node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
10,086 | 7 | Apcera:apcera apcera american cloud infrastructure company provides container management platform deploy orchestrate govern containers applications across on-premises cloud-based infrastructure apcera founded 2012 san francisco derek collison previously technology leader google tibco vmware designed first open platform-as-a-service paas cloud foundry apcera ’ primary offering apcera cloud platform provides governance security policy driven model allowing safe deployment management cloud-native applications microservices legacy applications well resources network services access user permissions according forbes tech apcera cloud platform enables clients manage migration legacy infrastructure newer approaches ... allows achieve significantly faster time-to-market … critical deployments without sacrificing crucial security requirements ” september 2014 ericsson acquired majority stake apcera cloud policy compliance apcera cloud platform available two forms community edition enterprise edition community edition free used deployment single infrastructure enterprise edition functionality deploy workloads multiple infrastructures apcera cloud platform allows user create set rules control available resources container level addition allows user connect back-end services outside platform maintaining governance allows users build workload move around container without re-writing code — needs connections made containers apcera also develops provides support several open source software projects including nats cloud-native enterprise messaging system kurma container runtime extensibility flexibility libretto golang virtual machine provisioning library public private clouds apcera ’ customers include nextsource ericsson qualcomm cygate rodan fields | [
1435,
9863
] | Test |
10,087 | 6 | FAT_filesystem_and_Linux:fat filesystem linux linux several filesystem drivers file allocation table fat filesystem format commonly known names used codice_1 command invoke particular drivers kernel msdos vfat umsdos linux filesystem drivers support three fat types namely fat12 fat16 fat32 differ provision support long filenames beyond 8.3 filename structure original fat filesystem format provision unix file semantics exist standard fat filesystem format file permissions filesystem drivers mutually exclusive one used mount given disk volume given time thus choice among determined long filenames unix semantics support use one wants make disk volume msdos filesystem driver provides extra unix file semantics long filename support fat disk filesystem mounted using driver 8.3 filenames visible long filenames accessible long filename data structures kind disk volume maintained vfat filesystem driver provides long filename support using disk data structures microsoft windows uses vfat long filename support fat format volumes support extra unix file semantics umsdos filesystem driver provides long filename support extra unix file semantics however using on-disk data structures recognized filesystem drivers operating systems linux key advantage umsdos three provides full unix file semantics therefore used situations desirable install linux run fat disk volume require semantics available however linux installed running disk volume slower linux installed running disk volume formatted example ext2 filesystem format unless utility program regularly run every time one switches running windows running linux certain changes made files directories disk windows cause error messages inaccessible files linux vfat whilst lacking full unix file semantics lacking ability linux installed running fat disk volume aforementioned disadvantages umsdos comes simply sharing data fat disk volume linux operating systems windows data structures used windows vfat long filenames require running synchronization utility order prevent windows linux data structures becoming disjointed reason appropriate linux fat filesystem drivers use majority situations mentioned previously linux filesystem drivers support three file allocation table sizes 12-bit 16-bit 32-bit common features support various linux mounting options specified codice_2 option codice_1 command umsdos fat filesystem driver stores extra information relating unix file semantics another fat filesystem driver appears normal file directory subdirectory named codice_14 absence file given directory thus default umsdos filesystem driver provides semantics msdos filesystem driver directory 8.3 filenames extra unix file semantics enable umsdos driver extra abilities necessary create file directory synchronize internal data normal fat data existing entries already directory done tool called codice_15 utility program run across every directory disc volume every time one switches running windows running linux order umsdos filesystem driver incorporate changes made files directories windows private data structures codice_14 file default codice_15 tool creates codice_14 files directories already exist resulting file every directory disc volume switching windows linux behaviour often considered desirable therefore normal mode operation invoking codice_15 switching windows linux usually done running tool linux boot time startup script employ codice_20 option command prevents creation new codice_14 files directories already possess mentioned umsdos permits installing linux bootstrapping running fat format disc volume advantage permits use linux computer dos already installed without requiring hard disc repartitioned linux bootstrapped directly volume boot record scenario instead dos first bootstrapped loadlin linld used bootstrap linux dos convention installation linux root directory subdirectory actual root directory dos boot volume e.g codice_22 various linux top-level directories thus dos directories codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 forth umsdos filesystem driver automatically prepends codice_29 pathnames location linux root directory supplied umsdos filesystem driver first place via option codice_30 command example aforegiven root directory codice_30 would invoked command line loadlin c \linux\boot\vmlinuz rw root=c \linux installation linux directory first place simply involves unpacking files archive directory subdirectories installation also generally requires use swap file rather swap partition linux however related desire repartition hard disc unrelated umsdos filesystem driver per se major linux distributions including redhat suse debian employ umsdos permit installation linux fat disc volume distributions however include distributions phat linux installs codice_32 dos unpacking zip file booted running command.com script named codice_33 zipslack umsdos project started 1992 jacques gelinas made available net january 1994 patch included standard distribution starting kernel 1.1.36 umsdos removed linux 2.6.11 kernel lack maintenance uvfat extension umsdos use windows data structures long filenames instead discontinued release work 2.4.x kernels earlier linux distributions used umsdos mulinux monkey linux winlinux 2000 although filesystem drivers kernel make possible access files directories fat formatted volumes normal manner also possible without kernel driver support using utility programs form mtools utility suite like vfat fat filesystem driver mtools provides long filename support using disc data structures microsoft windows uses alternately one fuse filesystem drivers may used—fatfuse fusefat mountlo modern equivalent umsdos posix overlay filesystem posixovl works fuse | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
4708,
5220,
9836,
7789,
9840,
9333,
6263,
9335,
9343,
7818,
6797,
654,
2193,
2194,
2197,
2199,
2201,
11419,
6309,
1190,
5286,
10405,
7344,
178,
2230,
5816,
1212,
8380,
10... | Validation |
10,088 | 5 | Cyberduck:cyberduck cyberduck open-source client ftp sftp webdav cloud storage openstack swift amazon s3 backblaze b2 microsoft azure available macos windows version 4.0 licensed gpl cyberduck written java c using cocoa user interface framework macos windows forms windows supports ftp/tls ftp secured ssl/tls using auth tls well directory synchronization user interacts user interface gui including file transfer drag drop notifications via growl also able open files external text editors cyberduck includes bookmark manager supports apple keychain bonjour networking supports multiple languages including english catalan czech chinese traditional simplified danish dutch finnish french german hebrew hungarian indonesian italian japanese korean norwegian polish portuguese russian slovak spanish swedish thai turkish ukrainian welsh cyberduck creator also provides version command-line interface cli called duck available windows macos linux website duck.sh | [
3969,
1935,
546,
1960,
11178,
2603,
5677,
7983,
2864,
823,
576,
11201,
7364,
1101,
8909,
8147,
10971,
4194,
10851,
9320,
4457,
8303
] | None |
10,089 | 9 | JOVIAL:jovial jovial high-level computer programming language similar algol specialized development embedded systems specialized computer systems designed perform one dedicated functions usually embedded part complete device including mechanical parts jovial developed new high-order programming language beginning 1959 team system development corporation sdc headed jules schwartz compose software electronics military aircraft name jovial acronym jules version international algorithmic language international algorithmic language ial name originally proposed algol 58 according schwartz language originally called ovial met opposition various reasons jovial suggested meaning attached j somewhat jokingly suggested language named schwartz since chairing meeting unofficial name stuck 1960s jovial part us military l-project series particular 465l saccs project due lack real-time processing languages available 95 percent saccs project managed itt software primarily written sdc written jovial software project took two years fewer 1400 programmer years less half equivalent time sage l-project late 1970s early 1980s u.s. air force adopted standardized cpu mil-std-1750a subsequent jovial programs built processor several commercial vendors provided compilers related tools build jovial processors mil-std-1750a including advanced computer techniques act tld systems proprietary software systems pss others jovial standardized 1973 mil-std-1589 revised 1984 mil-std-1589c still much used update maintain software older military vehicles aircraft three dialects common use j3 j3b-2 j73 jovial longer maintained distributed usaf jovial program office jpo software previously distributed jpo still available commercial resources software engineering associates inc. sea combinations host/target processors including microsoft windows linux mac os x powerpc sparc vax 1750a powerpc ti-9989 zilog z800x motorola 680x0 ibm system 360/system 370/system z addition ddc-i acquired parts advanced computer techniques also still lists jovial compilers related tools software implemented jovial mission critical maintenance getting difficult december 2014 reported software derived jovial code produced 1960s involved major failure united kingdom air traffic control infrastructure agency uses train staff jovial could maintain software scheduled replacement 2016 conversion jovial code new platforms therefore becoming common jovial rehosting retargeting currently done software engineering associates conversions jovial languages currently done semantic designs whose dms software reengineering toolkit used convert jovial mission software b-2 bomber c. languages influenced jovial include coral sympl space programming language spl extent cms-2 interactive subset jovial called tint similar joss developed 1960s jovial includes features found standard algol records arrays records inline assembly language notable systems using jovial include airborne radar systems embedded jovial software include apg-70 apg-71 apg-73 following example taken computer programming manual jovial j73 language proc retrieve code value example defines procedure named codice_1 takes unsigned integer input argument codice_2 floating-point output argument codice_3 searches 1000-element array codice_4 entry matches codice_2 sets floating-point variable codice_3 element array codice_7 matching array index matching element found codice_3 set codice_9 | [
512,
9345,
4998,
6797,
11153,
3613,
5551,
823,
11447,
10430,
1610,
1611,
9804,
721,
11219,
11604,
11625,
10474,
1776,
9330,
10098,
2804,
1399,
8700,
2045
] | Test |
10,090 | 7 | Salesforce.com:salesforce.com salesforce.com inc. usually abbreviated sf sfdc american cloud-based software company headquartered san francisco california though bulk revenue comes customer-relationship management crm service salesforce training also sells complementary suite enterprise applications focused customer service marketing automation analytics application development salesforce ranked first fortune 100 best companies work 2018 company founded 1999 former oracle executive marc benioff parker harris dave moellenhoff frank dominguez company specializing software service saas harris moellenhoff dominguez three software developers previously consulting firm left coast software introduced benioff friend former oracle colleague bobby yazdani harris team wrote initial sales automation software launched first customers sept-nov 1999 june 2004 company initial public offering new york stock exchange stock symbol crm raised us 110 million early investors include larry ellison magdalena yesil halsey minor stewart henderson mark iscaro igor sill geneva venture partners july 2012 salesforce applied trademark term social enterprise united states european union jamaica term widespread use describe businesses primarily social purpose successfully challenged campaign called notinourname launched social enterprise uk resulting salesforce.com withdrawing trademark application agreeing use term future marketing october 2014 salesforce announced development customer success platform tie together salesforce services including sales service marketing analytics community mobile apps october 2017 salesforce launched facebook analytics tool business-to-business marketers september 2018 salesforce partnered apple intended improving apps businesses salesforce.com customer-relationship management crm service comprises several broad categories commerce cloud sales cloud service cloud data cloud including jigsaw marketing cloud community cloud including chatter analytics cloud app cloud iot 100,000 customers salesforce primary enterprise offering within salesforce platform provides companies interface case management task management system automatically routing escalating important events salesforce customer portal provides customers ability track cases includes social networking plug-in enables user join conversation company social networking web sites provides analytical tools services including email alert google search access customers entitlement contracts lightning platform also known force.com platform service paas allows developers create add-on applications integrate main salesforce.com application third-party applications hosted salesforce.com infrastructure force.com applications built using declarative tools backed lightning apex proprietary java-like programming language force.com lightning visualforce framework includes xml syntax typically used generate html force.com platform typically receives three complete releases year platform provided service developers every single development instance also receives updates spring 2015 release new framework building user interfaces – lightning components – introduced beta lightning components built using open-source aura framework support apex server-side language instead aura javascript dependency described alternative necessarily replacement visualforce pages according september 2009 gartner group report force.com 1,000 customer accounts 2013 force.com platform 1.4 million registered developers community cloud provides salesforce customers ability create online web properties external collaboration customer service channel sales custom portals instance salesforce tightly integrated sales cloud service cloud app cloud community cloud quickly customized provide wide variety web properties work.com previously rypple social performance management platform helps managers employees improve work performance continuous coaching real-time feedback recognition marketed solution sales performance customer service marketing service employed human resource departments work.com known rypple founded daniel debow david stein wanted create simple way asking feedback anonymously work company formed may 2008 client list included mozilla facebook linkedin gilt groupe rypple 'reverses onus demand feedback getting employees build manage coaching networks september 2011 rypple announced hired bohdan zabawskyj chief technology officer 2011 rypple developed formalized management methodology called okr objectives key results spotify rypple also partnered facebook create loops short feedback loops gathers feedback co-workers thank progress goals coaching supervisors one channel rich robust continuous performance review december 2011 salesforce.com announced would acquire rypple transaction completed 2012 rypple rebranded work.com september 2012 launched 2005 salesforce appexchange online application marketplace third-party applications run force.com platform applications available free well via yearly monthly subscription models applications available range integrations sharepoint mobile approval management june 2016 features 2,948 applications driven 3+ million installs appexchange also place customers search cloud consulting partners help implement technology organization cloud consulting partners salesforce include large companies like ibm bluewolf accenture well smaller ones like cloudreach announced 2017 launched 2019 salesforce mytrailhead online training platform customized specific needs customers platform extends functionality salesforce built provide users training content specific usage salesforce enables users create publish training content programs announced may 29 2019 salesforce launched blockchain platform facilitate building blockchain network apps integrated crm data.com previously known jigsaw cloud-based automated system acquiring managing crm records within user salesforce.com account data.com also online business directory companies business professionals built maintained accessed worldwide community million subscribers. information consisted commonly found business card data.com competitors included services dun bradstreet/avention zoominfo data.com made three products data.com connect data.com clean data.com prospector april 2018 salesforce announced would retire data.com connect may 4 2019 salesforce also announced wind data.com clean data.com prospector services close july 31 2020 desk.com saas help desk customer support product accessible cloud desk.com owned salesforce.com previously known assistly desk.com headquartered san francisco california acquired salesforce.com 50 million 2011 assistly re-branded desk.com 2012 customer support software desk.com saas customer service application product differentiates salesforce service platform desk.com specifically targets small businesses features functions desk.com integrates variety products third-party applications including salesforce crm salesforce iq atlassian jira mailchimp apps desk.com also supports 50 languages salesforce announced retirement desk.com replacing service cloud lightning march 13 2018 new desk.com licenses sold retirement date announced march 13 2020 do.com cloud-based task management system small groups businesses introduced 2011 discontinued 2014 salesforce offer reason shutting service however provided export tool save data entered within do.com interface do.com domain sold startup 2014 salesforce users configure crm application system tabs contacts reports accounts tab contains associated information configuration done tab adding user-defined custom fields configuration also done platform level adding configured applications salesforce instance adding sets customized novel tabs specific vertical- function-level finance human resources etc features addition web interface salesforce offers soap/rest web service application programming interface api enables integration systems salesforce works model–view–controller architecture apex proprietary programming language provided force.com platform developers similar java c strongly typed object-oriented case-insensitive programming language following dot-notation curly-brackets syntax apex used execute programmed functions processes force.com platform including custom buttons links event handlers record insertion update deletion via scheduling via custom controllers visualforce pages due multitenant nature platform language strictly imposed governor limitations guard code monopolizing shared resources salesforce provides series asynchronous processing methods apex allow developers produce longer-running complex apex code 2014 salesforce made public front end platform called lightning component-based framework salesforce mobile app built salesforce built framework 2015 releasing lightning design system html style framework default css styling built framework allows customers build components either use internal instances sell appexchange salesforce lightning app builder tool rapid application development responsive web interfaces interface allows different screens put together based lightning components used layouts records specific applications lightning experience new redesigned interface salesforce processes enhancement released 2016 since apps available appexchange need lightning built classic migrate lightning classic updated salesforce platform offers option developers employ migration techniques enable new user interface switch lightning salesforce headquartered san francisco regional headquarters morges switzerland covering europe middle east africa singapore india covering asia pacific minus japan tokyo covering japan major offices toronto chicago new york city london sydney dublin hyderabad san mateo california indianapolis hillsboro oregon salesforce.com services translated 16 different languages july 31 2011 104,000 customers 2.1 million subscribers salesforce move midwest regional headquarters indianapolis 2017 standard poor included salesforce time fastenal p 500 index september 2008 following federal takeover fannie mae freddie mac removal index fiscal year 2018 salesforce reported earnings us 127 million annual revenue us 10.480 billion increase 24.9 previous fiscal cycle salesforce shares traded 131 per share market capitalization us 102.5 billion october 2018 salesforce ranked 285 2018 fortune 500 list largest united states companies revenue salesforce migrated dell servers advanced micro devices processors running linux sun fire e25k servers sparc processors running solaris 2008 company uses momentum platform message systems allow customers send large amounts email 2012 salesforce announced plans build data center uk handle european citizens personal data 2013 salesforce oracle announced nine-year partnership salesforce use oracle linux oracle exadata oracle database java platform power salesforce applications saas platform 2016 salesforce announced use amazon web services hosting countries restrictive data residency requirements salesforce data centers operating july 2017 first salesforce instance went live canada salesforce announcing enabled signing number canadian customers following list acquisitions salesforce november 2007 successful phishing attack salesforce employee compromised contact information number salesforce customers used send highly targeted phishing emails salesforce stated phisher tricked someone disclosing password intrusion stem security flaw salesforce.com application database phishing breach cited example crm industry needs greater security users threats spam crowd-sourced method building business contacts proven popular recruiters marketers sales professionals also raised questions privacy site database entered without permission person listed data.com however make easy remove business information request noted december 2009 techcrunch however recipients messages regard spam least one complaint receiving spam attempting remove one address noted 2017 def con salesforce director offensive security security engineer fired conference room floor front several attendees executive company giving talk word rapidly spread two speakers released event presentation initially signed company however salesforce management team unexplained sudden change heart hour event salesforce director offensive security turned phone prior presentation unable receive communication salesforce prior presentation reaction firings swift electronic frontier foundation providing representation fired employees members security community opining salesforce undermined credibility security community significant degree perceived security community n't top list things care presented meatpistol tool anticipated released open source time presentation salesforce continues hold back releasing code developers public terminated employees continued call company open-source software not-for-profit organization refugee immigrant center education legal services raices rejected us 250,000 philanthropic donation salesforce company contracts customs border patrol sic executive director raices jonathan ryan tweeted comes supporting oppressive inhumane illegal policies want clear right action stop reference rejected donation salesforce ceo marc benioff responded official statement company employees dont work cbp regarding separation families cbp customer follows tos dont agreement ice 'm proud men women protect serve country every day 'm proud ohana reported change acceptable-use policy salesforce barring customers using system sell semiautomatic guns firearms march 2019 salesforce faced lawsuit 50 anonymous women claiming victims survivors sex trafficking abuse rape alleges company profited knowingly facilitated sex trafficking web site backpage.com defunct since april 2018 lawsuit also pointed ironically salesforce publicly promoting anti-human trafficking campaign time work backpage 2009 response financial crisis 2007–2008 resulting decline venture funding salesforce began investing digital companies used integrated salesforce platform. ref name= peterson bi 8/18/2018 /ref eventually became salesforce ventures headed john somorjai since various funds created focus specific areas — september 2014 sfv set salesforce1 fund aimed start-ups creating applications primarily mobile phones december 2018 salesforce ventures announced launch japan trailblazer fund focused japanese startups august 2018 salesforce ventures reported investments totaling 1.2 billion 275 companies covering wide range business models including cloud storage cloudcraze artificial intelligence figure eight online fraud prevention forter accounting project software financialforce many areas five largest investments domo data-visualization software surveymonkey online survey software twilio cloud-communication dropbox cloud storage docusign secure e-signature company account nearly half portfolio. ref name= peterson bi 11/14/2018 /ref | [
0,
1539,
4621,
526,
3087,
4623,
10773,
8217,
10265,
5662,
5666,
9252,
9766,
39,
5159,
7721,
5677,
3121,
3634,
5681,
10820,
6729,
4683,
590,
79,
1102,
7248,
5202,
4194,
5732,
10340,
8817,
2170,
10887,
2696,
1675,
4236,
10893,
10911,
8353,
... | Validation |
10,091 | 6 | Readahead:readahead readahead system call linux kernel loads file contents page cache prefetches file subsequently accessed contents read main memory ram rather hard disk drive hdd resulting much lower file access latencies many linux distributions use readahead list commonly used files speed booting setup kernel booted profile boot parameter record file accesses bootup write new list files read later boot sequences make additional installed services start faster included default readahead list linux distributions use systemd readahead binary part boot sequence replaced systemd-readahead however support readahead removed systemd version 217 described unmaintained unable provide expected performance benefits certain experimental page-level prefetching systems developed improve performance | [
4616,
3082,
5139,
10780,
10785,
3618,
6180,
8242,
9266,
4161,
10817,
8772,
6213,
8268,
589,
593,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
8326,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
1694,
2723,
8364,
10933,
5815,
8379,
5822,
... | Test |
10,092 | 4 | Typhoid_adware:typhoid adware typhoid adware type computer security threat uses man-in-the-middle attack inject advertising web pages user visits using public network like wifi hotspot researchers university calgary identified issue require affected computer adware installed order display advertisements computer researchers said threat yet observed described mechanism potential countermeasures environment threat work area non-encrypted wireless connection wireless internet cafe wifi hotspots typhoid adware would trick laptop recognize wireless provider inserts route wireless connection computer actual provider adware may insert various advertisements data stream appear computer browsing session way even video stream e.g. youtube may modified adware may run infested computer whose owner would see manifestations yet affect neighboring ones latter peculiarity named analogy typhoid mary mary mallon first identified person never experienced symptoms yet spread infection time running antivirus software affected computer useless since adware installed implemented proof concept described article written march 2010 daniel medeiros nunes de castro eric lin john aycock mea wang typhoid adware variant well-known man-in-the-middle attack researchers point number new important issues protection video content growing availability public wireless internet access well-monitored researchers say annoying advertisements tip iceberg serious danger may come e.g. promotions rogue antivirus software seemingly coming trusted source suggested countermeasures include approaches investigated earlier contexts | [
612,
2213,
5636,
877,
2996,
1369,
794,
6013,
2558,
4863
] | Test |
10,093 | 3 | River_Raid:river raid river raid vertically scrolling shooter designed programmed carol shaw published activision 1982 atari 2600 video game console million game cartridges sold activision later ported title atari 5200 colecovision intellivision consoles well commodore 64 ibm pcjr msx zx spectrum atari 8-bit family shaw atari 8-bit atari 5200 ports activision published less successful sequel 1988 without shaw involvement viewed top-down perspective player flies fighter jet river return raid behind enemy lines player jet move left right—it maneuver screen—but accelerate decelerate player jet crashes collides riverbank enemy craft jet runs fuel assuming fuel replenished player evades damage gameplay essentially unlimited player scores points shooting enemy tankers 30 points helicopters 60 points fuel depots 80 points jets 100 points bridges 500 points jet refuels flies fuel depot bridge marks end game level non-atari 2600 ports game add hot air balloons worth 60 points shot well tanks along sides river shoot player jet destroying bridges also serve game checkpoints player crashes plane start next jet last destroyed bridge time river raid provided inordinate amount non-random repeating terrain despite constrictive computer memory limits game program actually store sequence terrain objects instead procedural generation algorithm manifests employing linear feedback shift register hard-coded vector starting value hard-coded algorithm generates game world every time program executes enemy crafts ai however relies random number generator make enemy movement less predictable infoworld 1983 stated river raid might best atari 8-bit game year challenging vcs version superior others like caverns mars antic 1984 said atari 8-bit version identical 2600 original slightly spiffed ... game visuals deseret news 1984 called river raid one playable entertaining war games newspaper gave colecovision version four stars recommending console owners describing definite winner way game received award 1984 best action videogame certificate merit category 1984 best computer action game 5th annual arkie awards judges described provid ing brand non-stop excitement blast brigaders adore river raid first video game banned minors west germany federal department writings harmful young persons german bundesprüfstelle für jugendgefährdende schriften 1996 next generation listed atari 2600 version number 81 top 100 games time commenting nostalgia aside 2600 sucks ... game still great one main reason level design activision published relatively obscure river raid ii atari 2600 1988 sequel programmed david lubar based concept dan kitchen similar gameplay different landscape increased difficulty 1995 river raid published microsoft windows part activision atari 2600 action pack | [
3075,
7051,
6797,
9006,
9998,
10931
] | None |
10,094 | 2 | Telecommunications_Access_Method:telecommunications access method telecommunications access method tcam access method ibm os/360 successors computer operating systems ibm system/360 later provides access terminals units within teleprocessing network tcam provides similar functionality qtam replaced access method initial version time sharing option tso advent ibm sna tcam eventually superseded vtam tcam said following enhancements qtam tcam consists message control program mcp zero application programs mcp handles communications terminals identifies input messages starts application programs process required similar concept much later internet service daemon inetd unix systems also similar qtam application programs called message processing programs mpp mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages application programs incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 either basic macros codice_3 codice_4 codice_5 queued macros codice_6 codice_7 use sam macros allows application programs tested batch processing environment tcam initially supported support 3270 terminals soon added | [
11656,
10508,
7312,
7836,
10415,
10040,
2616,
5562,
4546,
1478,
8393,
8138,
10958,
8911,
3669,
10072,
8290,
868,
7272,
4586,
6647,
11131,
2813
] | Test |
10,095 | 3 | Mobile-ITX:mobile-itx mobile-itx smallest 2009 x86 compliant motherboard form factor presented via technologies december 2009 motherboard size cpu module computer ports cpu module necessary use i/o carrier board design intended medical transportation military embedded markets mobile-itx form factor announced via technologies computex june 2007 motherboard size first prototypes design intended ultra-mobile computing smartphone umpc prototype boards shown date include x86-compliant 1 ghz via c7-m processor 256 512 megabytes ram modified version via cx700 chipset called cx700s interface cellular radio module demonstration boards contain cdma radio dc-dc electrical converter various connecting interfaces announcement ultra-mobile pc reference design shown running windows xp embedded | [
10337,
2500,
455,
7113,
9307,
3883,
7151,
2161,
499,
2803,
10715,
8730,
1083,
3037
] | Test |
10,096 | 2 | Yum_(software):yum software yellowdog updater modified yum free open-source command-line package-management utility computers running linux operating system using rpm package manager though yum command-line interface several tools provide graphical user interfaces yum functionality yum allows automatic updates package dependency management rpm-based distributions like advanced package tool apt debian yum works software repositories collections packages accessed locally network connection hood yum depends rpm packaging standard digital distribution software automatically uses hashes digisigs verify authorship integrity said software unlike app stores serve similar function neither yum rpm provide built-in support proprietary restrictions copying packages end-users yum implemented libraries python programming language small set programs provide command-line interface gui-based wrappers yum extender yumex also exist rewrite yum named dnf replaced yum default package manager fedora 22 dnf created improve yum several ways improved performance better resolution dependency conflicts easier integration software applications original package manager yellowdog updater yup developed 1999-2001 dan burcaw bryan stillwell stephen edie troy bengegerdes terra soft solutions leadership ceo kai staats back-end engine graphical installer yellow dog linux.. full rewrite yup yum evolved primarily update manage red hat linux systems used duke university department physics seth vidal michael stenner vidal continued contribute yum death durham north carolina bicycle accident 8 july 2013 2003 robert g. brown duke published documentation yum subsequent adopters included fedora centos many rpm-based linux distributions including yellow dog linux yum replaced original yup utility — last updated sourceforge 2001 2005 estimated use half linux market 2007 yum considered tool choice rpm-based linux distributions yum aimed address perceived deficiencies old apt-rpm restrictions red hat up2date package management tool yum superseded up2date red hat enterprise linux 5 later authors refer yum yellowdog update manager suggest update manager would appropriate basic knowledge yum often included requirement linux system-administrator certification gnu general public license yum allows free open-source software freely distributed modified without royalty terms license honored codice_1 perform operations 2.x versions yum feature additional interface programming extensions python allows behavior yum altered certain plug-ins installed default commonly installed package codice_2 contains commands use yum api many plugins graphical user interfaces known front-ends allow easier use yum packagekit yum extender yumex two examples information packages opposed packages known metadata metadata combined information package determine resolve possible dependencies among packages hope avoid situation known dependency hell separate tool codice_3 sets yum software repositories generating necessary metadata standard xml format sqlite metadata given -d option codice_4 tool formerly known yam help creation maintenance repositories yum xml repository built input many developers quickly became standard rpm-based repositories besides distributions use yum directly suse linux 10.1 added support yum repositories yast open build service repositories use yum xml repository format metadata yum automatically synchronizes remote meta data local client tools opting synchronize requested user automatic synchronization means yum fail due user failing run command correct interval | [
2050,
11525,
2310,
10760,
9353,
2955,
7435,
7181,
7947,
9487,
2448,
788,
1813,
8213,
10900,
6680,
8476,
5670,
4775,
7847,
5546,
6828,
6446,
7983,
1842,
823,
2872,
6583,
3131,
5819,
10172,
190,
3649,
10817,
9671,
5067,
3918,
463,
3791,
366... | Test |
10,097 | 9 | ActionScript:actionscript actionscript object-oriented programming language originally developed macromedia inc. later acquired adobe systems influenced hypertalk scripting language hypercard implementation ecmascript meaning superset syntax semantics language widely known javascript though originally arose sibling influenced hypertalk actionscript used primarily development websites software targeting adobe flash player platform used web pages form embedded swf files actionscript 3 also used adobe air system development desktop mobile applications language open-source specification offered free charge open source compiler part apache flex open source virtual machine mozilla tamarin available actionscript also used scaleform gfx development 3d video game user interfaces huds actionscript initially designed controlling simple 2d vector animations made adobe flash formerly macromedia flash initially focused animation early versions flash content offered interactivity features thus limited scripting capability later versions added functionality allowing creation web-based games rich internet applications streaming media video audio today actionscript suitable desktop mobile development adobe air use database applications basic robotics make controller kit flash mx 2004 introduced actionscript 2.0 scripting language suited development flash applications often possible save time scripting something rather animating usually also enables higher level flexibility editing since arrival flash player 9 alpha 2006 newer version actionscript released actionscript 3.0 version language intended compiled run version actionscript virtual machine completely re-written ground dubbed avm2 code written actionscript 3.0 generally targeted flash player 9 higher work previous versions time actionscript 3.0 executes 10 times faster legacy actionscript code due just-in-time compiler enhancements flash libraries used xml capabilities browser render rich content browser technology known asynchronous flash xml much like ajax adobe offers flex product line meet demand rich internet applications built flash runtime behaviors programming done actionscript actionscript 3.0 forms foundation flex 2 api actionscript started object-oriented language macromedia flash authoring tool developed adobe systems adobe flash first three versions flash authoring tool provided limited interactivity features early flash developers could attach simple command called action button frame set actions basic navigation controls commands play stop geturl gotoandplay release flash 4 1999 simple set actions became small scripting language new capabilities introduced flash 4 included variables expressions operators statements loops although referred internally actionscript flash 4 user manual marketing documents continued use term actions describe set commands 2000–2004 actionscript 1.0 release flash 5 september 2000 actions flash 4 enhanced named actionscript first time first version actionscript influences javascript ecma-262 third edition standard supporting said standard object model many core data types local variables may declared statement user-defined functions parameter passing return values also created notably actionscript could also typed text editor rather assembled choosing actions drop-down lists dialog box controls next release authoring tool flash mx corresponding player flash player 6 language remained essentially unchanged minor changes addition statement strict equality operator brought closer ecma-262-compliant two important features actionscript distinguish later versions loose type system reliance prototype-based inheritance loose typing refers ability variable hold type data allows rapid script development particularly well-suited small-scale scripting projects prototype-based inheritance actionscript 1.0 mechanism code reuse object-oriented programming instead keyword defines common characteristics class actionscript 1.0 uses special object serves prototype class objects common characteristics class defined class prototype object every instance class contains link prototype object 2003–2006 actionscript 2.0 next major revision language actionscript 2.0 introduced september 2003 release flash mx 2004 corresponding player flash player 7 response user demand language better equipped larger complex applications actionscript 2.0 featured compile-time type checking class-based syntax keywords allowed structured object-oriented programming approach code would still compiled actionscript 1.0 bytecode allowing used preceding flash player 6 well words class-based inheritance syntax layer top existing prototype-based system actionscript 2.0 developers could constrain variables specific type adding type annotation type mismatch errors could found compile-time actionscript 2.0 also introduced class-based inheritance syntax developers could create classes interfaces much would class-based languages java c++ version conformed partially ecmascript fourth edition draft specification 2006–today actionscript 3.0 june 2006 actionscript 3.0 debuted adobe flex 2.0 corresponding player flash player 9 actionscript 3.0 fundamental restructuring language much uses entirely different virtual machine flash player 9 contains two virtual machines avm1 code written actionscript 1.0 2.0 avm2 content written actionscript 3.0 actionscript 3.0 added limited support hardware acceleration directx opengl update language introduced several new features adobe air supports actionscript addition extended contents stage3d engine adobe developed number apis application programming interfaces available actionscript 3.0 also risen dramatically actionscript code free form thus may created whichever amount style whitespace author desires basic syntax derived ecmascript following code works compliant player creates text field depth 0 position 0 0 screen measured pixels 100 pixels wide high codice_1 parameter set string automatically displayed player writing external actionscript 2.0 class files example could written file named following actionscript 3.0 similar syntax actionscript 2.0 different set apis creating objects compare script previous actionscript 2.0 version var greet textfield new textfield greet.text hello world this.addchild greet minimal actionscript 3.0 programs may somewhat larger complicated due increased separation programming language flash ide presume following file package com.example actionscript 3 also used mxml files using apache flex framework actionscript primarily consists fundamental simple data types used create data types data types similar java data types since actionscript 3 complete rewrite actionscript 2 data types inheritances changed actionscript 2 top level data types actionscript 2 complex data types additional complex data types processor memory intensive consist many simple data types as2 data types actionscript 3 primitive prime data types actionscript 3 complex data types basic syntax order make empty object informal way types automatically put place unlike object-oriented languages actionscript makes distinction primitive types reference types actionscript variables reference types however objects belong primitive data types includes boolean number int uint string immutable variable supposedly primitive type e.g integer passed function altering variable inside function alter original variable new int object created inside function variable another primitive datatype e.g xml passed function altering variable inside function alter original variable well new xml object created data types assigned values literals reference actionscript pointer instance class reference stores memory address object – operations references follow value reference memory address object carry operation object objects actionscript accessed references instead accessed directly references object may removed using delete keyword removal actual objects data done flash player garbage collector checks existing references flash memory space none found reference made orphaned object removed memory reason memory management actionscript requires careful application development planning intermediate language compiled code flash microsoft .net swf file saved locally decompiled source code assets decompilers capable nearly full reconstruction original source file actual code used creation although results vary case-by-case basis opposition decompilers actionscript obfuscators introduced transform code form breaks decompiler output preserving functionality structure program higher-quality obfuscators implement lexical transformations identifier renaming control flow transformation data abstraction transformation collectively make harder decompilers generate output likely useful human less robust obfuscators insert traps decompilers obfuscators either cause decompiler software crash unexpectedly generate unintelligible source code following example actionscript 3.0 code generated decompiler program obfuscation code obfuscation code obfuscation | [
11291,
9245,
544,
5677,
9780,
1591,
10819,
8775,
4171,
84,
603,
5219,
9841,
9345,
5255,
5768,
6791,
9871,
8854,
155,
3761,
7347,
5311,
7871,
4292,
3270,
4822,
7894,
6875,
7396,
8421,
4844,
10991,
2804,
3830,
259,
1802,
10507,
11537,
4378,... | None |
10,098 | 3 | MIL-STD-1750A:mil-std-1750a mil-std-1750a 1750a formal definition 16-bit computer instruction set architecture isa including required optional components described military standard document mil-std-1750a 1980 since august 1996 inactive new designs addition core isa definition defines optional instructions fpu mmu importantly standard define implementation details 1750a processor 1750a supports 2 16-bit words memory core standard standard defines optional memory management unit allows 2 16-bit words memory using 512 page mapping registers i/o space defining separate instruction data spaces keyed memory access control instructions 16 bits although 16-bit extension standard computer 16 general purpose 16-bit registers 0 15 registers 1 15 used index registers registers 12 15 used base registers 16 registers could used stack pointer sjs urs instructions stack jump subroutine unstack return subroutine register 15 used stack pointer pshm popm instructions push multiple pop multiple computer instructions 16 32-bit binary arithmetic well 32 48 bit floating point i/o generally via i/o instructions xio vio separate 2 16-bit word address space may specialized bus mil-std-1750a define implementation details 1750a products available wide variety companies form component board system-level offerings implemented myriad technologies often advanced exotic respective periods e.g gaas ecl sos particular interest fact 1750a systems often offer high levels radiation hazardous environment protection making particularly suited military aviation space applications examples mil-std-1750a implementations include processors based mil-std-1750a usually programmed jovial high-level programming language defined united states department defense derived algol 58 lesser extent ada used also c compilers example cleanscape xtc-1750a older versions gnu gcc contain support mil-std-1750a declared obsolete version 3.1 removed subsequent versions addition ddc-i provides score integrated development environment ide ada95 c compilers tads tartan ada development system ada83 development environment targeting processors based mil-std-1750a u.s. air force defined standard order common computing architecture thereby reduce costs software computer systems military computing needs includes embedded tasks aircraft missile control systems well mundane general military computing needs advantages concept recognized outside usaf 1750a adopted numerous organizations european space agency nasa israeli aircraft industries many projects academia examples military aircraft using 1750a include fully space rated implementations make 1750a one types computers applicable use deep space applications example spacecraft use 1750a | [
8352,
4742,
8262,
10089,
428,
9804,
9932,
2353,
1461,
9911,
2045
] | Test |
10,099 | 7 | Cloud_Elements:cloud elements cloud elements cloud api integration platform enables developers publish integrate aggregate manage apis unified platform using cloud elements developers quickly connect entire categories cloud services e.g. crm documents finance using uniform apis simply synchronize data multiple cloud services e.g salesforce zendesk quickbooks using innovative integration toolkit founded october 2012 cloud elements purpose built developers help organize world apis one-to-many approach ‘ visionary ’ api management according gartner inc. cloud elements headquartered denver co serves customers worldwide information found www.cloud-elements.com cloud elements accelerates api integrations innovative api hub technology providing uniform apis developers use easily make apis work together past years developers published millions unique apis one island data bigger challenge integrate apis together order synchronize data build new apps faster october 2012 cloud elements founded ceo mark geene cto vineet joshi vp product development atul barve three shared vision help developers build cloud applications faster lower cost ... since start company cloud elements grown 100 employees work together bring api integrations business sizes july 18 2014 company announced receiving 3.1 million series funding round investors include virginia-based grotech ventures california-based icon venture partners along galvanize ventures january 9 2017 company announced receiving 13 million funding reach series b funding led harbert growth partners allow cloud elements continue revenue increase nearly 40 percent quarter-over-quarter sapphire 2018 sap launched sap cloud platform open connectors purpose built api integration platform leveraging cloud elements catalog feature-rich connectors 150 leading enterprise saas applications cloud elements created offer cloud applications hubs provide restful apis json payloads cloud elements differentiates one-to-many api lets developers integrate maintain several services elements category within hubs connector “ elements ” provide variety advanced features built cloud elements ’ api integration platform puts data center company application ecosystem provide virtual data hub puts data model center integration strategy making easier manage integrate data additionally cloud elements provides normalized consistent apis across entire catalog elements eliminate need experts every endpoint finally platform allows service embedded app customers convenience virtual data resources vdr provide canonicalized view data objects eliminating need point-to-point mapping data every new application putting data models center application ecosystem enables management company ’ data enriched api models maintained cloud elements make easier map defined resources required endpoints traditional integration platforms point-to-point meaning new application needs connected directly every application ecosystem point-to-point integration best solution external integration embedded platform makes difficult scale effectively use ce ’ vdr created ui easily maps domain model cloud services use allow directly write integrations also offer vdr templates pre-written templates common resources used customers pre-mapping multiple endpoints | [
10236,
7149
] | Test |
10,100 | 5 | Digital_Signal_Designation:digital signal designation digital signal designation classification digital bit rates digital multiplex hierarchy used transport signals one location another telecommunications see sonet information | [
8192,
5505,
2860,
7799
] | Test |
10,101 | 6 | List_of_file_copying_software:list file copying software article provides list inbuilt third party file copying moving software utilities software used part computer file management explicitly move copy files data demand one location another storage device file copying fundamental operation data storage popular operating systems linux windows macos well smartphone operating systems android contain built-in file copying functions well command line cli graphical gui interfaces filing system copy move functions cases replaced supplemented third party software different extended improved functionality article lists inbuilt well external software designed purpose software designed copy clone image author entire storage devices cds dvds blu-ray disks hard drives storage device partitions back data copiers work storage devices logical unit general file managers utilities related file copying software please see examples comparable operating functionality seen across file copying programs generic differentiators functions software gizmo freeware published basic comparison reviews range well-known third party file copying software windows july 2012 fastcopy given top place reviewers highest speed also light system resources author states uses cache avoid slowing software win32 api c runtime rather mfc ultracopier recognised well-developed gui interface unstoppable copier well regarded niche copier designed best results damaged media files cost speed teracopy also mentioned also worth considering third-party file transfer software include | [
1412,
2568,
1801,
6280,
6797,
2198,
10654,
9762,
5158,
7983,
7088,
1844,
823,
11256,
1083,
9025,
1358,
10195,
1750,
2406,
5482,
10476,
9840,
7672,
10489,
6270
] | Validation |
10,102 | 5 | Handle_System:handle system handle system corporation national research initiatives proprietary registry assigning persistent identifiers handles information resources resolving handles information necessary locate access otherwise make use resources handles used elsewhere computing handle system handles opaque encode information underlying resource bound metadata regarding resource consequently handles rendered invalid changes metadata system developed bob kahn corporation national research initiatives cnri original work funded defense advanced research projects agency darpa 1992 1996 part wider framework distributed digital object services thus contemporaneous early deployment world wide web similar goals handle system first implemented autumn 1994 administered operated cnri december 2015 new multi-primary administrator mpa mode operation introduced dona foundation administers system global handle registry accredits mpas including cnri international doi foundation system currently provides underlying infrastructure handle-based systems digital object identifiers dspace mainly used provide access scholarly professional government documents information resources cnri provides specifications source code reference implementations servers protocols used system royalty-free public license similar open source license thousands handle services currently running 1000 universities libraries also operation national laboratories research groups government agencies commercial enterprises receiving 200 million resolution requests per month handle system defined informational rfcs 3650 3651 3652 internet engineering task force ietf includes open set protocols namespace reference implementation protocols documentation software related information provided cnri dedicated website handles consist prefix identifies naming authority suffix gives local name resource similar domain names prefixes issued naming authorities one multi-primary administrators system upon payment fee must renewed annually naming authority may create number handles unique local names within assigned prefixes example handle first example handle handle.net software license codice_3 prefix assigned naming authority case handle.net codice_4 local name within namespace local name may consist characters unicode ucs-2 character set prefix also consists ucs-2 characters prefixes consist one naming authority segments separated periods representing hierarchy naming authorities thus example codice_5 naming authority prefix cnri codice_6 designates subordinate naming authority within 20 prefix examples top-level prefixes federated naming authorities dona foundation codice_7 doi handles codice_8 handles assigned itu codice_9 handles issued german gesellschaft für wissenschaftliche datenverarbeitung mbh göttingen gwdg scientific computing center university göttingen codice_10 coalition handle services – china older legacy prefixes issued cnri multi-primary administrator mpa structure instituted typically four five digits second example handle administered university leicester prefixes must registered global handle registry dona foundation approved registrar normally fee uses handles computing handle opaque encodes information underlying resource provides means retrieve metadata resource may contrasted uniform resource locator url may encode within identifier attributes resource protocol used access server holding resource server host name port number perhaps even location specifics name file server file system containing resource handle system specifics encoded handle found metadata handle bound metadata may include many attributes information resource locations forms available types access e.g free versus paid offered processing metadata determine resource accessed provision resource user performed separate step called resolution using resolver server may different ones involved exchanging handle metadata unlike urls may become invalid metadata embedded within becomes invalid handles become invalid need change locations metadata attributes change helps prevent link rot changes information resource location need reflected changes metadata rather changes every reference resource handle may administrator administration handles done distributed environment similar dns domain names name-to-value bindings may also secured via signatures verify data via challenge response verify transmission data allowing handles used trust management applications possible underlying information resource associated multiple handles two university libraries generate handles therefore possibly different sets metadata book handle system compatible domain name system dns require unlike persistent identifiers purls arks similar handles utilise domain names however unlike domain-name based approaches handles require separate prefix registration process handle servers separate domain name servers handles used natively expressed uniform resource identifiers uris namespace within info uri scheme example codice_1 may written uri codice_12 handle system namespaces digital object identifiers info uri namespaces right example codice_13 another way writing handle current revision doi handbook uri handle system namespaces define special presentation rules example digital object identifiers represent high percentage extant handles usually presented doi prefix codice_14 handles may also expressed uniform resource locators urls use http proxy server implementation handle system consists local handle services made one sites provide servers store specific handles global handle registry unique local handle service stores information prefixes also known naming authorities within handle system queried find specific handles stored local handle services within distributed system handle system website provides series implementation tools notably handle.net software handle.net client libraries handle clients embedded end user software e.g. web browser server software e.g. web server extensions already available adobe acrobat firefox handle client software libraries available c java applications developed specific add-on tools e.g. doi system interoperable network distributed handle resolver servers also known proxy server system linked global resolver one logical entity though physically decentralised mirrored users handle system technology obtain handle prefix created global handle registry global handle registry maintains resolves prefixes locally maintained handle services local handle service therefore resolve handle global resolver handles identifiers passed client query naming authority/prefix handle system global handle registry ghr ghr responds sending client location information relevant local handle service may consist multiple servers multiple sites query sent relevant server within local handle service local handle service returns information needed acquire resource e.g. url turned http re-direct note client already information appropriate lhs query initial query ghr omitted though original model handle system derives dealt management digital objects handle system mandate particular model relationships identified entities limited identifying digital objects non-digital entities may represented corresponding digital object purposes digital object management care needed definition objects relate non-digital entities established models aid definitions e.g. functional requirements bibliographic records frbr cidoc crm indecs content model applications found helpful marry framework handle application example advanced distributed learning adl initiative brings together handle system application existing standards distributed learning content using shareable content object reference model scorm digital object identifier doi system implementation handle system adopted together indecs framework deal semantic interoperability handle system also makes explicit importance organizational commitment persistent identifier scheme mandate one model ensuring commitment individual applications may choose establish sets rules social infrastructure ensure persistence e.g. used dspace application doi application handle system designed meet following requirements contribute persistence identifier string identifier resolution mechanism among objects currently identified handles journal articles technical reports books theses dissertations government documents metadata distributed learning content data sets handles used digital watermarking applications grid applications repositories although individual users may download use handle.net software independently many users found beneficial collaborate developing applications federation using common policy additional technology provide shared services one first persistent identifier schemes handle system widely adopted public private institutions proven several years see paradigm persistent identifiers handle system applications may use handles simple persistent identifiers commonly used resolve current url object may choose take advantage features support simultaneous return output multiple pieces current information related object defined data structures enables priorities established order multiple resolutions used handles therefore resolve different digital versions content mirror sites different business models pay vs. free secure vs. open public vs. private also resolve different digital versions differing content mix objects required distance-learning course thousands handle services running today located 71 countries 6 continents 1000 run universities libraries handle services run user federations national laboratories universities computing centers libraries national local government agencies contractors corporations research groups major publishers use handle system persistent identification commercially traded open access content implementation digital object identifier doi system number prefixes allow users assign handles growing stands 12,000 early 2014 six top-level global handle registry servers receive average 68 million resolution requests per month proxy servers known cnri passing requests system web receive average 200 million resolution requests per month statistics handle quick facts 2010 cnri itu international telecommunication union entered agreement collaborate use handle system digital object architecture generally working specific details collaboration april 2009 itu listed handle system emerging trend handle system handle.net global handle registry trademarks corporation national research initiatives cnri non-profit research development corporation usa handle system subject patents cnri licenses handle system technology public license similar open source license order enable broader use technology handle system infrastructure supported prefix registration service fees majority coming single prefix holders largest current single contributor international doi foundation public license allows commercial non-commercial use low cost patented technology reference implementation software allows software freely embedded systems products service agreement also available users intend provide identifier and/or resolution services using handle system technology handle system public license handle system represents several components long-term digital object architecture january 2010 cnri released general-purpose digital object repository software another major component architecture information release including protocol specification source code ready-to-use system clients utilities available | [
10114,
6406,
6662,
4232,
5641,
4107,
8717,
3858,
6419,
8085,
1022,
7702,
9243,
9376,
6306,
4392,
5885,
2680,
7085,
6320,
6014,
4916,
7604,
7350,
9397,
1083,
1723,
10049,
4548,
5956,
2247,
2887,
1993,
3146,
9169,
10452,
5078,
10584,
1502,
... | None |
10,103 | 8 | Typosquatting:typosquatting typosquatting also called url hijacking sting site fake url form cybersquatting possibly brandjacking relies mistakes typos made internet users inputting website address web browser user accidentally enter incorrect website address may led url including alternative website owned cybersquatter typosquatter url usually one five kinds similar victim site address e.g example.com similar abuses typosquatter site user may also tricked thinking fact real site use copied similar logos website layouts content spam emails sometimes make use typosquatting urls trick users visiting malicious sites look like given bank site instance several different reasons typosquatters buying typo domain many companies including verizon lufthansa lego garnered reputations aggressively chasing typosquatted names lego example spent roughly us 500,000 taking 309 cases udrp proceedings celebrities also frequently pursued domain names singers star athletes prominent examples include basketball player dirk nowitzki udrp dirkswish.com actress eva longoria udrp evalongoria.org since 2006 typosquatted variant google called 'goggle.com existed considered phishing/fraud site later ca 2011–2012 url redirected google.com 2018 check revealed redirect users adware pages another example corporate typosquatting yuube.com targeting youtube users programmed redirect malicious website page asks users add security check extension really malware similarly www.airfrance.com typosquatted www.arifrance.com diverting users website peddling discount travel examples equifacks.com equifax.com experianne.com experian.com tramsonion.com transunion.com three typosquatted sites registered comedian john oliver show last week tonight users trying visit popular internet-based game agar.io may misspell said url agor.io visiting site known produce jumpscare screamer popular creepypasta jeff killer flashed rapidly produced loud noise original site taken 2017 linked randomly-themed phishing websites united states 1999 anticybersquatting consumer protection act acpa contains clause section 3 amending 15 usc 1117 include sub-section 2 b ii aimed combatting typosquatting however april 17 2006 evangelist jerry falwell failed get u.s. supreme court review decision allowing christopher lamparello use www.fallwell.com relying plausible misspelling falwell name lamparello gripe site presents misdirected visitors scriptural references intended counter fundamentalist preacher scathing rebukes homosexuality lamparello v. falwell high court let stand 2005 fourth circuit finding use mark domain name gripe site criticizing markholder constitute cybersquatting uniform domain-name dispute-resolution policy udrp trademark holders file case world intellectual property organization wipo typosquatters cybersquatters general complainant show registered domain name identical confusingly similar trademark registrant legitimate interest domain name domain name used bad faith | [
8064,
2945,
3814,
2887,
7370,
877,
1139,
5012,
7515
] | Test |
10,104 | 9 | Symbolics:symbolics symbolics refers two companies now-defunct computer manufacturer symbolics inc. privately held company acquired assets former company continues sell maintain open genera lisp system macsyma computer algebra system symbolics.com domain originally registered march 15 1985 making first .com-domain world august 2009 sold napkin.com formerly xf.com investments symbolics inc. computer manufacturer headquartered cambridge massachusetts later concord massachusetts manufacturing facilities chatsworth california suburban section los angeles first ceo chairman founder russell noftsker symbolics designed manufactured line lisp machines single-user computers optimized run lisp programming language symbolics also made significant advances software technology offered one premier software development environments 1980s 1990s sold commercially open genera tru64 unix hp alpha lisp machine first commercially available workstation although word yet coined symbolics spinoff mit ai lab one two companies founded ai lab staffers associated hackers purpose manufacturing lisp machines lisp machines inc. although symbolics attracted hackers funding symbolics initial product lm-2 introduced 1981 repackaged version mit cadr lisp machine design operating system software development environment 500,000 lines written lisp microcode based mit lisp machine lisp software bundle later renamed zetalisp distinguish symbolics product vendors also licensed mit software symbolics zmacs text editor variant emacs implemented text-processing package named zwei acronym zwei eine initially eine acronym eine emacs recursive acronyms puns german words one eins eine two zwei lisp machine system software copyrighted mit licensed symbolics lmi 1981 symbolics shared copyrighted enhancements source code mit kept mit server according richard stallman symbolics engaged business tactic forced mit make symbolics copyrighted fixes improvements lisp machine os available symbolics mit symbolics competitors thereby choke competitor lmi time insufficient resources independently maintain develop os environment symbolics felt longer sufficient control product point symbolics began using copy software located company servers—while stallman says symbolics prevent lisp improvements flowing lisp machines inc. base symbolics made extensive improvements every part software continued deliver almost source code customers including mit however policy prohibited mit staff distributing symbolics version software others end open collaboration came end mit hacker community reaction stallman initiated gnu project make new community eventually copyleft gnu general public license would ensure hacker software could remain free software way symbolics played key albeit adversarial role instigating free software movement 1983 year later planned symbolics introduced 3600 family lisp machines code-named l-machine internally 3600 family innovative new design inspired cadr architecture sharing implementation details main processor 36-bit word divided 4 8 bits tags 32 bits data 28 bits memory address memory words 44 bits additional 8 bits used error-correcting code ecc instruction set stack machine 3600 architecture provided 4,096 hardware registers half used cache top control stack rest used microcode time-critical routines operating system lisp run-time environment hardware support provided virtual memory common machines class garbage collection unique original 3600 processor microprogrammed design like cadr built several large circuit boards standard ttl integrated circuits features common commercial computers class time cpu clock speed varied depending particular instruction executed typically around 5 mhz many lisp primitives could executed single clock cycle disk i/o handled multitasking microcode level 68000 processor known front-end processor fep started main computer handled slower peripherals normal operation ethernet interface standard equipment replacing chaosnet interface lm-2 3600 roughly size household refrigerator partly due size processor – cards widely spaced allow wire-wrap prototype cards fit without interference—and partly due limitations disk drive technology early 1980s 3600 introduction smallest disk could support zetalisp software 14 inches 356 mm across 3600s shipped 10½-inch fujitsu eagle 3670 3675 slightly shorter height essentially machine packed little tighter advent later disk drives could hold hundreds megabytes led introduction 3640 3645 roughly size two-drawer file cabinet later versions 3600 architecture implemented custom integrated circuits reducing five cards original processor design two large manufacturing cost savings performance slightly better old design 3650 first g machines known within company housed cabinet derived 3640s denser memory smaller disk drives enabled introduction 3620 size modern full-size tower pc 3630 fat 3620 room memory video interface cards 3610 lower priced variant 3620 essentially identical every way except licensed application deployment rather general development various models 3600 family popular ai research commercial applications throughout 1980s ai commercialization boom 1980s led directly symbolics success decade symbolics computers widely believed best platform available developing ai software lm-2 used symbolics-branded version complex space-cadet keyboard later models used simplified version right known simply symbolics keyboard featured many modifier keys used zmacs notably control/meta/super/hyper block feature complex symbol set space-cadet keyboard also contributing 3600 series success line bit-mapped graphics color video interfaces combined extremely powerful animation software symbolics graphics division headquartered westwood california stone throw major hollywood movie television studios made s-render s-paint software industry leaders animation business symbolics developed first workstations capable processing hdtv quality video enjoyed popular following japan 3600 – standard black-and-white monitor – made cameo appearance movie real genius company also referenced michael crichton novel jurassic park symbolics graphics division sold nichimen trading company early 1990s s-graphics software suite s-paint s-geometry s-dynamics s-render ported franz allegro common lisp sgi pc computers running windows nt today sold mirai izware llc continues used major motion pictures famously new line cinema lord rings video games military simulations symbolic 3600-series computers also used first front end controller computers connection machine massively parallel computers manufactured thinking machines inc. another mit spinoff based cambridge massachusetts connection machine ran parallel variant lisp initially used primarily ai community symbolics lisp machine particularly good fit front-end machine long time operating system n't name finally named genera around 1984 system included number advanced dialects lisp heritage maclisp pdp-10 included data types multiple-inheritance object-oriented programming features lisp dialect called lisp machine lisp mit symbolics used name zetalisp symbolics later wrote new software symbolics common lisp version common lisp standard late 1980s 2 years later planned ivory family single-chip lisp machine processors superseded g-machine 3650 3620 3630 systems ivory 390k transistor vlsi implementation designed symbolics common lisp using ns custom symbolics hardware design language hdl addressed 40-bit word 8 bits tag 32 bits data/address since addressed full words bytes half-words allowed addressing 4 gigawords gw 16 gigabytes gb memory increase address space reflected growth programs data semiconductor memory disk space became cheaper ivory processor 8 bits ecc attached word word fetched external memory chip actually 48 bits wide ivory instruction 18 bits wide two instructions plus 2-bit cdr code 2-bit data type instruction word fetched memory fetching two instruction words time memory enhanced ivory performance unlike 3600 microprogrammed architecture ivory instruction set still microcoded stored 1200 × 180-bit rom inside ivory chip initial ivory processors fabricated vlsi technology inc san jose california 2 µm cmos process later generations fabricated hewlett packard corvallis oregon 1.25 µm 1 µm cmos processes ivory stack architecture operated 4-stage pipeline fetch decode execute write back ivory processors marketed stand-alone lisp machines xl400 xl1200 xl1201 headless lisp machines nxp1000 add-in cards sun microsystems ux400 ux1200 apple macintosh macivory ii iii computers lisp machines ivory processors operated speeds two six times faster 3600 depending model revision ivory chip ivory instruction set later emulated software microprocessors implementing 64-bit alpha architecture virtual lisp machine emulator combined operating system software development environment xl machines sold open genera sunstone risc-like processor released shortly ivory designed ron lebel group symbolics westwood office however project canceled day supposed tape quickly commercial ai boom mid-1980s propelled symbolics success ai winter late 1980s early 1990s combined slowdown reagan star wars missile defense program darpa invested heavily ai solutions severely damaged symbolics internal war noftsker ceo board hired 1986 brian sear whether follow sun suggested lead focus selling software re-emphasize superior hardware ensuing lack focus noftsker sear fired company caused sales plummet fact combined ill-advised real estate deals company management boom years entered large long-term lease obligations california drove symbolics bankruptcy rapid evolution mass-market microprocessor technology pc revolution advances lisp compiler technology economics manufacturing custom microprocessors severely diminished commercial advantages purpose-built lisp machines 1995 lisp machine era ended symbolics hopes success symbolics continued enterprise limited revenues supported mainly service contracts remaining macivory ux-1200 ux-1201 machines still used commercial customers symbolics also sold virtual lisp machine vlm software dec compaq hp alpha-based workstations alphastation servers alphaserver refurbished macivory iis symbolics keyboards july 2005 symbolics closed chatsworth california maintenance facility reclusive owner company andrew topping died year current legal status symbolics software uncertain assortment symbolics hardware still available purchase august 2007 us dod still paying symbolics regular maintenance work march 15 1985 symbolics.com became first currently since still registered oldest registered .com domain internet symbolics.com domain purchased xf.com 2009 genera also featured extensive networking interoperability software seen point local area network system called chaosnet invented lisp machine predating commercial availability ethernet symbolics system supported chaosnet also one first tcp/ip implementations also supported decnet ibm sna network protocols dialnet protocol used phone lines modems genera would using hints distributed namespace database somewhat similar dns comprehensive like parts xerox grapevine automatically select best protocol combination use connecting network service application program user command would specify name host desired service example host name request terminal connection might yield connection tcp/ip using telnet protocol although many possibilities likewise requesting file operation copy file command might pick nfs ftp nfile symbolics network file access protocol one several others might execute request tcp/ip chaosnet whatever network suitable popular application program symbolics lisp machine icad computer-aided engineering system one first networked multi-player video games version spacewar developed symbolics lisp machine 1983 electronic cad software symbolics lisp machine used develop first implementation hewlett-packard precision architecture symbolics research development staff first mit later company produced number major innovations software technology symbolics graphics division sgd founded 1982 sold nichimen graphics 1992 developed s-graphics software suite s-paint s-geometry s-dynamics s-render symbolics genera software also used create computer animated movies used popular movies | [
10752,
4097,
7173,
11269,
2056,
8204,
2062,
9231,
9742,
9749,
8728,
4633,
8226,
6187,
2105,
6717,
8771,
3142,
1613,
80,
9299,
3675,
1121,
7267,
8293,
2666,
5751,
7805,
2179,
9864,
9877,
5803,
2225,
7867,
4799,
2243,
7364,
7880,
8908,
205,... | None |
10,105 | 2 | Spamd:spamd spamd isc-licensed lightweight spam-deferral daemon written umbrella openbsd project spamd works directly smtp connections supports features greylisting minimising false positives compared system full-body analysis spamd designed work conjunction pf 4 fully functional posix system pf available i.e openbsd netbsd freebsd dragonfly bsd spamd useful preventing inbound spam reaching mail servers also used partial application level proxy ensure external mail servers connecting internal mail servers behave legitimately additionally spamd useful preventing outgoing spam systems may compromised control spammers used block spammers use following features | [
9223,
10631,
2825,
3465,
1932,
274,
7702,
10906,
5407,
6702,
9520,
2245,
1993,
8778,
3404,
11086,
5970,
5084,
9824,
7139,
1637,
4071,
6762,
5230,
5492,
4725,
1785,
8954
] | None |
10,106 | 4 | Payment_Card_Industry_Security_Standards_Council:payment card industry security standards council payment card industry security standards council originally formed american express discover financial services jcb international mastercard visa inc. 7 september 2006 goal managing ongoing evolution payment card industry data security standard council claims independent various card vendors make council pci council formed body security standards known payment card industry data security standard pci dss standards consist twelve significant requirements including multiple sub-requirements contain numerous directives businesses may measure payment card security policies procedures guidelines also manage payment application data security standard pa-dss formerly referred payment application best practices pabp recently collaborated emvco provide security requirements testing procedures assessor training support emv 3-d secure v2.0 standard members pci security standards council currently consist five major payment brands visa mastercard american express discover jcb executives management pci ssc also filled employees aforementioned payment brands interested parties participate development pci security standards registration participating organization participants organized special interest groups tasked recommending revisions development various security standards maintained council | [
3552,
6080,
419,
9640,
4471
] | Validation |
10,107 | 4 | ElcomSoft:elcomsoft elcomsoft co.ltd privately owned software company headquartered moscow russia since establishment 1990 company working computer security programs main focus password system recovery software july 16 2001 dmitry sklyarov russian citizen employed elcomsoft time visiting united states def con arrested jailed allegedly violating united states dmca law writing elcomsoft advanced ebook processor software landmark court case ensued setting precedents attracting much public attention protest december 17 2002 elcomsoft found guilty four charges dmca bruce chizen ceo adobe systems say cnet looking back 20/20 wish could better communication elcomsoft dmitry sklyarov eff electronic frontier foundation whole thing went public 'm sorry n't able think could resolved lot issues thunder tables® company technology developed ensure guaranteed recovery microsoft word microsoft excel documents protected 40-bit encryption technology first appeared 2007 employs time–memory tradeoff method build pre-computed hash tables open corresponding files matter seconds instead days tables take around 4gb far technology used two password recovery programs advanced office password breaker advanced pdf password recovery 7,599,492 fast cryptographic key recovery system method 7,783,046 probabilistic cryptographic key identification deterministic result 7,787,629 use graphics processors parallel math co-processors password recovery 7,809,130 password recovery system method 7,929,707 use graphics processors parallel math co-processors password recovery 2009 elcomsoft released tool takes wpa/wpa2 hash codes uses brute-force methods guess password associated wireless network brute force attack carried testing passwords known ssid network wpa/wpa2 hash code captured passwords tested generated dictionary using various mutation genetic algorithm methods including case mutation password password password etc year mutation password password1992 password67 etc many mutations try guess correct password advantages using methods traditional ones rainbow tables numerous rainbow tables large size amount ssid/password combinations saved take long time traverse large numbers passwords per ssid reliant ssid common one rainbow table already listed hash codes common ones include linksys belkin54g etc. ewsa however uses relatively small dictionary file megabytes versus dozens gigabytes common rainbow tables creates passwords fly needed rainbow tables tested captured wpa/wpa2 hash code via computer processor relatively low numbers simultaneous processes possible ewsa however use computer processor 32 logical cores 8 gpus many cuda cores nvidia stream processors ati november 30 2010 elcomsoft announced encryption system used canon cameras ensure pictures exif metadata altered flawed fixed day dmitry sklyarov gave presentation confidence 2.0 conference prague demonstrating flaws among others showed image astronaut planting flag soviet union moon images pass canon authenticity verification | [
7556,
5284,
6916,
3984,
1623,
8637
] | None |
10,108 | 1 | SESAM_(database):sesam database sesam sql server relational database system originally developed siemens whose role developer successively succeeded siemens nixdorf informationssysteme sni fujitsu siemens computers fujitsu technology solutions runs bs2000/osd mainframe clients running bs2000/osd unix systems solaris linux microsoft windows supported | [
9920,
36,
9766,
3431,
1707,
9137,
3443,
5492,
10837,
823,
9177,
1503
] | None |
10,109 | 2 | NSLU2:nslu2 nslu2 network storage link usb 2.0 disk drives network-attached storage nas device made linksys introduced 2004 discontinued 2008 makes usb flash memory hard disks accessible network using smb protocol also known windows file sharing cifs superseded mainly nas200 enclosure type storage link another sense wrt600n wrt300n/350n combine wi-fi router storage link device runs modified version linux default formats hard disks ext3 filesystem firmware upgrade linksys adds ability use ntfs fat32 formatted drives device better windows compatibility device web interface various advanced features configured including user group permissions networking options device two usb 2.0 ports connecting hard disks uses arm-compatible intel xscale ixp420 cpu models manufactured prior around april 2006 linksys underclocked processor 133 mhz though simple hardware modification remove restriction possible later models circa may 2006 clocked rated speed 266 mhz device includes 32 mb sdram 8 mb flash memory also 100 mbit/s ethernet network connection nslu2 fanless making completely silent stock device runs customised version linux linksys required release source code per terms gnu general public license due availability source code nslu2 use well-documented commodity components relatively low price several community projects centered around including hardware modifications alternative firmware images alternative operating systems varying degrees reconfiguration unofficial hardware modifications include two main replacement firmware images available device first unslung based official linksys firmware improvements features added optware packages available expand functionality slugos/be formerly openslug based openembedded framework slugos/be allows users re-flash device minimal linux system including ssh server allow remote access installed operating system must moved attached hard disk due lack space available flash memory done wide range additional packages available installed internet repository also possible run openwrt debian gentoo freebsd netbsd openbsd ubuntu device ability run unrestricted operating system device opens whole new range uses common uses web server mail server daap server itunes xlink kai upnp av mediaservers bittorrent client freeswitch asterisk pbx network router attachment usb network interface/usb modem german programmer boris pasternak developed weather server program/server meteohub inexpensive way gather weather sensor data personal weather stations pws allow posted number online weather services including weather underground weatherbug citizens weather observation program cwop many others nslu2 unslung firmware interfaced topfield tf5800 personal video recorder pvr allow electronic programme guide epg automatically downloaded internet transferred pvr nslu2 innovative networking reader award tom hardware 2004 awards | [
1537,
2178,
3585,
2308,
10760,
6797,
2193,
1682,
405,
2199,
10393,
5019,
6178,
7983,
9266,
823,
1849,
1728,
7492,
10820,
11337,
9163,
7502,
6618,
5339,
2784,
225,
3300,
10341,
8428,
2285,
9581,
9964,
1776,
10606,
2420,
8319
] | Test |
10,110 | 4 | List_of_security_hacking_incidents:list security hacking incidents timeline computer security hacker history covers important noteworthy events history security hacking cracking | [
3072,
8321,
3843,
6916,
10756,
3852,
8976,
9745,
11152,
4883,
10132,
21,
3350,
8735,
9375,
6305,
2213,
8613,
7337,
939,
5547,
3629,
7851,
7983,
8879,
1970,
6837,
6712,
8632,
8635,
3774,
1087,
3525,
8135,
6473,
6474,
2251,
8779,
7887,
7248... | Test |
10,111 | 3 | Commodity_computing:commodity computing commodity computing also known commodity cluster computing involves use large numbers already-available computing components parallel computing get greatest amount useful computation low cost computing done commodity computers opposed high-cost superminicomputers boutique computers commodity computers computer systems manufactured multiple vendors incorporating components based open standards systems said based commodity components since standardization process promotes lower costs less differentiation among vendors products standardization decreased differentiation lower switching exit cost given vendor increasing purchasers leverage preventing lock-in governing principle commodity computing preferable low-performance low-cost hardware working parallel scalar computing e.g amd x86 cisc fewer high-performance high-cost hardware items e.g ibm power7 sun-oracle sparc risc point number discrete systems cluster greater mean time failures mtbf hardware platform matter reliable fault tolerance must built controlling software purchases optimized cost-per-unit-of-performance absolute performance-per-cpu cost first computers large expensive proprietary move towards commodity computing began dec introduced pdp-8 1965 computer relatively small inexpensive enough department could purchase one without convening meeting board directors entire minicomputer industry sprang supply demand 'small computers like pdp-8 unfortunately many different brands minicomputers stand software little hardware compatibility brands first general purpose microprocessor introduced 1974 immediately began chipping away low end computer market replacing embedded minicomputers many industrial devices process accelerated 1977 introduction first commodity-like microcomputer apple ii development visicalc application 1979 microcomputers broke factory began entering office suites large quantities still back door ibm pc introduced 1981 immediately began displacing apple iis corporate world commodity computing know today truly began compaq developed first true ibm pc compatible pc-compatible microcomputers began coming big companies front door commodity computing well established 1980s microcomputers began displacing larger computers serious way first price key justification late 1980s early 1990s vlsi semiconductor technology evolved point microprocessor performance began eclipse performance discrete logic designs traditional designs limited speed-of-light delay issues inherent cpu larger single chip performance alone began driving success microprocessor-based systems mid-1990s nearly computers made based microprocessors majority general purpose microprocessors implementations x86 instruction set architecture although time every traditional computer manufacturer proprietary micro-based designs manufacturers non-commodity computer systems today today fewer fewer general business computing requirements met off-the-shelf commodity computers likely low-end supermicrocomputer genre continue pushed upward increasingly powerful commodity microcomputers | [
7812,
9621,
8732,
8735,
10272,
3487,
9391,
4017,
5047,
6591,
10951,
330,
9677,
2638,
10447,
11343,
3795,
3042,
499,
1399,
6909,
3582
] | Validation |
10,112 | 5 | Multiple_Access_with_Collision_Avoidance_for_Wireless:multiple access collision avoidance wireless multiple access collision avoidance wireless macaw slotted medium access control mac protocol widely used ad hoc networks furthermore foundation many mac protocols used wireless sensor networks wsn ieee 802.11 rts/cts mechanism adopted protocol uses rts-cts-ds-data-ack frame sequence transferring data sometimes preceded rts-rrts frame sequence view provide solution hidden node problem although protocols based macaw s-mac use carrier sense addition rts/cts mechanism macaw make use carrier sense assume node data transfer node b. node initiates process sending request send frame rts node b destination node node b replies clear send frame cts receiving cts node sends data successful reception node b replies acknowledgement frame ack node send one data fragment wait random time successful data transfer compete adjacent nodes medium using rts/cts mechanism node overhearing rts frame example node f node e illustration refrains sending anything cts received waiting certain time captured rts followed cts maximum waiting time rts propagation time destination node turnaround time node node c node e overhearing cts frame refrains sending anything time data frame ack received solving hidden terminal problem plus random time rts cts frames contain information length data frame hence node uses information estimate time data transmission completion sending long data frame node sends short data-sending frame ds provides information length data frame every station overhears frame knows rts/cts exchange successful overhearing station node f might received rts ds cts defers transmissions ack frame received plus random time sum successful data transfer b consists following sequence frames macaw non-persistent slotted protocol meaning medium busy example cts message station waits random time start time slot sending rts results fair access medium example nodes b c data fragments send busy period chance access medium since transmission range node unaware ongoing data transfer node node b. node data send node c transmission range node d. initiates process sending rts frame node c. node c already deferred transmission completion current data transfer node node b avoid co-channel interference node b hence even though receives rts node reply back cts node assumes rts successful collision hence proceeds back using exponential backoff algorithm multiple data fragments send instant node successfully initiate data transfer small gaps node completed data transfer completion node b next cts node next data transfer request however due node backoff time period probability capture medium small time interval high increase per-node fairness macaw introduces new control message called request request send rrts node c reply earlier due ongoing transmission node node b sends rrts message node next contention period recipient rrts node immediately responds rts normal message exchange commenced nodes overhearing rrts defer two time slots long enough hear successful rts–cts exchange occurs summarize transfer may case consist following sequence frames node c additional back-off algorithms developed researched improve performance basic principle based use sequencing techniques node wireless network maintains counter limits number attempts less equal sequence number use wireless channel states control access probabilities node good channel state higher probability contention success reduces number collisions macaw generally solve exposed terminal problem assume node g data send node f example node g information ongoing data transfer b initiates process sending rts signal node f. node f transmission range node hear rts node g since exposed co-channel interference node g assumes rts successful collision hence backs tries case solution provided rrts mechanism improve situation much since data frames sent b rather long compared frames probability f exposed transmission rather high node f idea node interested initiating data transfer g happens transmit rts transmissions furthermore macaw might behave normally multicasting | [
2306,
388,
8708,
3847,
11288,
2458,
5020,
1192,
11560,
7723,
11181,
7490,
9284,
5321,
7498,
2911,
2785,
5092,
5863,
2802
] | Test |
10,113 | 2 | IMDOS:imdos imdos modified version cp/m operating system intel 8080 processors used ims associates inc. ims imsai 8080 personal computer since mits would license operating system manufacturers ims approached gary kildall paid fixed fee 25,000 non-exclusive cp/m license imdos introduced interrupt-driven devices tree-structured directories advances cp/m | [
6675,
7187,
10776,
25,
4637,
9762,
5158,
7217,
9784,
10809,
576,
10333,
97,
5220,
8298,
8301,
2672,
9329,
7285,
9335,
4727,
2168,
6778,
1147,
3197,
1150,
2179,
10883,
6797,
3216,
9366,
6296,
2201,
7325,
9887,
2729,
7849,
3248,
178,
6837,
... | None |
10,114 | 0 | Artificial_grammar_learning:artificial grammar learning artificial grammar learning agl paradigm study within cognitive psychology linguistics goal investigate processes underlie human language learning testing subjects ability learn made-up grammar laboratory setting developed evaluate processes human language learning also utilized study implicit learning general sense area interest typically subjects ability detect patterns statistical regularities training phase use new knowledge patterns testing phase testing phase either use symbols sounds used training phase transfer patterns another set symbols sounds surface structure many researchers propose rules artificial grammar learned implicit level since rules grammar never explicitly presented participants paradigm also recently utilized areas research language learning aptitude structural priming investigate brain structures involved syntax acquisition implicit learning apart humans paradigm also used investigate pattern learning species e.g cottontop tamarins starlings half century ago george a. miller established paradigm artificial grammar learning order investigate influence explicit grammar structures human learning designed grammar model letters different sequences research demonstrated easier remember structured grammar sequence random sequence letters explanation learners could identify common characteristics learned sequences accordingly encode memory set predicted subjects could identify letters likely appear together sequence repeatedly letters would subjects would use information form memory sets memory sets served participants strategy later memory tests reber doubted miller explanation claimed participants could encode grammar rules productive memory sets able verbalize strategy detail conducted research led development modern agl paradigm research used synthetic grammar learning model test implicit learning agl became used tested model field original paradigm developed miller participants asked memorize list letter strings created artificial grammar rule model test phase participants told set rules behind letter sequences memorized instructed categorize new letter strings based set rules previously exposed classified new letter strings grammatical constructed grammar rule vs. randomly constructed sequences subjects correctly sorted new strings chance level could inferred subjects acquired grammatical rule structure without explicit instruction rules reber found participants sorted new strings chance level reported using strategies sorting task could actually verbalize strategies subjects could identify strings grammatically correct could identify rules composed grammatical strings research replicated expanded upon many others conclusions studies congruent reber hypothesis implicit learning process done intentional learning strategies studies also identified common characteristics implicitly acquired knowledge modern agl paradigm used investigate explicit implicit learning although often used test implicit learning typical agl experiment participants required memorize strings letters previously generated specific grammar length strings usually ranges 2-9 letters per string example grammar shown figure 1 figure 1 example artificial grammar rule order compose grammatically ruleful string letters according predetermined grammar rule subject must follow rules pairing letters represented model figure 1 observing violation grammatical rule system composes string considered unruleful randomly constructed string case standard agl implicit learning task subjects told strings based specific grammar instead simply given task memorize letter strings memory learning phase subjects told letter strings presented learning phase based specific rules explicitly told rules test phase subjects instructed categorize new letter strings ruleful unruleful dependent variable usually measured percentage correctly categorized strings implicit learning considered successful percentage correctly sorted strings significantly higher chance level significant difference found indicates existence learning process involved memorizing presented letter strings mechanism behind implicit learning hypothesized occur people engage artificial grammar learning statistical learning specifically bayesian learning bayesian learning takes account types biases prior probability distributions individuals contribute outcome implicit learning tasks biases thought probability distribution contains probability possible hypothesis likely correct due structure bayesian model inferences output model form probability distribution rather single probable event output distribution posterior probability distribution posterior probability hypothesis original distribution probability hypothesis true given data probability data given hypothesis true bayesian model learning fundamental understanding pattern detection process involved implicit learning therefore mechanisms underlie acquisition artificial grammar learning rules hypothesized implicit learning grammar involves predicting co-occurrences certain words certain order example dog chased ball sentence learned grammatically correct implicit level due high co-occurrence chase one words follow dog sentence like dog cat ball implicitly recognized grammatically incorrect due lack utterances contain words paired specific order process important teasing apart thematic roles parts speech grammatical processing see grammar labeling thematic roles parts speech explicit identification words parts speech implicit traditional approaches agl claim stored knowledge obtained learning phase abstract approaches argue stored knowledge concrete consists exemplars strings encountered learning phase chunks exemplars case assumed information stored memory retrieved test phase used aid decisions letter strings 3 main approaches attempt explain agl phenomena research amnesia patients suggests dual factor approach may accurate model series experiments amnesiac patients support idea agl involves abstract concepts concrete exemplars amnesiacs able classify stimuli grammatical vs. randomly constructed well participants control group able successfully complete task amnesiacs able explicitly recall grammatical chunks letter sequence control group able explicitly recall performing task grammar rules different sequence letters previously tested amnesiacs control group able complete task although performance better task completed using set letters used training results experiment support dual factor approach artificial grammar learning people use abstract information learn rules grammars use concrete exemplar-specific memory chunks since amnesiacs unable store specific chunks memory completed task using abstract set rules control group able store specific chunks memory evidenced recall store examples memory later reference agl research criticized due automatic question agl considered automatic process encoding see encoding memory performance automatic sense occurring without conscious monitoring without conscious guidance performer ’ intentions case agl claimed implicit learning automatic process due fact done intention learning specific grammar rule complies classic definition automatic process fast unconscious effortless process may start unintentionally aroused continues without ability stop ignore consequences definition challenged many times alternative definitions automatic process given reber presumption agl automatic could problematic implying unintentional process automatic process essence focusing agl tests issues need addressed process complex contains encoding recall retrieval encoding retrieval could interpreted automatic processes since encoded learning stage necessary task intentionally performed test stage researchers need differentiate implicitness referring process learning knowledge encoding also referring performance test phase knowledge retrieval knowledge encoded training may include many aspects presented stimuli whole strings relations among elements etc. contribution various components performance depends specific instruction acquisition phase requirements retrieval task therefore instructions every phase important order determine whether stage require automatic processing phase evaluated automaticity separately one hypothesis contradicts automaticity agl mere exposure effect mere exposure effect increased affect towards stimulus result nonreinforced repeated exposure stimulus results 200 experiments effect indicate positive relationship mean goodness rating frequency stimulus exposure stimuli experiments included line drawings polygons nonsense words types stimuli used agl research experiments exposed participants stimulus 25 times following exposure participants asked rate degree stimulus suggested good vs. bad effect 7-point scale addition main pattern results also found several experiments participants rated higher positive affect previously exposed items novel items since implicit cognition reference previous study episodes effects affect ratings observed processing stimuli truly implicit results experiments suggests different categorization strings may occur due differences affect associated strings due implicitly learned grammar rules since advent computers artificial intelligence computer programs adapted attempt simulate implicit learning process observed agl paradigm ai programs first adapted simulate natural artificial grammar learning used following basic structure early model ai grammar learning wolff snpr system program acquires series letters pauses punctuation words sentences program examines string subsets looks common sequences symbols defines chunks terms sequences chunks akin exemplar-specific chunks described agl model acquires chunks exposure chunks begin replace sequences unbroken letters chunk precedes follows common chunk model determines disjunctive classes terms first set example model encounters the-dog-chased the-cat-chased classifies dog cat members class since precede chase model sorts chunks classes explicitly define groups e.g. noun verb early ai models grammar learning ignored importance negative instances grammar effect grammar acquisition also lacking ability connect grammatical rules pragmatics semantics newer models attempted factor details unified model attempts take factors account model breaks grammar according cues languages mark case roles using five possible cue types word order case marking agreement intonation verb-based expectation see grammar influence cue language grammar determined cue strength cue validity values determined using formula except cue strength defined experimental results cue validity defined corpus counts language databases formula cue strength/validity follows cue availability proportion times cue available times needed cue reliability proportion times cue correct total occurrences cue incorporating cue reliability along cue availability unified model able account effects negative instances grammar since takes accuracy frequency account result also accounts semantic pragmatic information since cues produce grammar appropriate context low cue strength cue validity macwhinney model also simulates natural grammar learning attempts model implicit learning processes observed agl paradigm contemporary studies agl attempted identify structures involved acquisition grammar implicit learning agrammatic aphasic patients see agrammatism tested agl paradigm results show breakdown language agrammatic aphasia associated impairment artificial grammar learning indicating damage domain-general neural mechanisms sub serving language sequential learning de vries barth maiworm knecht zwitserlood flöel found electrical stimulation broca area enhances implicit learning artificial grammar direct current stimulation may facilitate acquisition grammatical knowledge finding potential interest rehabilitation aphasia petersson vasiliki hagoort examine neurobiological correlates syntax processing structured sequences comparing fmri results artificial natural language syntax argue chomsky hierarchy directly relevant neurobiological systems agl testing | [
6274,
10102,
8759
] | Test |
10,115 | 5 | TCP_tuning:tcp tuning tcp tuning techniques adjust network congestion avoidance parameters transmission control protocol tcp connections high-bandwidth high-latency networks well-tuned networks perform 10 times faster cases however blindly following instructions without understanding real consequences hurt performance well bandwidth-delay product bdp term primarily used conjunction tcp refer number bytes necessary fill tcp path i.e equal maximum number simultaneous bits transit transmitter receiver high performance networks large bdps give practical example two nodes communicating geostationary satellite link round-trip delay time round-trip time rtt 0.5 seconds bandwidth 10 gbit/s 0.5×10 bits i.e. 5 gbit 625 mb unacknowledged data flight despite much lower latencies satellite links even terrestrial fiber links high bdps link capacity large operating systems protocols designed recently years ago networks slower tuned bdps orders magnitude smaller implications limited achievable performance original tcp configurations supported tcp receive window size buffers 65,535 64 kib 1 bytes adequate slow links links small rtts larger buffers required high performance options described buffering used throughout high performance network systems handle delays system general buffer size need scaled proportionally amount data flight time high performance applications sensitive network delays possible interpose large end end buffering delays putting intermediate data storage points end end system use automated scheduled non-real-time data transfers get data final endpoints maximum achievable throughput single tcp connection determined different factors one trivial limitation maximum bandwidth slowest link path also less obvious limits tcp throughput bit errors create limitation connection well rtt computer networking rwin tcp receive window amount data computer accept without acknowledging sender sender received acknowledgement first packet sent stop wait wait exceeds certain limit may even retransmit tcp achieves reliable data transmission even packet loss network windowing limit throughput tcp transmits data window size waiting acknowledgements full bandwidth network may always get used limitation caused window size calculated follows formula_1 rwin tcp receive window rtt round-trip time path given time window advertised receive side tcp corresponds amount free receive memory allocated connection otherwise would risk dropping received packets due lack space sending side also allocate amount memory receive side good performance even data sent network sending side must hold memory acknowledged successfully received case would retransmitted receiver far away acknowledgments take long time arrive send memory small saturate block emission simple computation gives optimal send memory size receive memory size given packet loss occurs network additional limit imposed connection case light moderate packet loss tcp rate limited congestion avoidance algorithm limit calculated according formula mathis et al formula_2 mss maximum segment size p probability packet loss packet loss rare tcp window becomes regularly fully extended formula n't apply number extensions made tcp years increase performance fast high-rtt links long fat networks lfns tcp timestamps rfc 1323 play double role avoid ambiguities due 32-bit sequence number field wrapping around allow precise rtt estimation presence multiple losses per rtt improvements becomes reasonable increase tcp window beyond 64 kb done using window scaling option rfc 1323 tcp selective acknowledgment option sack rfc 2018 allows tcp receiver precisely inform tcp sender segments lost increases performance high-rtt links multiple losses per window possible path mtu discovery avoids need in-network fragmentation increasing performance presence packet loss | [
10242,
3847,
649,
7817,
9868,
6797,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
3133,
3006,
5181,
5437,
7364,
2887,
8391,
8265,
2509,
4687,
5843,
4692,
2904,
5469,
... | Validation |
10,116 | 3 | University_of_Bristol:university bristol university bristol simply referred bristol university abbreviated bris post-nominal letters uob red brick research university located bristol united kingdom received royal charter 1909 although like university west england university bath trace roots merchant venturers technical college founded school 1595 society merchant venturers key predecessor institution university college bristol existence since 1876 bristol organised six academic faculties composed multiple schools departments running 200 undergraduate courses largely situated tyndalls park area city university total income £642.7 million 2017/18 £164.0 million research grants contracts. ref name= bristol financial statement 17/18 /ref largest independent employer bristol university bristol ranked 44th qs world university rankings 2018 ranked amongst top 10 uk universities qs arwu highly selective institution average 6.4 sciences faculty 13.1 medicine dentistry faculty applicants undergraduate place ranked 9th uk amongst multi-faculty institutions quality gpa research research power 2014 research excellence framework current academics include 21 fellows academy medical sciences 13 fellows british academy 13 fellows royal academy engineering 44 fellows royal society university associated 13 nobel laureates throughout history including paul dirac sir william ramsay cecil frank powell sir winston churchill dorothy hodgkin hans albrecht bethe max delbrück gerhard herzberg sir nevill francis mott sir paul nurse harold pinter jean-marie gustave le clézio recently 2015 economics nobel prize winner angus deaton bristol member russell group research-intensive british universities european-wide coimbra group worldwide universities network university previous vice-chancellor eric thomas chairman 2005 2007 addition university holds erasmus charter sending 500 students per year partner institutions europe earliest antecedent university engineering department merchant venturers technical college founded school early 1595 became engineering faculty bristol university university also preceded bristol medical school 1833 university college bristol founded 1876 first lecture attended 99 students university able apply royal charter due financial support wills fry families made fortunes tobacco plantations chocolate respectively wills family made vast fortune tobacco industry gave generously city university royal charter gained may 1909 288 undergraduates 400 students entering university october 1909 henry overton wills iii became first chancellor university college first institution country admit women basis men however women forbidden take examinations medicine 1906 since founding university 1909 grown considerably one largest employers local area although smaller student numbers nearby university west england bristol campus spread considerable geographic area activities however concentrated area city centre referred university precinct member russell group research-led uk universities coimbra group leading european universities worldwide universities network wun founding university college 1876 government support began 1889 mergers bristol medical school 1893 merchant venturers technical college 1909 funding allowed opening new medical school engineering school—two subjects remain among university greatest strengths 1908 gifts fry wills families particularly £100,000 henry overton wills iii £6m today money provided endow university bristol west england provided royal charter could obtained within two years december 1909 king granted charter erected university bristol henry wills became first chancellor conwy lloyd morgan first vice-chancellor wills died 1911 tribute sons george harry built wills memorial building starting 1913 finally finishing 1925 today houses parts academic provision earth sciences law graduation ceremonies held great hall wills memorial building grade ii* listed building 1920 george wills bought victoria rooms endowed university students union building houses department music grade ii* listed building point foundation university required provide local community mission behind creation department extra-mural adult education 1924 provide courses local community mission continues today new admissions policy specifically caters 'bs postcode area bristol among famous names associated bristol early period paul dirac graduated 1921 degree engineering obtaining second degree mathematics 1923 cambridge subsequent pioneering work quantum mechanics awarded 1933 nobel prize physics later 1920s h.h wills physics laboratory opened ernest rutherford since housed several nobel prize winners cecil frank powell 1950 hans albrecht bethe 1967 sir nevill francis mott 1977 laboratory stands site today close bristol grammar school city museum sir winston churchill became university third chancellor 1929 serving university capacity 1965 succeeded richard haldane held office 1912 following death henry wills world war ii wills memorial bombed destroying great hall organ housed along 7,000 books removed king college london safe keeping since restored former glory complete oak panelled walls new organ 1946 university established first drama department country year bristol began offering special entrance exams grants aid resettlement servicemen returning home student numbers continued increase faculty engineering eventually needed new premises become queen building 1955 substantial building housed university engineers 1996 department electrical engineering department computer science moved road new merchant venturers building make space rapidly expanding fields today queen building caters teaching needs faculty provides academic space heavy engineering subjects civil mechanical aeronautical unprecedented growth 1960s particularly undergraduate numbers student union eventually acquired larger premises new building clifton area city 1965 building spacious victoria rooms given department music new union provides many practice performance rooms specialist rooms well three bars bar 100 mandela also known ar2 avon gorge whilst spacious union building thought many ugly character compared architecture rest clifton area mentioned bbc poll find worst architectural eyesores britain university proposed relocating union central location part development 'masterplan recently plans redevelopment current building proposed 1960s time considerable student activism united kingdom bristol exception 1968 many students marched support anderson report called higher student grants discontent culminated 11-day sit-in senate house administrative headquarters university series chancellors vice-chancellors led university decades henry somerset 10th duke beaufort taking churchill chancellor 1965 succeeded dorothy hodgkin 1970 spent next 18 years office age mass higher education dawned bristol continued build student numbers various undergraduate residences repeatedly expanded recently postgraduate residences constructed recent ventures funded run external companies agreement university since 1988 three chancellors sir jeremy morse chairman lloyds bank handed 2003 brenda hale first female law lord sir paul nurse succeeded lady hale chancellor 1 january 2017 one centres deaf studies united kingdom established bristol 1981 followed 1988 norah fry centre research learning difficulties also 1988 2004 students union agm voted disaffiliate national union students nus occasions however subsequent referendum students reversed decision bristol remains affiliated nus 2002 university involved argument press intrusion details then-prime minister tony blair son application university published national newspapers number postgraduate students grown particularly numbers pursuing taught master degrees eventually became need separate representation university bodies postgraduate union pgu established 2000 universities increasingly expected exploit intellectual property generated research activities 2000 bristol established research enterprise division red cause particularly technology-based businesses 2001 university signed 25-year research funding deal ip2ipo intellectual property commercialisation company 2007 research activities expanded opening advanced composites centre innovation science accis bristol institute public affairs bipa 2002 university opened new centre sports exercise health heart university precinct cost local residents also able use facilities expansion teaching research activities continues 2004 faculty engineering completed work bristol laboratory advanced dynamics engineering blade £18.5m project intended study dynamics advanced facility europe built extension queen building officially opened queen elizabeth ii march 2005 january 2005 school chemistry awarded £4.5m higher education funding council england create bristol chemlabs centre excellence teaching learning cetl additional £350k announced capital part project february 2006 bristol chemlabs stands bristol chemical laboratory sciences chemistry cetl uk september 2009 saw opening university centre nanoscience quantum information £11 million building known quietest building world technologically sophisticated features self-cleaning glass advanced research quantum computing nanotechnology materials disciplines undertaken building also plan significantly redevelop centre university precinct coming years first step began september 2011 start construction state-of-the-art life sciences building time heavy financial pressures universities £50 million project clear statement bristol committed world class research teaching facilities 2018 building work underway fry building building caught fire university regarded elitist commentators taking 41 undergraduate students non-state schools according recent 2009/2010 figures despite fact pupils make 7 population 18 16+ year old pupils across uk intake state school pupils bristol lower many oxbridge colleges high ratio undergraduates non-state school led tension university late february early march 2003 bristol became embroiled row admissions policies private schools threatening boycott based claims effort improve equality access university discriminating students claims hotly denied university august 2005 following large-scale survey independent schools council publicly acknowledged evidence bias applicants schools represented university new admissions policy lays considerable detail basis greater lesser weight may given particular parts applicant backgrounds – particular account may taken school applicant hails new policy also encourages greater participation locally resident applicants university bristol buildings date pre-charter days university college bristol buildings designed charles hansom younger brother joseph hansom joseph inventor hansom cab buildings suffered built stages due financial pressure george oatley added tower memory albert fry still seen university road first large scale building project university bristol undertook gaining charter wills memorial building hoped would symbol academic permanence university memorial chief benefactor university henry overton wills requested architect george oatley building built last least 400 years site purchased top park street suffered awkward slope desirability link building museum art gallery situated adjacent plot architecture critic roger gill stated building remarkable size noted ambience medieval university strangely lacking goes criticise building sham folly armorials founder window represent interests present founding university bristol including wills fry families tyndalls park estate royal fort house also purchased trustees tyndall family allowing university expand many departments faculty arts housed large victorian houses converted teaching goldney gardens entered property university bristol george wills hoped build all-male hall residence prevented due moral objection warden clifton hall house objected idea male female residences close proximity university records show miss starvey prepared resign issue support chancellor conwy lloyd morgan eventually land purchased stoke bishop allowing wills hall bought allowing building described quasi-oxbridge hall added dame monica wills chapel george wills widow death burwalls mansion house side avon gorge used halls residence past home sir george oatley building used house centre continuing education many modern buildings including senate house newer parts hh wills physics laboratory designed ralph brentnall funds university grants committee also responsible extension wills memorial building library completed standard realise extension original building brentnall oversaw rebuilding great hall wills memorial building partly destroyed bristol blitz world war ii buildings st michael hill rebuilt using hundreds old photographs recreate original houses flats goldney hall designed michael grice received award civic trust design bristol university owns best examples georgian architecture city best examples royal fort house clifton hill house goldney hall despite additions victoria rooms house music department designed charles dyer seen good example greek revival movement british architecture tympanum building depicts scene advent morning designed jabez tyley major feature large organ since destroyed fire november 2016 university announced plans build £300 million temple quarter campus c. 5,000 students next bristol temple meads railway station within bristol temple quarter enterprise zone new campus include business school digital research facilities student village expected open 2021 existing campus plans remodel tyndall avenue pedestrianise surrounding area build new library resource hub common uk universities bristol headed formally chancellor currently sir paul nurse led day-to-day basis vice-chancellor currently hugh brady academic leader chief executive four pro vice-chancellors three ceremonial pro-chancellors chancellor may hold office ten years pro-chancellors three unless university court determines otherwise vice-chancellor pro-vice-chancellors term limits vice-chancellor supported deputy vice-chancellor responsibility running university held executive level vice-chancellor council body recommend changes university statutes charter exception academic ordinances made consent senate chief academic body university also holds responsibility teaching learning examinations research enterprise chancellor pro chancellors nominated council appointed formally court whose additional powers limited appointments others including lay members council finally convocation body staff ceremonial officers graduates university returns 100 members court one member council otherwise principally forum discussion ensure graduates stay touch university university made number schools departments organised six faculties university specifies mix cambridge oxford academic dress part uses oxford-style gowns cambridge-style hoods required 'university red see logo top page 2004 university unveiled new crest icons crest sun wills family dolphin colston horse fry ship-and-castle medieval seal city bristol also used coat arms shape whole crest represents open book learning crest replaced university arms shown arms continue used specific historical ceremonial requirement arms comprise argent cross quadrate gules arms city bristol pale sun splendour wills open book proper leaved clasped inscribed words nisi quia dominus fesse sinister dolphin embowed colston dexter horse courant fry third inscription book latin opening 124th psalm lord side ... bristol 8th highest average entry qualification undergraduates uk university 2015 new students averaging 485 ucas points equivalent aaaaa a-level grades competition places high average 7.7 applications per place according 2014 sunday times league tables making joint 11th competitive university uk university gives offers admission 67.3 applicants 8th lowest amongst russell group according 2017 times sunday times good university guide approximately 40 bristol undergraduates come independent schools 2016-17 academic year university domicile breakdown 78:5:17 uk eu non-eu students respectively female male ratio 55:45 bristol ranked 10th overall sunday times 10-year 1998–2007 average ranking british universities based consistent league table performance member 'sutton 13 top ranked universities uk internationally 2016 qs world university rankings placed bristol 41st overall world 2012 2013 rankings also placed bristol 15th world terms reputation employers placing higher several american ivy league universities including princeton university cornell upenn bristol chosen ninth best university uk quality graduates according recruiters uk major companies another international ranking shanghai jiao tong university academic ranking world universities placed bristol 64th globally 2013 times higher education world university ranking placed bristol 66th 2011 bristol ranked 47th world 6th uk 2016 round university ranking 2017 u.s. news world report ranks bristol 76th world 2019 ranked 120th among universities around world scimago institutions rankings according data published sunday times bristol sixth-highest percentage good honours uk university 2010 centre higher education development excellence rankings bristol one four uk universities oxford ucl manchester rated excellent seven departments following courses offered university bristol managed reach top 5 'times ranking 2008 computer science 3rd electrical electronic engineering 3rd civil engineering 5th biological sciences 3rd mathematics 3rd psychology 4th furthermore qs world university rankings place bristol world top 100 universities subject areas 2011 arts humanities 57th natural sciences 40th engineering 83rd social sciences 65th life sciences 70th breakdown qs world university natural sciences ranking shows following earth sciences 25th mathematics 35th environmental sciences 39th physics 41st chemistry 48th addition bristol particularly strong field social sciences particularly economics finance management rated fourth 2008 guardian university guide business management studies 2011 guardian also ranked bristol third uk geography behind second place oxford ranked bristol 1st uk music complete university guide 2013 bristol ranked fifth german fourth russian third mechanical civil engineering third music second drama bristol also known research strength 15 departments gaining top grade 5* 2001 research assessment exercise overall 36 46 departments rated gained top two ratings 5 5* 76 academic staff working departments scored top two levels terms teaching strength bristol average teaching quality assessment score 22.05/24 tqa abolished bristol drop-out rate also lower benchmark set hefce 3.1 bristol awards range academic degrees spanning bachelor master degrees well junior doctorates higher doctorates postnominals awarded degree abbreviations used commonly among british universities university part engineering doctorate scheme awards eng d. systems engineering engineering management aerospace engineering non-destructive evaluation bristol notably award title bachelor degrees music available study awarded ba although award mmus dmus degree divinity since divinity available study students theology awarded ba similarly university award blitt bachelor letters although award mlitt dlitt regulations university name md dds higher doctorates although many universities degrees normally accredited professional doctorates degrees dlitt dsc deng lld dmus whilst regulations specifying grounds award often conferred honorary degrees honoris causa used commonly dlitt dsc lld occasionally mlitt also sometimes conferred honorarily distinction local area within university university bristol students union bristol su bsu located queen road founding member national union students amongst oldest students unions england union oversees three media outlets ubtv bristol university radio station burst student newspaper epigram also local branch tab terms student life union responsible organisation annual freshers fair co-ordination bristol student community action organises volunteering projects local community organisation entertainment events large number student societies previous presidents included sue lawley former liberal democrat mp lembit öpik separate union postgraduate students well athletic union member british universities colleges sport distinction blues awarded sporting excellence oxford cambridge bristol successful athletes awarded reds accommodation students primarily central precinct university two areas bristol clifton stoke bishop known respectively west north villages stoke bishop wills hall edge clifton downs first opened 1929 chancellor winston churchill original quadrangle layout expanded twice 1962 1990 churchill hall named chancellor followed 1956 badock hall 1964 time badock hall establishment buildings called hiatt baker hall two years later hiatt baker moved site largest hall university first self-catering hall stoke bishop university hall established 1971 expansion 1992 university newest undergraduate residence 33 colston street opened city centre october 2011 acquiring property 2009 university established partnership unite plc order provide accommodation due increase number students accepted entry academic year 2012/2013 £20 million project expanding facilities hiatt baker provide additional 327 places undergraduate students 2014 main halls elect groups students junior common room organise halls social calendar next year residents student houses private accommodation students living home become members orbital – society organising social events students throughout year clifton goldney hall built first early 18th century wealthy merchant goldney family eventually became part university 1956 popular location filming chronicles narnia house eliott truly madly deeply well episodes fools horses casualty filmed grotto grounds grade listed building clifton hill house another grade listed building used student accommodation clifton original building constructed 1745 1750 isaac ware used university since earliest days 1909 manor hall comprises five separate buildings principal erected 1927–1932 design george oatley following donation henry herbert wills one annexes manor house recently refurbished officially 'reopened 1999 goldney hall beautiful gardens modern accommodation complexes clifton hill house dated facilities clifton residences also possesses attractive gardens manor hall houses largest dated rooms dating back early 20th century central precinct sits hawthorns student house accommodating 115 undergraduate students house started life collection villas built somewhere 1888 1924 later converted bit bit hotel john dingle hawthorns also houses conferencing facilities staff refectory bar accommodation office student houses office several residences central precinct recent built managed third-party organisations exclusivity arrangements university include new bridewell house opened 2016 includes en-suite bedrooms studios former police hq operated fresh student housing unite house chantry court opened 2000 2003 respectively unite group well dean court 2001 postgraduates woodland court 2005 run dominion housing group current academics university bristol include 18 fellows academy medical sciences 10 fellows british academy 13 fellows royal academy engineering 31 fellows royal society include sir michael berry one discoverers quantum mechanics geometric phase john rarity international expert quantum optics quantum cryptography quantum communication david may computer scientist lead architect transputer mark horton british maritime historical archaeologist academics computer science include david cliff inventor seminal zip trading algorithm peter flach mike fraser professor human-computer interaction julian gough nigel smart past academics university include patricia broadfoot vice-chancellor university gloucestershire nigel thrift vice-chancellor university warwick wendy larner provost victoria university wellington anthony epstein co-discoverer epstein-barr virus professor pathology university 1968–1982 sir john lennard-jones discoverer lennard-jones potential physics alfred marshall one university college principals influential economist latter part 19th century mathematicians philosophers rohit parikh brian rotman lectured mathematics department philosopher science paul feyerabend taught department philosophy university bristol associated three ig nobel prizes award unusual trivial achievements scientific research sir michael berry shared award andre geim nobel laureate using magnets levitate frog gareth jones also shared ig nobel prize scientifically documenting fellatio fruit bats dr. len fisher awarded 1999 prize physics calculating optimal way dunk biscuit bristol alumnus paul dirac went win nobel prize physics 1933 contribution formulation quantum mechanics considered one significant physicists 20th century notable scientists include dani rabaiotti environmental scientist science communicator notable alumni include writers dick king-smith sarah kane olivier award winning playwright laura wade angela carter dorothy simpson david gibbins david nicholls author novel starter ten turned screenplay set university bristol mark simmons author business books hutton economist author commentator entertainment current affairs former students include journalist mcmafia author misha glenny james landale bbc news chief political correspondent founded university independent newspaper epigram author journalist julie myerson william lewis editor-in-chief telegraph media group derren brown illusionist sue lawley radio 4 presenter alastair stewart newsreader dominic waghorn sky news us correspondent susanna reid itv breakfast anchor studied politics philosophy law university 1989 1992 also editor student newspaper epigram comedy matt lucas david walliams simon pegg chris morris creator controversial brass eye jon richardson comedy stars include chris langham thick fame standup comic marcus brigstocke alumni include mike bennett digital media entrepreneur albert ii prince monaco musician james blunt former liberal democrat mp lembit öpik president bristol university students union time sir jonathan evans former head mi5 anne mcclain member 2013 nasa astronaut class nkosazana dlamini-zuma chairperson african union commission october 2012 january 2017. notable alumni film television production department include film directors mick jackson michael winterbottom marc evans christopher smith alex cox peter webber maddie moate amongst many others | [
9984,
10116,
1862,
9801,
127,
11055,
4595,
4916,
6648,
2428,
415
] | Validation |
10,117 | 3 | Synchronous_Data_Flow:synchronous data flow synchronous dataflow restriction kahn process networks nodes produce consume fixed number data items per firing allows static scheduling | [
5090
] | None |
10,118 | 8 | Microsoft_services:microsoft services microsoft online services refers hosted technology solutions consumers businesses services previously branded windows live umbrella among services offered webmail storage contacts calendar accessed microsoft account microsoft services team provides wide range consulting support services consumers partners businesses web services feature metro user interface ui header contains pull-down element allows users switch outlook.com people calendar skydrive header color also changes depending web service user using exception outlook.com allows users customize header color according preference interface also in-built messaging sidebar allows users interact contacts messenger facebook skype using instant messages audio calls video calls | [
4704,
9448,
8740
] | Test |
10,119 | 4 | Insider_threat_management:insider threat management insider threat management process preventing combating detecting monitoring employees remote vendors contractors fortify organization data theft fraud damage insider individual employed agency access facilities sensitive information organizational data information systems equipment may accounts giving legitimate access computer systems access originally given serve performance duties permissions could abused harm organization insiders often familiar organization data intellectual property well methods place protect makes easier insider circumvent security controls aware physical proximity data means insider need hack organizational network outer perimeter traversing firewalls rather building already often direct access organization internal network insider threats harder defend attacks outsiders since insider already legitimate access organization information assets insiders may comprise permanent temporary employees vendors contractors suppliers ex-employees common insiders elevated access utilize sensitive information without drawing suspicion however anyone insider threat organization dispose secure utilize sensitive information described agency regulations cases individuals compromised opposing agency exploited individual financial status threats life factors order force individual comply opposing agencies demands insider may attempt steal property information personal gain benefit another organization country attacks may range information data stolen destruction business property insiders may perform following threats organization insiders similar characteristics compiled order help determine possible threats researchers identified insiders mainly show antisocial behavior may include limited machiavellianism narcissism psychopathy information system side list common behavioral indicators known insiders insider threat program management educational resources national insider threat special interest group nitsig created response u.s. goverment presidential executive order 13587 structural reforms improve security classified networks responsible sharing safeguarding classified information national insider threat policy national industrial security program operating manual conforming change 2 nitsig created function national insider threat information sharing analysis center nitsig membership largest network 1000+ insider threat mitigation professionals u.s. globally willingness members collaborate share information among membership driving force made nitsig successful encourage become member attend meetings events charge become member https //nationalinsiderthreatsig.org insider threat defense group one first companies offer comprehensive insider threat program development management training u.s. government agencies department defense intelligence community defense contractors required develop implement insider threat programs https //www.insiderthreatdefense.us damaging insider threat incident impacts insider threat incidents severe costly damaging incidents insiders malicious non-malicious insider incidents damaging malicious incidents listed link numerous insider threat incidents severe impacts organizations https //www.insiderthreatdefense.us/insider-threat/ | [
5722,
9750,
8638,
3495
] | Test |
10,120 | 4 | CloudEndure:cloudendure cloudendure cloud computing company develops business continuity software disaster recovery continuous backup live migration cloudendure headquartered united states r israel cloudendure founded 2012 ofer gadish ceo gil shai cro ofir ehrlich vp r leonid feinberg vp product founders previously established acceloweb acquired limelight networks 2011 cloudendure raised total 18.2 million private investors companies dell emc vmware mitsui infosys magma venture partners awards cloudendure include 2017 crn emerging vendors award storage startups 2016 gartner cool vendor award cloudendure products integrated oem software several partner company services including integration google cloud vm migration service integrations cisco systems cloudcenter disaster recovery migration sungard availability services cloud recovery amazon made offer purchase cloudendure january 2019 200 250 million negotiated price outbid google acquired company january 10 2019 cloudendure disaster recovery performs continuous block-level replication saves dormant copy target infrastructure uses smaller percentage compute storage memory primary site leads minimal rtos recovery time objective rpos recovery point objective spun disaster company offers two tiers disaster recovery well continuous backup live migration products cloudendure ’ software service saas application-agnostic replicate workloads physical virtual cloud-based infrastructure variety target sites including amazon web services aws google cloud platform gcp microsoft azure vmware cloudendure ltd. holds pending seven patents including disaster recovery disaster recovery plan drp business continuity recovery time objective rto recovery point objective rpo continuous data protection | [
3366,
6153,
1935,
7248,
6514,
6834,
982
] | None |
10,121 | 6 | PKZIP:pkzip pkzip file archiving computer program notable introducing popular zip file format pkzip first introduced ms-dos ibm-pc compatible platform 1989 since versions released number architectures operating systems pkzip originally written phil katz marketed company pkware inc bearing initials 'pk 1970s file archiving programs distributed standard utilities operating systems include unix utilities ar shar tar utilities designed gather number separate files single archive file easier copying distribution archives could optionally passed stream compressor utility compress others archivers also appeared 1980s including arc system enhancement associates inc. sea rahul dhesi zoo dean w. cooper dwc lharc haruhiko okomura haruyasu yoshizaki arj stands archived robert jung development pkzip first announced file softdev.doc within pkpak 3.61 package stating would develop new yet unnamed compression program announcement made following lawsuit sea pkware inc although sea suit lost compression war user base migrated pkzip compressor choice led bbs sysops refused accept offer files compressed .arc files users began recompressing old archives currently stored .arc format .zip files first version released 1989 dos command-line tool distributed shareware model us 25 registration fee us 47 manual help ensure interoperability zip format phil katz published original .zip file format specification appnote.txt documentation file pkware continued maintain document periodically published updates originally bundled registered versions pkzip later available pkware site specification version number necessarily correspond pkzip version numbers especially pkzip 6 later various times pkware adds preliminary features allows pkzip products extract archives using advanced features pkzip products create archives wo n't available next major release although popular time zip archives using pkzip 1.0 compression methods rare many modern unzip tools unable handle shrinking reducing although imploding usually supported shrinking uses dynamic lzw unisys held patents patent reduce algorithm also filed june 19 1984 long pkzip produced pkware also used pkzip standards following products | [
10756,
6022,
10886,
1420,
6797,
9745,
1940,
3222,
9880,
2201,
11432,
3114,
10027,
9388,
3629,
950,
6713,
2755,
11076,
3142,
7366,
1352,
4296,
10317,
9166,
10575,
4561,
722,
4441,
11614,
1631,
3296,
9953,
5858,
6759,
7529,
4459,
237,
1646,
... | Validation |
10,122 | 2 | Portable_Distributed_Objects:portable distributed objects portable distributed objects pdo application programming interface api creating object-oriented code executed remotely network computers created next computer inc. using openstep system whose use objective-c made package easy write characterized light weight high speed comparison similar systems corba versions pdo available solaris hp-ux versions openstep system version worked microsoft ole also available called d'ole allowing distributed code written using pdo platform presented microsoft systems local ole objects pdo one number distributed object systems created early 1990s design model front end applications gui-based microcomputers would call code running mainframe minicomputers processing data storage microsoft evolving ole component object model com similar distributed version called dcom ibm system object model som/dsom sun microsystems promoting distributed objects everywhere host smaller players well exception limited functionality com systems extremely heavyweight tended large slow often difficult use pdo hand relied small number features objective-c runtime handle portability well distribution key feature language support second chance method classes method call object failed object n't support normally allowed languages due strong typing runtime would bundle message compact format pass back object codice_1 method normal behavior codice_1 return error including details taken message invocation pdo instead supplied number new objects codice_1 methods passed invocation object another machine network various versions support different networks platforms calling methods remote objects almost invisible network setup lines typically pdo objects instantiated locally called way object system pdo object forwarded invocation remote computer processing unbundled results returned comparison corba pdo programs typically 1/10 less size common next staffers write magazines showing re-implement multi-page corba article perhaps 15 lines code programming standpoint nearly nothing easy use pdo however pdo also reliant entirely objective-c function price unwilling pay time c++ widely used effort shift codebases entirely new language paradigm considered onerous pdo never saw much use next emphasis shifted new webobjects framework 1995 pdo continues used mac os x programmers method interprocess interapplication communication communication networked applications need compatibility mac os x applications addition os x platform gnustep implementation distributed objects | [
9665,
2980,
10470,
7307,
10029,
8303,
8304,
2804,
1304,
3323
] | Test |
10,123 | 7 | Animaker:animaker animaker diy video animation software software cloud-based launched 2014 allows users create animated videos using pre-built characters templates 2017 animaker became first tool launch animated vertical video creator animaker cloud-based video animation software first launched open beta version 2014 february 2015 software officially launched based freemium model allowed users free account option software provides online tools create edit video animation software developed animaker inc video based saas company founded rs raghavan animaker uses html5 adobe flash create animated videos exported facebook youtube downloaded mp4 file software also available chrome extension chrome web store | [] | Test |
10,124 | 5 | HSTCP:hstcp highspeed tcp hstcp congestion control algorithm protocol defined rfc 3649 transport control protocol tcp standard tcp performs poorly networks large bandwidth-delay product unable fully utilize available bandwidth hstcp makes minor modifications standard tcp congestion control mechanism overcome limitation ack received congestion avoidance window increased formula_1 loss detected triple duplicate acknowledgments window decreased formula_2 w current window size congestion window small hstcp behaves exactly like standard tcp w 1 b w 0.5 tcp congestion window beyond certain threshold w b w become functions current window size region congestion window increases value w increases value b w decreases means hstcp window grow faster standard tcp also recover losses quickly behavior allows hstcp friendly standard tcp flows normal networks also quickly utilize available bandwidth networks large bandwidth delay products hstcp slow start/timeout behavior standard tcp since congestion control mechanism modified hstcp used tcp options like sack real implementations determining increase decrease parameters given current window size implemented lookup table | [
7017,
10924,
2934,
5817,
9021,
2079
] | Test |
10,125 | 8 | .htpasswd:.htpasswd .htpasswd flat-file used store usernames password basic authentication apache http server name file given .htaccess configuration anything although .htpasswd canonical name file name starts dot unix-like operating systems consider file begins dot hidden file often maintained shell command htpasswd add delete update users properly encode password use easily checked reversed back original password file consists rows row corresponding username followed colon followed string containing hashed password optionally prepended algorithm specifier 2y apr1 sha and/or salt hash historically used unix crypt style md5 sha1 common alternatives although version 2.2.18 variant md5 default resources available apache http server restricted users listed files created htpasswd .htpasswd file used protect entire directory placed well particular files | [
865,
4485,
3462,
8554,
5397,
119,
4893,
10815
] | Test |
10,126 | 8 | Digg_Reader:digg reader digg reader news aggregator operated digg reader released june 26 2013 response google reader shutting reader web-based also ios android applications well google chrome extension beta reader received mostly positive reviews march 26 2018 digg shut digg reader digg reader created response google reader shutting andrew mclaughlin ceo digg saw blog post fall 2012 speculating google reader shutting sent note one friends google jokingly offering buy reader mclaughlin sent serious reply said nothing buy february 2013 mclaughlin friend google said referring google reader ’ telling anything ’ going keep thing around forever maybe want something ready end year. ” google announced google reader shutting july 1 2013 digg announced development digg reader night digg officially announced development reader march 13 2013 instead original plan late 2013 moving project top priority list promised simulate best features google reader also updating fit 2013 digg reader initially launched june 21 2013 invite service launched publicly june 26 2013 july 2 2013 digg reader announced crawling 7.7 million feeds march 14 2018 digg announced would shutting digg reader march 26 2018 june 27 2013 digg reader integrated digg ios app form update digg decided make reader separate app company sees digg.com digg reader complementary products cnet gave app 3/5 stating digg beautiful app blends social news rss subscriptions bugs missing features make suitable committed digg users app current version rating 4.5 5 itunes app received app store best 2013 award apple well best 2013 award techcrunch august 29 2013 digg released android app digg reader digg says android app common request users app rating 3.9 5 google play october 9 2013 digg released google chrome extension digg reader extension rating 4 5 chrome web store early reviews beta mostly positive mashable liked saying extremely impressed criticized lack features search tagging pc magazine gave 4/5 praising clean design speed free price tag criticized lack opml support inability log email address required connection google autostraddle gave thumbs citing neat streamlined look free price tag speed disappointed n't share feature facebook twitter techcrunch impressed digg able produce functional google reader alternative said current form digg reader replacement google reader blinklist.com said good way get news want lacked certain appeal compared free apps maclife critical giving 2/5 stating barely accomplishes creators set ’ little doubt digg reader improve time gate disappoints despite clean user interface many basic features lacking especially kind rss solution power users depended upon google reader provide | [
1664,
3971,
8584,
4490,
11274,
3350,
11418,
11674,
2076,
10270,
1834,
4013,
559,
9908,
7488,
10057,
5205,
4310,
5078,
6231,
6237,
10722,
3428,
5605,
8169,
9451,
8557,
9325,
7921,
119,
11000,
5114
] | Test |
10,127 | 2 | Kongoni_(operating_system):kongoni operating system kongoni linux distribution used free version linux kernel distributed linux-libre project development kongoni project currently dormant kongoni desktop oriented operating system strong belief free freedom aimed easy install use customize kongoni ship include offer ability install software approved free software foundation kongoni shona word gnu animal gnu project takes name name chosen represents spirit history kongoni linux operating system african origin release kongoni named great philosophers including aristotle sophocles nietzsche cicero version kongoni compatible slackware release based natively install packages slackware project currently dormant september 2010 project maintained one developer robert gabriel previously project maintained a.j venter kongoni offered live cd option install os hard-drive kongoni os installs software use ports allows one download source code program opposed pre-compiled binary file compiled built automatically users system offers benefit smaller downloads programs may run faster and/or use less memory compiled explicitly users system kongoni shipped several pieces unique code including | [
4611,
3079,
3089,
4113,
8209,
8727,
10780,
543,
11297,
3618,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
10817,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
7812,
8326,
8837,
9353,... | None |
10,128 | 4 | Juanita_Moody:juanita moody juanita moody née morris may 29 1924 – february 17 2015 american cryptographer intelligence analyst worked signals intelligence service national security agency 1943 1976 juanita morris born 1924 morven north carolina began studying western carolina university 1942 left early 1943 join war effort volunteered recruitment office charlotte north carolina april sent arlington hall headquarters signals intelligence service arlington virginia began training cryptanalysis waiting security clearance later transferred administrative library role remained interested cryptanalysis however joined group met outside work study complex unbroken german code system result assigned official code-related tasks successful breaking german one-time pad cipher end war promoted code clerk head office planned return western carolina university end war supervisor asked remain sis agreed condition given complicated job 1948 married fellow civil servant warren moody moody promoted national security agency research development department war became involved computational cryptanalysis analytic machines 1950s supervisor soviet analytic affairs early 1960s head signals intelligence operations gather information cuba operation mongoose chief office non-communist nations oversaw nsa responses cuban missile crisis october 1962 responsible deciding information relating crisis would collected processed released promoted higher positions nsa throughout 1960s early 1970s became focus controversy 1975 called testify front senate committee investigating abuses power federal intelligence agencies name widely associated investigation press nsa later clarified involved abuses power involvement investigation spokesperson 1975 moody awarded inaugural national intelligence medal achievement retired nsa following year 33 years working agency inducted nsa hall honor 2003 | [
1941,
7887
] | None |
10,129 | 2 | Hive_UI:hive ui hive stylized hive custom rom developed xolo built android operating system v 4.4.4 kitkat hive exclusive xolo devices licensed third-parties hive designed xolo software design team bangalore users interact development team share ideas new features hive development team aims release over-the-air updates new features bug fixes every fortnight first xolo device 8x-1000 hive launched august 2014 | [
4995,
5892,
5637,
1670,
7428,
9610,
2828,
5262,
8719,
3600,
5522,
1427,
7700,
10645,
280,
10009,
10393,
7835,
9244,
10525,
798,
11294,
288,
673,
2978,
2852,
8486,
1191,
1959,
937,
1578,
5546,
6057,
5677,
7595,
7983,
10537,
3380,
5431,
108... | None |
10,130 | 2 | Power-on_self-test:power-on self-test power-on self-test post process performed firmware software routines immediately computer digital electronic device powered article mainly deals posts personal computers many embedded systems major appliances avionics communications medical equipment also self-test routines automatically invoked power-on results post may displayed panel part device output external device stored future retrieval diagnostic tool since self-test might detect system usual human-readable display non-functional indicator lamp speaker may provided show error codes sequence flashes beeps addition running tests post process may also set initial state device firmware case computer post routines part device pre-boot sequence complete successfully bootstrap loader code invoked load operating system ibm pc compatible computers main duties post handled bios may hand duties programs designed initialize specific peripheral devices notably video scsi initialization duty-specific programs generally known collectively option roms individually video bios scsi bios etc principal duties main bios post follows functions served post bios versions back first later bios versions post also bios begins post cpu reset first memory location cpu tries execute known reset vector case hard reboot northbridge direct code fetch request bios located system flash memory warm boot bios located proper place ram northbridge direct reset vector call ram earlier pc systems chipsets standard bios rom would located address range included reset vector bios ran directly rom motherboard bios rom segment f000 conventional memory map post flow contemporary bios one first things bios determine reason executing cold boot example may need execute functionality however system supports power saving quick boot methods bios may able circumvent standard post device discovery simply program devices preloaded system device table post flow pc developed simple straightforward process one complex convoluted post bios must integrate plethora competing evolving even mutually exclusive standards initiatives matrix hardware oses pc expected support although simple memory tests setup screen displayed earlier bioses around turn millennium post would perform thorough test devices including complete memory test design ibm modeled larger e.g mainframe systems would perform complete hardware test part cold-start process pc platform evolved commodity consumer device mainframe- minicomputer-inspired high-reliability features parity memory thorough memory test every post dropped models exponential growth pc memory sizes driven equally exponential drop memory prices also factor duration memory test using given cpu directly proportional memory size original ibm pc could equipped little 16 kb ram typically 64 640 kb depending amount equipped memory computer 4.77 mhz 8088 required five seconds 1.5 minutes complete post way skip beginning ibm xt memory count displayed post instead blank screen modern pc bus rate around 1 ghz 32-bit bus might 2000x even 5000x faster might 3 gb memory—5000x people concerned boot times 1980s 30 60 second memory test adds undesirable delay benefit confidence perceived worth cost users clone pc bioses allowed user skip post ram check pressing key modern machines often performed ram test unless enabled via bios setup addition modern dram significantly reliable dram 1980s part starting sequence post routines may display prompt user key press access built-in setup functions bios allows user set various options particular mother board operating system loaded key pressed post proceed boot sequence required load installed operating system original ibm bios made post diagnostic information available outputting number i/o port 80 screen display possible failure modes progress indication error codes generated case failure generate code code last successful operation available aid diagnosing problem using logic analyzer dedicated post cardan interface card shows port 80 output small displaya technician could determine origin problem operating system running computer code displayed board may become meaningless since oses e.g linux use port 80 i/o timing operations actual numeric codes possible stages error conditions differ one bios supplier another codes different bios versions single supplier may also vary although many codes remain unchanged different versions later bioses used sequence beeps motherboard-attached pc speaker present working signal error codes vendors developed proprietary variants enhancements msi d-bracket post beep codes vary manufacturer manufacturer information numeric beep codes available manufacturers bioses motherboards websites collect codes many bioses reference amibios8 check point beep code list version 2.0 last updated 10 june 2008 post beep codes covered specifically comptia a+ exam apple macintosh computers also perform post cold boot event fatal error mac make startup chime macs made 1987 prior 1998 upon failing post immediately halt death chime sound varies model beep car crash sound sound shattering glass short musical tone screen working sad mac icon along two hexadecimal strings used identify problem macs made prior 1987 crashed silently hexadecimal string sad mac icon apple introduced imac 1998 radical departure macs time imac began production new world macs called new world macs imac power macintosh g3 blue white power mac g4 pci graphics powerbook g3 bronze keyboard powerbook g3 firewire load mac os rom hard drive event error fatal hardware error display screen seen holding startup error message instead 0 prompt event fatal hardware error give beeps beep codes revised october 1999 since addition models power led would flash cadence amiga historical line computers a1000 4000 present interesting post sequence prompts user sequence flashing screens different colors rather audible beeps systems show various hardware post tests correct else failed amiga system performs following steps boot system fails rom test screen display turns red system halts almost amiga models present color sequence turned black screen dark gray light gray color screens filling monitor screen rapid sequence amigas taken usually 2 least max 3 seconds turn boot a4000 presents light gray screen boot time occurs 2 max 3 seconds keyboards historical amiga models proprietary happened early computer ages pragmatically based international standard ansi/iso 8859-1 keyboard intelligent device processor 4 kilobytes ram keeping buffer sequence keys pressed thus communicate user fault found flashing main led sequence | [
5000,
10253,
5520,
3496,
4910,
7983,
8625,
823,
576,
7106,
6597,
6093,
2383,
10839,
6499,
8035,
4581,
9066,
1515,
8301,
1903,
7151,
6129,
9466,
2811,
3324
] | Train |
10,131 | 4 | Vlastimil_Klíma:vlastimil klíma rndr vlastimil klíma born 19 february 1957 benešov czech republic leading cryptographer computer security expert white hat hacker academic taught applied cryptography faculty mathematics physics charles university prague author several works field cryptographic hash functions digital signatures klíma received doctorate faculty mathematics physics charles university 1984 dr. klíma former head research development group federal ministry defense czech republic czech national security authority klíma authored world ’ first on-the-fly encryption system windows 95 98/nt/2000 ethical hacker successfully broke ssl protocol currently works digital security sector | [
2558
] | Test |
10,132 | 4 | EternalBlue:eternalblue eternalblue cyberattack exploit developed u.s. national security agency nsa according testimony former nsa employees leaked shadow brokers hacker group april 14 2017 one month microsoft released patches vulnerability may 12 2017 worldwide wannacry ransomware used exploit attack unpatched computers june 27 2017 exploit used help carry 2017 notpetya cyberattack unpatched computers exploit also reported used since march 2016 chinese hacking group buckeye apt3 likely found re-purposed tool well reported used part retefe banking trojan since least september 5 2017 eternalblue exploits vulnerability microsoft implementation server message block smb protocol vulnerability denoted entry common vulnerabilities exposures cve catalog vulnerability exists smb version 1 smbv1 server various versions microsoft windows mishandles specially crafted packets remote attackers allowing execute arbitrary code target computer nsa alert microsoft vulnerabilities held five years breach forced hand agency warned microsoft learning eternalblue ’ possible theft allowing company prepare software patch issued march 2017 delaying regular release security patches february 2017 tuesday march 14 2017 microsoft issued security bulletin ms17-010 detailed flaw announced patches released windows versions currently supported time windows vista windows 7 windows 8.1 windows 10 windows server 2008 windows server 2012 windows server 2016 many windows users installed patches two months later may 12 2017 wannacry ransomware attack used eternalblue vulnerability spread next day microsoft released emergency security patches unsupported windows xp windows 8 windows server 2003 february 2018 eternalblue ported windows operating systems since windows 2000 risksense security researcher sean dillon eternalchampion eternalromance two exploits originally developed nsa leaked shadow brokers also ported event made available open sourced metasploit modules end 2018 millions systems still vulnerable eternalblue led millions dollars damages due primarily ransomware worms following massive impact wannacry notpetya badrabbit caused 1 billion worth damages 65 countries using eternalblue either initial compromise vector method lateral movement may 2019 baltimore struggled cyberattack digital extortionists using eternalblue attack froze thousands computers shut email disrupted real estate sales water bills health alerts many services since 2012 four baltimore city chief information officers fired resigned two left investigation eternalblue tool relies flaw microsoft software though company issued patch leakers posted tools online many systems remain vulnerable two years later existence patch prompted security researchers argue saturday responsibility baltimore breach lies city security consultant rob graham wrote tweet “ organization substantial numbers windows machines gone 2 years without patches ’ squarely fault organization eternalblue ” according microsoft united states nsa responsible dint controversial strategy stockpiling vulnerabilities least preventing microsoft timely public patching presumably hidden bugs eternalrocks microbotmassivenet computer worm infects microsoft windows uses seven exploits developed nsa comparatively wannacry ransomware program infected 230,000 computers may 2017 uses two nsa exploits making researchers believe eternalrocks significantly dangerous worm discovered via honeypot eternalblue among several exploits used conjunction doublepulsar backdoor implant tool eternalrocks first installs tor private network conceals internet activity access hidden servers brief 24 hour incubation period server responds malware request downloading self-replicating host machine malware even names wannacry avoid detection security researchers unlike wannacry eternalrocks possess kill switch ransomware | [
1024,
5636,
10756,
4117,
8726,
535,
9761,
4644,
4133,
9256,
5173,
1608,
3657,
8779,
4703,
8288,
8292,
7786,
107,
10875,
3711,
8320,
5764,
2187,
6797,
4240,
2709,
1688,
2717,
9375,
8368,
9904,
9395,
8886,
3789,
7887,
4304,
4314,
9435,
4830... | Test |
10,133 | 5 | Java_Embedding_Plugin:java embedding plugin java embedding plugin jep enables java mac os x non safari browsers plugin shipped firefox 1.5 recent versions seamonkey camino latest released version 0.9.7.5 requires mac os x 10.4.11 higher originally powerpc based macs port intel x86 needed version 0.9.6.1 security vulnerability allowed remote attackers crash browser | [
10057,
499,
5078,
6231,
8700
] | None |
10,134 | 7 | Informatica:informatica informatica software development company founded 1993 headquartered redwood city california core products include enterprise cloud data management data integration co-founded gaurav dhillon diaz nesamoney anil chakravarthy company ceo april 29 1999 initial public offering nasdaq stock exchange listed shares stock symbol infa april 7 2015 permira canada pension plan investment board announced company controlled permira funds cppib would acquire informatica approximately us 5.3 billion august 6 2015 acquisition completed microsoft salesforce ventures additional investors company stock ceased trading nasdaq ticker symbol infa effective date informatica product portfolio focused data integration extract transform load information lifecycle management business-to-business data exchange cloud computing integration complex event processing data masking data quality data replication data virtualization master data management ultra messaging components form toolset establishing maintaining data warehouses customer base 5,000 companies 2006 informatica announced cloud business informatica grown combination sales growth company acquisitiond | [
4194,
2691,
7781,
679,
5960,
10090,
8751,
10735,
10236,
9789
] | None |
10,135 | 4 | RainbowCrack:rainbowcrack rainbowcrack computer program generates rainbow tables used password cracking rainbowcrack differs conventional brute force crackers uses large pre-computed tables called rainbow tables reduce length time needed crack password drastically rainbowcrack developed zhu shuanglei implements improved time–memory tradeoff cryptanalysis attack originated philippe oechslin ophcrack organizations made rainbowcrack rainbow tables available free internet | [
3937,
7426,
8513,
6916,
7556,
4140,
6797,
7983,
3984,
3477,
1941,
823,
8827,
2716,
733
] | None |
10,136 | 1 | Navitaire_Inc_v_Easyjet_Airline_Co._and_BulletProof_Technologies,_Inc.:navitaire inc v easyjet airline co. bulletproof technologies inc. navitaire inc v easyjet airline co. bulletproof technologies inc. decision england wales high court justice chancery division case involved copyright infringement claim brought navitaire inc. navitaire easyjet airline company easyjet bulletproof technologies inc. bulletproof regards software used construct airline booking ticket reservation system curiously claimed defendant access original source code defendant source code resembled plaintiff way case affirms source code object code program i.e underlying framework may protected copyright programming language used create program well program functional aspects interfaces protected computer programs unique one achieve similar end result different means however artistic aspects may protected copyright subsists visual images created icons graphical user interfaces guis directive legal protection computer programs apply images specific case held writing original source code results similar identical function another program result infringement program navitaire also confirmed notion injunction would granted n't oppressive navitaire court approach confirmed opinions court appeals 2007 decision nova productions limited vs. mazooma games limited court held program infringe another produces similar results different underlying source code henry carr qc mark vanhegan anna edwards-stuart instructed field fisher waterhouse claimants richard arnold qc brian nicholson instructed herbert smith defendants claimant navitaire inc. navitaire developed system called openres ticketless airline booking application used number airlines users receive ticket given single reference number check-in airport navitaire owns copyright various works make source code openres software openres predominantly coded cobol navitaire predecessors open skies inc. open skies division hewlett packard open skies coded developed web interface openres called takeflight court refers navitaire open skies inc. collectively navitaire takeflight module consists source code navitaire developed airline booking system called openres predecessor open skies licensed software easyjet easyjet access underlying code navitaire suggest easyjet bulletproof access openres however studying functionality openres easyjet bulletproof developed system called eres also web interface substantially indistinguishable openres easyjet dispute allegation wanted new system substantially indistinguishable openres interface also disputed underlying code eres resemble openres codes easyjet created program studying observing navitaire system worked although code different eres acts upon identical similar inputs produces similar results openres thus navitaire filed action copyright law based alleging copyright infringement based non-textual copying specifically navitaire claimed similarity business logic overall look feel software functionality software rose level non-textual copying also regards takeflight known easyjet copied modified several occasions fix bugs provide display promotions etc provide foreign language interfaces code internationalized navitaire alleges easyjet breached license alleging non-textual copying software easyjet produced user interface look feel takeflight general matter court stated emulate action piece software writing software internal similarity first deliberately designed 'look achieve results far uncommon navitaire right far-reaching submission much work may amount infringement copyright original computer program even alleged infringer access source code investigate decompile executable program non-textual copying raised access issue three aspects non-contextual copying openres system consists database well series programs manipulate data interface consists single complex commands entered user relevant display screens different interfaces regards databases navitaire claimed copyright infringement occurred two points 1 transferring 'migrating data contained openres databases new easyres system easyjet made interim copies existing openres databases granted permission 2 easyjet bulletproof used knowledge openres databases design eres databases infringed copyright structure program court find infringement since databases manipulated way openres navitaire alleged eres violated copyright replicated overall look feel software i.e business logic relied required identical similar commands entered operator openres system copying icons displayed gui copying text-based screen displays well results produced software four classes relevant copyright works identified summary issues follows navitaire contend copyright subsists command set copyright work distinct source code claim number aspects collection commands whole entitled copyright 'compilation ii commands copyright work right iii alternatively 'complex commands work right displays navitaire contend respect vt100 screen displays 'template fixed data layout variable data separate copyright work display ii certain gui screens separate schedule maintenance module copyright works stand copied said quite distinct allegation similarity exhibited eres openres eye user 'non-textual copying whole source code said strictly analogous taking plot book 12 author takes plot another work copies nothing else still infringe copyright substantial part earlier author work represented plot goes computer programs john richardson computers v flanders 1993 fsr 497 ferris j easyjet accepts copyright subsists source code openres however stressed court regards user interface question considered whether substantial part taken since none code directly copied eres used command names substantial part source code agree copyright subsists command set either individual commands compilation since works begin moreover graphical displays also works contended non-contextual copying would extend protection copyright matters legitimately covered copyright argued claim went functional idea program rather expression idea software 1 comes computer programs copyright law protect non-textual copying long underlying source code different problem ultimate look feel similar present case fact easyjet n't access aided court finding infringement moreover court took account peculiar aspect computer programs several different ways producing similar identical result business logic i.e functionality program protected copyright law finding otherwise would extend copyright unjustifiably based navitaire merely copying look feel program website rise level infringement copyright using underlying ideas principles without copying actual expression source code infringe another even functionality however appearance may argued infringing artistic work see details metaphor navitaire urged easyjet studying openres system functionality resulted taking substantial part source code similar reading novel taking plot using plot new novel however court disagreed reasoning found computer programs code like novel instead court found case like chef invents pudding using different recipe original derives similar result one chef several tries comes tasty pudding dish writes recipe another chef tries decides recreate comes recipe would considered infringement although results means derive different 2 single words complex commands compilation commands qualify literary works single word commands qualify literary works necessary qualities literary work based 1988 act test considered merely whether written artefact accorded status copyright work regard kind skill labour expended nature copyright protection underlying policy complex commands i.e commands syntax one arguments must expressed particular way also qualify 1988 act mandates literary work written recorded moreover recitals 13-15 software directive reinforce computer languages may copyrighted present case identifiable literary work embodied command codes similarly collections commands count language protected compilation protection computer program may extended functionality alone copyright protection computer software given feel courts astute extend protection region functional effects program issue respectable case saying copyright general concerned functional effects advantage bright line rule protecting claimant embodiment function software superset software case truly analogous plot novel plot part work user interface part work one could permute letters codes command names would still work way would lost modest mnemonic advantage approach problem way may least consistent distinction idea expression finds way software directive course draws line idea expression particular place would say lies far side expression think however independence particular form actual codes used overall functioning software legitimate separate way afford separate protection underlying software even arguably copied 3 yes artistic work rise level copyright protection present case vt100 screen displays rise level considered tables found literary character based article 1 2 directive simply ideas underlying computer program interfaces providing merely static framework display dynamic data task software produce however graphic user interfaces guis icons qualified artistic works given protection due skill labour required arrange screens certain way icons copyrighted works court found since icons used guis copyrighted works easyjet made identical copies easyjet infringed navitaire copyright easyjet managed convince court licensees permitted alter modify program resolve bugs make modifications hired however court found infringement database fields reproduced unnecessarily us uk copyright grants protection expression idea idea database right according european union property right eu defined directive 96/9/ec directive legal protection databases passed 11 march 1996 affords legal protection databases granting specific separate legal rights limitations computer records rights collectively known database rights see full text court analyzed section making clear important dichotomy copyright law ideas protected expression thus code written protected interfaces function programming language see full text 3.— 1 part— literary work means work dramatic musical work written spoken sung accordingly includes— table compilation database b computer program c preparatory design material computer program database 2 copyright subsist literary dramatic musical work unless recorded writing otherwise references part time work made time recorded 50ba.— 1 infringement copyright lawful user computer program observe study test functioning program order determine ideas principles underlie element program performing acts loading displaying running transmitting storing program entitled 2 act permitted section irrelevant whether exists term condition agreement purports prohibit restrict act terms virtue section 296a void intellectual property | [
3888,
385
] | None |
10,137 | 1 | Hierarchical_and_recursive_queries_in_SQL:hierarchical recursive queries sql hierarchical query type sql query handles hierarchical model data special cases general recursive fixpoint queries compute transitive closures standard hierarchical queries implemented way recursive common table expressions ctes unlike oracle earlier connect-by clause recursive ctes designed fixpoint semantics beginning recursive ctes standard relatively close existing implementation ibm db2 version 2 recursive ctes also supported microsoft sql server since sql server 2008 r2 firebird 2.1 postgresql 8.4+ sqlite 3.8.3+ ibm informix version 11.50+ cubrid mariadb 10.2+ mysql 8.0.1+ tableau documentation describing ctes used tibco spotfire support ctes oracle 11g release 2 implementation lacks fixpoint semantics without common table expressions connected-by clauses possible achieve hierarchical queries user-defined recursive functions common table expression cte sql temporary named result set derived simple query defined within execution scope codice_1 codice_2 codice_3 codice_4 statement ctes thought alternatives derived tables subquery views inline user-defined functions common table expressions supported teradata db2 firebird microsoft sql server oracle recursion since 11g release 2 postgresql since 8.4 mariadb since 10.2 mysql since 8.0 sqlite since 3.8.3 hypersql h2 experimental oracle calls ctes subquery factoring syntax recursive cte follows codice_5 ‘ syntax recursive ctes recursive subquery factoring oracle jargon used traverse relations graphs trees although syntax much involved automatic pseudo-columns created like codice_6 desired created code see msdn documentation ibm documentation tutorial examples codice_7 keyword usually needed systems postgresql sql:1999 recursive cte query may appear anywhere query allowed possible example name result using codice_8 codice_7 codice_10 using cte inside codice_11 one populate table data generated recursive query random data generation possible using technique without using procedural statements databases like postgresql support shorter create recursive view format internally translated recursive coding example recursive query computing factorial numbers 0 9 following alternative syntax non-standard codice_12 construct introduced oracle 1980s prior oracle 10g construct useful traversing acyclic graphs returned error detecting cycles version 10g oracle introduced nocycle feature keyword making traversal work presence cycles well codice_12 supported enterprisedb oracle database cubrid ibm informix db2 although enabled compatibility mode syntax follows output query would look like following example returns last name employee department 10 manager employee hierarchy number levels manager employee path two academic textbooks note cover sql:1999 standard datalog oracle extension | [
10632,
8201,
9994,
8979,
2068,
10389,
4630,
7446,
2456,
1049,
5658,
5403,
10137,
11030,
4255,
9631,
1697,
9634,
11552,
4263,
2344,
7080,
5546,
1579,
9389,
10286,
10413,
9397,
5051,
3004,
10048,
5953,
6850,
5061,
9286,
10953,
9290,
8788,
290... | Test |
10,138 | 2 | CloudLinux_OS:cloudlinux os cloudlinux os linux distribution marketed shared hosting providers developed software company cloudlinux inc. cloudlinux os based centos operating system uses openvz kernel rpm package manager first version cloudlinux os released january 2010 operation system introduced compatibility red hat enterprise linux version 6 february 2011 version 7 april 2015 cloudlinux os provides modified kernel based openvz kernel adding set original fully functional solutions main feature lightweight virtual environment lve – separate environment cpu memory io iops number processes limits switching cloudlinux os performed provided cldeploy script installs kernel switches yum repositories installs basic packages allow lve work installation server requires rebooting load newly installed kernel cloudlinux os ’ modify existing packages possible boot previous kernel regular way | [
5096,
5067,
9387,
7983,
5105,
5363,
5397,
7483,
318
] | None |
10,139 | 3 | Intel_Dynamic_Acceleration:intel dynamic acceleration intel dynamic acceleration ida sometimes called dynamic acceleration technology dat technology created intel corp. certain multi-core intel microprocessors increases clock rate single core every two cores base operating frequency cores idle designed single threaded programs run faster multi-core intel microprocessors intel later released version ida called enhanced dynamic acceleration technology edat quad core processors boosts performance 2 cores 2 cores utilized intel dynamic acceleration first released core 2 duo mobile processor line new microprocessor lines released intel changed technology naming scheme slightly introduction quad core processors intel modified ida released dual dynamic acceleration dda later released nehalem microarchitecture intel microprocessors made additional changes original ida released improved version called intel turbo boost | [
6339,
4334,
398,
10675,
2516,
10966
] | None |
10,140 | 7 | Joint_Enterprise_Defense_Infrastructure:joint enterprise defense infrastructure joint enterprise defense infrastructure jedi large united states department defense cloud computing contract reported worth 10 billion dollars companies interested contract included amazon google microsoft oracle rean cloud llc protests google employees google decided drop contention contract conflict corporate values deal considered gift-wrapped amazon oracle co-chaired safra catz contested awarding contract amazon web services led jeff bezos citing national defense authorization act idiq contracts conflicts interest deap ubhi worked amazon time department defense led eric g. bruggink senior judge united states court federal claims place contract award hold august 2019 weeks winner expected announced president donald trump ordered contract placed hold defense secretary mark esper investigate complaints favoritism towards amazon | [
7248,
8921,
4194,
8900
] | Test |
10,141 | 4 | Mobile_malware:mobile malware mobile malware malicious software targets mobile phones wireless-enabled personal digital assistants pda causing collapse system loss leakage confidential information wireless phones pda networks become common grown complexity become increasingly difficult ensure safety security electronic attacks form viruses malware cell phone malware initially demonstrated brazilian software engineer marcos velasco created virus could used anyone order educate public threat first known mobile virus timofonica originated spain identified antivirus labs russia finland june 2000 timofonica sent sms messages gsm-capable mobile phones read spanish information telefónica fooling messages sent internet sms gateway movistar mobile operator june 2004 discovered company called ojam engineered anti-piracy trojan hack older versions mobile phone game mosquito sent sms texts company without user knowledge july 2004 computer hobbyists released proof-of-concept virus cabir infects mobile phones running symbian operating system spreading via bluetooth wireless march 2005 reported computer worm called commwarrior-a infecting symbian series 60 mobile phones specific worm replicated phone multimedia messaging service mms sending copies contacts listed phone user address book august 2010 kaspersky lab reported trojan trojan-sms.androidos.fakeplayer.a first sms malware affected google android operating system sent sms messages premium rate numbers without owner knowledge accumulating huge bills currently various antivirus software companies meanwhile operating system developers try curb spread infections quality control checks software content offered digital application distribution platforms google play apple app store recent studies however show mobile antivirus programs ineffective due rapid evolution mobile malware four types common malicious programs known affect mobile devices | [
3072,
7809,
6786,
11266,
5764,
901,
7044,
10245,
10756,
9227,
9356,
5261,
9102,
7441,
8978,
4863,
4883,
4245,
278,
8959,
9233,
10392,
1690,
3867,
9242,
5281,
9761,
2213,
8998,
9256,
939,
300,
9771,
7983,
1970,
4023,
10297,
3643,
6588,
773... | None |
10,142 | 9 | POV-Ray:pov-ray persistence vision ray tracer pov-ray ray tracing program generates images text-based scene description available variety computer platforms originally based dkbtrace written david kirk buck aaron a. collins amiga computers also influences earlier polyray raytracer contributed author alexander enzmann pov-ray free open-source software source code available agplv3 sometime 1980s david kirk buck downloaded source code unix ray tracer amiga experimented eventually deciding write ray tracer named dkbtrace initials posted call ray bulletin board system chicago thinking others might interested 1987 aaron a. collins downloaded dkbtrace began working x86-based port david buck collaborated add several features program proved popular anticipated could keep demand features thus july 1991 david turned project team programmers working graphdev forum compuserve time felt inappropriate use initials program longer maintained name star-light software taskforce animation rendering initially used eventually name became pv-ray ultimately pov-ray persistence vision ray tracer inspired dali persistence memory 2002 pov-ray became first ray tracer render image orbit rendered mark shuttleworth inside international space station features application summary history discussed interview february 2008 david kirk buck chris cason episode 24 floss weekly pov-ray matured substantially since created recent versions software include following features one pov-ray main attractions large collection third party support large number tools textures models scenes tutorials found web also useful reference wanting learn ray tracing related geometry graphics algorithms work current official version pov-ray 3.7 version introduces main features previous release 3.6 july 2006 intel corporation started using beta version demonstrate new dual-core conroe processor due efficiency 3.7 beta smp implementation pov-ray addition standard geometric shapes like tori spheres heightfields supports mathematically defined primitives isosurface finite approximation arbitrary function polynomial primitive infinite object defined 15th order lower polynomial julia fractal 3-dimensional slice 4-dimensional fractal superquadratic ellipsoid intermediate sphere cube parametric primitive using equations represent surface rather interior pov-ray internally represents objects using mathematical definitions pov-ray primitive objects described mathematical functions different many 3d computer modeling packages typically use triangle meshes compose objects fact provides pov-ray several advantages disadvantages rendering modeling systems pov-ray primitives accurate polygonal counterparts objects described terms spheres planar surfaces cylinders tori like perfectly smooth mathematically accurate pov-ray renderings whereas polygonal artifacts may visible mesh-based modeling software pov-ray primitives also simpler define polygonal counterparts pov-ray sphere described simply center radius mesh-based environment sphere must described multitude small polygons hand primitive- script-based modeling always practical method create objects realistic characters complex man-made artifacts like cars objects created mesh-based modeling applications wings 3d blender converted pov-ray mesh format following example scene description language used pov-ray describe scene render demonstrates use background colour camera lights simple box shape surface normal finish transforming effects rotation following script fragment shows use variable declaration assignment comparison loop construct pov-ray program include modeling feature essentially pure renderer sophisticated model description language accompany feature set third parties developed large variety modeling software specialized pov-ray others supporting import export data structures including free open-source 3d creation suite blender number additional pov-ray compatible modelers linked povray.org modelling programs 2007 pov-ray acquired rights moray interactive 3-d modeling program long used pov-ray however december 2016 moray development stalled official modifications pov-ray source tree done and/or approved pov-team patch submission and/or bug reporting done pov-ray newsgroups news.povray.org news server web interface also available since pov-ray source available unofficial forks patched versions pov-ray available third parties however officially supported pov-team official pov-ray versions currently support shader plug-ins features like radiosity splines still development may subject syntactical change pov-ray 3.6 distributed compiled format macintosh windows linux support intel macs available macintosh version since mac os x version unix linux version compiled 3.7 versions smp support officially supported windows linux unofficial macintosh versions v3.7 found pov-ray ported platform compatible c++ compiler originally pov-ray distributed pov-ray license namely pov-ray 3.6 distribution license pov-ray 3.6 source license permitted free distribution program source code binaries restricts commercial distribution creation derivative works fully functional versions pov-ray although source code older versions available modification due 3.6 prior license restrictions open source free software according osi fsf definition term problem source code exchange greater foss ecosystem impossible due license incompatibility copyleft licenses one reasons pov-ray originally licensed free software gnu general public license gpl open source licenses pov-ray developed gpl-style licenses became widely used developers wrote license release pov-ray contributors software worked assumption contributions would licensed pov-ray 3.6 licenses 2013 version 3.7 pov-ray relicensed affero general public license version 3 later thus pov-ray since free software according fsf definition also open source software according open source definition | [
1952,
5410,
6020,
7301,
9926,
10153,
10953,
4331,
5612,
6797,
7983,
499,
5492,
3350,
823,
6553,
8349
] | Train |
10,143 | 9 | Operators_in_C_and_C++:operators c c++ list operators c c++ programming languages operators listed exist c++ fourth column included c states whether operator also present c. note c support operator overloading overloaded operators codice_1 codice_2 codice_3 comma operator sequence point evaluation first operand c++ also contains type conversion operators codice_4 codice_5 codice_6 codice_7 formatting operators means precedence level unimportant operators available c c++ also available languages c java perl php precedence associativity semantics purposes tables codice_8 codice_9 codice_10 represent valid values literals values variables return value object names lvalues appropriate codice_11 codice_12 codice_13 stand type codice_14 class type enumerated type notes following table lists precedence associativity operators c c++ languages operators also exist java perl php many recent languages precedence given operators listed top bottom descending precedence descending precedence refers priority grouping operators operands considering expression operator listed row grouped prior operator listed row operators cell may several rows operators listed cell grouped precedence given direction operator precedence unaffected overloading syntax expressions c c++ specified phrase structure grammar table given inferred grammar iso c 1999 standard section 6.5.6 note 71 states c grammar provided specification defines precedence c operators also states operator precedence resulting grammar closely follows specification section ordering c syntax i.e. grammar specifies precedence operators evaluation expression order major subclauses subclause highest precedence first precedence table mostly adequate resolve details particular note ternary operator allows arbitrary expression middle operand despite listed higher precedence assignment comma operators thus codice_15 interpreted codice_16 meaningless codice_17 expression middle conditional operator codice_18 codice_19 parsed parenthesized also note immediate unparenthesized result c cast expression operand codice_20 therefore codice_21 interpreted codice_22 codice_23 precedence table determines order binding chained expressions expressly specified parentheses many operators containing multi-character sequences given names built operator name character example codice_35 codice_36 often called plus equal minus equal instead verbose assignment addition assignment subtraction binding operators c c++ specified corresponding standards factored language grammar rather precedence table creates subtle conflicts example c syntax conditional expression c++ hence expression parsed differently two languages c expression syntax error syntax assignment expression c c++ parsed valid expression precedence bitwise logical operators criticized conceptually arithmetic operators like expression syntactically parsed whereas expression parsed requires parentheses used often otherwise would historically syntactic distinction bitwise logical operators bcpl b early c operators n't exist instead different meaning depending whether used ‘ truth-value context ’ i.e boolean value expected example behaved logical operator behaved bitwise one retained keep backward compatibility existing installations moreover c++ later versions c equality operations exception three-way comparison operator yield bool type values conceptually single bit 1 0 properly belong bitwise operations c++ defines certain keywords act aliases number operators used exactly way punctuation symbols replace operator different name rather simple token replacements name character string respective operator means expressions identical meanings also means example codice_37 keyword may used replace bitwise-and operator also address-of operator even used specify reference types e.g. iso c specification makes allowance keywords preprocessor macros header file compatibility c c++ provides header inclusion effect | [
8582,
1435,
4267,
2605,
5165,
5677,
9008,
8627,
7479,
8382,
6338,
8644,
1349,
8262,
4173,
11219,
10075,
1501,
8545,
10980,
10470,
240,
6640,
2045
] | None |
10,144 | 5 | DHCPv6:dhcpv6 dynamic host configuration protocol version 6 dhcpv6 network protocol configuring internet protocol version 6 ipv6 hosts ip addresses ip prefixes configuration data required operate ipv6 network ipv6 equivalent dynamic host configuration protocol ipv4 ipv6 hosts may automatically generate ip addresses internally using stateless address autoconfiguration slaac may assigned configuration data dhcpv6 ipv6 hosts use stateless autoconfiguration may require information ip address route dhcpv6 used acquire information even though used configure ip addresses dhcpv6 necessary configuring hosts addresses domain name system dns servers configured using neighbor discovery protocol also mechanism stateless autoconfiguration many ipv6 routers routers residential networks must configured automatically operator intervention routers require ipv6 address use communicating upstream routers also ipv6 prefix use configuring devices downstream side router dhcpv6 prefix delegation provides mechanism configuring routers dhcpv6 uses udp port number 546 clients port number 547 servers dhcp unique identifier duid used client get ip address dhcpv6 server 2-byte duid type field variable-length identifier field 128 bytes actual length depends type server compares duid database delivers configuration data address lease times dns servers etc client first 16 bits duid contain duid type four types meaning remaining duid depends type four types identified rfc 8415 due fact difficult manage multiple identifiers dual-stack environment fact duid simply optimal situations rfc 6939 released giving way identify host based mac address defines way dhcpv6 relay pass information dhcpv6 server option dhcpv6 relays yet widely supported cisco brocade switches support option example without rapid-commit present server link-local address codice_1 client link-local address codice_2 lorenzo colitti google explained dhcpv6 implemented android | [
10242,
3847,
649,
9868,
8080,
3218,
9365,
10005,
11413,
5402,
4891,
5531,
3742,
10271,
8482,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
3133,
3006,
5181,
321,
5437,
6724,
7364,
2887,
8265,
2509,
8654,
4687,
6993,
5... | Validation |
10,145 | 9 | Data_type:data type computer science computer programming data type simply type attribute data tells compiler interpreter programmer intends use data programming languages support common data types real integer boolean data type constrains values expression variable function might take data type defines operations done data meaning data way values type stored type value expression may take value data types used within type systems offer various ways defining implementing using different type systems ensure varying degrees type safety almost programming languages explicitly include notion data type though different languages may use different terminology common data types include example java programming language type int represents set 32-bit integers ranging value −2,147,483,648 2,147,483,647 well operations performed integers addition subtraction multiplication colors hand represented three bytes denoting amounts red green blue one string representing color name allowable operations include addition subtraction multiplication programming languages also allow programmer define additional data types usually combining multiple elements types defining valid operations new data type example programmer might create new data type named complex number would include real imaginary parts data type also represents constraint placed upon interpretation data type system describing representation interpretation structure values objects stored computer memory type system uses data type information check correctness computer programs access manipulate data data types statistics comparable types computer programming vice versa shown following table identified five definitions type used—sometimes implicitly—in literature types including behavior align closely object-oriented models whereas structured programming model would tend include code called plain old data structures five types definition terms representation often done imperative languages algol pascal definition terms value space behaviour used higher-level languages simula clu primitive data types typically types built-in basic language implementation data computers based digital electronics represented bits alternatives 0 1 lowest level smallest addressable unit data usually group bits called byte usually octet 8 bits unit processed machine code instructions called word typically 32 64 bits instructions interpret word binary number 32-bit word represent unsigned integer values 0 formula_1 signed integer values formula_2 formula_3 two complement machine language machine n't need distinguish unsigned signed data types part floating point numbers used floating point arithmetic use different interpretation bits word see https //en.wikipedia.org/wiki/floating-point_arithmetic details machine data types need exposed made available systems low-level programming languages allowing fine-grained control hardware c programming language instance supplies integer types various widths codice_1 codice_2 corresponding native type exist target platform compiler break code using types exist instance 32-bit integer requested 16 bit platform compiler tacitly treat array two 16 bit integers higher level programming machine data types often hidden abstracted implementation detail would render code less portable exposed instance generic codice_3 type might supplied instead integers specific bit-width boolean type represents values true false although two values possible rarely implemented single binary digit efficiency reasons many programming languages explicit boolean type instead interpreting instance 0 false values true boolean data refers logical structure language interpreted machine language case boolean 0 refers logic false true always non zero especially one known boolean 1 composite types derived one primitive type done number ways ways combined called data structures composing primitive type compound type generally results new type e.g array-of-integer different type integer many others possible tend variations compounds example linked list store data array provides sequential access rather random built records dynamic memory though arguably data structure rather type per se also common distinct enough including discussion composite types justified enumerated type distinct values compared assigned necessarily particular concrete representation computer memory compilers interpreters represent arbitrarily example four suits deck playing cards may four enumerators named club diamond heart spade belonging enumerated type named suit variable v declared suit data type one assign four values implementations allow programmers assign integer values enumeration values even treat type-equivalent integers character string types store sequences characters character set ascii since character sets include digits possible numeric string codice_7 however many languages treat belonging different type numeric value codice_8 character string types different subtypes according required character width original 7-bit wide ascii found limited superseded 8 16-bit sets encode wide variety non-latin alphabets hebrew chinese symbols strings may either stretch-to-fit fixed size even programming language may also subtyped maximum size note strings primitive languages instance c composed array characters types based derived basic types explained languages c functions type derived type return value main non-composite derived type pointer data type whose value refers directly points another value stored elsewhere computer memory using address primitive kind reference everyday terms page number book could considered piece data refers another one pointers often stored format similar integer however attempting dereference look pointer whose value never valid memory address would cause program crash ameliorate potential problem pointers considered separate type type data point even underlying representation type specify implementation abstract data type instance stack abstract type implemented array contiguous block memory containing multiple values linked list set non-contiguous memory blocks linked pointers abstract types handled code know care underlying types contained programming agnostic concrete data types called generic programming arrays records also contain underlying types considered concrete specify contents elements laid memory examples include convenience high-level languages may supply ready-made real world data types instance times dates monetary values memory even language allows built primitive types type system associates types computed values examining flow values type system attempts prove type errors occur type system question determines constitutes type error type system generally seeks guarantee operations expecting certain kind value used values operation make sense compiler may use static type value optimize storage needs choice algorithms operations value many c compilers data type example represented 32 bits accord ieee specification single-precision floating point numbers thus use floating-point-specific microprocessor operations values floating-point addition multiplication etc. depth type constraints manner evaluation affect typing language programming language may associate operation varying concrete algorithms type case type polymorphism type theory study type systems although concrete type systems programming languages originate practical issues computer architecture compiler implementation language design type systems may variously static dynamic strong weak typing forth | [
512,
5635,
4101,
2062,
5151,
5677,
2617,
3642,
8251,
9794,
8262,
2632,
1611,
10326,
9309,
6239,
8291,
8295,
8808,
1131,
9331,
3702,
2680,
3705,
1146,
655,
9875,
5783,
5796,
10916,
692,
9397,
3767,
9921,
6860,
9932,
7386,
8926,
7392,
8421,... | Test |
10,146 | 3 | Joe-E:joe-e joe-e subset java programming language intended support programming according object-capability discipline language notable early object-capability subset language influenced later subset languages adsafe caja/cajita subsets javascript also notable allowing methods verified functionally pure based method signatures restrictions imposed joe-e verifier include cup joe slang coffee serves trademark-avoiding reference java thus name joe-e intended suggest adaptation ideas e programming language create variant java language waterken server written joe-e | [
256,
9345,
4034,
7480,
10813,
2951,
5503,
5483,
7884,
5677,
11596,
10835,
3700,
10614,
728,
1114,
6813,
3999
] | Test |
10,147 | 5 | TCP_Westwood:tcp westwood tcp westwood tcpw sender-side-only modification tcp new reno intended better handle large bandwidth-delay product paths large pipes potential packet loss due transmission errors leaky pipes dynamic load dynamic pipes tcp westwood relies mining ack stream information help better set congestion control parameters slow start threshold ssthresh congestion window cwin tcp westwood eligible rate estimated used sender update ssthresh cwin upon loss indication agile probing phase proposed modification well-known slow start phase addition scheme called persistent non congestion detection pncd devised detect persistent lack congestion induce agile probing phase expeditiously utilize large dynamic bandwidth resultant performance gains efficiency without undue sacrifice fairness friendliness stability reported numerous papers found tcp westwood home page significant efficiency gains obtained large leaky dynamic pipes maintaining fairness appropriate criterion friendliness i.e opportunistic friendliness tcp westwood shown good controllable friendliness tcp westwood plus evolution tcp westwood fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression tcp westwood+ version implemented linux kernel | [
7017,
10924,
718
] | Test |
10,148 | 2 | ProbeVue:probevue probevue ibm implementation lightweight dynamic tracing environment introduced aix version 6.1 probevue provides ability probe running processes order provide statistical analysis well retrieve data probed process dynamic nature probevue allows used global system performance tool retaining ability drill specific events single process thread modifications required probed process system lightweight design probevue tracing tool suitable use production environment previous tracing tools would performance prohibitive probevue provides series probe point specifications potential events probed script written vue language allows user define probe block code called action block run events occur system execution action block limited specific events use conditional statement placed probe called predicate code action block follows c-like syntax limited set built functions following example probe defined whenever process pid 123456 enters read system call event happens script call built-in printf function print message output trace buffers first line action block c-style comment therefore execute probevue environment probes like sample written run without extensive testing normally required production system probevue environment protects user errant code resource hungry tracing frequently seen previous ibm tracing tools runtime compile feature probevue provides powerful ad hoc environment data gathering currently ibm provides following probe providers aix 6.1 syscall uft interval trace probevue probes begin end syscall provider defines probe points subset available system calls user function tracing uft probes defined entry points functions defined c c++ program syscall uft probes must include valid function prototype vue script function parameters entry probes return values syscall exit probes accessed interval probes fire timer defined 100 millisecond intervals trace provider allows probevue access traditional trace hooks finally probevue probes called begin end fire probevue environment starts exits probevue designed tool monitor operating system events vue language uses event driven style used describe process data derived events like dynamic tracing languages found unices vue language c-like syntax frequently presented context vue relationship c many parallels deviates significantly imperative nature c. contrasts similarities shown probevue used monitor applications written primarily c supports c data types well c data structures vue also supports string list time stamp data types string list types actually arrays time stamp high resolution representation point time type casting automatic type promotion operations mixed types similar c behavior well pointers arrays data structures behave probevue would c program key difference c pointers refer location memory referencing location another process space access memory necessary first copy memory location local probevue environment memory paged probevue force page fault access another difference size pointers c determined compile time probevue determined 32 64 bitness application probed floating point data types valid data types assignment probed process used floating point mathematical operations vue uses scoping rules similar c must also account externally derived nature much data probes result data classes available relevant probes portions view script basic classifications data follows vue operators follow c conventions closely exception used strings used strings operator performs concatenation == operator used comparisons vue allow definition user functions recursion looping constructs offer conditional if-then expressions within probe action block lightweight nature probevue prohibits vue script defining expensive looping extensive branching operations could degrade performance tentative tracing concept allows trace output block code labeled tentative output code later committed trace buffers visible output discarded works conceptually much like transaction controls sql vue script invoked interpreter magic set executable like shell script run input probevue command form command line parameter stdin input convention vue scripts .e filename extension vue language lacks aggregations instead uses list data type offers similar yet limited functionality equivalent product solaris called dtrace offers aggregation data type powerful set aggregating functions represent statistical data list data type offers basic aggregating functions single item opposed associative arrays aggregations dtrace offers list data type offers slight simplification keeping stats manually allow list reset say interval easily done using manual summaries basic types ibm committed associative arrays future versions vue language long development lead time dtrace probevue dtrace considerably probe point specifications ibm plans add considerable number new probe points future technology level releases aix 6.1 next major aix release | [
1152,
5222,
10413,
10510,
11632,
11506,
3323,
2045,
3615
] | Test |
10,149 | 3 | Slackware:slackware slackware linux distribution created patrick volkerding 1993 originally based softlanding linux system slackware basis many linux distributions notably first versions suse linux distributions oldest distribution still maintained slackware aims design stability simplicity unix-like linux distribution makes modifications possible software packages upstream tries anticipate use cases preclude user decisions contrast modern linux distributions slackware provides graphical installation procedure automatic dependency resolution software packages uses plain text files small set shell scripts configuration administration without modification boots command-line interface environment many conservative simplistic features slackware often considered suitable advanced technically inclined linux users slackware available ia-32 x86_64 architectures port arm architecture slackware mostly free open source software formal bug tracking facility public code repository releases periodically announced volkerding formal membership procedure developers volkerding primary contributor releases name slackware stems fact distribution started private side project intended commitment prevent taken seriously first volkerding gave humorous name stuck even slackware became serious project slackware refers pursuit slack tenet church subgenius parody religion certain aspects slackware graphics reflect this—the pipe tux smoking influenced image j. r. bob dobbs head humorous reference church subgenius found many versions install.end text files indicate end software series setup program recent versions including slackware release 14.1 text rot13 obfuscated slackware originally derived softlanding linux system sls popular original linux distributions first offer comprehensive software collection comprised kernel basic utilities including x11 graphical interface tcp/ip uucp networking gnu emacs patrick volkerding started sls needing lisp interpreter school project named moorhead state university msu found clisp available linux downloaded sls run weeks later volkerding asked artificial intelligence professor msu show install linux home computers school volkerding made notes describing fixes issues found installing sls professor went applied changes new installation however took almost long took install sls professor asked install disks could adjusted fixes could applied installation start slackware volkerding continued making improvements sls fixing bugs upgrading software automatic installation shared libraries kernel image fixing file permissions short time volkerding upgraded around half packages beyond sls available volkerding intentions provide modified sls version public friends msu urged put sls modifications onto ftp server volkerding assumed sls would putting new version included things soon enough held weeks time many sls users internet asking sls new release eventually volkerding made post titled anyone want sls-like 0.99pl11a system received many positive responses discussion local sysadmin msu volkerding obtained permission upload slackware university ftp server first slackware release version 1.00 distributed july 17 1993 00:16:36 utc supplied 24 3½ floppy disk images announcement made volkerding watched flood ftp connections continually crashed server soon afterwards walnut creek cdrom offered additional archive space ftp servers size slackware quickly increased addition included software version 2.1 released october 1994 tripled comprise 73 1.44m floppy disk images 1999 slackware saw version jump 4 7 slackware version numbers lagging behind distributions led many users believe date even though bundled software versions similar volkerding made decision bump version marketing effort show slackware up-to-date linux distributions many release numbers 6 time chose 7 estimating distributions would soon release number april 2004 patrick volkerding added x.org server packages testing/ directory -current replacement xfree86 packages currently used request comments future x window system slackware month later switched xfree86 x.org server stating opinions 4 1 favor using x.org release default version x stated decision primarily technical one xfree86 proving cause compatibility problems slackware 10.0 first release x.org server march 2005 patrick volkerding announced removal gnome desktop environment development changelog stated consideration 4 years already projects provided complete version gnome slackware slackware provided volkerding stated future gnome support would rely community community responded october 2016 several active gnome projects slackware include cinnamon dlackware dropline gnome mate slackmate removal deemed significant linux community due prevalence gnome many distributions may 2009 patrick volkerding announced public development release official x86_64 variant called slackware64 maintained parallel ia-32 distribution slackware64 pure 64-bit distribution support running compiling 32-bit programs however designed multilib-ready eric hameleers one core slackware team members maintains multilib repository contains necessary packages convert slackware64 multilib enable running 32-bit software hameleers started 64-bit port diversion pain recovering surgery september 2008 volkerding tested port december 2008 impressed saw speed increases 20 40 percent benchmarks compared 32-bit version minimize extra effort maintaining versions parallel slackware build scripts called slackbuilds slowly transitioned supporting either architecture allowing one set sources versions slackware64 saw first stable release version 13.0 november 2013 release 14.1 june 2016 slackware saw 31-month gap releases marking longest span release history time development branch went without updates 47 days however april 21 2015 patrick volkerding apologized changelog absence updates stated development team used time get good work done 700 program changes listed changelog entry including many major library upgrades january 2016 volkerding announced reluctant addition pulseaudio primarily due bluez dropping direct alsa support v5.x various projects turn dropping support bluez v4.x knowing users would happy change stated bug reports complaints threats go changes culminated release slackware 14.2 june 2016 design philosophy slackware oriented toward simplicity software purity core design emphasizes lack change upstream sources many design choices slackware seen heritage simplicity traditional unix systems examples kiss principle context simple refers simplicity system design rather system usage thus ease use may vary users lacking knowledge command line interfaces classic unix tools may experience steep learning curve using slackware whereas users unix background may benefit less abstract system environment keeping slackware design philosophy spirit purity software slackware uses original configuration mechanisms supplied software authors however administrative tasks distribution-specific configuration tools delivered formal issue tracking system official procedure become code contributor developer project maintain public code repository bug reports contributions essential project managed informal way final decisions going included slackware release strictly remain slackware benevolent dictator life patrick volkerding first versions slackware developed patrick volkerding alone beginning version 4.0 official slackware announce files list david cantrell logan johnson part slackware team later announce statements release version 8.1 include chris lumens lumens johnson cantrell also authors first edition slackware linux essentials official guide slackware linux slackware website mentions chris lumens david cantrell slackware alumni worked full-time slackware project several years release notes slackware 10.0 10.1 volkerding thanks eric hameleers work supporting usb pci cardbus wireless cards starting version 12.0 second time team building around volkerding according release notes 12.2 development team consists seven people future versions added people since version 13.0 slackware team seems core members eric hameleers gives insight core team essay history slackware development written october 3–4 2009 shortly release version 13.0 slackware package management system collectively known pkgtools administer install upgrade remove packages local sources also uncompress create packages official tool update slackware network internet originally developed piter punk unofficial way keep slackware up-to-date officially included main tree slackware 12.2 included since slackware 9.1 package upgraded install new package old one remove files longer exist new package running confirms version numbers different thus allowing downgrading package desired slackware packages tarballs compressed using various methods starting 13.0 packages compressed using xz based lzma compression algorithm utilizing filename extension prior 13.0 packages compressed using gzip based deflate compression algorithm using extension support bzip2 lzma compression also added using filename extensions respectively although commonly used packages contain files program well additional metadata files used package manager package tarball contains full directory structure files meant extracted system root directory installation additional metadata files located special directory within tarball usually include file specifically formatted text file read package manager provide users description packaged software well file post-unpacking shell script allowing creation symbolic links preserving permissions startup files proper handling new configuration files aspects installation ca n't implemented via package directory structure package manager maintains directory package installed corresponding install log file lists package size compressed uncompressed software description full path files installed also maintains directory containing files allow proper removal installed symlinks package removed upgraded old install logs files moved respectively making possible review previous packages see removed package management system track manage dependencies however performing recommended full install dependencies stock packages met custom installations 3rd-party packages slackware relies user ensure system supporting system libraries programs required program since official lists dependencies stock packages provided users decide install custom installation install 3rd-party software need work possible missing dependencies since package manager n't manage dependencies install packages whether dependencies met user may find dependencies missing attempting use software slackware incorporate official tools resolve dependencies unofficial community-supported software tools provide function similar way apt debian-based distributions yum red hat-based distributions include official repositories slackware official packages slackware provides available installation media however many third-party repositories slackware standalone repositories others distributions slackware-based retain package compatibility slackware many searched using pkgs.org linux package search engine however mixing matching dependencies multiple repositories lead two packages require different versions dependency form dependency hell slackware wo n't provide dependency resolution packages however projects provide list dependencies included slackware files package commonly extension due possibility dependency issues many users choose compile programs using community-provided slackbuilds slackbuilds shell scripts create installable slackware package provided software tarball since slackbuilds scripts n't limited compiling program source also used repackage pre-compiled binaries provided projects distributions repositories proper slackware packages slackbuilds compile sources several advantages pre-built packages since build original author source code user trust third-party packager furthermore local compilation process allows machine-specific optimization comparison manual compilation installation software slackbuilds provide cleaner integration system utilizing slackware package manager slackbuilds come additional file metadata allows automated tools download source verify source corrupted calculate additional dependencies part slackware repositories include slackbuilds resulting slackware packages allowing users either build install pre-built package officially endorsed slackbuilds repository slackbuilds.org commonly referred sbo community-supported project offering slackbuilds building software included slackware users able submit new slackbuilds software site approved become package maintainer responsible providing updates slackbuild either fix issues build newer versions provided upstream ensure programs compiled used required dependencies software included slackware required documented available site submissions tested site administrators added repository administrators intend build process nearly identical way slackware official packages built mainly ensure volkerding sympathetic cause allows slackbuilds volkerding deems worthy pulled regular slackware minimal changes script also prevent users suggesting volkerding change scripts match sbo sbo provides templates slackbuilds additional metadata files encourage package maintainers deviate unless necessary two slackware team members eric hameleers robby workman repository pre-compiled packages along slackbuilds source files used create packages packages additional software included slackware felt worth time maintain packages used testbed future upgrades slackware notably hameleers provides ktown packages newer versions kde also maintains slackware multilib repository enabling slackware64 run compile 32bit packages slackware release policy follows feature stability based release cycle contrast time-bound e.g ubuntu rolling release e.g gentoo linux schemes linux distributions means set time expect release volkerding release next version feels suitable number changes previous version made changes lead stable environment stated patrick volkerding usually policy speculate release dates since — pure speculation always possible know long take make upgrades needed tie related loose ends things built upcoming release 'll uploaded -current tree throughout slackware history generally try deliver up-to-date software least annual basis however slackware 14.1 14.2 2-year gap releases inception 2014 2015 slackware least one release per year release activity peaked 1994 1995 1997 1999 three releases year starting version 7.1 june 22 2000 release progression became stable tended occur year since years two releases 2003 2005 2008 slackware latest 32bit x86 64bit x86_64 stable releases version 14.2 released june 30 2016 include support linux 4.4.14 volkerding also maintains testing/developmental version slackware called -current used bleeding edge configuration version eventually become next stable release point volkerding start new -current start developing next release slackware version generally known stable possible things break -current tends recommended production systems currently slackware officially stated support term policy however june 14 2012 notices appeared changelogs versions 8.1 9.0 9.1 10.0 10.1 10.2 11.0 12.0 stating effective august 1 2012 security patches would longer provided versions oldest release version 8.1 released june 18 2002 10 years support reaching eol later august 30 2013 announcements made changelogs 12.1 12.2 stating eol december 9 2013 stated changelog entries least 5 years support april 6 2018 versions 13.0 13.1 13.37 declared reaching eol july 5 2018 stated changelog entries least 7 years support 13.0 supported almost 9 years announcements slackware team versions slackware 14.0 eol official announcements versions prior 8.1 longer maintained effectively eol historically slackware concentrated solely ia-32 architecture releases available 32-bit however starting slackware 13.0 64-bit x86_64 variant available officially supported symmetrical development 32-bit platform prior release slackware64 users wanting 64-bit required use unofficial ports slamd64 slackware also available ibm s/390 architecture form slack/390 arm architecture slackware arm originally known 'armedslack ports declared official patrick volkerding however s/390 port still version 10.0 stable version 11.0 testing/developmental version updates since 2009 also may 7 2016 developer slackware arm announced 14.1 eol september 1 2016 development -current cease release 14.2 however support 14.2 maintained foreseeable future eol announcement 14.1 added changelog june 25 2016 july 2016 developer slackware arm announced development build tools enhanced reduce manual effort involved maintaining arm port proceeded announce 32-bit hardware floating port development port released august 2016 current form slackintosh unofficial port slackware new world macintosh powerpc architecture slackintosh final release 12.1 longer maintained slackware iso images installation downloaded free slackware website via bittorrent various ftp http mirrors 6-cd set single dual-dvd previously available order slackware official store store currently unavailable official statement return cd set targeted 32bit ia-32 platform also runs 64bit x86_64 processors 32-bit mode dvd contains 32bit 64bit versions distributions ports arm architecture ibm s/390 neither available cd/dvds iso images downloaded slackware s/390 installs dos partition floppy disk slackware arm distribute iso files arm devices boot cd dvd instead installed network using das u-boot tftp boot server mini-root filesystem slackware arm also installed pc running qemu using technique 2019 distrowatch ranks slackware 34 interest appears peaked 2002 slackware rank reached 7 gradually slipped top 10 2010 appears stabilized around current rank 2015 however since distrowatch tracks visitors various distributions pages state ranking n't always correlate usage distribution popularity distribution site rankings used measure market share distributions linux distributions slackware official tracking system total unique installs active users | [
4611,
7685,
3079,
7689,
9743,
2064,
3089,
4113,
6675,
8209,
10257,
8727,
5656,
543,
11297,
7204,
9253,
5670,
11305,
6189,
56,
3129,
4153,
59,
7228,
8248,
9276,
4673,
8258,
10817,
8772,
3654,
5190,
3147,
2125,
593,
1107,
1110,
89,
5721,
... | Test |
10,150 | 9 | Variable_Assembly_Language:variable assembly language variable assembly language val computer-based control system language designed specifically use unimation inc. industrial robots val robot language permanently stored part val system includes programming language used direct system individual applications val language easy understand syntax uses clear concise generally self-explanatory instruction set commands communications robot consist easy understand word number sequences control programs written computer controls robot real-time system val continuous trajectory computation permits complex motions executed quickly efficient use system memory reduction overall system complexity val system continuously generates robot control commands simultaneously interact human operator permitting on-line program generation modification convenient feature val ability use libraries manipulation routines thus complex operations may easily quickly programmed combining predefined subtasks val language consists monitor commands program instructions monitor commands used prepare system execution user-written programs program instructions provide repertoire necessary create val programs controlling robot actions following terms frequently used val related operations val monitor administrative computer program oversees operation system accepts user input initiates appropriate response follows instructions user-written programs direct robot performs computations necessary control robot val editor aid entering information computer system modifying existing text used enter modify robot control programs list instructions telling computer something val programs written system users describe tasks robot perform location position object space orientation object locations used define positions orientations robot tool assume program execution several conventions apply numerical values supplied val commands instructions preceding monitor-command description two symbols indicating command typed user dot signifies command performed val top-level monitor mode user program executed system prompt dot asterisk indicates command performed time val executing program system prompt asterisk symbols present command executed either case monitor commands program instructions abbreviated entering monitor command program instruction function name abbreviated many characters necessary make name unique commands instructions angle brackets used enclose item describes actual argument appear thus programmer supply appropriate item position entering command instruction note brackets used clarification never included part command instruction many val commands instructions optional arguments notations optional arguments enclosed square brackets comma following argument comma must retained argument omitted unless nothing follows example monitor base command form specify 300-millimeter change z direction command could entered following ways note commas preceding number 300 must present correctly relate number z-direction change like angle brackets square brackets never entered part command instruction several types numerical arguments appear commands instructions type restrictions values accepted val following rules observed nearest representable value function val regulate control robot system following user commands instructions addition compact stand-alone system val designed highly interactive minimize programing time provide many programming aids possible standard val system uses operator console terminal manual control box input commands data user operator console serves primary communication device either direct play terminal printing terminal interaction devices automated cell typically handled monitoring input channels switching outputs means robot control modest cell without need programmable devices controller two levels operation prom memory retains contents finitely thus val immediately available controller switched monitor responsible control robot commands come manual control unit system terminal programs increase versatility flexibility val monitor perform commands even user program executed commands processed way include controlling status system defining robot locations storing retrieving information floppy disk creating editing robot control programs | [] | None |
10,151 | 6 | Linear_Tape_File_System:linear tape file system linear tape file system ltfs file system allows files stored magnetic tape accessed similar fashion disk removable flash drives requires specific format data tape media software provide file system interface data technology based around self-describing tape format developed ibm adopted lto consortium 2010 magnetic tape data storage used 50 years typically hold file metadata form easy access modify independent file content data often external databases used maintain file metadata file names timestamps directory hierarchy hold data external databases generally designed interoperability tapes might might contain index content unix-like systems tar interoperable standard well-suited allow modification file metadata independent modifying file content data maintain central index files provide filesystem interface characteristics ltfs technology first implemented ibm prototype running linux mac os x 2008/2009 prototype demonstrated nab 2009 based feedback initial demonstration experience within ibm filesystem overhauled preparation release product ltfs development team worked vendors lto tape products hp quantum build support understanding ltfs format filesystem implementation leading public release ltfs format specification filesystem implementation released april 12 2010 support ibm hp quantum lto consortium ltfs v2.0.0 released march 2011 improving text clarify remove ambiguity also added support sparse files persistent file identifiers virtual extended attributes filesystem metadata control defined minimum recommended blocksize values ltfs volumes compatibility across various hba hardware implementations version 2.0.0 defines rules version number may change future compatibility maintained across varying implementations implementations must august 2012 snia announced forming twg technical work group continue technical development specification ltfs format specification v 2.1 baseline technical work standards accreditation process snia ltfs twg members include hp ibm oracle quantum ltfs make tape appear behave like disk change fundamentally sequential nature tape files always appended end tape file modified overwritten removed volume associated tape blocks used freed simply marked unavailable used volume capacity recovered data deleted capacity recovered whole tape reformatted spite disadvantages several uses cases ltfs formatted tape superior disk data storage technologies lto seek times range 10 100 seconds streaming data transfer rate match exceed disk data transfer rates additionally lto cartridges easily transportable hold far data removable data storage format ability copy large file large selection files 1.5tb lto-5 2.5tb lto_6 ltfs formatted tape allows easy exchange data collaborator saving archival copy since ltfs open standard ltfs formatted tapes usable wide variety computing systems ibm linear tape file system single drive edition initially released ibm long term file system allows tapes formatted ltfs volume volumes mounted users applications access files directories stored tape directly including drag-and-drop files ibm linear tape file system library edition ltfs-le product allows ltfs volumes used tape library ltfs-formatted tape cartridge library appears separate folder filesystem mount point user application navigate folders access files stored tape ltfs-le software automatically controls tape library robotics load unload necessary ltfs volumes oracle free open source storagetek linear tape file system ltfs open edition software claimed first store 8.5tb native capacity single cartridge supports oracle ’ midrange storagetek lto 5 lto 6 tape drives hp ibm well oracle ’ storagetek t10000c t10000d tape drives oracle ’ storagetek ltfs-le software offering supports storagetek sl8500 modular library system storagetek sl3000 modular library system storagetek sl150 modular tape hp linear tape file system hp ltfs hp implementation free open source software application quantum corporation provides ltfs solution windows linux mac os x support scalar ltfs appliance file system presents quantum tape library nas share appliance makes files viewable resided local disk allows users drag drop files directly tape cartridge implementations | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
6797,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
7344,
2230,
5816,
1212,
8380,
10951,
9420,
3795,
4819,
... | Test |
10,152 | 7 | CloudShare:cloudshare cloudshare cloud computing provider company formerly structures founded january 2007 israel headquartered san francisco california cloudshare combines aspects virtualization cloud computing advanced features offer software service saas similar virtual lab automation cloudshare makes full-featured virtual enterprise environments available online on-demand applications including developing testing pre-sales demos proofs-of-concept evaluations technical training development certification hardware software channel enablement customers create multi-machine environments cloud upload existing virtual machines cloudshare supports hypervisors vmware oracle virtualbox operating systems windows 7 ubuntu provides templates new machines operating systems even software microsoft sharepoint 2010 microsoft office 2010 ruby rails preinstalled created environments consist single virtual machine multiple networked machines able operate seamlessly user ’ physical pc workstation environments saved replicated shared additional users free interact independent replica “ snapshot ” cloudshare founded tel aviv israel january 2007 avner rosenan ophir kra-oz zvi guterman company originally named structures 2009 cloudshare moved headquarters san mateo california december 2009 cloudshare closed series b round funding receiving 10 million sequoia capital charles river ventures gemini capital bringing total venture capital funding 16 million 2014 zvi guterman bought company back sequoia capital took private | [
4194,
467
] | Test |
10,153 | 3 | Apple–Intel_architecture:apple–intel architecture apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors rather powerpc motorola 68000 68k series processors used predecessors change architecture change firmware became necessary apple selected intel-designed extensible firmware interface efi comparable component open firmware used powerpc architectures firmware-based replacement pc bios intel change processor architecture x86 macs gained ability boot x86-native operating systems microsoft windows intel vt-x brought near-native virtualization mac os x host os apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors name implies refers changes architecture earlier powerpc apple 68k preceding processors apple uses subset standard pc architecture provides support mac os x support operating systems hardware firmware components must supported run operating system apple-intel hardware include extensible firmware interface change architecture change firmware became necessary extensible firmware interface efi firmware-based replacement pc bios intel designed intel chosen apple replace open firmware used powerpc architectures since many operating systems windows xp many versions windows vista incompatible efi apple released firmware upgrade compatibility support module provides subset traditional bios support boot camp product guid partition table gpt standard layout partition table physical hard disk part extensible firmware interface efi standard proposed intel substitute earlier pc bios gpt replaces master boot record mbr used bios intel macs boot two ways directly via efi legacy bios compatibility mode multibooting holding option gives choice bootable devices refind bootloader commonly used added configurability standard live usbs used intel macs efi firmware recognize boot usb drives efi mode–when firmware switches bios mode longer recognizes usb drives due lack bios-mode usb driver many operating systems earlier versions windows linux booted bios mode easily booted perform better booted bios mode thus usb booting intel-based macs time largely limited mac os x easily booted via efi april 5 2006 apple made available download public beta version boot camp collection technologies allows users intel-based macs boot windows xp service pack 2 first non-beta version boot camp included mac os x v10.5 leopard introduction boot camp provides hardware drivers windows xp drivers xp difficult find linux also booted boot camp intel-based mac computers use similar hardware pcs manufacturers ship microsoft windows linux operating systems particular cpus chipsets gpus entirely compatible however apple computers also include custom hardware design choices found competing systems differences pose obstacles running macos non-apple hardware booting alternative operating systems mac computers – apple provides drivers custom hardware macos microsoft windows part boot camp drivers operating systems linux need written third parties usually volunteer free software enthusiasts digital rights management apple–intel architecture accomplished via dont steal mac os x.kext sometimes referred dsmos dsmosx file present intel-capable versions mac os x operating system presence enforces form digital rights management preventing mac os x installed stock pcs name kext reference mac os x license conditions allow installation apple hardware according apple anything else stealing mac os x kext located /system/library/extensions volume containing operating system extension contains kernel function called performs aes decryption apple-protected programs system lacking proper key able run apple-restricted binaries include initial announcement first intel-based mac hardware configurations reporting trusted platform module among system components believed tpm responsible handling drm protection later proven case keys actually contained within system management controller component exclusive apple computers easily retrieved two 32-byte keys form human-readable ascii string copyrighted apple establishing another possible line legal defence prospective clone makers intel core duo later including current i5 i7 xeon processors found intel macs support intel vt-x allowing high performance near native virtualization gives user ability run switch two operating systems simultaneously rather dual-boot run one operating system time first software take advantage technology parallels desktop mac released june 2006 parallels virtualization products allow users use installations windows xp later virtualized mode running os x. virtualbox virtualization software oracle corporation released january 2007 available mac os x well host operating systems supports intel vt-x run multiple guest operating systems including windows xp later available free charge either proprietary license gpl free software license used default running docker images operating systems vmware offers product similar parallels called fusion released august 2007 vmware virtualization product also allows users use installations windows xp later os x regardless product used inherent limitations performance penalties using virtualized guest os versus native mac os booting alternative os solution offered via boot camp | [
6150,
6153,
6797,
1042,
533,
4637,
7326,
10142,
9762,
7983,
823,
11447,
7354,
11257,
2623,
576,
2525,
2910,
1632,
4068,
2149,
4581,
1515,
2667,
499,
6771,
9337,
2811,
8700
] | None |
10,154 | 7 | Twister_(software):twister software twister free software experimental peer-to-peer microblogging completely decentralized means one able shut single point attack system uses end-to-end encryption safeguard communications based bittorrent bitcoin-like protocols considered distributed twitter clone twister twitter-like microblogging platform utilizes blockchain technology bitcoin file exchange method bittorrent based p2p technologies twister experimental software alpha phase implemented distributed file sharing system user registration authentication provided bitcoin-like network completely distributed depend central authority distribution posts uses kademlia distributed hash table dht network bittorrent-like swarms provided libtorrent included versions bitcoin libtorrent highly patched intentionally interoperable already existing networks miguel freitas aiming build censor-resistant public posting platform began development twister july 2013 address concerns free speech privacy building work bitcoin bittorrent able core working october 2013 lucas leal hired create html css user interface miguel writing required javascript code 2,500 user accounts registered first six days operation completely decentralized network one capable incapacitating twister since unique point attack system twister uses end-to-end encryption protect communications furthermore twister designed prevent users knowing gsm localization ip address following users publish public messages microblogging platforms send direct messages private messages users protected unsolicited access brazilian computer engineer programmer miguel freitas started developing new social network learning massive spy programs usa national security agency nsa revealed nsa whistle-blower edward snowden started worry accessibility amount information control single company american jurisdiction according freitas twitter social network helped promote democracy organize protests magazine 'wired claims believes massive surveillance likes nsa makes dangerous provide personal information social networks currently exist reason decided build new system based privacy-preserving technology freitas used believe future social networks would based decentralized protocols central point control learning existing social networks already massively compromised state began take action development alternative service based closely twitter miguel developer lucas leal considered alpha version application android linux os x versions windows iphone ’ planned since open source free migrate application operating systems even though project moment alpha phase brian armstrong co-founder coinbase believes great example open protocol bitcoin used diverse purposes twister decentralized system instead networks kind like pump.io identi.ca statusnet gnu social diaspora n't require use server ’ require trust third one order use works peer-to-peer program achieved bitcoin protocol net used cryptocurrency basically protocol handles register users accesses way miners verify transactions bitcoin network secure one makes double spent twister network verifies users names messages belonging specific user really user messages driven bittorrent protocol allows keeping distribution system great number messages along network fast efficient way also allows users receive notifications almost instantly new messages alerts – without necessity central server since twister uses end-to-end encryption intercepted private direct messages read person apart addressee code used elliptic curve cryptography different one used nsa used bitcoin thought give security level similar rsa code 3072 bits data ’ stored anywhere ’ used cut consequence lose entry password impossible access private messages peer-to-peer system ’ central server publications may compiled see prism freitas explains system designed way users ’ know online ip address messages read information ’ registered anywhere despite freitas warns users anonymity may total depending circumstances twister developed linux environment freitas migrated successfully system android os x another long-term interesting objective would moving whole cryptographic code implementation interface user browser way users would capable accessing twister client platform use choosing third server still maintaining security private passwords times first twister prototype intended reproducing basic characteristics microblogging platform including private messages require addressee follower speaker common requisite existing platforms characteristics difficult implement completely decentralized system requiring effort includes arbitrary register words posts recompilation hashtaghs find main tendencies twister uses parameters elliptic curves bitcoin secp256k1.this ’ curve usually implicated nsa called sec256r1 256 bits public-key cryptography comprometido ecc must proportionate security similar key rsa 3072 bits least said experts usually stimulate people try break security systems something everyone desires money millions usd table coded keys secp256k1 bitcoin direct application messages encoding based example code published internet ladar levison lavabit known ladar took service denied cooperating us government allows control clients twister platform microblogging peer-to-peer means communication established computers without going central node would one recorded information company behind provides server machinery used detect case conversations people run node delete posts dht block account due fact messages sent directly user another without going central node also encrypted way – beginning end encrypted exit decrypted arrival – travel private way web black-box besides ip directions also protected application ip direction machine go internet recorded moment avoiding followed entity company according freitas guarantees anonymity mean ip ’ detected isp internet service provider content message ’ visible except spy knows decrypt breaking algorithms order 100 anonymous would use browser masks ip tor another one similar protecting spies | [
8640,
8674,
3428,
9732,
3495,
6344,
6761,
3629,
6797,
7887,
7983,
823,
574,
1087
] | None |
10,155 | 2 | SCSI_Pass_Through_Interface:scsi pass interface scsi pass interface spti application programming interface api accessing scsi device developed microsoft corporation part windows nt family operating systems storage port drivers provide interface win32 applications send scsi command descriptor block cdb messages scsi devices interfaces ioctl_scsi_pass_through ioctl_scsi_pass_through_direct applications build pass-through request send device using ioctl spti accessible windows software using deviceiocontrol windows api imgburn offers spti method accessing optical disc drives | [
6240,
8262,
6797,
7983,
8976,
3860,
823,
5754
] | Validation |
10,156 | 2 | USIX:usix usix discontinued unix-like computer operating system created system six inc. russia ineum institut elektronnykh upravlyaushikh mashin institute electronic control machines one leading software r organizations soviet union collapse funding system six operating system development closed | [
6787,
8713,
11145,
6412,
7823,
5267,
5397,
1304,
3487,
3241,
7983,
3248,
2995,
9141,
823,
7224,
3129,
9784,
7483,
1853,
9151,
10436,
4039,
6369,
4076,
5363,
5492,
2424,
633
] | Test |
10,157 | 1 | SQL_Server_Management_Studio:sql server management studio sql server management studio ssms software application first launched microsoft sql server 2005 used configuring managing administering components within microsoft sql server successor enterprise manager sql 2000 tool includes script editors graphical tools work objects features server central feature ssms object explorer allows user browse select act upon objects within server also shipped separate express edition could freely downloaded however recent versions ssms fully capable connecting manage sql server express instance microsoft also incorporated backwards compatibility older versions sql server thus allowing newer version ssms connect older versions sql server instances also comes microsoft sql server express 2012 users download separately starting version 11 application based visual studio 2010 shell using wpf user interface versions 18 based visual studio 2017 isolated shell june 2015 microsoft announced intention release future versions ssms independently sql server database engine releases | [
6797,
10900,
10902,
11030,
3224,
5401,
7064,
11414,
4384,
8227,
11683,
11559,
4010,
1964,
7983,
9263,
11570,
6709,
8246,
315,
7486,
4674,
1347,
1348,
5320,
4174,
847,
83,
1366,
9177,
9434,
603,
608,
2401,
8161,
7523,
3303,
11498,
3821,
10... | Test |
10,158 | 2 | Windows_Master_Control_Panel_shortcut:windows master control panel shortcut windows master control panel shortcut labeled tasks also called windows god mode bloggers tasks folder least one microsoft developer short-cut access various control settings windows vista later operating systems including windows 10 creating folder certain name users access operating system control panels within single folder hack published outside microsoft documentation 2007 gained popularity name god mode used bloggers variations method access different settings also called “ god mode ” folders functionality discovered named master control panel god mode designed base folder searching control panel options using new start menu search function allows users type want e. g. “ change screen resolution ” get right control panel options search result shortcut implemented creating folder extension codice_1 godmode original folder name used feature publicised name used functionality achieved creating standard windows shortcut path codice_2 creating codice_3 file folder includes extension clsid class id general method creating shortcuts documented microsoft though microsoft publicized specific guid codice_4 master control panel third parties published method since least 2007 modest title “ registry hack vista control panel setting tasks one place ” numerous blogs tweets subject appeared december 2009 january 2010 “ windows 7 godmode ” many sites repeating information available elsewhere general folder shortcut format codice_5 codice_6 valid class id clsid system.applicationname entry windows registry technique documented microsoft “ using file system folders junction points ” clsid codice_7 particular interest associated widget allows access many windows settings microsoft documents guids regular control panel applets msdn cnet article attributed many guid shortcuts head microsoft windows division steven sinofsky pre-java 8 applications using swing windows look-and-feel including compiled excelsior jet known crash windows 10 creators update god folder exists | [
6797,
7983
] | Test |
10,159 | 5 | MIMIC_Simulator:mimic simulator mimic simulator product suite gambit communications consisting simulation software network systems management space mimic simulator suite several components related simulation managed networks data centers purposes software development software testing training sales marketing network management applications see mimic snmp simulator solves classical simulation problem network management operations support system software typically manages large networks traditionally order set networks purposes physical equipment separately purchased assembled laboratories reduce expense network simulated e.g see principle behind snmp simulation snmp protocol interface simulated snmp requests carry data values mib objects shaped simulator thus representing device snmp interface contrast network simulation entire network modeled within computer type empirical simulation visible network one communicate simulator network concept extended protocols modern management software typically uses multiple protocols manage networks simulator thus integrate required protocols present authentic instrumentation mimic ios simulator allows simulating cli protocol encountered cisco ios junos tl/1 low-end mimic virtual lab products used training cisco ccna mimic netflow simulator creates many custom netflow exporters mimic sflow simulator sflow mimic ipmi simulator simulates ipmi rmcp via lan interface high-end servers mimic web simulator handles http soap xml wsdl wsman redfish interfaces management via web services mimic iot simulator creates large iot environments based standard protocols mqtt coap | [
10659,
8262,
6797,
9365,
10486,
823,
3133,
479
] | Test |
10,160 | 0 | TenTen_Corpus_Family:tenten corpus family tenten corpus family also called tenten corpora set comparable web text corpora i.e collections texts crawled world wide web processed match standards corpora made available sketch engine corpus manager tenten corpora 35 languages target size 10 billion 10 words per language gave rise corpus family name creation tenten corpora data crawled world wide web processed natural language processing tools developed natural language processing centre faculty informatics masaryk university brno czech republic lexical computing company developer sketch engine corpus linguistics text corpus large structured collection texts electronically stored processed used hypothesis testing languages validating linguistic rules frequency distribution words n-grams within languages electronically processed corpora provide fast search text processing procedures tokenization part-of-speech tagging word-sense disambiguation enrich corpus texts detailed linguistic information enables narrow search particular parts speech word sequences specific part corpus first text corpora created 1960s 1-million-word brown corpus american english time many corpora produced british national corpus lob corpus work begun also corpora larger sizes covering languages english development linked emergence corpus creation tools help achieve larger size wider coverage cleaner data etc procedure tenten corpora produced based creators earlier research preparing web corpora subsequent processing thereof beginning huge amount text data downloaded world wide web dedicated spiderling web crawler later stage texts undergo cleaning consists removing non-textual material navigation links headers footers html source code web pages justext tool full solid sentences preserved eventually onion tool applied remove duplicate text portions corpus naturally occur world wide web due practices quoting citing copying etc tenten corpora follow specific metadata structure common metadata contained structural attributes relate individual documents paragraphs corpus tenten corpora feature additional specific attributes following corpora accessed sketch engine october 2018 | [
5635,
5667,
7780,
2887,
3721,
9577,
4971,
5903,
7599,
113,
1044,
11348,
119,
538,
5214
] | None |
10,161 | 7 | Tresorit:tresorit tresorit online cloud storage service based switzerland hungary emphasizes enhanced security data encryption businesses individuals/freelancers business version offers 1tb storage space per user solo version offers 2tb one user extra security features drm granular access levels functions aim create safer collaborative environment tresorit likened high-security alternative dropbox tresorit service accessible client desktop software web-based application mobile apps currently software available windows macos android windows phone 8 ios linux tresorit founded 2011 hungarian programmers istvan lam remains ceo szilveszter szebeni currently cio gyorgy szilagyi cpo company tresorit officially launched client-side encrypted cloud storage service emerging stealth beta april 2014 august 2015 wuala owned lacie seagate pioneer secure cloud storage announced closing service 7 years recommended users choose tresorit secure cloud alternative end 2016 tresorit launched beta software development kit sdk zerokit january 2017 apple sdk project carekit announced option mobile app developers using carekit integrate zerokit enabling zero knowledge user authentication encryption medical health apps tresorit encrypts files using client-side encryption aes-256 uploading files also secured hmac message authentication codes applied sha-512 hashes tresors german vaults encrypted counterparts uploaded directories tresors automatically sync cloud files added removed similar box.com dropbox desktop software main difference tresorit competition tresorit applies aes-256 client-side encryption files still local uploads cloud company claims due end-to-end encryption users share protected files folders others work together keeping documents synced secure every step process additional layers security core privacy feature service encryption key never leaves user using zero-knowledge encryption protocols tresorit possession users ’ authentication data content files accessed servers delivered authorities upon request 2013 2014 tresorit hosted hacking contest offering 10,000 anyone hacked data encryption methods gain access servers months reward increased 25,000 later 50,000 challenging experts institutions like harvard stanford mit contest ran 468 days according company nobody able break encryption tresorit received number nominations awards up-cloud rewards named one top 5 cloud security solutions 2012 early 2016 forbes listed tresorit cofounder istvan lam among european 30 30 2017 tresorit listed finalist cybersecurity excellence awards category encryption | [
2050,
4869,
2694,
10631,
4746,
8331,
4623,
5650,
6565,
3629,
7983,
823,
8640,
9281,
7238,
10054,
10185,
7891,
1239,
8283,
2267,
7139,
4710,
4970,
5749,
8446
] | Test |
10,162 | 1 | ArchINFORM:archinform archinform online database international architecture originally emerging records interesting building projects architecture students university karlsruhe germany self-described largest online-database worldwide architects buildings contains plans images buildings built potential forms record architecture 20th century database uses search engine allows particular project found listing architect location key word described librarian calouste gulbenkian foundation one useful reference tools concerning architecture available internet | [
2901
] | Test |
10,163 | 4 | Security_printing:security printing security printing field printing industry deals printing items banknotes cheques passports tamper-evident labels security tapes product authentication stock certificates postage stamps identity cards main goal security printing prevent forgery tampering counterfeiting recently many techniques used protect high-value documents become available commercial printers whether using traditional offset flexographic presses newer digital platforms businesses protecting lesser-value documents transcripts coupons prescription pads incorporating features listed ensure forged alteration data occur undetected number technical methods used security printing industry security printing often done security paper also occur plastic materials substrate banknotes made paper almost always cotton fibres strength durability cases linen speciality coloured forensic fibres added give paper added individuality protect counterfeiting countries including canada nigeria romania mexico new zealand israel singapore malaysia england australia produce polymer plastic banknotes improve longevity may include transparent windows 10 millimeters diameter security feature areas covered opacifying layer paper substrate may also include windows based laser-cut holes covered security foil holografic elements makes difficult reproduce using common counterfeiting techniques true watermark recognizable image pattern paper appears lighter darker surrounding paper viewed light behind paper due paper density variations watermark made impressing water coated metal stamp dandy roll onto paper manufacturing watermarks first introduced bologna italy 1282 well use security printing also used papermakers identify product proofing authenticity thinner part watermark shine brighter light source background darker dark background watermark proven anti-counterfeit technology counterfeits simulating appearance printing pattern printed white ink simulated watermarks different reflectance base paper seen angle ink white photocopied scanned similar effect achieved iriodin varnish creates reflections certain viewing angles transparent otherwise watermarks sometimes simulated polymer currency printing according pattern little anti-counterfeiting effect example australian dollar coat arms watermarked plastic bills diffractive optical element doe within transparent window create comparable effect requires laser beam verifcation intaglio printing technique image incised surface normally copper zinc plates used incisions created etching engraving image one may also use mezzotint printing surface covered ink rubbed vigorously tarlatan cloth newspaper remove ink surface leaving incisions damp piece paper placed top plate paper run printing press pressure transfers ink paper sharp printing obtained intaglio process hard imitate means intaglio also allows creation latent images visible document viewed shallow angle guilloché ornamental pattern formed two curved bands interlace repeat circular design made geometric lathe involves use extremely small text often used currency bank checks text generally small enough indiscernible naked eye cheques example use microprint signature line optically variable ink ovi made mica colored magnetizable inks prepared including chromatic pigments high color strength magnetic pigments ’ strong inherent color generally reduces spectrum achievable shades generally pigments used high concentrations ensure sufficient magnetizable material applied even thin offset coats magnetic pigment best suited colored magnetizable inks due lower blackness homogenous magnetization preferred orientation easily obtained pigment made spherical particles best results achieved remanence coercive field strength low saturating magnetization high pearlescent pigments viewed different angles angle light perceived makes color appear change magnetic fields within particles shift direction hologram may embedded either via hot-stamping foil wherein extremely thin layer micrometers depth bonded paper plastic substrate means hot-melt adhesive called size coat heat metal die may directly embossed holographic paper onto laminate card incorporated custom design pattern logo hologram hot stamping foils become security foils protect credit cards passports bank notes value documents counterfeiting holograms help curtailing forging duplication products hence essential security purposes stamped product removed forged enhancing product time also security perspective stamped hologram superior security device virtually impossible remove substrate metal threads foils simple iridescent features foil color copying foils additional optically variable effects often used two kinds security threads one thin aluminum coated partly de-metalized polyester film thread microprinting embedded security paper banknote passport paper kind security thread single multicolor sewing thread made cotton synthetic fibers mostly uv fluorescent bookbinding passport booklets recent designs security thread enhanced security features holograms three-dimensional effects tilted occasion banknote designers succumb titanic effect excess belief latest technology place much faith particular trick example forgery british banknotes 1990s british banknotes 1990s featured windowed metal strip paper 1 mm wide comes paper surface every 8 mm examined reflected light appears dotted metallic line running across viewed transmitted light metal strip dark solid duplicating thought difficult criminal gang able reproduce quickly used cheap hot-stamping process lay metal strip surface paper printed pattern solid bars using white ink leave expected metal pattern visible trial found forged tens millions pounds ’ worth notes period years speed read computer systems magnetic ink character recognition used extensively banking primarily personal checks ink used magnetic ink character recognition micr technology also used greatly reduce errors automated computerized reading pigment dispersed binder system resin solvent wax compound applied either pressing hot melt carrier film usually polyethylene people believe magnetic ink intended fraud prevention concept yet original intent non-optical technology writing cheque like signatures would interfere reading main magnetic fonts e13-b cmc7 downloadable small fee addition magnetic toner available many printers higher resolution toners sufficient magnetic properties magnetic reading successful without special toner serial numbers help make legitimate documents easier track audit help detect forgeries serial numbers normally check digit verify serial number banknote printing unique serial number provides effective means monitoring verification production volume another method protection create trap numbers within serial number range example system may automatically invalidate numbers range 200-300 e.g 210 205 would invalid system may even take single random numbers within block e.g ending 51 37 48 within 200-300 range would invalid late twentieth century advances computer photocopy technology made possible people without sophisticated training easily copy currency attempt prevent banks sought add filtering features software hardware available public senses features currency locks reproduction material marks one known example system eurion constellation sometimes original document value original signed cheque example value photocopy original prescription script filled photocopy copy-evident technologies provide security hard copy documents helping distinguish original document copy common technology help differentiate originals copies void pantograph void pantographs essentially invisible untrained naked eye original scanned copied layout lines dots dashes reveal word frequently void hence name symbol clearly allows copy identified technology available traditional presses offset flexographic newer digital platforms advantage digital press single pass printer void pantograph variable data printed plain paper copy-evident paper sometimes marketed ‘ security paper ’ pre-printed void pantograph paper usually produced offset flexographic press quality void pantograph usually quite good produced press high resolution small number originals printed cost effective solution however advent digital printer rapidly eroded benefit second technology complements enhances effectiveness void pantograph verification grid technology visible original usually fine lines symbols photocopied lines images disappear inverse reaction void pantograph common examples technology fine lines edge cheque disappear copied coupon symbol shopping cart disappears unauthorized copy made verification grid available either traditional digital presses together void pantograph verification grid complement reactions copying inverse resulting higher degree assurance hard copy document original use color greatly assist prevention forgeries including color document color photocopier must used attempt make copy however use machines also tends enhance effectiveness technologies void pantographs verification grids see copy-evident using two colors background blending together prismatic effect created done either traditional digital press document using technique attempted photocopied scanning re-creation color copier inexact usually resulting banding blotching thereby immediate recognition document copy frequent example prismatic coloring checks combined techniques void pantograph increase difficulty successful counterfeiting carefully created images hidden background picture document images seen without help inexpensive lens specific line screening placed location image rotated image becomes visible document photocopied halo image lost known implementation scrambled indicia halo printed traditional digital presses advantage traditional presses multiple images overlaid location become visible turn lens rotated halo used technique authenticate originality document may used verify critical information within document example value coupon might encoded halo image could verified time redemption similarly seat number sporting event ticket false-positive testing derives name testing requires false positive reaction authenticate document common instance widely available counterfeit detector marker seen many banks stores counterfeit detector markers use chemical interaction substrate usually paper document turning particular color usually marker turns newsprint black leaves currency specially treated areas document clear gold reaction coloring varies depending upon formulation banknotes specially manufactured substrate usually behave differently standard newsprint paper difference counterfeits detected markers false-positive testing also done documents currencies means test authenticity stroke marker symbol word value revealed allow user quickly verify document coupon advanced applications marker creates barcode scanned verification reference data within document resulting higher degree assurance authenticity photocopied documents lack special characteristics substrate easily detectable false-positive testing generally one time test done results remain visible useful part coupon technique suitable id badges example fluorescent dyes react fluorescence ultraviolet light unusual lighting show words patterns pictures may visible invisible normal lighting feature also incorporated many banknotes documents e.g northern ireland nhs prescriptions show picture local '8th wonder giant causeway uv light producers include multi-frequency fluorescence different elements fluoresce specific frequencies light phosphorescence may accompany fluorescence shows after-glow uv light switched banknotes typically printed fine alignment so-called see-through registration window offset printing side note allows note examined feature provides opportunities unambiguously align features note printing difficult imitate accurately enough print shops advent rfid based smart card technology possible insert extremely small rf-active devices printed product enhance document security apparent modern biometric passports rfid chip mirrors printed information biometric passports additionally include data verification individual fingerprint face recognition automated border control gates security ink normal trigger temperature either disappear change colors ink rubbed usually fingertips pressure-sensitive hot stamped labels characterized normal gray colored appearance viewed via special filter polarizer additional normally latent image appears intaglio printing similar effect may achieved viewing banknote slanted angle | [
10976,
8839,
9745,
4882,
1588,
1845,
6324,
5433,
6141,
10685
] | None |
10,164 | 1 | The_National_Law_Review:national law review national law review american law journal legal news website legal analysis content-aggregating database site offers news coverage analysis recent court decisions regulatory changes legislative actions includes original content content submitted various professionals legal business communities online version national law review started research tool group corporate attorneys looking store classify useful legal analysis news located internet on-line version specializes news analysis following types american law administrative law banking law bankruptcy law civil procedure common law competition law conflicts laws construction law consumer protection contract law copyright law business criminal law cyberlaw election law energy law entertainment law environment law family law financial regulation law health law immigration law insurance law intellectual property law labour law labor law military law municipal law patent law product liability property law securities law statutory law tort law tax law trademark law trust law national law review print edition founded 1888 philadelphia legal publishers kay brother monthly scholarly law review included sections current legal news book review section digest important decisions summarized recent judicial decisions various states section devoted current legal thought organized legal topic historically articles law reviews often considered persuasive authority american courts though influence generally thought waning recent years on-line edition national law review developed chicago illinois corporate attorney jennifer schaller legal internet professionals order provide easily accessible reliable database articles written experts analyzing legal news trends on-line edition described straightforward practical informative traditional law review containing information potential interest legal business professionals often serves reference source legal periodicals addition serving source emerging american legal issues mainstream media national law review provides several services interest practicing lawyers law students running example law student writing competition published articles multiple areas law | [
9732
] | Test |
10,165 | 1 | National_Forensic_DNA_Database_of_South_Africa:national forensic dna database south africa national forensic dna database south africa nfdd national dna database used law enforcement south africa criminal law forensic procedures amendment act 37 2013 dna act provides expansion administration database south africa enabling south african police service saps match forensic dna profiles derived samples collected crime scenes forensic dna profiles offenders convicted suspects arrested offences listed new schedule 8 amended criminal procedure act 1977 dna profiling used south african law enforcement since 1998 albeit without legal framework prior commencement dna act dna criminal intelligence database dcid developed saps administered biology unit saps forensic science laboratory fsl repository dna profiles held fsl prior commencement dna act comprises two indices namely casework index containing forensic dna profiles derived biological samples collected crime scenes reference index containing forensic dna profiles known people including victims suspects volunteers personnel criminal procedure act 1977 currently prevents dna samples taken convicted offenders dna profiles dcid generated analysing ampflstr profiler plus str multiplex system 9 different str loci d3s1358 vwa fga d8s1179 d21s11 d18s51 d5s818 d13s317 d7s820 plus amelogenin sex determination approximately 80,000 dna profiles dcid 2007 number increasing approximately 180,000 late 2013 criminal law forensic procedures amendment act 37 2013 dna act provides expansion regulation administration national dna database known national forensic dna database south africa nfdd initial criminal law forensic procedures amendment bill drafted 2008 tabled parliament 2009 subsequently split two separate bills criminal law forensic procedures amendment bill b2–2009 dealing fingerprints body-prints assented 2010 came effect 18 january 2013 separate bill unofficially known dna bill re-introduced parliament may 2013 addresses various concerns arose regarding initial bill including relating human rights issues final version dna bill namely criminal law forensic procedures amendment bill b9d–2013 passed national assembly 12 november 2013 assented president jacob zuma 23 january 2014 commencement date dna act 31 january 2015 dna act provides inter alia nfdd comprises six indices containing forensic dna profiles namely crime scene index arrestee index convicted offender co index investigative index elimination index missing persons unidentified human remains index mandatory dna sampling applies persons convicted persons arrested offences listed new schedule 8 amended criminal procedure act 1977 offences listed schedule 8 may amended initial implementation phase takes account capacity constraints dna profiles nfdd generated analysing 15 different str loci plus amelogenin sex determination different retention frameworks apply six different indices crime scene index contains forensic dna profiles obtained crime scene samples biological evidence collected crime scenes held nfdd indefinitely arrestee index convicted offender index contains forensic dna profiles persons arrested convicted case may schedule 8 offence range rape murder burglary forensic dna profiles entered arrestee index either migrated convicted offender index upon conviction held indefinitely removed within three years arrest result conviction forensic dna profiles obtained volunteers informed consent held investigative index removed nfdd within 3 months case finalised repository dna profiles held state fsl expected transferred nfdd within 3 months dna database operational 2013 fsl investigating implementing combined dna index system database software developed fbi dna act subject five-year implementation plan takes account new training equipment requirements brazil families crime victims south africa successfully campaigned establishment national forensic dna database dna project non-profit organisation advocacy initiative founded attorney vanessa lynch following unsolved murder lynch father john lynch 2004 dna project advocates establishment expansion national forensic dna database hence earlier identification criminal suspects campaigned passing dna bill donated laboratory equipment fsl funded uk forensic science service diagnostic review south africa fsl initiated dna forensic awareness training programs developed post-graduate forensic analyst qualification | [
7016
] | Train |
10,166 | 4 | Bitdefender:bitdefender bitdefender romanian cybersecurity anti-virus software company founded 2001 florin talpeș currently ceo bitdefender develops sells anti-virus software internet security software endpoint security software cybersecurity products services 2018 software 500 million users worldwide bitdefender software originally developed softwin sold avx antivirus expert 1996 2001 name changed 2007 softwin spun bitdefender bitdefender develops markets anti-virus internet security endpoint security cyber security products services bitdefender internet things device protection solution called bitdefender box box router designed protect smart home products internet things devices blocking malicious internet traffic available windows mac bitdefender offers cloud-based security solution anti-malware anti-theft capabilities android ios users called bitdefender mobile security businesses company markets bitdefender gravityzone enterprise security includes self-configuring kits deployment desktop datacenter cloud software secures physical virtual cloud-based endpoints software uses network malware data stay updated software product small businesses looking simple security called bitdefender gravityzone business security bitdefender antispam neunet antispam filter trained bitdefender antispam lab series spam messages learns recognize new spam perceiving similarities messages already examined may 2006 bitdefender developed new technology b-have reduce dependency virus signatures proactive detection unknown threats technology based behavioral analysis virtualized environment bitdefender introduced active virus control august 2009 technology continuously monitors program specific processes running pc executes notes malware-like actions action scored given threshold reached process reported harmful 2014 version company claimed feature new technology called fuoton technology says visibly improves computer speed performance gradually adapting pc content filtering technologies developed filter raw online content applicable used antispam anti-phishing web filtering scanning spam social networks facilitate creation signatures proactively detect never-before-seen malicious files company claims bitdefender using cloud-based machine learning identify new malware malicious urls online threats processing analysing big data obtain behavioral patterns predict future advanced threats may 2009 customers criticized bitdefender support service lack responses bitdefender responded saying aware problems would take steps solve attributed problem unexpectedly high surge customers currently company website claims support available 24/7 telephone email livechat online knowledge base 20 march 2010 computers running bitdefender 64-bit versions windows affected malfunctioning update classified every executable program well dll files infected files marked 'trojan.fakealert.5 moved quarantine action led software systems malfunctions affected users around world bitdefender representatives announced removal faulty update workaround users affected except using 2008 version version 2012 bitdefender comodo firewall bitdefender co-exist currently official solution unofficial suggestions forums bitdefender bitdefender incompatible asus aisuite2 asus aisuite3 motherboard optimization suite software bundled asus motherboards enables automatic overclocking power tuning fan control bitdefender claims incompatibility due ndis asus driver winpkfilter lightweight filter prevents installation bitdefender files | [
2049,
7809,
131,
5891,
1417,
7948,
3981,
6797,
10637,
9488,
4374,
3739,
1052,
156,
9885,
6431,
2721,
5924,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
3885,
4013,
6699,
8615,
6834,
4403,
9523,
4023,
1979,
7103,
704,
9537,
7362,
10308,
... | Test |
10,167 | 4 | SMTP_Authentication:smtp authentication smtp authentication often abbreviated smtp auth extension simple mail transfer protocol smtp whereby client may log using authentication mechanism supported server mainly used submission servers authentication mandatory smtp specified jon postel 1970s provide using passwords sending email messages server design open mail relay initially problem late '90s spam worms become plague smtp auth relay client identified ip address practical email services provided internet service provider isp supplying connection else using specific hacks pop smtp john gardiner myers published first draft smtp auth 1995 successively developed discussed ietf along mail submission protocol extended smtp esmtp simple authentication security layer sasl older sasl mechanism esmtp authentication esmtpa cram-md5 uses md5 algorithm hmacs hash-based message authentication codes still considered sound internet mail consortium imc reported 55 mail servers open relays 1998 less 1 2002 using mail submission agent msa generally port 587 implies smtp auth msa usage supported software recommended especially support nomadic users several network hubs either block port 25 use smtp proxies msa responsible ensuring message envelope contains good addresses may enforce local policies codice_1 header field verifying envelope sender a.k.a codice_2 used spf address agree authenticated user-id particularly important domains sign messages using dkim keywords ending codice_3 codice_4 provided codice_5 clause codice_6 header fields messages received smtp auth keywords provided statistical diagnostic purposes rfc 3848 checked clients e.g spamassassin smtp extensions smtp auth advertised ehlo response along list supported authentication methods methods may change issuing starttls typically allowing plain text passwords latter case rfc 4954 provides following example c part protocol indicate lines sent client server respectively smtp auth used also port 25 usually servers reject rcpt commands imply relaying unless authentication credentials accepted specification recommends servers issue 530 5.7.0 authentication required response commands case server configured require authentication client n't done yet servers listening port 587 private servers configured way message exchange mx however historical trait smtp authenticated default results different behavior regard access protocols cases example using auth external starttls besides auth command extension also provides auth parameter mail command allow distinguish authentication authorization way sender identify transmit several messages session authentication n't need vary established different messages may sent according different agreements hence require different authorization example messages may relayed behalf different users use parameter much less popular using command grant relay privileges using authentication ehlo used greeting indicate extended smtp use opposed deprecated helo greeting still accepted extension used backward compatibility capitalized text auth command list types authorization smtp server accept examples authorization protocols include | [
2274,
1125,
10696,
4009,
8202,
8337,
4793,
9909,
4663,
2041,
6750
] | Test |
10,168 | 7 | Personal_cloud:personal cloud personal cloud collection digital content services accessible device personal cloud tangible entity place gives users ability store synchronize stream share content relative core moving one platform screen location another created connected services applications reflects sets consumers ’ expectations next-generation computing services work four primary types personal cloud use today online cloud nas device cloud server device cloud home-made clouds online cloud also sometimes referred public cloud online cloud cloud computing model online resources like software data storage made available internet service provider online cloud model cloud services provided virtualized system constructed using pooled shared physical resources accessed internet typically individual organization little control ecosystem online cloud hosted core infrastructure shared many individuals organizations data applications provided service provider logically segregated authorized allowed access network-attached storage nas device computer connected network provides file-based data storage services devices network although may technically possible run software nas device designed general purpose server cloud nas remote storage accessed internet local cloud nas often used backups archiving one benefits nas cloud data cloud accessed time anywhere main drawback however speed transfer rate fast network connection data accessed therefore fairly slow three examples nas personal clouds cloud western digital cloudbox lacie central seagate many ways cloud servers work way physical servers functions perform different typically cloud server on-premises device connected internet gives users functions available online cloud added benefit security files control premises server cloud historically enterprise-based deployed businesses needing in-house cloud however also in-house options available individual users open-source owncloud runs linux cloudlocker device stoamigo nimbus project technologically proficient user common solution using personal cloud create home-made cloud system connecting external usb hard drive wi-fi router enables wired wireless computers access usb hard drive use storage retrieving files user needs share network thereby acting like cloud challenge home-made cloud order set user certain degree skills technology network setup solution novices average consumers setup done tech expert biggest issue security leaving files accessible anyone technical knowledge every router supports type access modification three biggest routers allow type connection linksys netgear asus | [
4194,
2694,
4623,
1968,
5202,
10270,
8446,
5791
] | None |
10,169 | 6 | B1_Free_Archiver:b1 free archiver b1 free archiver proprietary freeware multi-platform file archiver file manager b1 archiver available microsoft windows linux macos android full support compression unpacking encryption zip native b1 format program decompresses 20 popular archive formats creates split encrypted archives b1 free archiver translated 30 languages translations made volunteers crowdin localization management platform program used graphical user interface command line interface b1 free archiver written c++/qt released proprietary license b1 free archiver supports opening popular archive formats b1 zip rar 7z gzip tar.gz tar.bz2 iso create .b1 .zip archives utility also create split archives consist several parts specified size password-protected archives encrypted 256 bit aes algorithm desktop application supports editing archive adding new files deleting files archive editing files directly archive b1 free archiver full drag-and-drop support keyboard shortcuts hotkeys navigation program works windows xp higher linux ubuntu/debian fedora macos 10.6 higher android also online b1 free archiver decompression tool | [
6797,
7983,
950,
823,
10623
] | Validation |
10,170 | 4 | Multilevel_security:multilevel security multilevel security multiple levels security mls application computer system process information incompatible classifications i.e. different security levels permit access users different security clearances needs-to-know prevent users obtaining access information lack authorization two contexts use multilevel security one refer system adequate protect subversion robust mechanisms separate information domains trustworthy another context refer application computer require computer strong enough protect subversion possess adequate mechanisms separate information domains system must trust distinction important systems need trusted necessarily trustworthy mls operating environment often requires highly trustworthy information processing system often built mls operating system os necessarily mls functionality supported system composed entirely untrusted computers although requires multiple independent computers linked hardware security-compliant channels see section b.6.2 trusted network interpretation ncsc-tg-005 example hardware enforced mls asymmetric isolation one computer used mls mode computer must use trusted operating system os information mls environment physically accessible os strong logical controls must exist ensure access information strictly controlled typically involves mandatory access control uses security labels like bell–lapadula model customers deploy trusted operating systems typically require product complete formal computer security evaluation evaluation stricter broader security range lowest highest classification levels system process trusted computer system evaluation criteria tcsec first evaluation criteria developed assess mls computer systems criteria clear uniform mapping security requirements breadth mls security range historically implementations certified capable mls processing security range unclassified top secret among honeywell scomp usaf sacdin nsa blacker boeing mls lan tcsec 1980s vintage intel 80386-based currently mls products evaluated common criteria late 2008 first operating system certified high evaluated assurance level evaluation assurance level eal eal 6+ high robustness auspices u.s. government program requiring multilevel security high threat environment assurance level many similarities old orange book a1 formal methods functional requirements focus fundamental isolation information flow policies rather higher level policies bell-la padula common criteria decoupled tcsec pairing assurance eal functionality protection profile clear uniform mapping security requirements mls security range capability documented csc-std-004-85 largely lost common criteria superseded rainbow series freely available operating systems features support mls include linux security-enhanced linux feature enabled freebsd security evaluation thought problem free mls implementations three reasons notwithstanding suppositions red hat enterprise linux 5 certified lspp rbacpp capp eal4+ june 2007 uses security-enhanced linux implement mls first common criteria certification enforce toe security properties security-enhanced linux vendor certification strategies misleading laypersons common strategy exploits layperson overemphasis eal level over-certification certifying eal 3 protection profile like capp elevated levels like eal 4 eal 5 another adding certifying mls support features role-based access control protection profile rbacpp labeled security protection profile lspp kernel evaluated mls-capable protection profile types features services run kernel depend kernel protect corruption subversion kernel evaluated mls-capable protection profile mls features trusted regardless impressive demonstration looks particularly noteworthy capp specifically mls-capable profile specifically excludes self-protection capabilities critical mls general dynamics offers pitbul l trusted mls operating system pitbull currently offered enhanced version red hat enterprise linux earlier versions existed sun microsystems solaris ibm aix svr4 unix pitbull provides bell lapadula security mechanism biba integrity mechanism privilege replacement superuser many features pitbull security base general dynamics trusted network environment tne product since 2009 tne enables multilevel information sharing access users department defense intelligence communities operating varying classification levels also foundation multilevel coalition sharing environment battlefield information collection exploitation systems extended bices-x sun microsystems oracle corporation offers solaris trusted extensions integrated feature commercial oss solaris opensolaris addition controlled access protection profile capp role-based access control rbac protection profiles trusted extensions also certified eal4 labeled security protection profile lspp security target includes desktop network functionality lspp mandates users authorized override labeling policies enforced kernel x window system x11 server evaluation include covert channel analysis certifications depend capp common criteria certifications suggest product trustworthy mls bae systems offers xts-400 commercial system supports mls vendor claims high assurance predecessor products including xts-300 evaluated tcsec b3 level mls-capable xts-400 evaluated common criteria eal5+ capp lspp protection profiles capp lspp eal3 protection profiles inherently mls-capable security target common criteria evaluation product contains enriched set security functions provide mls capability sanitization problem area mls systems systems implement mls restrictions like defined bell–lapadula model allow sharing obviously violate security restrictions users lower clearances easily share work users holding higher clearances vice versa efficient reliable mechanism top secret user edit top secret file remove top secret information deliver users secret lower clearances practice mls systems circumvent problem via privileged functions allow trustworthy user bypass mls mechanism change file security classification however technique reliable covert channels pose another problem mls systems mls system keep secrets perfectly must possible way top secret process transmit signals kind secret lower process includes side effects changes available memory disk space changes process timing process exploits side effect transmit data exploiting covert channel extremely difficult close covert channels practical computing system may impossible practice process identifying covert channels challenging one commercially available mls systems attempt close covert channels even though makes impractical use high security applications bypass problematic introduced means treat system high object mls trusted common example extract data secret system high object sent unclassified destination citing property data trusted evidence 'really unclassified e.g 'strict format system high system trusted preserve trusted evidence result overt data path opened logical way securely mediate bypass risky unlike narrow bandwidth covert channels difficult exploit bypass present large easily exploitable overt leak system bypass often arises failure use trusted operating environments maintain continuous separation security domains way back origin origin lies outside system boundary may possible validate trusted separation origin case risk bypass unavoidable flow truly essential common example unavoidable bypass subject system required accept secret ip packets untrusted source encrypt secret userdata header deposit result untrusted network source lies outside sphere influence subject system although source untrusted e.g system high trusted mls provides packets unclassified headers secret plaintext userdata mls data construct since source untrusted could corrupt place secrets unclassified packet header corrupted packet headers could nonsense impossible subject system determine reasonable reliability packet userdata cryptographically well protected packet header contain readable secrets corrupted packets passed untrusted network subject system may routable cooperating corrupt process network could grab packets acknowledge subject system may detect leak large overt leak hard detect viewing classified packets unclassified headers system high structures instead mls structures really presents common serious threat bypass avoidable avoidable bypass often results system architects design system correctly considering security attempt apply security fact add-on functions situation bypass appears easy way make system work pseudo-secure schemes proposed approved examine contents bypassed data vain attempt establish bypassed data contains secrets possible without trusting something data format contrary assumption source trusted preserve characteristics source data assured secure bypass myth so-called high assurance guard hag transparently implements bypass risk introduce long acknowledged extant solutions ultimately procedural rather technical way know certainty much classified information taken systems exploitation bypass decline compusec experts laypersons compusec-astute designing secure computing systems mistakenly drawing conclusion term mls overloaded two uses mls processing environment vs mls capability false conclusion based belief products certified operate mls environment mode therefore mls capability exist one imply many systems operate environment containing data unequal security levels therefore mls computer security intermediate value theorem cs-ivt consequence confusion runs deeper noted however nsa-certified mls operating systems databases networks existed operational mode since 1970s mls products continuing built marketed deployed laypersons often conclude admit system operates mls environment environment-centric meaning mls backed perceived corner problem mls solution capability-centric meaning mls mls deceptively complex simple solutions obvious justify conclusion exist lead crippling ignorance compusec manifests whispers one talk mls thing mls mls-denial schemes change rapidly addressed instead important clarify distinction mls-environment mls-capable original use term mls applied security environment mode one solution confusion retain original definition mls specific mls-capable context used multiple independent levels security mils architecture addresses domain separation component mls note ucdmo us government lead cross domain multilevel systems created term cross domain access category baseline dod intelligence community accredited systems category seen essentially analogous mils security models biba model integrity bell–lapadula model confidentiality allow one-way flow certain security domains otherwise assumed isolated mils addresses isolation underlying mls without addressing controlled interaction domains addressed models trusted security-compliant channels mentioned link mils domains support mls functionality mils approach pursues strategy characterized older term msl multiple single level isolates level information within single-level environment system high rigid process communication isolation offered mils may useful ultra high reliability software applications mls mils notably address hierarchical structure embodied notion security levels requires addition specific import/export applications domains needs accredited appropriately mils might better called multiple independent domains security mls emulation mils would require similar set accredited applications mls applications declining address box interaction among levels consistent hierarchical relations bell-la padula mils almost deceptively simple implement initially needs non-trivial supplementary import/export applications achieve richness flexibility expected practical mls applications mils/mls comparison consider accreditation set simpler export applications achievable accreditation one complex mls kernel question depends part extent import/export interactions stakeholders require favour mils possibility export applications require maximal assurance another way solving problems known multiple single-level security level isolated separate untrusted domain absence medium communication domains assures interaction possible mechanism isolation usually physical separation separate computers often used support applications operating systems possibility supporting mls microsoft windows infrastructure trusted operating systems important component mls systems order fulfill criteria required definition mls cnssi 4009 paraphrased start article system must provide user interface capable allowing user access process content multiple classification levels one system ucdmo ran track specifically focused mls nsa information assurance symposium 2009 highlighted several accredited production emergent mls systems note use mls selinux several databases classified mls systems oracle product named oracle label security ols implements mandatory access controls typically adding 'label column table oracle database ols deployed us army inscom foundation all-source intelligence database spanning jwics siprnet networks project create labeled version postgresql also older labeled-database implementations trusted rubix mls database systems provide unified back-end system content spanning multiple labels resolve challenge users process content multiple security levels one system enforcing mandatory access controls also several mls end-user applications mls capability currently ucdmo baseline called mlchat chat server runs xts-400 operating system created us naval research laboratory given content users different domains passes mlchat server dirty-word scanning employed protect classified content debate truly mls system form cross-domain transfer data guard mandatory access controls maintained combination xts-400 application-specific mechanisms joint cross domain exchange jcdx another example mls capability currently ucdmo baseline jcdx department defense dod defense intelligence agency dia accredited multilevel security mls command control communication computers intelligence c4i system provides near real-time intelligence warning support theater forward deployed tactical commanders jcdx architecture comprehensively integrated high assurance protection level four pl4 secure operating system utilizing data labeling disseminate near real-time data information force activities potential terrorist threats around world oceans installed locations united states allied partner countries capable providing data top secret/sci secret-releasable levels single platform mls applications currently part ucdmo baseline include several applications bluespace bluespace several mls applications including mls email client mls search application mls c2 system bluespace leverages middleware strategy enable applications platform neutral orchestrating one user interface across multiple windows os instances virtualized remote terminal sessions us naval research laboratory also implemented multilevel web application framework called mlweb integrates ruby rails framework multlevel database based sqlite3 perhaps greatest change going multilevel security arena today convergence mls virtualization increasing number trusted operating systems moving away labeling files processes instead moving towards unix containers virtual machines examples include zones solaris 10 tx padded cell hypervisor systems green hill integrity platform xenclient xt citrix high assurance platform nsa implemented general dynamics trusted virtualization environment tve another example uses selinux core support mls applications span multiple domains | [
2179,
6797,
3480,
3360,
3616,
9635,
5546,
9646,
7983,
11184,
1585,
4914,
11695,
5433,
700,
6337,
9665,
5060,
1350,
8904,
1225,
2761,
4299,
11470,
4303,
210,
10962,
3924,
10580,
10968,
6369,
4067,
11363,
7528,
11496,
3440,
6902,
5240,
125,
... | Validation |
10,171 | 5 | Resource_Reservation_Protocol:resource reservation protocol resource reservation protocol rsvp transport layer protocol designed reserve resources across network quality service qos using integrated services model rsvp operates ipv4 ipv6 provides receiver-initiated setup resource reservations multicast unicast data flows transport application data similar control protocol like internet control message protocol icmp internet group management protocol igmp rsvp described rsvp used hosts routers request deliver specific levels qos application data streams flows rsvp defines applications place reservations relinquish reserved resources longer required rsvp operation generally result resources reserved node along path rsvp routing protocol designed interoperate current future routing protocols rsvp rarely deployed telecommunications networks today traffic engineering extension rsvp rsvp-te becoming widely accepted nowadays many qos-oriented networks next steps signaling nsis proposed replacement rsvp basic concepts rsvp originally proposed rsvp93 zhang l. deering s. estrin d. shenker s. d. zappala rsvp new resource reservation protocol ieee network september 1993 rsvp described series rfc documents ietf two key concepts rsvp reservation model flowspec filterspec rsvp reserves resources flow flow identified destination address protocol identifier optionally destination port multiprotocol label switching mpls flow defined label switched path lsp flow rsvp also identifies particular quality service required flow although understand specific information flow qos qos specific information called flowspec rsvp passes flowspec application hosts routers along path systems analyse flowspec accept reserve resources flowspec consists filterspec defines set packets shall affected flowspec i.e data packets receive qos defined flowspec filterspec typically selects subset packets processed node selection depend attribute packet e.g sender ip address port currently defined rsvp reservation styles rsvp reservation request consists flowspec filterspec pair called flowdescriptor effects node spec flowspec sets parameters packet scheduler node filterspec sets parameters packet classifier two primary types messages data objects rsvp messages transmitted order complete list rsvp messages date objects see rfc 2205 rsvp host needs send data flow specific qos transmit rsvp path message every 30 seconds travel along unicast multicast routes pre-established working routing protocol path message arrives router understand rsvp router forwards message without interpreting contents message reserve resources flow want listen send corresponding resv short reserve message traces path backwards sender resv message contains flow specs router receives rsvp resv message resv message also filterspec object defines packets receive requested qos defined flowspec simple filter spec could sender ’ ip address optionally udp tcp port | [
10242,
1030,
8211,
6681,
6682,
10271,
6689,
9251,
2085,
7208,
7214,
8238,
562,
1586,
9269,
11321,
3133,
5181,
6723,
8265,
4687,
10341,
10344,
3695,
4723,
2679,
4729,
5251,
649,
9868,
3218,
9365,
11413,
152,
3742,
9380,
9381,
3751,
3752,
1... | Test |
10,172 | 2 | Up2date:up2date up2date also known red hat update agent tool used older versions red hat enterprise linux centos fedora core downloads installs new software upgrades operating system functions front-end rpm package manager adds advanced features automatic dependency resolution file /etc/sysconfig/rhn/sources specifies up2date search packages default red hat enterprise linux up2date retrieves packages red hat network rhn server though users add directories full packages even debian yum repositories wish up2date fedora core defaults retrieving packages yum repositories sources added apart rhn red hat enterprise linux specific fedora core 5 red hat enterprise linux 5 up2date longer shipped distribution yum used instead centos up2date downloads packages yum repositories centos mirror network | [
11525,
2310,
10760,
9353,
2955,
7435,
7181,
7947,
9487,
2448,
1553,
788,
1813,
8213,
10900,
6680,
8476,
2974,
6393,
5670,
4775,
7847,
6828,
6446,
7983,
1842,
823,
2872,
6583,
3131,
5819,
190,
3649,
10817,
9671,
5067,
3918,
463,
10961,
366... | Validation |
10,173 | 4 | Reverse_engineering:reverse engineering reverse engineering also called back engineering process man-made object deconstructed reveal designs architecture extract knowledge object similar scientific research difference scientific research natural phenomenon reverse engineering applicable fields mechanical engineering electronic engineering software engineering chemical engineering systems biology many reasons performing reverse engineering various fields reverse engineering origins analysis hardware commercial military advantage however reverse engineering process concerned creating copy changing artifact way analysis order deduce design features products little additional knowledge procedures involved original production cases goal reverse engineering process simply redocumentation legacy systems even product reverse engineered competitor goal may copy perform competitor analysis reverse engineering may also used create interoperable products despite narrowly tailored united states european union legislation legality using specific reverse engineering techniques purpose hotly contested courts worldwide two decades software reverse engineering help improve understanding underlying source code maintenance improvement software relevant information extracted order make decision software development graphical representations code provide alternate views regarding source code help detect fix software bug vulnerability frequently software develops design information improvements often lost time lost information usually recovered reverse engineering process also help cut time required understand source code reducing overall cost software development reverse engineering also help detect eliminate malicious code written software better code detectors reversing source code used find alternate uses source code detect unauthorized replication source code n't intended used reveal competitors product built process commonly used cracking software media remove copy protection create possibly improved copy even knockoff usually goal competitor hacker malware developers often use reverse engineering techniques find vulnerabilities operating system os order build computer virus exploit system vulnerabilities reverse engineering also used cryptanalysis order find vulnerabilities substitution cipher symmetric-key algorithm public-key cryptography addition purposes uses reverse engineering computer-aided design cad become popular reverse engineering become viable method create 3d virtual model existing physical part use 3d cad cam cae software reverse-engineering process involves measuring object reconstructing 3d model physical object measured using 3d scanning technologies like cmms laser scanners structured light digitizers industrial ct scanning computed tomography measured data alone usually represented point cloud lacks topological information design intent former may recovered converting point cloud triangular-faced mesh reverse engineering aims go beyond producing mesh recover design intent terms simple analytical surfaces appropriate planes cylinders etc well possibly nurbs surfaces produce boundary-representation cad model recovery model allows design modified meet new requirements manufacturing plan generated etc hybrid modelling commonly used term nurbs parametric modelling implemented together using combination geometric freeform surfaces provide powerful method 3d modelling areas freeform data combined exact geometric surfaces create hybrid model typical example would reverse engineering cylinder head includes freeform cast features water jackets high tolerance machined areas reverse engineering also used businesses bring existing physical geometry digital product development environments make digital 3d record products assess competitors products used analyse instance product works components consists estimate costs identify potential patent infringement etc value engineering related activity also used businesses involves de-constructing analysing products objective find opportunities cost cutting 1990 institute electrical electronics engineers ieee defined reverse engineering process analyzing subject system identify system components interrelationships create representations system another form higher level abstraction subject system end product software development reverse engineering process examination software system consideration modified would make re-engineering restructuring reverse engineering performed stage product cycle necessarily functional end product two components reverse engineering redocumentation design recovery redocumentation creation new representation computer code easier understand meanwhile design recovery use deduction reasoning general knowledge personal experience product order fully understand product functionality also seen going backwards development cycle model output implementation phase source code form reverse-engineered back analysis phase inversion traditional waterfall model another term technique program comprehension working conference reverse engineering wcre held yearly explore expand techniques reverse engineering computer-aided software engineering case automated code generation contributed greatly field reverse engineering software anti-tamper technology like obfuscation used deter reverse engineering re-engineering proprietary software software-powered systems practice two main types reverse engineering emerge first case source code already available software higher-level aspects program perhaps poorly documented documented longer valid discovered second case source code available software efforts towards discovering one possible source code software regarded reverse engineering second usage term one people familiar reverse engineering software make use clean room design technique avoid copyright infringement related note black box testing software engineering lot common reverse engineering tester usually api goals find bugs undocumented features bashing product outside purposes reverse engineering include security auditing removal copy protection cracking circumvention access restrictions often present consumer electronics customization embedded systems engine management systems in-house repairs retrofits enabling additional features low-cost crippled hardware graphics card chip-sets even mere satisfaction curiosity binary reverse engineering performed source code software unavailable process sometimes termed reverse code engineering rce example decompilation binaries java platform accomplished using jad one famous case reverse engineering first non-ibm implementation pc bios launched historic ibm pc compatible industry overwhelmingly dominant computer hardware platform many years reverse engineering software protected u.s. fair use exception copyright law samba software allows systems running microsoft windows systems share files systems classic example software reverse engineering since samba project reverse-engineer unpublished information windows file sharing worked non-windows computers could emulate wine project thing windows api openoffice.org one party microsoft office file formats reactos project even ambitious goals strives provide binary abi api compatibility current windows oses nt branch allowing software drivers written windows run clean-room reverse-engineered free software gpl counterpart windowsscope allows reverse-engineering full contents windows system live memory including binary-level graphical reverse engineering running processes another classic well-known example 1987 bell laboratories reverse-engineered mac os system 4.1 originally running apple macintosh se could run risc machines reverse engineering software accomplished various methods three main groups software reverse engineering software classification process identifying similarities different software binaries example two different versions binary used detect code relations software samples task traditionally done manually several reasons patch analysis vulnerability detection copyright infringement nowadays done somewhat automatically large numbers samples method used mostly long thorough reverse engineering tasks complete analysis complex algorithm big piece software general statistical classification considered hard problem also true software classification therefore n't many solutions/tools handle task well number uml tools refer process importing analysing source code generate uml diagrams reverse engineering see list uml tools although uml one approach providing reverse engineering recent advances international standards activities resulted development knowledge discovery metamodel kdm standard delivers ontology intermediate abstracted representation programming language constructs interrelationships object management group standard way becoming iso standard well kdm started take hold industry development tools analysis environments deliver extraction analysis source binary byte code source code analysis kdm granular standards architecture enables extraction software system flows data control call maps architectures business layer knowledge rules terms process standard enables use common data format xmi enabling correlation various layers system knowledge either detailed analysis e.g root cause impact derived analysis e.g business process extraction although efforts represent language constructs never-ending given number languages continuous evolution software languages development new languages standard allow use extensions support broad language set well evolution kdm compatible uml bpmn rdf standards enabling migration environments thus leverage system knowledge efforts software system transformation enterprise business layer analysis protocols sets rules describe message formats messages exchanged i.e. protocol state-machine accordingly problem protocol reverse-engineering partitioned two subproblems message format state-machine reverse-engineering message formats traditionally reverse-engineered tedious manual process involved analysis protocol implementations process messages recent research proposed number automatic solutions typically automatic approaches either group observed messages clusters using various clustering analyses emulate protocol implementation tracing message processing less work reverse-engineering state-machines protocols general protocol state-machines learned either process offline learning passively observes communication attempts build general state-machine accepting observed sequences messages online learning allows interactive generation probing sequences messages listening responses probing sequences general offline learning small state-machines known np-complete online learning done polynomial time automatic offline approach demonstrated comparetti et al online approach cho et al components typical protocols like encryption hash functions reverse-engineered automatically well typically automatic approaches trace execution protocol implementations try detect buffers memory holding unencrypted packets reverse engineering invasive destructive form analyzing smart card attacker grinds away layer layer smart card takes pictures electron microscope technique possible reveal complete hardware software part smart card major problem attacker bring everything right order find everything works makers card try hide keys operations mixing memory positions example bus scrambling cases even possible attach probe measure voltages smart card still operational makers card employ sensors detect prevent attack attack common requires large investment effort special equipment generally available large chip manufacturers furthermore payoff attack low since security techniques often employed shadow accounts uncertain time whether attacks chip/pin cards replicate encryption data consequentially crack pins would provide cost effective attack multifactor authentication reverse engineering often used people order copy nations technologies devices information obtained regular troops fields intelligence operations often used second world war cold war well-known examples wwii later include reverse engineering applies primarily gaining understanding process artifact manner construction use internal processes made clear creator patented items reverse-engineered studied since essence patent inventor provides detailed public disclosure return receives legal protection invention involved however item produced one patents could also include technology patented disclosed indeed one common motivation reverse engineering determine whether competitor product contains patent infringements copyright infringements united states even artifact process protected trade secrets reverse-engineering artifact process often lawful long legitimately obtained reverse engineering computer software us often falls contract law breach contract well relevant laws end user license agreements specifically prohibit u.s. courts ruled terms present override copyright law expressly permits see bowers v. baystate technologies sec 103 f dmca 17 u.s.c § 1201 f says person legal possession program permitted reverse-engineer circumvent protection necessary order achieve interoperability — term broadly covering devices programs able interact make use use transfer data useful ways limited exemption exists allows knowledge thus gained shared used interoperability purposes eu directive 2009/24 legal protection computer programs superseded earlier 1991 directive governs reverse engineering european union | [
519,
9741,
7715,
552,
3629,
1588,
5173,
55,
11322,
7739,
7742,
10303,
1632,
612,
107,
8301,
2675,
4211,
2678,
5754,
8830,
4229,
4743,
6797,
1683,
8868,
1722,
9420,
10971,
9440,
3812,
8438,
11006,
7941,
8455,
778,
7983,
9519,
1849,
2361,
... | Validation |
10,174 | 8 | NetPresenz:netpresenz netpresenz written peter n. lewis stairways software pty ltd world wide web ftp server developed use classic mac os update older product called simply ftpd time significant ftp daemon available macintosh platform added web gopher functionality originally shareware package netpresenz rendered obsolete increasing functionality mac os made freeware work macos | [
6657,
7943,
9757,
10910,
3110,
10791,
9908,
10808,
5054,
576,
7364,
10057,
10060,
4310,
119,
10722,
494,
1520,
9843,
6133,
3191,
3961,
5114,
8443,
637
] | Test |
10,175 | 5 | Simple_Loop_Prevention_Protocol:simple loop prevention protocol simple loop prevention protocol slpp computer networking data link layer protocol developed nortel previously acquired avaya part extreme networks protect layer 2 network loops slpp uses small hello packet detect network loops slpp protocol checks packets originating switch peer switch smlt configuration sending hello packets per vlan basis allows slpp detect vlan based network loops un-tagged well tagged ieee 802.1q vlan link configurations loop detected associated port shut =external links= | [
9603,
1284,
9937,
5490,
1303,
3580,
10175
] | Test |
10,176 | 4 | Dynamic_linker:dynamic linker computing dynamic linker part operating system loads links shared libraries needed executable executed run time copying content libraries persistent storage ram filling jump tables relocating pointers specific operating system executable format determine dynamic linker functions implemented linking often referred process performed executable compiled dynamic linker special part operating system loads external shared libraries running process binds shared libraries dynamically running process approach also called dynamic linking late linking dynamic-link library dll microsoft implementation shared library concept microsoft windows os/2 operating systems libraries usually file extension codice_1 codice_2 libraries containing activex controls codice_3 legacy system drivers file formats dlls windows exe files portable executable pe 32-bit 64-bit windows new executable ne 16-bit windows exes dlls contain code data resources combination data files file format dll different file extensions possibly containing resource sections called resource dlls examples dlls include icon libraries sometimes extension codice_4 font files extensions codice_5 codice_6 unix-like systems machine code makes dynamic linker actually external executable operating system kernel loads executes first process address space newly constructed result calling codice_7 codice_8 functions link time path dynamic linker used embedded executable image executable file loaded operating system kernel reads path dynamic linker attempts load execute executable binary attempt fails example file path attempt execute original executable fails dynamic linker loads initial executable image dynamically-linked libraries depends starts executable result pathname dynamic linker part operating system application binary interface unix-like systems use elf executable images dynamic libraries solaris 64-bit versions hp-ux linux freebsd netbsd openbsd dragonfly bsd path dynamic linker used embedded link time codice_9 section executable codice_10 segment systems dynamically loaded shared libraries identified filename suffix codice_11 shared object dynamic linker influenced modifying behavior either program execution program linking examples seen run-time linker manual pages various unix-like systems typical modification behavior use codice_12 codice_13 environment variables adjust runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively example zlibc also known codice_14 facilitates transparent decompression used codice_13 hack result possible read pre-compressed gzipped file data bsd linux systems files compressed essentially allowing user add transparent compression underlying filesystem although caveats mechanism flexible allowing trivial adaptation code perform additional alternate processing data file read prior provision said data user process requested apple darwin operating system macos ios operating systems built top path dynamic linker used embedded link time one mach-o load commands executable image systems dynamically loaded shared libraries identified either filename suffix codice_16 placement inside bundle framework dynamic linker links target executable shared libraries also places machine code functions specific address points memory target executable knows link time executable wishes interact dynamic linker simply executes machine-specific call jump instruction one well-known address points executables macos ios platforms often interact dynamic linker execution process even known executable might interact dynamic linker causing load libraries resolve symbols hours initially launches reason macos ios program interacts dynamic linker often due apple cocoa cocoa touch apis objective-c language implemented see main articles information dynamic linker coerced modifying behavior however unlike unix-like operating systems modifications hints sometimes ignored dynamic linker examples seen codice_17 manual page typical modification behavior use codice_18 codice_19 environment variables former previously-mentioned variables adjusts executables search path shared libraries latter displays names libraries loaded linked apple macos dynamic linker open-source project released part darwin found apple open-source codice_17 project unix-like operating systems using xcoff aix dynamically-loaded shared libraries use filename suffix codice_21 dynamic linker influenced modifying behavior either program execution program linking typical modification behavior use codice_22 environment variable variable adjusts runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively dynamic linking assembler language programs ibm os/360 successors done typically using link macro instruction containing supervisor call instruction activates operating system routines makes library module linked available program library modules may reside steplib joblib specified control cards available specific execution program library included linklist parmlib specified system startup time link pack area specific reentrant modules loaded system startup time multics operating system files including executables segments call routine part current segment cause system find referenced segment memory disk add address space running process dynamic linking normal method operation static linking using binder exception | [
2432,
1922,
3334,
4998,
6664,
8966,
6797,
10765,
5397,
1304,
10013,
7071,
5921,
4902,
7847,
5546,
10026,
7983,
5040,
823,
1724,
9791,
9921,
4423,
4424,
5065,
1106,
3410,
2138,
11361,
8675,
868,
8037,
10470,
4712,
1775,
7792,
2673,
8303,
1... | Train |
10,177 | 9 | XLNT:xlnt xlnt scripting language windows platforms based dcl language vax-vms machines proprietary implementation maintained originator advanced systems concepts inc. since 1997 implementation contains xlnt executable windows scripting host engine integrated development environment also used cgi mode one handful windows-vms emulation interoperability tools others pc-dcl accelr8 dcl lite console mode interpreters run automated scripting mode older programme type vcl used vms functionality ms-dos pc dos os/2 unix variants vcl run later windows versions provide 16-bit dos programmes run e.g windows nt via win16/dos environmental subsystem program compatibility option windows xp et seq | [
8262,
6797,
9166,
7983,
8976,
10387,
5492,
2485,
9780
] | Test |
10,178 | 3 | Moon_Patrol:moon patrol player takes role luna city police officer assigned sector nine home toughest thugs galaxy player controls moon buggy travels moon surface viewing side moves towards right side screen driving obstacles craters mines must avoided various enemies ufos tanks ground must shot gameplay within number courses divided 26 checkpoints named letters english alphabet five major checkpoints— e j z —denote new stage new background theme example third stage starting j introduces mines top portion screen shows timeline-style map course five major checkpoints clearly marked map indicator current checkpoint time spent stage three indicator lights top light indicates upcoming enemy aerial attacks middle one indicates upcoming minefield bottom one indicates enemies approaching behind end stage time spent compared average bonus points awarded accordingly 1,000 plus 100 per second bettered completing entire course gives additional 5,000 points plus 100 per second bettered two unique courses beginner course champion course champion course loops forever loop numbered convenience 3 extra lives given 10,000 points per 20,000 scored 50,000 thereafter lives given game ends last patrol car destroyed game continued points scored one game carry 999,990 points maximum high score achieved players exceed score game retains last six digits moon patrol ported apple ii atari 8-bit family atari 2600 atari 5200 atari st commodore 64 vic-20 msx ibm pc ti-99/4a tandy color computer many published atari atarisoft label moon patrol received certificate merit category 1984 best science fiction/ fantasy video game 5th annual arkie awards arcade express reviewed arcade version january 1983 scored 8 10 scott mace infoworld stated moon patrol commodore 64 favorite atarisoft game making good use computer sound moon patrol included retro compilations arcade hits moon patrol spy hunter game boy color midway presents arcade greatest hits midway collection 2 dreamcast playstation windows 2006 bandai released enhanced version moon patrol ex cell phones march 22 2018 moon patrol released nintendo switch hamster part arcade archives series bootleg version called moon ranger released arcades year moon patrol home clones include desert patrol trs-80 color computer 1983 gas hog atari 2600 1983 lunar rover patrol dragon 32 1983 moon buggy commodore 64 1983 moon alert zx spectrum 1984 luna rover zx spectrum 1985 moon control amstrad cpc 1985 moonrider msx 1986 overlander amiga 1993 battle time 1984 commodore 64 re-themed gameplay major wars twentieth century open-source clones named moon-buggy ascii patrol run unix-like terminals | [
11557,
6405,
9006,
1776,
10931
] | None |
10,179 | 9 | Andy_Wellings:andy wellings andy j. wellings professor computer science department university york northern england works closely alan burns real-time systems distributed concurrent real-time programming languages andy wellings member team responsible creation real-time specification java also ada programming language expert wellings written number books programming especially ada | [
428,
8262
] | Test |
10,180 | 3 | POWER10:power10 power10 family multi-core processors based power isa primarily designed ibm substantial contributions openpower foundation partners designed tackle future demands analytics big data domains power10 processors manufactured using 7 nm process feature enhancements compared predecessor power9 regarding core count microarchitecture design memory controllers i/o support opencapi 4.0 nvlink3 systems using power10 expected available 2020 | [
6914,
4868,
10501,
3846,
4743,
6663,
5642,
1548,
1933,
398,
3472,
4881,
7065,
1563,
1309,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
10675,
8120,
6715,
9020,
1725,
1983,
1985,
336,
8530,
3540,
342,
9302,
11613,
6878,
1635,
869... | Test |
10,181 | 9 | Actor-Lab:actor-lab actor-lab program visualizes lego mindstorms internal logic visual flowcharts ideas underlying actor-lab derived event-driven message-passing computer languages began actor based languages devised hewit actor-lab requires constant communication programmable brick e.g rcx via infra-red link means user mount programmable brick vertically models move hold tower form gantry crane actor-lab shows user real-time happening programmable brick including simulation motors sensors lights sounds one also add controls bottom screen give oneself real-time control program/model similar program lego called robolab one actually download programs lego programmable brick notice one control edited control power stop | [] | Test |
10,182 | 8 | Rambler_(portal):rambler portal rambler russian search engine one biggest russian web portals owned rambler media group prof-media since 2006 launched 1996 stack ltd including sergey lysakov dmitry kryukov vladimir samoylov others rambler online since 1996 2005 rambler media group went public bought prof-media 2006 july 18 2008 announced google acquire begun part rambler media one biggest russian contextual advertising services 140 million deal blocked russian federal antimonopoly service main competitors rambler russian market yandex mail.ru july 2013 rambler ranked 11th popularity among russian sites september 2016 reported site breached february 2012 leakedsource received dump user database time included usernames passwords icq instant messaging accounts 98 million users revealed rambler.ru database stored user passwords plaintext — meaning whoever breached database instantly access e-mail accounts users services offered rambler include web search e-mail news aggregation e-commerce services russian-speaking community globally complemented number rambler media group owned web properties including | [
11347,
3237
] | Validation |
10,183 | 3 | End_of_interrupt:end interrupt end interrupt eoi signal sent programmable interrupt controller pic indicate completion interrupt processing given interrupt eoi used cause pic clear corresponding bit service register isr thus allow interrupt requests equal lower priority generated pic eois may indicate interrupt vector implicitly explicitly explicit eoi vector indicated eoi whereas implicit eoi vector typically use vector indicated pics priority schema example highest vector isr also eois may sent end interrupt processing interrupt handler operation pic may set auto-eoi start interrupt handler | [
3272,
5457,
1058,
5823
] | None |
10,184 | 4 | Nolisting:nolisting nolisting name given technique defend electronic mail domain names e-mail spam domain name internet series one mx records specifying mail servers responsible accepting email messages behalf domain preference nolisting simply adding mx record pointing non-existent server primary i.e lowest preference value means initial mail contact always fail many spam sources n't retry failure spammer move next victim legitimate email servers retry next higher numbered mx normal email delivered small delay simple example mx records demonstrate technique defeats spam programs connect highest priority lowest numbered mx follow standard error-handling retrying next priority mx alternate techniques suggest sandwiching valid mx records non-responsive ones variants also suggest configuring highest-numbered hosts always return 4xx errors i.e retry later simple example mx records demonstrate technique greylisting also relies fact spammers often use custom software persevere deliver message correct rfc-compliant way | [
6762,
9909,
10906
] | None |
10,185 | 7 | Amazon_Drive:amazon drive amazon drive formerly known amazon cloud drive cloud storage application managed amazon service offers secure cloud storage file backup file sharing photo printing using amazon account files folders transferred managed multiple devices including web browsers desktop applications mobiles tablets amazon drive also lets u.s. users order photo prints photo books using amazon prints service today amazon drive offers free unlimited photo storage amazon prime subscription kindle fire device paid limited storage service launched major countries including u.s canada european nations japan australia also functions china brazil free limited 5gb storage service amazon first announced storage service march 29 2011 initially offering pay-as-you-need tiered storage plans users users paid storage tier utilized expandable maximum 1 terabyte plan march 2015 unlimited storage plans intended non-business customer sections introduced plan offered free 3-month free trial customers wish try service entering annual subscription 2015 black friday plan became popular amazon offered 92 discounted unlimited storage plan 5 60 year purchase fine print stated unlimited storage private use restricted file type must substantially exceed differ normal use users amazon anytime may impose restrictions use service june 2017 amazon reverted unlimited storage plans us 15 november 2017 amazon removed unlimited storage plans canadian customers well july 2019 amazon offers two plans marketplaces prime photos since november 2014 free limited file storage china brazil prime photos plan offers unlimited storage photos raw files 5 gigabytes storage videos files photos uploaded amazon drive ios android apps kindle device cloud drive website additionally users kindle fire tablets also get plan benefits along purchase device photos videos automatically backup device amazon drive cloud storage according amazon prime photos available personal non-commercial use ca n't used conjunction photography business full resolution photo formats raw files uploaded raw formats wo n't viewable within service web interface apps china brazil amazon drive service limited 5gb storage storage counts space taken photos videos files types customers countries amazon drive n't offer expansion plan neither tier-based unlimited store media files exceeding limited 5gb service supported almost types devices ranging pcs mobiles web application supported common web browsers including internet explorer firefox safari google chrome one create folders organize files rename files move around forth application handle photos better files web app photos videos viewed played whereas files viewable default images sorted date taken photos include basic metadata filename capture date added date filesize pixel dimension amazon drive released desktop application supported mac windows designed drop panel allowing users drag drop files initiate uploading users install application pc mac use application supports one-touch button downloading files cloud restored notably files 2gb uploaded amazon drive desktop clients bulk upload files folders paused cancelled progress amazon drive offers free smartphone application ios android mobile devices mobile application everything web addition automatically backs upload media files mobile device cloud amazon proprietary devices kindle fire fire phone ship free unlimited photo storage similarly backs photos files tablet amazon drive files folders selected downloaded device generate randomized shareable link link directed e-mailed shared social media anyone link access shared files point time future application allow owner break shared link make files private september 2016 amazon drive launched amazon prints u.s. users edit photos order prints photo books application ordered amazon ship print orders customer address similar retail orders service available major amazon marketplaces applications supported multiple languages usage different countries popular languages supported regional variations english spanish french italian simplified chinese japanese amazon drive also built amazon fire tv amazon video application media players smart tvs devices users browse personal photos videos large tv screens view slideshow prime photo users upload unlimited number picture file formats rest formats including video formats counted additional 5gb storage plan additional files exceeding 5gb need stored one opt unlimited storage plan one paid plans depending country unlimited plans files 2gb restricted uploading application desktop application however exempted uploading files greater 2gb size amazon drive streaming available videos longer 20 minutes larger 2 gb stored amazon drive download watch offline unlike popular file hosting services amazon drive offer file-syncing automatic backup web users latest desktop version documents images also shared documents collaborated others downloaded editing however mobile applications support automatic backup capabilities service limits usage personal non-commercial use one may use store transfer distribute content behalf third parties operate file storage application service operate photography business commercial service | [
8962,
8451,
4869,
2694,
6027,
4623,
5650,
5660,
11038,
11556,
2217,
10161,
10681,
11201,
7238,
10054,
5960,
590,
7248,
5078,
1239,
7512,
8921,
2267,
4574,
735,
4710,
1001,
4970,
236,
8181
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.