node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
10,186 | 9 | WebDNA:webdna webdna server-side scripting interpreted language embedded database system specifically designed world wide web primary use creating database-driven dynamic web page applications released 1995 name registered trademark 1998 webdna currently maintained webdna software corporation webdna contains ram-resident database system hybrid in-memory database searching editing capabilities resilient persistent backup ram databases maintained disk webdna code interweave css html/html5 js/ajax allowing mix layout programming server-side client-side scripting instructions allow interact remote servers usually considered easy-to-learn scripting language designed webmasters webdesigners programmers looking quick results webdna made syntax uses square brackets english language example display today date web page simply insert nowiki date /nowiki within html css code want live date appear likewise nowiki time /nowiki show text specific client ip address request 'showif context used showif ipaddress =xxx.xxx.xxx.xxx text /showif webdna tags contexts commands follow similar conventions webdna syntax based simple format webdna instructions based two types parameters included many tags contexts commands example code connects whois server shows information stores permanent database according grant hulbert one pacific coast software founders webcatalog webdna began set c macros help accomplish website graphical tasks webdna evolved general-purpose server-side language special-purpose server-side language designed help create web pages sold stock photography shopping cart features searchable fixed-field database specialized fields storing stock photo information pacific coast software quickly saw value creating web programming language webcatalog began mid-1990s public debut macintosh platform name implies early development focus allowed web master store administrator migrate traditional product catalog online catalog evident 1997 1998 storebuilder webmerchant products allowed user quickly build store front online term webcatalog referred entire product term webdna referred scripting syntax around year 2000 webcatalog pacific coast software purchased smith micro software inc. smith micro software inc. changed name webcatalog webdna point became name referenced aspects product starting release webdna version 4.0 ending version 6.0a years 1999 2004 active years webdna scripting language adopted many national international names including disney chrysler kodak ben jerry pillsbury dough boy shop ncaa final four museum television radio also time development language gained contemporary tools nowiki function /nowiki nowiki scope /nowiki lend modular programming structured programming 2005 2008 perhaps various reasons including success smith micro software products webdna users began lose support smith micro webdna lost users free solutions like php mysql ultimately developers webdna revived language june 2008 formed together organized establish webdna software corporation wsc wsc purchased intellectual property webdna 2009 wsc released new webdna version 6.2 cicada december 2011 fastcgi version webdna engine released version along offering compatibility non-apache installations changes scope webdna server-wide application domain name-specific application means website owner easily install webdna specifically one domain without affecting domains may reside server | [
865,
8644,
4490,
10506,
7022,
5395,
3219,
1556
] | Test |
10,187 | 9 | Java_Bindings_for_OpenGL:java bindings opengl java binding opengl api jsr api specification jsr 231 java platform standard edition allows use opengl java software platform also java binding opengl es api jsr 239 java platform micro edition core opengl api glu library calls available java thin wrapper looking much original opengl c api except glu nurbs routines exposed public api platform specific libraries available cgl api mac os x glx x window system wgl microsoft windows also abstracted create platform independent way selecting framebuffer attributes performing platform specific framebuffer operations platform-specific extensions included public api implementation choose export apis via gl.getplatformglextensions gl.getextension string method calls return objects whose data types specific given implementation example shows draw polygon without initialization repaint code reference c implementation translates following java implementation | [
4960,
3561,
3562,
5677,
6797,
823,
2045
] | None |
10,188 | 3 | Krakout:krakout krakout breakout clone released zx spectrum amstrad cpc bbc micro commodore 64 thomson computers msx platforms 1987 one wave enhanced breakout variants emerge wake arkanoid key distinctions gameplay horizontal layout allows player select acceleration characteristics bat playing written andy green rob toone published gremlin graphics music composed ben daglish 1990 dragon gave game 4 5 stars calling one favorites breakout different flavor | [
4690,
9006
] | Test |
10,189 | 4 | ADF_Solutions:adf solutions advanced digital forensic solutions inc. adf solutions company based bethesda maryland develops tools scanning suspect computers digital devices order locate extract data process known digital forensics digital forensic tools scan mobile phones computers digital devices collect intelligence evidence crime identify computers contain content relevant investigation tools used digital forensic labs field operatives defense intelligence law enforcement border security government agencies adf produces four forensic triage tools mobile device investigator digital evidence investigator triage-g2 triage-investigator tool targets different kinds users specific scenarios triage-g2 media exploitation medex tool used computers peripheral devices typically deployed usb device military personnel working field usb devices known triage keys prepared advance field selecting specific search criteria users tool require significant technical computer skills triage-g2 currently use several u.s. defense intelligence agencies mobile device investigator provides field investigators rapid evidence collection analysis reporting ios android devices smartphones tablets recover call records messages saved contacts calendar data browsing history download history search terms wifi connections installed applications pictures videos audio files documents police investigators review analyze results immediately make on-scene decisions digital evidence investigator forensic triage tool used computers forensic examiners lab environments location scan suspect devices prioritize full examinations digital evidence investigator use law enforcement agencies worldwide triage-investigator used law enforcement investigators field scan suspect computers evidence crime like triage-g2 users minimal technical experience tool also comes usb key used create field reports developed partnership u.s. department homeland security science technology directorate software used technology employs sets search criteria known captures software allows analysts operators describe specific search exploitation want conduct also used automate recurring categories investigations shared among agencies need according technopedia.com document media exploitation defined extraction translation analysis physical digital documents media generate useful timely information also known domex similar discipline computer forensics digital forensics media exploitation | [
7968,
4834,
5475,
5284,
2437,
7525,
9319,
6475,
11182,
830,
4049,
4789,
8635,
2494
] | Validation |
10,190 | 4 | Computer_emergency_response_team:computer emergency response team computer emergency response team cert expert group handles computer security incidents alternative names groups include computer emergency readiness team computer security incident response team csirt name computer emergency response team first used 1988 cert coordination center cert-cc carnegie mellon university cmu abbreviation cert historic name picked teams around world teams took specific name csirt point task handling computer security incidents instead tech support work cmu threatening take legal action individuals organisations referred team cert-cc cert turn century cmu relaxed position terms cert csirt used interchangeably history certs linked existence malware especially computer worms viruses whenever new technology arrives misuse long following first worm ibm vnet covered shortly worm hit internet 3 november 1988 so-called morris worm paralysed good percentage led formation first computer emergency response team carnegie mellon university u.s. government contract massive growth use information communications technologies subsequent years now-generic term 'cert'/'csirt refers essential part large organisations structures many organisations cert evolves information security operations center first forum incident response security teams global association csirts | [
8320,
3843,
5636,
7059,
3619,
2084,
5545,
7337,
7979,
2742,
7734,
7739,
2430,
7491,
6474,
4689,
10196,
4439,
7515,
7522,
612,
101,
10213,
4081,
5366,
2041,
3323,
5373,
2558
] | Validation |
10,191 | 9 | Ypsilon_(Scheme_implementation):ypsilon scheme implementation ypsilon scheme free software implementation r6rs standard scheme implements mostly concurrent garbage collection optimized multi-core cpu systems author yoshikatsu fujita developed ypsilon implementation satisfy need real-time scheme implementation suitable computer game development without giving garbage collected dynamic interpreter | [
1952,
10083,
8262,
5612,
7983
] | Test |
10,192 | 2 | Mandriva:mandriva mandriva s.a. public software company specializing linux open-source software corporate headquarters paris development centers metz france curitiba brazil mandriva s.a. developer maintainer linux distribution called mandriva linux well various enterprise software products mandriva founding member desktop linux consortium mandriva s.a. began mandrakesoft 1998 february 2004 following lengthy litigation hearst corporation name mandrake hearst corporation owned comic strip called mandrake magician mandrakesoft required change name following acquisition brazilian linux distribution conectiva february 2005 company name changed 7 april 2005 mandriva reflect names mandrakesoft conectiva october 4 2004 mandrakesoft acquired professional support company edge focused corporate market france 6 employees june 15 2005 mandriva acquired lycoris formerly redmond linux corporation october 5 2006 mandriva signed agreement acquire linbox linux enterprise software infrastructure company agreement included acquisition shares linbox total 1.739 million mandriva stock plus earn 401,000 based 2006 linbox financials 2007 mandriva reached deal government nigeria put operating system 17,000 school computers january 16 2008 mandriva turbolinux announced partnership create lab named manbo-labs share resources technology release common base system companies linux distributions although mandriva operating system eventually became significant entity data center company operating margins thin 2012 company brink bankruptcy january 30 2012 mandriva announced external entity bid rejected minority share holder deal go end first semester 2012 solution situation appeared january year found settlement achieved mandriva subsequently owned several different shareholders mandriva filed administrative receivership early 2015 liquidated may 22 2015 mandriva linux distribution continues survive openmandriva lx notable forks include mageia linux rosa linux addition selling linux distributions online store authorized resellers mandriva previously sold subscriptions mandriva club several levels membership costs ranging us 66 €60 per year 2007 €600 per year club members gained access club website additional mirrors torrents downloading free downloads boxed products depending membership level interim releases mandriva linux distribution additional software updates example gold-level higher members could download powerpack+ editions many mandriva commercial products came short-term membership club however mandriva linux completely usable without club membership mandriva linux 2008.0 released october 2007 mandriva made club membership free charge comers splitting download subscriptions separate service mandriva also mandriva corporate club larger organizations | [
7555,
7685,
4230,
1032,
6680,
10780,
6302,
10022,
9646,
1455,
9902,
823,
2239,
10308,
10694,
3162,
10606,
6525,
6910,
2559
] | Test |
10,193 | 1 | Oracle_TopLink:oracle toplink oracle toplink mapping persistence framework java developers toplink produced oracle part oracle oracleas weblogic oc4j servers object-persistence object-transformation framework toplink provides development tools run-time functionalities ease development process help increase functionality persistent object-oriented data stored relational databases helps build high-performance applications storing data either xml extensible markup language relational databases made possible transforming object-oriented data rich user-interface possible toplink help toplink mapping workbench mapping workbench makes possible carry following ease oracle jdeveloper ide provides easy integration functionalities provided mapping workbench use toplink users stay focused primary cause let toplink handle integration persistence object transformation application designing implementing deploying process accelerated toplink supports variety data sources formats relational database object-relational database enterprise information system eis xml many others toplink originally developed object people smalltalk ported java 1996-1998 called toplink java 2002 toplink acquired oracle corporation developed oracle fusion middleware product toplink code donated eclipse foundation eclipselink project born 2007 eclipselink provides functionality toplink sun microsystems selected eclipselink march 2008 implementation jpa 2.0 jsr 317 reference number versions toplink released since latest version 12c 12.1.3 available free download runtime component toplink provided eclipselink core api provides direct access runtime embedded application persistence behavior enabled making application calls invoke eclipselink api perform functionalities provides safe access shared databases import following class use extended functionality eclipselink binding java classes xml schemas possible help object-xml eclipselink component implementing jaxb mapping information provided annotations also provides manipulation xml service data objects sdo provides use sdo api use dynamic objects customize manipulate xml use static data objects conversion xml schema database web services dbws facilitates access relational databases help web service database access made without need write java code xml soap messages databases connected runtime component dbws uses eclipselink toplink grid integration mechanism provides connection oracle coherence eclipselink application generally interacts relational database primary database toplink application store data coherence grid called jpa grid toplink grid functionality used user license oracle coherence functionality provided get support toplink grid eclipselink users also need import following package classes database operations like insert update delete also performed toplink changes made database reflected oracle coherence cache java persistence api entity persistence class using toplink number performance features writing large amounts data implemented batch writing stored procedure support parameter binding statement ordering features offered satisfy database constraints basic operations entitymanager method persist object entity used add instance marks insertion database completion transaction codice_1 data inserted database updating entity means simply reading transaction updating properties entity updating employee lastname done follows deleting entity opposite insertion one using codice_2 method entitymanager.the entitymanager method codice_3 deletes entity completion transaction users use tools market use toplink along following toots provide special integration toplink | [
4358,
4614,
4233,
910,
11030,
10526,
9471,
5031,
1579,
5677,
9389,
7983,
10413,
7475,
6074,
10683,
7485,
6334,
5567,
7742,
9665,
6338,
9286,
6860,
3920,
4944,
5460,
479,
4960,
1250,
2658,
7523,
3560,
3561,
3562,
5612,
7022,
3952,
5872,
90... | Train |
10,194 | 7 | Dimension_Data:dimension data dimension data company specialising information technology services based johannesburg south africa company maintains operations every inhabited continent dimension data focuses services including consulting technical support services managed services company official technology partner tour de france vuelta españa also sponsors team name 2010 company fully acquired nippon telegraph telephone ntt 1 july 2019 dimension data operations excluding middle east africa became part ntt ltd. dimension data founded 1983 keith mclachlan werner sievers jeremy ord peter neale kevin hamilton company listed johannesburg stock exchange 15 july 1987 jeremy ord appointed company executive chairman year position continued hold 2016 1991 company became official south african distributor cisco systems 1993 company expanded botswana 1995 1997 began expansion asia pacific region 1996 dimension data purchased 45 stake australian company comtech would later buyout company fully 2000 company also bought stake south african company internet solutions 1996 dimension data would increase stake company following year also 1997 company purchased majority stakes merchants group datacraft 1998 2000 company focused expansion efforts northern hemisphere investing acquiring variety companies europe united kingdom united states one acquisition 1998 purchase london-based telecommunications company plessey 31 july 2000 dimension data listed london stock exchange raising 1.25 billion process 2003 company revenue jumped 2 billion 2004 brett dawson appointed ceo company jeremy ord appointed group executive chairman next 6 years company expanded africa middle east south america september 2009 company annual revenue around 4 billion july 2010 dimension data acquired nippon telegraph telephone ntt £2.1 billion 3.2 billion october year ntt announced dimension data would delisted johannesburg stock exchange london stock exchange end year next years dimension data continued acquiring integrating businesses like opsource nextiraone oakton june 2016 brett dawson stepped ceo replaced coo jason goodall time dimension data maintained 31,000 staff 58 countries across 6 inhabited continents annual revenue company 7.5 billion 1 july 2019 majority dimension data became part ntt ltd. along ntt security ntt communications however brand continues operate middle east africa grant bodley ceo dimension data current subsidiaries include accesskenya group alwayson continuitysa e2y commerce earthwave euricom internet solutions jq network merchants nexus oakton plessey security assessment sql services training partners viiew early acquisitions included australian companies comtech internet solutions 1996 merchants datacraft acquired year later 2000 company purchased plessey joint venture worldwide african investment holdings sql services acquired 2008 nippon telegraph telephone purchased company 2010 dimension data began adding subsidiaries fold include e2y commerce award-winning digital experience commerce marketplace consultancy sap cx hybris mirakl earthwave information communications technology specialist based australia cosuses cybersecurity umbrella dimension data 2013 accesskenya nexus 2014 nexus acquisition nearly doubled dimension data presence united states dimension data subsidiaries like alwayson continuitysa first acquired fellow subsidiary internet solutions dimension data provides information technology products services data centers security network integration converged communications microsoft support company placing primary focus four service areas include digital infrastructure hybrid cloud workspaces tomorrow cybersecurity addition offering sale physical data centers provides operation management transformation relocation data centers dimension data also manages operates servers storage provides backup services case damage disaster 2016 association amaury sports organization dimension data overhauled digital infrastructure tour de france company added big data upgrades allowed new technologies like data capture race coordination improved graphics analytics dimension data provides public private cloud computing servers also offer hybrid cloud customers choose resources public private data stored customer servers dimension data servers company operates locations including johannesburg sydney london dimension data provides cybersecurity businesses enterprise scale includes infrastructure security governance compliance risk assessment variety cybersecurity services also offers services mobile security data leakage prevention march 2013 dimension data named leader green quadrant® sustainable technology services report verdantix dimension data named along seven companies dedicated sustainability practice wide range capabilities strong track record corporate sustainability april 2015 dimension data honored three separate cisco partner year awards three different regions following year company 2016 microsoft country partner year award rwanda tanzania regions along communications partner year cloud productivity partner year global arena 3 may 2015 amaury sports organisation aso signed five-year deal dimension data dimension data official technology partner cycling events part deal dimension data provides telemetrics including gps positioning speed real time september 2015 company also became sponsor former mtn-qhubeka becoming team dimension data qhubeka | [
6834,
4194,
3405
] | None |
10,195 | 4 | List_of_data-erasing_software:list data-erasing software list utilities performing data erasure | [
4032,
1475,
3972,
8997,
2534,
10149,
11368,
7369,
11695,
7090,
9086,
5492,
10101,
823,
3323,
6494,
831
] | Test |
10,196 | 4 | Information_security_operations_center:information security operations center information security operations center isoc soc facility enterprise information systems web sites applications databases data centers servers networks desktops endpoints monitored assessed defended soc related people processes technologies provide situational awareness detection containment remediation threats soc handle behalf institution company threatening incident ensure properly identified analyzed communicated investigated reported soc also monitors applications identify possible cyber-attack intrusion event determines genuine malicious threat incident could affect business establishing operating soc expensive difficult organisations need good reason may include security operations center soc also called security defense center sdc security analytics center sac network security operations center nsoc security intelligence center cyber security center threat defense center security intelligence operations center sioc canadian federal government term infrastructure protection center ipc used describe soc socs typically based around security information event management siem system aggregates correlates data security feeds network discovery vulnerability assessment systems governance risk compliance grc systems web site assessment monitoring systems application database scanners penetration testing tools intrusion detection systems ids intrusion prevention system ips log management systems network behavior analysis cyber threat intelligence wireless intrusion prevention system firewalls enterprise antivirus unified threat management utm siem technology creates single pane glass security analysts monitor enterprise soc staff includes analysts security engineers soc managers seasoned networking professionals usually trained computer engineering cryptography network engineering computer science may credentials cissp giac soc staffing plans range eight hours day five days week 8x5 twenty four hours day seven days week 24x7 shifts include least two analysts responsibilities clearly defined large organizations governments may operate one soc manage different groups information communication technology provide redundancy event one site unavailable soc work outsourced instance using managed security service term soc traditionally used governments managed computer security providers although growing number large corporations organizations also centers soc network operations center noc complement work tandem noc usually responsible monitoring maintaining overall network infrastructure primary function ensure uninterrupted network service soc responsible protecting networks well web sites applications databases servers data centers technologies likewise soc physical security operations center coordinate work together physical soc facility large organizations security staff monitor control security officers/guards alarms cctv physical access lighting vehicle barriers etc every soc role three different focus areas soc may active combined combination cases soc noc physical soc may housed facility organizationally combined especially focus operational tasks soc originates cert organisation focus usually monitoring control case soc operates independently noc maintain separation duties typically larger organizations maintain separate soc ensure focus expertise soc collaborates closely network operations physical security operations socs usually well protected physical electronic computer personnel security centers often laid desks facing video wall displays significant status events alarms ongoing incidents corner wall sometimes used showing news weather tv channel keep soc staff aware current events may affect information systems security engineer security analyst may several computer monitors desk processes procedures within soc clearly spell roles responsibilities well monitoring procedures processes include business technology operational analytical processes lay steps taken event alert breach including escalation procedures reporting procedures breach response procedures cloud security operations center cloudsoc may set monitor cloud service use within enterprise keep shadow problem control parse audit infrastructure application logs via siem technologies machine data platforms logrhythm splunk ibm qradar arctic wolf networks assuria hp arcsight cybershark elastica provide alerts details suspicious activity smart soc security operations center comprehensive technology agnostic cybersecurity solution utilizes leading-edge technology tools highly skilled experienced human talent composed cyber intelligence gatherers analysts security experts proactive cyberwarfare principles prevent neutralize threats organization ’ digital infrastructure assets data addition many commonly referenced terms related original isoc title including following | [
10307,
11429,
2090,
2539,
4490,
7228,
10190,
5010,
11507,
4471,
9688,
11611,
1980,
2558
] | Test |
10,197 | 2 | License_Program_Product:license program product license program product lpp aix terminology referring complete software product collection including one packages filesets | [
7217,
5067,
4309
] | Train |
10,198 | 9 | Io_(programming_language):io programming language io pure object-oriented programming language inspired smalltalk self lua lisp act1 newtonscript io prototype-based object model similar ones self newtonscript eliminating distinction instance class like smalltalk everything object uses dynamic typing like lisp programs data trees io uses actors concurrency remarkable features io minimal size openness using external code resources io executed small portable virtual machine language created steve dekorte 2002 trying help friend dru nelson language cel found really n't know much languages worked set write tiny language understand problems better io goal explore conceptual unification dynamic languages tradeoffs tend favor simplicity flexibility performance simplest form composed single identifier assuming dostuff method called zero arguments result explicit parentheses required dostuff arguments would look like io message passing language since everything io message excluding comments message sent receiver example demonstrates well fully describe point better let look next example example demonstrates message passing io version message sent system object operators special case syntax cut-and-dried examples io parser intercepts set operators defined interpreter translates method calls example following translates see also little bit operator precedence happening precedence levels c precedence levels operators also turned method calls fact operators io methods fact require explicit parentheses convenience io two ways creating anonymous functions methods blocks almost identical except scope blocks lexical scope methods dynamic scope method block higher-order functions ubiquitous hello world program new objects created cloning objects io specifically new empty object created differences parent stored within new object behavior known differential inheritance example behavior shown simple non-recursive factorial function io assignment codice_1 codice_2 last action taken function implicitly returns result explicit return expression needed demonstrates usage ranges n't use codice_3 loop would faster | [
2304,
9345,
5255,
6536,
9224,
10510,
6160,
5783,
541,
5029,
4777,
7347,
1591,
10819,
8262,
11219,
7513,
11226,
4069,
6502,
9960,
8041,
8554,
11625,
8430,
2804,
10228,
2556
] | Validation |
10,199 | 3 | Apple_A7:apple a7 apple a7 64-bit system chip soc designed apple inc first appeared iphone 5s introduced september 10 2013 apple states twice fast twice graphics power compared predecessor apple a6 first 64-bit arm cpu first ship consumer smartphone tablet computer software updates systems using chip cease late 2019 ios 13 support iphone 5s ipados 13 support ipad air mini 2 3 a7 features apple-designed 64-bit 1.3–1.4 ghz armv8-a dual-core cpu called cyclone 64-bit a64 instruction set armv8-a architecture doubles number registers a7 compared armv7 architecture used a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 also integrates graphics processing unit gpu anandtech believes powervr g6430 four cluster configuration a7 per-core l1 cache 64 kb data 64 kb instructions l2 cache 1 mb shared cpu cores 4 mb l3 cache services entire soc a7 includes new image processor feature originally introduced a5 used functionality related camera image stabilizing color correction light balance a7 also includes area called secure enclave stores protects data touch id fingerprint sensor iphone 5s ipad mini 3 speculated security data secure enclave enforced arm trustzone/securcore technology change apple a6 a7 soc longer services accelerometer gyroscope compass order reduce power consumption functionality moved new m7 motion coprocessor appears separate arm-based microcontroller nxp semiconductors apple uses apl0698 variant a7 chip running 1.3 ghz iphone 5s ipad mini 2 ipad mini 3 a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size according abi research a7 drew 1100 fixed point operations 520 floating point operations predecessor a6 processor iphone 5 drew 485 320 manufactured package package pop together 1 gb lpddr3 dram 64-bit wide memory interface onto package apple uses apl5698 variant a7 chip running 1.4 ghz,1.4 ipad air die identical size layout first a7 manufactured samsung however unlike first version a7 a7 used ipad air pop stacked ram instead uses chip-on-board mounting immediately adjacent dram covered metallic heat spreader similar apple a5x a6x a7 branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016 images illustrations | [
9732,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
8222,
1057,
2551,
38,
6183,
1576,
8231,
6186,
4139,
7211,
8237,
9774,
2097,
8250,
1083,
8253,
10813,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
10840,
9312,
3681,
9826,
99,
8806,
8812,
625... | None |
10,200 | 7 | Sun_Cloud:sun cloud sun cloud on-demand cloud computing service operated sun microsystems prior acquisition oracle corporation sun cloud compute utility provided access substantial computing resource internet us 1 per cpu-hour launched sun grid march 2006 based supported open source technologies solaris 10 sun grid engine java platform sun cloud delivered enterprise computing power resources internet enabling developers researchers scientists businesses optimize performance speed time results accelerate innovation without investment infrastructure early 2010 oracle announced discontinuing sun cloud project since sunday march 7 2010 network.com web site inaccessible typical application could run compute utility fit following parameters resources collections files contain user data executable jobs compute utility concept define elements unit work submitted sun cloud compute utility major elements job include name shell script controlling program execution required arguments shell script list resources must place job run run specific instantiation job description submitted sun cloud compute utility runs occur job submitted compute utility execution job one submits runs cloud sun cloud cpu usage aggregated rounded nearest whole hour example job used 1000 cpus one minute would aggregated 1000 cpu minutes 16.67 cpu hours software rounds 17 hours job would billed us 17 march 13 2007 sun announced launch application catalog online service allows developers isvs develop publish applications enabling communities scientists academics life sciences education engineering fields accelerate innovation complete research projects quickly less expensively network.com application catalog gives users immediate online access popular isv open-source applications easy-to-use web portal contractual obligation users upload run applications create personal library favorites take advantage pre-installed configured applications giving instant productivity portal gives everything need conduct analysis complete complex computational tasks help speed scientific discovery shorten time market new products simply select application upload data get results fast network.com enables anyone publish applications application catalog take advantage powerful solaris 10-based cloud platform users publish applications private library access whenever want also share applications others retaining data securely private space applications available catalog include category examples types suitable applications include | [
9731,
4623,
10789,
9766,
5159,
5677,
3121,
7248,
597,
10327,
4194,
11363,
5732,
5233,
9333,
631,
2170,
9343,
4235,
4236,
10893,
10387,
2710,
6307,
1707,
3247,
6322,
7352,
4289,
6338,
10436,
5830,
1224,
6856,
3285,
6367,
9955,
3819,
5872,
... | Validation |
10,201 | 1 | Snapshot_isolation:snapshot isolation databases transaction processing transaction management snapshot isolation guarantee reads made transaction see consistent snapshot database practice reads last committed values existed time started transaction successfully commit updates made conflict concurrent updates made since snapshot snapshot isolation adopted several major database management systems interbase firebird oracle mysql postgresql sql anywhere mongodb microsoft sql server 2005 later main reason adoption allows better performance serializability yet still avoids concurrency anomalies serializability avoids always practice snapshot isolation implemented within multiversion concurrency control mvcc generational values data item versions maintained mvcc common way increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object snapshot isolation used criticize ansi sql-92 standard definition isolation levels exhibits none anomalies sql standard prohibited yet serializable anomaly-free isolation level defined ansi spite distinction serializability snapshot isolation sometimes referred serializable oracle transaction executing snapshot isolation appears operate personal snapshot database taken start transaction transaction concludes successfully commit values updated transaction changed externally since snapshot taken write-write conflict cause transaction abort write skew anomaly two transactions t1 t2 concurrently read overlapping data set e.g values v1 v2 concurrently make disjoint updates e.g t1 updates v1 t2 updates v2 finally concurrently commit neither seen update performed system serializable anomaly would impossible either t1 t2 would occur first visible contrast snapshot isolation permits write skew anomalies concrete example imagine v1 v2 two balances held single person phil bank allow either v1 v2 run deficit provided total held never negative i.e v1 v2 ≥ 0 balances currently 100 phil initiates two transactions concurrently t1 withdrawing 200 v1 t2 withdrawing 200 v2 database guaranteed serializable transactions simplest way coding t1 deduct 200 v1 verify v1 v2 ≥ 0 still holds aborting t2 similarly deducts 200 v2 verifies v1 v2 ≥ 0 since transactions must serialize either t1 happens first leaving v1 100 v2 100 preventing t2 succeeding since v1 v2 200 200 t2 happens first similarly prevents t1 committing database snapshot isolation mvcc however t1 t2 operate private snapshots database deducts 200 account verifies new total zero using account value held snapshot taken since neither update conflicts commit successfully leaving v1 v2 100 v1 v2 200 systems built using multiversion concurrency control mvcc may support snapshot isolation allow transactions proceed without worrying concurrent operations importantly without needing re-verify read operations transaction finally commits convenient mvcc maintains series recent history consistent states information must stored transaction list updates made scanned conflicts fairly easily committed however mvcc systems marklogic use locks serialize writes together mvcc gain performance gains still support stronger serializability level isolation potential inconsistency problems arising write skew anomalies fixed adding otherwise unnecessary updates transactions order enforce serializability property example materialize conflict adding new table makes hidden constraint explicit mapping person total balance phil would start total balance 200 transaction would attempt subtract 200 creating write-write conflict would prevent two succeeding concurrently however approach violates normal form alternatively promote one transaction reads write instance t2 could set v1 v1 creating artificial write-write conflict t1 preventing two succeeding concurrently solution may always possible general therefore snapshot isolation puts problem maintaining non-trivial constraints onto user may appreciate either potential pitfalls possible solutions upside transfer better performance snapshot isolation called serializable mode oracle postgresql versions prior 9.1 may cause confusion real serializability mode arguments decision clear users must aware distinction avoid possible undesired anomalous behavior database system logic snapshot isolation arose work multiversion concurrency control databases multiple versions database maintained concurrently allow readers execute without colliding writers system allows natural definition implementation isolation level interbase later owned borland acknowledged provide si rather full serializability version 4 likely permitted write-skew anomalies since first release 1985 unfortunately ansi sql-92 standard written lock-based database mind hence rather vague applied mvcc systems berenson et al wrote paper 1995 critiquing sql standard cited snapshot isolation example isolation level exhibit standard anomalies described ansi sql-92 standard yet still anomalous behaviour compared serializable transactions 2008 cahill et al showed write-skew anomalies could prevented detecting aborting dangerous triplets concurrent transactions implementation serializability well-suited multiversion concurrency control databases adopted postgresql 9.1 referred serializable snapshot isolation abbreviated ssi used consistently eliminates need workarounds downside snapshot isolation increase aborted transactions perform better worse snapshot isolation workarounds depending workload 2011 jimenez-peris et al filed patent shown possible scale many millions update transactions per second new method attaining snapshot isolation distributed manner method based observation becomes possible commit transactions fully parallel without coordination therefore removing bottleneck traditional transactional processing methods method uses commit sequencer generates commit timestamps snapshot server advances current snapshot gaps filled serialization order method base database leanxcale first implementation method made 2010 part cumulonimbo european project | [
10048,
3398,
9389,
7022,
10413,
2901,
7446,
11030,
3096,
5658,
8539,
3004,
4861,
7581
] | Test |
10,202 | 2 | IXsystems:ixsystems ixsystems inc. privately owned american computer technology company based san jose california develops sells supports computing storage products services principal products customized open source freebsd distributions including desktop operating system trueos formerly pc-bsd file servers network attached storage systems freenas truenas also markets hardware platforms products develops enterprise-scale storage architectures converged architectures part activities company strong ties freebsd community repeatedly donated hardware support fledgling projects within bsd community sponsors develops development within freebsd well sponsor attendee open-source community events ixsystems founded 1991 berkeley software design inc. bsdi later bsdi rick adams members university california berkeley computer systems research group csrg including keith bostic kirk mckusick mike karels bill jolitz donn seeley year 2000 berkeley software design inc. acquired enterprise server manufacturer telenet system solutions inc. founded 1996 operated san jose california office manufacturing facility ixsystems operates today 2001 bsdi sold operating systems business wind river systems spun hardware business ixtreme line servers ixsystems inc 2002 offmyserver inc. owned two bsdi employees acquired ixsystems inc. operated offmyserver inc. restoring ixsystems name 2005 2006 ixsystems adopted pc-bsd project hired founder kris moore 2007 ixsystems acquired freebsd mall inc. reuniting portions original bsdi spun wind river systems 2009 ixsystems negotiated continue freenas project developers decided move debian linux ixsystems introduced comprehensive rewrite freenas 2011 provides platform freenas mini smb nas arrays truenas enterprise storage arrays august 2010 bsd author dru lavigne joined ixsystems july 2013 jordan k. hubbard one founders freebsd project joined ixsystems cto ixsystems designs sells supports custom x86 servers workgroups data centers focus support freebsd operating system company relies partnerships hardware vendors intel supermicro western digital lsi corporation combined on-staff freebsd developers ixsystems servers subjected three-day burn-in process reduce returns available linux alternative operating system freenas project originally launched third party developers october 2005 aimed create open source network attached storage system based freebsd 6.0 september 2009 development team concluded project release 0.7 required complete rewrite accommodate modern features plug-in architecture project gradually forked new version based debian linux existing version transferred ixsystems rewrote new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 november 19 2010 ixsystems released freenas 8 beta first release popular free open-source software-defined storage project adopted rewrote freenas based freebsd operating system openzfs file system aug 3 2011 ixsystems introduced truenas line enterprise storage arrays network-attached storage nas system storage area network san device supports smb afp nfs iscsi ssh rsync ftp/tftp sharing protocols ethernet fibre channel network fabrics truenas also supports vendor-certified protocols including vmware vaai microsoft csv odx vss veeam custom tool-less enclosure provides truenas high availability using dual controllers four user-serviceable components disks power supplies fans controllers truenas uses openzfs file system hybrid all-flash configurations 4.8 petabytes raw capacity ixsystems freenas certified line small medium-sized enterprise storage arrays designed run freenas storage operating system available 1u 2u 4u configurations ixsystems freenas mini line soho storage arrays designed run freenas storage operating system available 4 bay 8 bay configurations | [
7552,
5506,
1927,
10631,
4745,
10761,
2061,
9743,
8725,
9625,
414,
5534,
1316,
684,
4908,
1839,
7983,
1718,
823,
1080,
7863,
10811,
9151,
9153,
3651,
7364,
7748,
10436,
9927,
11459,
8395,
850,
8404,
6361,
9306,
3551,
607,
998,
9320,
873,
... | None |
10,203 | 3 | HD_Loader:hd loader hd loader program playstation 2 video game console allows users play games installed optional hard drive peripheral via playstation 2 network adaptor games copied hard drive within program using computer image dumping software outputs specific custom format hd loader software require original sony hard drive function properly however drives may impossible attach without modifying connectors games may also refuse detect drive unofficial sony public stance hd loader supported illegal enable game piracy allowing games installed played later without owning disc october 2006 federal court california ordered defendants pay excess 9 million damages digital millennium copyright act violations selling hd loader clone patched version official version sold hd advance still manufactured purchased many online retailers hd loader 100 compatible ps2 games incompatibilities exist game software depends certain peculiarities ps2 drive hardware additional incompatibilities arise use dual-layer dvds ps2 games sometimes parsed properly hd loader incidentally dual-layer games installed pc 0.8c possible install hd loader finally intentional impediments introduced recent high-profile ps2 titles god war gran turismo 4 prevent executed hard drive response limitations hd loader number independent programmers developed patches extend functionality hd loader improve game compatibility different software entirely e.g. openps2loader include fix improve dual-layer support one implement non-aligned data buffer allows gradius v played hd one defeat newer copy-protection measures popularly known god war fix one support new slimline scph-70000 series playstation 2 hardware one implement 48-bit logical block addressing allows hd loader take full advantage hard drives larger 137 gb 128 gib reported hd loader 0.7c hard drives 2 terabytes used unofficial patches accumulated hd loader release known 0.8b unofficial hd loader currently version 0.8c april 2007 version 0.8c continues support 48-bit 2 terabyte hard drives patches god war ii 3 modes support installing running dual layer games directly hard drive games need patched order played hd loader another may require using tricks starting game older digital controller switching dualshock 2 refuse install according ps2hd.com compatibility rate patched hd loader around 88.2 original playstation games compatible method official hd loader extracted released internet retaliation free library files used creation 0.6d first unofficial version improved game compatibility 0.7c fix suikoden v patches 48bit hdds 2 terabytes dma modes udma/mdma dvd9 fix allow dual layer games played added stable gui patching app created allowed one choose patches various edits apply official unpatched version updated compatibility menu added 0.7e patches fixed shadow colossus super monkey ball added version enabled playing many previously incompatible games updated compatibility menu changed modes description 0.8 patch fixed ability edit dma button configuration 0.8b fixes bug hdl0.8 installing hdds 128 gb minor errors updated compatibility menu 0.8b+ patch fixed god war ii added version known different names author rename version additionally patch breaks support 0.8c fix buffer alignment added gui patcher app made gow2 gta lcs run without crashing current version unofficial releases run console modchip installed using exploit free mcboot ps2 independence exploit hd advance cloned version hd loader software playstation 2 allow users play games installed optional hard drive peripheral available ps2 hd advance identical functionality many patched versions hd loader freely available online include dvd-9 support 48-bit hard drive addressing different theme changed text strings benefit hd advance distributed pressed disk giving patched version hd loader run console without modchip installed also without need ps2 independence exploit software modification however players using hd advance 2.0 retail pressed discs cd dvd format maxtor hard disk 80 gb capacity subsequently use disc play ps2 games hdd reported experiencing strange problem hd loader versions 0.7c boot perfectly via independence exploit subsequent versions hd loader 0.8 onwards freezes splash screen refuses start formatted hd advance disc possibly due newer patches hd advance discs solution reformat hard disk hd loader version 0.8 higher recommended newer ps2 games however confirmed work 100 across board certain ps2 models mainly pal 7xxx consoles reported still freeze splash screen currently-unfixable problem related hd loader version 0.8 higher pal single-port network adapter models main problem open ps2 loader abbreviated opl open-source program allows playing commercial games homebrew installed external storage devices support hard disk drive like hd loader usb like hd advance smb network also additional features like gsm feature used disable videos change resolution game output virtual memory cards allowing save usb hdd smb usage dualshock3 controller usb bluetooth using dongle cheat engine interface open ps2 loader customized themes developed version control since september 27 2009 | [
10316,
6845,
5215
] | Test |
10,204 | 3 | Cross-domain_interoperability:cross-domain interoperability cross-domain interoperability exists organizations systems different domains interact information exchange services and/or goods achieve common goals interoperability method systems working together inter-operate domain instance community related infrastructure bound common purpose interests consistent mutual interactions rules engagement separable communities social technical linguistic professional legal sovereignty related boundaries capability cross-domain interoperability becoming increasingly important business government operations become global interdependent cross-domain interoperability enables synergy extends product utility enables users effective successful within domains combined effort cross-domain interoperability characterized common understanding agreements sides domain boundary enable individual organizations tailor make products assets services interoperable within larger community participant accepts enforces use mutual domain-wide worldwide standards interface protocols consequently cross-domain interfaces may control single element authority -- unlike integrated system-of-systems environment one domain authority may control interfaces used domains two examples activities benefit information systems interoperable across domains disaster response work 2013 typhoon relief philippines multi-national peacekeeping missions allied forces support france 2012-2013 conflict mali another effort cross-domain interoperability critical overall success implementation u.s affordable care act federal state governments insurance companies healthcare providers perform individual functions using variety networks divergent computer platforms – interoperable environment enable participants different domains effectively exchange information perform essential services protecting privacy rights individual patients exchange healthcare-related community begun focus establishing cross-domain interoperability yet large-scale basis cloud computing promotes communication collaboration connecting internet migrating information cloud group clouds guarantee cross-domain interoperability organizations connected internet mean cross-domain interoperability automatically happens eliminating technological barriers enabling information sharing collaboration involves designing building computer programs environments interoperate also cooperative agreements place regarding management administrative policies governing issues security user identification trust information assurance internal policies government regulations also impact either promote impede cross-domain interoperability establish cross-domain interoperability needs spirit cooperation among different participants domains must agreed-to standards translations interface conversions enable entity exchange information extract data needs order perform role contribute knowledge adds value overall mission number organizations businesses institutions work technology policies make cross-domain interoperability reality including national institute standards technology united states department defense nato network centric operations industry consortium ncoic ncoic number resources government industry foster cross-domain interoperability including open process ncoic rapid response capability nrrc™ first designed national geospatial-intelligence agency | [
4194,
2948,
11470
] | Validation |
10,205 | 3 | Replay_system:replay system replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled replay system came result intel quest ever-increasing clock speeds higher clock speeds necessitated lengthy pipelines 31 stages prescott core six stages scheduler execution units prescott core attempt maintain acceptable performance intel engineers design scheduler optimistic scheduler pentium 4 processor aggressive send operations execution without guarantee successfully executed among things scheduler assumes data level 1 trace cache cpu cache common reason execution fails requisite data available likely due cache miss happens replay system signals scheduler stop repeatedly executes failed string dependent operations completed successfully surprisingly cases replay system bad impact performance normal circumstances execution units pentium 4 use roughly 33 time replay system invoked occupy execution units nearly every available cycle wastes power increasingly important architectural design metric poses performance penalty execution units would sitting idle anyway however hyper-threading use replay system prevent thread utilizing execution units true cause performance degradation concerning hyper-threading prescott pentium 4 gained replay queue reduces time replay system occupy execution units cases thread processing different types operations replay system interfere performance increase appear explains performance hyper-threading application-dependent | [
3457,
7657,
8523,
6926,
8815,
10734,
7313,
7218
] | Train |
10,206 | 7 | Insteon_(company):insteon company insteon irvine ca-based developer home automation aka domotics hardware software technology also called insteon allows light switches lights thermostats motion sensors electrical devices interoperate power lines radio frequency rf communications company produces 200 products featuring technology insteon subsidiary smartlabs inc. also based irvine ca insteon founded 2005 irvine ca ceo joe dada dada previously founded smarthome 1992 home automation product catalog company operator smarthome.com e-commerce site late 1990s dada acquired two product engineering firms undertook extensive product development efforts create networking technology based power-line rf communications 2004 company filed patent protection resultant technology called insteon released 2005 2012 company released first network-controlled light bulb using insteon-enabled technology point dada spun insteon smarthome insteon technology uses dual-mesh networking topology devices peers device independently transmits receives repeats messages insteon produces 200 products using technology including led bulbs wall switches wall keypads sensors thermostats plug modules embedded devices along central controllers system management insteon markets two different central controllers brand called insteon hub newer homekit-enabled insteon hub pro designed apple homekit compatibility 2012 company introduced first network-controlled led light bulb | [
8736,
4609,
11267,
10021
] | Test |
10,207 | 4 | Biometrics:biometrics biometrics technical term body measurements calculations refers metrics related human characteristics biometrics authentication realistic authentication used computer science form identification access control also used identify individuals groups surveillance biometric identifiers distinctive measurable characteristics used label describe individuals biometric identifiers often categorized physiological versus behavioral characteristics physiological characteristics related shape body examples include limited fingerprint palm veins face recognition dna palm print hand geometry iris recognition retina odour/scent behavioral characteristics related pattern behavior person including limited typing rhythm gait voice researchers coined term behaviometrics describe latter class biometrics traditional means access control include token-based identification systems driver license passport knowledge-based identification systems password personal identification number since biometric identifiers unique individuals reliable verifying identity token knowledge-based methods however collection biometric identifiers raises privacy concerns ultimate use information many different aspects human physiology chemistry behavior used biometric authentication selection particular biometric use specific application involves weighting several factors jain et al 1999 identified seven factors used assessing suitability trait use biometric authentication proper biometric use application dependent certain biometrics better others based required levels convenience security single biometric meet requirements every possible application block diagram illustrates two basic modes biometric system first verification authentication mode system performs one-to-one comparison captured biometric specific template stored biometric database order verify individual person claim three steps involved verification person first step reference models users generated stored model database second step samples matched reference models generate genuine impostor scores calculate threshold third step testing step process may use smart card username id number e.g pin indicate template used comparison 'positive recognition common use verification mode aim prevent multiple people using identity second identification mode system performs one-to-many comparison biometric database attempt establish identity unknown individual system succeed identifying individual comparison biometric sample template database falls within previously set threshold identification mode used either 'positive recognition user provide information template used 'negative recognition person system establishes whether person implicitly explicitly denies latter function achieved biometrics since methods personal recognition passwords pins keys ineffective first time individual uses biometric system called enrollment enrollment biometric information individual captured stored subsequent uses biometric information detected compared information stored time enrollment note crucial storage retrieval systems secure biometric system robust first block sensor interface real world system acquire necessary data times image acquisition system change according characteristics desired second block performs necessary pre-processing remove artifacts sensor enhance input e.g removing background noise use kind normalization etc third block necessary features extracted step important step correct features need extracted optimal way vector numbers image particular properties used create template template synthesis relevant characteristics extracted source elements biometric measurement used comparison algorithm discarded template reduce filesize protect identity enrollee enrollment phase template simply stored somewhere card within database matching phase obtained template passed matcher compares existing templates estimating distance using algorithm e.g hamming distance matching program analyze template input output specified use purpose e.g entrance restricted area selection biometrics practical application depending upon characteristic measurements user requirements selecting particular biometric factors consider include performance social acceptability ease circumvention and/or spoofing robustness population coverage size equipment needed identity theft deterrence selection biometric based user requirements considers sensor device availability computational time reliability cost sensor size power consumption multimodal biometric systems use multiple sensors biometrics overcome limitations unimodal biometric systems instance iris recognition systems compromised aging irises electronic fingerprint recognition worsened worn-out cut fingerprints unimodal biometric systems limited integrity identifier unlikely several unimodal systems suffer identical limitations multimodal biometric systems obtain sets information marker i.e. multiple images iris scans finger information different biometrics requiring fingerprint scans using voice recognition spoken passcode multimodal biometric systems fuse unimodal systems sequentially simultaneously combination thereof series refer sequential parallel hierarchical serial integration modes respectively fusion biometrics information occur different stages recognition system case feature level fusion data features extracted multiple biometrics fused matching-score level fusion consolidates scores generated multiple classifiers pertaining different modalities finally case decision level fusion final results multiple classifiers combined via techniques majority voting feature level fusion believed effective levels fusion feature set contains richer information input biometric data matching score output decision classifier therefore fusion feature level expected provide better recognition results spoof attacks consist submitting fake biometric traits biometric systems major threat curtail security multi-modal biometric systems commonly believed intrinsically robust spoof attacks recent studies shown evaded spoofing even single biometric trait following used performance metrics biometric systems early cataloguing fingerprints dates back 1891 juan vucetich started collection fingerprints criminals argentina josh ellenbogen nitzan lebovic argued biometrics originated identification systems criminal activity developed alphonse bertillon 1853–1914 francis galton theory fingerprints physiognomy according lebovic galton work led application mathematical models fingerprints phrenology facial characteristics part absolute identification key inclusion exclusion populations accordingly biometric system absolute political weapon era form soft control theoretician david lyon showed past two decades biometric systems penetrated civilian market blurred lines governmental forms control private corporate control kelly gates identified 9/11 turning point cultural language present language cultural studies aftermath 9/11 moment articulation objects events necessary connection come together new discourse formation established automated facial recognition homeland security technology kelly gates biometric future facial recognition technology culture surveillance new york 2011 p. 100 adaptive biometric systems aim auto-update templates model intra-class variation operational data two-fold advantages systems solving problem limited training data tracking temporal variations input data adaptation recently adaptive biometrics received significant attention research community research direction expected gain momentum key promulgated advantages first adaptive biometric system one longer needs collect large number biometric samples enrollment process second longer necessary enrol retrain system scratch order cope changing environment convenience significantly reduce cost maintaining biometric system despite advantages several open issues involved systems mis-classification error false acceptance biometric system cause adaptation using impostor sample however continuous research efforts directed resolve open issues associated field adaptive biometrics information adaptive biometric systems found critical review rattani et al recent times biometrics based brain electroencephalogram heart electrocardiogram signals emerged research group university kent led ramaswamy palaniappan shown people certain distinct brain heart patterns specific individual another example finger vein recognition using pattern-recognition techniques based images human vascular patterns advantage 'futuristic technology fraud resistant compared conventional biometrics like fingerprints however technology generally cumbersome still issues lower accuracy poor reproducibility time new generation biometrical systems called biometrics intent aims scan intent technology analyze physiological features eye movement body temperature breathing etc predict dangerous behaviour hostile intent materializes action portability side biometric products vendors embracing significantly miniaturized biometric authentication systems bas thereby driving elaborate cost savings especially large-scale deployments operator signature biometric mode manner person using device complex system recorded verification template one potential use type biometric signature distinguish among remote users telerobotic surgery systems utilize public networks communication john michael mike mcconnell former vice admiral united states navy former director u.s. national intelligence senior vice president booz allen hamilton promoted development future capability require biometric authentication access certain public networks keynote speech 2009 biometric consortium conference basic premise proposal person uniquely authenticated using biometrics computer fact also agent performing potentially malicious actions computer however control computer subverted example computer part botnet controlled hacker knowledge identity user terminal materially improve network security aid law enforcement activities recently another approach biometric security developed method scans entire body prospects guarantee better identification prospect method globally accepted complex prospects concerned privacy rather tags tattoos biometric techniques may used identify individual animals zebra stripes blood vessel patterns rodent ears muzzle prints bat wing patterns primate facial recognition koala spots tried biometrics considered also instrumental development state authority put foucauldian terms discipline biopower turning human subject collection biometric parameters biometrics would dehumanize person infringe bodily integrity ultimately offend human dignity well-known case italian philosopher giorgio agamben refused enter united states protest united states visitor immigrant status indicator us-visit program requirement visitors fingerprinted photographed agamben argued gathering biometric data form bio-political tattooing akin tattooing jews holocaust according agamben biometrics turn human persona bare body agamben refers two words used ancient greeks indicating life zoe life common animals humans life bios life human context meanings purposes agamben envisages reduction bare bodies whole humanity new bio-political relationship citizens state turning citizens pure biological life zoe depriving humanity bios biometrics would herald new world dark matters surveillance blackness surveillance scholar simone browne formulates similar critique agamben citing recent study relating biometrics r found gender classification system researched inclined classify africans males mongoloids females consequently browne argues conception objective biometric technology difficult systems subjectively designed vulnerable cause errors described study stark expansion biometric technologies public private sector magnifies concern increasing commodification biometrics private sector adds danger loss human value indeed corporations value biometric characteristics individuals value browne goes suggest modern society incorporate biometric consciousness entails informed public debate around technologies application accountability state private sector ownership access one body data intellectual property generated one body data must understood right scholars emphasized however globalized world confronted huge mass people weak absent civil identities developing countries weak unreliable documents poorer people countries even unreliable documents without certified personal identities certainty right civil liberty one claim rights including right refuse identified identifiable subject public identity sense biometrics could play pivotal role supporting promoting respect human dignity fundamental rights biometrics intent poses risks paper harvard international review prof nayef al-rodhan cautions high risks miscalculations wrongful accusations infringements civil liberties critics us also signalled conflict 4th amendment possible data obtained biometric enrollment may used ways enrolled individual consented example biometric features could disclose physiological and/or pathological medical conditions e.g. fingerprint patterns related chromosomal diseases iris patterns could reveal genetic sex hand vein patterns could reveal vascular diseases behavioral biometrics could reveal neurological diseases etc. moreover second generation biometrics notably behavioral electro-physiologic biometrics e.g. based electrocardiography electroencephalography electromyography could also used emotion detection three categories privacy concerns thieves get access secure properties chance thieves stalk assault property owner gain access item secured biometric device damage owner could irreversible potentially cost secured property example 2005 malaysian car thieves cut finger mercedes-benz s-class owner attempting steal car context biometric systems presentation attacks may also called spoofing attacks per recent iso/iec 30107 standard presentation attacks defined presentation biometric capture subsystem goal interfering operation biometric system attacks either impersonation obfuscation attacks impersonation attacks try gain access pretending someone else obfuscation attacks may example try evade face detection face recognition systems recently several methods proposed counteract presentation attacks automated detection presentation attack called presentation attack detection pad one advantage passwords biometrics re-issued token password lost stolen cancelled replaced newer version naturally available biometrics someone face compromised database cancel reissue electronic biometric identifier stolen nearly impossible change biometric feature renders person biometric feature questionable future use authentication case hacking security-clearance-related background information office personnel management opm united states cancelable biometrics way incorporate protection replacement features biometrics create secure system first proposed ratha et al cancelable biometrics refers intentional systematically repeatable distortion biometric features order protect sensitive user-specific data cancelable feature compromised distortion characteristics changed biometrics mapped new template used subsequently cancelable biometrics one major categories biometric template protection purpose besides biometric cryptosystem biometric cryptosystem error-correcting coding techniques employed handle intraclass variations ensures high level security limitations specific input format small intraclass variations several methods generating new exclusive biometrics proposed first fingerprint-based cancelable biometric system designed developed tulyakov et al essentially cancelable biometrics perform distortion biometric image features matching variability distortion parameters provides cancelable nature scheme proposed techniques operate using recognition engines teoh et al savvides et al whereas methods dabbah et al take advantage advancement well-established biometric research recognition front-end conduct recognition although increases restrictions protection system makes cancellable templates accessible available biometric technologies soft biometrics traits physical behavioral adhered human characteristics derived way human beings normally distinguish peers e.g height gender hair color used complement identity information provided primary biometric identifiers although soft biometric characteristics lack distinctiveness permanence recognize individual uniquely reliably easily faked provide evidence users identity could beneficial words despite fact unable individualize subject effective distinguishing people combinations personal attributes like gender race eye color height visible identification marks used improve performance traditional biometric systems soft biometrics easily collected actually collected enrollment two main ethical issues raised soft biometrics first soft biometric traits strongly cultural based e.g. skin colors determining ethnicity risk support racist approaches biometric sex recognition best recognizes gender tertiary sexual characters unable determine genetic chromosomal sexes soft biometrics aging recognition often deeply influenced ageist stereotypes etc second soft biometrics strong potential categorizing profiling people risking supporting processes stigmatization exclusion many countries including united states planning share biometric data nations testimony us house appropriations committee subcommittee homeland security biometric identification 2009 kathleen kraninger robert mocny commented international cooperation collaboration respect biometric data follows according article written 2009 s. magnuson national defense magazine entitled defense department pressure share biometric data united states bilateral agreements nations aimed sharing biometric data quote article certain members civilian community worried biometric data used full disclosure may forthcoming particular unclassified report united states defense science board task force defense biometrics states wise protect sometimes even disguise true total extent national capabilities areas related directly conduct security-related activities also potentially applies biometrics goes say classic feature intelligence military operations short goal preserve security 'sources methods countries using biometrics include australia brazil canada cyprus greece china gambia germany india iraq ireland israel italy malaysia netherlands new zealand nigeria norway pakistan south africa saudi arabia tanzania ukraine united arab emirates united kingdom united states venezuela among low middle income countries roughly 1.2 billion people already received identification biometric identification program also numerous countries applying biometrics voter registration similar electoral purposes according international idea ’ icts elections database countries using 2017 biometric voter registration bvr armenia angola bangladesh bhutan bolivia brazil burkina faso cambodia cameroon chad colombia comoros congo democratic republic costa rica ivory coast dominican republic fiji gambia ghana guatemala india iraq kenya lesotho liberia malawi mali mauritania mexico morocco mozambique namibia nepal nicaragua nigeria panama peru philippines senegal sierra leone solomon islands somaliland swaziland tanzania uganda uruguay venezuela yemen zambia zimbabwe india national id program called aadhaar largest biometric database world biometrics-based digital identity assigned person lifetime verifiable online instantly public domain time anywhere paperless way designed enable government agencies deliver retail public service securely based biometric data fingerprint iris scan face photo along demographic data name age gender address parent/spouse name mobile phone number person data transmitted encrypted form internet authentication aiming free limitations physical presence person given place 550 million residents enrolled assigned 480 million aadhaar national identification numbers 7 november 2013 aims cover entire population 1.2 billion years however challenged critics privacy concerns possible transformation state surveillance state banana republic.§ project also met mistrust regarding safety social protection infrastructures tackle fear amongst people india supreme court put new ruling action stated privacy seen fundamental right 24 august 2017 new law established | [
3329,
6017,
5892,
5125,
7559,
8839,
651,
9356,
1169,
9745,
4883,
10002,
10773,
278,
1945,
6937,
7834,
3612,
5918,
1315,
7207,
1832,
7212,
2737,
3125,
5433,
4541,
10557,
10685,
10943,
8645,
838,
5195,
6350,
2901,
1369,
9949,
10207,
9313,
1... | Validation |
10,208 | 4 | MiniPanzer_and_MegaPanzer:minipanzer megapanzer minipanzer megapanzer two variants bundestrojaner german federal trojan horse written era solutions swiss federal government contractor software engineer ruben unteregger later used federal department environment transport energy communications uvek intercept skype generally voice ip traffic windows xp systems source code program released gnu general public license version 3 gplv3 2009 author retained copyright thereafter trojan apparently detected wild one designations given anti-virus companies trojan.peskyspy | [
5024,
9569,
11266,
10756,
6797,
7983,
9233,
499,
8726,
4314,
3867
] | None |
10,209 | 4 | Ghost_Push:ghost push ghost push family malware infects android os automatically gaining root access downloading malicious unwanted software malware appears discovered september 2015 security research lab cheetah mobile subsequently developed diagnostic software determine whether device compromised september 2015 twenty variants circulation latter day versions employed routines made harder detect remove malware hogs system resources making phone slow draining battery consuming cellular data advertisements continually appear either full partial screen ads status bar applications installed malware appear difficult remove impervious anti-virus software even surviving factory reset device infection typically comes via downloading applications third-party app stores least thirty-nine applications identified carriers peak ghost push virus infected 600,000 devices daily 50 infections occurring india well indonesia philippines ranking second third malware discovered september 2015 cheetah mobile security research lab | [
9356,
7515,
700,
7103
] | Test |
10,210 | 4 | Deep_content_inspection:deep content inspection deep content inspection dci form network filtering examines entire file mime object passes inspection point searching viruses spam data loss key words content level criteria deep content inspection considered evolution deep packet inspection ability look actual content contains instead focusing individual multiple packets deep content inspection allows services keep track content across multiple packets signatures may searching cross packet boundaries yet still found exhaustive form network traffic inspection internet traffic examined across seven osi iso layers importantly application layer traditional inspection technologies unable keep recent outbreaks widespread attacks unlike shallow inspection methods deep packet inspection dpi data part possibly also header packet inspected deep content inspection dci -based systems exhaustive network traffic packets reassembled constituting objects un-encoded and/or decompressed required finally presented inspected malware right-of-use compliance understanding traffic ’ intent reconstruction comprehension done real-time real-time policies applied traffic preventing propagation malware spam valuable data loss dci correlation comprehension digital objects transmitted many communication sessions leads new ways network performance optimization intelligence regardless protocol blended communication sessions historically dpi developed detect prevent intrusion used provide quality service flow network traffic prioritized latency-sensitive traffic types e.g. voice ip utilized provide higher flow priority new generation network content security devices unified threat management next generation firewalls garner ras core research note g00174908 use dpi prevent attacks small percentage viruses worms signatures malware fit within payload dpi ’ inspection scope however detection prevention new generation malware conficker stuxnet possible exhaustive analysis provided dci computer networks send information across network one point another data sometimes referred payload ‘ encapsulated ’ within ip packet looks follows networks evolve inspection techniques evolve attempting understand payload throughout last decade vast improvements including historically inspection technology examined ip header tcp/udp header dubbed ‘ packet filtering ’ devices would drop sequence packets packets allowed network scheme network traffic inspection first used firewalls protect packet attacks stateful packet inspection developed examine header information packet content increase source destination understanding instead letting packets result addresses ports packets stayed network context appropriate networks ’ current ‘ state ’ scheme first used check point firewalls eventually intrusion prevention/detection systems deep packet inspection currently predominant inspection tool used analyze data packets passing network including headers data protocol structures technologies scan packet streams look offending patterns effective deep packet inspection systems must ‘ string ’ match packet payloads malware signatures specification signatures dictate request/response like wire speeds fpgas field programmable gate arrays network processors even graphics processing units gpus programmed hardwired signatures result traffic passes circuitry quickly matched using hardware allows quick inline matches dpi systems following limitations including hardware limitations since dpi systems implement pattern matching searches ‘ offending ’ patterns hardware systems typically limited payload limitations web applications communicate content using binary-to-text encoding compression zipped archived etc obfuscation even encryption payload structure becoming complex straight ‘ string ’ matching signatures longer sufficient common workaround signatures similarly ‘ encoded ’ zipped given ‘ search limitations ’ scale support every application type nested zipped archived files parallel development deep packet inspection beginnings deep content inspection traced back early 1995 introduction proxies stopped malware spam deep content inspection seen third generation network content inspection network content exhaustively examined proxies deployed provide internet caching services retrieve objects forward consequently network traffic intercepted potentially stored graduated known secure web gateways proxy-based inspections retrieve scans object script images proxies relies fetch content first cached forwarding content recipient introduced form file inspection early 1995 mailsweeper released content technologies clearswift replaced mimesweeper 2005 2006 saw release open-source cross-platform antivirus software clamav provided support caching proxies squid netcache using internet content adaptation protocol icap proxy pass downloaded content scanning icap server running anti-virus software since complete files ‘ objects ’ passed scanning proxy-based anti-virus solutions considered first generation network content inspection bluecoat webwasher secure computing inc. mcafee division intel provided commercial implementations proxies eventually becoming standard network element enterprise networks limitations proxies secure web gateways provide in-depth network traffic inspection use limited second generation network traffic inspection solutions implemented firewalls and/or utms given network traffic choked devices addition dpi inspection proxy-like inspection possible approach first pioneered netscreen technologies inc. acquired juniper networks inc however given expensive cost operation feature applied tandem dpi system activated a-per-need basis content failed qualified dpi system third current generation network content inspection known deep content inspection solutions implemented fully transparent devices perform full application level content inspection wire speed order understand communication session ’ intent —in entirety— deep content inspection system must scan handshake payload digital objects executables images javascript ’ .pdfs etc also referred data-in-motion carried within payload constructed usability compliance threat analysis session payload achieved given handshake sequence complete payload session available dci system unlike dpi systems simple pattern matching reputation search possible exhaustive object analysis possible inspection provided dci systems include signature matching behavioral analysis regulatory compliance analysis correlation session inspection history previous sessions availability complete payload objects schemes inspection deep content inspection systems typically deployed high-grade security compliance required end-point security solutions possible bring device cloud installations third generation approach deep content inspection developed within defence intelligence community first appearing guard products sybard later wedge networks inc.. key-implementation highlights company approach deduced patent uspto 7,630,379 main differentiators deep content inspection deep content inspection content-focused instead analyzing packets classifying traffic based application types next generation firewalls understanding content intent highest level intelligence gained network traffic important information flow moving away packet towards application ultimately content example inspection levels availability complete objects payload deep content inspection system services/inspection examples include dci currently adopted enterprises service providers governments reaction increasingly complex internet traffic benefits understanding complete file types intent typically organizations mission-critical applications rigid requirements type inspection deals real time protocols continue increase complexity size one key barriers providing level inspection looking content dealing network throughput solutions must overcome issue introducing latency network environment must also able effectively scale meet tomorrow demands demands envisioned growing cloud computing trend one approach use selective scanning however avoid compromising accuracy selection criteria based recurrence following patent uspto 7,630,379 provides scheme deep content inspection carried effectively using recurrence selection scheme novelty introduced patent addresses issues content e.g. mp3 file could renamed transmission dealing amount traffic information applying services requires high speed look ups able effective need compare full services platforms else traffic utilized effectively example often found dealing viruses malicious content solutions compare content small virus database instead full complete one | [
3843,
10245,
10889,
9722,
8211,
11413,
7578,
3742,
8998,
6569,
4268,
10417,
7859,
2228,
10291,
10816,
5959,
8265,
11468,
7376,
11606,
855,
2136,
9048,
6490,
7515,
5084,
3930,
5472,
9318,
8039,
6762,
11248,
5749,
2169,
3322
] | Test |
10,211 | 9 | Joel_Moses:joel moses joel moses born 1941 israeli-american mathematician computer scientist institute professor emeritus massachusetts institute technology joel moses born mandatory palestine 1941 emigrated u.s. 1954 attended midwood high school brooklyn new york received undergraduate degree mathematics columbia university master degree mathematics also columbia supervision marvin minsky moses received doctorate mathematics mit 1967 thesis entitled symbolic integration laid groundwork macsyma symbolic mathematics program created mit largely supervision 1969 1983 macsyma able solve problems simplification polynomial factorization indefinite integration solution differential equations higher-order mathematical questions moses served administrative posts mit 1974 1998 associate director laboratory computer science head electrical engineering computer science department dean engineering provost also served acting director engineering systems division mit 2006 2007 acting director center technology policy industrial development 2007 2010 memoirs published interviewed occasion mit 150th anniversary appears independent documentary film called plug pray talks impact eliza computer program published joseph weizenbaum 1966 moses member national academy engineering fellow american academy arts sciences association computing machinery american association advancement science life fellow ieee | [
10083,
7048,
8587,
10581,
5783,
10778
] | Test |
10,212 | 2 | HiperDispatch:hiperdispatch hiperdispatch workload dispatching feature found newest ibm mainframe models system z10 ibm zenterprise system processors running recent releases z/os hiperdispatch introduced february 2008 support added z/vm v6r3 release july 26 2013 one engineering challenges large smp server designs maintain near-linear scalability number cpus increases performance throughput double doubling number processors many overhead factors including contention cache main memory access overhead factors become increasingly difficult mitigate number cpus increases design goal delivering maximum performance minimize overhead factors new mainframe model supports higher maximum number cpus 64 main processors single system z10 mainframe example engineering challenge becomes ever important hiperdispatch helps address problem combination hardware features z/os dispatching z/os workload manager z/os may tasks waiting processing attention transaction programs task often requires access memory large smp design system z cpus physically closer faster access cache memory might hold supporting data particular tasks hiperdispatch exploits fact steers tasks cpus likely fastest access relevant data already cache particular cpu busy hiperdispatch first wait finish task even another less favorable cpu idle however limitations patient hiperdispatch governed workload manager goals z/os workload manager senses risk pending task miss service level responding within certain number milliseconds user request example workload manager hiperdispatch send task idle cpu processing even cpu must fetch data slower main memory hiperdispatch offers little cpu savings benefit machines configured relatively small number cpus however feature help quite lot cpu count increases ibm mainframe capacity tables thus software pricing based assumption hiperdispatch active benefit hiperdispatch parking logical cpus number cpus z/os dispatches work closely matches lpar weight applicable even small machine configurations benefit reduction short engine effect making system performance responsive workload manager wlm must configured correctly hiperdispatch work well mainframe users latent problems wlm goal settings exposed hiperdispatch option disable hiperdispatch cases mainframe users want correct issues right away z/os system resource manager srm configure z/os system resource manager modify parmlib-member ieaoptxx hiperdispatch=yes|no yes srm turn hiperdispatch mode srm turn hiperdispatch mode partitions 64 logical processors ipl time forced run hiperdispatch=yes ipl lpars 64 logical processors switch hiperdispatch=no case hiperdispatch=yes z196 follow-on cpcs vary cpu management automatically turned independent varycpu -specification default value | [
2168,
7242,
7733,
7802
] | Test |
10,213 | 4 | Computer_security_incident_management:computer security incident management fields computer security information technology computer security incident management involves monitoring detection security events computer computer network execution proper responses events computer security incident management specialized form incident management primary purpose development well understood predictable response damaging events computer intrusions incident management requires process response team follows process definition computer security incident management follows standards definitions described national incident management system nims incident coordinator manages response emergency security incident natural disaster event requiring response emergency services incident coordinator would act liaison emergency services incident manager computer security incident management administrative function managing protecting computer assets networks information systems systems continue become critical personal economic welfare society organizations public private sector groups associations enterprises must understand responsibilities public good welfare memberships stakeholders responsibility extends management program “ things go wrong. ” incident management program defines implements process organization may adopt promote welfare security public event observable change normal behavior system environment process workflow person components three basic types events computer security information technology personnel must handle emergency events according well-defined computer security incident response plan incident event attributable human root cause distinction particularly important event product malicious intent harm important note incidents events many events incidents system application failure due age defect may emergency event random flaw failure incident security incident coordinator manages response process responsible assembling team coordinator ensure team includes individuals necessary properly assess incident make decisions regarding proper course action incident team meets regularly review status reports authorize specific remedies team utilize pre-allocated physical virtual meeting place investigation seeks determine circumstances incident every incident warrant require investigation however investigation resources like forensic tools dirty networks quarantine networks consultation law enforcement may useful effective rapid resolution emergency incident incident response steps detection- incident detected sensor network analyst user reporting something unusual his/her pc containment- event malicious network traffic computer virus incident response manager stop traffic taking computer network clean- run virus scan remove virus wipe computer clean reimage machine reverse engineering- use computer forensics tools understand malicious traffic occurred first place incident completely understood make plans decrease future risk | [
9319,
7560,
2090,
10190,
5327,
11198,
8533,
2558
] | Test |
10,214 | 3 | RAD5500:rad5500 rad5500 radiation-hardened 64-bit multi-core processor platform created bae systems electronics intelligence support based powerpc e5500 designed ibm freescale semiconductor successor rad750 rad5500 processor platform use high radiation environments experienced board satellites spacecraft rad5500 platform supports vpx high speed connectors ddr2/ddr3 memory serialize/deserialize serdes spacewire io rad5500 family radiation-hardened processors based versions freescale semiconductor e5500-based qoriq system-on-chip rad5510 rad5515 rad5545 radspeed-hb host bridge four system chip processors implemented rad5500 cores produced 45 nm soi technology ibm trusted foundry rad5510 rad5515 processors employ single rad5500 core intended medium processing capability environments require low power consumption 11.5 13.7 watts respectively processor provides 1.4 giga operations per second gops 0.9 gflops performance rad5545 processor employs four rad5500 cores achieving performance characteristics 5.6 giga-operations per second gops 3.7 gflops power consumption 20 watts peripherals operating based rad5545 radspeed-hb intended host processing data management support one four radspeed dsps radspeed-hb replaces secondary ddr2/ddr3 memory interface connection found rad5545 connections radspeed dsps instead note radspeed dsps entirely different processors specialized digital signal processing confused radspeed-hb serves host bridge rad5545 spacevpx single-board computer use harsh environmental conditions outer space designed operating temperatures −55 °c 125 °c radiation-hardened total ionizing dose 100 krad silicon chips 6u-220 format module compliant ansi/vita 78.00 spacevpx standard includes either rad5515 rad5545 processor rad5545 spacevpx single-board computer produced bae systems facility manassas virginia u.s. department defense category 1a microelectronics trusted source | [
6914,
4868,
10501,
3846,
4743,
6663,
5642,
1548,
1933,
398,
3472,
4881,
7065,
1563,
1309,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
8120,
6715,
9020,
1725,
1983,
1985,
5825,
10180,
336,
8530,
3540,
342,
9302,
11613,
6878,
163... | None |
10,215 | 2 | MotoMagx:motomagx motomagx linux kernel-based mobile operating system developed launched 2007 motorola run mid-to-high-end mobile phones system based montavista mobilinux originally intended 60 upcoming devices soon dropped favor android windows mobile operating systems motomagx compatible motorola gsm/umts devices shown due lack implementation compatible qualcomm cdma2000 devices result motorola often sold multiple device variants radically different firmware example motorola razr2 t-mobile shipped motomagx whereas razr2 verizon wireless shipped motorola p2k firmware created significant confusion customers user experience varied widely two identical devices simply based carrier phones based os | [
2179,
6276,
11271,
4364,
3089,
10393,
6301,
5406,
4383,
673,
3626,
7727,
3248,
7857,
7983,
823,
7991,
9784,
1083,
7483,
5824,
7492,
11079,
7246,
2001,
4305,
2259,
7253,
3542,
3162,
607,
10080,
2658,
8423,
10599,
3561,
6763,
6508,
2925,
49... | Train |
10,216 | 4 | The_Diana_Initiative:diana initiative diana initiative computer security conference based las vegas nevada aimed supporting women cybersecurity first diana initiative conference took place 2017 diana initiative founded cheryl biswas virginia robbins pablo breuer elizabeth etherington michael smith 2019 conference held westin las vegas def con | [
7449
] | Validation |
10,217 | 3 | Dragon_Slayer:_The_Legend_of_Heroes:dragon slayer legend heroes originally released 1989 nec pc-8801 within next years would also ported nec pc-9801 msx 2 sharp x68000 sega mega drive super famicom turbografx-cd pc engine cd-rom dragon slayer legend heroes barcode battler card set also released epoch co. 1992 pc engine version released united states turbografx-cd game series released us playstation portable remake legend heroes iv akai shizuku 1995 version game broadcast exclusively japanese markets via super famicom satellaview subunit name bs dragon slayer eiyu densetsu 1998 remake legend heroes bundled remake released playstation sega saturn korean conversion original pc-9801 version released ms-dos/ibm pc mantra samsung 1996 japanese pc edition released 1997 game soundtrack composed members soundtrack turbografx-16 version arranged upon release famitsu scored pc engine cd-rom version 29 40 1991 later scored super famicom version 29 40 1992 sega mega drive version 23 40 1994 january 1993 issue electronic games magazine electronic gaming awards nominated turbografx-cd version 1992 multimedia game year award stated demonstrates far multimedia come since design team ys ii mammoth quest meticulously detailed incorporates highly involved game play | [
770,
3113,
6797,
9006,
9166,
10931,
11443,
9658,
1596
] | Test |
10,218 | 4 | OneID:oneid oneid digital security service based redwood city california oneid sells digital identity system claims provide security across devices using public key cryptography instead passwords technology utilized non-profits salsa labs increase frequency security online donations company founded 2011 serial entrepreneur steve kirsch kirsch recruited engineers jim fenton adam back bobby beckmann create flagship product launched early 2012 following launch company raised us 7 million venture capital financing menlo park-based venture capital firm khosla ventures following series alex doll took position ceo doll previously executive-in-residence khosla ventures founding executive pgp corp. doll appointment founder kirsch moved cto role shirish sathaye general partner khosla ventures jonathan heiliger added oneid board directors following growth period late 2013 company appointed kirsch ceo 2014 fast company named oneid one top 10 innovative companies finance | [] | Test |
10,219 | 7 | Lucidpress:lucidpress lucidpress web-based desktop publishing software application developed lucid software used create brochures flyers newsletters business cards posters magazines presentations built web standards html5 javascript lucidpress supported modern web browsers including google chrome firefox safari internet explorer 8+ though started platform single users small businesses lucidpress found substantial user bases education enterprise spaces october 2013 lucid software announced lucidpress public beta version following release lucidpress featured techcrunch venturebeat pc world techcrunch noting chance test app launch indeed easy use 've ever used desktop publishing app past 'll feel right home lucidpress features kind standard top-bar menu layout options publishing apps terms features also hold similar desktop-based apps october 2013 lucidpress became available g suite marketplace may 2015 lucidpress hit 1 million users one year later june 2016 lucidpress hit 2 million users announced advanced template locking feature november 2016 lucidpress announced print ship feature users order printed versions documents create lucidpress october 2016 lucidpress conducted survey research firm demand metric impact brand consistency report titled impact brand consistency contains insights 200 senior marketing brand leaders found among insights consistent brand marketing worth estimated 23 increase revenue lucid software raised 1 million seed 2011 led google ventures may 2014 company received 5 million investment round led salt lake-based kickstart seed fund september 2016 company received 36 million investment spectrum equity whose previous investments include online platforms ancestry.com lynda.com prezi surveymonkey kickstart seed fund grayhawk capital also participated round lucidpress alternative complex design programs like adobe indesign microsoft publisher especially mac users design capabilities range single-page documents like business cards flyers multi-page documents like annual reports digital magazines lucidpress accessible anywhere modern web browsers documents securely stored cloud application require download incorporating real-time collaborative editor lucidpress allows multiple users edit document simultaneously users also make comments chat collaborators real time lucidpress content published several different mediums including lucidpress offers large library templates designing print digital content template categories include lucidpress fully integrated google drive google apps known g suite lucidpress integration consistently one top productivity apps g suite marketplace users import images flickr facebook dropbox | [
3462,
7983,
4623,
5078,
6367
] | Test |
10,220 | 3 | VAXft:vaxft vaxft family fault-tolerant minicomputers developed manufactured digital equipment corporation dec using processors implementing vax instruction set architecture isa vaxft stood virtual address extension fault tolerant systems ran openvms operating system first supported vms 5.4 two layered software products vaxft system services vms volume shadowing required support fault-tolerant features vaxft redundancy data stored hard disk drives vaxft systems shared basic system architecture vaxft system consisted two zones operated lock-step zone zone b zone fully functional computer capable running operating system identical hardware configuration lock-step achieved hardware cpu module cpu module zone connected crosslink cable crosslink cables carried results instructions executed one cpu module compared hardware results instructions executed latter ensure identical two zones kept synchronous clock signal carried crosslink cables hardware failure occurred one zones affected zone brought offline without bringing zone continued operate normal repairs completed offline zone powered automatically resynchronized zone restoring redundancy vaxft model 310 introduced vaxft 3000 model 310 code named cirrus introduced february 1990 shipped june first vaxft model dec first fault-tolerant computer generally available 1991 launch new vaxft models vax 3000 model 310 renamed follow new naming scheme becoming vaxft model 310 model 310 theoretical maximum performance 3.8 vups announced model 310 starting price us 200,000 august 1990 slow sales prompted dec reduce us price model 310 us 168,000 used ka520 cpu module containing 16.67 mhz 60 ns cycle time cvax+ chip set 32 kb external secondary cache system contained two cpu modules one zone running lock-step vaxft model 110 code named cirrus entry-level model announced 18 march 1991 alongside three models model 110 essentially low-cost model vaxft model 310 theoretical maximum performance 2.4 vups contained two zones packed side side enclosure compared model 310 limited expandability regards memory storage capacity available options available either pedestal rackmount configuration rackmount configuration pedestal without plastic covers casters fitted standard 19-inch retma cabinet zone five-slot backplane ka510 cpu module one three 32 mb ms520 memory modules one two kfe52 system i/o controller modules one two dec wancontroller 620 dsf32 wide area network wan communications adapters leftmost slot first slot primary system controller resided first slot cpu module second memory modules third fourth fifth slots second system i/o controller resided either fourth fifth slots wan communications adapters also fourth fifth slots basic system contained cpu module memory module system i/o controller dec wancontroller 620 designed use vaxft systems provided two synchronous lines bandwidth 64 kb lines could operated two independent lines paired provide redundancy vaxft model 410 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 410 identical model 310 used ka550 cpu module containing 28.57 mhz 35 ns cycle time soc microprocessor 128 kb external secondary cache supported 256 mb memory model 410 theoretical maximum performance 6.0 vups vaxft model 610 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 610 architecturally identical model 410 except two zones packaged vertically 60 high cabinet zone zone b cabinet storage capacity systems packaged pedestals reason model 610 intended data centers could one two expander cabinets placed left right system additional storage devices cabinets front rear cooled vaxft model 612 high-end model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 612 vaxcluster two vaxft model 610s expansion cabinet positioned two systems standard theoretical maximum performance 12.0 vups second expansion cabinet could added two system cabinets vaxft model 810 code named jetstream high-end model introduced october 1993 instead targeted introduction date late summer early fall 1992 system developed dec manufactured italian industrial manufacturer alenia spa theoretical maximum performance 30.0 vups model 810 third generation vaxft system contained two zones vertically packaged cabinet optional expansion cabinet could connected system addition two uninterruptable power supplies one zone used ka560-aa cpu module contained two 83.33 mhz 12 ns cycle time nvax+ microprocessors 512 kb b-cache l2 cache module two microprocessors operated lock-step fashion like previous vaxft systems two cpu modules system one two zones operated lock-step fashion model 810 cabinet 60.0 cm 24 wide 170.0 cm 67 high 86.0 cm 34 deep | [
7234,
3142,
8390,
3945,
8474,
10733,
5358,
7983,
9742,
5873,
10734,
499,
11604,
1722,
9723,
8732
] | Validation |
10,221 | 2 | Gatekeeper_(macOS):gatekeeper macos gatekeeper security feature macos operating system apple enforces code signing verifies downloaded applications allowing run thereby reducing likelihood inadvertently executing malware gatekeeper builds upon file quarantine introduced mac os x leopard expanded mac os x snow leopard feature originated version 10.7.3 mac os x lion command-line utility spctl graphical user interface added os x mountain lion later also version 10.7.5 lion security privacy panel system preferences user three options command-line utility spctl provides granular controls custom rules individual blanket permissions well option turn gatekeeper upon download application particular extended file attribute quarantine flag added downloaded file attribute added application downloads file web browser email client added torrent downloaders transmission bittorrent client bit torrent behavior disabled default third-party applications developers need opt system also force behavior upon individual applications using signature-based system named xprotect user attempts open application attribute system delay execution verify whether since snow leopard system keeps two blacklists identify known malware insecure software blacklists updated periodically application blacklisted file quarantine refuse open recommend user move trash gatekeeper refuse open application code-signing requirements met apple revoke developer certificate application signed prevent distribution application passed file quarantine gatekeeper allowed run normally verified override gatekeeper user acting administrator either switch lenient policy security privacy panel system preferences authorize manual override particular application either opening application context menu adding spctl developers sign disk images verified unit system macos sierra allows developers guarantee integrity bundled files prevent attackers infecting subsequently redistributing addition path randomization executes application bundles random hidden path prevents accessing external files relative location feature turned application bundle originated signed installer package disk image user manually moved application without files another directory effectiveness rationale gatekeeper combating malware acknowledged met reservations security researcher chris miller noted gatekeeper verify developer certificate consult known-malware list application first opened malware already passed gatekeeper stopped addition gatekeeper verify applications quarantine flag flag added applications system neglect failure trigger gatekeeper according security blogger thomas reed bittorrent clients frequent offenders flag also added application came different source like network shares usb flash drives questions also raised registration process acquire developer certificate prospect certificate theft september 2015 security researcher patrick wardle wrote another shortcoming concerns applications distributed external files libraries even html files contain javascript attacker manipulate files exploit vulnerability signed application application external files redistributed leaving original signature application bundle intact gatekeeper verify individual files security compromised path randomization signed disk images apple provided mechanisms mitigate issue macos sierra | [
5636,
4615,
10765,
5647,
1042,
6700,
4657,
1074,
576,
9802,
5713,
3670,
4184,
2141,
4702,
2149,
8303,
6771,
2676,
6264,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
6849,
70... | None |
10,222 | 2 | Rudder_(software):rudder software rudder open source audit configuration management utility help automate system configuration across large infrastructures rudder relies lightweight local agent installed managed machine rudder produced normation founded 2010 server-side web interface written scala local agent written c published free software gnu general public license 3.0 rudder created founding team normation first released free software october 2011 rudder 3.0 released february 2015 following operating systems supported root server following operating systems supported rudder nodes packages available platforms | [
4194,
6797,
7983,
5397,
3705,
8378,
9948,
2045
] | None |
10,223 | 3 | Smartbook:smartbook smartbook class mobile device combined certain features smartphone netbook computer produced 2009 2010 smartbooks advertised features always all-day battery life 3g wi-fi connectivity gps typically found smartphones laptop tablet-style body screen size 5 10 inches physical soft touchscreen keyboard german company sold laptops brand smartbook held trademark word many countries including big markets like united states china japan india acted preempt others using term smartbook describe products smartbooks tended designed entertainment purposes productivity typically targeted work online applications projected sold subsidized mobile network operators like mobile phones along wireless data plan advent much popular tablets like android tablets ipad coupled prevailing popularity conventional desktop computers laptops displaced smartbook smartbook concept mentioned qualcomm may 2009 marketing snapdragon technology products expected later year difficulties adapting key software particular adobe proprietary flash player arm architecture delayed releases first quarter 2010 smartbooks would powered processors energy-efficient traditional ones typically found desktop laptop computers first smartbooks expected use variants linux operating system google android chrome os arm processor would allowed achieve longer battery life many larger devices using x86 processors february 2010 abi research projected 163 million smartbooks would ship 2015 many countries word smartbook trademark registered smartbook ag august 2009 german court ruled qualcomm must block access germany webpages containing word smartbook unless smartbook ag mentioned smartbook ag defended trademark february 2010 ruling prevented lenovo using term end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped february 2011 qualcomm legal battle german patent office ruled words smart book could used however several trademarks registered march 2009 always innovating company announced touch book based texas instruments omap 3530 implemented arm cortex-a8 architecture originally developed texas instruments beagle board touchscreen detachable keyboard contained second battery device came linux operating system company offered license hardware designs sharp electronics introduced pc-z1 netwalker device august 2009 promised ship date october 2009 featured 5.5 touchscreen runs ubuntu arm cortex-a8 based freescale i.mx515 packaged small clamshell design sharp reported device weighs less 500 grams run 10 hours one battery charge device said run 720p video 2d 3d graphics acceleration comes adobe flash lite 3.1 installed pegatron asus company showed working prototype smartbook august 2009 consisted arm cortex-a8 based freescale i.mx515 supports 2d/3d graphics well 720p hd video 512 mb ddr2 ram 1024x600 8.9 lcd screen bluetooth 2.0 802.11g run sd card also featured one usb one micro usb port vga port well card reader smartbook ran ubuntu netbook 9.04 contained version adobe flash player date bill materials pegatron smartbook prototype 120 november 2009 pegatron said received large number orders smartbooks would launch early 2010 devices rumored sell 200 subsidized asus announced plans release smartbook first quarter 2010 asus later postponed smartbook launch second quarter 2010 qualcomm expected announce smartbook november 12 2009 analyst meeting lenovo device concept shown announced january 2010 may 2010 skylight cancelled late january 2010 u.s. federal communications commission fcc listing featured device hp referred smartbook prototype device already shown earlier beginning february mobile world congress barcelona hp announced bring device market specifications likely following end march 2010 smartbook made appearance fcc time listing 3g capabilities according fcc device support gsm 850 1900 well wcdma ii v bands wcdma bands may indicate usage network united states details product available hp website june 2010 smartbook device toshiba announced features nvidia tegra processor able remain stand-by mode 7 days device officially available toshiba united kingdom site originally delivered android v2.1 upgradable v2.2 since 2011 also modified run customized linux distribution japan sold dynabook az genesi company announced mx smartbook part efika line august 2010 originally priced us 349 reviewers questioned small enough fit definition ostensibly derivative above-mentioned pegatron design september 2009 foxconn announced working smartbook development november 2009 quanta computer pre-production snapdragon powered sample smartbook device ran android unveiled companies like acer inc. planned release smartbook due popularity tablets macbook air ultrabooks plans scrapped | [
9863,
5384,
6539,
10768,
4264,
7983,
5681,
11062,
823,
9913,
1083,
10945,
1480,
2635,
5963,
9163,
3537,
6618,
7519,
8044,
9964,
6001,
499
] | Test |
10,224 | 3 | Motorola_68881:motorola 68881 motorola 68881 motorola 68882 floating-point coprocessor fpu devices used computer systems conjunction 68020 68030 microprocessors motorola 68881 introduced 1984 addition one devices added substantial cost computer added floating-point unit could rapidly perform floating point mathematical calculations mid 1980s feature useful mostly scientific mathematical software 68020 68030 cpus designed separate 68881 chip mind instruction sets reserved f-line instructions – opcodes beginning hexadecimal digit f could either forwarded external coprocessor used traps would throw exception handing control computer operating system fpu present system os would either call fpu emulator execute instruction equivalent using 68020 integer-based software code return error program terminate program crash require reboot 68881 eight 80-bit data registers 64-bit mantissa plus sign bit 15-bit signed exponent allowed seven different modes numeric representation including single-precision double-precision extended-precision defined ieee floating-point standard ieee 754 designed specifically floating-point math general-purpose cpu example instruction required address calculations main cpu would handle 68881 took control cpu/fpu pair designed could run time cpu encountered 68881 instruction would hand fpu operands needed instruction fpu would release cpu go execute next instruction 68882 improved version 68881 better pipelining eventually available higher clock speeds instruction set exactly 68881 motorola claimed marketing literature executed instructions 40 faster 68881 clock speed though reflect typical performance seen modest improvement table 68882 pin compatible 68881 used direct replacement systems important software incompatibility 68882 used larger fsave state frame affected unix preemptive multitasking oses modified allocate space 68881 68882 used sun microsystems sun-3 workstations ibm rt pc workstations apple computer macintosh ii family next computer sharp x68000 amiga 3000 atari mega ste tt falcon030 third-party amiga atari products used 68881 68882 memory-mapped peripheral 68000 statistics came comp.sys.m68k faq statistics listed 16 mhz 20 mhz 68882 though chips indeed produced starting motorola 68040 floating point support included cpu | [
7299,
3844,
4741,
1158,
4868,
7302,
7305,
10501,
3467,
1548,
6415,
5264,
7830,
6807,
2073,
7065,
8102,
7211,
7983,
5297,
11314,
1461,
11447,
8761,
6715,
8893,
1983,
7104,
9665,
1090,
10945,
4807,
3017,
4810,
8525,
336,
8530,
3540,
3932,
2... | Test |
10,225 | 3 | Intel_Socket_G3:intel socket g3 socket g3 also known rpga 946b/947 fcpga 946 socket intel microprocessors supports haswell-based mobile cpus compatible skus 'm suffix model number socket g3 designed replacement socket g2 also known rpga 988b socket g3 holes make contact 946 947 pins processor pin grid array pga lynx point platform controller hub pch associated socket g3 socket rpga 947 one extra pin hole identical socket g3 last pin grid array socket intel mobile processors mobile processors microarchitectures succeding haswell exclusively available bga packaging | [
3588,
5901,
7058,
5523,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
2237,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
1260,
4717,
371,
95... | Train |
10,226 | 7 | Email_backbone:email backbone email backbone typically middleware email infrastructure manages smtp-based applications internal external email message routing policy management enforcement email backbone normally portion email infrastructure sits gateway dmz layer “ email groupware system ” layer messaging infrastructure microsoft exchange lotus notes/domino email backbone sometimes referred messaging fabric messaging infrastructure layer many businesses either considering actively migrating cloud-based email offer number important benefits benefits may include lower cost ownership predictable costs shift capital expenditure capex operational cost opex model less demand internal resources typical email infrastructure functions moved cloud include email filtering layer spam virus protection message archiving email groupware system mailboxes email backbone layer typically stays on-premises benefits moving email cloud compelling quantifiable advantages keeping email backbone layer messaging infrastructure on-premises leveraging cloud-based services common email functions spam virus filtering end user mailbox system microsoft exchange example on-premises email backbone provide policy management enforce outbound messaging policies encrypting sensitive messages contents email leaves organization benefits on-premises email backbone include ability manage wide variety mobile platforms potentially lower cost ability maintain legacy records management systems integration existing voicemail systems many organizations complex routing smtp application requirements require use email backbone even key parts email infrastructure migrated cloud example routing control requirements quite complex often satisfied cloud-based email systems examples requirements include enterprise level choice manage email decision on-premises cloud rather services remain on-premises managed cloud next several years email management evolve toward hybrid model using email backbone virtually smallest organizations | [
4194,
5608,
9909,
8122,
9053
] | None |
10,227 | 7 | Clesh:clesh clesh clip load edit share cloud-based video editing platform designed consumers prosumers online communities integrate user generated content core technology based forscene geared towards professionals working example broadcasting news media post production video audio graphical content uploaded clesh via standard web browser mobile device phone tablet desktop software dv capture firewire hosted material reviewed searched edited published online anyone standard web browser compatible mobile device clesh supports storyboard shot selection frame-accurate editing transitions various functions pan zoom colour light correction audio levels content published formats example podcast mpeg2 html5 video proprietary java format cloud-based software provides greater scope sharing information collaborating compared lan desktop based systems users cloud-based software rely cloud owner adequate security performance resilience clesh assert rights uploaded content contrast platforms youtube rights content uploaded clesh remain author services available clesh users clesh based technology forscene array servers internet backbone provide cloud computing platform host clesh white-label solution clesh would branded hosted per client requirement end-users access clesh rich user interface clients standard java-enabled web browsers android enabled mobile devices tablets smartphones clesh launched january 2006 subject several upgrades year extend functionality including storyboard podcasting moderation chat showreel 2007 consumers offered clesh via subscription model upgrades include web start graphics upload mr paparazzi selects clesh platform host video offering truetube 2008 choosing use clesh manage video portal several upgrades applied include better audio quality image enhancement controls transitions fades titles additional publishing options jpeg 2010 version clesh demonstrated android os tablet device samsung galaxy tab several upgrades applied including html5 publishing pan zoom overlays | [
3593,
4194,
1083,
3300
] | None |
10,228 | 9 | Ioke_(programming_language):ioke programming language ioke dynamic strongly typed prototype-based programming language targeting java virtual machine common language runtime designed ola bini developer jruby simple homoiconic syntax somewhat similar io ioke designed expressiveness else including performance designed important tool example language-oriented programming encourages creation domain-specific languages ioke first announced november 6 2008 ioke code contains documentation unit tests | [
9345,
6502,
9926,
11625,
8430,
10198,
1591,
9245,
5567
] | Train |
10,229 | 2 | Windows_Rally:windows rally windows rally set technologies microsoft intended simplify setup maintenance wired wireless network-connected devices aim increase reliability security connectivity users connect devices internet computers running microsoft windows technologies provide control network quality service qos diagnostics data sharing communications entertainment windows rally technologies provide provisioning following devices windows rally includes following set technologies link layer topology discovery lltd protocol enables applications discover devices determine network topology windows vista enables graphical view devices network network map windows xp computers appear network map lltd responder must downloaded installed devices provide audio video playback bandwidth sensitive implement qos extension part protocol receive prioritized streams changes available bandwidth less impact playback experience windows vista includes qwave pre-configured quality service api time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets delayed little possible providing high quality channel data packets qwave-enabled applications together devices implement lltd qos extensions aim improve end user experience streaming video prioritizing traffic reducing effects network-related transient issues windows connect wcn name windows rally technologies aimed simpler wireless device configuration windows connect users running windows vista windows xp sp2 create network configuration settings transmit access point alternatively users also print configuration settings reference manually configuring device windows connect one following methods may used easier configuration devices profile web services dpws standard defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices dpws describes set requirements enable device discovered clients describe available services clients dpws similar universal plug play upnp fully aligned web services technology supports standards device connectivity ws-discovery ws-eventing includes numerous extension points allowing integration device-provided services enterprise-wide application scenarios roaming devices work across internet windows vista web services devices wsdapi unmanaged code implementation devices profile web services dpws standard windows communication foundation wcf executes managed code offers enterprise-level services web services solutions windows xp windows vista support simple service discovery protocol ssdp ws-discovery extensible discovery support protocols windows vista includes function discovery api function discovery serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection function discovery api aims create applications enumerate system resources use devices specific type discover manage lists devices objects sorted functionality class whether local network connected function discovery supports extensible discovery provider model vendors also create custom provider expose resources function discovery pnp-x uses ssdp ws-discovery network communication protocols make network-connected devices discoverable connected directly computer bus universal serial bus usb pnp-x allows network-connected devices appear devices inside windows connected physically provides installation experience similar attaching bus-connected device device manufacturer implements pnp-x capabilities supplement either upnp web services devices wsd enabled devices result end users device relatively easy install traditional plug play devices universal plug play upnp ip-based protocol suite based preliminary versions web services protocols xml simple object access protocol soap upnp device dynamically join network obtain ip address convey capability discover presence capabilities devices network information set services particular device type provide captured xml device description document device hosts device description also lists properties device name icons associated device upnp adopted widely devices interact home network audio-video scenarios upnp supported windows windows xp windows vista windows vista upnp integrated pnp-x function discovery | [
10243,
9734,
10769,
9234,
1043,
540,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
10829,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
651,
5259,
653,
6797,
3224,
4771,
7846,
10414,
8391,
6353,
21... | Test |
10,230 | 3 | Rent's_rule:rent rule rent rule pertains organization computing logic specifically relationship number external signal connections logic block i.e. number pins number logic gates logic block applied circuits ranging small digital circuits mainframe computers 1960s e. f. rent ibm employee found remarkable trend number pins terminals boundaries integrated circuit designs ibm number internal components g logic gates standard cells log–log plot datapoints straight line implying power-law relation formula_1 p constants p 1.0 generally 0.5 p 0.8 rent findings ibm-internal memoranda published ibm journal research development 2005 relation described 1971 landman russo performed hierarchical circuit partitioning way hierarchical level top-down least number interconnections cut partition circuit less equal parts partitioning step noted number terminals number components partition partitioned sub-partitions found power-law rule applied resulting versus g plot named rent rule rent rule empirical result based observations existing designs therefore less applicable analysis non-traditional circuit architectures however provides useful framework compare similar architectures christie stroobandt later derived rent rule theoretically homogeneous systems pointed amount optimization achieved placement reflected parameter formula_2 rent exponent also depends circuit topology particular values formula_3 correspond greater fraction short interconnects constant formula_4 rent rule viewed average number terminals required single logic block since formula_5 formula_6 random arrangement logic blocks typically formula_7 larger values impossible since maximal number terminals region containing g logic components homogeneous system given formula_8 lower bounds p depend interconnection topology since generally impossible make wires short lower bound formula_9 often called intrinsic rent exponent notion first introduced hagen et al used characterize optimal placements also measure interconnection complexity circuit higher intrinsic rent exponent values correspond higher topological complexity one extreme example formula_10 long chain logic blocks clique formula_7 realistic 2d circuits formula_9 ranges 0.5 highly-regular circuits sram 0.75 random logic system performance analysis tools bacpac typically use rent rule calculate expected wiring lengths wiring demands estimate rent exponent one use top-down partitioning used min-cut placement every partition count number terminals connected partition compare number logic blocks partition rent exponent found fitting datapoints log–log plot resulting exponent p optimally partitioned circuits formula_13 longer case practical heuristic partitioning approaches partitioning-based placement algorithms formula_14 landman russo found deviation rent rule near far end i.e. partitions large number blocks known region ii rent rule similar deviation also exists small partitions found stroobandt called region iii another ibm employee donath discovered rent rule used estimate average wirelength wirelength distribution vlsi chips motivated system level interconnect prediction workshop founded 1999 entire community working wirelength prediction see survey stroobandt resulting wirelength estimates improved significantly since used technology exploration use rent rule allows perform estimates priori i.e. actual placement thus predict properties future technologies clock frequencies number routing layers needed area power based limited information future circuits technologies comprehensive overview work based rent rule published stroobandt | [
2874,
3323,
3886
] | Test |
10,231 | 0 | Text_simplification:text simplification text simplification operation used natural language processing modify enhance classify otherwise process existing corpus human-readable text way grammar structure prose greatly simplified underlying meaning information remains text simplification important area research natural human languages ordinarily contain complex compound constructions easily processed automation terms reducing language diversity semantic compression employed limit simplify set words used given texts text simplification illustrated example siddharthan 2006 first sentence contains two relative clauses one conjoined verb phrase text simplification system aims simplify first sentence second sentence “ ability simplify means eliminate unnecessary necessary may speak ” | [
5122,
2440,
2059,
6798,
11538,
1044,
5399,
538,
3748,
7599,
4531,
4662,
2999,
3127,
2488,
10557,
1214,
6208,
3533,
5197,
6223,
8538,
5857,
7780,
7918,
8046,
8688,
887,
8440,
7164
] | Test |
10,232 | 4 | Defense_in_depth_(computing):defense depth computing defense depth also known castle approach information assurance ia concept multiple layers security controls defense placed throughout information technology system intent provide redundancy event security control fails vulnerability exploited cover aspects personnel procedural technical physical security duration system life cycle idea behind defense depth approach defend system particular attack using several independent methods layering tactic conceived national security agency nsa comprehensive approach information electronic security term defense depth computing inspired military strategy name quite different concept military strategy revolves around weaker perimeter defense intentionally yielding space buy time envelop ultimately counter-attack opponent whereas ia strategy simply involves parallel systems controls intentionally ceding ground cf honeypot defense depth divided three areas physical technical administrative physical controls anything physically limits prevents access systems fences guards dogs cctv systems like technical controls hardware software whose purpose protect systems resources examples technical controls would disk encryption fingerprint readers windows active directory hardware technical controls differ physical controls prevent access contents system physical systems administrative controls organization policies procedures purpose ensure proper guidance available regards security regulations met include things hiring practices data handling procedures security requirements usage non-standard ports valid means security using one following layers constitutes defense depth | [
3843,
11526,
2324,
5245,
8343,
2084,
2213,
8998,
9256,
7979,
3629,
5433,
3262,
4552,
7887,
10207,
10466,
5608,
4972,
11244,
5749,
5373,
2558
] | Test |
10,233 | 4 | Vault_Corporation:vault corporation vault corporation founded 1981 w. krag brotby unsung technology pioneer already successful real-estate entrepreneur brotby authored book software program called tax cash frustrated pirating software people making copies free without paying brotby came mechanism attempt defeat illegal copying called prolok disk us patent 4,785,361 technology influential many later copy-protection techniques original patent referenced 140 later patents prolok used many early 80 software companies including ashton-tate developers first massively successful pc database software vault also invested millions dollars legal front behalf software industry whole authoring testing first many controversial shrink wrap software law vault contract ultimately defeated 5th circuit federal appeals court | [] | Test |
10,234 | 3 | The_Return_of_Ishtar:return ishtar translating english resurrection ishtar action role-playing arcade game released namco 1986 runs namco system 86 hardware sequel tower druaga released two years earlier second game company babylonian castle saga series later ported msx nec pc-8801 fm7 sharp x68000 platforms also included namco museum volume 4 playstation return ishtar adventure game requires two players also first game namco password feature give players opportunity continue left first feature scoring system player 1 controls priestess ki fights magic player 2 controls sword-wielding prince gilgamesh sequel starts directly gilgamesh saved ki druaga focuses escape tower inhabitants gilgamesh ki avenge former master total 128 rooms sixty-floor tower screen scroll according ki location second player stay close partner traverse tower ki attacks casting spells enemies gilgamesh automatically draws sword whenever enemy gets close enough allowing attack enemy bumping blade similar adol ys games however colliding enemies also damage gilgamesh counter bottom-right screen decrease preset amount depending enemy type counter reaches 0 disappear game players also happen ki touched enemy also several different items found rooms collected aid gilgamesh ki quest easter egg game designer masanobu endō appears unconscious desk dead end room ki use blue crystal rod spell wake proceed warp gilgamesh calvary prison room reviewing namco museum volume 4 jeff gerstmann gamespot described return ishtar plain weird incredibly boring electronic gaming monthly shawn smith said genji heike clans pretty lame due difficult control games ... well fun | [
1776,
5753,
10931,
9006
] | Train |
10,235 | 2 | VS/9:vs/9 vs/9 discontinued computer operating system available univac series 90 mainframes 90/60 90/70 90/80 late 1960s 1980s 90/60 90/70 repackaged univac 9700 computers rca acquisition sperry determined rca tsos operating system far advanced univac counterpart company opted merge univac hardware rca software introduced 90/70 90/60 introduced shortly thereafter slower less expensive 90/70 introduction 90/80 vs/9 finally hardware platform optimized take full advantage capability allow interactive batch operations computer september 1971 rca decided exit mainframe computer business losing half billion dollars trying failing compete ibm assets computer division sold univac included rca spectra series computers various external hardware designs video terminals tape drives punched card readers operating system time sharing operating system tsos tsos may better operating system user standpoint ibm time operating systems considered something sold separately computer manufacturer included free part purchase price univac introduced additional new features tsos renamed vs/9 name 'tsos however remained username primary privileged system manager account unix-type systems called 'root rca also sold tsos would become fujitsu basis fujitsu bs2000 operating system mainframes name interactive use vs/9 done terminals connected terminal concentrator unit passed control signals terminals manner similar way ibm would provide ibm 3270-style terminals provided general input terminal sent response enter key opposed practice pcs taking input one character time concentrator unit originally known communications control module ccm however rca sold patents designs ccm terminal controller singer corporation univac developed emulator device ccm known multiterminal connection controller model 16 mcc-16 mcc-16 supported univac standard terminal rca renamed uniscope video display terminal vdt well ordinary ascii dumb terminals univac uniscope vdt provided sophisticated time editing capability including ability edit text screen make changes line time page time transmit text back computer vdt also supported direct cursor positioning input protection cursor indicated text cursor recognized also supported special scroll mode subset screen window instead entire screen scrolling upward last line displayed possible make scroll area bottom half screen feature split screen scroll would become available 20 years later apple ii microcomputer distinction made interactive timesharing terminals transactional terminals interactive terminals controlled directly operating system transactional terminals controlled batch program initially batch program known mcp multichannel communications program developed rca sperry batch-oriented operating systems tdos tape-disk operating system dos disk operating system became clear would phased favor much robust interactive operating system vmos mcp ported run vmos vmos virtual memory operating system became new moniker tsos rca spectra 70 models 46 61 3 7 computers initially univac series 70 formerly rca computers eventually mcp enhanced support sperry univac terminals name changed cos communication operating system ports ccm later mcc running emulation mode could designated either interactive transactional port designated interactive port controlled timesharing services integrated vmos vs/9 operating system transactional ports hand controlled cos. terminals connected ports became property respective controlling host software timesharing used program development allowing much faster program development traditional batch process state art time timesharing user task could execute programs create files request system resources needed made much possible operating system ability manage virtual memory temporarily save pages memory including executing programs disk drum use retrieve later needed virtual memory page size fixed 4096 bytes allowed many tasks running simultaneously would otherwise constrained limited expensive main memory space transactional users hand controlled single program view environment limited presented identified individual tasks ability run programs request system resources ccm mcc running emulation mode dumb hardware interfaces network protocol intelligence including terminal polling error recovery message construction resided mainframe ccm mcc simply acted conduits mainframe phone lines mcc used true front end processor much overhead polling error recovery offloaded mainframe thus freeing computer time running application programs occur vs/9 era vs/9 supported one card readers connected computer activated user placing card deck hopper pressing start button presumably computer would read source deck place cards read output hopper card deck consisted valid login would process card deck job execute vs/9 controlled computer operator central site computer operators interacted system system console initially console teletype device later upgraded video display device attached system console printer system console messages logged system console printer unsolicited messages originating operating system also logged system console printer computer operators number responsibilities one useful enhancements late life vs/9 volume groups disk technology time provided limited storage space disk since disk drives comparatively large quite expensive manufacturers disk drives provided capability physically remove actual disk device replace another customers thus ability store many times capacity disk drives albeit could necessarily used simultaneously unless enough free disk drives limited disk storage space also presented users another problem often files would larger could contained one disk volume groups helped mitigate technological problem allowing files span multiple disks volumes disks mounted simultaneously designated volume group owners could defined order limit access sensitive data mounted attached active task entire volume group could dismounted attached tasks either released terminated every disk available system part volume group even one volume group volume groups could designated removable fixed fixed volume groups could removed time necessary disks housed operating system files supported transactional terminals remote batch processing rbp capability existed vs/9 although never completely exploited probably due limited demand rbp allowed remote users submit batch jobs execution mainframe receive results back offsite printer typically remote batch device consisted card reader printer connected communication line interfaced remote batch services operating system like local batch job operators could receive requests tape disk mounts/dismounts program prompts responses questions vs/9 managed tasks task type task types could either executing programs queues pending tasks following task types used vs/9 mcp cos always type 2 tasks computer operator would see count number tasks within queue system console complete list task queues available interactive terminal administrator access via field-written program known stat200 program would scan task queues every seconds display rolling list tasks terminal screen interrupted terminated officially released product became de facto standard task monitoring vs/9 controlled access use account name user name account name 1 7 character identifier user name also 1 8 character identifier identifiers account names user names could letters numbers account name equivalent directory name unix-style user accounts note user name indicated person sharing account party using thus example account name s0103 two users whose name pat leslie account would complete identifier s0103 pat s0103 leslie files would stored directory s0103 thus could create files name note account name say pa5 user named pat identifier would pa5 pat would completely unrelated user named pat accounts could given restrictions requiring password use limits amount files amount usage time permitted usage allowing logons 5 p.m. 8 a.m. cpu limits user could also issue commands system interrupt program current session used certain amount wall-clock cpu time user terminal logged wanted start session would press red transmit key univac vdt use control-c ascii terminal vs/9 would issue following response followed slash case univac vdt prompt character looked like inverse color greater sign user would logon typing word 'logon followed identifier e.g account name comma user name password account would type comma followed password could 1 4 characters contained one spaces trailing spaces could omitted typed single quotes contained non-printable binary characters typed using letter x followed quote 8-character hexadecimal value password account s0103 password hexadecimal a0b0c0 space user leslie would logon system typing credentials incorrect either account name user name password incorrect would get message would given prompt logon credentials correct system manager owner account tsos posted system message would display time user would command mode standard prompt would appear could type various commands user would finish session typing logoff pressing transmit univac vdt control-c ascii terminal univac vdt terminal four function keys top vs/9 specifically recognized vs/9 accepted commands typing command options commands issued batch stream either cards batch file required preceded slash commands entered terminal require use slash commands included following one issued break running program break key ascii terminal f1 key univac vdt used load command instead exec one would break mode program suspended allow user command mode could issue commands well following file names could 56 characters length file could consist letters numbers dashes digits file name digits permissible file could two consecutive periods access file another account necessary user account make file public file public could accessed another user prefixing name file indicator file referenced another account dollar sign followed account name followed period file named account s0103 user account pa5 wanted access file account s0103 first file would marked public second would referenced account name name file user account pa5 wanted access file account s0103 file public would reference s0103.a note user account s0103 could reference file simply could reference fully qualified file name including dollar sign account name followed period name public files special account tsos could accessed using alone first character file unless file began name identical account number case explicit account reference tsos would required also tsos would called path name missing files referenced name found user account example file called s0103.xyzzy account tsos account system named s0103 user wanting access would access tsos.s0103.xyzzy tsos also default account file referenced exist locally example execute edt editor program one would issue command run program exec followed name file called edt user created file named edt could execute edt editor typing pressing transmit key reason created program name use system editor would type could explicitly type system account unisys discontinued sales 9000 series mainframes favor exec 8 series computers probably longer cost effective market mainframes shrank vs/9 effectively abandoned company | [
2560,
6155,
6675,
7187,
10776,
25,
4637,
9762,
4643,
6180,
5158,
7217,
10803,
9784,
10809,
576,
2625,
6221,
3160,
10333,
97,
11363,
6760,
10856,
8298,
9835,
7285,
4727,
2168,
9335,
634,
1147,
3197,
1150,
5247,
11390,
2179,
10883,
10891,
6... | Test |
10,236 | 7 | Comparison_of_business_integration_software:comparison business integration software article comparison notable business integration business process automation software scope comparison supported hardware depends supported operating systems | [
1280,
4107,
6797,
270,
1041,
10389,
10134,
1304,
9124,
9252,
9389,
8751,
11184,
823,
9665,
2501,
6862,
11515,
6483,
5210,
8539,
7022,
9455,
10099,
2168,
6522,
3323,
2172
] | None |
10,237 | 3 | Multipath_I/O:multipath i/o computer storage multipath i/o fault-tolerance performance-enhancement technique defines one physical path cpu computer system mass-storage devices buses controllers switches bridge devices connecting example scsi hard disk drive may connect two scsi controllers computer disk may connect two fibre channel ports one controller port switch fail operating system route i/o remaining controller port switch transparently changes visible applications perhaps resulting increased latency multipath software layers leverage redundant paths provide performance-enhancing features including dynamic load balancing traffic shaping automatic path management dynamic reconfiguration | [
11233,
9571,
1801,
8233,
1291,
366,
1776,
9882,
1304,
8602
] | Test |
10,238 | 5 | X.500:x.500 x.500 series computer networking standards covering electronic directory services x.500 series developed telecommunication standardization sector international telecommunications union itu-t itu-t formerly known consultative committee international telephony telegraphy ccitt x.500 approved first 1988 directory services developed support requirements x.400 electronic mail exchange name lookup international organization standardization iso partner developing standards incorporating open systems interconnection suite protocols iso/iec 9594 corresponding iso identification protocols defined x.500 include protocols used osi networking stack number alternatives dap developed allow internet clients access x.500 directory using tcp/ip networking stack well-known alternative dap lightweight directory access protocol ldap dap x.500 protocols use tcp/ip networking stack ldap remains popular directory access protocol primary concept x.500 single directory information tree dit hierarchical organization entries distributed across one servers called directory system agents dsa entry consists set attributes attribute one values entry unique distinguished name formed combining relative distinguished name rdn one attributes entry rdns superior entries root dit ldap implements similar data model x.500 description data model article ldap x.520 x.521 together provide definition set attributes object classes used representing people organizations entries dit one widely deployed white pages schema x.509 portion standard providing authentication framework also widely used outside x.500 directory protocols specifies standard format public-key certificates current use x.509v3 certificates outside directory structure loaded directly web browsers necessary e-commerce develop allowing secure web based ssl/tls communications require x.500 directory source digital certificates originally conceived x.500 1988 one contrast role x.500 x.509 understand relationship x.509 designed secure access method updating x.500 www web browsers became popular needed simple method encrypting connections transport layer web sites hence trusted root certificates supported certificate authorities pre loaded certificate storage areas personal computer device added security envisaged scheduled 2011-2014 implementation us national strategy trusted identities cyberspace two- three-year project protecting digital identities cyberspace www e-commerce implementation x.509v3 bypassed replace original iso standard authentication mechanism binding distinguished names x.500 directory packages certificates added removed end user software reviewed microsoft mozilla terms continued trustworthiness problem arise occurred diginotar browser security experts issue update mark certificate authority untrusted serious removal effectively ca internet trust x.500 offers way view organization claims specific root certificate outside provided bundle function 4 corner model trust adding another check determine root certificate compromised rules governing federal bridge policy revoking compromised certificates available www.idmanagement.gov contrast browser bundled approach x.500 ldap attribute cacertificate bound directory entry checked addition default pre-loaded bundle certificates end users typically never noticed unless ssl warning message appeared example web site using ssl typically dns site name www.foobar.com verified browser software using libraries would check see certificate signed one trusted root certificates given user therefore creating trust users reached correct web site via https however stronger checks also possible indicate domain name verified contrast x.500 certificate one attribute many entry entry could contain anything allowable specific directory schema thus x.500 store digital certificate one many attributes could potentially verify organization physical address contact telephone number email contact ca certs certificate authority certs loaded browser automatically case microsoft update mechanism new version updates browsers user given choices import delete develop individual trust relationship loaded certificate authorities determine browser behave ocsp revocation servers unreachable contrast directory model associates attribute cacertificate listed certificate authority thus browser verify ssl cert website means loaded group accepted certificates root certificates looked x.500 ldap directory via http/s imported list trusted certificate authorities bound distinguished name located subject fields certificate matches directory entry x.509v3 contain extensions depending community interest international domain names broad internet use rfc-5280 pkix describes profile fields may useful applications encrypted email end user relies authenticity certificate presented browser email simple way compare forged certificate presented perhaps triggers browser warning valid certificate without also given opportunity validate dn distinguished name designed looked x.500 dit certificate public considered unforgeable therefore distributed manner associated binding identity occurs directory binding links certificate identity claims using certificate example x.500 software runs federal bridge cross certificates enable trust certificate authorities simple homographic matching domain names resulted phishing attacks domain appear legitimate x.509v3 certificate bound valid organization distinguished name within directory simple check made regards authenticity certificate comparison presented browser present directory options exist check notaries see certificate recently seen therefore likely compromised cert likely trusted failing domain name slight mismatch initially fail browser subjected notary trust bypass browser warning valid organizational entry o=foobarwidgets also associated alphanumeric oid identity proofed ansi providing another layer assurance regarding binding certificate identity recent events 2011 indicated threat unknown actors nation states forged certificates done order create mitm attack political activists syria accessing facebook web would normally triggered browser warning would mitm certificate issued valid certificate authority already trusted browser software similar attacks used stuxnet allowed software impersonate trusted code point certificate transparency allow end user determine using simple procedure certificate fact valid checking default bundle certificates may enough therefore additional check desired suggestions certificate transparency also advanced different attack used comodo certificate authority resulted forged certificates directed high-profile communications websites necessitated emergency patch major browsers certificates actually issued trusted certificate authority therefore user would warning gone faked website contrast syria incident certificate crudely forged including substituting alto palo palo alto incorrect serial numbers projects designed exchange phi protected health information considered highly hipaa sensitive may obtain x.509v3 certs via cert dns resource record via ldap x.500 2008 directory issue authoritative bind detailed rfcs related accuracy dns information secured signing root using dnssec concept root name servers source major contention internet community dns largely resolved name space associated x.500 traditionally thought start national naming authority mirrors iso/itu approach global systems national representation thus different countries create unique x.500 services u.s. x.500 privatized 1998 u.s. government longer offered x.500 dns registration outside known government agencies x.500 pilot project development commercial space technology continues present major installations millions users within corporate data centers within u.s. government credentialing authors rfc 2693 concerning spki note original x.500 plan unlikely ever come fruition collections directory entries ... considered valuable even confidential owning lists likely released world form x.500 directory sub-tree x.500 idea distinguished name single globally unique name everyone could use referring entity also likely occur x.500 complex support desktops internet ldap created provide service 'for rest us | [
10752,
9352,
8854,
8471,
5531,
11036,
5149,
2206,
9245,
929,
5413,
6054,
10413,
11056,
8627,
3126,
2359,
1079,
5816,
6710,
1086,
11456,
6977,
8904,
1610,
9290,
8524,
3026,
6229,
9429,
2519,
2904,
4058,
6110,
4064,
7010,
8674,
8421,
8426,
... | Test |
10,239 | 9 | ObjectPAL:objectpal objectpal short object-oriented paradox application language programming language used borland paradox database application owned corel paradox 11th version constituent corel word perfect x3 office suite 32-bit microsoft windows language tightly-bound application forms provides rapid robust development environment creating database applications windows objectpal full free-standing object-oriented language belongs family languages inspired hypercard influences pal wherever functionality could kept smalltalk garnet ui language created brad myers objects encapsulate source code support polymorphism limited inheritance concept wedded objects form controlled code placed higher object form object hierarchy however objectpal provides wideranging versatile language creating paradox applications syntax structure language resembles visual basic knowing visual basic would help someone new objectpal sense programming skill would transferable objectpal objectpal successor pal paradox dos programming language advent paradox windows 1.0 1993 owned borland corporation objectpal born version 1.0 quickly succeeded version 4.5 year used web server scripting language combined corel web server control ocx implements server api similar cgi standalone console corel web server | [
8262,
6797,
847,
10899,
9780,
2901,
2485
] | Test |
10,240 | 3 | Ys_II:_Ancient_Ys_Vanished_–_The_Final_Chapter:ys ii ancient ys vanished – final chapter later adapted anime ys ii castle heavens 1992 like predecessor ys ii ported various platforms following first release fm-7 x1 msx2 famicom released along predecessor part enhanced compilation ys ii turbografx-cd hudson soft 1989 many years version ys ii received official english release ms-dos remake called ys ii special developed mantra released exclusively south korean market 1994 mash-up ys ii anime ys ii castle heavens 1992 along large amount new content including secrets version game game success korea despite competition korean rpg astonishia story year years later third remake released microsoft windows-based pcs ys ii eternal later ys ii complete versions game also developed mobile phone platforms ys ii also remade 2008 nintendo ds english translation version released atlus north america along ds version ys single card legacy ys books ii 2009 japanese version released single game came 2008 ys ii picks immediately ys left adol christin transported floating island ys meets young woman named lilia takes adol home lance village begin quest unravel secrets ys finally rid esteria evil player controls adol battles way across land ys first game adol strength measured typical rpg fashion numerical statistics hp attack power defense power determine strength stats increased raising experience level battling also returning first game 'bump combat system player attacks enemies running enemy takes damage according adol stats enemy stats adol position enemy position new addition ys ii magic system adol acquire several different spells use throughout course play fire spell attack time spell stop enemies long active use magic consumes adol mp stat another major change combat game compared previous game bump combat system used bosses crashing two bosses game attempt damage result adol taking damage bosses must defeated fire spell soundtrack ys ii composed yuzo koshiro hideya nagata several music cds dedicated music ys ii released falcom include japanese game magazine famitsu gave famicom nes version score 27 40 famitsu gave pce-cd turbografx-cd version score 35 40 | [
2249,
9166,
445,
6797
] | Test |
10,241 | 3 | Xploder:xploder xploder brand game cheats multimedia devices games consoles similar action replay xploder products released dreamcast ps2 playstation psp xbox gamecube n64 game boy game boy advance pc others support ps3 xbox 360 nintendo wii started 2006-2007 xploder products often bundled accessories game consoles lexar memory sticks psp x-link cable ps2 v5 media centre version newer versions xbox 360 playstation 3 allow users download saved games internet utilizing xploder disc original playstation users found possible boot backup copied versions games | [
8937,
9477,
8782
] | Test |
10,242 | 5 | XMPP:xmpp extensible messaging presence protocol xmpp communication protocol message-oriented middleware based xml extensible markup language enables near-real-time exchange structured yet extensible data two network entities originally named jabber protocol developed homonym open-source community 1999 near real-time instant messaging im presence information contact list maintenance designed extensible protocol used also publish-subscribe systems signalling voip video file transfer gaming internet things iot applications smart grid social networking services unlike instant messaging protocols xmpp defined open standard uses open systems approach development application anyone may implement xmpp service interoperate organizations implementations xmpp open protocol implementations developed using software license many server client library implementations distributed free open-source software numerous freeware commercial software implementations also exist internet engineering task force ietf formed xmpp working group 2002 formalize core protocols ietf instant messaging presence technology xmpp working group produced four specifications rfc 3920 rfc 3921 rfc 3922 rfc 3923 approved proposed standards 2004 2011 rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 respectively rfc 6122 specifying xmpp address format 2015 rfc 6122 superseded rfc 7622 addition core protocols standardized ietf xmpp standards foundation formerly jabber software foundation active developing open xmpp extensions xmpp-based software deployed widely across internet 2003 used ten million people worldwide according xmpp standards foundation jeremie miller began working jabber technology 1998 released first version jabberd server january 4 1999 early jabber community focused open-source software mainly jabberd server major outcome proved development xmpp protocol early jabber protocol developed 1999 2000 formed basis xmpp published rfc 3920 rfc 3921 primary changes formalization ietf xmpp working group addition tls channel encryption sasl authentication note rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 published 2011 first im service based xmpp jabber.org operated continuously offered free accounts since 1999 1999 february 2006 service used jabberd server software time migrated ejabberd free software application servers january 2010 service migrated proprietary m-link server software produced isode ltd august 2005 google introduced google talk combination voip im system uses xmpp instant messaging base voice file transfer signaling protocol called jingle initial launch include server-to-server communications google enabled feature january 17 2006 google since added video functionality google talk also using jingle protocol signaling may 2013 google announced xmpp compatibility would dropped google talk server-to-server federation although would retain client-to-server support january 2008 aol introduced experimental xmpp support aol instant messenger aim service allowing aim users communicate using xmpp however march 2008 service discontinued may 2011 aol offers limited xmpp support september 2008 cisco systems acquired jabber inc. creators commercial product jabber xcp february 2010 social-networking site facebook opened chat feature third-party applications via xmpp functionality unavailable xmpp support dropped april 2014 similarly december 2011 microsoft released xmpp interface microsoft messenger service skype de facto successor also provides limited xmpp support however native xmpp implementations xmpp network uses client–server architecture clients talk directly one another model decentralized anyone run server design central authoritative server services aol instant messenger windows live messenger confusion often arises point public xmpp server run jabber.org large number users subscribe however anyone may run xmpp server domain every user network unique xmpp address called jid historical reasons xmpp addresses often called jabber ids jid structured like email address username domain name ip address server user resides separated sign username example.com since user may wish log multiple locations may specify resource resource identifies particular client belonging user example home work mobile may included jid appending slash followed name resource example full jid user mobile account could username example.com/mobile resource may specified numerical value called priority messages simply sent username example.com go client highest priority sent username example.com/mobile go mobile client highest priority one largest numerical value jids without username part also valid may used system messages control special features server resource remains optional jids well means route messages based logical endpoint identifier jid instead explicit ip address present opportunities use xmpp overlay network implementation top different underlay networks one original design goals early jabber open-source community enabling users connect multiple instant messaging systems especially non-xmpp systems single client application done entities called transports gateways instant messaging protocols also protocols sms email unlike multi-protocol clients xmpp provides access server level communicating via special gateway services running alongside xmpp server user register one gateways providing information needed log network communicate users network though xmpp users thus gateways function client proxies gateway authenticates user behalf non-xmpp service result client fully supports xmpp access network gateway without extra code client without need client direct access internet however client proxy model may violate terms service protocol used although terms service legally enforceable several countries also requires user send im username password third-party site operates transport may raise privacy security concerns another type gateway server-to-server gateway enables non-xmpp server deployment connect native xmpp servers using built interdomain federation features xmpp server-to-server gateways offered several enterprise im software products including xmpp provides general framework messaging across network offers multitude applications beyond traditional instant messaging im distribution presence data several service discovery protocols exist today zeroconf service location protocol xmpp provides solid base discovery services residing locally across network availability services via presence information specified xep-0030 disco building capability support discovery across local network domains xmpp well-suited cloud computing virtual machines networks firewalls would otherwise present obstacles alternative service discovery presence-based solutions cloud computing storage systems rely various forms communication multiple levels including messaging systems relay state also migration distribution larger objects storage virtual machines along authentication in-transit data protection xmpp applied variety levels may prove ideal extensible middleware message-oriented middleware mom protocol widely known ability exchange xml-based content natively become open platform exchange forms content including proprietary binary streams full motion video fmv content transport file-based content via example jingle series extensions majority applications nothing human communications i.e. im instead provide open means support machine-to-machine peer-to-peer communications across diverse set networks xmpp implemented large number clients servers code libraries implementations provided variety software licenses original native transport protocol xmpp transmission control protocol tcp using open-ended xml streams long-lived tcp connections alternative tcp transport xmpp community also developed http transport web clients well users behind restricted firewalls original specification xmpp could use http two ways polling binding polling method deprecated essentially implies messages stored server-side database fetched posted regularly xmpp client way http 'get 'post requests binding method implemented using bidirectional-streams synchronous http bosh allows servers push messages clients soon sent push model notification efficient polling many polls return new data client uses http firewalls allow clients fetch post messages without hindrances thus scenarios tcp port used xmpp blocked server listen normal http port traffic pass without problems various websites let people sign xmpp via browser furthermore open public servers listen standard http port 80 https port 443 ports hence allow connections behind firewalls however iana-registered port bosh actually 5280 80 several large public im services natively use xmpp including livejournal lj talk nimbuzz hipchat various hosting services dreamhost enable hosting customers choose xmpp services alongside traditional web email services specialized xmpp hosting services also exist form cloud domain owners need directly run xmpp servers including cisco webex connect chrome.pl flosoft.biz i-pobox.net hosted.im largest messaging providers use using various forms xmpp based protocols backend systems without necessarily exposing fact end users includes whatsapp google talk facebook chat deprecated facebook messaging system deployments built free-software erlang-based xmpp server called ejabberd xmpp also used deployments non-im services including smart grid systems demand response applications message-oriented middleware replacement sms provide text messaging many smartphone clients xmpp de facto standard private chat gaming related platforms origin raptr playstation discontinued xfire two notable exceptions steam xbox live use proprietary messaging protocols xmpp standards foundation xsf develops publishes extensions xmpp standards process centered xmpp extension protocols xeps previously known jabber enhancement proposals jeps following extensions especially wide use xmpp features federation across domains publish/subscribe authentication security even mobile endpoints used implement internet things several xmpp extensions part experimental implementation efficient xml interchange exi format sensor data provisioning control concentrators discovery efforts documented page xmpp wiki dedicated internet things xmpp iot mailing list ietf xmpp working group produced series request comments rfc documents important widely implemented specifications xmpp often regarded competitor simple based session initiation protocol sip standard protocol instant messaging presence notification xmpp extension multi-user chat seen competitor internet relay chat irc although irc far simpler far fewer features far widely used xmpp extensions publish-subscribe provide many features advanced message queuing protocol amqp xmpp standards foundation xsf formerly jabber software foundation active developing open xmpp extensions called xep however extensions also defined individual software project organization another example federation protocol apache wave based xmpp | [
514,
2050,
1030,
9734,
1036,
10254,
8211,
6681,
3610,
6682,
10269,
10271,
3105,
6689,
35,
9251,
2085,
7208,
9769,
3629,
7214,
8238,
562,
1586,
9269,
8758,
5687,
11321,
1594,
1083,
3133,
5181,
2111,
6208,
6723,
8265,
4687,
87,
4194,
10341,... | Test |
10,243 | 2 | Windows_Color_System:windows color system windows color system wcs platform color management first included windows vista aims achieve color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc profiles windows color system features color infrastructure translation engine cite core backed color processing pipeline supports bit-depths 32 bits per pixel multiple color channels three alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also supports floating point calculations minimize round-off errors inherent integer processing color pipeline finishes processing colors cite engine applies color translation according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer support deprecated v2 standard show dark images used v4 profiles windows imaging component hd photo format xps print path xps documents support color management wcs superset image color management icm first included windows 2000 windows xp windows server 2003 | [
10769,
9234,
1043,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
1098,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
3224,
4771,
7846,
2221,
10414,
8391,
214,
9943,
9434,
2783,
736,
4321... | Validation |
10,244 | 1 | Encyclopedia_of_Triangle_Centers:encyclopedia triangle centers encyclopedia triangle centers etc online list thousands points centers associated geometry triangle maintained clark kimberling professor mathematics university evansville list identifies 32,784 triangle centers point list identified index number form x n —for example x 1 incenter information recorded point includes trilinear barycentric coordinates relation lines joining identified points links geometer sketchpad diagrams provided key points encyclopedia also includes glossary terms definitions point list assigned unique name cases particular name arises geometrical historical considerations name star used instead example 770th point list named point acamar first 10 points listed encyclopedia points entries encyclopedia include similar albeit shorter lists exist quadri-figures quadrilaterals systems four lines polygon geometry see external links | [] | Test |
10,245 | 4 | Data_loss_prevention_software:data loss prevention software data loss prevention software detects potential data breaches/data ex-filtration transmissions prevents monitoring detecting blocking sensitive data use endpoint actions motion network traffic rest data storage terms data loss data leak related often used interchangeably data loss incidents turn data leak incidents cases media containing sensitive information lost subsequently acquired unauthorized party however data leak possible without losing data originating side terms associated data leakage prevention information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf information protection control ipc extrusion prevention system eps opposed intrusion prevention system technological means employed dealing data leakage incidents divided categories standard security measures advanced/intelligent security measures access control encryption designated dlp systems standard security measures firewalls intrusion detection systems idss antivirus software commonly available products guard computers outsider insider attacks use firewall example prevents access outsiders internal network intrusion detection system detects intrusion attempts outsiders inside attacks averted antivirus scans detect trojan horses send confidential information use thin clients operate client-server architecture personal sensitive data stored client device advanced security measures employ machine learning temporal reasoning algorithms detecting abnormal access data e.g. databases information retrieval systems abnormal email exchange honeypots detecting authorized personnel malicious intentions activity-based verification e.g. recognition keystroke dynamics user activity monitoring detecting abnormal data access designated systems detect prevent unauthorized attempts copy send sensitive data intentionally unintentionally mainly personnel authorized access sensitive information order classify certain information sensitive use mechanisms exact data matching structured data fingerprinting statistical methods rule regular expression matching published lexicons conceptual definitions keywords network data motion technology typically installed network egress points near perimeter analyzes network traffic detect sensitive data sent violation information security policies multiple security control points may report activity analyzed central management server endpoint data use systems run internal end-user workstations servers like network-based systems endpoint-based technology address internal well external communications therefore used control information flow groups types users e.g 'chinese walls also control email instant messaging communications reach corporate archive blocked communication i.e. one never sent therefore subject retention rules identified subsequent legal discovery situation endpoint systems advantage monitor control access physical devices mobile devices data storage capabilities cases access information encrypted endpoint-based systems provide application controls block attempted transmissions confidential information provide immediate user feedback must installed every workstation network used mobile devices e.g. cell phones pdas practically installed example workstation internet café dlp includes techniques identifying confidential sensitive information sometimes confused discovery data identification process organizations use dlp technology determine look data classified either structured unstructured structured data resides fixed fields within file spreadsheet unstructured data refers free-form text media text documents pdf files video estimated 80 data unstructured 20 structured data classification divided content analysis focused structured data contextual analysis looks place origin application system generated data methods describing sensitive content abundant divided precise imprecise methods precise methods involve content registration trigger almost zero false positive incidents methods imprecise include keywords lexicons regular expressions extended regular expressions meta data tags bayesian analysis statistical analysis techniques machine learning behavior analytics hierarchical threat modeling predefined dlp templates etc strength analysis engine directly relates accuracy accuracy dlp identification important lowering/avoiding false positives negatives accuracy depend many variables may situational technological testing accuracy recommended ensure virtually zero false positives/negatives high false positive rates cause system considered dld dlp sometimes data distributor gives sensitive data one third parties sometime later data found unauthorized place e.g. web user laptop distributor must investigate source leak data rest specifically refers old archived information information great concern businesses government institutions simply longer data left unused storage likely might retrieved unauthorized individuals protecting data involves methods access control data encryption data retention policies data use refers data user currently interacting dlp systems protect data in-use may monitor flag unauthorized activities activities include screen-capture copy/paste print fax operations involving sensitive data intentional unintentional attempts transmit sensitive data communication channels data motion data traversing network endpoint | [
3072,
10756,
9227,
9233,
9242,
9761,
9256,
9771,
10297,
3643,
7739,
9791,
1088,
5186,
4165,
2118,
107,
5245,
127,
6786,
5764,
11400,
9356,
7828,
4245,
8343,
10392,
1690,
5281,
2213,
2733,
2222,
10417,
5305,
704,
8387,
9929,
5327,
7891,
11... | Test |
10,246 | 9 | John_C._Reynolds:john c. reynolds john charles reynolds june 1 1935 – april 28 2013 american computer scientist john reynolds studied purdue university earned phd theoretical physics harvard university 1961 professor information science syracuse university 1970 1986 death professor computer science carnegie mellon university also held visiting positions aarhus university denmark university edinburgh imperial college london microsoft research cambridge queen mary university london uk reynolds main research interest area programming language design associated specification languages especially concerning formal semantics invented polymorphic lambda calculus system f formulated property semantic parametricity calculus independently discovered jean-yves girard wrote seminal paper definitional interpreters clarified early work continuations introduced technique defunctionalization applied category theory programming language semantics defined programming languages gedanken forsythe known use intersection types worked separation logic describe reason shared mutable data structures editor journals communications acm journal acm 2001 appointed fellow acm acm sigplan programming language achievement award 2003 lovelace medal british computer society 2010 | [
512,
2595,
8479,
11141,
8262,
4392,
4201,
6536,
10395,
1936,
5585,
9680,
1333,
11574,
1783,
8251,
3263
] | Test |
10,247 | 7 | Computation_offloading:computation offloading computer science computation offloading transfer resource intensive computational tasks external platform cluster grid cloud offloading may necessary due hardware limitations devices limited computational power storage energy resource intensive tasks may searching virus scanning image processing artificial intelligence computational decision making etc offloading mainly used mobile cloud computing edge computing fog computing | [
154,
5956,
4194
] | Test |
10,248 | 5 | Qpopper:qpopper qpopper one oldest popular server implementations pop3 free open-source server distributed bsd style license common choice internet service providers schools corporations organizations included several linux unix distributions qpopper longer maintained final version 4.1.0 released 2011 qpopper distributed qualcomm source code parties offer pre-compiled pre-configured versions various platforms qpopper ran wide variety platforms including virtually unix linux distribution mac os x even windows cygwin qpopper generally recognized fast stable secure commonly used standard unix mbox format inboxes spools also supported homedir mail mbox linear format messages stored sequentially qpopper supports number optimizations improve speed scalability including cache file maintain mailbox state sessions several optional i/o techniques qpopper started popper around 1989 university california berkeley qualcomm took 1993 renamed qpopper qualcomm original goal promote availability correct modern servers eudora mail client use also provide platform newer extensions | [
2748,
471,
5063,
9863,
76,
11500,
5230,
9909,
4439,
412
] | Validation |
10,249 | 4 | Cyber_Storm_II:cyber storm ii cyber storm ii international cyber security exercise sponsored united states department homeland security 2008 week-long exercise centered washington dc concluded march 15 | [
826
] | Validation |
10,250 | 1 | SQLAlchemy:sqlalchemy sqlalchemy open-source sql toolkit object-relational mapper orm python programming language released mit license sqlalchemy provides full suite well known enterprise-level persistence patterns designed efficient high-performing database access adapted simple pythonic domain language sqlalchemy philosophy relational databases behave less like object collections scale gets larger performance starts concern object collections behave less like tables rows abstraction designed reason adopted data mapper pattern similar hibernate java rather active record pattern used number object-relational mappers however optional plugins allow users develop using declarative syntax sqlalchemy first released february 2006 quickly become one widely used object-relational mapping tools python community alongside django orm following example represents n-to-1 relationship movies directors shown user-defined python classes create corresponding database tables instances relationships created either side relationship finally data queried—illustrating automatically-generated sql queries lazy eager loading creating two python classes according database tables dbms one insert director-movie relationship via either entity sqlalchemy issues following query dbms omitting aliases output setting codice_1 default instead sqlalchemy would first issue query get list movies needed lazy director query get name according director | [
9729,
3080,
8554,
11338,
5612,
5677,
6860,
7983,
8718,
10413,
3763,
11221,
1142,
9467
] | Test |
10,251 | 9 | Multi-user_BASIC:multi-user basic multi-user basic dialect basic language dec pdp-11 running rt-11 operating system one users supported separate address spaces sharing language interpreter syntax language similar identical basic-11 key language element support virtual files similar virtual arrays basic-plus limited array integers floatingpoint character strings length 1 2 4 8 16 32 64 could placed file accessed subscript file could actually opened re-opened different definition allowing integers characters floating point numbers stored file like basic-11 multi-user basic provided support lab equipment support character terminals la30 vt100 multi-user system support real-time data collection | [
1253,
8262,
7983
] | Test |
10,252 | 4 | ThreatConnect:threatconnect threatconnect cyber-security firm based arlington virginia provide threat intelligence platform companies aggregate act upon threat intelligence firm founded 2011 cyber squared inc. adam vincent richard barger andrew pendergast leigh reichel renamed threatconnect series funding 4 million 2014 december 2015 obtained series b funding 16 million company gained attention linked anthem medical data breach chinese government-sponsored entities according cybercrime expert brian krebs threatconnect identified domains used group intentionally similar legitimate domains used anthem also linked guccifer 2.0 responsible 2016 democratic national committee email leak russian-backed cyberespionage group fancy bear cyberattacks attributed fancy bear include group investigating malaysia airlines 17 crash world anti-doping agency recently issued report state-sponsored doping | [
8288,
8805,
2090,
176,
2558
] | Train |
10,253 | 3 | Scroll_Lock:scroll lock scroll lock ⤓ ⇳ lock key typically associated status light ibm-compatible computer keyboards depending operating system may used different purposes applications may assign functions key change behaviour depending toggling state key frequently used therefore reduced specialized keyboards lack altogether pressing performs function pressing behavior remnant original ibm pc keyboards dedicated key instead assigned pause function break function key meant lock scrolling techniques vestige original ibm pc keyboard original design intended modify behavior arrow keys mode arrow keys would scroll contents text window instead moving cursor usage toggling lock key like num lock caps lock state persists key released today particular use rare modern programs honoring behavior include ibm lotus notes forté agent image-line fl studio renoise microsoft excel microsoft project libreoffice calc occasions microsoft word text editors notepad++ microsoft visual studio exhibit similar behavior arrow keys used pressed gui environments neglect means scrolling must accomplished mouse using means scrollbars scroll wheels often middle wheel mouse button works toggle determining mouse movements move mouse cursor scroll contents scroll window web browsers including firefox internet explorer support caret browsing mode toggled window scrolling behaviour caret navigation disabled default similar suggested scroll lock enabling caret navigation enable cursor scrolling behaviour scroll lock disabled pressing key linux console text scrolling screen freezes console output input text sent screen program continues running usual pressed screen unfrozen text generated freeze displayed allows user pause display read long messages scroll screen quickly read example system booting provided keyboard driver already loaded configured otherwise used instead scroll lock terminal linux freeze unfreeze terminal output respectively behaviour emulates hold screen key similar flow control mechanisms computer terminals behaviour must distinguished pressing pause key post dos default effect temporarily halting running process freebsd system console key additionally enables scrolling pressing scroll lock one use scroll pressing scroll lock disables mode moves back bottom output linux console implements behaviour using requiring active multiuser dos system manager real/32 activating boot always enter special diagnostic mode operating system loaded device drivers display detailed status debugging information interaction operating system sometimes several screenfuls per loaded driver automatic scrolling suspended long remains activated dr-dos 7.02 higher provides config.sys directive named codice_1 change scroll lock status fly activating boot enter diag mode well wherein special drivers may display verbose messages contrast situation multiuser dos family normal dos drivers typically display additional information operating system however temporarily suspend automatic timeouts codice_2 config.sys trace codice_3 single-stepping modes long active microsoft windows nt family starting windows 2000 debugging feature enabled allows user manually crash system generating memory dump analysis current state operating system accomplished setting reg_dword registry key hkey_local_machine\system\currentcontrolset\services\i8042prt\parameters\crashonctrlscroll 1 set user hold key tap key twice trigger blue screen death microsoft visual basic 5.0 6.0 pauses running program integrated development environment alias conjunction alternative dos keyboard console drivers freekeyb k3plus also served part copy paste facility applications compared standard keyboard driver keyb drivers offered number extensions including extended keystroke buffer key stacking facility macro recorder second cursor called copycursor could invoked demand default pressing middle mouse button freely moved screen using cursor keys mouse even outside area reachable standard cursor running application invoked pressing left mouse button characters copycursor could stuffed one another keyboard buffer would read running application emulated key alt numpad input thereby typically showing location standard cursor copycursor would move next screen position backwards normal keyboard input still possible copycursor enabled user could switch two cursors toggling hotkey pressing would exit copycursor next invocation would show position standard cursor rather previous location screen contents scrolled position copycursor would move accordingly reaching display limits activated keypresses would still reach normal keystroke buffer copycursor input would stacked internally later use second queue dynamically maintained within extended keystroke buffer thereby possible collect selected screen output different programs spool data much later within yet another application toggling also possible use input macro recorder later use scrap macro since integral part keyboard drivers fully transparent running software therefore worked virtually dos programs including command prompt temporary shelled programs task switchers ibm pc documentation called inactive key pc magazine asked executive keyboard manufacturer key tronic key purpose 1983 interview replied n't know put indicator light sometimes used purposes keyboard layout indicator linux distributions applications less likely cause problems manipulating keys/lights keyboard video mouse switches kvm often use scroll lock key keyboard connected kvm switch selecting computers kvm switches on-screen display osd double click scroll lock key often brings osd allowing user select desired computer list access configuration menu kvm models especially lack osd switch input corresponding number key pressed scroll lock case 2-port switches arrow keys simple models two four inputs may immediately switch next input following double press scroll lock key laptops keyboards physical key second function another key acts key pressed common methods another way press key use onscreen keyboard windows 8 found control panel ease access center selecting start on-screen keyboard provide access emulation standard 101/102-key keyboard windows 10 function performed on-screen keyboard module codice_4 started either command line alternatively run menu | [
6213,
9864,
6797,
847,
178,
10130,
5078,
2201,
3642
] | None |
10,254 | 3 | YunoHost:yunohost yunohost debian gnu/linux based distribution packaged free software automates installation personal web server purpose yunohost allow users easily host web services enabling simple point-and-click web interface installing various web apps currently supported apps include email server webmail interface wordpress website instant messaging server news aggregator file sharing server seedbox among others name yunohost play words internet meme u yunohost development began march 2012 still actively maintained version 1.0 based debian squeeze released august 5 2012 version 2.0 based debian wheezy released version 2.4 based debian jessie released version 3.0 based debian stretch released version 2.2 released compatible debian wheezy jessie bind replaced dnsmasq mailbox quota system set yunohost 2.4 released includes backup recovery system system fine management service configuration improvements application management packaging many new features bug fixes mysql replaced mariadb theanti-spam amavis replaced rspamd release compatible debian jessie yunohost 3.0 released june 17 2018 includes new features compatible new version debian released almost year ago debian stretch also marks end cycle debian jessie adds new security features program nginx ssh ... also updates metronome rspamd recent versions improvements translation made finally backup/restore system also switches stable version occitan language available released july 5 2019 brings new unified list applications 18 march 2019 time4vps started offer vps servers yunohost template | [
225,
10242,
708,
3237,
10341,
4040,
362,
8683,
5356,
9964,
5198,
7022,
499,
2228,
2901,
9909,
823
] | None |
10,255 | 2 | Scanner_Access_Now_Easy:scanner access easy scanner access easy sane application programming interface api provides standardized access raster image scanner hardware flatbed scanner handheld scanner video- still-cameras frame grabbers etc. sane api public domain discussion development open everybody commonly used linux sane differs twain cleanly separated front ends user programs back ends scanner drivers whereas twain driver handles user interface well communications scanner hardware sane driver provides interface hardware describes number options drive scan options specify parameters resolution scan scan area colour model etc option name information type units range possible values e.g. enumerated list convention several well known options front ends supply using convenient gui interaction e.g. scan area options set dragging rectangular outline preview image options presented using gui elements appropriate type e.g. sliders drop-down lists etc one consequence separation network scanning easily implemented special handling either front ends back ends host scanner saned daemon runs handles network requests client machines net back end driver connects remote host fetch scanner options perform previews scans saned daemon acts front end locally simply passes requests data network connections local scanner similarly net back end passes requests data local front end remote host various types unsupervised batch scanning also possible minimum support needed back end driver many scanners support attachment document feeders allow large number sheets paper automatically scanned succession using sane api front end simply play back set options scan driving document feed scans load next sheet paper front end obtain set options user several user interfaces written combine sane easy user method controlling xsane graphical front end sane written oliver rauch available microsoft windows linux unix os/2 licensed gnu general public license gpl windows version allows windows computer access scanner attached unix os/2 mac os x network computer generally local windows computer complete sane-back-ends versions possibly work scanner models connected locally simple scan simplified gui using sane intended easier use better integrate gnome desktop xsane initially written ubuntu maintained robert ancell canonical ltd. linux simple scan first fielded part ubuntu 10.04 lucid lynx also used lubuntu xubuntu gscan2pdf interface scanning documents pdf gnome desktop uses sane communicate scanner available gpl includes common editing tools e.g. rotating cropping pages also able perform ocr using several optional ocr tools save searchable pdf pdf files downsampled upon saving swingsane cross-platform java front end sane written maintained roland quast available microsoft windows linux mac os x licensed apache 2.0 license source code project also adapted use existing swing application | [
3969,
11394,
6413,
6797,
8848,
9872,
7450,
1822,
546,
6691,
10414,
7983,
2864,
9908,
823,
3649,
3015,
7626,
1101,
8909,
4177,
6993,
8147,
10971,
9054,
10851,
5095,
9320,
7913,
4459,
3189,
5755
] | Validation |
10,256 | 9 | Orchidée:orchidée orchidée software developed ircam computer-aided orchestration tool matlab-based application communicates traditional computer-aided composition environments open sound control messages means effectively controlled programs like max/msp openmusic developed grégoire carpentier damien tardieu phds ircam help supervision composer yan maresz recent example use orchestral composition jonathan harvey speakings premiered 2008 speech analyzed computed provide orchestral combinations composer given input target sound orchidée creates musical score imitates sound using mixture traditional instruments searches within large instrument sample database combinations sounds perceptually match target application takes account complex combinatorial possibilities considering virtually infinite sets different sounds created orchestra also considers musical attributes instruments dynamics perceptual attributes brightness roughness example speakings mantra oh/ah/hum analyzed imputed orchidée turn generated different possibilities orchestration mantra developed throughout piece using possibilities musical works using orchidée | [
2667,
7326
] | Test |
10,257 | 6 | List_of_default_file_systems:list default file systems default file system used various operating systems | [
5120,
2564,
6148,
6669,
3598,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
4151,
7225,
11323,
576,
4673,
8772,
1109,
1623,
4708,
9836,
7789,
8301,
10860,
9333,
6263,
9335,
636,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
4764,
6309... | Validation |
10,258 | 1 | WebScaleSQL:webscalesql webscalesql open-source relational database management system rdbms created software branch production-ready community releases mysql joining efforts companies incorporating various changes new features mysql webscalesql aimed toward fulfilling various needs arising deployment mysql large-scale environments involve large amounts data numerous database servers source code webscalesql hosted github licensed terms version 2 gnu general public license project website announced december 2016 companies involved would longer contribute project running mysql numerous servers large amounts data scale terabytes petabytes data creates set difficulties many cases arise need implementing specific customized mysql features need introducing functional changes mysql companies faced similar set difficulties production environments used result availability multiple solutions similar challenges webscalesql announced march 27 2014 joint effort facebook google linkedin twitter alibaba group joining january 2015 aiming provide centralized development structure extending mysql new features specific large-scale deployments building large replicated databases running server farms result webscalesql attempted open path toward deduplicating efforts founding company putting maintaining branch mysql toward bringing together developers webscalesql created branch mysql latest production-ready community release version 5.6 project aimed tightly follow new mysql community releases branching path selected instead becoming software fork mysql selection mysql production-ready community releases webscalesql upstream instead selecting available mysql forks mariadb percona server result consensus four founding companies concluded features already existing mysql 5.6 suitable large-scale deployments additional features kind planned mysql 5.7 initial changes feature additions webscalesql introduced mysql 5.6 codebase came engineers employed four founding companies however project open peer-reviewed community contributions available new features changes included following planned new features changes included following webscalesql distributed source-code-only form official binaries available compiling source code running webscalesql supported x86-64 linux hosts requiring time toolchain supports c99 c++11 language standards source code hosted github available version 2 gnu general public license gpl v2 december 2016 webscalesql website announced companies originally involved collaborating project facebook google linkedin twitter alibaba would longer contribute project announcement blamed differences among needs various companies end collaboration | [
2688,
11392,
8195,
8582,
9481,
4490,
10505,
10389,
10518,
4376,
1049,
9112,
7453,
1950,
9503,
1952,
7968,
290,
1314,
7461,
8742,
7339,
10413,
5550,
7983,
5808,
10873,
9010,
10418,
823,
3768,
3004,
9663,
4416,
5441,
6721,
11457,
8518,
72,
... | None |
10,259 | 2 | List_of_input_methods_for_Unix_platforms:list input methods unix platforms intended non-exhaustive list input methods unix platforms input method means entering characters glyphs corresponding encoding character set see input method page information | [
2684,
1524,
5492
] | Test |
10,260 | 3 | Socket_AM1:socket am1 socket fs1b branded socket am1 socket designed amd launched april 2014 desktop socs value segment socket am1 intended class cpus contain integrated gpu chipset essentially forming complete soc implementation pins display pci express sata i/o interfaces directly socket amd first compatible cpus designated apus 4 socketable chips kabini family jaguar microarchitecture marketed athlon sempron names announced april 9 2014 brand names athlon sempron underlying microarchitectures jaguar puma products socs means chipset die apu motherboard amd mobile cpus available one 722-pin package socket fs1 sure whether notebook cpus compatible socket am1 vice versa mobile counterpart socket ft3 bga-769 least one board supported coreboot | [
3586,
9475,
3588,
8452,
10375,
3464,
4872,
7058,
4246,
4767,
2463,
7712,
9122,
1322,
11183,
1329,
6705,
3892,
8629,
9400,
6978,
11331,
9157,
3783,
11080,
7247,
9551,
7122,
9427,
10715,
7132,
2525,
4451,
5859,
1260,
1005,
7788,
7151,
1651
] | Test |
10,261 | 9 | Erroneous_program:erroneous program design programming languages erroneous program one whose semantics well-defined language implementation obligated signal error either compile execution time example ada defining condition erroneous means language implementation need perform potentially expensive check e.g global variable refers object subroutine parameter may nonetheless depend condition true defining semantics program | [
428,
8262,
5911
] | None |
10,262 | 8 | Open_Web_Analytics:open web analytics open web analytics owa open-source web analytics software created peter adams owa written php uses mysql database makes compatible running amp solution stack various web servers owa comparable google analytics though owa server software anyone install run host google analytics software service offered google owa supports tracking wordpress mediawiki two popular web site frameworks application helps keep track observe influx views website program also tracks competitors company growth compared | [
225,
8644,
6533,
5612,
7022,
7983,
6576,
467,
5524,
119,
1943
] | None |
10,263 | 4 | Cost-based_anti-spam_systems:cost-based anti-spam systems since spam occurs primarily cheap send proposed set solutions require senders pay cost order send spam making prohibitively expensive spammers gatekeeper would sell electronic stamps keep proceeds micropayment electronic money would paid sender recipient isp gatekeeper proof-of-work systems hashcash penny black require sender pay computational cost performing calculation receiver later verify verification must much faster performing calculation computation slows sender significantly impact receiver point slow machines send spam—often millions millions every user wants send email moderate number recipients suffers seconds delay sending millions emails would take unaffordable amount time approach suffers sender maintains computation farm zombies refinement stamp systems method requiring micropayment made form penalty imposed recipient considers email abusive addresses principal objection stamp systems popular free legitimate mailing list hosts would unable continue provide services pay postage every message sent 2004 bill gates announced microsoft working solution requiring so-called “ unknown senders ” i.e senders accepted list recipient post “ electronic equivalent ” stamp whose value would lost sender recipient disapproves email gates said microsoft favors solutions short-term would rely contingent payment solution solve spam problem longer run microsoft aol well yahoo recently introduced systems allow commercial senders avoid filters obtain paid pre-paid certificate certification lost sender recipients complain approach suffers user initially signs legitimate mailing list later decides want receive e-mail lazy users simply click spam button e-mail client rather going formal unsubscription process detailed bottom message end-user gets effect either way without realizing consequences list host may face however companies implementing penalty approach certifying withdrawing certification commercial senders learned account problem setting appropriate complaint thresholds intent sender-at-risk solutions impose significant cost sender recipient rejects message subsequent receiving email deter spam making economically prohibitive send unwanted email messages allowing legitimate emailers send messages little expense anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers approach financially sustainable activist questionable whether actually reduces spam either activist anyone else | [
8224,
1667,
488,
6762,
1899,
8202,
8747,
10826,
4272,
914,
3508,
5012,
2358,
1495,
8735
] | Test |
10,264 | 4 | VENOM_(security_vulnerability):venom security vulnerability venom virtualized environment neglected operations manipulation computer security flaw publicly disclosed 2015 jason geffner crowdstrike flaw introduced 2004 affected versions qemu xen kvm virtualbox date patched following disclosure existence vulnerability due flaw qemu virtual floppy disk controller venom registered common vulnerabilities exposures database cve-2015-3456 | [
5636,
176,
2709,
5174,
8439,
2558
] | None |
10,265 | 4 | CTERA_Networks:ctera networks ctera networks privately held enterprise software company headquartered new york israel company regional offices uk italy france spain germany australia ctera partnered companies including amazon web services hewlett packard enterprise ibm clients include deutsche telekom banco santander axa united states department defense october 2016 ibm became ctera reseller ibm cloud object storage integrated ctera enterprise file services platform deployed on-premises softlayer cloud hybrid on-premises/cloud setup ctera mentioned gartner 2016 magic quadrant data center backup recovery software ctera founded 2008 liran eshel zohar kaufman company raised 9 million series funding round january 2009 led benchmark capital march 2012 ctera raised 11 million funding round lead venrock included strategic investment cisco systems participation prior investor benchmark capital raised approximately 15 million july 2014 ctera raised 25 million series c funding round led bessemer venture partners participation benchmark capital cisco venrock september 2016 ctera announced additional 25 million funding round led bessemer venture partners participation cisco new investor vintage investment partners investment considered part earlier series c funding round consisted 25 million july 2014 2016 ctera raised 70 million funding gartner named ctera one five cool venders storage technologies 2013 gartner included ctera 2015 critical capabilities enterprise endpoint backup magic quadrant enterprise file synchronization sharing efss ctera included deloitte fast 500 list technology 2015 ctera mentioned gartner 2016 magic quadrant data center backup recovery software june 2016 ctera earned contract provide private cloud file sharing solution united states department defense part agreement ctera disa defense information systems agency co-developed mutual authentication technology using government-issued smart cards additional layers protection beyond standard enterprise integration microsoft active directory servers 2009 ctera released first cloud storage gateway c200 gateway combined speed local network storage off-site cloud storage backup technology 2010 ctera released c400 cloud storage gateway added features office server backup recovery collaboration capability multiple users working files stored cloud gateway 2011 c800 gateway released 24 tb raw local storage 2016 ctera announced virtual cloud storage gateway deployed vmware kvm servers enabled customers use existing hardware ctera released updates cloud storage gateway portfolio april 2016 focused efficiency storage capacity ctera released enterprise file sync share efss 2012 enabled users access share collaborate files location storing files either locally cloud also 2012 ctera launched mobile app made possible access files backups ios android devices december 2015 ctera announced cloud server data protection storage-as-a-service server data protection software enterprise cloudops cloud server data protection protects server data private virtual private cloud using backup agents windows linux environments object storage services cloud platforms amazon web services microsoft azure ibm cloud openstack-based clouds | [
4236,
10893,
911,
1935,
4623,
8592,
5499,
2965,
2328,
4377,
8986,
6307,
6565,
9766,
5159,
6444,
8495,
3121,
6834,
7352,
3773,
2496,
4289,
11072,
11201,
1224,
8520,
4429,
7248,
1362,
467,
7891,
9682,
6618,
6367,
4194,
11646,
5732,
1638,
10... | Test |
10,266 | 7 | Networked_Help_Desk:networked help desk networked help desk open standard initiative provide common api sharing customer support tickets separate instances issue tracking bug tracking customer relationship management crm project management systems improve customer service reduce vendor lock-in initiative created zendesk june 2011 collaboration eight founding member organizations including atlassian new relic otrs pivotal tracker servicenow sugarcrm first integration zendesk atlassian issue tracking product jira announced 2011 atlassian summit august 2011 34 member companies joined initiative year launching 50 organizations joined within zendesk instances feature branded ticket sharing support tools generally built around common paradigm begins customer making request incident report create ticket ticket progress status updated annotations attachments annotations attachments may visible customer public visible analysts private customers notified progress made ticket complete people necessary complete ticket using separate support tools additional overhead introduced maintaining relevant information ticket tool notifying customer progress made group completing ticket example customer support issue caused software bug reported help desk using one system fix documented developers another analyzed customer relationship management tool keeping records system up-to-date notifying customer manually using swivel chair approach unnecessarily time-consuming error-prone information transferred correctly customer may re-explain problem time ticket transferred systems networked help desk api implemented possible several different applications related customer support experience synchronize data one uniquely identified shared ticket many applications domains implemented apis allow data imported exported modified network help desk provides common standard customer support information automatically synchronize several systems implemented two systems quickly share tickets configuration change understand interface communication two instances specific ticket occurs three steps invitation agreement sharing ticket data continued synchronization tickets standard allows full delegation analysts systems make public private comments synchronize status well partial delegation instance receiving ticket make private comments status changes synchronized tickets may shared multiple instances harvey kandola countersoft suggested would preferable single application consolidates tracking related functions rather using multiple tools connecting dots initiatives like networked help desk | [
4960,
4388,
8644,
3462,
8582,
5677,
9245,
2842,
4797
] | Test |
10,267 | 2 | Event_Driven_Executive:event driven executive event driven executive edx computer operating system originally developed ibm control research laboratory devices experiments included application programming language known edl hcf host communication facility ibm research division opened san jose research laboratory sjrl 1956 building 025 ibm plant site san jose california dr. henry m. gladney established first laboratory automation project 1968 ibm 1800 computer various instruments chemistry physics laboratories throughout sjrl linked 1800 control data acquisition processing note long time instrumentation came embedded chips microprocessors output sophisticated research instrument likely strip chart paper squiggly marks perhaps punched paper tape dr. gladney became manager research computing facility rcf research moved building 028 1970 established new department rcf laboratory automation group tasked transition new sensor-based computer ibm system/7 produced boca raton florida robert w. martin appointed first line manager group staff consisting ray aylsworth donald l. raimondi gerd hochweller post-doctoral fellow assignment germany system/7 much smaller machine 1800 intended co-located individual research labs along instruments would service multiple system/7s hosted large scale computing purposes ibm system/360 “ mainframe ” served sjrl whole system/7 somewhat unusual especially programmer perspective lack supporting software basic human input/output interface teletype keyboard printer along paper tape reader punch hard disc drive data storage along digital analog input/output process interrupt could used lab instrument interface data acquisition instrument control sort operating system high level programming facility basic assembler language program another way putting would say delivered user friendly users research scientists engineers i.e non-programming professionals clear start order provide successful system/7 based environment laboratory automation sjrl would necessary develop real-time sensor-based multitasking multiprogramming operating system associated application development facility provided appropriate high level application programming language requisite special features e.g sensor i/o also communication interface large scale host computer program development bidirectional data transfer data analysis result development operating system known laboratory automation basic supervisor system/7 labs/7 application development language labs/7 real-time multitasking multiprogramming operating system application development language needed provide timing process interrupt capability analog digital input output commands allow data acquisition control external laboratory instruments along basic computational functions direct access data storage host communications hierarchical environment addition programming language associated program preparation facility compiler also needed defined decided use syntactical model could processed system/360 macro assembler would obviate need writing compiler machine language instructions created interpret object code output assembler effect high level instruction set programming language hypothetical virtual real-time sensor-based computer labs/7 provided language interpreter implemented system/7 machine language mimicked today language emulated virtual machine another element labs/7 package general purpose utility programs today would probably called apps finally system/360 software package known host communication facility hcf developed provide bi-directional data transfer host system/360 multiple satellite system/7s together labs/7 provided environment 1 application program could written compiled host system/360 downloaded host system/7 scientist laboratory 3 invoked control laboratory apparatus/instrument/machine 4 acquire measurement results instrument 5 send data host computer 6 start program host analyze data 7 return display results analysis scientist laboratory course system/7 could operated completely standalone i.e non-hierarchical environment usage labs/7 increased sjrl ibm organizations trying implement applications system/7 became aware labs/7 tried found extremely useful among general product division ibm plant site san jose sjrl sister research labs yorktown ny zürich switzerland ibm federal systems division oswego ny ibm office products division lexington ky. word labs/7 spread “ field ” charged marketing system/7 ibm customers cooperative effort mounted involving program authors sjrl team ibm system engineers led fred schneider make software available customers installed user program iup iup thought “ ” software package available ibm without support warranties associated formal product software labs/7 iup relatively successful came rather late product lifetime system/7 1976 ibm announced ibm series/1 successor system/7 series/1 last line special purpose sensor-based computers produced ibm laboratory automation group sjrl acquired early model series/1 announcement time ported labs/7 series/1 labs/7 became edx/1 event driven executive course included embedded interpreter programming language appropriately named edl event driven language time ibm field support team expanded significant effort underway make software available ibm customers field developed program fdp fdp step ibm software hierarchy still caveat “ ” package minimal formal ibm support development powerful terminal control product known communications facility edx/cf sales edx especially focused distributed computing environment whereby series/1 used primarily terminal controller many cases attached system/370 host computer edx efficient system able support large number work stations installed base edx grew product support edx transferred ibm general systems division series/1 product division boca raton fl edx became fully supported ibm program product edx origin tool laboratory automation 1981 ibm announced series/1 edx-based application software package edx laboratory automation software developed sjrl iup product number 5798-rhb edx edl well accepted marketplace successful ibm software products application programs developed edl run edx e.g communication facility multiple terminal monitor u.s. marine corps recognized extensive usage series/1 edx 1984 edx edl ported ibm pc product known hummingbird ibm plant site san jose california implemented completely automated warehouse facility inventory system production parts complete robot fork lifts control one series/1 computer running edx system operation late 1999 one example major applications within ibm companies developed edx-based applications e.g utility packages developed legler recently september 2014 program announced business partners ibm datatrend allows running applications ported series/1 unix based systems 1980 martin raimondi received ibm corporate award work developing edx edl | [
2179,
2345,
10508,
7983,
5457,
3323
] | Test |
10,268 | 4 | Access_structure:access structure access structures used study security system multiple parties need work together obtain resource groups parties granted access called qualified set theoretic terms referred qualified sets turn set qualified sets called access structure system less formally description needs cooperate order access resource original use cryptography resource secret shared among participants subgroups participants contained access structure able join shares recompute secret generally resource also task group people complete together creating digital signature decrypting encrypted message reasonable assume access structures monotone sense subset access structure sets contain subset also form part access structure | [
2737
] | None |
10,269 | 5 | SIP_URI_scheme:sip uri scheme sip uri scheme uniform resource identifier uri scheme session initiation protocol sip multimedia communications protocol sip address uri addresses specific telephone extension voice ip system number could private branch exchange e.164 telephone number dialled specific gateway scheme defined sip address written user domain.tld format similar fashion email address address like instructs sip client use naptr srv schemes look sip server associated dns name voip-provider.example.net connect server records found name associated ip address client directly contact sip server ip address port 5060 default using udp transport protocol ask server may gateway connected destination user 1-999-123-4567 gateway may require user register using sip placing call destination port provided part sip uri naptr/srv lookups used rather client directly connects specified host port sip address text much like e-mail address may contain non-numeric characters client may sip phone device numeric telephone-like keypad various schemes exist associate entirely numeric identifier publicly reachable sip address include inum initiative issues e.164-formatted numbers corresponding sip address number sip.inum.net sip broker-style services associate numeric *prefix sip domain name e164.org e164.arpa domain name servers convert numbers addresses one-by-one dns reverse-lookups sip addresses may used directly configuration files instance asterisk pbx installations specified web interface voice-over-ip gateway provider usually call forwarding destination address book entry systems allow speed dial user address book using vertical service code may allow short numeric code like *75xx translated pre-stored alphanumeric sip address theory owner sip-capable telephone handset could publish sip address could freely directly reached worldwide much way smtp e-mail recipients may contacted anywhere almost cost message sender anyone broadband connection could install softphone ekiga call sip addresses free practice various forms network abuse discouraging creation publication openly reachable sip addresses server logs looks like attempt call palestinian mobile telephone israel country code +972 randomly trying 9- common code outside line office pbx 011- overseas call prefix north american numbering plan 7- off-chance pbx using instead 9- outside line security tools firewalls fail2ban must therefore deployed prevent unauthorised outside call attempts many voip providers also disable overseas calls countries specifically requested enabled subscriber sips uri scheme adheres syntax sip uri differing scheme codice_1 rather codice_2 default internet port address sips 5061 unless explicitly specified uri sips allows resources specify reached securely mandates hop request forwarded target domain must secured tls last hop proxy target domain user agent secured according local policies sips protects attackers try listen signaling link provide real end-to-end security since encryption hop-by-hop every single intermediate proxy trusted | [
10242,
5251,
3717,
3218,
11413,
10271,
35,
8998,
6319,
9909,
6330,
4797,
6590,
7364,
2887,
9167,
10341,
10727,
11112,
5482,
9834,
11509,
8950,
3191,
6651
] | Test |
10,270 | 7 | Streaming_media:streaming media streaming media multimedia constantly received presented end-user delivered provider verb stream refers process delivering obtaining media manner term refers delivery method medium rather medium alternative file downloading process end-user obtains entire file content watching listening client end-user use media player start playing digital video digital audio content entire file transmitted distinguishing delivery method media distributed applies specifically telecommunications networks delivery systems either inherently streaming e.g radio television streaming apps inherently non-streaming e.g books video cassettes audio cds example 1930s elevator music among earliest popular music available streaming media nowadays internet television common form streamed media term streaming media apply media video audio live closed captioning ticker tape real-time text considered streaming text live streaming delivery internet content real-time much live television broadcasts content airwaves via television signal live internet streaming requires form source media e.g video camera audio interface screen capture software encoder digitize content media publisher content delivery network distribute deliver content live streaming need recorded origination point although frequently challenges streaming content internet user enough bandwidth internet connection may experience stops lags slow buffering content users may able stream certain content due compatible computer software systems popular streaming services include video sharing website youtube netflix amazon video vudu stream films television shows spotify apple music stream music video game live streaming sites twitch mixer early 1920s george o. squier granted patents system transmission distribution signals electrical lines technical basis later became muzak technology streaming continuous music commercial customers without use radio attempts display media computers date back earliest days computing mid-20th century however little progress made several decades primarily due high cost limited capabilities computer hardware late 1980s 1990s consumer-grade personal computers became powerful enough display various media primary technical issues related streaming enough cpu power bus bandwidth support required data rates creating low-latency interrupt paths operating system prevent buffer underrun enabling skip-free streaming content however computer networks still limited mid-1990s audio video media usually delivered non-streaming channels downloading digital file remote server saving local drive end user computer storing digital file playing back cd-roms 1991 first commercial ethernet switch see network switch introduced enabled powerful computer networks leading first streaming video solutions see business developments used schools corporations expanding bloomberg television worldwide mid 1990s world wide web established streaming audio would practical years later practical streaming media made possible advances data compression due impractically high bandwidth requirements uncompressed media raw digital audio encoded pulse-code modulation pcm requires bandwidth 1.4mbps uncompressed cd audio raw digital video requires bandwidth 168mbps sd video 1gbps fhd video important compression technique enabled practical streaming media discrete cosine transform dct form lossy compression conceived 1972 nasir ahmed developed algorithm t. natarajan k. r. rao university texas 1973 dct algorithm basis first practical video coding format h.261 1988 initially used online video conferencing followed dct-based video coding standards notably mpeg video formats 1991 onwards dct algorithm adapted modified discrete cosine transform mdct j. p. princen a. w. johnson b. bradley university surrey 1987 mdct algorithm fundamental mp3 audio format introduced 1994 especially widely used advanced audio coding aac format introduced 1999 late 1990s early 2000s users increased access computer networks especially internet early 2000s users access increased network bandwidth especially last mile technological improvements facilitated streaming audio video content computer users homes workplaces also increasing use standard protocols formats tcp/ip http html internet became increasingly commercialized led infusion investment sector band severe tire damage first group perform live internet june 24 1993 band playing gig xerox parc elsewhere building scientists discussing new technology mbone broadcasting internet using multicasting proof parc technology band performance broadcast could seen live australia elsewhere march 2017 interview band member russ haines stated band used approximately half total bandwidth internet stream performance 152-by-76 pixel video updated eight twelve times per second audio quality best bad telephone connection microsoft research developed microsoft tv application compiled ms windows studio suite tested conjunction connectix quickcam realnetworks also pioneer streaming media markets broadcast baseball game new york yankees seattle mariners internet 1995 first symphonic concert internet took place paramount theater seattle washington november 10 1995 concert collaboration seattle symphony various guest musicians slash guns n roses velvet revolver matt cameron soundgarden pearl jam barrett martin screaming trees word magazine launched 1995 featured first-ever streaming soundtracks internet metropolitan opera live hd program metropolitan opera streams opera performance live performance taking place 2013–2014 10 operas transmitted via satellite least 2,000 theaters 66 countries term streaming first used tape drives made data electronics inc. drives meant slowly ramp run entire track slow ramp times resulted lower drive costs making competitive product streaming applied early 1990s better description video demand later live video ip networks first done starlight networks video streaming real networks audio streaming time video usually referred store forward video misleading nomenclature first commercial streaming product appeared late 1992 named starworks starworks enabled demand mpeg-1 full motion videos randomly accessed corporate ethernet networks starworks starlight networks also pioneered live video streaming ethernet via internet protocol satellites hughes network systems early companies created streaming media technology include realnetworks known progressive networks protocomm prior wide spread world wide web usage web became popular late 90s streaming video internet blossomed startups vdonet acquired realnetworks precept acquired cisco microsoft developed media player known activemovie 1995 allowed streaming media included proprietary streaming format precursor streaming feature later windows media player 6.4 1999 june 1999 apple also introduced streaming media format quicktime 4 application later also widely adopted websites along realplayer windows media streaming formats competing formats websites required user download respective applications streaming resulted many users three applications computer general compatibility 2000 industryview.com launched world largest streaming video archive website help businesses promote webcasting became emerging tool business marketing advertising combined immersive nature television interactivity web ability collect data feedback potential customers caused technology gain momentum quickly around 2002 interest single unified streaming format widespread adoption adobe flash prompted development video streaming format flash format used flash-based players video hosting sites first popular video streaming site youtube founded steve chen chad hurley jawed karim 2005 initially used flash-based player played mpeg-4 avc video aac audio defaults html5 video increasing consumer demand live streaming prompted youtube implement new live streaming service users company currently also offers secured link returning available connection speed user recording industry association america riaa revealed 2015 earnings report streaming services responsible 34.3 percent year total music industry revenue growing 29 percent previous year becoming largest source income pulling around 2.4 billion us streaming revenue grew 57 percent 1.6 billion first half 2016 accounted almost half industry sales advances computer networking combined powerful home computers modern operating systems made streaming media practical affordable ordinary consumers stand-alone internet radio devices emerged offer listeners no-computer option listening audio streams audio streaming services become increasingly popular recent years streaming music hit record 118.1 billion streams 2013 general multimedia content large volume media storage transmission costs still significant offset somewhat media generally compressed storage streaming increasing consumer demand streaming high definition hd content led industry develop number technologies wirelesshd itu-t g.hn optimized streaming hd content without forcing user install new networking cables 1996 digital pioneer marc scarpa produced first large-scale online live broadcast history adam yauch-led tibetan freedom concert event would define format social change broadcasts scarpa continued pioneer streaming media world projects woodstock '99 townhall president clinton recently covered ca campaign tell friend get covered live streamed youtube media stream streamed either live demand live streams generally provided means called true streaming true streaming sends information straight computer device without saving file hard disk on-demand streaming provided means called progressive streaming progressive download progressive streaming saves file hard disk played location on-demand streams often saved hard disks servers extended amounts time live streams available one time e.g. football game streaming media increasingly coupled use social media example sites youtube encourage social interaction webcasts features live chat online surveys user posting comments online furthermore streaming media increasingly used social business e-learning due popularity streaming medias many developers introduced free hd movie streaming apps people use smaller devices tablets smartphones everyday purposes horowitz research state pay tv ott svod 2017 report said 70 percent viewing content streaming service 40 percent tv viewing done way twice number five years earlier millennials report said streamed 60 percent content one movie streaming industry largest impacts dvd industry effectively met demise mass popularization online content rise media streaming caused downfall many dvd rental companies blockbuster july 2015 new york times published article netflix dvd services stated netflix continuing dvd services 5.3 million subscribers significant drop previous year hand streaming services 65 million members march 2016 study assessing “ impact movie streaming traditional dvd movie rental ” found respondents purchase dvd movies nearly much anymore streaming taken market according study viewers find movie quality significantly different dvd online streaming issues respondents believed needed improvement movie streaming included functions fast forwarding rewinding well search functions article highlighted quality movie streaming industry would increase time advertising revenue continued soar yearly basis throughout industry providing incentive quality content production music streaming one popular ways consumers interact streaming media age digitization private consumption music transformed public good largely due one player market napster napster peer-to-peer p2p file sharing network users could upload download mp3 files freely broke music industry conventions launched early 1999 hull massachusetts platform developed shawn john fanning well sean parker interview 2009 shawn fanning explained napster “ something came result seeing sort unmet need passion people able find music particularly lot obscure stuff ’ something go record store purchase felt like problem worth solving. ” development disrupt music industry making songs previously required payment acquire freely accessible napster user demonstrated power p2p networks turning digital file public shareable good brief period time napster existed mp3 files fundamentally changed type good songs longer financially excludable barring access computer internet access rival meaning one person downloaded song diminish another user napster like providers public goods faced problem free riding every user benefits individual uploads mp3 file requirement mechanism forces users share music thus napster users incentivized let others upload music without sharing files structure revolutionized consumer ’ perception ownership digital goods made music freely replicable napster quickly garnered millions users growing faster business history peak existence napster boasted 80 million users globally site gained much traffic many college campuses block access napster created network congestion many students sharing music files advent napster sparked creation numerous p2p sites including limewire 2000 bittorrent 2001 pirate bay 2003 reign p2p networks short lived first fall napster 2001 numerous lawsuits filed napster various record labels subsidiaries universal music group sony music entertainment warner music group emi addition recording industry association america riaa also filed lawsuit napster grounds unauthorized distribution copyrighted material ultimately led napster shutting 2001 interview gary stiffelman represents eminem aerosmith tlc explained napster problem record labels loss revenue interview new york times stiffelman said “ ’ opponent artists ’ music included services ’ opponent revenue shared lawsuit records inc. v. napster inc. fundamentally changed way consumers interact music streaming argued october 2 2000 decided february 12 2001 court appeals ninth circuit ruled p2p file sharing service could held liable contributory vicarious infringement copyright serving landmark decision intellectual property law first issue court addressed “ fair use ” says otherwise infringing activities permissible long purposes “ criticism comment news reporting teaching ... scholarship research. ” judge beezer judge case noted napster claimed services fit “ three specific alleged fair uses sampling users make temporary copies work purchasing space-shifting users access sound recording napster system already audio cd format permissive distribution recordings new established artists. ” judge beezer found napster fit criteria instead enabling users repeatedly copy music would affect market value copyrighted good second claim plaintiffs napster actively contributing copyright infringement since knowledge widespread file sharing platform since napster took action reduce infringement financially benefited repeated use court ruled p2p site court found “ much eighty-seven percent files available napster may copyrighted seventy percent may owned administered plaintiffs. ” injunction ordered napster ended brief period music streaming public good non-rival non-excludable nature p2p networks success sharing mp3 ’ though met similar fate court ruling set precedent copyrighted digital content freely replicated shared unless given consent owner thereby strengthening property rights artists record labels alike although music streaming longer freely replicable public good streaming platforms spotify deezer apple music soundcloud prime music shifted music streaming club-type good platforms notably spotify give customers access freemium service enables use limited features exposure advertisements companies operate premium subscription model circumstances music streaming financially excludable requiring customers pay monthly fee access music library non-rival since one customer ’ use impair another ’ music streaming platforms grown rapidly popularity recent years spotify 207 million users january 1 2019 78 different countries apple music 60 million soundcloud 175 million platforms provide varying degrees accessibility apple music prime music offer services paid subscribers whereas spotify soundcloud offer freemium premium services napster owned rhapsody since 2011 resurfaced music streaming platform offering subscription based services 4.5 million users january 2017 music streaming providers proliferated competition pushed price subscriptions music piracy rates also fallen see chart right music industry ’ response music streaming initially negative along music piracy streaming services disrupted market contributed fall revenue 14.6 billion revenue 1999 6.3 billion 2009 u.s. cd ’ single-track downloads selling content freely available internet result record labels invested artists “ safe ” chart music became appealing producers bands unique sounds 2018 however music streaming revenue exceeded traditional revenue streams e.g record sales album sales downloads 2017 alone saw 41.1 increase streaming revenue alone 8.1 increase overall revenue streaming revenue one largest driving forces behind growth music industry interview jonathan dworkin senior vice president strategy business development universal said “ afraid perpetual change dynamism driving growth. ” broadband speed 2 mbit/s recommended streaming standard definition video without experiencing buffering skips especially live video example roku apple tv google tv sony tv blu-ray disc player 5 mbit/s recommended high definition content 9 mbit/s ultra-high definition content streaming media storage size calculated streaming bandwidth length media using following formula single user file requires storage size megabytes equal length seconds × bit rate bit/s 8 × 1024 × 1024 example one hour digital video encoded 300 kbit/s typical broadband video 2005 usually encoded 320 × 240 pixels window size 3,600 × 300,000 bit/s 8×1024×1024 requires around 128 mb storage file stored server on-demand streaming stream viewed 1,000 people time using unicast protocol requirement 300 kbit/s × 1,000 300,000 kbit/s 300 mbit/s bandwidth equivalent around 135 gb per hour using multicast protocol server sends single stream common users therefore stream would use 300 kbit/s serving bandwidth see information protocols calculation live streaming similar assuming seed encoder 500 kbit/s show lasts 3 hours 3,000 viewers calculation number mbs transferred encoder speed bit/s × number seconds × number viewers 8*1024*1024 results calculation follows number mbs transferred 500 x 1024 bit/s × 3 × 3,600 3 hours × 3,000 number viewers 8*1024*1024 1,977,539 mb audio stream compressed make file size smaller using audio coding format mp3 vorbis aac opus video stream compressed using video coding format make file size smaller video coding formats include h.264 hevc vp8 vp9 encoded audio video streams assembled container bitstream mp4 flv webm asf isma bitstream delivered streaming server streaming client e.g. computer user internet-connected laptop using transport protocol adobe rtmp rtp 2010s technologies apple hls microsoft smooth streaming adobe hds non-proprietary formats mpeg-dash emerged enable adaptive bitrate streaming http alternative using proprietary transport protocols often streaming transport protocol used send video event venue cloud transcoding service cdn uses http-based transport protocols distribute video individual homes users streaming client end user may interact streaming server using control protocol mms rtsp quality interaction servers users based workload streaming service users attempt access service quality affected unless enough bandwidth host using enough proxy networks designing network protocol support streaming media raises many problems datagram protocols user datagram protocol udp send media stream series small packets simple efficient however mechanism within protocol guarantee delivery receiving application detect loss corruption recover data using error correction techniques data lost stream may suffer dropout real-time streaming protocol rtsp real-time transport protocol rtp real-time transport control protocol rtcp specifically designed stream media networks rtsp runs variety transport protocols latter two built top udp another approach seems incorporate advantages using standard web protocol ability used streaming even live content adaptive bitrate streaming http adaptive bitrate streaming based http progressive download contrary previous approach files small compared streaming packets much like case using rtsp rtp reliable protocols transmission control protocol tcp guarantee correct delivery bit media stream however accomplish system timeouts retries makes complex implement also means data loss network media stream stalls protocol handlers detect loss retransmit missing data clients minimize effect buffering data display delay due buffering acceptable video demand scenarios users interactive applications video conferencing experience loss fidelity delay caused buffering exceeds 200 ms. unicast protocols send separate copy media stream server recipient unicast norm internet connections scale well many users want view television program concurrently multicast protocols developed reduce server/network loads resulting duplicate data streams occur many recipients receive unicast content streams independently protocols send single stream source group recipients depending network infrastructure type multicast transmission may may feasible one potential disadvantage multicasting loss video demand functionality continuous streaming radio television material usually precludes recipient ability control playback however problem mitigated elements caching servers digital set-top boxes buffered media players ip multicast provides means send single media stream group recipients computer network multicast protocol usually internet group management protocol used manage delivery multicast streams groups recipients lan one challenges deploying ip multicast routers firewalls lans must allow passage packets destined multicast groups organization serving content control network server recipients i.e. educational government corporate intranets routing protocols protocol independent multicast used deliver stream content multiple local area network segments mass delivery content multicast protocols need much less energy resources widespread introduction reliable multicast broadcast-like protocols preferential use wherever possible significant ecological economic challenge peer-to-peer p2p protocols arrange prerecorded streams sent computers prevents server network connections becoming bottleneck however raises technical performance security quality business issues useful – typical – applications streaming concept example long video lectures performed online internet advantage presentation lectures long although always interrupted repeated arbitrary places also new marketing concepts example berlin philharmonic orchestra sells internet live streams whole concerts instead several cds similar fixed media so-called digital concert hall using youtube trailing purposes online concerts also spread lot different places – cinemas – various places globe similar concept used metropolitan opera new york many successful startup ventures based business streaming media also livestream international space station media live streamed recorded certain media players vlc player use screen recorder live-streaming platforms twitch may also incorporate video demand system allows automatic recording live broadcasts watched later popular site youtube also recordings live broadcasts including television shows aired major networks streams potential recorded anyone access whether legally otherwise streaming copyrighted content involve making infringing copies works question recording distribution streamed content also issue many companies rely revenue based views attendance net greenhouse gas emissions streaming music estimated 200 350 million kilograms per year united states according 2019 study increase emissions pre-digital music period estimated 140 million kilograms 1977 136 million kilograms 1988 157 million 2000 several ways decrease ghgs associated streaming music including efforts make data centers carbon neutral converting electricity produced renewable sources individual level purchase physical cd may environmentally friendly played 27 times another option reducing energy use downloading music offline listening reduce need streaming distance spotify service built-in local cache reduce necessity repeating song streams | [
10368,
8833,
1411,
4485,
9990,
1674,
11274,
10126,
2196,
10900,
3350,
11413,
4120,
11674,
5531,
2076,
10782,
10271,
5536,
8864,
546,
6435,
9380,
9381,
9508,
11559,
7722,
5291,
10282,
10410,
9262,
7983,
10924,
562,
5558,
10168,
11576,
7488,
... | Test |
10,271 | 5 | Session_Initiation_Protocol:session initiation protocol session initiation protocol sip signaling protocol used initiating maintaining terminating real-time sessions include voice video messaging applications sip used signaling controlling multimedia communication sessions applications internet telephony voice video calls private ip telephone systems instant messaging internet protocol ip networks well mobile phone calling lte volte protocol defines specific format messages exchanged sequence communications cooperation participants sip text-based protocol incorporating many elements hypertext transfer protocol http simple mail transfer protocol smtp call established sip may consist multiple media streams separate streams required applications text messaging exchange data payload sip message sip works conjunction several protocols specify carry session media commonly media type parameter negotiation media setup performed session description protocol sdp carried payload sip messages sip designed independent underlying transport layer protocol used user datagram protocol udp transmission control protocol tcp stream control transmission protocol sctp secure transmissions sip messages insecure network links protocol may encrypted transport layer security tls transmission media streams voice video sdp payload carried sip messages typically employs real-time transport protocol rtp secure real-time transport protocol srtp sip originally designed mark handley henning schulzrinne eve schooler jonathan rosenberg 1996 protocol standardized 1999 november 2000 sip accepted 3gpp signaling protocol permanent element ip multimedia subsystem ims architecture ip-based streaming multimedia services cellular networks june 2002 specification revised various extensions clarifications published since sip designed provide signaling call setup protocol ip-based communications supporting call processing functions features present public switched telephone network pstn vision supporting new multimedia applications extended video conferencing streaming media distribution instant messaging presence information file transfer internet fax online games sip distinguished proponents roots internet community rather telecommunications industry sip standardized primarily ietf protocols h.323 traditionally associated international telecommunication union itu sip involved signaling operations media communication session primarily used set terminate voice video calls sip used establish two-party unicast multiparty multicast sessions also allows modification existing calls modification involve changing addresses ports inviting participants adding deleting media streams sip also found applications messaging applications instant messaging event subscription notification sip works conjunction several protocols specify media format coding carry media call set call setup body sip message contains session description protocol sdp data unit specifies media format codec media communication protocol voice video media streams typically carried terminals using real-time transport protocol rtp secure real-time transport protocol srtp every resource sip network user agents call routers voicemail boxes identified uniform resource identifier uri syntax uri follows general standard syntax also used web services e-mail uri scheme used sip sip typical sip uri form nowiki sip username domainname /nowiki nowiki sip username hostport /nowiki domainname requires dns srv records locate servers sip domain hostport ip address fully qualified domain name host port secure transmission required scheme sips used sip employs design elements similar http request response transaction model transaction consists client request invokes particular method function server least one response sip reuses header fields encoding rules status codes http providing readable text-based format sip carried several transport layer protocols including transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp sip clients typically use tcp udp port numbers 5060 5061 sip traffic servers endpoints port 5060 commonly used non-encrypted signaling traffic whereas port 5061 typically used traffic encrypted transport layer security tls sip-based telephony networks often implement call processing features signaling system 7 ss7 special sip protocol extensions exist although two protocols different ss7 centralized protocol characterized complex central network architecture dumb endpoints traditional telephone handsets sip client-server protocol equipotent peers sip features implemented communicating endpoints traditional ss7 architecture use switching centers network elements use session initiation protocol communication called sip user agents user agent ua performs function user agent client uac requesting service function user agent server uas responding request thus two sip endpoints may principle operate without intervening sip infrastructure however network operational reasons provisioning public services users directory services sip defines several specific types network server elements service elements also communicates within client-server model implemented user agent clients servers user agent logical network end-point sends receives sip messages manages sip sessions user agents client server components user agent client uac sends sip requests user agent server uas receives requests returns sip response unlike network protocols fix roles client server e.g. http web browser acts client never server sip requires peers implement roles roles uac uas last duration sip transaction sip phone ip phone implements client server functions sip user agent provides traditional call functions telephone dial answer reject call hold call transfer sip phones may implemented hardware device softphone vendors increasingly implement sip standard telephony platform distinction hardware-based software-based sip phones blurred sip elements implemented basic firmware functions many ip-capable communications devices smartphones sip http user agent may identify using message header field user-agent containing text description software hardware product name user agent field sent request messages means receiving sip server evaluate information perform device-specific configuration feature activation operators sip network elements sometimes store information customer account portals useful diagnosing sip compatibility problems display service status proxy server network server uac uas components functions intermediary entity purpose performing requests behalf network elements proxy server primarily plays role routing meaning job ensure request sent another entity closer targeted user proxies also useful enforcing policy determining whether user allowed make call proxy interprets necessary rewrites specific parts request message forwarding sip proxy servers route messages one destination called forking proxies forking sip requests means multiple dialogs established single request explains need two-sided dialog identifier without contribution recipients originator could disambiguate multiple dialogs established single request sip forking refers process forking single sip call multiple sip endpoints powerful feature sip single call ring many endpoints time sip forking allows desk phone ring time mobile allowing call taken either device redirect server user agent server generates 3xx redirection responses requests receives directing client contact alternate set uris redirect server allows proxy servers direct sip session invitations external domains registrar sip endpoint provides location service accepts register requests recording address parameters user agent subsequent requests provides essential means locate possible communication peers network location service links one ip addresses sip uri registering agent multiple user agents may register uri result registered user agents receive calls uri sip registrars logical elements often co-located sip proxies improve network scalability location services may instead located redirect server session border controllers serve middle boxes user agents sip servers various types functions including network topology hiding assistance nat traversal gateways used interconnect sip network networks public switched telephone network use different protocols technologies sip text-based protocol syntax similar http two different types sip messages requests responses first line request method defining nature request request-uri indicating request sent first line response response code requests initiate functionality protocol sent user agent client server answered one sip responses return result code transaction generally indicate success failure state transaction responses sent user agent server indicating result received request several classes responses recognized determined numerical range result codes sip defines transaction mechanism control exchanges participants deliver messages reliably transaction state session controlled various timers client transactions send requests server transactions respond requests one responses responses may include provisional responses response code form 1xx one multiple final responses 2xx – 6xx transactions categorized either type invite type non-invite invite transactions differ establish long-running conversation referred dialog sip include acknowledgment ack non-failing final response e.g. 200 ok session initiation protocol instant messaging presence leveraging extensions simple sip-based suite standards instant messaging presence information message session relay protocol msrp allows instant message sessions file transfer sip developer community meets regularly conferences organized sip forum test interoperability sip implementations ttcn-3 test specification language developed task force etsi stf 196 used specifying conformance tests sip implementations developing sip software deploying new sip infrastructure important test capability servers ip networks handle certain call load number concurrent calls number calls per second sip performance tester software used simulate sip rtp traffic see server ip network stable call load software measures performance indicators like answer delay answer/seizure ratio rtp jitter packet loss round-trip delay time sip connection marketing term voice internet protocol voip services offered many internet telephony service providers itsps service provides routing telephone calls client private branch exchange pbx telephone system public switched telephone network pstn services may simplify corporate information system infrastructure sharing internet access voice data removing cost basic rate interface bri primary rate interface pri telephone circuits sip trunking similar marketing term preferred service used simplify telecom infrastructure sharing carrier access circuit voice data internet traffic removing need primary rate interface pri circuits sip-enabled video surveillance cameras initiate calls alert operator events motion objects protected area sip used audio ip broadcasting applications provides interoperable means audio interfaces different manufacturers make connections one another u.s. national institute standards technology nist advanced networking technologies division provides public-domain java implementation serves reference implementation standard implementation work proxy server user agent scenarios used numerous commercial research projects supports full number extension rfcs including event notification reliable provisional responses numerous commercial open-source sip implementations exist see list sip software sip-i session initiation protocol encapsulated isup protocol used create modify terminate communication sessions based isup using sip ip networks services using sip-i include voice video telephony fax data sip-i sip-t two protocols similar features notably allow isup messages transported sip networks preserves detail available isup header important many country-specific variants isup implemented last 30 years always possible express detail using native sip message sip-i defined itu-t whereas sip-t defined via ietf rfc route concerns security calls via public internet addressed encryption sip protocol secure transmission uri scheme sips used mandate hop request forwarded target domain must secured transport layer security tls last hop proxy target domain user agent secured according local policies tls protects attackers try listen signaling link provide end-to-end security prevent espionage law enforcement interception encryption hop-by-hop every single intermediate proxy trusted end-to-end security may also achieved secure tunneling ipsec service providers offer secure connections use tls securing signaling tls connections use uris form nowiki sips user example.com /nowiki media streams separate connections signaling stream may encrypted secure real-time transport protocol srtp key exchange srtp performed sdes zrtp one may also add mikey exchange sip determine session keys use srtp | [
0,
7681,
10242,
1030,
1036,
14,
527,
8211,
2072,
6681,
3610,
5659,
6682,
7705,
10269,
10270,
3105,
6177,
6689,
9251,
2085,
7208,
5677,
7214,
8238,
562,
1586,
9269,
8758,
11321,
1083,
3133,
5181,
6208,
6723,
11332,
8265,
9292,
4687,
4186,
... | Validation |
10,272 | 3 | Enterprise_Storage_OS:enterprise storage os enterprise storage os also known esos linux distribution serves block-level storage server storage area network san esos composed open-source software projects required linux distribution several proprietary build install time options scst project core component esos provides back-end storage functionality esos niche linux distribution esos intended run usb flash drive type removable media secure digital compactflash etc esos memory resident operating system boot tmpfs file system initialized root file system usb flash drive image copied onto file system configuration files logs periodically written usb flash drive persistent storage user intervention configuration changes occur esos utilizes text-based user interface tui system management network configuration storage provisioning functions tui used esos written c ncurses cdk libraries used esos supports connectivity several different front-end storage area network technologies core functions supported scst third-party target drivers vendors developed scst open-source software projects commodity computing server hardware used back-end side provide underlying storage utilized front-end target interfaces esos differs popular linux distributions bootable iso image provided esos consists one archive file extracted local computer running supported operating system linux windows mac os x local computer used installing esos image usb flash drive removable media device users esos extract archive execute esos install script esos installer script prompts user installation target device writes image allow users integrate proprietary cli raid controller utilities esos usb flash drive january 16 2019 commit bfb8c55 license esos project changed gnu general public license gpl apache license version 2.0 | [
7907,
8772,
935,
5384,
10382,
7983,
246,
7863,
1049,
2045,
3582,
10111
] | Validation |
10,273 | 3 | DOS/V:dos/v dos/v japanese computing initiative starting 1990 allow dos ibm pc compatibles vga cards handle double-byte dbcs japanese text via software alone developed ibm ps/55 machines localized version ps/2 kanji fonts locale information stored hard disk rather special chips preceding ax architecture ax great value japanese computing industry allowing compatibility foreign software possible nec proprietary pc-98 system market leader dos/v emerged dos/v stands disk operating system/vga version 5 dos/v came approximately time dos 5 promotion dos/v done ibm consortium called pc open architecture developers group oadg digital research released japanese dos/v compatible version dr dos 6.0 1992 early 1980s ibm japan released two x86-based personal computer lines asian-pacific region ibm 5550 ibm jx 5550 read kanji fonts disk drew text graphic characters 1024×768 high resolution monitor jx extended ibm pcjr ibm pc architecture supported english japanese version pc dos 720×512 resolution monitor machines could n't break dominant nec pc-98 consumer market japan 5550 expensive mostly sold large enterprises used ibm mainframes jx used 8088 processor instead faster 8086 processor ibm thought consumer product jx must n't surpass business-class 5550 damaged buyer reputations whatever actual speed another point software company said ibm uncooperative developing jx softwares ibm japan planned 100 pc/xt compatible machine codenamed jx2 cancelled 1986 masahiko hatori developer jx dos 1987 started developing dos/v spare time ibm yamato development laboratory era toshiba released japanese version t3100 laptop microsoft introduced ax architecture months later ibm japan released ps/55 model 5535 proprietary laptop using special version dos hatori thought ibm need shift proprietary pc ibm pc compatibles bosses tsutomu maruyama nobuo mii thought japan closed pc market needed changed attempt could n't done ibm alone summer 1989 decided carry development dos/v disclose architecture ps/55 found pc open architecture developers group oadg dos/v development team designed dos/v simple better scalability compatibility original pc dos difficulty reducing text drawing time stopwatch necessity dos/v development hatori said first version dos/v introduced 11 october 1990 shipped november 1990 announcement letter said designed low-end desktops laptops ps/55 users reported bbs could run dos/v ibm pc clones development team confirmed comments modified incompatibilities dos/v secret inside company would prevent sales ps/55 meet opposition hatori said maruyama mii convince ibm branches agree plan beginning december 1990 maruyama went ibm management committee presented plan low-end pc strategy japan committee usual topic took 15 minutes topic took hour plan finally approved john akers committee microsoft japan got contract ibm japan receive source code dos/v 20 december 1990 ibm japan announced founded oadg microsoft would supply dos/v pc manufacturers 1992 1994 japanese manufacturers begun selling ibm pc clones dos/v global manufacturers entered japanese market compaq 1992 dell 1993 fujitsu released ibm pc clones fmv series october 1993 200,000 units shipped 1994 microsoft japan released first retail versions windows windows 3.1 dos/v pc-98 dos/v contributed dawn ibm pc clones japan yet pc-98 kept 50 market share 1996 changed release windows 95 pc dos versions dos/v j japanese p chinese prc taiwanese h korean ms-dos versions dos/v dr dos versions dos/v | [
1408,
8576,
2179,
1400,
4996,
6148,
6787,
10883,
6797,
7053,
1148,
3857,
8976,
9619,
3477,
11673,
6557,
5406,
3359,
8098,
8355,
6442,
10999,
11562,
7983,
9137,
178,
9139,
6325,
7483,
573,
321,
10749,
1219,
964,
6342,
8262,
2813,
9033,
238... | Test |
10,274 | 5 | Session_Announcement_Protocol:session announcement protocol session announcement protocol sap experimental protocol broadcasting multicast session information sap published ietf rfc 2974 sap typically uses session description protocol sdp format real-time transport protocol session descriptions announcement data sent using ip multicast user datagram protocol sap senders periodically broadcast sdp descriptions well-known multicast address port sap listening application listen sap multicasts construct guide advertised multicast sessions announcement interval cooperatively modulated sap announcements multicast delivery scope default consume 4000 bits per second regardless maximum announce interval 300 seconds 5 minutes announcements automatically expire 10 times announcement interval one hour whichever greater announcements may also explicitly withdrawn original issuer sap features separate methods authenticating encrypting announcements use encryption recommended authentication prevents unauthorized modification dos attacks authentication optional two authentication schemes supported message body may optionally compressed using zlib format defined rfc 1950 vlc media player monitors sap announcements presents user list available streams. /ref sap one optional discovery connection management techniques described aes67 audio-over-ethernet interoperability standard | [
1411,
9860,
9734,
3847,
1297,
11413,
2206,
9381,
3629,
7865,
5433,
8386,
11332,
6993,
8283,
1893,
5875,
5118,
2431
] | Test |
10,275 | 4 | Boxbe:boxbe boxbe free service prioritizes screens spam personal email users select email want receive email goes spam presents challenge sender requires human response bulk anonymous data provided parent company provides email validation tracking service boxbe starts user allowing boxbe access user email contacts boxbe gives priority contacts users allow integration within gmail including google apps aol yahoo mail affiliates lets boxbe stay date screen email one way boxbe promotes service sending email addresses member guest list boxbe founded 2005 thede loder corbett barr venture capital firm draper fisher jurvetson esther dyson investors dyson steve jurvetson serving board members way filter spam beyond challenge response boxbe initially used option allowing recipients define price senders must risk deliver initial message paying fee deliver email called attention bond mechanism later abandoned boxbe company founder thede loder along marshall van alstyne rick wash wrote initial paper attention bond mechanism technically capable users assemble many functions whitelisting 2012 edatasource inc. purchased assets boxbe inc | [
8224,
1667,
488,
6762,
1899,
8202,
8747,
914,
5012,
1495
] | Validation |
10,276 | 4 | Zmanda_Recovery_Manager:zmanda recovery manager zmanda recovery manager perl-based utility used automate backup recovery mysql databases released gnu general public license zmanda recovery manager zrm mysql used mysql dbas backup recovery live mysql databases either local remote zrm uses appropriate backup method based particular storage engine used mysql particular storage infrastructure used e.g. use snapshots instant full backups lvm zfs netapp vxfs used zmanda offers three versions zrm mysql zrm enterprise edition zrm cluster edition zrm community edition enterprise edition includes graphical installer zmanda management console zmc command-line interface plugin framework community edition freely downloadable subset enterprise edition licensed gnu gplv2 supports lvm snapshots include zmc graphical installer zrm server runs windows solaris linux distributions including red hat ubuntu backing mysql databases solaris zrm able take benefit snapshot feature zfs zrm integrated | [
5249,
8582,
6280,
3988,
1950,
3366,
6313,
4398,
9014,
823,
9025,
4294,
7764,
7518,
11492,
2281,
5737,
8941,
7022
] | None |
10,277 | 3 | Calxeda:calxeda calxeda previously known smooth-stone company aimed provide computers based arm architecture server computers march 2011 calxeda announced 480-core server development consisting 120 quad-core arm cortex-a9 cpus calxeda claimed reduced energy consumption well better cost per throughput compared x86-based server manufacturers competed many-core server market intel amd recent arm-based server vendors marvell technology group armada xp product multi-core processor manufacturer tilera november 2011 calxeda announced energycore ecx-1000 featuring four 32-bit armv7 cortex-a9 cpu cores operating 1.1–1.4 ghz 32 kb l1 i-cache 32 kb l1 d-cache per core 4 mb shared l2 cache 1.5 w per processor 5 w per server node including 4 gb ddr3 dram 0.5 w idle chip included five 10 gigabit ethernet ports four chips carried energycard uk-headquartered company boston limited announced 2011 appliances based calxeda energycore system chip products boston appliances marketed viridis brand demonstrated november 2012 hewlett-packard used calxeda products server product known moonshot november 2011 named redstone rocket 19 december 2013 reported calxeda going restructuring widely referred shutting operation due running capital venture funding failing secure deal hewlett-packard december 2014 intellectual property developed calxeda re-emerged company called silver lining systems sls | [
7745,
5384,
9964,
7699,
499,
10675
] | None |
10,278 | 4 | Nyotron:nyotron nyotron information-security company established 2009 brothers nir ofer gaist nir gaist cto sagit manor former executive verifone became ceo 2014 company based santa clara ca r office herzliya israel 2006 18-year-old nir gaist created original concept technology became nyotron flagship product paranoid 2007 ofer traveled bucharest romania develop prototype 2008 returned israel seeking support investors major general ret amos malka former director intelligence idf among first investors served nyotron first chairman board 2014 first official version paranoid shipped 2016 nyotron moved headquarters santa clara ca company launched global war room soc console 2017 began offering paranoid service managed detection response mdr service provided solution companies require protection advanced attackers unknown threats limited security staff 2018 nyotron signed distribution agreement ingram micro company published in-depth research report activities oilrig nation-state actor aka apt34 nyotron also joined anti-malware testing standards organization amtso paranoid anti-malware endpoint detection response edr technology grounded three realizations nyotron created map known good behavior operating system areas malicious activity would attempt access file systems process thread management networking registry partition modification approach called os-centric positive security automatic os behavior whitelisting language used describing “ maps ” called behavior patterns mapping bpm patented language require machine learning/artificial intelligence statistical math-based algorithm instead deterministic algorithm complexity 1 means performance n't degrade volume input os-centric positive security approach focuses “ good ” behavior operating system paranoid detects blocks known unknown malware including zero-day exploits company calls “ threat-agnostic defense ” addition protection paranoid provides visibility attack timelines root cause attacker methods ttps 2015 company raised 10 million mivtach shamir holdings investors 2017 21 million raised douglas sandra bergeron founders dgb investments investors 2018 ingram micro made strategic investment 10 million july 2017 paranoid part sc magazine endpoint security group test received 5 5 stars publication stated “ perspective breadth depth analytical capability one best best displays type ever seen. ” september 2017 nyotron labeled “ vendor watch ” enterprise management associates nyotron also named top 50 cyber security leader 2017 cyber defense magazine 2018 paranoid named “ innovator endpoint security 2018 ” cyber defense september 2018 central station released review paranoid giving 4 possible 5 stars stating “ ransomware happening many companies product solution ransomware like virus transforms changing every day product really best solution security issue protecting end-point ransomware threat. ” october 2018 icsa labs released report stating nyotron paranoid icsa labs certified advanced threat defense report goes say nyotron detected 100 441 malicious samples tested 1 false positive 721 innocuous apps test february 2019 nyotron silver cybersecurity excellence awards categories innovative cybersecurity company advanced persistent threat protection | [
9762,
4423,
5902,
7983,
1970,
6516,
7515
] | None |
10,279 | 4 | SMBRelay:smbrelay smbrelay smbrelay2 computer programs used carry smb man-in-the-middle mitm attacks windows machines written sir dystic cult dead cow cdc released march 21 2001 lantacon convention atlanta georgia seven years release microsoft released patch fixed hole exploited smbrelay fix fixes vulnerability smb reflected back client forwarded another host vulnerability still exploited smbrelay receives connection udp port 139 relays packets client server connecting windows machine originating computer port 139 modifies packets necessary connecting authenticating target client disconnected smbrelay binds port 139 new ip address relay address connected directly using net use \\192.1.1.1 used networking functions built windows program relays smb traffic excluding negotiation authentication long target host remains connected user disconnect reconnect virtual ip smbrelay collects ntlm password hashes writes hashes.txt format usable l0phtcrack cracking later time port 139 privileged port requires administrator access use smbrelay must run administrator access account however since port 139 needed netbios sessions difficult block according sir dystic problem marketing standpoint microsoft wants products much backward compatibility possible continuing use protocols known issues continue leave customers risk exploitation ... yet known issues existed since day one protocol bug fundamental design flaw assume nobody used method exploit people silly took less two weeks write smbrelay smbrelay2 works netbios level across protocol netbios bound nbf nbt differs smbrelay uses netbios names rather ip addresses smbrelay2 also supports man-in-the-middling third host however supports listening one name time | [
10914,
1187,
8135,
4552,
6797,
10640,
5111,
11413,
2007,
8827,
1501,
9214,
4863
] | Test |
10,280 | 2 | IBM_Systems_Application_Architecture:ibm systems application architecture systems application architecture saa introduced 1987 set standards computer software developed ibm saa initiative started 1987 leadership earl wheeler father saa intent implement saa ibm operating systems including mvs os/400 os/2 aix ibm version unix operating system target saa interoperability saa family saa define new standards selected among ibm existing guidelines software ibm also purchased third party software developers bachman information systems index technology inc. knowledgeware inc intended implemented uniformly across saa compliant environments standard designed make application programs look work manner across entire range company personal computing systems midrange processors system/370 processors saa labeled complex obscure potentially difficult learn lou gerstner ibm later quietly discontinued use saa umbrella 2001 saa spoken past tense however many individual components saa still use common programming interface attempted standardize compilers application programming interfaces among systems participating saa objective providing common programming interface entire ibm computer product line pcs system/3x system/370 implies saa program written ibm machine run cpi included number pieces common user access aimed providing common user interface entire ibm product line user sits pc see menus keyboards procedures would 3270 terminal hardware differences complete commonality impossible attain ibm created two cua standards basic interface ibm 3270 ibm 5250 terminals advanced interface so-called intelligent workstations pcs keyboard standardized model 101 key enhanced keyboard layout common communications services defined methods heterogeneous systems communicated ccs depended advanced program-to-program communications also known appc lu6.2 systems network architecture sna pu2.1 low entry networking peer peer networking sna management services network control three types data links supported application services provided officevision saa-compliant successor profs as/400 office office automation ad/cycle family development tools intended simplify development saa applications | [
1184,
1760,
4546,
10438,
2089,
909,
7053,
7983,
6544,
10289,
8628,
8502,
2775,
3960,
11450,
3323,
2045
] | None |
10,281 | 2 | Credential_Guard:credential guard credential guard virtualization-based isolation technology lsass prevents attackers stealing credentials could used pass hash attacks credential guard introduced microsoft windows 10 operating system windows 10 version 20h1 credential guard available enterprise edition operating system compromising system attackers often attempt extract stored credentials lateral movement network prime target lsass process stores ntlm kerberos credentials credential guard prevents attackers dumping credentials stored lsass running lsass virtualized container even user system privileges access system creates proxy process called lsaiso lsa isolated communication virtualized lsass process several generic techniques stealing credentials systems credential guard | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
2101,
10812,
3648,
582,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9874,
109... | None |
10,282 | 2 | DirectX_Media:directx media directx media set multimedia-related apis microsoft windows complementing directx included directanimation 2d/3d web animation directshow multimedia playback streaming media directx transform web interactivity direct3d retained mode higher level 3d graphics directshow additionally contained directx plugins audio signal processing directx video acceleration accelerated video playback directx media runtime components distributed part internet explorer directx media sdk directx sdk existed two separate sdks directx 6.0 later microsoft deprecated directx media integrated directshow key part directx media directx april 2005 directshow removed directx moved microsoft platform sdk instead directx however still required build directshow samples directshow components gradually deprecated favor newer media foundation retained mode used variety applications still implemented systems newer xp copying d3drm.dll file older version windows system32 directory 32 bit windows syswow64 directory 64 bit windows regain system-wide support | [
5765,
9609,
6028,
6797,
6927,
790,
6171,
10270,
7713,
11683,
10026,
11060,
11316,
10808,
9167,
9808,
3413,
11223,
8281,
2777,
603,
4321,
5225,
1770,
9328,
2943
] | Test |
10,283 | 4 | Network_behavior_anomaly_detection:network behavior anomaly detection network behavior anomaly detection nbad provides one approach network security threat detection complementary technology systems detect security threats based packet signatures nbad continuous monitoring network unusual events trends nbad integral part network behavior analysis nba offers security addition provided traditional anti-threat applications firewalls intrusion detection systems antivirus software spyware-detection software security monitoring systems utilize signature-based approach detect threats generally monitor packets network look patterns packets match database signatures representing pre-identified known security threats nbad-based systems particularly helpful detecting security threat vectors 2 instances signature-based systems new zero-day attacks ii threat traffic encrypted command control channel certain botnets nbad program tracks critical network characteristics real time generates alarm strange event trend detected could indicate presence threat large-scale examples characteristics include traffic volume bandwidth use protocol use nbad solutions also monitor behavior individual network subscribers order nbad optimally effective baseline normal network user behavior must established period time certain parameters defined normal departure one flagged anomalous nbad used addition conventional firewalls applications detection malware vendors begun recognize fact including nba/nbad programs integral parts network security packages nbad technology/techniques applied number network security monitoring domains including log analysis ii packet inspection systems iii flow monitoring systems iv route analytics | [
704,
9569,
9413,
8998,
3433,
939,
10924,
10417,
6834,
7411,
7515,
11413,
2328,
793,
3323,
156,
10392
] | Test |
10,284 | 4 | Google_Native_Client:google native client google native client nacl sandboxing technology running either subset intel x86 arm mips native code portable executable sandbox allows safely running native code web browser independent user operating system allowing web apps run near-native speeds aligns google plans chrome os may also used securing browser plugins parts applications full applications zerovm demonstrate readiness technology 9 december 2011 google announced availability several new chrome-only versions games known rich processor-intensive graphics including bastion longer supported chrome web store nacl runs hardware-accelerated 3d graphics via opengl es 2.0 sandboxed local file storage dynamic loading full screen mode mouse capture also plans make nacl available handheld devices portable native client pnacl architecture-independent version pnacl apps compiled ahead-of-time pnacl recommended nacl use cases general concept nacl running native code web browser implemented activex still use full access system disk memory user-interface registry etc. native client avoids issue using sandboxing alternative sorts nacl asm.js also allows applications written c c++ compiled run browser half native speed also supports ahead-of-time compilation subset javascript hence backwards-compatible browsers support directly another alternative may initially powered pnacl webassembly october 12 2016 comment chromium issue tracker indicated google pepper native client teams destaffed may 30 2017 google announced deprecation pnacl favor webassembly although initially google planned remove pnacl first quarter 2018 removal currently planned second quarter 2019 except chrome apps native client open-source project developed google date quake xaos battle wesnoth doom lara croft guardian light dust mame well sound processing system csound ported native client native client available google chrome web browser since version 14 enabled default since version 31 portable native client pnacl pronounced pinnacle released arm implementation released march 2010. x86-64 ia-32 mips also supported run application portably pnacl must compiled architecture-agnostic stable subset llvm intermediate representation bytecode executables called pnacl executables pexes pnacl toolchain makes .pexe files nacl toolchain .nexe files magic number .nexe files 0x7f e l f elf chrome translated architecture-specific executables run nacl uses software fault detection isolation sandboxing x86-64 arm x86-32 implementation native client notable novel sandboxing method makes use x86 architecture rarely used segmentation facility native client sets x86 segments restrict memory range sandboxed code access uses code verifier prevent use unsafe instructions perform system calls prevent code jumping unsafe instruction hidden middle safe instruction native client requires indirect jumps jumps start 32-byte-aligned blocks instructions allowed straddle blocks constraints c c++ code must recompiled run native client provides customized versions gnu toolchain specifically gnu compiler collection gcc gnu binutils llvm native client licensed bsd-style license native client uses newlib c library port gnu c library gnu libc also available nacl denotes sodium chloride common table salt pun name pepper also used pepper api cross-platform open-source api creating native client modules pepper plugin api ppapi cross-platform api native client-secured web browser plugins first based netscape npapi rewritten scratch currently used chromium google chrome enable ppapi version adobe flash built-in pdf viewer 12 august 2009 page google code introduced new project pepper associated pepper plugin api ppapi set modifications npapi make plugins portable secure extension designed specifically ease implementing out-of-process plugin execution goals project provide framework making plugins fully cross-platform topics considered include continuously evolving pepper api also supports gamepads version 19 websockets version 18 google open source browser chromium web browser use new browser plug-in model 2015 pepper supported chrome chromium blink layout engine-based browsers opera mozilla firefox stated 2014 would support pepper full specification api beyond implementation chrome designed use blink layout engine private apis specific flash player plugin documented october 2016 mozilla announced re-considered exploring whether incorporate pepper api pdfium future releases firefox however steps taken one website uses nacl server let users experiment go programming language browsers groups browser developers support native client technology others chad austin imvu praised way native client bring high-performance applications web 5 penalty compared native code secure way also accelerating evolution client-side applications giving choice programming language used besides javascript id software john d. carmack praised native client quakecon 2012 saying something inside browser native client much interesting something started really pretty darn clever x86 hack way could sandbox user mode interestingly dynamic recompilation something program c c++ compiles something going -o4 optimization level completely native code pretty damn close native code could evil pointer chasings whatever want to-the-metal game developer professionals critical sandboxing technology substantial substantive interoperability issues mozilla vice president products jay sullivan said mozilla plans run native code inside browser native apps little black boxes webpage ... really believe html want focus mozilla christopher blizzard criticized nacl claiming native code evolve way source code-driven web also compared nacl microsoft activex technology plagued dll hell håkon wium lie opera cto believes nacl seems 'yearning bad old days web native client building new platform – porting old platform web ... bring complexity security issues take away focus web platform second generation sandboxing developed google gvisor intended replace nacl google cloud exact google app engine | [
4096,
9229,
8719,
3600,
1556,
7700,
9244,
7212,
10284,
3633,
4658,
5697,
7234,
4683,
5707,
11343,
3664,
2138,
8285,
2658,
7784,
9320,
9834,
9841,
10353,
115,
8821,
124,
7816,
5262,
7822,
5264,
6800,
11408,
4758,
10393,
6810,
8858,
7841,
1... | None |
10,285 | 3 | Computational_RAM:computational ram computational ram c-ram random-access memory processing elements integrated chip enables c-ram used simd computer also used efficiently use memory bandwidth within memory chip influential implementations computational ram came berkeley iram project vector iram v-iram combines dram vector processor integrated chip reconfigurable architecture dram radram dram reconfigurable computing fpga logic elements integrated chip simplescalar simulations show radram system conventional processor give orders magnitude better performance problems traditional dram system processor embarrassingly parallel computational problems already limited von neumann bottleneck cpu dram researchers expect total cost machine built computational ram run orders magnitude faster traditional general-purpose computer kinds problems 2011 dram process layers optimized high capacitance cpu process optimized high frequency typically twice many beol layers dram since additional layer reduces yield increases manufacturing cost chips relatively expensive per square millimeter compared dram distinct enough three approaches computational ram cpus designed built dram process technology rather cpu logic process technology specifically optimized cpus include berkeley iram project tomi technology dsp1 memory bus off-chip memory many times capacitance on-chip memory bus system separate dram cpu chips several times energy consumption iram system computer performance computational dram expected run hotter traditional dram increased chip temperatures result faster charge leakage dram storage cells computational dram expected require frequent dram refresh processor-in-/near-memory pinm refers computer processor cpu tightly coupled memory generally silicon chip chief goal merging processing memory components way reduce memory latency increase bandwidth alternatively reducing distance data needs moved reduces power requirements system much complexity hence power consumption current processors stems strategies deal avoiding memory stalls 1980s tiny cpu executed forth fabricated dram chip improve push pop forth stack-oriented programming language improved efficiency transputer also large chip memory given made early 1980s making essentially processor-in-memory notable pim projects include berkeley iram project iram university california berkeley project university notre dame pim effort | [
1376,
9126,
2535,
2383,
1776,
2623
] | Train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.