelinux comes multi-tasking operating system runs x window k desktop environment used primary graphical user interface current version k desktop environment used simplelinux kde 3.5 stable extended use compiz fusion also integrated newest simplelinux version simplelinux uses slackpkg install remove upgrade packages network moreover simplelinux provides optional lzm packages official repository applications provided repository compressed lzma | [
10149,
5067,
5356,
499,
5363,
5397,
6583,
7483,
1150
] | Validation |
10,063 | 2 | Kexec:kexec kexec abbreviated kernel execution analogous unix/linux kernel call exec mechanism linux kernel allows booting new kernel currently running one essentially kexec skips bootloader stage hardware initialization phase performed system firmware bios uefi directly loads new kernel main memory starts executing immediately avoids long times associated full reboot help systems meet high-availability requirements minimizing downtime feasible implementing mechanism kexec raises two major challenges support allowing signed kernels booted kexec merged version 3.17 linux kernel mainline released october 5 2014 disallows root user load arbitrary code via kexec execute complementing uefi secure boot in-kernel security mechanisms ensuring signed linux kernel modules inserted running kernel | [
4616,
3082,
5139,
10780,
10785,
3618,
6180,
8242,
9266,
4161,
10817,
8772,
6213,
8268,
589,
593,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
8326,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
1694,
2723,
8364,
10933,
5815,
5822,
5824,
... | None |
10,064 | 3 | Ninja_JaJaMaru-kun:ninja jajamaru-kun released nintendo japanese virtual console december 26 2006 pal regions september 21 2007 part ninja week hanabi festival promotion released north american virtual console october 22 2007 first time game made release outside japan respective regions primary inspiration behind robot ninja haggleman 8-bit style game retro game challenge nintendo ds game stars brother ninja-kun ninja-kid princess sakura kidnapped damazu-dayuu ninja-kun away journey task falls young jajamaru-kun game player starts three lives run jump throw shurikens game divided stages four floors eight ghost-like enemies japanese folklore names displayed stage begins sakura-hime damazu placed unreachable top screen enemies use various projectiles one cause player lose life jajamaru-kun lands top enemy simply temporarily stunned vice versa enemy defeated offscreen spirit appear ascend top screen collected disappeared receive points vary depending enemy among eight enemies one top floor tougher beat others player need careful deal sakura sometimes drop petals player collect damazu sometimes run around dropping bombs advance next stage player must defeat eight enemies using shurikens bricks yield items include three types power-ups collected gamapa-kun giant frog summoned jajamaru-kun riding completely invincible able eat enemies three sakura petals collected player go bonus stage jajamaru-kun bottom damazu top damazu drops bombs player throws shurikens upward player manages hit damazu bonus points awarded jajamaru-kun hit bomb goes next stage | [
616,
2121,
9006,
10931,
5942
] | Test |
10,065 | 2 | Transaction_Management_eXecutive:transaction management executive transaction management executive tmx ncr corporation proprietary transaction processing system running ncr tower 5000-series systems based motorola 680xx cpus system used mainly financial institutions 1980s 1990s basic features tmx operating system listed ncr tower 5000 systems also capable running unix svr3 version | [
1952,
9985,
4546,
2179,
9762,
8262,
2345,
8393,
7983,
2995,
11447,
2045
] | None |
10,066 | 3 | Spelunker_(video_game):spelunker video game originally released micrographic image atari 8-bit family 1983 game later ported commodore 64 re-released broderbund 1984 european publishing rights licensed ariolasoft arcade version followed 1985 game released nintendo entertainment system december 6 1985 japan september 1987 north america msx 1986 sequel released arcades nes september 18 1987 called irem japan player must walk jump increasingly challenging parts cave working finite supply fresh air could replenished various points cave hazards include bats drop deadly guano player ghost haunting cave appearing randomly attempting take player shadow world player character send blast air push ghost away however renders player character immobile seconds thus vulnerable dangers depleting air supply objects collect include sticks dynamite flares keys precise positioning jumping play key factors successfully completing game cave spelunker divided six levels although levels connect seamlessly forming one large map game clearly signals level change certain points showing name next level giving player bonus consisting extra life varying number points splash screen game original atari features excerpt modest mussorgsky pictures exhibition background music versions game including atari re-release feature different title theme nes msx versions additional music gameplay computer gaming world 1985 called spelunker thoroughly enjoyable game ... class act game re-released virtual console north america march 17 2008 europe september 5 2008 wii regions june 6 2013 wii u north america june 27 2013 nintendo 3ds sony computer entertainment japan released spelunker hd playstation 3 downloadable game playstation network store received playstation store best sales award 2009 sony computer entertainment japan game remake nes port high definition graphics 100 levels 10 large caves 10 levels 2015 square enix released free-to-play sequel titled spelunker world playstation 4 playstation vita 2017 new title based spelunker world announced nintendo switch released april 20 2017 japan later released worldwide spelunker party october 19 2017 although spelunker party released physically japan worldwide release digital-only 2016 collaboration happened spelunker neptunia series resulted unlockable minigame mode called neplunker megadimension neptunia vii consists two special dungeons mixes normal gameplay spelunker gameplay mini-game became notorious players due normal controls game suited platforming lack proper tutorial led many players experiencing unintentional deaths game returns series viir playstation vr-compatible remake playstation 4 | [
10931,
2540,
9006
] | None |
10,067 | 2 | BatteryMAX_(idle_detection):batterymax idle detection batterymax idle detection system used computer power management operating system control developed digital research inc. european development centre edc hungerford uk created address new genre portable personal computers laptops ran battery power also integral part novell palmdos 1.0 operating system tailored early palmtops 1992 power saving laptop computers traditionally relied hardware inactivity timers determine whether computer idle would typically take several minutes computer could identify idle behavior switch lower power consumption state monitoring software applications within operating system batterymax able reduce time taken detect idle behavior minutes microseconds moreover switch power states around 18 times second user keystrokes technique named dynamic idle detection includes halting stopping cpu periods microseconds hardware event occurs restart dr dos 5.0 first personal computer operating system incorporate idle detection system power management invented british engineers roger gross john p. constant august 1989 us patent describing idle detection system filed 9 march 1990 granted 11 october 1994 despite taking early lead protection patent batterymax enjoy significant commercial success sidelined disarray followed integration digital research novell inc. 1991 1992 three years invention software power management operating system control became ubiquitous following launch advanced power management apm microsoft intel batterymax uses technique dynamic idle detection provide power savings detecting application whether idle switching power states entering low power mode therefore extending battery life product batterymax employs layered model detection software encapsulated dos character device driver called idle contains hardware-dependent code support dynamic idle detection either linked dr-dos operating system bios loaded dynamically using config.sys device directive overloading built-in default driver versions dr-dos since version 5.0 contained dynamic idle detection support inside operating system kernel operating system believes application idle calls idle bios/driver layer executes custom code written computer manufacturer third parties verify request switch power states using device driver concept batterymax integrated hardware-related power management facilities might provided underlying hardware including interfacing apm acpi system bioses power states computer dependent vary manufacturer manufacturer power savings made number ways including slowing/stopping processor clock speed shutting power complete sub-systems switching power states codice_1 driver uses available hardware assistance detect application accessing components system example application may polling serial port updating graphics screen case device driver determines application fact idle overrides kernel call switch power states passing information back layers allowing application execution resume application idle waiting external event occur example keystroke mouse movement fixed amount time pass dr-dos kernel monitors dos api calls building profile applications behavior certain combinations api calls suggest application idle codice_1 driver able make subtle distinction program genuinely idle instance one polling keyboard tight loop one active also polling keyboard test abort key pressed driver makes distinction monitoring time taken go idle time within specified period driver assumes program idle e.g polling tight loop key pressed time outside specified limit driver assumes processing occurred polling keyboard allows application execution resume without switching power states local variable idle_cntdn specifies time actual time taken go idle compared value variable dynamically calculated initialization recalculated periodically idle detection technique first used improve multi-tasking single-tasking dos applications digital research multi-tasking/multi-user concurrent dos 386 cdos386 operating system programs written single-tasking operating systems ms-dos/pc dos go endless loops interrupted example waiting user press key whilst problem process waiting run wastes valuable processor time could used programs multi-tasking/multi-user environment like cdos386 applications designed multi-tasking environment use api calls sleep idle period time normal dos applications idle detection must used concurrent dos 386 release included idle detection function operating system kernel monitored dos api calls determine whether application useful work fact idle idle process suspended allowing dispatcher schedule another process execution batterymax idle detection patent played important role alleged patent infringement relating software power management operating system control 15 may 2009 st. clair intellectual property consultants inc. filed civil action 09-354 united states district court d. delaware defendants acer inc. dell inc. gateway inc. lenovo group inc. 18 september 2009 filed civil action 09-704 apple inc. toshiba corporation inc actions alleged infringement several u.s. patents owned relating software power management operating system control st. clair asserted henry fung invented software power management operating system control alleged companies infringed st. clair patents therefore owed st. clair royalty payments microsoft intervened behalf defendants filed declaratory judgment st. clair 7 april 2010 seeking judgments non-infringement invalidity fung patents d.i 1 c.a 10-282 intel corporation filed intervention behalf defendants granted 4 june 2010 d.i 178 c.a 09-354 seattle law firm perkins coie llp acting defendants discovered batterymax gross idle detection patent prior art search gross patent earlier priority date fung patents proven would undermine st. clair case 28 february 2011 gross hired intel subject matter expert provide expert witness testimony defendants case gross provided evidence expert report fung invented software power management operating system control sited idle detection patent existence batterymax proof st clair filed motion exclude opinions concerning batterymax attempt gross expert report dismissed 29 march 2013 district court denied st. clair motion declaring gross testimony defendants admissible stating court agrees defendants sufficient corroborating evidence batterymax available public prior fung patents priority date court concludes even batterymax predate fung patents mr gross testimony … would relevant helpful fact finder obviousness inquiry ” | [
10113,
518,
6921,
3216,
2840,
2201,
2729,
7849,
11562,
7983,
178,
4409,
7999,
4548,
10083,
5220,
1515,
2672,
3056,
4337,
9329,
4727,
1400,
11513,
6778
] | Test |
10,068 | 6 | Working_directory:working directory computing working directory process directory hierarchical file system dynamically associated process sometimes called current working directory cwd e.g bsd function current directory process refers file using simple file name relative path opposed file designated full path root directory reference interpreted relative current working directory process example process working directory /rabbit-shoes asks create file foo.txt end creating file /rabbit-shoes/foo.txt computer file systems every directory entry usually named points directory dos unix command shells well microsoft windows command line interpreters cmd.exe windows powershell working directory changed using cd chdir commands unix shells pwd command outputs full pathname current working directory equivalent command dos windows cd chdir without arguments whereas unix cd used without arguments takes user back his/her home directory environment variable pwd unix/linux shells pseudo-environment variables cd windows command.com cmd.exe os/2 dos _cwd _cwds _cwp _cwps 4dos 4os2 4nt etc used scripts one need start external program microsoft windows file shortcuts ability store working directory command.com dr-dos 7.02 higher provides echos variant echo command omitting terminating linefeed used create temporary batchjob storing current directory environment variable like cd later use example alternatively multiuser dos dr-dos 7.02 higher various internal external commands support parameter /b batch modifies output commands become suitable direct command line input redirecting batch file usage parameter commands using input another command chdir would issue directory path like codice_1 command like chdir /b would issue codice_2 instead chdir /b retdir.bat would create temporary batchjob allowing return directory later current working directory also displayed p token codice_3 command keep prompt short even inside deep subdirectory structures dr-dos 7.07 command.com supports w token display deepest subdirectory level default prompt p g would result f.e codice_4 codice_5 prompt n w g would instead yield codice_6 codice_7 respectively similar facility using w w added 4dos well dos absolute paths current working directories volumes internaly stored array-like data structure called current directory structure cds gets dynamically allocated boot time hold necessary number slots drives defined lastdrive structure imposes length-limit 66 characters full path current working directory thus implicitly also limits maximum possible depth subdirectories dos plus older issues dr dos dr dos 6.0 1991 limitation due implementation using dos emulation top concurrent dos- thus cp/m-86- derived kernel internally organized subdirectories relative links parent directories instead absolute paths since palmdos dr dos 6.0 since 1992 higher switched use cds maximum compatibility dos programs well faced limitations present doses programming languages provide interface file system functions operating system including ability set change working directory program c language posix function codice_8 effects system call changes working directory argument text string path new directory either absolute relative old one available called process set working directory function languages visual basic usually spelled codice_9 unlike windows api posix c function neither java programming language java virtual machine supports codice_8 directly change request remained open decade team responsible java considered alternatives though 2008 request denied limited support introduced affecting first codice_11 later codice_12 | [
4870,
1801,
6797,
8975,
3856,
6674,
2201,
11033,
6813,
9762,
7847,
5677,
7983,
178,
11442,
9665,
3522,
8517,
8262,
4423,
4298,
847,
10959,
1750,
4441,
9946,
4966,
8298,
621,
4850,
3571,
5492,
9972,
4727,
5754,
2045,
5759
] | Test |
10,069 | 1 | Imieliński-Lipski_algebra:imieliński-lipski algebra imieliński-lipski algebras extension relational algebra onto tables different types null values used operate relations incomplete information imieliński-lipski algebras defined satisfy precise conditions semantically meaningful extension usual relational operators projection selection union join operators relations operators relations various kinds null values conditions require system safe sense incorrect conclusion derivable using specified subset f relational operators complete sense valid conclusions expressible relational expressions using operators f fact derivable system example well known 3-valued logic approach deal null values supported treatment nulls values sql complete see ullman book show let take sql query q sql query q return empty set results 3-valued semantics currently adopted variants sql case sql null never equal constant – case neither “ spring ” “ fall ” “ winter ” winter semester school codice_1 evaluate maybe codice_2 disjunction maybe maybe evaluates maybe true thus igor part answer course neither rohit igor returned answer indeed regardless semester igor took networks class matter unknown value null selection condition true “ igor ” missed sql sql answer ’ complete according completeness requirements specified tomasz imieliński witold lipski 'incomplete information relational databases also argued 3-valued logic true false maybe never provide guarantee complete answer tables incomplete information three algebras satisfy conditions safety completeness defined imielinski-lipski algebras codd-tables algebra v-tables algebra conditional tables c-tables algebra codd-tables algebra based usual codd singe null values table example codd-table codd-table algebra supports projection positive selections also demonstrated il84 possible correctly extend relational operators codd-tables example basic operation join extendable codd-tables possible define selections boolean conditions involving negation preserve completeness example queries like query q supported order able extend relational operators expressive form null value representation needed tables called v-table v-tables algebra based many different marked null values variables allowed appear table v-tables allow show value may unknown different tuples example table gaurav igor order unknown beer two unknown bars may may different – remain unknown gaurav jane frequent unknown bad y1 thus instead one null value use indexed variables skolem constants v-tables algebra shown correctly support projection positive selection negation occurring selection condition union renaming attributes allows processing arbitrary conjunctive queries desirable property enjoyed v-table algebra relational operators tables performed exactly way case usual relations example conditional table c-table shown additional column “ con ” boolean condition involving variables null values – v-tables following table c-table conditional tables algebra mainly theoretical interest supports projection selection union join renaming closed world assumption also handle operator difference thus support relational operators imieliński-lipski algebras introduced tomasz imieliński witold lipski jr. 'incomplete information relational databases | [
10632,
8201,
8979,
2068,
10389,
7446,
2456,
1049,
5658,
5403,
9631,
9634,
4263,
2344,
7080,
10413,
10286,
9397,
3004,
10048,
5953,
9286,
2901,
10326,
987,
2780,
4065,
9828,
10471,
6124,
2669,
6383,
2544,
10737,
9075,
1146
] | Test |
10,070 | 4 | Oulu_University_Secure_Programming_Group:oulu university secure programming group oulu university secure programming group ouspg research group university oulu studies evaluates develops methods implementing testing application system software order prevent discover eliminate implementation level security vulnerabilities pro-active fashion focus implementation level security issues software security testing ouspg active independent academic research group computer engineering laboratory department electrical information engineering university oulu since summer 1996 ouspg known participation protocol implementation security testing called robustness testing using protos mini-simulation method protos co-operated project vtt number industrial partners project developed different approaches testing implementations protocols using black-box i.e functional testing methods goal support pro-active elimination faults information security implications promote awareness issues develop methods support customer driven evaluation acceptance testing implementations improving security robustness products attempted supporting development process notable result protos project result c06-snmp test suite discovered multiple vulnerabilities snmp work done protos continued protos-genome applies automatic structure inference combined domain specific reasoning capabilities enable automated black-box program robustness testing tools without prior knowledge protocol grammar work resulted large number vulnerabilities found archive file antivirus products group produced two spin-off companies codenomicon continues work protos clarified networks work frontier | [
5636,
2213,
11333,
3887,
2095,
4435,
3133
] | Train |
10,071 | 4 | Credential_Management:credential management credential management also referred credential management system cms established form software used issuing managing credentials part public key infrastructure pki cms software used governments enterprises issuing strong two-factor authentication 2fa employees citizens cms integrates components pki provide one joined-up solution departments issue manage credentials wide selection devices including smart cards usb keys smartphones laptops desktop computers credential management also proposed application programming interface api development world wide web consortium standardizing aspects password managers used web user agents web browsers applications create store use modify username password combinations logins addition management federated credentials single sign-on tokens user agents api developed w3c web application security working group working draft status since april 2016 recommendation-track proposal expected become accepted standard may undergo significant changes occurs credential management api already extended webauthn web authentication proposal reached candidate recommendation status april 2018 adds ability handle public-key authentication common modern web browsers able store automatically enter usernames passwords website logins though often used suboptimal heuristics guessing form fields data supposed filled/stored resulting inconsistent sometimes faulty behavior browsers also trouble filling login forms federated identities user connecting website uses account third-party web service like facebook google twitter authenticate provide identity information credential management specification also aims streamline process changing passwords locally stored password client updated time modified server google chrome included support credential management since version 51 released may 2016 opera included support since version 44 released april 2017 mozilla firefox includes subset api support webauthn since version 60 released may 2018 august 2017 working draft user agents supporting credential management api must implement credential store persistent storage credential objects also include credential chooser allow users interact objects allow deny use logins credentials ideally name favicon associated perhaps along related information help distinguish website service used well ability differentiate credentials multiple accounts site api defines four main javascript methods expose codice_1 interface codice_2 codice_3 codice_4 codice_5 also specifies top-level codice_6 interface object descendant codice_7 codice_8 object types webauthn also defines codice_9 interface object api available user agent connected secure https website browsers still implement auto-filling login information non-secure sites must allow sites benefit automation api provides since could lead accidental exposure passwords credentials addition api access allowed top-level windows within codice_10 elements nested browsing contexts codice_2 method used constructing credential objects memory codice_12 triggers writing object credential store following successful login codice_13 requests potentially relevant credentials storage may presented user credential chooser retrieval requests made user agents required prompt user authorization default though user interface allow flag set allows silent authorization without presenting prompt website reset flag codice_14 method recommended use logging | [
3462,
8584,
7212,
10831,
124
] | None |
10,072 | 2 | Basic_telecommunications_access_method:basic telecommunications access method basic telecommunications access method btam low-level programming interface specified ibm use ibm system/360 start-stop binary synchronous telecommunications terminals later ibm specified higher-level interfaces qtam tcam btam superseded vtam systems network architecture sna devices btam continued supported later iterations system architecture ibm finally withdrew support 2000 btam requires application program transaction processing system handle almost every detail protocol harder using higher-layer protocol permits interfacing non-standard devices non-standard ways btam access method interactively communicating remote terminals usually connected front end processor 270x although support local channel-attached 3270 terminals included btam dynamically builds channel command words ccws reading writing polling terminals deals specific responses terminals according success failure communication channel btam key component ibm early transaction processing systems mtcs cics ims underpinned rise online transaction processing many large commercial banks insurance companies unusual btam later developed access methods vtam co-exist supporting different devices simultaneously transaction processing system material section taken ibm system/360 operating system basic telecommunications access method gc30-2004-6 btam programming requires detailed knowledge characteristics specific terminals used dcb macro used define communications line group br codice_1 br codice_2 coded specify binary synchronous bisync line many operands specify unique characteristics attached terminals terminal list specified codice_3 macro identifies terminals attached line macro specifies line characteristics—start-stop bisync point-to-point multipoint leased line dial — type polling required— wrap around open polling characters telephone number used identify specific remote device line coded codice_4 macro used modify information specific device list execution wrap-around polling list cause device list polled sequentially channel response received reduces load cpu continuous polling programmer specify buffer pool data structure used hold messages transmitted terminals btam construct pool automatically programmer construct pool various ways build macro format pool static dynamic storage previously acquired codice_5 macro acquire format storage automatically read operations btam automatically obtain one buffers pool store received message write operation programmer needs code codice_6 obtain number buffers necessary build output message either case codice_7 used free buffers completion read write tha codice_8 codice_9 include translation tables translate non ebcdic character codes standard os/360 codice_10 codice_11 macros used initiate terminate processing btam line codice_12 macro reinitialize line whatever reason failed open successfully btam provides large number options codice_13 codice_14 macros depending line terminal types current status operations read initial reset read conversational read repeat write initial write break write continue transparent specified codes codice_15 read initial read write operation executed asynchronously channel following read write codice_16 codice_17 macro required wait completion retrieve ending status codice_18 macro cancels outstanding read and/or stops polling line amongst many devices supported btam handles | [
10508,
11024,
5658,
5936,
10040,
2616,
4546,
1219,
11131,
1478,
8393,
8138,
10958,
3669,
868,
7272,
4586,
10094,
3443,
3323
] | Test |
10,073 | 1 | Hong_Kong_shipping_register:hong kong shipping register port hong kong deep water port located southern china one hub ports serving south-east east asia region gateway mainland china city hong kong began colony united kingdom free port became international trade center connecting land sea transport china countries port mature infrastructure well-developed air-sea-land transport helps hong kong maintain position international trade centre transshipment hub part 1997 transfer sovereignty hong kong britain china ship registration system made adjustments 1990 marine department set separate system hong kong shipping register ordinance hong kong ship registration amended accordingly new measures reduce operation cost ship management also improve service quality new system increased hong kong competitive advantage attracting ships port january 2009 hong kong registered ships reached 40.56 million tons 1,380 vessels | [
10408,
5419
] | Test |
10,074 | 9 | Philip_Van_Cleave:philip van cleave philip van cleave born 1952 kankakee illinois american gun rights advocate computer programmer president virginia citizens defense league vcdl 2018 appeared show america instructed preschool children use guns fictitious show van cleave grew illinois 16 mother bought first gun .410 bore shotgun 21 volunteered reserve deputy sheriff san antonio purchased first .357 magnum ruger service revolver van cleave joined virginia citizens defense league 1995 year founded june 2004 received gun rights defender month award citizens committee right keep bear arms van cleave proponent strong interpretation second amendment united states constitution believing open access guns guarantees individual americans right defend put 2004 take back country ever become totalitarian state although gun rights groups citizens committee right keep bear arms criticized vcdl members open carry en masse van cleave defended practice saying helps educate citizens police virginia gun laws also defended vcdl advocacy passing concealed carry laws allow college students carry guns campus permit saying virginia tech shooting one adult students armed building would much better chance somebody would stopped madman 2010 reported pressuring virginia lawmakers legalize gun carrying drinking among non-police officers well police officers long drunk carrying gun arguing 're allowed drink two classes citizens van cleave interviewed 60-minutes nightline washington post host places van cleave appeared daily show 2013 segment gun control australia show interviewed john oliver said gun control end day none works went say united states high gun crime rates many guns oliver replied point 2018 van cleave appeared fake promotional pro-gun rights video advocating arming children toddlers sacha baron cohen showtime spoof interview series america baron cohen disguised israeli ex-mossad agent invited van cleave washington dc receive friend israel award honor israel 70th anniversary fictitious pro-israel group created baron cohen segment van cleave endorses “ kinderguardians ” phony program teach arm schoolchildren young three protect classroom segment van cleave argued since children developed conscience would make effective soldiers notable pro-gun politicians duped fake award appearing segment including former us senate majority leader trent lott former us congressman joe walsh former chief justice alabama supreme court roy moore | [] | None |
10,075 | 9 | Scope_resolution_operator:scope resolution operator computer programming scope enclosing context values expressions associated scope resolution operator helps identify specify context identifier refers particularly specifying namespace specific uses vary across different programming languages notions scoping many languages scope resolution operator written languages notably influenced modula-3 including python go modules objects scope resolution within modules special case usual object member access usual method operator codice_1 used scope resolution languages notably c++ ruby feature scope resolution method access interact various ways see examples php scope resolution operator also called paamayim nekudotayim second word colloquial corruption נקודתיים means “ double colon ” hebrew name paamayim nekudotayim introduced israeli-developed zend engine 0.5 used php 3 although confusing many developers speak hebrew still used php 7 sample error message similar error also occur scope resolution operator present example attempting check whether constant empty triggers error php 5.4 error messages concerning scope resolution operator still include name clarified meaning somewhat less obvious ways trigger error example attempting use following invalid php expression ruby scope resolution specified using namespaces classes modules scope also affected sigils preface variable names | [
1152,
3553,
5059,
8644,
8554,
2029,
10510,
1973,
4341,
10143,
1435,
9245,
6335
] | None |
10,076 | 7 | FMOD:fmod fmod proprietary sound effects engine authoring tool video games applications developed firelight technologies play mix sounds diverse formats many operating systems fmod sound system supplied programmer api authoring tool similar digital audio workstation fmod consists following technologies legacy products fmod sound system advanced plugin architecture used extend support audio formats develop new output types e.g streaming fmod available multiple license schemes fmod written portable c++ thus run many different pc mobile gaming console platforms including microsoft windows x86 x86-64 macos ios linux x86 x86-64 android blackberry wii wii u 3ds nintendo switch xbox xbox 360 xbox one playstation 2 playstation 3 playstation 4 playstation portable playstation vita google native client fmod contains support amd trueaudio sound blaster hardware acceleration fmod play back following audio formats aiff asf asx dls flac fsb fmod sample bank format m3u midi mod mp2 mp3 ogg vorbis pls s3m vag ps2/psp format wav wax windows media audio redirector wma xm xma xbox 360 well raw audio data fmod integrated primary sound-effects system following video game engines fmod used many high-profile commercial games since release partial list | [
2208,
2368,
162,
8071,
8937,
5356,
6797,
10284,
7983,
10316,
8561,
499,
823,
8185,
1916,
2943
] | Test |
10,077 | 7 | Bytemark:bytemark bytemark uk-based server hosting datacentre provider headquartered york united kingdom founded 2002 bytemark computer consulting ltd bytemark first provider virtual machines cloud hosting user-mode linux 2003 2012 bytemark launched bigv public cloud platform designed completely in-house using open source software 2013 bytemark moved £1.2 million datacentre headquarters york yo26 2017 bigv platform renamed bytemark cloud september 2018 bytemark acquired iomart group plc yo26 datacentre uses fresh-air cooling common uk shortlisted innovation medium data center datacenterdynamics awards emea 2013 bytemark servers built using efficient power supplies certified 80plus scheme requires power supplies least 80 efficient 100 rated load reduce bias found traditional recruitment processes bytemark developed anonymous recruitment process 2015 2014 bytemark named one top 50 fastest grown tech companies north northern tech awards revenue growth 44 financially bytemark turned £2.5 million 2013 2014 grew £3 million 2015 bytemark awarded fair tax mark bytemark history contributing supporting free software bytemark offers ongoing discount least 5 free software publishers bytemark support libreoffice provision build server 2009 bytemark became supporter xbmc 2012 bytemark started supporting cyanogenmod build servers 2013 bytemark contributed hosting services worth £150,000 debian project used debian since company founded bytemark also supports openstreetmap dns services servers support version control mailing lists help pages bytemark also support projects social good including sponsoring servers mysociety including fixmystreet theyworkforyou whatdotheyknow | [
4194,
4734
] | Test |
10,078 | 7 | Firefox_Sync:firefox sync firefox sync originally branded mozilla weave browser synchronization feature allows users partially synchronize bookmarks browsing history preferences passwords filled forms add-ons last 25 opened tabs across multiple computers keeps user data mozilla servers according mozilla data encrypted way third party even mozilla access user information also possible user host firefox sync servers indeed entity firefox sync originally add-on mozilla firefox 3.x seamonkey 2.0 built-in feature since firefox 4.0 seamonkey 2.1 firefox sync built top firefox accounts firefox 29 therefore firefox 29 later sync firefox 28 earlier firefox home companion application iphone ipod touch based firefox sync technology allowed users either device access firefox browsing history bookmarks recent tabs also included firefox awesomebar location bar firefox home browser application launches pages either webkit web viewer safari mozilla pulled firefox home app store september 2012 stating would focus resources projects company subsequently released source code firefox home underlying synchronization software december 2014 mozilla announced designing version firefox ios due apple application review policies firefox use built-in ios webkit-based rendering framework instead gecko browser able sync firefox browsing history bookmarks recent tabs mozilla also offers synchronization server application use firefox sync users businesses prefer host synchronization data | [
1664,
9732,
6791,
9736,
1295,
7951,
2836,
10006,
11418,
9757,
7983,
1713,
7861,
11449,
5054,
9152,
9281,
1346,
10057,
2893,
7889,
5078,
6231,
10078,
482,
10722,
9063,
8169,
5612,
10860,
6133,
7543,
4728,
5114,
8443,
637,
6143
] | Validation |
10,079 | 2 | Network_Driver_Interface_Specification:network driver interface specification network driver interface specification ndis application programming interface api network interface cards nics jointly developed microsoft 3com corporation mostly used microsoft windows however open-source ndiswrapper project evil driver wrapper projects allow many ndis-compliant nics used linux freebsd netbsd magnussoft zeta derivative beos supports number ndis drivers ndis forms logical link control llc sublayer upper sublayer osi data link layer layer 2 therefore ndis acts interface media access control mac sublayer lower sublayer data link layer network layer layer 3 ndis library functions often referred wrapper hides underlying complexity nic hardware serves standard interface level 3 network protocol drivers hardware level mac drivers ndis versions supported various windows versions follows traffic accepted nic controlled ndis miniport driver various protocols tcp/ip implemented ndis protocol drivers single miniport may associated one protocols means traffic coming miniport may received parallel several protocol drivers example winpcap adds second protocol driver selected miniport order capture incoming packets furthermore possible simulate several virtual nics implementing virtual miniport drivers send receive traffic single physical nic one example virtual miniport driver usage add virtual nics different virtual lan implementations assume drivers received buffers one must treat incoming buffers read driver changes packet content must allocate buffers miniport type hardware driver part windows driver model usb audio scsi network card adapters usually source binary compatible windows 98 windows 2000 hardware specific control access hardware specific bus class driver another driver type ndis intermediate driver intermediate drivers sit in-between mac ip layers control traffic accepted nic practice intermediate drivers implement miniport protocol interfaces miniport driver protocol driver actually communicate corresponding miniport protocol interfaces reside intermediate driver design enables adding several chained intermediate drivers miniport protocol drivers therefore driver vendors assume interface send traffic implemented last driver chain order write applications using ndis one use samples accompany microsoft windows driver kit wdk passthru sample good starting point intermediate drivers implements necessary details required driver type passes traffic next driver chain | [
10243,
2569,
10769,
9234,
1043,
1055,
2083,
8227,
1575,
1577,
4143,
9263,
11316,
1077,
8246,
8266,
4174,
1617,
4178,
9813,
603,
2145,
1648,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
651,
5259,
653,
6797,
10902,
3224,
4771,
7846,
10... | Test |
10,080 | 2 | Bada:bada bada stylized bada korean discontinued operating system mobile devices smartphones tablet computers developed samsung electronics name derived bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones devices running bada branded wave name unlike samsung devices branded name galaxy encompass whole range samsung devices running android 25 february 2013 samsung announced would stop developing bada moving development tizen instead bug reporting finally terminated april 2014 announcement bada wave s8500 would eventually turn first bada-based phone first shown public mobile world congress 2010 barcelona february 2010 alongside bada applications running bada exhibited including mobile videogames like gameloft asphalt 5 samsung wave s8500 released april year sold one million handsets first four weeks market according samsung companies twitter ea capcom gameloft blockbuster revealed support bada platform arranged development partnerships samsung since launch shared insights vision future mobile apps bada would play role showcase could heard series events held across world year 2010 called developer days addition made public announcement incoming bada developer challenge total prize 2,700,000 usd throughout launch event may 2010 samsung released beta bada software development kit sdk making available general public done partners previous december entice potential developers applications platform august 2010 samsung released version 1.0 bada sdk year later august 2011 version 2.0 bada sdk released samsung s8500 wave launched version 1.0 bada operating system samsung soon released version 1.0.2 included minor fixes european users latest version 1.2 released samsung s8530 wave ii phone alpha-version bada 2.0 introduced 15 february 2011 samsung s8530 wave ii handset current flagship bada handset samsung wave 3 s8600 running bada 2.0 release samsung wave samsung opened international application store samsung apps bada platform samsung apps 2400 applications store also available android samsung feature phones samsung remove bada brand market new os tizen apps store new store around 1000 applications tizen bada samsung defines operating system platform kernel configurable architecture allows using either proprietary real-time operating system hybrid rtos kernel linux kernel according copyrights displayed samsung wave s8500 uses code freebsd netbsd openbsd despite numerous suggestions known bada device date running linux kernel similarly evidence bada uses similar graphics stack tizen os particular efl device layer provides core functions graphics protocols telephony security service layer provides service-centric features sms mapping in-app-purchasing provide features so-called bada server top layer framework layer provides application programming interface api c++ application developers use bada provides various ui controls developers provides assorted basic ui controls listbox color picker tab web browser control based open-source webkit features adobe flash supporting flash 9 10 11 flash lite 4 actionscript 3.0 support bada 2.0 webkit flash embedded inside native bada applications bada supports opengl es 2.0 3d graphics api offers interactive mapping point interest poi features also embedded inside native applications supports pinch-to-zoom tabbed browsing cut copy paste features bada supports many mechanisms enhance interaction incorporated applications include various sensors motion sensing vibration control face detection accelerometer magnetometer tilt global positioning system gps multi-touch native applications developed c++ bada sdk eclipse based integrated development environment ide gnu-based tool chains used building debugging applications ide also contains ui builder developers easily design interface applications dragging dropping ui controls forms testing debugging ide contains emulator run apps publications criticized bada 1.x following issues bada 2.0 version shown ifa 2011 berlin released end december 2011 lot new functions improvements compared version 1.2 introducing features end 2011 samsung released three new models preloaded bada 2.0 ending list devices running short-lived bada chart show global sales bada smartphones second quarter 2010 second quarter 2013 canalys technology market analysis company estimated samsung shipped 3.5 million phones running bada q1 2011 rose 4.5 million phones q2 2011 according gartner q1 2012 bada gained grow index +43 rose 2.7 market share 1.9 q1 2011 south korea fiscal year calendar year | [
2179,
6276,
9605,
8326,
11271,
4364,
3089,
2707,
2835,
9366,
10393,
6301,
5406,
4383,
11294,
673,
2852,
3626,
7727,
3248,
7857,
7983,
7991,
9784,
1083,
2368,
5824,
7492,
69,
8262,
11079,
5067,
7246,
2001,
4305,
2259,
7253,
3542,
3162,
879... | Train |
10,081 | 0 | Articulatory_phonology:articulatory phonology articulatory phonology linguistic theory originally proposed 1986 catherine browman haskins laboratories louis m. goldstein yale university haskins theory identifies theoretical discrepancies phonetics phonology aims unify two treating low- high-dimensional descriptions single system unification achieved incorporating single model idea physical system identified phonetics constrains underlying abstract system identified phonology making units control abstract planning level physical level plan utterance formatted gestural score provides input physically based model speech production task dynamic model elliot saltzman gestural score graphs locations within vocal tract constriction occur indicating planned target degree constriction computational model speech production developed haskins laboratories combines articulatory phonology task dynamics haskins articulatory synthesis system developed philip rubin colleagues | [] | None |
10,082 | 4 | Dwight_Agnew:dwight agnew dwight merle agnew january 1 1902 – october 4 1969 united states navy officer fredericktown ohio destroyer commander world present attack pearl harbor later received navy cross tactical acumen guadalcanal campaign post-war led destroyer squadron 10 later worked national security agency 1956 moved retired list made tombstone admiral agnew married thelma marie biegler daughter united states army officer medal honor recipient george w. biegler dwight agnew born fredericktown ohio january 1 1902 murray agnew emma louise agnew née follin graduating fredericktown high school briefly attended denison university entering united states naval academy graduated naval academy 1926 commissioned ensign prior world war ii agnew held variety shipboard postings serving aboard time nevada number four gun turret crew – leadership – trenchard medal excellence gunnery japanese attack pearl harbor december 7 1941 agnew family – dwight brother henry sisters brothers-in-law latter also navy officers – stationed hawaii time agnew serving commanding officer uss trever destroyer minesweeper like many american ship captains agnew aboard vessel attack began 0755 december 7 command junior officers uss trever sounded general alarm 0757 began returning fire japanese forces seven minutes later successfully downing imperial japanese navy air service aircraft strafing pearl city yacht club well second aircraft maneuvering attack ship frantic orders sortie fleet resulted agnew left behind aboard trever instead putting sea commander helm following attack wasmuth rendezvoused trever agnew rejoined ship trever depth charges already armed set agnew ordered magnetic sweep harbor taking defensive station harbor mouth protect feared second wave attack materialize following week december 14 agnew led trever rescue crew passengers torpedoed norwegian freighter ms høegh merchant høegh merchant sunk japanese submarine attempting navigate safe port following outbreak hostilities august 1942 agnew promoted captain continuing commanding officer agnew received navy cross tactical brilliance repelling attack imperial japanese navy upon trever task unit leading guadalcanal campaign according citation 1943 transferred san francisco california oversee outfitting new subsequently commanding ship engagements pacific received bronze star agnew given command attack transport 1945 commanded battle iwo jima following world war ii agnew held variety staff assignments navy – including naval representative joint american military mission aid turkey – january 1952 february 1953 commanding officer destroyer squadron 10 united states atlantic fleet final three years military career 1956 retirement assigned national security agency upon retirement advanced rank rear admiral died october 4 1969 october 1929 agnew married thelma marie biegler daughter army officer george w. biegler following outbreak world thelma agnew son dwight agnew jr evacuated san diego stay dwight agnew mother living city agnew brother henry also alumnus u.s naval academy instructor academy also held several shipboard assignments world given command post-war period sisters dorothy elizabeth married naval officers | [
7887
] | Validation |
10,083 | 9 | Scheme_(programming_language):scheme programming language scheme programming language supports multiple paradigms including functional imperative programming one three main dialects lisp alongside common lisp clojure unlike common lisp scheme follows minimalist design philosophy specifying small standard core powerful tools language extension scheme created 1970s mit ai lab released developers guy l. steele gerald jay sussman via series memos known lambda papers first dialect lisp choose lexical scope first require implementations perform tail-call optimization giving stronger support functional programming associated techniques recursive algorithms also one first programming languages support first-class continuations significant influence effort led development common lisp scheme language standardized official ieee standard de facto standard called revised report algorithmic language scheme r n rs widely implemented standard r5rs 1998 new standard r6rs ratified 2007 scheme diverse user base due compactness elegance minimalist philosophy also caused wide divergence practical implementations much scheme steering committee calls world unportable programming language family dialects rather single language scheme started 1970s attempt understand carl hewitt actor model purpose steele sussman wrote tiny lisp interpreter using maclisp added mechanisms creating actors sending messages scheme originally called schemer tradition lisp-derived languages planner conniver current name resulted authors use operating system limited filenames two components six characters currently schemer commonly used refer scheme programmer new language standardization process began 2003 scheme workshop goal producing r6rs standard 2006 process broke earlier r n rs approach unanimity r6rs features standard module system allowing split core language libraries number drafts r6rs specification released final version r5.97rs successful vote resulted ratification new standard announced august 28 2007 currently newest releases various scheme implementations support r6rs standard portable reference implementation proposed implicitly phased libraries r6rs called psyntax loads bootstraps properly various older scheme implementations feature r6rs record-type descriptor rtd rtd created used record type representation show memory layout also calculated object field bit mask mutable scheme object field bit masks helped garbage collector know fields without traversing whole fields list saved rtd rtd allows users expand basic rtd create new record system r6rs introduces numerous significant changes language source code specified unicode large subset unicode characters may appear scheme symbols identifiers minor changes lexical rules character data also specified unicode many standard procedures moved new standard libraries form large expansion standard containing procedures syntactic forms formerly part standard new module system introduced systems exception handling standardized syntax-rules replaced expressive syntactic abstraction facility syntax-case allows use scheme macro expansion time compliant implementations required support scheme full numeric tower semantics numbers expanded mainly direction support ieee 754 standard floating point numerical representation r6rs standard caused controversy seen departed minimalist philosophy august 2009 scheme steering committee oversees standardization process announced intention recommend splitting scheme two languages large modern programming language programmers small version subset large version retaining minimalism praised educators casual implementors two working groups created work two new versions scheme scheme reports process site links working groups charters public discussions issue tracking system ninth draft r7rs small language made available april 15 2013 vote ratifying draft closed may 20 2013 final report available since august 6 2013 describing 'small language effort therefore considered isolation successor r6rs scheme primarily functional programming language shares many characteristics members lisp programming language family scheme simple syntax based s-expressions parenthesized lists prefix operator followed arguments scheme programs thus consist sequences nested lists lists also main data structure scheme leading close equivalence source code data formats homoiconicity scheme programs easily create evaluate pieces scheme code dynamically reliance lists data structures shared lisp dialects scheme inherits rich set list-processing primitives codice_1 codice_2 codice_3 lisp progenitors scheme uses strictly dynamically typed variables supports first class procedures thus procedures assigned values variables passed arguments procedures section concentrates mainly innovative features language including features distinguish scheme lisps unless stated otherwise descriptions features relate r5rs standard examples provided section notation === result used indicate result evaluating expression immediately preceding line convention used r5rs subsection describes features scheme distinguished programming languages earliest days aspects scheme strongly influence product scheme language aspects versions scheme programming language 1973 onward share scheme simple language much easier implement many languages comparable expressive power ease attributable use lambda calculus derive much syntax language primitive forms instance 23 s-expression-based syntactic constructs defined r5rs scheme standard 14 classed derived library forms written macros involving fundamental forms principally lambda r5rs says r5rs sec 3.1 fundamental variable binding constructs lambda expression variable binding constructs explained terms lambda expressions example macro implement codice_4 expression using codice_5 perform variable bindings define-syntax let thus using codice_4 defined scheme implementation would rewrite codice_7 codice_8 reduces implementation task coding procedure instantiations 1998 sussman steele remarked minimalism scheme conscious design goal rather unintended outcome design process actually trying build something complicated discovered serendipitously accidentally designed something met goals much simpler intended ... realized lambda calculus—a small simple formalism—could serve core powerful expressive programming language like modern programming languages unlike earlier lisps maclisp scheme lexically scoped possible variable bindings program unit analyzed reading text program unit without consideration contexts may called contrasts dynamic scoping characteristic early lisp dialects processing costs associated primitive textual substitution methods used implement lexical scoping algorithms compilers interpreters day lisps perfectly possible reference free variable inside procedure refer quite distinct bindings external procedure depending context call impetus incorporate lexical scoping unusual scoping model early 1970s new version lisp came sussman studies algol suggested algol-like lexical scoping mechanisms would help realize initial goal implementing hewitt actor model lisp key insights introduce lexical scoping lisp dialect popularized sussman steele 1975 lambda paper scheme interpreter extended lambda calculus adopted concept lexical closure page 21 described ai memo 1970 joel moses attributed idea peter j. landin alonzo church mathematical notation lambda calculus inspired lisp use lambda keyword introducing procedure well influencing development functional programming techniques involving use higher-order functions lisp early lisps suitable expressions lambda calculus treatment free variables formal lambda system axioms complete calculation rule helpful analysis using mathematical logic tools system calculation seen directional deduction syntax lambda calculus follows recursive expressions x z ... parentheses spaces period symbol λ function lambda calculation includes first serve starting point powerful mathematical logic second reduce requirement programmers consider implementation details use imitate machine evaluation finally lambda calculation created substantial meta-theory introduction lexical scope resolved problem making equivalence forms lambda notation practical expression working programming language sussman steele showed new language could used elegantly derive imperative declarative semantics programming languages including algol fortran dynamic scope lisps using lambda expressions simple procedure instantiations control structures environment modifiers introduced continuation-passing style along first description scheme first lambda papers subsequent papers proceeded demonstrate raw power practical use lambda calculus scheme inherits block structure earlier block structured languages particularly algol scheme blocks implemented three binding constructs codice_4 codice_10 codice_11 instance following construct creates block symbol called codice_12 bound number 10 let var 10 blocks nested create arbitrarily complex block structures according need programmer use block structuring create local bindings alleviates risk namespace collision otherwise occur one variant codice_4 codice_10 permits bindings refer variables defined earlier construct thus variant codice_11 designed enable mutually recursive procedures bound one another === 1 0 1 0 2 1 2 2 3 2 3 3 4 4 5 4 5 5 procedures bound single codice_11 may refer one another name well values variables defined earlier codice_11 may refer values defined later codice_11 variant codice_4 named let form identifier codice_4 keyword binds let variables argument procedure whose name given identifier whose body body let form body may repeated desired calling procedure named let widely used implement iteration example simple counter === 1 2 3 4 5 6 7 8 9 10 like procedure scheme procedure created named let first class object scheme iteration construct codice_21 idiomatic scheme use tail recursion express iteration standard-conforming scheme implementations required optimize tail calls support unbounded number active tail calls r5rs sec 3.5 —a property scheme report describes proper tail recursion —making safe scheme programmers write iterative algorithms using recursive structures sometimes intuitive tail recursive procedures named codice_4 form provide support iteration using tail recursion === 0 1 4 9 16 25 36 49 64 81 continuations scheme first-class objects scheme provides procedure codice_23 also known codice_24 capture current continuation packing escape procedure bound formal argument procedure provided programmer r5rs sec 6.4 first-class continuations enable programmer create non-local control constructs iterators coroutines backtracking continuations used emulate behavior return statements imperative programming languages following function codice_25 given function codice_26 list codice_27 returns first element codice_28 codice_27 codice_30 returns true === 7 === f following example traditional programmer puzzle shows scheme handle continuations first-class objects binding variables passing arguments procedures let* yin executed code displays counting sequence codice_31 contrast common lisp data procedures scheme share common namespace whereas common lisp functions data separate namespaces making possible function variable name requiring special notation referring function value sometimes known lisp-1 vs. lisp-2 distinction referring unified namespace scheme separate namespaces common lisp scheme primitives used manipulate bind data used bind procedures equivalent common lisp codice_32 codice_33 primitives define f 10 f === 10 set f f f 6 f === 26 set f lambda n n 12 === 18 set f f 1 f === 13 apply 1 2 3 4 5 6 === 21 === 101 102 103 subsection documents design decisions taken years given scheme particular character direct outcomes original design scheme specifies comparatively full set numerical datatypes including complex rational types known scheme numerical tower r5rs sec 6.2 standard treats abstractions commit implementor particular internal representations numbers may quality exactness exact number produced sequence exact operations involving exact numbers—inexactness thus contagious standard specifies two implementations must produce equivalent results operations resulting exact numbers r5rs standard specifies procedures codice_34 codice_35 used change exactness number codice_35 produces exact number numerically closest argument codice_34 produces inexact number numerically closest argument r6rs standard omits procedures main report specifies r5rs compatibility procedures standard library rnrs r5rs 6 r5rs standard scheme implementations required implement whole numerical tower must implement coherent subset consistent purposes implementation spirit scheme language r5rs sec 6.2.3 new r6rs standard require implementation whole tower exact integer objects exact rational number objects practically unlimited size precision implement certain procedures ... always return exact results given exact arguments r6rs sec 3.4 sec 11.7.1 example 1 exact arithmetic implementation supports exact rational complex numbers define x 1/3 1/4 -1/5 -1/3i 405/50+2/3i x === 509/60+1/3i exact x === example 2 arithmetic implementation supports neither exact rational numbers complex numbers accept real numbers rational notation define xr 1/3 1/4 -1/5 405/50 define xi -1/3 2/3 xr === 8.48333333333333 xi === 0.333333333333333 exact xr === f === f implementations conform r5rs standard second conform r6rs implement full numerical tower scheme supports delayed evaluation codice_38 form procedure codice_39 === 22 === 70 === 22 lexical context original definition promise preserved value also preserved first use codice_39 promise ever evaluated primitives produce handle values known promises used implement advanced lazy evaluation constructs streams r6rs standard longer primitives instead provided part r5rs compatibility library rnrs r5rs 6 r5rs suggested implementation codice_38 codice_39 given implementing promise procedure arguments thunk using memoization ensure ever evaluated irrespective number times codice_39 called r5rs sec 6.4 srfi 41 enables expression finite infinite sequences extraordinary economy example definition fibonacci sequence using functions defined srfi 41 define fibs stream-ref fibs 99 === 218922995834555169026 lisps specify order evaluation procedure arguments scheme order evaluation—including order expression operator position evaluated—may chosen implementation call-by-call basis constraint effect concurrent evaluation operator operand expressions constrained consistent sequential order evaluation r5rs sec 4.1.3 === 3 ev procedure describes argument passed returns value argument contrast lisps appearance expression operator position first item scheme expression quite legal long result expression operator position procedure calling procedure add 1 2 expressions ev ev 1 ev 2 may evaluated order long effect evaluated parallel thus following three lines may displayed order standard scheme example code executed although text one line may interleaved another would violate sequential evaluation constraint r5rs standard also later reports syntax scheme easily extended via macro system r5rs standard introduced powerful hygienic macro system allows programmer add new syntactic constructs language using simple pattern matching sublanguage r5rs sec 4.3 prior hygienic macro system relegated appendix r4rs standard high level system alongside low level macro system treated extensions scheme rather essential part language implementations hygienic macro system also called codice_44 required respect lexical scoping rest language assured special naming scoping rules macro expansion avoids common programming errors occur macro systems programming languages r6rs specifies sophisticated transformation system codice_45 available language extension r5rs scheme time define-syntax invocations macros procedures bear close resemblance—both s-expressions—but treated differently compiler encounters s-expression program first checks see symbol defined syntactic keyword within current lexical scope attempts expand macro treating items tail s-expression arguments without compiling code evaluate process repeated recursively macro invocations remain syntactic keyword compiler compiles code evaluate arguments tail s-expression evaluate variable represented symbol head s-expression call procedure evaluated tail expressions passed actual arguments scheme implementations also provide additional macro systems among popular ones syntactic closures explicit renaming macros codice_46 non-hygienic macro system similar codice_47 system provided common lisp inability specify whether macro hygienic one shortcomings macro system alternative models expansion scope sets provide potential solution prior r5rs scheme standard equivalent codice_48 procedure ubiquitous lisps although first lambda paper described codice_49 similar lisp function eval first revised report 1978 replaced codice_50 took two arguments second third fourth revised reports omitted equivalent codice_48 reason confusion scheme lexical scoping result evaluating expression depends evaluated instance clear whether result evaluating following expression 5 6 evaluated outer environment codice_52 defined result sum operands evaluated inner environment symbol bound value procedure result product two operands r5rs resolves confusion specifying three procedures return environments providing procedure codice_48 takes s-expression environment evaluates expression environment provided r5rs sec 6.5 r6rs extends providing procedure called codice_54 programmer specify exactly objects import evaluation environment dialects lisp including common lisp convention value codice_55 evaluates value false boolean expression scheme since ieee standard 1991 values except f including codice_55 equivalent scheme written evaluate value true boolean expression r5rs sec 6.3.1 constant representing boolean value true codice_57 lisps scheme codice_58 scheme primitive datatypes disjoint one following predicates true scheme object codice_59 codice_60 codice_61 codice_62 codice_63 codice_64 codice_65 codice_66 codice_67 r5rs sec 3.2 within numerical datatype contrast numerical values overlap example integer value satisfies codice_68 codice_69 codice_70 codice_71 codice_62 predicates time r5rs sec 6.2 scheme three different types equivalence arbitrary objects denoted three different equivalence predicates relational operators testing equality codice_73 codice_74 codice_75 type dependent equivalence operations also exist scheme codice_83 codice_84 compare two strings latter performs case-independent comparison codice_85 codice_86 compare characters codice_87 compares numbers r5rs standard standard comment scheme semicolon makes rest line invisible scheme numerous implementations supported alternative conventions permitting comments extend single line r6rs standard permits two entire s-expression may turned comment commented preceding codice_88 introduced srfi 62 multiline comment block comment may produced surrounding text codice_89 codice_90 scheme input output based port datatype r5rs sec 6.6 r5rs defines two default ports accessible procedures codice_91 codice_92 correspond unix notions standard input standard output implementations also provide codice_93 redirection input standard output supported standard standard procedures codice_94 codice_95 implementations provide string ports similar redirection capabilities enabling many normal input-output operations performed string buffers instead files using procedures described srfi 6 r6rs standard specifies much sophisticated capable port procedures many new types port following examples written strict r5rs scheme example 1 output defaulting current-output-port example 2 1 using optional port argument output procedures example 3 1 output redirected newly created file let hello0 lambda display hello world newline example 4 2 explicit file open port close send output file example 5 2 using call-with-output-file send output file similar procedures provided input r5rs scheme provides predicates codice_96 codice_97 character input output codice_98 codice_99 codice_100 codice_101 provided writing reading scheme expressions scheme provides codice_102 codice_103 read operation result returned end-of-file object input port reached end file tested using predicate codice_104 addition standard srfi 28 defines basic formatting procedure resembling common lisp codice_105 function named scheme procedures bound variables r5rs language standard formally mandated programs may change variable bindings built-in procedures effectively redefining r5rs language changes example one may extend codice_106 accept strings well numbers redefining set === 6 === 123 r6rs every binding including standard ones belongs library exported bindings immutable r6rs sec 7.1 redefinition standard procedures mutation forbidden instead possible import different procedure name standard one effect similar redefinition standard scheme procedures convert one datatype another contain character string name predicates end procedures change value already-allocated data end conventions often followed scheme programmers formal contexts scheme standards word procedure used preference function refer lambda expression primitive procedure normal usage words procedure function used interchangeably procedure application sometimes referred formally combination lisps term thunk used scheme refer procedure arguments term proper tail recursion refers property scheme implementations perform tail-call optimization support indefinite number active tail calls form titles standards documents since r3rs revised report algorithmic language scheme reference title algol 60 standard document revised report algorithmic language algol 60 summary page r3rs closely modeled summary page algol 60 report language formally defined standards r5rs 1998 r6rs 2007 describe standard forms keywords accompanying syntax provide control structure language standard procedures perform common tasks table describes standard forms scheme forms appear one row easily classified single function language forms marked l table classed derived library forms standard often implemented macros using fundamental forms practice making task implementation much easier languages note codice_107 defined library syntax r5rs expander needs know achieve splicing functionality r6rs longer library syntax following two tables describe standard procedures r5rs scheme r6rs far extensive summary type would practical procedures appear one row easily classified single function language string character procedures contain -ci names perform case-independent comparisons arguments upper case lower case versions character taken equal implementations take two arguments defined left optional r5rs scheme minimalism many common procedures syntactic forms defined standard order keep core language small facilitate standardization extensions scheme community scheme request implementation srfi process extension libraries defined careful discussion extension proposals promotes code portability many srfis supported scheme implementations srfis fairly wide support different implementations include elegant minimalist design made scheme popular target language designers hobbyists educators small size typical interpreter also popular choice embedded systems scripting resulted scores implementations differ much porting programs one implementation another quite difficult small size standard language means writing useful program great complexity standard portable scheme almost impossible r6rs standard specifies much broader language attempt broaden appeal programmers almost implementations provide traditional lisp-style read–eval–print loop development debugging many also compile scheme programs executable binary support embedding scheme code programs written languages also common relative simplicity scheme implementations makes popular choice adding scripting capabilities larger systems developed languages c. gambit chicken bigloo scheme interpreters compile scheme c makes embedding particularly easy addition bigloo compiler configured generate jvm bytecode also features experimental bytecode generator .net implementations support additional features example kawa jscheme provide integration java classes scheme c compilers often make easy use external libraries written c allowing embedding actual c code scheme source another example pvts offers set visual tools supporting learning scheme scheme widely used number schools particular number introductory computer science courses use scheme conjunction textbook structure interpretation computer programs sicp past 12 years plt run programbydesign formerly teachscheme project exposed close 600 high school teachers thousands high school students rudimentary scheme programming mit old introductory programming class 6.001 taught scheme although 6.001 replaced modern courses sicp continues taught mit textbook design programs matthias felleisen currently northeastern university used institutes higher education introductory computer science courses northeastern university worcester polytechnic institute use scheme exclusively introductory courses fundamentals computer science cs2500 introduction program design cs1101 respectively rose-hulman uses scheme advanced programming language concepts course indiana university introductory class c211 taught entirely scheme introductory class uc berkeley cs 61a 2015 taught entirely scheme save minor diversions logo demonstrate dynamic scope course materials including lecture webcasts available online free charge self-paced version course cs 61as continues use scheme introductory computer science courses yale grinnell college also taught scheme programming design paradigms mandatory course computer science graduate students northeastern university also extensively uses scheme introductory computer science course university minnesota twin cities csci 1901 also uses scheme primary language followed course introduces students java programming language software industry tata consultancy services asia largest software consultancy firm uses scheme month-long training program fresh college graduates scheme is/was also used following | [
512,
10752,
9730,
3076,
4101,
11269,
2056,
9224,
2062,
9231,
6160,
2577,
6673,
5651,
7184,
2069,
9749,
8728,
2585,
4122,
4633,
8221,
9245,
1568,
8226,
8738,
3119,
5684,
9780,
2102,
7734,
9783,
2105,
2620,
3132,
6717,
6718,
2557,
8258,
877... | Test |
10,084 | 2 | Mklivecd:mklivecd mklivecd script linux distributions allows one compile snapshot current hard drive partition data resides settings applications documents bookmarks etc compress iso 9660 cd-image allows easy backup user data also makes easy create customized linux-distribution linux-distributions like pclinuxos include graphical frontend easier script usage | [
5618,
3147,
9902,
1150
] | Test |
10,085 | 2 | IntervalZero:intervalzero intervalzero inc. develops hard real-time software symmetric multiprocessing smp enabled rtx rtx64 software transform microsoft windows general-purpose operating system gpos real-time operating system rtos intervalzero engineering group regularly release new software cf history recent product rtx64 focuses 64-bit symmetric multiprocessing smp replace dedicated hardware based systems digital signal processors dsps field-programmable gate arrays fpgas multicore pcs instance audio mixing surface manufacturer largely deployed dsp based systems switched personal computer pc based systems dedicating multi-core processors real time audio processing founded july 2008 group former ardence executives intervalzero headed ceo jeffrey d. hibbard firm offices waltham nice france munich germany taiwan roc global presence important solutions deployed worldwide primarily industrial automation military aerospace medical devices digital media test simulation software corporate name intervalzero comes firm mission deliver deterministic hard real-time functionality interval zero technical definition optimal experience system command execution intervalzero lineage traces back 1980 group massachusetts institute technology mit engineers started venturcom began develop expertise embedded technology time venix developed marketed first innovation focus windows nt 4.0 possible real-time solution industry 1995 releasing rtx since lot controllers pc windows based second innovation came second product component integrator makes windows nt 4.0 embedded os licensed microsoft years later became origin windows nt embedded 2004 venturcom renamed ardence 20 december 2006 citrix systems announced agreement acquire ardence enterprise embedded software businesses integrated software streaming products citrix portfolio 2007 early 2008 2008 group former ardence executives founded intervalzero acquired ardence embedded software business citrix systems inc. citrix retained minority ownership firm intervalzero develops following products | [
640,
8576,
2476,
6797,
3886,
3250,
10675,
9366,
4792,
5371,
6207
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.