node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
10,386
9
Ike_Nassi:ike nassi isaac robert ike nassi born 1949 brooklyn new york currently ceo tidalscale inc. campbell ca adjunct professor computer science university california santa cruz formerly executive vice president chief scientist sap ag practice lead sap research technology infrastructure practice focused guiding sap technology infrastructure vision direction execution group also responsible sap sponsored academic research program probably best known creating ben shneiderman highly influential nassi–shneiderman diagram notation also helped design ada programming language prior work tidalscale sap nassi helped start three companies firetide infogear technology encore computer co-founded wireless mesh company firetide served executive vice president chief technology officer cto chairman board nassi cto head product operations infogear prior acquisition cisco systems helped start encore computer pioneer symmetric multiprocessors forerunner today multicore processors addition start-up experience nassi held executive position cisco systems following acquisition infogear technology joined apple inc. run new advanced technology group research lab cambridge near mit work dylan programming language intended apple newton become vp development tools california become senior vice president software launch mklinux become corporate officer served boards taligent opendoc foundation also held executive senior management roles visual technology tewkesbury digital equipment corporation softech nassi serves active member board trustees computer history museum mountain view california formerly served board anita borg institute women technology member industry advisory board ieee computer society member advisory boards northwestern university stony brook university peking university visiting scholar stanford university u.c berkeley recently visiting scientist mit nassi holds several patents certificate distinguished service department defense work design ada programming language member defense advanced research projects agency information systems technology group testified congress emerging telecommunications act 1991 nassi holds memberships ieee acm earned bachelor degree mathematics master degree doctorate computer science stony brook university new york
[ 9123, 6234, 2282, 3051, 428, 1389, 11118, 6554, 9999, 11696, 6834, 9778, 5210, 4251 ]
Test
10,387
9
Shell_script:shell script shell script computer program designed run unix shell command-line interpreter various dialects shell scripts considered scripting languages typical operations performed shell scripts include file manipulation program execution printing text script sets environment runs program necessary cleanup logging etc called wrapper term also used generally mean automated mode running operating system shell specific operating systems called things batch files msdos-win95 stream os/2 command procedures vms shell scripts windows nt stream third-party derivatives like 4nt—article cmd.exe mainframe operating systems associated number terms typical unix/linux/posix-compliant installation includes kornshell codice_1 several possible versions ksh88 korn shell '93 others oldest shell still common use bourne shell codice_2 unix systems invariably also include c shell codice_3 bash codice_4 remote shell codice_5 secure shell codice_6 ssl telnet connections shell main component tcl/tk installation usually called codice_7 wish gui-based tcl/tk shell c tcl shells syntax quite similar said programming languages korn shells bash developments bourne shell based algol language elements number others added well hand various shells plus tools like awk sed grep basic lisp c forth contributed perl programming language shells available machine available download and/or purchase include almquist shell codice_8 powershell codice_9 z shell codice_10 particularly common enhanced kornshell tenex c shell codice_11 perl-like shell codice_12 related programs shells based python ruby c java perl pascal rexx c various forms also widely available another somewhat common shell osh whose manual page states enhanced backward-compatible port standard command interpreter sixth edition unix windows-unix interoperability software mks toolkit cygwin uwin interix others make shells unix programming available windows systems providing functionality way signals inter-process communication system calls apis hamilton c shell windows shell similar unix c shell microsoft distributes windows services unix use nt-based operating systems particular posix environmental subsystem shell script provide convenient variation system command special environment settings command options post-processing apply automatically way allows new script still act fully normal unix command one example would create version ls command list files giving shorter command name l would normally saved user bin directory /home/ username /bin/l default set command options pre-supplied first line shebang indicates interpreter execute rest script second line makes listing options file format indicators columns files none omitted size blocks lc_collate=c sets default collation order fold upper lower case together intermix dotfiles normal filenames side effect ignoring punctuation names dotfiles usually shown option like -a used causes parameters given l pass parameters ls normal options syntax known ls still used user could simply use l commonly used short listing another example shell script could used shortcut would print list files directories within given directory case shell script would start normal starting line /bin/sh following script executes command clear clears terminal text going next line following line provides main function script ls -al command lists files directories directory script run ls command attributes could changed reflect needs user note implementation clear command try using clr command instead shell scripts allow several commands would entered manually command-line interface executed automatically without wait user trigger stage sequence example directory three c source code files rather manually running four commands required build final program one could instead create c shell script named build kept directory would compile automatically script would allow user save file edited pause editor run ./build create updated program test return editor since 1980s however scripts type replaced utilities like make specialized building programs simple batch jobs unusual isolated tasks using shell loops tests variables provides much flexibility users bash unix shell script convert jpeg images png images image names provided command-line—possibly via wildcards—instead listed within script created file typically saved file like /home/ username /bin/jpg2png jpg2png command run entire directory full jpeg images /home/ username /bin/jpg2png *.jpg key feature shell scripts invocation interpreters handled core operating system feature rather user shell able execute scripts shell language script interpreter directive handled correctly run shell limitations early bourne shell handling scripts shell scripts set executed os modern shell script footing system commands rather many system commands actually shell scripts generally scripts since interpreted shell instead perl python language extends returning exit codes like system utilities indicate success failure allows called components larger programs regardless larger tools implemented like standard system commands shell scripts classically omit kind filename extension unless intended read running shell special mechanism purpose sh ’ codice_13 csh ’ source many modern shells also supply various features usually found sophisticated general-purpose programming languages control-flow constructs variables comments arrays subroutines sorts features available possible write reasonably sophisticated applications shell scripts however still limited fact shell languages little support data typing systems classes threading complex math common full language features also generally much slower compiled code interpreted languages written speed performance goal standard unix tools sed awk provide extra capabilities shell programming perl also embedded shell scripts scripting languages like tcl perl tcl come graphics toolkits well many powerful scripting languages introduced tasks large complex comfortably handled ordinary shell scripts advantages script desirable development overhead full-blown compiled programming language would disadvantageous specifics separates scripting languages high-level programming languages frequent source debate generally speaking scripting language one requires interpreter shell scripts often serve initial stage software development often subject conversion later different underlying implementation commonly converted perl python c. interpreter directive allows implementation detail fully hidden inside script rather exposed filename extension provides seamless reimplementation different languages impact end users files .sh file extension usually shell script kind shell scripts filename extension perhaps biggest advantage writing shell script commands syntax exactly directly entered command-line programmer switch totally different syntax would script written different language compiled language used often writing shell script much quicker writing equivalent code programming languages many advantages include easy program file selection quick start interactive debugging shell script used provide sequencing decision-making linkage around existing programs moderately sized scripts absence compilation step advantage interpretive running makes easy write debugging code script re-run detect fix bugs non-expert users use scripting tailor behavior programs shell scripting provides limited scope multiprocessing hand shell scripting prone costly errors inadvertent typing errors rm -rf instead intended rm -rf */ folklore unix community single extra space converts command one deletes everything sub-directories one deletes everything—and also tries delete everything root directory similar problems transform cp mv dangerous weapons misuse redirect delete contents file made problematic fact many unix commands differ name one letter cp cd dd df etc another significant disadvantage slow execution speed need launch new process almost every shell command executed script job accomplished setting pipeline efficient filter commands perform work slowdown mitigated complex script typically several orders magnitude slower conventional compiled program performs equivalent task also compatibility problems different platforms larry wall creator perl famously wrote easier port shell shell script similarly complex scripts run limitations shell scripting language limits make difficult write quality code extensions various shells ameliorate problems original shell language make problems worse many disadvantages using script languages caused design flaws within language syntax implementation necessarily imposed use text-based command-line number shells use shell programming languages even full-fledged languages like scsh uses scheme interoperability software cygwin mks toolkit interix available microsoft windows services unix hamilton c shell uwin unix windows others allow unix shell programs run machines running windows nt successors loss functionality ms-dos-windows 95 branch well earlier mks toolkit versions os/2 least three dcl implementations windows type operating systems—in addition xlnt multiple-use scripting language package used command shell windows script host cgi programming—are available systems well mac os x subsequent unix-like well addition aforementioned tools posix os/2 functionality used corresponding environmental subsystems windows nt operating system series windows 2000 well third 16-bit subsystem often called ms-dos subsystem uses command.com provided operating systems run aforementioned ms-dos batch files console alternatives 4dos 4os2 freedos peter norton ndos 4nt take command add functionality windows nt-style cmd.exe ms-dos/windows 95 batch files run command.com os/2 cmd.exe 4nt respectively similar shells enhance integrated windows script host comes three pre-installed engines vbscript jscript vba numerous third-party engines added rexx perl python ruby tcl pre-defined functions 4nt related programs pc dos quite similar ms-dos whilst dr dos different earlier versions windows nt able run contemporary versions 4os2 os/2 subsystem scripting languages definition able extended example ms-dos/windows 95/98 windows nt type systems allows shell/batch programs call tools like kixtart qbasic various basic rexx perl python implementations windows script host installed engines unix posix-compliant systems awk sed used extend string numeric processing ability shell scripts tcl perl rexx python graphics toolkits used code functions procedures shell scripts pose speed bottleneck c fortran assembly language c much faster still add functionality available shell language sockets connectivity functions heavy-duty text processing working numbers calling script abilities self-writing self-modifying code techniques like recursion direct memory access various types sorting difficult impossible main script visual basic applications vbscript used control communicate things spreadsheets databases scriptable programs types telecommunications software development tools graphics tools software accessed component object model
[ 512, 9733, 9735, 3594, 9747, 9245, 5677, 9780, 6718, 8262, 4684, 6228, 603, 5723, 10341, 1130, 621, 9330, 3705, 7292, 9345, 2693, 9871, 3221, 2198, 7318, 9882, 7326, 4775, 7847, 4777, 6313, 10920, 8879, 7857, 11442, 1203, 692, 4277, 6335,...
Validation
10,388
2
Universal_Windows_Platform_apps:universal windows platform apps universal windows platforms uwp apps formerly windows store apps metro-style apps applications used across compatible microsoft windows devices including personal computers pcs tablets smartphones xbox one microsoft hololens internet things uwp software primarily purchased downloaded via microsoft store starting windows 10 windows uses windows app refer uwp apps app installed microsoft store formerly windows store trusted windows store app computer programs running desktop computer desktop apps terms universal windows platform uwp uwp app appear microsoft documentation developers microsoft started retrospectively use windows runtime app refer precursors uwp app unambiguous name windows software first became available name metro-style apps windows store opened 2012 marketed windows 8 windows 8.x metro-style apps run window instead either occupy entire screen snapped one side case occupy entire height screen part width title bar system menu window borders control buttons command interfaces like scroll bars usually hidden first menus located settings charm metro-style apps use ui controls windows 8.x typically follow windows 8.x ui guidelines horizontal scrolling inclusion edge-uis like app bar response criticism customers windows 8.1 title bar present hidden unless users move mouse cursor top screen hamburger menu button title bar gives access charms users point entry metro-style apps windows store enterprises operating windows domain infrastructure may enter contract microsoft allows sideload line-of-business metro-style apps circumventing windows store also major web browser vendors google mozilla foundation selectively exempted rule allowed circumvent microsoft guidelines windows store run metro-style version user chooses make product default web browser metro-style apps third-party apps run windows rt traditional third-party apps run operating system windows 8 computer programs identified static computer icons windows taskbar responsible representing every app window run metro-style apps however identified tiles show icon also dynamic contents addition windows 8 windows 8.1 rtm shown windows taskbar run dedicated app switcher left side screen windows 8.1 update restored taskbar icons metro-style apps set limit many copies desktop apps run simultaneously example one user may run many copies programs notepad paint firefox system resources support desktop apps windows media player designed allow single instance enforced operating system however windows 8 one copy metro-style apps may run given time invoking app brings running instance front true multi-instancing apps available windows 10 version 1803 released may 2018 windows 10 brings significant changes uwp apps look work uwp apps look depends app uwp apps built specifically windows 10 typically distinct look feel use new ui controls look different previous versions windows exception apps use custom ui especially case video games apps designed windows 8.x look significantly different designed windows 10 uwp apps also look almost identical traditional desktop apps using legacy ui controls windows versions dating back windows 95 legacy desktop apps converted uwp apps distributed using appx file format windows 10 uwp apps even designed windows 8.x run floating windows users use windows taskbar task view switch uwp apps desktop apps windows 10 also introduced continuum tablet mode mode default disabled desktop computers enabled tablet computers desktop users switch manually tablet mode apps may resizable windows visible title bars tablet mode enabled resizable apps use windowing system similar metro-style apps windows 8.x forced either occupy whole screen snapped one side uwp apps windows 10 open multiple windows microsoft edge calculator photos examples apps allow windows 10 v1803 released may 2018 added true multi-instancing capabilities multiple independent copies uwp app run uwp apps downloaded windows store sideloaded another device sideloading requirements reduced significantly windows 8.x 10 app must still signed trusted digital certificate chains root certificate metro-style apps suspended closed suspended apps terminated automatically needed windows app manager dynamic tiles background components contracts interfaces interacting apps may require app activated user starts six years invoking arbitrary metro-style app uwp app command line supported feature first introduced insider build 16226 windows 10 released 21 june 2017 traditionally windows software developed using windows api software access api arbitrary restrictions developers free choose programming language development tools metro-style apps however developed using windows runtime winrt calling forbidden api disqualifies app appearing windows store every app using winrt metro-style app limited subset winrt available desktop apps metro-style apps developed using microsoft development tools according allen bauer chief scientist embarcadero technologies apis every computer program must call microsoft forbidden except call comes microsoft visual c++ runtime apps developed work intrinsically smartphones personal computers video game consoles hololens called universal apps accomplished using universal app api first introduced windows 8.1 windows phone 8.1 visual studio 2013 update 2 could used develop apps windows 10 introduced universal windows platform uwp 10 developing universal apps apps take advantage platform developed visual studio 2015 later older metro-style apps windows 8.1 windows phone 8.1 universal 8.1 need modifications migrate platform uwp distinct windows runtime rather extension universal apps longer indicate written specific os manifest instead target one device families e.g desktop mobile xbox internet things iot react capabilities become available device universal app may run small mobile phone tablet provide suitable experience universal app running mobile phone may start behaving way would tablet phone connected monitor suitable docking station appx file format used distribute install apps windows 8.x 10 windows phone 8.1 windows 10 mobile xbox one hololens windows 10 iot core unlike legacy desktop apps appx installation system allowed uwp apps replaces xap file format windows phone 8.1 attempt unify distribution apps windows phone windows 8 appx files compatible windows phone 8.1 later versions windows 8 later versions windows phone 8.x marketplace allows users download appx files sd card install manually contrast sideloading prohibited windows 8.x unless user developers license business domain traditionally windows software power use change ecosystem however wanted windows user account rights user account control antivirus software attempt keep ability check notify user app tries use malicious purposes metro-style apps however sandboxed permanently change windows ecosystem need permission access hardware devices webcam microphone file system access restricted user folders documents microsoft moderates programs may remove windows store discovered security privacy issues
[ 6797, 4624, 10900, 537, 11546, 11549, 3102, 7456, 9762, 2213, 11559, 1832, 3881, 6441, 430, 6709, 1083, 2749, 5952, 8262, 6088, 5078, 9434, 9694, 4704, 8296, 9448, 10986, 364, 4972, 7796, 3573, 5754, 510, 11519 ]
Test
10,389
1
Comparison_of_relational_database_management_systems:comparison relational database management systems following tables compare general technical information number relational database management systems please see individual products articles information unless otherwise specified footnotes comparisons based stable versions without add-ons extensions external programs style= width:16em maintainer first public release date latest stable version latest release date license public issues list style= text-align left 4d 4th dimension style= text-align left adabas style= text-align left adaptive server enterprise style= text-align left advantage database server ads style= text-align left altibase style= text-align left apache derby style= text-align left clustrixdb style= text-align left cubrid style= text-align left datacom style= text-align left db2 style= text-align left empress embedded database style= text-align left exasolution style= text-align left filemaker style= text-align left firebird style= text-align left gpudb style= text-align left hsqldb style= text-align left h2 style= text-align left informix dynamic server style= text-align left ingres style= text-align left interbase style= text-align left linter sql rdbms style= text-align left luciddb style= text-align left mariadb style= text-align left maxdb style= text-align left microsoft access jet style= text-align left microsoft visual foxpro style= text-align left microsoft sql server style= text-align left microsoft sql server compact embedded database style= text-align left mimer sql style= text-align left monetdb style= text-align left msql style= text-align left mysql style= text-align left memsql style= text-align left nexusdb style= text-align left hp nonstop sql style= text-align left nuodb style= text-align left omnis studio style= text-align left openbase sql style= text-align left openedge style= text-align left openlink virtuoso style= text-align left oracle db style= text-align left oracle rdb style= text-align left paradox style= text-align left percona server mysql style= text-align left pervasive psql style= text-align left polyhedra dbms style= text-align left postgresql style= text-align left style= text-align left raima database manager style= text-align left rdm server style= text-align left sap hana style= text-align left soliddb style= text-align left sql anywhere style= text-align left sqlbase style= text-align left sqlite style= text-align left sqream db style= text-align left superbase style= text-align left teradata style= text-align left tibero style= text-align left tidb
[ 5640, 8201, 4106, 6156, 10258, 2068, 3096, 1049, 5658, 3103, 9248, 10793, 1579, 10286, 6709, 11324, 9286, 2632, 9290, 8788, 10326, 7767, 4696, 5210, 1636, 9828, 5734, 8295, 8808, 10340, 2669, 6770, 2168, 1146, 6780, 3196, 8844, 6797, 9360, ...
Test
10,390
8
Bitly:bitly bitly url shortening service link management platform company bitly inc. established 2008 privately held based new york city bitly shortens 600 million links per month use social networking sms email bitly makes money charging access aggregate data created result many people using shortened urls 2017 spectrum equity acquired majority stake bitly 64 million august 2018 bitly shortened 37.5 billion urls bitly url shortening service became popular twitter became default url shortening service website may 6 2009 subsequently replaced twitter t.co service company behind bitly launched similar service online videos determine videos popular web company offers paid solution called bitly enterprise provides advanced branding features audience intel omnichannel campaign tracking companies use custom domains generate shortened links example new york times uses codice_1 pepsi uses codice_2 allows company push brand awareness services twitter use bitly engine generate shortened urls track marketing metrics bitly enterprise also advanced analytics features uses bitly data provide advanced social insight tools companies brands company uses http 301 redirects links shortcuts intended permanent changed created urls shortened bitly service use codice_3 domain generic domain service offers information short bitly url codice_4 available codice_5 url plus sign appended example codice_6 allows users see check long url visiting starting october 12 2010 users could automatically generate qr codes scanned mobile qr code reader automatically directed users shortened links later removed may 29 2012 bitly announced bitmarks new search feature enhanced public profiles iphone app codice_7 country code top-level domain cctld libya 2011 bit.ly address set redirect bitly.com .ly tld controlled libyan government previously removed one domain deemed incompatible muslim law shortened url generated bitly also accessed replacing domain one following
[ 7370, 1643, 9039, 5012, 735 ]
Test
10,391
9
Little_Implementation_Language:little implementation language lil little implementation language system programming language early days unix history pdp-11 machines written p. j. plauger bell labs lil attempted fill gap assemblers machine-independent system implementation languages c programming language basically adding structured programming pdp-11 assembly language lil resembled pl360 c-like flow control syntax lil compiler lc part fifth edition unix 1974 dropped sixth edition unix 1975 plauger left bell labs year plauger explains lil abandoned bell labs favor c
[ 3488, 5492 ]
Test
10,392
4
Spyware:spyware spyware software aims gather information person organization sometimes without knowledge may send information another entity without consumer consent asserts control device without consumer knowledge may send information another entity consumer consent cookies spyware mostly classified four types adware system monitors tracking cookies trojans examples notorious types include digital rights management capabilities phone home keyloggers rootkits web beacons spyware mostly used stealing information storing internet users movements web serving pop-up ads internet users whenever spyware used malicious purposes presence typically hidden user difficult detect spyware keyloggers may installed owner shared corporate public computer intentionally order monitor users term spyware suggests software monitors user computing functions spyware extend beyond simple monitoring spyware collect almost type data including personal information like internet surfing habits user logins bank credit account information spyware also interfere user control computer installing additional software redirecting web browsers spyware change computer settings result slow internet connection speeds un-authorized changes browser settings changes software settings sometimes spyware included along genuine software may come malicious website may added intentional functionality genuine software see paragraph facebook response emergence spyware small industry sprung dealing anti-spyware software running anti-spyware software become widely recognized element computer security practices especially computers running microsoft windows number jurisdictions passed anti-spyware laws usually target software surreptitiously installed control user computer german-speaking countries spyware used made government called govware computer experts common parlance regierungstrojaner literally government trojan govware typically trojan horse software used intercept communications target computer countries like switzerland germany legal framework governing use software us term policeware used similar purposes use term spyware eventually declined practice tracking users pushed ever mainstream major websites data mining companies generally break known laws compel users tracked fraudulent practices per se default settings created users language terms-of-service agreements one documented example cbs/cnet news reported march 7 2011 wall street journal analysis revealing practice facebook websites tracking users browsing activity linked identity far beyond users visits activity within facebook site report stated works go facebook log spend time ... move without logging let say next site go new york times buttons without clicking reported back facebook twitter went also identity within accounts let say moved something like site depression one also tweet button google widget report back went wsj analysis researched brian kennish founder disconnect inc. spyware necessarily spread way virus worm infected systems generally attempt transmit copy software computers instead spyware installs system deceiving user exploiting software vulnerabilities spyware installed without knowledge using deceptive tactics spyware may try deceive users bundling desirable software common tactics using trojan horse spy gadgets look like normal devices turn something else usb keylogger devices actually connected device memory units capable recording stroke made keyboard spyware authors infect system security holes web browser software user navigates web page controlled spyware author page contains code attacks browser forces download installation spyware installation spyware frequently involves internet explorer popularity history security issues made frequent target deep integration windows environment make susceptible attack windows operating system internet explorer also serves point attachment spyware form browser helper objects modify browser behavior spyware rarely operates alone computer affected machine usually multiple infections users frequently notice unwanted behavior degradation system performance spyware infestation create significant unwanted cpu activity disk usage network traffic stability issues applications freezing failure boot system-wide crashes also common spyware interferes networking software commonly causes difficulty connecting internet infections spyware even evident users assume situations performance issues relate faulty hardware windows installation problems another malware infection owners badly infected systems resort contacting technical support experts even buying new computer existing system become slow badly infected systems may require clean reinstallation software order return full functionality moreover types spyware disable software firewalls antivirus software and/or reduce browser security settings opens system opportunistic infections spyware disables even removes competing spyware programs grounds spyware-related annoyances increase likelihood users take action remove programs keyloggers sometimes part malware packages downloaded onto computers without owners knowledge keylogger software freely available internet others commercial private applications keyloggers allow keyboard keystrokes captured also often capable collecting screen captures computer typical windows user administrative privileges mostly convenience program user runs unrestricted access system operating systems windows users able follow principle least privilege use non-administrator accounts alternatively reduce privileges specific vulnerable internet-facing processes internet explorer since windows vista default computer administrator runs everything limited user privileges program requires administrative privileges user account control pop-up prompt user allow deny action improves design used previous versions windows spyware threat evolved number techniques emerged counteract include programs designed remove block spyware well various user practices reduce chance getting spyware system nonetheless spyware remains costly problem large number pieces spyware infected windows computer remedy may involve backing user data fully reinstalling operating system instance spyware completely removed symantec microsoft pc tools many programmers commercial firms released products dedicated remove block spyware programs pc tools spyware doctor lavasoft ad-aware se patrick kolla spybot search destroy rapidly gained popularity tools remove cases intercept spyware programs december 16 2004 microsoft acquired giant antispyware software rebranding windows antispyware beta releasing free download genuine windows xp windows 2003 users 2006 renamed windows defender major anti-virus firms symantec pc tools mcafee sophos also added anti-spyware features existing anti-virus products early anti-virus firms expressed reluctance add anti-spyware functions citing lawsuits brought spyware authors authors web sites programs described products spyware however recent versions major firms home business anti-virus products include anti-spyware functions albeit treated differently viruses symantec anti-virus instance categorizes spyware programs extended threats offers real-time protection threats anti-spyware programs combat spyware two ways programs inspect contents windows registry operating system files installed programs remove files entries match list known spyware real-time protection spyware works identically real-time anti-virus protection software scans disk files download time blocks activity components known represent spyware cases may also intercept attempts install start-up items modify browser settings earlier versions anti-spyware programs focused chiefly detection removal javacool software spywareblaster one first offer real-time protection blocked installation activex-based spyware like anti-virus software many anti-spyware/adware tools require frequently updated database threats new spyware programs released anti-spyware developers discover evaluate adding list known spyware allows software detect remove new spyware result anti-spyware software limited usefulness without regular updates updates may installed automatically manually popular generic spyware removal tool used requires certain degree expertise hijackthis scans certain areas windows os spyware often resides presents list items delete manually items legitimate windows files/registry entries advised less knowledgeable subject post hijackthis log numerous antispyware sites let experts decide delete spyware program blocked manages get installed may resist attempts terminate uninstall programs work pairs anti-spyware scanner user terminates one running process one respawns killed program likewise spyware detect attempts remove registry keys immediately add usually booting infected computer safe mode allows anti-spyware program better chance removing persistent spyware killing process tree may also work detect spyware computer users found several practices useful addition installing anti-spyware programs many users installed web browser internet explorer mozilla firefox google chrome though browser completely safe internet explorer greater risk spyware infection due large user base well vulnerabilities activex three major browsers close equivalent comes security isps—particularly colleges universities—have taken different approach blocking spyware use network firewalls web proxies block access web sites known install spyware march 31 2005 cornell university information technology department released report detailing behavior one particular piece proxy-based spyware marketscore steps university took intercept many educational institutions taken similar steps individual users also install firewalls variety companies monitor flow information going networked computer provide protection spyware malware users install large hosts file prevents user computer connecting known spyware-related web addresses spyware may get installed via certain shareware programs offered download downloading programs reputable sources provide protection source attack individual users use cellphone computer physical electric switch isolated electronic switch disconnects microphone camera without bypass keep disconnected position use limits information spyware collect policy recommended nist guidelines managing security mobile devices 2013 spyware vendors notably 180 solutions written new york times dubbed stealware spyware researcher ben edelman terms affiliate fraud form click fraud stealware diverts payment affiliate marketing revenues legitimate affiliate spyware vendor spyware attacks affiliate networks places spyware operator affiliate tag user activity – replacing tag one spyware operator party gains user choices thwarted legitimate affiliate loses revenue networks reputations injured vendors harmed pay affiliate revenues affiliate party contract affiliate fraud violation terms service affiliate marketing networks result spyware operators 180 solutions terminated affiliate networks including linkshare sharesale mobile devices also vulnerable chargeware manipulates users illegitimate mobile charges one case spyware closely associated identity theft august 2005 researchers security software firm sunbelt software suspected creators common coolwebsearch spyware used transmit chat sessions user names passwords bank information etc however turned actually sophisticated criminal little trojan independent cws case currently investigation fbi federal trade commission estimates 27.3 million americans victims identity theft financial losses identity theft totaled nearly 48 billion businesses financial institutions least 5 billion out-of-pocket expenses individuals copy-protection technologies borrowed spyware 2005 sony bmg music entertainment found using rootkits xcp digital rights management technology like spyware difficult detect uninstall poorly written efforts remove could rendered computers unable function texas attorney general greg abbott filed suit three separate class-action suits filed sony bmg later provided workaround website help users remove beginning april 25 2006 microsoft windows genuine advantage notifications application installed windows pcs critical security update main purpose deliberately uninstallable application ensure copy windows machine lawfully purchased installed also installs software accused phoning home daily basis like spyware removed removewga tool spyware used monitor electronic activities partners intimate relationships least one software package loverspy specifically marketed purpose depending local laws regarding communal/marital property observing partner online activity without consent may illegal author loverspy several users product indicted california 2005 charges wiretapping various computer crimes anti-spyware programs often report web advertisers http cookies small text files track browsing activity spyware always inherently malicious many users object third parties using space personal computers business purposes many anti-spyware programs offer remove common spyware programs illustrate diversity behaviors found attacks note computer viruses researchers give names spyware programs may used creators programs may grouped families based shared program code common behaviors following money apparent financial business connections instance number spyware programs distributed claria collectively known gator likewise programs frequently installed together may described parts spyware package even function separately first recorded use term spyware occurred october 16 1995 usenet post poked fun microsoft business model spyware first denoted software meant espionage purposes however early 2000 founder zone labs gregor freund used term press release zonealarm personal firewall later 2000 parent using zonealarm alerted fact reader rabbit educational software marketed children mattel toy company surreptitiously sending data back mattel since spyware taken present sense according 2005 study aol national cyber-security alliance 61 percent surveyed users computers infected form spyware 92 percent surveyed users spyware reported know presence 91 percent reported given permission installation spyware spyware become one preeminent security threats computer systems running microsoft windows operating systems computers internet explorer ie primary browser particularly vulnerable attacks ie widely used tight integration windows allows spyware access crucial parts operating system internet explorer 6 sp2 released part windows xp service pack 2 browser would automatically display installation window activex component website wanted install combination user ignorance changes assumption internet explorer activex components benign helped spread spyware significantly many spyware components would also make use exploits javascript internet explorer windows install without user knowledge permission windows registry contains multiple sections modification key values allows software executed automatically operating system boots spyware exploit design circumvent attempts removal spyware typically link location registry allows execution running spyware periodically check links removed automatically restored ensures spyware execute operating system booted even registry links removed malicious programmers released large number rogue fake anti-spyware programs widely distributed web banner ads warn users computers infected spyware directing purchase programs actually remove spyware—or else may add spyware proliferation fake spoofed antivirus products bill antispyware troublesome users may receive popups prompting install protect computer fact add spyware software called rogue software recommended users install freeware claiming anti-spyware unless verified legitimate known offenders include fake antivirus products constitute 15 percent malware january 26 2006 microsoft washington state attorney general filed suit secure computer spyware cleaner product unauthorized access computer illegal computer crime laws u.s. computer fraud abuse act u.k. computer misuse act similar laws countries since owners computers infected spyware generally claim never authorized installation prima facie reading would suggest promulgation spyware would count criminal act law enforcement often pursued authors malware particularly viruses however spyware developers prosecuted many operate openly strictly legitimate businesses though faced lawsuits spyware producers argue contrary users claims users fact give consent installations spyware comes bundled shareware applications may described legalese text end-user license agreement eula many users habitually ignore purported contracts spyware companies claria say demonstrate users consented despite ubiquity eulas agreements single click taken consent entire text relatively little caselaw resulted use established common law jurisdictions type agreement binding contract certain circumstances however mean every agreement contract every term one enforceable jurisdictions including u.s. states iowa washington passed laws criminalizing forms spyware laws make illegal anyone owner operator computer install software alters web-browser settings monitors keystrokes disables computer-security software united states lawmakers introduced bill 2005 entitled internet spyware prevention act would imprison creators spyware us federal trade commission sued internet marketing organizations unfairness doctrine make stop infecting consumers pcs spyware one case seismic entertainment productions ftc accused defendants developing program seized control pcs nationwide infected spyware malicious software bombarded barrage pop-up advertising seismic clients exposed pcs security risks caused malfunction seismic offered sell victims antispyware program fix computers stop popups problems seismic caused november 21 2006 settlement entered federal court 1.75 million judgment imposed one case 1.86 million another defendants insolvent second case brought cyberspy software llc ftc charged cyberspy marketed sold remotespy keylogger spyware clients would secretly monitor unsuspecting consumers computers according ftc cyberspy touted remotespy 100 undetectable way spy anyone anywhere ftc obtained temporary order prohibiting defendants selling software disconnecting internet servers collect store provide access information software gathered case still preliminary stages complaint filed electronic privacy information center epic brought remotespy software ftc attention administrative fine first kind europe issued independent authority posts telecommunications opta netherlands applied fines total value euro 1,000,000 infecting 22 million computers spyware concerned called dollarrevenue law articles violated art 4.1 decision universal service providers interests end users fines issued based art 15.4 taken together art 15.10 dutch telecommunications law former new york state attorney general former governor new york eliot spitzer pursued spyware companies fraudulent installation software suit brought 2005 spitzer california firm intermix media inc. ended settling agreeing pay us 7.5 million stop distributing spyware hijacking web advertisements also led litigation june 2002 number large web publishers sued claria replacing advertisements settled court courts yet decide whether advertisers held liable spyware displays ads many cases companies whose advertisements appear spyware pop-ups directly business spyware firm rather contracted advertising agency turn contracts online subcontractor gets paid number impressions appearances advertisement major firms dell computer mercedes-benz sacked advertising agencies run ads spyware litigation gone ways since spyware become common pejorative makers filed libel defamation actions products described 2003 gator known claria filed suit website pc pitstop describing program spyware pc pitstop settled agreeing use word spyware continues describe harm caused gator/claria software result anti-spyware anti-virus companies also used terms potentially unwanted programs greyware denote products 2010 webcamgate case plaintiffs charged two suburban philadelphia high schools secretly spied students surreptitiously remotely activating webcams embedded school-issued laptops students using home therefore infringed privacy rights school loaded student computer lanrev remote activation tracking software included now-discontinued thefttrack thefttrack enabled default software program allowed school district elect activate choose thefttrack surveillance options school wanted enable thefttrack allowed school district employees secretly remotely activate webcam embedded student laptop laptop screen allowed school officials secretly take photos webcam whatever front line sight send photos school server lanrev software disabled webcams uses e.g students unable use photo booth video chat students mistakenly believed webcams work addition webcam surveillance thefttrack allowed school officials take screenshots send school server addition lanrev allowed school officials take snapshots instant messages web browsing music playlists written compositions schools admitted secretly snapping 66,000 webshots screenshots including webcam shots students bedrooms
[ 3072, 2049, 5636, 6149, 8197, 10245, 8200, 10756, 11272, 5131, 9227, 8206, 9233, 9746, 1046, 6679, 8726, 537, 9242, 2075, 10780, 7710, 8735, 9761, 2084, 9256, 9771, 10283, 8753, 11313, 2611, 8247, 10297, 3643, 7739, 3135, 1088, 9791, 4165, ...
None
10,393
3
Nexus_S:nexus nexus smartphone co-developed google samsung manufactured samsung electronics release 2010 first smartphone use android 2.3 gingerbread operating system first android device support near field communication nfc hardware software fourth time google worked manufacturer produce phone previous google g1 mytouch nexus one three htc following nexus next android developer phone galaxy nexus released following year google current generation nexus phones nexus 6p huawei nexus 5x lg electronics nexus first commercial smartphone certified nasa fly space shuttle used international space station part spheres experiment nexus demonstrated google ceo eric schmidt 15 november 2010 web 2.0 summit google officially announced phone blog 6 december 2010 phone became available purchase 16 december united states 22 december united kingdom super amoled version phone gt-i9020 based samsung galaxy hardware principal hardware differences absence support sd card addition near field chip alternate sc-lcd super clear lcd version phone gt-i9023 meant european non-uk market may 2011 sprint introduced nexus us unlike gsm version sprint nexus runs wimax network uses cdma instead gsm also march 2011 vodafone released white version phone web store uk united kingdom nexus sold carphone warehouse available vodafone o2 t-mobile 3 orange networks france available sfr bouygues telecom india samsung officially announced sale unlocked version super lcd screen i9023 support gsm-based carriers throughout country canada nexus became available carriers april 2011 two versions one telus bell rogers 3g frequencies 850/1900/2100 mhz wind/mobilicity/vidéotron using 3g frequencies 900/1700/2100 australia nexus became available black white available vodafone virtual provider crazy john nexus samsung exynos 3110 processor processor combines 45 nm 1 ghz arm cortex a8 based cpu core powervr sgx 540 gpu cpu core code-named hummingbird co-developed samsung intrinsity gpu designed imagination technologies supports opengl es 1.1/2.0 capable 20 million triangles per second nexus first device use slightly curved glass touchscreen described google contour display super amoled 800 x 480 wvga pentile matrix display manufactured samsung markets outside canada us uk super lcd supplied instead phone shipped android 2.3 gingerbread first device ship updated os 19 december 2011 google released android 4.0 ice cream sandwich nexus s. automatic update suspended allegedly due poor battery performance umts/gsm variants among first receive android 4.0.4 march 2012 nexus 4g aka samsung sph-d720 i9020a m200 taking longer gsm variant received android 4.0.4 update several devices samsung galaxy ii receive updates variants 27 june 2012 google i/o conference announced nexus would one first devices receive upgrade android 4.1 jelly bean along motorola xoom galaxy nexus began 26 july 2012 october 2012 jelly bean 4.1.2 ota update released last official os released devices 13 november 2012 announced nexus would updated android 4.2 jelly bean still supported independent developers though android 4.2.2-based well 4.3- 4.4- 5.1- 6.0-based alternative software installed see nexus sim locked unlockable bootloader allowing users install custom roms joshua topolsky writing engadget review praised devices hardware software concluding truth really best android device available right review register gave nexus 85 rating summarized cool innovative device eye snatch apple ’ smartphone crown anandtech review praised display nfc tag reader android gingerbread operating system noted lack 720p video recording hspa+ baseband external storage support techradar review praised nexus fixing gps problems experienced samsung galaxy good news looking upgrade samsung galaxy – gps issues resolved actually get signal problem cnet review enthusiastic display operating system performance cnet noted lack 720p video recording hdmi output external sd card memory support cnet also noted rather fragile feel phone lack led notifications new features nexus one
[ 1537, 3585, 9732, 5637, 6, 11271, 8719, 3600, 7700, 9244, 11294, 10271, 6178, 1578, 3626, 10284, 5677, 7727, 9266, 1083, 10303, 1602, 6212, 69, 8262, 10820, 11337, 4683, 4685, 7246, 11343, 3664, 7253, 8280, 3162, 8794, 8285, 607, 2658, 67...
None
10,394
2
GoboLinux:gobolinux gobolinux open source operating system whose prominent feature reorganization traditional linux file system rather following filesystem hierarchy standard like unix-like systems program gobolinux system subdirectory tree files including settings specific program may found thus program foo specific files libraries codice_1 corresponding version program hand example commonly known gcc compiler suite version 8.1.0 would reside directory codice_2 according gobolinux developers results cleaner system gobolinux hierarchy represents radical departure filesystem hierarchy traditionally employed unix-like operating systems specific types files stored together common standard subdirectories codice_3 executables codice_4 configuration files package managers used keep track file belongs program gobolinux files program placed respective program dedicated subdirectory makers gobolinux said filesystem package manager gobolinux package system uses filesystem package database said produce straightforward less cluttered directory tree gobolinux uses symlinks optional kernel module called gobohide achieve maintaining full compatibility traditional linux filesystem hierarchy creators gobolinux stated design modernisms removal distinctions similar traditional directories locations executables codice_3 codice_6 codice_7 gobolinux designers claimed results shell scripts breaking less often linux distributions change introduced gobolinux 2003 adopted distributions much later fedora merged /bin /usr/bin 2012 debian enabled /usr merge default 2016 gobolinux also allows user different versions program installed concurrently even run concurrently furthermore claimed package management index could never become unsynchronized filesystem references nonexistent files simply become broken links thus become inactive gobolinux filesystem changes also allow innovations entirely new boot system use system v bsd style init systems design gobolinux influenced earlier systems nextstep atheos beos adopted original filesystem structures still maintaining considerable degree compatibility unix root gobolinux tree six directories programs users system files mount depot contents described compile program downloads unpacks compiles source code tarballs installs resulting executable code single command codice_25 using simple compilation scripts known recipes compile system somewhat similar gentoo portage system based freebsd ports collection however portage made traditional filesystem hierarchy compatible filesystem hierarchy standard compile extends capability gobolinux distinctive filesystem hierarchy area package management thus gobolinux filesystem serves naturally kind package manager database compile program introduced gobolinux version 011 discussions porting gentoo portage system gobolinux developing port sourceforge.net project name goboportage compile features included gobolinux hierarchy files grouped functional categories index-like structure using symbolic links rooted codice_12 executables accessible codice_27 libraries accessible codice_28 eliminates many traditional distinctions filesystem hierarchy standard distinction made non-essential files stored codice_29 essential emergency files stored directly subdirectories root directory gobolinux developers maintained although distinctions useful longer necessary gobolinux schema symbolic links relating usual unix directories gobolinux tree therefore one find directories codice_4 codice_31 codice_6 expected places symbolic links point functional equivalent codice_12 tree thus traditionally crucial path names codice_34 codice_35 resolved correctly compatibility directories concealed view using custom kernel modification called gobohide implements support hidden files linux used aesthetic reasons thus optional feature gobolinux uses initialization procedure unlike linux distributions use bsd system v procedure codice_36 files command entire boot procedure codice_37 codice_38 run system boot shutdown respectively additionally possible define runlevel scripts specify different ways system may initialized example codice_39 single-user codice_40 multi-user codice_41 boot graphic mode controlled boot loader menu codice_42 file separates site-specific settings rest scripts application-specific tasks found codice_43 called boot scripts releases numbered using octal base system according authors scheme chosen keeps typical leading zero present many free software version numbers since leading zero often indicates number octal play version numbers race happened among linux distributions around 1999 read decimal numbers using octal numbers causes deterministic version bump eight releases version 013 gobolinux made point releases order avoid implication releases stable others tradition broken version 014.01 update 014 focused bug fixes gobolinux currently developed x86-64 officially made i686 release 015 one point incomplete port i386 made ports also made embedded architectures arm superh tasks achieved bootstrap tool developed especially automate making ports lwn.net reviewed gobolinux 010 2004 linux.com wrote review gobolinux 013 jesse smith distrowatch weekly reviewed gobolinux 015 smith also reviewed gobolinux 016
[ 4611, 3079, 3089, 4113, 8209, 8213, 8727, 543, 11297, 9762, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 2125, 1107, 3667, 1110, 89, 5721, 4192, 3685, 10860, 5742, 2671, 11388, 7293, 1150, 2692, 8837, 9353, ...
Train
10,395
9
Continuation-passing_style:continuation-passing style functional programming continuation-passing style cps style programming control passed explicitly form continuation contrasted direct style usual style programming gerald jay sussman guy l. steele jr. coined phrase ai memo 349 1975 sets first version scheme programming language john c. reynolds gives detailed account numerous discoveries continuations function written continuation-passing style takes extra argument explicit continuation i.e function one argument cps function computed result value returns calling continuation function value argument means invoking cps function calling function required supply procedure invoked subroutine return value expressing code form makes number things explicit implicit direct style include procedure returns become apparent calls continuation intermediate values given names order argument evaluation made explicit tail calls simply call procedure continuation unmodified passed caller programs automatically transformed direct style cps functional logic compilers often use cps intermediate representation compiler imperative procedural programming language would use static single assignment form ssa ssa formally equivalent subset cps excluding non-local control flow occur cps used intermediate representation functional compilers also use a-normal form anf languages requiring eager evaluation rather 'thunks described examples cps cps used frequently compilers programmers local global style cps procedure takes extra argument representing done result function calculating along restrictive style prohibiting variety constructs usually available used expose semantics programs making easier analyze style also makes easy express unusual control structures like catch/throw non-local transfers control key cps remember every function takes extra argument continuation b every argument function call must either variable lambda expression complex expression effect turning expressions inside-out innermost parts expression must evaluated first cps explicitizes order evaluation well control flow examples code direct style corresponding cps appear examples written scheme programming language convention continuation function represented parameter named codice_1 note cps versions primitives used like codice_2 codice_3 cps direct style make examples work scheme system would need write cps versions primitives instance codice_3 defined order call procedure written cps procedure written direct style necessary provide continuation receive result computed cps procedure example assuming cps-style primitives provided might call codice_5 variety compilers way primitive functions provided cps used simplest convention however sometimes boolean primitives provided take two thunks called two possible cases codice_6 call inside codice_7 definition would written instead codice_8 similarly sometimes codice_9 primitive included cps instead function codice_10 provided takes three arguments boolean condition two thunks corresponding two arms conditional translations shown show cps global transformation direct-style factorial takes might expected single argument cps factorial takes two argument continuation function calling cps-ed function must either provide new continuation pass calls cps-ed function non-cps function use implicit continuations thus ensure total absence function stack entire program must cps section write function codice_11 calculates hypotenuse using pythagorean theorem traditional implementation codice_11 function looks like transform traditional function cps one need change signature function get another argument function type return type depends function first calculate square codice_13 function pass lambda function continuation accept square first argument reach result calculations get result function pass codice_14 function final argument returns value passed unchanged codice_15 mtl library shipped ghc compiler control.monad.cont module module provides cont type implements monad useful functions following snippet shows codice_13 function using cont type syntax become cleaner type allows us use function codice_17 type codice_18 function one argument function type function argument accepts function discards computations going call example let break execution codice_11 function least one arguments negative returning zero programming continuations also useful caller want wait callee completes example user-interface ui programming routine set dialog box fields pass along continuation function ui framework call returns right away allowing application code continue user interacts dialog box user presses ok button framework calls continuation function updated fields although style coding uses continuations full cps similar idea used function must run different thread different processor framework execute called function worker thread call continuation function original thread worker results java using swing ui framework using java 8 lambda notation code shortens codice_20 keyword might skipped every call cps tail call continuation explicitly passed using cps without tail call optimization tco cause constructed continuation potentially grow recursion also call stack usually undesirable used interesting ways—see chicken scheme compiler cps tco eliminate concept implicit function return combined use eliminate need run-time stack several compilers interpreters functional programming languages use ability novel ways continuation passing style used implement continuations control flow operators functional language feature first-class continuations first-class functions tail-call optimization without tail-call optimization techniques trampolining i.e using loop iteratively invokes thunk-returning functions used without first-class functions even possible convert tail calls gotos loop writing code cps impossible often error-prone various translations usually defined one- two-pass conversions pure lambda calculus convert direct style expressions cps expressions writing trampolined style however extremely difficult used usually target sort transformation compilation functions using one continuation defined capture various control flow paradigms example scheme note cps transform conceptually yoneda embedding also similar embedding lambda calculus π-calculus outside computer science cps general interest alternative conventional method composing simple expressions complex expressions example within linguistic semantics chris barker collaborators suggested specifying denotations sentences using cps might explain certain phenomena natural language mathematics curry–howard isomorphism computer programs mathematical proofs relates continuation-passing style translation variation double-negation embeddings classical logic intuitionistic constructive logic unlike regular double-negation translation maps atomic propositions p p → ⊥ → ⊥ continuation passing style replaces ⊥ type final expression accordingly result obtained passing identity function continuation cps-style expression example classical logic relates manipulating continuation programs directly scheme call-with-current-continuation control operator observation due tim griffin using closely related c control operator
[ 2304, 10246, 9866, 8587, 9749, 5783, 1952, 2595, 3876, 5677, 5040, 2045, 8883, 2105, 8262, 1613, 5837, 10703, 10324, 10581, 10584, 8926, 10083, 1769, 5354, 2557 ]
None
10,396
8
WS-MetadataExchange:ws-metadataexchange ws-metadataexchange web services protocol specification published bea systems ibm microsoft sap ws-metadataexchange part ws-federation roadmap designed work conjunction ws-addressing wsdl ws-policy allow retrieval metadata web services endpoint uses soap message request metadata goes beyond basic technique appending wsdl service name url
[ 8227, 10020, 7878, 8070, 6284, 10829, 6357, 5210, 3323 ]
Test
10,397
2
Libranet:libranet libranet operating system based debian gnu/linux last version april 25 2005 released libranet 3.0 cost 90 us dollars new users 65 existing libranet users previous version libranet 2.8.1 became free download development libranet discontinued name comes libra computer systems company owned founder fact libra.com taken first release libranet 1999 linux distributions time difficult install considered either programmers wanted low cost server libranet attempted put sell distribution easy install meant desktop use corel likewise attempted corel linux abandoned refocused software windows mac os x operating systems libranet however continued developed recognition linux distribution good desktop users corel sold rights linux operating system xandros later released offering linux desktop 1999 2003 linux distributions comparable desktop usability libranet also priced similarly began change however 2004 linux whole advanced many distributions reasonably easy install relatively user-friendly desktop distributions mepis competitive far less expensive others knoppix offered cost libranet attempted carve niche user-friendly linux distro extensive support termed running support desktop distros compatible debian release time woody support offered truly extensive jon danzig founder would often personally answer people inquiries helped make people chosen libranet even loyal however release debian sarge 2005 along emergence ubuntu debian based distro offered cost option purchase support libranet received less attention debian revamped installer making easier use good reason use debian-based distribution debian installer user friendly libranet released version 3.0 received good reviews market changed desktop distributions various commercial vendors released free versions distributions suse released opensuse red hat released fedora whereas libranet sold distribution gave free extensive support many distributors chose give away distribution sell support and/or sell proprietary software enhancements jon danzig founder libranet died june 1 2005 son tal taken leadership development team stated would stop maintaining libranet daniel de kok remaining employee went become developer centos many users interested seeing libranet libranet adminmenu software continued available operating system setup configuration tool unique also contained user-friendly kernel compiling tool team including daniel de kok proposed opensource libranet release openlibranet 3.1 failing obtain definitive permission plan tal danzig owner plan dropped
[ 2692, 8837, 7435, 6797, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 823, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 3791, 1110, 5721, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, ...
Test
10,398
4
ERP_security:erp security erp security wide range measures aimed protecting enterprise resource planning erp systems illicit access ensuring accessibility integrity system data erp system computer software serves unify information intended manage company including production supply chain management financial management human resource management customer relationship management enterprise performance management etc common erp systems sap oracle e-business suite microsoft dynamics erp system integrates business processes enabling procurement payment transport human resources management product management financial planning erp system stores confidential information isaca recommends regularly conduct comprehensive assessment erp system security checking erp servers software vulnerabilities configuration errors segregation duties conflicts compliance relevant standards recommendations recommendations vendors erp systems process transactions implement procedures ensure users different access privileges hundreds authorization objects sap permitting users perform actions system case 200 users company approximately 800,000 100*2*20*200 ways customize security settings erp systems growth complexity possibility errors segregation duties conflicts increases vendors fix vulnerabilities regular basis since hackers monitor business applications find exploit security issues sap releases patches monthly patch tuesday oracle issues security fixes every quarter oracle critical patch update business applications becoming exposed internet migrate cloud erp cybersecurity survey revealed organizations running erp systems lack awareness actions taken towards erp security isaca states shortage staff members trained erp security security services superficial understanding risks threats associated erp systems consequently security vulnerabilities complicate undertakings detecting subsequent fixing erp security audit done manually various tools erp packages provide means system security auditing manual auditing complex time-consuming process increases possibility making mistake system includes thousands parameters fine settings including segregation duties transactions tables security parameters set every single system erp system settings customized according customers requirements security issues occur erp systems different levels traffic interception modification 2011 sensepost specialists analyzed diag protocol used sap erp system transferring data client sap server two utilities published allowed intercept decrypt modify client-server requests containing critical information made attacks possible including man-in-the-middle attack second utility operates like proxy created identify new vulnerabilities allowed modifying requests coming client server sap erp system possible perform administering functions via telnet protocol encrypts passwords vulnerabilities encryption authentication protocols vulnerabilities protocols e.g rfc sap erp oracle net oracle e-business suite rfc protocol used remote function call connect two systems tcp/ip sap erp rfc call function enables calling running functional module located system abap language used writing business applications sap functions make rfc calls several critical vulnerabilities found sap rfc library versions 6.x 7.x os software vulnerabilities weak os passwords insecure os settings erp systems transfer functionality web applications level lot vulnerabilities erp systems rbac role-based access control model applied users perform transactions gain access business objects model decision grant access user made based functions users roles roles multitude transactions user group users performs company transaction procedure transforming system data helps perform transaction role number corresponding users one multiple roles roles hierarchical roles implemented system transactions corresponding role rarely change administrator needs add delete users roles administrator provides new user membership one roles employees leave organization administrator removes roles segregation separation duties also known sod concept according user make transaction without users e.g user add new supplier write cheque pay supplier risk fraud much lower sod implemented rbac mechanisms notion mutually exclusive roles introduced instance pay supplier one user initiates payment procedure another accepts case initiating payment accepting mutually exclusive roles segregation duties either static dynamic static sod ssod user belong two mutually exclusive roles dynamic sod dsod user perform within one transaction advantages ssod simple dsod flexible segregation duties explained sod matrix x matrixes describe system roles two roles mutually exclusive flag interception corresponding rows columns erp security scanner software intended search vulnerabilities erp systems scanner analyzes configurations erp system searches misconfigurations access control encryption conflicts insecure components checks updates scanner checks system parameters compliance manufacturer recommendations auditing procedures erp security scanners produce reports vulnerabilities listed according criticality examples scanners
[ 2470, 11112, 11507, 5173, 3414, 10717, 4863 ]
None
10,399
7
Cannon's_algorithm:cannon algorithm computer science cannon algorithm distributed algorithm matrix multiplication two-dimensional meshes first described 1969 lynn elliot cannon especially suitable computers laid n × n mesh cannon algorithm works well homogeneous 2d grids extending heterogeneous 2d grids shown difficult main advantage algorithm storage requirements remain constant independent number processors scalable universal matrix multiplication algorithm summa practical algorithm requires less workspace overcomes need square 2d grid used scalapack plapack elemental libraries multiplying two n×n matrices b need n ×n processing nodes p arranged 2d grid initially p responsible b need select k every iteration every processor element pe processors n't access data computing formula_1 therefore processors row column must begin summation different indexes example pe 0,0 calculates formula_2 first step pe 0,1 chooses formula_3 first selection k j mod n pe j satisfies constraint first step first step distribute input matrices processors based previous rule next iterations choose new k k 1 mod n every processor way every processor continue accessing different values matrices needed data always neighbour processors pe j needs formula_4 pe j 1 mod n formula_5 pe 1 mod n j next step means formula_4 passed cyclically left also formula_5 cyclically upwards results multiplications summed usual n steps processor calculated formula_1 sum thus searched formula_9 initial distribution processor data next step stored intermediate result previous sum formula_10 formula_11 means three matrices need stored memory evenly distributed across processors practice much fewer processors matrix elements replace matrix elements submatrices every processor processes values scalar multiplication addition become sequential matrix multiplication addition width height submatrices formula_12 runtime algorithm formula_13 formula_14 time initial distribution matrices first step formula_15 calculation intermediate results formula_16 formula_17 stands time takes establish connection transmission byte respectively disadvantage algorithm many connection setups small message sizes would better able transmit data message
[ 10734, 10021, 7326 ]
Test
10,400
9
Dartmouth_ALGOL_30:dartmouth algol 30 dartmouth algol 30 1960s-era implementation firstly algol 58 programming language algol 60 lgp-30 dartmouth college hence name since limited size lgp-30 precluded full implementation algol 60 certain features arrays called value arrays strings variable array bounds recursion omitted implementers include parameters called name using thunks integer labels dubbed work algol 30 since lgp-30 project emerged small group undergraduate students well equipped perform work development computer languages instance one student stephen j. garland discovered compound statements blocks could included samelson bauer scanning algorithm simple fact published years later algol 30 system suffered one defect hindered wide use student-oriented language two-pass system intermediate code similar relocatable binary punched onto paper tape compilations could batched delays presenting source code tape final execution great allow widespread student use clear load-and-go system needed thus born scalp self contained algol processor
[ 512, 8262, 1610, 4492, 9644, 9804, 6906 ]
Validation
10,401
1
Virtual_Health_Library:virtual health library virtual health library vhl biblioteca virtual en salud bvs institution employs world wide web improve access reliable locally relevant information health health sciences health-professionals researchers academics educators decision makers general public bvses organized auspices pan-american health organization world health organization vhl on-line digital library common space convergence cooperative work producers intermediaries users information healthcare science built developed latin american caribbean center health sciences information also known bireme 1998 vhl promotes development network sources scientific technical information universal access internet bireme envisioned vhl new model management information knowledge includes cooperation convergence institutions systems networks initiatives producers intermediaries users operation networks local national regional international information sources favoring open universal access today every country latin america caribbean regions participates either directly indirectly cooperative products services offered vhl includes 1,000 institutions 30 countries vhl simulated virtual space internet formed collection network health information sources region users different levels locations interact navigate space one many information sources regardless information sources generated updated stored operated internet producers integrators intermediaries decentralized manner following common methodologies integration vhl vhl organizes information structure integrates interconnects literature databases directories experts events institutions catalogue information resources available internet collections full texts highlight scielo scientific electronic library online collection scientific journals selective information dissemination services information sources support education decision-making news discussion lists support virtual communities space vhl therefore dynamic decentralized network information sources based possible retrieve extract information knowledge support health decision-making processes virtual health library visualized distributed base scientific technical health knowledge saved organized stored electronic format countries region universally accessible internet compatible international databases bvs web sites individual countries
[ 4984, 119 ]
None
10,402
5
Multicast_Source_Discovery_Protocol:multicast source discovery protocol multicast source discovery protocol msdp protocol independent multicast pim family multicast routing protocol defined experimental rfc 3618 despite becoming ipv4 de facto standard inter-domain multicast development protocol stopped 2006 decided authors proceed making proposed standard msdp interconnects multiple ipv4 pim sparse-mode pim-sm domains enables pim-sm rendezvous point rp redundancy inter-domain multicasting rfc 4611 msdp uses tcp transport protocol multicast tree needs rp rps peers directly msdp peers messages contain sender source address multicast group address g rp domain receives message determines listeners group listeners exist triggers pim join source domain towards data source peering relationship one msdp peer listens new tcp connections well-known port 639 msdp deliberately unspecified ipv6 number reasons including protocols source-specific multicast ssm bi-directional multicast ipv6 embedded rendezvous points would mean less requirement msdp
[ 1411, 9734, 10924, 6993, 5653, 5469 ]
None
10,403
9
SECD_machine:secd machine secd machine highly influential see landin contribution virtual machine abstract machine intended target functional programming language compilers letters stand stack environment control dump internal registers machine registers stack control dump point realisations stacks environment points realisation associative array machine first specifically designed evaluate lambda calculus expressions originally described peter j. landin mechanical evaluation expressions 1964 description published landin fairly abstract left many implementation choices open like operational semantics hence secd machine often presented detailed form peter henderson lispkit lisp compiler distributed since 1980 since used target several experimental compilers 1989 researchers university calgary worked hardware implementation machine d. a. turner 2012 points revised report algol 60 naur 1963 specifies procedure call copying rule avoids variable capture systematic change identifiers method works algol 60 implementation functional programming language functions first-class citizens free variable call stack might dereferenced error turner notes landin solved secd machine function represented closure heap instead evaluation expression begins expression loaded element control codice_1 environment codice_2 stack codice_3 dump codice_4 begin empty evaluation codice_1 converted reverse polish notation rpn codice_6 apply operator example expression codice_7 single list element changed list codice_8 evaluation codice_1 proceeds similarly rpn expressions first item codice_1 value pushed onto stack codice_3 exactly item identifier value pushed onto stack binding identifier current environment codice_2 item abstraction closure constructed preserve bindings free variables codice_2 closure pushed onto stack item codice_6 two values popped stack application done first applied second result application value pushed onto stack application abstraction value however result lambda calculus expression may application rather value pushed onto stack case current contents codice_3 codice_2 codice_1 pushed onto dump codice_4 stack triples codice_3 reinitialised empty codice_1 reinitialised application result codice_2 containing environment free variables expression augmented binding resulted application evaluation proceeds completed evaluation indicated codice_1 empty case result stack codice_3 last saved evaluation state codice_4 popped result completed evaluation pushed onto stack contents restored codice_4 evaluation restored state continues codice_1 codice_4 empty overall evaluation completed result stack codice_3 secd machine stack-based functions take arguments stack arguments built-in instructions encoded immediately instruction stream like internal data-structures stack list codice_3 register pointing list head beginning due list structure stack need continuous block memory stack space available long single free memory cell even cells used garbage collection may yield additional free memory obviously specific implementations secd structure implement stack canonical stack structure improving overall efficiency virtual machine provided strict bound put dimension stack codice_1 register points head code instruction list evaluated instruction executed codice_1 pointed next instruction list—it similar instruction pointer program counter conventional machines except subsequent instructions always specified execution default contained subsequent memory locations case conventional machines current variable environment managed codice_2 register points list lists individual list represents one environment level parameters current function head list variables free current function bound surrounding function elements codice_2 dump whose head codice_4 register points used temporary storage values registers example function calls likened return stack machines memory organization secd machine similar model used functional language interpreters number memory cells hold either atom simple value example 13 represent empty non-empty list latter case cell holds two pointers cells one representing first element representing list except first element two pointers traditionally named car cdr respectively—but modern terms head tail often used instead different types values cell hold distinguished tag often different types atoms integers strings etc distinguished well list holding numbers 1 2 3 usually written codice_35 might represented follows memory cells 3 5 belong list cells distributed randomly memory cell 2 head list points cell 1 holds first element value list containing 2 3 beginning cell 6 cell 6 points cell holding 2 cell 7 represents list containing 3 pointing cell 8 containing value 3 pointing empty list nil cdr secd machine cell 0 always implicitly represents empty list special tag value needed signal empty list everything needing simply point cell 0 principle cdr list cell must point another list convention car cdr point atoms yield pair usually written like codice_36 number additional instructions basic functions like car cdr list construction integer addition i/o etc exist take necessary parameters stack
[ 2304, 2881, 2595, 1124, 6821, 7395, 3370, 9739, 2381, 5585, 1333, 10581, 5501, 1947, 5342, 1982 ]
Validation
10,404
1
Canadian_Police_Information_Centre:canadian police information centre canadian police information centre cpic cipc central police database canada law enforcement agencies access information number matters canada national law enforcement networking computer system ensuring officers across country access information approximately 3 million files generated year responsibility originating agency ensure data integrity file cpic approved use treasury board canada became operational 1972 maintained royal canadian mounted police rcmp central registry located rcmp headquarters ottawa ontario canada cpic interfaced united states national crime information center national law enforcement telecommunications system information shared example wandering persons registry information shared across border order government agency access cpic must agree abide rules set cpic reference manual approved cpic advisory committee composed 26 senior police officers municipal provincial police forces ontario police commission rcmp non-policing agencies must also enter memorandum understanding rcmp may audited time time compliance cpic broken four data banks investigative identification intelligence ancillary contain information local municipal provincial police services canada well federal law enforcement agencies canada border services agency military police maintain local records addition cpic records local records maintained contact police variety reasons may may contain information would entered cpic system cpic agencies subject audit 4-year cycle records added cpic system must satisfy stringent entry criteria every record must valid accurate complete nature compliant input rules province british columbia mandated law police forces share platform known prime-bc ontario local records kept systems known either niche versadex depending municipalities choice implementation quebec system used called crpq centre de reseignement des policiers du québec rcmp runs similar system called pros police reporting occurrence system provinces providing contract policing well federal policing 2011 toronto-based psychiatric patient advocate office announced received numerous complaints people denied entry united states names american department homeland security watchlist names provided canadian police information centre available american law enforcement authorities according wikileaks
[ 2901 ]
Test
10,405
6
EncFS:encfs encfs free lgpl fuse-based cryptographic filesystem transparently encrypts files using arbitrary directory storage encrypted files two directories involved mounting encfs filesystem source directory mountpoint file mountpoint specific file source directory corresponds file mountpoint provides unencrypted view one source directory filenames encrypted source directory files encrypted using volume key stored either within outside encrypted source directory password used decrypt key encfs offers several advantages disk encryption software simply file stored individually encrypted file elsewhere host directory tree encfs available multiple platforms whereas ecryptfs tied linux kernel encfs implements bitrot detection top underlying filesystem encfs volumes occupy fixed size — encrypted directories grow shrink files added removed mountpoint encfs encrypted directory located normal file server via nfs sshfs etc mirrored backed efficiently normal file-system tools rsync possible directories mountpoint exist different physical devices filesystem mounted one sub-directories source directory backup utilities back files changed source directory file synchronisation cloud storage corruption data isolated corruption filedata local single file data corruption filesystem corrected reliable filesystem repair utility like fsck whole-disk encryption systems lack one attributes since file modifications shine underlying file system various optimizations operating system still possible unlike full-disk encryption example passing information released space trim improve performance ssd drives also supported dm-crypt files accessed random example skip middle large encrypted video without decrypting whole file drawbacks using encfs mounted encfs directories share features restrictions filesystem containing source directory due encryption filenames encrypted files produced encfs longer original filenames therefore filenames whose length close maximum supported filesystem stored encfs since exceed length limit encryption filesystems limit filenames 255 bytes case encfs supports filenames 190 bytes anyone access source directory able see many files encrypted filesystem permissions approximate size last time accessed modified though file names file data encrypted paid security audit conducted february 2014 revealed several potential vulnerabilities concludes announcement encfs 1.8 included several underlying design changes acknowledging security concerns raised previous audit however certain concerns still remain regarding vulnerabilities creating new encfs volume several different options available customize filesystem suit various needs encfs uses whatever ciphers able locate various encryption libraries system blowfish aes typically available cipher key length keysize selected ciphers support variable key lengths file encrypted blocks option controls size blocks time single byte read entire block contained must decrypted likewise write block must decrypted altered re-encrypted default block size 1024 sufficient purposes filenames source directory plain encrypted block stream mode block mode obscures filename length somewhat stream mode keeps short possible might save space source directory filesystem depending filesystem manages directory tree enabled initialization vector filename encryption derived file parent directories causing two files name — different directories — different encrypted filenames directory renamed files directories contained therein need encrypted filenames re-encrypted expensive operation option disabled heavily populated directories renamed often enabled file encrypted random 8-byte initialization vector stored within encrypted file source directory option disabled file encrypted initialization vector make volume key easier break enabling option makes filesystem secure cost additional 8 bytes per file causes file data initialization vector derived filename initialization vector chain data encrypted differently given different filename directory consequently renaming file mode enabled requires either file random initialization vector offset change filename initialization vector chain data re-encoded authors encfs chosen former route considerably faster especially large files makes encoding depend full pathname renaming moving means reencoding hardlinks supported stores checksum encrypted block causing corruption modification encrypted files detected encfs checksum blockmacbytes 8 bytes optionally 8 additional bytes random data blockmacrandbytes added block prevent two blocks unencrypted data checksum option creates large amount cpu overhead block checksum must calculated data read verify integrity written update checksum encfs supports somewhat primitive form secondary volumes single source directory offering different files given different passwords encfs unable decrypt file volume key ignored encfs forced ignore invalid password entry volume key decode differently hence files encrypted decrypted different key present two different encrypted volumes given different passwords however possible two filenames two different secondary volumes encrypted filename case file overwritten new file created note refers encrypted filenames unencrypted filenames danger averted creating one directory per secondary volume storing files visible directory secondary volume mounted also password changed volume key re-encoded new password cause secondary filesystems vanish volume key longer incorrectly decode key given secondary password primary password changed back secondary filesystems become available encfs author support technique
[ 5120, 2050, 2564, 6669, 3598, 4623, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 3629, 7225, 11323, 9281, 8772, 7244, 1109, 8283, 4708, 9836, 7789, 7794, 5749, 9333, 6263, 9335, 9343, 6280, 4746, 7818, 8331, 654, 2193, 2194, 219...
Validation
10,406
2
Interface_Builder:interface builder interface builder software development application apple macos operating system part xcode formerly project builder apple developer developer toolset interface builder allows cocoa carbon developers create interfaces applications using graphical user interface resulting interface stored .nib file short next interface builder recently .xib file interface builder descended nextstep development software name version interface builder also used development openstep software similar tool called gorm exists gnustep march 27 2008 specialized iphone version interface builder allowing interface construction iphone applications released iphone sdk beta 2 interface builder intentionally developed separate application allow interaction designers design interfaces without use code-oriented ide xcode 4 apple integrated functionality directly xcode interface builder first made appearance 1986 written lisp experlisp product expertelligence invented developed jean-marie hullot using object-oriented features experlisp deeply integrated macintosh toolbox denison bollay took jean-marie hullot next later year demonstrate steve jobs jobs immediately recognized value started incorporating nextstep 1988 part nextstep 0.8 first commercial application allowed interface objects buttons menus windows placed interface using mouse one notable early use interface builder development first worldwideweb web browser tim berners-lee cern made using next workstation interface builder provides palettes collections user interface objects objective-c swift developer user interface objects contain items like text fields data tables sliders pop-up menus interface builder palettes completely extensible meaning developer develop new objects add palettes interface builder build interface developer simply drags interface objects palette onto window menu actions messages objects emit connected targets application code outlets pointers declared application code connected specific objects way initialization done runtime improving performance streamlining development process interface builder standalone application interface designers could ship nib files developers would drop projects interface builder saves application interface bundle contains interface objects relationships used application objects archived process also known serialization marshalling contexts either xml file next-style property list file .nib extension upon running application proper nib objects unarchived connected binary owning application awakened unlike almost gui designer systems generate code construct ui notable exceptions glade embarcadero technologies delphi c++builder stream ui objects similarly nibs often referred freeze dried contain archived objects ready run interface builder version 3 new file format extension .xib added functionally identical .nib except stored flat file making suitable storage revision control systems processing tools diff
[ 2819, 9732, 10755, 6023, 7307, 1549, 10765, 4111, 5784, 6554, 11420, 5409, 11430, 4520, 6186, 3371, 7983, 8754, 2363, 1852, 2365, 2366, 576, 5696, 1347, 5194, 7378, 3286, 1623, 7640, 6234, 7133, 3038, 350, 479, 3681, 6502, 10470, 2282, 36...
Test
10,407
3
Dup_(system_call):dup system call unix-like operating systems dup short duplicate dup2 system calls create copy given file descriptor new descriptor actually behave like copy like alias old one dup dup2 calls standardized posix specification former allocates first available descriptor like open behaves alternative way duplicate file descriptor unspecified place fcntl system call codice_1 command latter places copy newfd newfd open closed first unix shells use dup2 input/output redirection along codice_2 tool unix pipes rely following example uses codice_2 codice_4 order connect two separate processes program1 program2 using unix pipes
[ 10016, 6498, 4968, 7933, 5514, 823, 11442, 8499, 7540, 5397, 8438, 5911, 6813 ]
Test
10,408
1
Port_State_Control:port state control port state control psc inspection regime countries inspect foreign-registered ships port flag state take action ships compliance inspectors called psc officers required investigate compliance requirements international conventions solas marpol stcw mlc inspections involve checking vessel manned operated compliance applicable international law verifying competency ship master officers ship condition equipment 1978 number european countries agreed hague memorandum audit labour conditions board vessels whether accordance rules ilo amoco cadiz sank year decided also audit safety pollution practices end 1982 fourteen european countries agreed paris memorandum understanding port state control paris mou establish port state control nowadays 26 european countries canada signatories paris mou psc reaction failure flag states especially flag convenience states — delegated survey certification responsibilities classification societies modeled paris mou several regional mous signed including tokyo mou pacific ocean acuerdo latino acuerdo de viña del mar south central america caribbean mou mediterranean mou indian ocean mou abuja mou west central atlantic africa black sea mou riyadh mou persian gulf port state control psc makes inspection ships port taken port state control officer psco annual report paris mou reported total 74,713 deficiencies recorded port state control inspections 2007 deficiencies resulted 1,250 detentions year detention ship last course action psco would take upon finding deficiencies aboard vessel courses action psco may impose ship deficiencies order ascending gravity
[ 10073, 41, 3090, 676 ]
None
10,409
0
Transcriber:transcriber transcriber tool transcription annotation speech signals linguistic research supports multiple hierarchical layers segmentation named entity annotation speaker lists topic lists overlapping speakers two views sound pressure waveform different resolutions may viewed simultaneously various character encodings including unicode supported annotations transcriber may exported xml oasis cover pages publishes open dtd used transcriber transcriber written tcl/tk snack audio library therefore available major platforms distributed gnu general public license transcriber superseded transcriberag
[ 6144, 6626, 5612, 7983, 4979, 479 ]
None
10,410
2
Nokia_E52/E55:nokia e52/e55 nokia e52 nokia e55 smartphones nokia business-oriented eseries range run symbian os v9.3 s60 3rd edition fp1 e55 announced 16 february 2009 whilst e52 announced later 6 may 2009 physically functionally identical except e55 'half-qwerty keyboard whereas e52 revision traditional t9 keypad available black black aluminum metal grey aluminium white aluminium gold came 1gb microsd memory card supports microsd cards 32gb memory also 60 mb free user memory e52 successor nokia successful e51 model latest firmware version v091.004 released june 2 2012 e52 e55 9.9 mm thickness slim time feature mostly metallic bodies nokia called e55 world thinnest smartphone 0.1 mm thinner nokia e71 e55 model unique 'compact qwerty keyboard featuring two letters qwerty order single key observed 5.5 watt-hour 1500 mah 3.7 v battery easily last 27 days practical use considerably higher phones class made nokia manufacturers wifi bluetooth used built-in voip client active battery last 24 hours
[ 1537, 4609, 8577, 3205, 3462, 11655, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 10270, 11545, 4003, 4132, 6310, 167, 40, 8360, 3626, 5290, 10410, 9262, 690, 10802, 7220, 821, 5175, 7866, 1083, ...
Test
10,411
2
CNK_operating_system:cnk operating system compute node kernel cnk node level operating system ibm blue gene series supercomputers compute nodes blue gene family supercomputers run compute node kernel cnk lightweight kernel runs node supports one application running one user node maximize operating efficiency design cnk kept simple minimal implemented 5,000 lines c++ code physical memory statically mapped cnk neither needs provides scheduling context switching given point runs one application one user allowing virtual memory multi-tasking design cnk aimed devote many cycles possible application processing cnk even implement file input/output i/o compute node delegates dedicated i/o nodes i/o nodes blue gene supercomputers run different operating system i/o node kernel ink ink based modified linux kernel
[ 6179, 1795, 1480, 7497, 1933, 7983, 1168, 8242, 6675 ]
None
10,412
4
Dynamic_Application_Security_Testing:dynamic application security testing dynamic application security testing dast tool program communicates web application web front-end order identify potential security vulnerabilities web application architectural weaknesses performs black-box test unlike static application security testing tools dast tools access source code therefore detect vulnerabilities actually performing attacks dast tools allow sophisticated scans detecting vulnerabilities minimal user interactions configured host name crawling parameters authentication credentials tools attempt detect vulnerabilities query strings headers fragments verbs get/post/put dom injection customers benefit convenience applications tacitly taking risk private information stored web applications compromised hacker attacks insider leaks according privacy rights clearinghouse 18 million customer records compromised 2012 due insufficient security controls corporate data web applications dast tools facilitate automated review web application expressed purpose discovering security vulnerabilities required comply various regulatory requirements web application scanners look wide variety vulnerabilities input/output validation e.g cross-site scripting sql injection specific application problems server configuration mistakes copyrighted report published march 2012 security vendor cenzic common application vulnerabilities recently tested applications include commercial scanners category web-assessment tools need bought specific price usually quite high scanners include free features need bought full access tool power open-source scanners another class free nature best category since source code open user gets know happening unlike commercial scanners security researcher shay chen previously compiled exhaustive list commercial open-source web application security scanners list also highlights scanners performed benchmarking tests wavsep wavsep platform publicly available used evaluate various aspects web application scanners technology support performance accuracy coverage result consistency tools detect vulnerabilities finalized release candidate versions prior shipping scanners simulate malicious user attacking probing identifying results part expected result set dynamic testing tool web scanners language dependent web application scanner able scan engine-driven web applications attackers use tools tools find vulnerability attackers scanning dast tool data may overwritten malicious payloads injected subject site sites scanned production like non-production environment ensure accurate results protecting data production environment tool implementing dynamic testing method cover 100 source code application application penetration tester look coverage web application attack surface know tool configured correctly able understand web application tool implement variants attacks given vulnerability tools generally predefined list attacks generate attack payloads depending tested web application tools also quite limited understanding behavior applications dynamic content javascript flash report 2012 found top application technologies overlooked web application scanners includes json jquery rest google webtoolkit ajax applications flash remoting amf html5 well mobile apps web services using json rest xml-rpc soap technologies used web services complex workflows shopping cart xsrf/csrf tokens also listed
[ 1474, 899, 1251, 5636, 2470, 3462, 4198, 2409, 6665, 1803, 331, 7526, 5682, 3604, 9432, 10492, 8094 ]
Validation
10,413
1
SQL:sql sql s-q-l sequel structured query language domain-specific language used programming designed managing data held relational database management system rdbms stream processing relational data stream management system rdsms particularly useful handling structured data relations different entities/variables data sql offers two main advantages older read/write apis like isam vsam first introduced concept accessing many records one single command second eliminates need specify reach record e.g without index originally based upon relational algebra tuple relational calculus sql consists many types statements may informally classed sublanguages commonly data query language dql data definition language ddl data control language dcl data manipulation language dml scope sql includes data query data manipulation insert update delete data definition schema creation modification data access control although sql often described great extent declarative language 4gl also includes procedural elements sql one first commercial languages edgar f. codd relational model model described influential 1970 paper relational model data large shared data banks despite entirely adhering relational model described codd became widely used database language sql became standard american national standards institute ansi 1986 international organization standardization iso 1987 since standard revised include larger set features despite existence standards sql code completely portable among different database systems without adjustments sql initially developed ibm donald d. chamberlin raymond f. boyce learning relational model ted codd early 1970s version initially called sequel structured english query language designed manipulate retrieve data stored ibm original quasi-relational database management system system r group ibm san jose research laboratory developed 1970s chamberlin boyce first attempt relational database language square difficult use due subscript notation moving san jose research laboratory 1973 began work sequel acronym sequel later changed sql sequel trademark uk-based hawker siddeley dynamics engineering limited company testing sql customer test sites determine usefulness practicality system ibm began developing commercial products based system r prototype including system/38 sql/ds db2 commercially available 1979 1981 1983 respectively late 1970s relational software inc. oracle corporation saw potential concepts described codd chamberlin boyce developed sql-based rdbms aspirations selling u.s. navy central intelligence agency u.s. government agencies june 1979 relational software inc. introduced first commercially available implementation sql oracle v2 version2 vax computers 1986 ansi iso standard groups officially adopted standard database language sql language definition new versions standard published 1989 1992 1996 1999 2003 2006 2008 2011 recently 2016 sql deviates several ways theoretical foundation relational model tuple calculus model table set tuples sql tables query results lists rows row may occur multiple times order rows employed queries e.g limit clause critics argue sql replaced language strictly returns original foundation example see third manifesto however known proof exists uniqueness added sql least variation sql words quite possible sql fixed least improved regard industry may switch completely different query language obtain uniqueness debate remains open /math sql language subdivided several language elements including sql designed specific purpose query data contained relational database sql set-based declarative programming language imperative programming language like c basic however extensions standard sql add procedural programming language functionality control-of-flow constructs include addition standard sql/psm extensions proprietary sql extensions procedural object-oriented programmability available many sql platforms via dbms integration languages sql standard defines sql/jrt extensions sql routines types java programming language support java code sql databases sql server 2005 uses sqlclr sql server common language runtime host managed .net assemblies database prior versions sql server restricted unmanaged extended stored procedures primarily written c. postgresql lets users write functions wide variety languages—including perl python tcl javascript pl/v8 c. sql implementations incompatible vendors necessarily completely follow standards particular date time syntax string concatenation codice_1s comparison case sensitivity vary vendor vendor particular exceptions postgresql mimer sql strive standards compliance though postgresql adhere standard folding unquoted names done folding unquoted names lower case postgresql incompatible sql standard says unquoted names folded upper case thus codice_2 equivalent codice_3 codice_4 according standard popular implementations sql commonly omit support basic features standard sql codice_5 codice_6 data types obvious examples incidentally popular commercial proprietary sql dbmss oracle whose codice_5 behaves codice_8 lacks codice_6 type ms sql server 2008 version result sql code rarely ported database systems without modifications several reasons lack portability database systems sql adopted standard american national standards institute ansi 1986 sql-86 international organization standardization iso 1987 maintained iso/iec jtc 1 information technology subcommittee sc 32 data management interchange standard commonly denoted pattern iso/iec 9075-n yyyy part n title shortcut iso/iec 9075 iso/iec 9075 complemented iso/iec 13249 sql multimedia application packages sql/mm defines sql based interfaces packages widely spread applications like video audio spatial data 1996 national institute standards technology nist data management standards program certified sql dbms compliance sql standard vendors self-certify compliance products original standard declared official pronunciation sql initialism ess cue el regardless many english-speaking database professionals including donald chamberlin use acronym-like pronunciation sequel mirroring language pre-release development name sequel sql standard gone number revisions interested parties may purchase sql standards documents iso iec ansi draft sql:2008 freely available zip archive sql standard divided ten parts iso/iec 9075 complemented iso/iec 13249 sql multimedia application packages closely related separate standard developed committee defines interfaces packages based sql aim unified access typical database applications like text pictures data mining spatial data iso/iec 9075 also accompanied series technical reports published iso/iec tr 19075 8 parts technical reports explain justification usage features sql giving examples appropriate technical reports non-normative discrepancy 9075 text 9075 holds currently available 19075 technical reports distinction made alternatives sql language alternatives relational model proposed relational alternatives sql language see navigational database nosql alternatives relational model distributed relational database architecture drda designed work group within ibm period 1988 1994 drda enables network connected relational databases cooperate fulfill sql requests interactive user program issue sql statements local rdb receive tables data status indicators reply remote rdbs sql statements also compiled stored remote rdbs packages invoked package name important efficient operation application programs issue complex high-frequency queries especially important tables accessed located remote systems messages protocols structural components drda defined distributed data management architecture chamberlin 2012 paper discusses four historical criticisms sql early specifications support major features primary keys result sets could named sub-queries defined added 1992 sql controversial null three-value logic predicates evaluated nulls return logical value unknown rather true false features outer-join depend nulls null equivalent space null represents data row another popular criticism allows duplicate rows making integration languages python whose data types might make difficult accurately represent data difficult terms parsing absence modularity avoided declaring unique constraint one fields identifies uniquely row table constraint could also become primary key table similar sense object-relational impedance mismatch mismatch declarative sql language procedural languages sql typically embedded iso/iec information technology task force publishes publicly available standards including sql technical corrigenda corrections technical reports discussion documents published sql -- part 1 framework sql/framework formal sql standards available iso ansi fee informative use opposed strict standards compliance late drafts often suffice
[ 6147, 8201, 6154, 10250, 2063, 6161, 10258, 2068, 8217, 8225, 4135, 44, 10286, 8262, 6219, 83, 10326, 4183, 10340, 10342, 8295, 2163, 2181, 10374, 2183, 4236, 6285, 10389, 151, 2206, 4255, 4263, 6311, 2221, 10413, 10435, 8393, 210, 10459, ...
None
10,414
2
Windows_Image_Acquisition:windows image acquisition windows image acquisition wia sometimes also called windows imaging architecture proprietary microsoft driver model application programming interface api microsoft windows later windows operating systems enables graphics software communicate imaging hardware scanners digital cameras digital video equipment first introduced 2000 part windows continues standard imaging device api model successive windows versions implemented on-demand service windows xp later windows operating systems wia significant superset support digital still imaging drivers provided still image architecture sti windows 98 whereas sti provided low-level interface basic transfers data device well invocation image scan process windows machine external device wia provides framework device present unique capabilities operating system applications invoke features according microsoft wia drivers made user interface ui component driver core component loaded two different process spaces ui application space driver core wia service space certain scanners support wia 2002 microsoft released windows image acquisition automation library tool provides access wia functionality programming languages scripting environments support ole automation windows xp wia runs localsystem context security ramifications running service localsystem whereby buggy driver malicious person would unrestricted access system wia service windows server 2003 windows vista operates localservice context result compatibility issues using driver designed windows xp windows xp support added automatic document feeder scanners scroll-feed scanners without preview capabilities multi-page tiff generation wia video snapshot filter driver introduced allows still frames captured video stream windows vista introduced windows image acquisition 2.0 windows vista also wia automation library built-in wia2 supports push scanning multi-image scanning push scanning allows initiating scans adjusting scanning parameters directly scanner control panel multi-image scanning allows one scan several images save directly separate files however video content support removed wia windows vista
[ 10243, 10255, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 5225, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 3224, 4771, 7846, 2221, 8391, 214, 9943, 9434, 27...
Validation
10,415
2
Queued_Telecommunications_Access_Method:queued telecommunications access method queued telecommunications access method qtam ibm system/360 communications access method incorporating built-in queuing qtam alternative lower level basic telecommunications access method btam access method qtam announced ibm 1965 part os/360 dos/360 aimed inquiry data collection announced also supported remote job entry rje applications called job processing dropped 1968 originally qtam supported ibm 1030 data collection system ibm 1050 data communications system ibm 1060 data communications system 83b2 selective calling stations western union plan 115a outstations teletype model 33 35 teletypewriters 1968 terminal support expanded include ibm 2260 display complex ibm 2740 communications terminal qtam devices attached system/360 multiplexor channel ibm 2701 data adapter ibm 2702 transmission control 1968 support ibm 2703 transmission control unit added qtam succeeded tcam provided roughly similar facilities supported dos qtam consists message control program mcp zero message processing programs mpp mcp handles communications terminals identifies input messages starts mpps process required similar concept much later internet service daemon inetd unix systems mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages mpps incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 codice_3 codice_4 pl/i includes codice_5 file declaration attribute allow mpps written high-level language
[ 1219, 868, 11131, 7272, 8393, 4586, 10508, 10094, 10958, 5936, 10040, 3669, 8502, 2616, 3323, 2813 ]
Test
10,416
4
Network_Based_Application_Recognition:network based application recognition network based application recognition nbar mechanism used cisco routers switches recognize dataflow inspecting packets sent networking equipment uses nbar deep packet inspection packets dataflow determine traffic category flow belongs used conjunction features may program internal application-specific integrated circuits asics handle flow appropriately categorization may done open systems interconnection osi layer 4 info packet content signaling new applications made difficult purpose cling kind tagging nbar approach useful dealing malicious software using known ports fake priority traffic well non-standard applications using dynamic ports nbar also known osi layer 7 categorization cisco routers nbar mainly used quality service security purposes
[ 10417 ]
Test
10,417
4
Deep_packet_inspection:deep packet inspection deep packet inspection dpi type data processing inspects detail data sent computer network usually takes action blocking re-routing logging accordingly deep packet inspection often used ensure data correct format check malicious code eavesdropping internet censorship among purposes multiple headers ip packets network equipment needs use first ip header normal operation use second header tcp udp normally considered shallow packet inspection usually called stateful packet inspection despite definition multiple ways acquire packets deep packet inspection using port mirroring sometimes called span port common way well optical splitter deep packet inspection filtering enables advanced network management user service security functions well internet data mining eavesdropping internet censorship although dpi used internet management many years advocates net neutrality fear technique may used anticompetitively reduce openness internet dpi used wide range applications so-called enterprise level corporations larger institutions telecommunications service providers governments dpi combines functionality intrusion detection system ids intrusion prevention system ips traditional stateful firewall combination makes possible detect certain attacks neither ids/ips stateful firewall catch stateful firewalls able see beginning end packet flow catch events would bounds particular application idss able detect intrusions little capability blocking attack dpis used prevent attacks viruses worms wire speeds specifically dpi effective buffer overflow attacks denial-of-service attacks dos sophisticated intrusions small percentage worms fit within single packet dpi-enabled devices ability look layer 2 beyond layer 3 osi model cases dpi invoked look layer 2-7 osi model includes headers data protocol structures well payload message dpi functionality invoked device looks takes action based information beyond layer 3 osi model dpi identify classify traffic based signature database includes information extracted data part packet allowing finer control classification based header information end points utilize encryption obfuscation techniques evade dpi actions many cases classified packet may redirected marked/tagged see quality service blocked rate limited course reported reporting agent network way http errors different classifications may identified forwarded analysis many dpi devices identify packet flows rather packet-by-packet analysis allowing control actions based accumulated flow information initially security enterprise level perimeter discipline dominant philosophy keeping unauthorized users shielding authorized users outside world frequently used tool accomplishing stateful firewall permit fine-grained control access outside world pre-defined destinations internal network well permitting access back hosts request outside world made previously vulnerabilities exist network layers however visible stateful firewall also increase use laptops enterprise makes difficult prevent threats viruses worms spyware penetrating corporate network many users connect laptop less-secure networks home broadband connections wireless networks public locations firewalls also distinguish permitted forbidden uses legitimately-accessed applications dpi enables administrators security officials set policies enforce layers including application user layer help combat threats deep packet inspection able detect kinds buffer overflow attacks dpi may used enterprise data leak prevention dlp e-mail user tries send protected file user may given information get proper clearance send file addition using dpi secure internal networks internet service providers also apply public networks provided customers common uses dpi isps lawful intercept policy definition enforcement targeted advertising quality service offering tiered services copyright enforcement service providers required almost governments worldwide enable lawful intercept capabilities decades ago legacy telephone environment met creating traffic access point tap using intercepting proxy server connects government surveillance equipment acquisition component functionality may provided many ways including dpi dpi-enabled products li calea-compliant used – directed court order – access user datastream service providers obligated service-level agreement customers provide certain level service time enforce acceptable use policy may make use dpi implement certain policies cover copyright infringements illegal materials unfair use bandwidth countries isps required perform filtering depending country laws dpi allows service providers readily know packets information receiving online—from e-mail websites sharing music video software downloads policies defined allow disallow connection ip address certain protocols even heuristics identify certain application behavior isps route traffic customers able monitor web-browsing habits detailed way allowing gain information customers interests used companies specializing targeted advertising least 100,000 united states customers tracked way many 10 u.s. customers tracked way technology providers include nebuad front porch phorm u.s. isps monitoring customers include knology wide open west addition united kingdom isp british telecom admitted testing solutions phorm without customers knowledge consent dpi used net neutrality applications peer-to-peer p2p traffic present increasing problems broadband service providers typically p2p traffic used applications file sharing may kind files i.e documents music videos applications due frequently large size media files transferred p2p drives increasing traffic loads requiring additional network capacity service providers say minority users generate large quantities p2p traffic degrade performance majority broadband subscribers using applications e-mail web browsing use less bandwidth poor network performance increases customer dissatisfaction leads decline service revenues dpi allows operators oversell available bandwidth ensuring equitable bandwidth distribution users preventing network congestion additionally higher priority allocated voip video conferencing call requires low latency versus web browsing approach service providers use dynamically allocate bandwidth according traffic passing networks mobile broadband service providers use dpi means implement tiered service plans differentiate walled garden services value added all-you-can-eat one-size-fits-all data services able charge walled garden per application per service all-you-can-eat rather one-size-fits-all package operator tailor offering individual subscriber increase average revenue per user arpu policy created per user user group dpi system turn enforces policy allowing user access different services applications isps sometimes requested copyright owners required courts official policy help enforce copyrights 2006 one denmark largest isps tele2 given court injunction told must block customers accessing pirate bay launching point bittorrent instead prosecuting file sharers one time international federation phonographic industry ifpi big four record labels emi sony bmg universal music warner music begun suing isps eircom enough protecting copyrights ifpi wants isps filter traffic remove illicitly uploaded downloaded copyrighted material network despite european directive 2000/31/ec clearly stating isps may put general obligation monitor information transmit directive 2002/58/ec granting european citizens right privacy communications motion picture association america mpaa enforces movie copyrights taken position federal communications commission fcc network neutrality could hurt anti-piracy techniques deep packet inspection forms filtering dpi allows isps gather statistical information use patterns user group instance might interest whether users 2 mbit connection use network dissimilar manner users 5 mbit connection access trend data also helps network planning addition using dpi security networks governments north america europe asia use dpi various purposes surveillance censorship many programs classified fcc adopts internet calea requirements fcc pursuant mandate u.s. congress line policies countries worldwide required telecommunication providers including internet services capable supporting execution court order provide real-time communication forensics specified users 2006 fcc adopted new title 47 subpart z rules requiring internet access providers meet requirements dpi one platforms essential meeting requirement deployed purpose throughout u.s national security agency nsa cooperation inc. used deep packet inspection make internet traffic surveillance sorting forwarding intelligent dpi used find packets carrying e-mail voice internet protocol voip telephone call traffic associated ’ common backbone split two fibers dividing signal 50 percent signal strength went output fiber one output fibers diverted secure room carried communications ’ switching equipment secure room contained narus traffic analyzers logic servers narus states devices capable real-time data collection recording data consideration capture 10 gigabits per second certain traffic selected sent dedicated line central location analysis according affidavit expert witness j. scott marcus former senior advisor internet technology us federal communications commission diverted traffic represented substantially ’ peering traffic san francisco bay area thus designers ... configuration made attempt terms location position fiber split exclude data sources primarily domestic data narus semantic traffic analyzer software runs ibm dell linux servers using dpi sorts ip traffic 10gbit/s pick specific messages based targeted e-mail address ip address case voip telephone number president george w. bush attorney general alberto r. gonzales asserted believe president authority order secret intercepts telephone e-mail exchanges people inside united states contacts abroad without obtaining fisa warrant defense information systems agency developed sensor platform uses deep packet inspection chinese government uses deep packet inspection monitor censor network traffic content claims harmful chinese citizens state interests material includes pornography information religion political dissent chinese network isps use dpi see sensitive keyword going network connection cut people within china often find blocked accessing web sites containing content related taiwanese tibetan independence falun gong dalai lama tiananmen square protests massacre 1989 political parties oppose ruling communist party variety anti-communist movements materials signed dpi sensitive keywords already china previously blocked voip traffic country many available voip applications function china voice traffic skype unaffected although text messages subject dpi messages containing sensitive material curse-words simply delivered notification provided either participant conversation china also blocks visual media sites youtube.com various photography blogging sites iranian government purchased system reportedly deep packet inspection 2008 nokia siemens networks nsn joint venture siemens ag german conglomerate nokia corp. finnish cell telephone company nsn nokia solutions networks according report wall street journal june 2009 quoting nsn spokesperson ben roome according unnamed experts cited article system enables authorities block communication monitor gather information individuals well alter disinformation purposes system purchased telecommunication infrastructure co. part iranian government telecom monopoly according journal nsn provided equipment iran last year internationally recognized concept 'lawful intercept said mr. roome relates intercepting data purposes combating terrorism child pornography drug trafficking criminal activities carried online capability telecom companies said ... monitoring center nokia siemens networks sold iran described company brochure allowing 'the monitoring interception types voice data communication networks joint venture exited business included monitoring equipment called 'intelligence solution end march selling perusa partners fund 1 lp munich-based investment firm mr. roome said said company determined longer part core business nsn system followed purchases iran secure computing corp. earlier decade questions raised reporting reliability journal report david isenberg independent washington d.c.-based analyst cato institute adjunct scholar specifically saying mr. roome denying quotes attributed isenberg also similar complaints one journal reporters earlier story nsn issued following denial nsn provided deep packet inspection web censorship internet filtering capability iran concurrent article new york times said nsn sale covered spate news reports april 2009 including washington times reviewed censorship internet media country mention dpi according walid al-saqaf developer internet censorship circumventor alkasir iran using deep packet inspection february 2012 bringing internet speeds entire country near standstill briefly eliminated access tools tor alkasir dpi yet mandated russia federal law №139 enforces blocking websites russian internet blacklist using ip filtering force isps analyzing data part packets yet isps still use different dpi solutions implement blacklisting 2019 governmental agency roskomnadzor planning nationwide rollout dpi pilot project one country regions estimated cost 20 billion roubles us 300m human rights activists consider deep packet inspection contrary article 23 constitution russian federation though legal process prove refute never taken place city state reportedly employs deep packet inspection internet traffic state reportedly employs deep packet inspection internet traffic analyze block unallowed transit incumbent malaysian government headed barisan nasional said using dpi political opponent run-up 13th general elections held 5 may 2013 purpose dpi instance block and/or hinder access selected websites e.g facebook accounts blogs news portals since 2015 egypt reportedly started join list constantly denied egyptian national telecom regulatory authority ntra officials however came news country decided block encrypted messaging app signal announced application developer april 2017 voip applications including facetime facebook messenger viber whatsapp calls skype blocked country people organizations concerned privacy network neutrality find inspection content layers internet protocol offensive saying example 'net built open access non-discrimination packets critics network neutrality rules meanwhile call solution search problem say net neutrality rules would reduce incentives upgrade networks launch next-generation network services deep packet inspection considered many undermine infrastructure internet increased use https privacy tunneling using vpns effectiveness dpi coming question response many web application firewalls offer https inspection decrypt https traffic analyse waf either terminate encryption connection waf client browser uses plain http re-encrypt data using https certificate must distributed clients beforehand techniques used https ssl inspection also known https ssl interception used man-in-the-middle mitm attacks works like done tls-terminated connection https long firewall product modify truststore ssl-client traditionally mantra served isp well operate layer 4 osi model simply deciding packets go routing comparably easy handle securely traditional model still allows isp accomplish required tasks safely restricting bandwidth depending amount bandwidth used layer 4 rather per protocol application type layer 7 strong often ignored argument isp action layer 4 osi model provides known security community 'stepping stones platforms conduct man middle attacks problem exacerbated isp often choosing cheaper hardware poor security track records difficult arguably impossible secure task deep packet inspection openbsd packet filter specifically avoids dpi reason done securely confidence means dpi dependent security services talktalk former homesafe implementation actually trading security protectable often already protectable effective ways cost decreased security users also far less possibility mitigating risk homesafe service particular opt blocking dpi opted even business users ndpi fork opendpi eol developers ntop open source version non-obfuscated protocols pace another engine includes obfuscated encrypted protocols types associated skype encrypted bittorrent opendpi longer maintained opendpi-fork named ndpi created actively maintained extended new protocols including skype webex citrix many others l7-filter classifier linux netfilter identifies packets based application layer data classify packets kazaa http jabber citrix bittorrent ftp gnucleus edonkey2000 others classifies streaming mailing p2p voip protocols gaming applications hippie hi-performance protocol identification engine open source project developed linux kernel module developed josh ballard supports dpi well firewall functionality spid statistical protocol identification project based statistical analysis network flows identify application traffic spid algorithm detect application layer protocol layer 7 analysing flow packet sizes etc payload statistics byte values etc pcap files proof concept application currently supports approximately 15 application/protocols edonkey obfuscation traffic skype udp tcp bittorrent imap irc msn others tstat tcp statistic analysis tool provides insight traffic patterns gives details statistics numerous applications protocols libprotoident introduces lightweight packet inspection lpi examines first four bytes payload direction allows minimize privacy concerns decreasing disk space needed store packet traces necessary classification libprotoident supports 200 different protocols classification based combined approach using payload pattern matching payload size port numbers ip matching french company called amesys designed sold intrusive massive internet monitoring system eagle muammar gaddafi comprehensive comparison various network traffic classifiers depend deep packet inspection pace opendpi 4 different configurations l7-filter ndpi libprotoident cisco nbar shown independent comparison popular dpi tools traffic classification greater emphasis placed deep packet inspection comes light rejection sopa pipa bills many current dpi methods slow costly especially high bandwidth applications efficient methods dpi developed specialized routers able perform dpi routers armed dictionary programs help identify purposes behind lan internet traffic routing cisco systems second iteration dpi enabled routers announcement cisco isr g2 router
[ 517, 10245, 521, 9744, 9233, 8211, 4119, 10283, 3629, 1070, 7214, 7739, 10303, 4163, 8265, 2136, 1115, 9318, 1650, 2162, 5749, 6773, 3703, 4732, 5245, 127, 4224, 10889, 1169, 3732, 10392, 1692, 3742, 4268, 10416, 6834, 7859, 2228, 7364, 1...
None
10,418
1
Database_virtualization:database virtualization database virtualization decoupling database layer lies storage application layers within application stack virtualization database layer enables shift away physical toward logical virtual virtualization enables compute storage resources pooled allocated demand enables sharing single server resources multi-tenancy well pooling server resources single logical database cluster cases database virtualization provides increased flexibility granular efficient allocation pooled resources scalable computing act partitioning data stores database grows use several decades two primary ways data partitioned inside legacy data management systems virtual partitioning logical data abstracted physical data autonomously creating managing large numbers data partitions 100s 1000s autonomously maintained resources required manage partitions minimal kind massive partitioning results “ shared-data ” “ shared-nothing ” architectures allow scalability multiple data partitions cross-partition querying transaction processing without full partition scanning partitioning database sources consumers fundamental concept greater numbers database sources inserting horizontal data virtualization layer sources consumers helps address complexity rick van der lans author multiple books sql relational databases defined data virtualization process offering data consumers data access interface hides technical aspects stored data location storage structure api access language storage technology
[ 2688, 9481, 10505, 10258, 10518, 4376, 9112, 5658, 7968, 290, 1314, 7461, 8742, 5550, 5808, 9527, 3768, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 8518, 72, 853, 2901, 9942, 9177, 987, 860, 9183, 11362, 10471, 8808, 6383, 9079, 2681, 9467...
None
10,419
9
Espruino:espruino espruino open-source javascript interpreter microcontrollers designed devices small amounts ram low 8kb espruino created gordon williams 2012 attempt make microcontroller development truly multiplatform though initially open-source espruino firmware offered free download stm32 microcontrollers made open-source 2013 successful kickstarter campaign development board running software since original espruino board number new official development boards including small usb thumb-drive-sized espruino pico wifi-equipped espruino wifi puck.js built-in bluetooth pixl.js built-in lc display arduino shield compatibility addition official boards espruino runs approximately 40 types development boards including esp8266 large body reference material espruino including 100 tutorials well book making things smart contains selection hardware projects created espruino-based microcontrollers first official development board original espruino later boards available variety form factors original espruino followed espruino pico espruino wifi puck.js pixl.js breakout board featuring mdbt42q bluetooth le module used puck.js pixl.js also available espruino programs written using javascript espruino ide available web-based app google chrome app native windows application also alternative methods programming espruino boards using terminal programs example windows users program boards putty espruino open source different parts licensed follows
[ 8720, 7235, 3462, 438 ]
None
10,420
4
Polymorphic_engine:polymorphic engine polymorphic engine sometimes called mutation engine mutating engine computer program used transform program subsequent version consists different code yet operates functionality example 3+1 6-2 achieve result yet use completely different code polymorphic engines typically work either encrypting code obfuscating code latter may involve encryption polymorphic engines used almost exclusively computer viruses shellcodes malware main purpose make hard virus scanners security software detect identify body malware traditional fixed signatures usually used first polymorphic engine called mte short mutation engine written 1992 virus author called 'dark avenger polymorphic packer type polymorphic engine polymorphic packer software tool rolls several kinds malware single package e-mail attachment ability make signature mutate time difficult detect remove
[ 2213, 7717, 7851, 8171, 3629, 7515, 7739 ]
None
10,421
2
Prevayler:prevayler prevayler open-source bsd system-prevalence layer java transparently persists plain old java objects in-ram database backed snapshots system via object serialization loaded system crash restore state changes data happen via transaction operations objects made serializable classes prevayler development started klaus wuestefeld read operations three four orders magnitude faster prevayler compared traditional database systems since objects always ram in-process prevayler requires enough ram keep entire system state
[ 5677 ]
Validation
10,422
2
Network_block_device:network block device operating systems network block device device node whose content provided remote machine typically network block devices used access storage device physically reside local machine remote one example local machine access hard disk drive attached another computer technically network block device realized three components server part client part network client machine device node kernel driver controls device whenever program tries access device kernel driver forwards request client part fully implemented kernel done help userspace program server machine data resides physically server machine requests client handled userspace program network block device servers typically implemented userspace program running general-purpose computer function specific network block device servers reside userspace process process communicates client via conventional sockets accesses storage via conventional file system interface network block device client module available unix-like operating systems including linux bitrig since server userspace program potentially run every unix-like platform example nbd server part ported solaris
[ 10016, 9762, 7863, 2314, 10926, 7983, 6864, 9972, 2421, 5397, 823, 1080, 11221, 8602, 1406 ]
Validation
10,423
9
Frederica_Darema:frederica darema frederica darema greek american physicist proposed spmd programming model 1984 dynamic data driven application systems dddas 2000 elected ieee fellow 2004 darema received bs degree school physics mathematics university athens greece ms ph d. degrees theoretical nuclear physics illinois institute technology university california davis respectively attended fulbright scholar distinguished scholar physics research associate positions university pittsburgh brookhaven national laboratory received aps industrial fellowship became technical staff member nuclear sciences department schlumberger doll research subsequently 1982 joined ibm thomas j. watson research center research staff member computer sciences department later-on established became manager research group ibm research parallel applications dr. darema national science foundation since 1994 managed new generation software dynamic data driven application systems programs 1996-1998 completed two-year assignment darpa air force office scientific research
[]
Test
10,424
3
Chuck_Yeager's_Advanced_Flight_Trainer:chuck yeager advanced flight trainer chuck yeager advanced flight trainer 1987 computer aircraft simulation game produced electronic arts originally released chuck yeager advanced flight simulator due legal dispute microsoft usage flight simulator name title pulled shelves later re-released chuck yeager advanced flight trainer many copies original title sold pulled shelves chuck yeager served technical consultant game likeness voice prominently used game allows player test pilot 14 different airplanes including bell x-1 yeager piloted become first man exceed mach 1 game embellished yeager laconic commentary user crashes one plane yeager remarks really screwed pooch one asides chuck yeager advanced flight trainer includes 11 real aircraft three experimental aircraft designed developers fictional experimental aircraft named people worked game game big hit ea selling 100,000 copies december 1987 sales surpassed 250,000 copies november 1989 game reviewers hartley patricia lesser complimented game role computers column dragon 126 1987 stating much game going quite time another flight simulator offer much performance buck reviewers gave pc/ms-dos version game 4 5 stars lessers reviewed macintosh version game 1988 dragon 140 role computers column giving version 4 stars well compute criticized blocky graphics sound noted simple graphics resulted high frame rate concluded chuck yeager differed games simulating flying high-performance experimental aircraft 1994 survey wargames computer gaming world gave title one-plus stars five stating replaced chuck yeager air combat game followed 1989 chuck yeager advanced flight trainer 2.0 1991 chuck yeager air combat
[ 4741, 9006, 9166, 4910, 2159 ]
Train
10,425
2
Trustix:trustix trustix secure linux linux distribution intended use servers focused security stability hardened secure os meaning non-essential services binaries installed unix staples like sendmail replaced programs like postfix trustix originally produced trustix company established late 1997 entrepreneurs usa norway company went bankrupt 2003 comodo group bought assets november 2003 shortly thereafter comodo announced end free version trustix secure linux long thereafter comodo changed minds free version reappeared late 2005 series budget cuts resulted many developers laid early 2006 members original trustix team left company trustix secure linux continues maintained small team developers india late 2007 comodo announced discontinue distribution updates direct support trustix secure linux effective december 31 2007
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 8615, 11305, 7854, 2738, 4790, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920, 8177,...
None
10,426
4
Parkerian_Hexad:parkerian hexad parkerian hexad set six elements information security proposed donn b. parker 1998 parkerian hexad adds three additional attributes three classic security attributes cia triad confidentiality integrity availability parkerian hexad attributes following attributes information atomic broken constituents non-overlapping refer unique aspects information information security breach described affecting one fundamental attributes information confidentiality refers limits get kind information example executives concerned protecting enterprise strategic plans competitors individuals concerned unauthorized access financial records integrity refers correct consistent intended state information unauthorized modification data whether deliberate accidental breach data integrity example data stored disk expected stable – supposed changed random problems disk controller similarly application programs supposed record information correctly introduce deviations intended values donn parker definition information integrity comes dictionaries integrity means information whole sound unimpared necessarily correct means nothing missing information complete intended good order author statement comes close saying information correct ... state information may incorrect authentic integrity correct authentic lacking integrity availability means timely access information example disk crash denial-of-service attacks cause breach availability delay exceeds expected service levels system described breach availability authenticity refers veracity claim origin authorship information example one method verifying authorship hand written document compare handwriting characteristics document sampling others already verified electronic information digital signature could used verify authorship digital document using public-key cryptography could also used verify integrity document possession control suppose thief steal sealed envelope containing bank debit card personal identification number even thief open envelope reasonable victim concerned thief could time situation illustrates loss control possession information involve breach confidentiality utility means usefulness example suppose someone encrypted data disk prevent unauthorized access undetected modifications – lost decryption key would breach utility data would confidential controlled integral authentic available – would n't useful form similarly conversion salary data one currency inappropriate currency would breach utility would storage data format inappropriate specific computer architecture e.g. ebcdic instead ascii 9-track magnetic tape instead dvd-rom tabular representation data substituted graph could described breach utility substitution made difficult interpret data utility often confused availability breaches described examples may also require time work around change data format presentation however concept usefulness distinct availability
[ 8674, 3443, 5373 ]
Test
10,427
7
PagerDuty:pagerduty pagerduty cloud computing company produces saas incident response platform departments 2018 company raised 170 million venture funding recognized forbes cloud 100 well usa today list top small mid-sized companies diversity 2018 pagerduty headquartered san francisco operations toronto ontario atlanta united kingdom australia platform designed alert clients disruptions outages machine learning automation software operates standalone service integrated existing systems company works 10,000 clients including airbnb ibm instacart lululemon uber william hill australia company founded 2009 toronto ontario university waterloo graduates alex solomon andrew miklas baskar puvanathasan company incubated combinator pagerduty raised seed funding round 1.9 million 2010 followed series round raised 10.7 million january 2013 july 2016 former ceo keynote systems jennifer tejada named ceo pagerduty later year company held first pagerduty summit industry conference encourage digital innovation pagerduty summit held san francisco 2017 2018 2016 pagerduty received silver stevie award female executive year computer services computer software category following year company gold new product service year award software service management solution silver award customer service department year computer services pagerduty announced funding round april 2017 led accel 43.8 million round included existing investors andreessen horowitz bessemer venture partners baseline ventures harrison metal september 2018 pagerduty raised 90 million round led t. rowe price associates wellington management june 2018 pagerduty launched event intelligence product designed analyze incoming digital signals human responses communicate incident response suggestions operators new incidents occur industry conference september 2018 company also launched pagerduty visibility pagerduty analytics march 2019 pagerduty filed s-1 sec anticipation ipo april 2019 pagerduty went public new york stock exchange
[ 9754, 4194, 467, 3323 ]
Test
10,428
2
Windows_Terminal:windows terminal windows terminal terminal emulator windows 10 written microsoft includes support command prompt powershell wsl ssh initial source code release github preview release first published microsoft store june 21 2019
[ 2568, 5643, 4624, 6674, 537, 8729, 540, 3102, 9762, 8227, 8740, 10281, 9780, 2101, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 3170, 622, 1647, 9839, 4210, 7796, 7290, 4731, 10879, 8834, 8841, 6797, 2193, 9874, 10900, 42...
Test
10,429
3
Geoplexing:geoplexing geoplexing computer science term relating duplication computer storage applications within server farm geographically diverse locations purpose fault tolerance name comes contraction geographical multiplex geoplex server clusters duplicated one geographically separate sites geoplexes active-active clusters used tandem active-passive one clusters kept hot spare data applications shared either via cloning partitioning cloning server cluster handles one applications applications data cloned servers geoplex load balancer distributes requests cloned servers partitioning hardware applications duplicated geoplex application data divided servers requests routed correct server
[ 1801, 2994, 9677, 2558 ]
None
10,430
9
Steelman_language_requirements:steelman language requirements steelman language requirements set requirements high-level general-purpose programming language meet created united states department defense department defense common high order language program 1978 predecessors document called order strawman woodenman tinman ironman requirements focused needs embedded computer applications emphasised reliability maintainability efficiency notably included exception handling facilities run-time checking parallel computing concluded existing language met criteria sufficient extent contest called create language would closer fulfilling design contest became ada programming language resulting language followed steelman requirements closely though exactly ada 95 revision language went beyond steelman requirements targeting general-purpose systems addition embedded ones adding features supporting object-oriented programming
[ 8262, 10089, 1611, 428, 8524 ]
Validation
10,431
5
Messenger_Plus!:messenger plus messenger plus formerly known messenger plus live commonly abbreviated msgplus plus incorrectly msn plus add-on windows live messenger skype software provides additional functionality microsoft instant messaging client windows live messenger adding controls main interface controls affect messenger behaviour appearance often additional dialog boxes add-on first released may 2001 name messenger plus extension msn messenger windows messenger later changed name messenger plus release new windows live messenger client messenger plus live chosen 2011 name changed back messenger plus become one widely used add-ons microsoft im clients citing 62 million users february 2010 volunteers messenger plus community around world develop skins scripts submission database website software messenger plus generally expands features windows live messenger 2009 9.0 2011. notable features include messenger plus available 22 languages messenger plus originally created 2001 cyril paciullo better known pseudonym patchou born france currently resides canada started developing plus hobby next day job developer soon maintaining messenger plus software became full-time job q4 2009 paciullo announced longer full control product messenger plus owned yuna software limited q1 2011 paciullo officially declared left company chapter professional life closed financial details names people behind new company disclosed yuna software offices several places world office montreal also known kimahri software development team continued develop messenger plus developing messenger plus became full-time job form revenue added keep software free formerly software came bundled optional adware software developed circle development ltd. august 17 2005 messenger plus website contained petition microsoft anti-spyware division regarding windows defender known microsoft antispyware time detection messenger plus executable spyware subsequent warning messenger plus would attempt install spyware runtime post-installation rather setup program contained installer threat detected petition 401,683 signatures 10,137 pages long total sent redmond september 20 2005 stating messenger plus labeled threat september 23 2005 3 days petition mailed redmond canada microsoft released new definitions windows defender fixed false threat detection affecting messenger plus executable together detection improvements recent versions windows defender also stopped detecting messenger plus installer potentially dangerous software review websites criticized user agreement stating 'sponsorship agreement authorized installation optional adware software misleading looked like standard eula available english user get option install 'sponsor program however even slightly unorthodoxly since messenger plus 3.60 released september 27 2005 setup includes separate sponsor license agreement addition traditional eula agreements also translated several languages separate adware uninstallation program provided circle development ltd. appears users attempt uninstall sponsor program messenger plus early 2010 messenger plus versions 4.84 later longer contain sponsor program circle development ltd. yuna software currently uses conventional methods messenger plus bundles optional toolbar custom search page custom home page branded messenger plus network yuna software also launched sites 2010 affiliated messenger plus including plus games plus sports plus image plus network links old website earlier messenger plus versions caused sites mcafee siteadvisor warn website www.msgpluslive.net linked adware adware-lop/swizzor however siteadvisor tested current website www.msgplus.net found downloads free adware spyware potentially unwanted programs sites already found site safe example norton safe web found issues site stating 0 computer threats 0 identity threats 0 annoyance factors february 2013 yuna software released new installer messenger plus required user install least one bundled options order install software note may longer requirement recent updates appear require bundled options installed confirmed clean install coincide newly branded windows live messenger 2006 new versions messenger plus called messenger plus live rebuilt ground included new user interface design intended blend user interface windows live messenger since 2011 versions 5.0 later called messenger plus messenger plus 5 completely compatible windows live messenger 2011 latest version messenger plus longer supports messenger version older 2009 older messenger plus versions longer officially supported however last version messenger plus version 3.63 renamed messenger plus live still available download official website version supports msn messenger windows messenger 4.7 5 6 7 additionally last version messenger plus live version 4.90.392 name changed back also still available official website version supports windows live messenger 8.0 14.0 2009 messenger plus skype released english january 12 2012 adware adds video audio recording capabilities skype conversations lets users send flash animations users subsequent version messenger plus skype 1.2 released march 28 2012 introduced 16 additional languages video voice transformation effects ring tones version 1.5 released june 18 2012 included ability stream movies overlay images video conversations viewable skype-enabled devices including mobile phones tablets version 1.8 followed march 3 2013 release developed microsoft announcement discontinuing windows live messenger service integrated custom sounds united messenger plus windows live messenger/skype sound archive also introduced new default design add-on messenger plus skype application skype adds video audio recording capabilities skype notable features include skype announced intention discontinue desktop api used messenger plus skype note date happen originally december 2013 unknown skype tries come new methods support small subset desktop api functionality currently information available yuna website mentions plans handle desktop api discontinued skype point future version 3.0.0.180 messenger plus skype available automatic download around january 15 2014 built january 8th 2014 updated components december 2013 first version year feature seem mentioned anywhere sends ad messenger plus chat message random contacts feature makes less extension unusable second version year 3.0.0.185 released february 2014 feature mentioned turned apparently messenger plus still supported noted despite fact yuna software website gives impression software longer active development due following factors noted forums longer accessible public may even exist links redirect back yuna website archive forums exist hosted third party
[ 704, 877, 6797, 7983, 10392, 603, 3163 ]
None
10,432
2
Monaco_(typeface):monaco typeface monaco monospaced sans-serif typeface designed susan kare kris holmes ships os x already present previous versions mac operating system characters distinct difficult confuse 0 figure zero uppercase 1 figure one vertical bar uppercase l lowercase l unique feature font high curvature parentheses well width square brackets result empty pair parentheses square brackets strongly resemble circle square respectively monaco released least three forms original bitmap monospace font still appears roms even new world macs still available recent macos releases size 9 disabled antialiasing second outline form loosely similar lucida mono created truetype font system 6 7 standard font used sizes briefly third known mpw since designed used macintosh programmer workshop ide essentially straight conversion bitmap font outline font addition disambiguation features added truetype monaco original monaco 9 point bitmap font designed compact macintosh window displayed full screen terminal emulator program would result standard text user interface display 80 columns 25 lines august 2009 release mac os x 10.6 snow leopard menlo introduced default monospaced font instead monaco terminal xcode however monaco remains part os x. monaco default font current python idle used mac running os x el capitan
[ 2978, 7171, 166, 1191, 4141, 10478, 213, 9912, 6234, 1435, 3324, 8701 ]
Test
10,433
4
IPFire:ipfire ipfire hardened open source linux distribution primarily performs router firewall standalone firewall system web-based management console configuration ipfire originally started fork ipcop rewritten basis linux scratch since version 2 supports installation add-ons add server services extended soho server april 2015 project became member open invention network basic requirements least 1ghz cpu 1gb ram 4gb hard drive two network cards needed connect ethernet network dsl lte wi-fi wlan supported according hardware required computing power run ipfire depends area application commonly x86 systems used arm devices raspberry pi banana pi supported ipfire used virtual environments kvm vmware xen qemu etc. basic setup ipfire happens guided dialogue console administration takes place web-based management interface add-ons additional features project regularly updated development team maintain security developed stateful packet inspection spi firewall ipfire separates network different segments based security risk organised colours normal clients connected lan represented green internet represented red optional dmz represented orange optional wireless network represented blue traffic flow segments unless specifically permitted firewall rule ipfire package management system called pakfire allows install system updates keep security date additional software packages customisation different usage scenarios needs linux system customised concrete purpose firewall design modular making functionalities extensible plugins base comes following features
[ 2049, 2563, 4611, 550, 10790, 8753, 569, 5178, 9279, 10303, 2118, 8816, 4725, 5749, 10872, 5245, 11396, 6797, 1172, 3742, 3243, 1708, 686, 2228, 9927, 5322, 4814, 7887, 9423, 10451, 1754, 6364, 5860, 10987, 5356, 9964, 8943, 5363, 9971, 8...
Test
10,434
4
Chung_Kwei_(algorithm):chung kwei algorithm chung kwei spam filtering algorithm based teiresias algorithm finding coding genes within bulk dna
[ 8224, 4294 ]
Train
10,435
9
Syntactic_sugar:syntactic sugar computer science syntactic sugar syntax within programming language designed make things easier read express makes language sweeter human use things expressed clearly concisely alternative style may prefer example many programming languages provide special syntax referencing updating array elements abstractly array reference procedure two arguments array subscript vector could expressed codice_1 instead many languages provide syntax codice_2 similarly array element update procedure three arguments example codice_3 many languages provide syntax codice_4 construct language called syntactic sugar removed language without effect language functionality expressive power remain language processors including compilers static analyzers often expand sugared constructs fundamental constructs processing process sometimes called desugaring term syntactic sugar coined peter j. landin 1964 describe surface syntax simple algol-like programming language defined semantically terms applicative expressions lambda calculus centered lexically replacing λ later programming languages clu ml scheme extended term refer syntax within language could defined terms language core essential constructs convenient higher-level features could desugared decomposed subset fact usual mathematical practice building primitives building landin distinction essential language constructs syntactic sugar 1991 matthias felleisen proposed codification expressive power align widely held beliefs literature defined expressive mean without language constructs question program would completely reorganized programmers feel syntax usability features either unimportant outright frivolous notably special syntactic forms make language less uniform specification complex may cause problems programs become large complex view particularly widespread lisp community lisp simple regular syntax surface syntax easily modified example alan perlis quipped epigrams programming reference bracket-delimited languages syntactic sugar causes cancer semi-colons metaphor extended coining term syntactic salt indicates feature designed make harder write bad code specifically syntactic salt hoop programmers must jump prove know going rather express program action example java pascal assigning float value variable declared int without additional syntax explicitly stating intention result compile error c c++ automatically truncate floats assigned int however syntax semantics c hiding inherited class member compiler warning issued unless codice_29 keyword used specify hiding intentional avoid potential bugs owing similarity switch statement syntax c c++ c requires codice_30 non-empty codice_31 label codice_32 unless codice_33 codice_34 codice_35 used even though allow implicit fall-through using codice_33 specifying subsequent label produces c/c++-like fall-through syntactic salt may defeat purpose making code unreadable thus worsen quality – extreme cases essential part code may shorter overhead introduced satisfy language requirements alternative syntactic salt generating compiler warnings high probability code result mistake – practice common modern c/c++ compilers extensions syntactic saccharin syntactic syrup meaning gratuitous syntax make programming easier
[ 512, 515, 4486, 8582, 1931, 9871, 6160, 1947, 155, 1565, 6047, 1952, 5537, 3876, 4777, 5165, 5677, 10413, 1333, 2617, 10555, 10684, 8385, 8262, 5833, 1611, 8524, 5837, 11212, 335, 11475, 1883, 10083, 7805, 6502, 8554, 3051, 9078, 5880, 72...
Train
10,436
2
SunOS:sunos sunos unix-branded operating system developed sun microsystems workstation server computer systems sunos name usually used refer versions 1.0 4.1.4 based bsd versions 5.0 later based unix system v release 4 marketed brand name solaris sunos 1 supported sun-2 series systems including sun-1 systems upgraded sun-2 68010 cpu boards sunos 2 supported sun-2 sun-3 68020 series systems sunos 4 supported sun-2 release 4.0.3 sun-3 4.1.1 sun386i 4.0 4.0.1 4.0.2 sun-4 sparc architectures although sunos 4 intended first release fully support sun new sparc processor also sunos 3.2 release preliminary support sun-4 systems sunos 4.1.2 introduced support sun first sun4m-architecture multiprocessor machines sparcserver 600mp series since single lock kernel one cpu time could execute kernel last release sunos 4 4.1.4 solaris 1.1.2 1994 sun4 sun4c sun4m architectures supported 4.1.4 sun4d supported sun continued ship sunos 4.1.3 4.1.4 december 27 1998 supported september 30 2003 1987 corporation sun announced collaborating project merge popular unix flavors market time bsd including many features unique sunos system v xenix would become system v release 4 svr4 september 4 1991 sun announced next major os release would switch bsd-derived source base one based svr4 although internal designation release would sunos 5 point sun began using marketing name solaris justification new overbrand encompassed sunos also openwindows desktop environment open network computing onc functionality even though new svr4-based os expected ship volume following year sun immediately began using new solaris name refer currently shipping sunos 4 release also including openwindows thus sunos 4.1.1 rebranded solaris 1.0 sunos 5.0 would considered part solaris 2.0 sunos 4.1 x micro versions continued released 1994 also given solaris 1 x equivalent name practice often still referred customers even sun personnel sunos release names matching version numbers straightforward today sunos 5 universally known solaris although sunos name still visible within os startup banner output uname command man page footers among places matching sunos 5.x release corresponding solaris marketing name simple solaris release name includes corresponding sunos 5 minor version number example solaris 2.4 incorporated sunos 5.4 one small twist solaris 2.6 2 dropped solaris name sunos minor number appears latest solaris release named solaris 11 incorporates sunos 5.11 gui environments bundled earlier versions sunos included suntools later sunview news 1989 sun released openwindows open look-compliant x11-based environment also supported sunview news applications became default sunos gui sunos 4.1.1
[ 2560, 7682, 9731, 10761, 2061, 8207, 9231, 9743, 6675, 8725, 10774, 1561, 2073, 11292, 9245, 10789, 5677, 1071, 1080, 7224, 9784, 9791, 10817, 3651, 7748, 11332, 2120, 6218, 1611, 2132, 597, 10327, 9306, 607, 1634, 11363, 7269, 6760, 9320, ...
None
10,437
4
SANS_Institute:sans institute sans institute officially escal institute advanced technologies private u.s. for-profit company founded 1989 specializes information security cybersecurity training selling certificates topics available training include cyber network defenses penetration testing incident response digital forensics audit information security courses developed consensus process involving administrators security managers information security professionals courses cover security fundamentals technical aspects information security institute recognized training programs certification programs sans stands sysadmin audit network security sans institute sponsors internet storm center internet monitoring system staffed global community security practitioners sans reading room research archive information security policy research documents sans one founding organizations center internet security sans offers news analysis twitter feeds e-mail newsletters additionally weekly news vulnerability digest available subscribers originally organized 1989 sans training events functioned like traditional technical conferences showcasing technical presentations mid-1990s sans offered events combined training tradeshows beginning 2006 sans offered asynchronous online training sans ondemand virtual synchronous classroom format sans vlive free webcasts email newsletters risk newsbites ouch developed conjunction security vendors actual content behind sans training courses training events remain vendor-agnostic vendors pay offer official sans course although teach sans hosted event via sponsorship 1999 sans institute formed global information assurance certification giac independent entity grants certifications information security topics developed operates netwars suite interactive learning tools simulating scenarios cyberattacks netwars use us air force us army majority sans faculty sans employees industry professionals respected experts field information security faculty organized six different levels mentors community certified instructors principal instructors senior instructors fellows sans established sans technology institute accredited college based sans training giac certifications november 21 2013 sans technology institute granted regional accreditation middle states commission higher education sans technology institute focuses exclusively cybersecurity offering master science degree program information security engineering msise five post-baccalaureate certificate programs penetration testing ethical hacking incident response industrial control systems cyber defense operations cybersecurity engineering core upper-division undergraduate certificate program applied cybersecurity sans continues offer free security content via sans technology institute leadership lab it/security related leadership information
[ 6273, 10633, 399, 5010, 4883, 5780, 7059, 6550, 3994, 2717, 2976, 297, 10539, 7605, 183, 7228, 3133, 9791, 4552, 331, 11476, 9049, 3552, 612, 11112, 1907, 4467, 6773, 7031, 10492, 5373, 2558 ]
None
10,438
5
IBM_Advanced_Program-to-Program_Communication:ibm advanced program-to-program communication computing advanced program program communication appc protocol computer programs use communicate network appc application layer osi model enables communications programs different computers portables workstations midrange host computers appc defined vtam lu 6.2 logical unit type 6.2 appc developed 1982 component ibm systems network architecture sna several apis developed programming languages cobol pl/i c rexx appc software available many different ibm non-ibm operating systems either part operating system separate software package appc serves translator application programs network application computer passes information appc software appc translates information passes network interface lan adapter card information travels across network another computer appc software receives information network interface appc translates information back original format passes corresponding partner application appc mainly used ibm installations running operating systems z/os formerly mvs os/390 z/vm formerly vm/cms z/tpf ibm formerly os/400 os/2 aix z/vse formerly dos/vse microsoft also includes sna support microsoft host integration server major ibm software products also include support appc including cics db2 cim websphere mq unlike tcp/ip communication partners always possess clear role one always server others always client appc peer-to-peer protocol communication partners appc equal every application server client equally role number parallel sessions partners negotiated cnos sessions change number session special log mode e.g ibm 'snasvcmg transmission data made 'data sessions log modes determined detail vtam administrator e.g length data blocks coding etc.. also apparent architects appc could used provide operating system services remote computers separate architecture group formed use appc enable programs one computer transparently use data management services remote computers use appc session created used client-server fashion conversational communications manager distributed data management architecture ddm message formats protocols defined accessing managing record-oriented files stream-oriented files relational databases base architecture distributed relational database architecture drda services variety ddm drda products implemented ibm vendors increasing prevalence tcp/ip appc declined although many ibm systems translators enterprise extender rfc 2353 allow sending appc-formatted traffic ip networks appc confused similarly named appn advanced peer-to-peer networking appc manages communication programs operating application presentation layers contrast appn manages communication machines including routing operates transport network layers
[ 8640, 4546, 10280, 2222, 7733, 8502, 2775, 2168, 3323, 2045 ]
Test
10,439
7
Data_diffusion_machine:data diffusion machine data diffusion machine historical virtual shared memory architecture data free migrate machine shared memory machines convenient programming scale beyond tens processors data diffusion machine ddm overcomes problem providing virtual memory abstraction top distributed memory machine ddm appears user conventional shared memory machine implemented using distributed memory architecture data diffusion machines active research late 1980s early 1990s research ceased since
[ 1866, 11539 ]
Test
10,440
3
CPU_core_voltage:cpu core voltage cpu core voltage v power supply voltage supplied cpu digital circuit gpu device containing processing core amount power cpu uses thus amount heat dissipates product voltage current draws modern cpus cmos circuits current almost proportional clock speed cpu drawing almost current clock cycles see however subthreshold leakage order help conserve power manage heat many laptop desktop processors power management feature allows software usually operating system adjust clock speed core voltage dynamically often voltage regulator module converts 5v 12 v voltage whatever cpu core voltage required cpu trend towards lower core voltages conserve power presents cmos designer challenge cmos voltages go ground supply voltage source gate drain terminals fets supply voltage zero voltage across mosfet formula formula_1 says current formula_2 supplied fet proportional gate-source voltage reduced threshold voltage formula_3 dependent geometrical shape fet channel gate physical properties especially capacitance order reduce formula_3 necessary order reduce supply voltage increase current one must increase capacitance load driven fact another fet gate current needed drive proportional capacitance thus requires designer keep low trend towards lower supply voltage therefore works goal high clock speed improvements photolithography reduction threshold voltage allow improve another note formula shown long channel mosfets area mosfets halving every 18-24 months moore law distance two terminals mosfet switch called channel length becoming smaller smaller changes nature relationship terminal voltages current processor overclocked clock speed increased cost system stability withstand higher clocks core voltage often needs increased cost power consumption heat dissipation known overvolting overvolting generally involves running processor specifications may damage shorten cpu life dual-voltage cpu uses split-rail design allow lower voltages used processor core external input/output i/o voltages remain 3.3 volts backwards compatibility single-voltage cpu uses single power voltage throughout chip supplying i/o power internal power 2002 microprocessor market statistics cpus single-voltage cpus cpus pentium mmx single-voltage cpus dual-voltage cpus introduced performance gain increasing clock speeds finer semiconductor fabrication processes resulted excess heat generation power supply concerns especially regarding laptop computers using voltage regulator external i/o voltage levels would transformed lower voltages order reduce power usage resulting less heat produced ability operate higher frequencies vrt feature older intel p5 pentium processors typically intended use mobile environment refers splitting core voltage supply i/o voltage vrt processor 3.3 v i/o 2.9 v core voltage save power compared typical pentium processor i/o core voltage 3.3v pentium mmx later processors adopted so-called split rail power supply
[ 2273, 10658, 5444, 10440, 1677, 4334, 7983, 1776, 5649, 8851, 10966, 1849, 3194 ]
Test
10,441
1
Driver_and_Vehicle_Licensing_Agency:driver vehicle licensing agency driver vehicle licensing agency dvla organisation uk government responsible maintaining database drivers great britain database vehicles entire united kingdom counterpart drivers northern ireland driver vehicle agency dva agency issues driving licences organises collection vehicle excise duty also known road tax road fund licence sells personalised registrations dvla executive agency department transport dft current chief executive agency julie lennard dvla based swansea wales prominent 16-storey building clase offices swansea vale previously known driver vehicle licensing centre dvlc agency previously network 39 offices around great britain known local office network users could attend apply licences transact business throughout course 2013 local offices gradually closed closed december 2013 agency work consequently fully centralised swansea majority users transact remotely post transactions phone dvla introduced electronic vehicle licensing evl 2004 allowing customers pay vehicle excise duty online telephone however customers still option tax vehicles via post office seven-year contract enabling post office continue process car tax applications agreed november 2012 option three-year extension originally vehicle registration responsibility borough county councils throughout great britain system created motor car act 1903 licensing system centralised 1965 administered driver vehicle licensing centre dvlc swansea 1990 dvlc renamed driver vehicle licensing agency dvla becoming executive agency department transport civilian vehicles used germany members british forces germany families registered dvla behalf ministry defence official diplomatic consular vehicles registered dvla behalf foreign commonwealth office vehicle register held dvla used many ways example dvla identify untaxed vehicles outside agencies identify keepers cars entering central london paid congestion charge exceed speed limits road speed cameras matching cars keepers utilising dvla database current dvla vehicle register built eds £5 million contract signed 1996 planned implementation date october 1998 though actual implementation delayed year uses client–server architecture uses vehicle identification number rather registration plate primary key track vehicles eliminating possibility multiple registrations single vehicle vehicle identity check vic introduced help reduce vehicle crime intended deter criminals disguising stolen cars identity written scrapped vehicles however scheme later scrapped october 2014 insurance company writes car registration document v5 logbook surrendered destroyed insurance company notify dvla vehicle written notification set vic marker vehicle record dvla database dvla database records used commercial vehicle check companies offer comprehensive individual car check prospective purchasers however accuracy data held remains continuing problem anyone request information database purport cause need fee £2.50 database drivers developed late 1980s holds details 42 million driving licence holders uk used produce driving licences assist bodies driving standards agency police courts enforcement legislation concerning driving entitlements road safety dvla revealed december 2012 temporarily banned 294 public bodies including local councils police forces using access database correctly 2006 2012 38 bodies banned permanently period 2002 2015 estimated dvla spent £500 million information technology ibm staff dvla predominantly female whereas parts department transport predominantly male starting salaries £12,500 november 2007 public accounts committee report criticised amazingly high levels sick leave among staff dvla employees took average three weeks per year sick leave report said overall sickness leave dft seven agencies averaged 10.4 working days per full-time employee 2005 calculated costing taxpayers £24 million sick leave rates department four agencies average—at dvla dsa together employ 50 dft staff—they significantly higher committee chairman edward leigh said surprising agencies could function adequately 2008 dvla staff went one-day strike pay inequality arguing receive similar salaries employees department transport recent level sickness absence 2012/13 6.7 days 2006 120,000 130,000 vehicle registration certificates went missing bbc investigation 2010 found vehicles worth £13 million stolen using documents 18 months preceding investigation around ten cars found week forged log books police said would decades recovered 7 february 2007 letter bomb sent dvla swansea injured four people suspected part group letter bombs sent organisations deal administration motoring charges offences capita central london targeted days earlier miles cooper aged 27 school caretaker arrested 19 february 2007 charged 22 february dvla since installed x-ray machines post opening areas reduce effectiveness attacks december 2007 revealed sending surveys 1,215 drivers dvla sent confidential details wrong owners error occurred sending routine surveys discovered members public contacted dvla notify error 2009 bbc watchdog reported entitlements specifically entitlement drive motorcycle lost reissued driving licences 2005 programme highlighted drivers lost entitlements drive heavy goods vehicles similar way 2010 revealed dvla sold drivers details database certain private parking enforcement companies run individuals criminal records dvla sells details companies £2.50 found agency sold business fined weeks unfair business practices dvla uses advertising warn drivers pay road tax cars may crushed despite bill rights 1689 section 12 states 'all fines forfeitures conviction illegal void uk legal persons equality law dvla therefore stands equal private citizens court law seeking civil penalty sorn 'fine so-called dvla right sue car owners civil court practice dvla illegally usurps judicial procedure bypasses presumption innocence levies fine £40 £80 without regard extenuating circumstances illness documents lost post etc sorn scheme never debated parliament also 'daft pointless legislation motorists ... asked confirm dvla already know acknowledgment lost post might need proof 've confirmed 've confirmed already know ... dvla makes mistake claims car owners responsible clamping vehicles explicitly outlawed scotland may english law constitute common law offence 'holding property ransom according peter oborne fines levied dvla grossly disproportionate represent justice part unofficial supplementary tax-gathering system dvla handled 12,775 complaints year 2015/16 failed resolve 14.9 first contact overall complaints year 6.5 dvla 'customer service excellence standard retained details provided measured customer satisfaction levels varied 76 97 four categories surveyed vehicle registration driver licence renewal vehicle taxation driver medical transactions data provided respect complaints sorn scheme fines levied dvlc swansea regularly referred british political sitcom yes minister bernard woolley regularly threatened reassignment episode big brother jim hacker scheduled give address
[ 10441, 3323 ]
Test
10,442
4
Security_through_obscurity:security obscurity security obscurity security obscurity reliance security engineering design implementation secrecy main method providing security system component security experts rejected view far back 1851 advise obscurity never security mechanism early opponent security obscurity locksmith alfred charles hobbs 1851 demonstrated public state-of-the-art locks could picked response concerns exposing security flaws design locks could make vulnerable criminals said rogues keen profession know already much teach scant formal literature issue security obscurity books security engineering cite kerckhoffs doctrine 1883 cite anything example discussion secrecy openness nuclear command control benefits reducing likelihood accidental war considered outweigh possible benefits secrecy modern reincarnation kerckhoffs doctrine first put forward nineteenth century security system depend key design remaining obscure field legal academia peter swire written trade-off notion security obscurity illusion military notion loose lips sink ships well competition affects incentives disclose principle security obscurity generally accepted cryptographic work days essentially well-informed cryptographers employed national intelligence agencies national security agency cryptographers often work universities researchers publish many even results publicly test others designs private industry results often controlled patents copyrights secrecy argument lost former popularity example pgp whose source code publicly available anyone generally regarded military-grade cryptosystem conflicting stories origin term fans mit incompatible timesharing system say coined opposition multics users hall security far issue within culture term referred self-mockingly poor coverage documentation obscurity many commands attitude time tourist figured make trouble 'd generally got urge make felt part community one instance deliberate security obscurity noted command allow patching running system altmode altmode control-r echoed ^d typing alt alt control-d set flag would prevent patching system even user later got right security obscurity alone discouraged recommended standards bodies national institute standards technology nist united states sometimes recommends practice system security depend secrecy implementation components technique stands contrast security design open security although many real-world projects include elements strategies knowledge system built differs concealment camouflage efficacy obscurity operations security depends whether obscurity lives top good security practices used alone used independent layer obscurity considered valid security tool recent years security obscurity gained support methodology cybersecurity moving target defense cyber deception nist cyber resiliency framework 800-160 volume 2 recommends usage security obscurity complementary part resilient secure computing environment research firm forrester recommends usage environment concealment protect messages advanced persistent threats
[ 5387, 8715, 9356, 1683, 2324, 4117, 2975, 1315, 8764, 1344, 4552, 1101, 7887, 8273, 8283, 6877, 10466, 3944, 8171, 2801, 6772, 3701, 6902, 8692, 1147, 5887 ]
Test
10,443
2
RTXC_Quadros:rtxc quadros rtxc quadros real time operating system rtos written mainly c programming language mainly intended use embedded systems rtxc rtos originally developed barrett associates 1970s currently maintained quadros systems inc. houston texas rtxc quadros comes tracing tool give insight runtime dynamics timing rtxcview
[ 2179, 9964, 9366, 1462, 2045, 6207 ]
Test
10,444
5
Text_over_IP:text ip text ip toip means providing real-time text rtt service operates ip-based networks complements voice ip voip video ip real-time text streaming text transmitted produced allowing text used conversationally real-time text defined itu-t multimedia recommendation f.700 2.1.2.1 real-time text designed conversational use people interactively converse achieve particular user requirements specified delay character character loss rate see f.700 annex a.3 real-time text ip used toip designed around itu-t t.140 real-time text presentation layer protocol defined h.32x multimedia services t.140 allows real-time editing text e.g using 'backspace retyping t.140 based iso 10646-1 character set used ip text specifications uses utf-8 format transport toip uses real-time transport protocol rtp voip video-over-ip text encoded according ietf rfc 4103 rtp payload text conversation rfc 4103 supports optional forward error correction scheme based redundant transmission using rfc 2198 results low end-to-end packet loss across ip transmission links moderately high packet loss improve efficiency text buffered 0.3 – 0.5 seconds sent whilst still meeting delay requirements rtp usually transported user datagram protocol udp however 2.5g mobile networks supported transmission control protocol tcp consistently support udp implementations toip mobile networks use tcp internally 3g mobile networks support udp protocol stack toip medium fast typing 30 characters per second results two kilobit per second traffic load including overheads rfc4103 maximum level redundancy rtp udp ip control toip sessions defined using standard session initiation protocol sip rfc 3261 session description protocol sdp rfc 4566 protocols see ietf rfc 5194 framework real-time text ip using session initiation protocol sip ietf rfc 4504 sip telephony device requirements configuration section 2.9 information next generation networking ngns concept developed telecommunication service providers suppliers aims create true multi-service network based ip technology toip specified inclusion 3gpp ip multimedia subsystem ims 3gpp ts 26.114 v2.0.0 ims multimedia telephony media handling interaction ims used implement ngns many fixed mobile networks support toip considered multimedia emergency public-safety answering point psaps europe usa ecrit ietf working group defines toip one form access emergency services toip provide 'low impact solution meeting national regulatory requirements provide 'equivalent service telephone service people hearing speech impairments typical terminal fixed line access home computer supports multimedia communications voice video real-time text ip see external links information toip equipment software telecommunications device deaf tdd ttys also called textphone minicoms designed transport real-time text pstn tdds use range modem technologies text-over-ip designed replacement tdds using ip-based networks also use mainstream voice call users less service restrictions compared tdds designed used mainstream service used standard computers mobile terminals proper alerting systems incoming calls need included well user interfaces hardware software meet needs deaf people people hearing speech impairments best achieved input end-users development stages interworking tdds toip implemented using gateways t-meeting omnitor trace r rnid center voiceriver annies rfc 5194 framework real-time text ip using session initiation protocol sip provides overview interworking issues work proposed ietf sipping work group detailed interworking based range call scenarios
[ 9381, 9131, 10924, 7407, 11413, 10271 ]
Test
10,445
2
Find_My_Device:find device find device application service provided google remotely trace locate android devices phones tablets watches using map find device uses map locate trace exert location android device located location available allow users remotely locate android device linked google account
[ 4995, 5892, 7816, 5262, 8719, 5524, 7700, 10645, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 7983, 1203, 5431, 7359, 196, 3269, 3782, 11590, 4683, 11343, 3664, 3795, 1240, 8413, 6367, 2658, 6632, 5483, 236, 9712, 9970, 8821, 3836 ]
Test
10,446
4
Internet_Watch_Foundation:internet watch foundation internet watch foundation iwf registered charity based cambridgeshire england states remit minimise availability online sexual abuse content specifically child sexual abuse images videos hosted anywhere world non-photographic child sexual abuse images hosted uk content inciting racial hatred removed iwf remit police website set purpose april 2011 iwf used also take reports criminally obscene adult content hosted uk removed iwf ’ remit 2017 part function iwf says supply partners accurate current url list enable blocking child sexual abuse content excellent responsive national hotline reporting service receiving reports public addition receiving referrals public agents also proactively search open web deep web identify child sexual abuse images videos ask service providers take websites containing images block fall outside uk jurisdiction found open web traces content hosted geographically either directly issues notice hosting company remove imagery hosted uk works network hotlines police around world follow country ’ process removing imagery 99 child sexual abuse images found iwf hosted outside uk instance whilst work remove imagery takes place iwf places web address url list partners block content 2010 office government commerce ogc required procurement specifications provision internet-related services government agencies public bodies require internet service provider isp block access sites iwf list iwf operates informal partnerships police government public internet companies across world originally formed police suspected child pornography online iwf remit later expanded cover criminally obscene material iwf takes strong stance term ‘ child pornography ’ website cites “ use term child sexual abuse reflect gravity images videos deal child pornography child porn kiddie porn acceptable descriptions child consent abuse ” iwf incorporated charity limited guarantee largely funded voluntary contributions uk communications service providers including isps mobile phone operators internet trade associations search engines hardware manufacturers software providers also currently receives funding european union comprising one third uk safer internet centre iwf governed board trustees consists independent chair six non-industry representatives three industry representatives plus one co-opted independent representative specialism human rights board monitors reviews iwf remit strategy policy budget enable iwf achieve objectives iwf operate offices vision park near cambridge criticized ineffective quango deserve charity status producing excessive numbers false positives secrecy proceedings poor technical implementations policies degraded response time whole uk internet iwf succeeded reducing child sexual abuse imagery hosted uk 18 1996 0.04 2018 1996 metropolitan police told internet service providers association ispa content carried newsgroups made available illegal considered isps involved publishers material therefore breaking law august 1996 chief inspector stephen french metropolitan police clubs vice unit sent open letter ispa requesting ban access list 132 newsgroups many deemed contain pornographic images explicit text list arranged first section consisted unambiguously titled paedophile newsgroups continued kinds groups police wanted restrict access including alt.binaries.pictures.erotica.cheerleaders alt.binaries.pictures.erotic.centerfolds although action taken place without prior debate parliament elsewhere police appeared best create simply enforce law acting entirely initiative alan travis home affairs editor newspaper guardian explained book bound gagged ian taylor conservative science industry minister time underlined explicit threat isps stop carrying newsgroups question police would act company provided users pornographic violent material taylor went make clear would calls legislation regulate aspects internet unless service providers seen wholeheartedly embrace responsible self-regulation isp demon internet regarded police request unacceptable censorship however attitude annoyed ispa chairman shez hamill said following tabloid-style exposé demon internet appeared observer newspaper alleged clive feather director demon provides paedophiles access thousands photographs children sexually abused summer autumn 1996 uk police made known planning raid isp aim launching test case regarding publication obscene material internet direct result campaign threats pressure establishment internet watch foundation initially known safety net foundation september 1996 facilitated department trade industry dti discussions held certain isps metropolitan police home office body called safety net foundation formed dawe charitable trust resulted r3 safety net agreement r3 referred triple approach rating reporting responsibility september 1996 agreement made ispa linx safety net foundation subsequently renamed internet watch foundation agreement set requirements associated isps regarding identifiability traceability internet users isps cooperate iwf identify providers illegal content facilitate easier traceability demon internet driving force behind iwf creation one employees clive feather became iwf first chair funding board solicitor mark stephens first chair iwf policy board policy board developed codes guidance operational oversight hotline reporting content funding board made industry representatives chair policy board provided wherewithal iwf day day activities set required policy board 3 years operation iwf reviewed dti home office consultants kpmg denton hall report delivered october 1999 resulted number changes made role structure organisation relaunched early 2000 endorsed government dti played facilitating role creation according dti spokesman time patricia hewitt minister e-commerce said internet watch foundation plays vital role combating criminal material net counter accusations iwf biased favour isps new independent chairman appointed roger darlington former head research communication workers union iwf website offers web-based government-endorsed method reporting suspect online content remains operation united kingdom acts relevant authority accordance memorandum understanding mou concerning section 46 sexual offences act 2003 meaning analysts prosecuted looking illegal content course duties reports submitted anonymously according iwf mou potentially illegal content hosted uk iwf work relevant service provider british police agency content ‘ taken ’ assist necessary offender responsible distributing offending content detected potentially illegal content includes however almost whole iwf site concerned suspected images child sexual abuse little mention criminally obscene material also within remit images judged iwf using uk law images child sexual abuse blocked government claimed would also handling images adult extreme pornography became illegal people uk possess 26 january 2009 longer part iwf ’ remit since 2017 iwf includes extreme pornography example criminally obscene content meaning report material hosted uk uploaded someone uk regarding blocking sites categories remit go far refer sites hosted uk appropriate authorities iwf states works partnership uk government departments home office dcms influence initiatives programmes developed combat online abuse funded european union online industry includes internet service providers mobile operators manufacturers content service providers telecommunications filtering companies search providers financial sector well blue-chip organisations support iwf corporate social responsibility reasons hotline reporting system organisation helps isps combat abuse services notice take service alerting potentially illegal content within remit systems simultaneously invites police investigate publisher iwf connections virtual global taskforce serious organised crime agency child exploitation online protection centre susie hargreaves appointed ceo september 2011 andrew puddephatt appointed chair january 2018 senior leadership team iwf comprises iwf passes notifications suspected child sexual abuse images videos inhope network hotlines across world whenever content traced inhope country inhope hotline iwf works relevant police body country previously iwf passed notifications suspected child pornography hosted non-uk servers uk national criminal intelligence service turn forwards interpol relevant foreign police authority works serious organised crime agency instead iwf however pass notifications types potentially illegal content hosted outside uk iwf compiles maintains list urls individual webpages child sexual abuse content called iwf url list previously referred child abuse image content list caic list whole website included list whole domain dedicated distribution child sexual abuse images says every url list depicts indecent images children advertisements links content publicly available website list typically contains 500 800 urls one time updated twice day ensure entries still live since iwf began proactively searching child sexual abuse imagery since introduction crawler technology list typically contains 5,000 12,000 urls every day daily ‘ churn ’ content added list removed list appropriate offending uk urls listed taken quickly urls elsewhere listed removed list applied isps 95 commercial internet customers uk according iwf website blocking applies potentially criminal urls related child sexual abuse content publicly available websites distribution images channels peer-to-peer matter police partners iwf plans extend type content included list staff 13 trained analysts responsible work iwf ’ 2018 annual report says average 376 new urls added list daily 2004 2006 bt group introduced cleanfeed technology used 80 internet service providers bt spokesman jon carter described cleanfeed function block access illegal web sites listed internet watch foundation described essentially server hosting filter checked requested urls web sites iwf list returning error message web site found positive matches 2006 home office minister alan campbell pledged isps would block access child abuse websites end 2007 middle 2006 government reported 90 domestic broadband connections either currently blocking plans end year target 100 coverage set end 2007 however middle 2008 stood 95 february 2009 government said looking ways cover final 5 interview march 2009 home office spokesperson mistakenly thought iwf deleted illegal content n't look content rate although iwf blacklist causes content censored even content found illegal court law iwf director communications sarah robertson claimed 8 december 2008 iwf opposed censorship legal content case iwf blacklisting cover art hosted wikipedia days prior claimed “ iwf found image illegal ” despite body legal jurisdiction march 2009 home office spokesperson said isps pressured sign iwf blacklist order block child pornography websites said alternative using iwf blacklist zen internet previously refused use iwf blacklist citing concerns effectiveness however quietly joined foundation september 2009 still maintaining concerns 2009 blacklist said contain 450 urls 2009 study researcher richard clayton university cambridge found quarter specific pages otherwise legitimate free file hosting services among rapidshare megaupload sendspace zshare listing pages confidential blacklist pages would cause accesses sites hosting referred iwf potentially causing unintended interference discussed 2018 iwf url list contained 100,682 unique urls r v walker sometimes called girls scream aloud obscenity trial first prosecution written material section 2 1 obscene publications act nearly two decades involved prosecution darryn walker posting story entitled girls scream aloud internet erotic story site 2008 story fictional written account describing kidnap rape murder pop group girls aloud reported iwf passed information scotland yard ’ obscene publications unit trial prosecution claimed story could easily accessed young fans girls aloud however defence demonstrated could located specifically searching material result case abandoned defendant cleared charges 5 december 2008 iwf system started blacklisting wikipedia article covering scorpions 1976 album virgin killer appeared article users major isps including bt vodafone virgin media/tesco.net be/o2 easynet/uk online/sky broadband plusnet demon talktalk opal telecom unable access filtered content although controversial album image still available internet shopping sites physical shops image reported iwf reader iwf determined could seen potentially illegal iwf estimated block affected 95 british residential users iwf since rescinded block issuing following statement additionally many uk internet users unable edit wikipedia pages unless registered logged wikipedia reported due single blacklisted article causing wikipedia traffic isps using system routed transparent proxy server wikipedia distinguishes unlogged-in users ip address interpreted unlogged-in users particular isp single user editing massively proxy address triggered wikipedia anti-abuse mechanism blocking 14 january 2009 uk users reported 85 billion pages internet archive wayback machine blocked although iwf policy block individual offending webpages whole domains according iwf chief executive peter robbins due technical hitch internet archive web site contained urls iwf blacklist requests sent demon internet carried particular header clashed internet archive internal mechanism convert web links serving archived versions web pages actual blocked url caused incident never became publicly known many isps implement iwf filtering using transparent proxy server unconnected iwf quoting plusnet ip address matches server used host one websites iwf list request diverted proxy server hosting server blacklisted problem due requesting page server also hosts listed page iwf lists internet companies voluntarily committed block access child sexual abuse web pages companies may use transparent proxies techniques using transparent proxy unintended side effect quite independent iwf filtering appearing websites connected originating proxy ip instead user real ip sites detect user ip adjust behaviour accordingly example trying download files file distribution website restricts free-of-charge usage enforcing delay typically 30 minutes downloads attempt download interpreted originating isp proxy rather user consequence user isp downloaded file site last half-hour likely large isp download allowed unintended consequence isp use proxy servers iwf filtering file sharing sites distribute files types example linux distribution files large use proxy servers also reported caused problem editing wikipedia blocking actual offending web page reported iwf filtering criticised interfering legitimate internet activity ineffective anyone intending access objectionable content one carefully argued discussion opposing things child pornography terrorism points filtering side effects discussed section would stop access material images child sexual abuse would stop email ftp https p2p usenet irc many ways access content simple encryption systems never stop best drives underground harder assess track february 2009 yorkshire-based software developer lodged formal complaint regarding iwf status charity charity commission pointed regulating worst internet really charitable purpose iwf existed mainly serve interests isps subscribing rather public iwf spokesperson said iwf attained charitable status 2004 order subject robust governance requirements higher levels scrutiny accountability charity law alongside company law brings iwf listed fakecharities.org directory so-called charities receive substantial funding either uk eu governments also termed quango critics implying poor management lack accountability iwf publishes details inspections audits website includes hotline audit every two years independent experts quality assurance inspections inhope hotline umbrella body iso27001 compliance human rights audit organisation carried lord ken macdonald 2014 following iwf blacklisting wikipedia article organisation operating habits came scrutiny j.r. raphael pc world stated incident raised serious free-speech issues alarming one non-governmental organisation ultimately acting morality police 95 uk internet users frank fisher guardian criticized iwf secretiveness lack legal authority among things noted blacklist could contain anything visitor blocked address may know browsing censored government believes self-regulatory system best solution metropolitan police also believe working isps rather trying force via legislation way forward iwf list urls considered host objectionable material distinct actual confidential blacklist pages available isps isps obliged subscribe self-appointed self-regulated internet watchdog views user-submitted content compiles list websites deems contain illegal images questions raised regarding legality viewing content would normally constitute criminal offence iwf memorandum understanding crown prosecution service association chief police officers – npcc “ clarify position professionally involved management operation use electronic communications networks services may face jeopardy criminal offences reassured protection acting combat creation distribution images child abuse ” iwf criticized blacklisting legal content telling websites blocked circumstances owner blocked webpage might even know offending content site means content would still readily available anyone outside uk internet companies deploy services across world implement iwf url list help prevent people stumbling across child sexual abuse imagery blocking methodology implemented company taking list iwf ’ good practice blocking guide recommends companies use splash page people know page blocked view rather simply delivering “ page found ” message lord ken macdonald carried human rights audit addressing iwf ’ members agm 26 november 2013 lord macdonald said “ deeply impressed ” quality staff “ commitment attention freedom expression privacy rights ” historically blacklisting sites may concealed generic http 404 page found message rather explanation content censored exact method censorship determined implementing isp bt example return http 404 pages whereas demon return message stating page censored time wikipedia blocking performance issues accessing site uk reported october 2014 users sky broadband reported slow intermittent performance image host imgur clicking image would typically result site appearing accessing via https causes images load normally bypasses proxy used sites blacklisted content aside iwf url list iwf developed many services may taken internet companies help stop spread child sexual abuse imagery online
[ 2945, 9704, 8204, 6000, 10545, 4435, 823 ]
Test
10,447
7
MinIO:minio minio cloud storage server compatible amazon s3 released apache license v2 object store minio store unstructured data photos videos log files backups container images maximum size object 5tb main developer minio cloud storage stack minio inc silicon valley-based technology startup founded anand babu periasamy garima kapoor harshavardhana november 2014 source code hosted github 17,000 stars august 2019 contributions project accepted via github implementation pull requests minio server designed light enough bundled along application stack similar redis default server single instance single backing disk erasure code mode available server configured use four drives erasure code subsystem also attempts automatically detect correct data degradation minio server distributed mode allows operators pool multiple drives local remote single object storage server setup distributed mode resilient node failures provide increased data protection minio server hardware agnostic works variety physical virtual/container environments allows run containers running commodity servers local disks still enterprise-level data safety scalability minio server installed physical virtual machines launched docker containers deployed container orchestration platforms like kubernetes mesosphere docker swarm minio client codice_1 provides alternative standard unix commands e.g codice_2 codice_3 codice_4 codice_5 codice_6 etc adding support amazon s3-compatible cloud storage services aws signature v2 v4 minio client supported linux mac windows platforms minio client sdk provides simple api access amazon s3-compatible object storage server language bindings available go java python javascript haskell languages hosted .net framework
[ 11201, 3876, 3462, 8554, 5677, 6797, 7347, 3573, 2198, 823, 11221, 1435, 10111, 2910, 8446 ]
None
10,448
4
Sony_BMG_copy_protection_rootkit_scandal:sony bmg copy protection rootkit scandal scandal erupted 2005 regarding sony bmg implementation deceptive illegal harmful copy protection measures 22 million cds inserted computer cds installed one two pieces software provided form digital rights management drm modifying operating system interfere cd copying neither program could easily uninstalled created vulnerabilities exploited unrelated malware sony claims unintentional one programs installed even user refused end-user license agreement eula would still phone home reports user private listening habits mentioned eula contained code several pieces copylefted free software apparent infringement copyright configured operating system hide software existence leading programs classified rootkits sony bmg initially denied rootkits harmful released one programs uninstaller un-hid program installed additional software could easily removed collected email address user introduced security vulnerabilities following public outcry government investigations class-action lawsuits 2005 2006 sony bmg partially addressed scandal consumer settlements recall 10 affected cds suspension cd copy protection efforts early 2007 august 2000 statements sony pictures entertainment us senior vp steve heckler foreshadowed events late 2005 heckler told attendees americas conference information systems industry take whatever steps needs protect protect revenue streams ... lose revenue stream matter ... sony going take aggressive steps stop develop technology transcends individual user firewall napster source – block cable company block phone company block isp firewall pc ... strategies aggressively pursued simply much stake europe bmg created minor scandal 2001 released natalie imbruglia second album white lilies island without warning labels stating cd copy protection cds eventually replaced bmg sony released copy-protected versions certain releases certain markets late 2001 late 2002 report indicated bmg cds sold europe would form copy protection two pieces copy-protection software issue 2005–2007 scandal included 22 million cds marketed sony bmg record company formed 2004 merger sony bmg recorded music divisions two million cds spanning 52 titles contained first 4 internet f4i extended copy protection xcp installed microsoft windows systems user accepted eula made mention software remaining 20 million cds spanning 50 titles contained sunncomm mediamax cd-3 installed either microsoft windows mac os x systems user presented eula regardless whether user accepted however mac os x prompted user confirmation software attempted modify os whereas computers running windows scandal erupted october 31 2005 winternals later acquired microsoft corporation researcher mark russinovich posted blog detailed description technical analysis f4i xcp software ascertained recently installed computer sony bmg music cd russinovich compared software rootkit due surreptitious installation efforts hide existence noted eula mention software asserted emphatically software illegitimate digital rights management gone far anti-virus firm f-secure concurred although software n't directly malicious used rootkit hiding techniques exactly used malicious software hide drm software cause many similar false alarms av software detect rootkits ... thus inappropriate commercial software use techniques public pressure symantec anti-virus vendors included detection rootkit products well microsoft announced would include detection removal capabilities security patches russinovich discovered numerous problems xcp soon russinovich first post several trojans worms exploiting xcp security holes people even used vulnerabilities cheat online games sony bmg quickly released software remove rootkit component xcp affected microsoft windows computers russinovich analyzed utility reported blog exacerbated security problems raised concerns privacy russinovich noted removal program merely unmasked hidden files installed rootkit actually remove rootkit also reported installed additional software could uninstalled order download uninstaller found necessary provide e-mail address sony bmg privacy policy implied added various bulk e-mail lists install activex control containing backdoor methods marked safe scripting thus prone exploits november 18 2005 sony bmg provided new improved removal tool remove rootkit component xcp affected microsoft windows computers november 15 2005 vnunet.com announced sony bmg backing copy-protection software recalling unsold cds stores offering consumers exchange cds versions lacking software electronic frontier foundation compiled partial list cds xcp sony bmg quoted maintaining security risks associated anti-piracy technology despite numerous virus malware reports november 16 2005 us-cert part united states department homeland security issued advisory xcp drm said xcp uses rootkit technology hide certain files computer user technique security threat computer users also said one uninstallation options provided sony bmg introduces vulnerabilities system us-cert advised install software sources expect contain software audio cd sony bmg announced instructed retailers remove unsold music discs containing software shelves estimated internet security expert dan kaminsky xcp use 500,000 networks cds xcp technology identified letters xcp printed back cover jewel case cd according sonybmg xcp faq november 18 2005 reuters reported sony bmg would exchange affected insecure cds new unprotected disks well unprotected mp3 files information swap found sony bmg swap program website part swap program consumers mail xcp-protected cds sony bmg sent unprotected disc via return mail november 29 new york attorney general eliot spitzer found investigators despite recall november 15 sony bmg cds xcp still sale new york city music retail outlets spitzer said unacceptable three weeks serious vulnerability revealed cds still shelves busiest shopping days year strongly urge retailers heed warnings issued products pull distribution immediately ship back sony next day massachusetts attorney general tom reilly issued statement saying sony bmg cds xcp still available boston despite sony bmg recall november 15 attorney general reilly advised consumers purchase sony bmg cds xcp said conducting investigation sony bmg may 11 2006 sony bmg website offered consumers link class action settlement information regarding xcp mediamax content protection online claim filing links software updates/uninstallers deadline submitting claim june 30 2007 april 2 2008 sony bmg website finally offered consumers explanation list affected cds november 21 2005 texas attorney general greg abbott sued sony bmg texas first state united states bring legal action sony bmg response rootkit suit also first filed state ’ 2005 spyware law alleged company surreptitiously installed spyware millions compact music discs cds consumers inserted computers play cds compromise systems december 21 2005 abbott added new allegations lawsuit sony-bmg regarding mediamax new allegations claimed mediamax violated state spyware deceptive trade practices laws mediamax software would installed computer even user declined license agreement would authorize installation abbott stated keep discovering additional methods sony used deceive texas consumers thought simply buying music thousands texans potential victims deceptive game sony played consumers purposes addition violations consumer protection computer spyware act 2005 allowed civil penalties 100,000 violation law alleged violations added updated lawsuit december 21 2005 carried maximum penalties 20,000 per violation sony lost battle abbott pay 750,000 legal fees texas accept customer returns affected cds place conspicuous detailed notice homepage make keyword buys alert consumers advertising google yahoo msn pay 150 per damaged computer much sony bmg also agree would make claim legal settlement way constitutes approval court class action suits filed sony bmg new york california december 30 2005 new york times reported sony bmg reached tentative settlement lawsuits proposing two ways compensating consumers purchased affected recordings according proposed settlement purchased xcp cd paid 7.50 per purchased recording given opportunity download free album able download three additional albums limited list recordings give cash incentive district judge naomi reice buchwald entered order tentatively approving settlement january 6 2006 settlement designed compensate whose computers infected otherwise damaged damages addressed class action able opt settlement pursue litigation fairness hearing held may 22 2006 9:15 daniel patrick moynihan united states courthouse southern district new york claims submitted december 31 2006 class members wished excluded settlement must filed may 1 2006 remained settlement could attend fairness hearing expense speak behalf represented attorney italy alcei association similar eff also reported rootkit financial police asking investigation various computer crime allegations along technical analysis rootkit us department justice doj made comment whether would take criminal action sony however stewart baker department homeland security publicly admonished sony stating intellectual property—it computer november 21 eff announced also pursuing lawsuit xcp sunncomm mediamax drm technology eff lawsuit also involves issues concerning sony bmg end user license agreement reported december 24 2005 then-florida attorney general charlie crist investigating sony bmg spyware january 30 2007 u.s. federal trade commission ftc announced settlement sony bmg charges cd copy protection violated federal law—section 5 federal trade commission act 15 usc 45 —by engaging unfair deceptive business practices settlement requires sony bmg reimburse consumers 150 repair damage resulted directly attempts remove software installed without consent settlement also requires provide clear prominent disclosure packaging future cds limits copying restrictions use playback devices ban company installing content protection software without obtaining consumers ’ authorization ftc chairwoman deborah platt majoras added installations secret software create security risks intrusive unlawful consumers computers belong companies must adequately disclose unexpected limitations customer use products consumers make informed decisions regarding whether purchase install content researchers found sony bmg makers xcp also apparently infringed copyright failing adhere licensing requirements various pieces free open-source software whose code used program including lame mp3 encoder mpglib faac id3lib mpg123 vlc media player january 2006 developers lame posted open letter stating expected appropriate action sony bmg developers plans investigate take action apparent violation lame source code license russinovich report discussed popular blogs almost immediately following release npr one first major news outlets report scandal november 4 2005 thomas hesse sony bmg global digital business president told reporter neda ulaby people think n't even know rootkit care november 7 2005 article vnunet.com summarised russinovich findings urged consumers avoid buying sony bmg music cds time following day boston globe classified software spyware computer associates etrust security management unit vp steve curry confirmed communicates personal information consumers computers sony bmg namely cd played user ip address methods used software avoid detection likened used data thieves november 8 2005 computer associates decided classify sony bmg software spyware provide tools removal speaking sony bmg suspending use xcp independent researcher mark russinovich said step taken immediately first virus made use sony bmg stealth technology make malicious files invisible user anti-virus programs surfaced november 10 2005 one day later yahoo news announced sony bmg suspended distribution controversial technology according zdnet news latest risk uninstaller program distributed sunncomm technologies company provides copy protection sony bmg releases uninstall program obeys commands sent allowing others take control pcs uninstaller used december 6 2005 sony bmg said 5.7 million cds spanning 27 titles shipped mediamax 5 software company announced availability new software patch prevent potential security breach consumers computers sony bmg australia released press release indicating sony bmg titles manufactured australia copy protection
[ 2309, 11, 268, 6797, 7957, 1046, 10392, 3867, 10026, 7739, 9791, 9537, 3525, 839, 7515, 3163, 8797, 9569, 4081, 2041 ]
Test
10,449
3
Wizardry_II:_The_Knight_of_Diamonds:wizardry ii knight diamonds wizardry ii knight diamonds originally known wizardry knight diamonds second scenario second game wizardry series role-playing video games published 1982 sir-tech game begins city llylgamyn siege llylgamyn rulers killed city hope recovery staff gnilda obtainable trading mystic knight diamonds armor legendary knight diamonds fend invaders game functions virtually identically first scenario player guiding party six adventurers 6 level dungeon original version required players import characters first game whilst later versions include pregenerated party ability create new characters game intended played successfully completed first game difficulty level intended characters least level 13 training area means lower level characters go baptism fire mechanical differences include ability save game dungeon rather forcing characters exit dungeon return training grounds spells increasing power noted message dungeon unlike first scenario half levels purpose plot-wise could skipped player wished exploration levels knight diamonds necessary complete game six levels piece knight armor somewhere level pieces must collected order finish game furthermore unlike first scenario elevators used skip levels teleportation spells fail party attempts use teleport level yet reached via stairs softline 1982 praised knight diamonds variety monsters liked level dungeon quests magazine concluded one wonder amazing duo greenberg woodhead next scenario computer gaming world 1991 1993 called wizardry ii disappointingly weak follow-up criticizing small size noting first game necessary play magazine concluded best hard-core fan philip l. wing reviewed knight diamonds space gamer 76 wing commented recommend scenario interesting challenging adventure higher-level wizardry characters knight diamonds named best adventure game home computer 1982 origins game fair defeating ultima ii among nominees also received certificate merit category 1984 best computer adventure 5th annual arkie awards
[ 9446, 5260, 4533, 9166 ]
Test
10,450
8
Web_beacon:web beacon web beacon also called web bug tracking bug tag web tag page tag tracking pixel pixel tag 1×1 gif clear gif one various techniques used web pages email unobtrusively usually invisibly allow checking user accessed content web beacons typically used third parties monitor activity users website purpose web analytics page tagging also used email tracking implemented using javascript may called javascript tags using beacons companies organizations track online behavior web users first companies tracking mainly advertisers web analytics companies later social media sites also started use tracking techniques instance use buttons act tracking beacons work progress standardize interface web developers use create web beacons web beacon number techniques used track visiting web page also used see email read forwarded web page copied another website first web beacons small digital image files embedded web page email image could small single pixel could color background completely transparent thus name “ tracking pixel ” user opens page email image embedded might see image web browser email reader would automatically download image requiring user ’ computer send request host company ’ server source image stored request would provide identifying information computer allowing host keep track user basic technique developed sorts elements used beacons currently include visible elements graphics banners buttons also non-pictorial html elements frame style script input link embed object etc. email web page identifying information provided user computer typically includes ip address time request made type web browser email reader made request existence cookies previously sent host server host server store information associate session identifier tracking token uniquely marks interaction use framing added new level versatility web beacons framing allows web pages refer content images buttons html elements located servers rather hosting content directly server user sees email web page user ’ email reader web browser prepares referred content display send request third-party server ask send referred content part request user computer supply identifying information third-party server protocol allows companies embed beacons content directly operate use beacons tracking purposes beacons embedded email web page images buttons html elements hosted different server website embedded third-party server requests identifying information sent instance case advertisement displayed image web page image file would reside page ’ host server server belonging advertising company user opens page user computer request download advertisement page ’ server referred advertiser server request download image advertiser server request require user computer supply identifying information advertiser means third-party site advertiser gather information visitors main site news site social media site even users clicking advertisement moreover given beacons embedded visible advertisements embedded completely invisible elements third party gather information even user completely unaware third party ’ existence company identify particular user company track user behavior across multiple interactions different websites web servers example consider company owns network websites company could store images one particular server store contents web pages variety servers instance server could specific given website could even located different city company could use web beacons count recognize individual users visit different websites rather gathering statistics managing cookies server independently company analyze data together track behavior individual users across different websites assembling profile user navigates different environments web beacons embedded emails greater privacy implications beacons embedded web pages use embedded beacon sender email even third party record sort information advertiser website namely time email read ip address computer used read email ip address proxy server reader went type software used read email existence cookies previously sent way sender third party gather detailed information particular recipient reads email every subsequent time email message displayed information also sent sender third party return-receipt-to rrt email headers also trigger sending information may seen another form web beacon web beacons used email marketers spammers phishers verify email read using system send similar emails large number addresses check ones valid valid case means address actually use email made past spam filters content email actually viewed extent kind email tracking prevented configuring email reader software avoid accessing remote images examples email software able include gmail yahoo hushmail spamcop/horde webmail clients mozilla thunderbird opera pegasus mail incredimail apple mail later versions microsoft outlook kmail mail readers however since beacons embedded email non-pictorial elements email need contain image advertisement anything else related identity monitoring party makes detection emails difficult one way neutralize email tracking disconnect internet downloading email reading downloaded messages note assumes one using email reader resides one ’ computer downloads emails email server one ’ computer case messages containing beacons able trigger requests beacons host servers tracking prevented one would delete messages suspected containing beacons risk beacons activate computer reconnected internet way completely avoid email tracking beacons use text-based email reader pine mutt graphical email reader purely text-based html capabilities mulberry email readers interpret html display images users subject tracking email web beacons plain-text email messages contain web beacons contents interpreted display characters instead embedded html code opening messages initiate communication email readers offer option disable html every message thus rendering messages plain text prevent tracking beacons working recently many email readers web-based email services moved towards loading images opening hypertext email comes unknown sender suspected spam email user must explicitly choose load images course beacons embedded non-pictorial elements hypertext email web beacons also filtered server level never reach end user mailscanner example gateway software neutralize email tracking beacons users particular server beacon api application programming interface candidate recommendation world wide web consortium standards organization web standardized set protocols designed allow web developers track activity users without slowing website response times sending tracking information back beacon host server user navigated away webpage use beacon api allows tracking without interfering delaying navigation away site invisible end-user support beacon api introduced mozilla firefox browser february 2014 google chrome browser november 2014
[ 1667, 3462, 8584, 1419, 5524, 11418, 7965, 8735, 3490, 297, 9642, 6576, 845, 6094, 10579, 1514, 235, 9451, 4725, 3578, 124 ]
None
10,451
2
List_of_router_firmware_projects:list router firmware projects list software created maintained people manufacturer product extent support testing particular hardware varies project project notable custom-firmware projects wireless routers many run various brands linksys asus netgear etc software distributions routers 5 gb storage 1 gb ram
[ 1792, 2049, 4480, 2179, 4611, 2825, 1802, 6797, 1172, 1814, 8214, 9496, 3482, 1436, 4511, 6431, 5924, 550, 8998, 9640, 10790, 7082, 1708, 3885, 686, 7983, 9004, 8753, 9009, 823, 569, 5178, 11577, 3007, 9279, 5057, 1858, 10303, 10433, 1107...
Test
10,452
8
Semantic_Web:semantic web semantic web extension world wide web standards world wide web consortium w3c standards promote common data formats exchange protocols web fundamentally resource description framework rdf according w3c semantic web provides common framework allows data shared reused across application enterprise community boundaries semantic web therefore regarded integrator across different content information applications systems term coined tim berners-lee web data data web processed machines—that one much meaning machine-readable critics questioned feasibility proponents argue applications library information science industry biology human sciences research already proven validity original concept berners-lee originally expressed vision semantic web follows 2001 scientific american article berners-lee hendler lassila described expected evolution existing web semantic web 2006 berners-lee colleagues stated simple idea…remains largely unrealized 2013 four million web domains contained semantic web markup following example text 'paul schuster born dresden website annotated connecting person place birth following html-fragment shows small graph described rdfa-syntax using schema.org vocabulary wikidata id div vocab= http //schema.org/ typeof= person /div example defines following five triples shown turtle syntax triple represents one edge resulting graph first element triple subject name node edge starts second element predicate type edge last third element object either name node edge ends literal value e.g text number etc. triples result graph shown given figure one advantages using uniform resource identifiers uris dereferenced using http protocol according so-called linked open data principles dereferenced uri result document offers data given uri example uris edges nodes e.g nowiki http //schema.org/person /nowiki nowiki http //schema.org/birthplace /nowiki nowiki http //www.wikidata.org/entity/q1731 /nowiki dereferenced result rdf graphs describing uri e.g dresden city germany person sense uri fictional second graph shows previous example enriched triples documents result dereferencing nowiki http //schema.org/person /nowiki green edge nowiki http //www.wikidata.org/entity/q1731 /nowiki blue edges additionally edges given involved documents explicitly edges automatically inferred triple original rdfa fragment triple document nowiki http //schema.org/person /nowiki green edge figure allow infer following triple given owl semantics red dashed line second figure concept semantic network model formed early 1960s researchers cognitive scientist allan m. collins linguist m. ross quillian psychologist elizabeth f. loftus form represent semantically structured knowledge applied context modern internet extends network hyperlinked human-readable web pages inserting machine-readable metadata pages related enables automated agents access web intelligently perform tasks behalf users term semantic web coined tim berners-lee inventor world wide web director world wide web consortium w3c oversees development proposed semantic web standards defines semantic web web data processed directly indirectly machines many technologies proposed w3c already existed positioned w3c umbrella used various contexts particularly dealing information encompasses limited defined domain sharing data common necessity scientific research data exchange among businesses addition technologies similar goals emerged microformats many files typical computer also loosely divided human-readable documents machine-readable data documents like mail messages reports brochures read humans data calendars addressbooks playlists spreadsheets presented using application program lets viewed searched combined currently world wide web based mainly documents written hypertext markup language html markup convention used coding body text interspersed multimedia objects images interactive forms metadata tags provide method computers categorize content web pages examples field names keywords description author assigned values computing cheap widgets sale john doe metadata tagging categorization computer systems want access share data easily identify relevant values html tool render perhaps web browser software perhaps another user agent one create present page lists items sale html catalog page make simple document-level assertions document title 'widget superstore capability within html assert unambiguously example item number x586172 acme gizmo retail price €199 consumer product rather html say span text x586172 something positioned near acme gizmo €199 etc way say catalog even establish acme gizmo kind title €199 price also way express pieces information bound together describing discrete item distinct items perhaps listed page semantic html refers traditional html practice markup following intention rather specifying layout details directly example use denoting emphasis rather specifies italics layout details left browser combination cascading style sheets practice falls short specifying semantics objects items sale prices microformats extend html syntax create machine-readable semantic markup objects including people organisations events products similar initiatives include rdfa microdata schema.org semantic web takes solution involves publishing languages specifically designed data resource description framework rdf web ontology language owl extensible markup language xml html describes documents links rdf owl xml contrast describe arbitrary things people meetings airplane parts technologies combined order provide descriptions supplement replace content web documents thus content may manifest descriptive data stored web-accessible databases markup within documents particularly extensible html xhtml interspersed xml often purely xml layout rendering cues stored separately machine-readable descriptions enable content managers add meaning content i.e. describe structure knowledge content way machine process knowledge instead text using processes similar human deductive reasoning inference thereby obtaining meaningful results helping computers perform automated information gathering research example tag would used non-semantic web page encoding similar information semantic web page might look like tim berners-lee calls resulting network linked data giant global graph contrast html-based world wide web berners-lee posits past document sharing future data sharing answer question provides three points instruction one url point data two anyone accessing url get data back three relationships data point additional urls data tim berners-lee described semantic web component web 3.0 semantic web sometimes used synonym web 3.0 though definition term varies web 3.0 started emerge movement away centralisation services like search social media chat applications dependent single organisation function guardian journalist john harris reviewed concept favorably early2019 particular work bernerslee project called 'solid based around personal data stores 'pods individuals retain control bernerslee formed startup inrupt advance idea attract volunteer developers challenges semantic web include vastness vagueness uncertainty inconsistency deceit automated reasoning systems deal issues order deliver promise semantic web list challenges illustrative rather exhaustive focuses challenges unifying logic proof layers semantic web world wide web consortium w3c incubator group uncertainty reasoning world wide web urw3-xg final report lumps problems together single heading uncertainty many techniques mentioned require extensions web ontology language owl example annotate conditional probabilities area active research standardization semantic web context web 3.0 care w3c term semantic web often used specifically refer formats technologies enable collection structuring recovery linked data enabled technologies provide formal description concepts terms relationships within given knowledge domain technologies specified w3c standards include semantic web stack illustrates architecture semantic web functions relationships components summarized follows well-established standards yet fully realized intent enhance usability usefulness web interconnected resources creating semantic web services services could useful public search engines could used knowledge management within organization business applications include corporation closed group users management able enforce company guidelines like adoption specific ontologies use semantic annotation compared public semantic web lesser requirements scalability information circulating within company trusted general privacy less issue outside handling customer data critics question basic feasibility complete even partial fulfillment semantic web pointing difficulties setting lack general-purpose usefulness prevents required effort invested 2003 paper marshall shipman point cognitive overhead inherent formalizing knowledge compared authoring traditional web hypertext according marshall shipman tacit changing nature much knowledge adds knowledge engineering problem limits semantic web applicability specific domains issue point domain- organisation-specific ways express knowledge must solved community agreement rather technical means turns specialized communities organizations intra-company projects tended adopt semantic web technologies greater peripheral less-specialized communities practical constraints toward adoption appeared less challenging domain scope limited general public world-wide web finally marshall shipman see pragmatic problems idea knowledge navigator-style intelligent agents working largely manually curated semantic web cory doctorow critique metacrap perspective human behavior personal preferences example people may include spurious metadata web pages attempt mislead semantic web engines naively assume metadata veracity phenomenon well-known metatags fooled altavista ranking algorithm elevating ranking certain web pages google indexing engine specifically looks attempts manipulation peter gärdenfors timo honkela point logic-based semantic web technologies cover fraction relevant phenomena related semantics enthusiasm semantic web could tempered concerns regarding censorship privacy instance text-analyzing techniques easily bypassed using words metaphors instance using images place words advanced implementation semantic web would make much easier governments control viewing creation online information information would much easier automated content-blocking machine understand addition issue also raised use foaf files geolocation meta-data would little anonymity associated authorship articles things personal blog concerns addressed policy aware web project active research development topic another criticism semantic web would much time-consuming create publish content would need two formats one piece data one human viewing one machines however many web applications development addressing issue creating machine-readable format upon publishing data request machine data development microformats one reaction kind criticism another argument defense feasibility semantic web likely falling price human intelligence tasks digital labor markets amazon mechanical turk specifications erdf rdfa allow arbitrary rdf data embedded html pages grddl gleaning resource descriptions dialects language mechanism allows existing material including microformats automatically interpreted rdf publishers need use single format html first research group explicitly focusing corporate semantic web acacia team inria-sophia-antipolis founded 2002 results work include rdf based corese search engine application semantic web technology realm e-learning since 2008 corporate semantic web research group located free university berlin focuses building blocks corporate semantic search corporate semantic collaboration corporate ontology engineering ontology engineering research includes question involve non-expert users creating ontologies semantically annotated content extracting explicit knowledge interaction users within enterprises tim o'reilly coined term web 2.0 proposed long-term vision semantic web web data sophisticated applications manipulate data web data web transforms web distributed file system distributed database system
[ 6145, 2948, 5641, 11659, 8717, 6798, 4624, 11538, 10004, 5525, 534, 1174, 11674, 2715, 3227, 9631, 416, 1825, 9248, 9762, 5030, 2471, 53, 6330, 10938, 3389, 4797, 9150, 3264, 10557, 8514, 6470, 5319, 9286, 1481, 1737, 5449, 7164, 4557, 87...
Test
10,453
1
EXist:exist exist-db exist short open source software project nosql databases built xml technology classified nosql document-oriented database system native xml database provides support xml json html binary documents unlike relational database management systems rdbms nosql databases exist-db provides xquery xslt query application programming languages exist-db released version 2.1 gnu lgpl exist-db created 2000 wolfgang meier major versions released 1.0 september 2006 2.0 february 2013 3.0 february 2017 4.0 february 2018 5.0.0-rc1 june 2018. exist-db awarded best xml database year infoworld 2006 company called exist solutions gmbh germany promotes software.. o'reilly book exist-db co-authored adam retter erik siegel exist-db allows software developers persist xml/json/binary documents without writing extensive middleware exist-db follows extends many w3c xml standards xquery exist-db also supports rest interfaces interfacing ajax-type web forms applications xforms may save data using lines code webdav interface exist-db allows users drag drop xml files directly exist-db database exist-db automatically indexes documents using keyword indexing system exist-db support following standards technologies
[ 9828, 2757, 1802, 7983, 2901, 502, 6775, 2296, 124, 479 ]
Validation
10,454
7
Introhive:introhive introhive customer relationship management crm automation relationship intelligence platform designed help companies drive user adoption crm increase sales business development efficiency introhive platform works connect contact account data email systems crm improve team productivity data accuracy completeness information crm introhive established fredericton new brunswick canada offices chicago miami london u.k. chennai india headquartered washington d.c.. introhive founded january 2012 fredericton jody glidden stewart walchli entrepreneurs previously founded content delivery application company chalk media sold research motion 2009 introhive raised substantial venture funding first year canadian us-based investors early 2013 three former executives salesforce.com joined leadership team today introhive numbers 120+ staff across company 6 global offices introhive developed cloud-based software platform utilizes relationships organization ’ employees customers colleagues friends – including social media email electronic calendars contacts introhive platform assesses well person knows someone else assigning relationship score contact designed particularly large organisations hard quantify mine existing connections among employees platform core enterprise relationship management erm solution integrates crm business systems provide sales force automation relationship intelligence crm relationship analytics solutions platform built sales marketing organisations looking increase user adoption crm increase data quality decrease manual data entry crm increase insights business relationships platform provides organizations holistic view knows across company employees customer relationships data gathered crm distributed users platform via pre-meeting digests include company news meeting attendee profiles meeting notes crm information marketing automation information relationship intelligence stock quotes platform designed create enterprise relationship graph enable introhive refers 'warm introductions rather relying sales marketing cold calls
[ 4194, 467, 10090 ]
Test
10,455
2
Robert_Watson_(computer_scientist):robert watson computer scientist robert nicholas maxwell watson born 3 may 1977 freebsd developer founder trustedbsd project currently employed university lecturer systems security architecture security research group university cambridge computer laboratory watson graduated computer science carnegie mellon university attained phd university cambridge well cambridge worked national institutes health carnegie mellon university trusted information systems network associates mcafee sparta obtained phd computer security university cambridge computer laboratory supervised ross anderson sponsored google watson work supported darpa apple computer navy us government agencies main research interests network security operating system security main open source software contributions include work developing multi-threaded multi-processor freebsd network stack trustedbsd project openbsm writing featured forums acm queue magazine usenix annual technical conference bsdcon slashdot interview also freebsd core team member 2000 2012 watson coauthor standard textbook design implementation freebsd operating system 2nd ed. 2015 marshall kirk mckusick
[ 7425, 2180, 1927, 1801, 10761, 274, 9625, 1946, 4636, 2212, 6438, 10535, 684, 4908, 1071, 3248, 7983, 9009, 11698, 11573, 1718, 3766, 9784, 1465, 5177, 5819, 3006, 704, 11459, 8262, 9927, 8266, 8395, 9932, 8909, 5710, 6864, 7249, 850, 636...
None
10,456
0
Margaret_Masterman:margaret masterman margaret masterman 4 may 1910 – 1 april 1986 british linguist philosopher known pioneering work field computational linguistics especially machine translation founded cambridge language research unit margaret masterman born london 4 may 1910 charles f. g. masterman politician lucy blanche lyttelton politician poet writer 1932 married richard bevan braithwaite philosopher son daughter margaret masterman one six students wittgenstein course 1933–34 whose notes compiled blue book 1955 founded directed cambridge language research unit clru grew informal discussion group major research centre computational linguistics time student newnham college cambridge read modern languages moral sciences philosophy called cambridge language research unit founded small beautiful building called adie museum housed far eastern art small buddhist sculptures built walls carved doors period twenty years starting 1953 source significant research machine translation computational linguistics quantum physics even though outside official university structures cambridge funded grants us agencies afosr onr nsf uk government agencies osti later eu funds luxembourg computing facilities primitive—an ancient icl 1202 computer -- -and serious computation done either cambridge university machine mathematical laboratory—or clru visitors sites us one measure impact staff never exceeded ten people annual lifetime achievement awards association computational linguistics us three awarded clru alumni martin kay karen spärck jones yorick wilks margaret masterman ahead time twenty years many beliefs proposals language processing computer become part common stock ideas artificial intelligence ai machine translation mt fields never able lay adequate claim unacceptable published written later students independently “ discovered ” others trace back especially fields little nothing ten years old ever reread core beliefs language processing must reflect coherence language redundancy signal idea partial inheritance old “ information theoretic ” view language meant processes analysing language must take account repetitive redundant structures writer goes saying thing different ways writer ambiguities removed signal sometimes led overemphasise real explicit redundancy would find rhythmical repetitive verse claim implausibly normal english like could see right led later years key role assigned rhythm stress breathgroupings boundaries impose text processes understanding put crudely claim languages way least part produced creatures breathe fairly regular intervals obvious claims could even entertained chomsky views preeminent language studies however could never give systematic surface criteria breathgroups stress patterns identified surface cues could reduced criteria syntax morphology would become involved actual physics voice patterns views importance semantics language processing continued defend high years chomskyan syntax 1951 1966 much influenced r. h. richens views classification description means language semantic primitives syntax along associated claims semantic pattern matching onto surface text developed actual programs might assumed straightforward believer existence semantic primitives katzian schankian sense nothing could truth far much wittgensteinian sceptic ability limited sublanguage logic take role whole language always argued semantic primitives would make sense empirical criteria discovery theory allowed fact would develop exactly polysemy higher natural language always emphasised functional role primitives example resolving sense ambiguity interlingua mt hoped escape problem origin semantic primitives would lie either empirical classification procedures operating actual texts way speak deriving primitives massive connectionist learning adequate formal theory structure thesauri believed make explicit certain underlying structures semantic relations natural language theory “ primitives ” would emerge naturally organizing classification thesauri years colleagues explored lattice theory underlying formal structure thesauri two concerns went intellectual life owe much period michael halliday university lecturer chinese cambridge colleague c.l.r.u got idea syntactic theory fundamentally semantic pragmatic either categories fundamental definition terms role syntax organizing principle semantic information first ai researcher influenced halliday long terry winograd became preoccupied considerable period nature function chinese ideograms felt clarified empirical way problems wittgenstein wrestled so-called picture-theory-of-truth led exaggerate generality ideogrammatic principles seem hold english really rather like chinese seen correctly meaning atoms highly ambiguous virtually uninflected view found little sympathy dominant linguistic computational currents time main creation 1953 one endured twenty years cambridge language research unit grew informal discussion group heterogeneous membership interested language philosophical computational points view subsequently attempt build language processing programs sound philosophical basis distinctive feature unit work approach language processing specific form took use thesaurus main vehicle semantic operations probably come seen unit major contributions field whole margaret primarily responsible vision language processing possibilities remarkable time computers rudimentary indeed much c.l.r.u work done predecessors computers namely hollerith punched card machines equally margaret determination establishing maintaining unit enormous effort fund raising involved striking fact could continue decades periods public support work hard come tribute margaret persistence charm difficult us days artificial intelligence ordinary market place powerful personal computers realise hard get financial resources needed language-processing research technical resources actual experiments perhaps best comment margaret initiative embarking language processing research specifically machine translation work comes somewhat unexpected source machine translation initial period high hopes large claims cast outer darkness 1966 funding agencies saw little return money reviewing twenty five years artificial intelligence research presidential address american association artificial intelligence 1985 woody bledsoe one long-standing leaders field though areas quite outside language said attempted machine translation fifties sixties may failed right try learned much attempts something difficult c.l.r.u trying far ahead time efforts made tackle fundamental problems computers day capacity modern digital wrist watch despite every kind problem unit produced numerous publications language related subjects including information retrieval automatic classification ten years unit presence strongly felt field always emphasis basic semantic problems language understanding margaret time felt needed syntactic parsing complete parsing necessary anything else semantics language regarded basic part understanding machine ideas c.l.r.u seem curiously modern margaret main contribution life clru continual intellectual stimulus gave research larger natural language processing community wide ranging concerns lateral ideas led example propose thesaurus means carrying many distinct language processing tasks like indexing translation margaret emphasis algorithms testing vital development clru work language processing ideas notable especially worked intellectual qualities sheer joyousness serious research stopped clru 1978 margaret tried restart clru 1980 william williams hope new breed micro-computers could used develop algorithms natural language translation margaret walked 7 miles millington road cambridge orwell purchased two north star horizon computers intelligent artefacts see st robotics installed forth programming language written david sands used various students university cambridge programmed margaret algorithms computers margaret approach natural language translation time split sentence breath group segments since breath group unique meaning could translated target language target sentence reconstructed using translated breath groups contrasted predominant language translation techniques time notably systran used dictionary rule based system still used today margaret died 1986 william williams closed clru unique library early mt documents dumped skip even though two university bodies offered give home one cofounders lucy cavendish college first vice-president 1965–1975 great-niece lucy cavendish college named also founder major inspiration epiphany philosophers group shared membership clru dedicated study relationship science religion forms religious practice 1965 margaret masterman read work nature paradigm fourth international colloquium philosophy science london conducted detailed textual criticism thomas s. kuhn book structure scientific revolutions 1962 characterizing book scientifically perspicuous philosophically obscure masterman praised kuhn one outstanding philosophers science time concept paradigms fundamental idea new one philosophy science criticised thomas kuhn vague inconsistent use concept paradigm noting used least 21 different senses summarized three groups metaparadigms sociological paradigms artefact construct paradigms masterman proposed kuhn critics philosophy science dealt metaparadigms explored insights implications various conceptions criticism accepted thomas kuhn crucial shift concept paradigm incommensurability
[ 3904, 1890, 7724, 3085, 3668, 538, 7164 ]
Validation
10,457
4
Nitol_botnet:nitol botnet nitol botnet mostly involved spreading malware distributed denial-of-service attacks nitol botnet first discovered around december 2012 analysis botnet indicating botnet mostly prevalent china estimate 85 infections detected china botnet found present systems came brand-new factory indicating trojan installed somewhere assembly manufacturing process according microsoft systems risk also contained counterfeit installation microsoft windows 10 september 2012 microsoft took action nitol botnet obtaining court order subsequently sinkholing 3322.org domain 3322.org domain dynamic dns used botnet creators command control infrastructure controlling botnet microsoft later settled 3322.org operator pen yong allowed latter continue operating domain condition subdomains linked malware remain sinkholed
[ 3072, 10756, 3724, 6797, 3347, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 10297, 3643, 7739, 7996, 11583, 9664, 9154, 8133, 10952, 81, 8789, 7515, 988, 3807, 8032, 3941, 2409, 10477, 4462, 2041, 10875, 3581, 5886, 9087 ]
Test
10,458
2
CDC_SCOPE:cdc scope scope acronym supervisory control program execution name used control data corporation number operating system projects 1960s operating system based original chippewa operating system early 1970s renamed nos/be cdc cyber machines scope operating system file-oriented system using mass storage random access devices designed make use capabilities cdc 6000 computer systems exploits fully multiple-operating modes segments computer main tasks scope controlling job execution storage assignment performing segment overlay loading features include comprehensive input/output functions library maintenance routines dayfile chronologically records jobs run problems encountered aid debugging dumps memory maps available control scope variety assemblers compass compilers algol fortran cobol utility programs sort/merge pert/time export/import respond simscript apt optima etc may operated computer emulation community made repeated attempts recover preserve software running cdc cyber 6000 series emulator screenshot scope 3.1 building scope written programming team sunnyvale california 2,000 miles cdc hardware division considered buggy inefficient piece software though much different many operating systems era cdc arden hills minnesota laboratories referred scope sunnyvale collection programming errors competing operating system mace mansfield cahlander executive greg mansfield dave cahlander authors system started engineering test executive eventually developed complete operating system — modularized rewrite enhancement original chippewa operating system cos never official cdc product copy freely given customer asked one many customers especially advanced ones like university research sites control data decided write next operating system kronos considered current scope system unofficial mace alternative chose abandon scope system base kronos mace software eventually kronos replaced new network operating system nos though many smaller cdc customers continued use scope system rather kronos nos became primary control data operating system customers running mainly batch operations reluctant switch nos system saw benefit shop scope system maintained renamed nos/be batch environment primarily cdc marketing could say mainframe customers using nos operating system
[ 512, 6529, 2179, 996, 9991, 8136, 7983, 5584, 6675, 3960, 25, 11356 ]
Validation
10,459
1
Database_Workbench:database workbench database workbench software application development administration multiple relational databases using sql interoperationality different database systems developed upscene productions databases workbench supports multiple database systems provide software developers interface development environment otherwise different database systems also includes cross database tools database workbench started developer tool specifically interbase interbase workbench initially modeled sql navigator tool oracle database quest software early years interbase became open-source short soon firebird created fork interbase code base main developer database workbench martijn tonies closely involved early development firebird committee member firebird foundation database workbench continued support database systems initially separate firebird workbench release long program became interoperational different database systems initial support multiple database systems led renaming product current title database workbench 2003 also opened path inclusion support database systems support microsoft sql server mysql added 2003 2005 support oracle database nexusdb added sql anywhere support followed 2008 early 2010 full unicode version database workbench released version 5 database workbench released august 2014 free version limited functionality data workbench lite based data workbench 4 also available database workbench supports following relational databases oracle database microsoft sql server sql anywhere firebird nexusdb interbase mysql mariadb postgresql version 5 database workbench runs 32-bit 64 bit windows platforms linux freebsd mac os x database workbench operate using wine database workbench used view create edit tables indexes stored procedures database meta data objects also supports includes several productivity features
[ 11392, 8195, 6797, 9360, 10258, 5779, 11030, 2456, 3096, 5403, 7453, 1950, 9503, 7339, 9389, 10413, 7983, 9010, 823, 9661, 6721, 9286, 5964, 5198, 7506, 9687, 9177, 8539, 1632, 10340, 6245, 8295, 8683, 2413, 7022, 6383, 10737, 3188, 10873, ...
None
10,460
9
Nuprl:nuprl nuprl proof development system providing computer-mediated analysis proofs formal mathematical statements tools software verification optimization originally developed 1980s robert lee constable others system maintained prl project cornell university currently supported version nuprl 5 also known fdl formal digital library nuprl functions automated theorem proving system also used provide proof assistance nuprl uses type system based martin-löf intuitionistic type theory model mathematical statements digital library mathematical theories constructed analyzed variety editors including graphical user interface web-based editor emacs mode variety evaluators inference engines operate statements library translators also allow statements manipulated java ocaml programs overall system controlled variant ml nuprl 5 architecture described distributed open architecture intended primarily used web service rather standalone software interested using web service migrating theories older versions nuprl contact email address given nuprl system web page nuprl first released 1984 first described detail book implementing mathematics nuprl proof development system published 1986 nuprl 2 first unix version nuprl 3 provided machine proof mathematical problems related girard paradox higman lemma nuprl 4 first version developed world wide web used verify cache coherency protocols computer systems current system architecture implemented nuprl 5 first proposed 2000 conference paper reference manual nuprl 5 published 2002 nuprl subject many computer science publications recent 2014 jonprl redprl systems also based computational type theory redprl explicitly inspired nuprl
[ 5796, 10020, 5677, 6419, 119, 4791, 9816, 7386, 6239 ]
Test
10,461
5
Multicast_Listener_Discovery:multicast listener discovery multicast listener discovery mld component internet protocol version 6 ipv6 suite mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 protocol embedded icmpv6 instead using separate protocol mldv1 similar igmpv2 mldv2 similar igmpv3 protocol described rfc 3810 updated rfc 4604 several operating system support mldv2
[ 10242, 1411, 3847, 649, 9868, 3218, 5653, 9365, 10005, 11413, 5402, 4891, 5531, 3742, 10271, 10144, 8482, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 3133, 3006, 5181, 5437, 6724, 7364, 710, 2887, 8391, 8265, 2509, ...
Test
10,462
4
Naemon:naemon naemon open-source computer system monitoring network monitoring infrastructure monitoring software application naemon offers monitoring alerting services servers switches applications services alerts users things go wrong alerts second time problem resolved naemon created 2014 fork nagios available red hat centos suse debian ubuntu linux distribution naemon open source software licensed gnu gpl v2 provides
[ 9353, 5612, 7983, 1776, 3218, 6523, 9909, 1211, 4797 ]
None
10,463
9
Chez_Scheme:chez scheme chez scheme programming language dialect implementation language scheme type lisp uses incremental native-code compiler produce native binary files x86 ia-32 x86-64 powerpc sparc processor architectures supported r6rs standard since version 7.9.1 free open-source software released apache license version 2.0 first released 1985 r. kent dybvig originally licensed proprietary software released open-source software github version 9.4 petite chez scheme sibling implementation uses threaded interpreter design instead chez scheme incremental native-code compiler programs written chez scheme run unchanged petite chez scheme long depend using compiler example foreign function interface available compiler petite chez scheme freely distributable may used royalty fees subject license agreement one series benchmarks chez scheme among fastest available scheme implementations sun sparc processor architecture petite chez scheme among slowest implementations common x86 pentium 32-bit processor architecture chez scheme windowing system computer graphics package called scheme widget library supported portable slib library
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 9877, 5803, 2225, 7867, 4799, 7880, 8908, 2...
Test
10,464
2
William_John_Sullivan:william john sullivan william john sullivan commonly known john sullivan born december 6 1976 software freedom activist hacker writer john currently executive director free software foundation worked since early 2003 also speaker webmaster gnu project also maintains plannermode delicious-el packages gnu emacs text editor active free software free culture communities sullivan ba philosophy michigan state university mfa writing poetics college sullivan successful policy debater reaching finals ceda nationals semifinals national debate tournament 2007 john main contact behind defective design badvista play ogg campaigns also served chief-webmaster gnu project july 2006 served executive director free software foundation since 2011 john currently delivers speeches following topics english
[ 2050, 7938, 1028, 2180, 4230, 7812, 4360, 8326, 9865, 11654, 4493, 4367, 1939, 2195, 1813, 11155, 2332, 10012, 1694, 10780, 3744, 802, 3618, 2724, 4265, 4011, 11180, 9646, 6962, 5555, 823, 2233, 9148, 9660, 10687, 10817, 8258, 10822, 5703, ...
None
10,465
9
Interface_description_language:interface description language interface description language interface definition language idl specification language used describe software component application programming interface api idls describe interface language-independent way enabling communication software components share one language example written c++ written java idls commonly used remote procedure call software cases machines either end link may using different operating systems computer languages idls offer bridge two different systems software systems based idls include sun onc rpc open group distributed computing environment ibm system object model object management group corba implements omg idl idl based dce/rpc data distribution service mozilla xpcom microsoft microsoft rpc evolved com dcom facebook thrift wsdl web services
[ 8070, 8717, 11661, 8975, 6553, 9114, 7067, 6555, 7580, 11161, 5921, 8100, 10020, 5031, 1407, 7592, 10024, 11303, 428, 5677, 7983, 8000, 9665, 5188, 9926, 2120, 465, 2644, 5471, 9441, 7018, 3952, 5754, 3323, 9596, 3839 ]
Validation
10,466
4
Session_fixation:session fixation computer network security session fixation attacks attempt exploit vulnerability system allows one person fixate find set another person session identifier session fixation attacks web based rely session identifiers accepted urls query string post data alice account bank codice_1 mallory intends target alice money bank alice reasonable level trust mallory visit links mallory sends straightforward scenario misconception server accepts server-generated session identifiers safe fixation false scenario like cross-site cookie except rely browser vulnerabilities rather relies fact wildcard cookies set one subdomain affect subdomains scenario attack scenarios result mallory successfully gained access functions data normally reserved alice alternative attack scenario require alice log site rather simply fixing session mallory may able spy alice abuse data enters example mallory may use attacks give alice authenticated session—so alice start using site authentication mallory alice decides purchase something site enters credit card details mallory might able retrieve data confidential data looking historical data stored account type session fixation exploitation differs classic exploitation scenarios since happens unauthenticated part application reverses authentication attacker logging victim session identifiers url query string get variables post variables recommended simplify attack – easy make links forms set get post variables note cookies shared tabs popped browser windows system requires hit domain www.example.com/ code=site1 www.example.com/ code=site2 cookies may conflict one another tabs may required send session identifier url order overcome limitation possible use site1.example.com site2.example.com domain conflicts cookies may incur costs extra ssl certificates behavior seen many sites opening another tab trying side side search results one sessions become unusable attack largely avoided changing session id users log every request specific user requires user authenticated logged site attacker would need know id victim log-in session victim visits link fixed session id however need log account order anything important point session id change attacker able anything important anonymous session id similar technique used solve phishing problem user protects account two passwords solved great extent technique also useful cross-site request forgery attacks session identifier modern systems stored default http cookie moderate level security long session system disregards get/post values however solution vulnerable cross-site request forgery meet statelessness requirement rest enabling https security systems allow applications obtain ssl tls session identifier use ssl/tls session identifier secure many web development languages provide robust built-in functionality ssl/tls session identifiers may suitable critical applications large financial sites due size systems issue however rarely debated even security forums countermeasure session fixation generate new session identifier sid request done even though attacker may trick user accepting known sid sid invalid attacker attempts re-use sid implementation system simple demonstrated following example mallory successfully tricks alice visiting codice_24 http request sent codice_25 codice_25 accepts codice_27 would normally bad however codice_25 secure performs session regeneration codice_25 gets following response alice use codice_30 unknown mallory codice_27 invalid mallory thus unsuccessful session fixation attempt unfortunately session regeneration always possible problems known occur third-party software activex java applets used browser plugins communicate server third-party software could cause logouts session could split two separate sessions implementation sessions includes transmitting sid get post variables might also render back button browsers unusable user would using older invalid session identifier previous request one way improve security accept session identifiers generated server however noted prevent session fixation attacks isset _session 'server_generated_sid session_regenerate_id // generate new session identifier _session 'server_generated_sid true logout function useful allows users indicate session allow requests thus attacks effective session active note following code performs cross-site request forgery checks potentially allowing attacker force users log web application logout defense simple implement advantage providing measure protection unauthorized users accessing authorized user account using machine may left unattended store session variable containing time stamp last access made sid sid used compare current timestamp one stored session difference greater predefined number say 5 minutes destroy session otherwise update session variable current timestamp visiting page browsers set referrer – page contained link followed get page user logged site likely linked outside site e.g. banking websites webmail site kind site users would remain logged great length time referrer site referrer considered suspicious however originating request https page referrer stripped depend security system example codice_8 could employ following security check strpos _server 'http_referer 'http //vulnerable.example.com/ == 0 session_regenerate_id // generate new session identifier one way improve security ensure user appears end user client makes bit harder perform session fixation attacks networks begin conform rfc 3704 anti-spoofing practices ip address becomes reliable source identifier therefore security web site improved verifying source ip address consistent throughout session could performed manner _server 'remote_addr _session 'prev_remoteaddr session_regenerate_id // generate new session identifier _session 'prev_remoteaddr _server 'remote_addr however points consider employing approach sites added security outweighs lack convenience others browsers identify user-agent http headers header normally change use would extremely suspicious happen web application might make use user-agent detection attempt prevent malicious users stealing sessions however trivial bypass attacker easily capture victim user-agent site spoof attack proposed security system relying security obscurity _server 'http_user_agent _session 'prev_useragent session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent however points consider employing approach user agent may change legally cases following examples users defense depth combine several countermeasures idea simple one obstacle trivial overcome several obstacles could hard overcome defense depth strategy could involve http referrers passed ssl/tls https following php script demonstrates several countermeasures combined defense depth manner isset _get 'logout || session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent _session 'prev_remoteaddr _server 'remote_addr note code checks current remote_addr user ip address user-agent remote_addr user-agent previous request might inconvenient sites discussed
[ 450, 4163, 2470, 488, 6750, 7965, 10442, 3473, 10579, 87, 10232, 7324, 6269, 5470 ]
Validation
10,467
4
ITSEC:itsec information technology security evaluation criteria itsec structured set criteria evaluating computer security within products systems itsec first published may 1990 france germany netherlands united kingdom based existing work respective countries following extensive international review version 1.2 subsequently published june 1991 commission european communities operational use within evaluation certification schemes since launch itsec 1990 number european countries agreed recognize validity itsec evaluations itsec largely replaced common criteria provides similarly-defined evaluation levels implements target evaluation concept security target document product system evaluated called target evaluation subjected detailed examination security features culminating comprehensive informed functional penetration testing degree examination depends upon level confidence desired target provide different levels confidence itsec defines evaluation levels denoted e0 e6 higher evaluation levels involve extensive examination testing target unlike earlier criteria notably tcsec developed us defense establishment itsec require evaluated targets contain specific technical features order achieve particular assurance level example itsec target might provide authentication integrity features without providing confidentiality availability given target security features documented security target document whose contents evaluated approved target evaluated itsec evaluation based exclusively verifying security features identified security target formal z notation used prove security properties mondex smart card electronic cash system allowing achieve itsec level e6 highest granted security-level classification
[ 4067, 5636, 8904, 3594, 4988 ]
Validation
10,468
3
Socket_370:socket 370 socket 370 also known pga370 socket cpu socket first used intel pentium iii celeron processors first complement later replace older slot 1 cpu interface personal computers 370 refers number pin holes socket cpu pins socket 370 replaced socket 423 2000 socket 370 started budget oriented platform 66 mhz fsb ppga mendocino celeron cpus late 1998 move on-die l2 cache removed need pcb design seen slot 1 late 1999 late 2000 intel main desktop socket 100/133 mhz fsb coppermine pentium iiis 2001 tualatin pentium iii processors brought changes infrastructure required dedicated tualatin-compatible motherboards manufacturers would indicate blue instead white socket late sockets typically compatible coppermine processors older mendocino celerons motherboards used socket 370 support intel processors dual cpu configurations others allowed use socket 370 slot 1 cpu although time via-cyrix cyrix iii later renamed via c3 also used socket 370 weight socket 370 cpu cooler exceed 180 grams 6.3 ounces heavier coolers may result damage die system properly handled intel socket 370 processors pentium iii celeron following mechanical maximum load limits exceeded heat sink assembly shipping conditions standard use load limits crack processor die make unusable intel socket 370 processors integrated heat sink pentium iii celeron 1.13–1.4 ghz following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable
[ 3588, 5901, 5523, 4246, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 3883, 2604, 4523, 2350, 6192, 9649, 3892, 4537, 7744, 7105, 2500, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 613, 8552, 1260, 47...
Test
10,469
9
Program_optimization:program optimization computer science program optimization software optimization process modifying software system make aspect work efficiently use fewer resources general computer program may optimized executes rapidly make capable operating less memory storage resources draw less power although word optimization shares root optimal rare process optimization produce truly optimal system system generally made optimal absolute terms respect given quality metrics may contrast possible metrics result optimized system typically optimal one application one audience one might reduce amount time program takes perform task price making consume memory application memory space premium one might deliberately choose slower algorithm order use less memory often one size fits design works well cases engineers make trade-offs optimize attributes greatest interest additionally effort required make piece software completely optimal — incapable improvement — almost always reasonable benefits would accrued process optimization may halted completely optimal solution reached fortunately often case greatest improvements come early process optimization occur number levels typically higher levels greater impact harder change later project requiring significant changes complete rewrite need changed thus optimization typically proceed via refinement higher lower initial gains larger achieved less work later gains smaller requiring work however cases overall performance depends performance low-level portions program small changes late stage early consideration low-level details outsized impact typically consideration given efficiency throughout project – though varies significantly – major optimization often considered refinement done late ever longer-running projects typically cycles optimization improving one area reveals limitations another typically curtailed performance acceptable gains become small costly performance part specification program – program unusably slow fit purpose video game 60 hz frames-per-second acceptable 6 frames-per-second unacceptably choppy – performance consideration start ensure system able deliver sufficient performance early prototypes need roughly acceptable performance confidence final system optimization achieve acceptable performance sometimes omitted belief optimization always done later resulting prototype systems far slow – often order magnitude – systems ultimately failures architecturally achieve performance goals intel 432 1981 ones take years work achieve acceptable performance java 1995 achieved acceptable performance hotspot 1999 degree performance changes prototype production system amenable optimization significant source uncertainty risk highest level design may optimized make best use available resources given goals constraints expected use/load architectural design system overwhelmingly affects performance example system network latency-bound network latency main constraint overall performance would optimized minimize network trips ideally making single request requests push protocol rather multiple roundtrips choice design depends goals designing compiler fast compilation key priority one-pass compiler faster multi-pass compiler assuming work speed output code goal slower multi-pass compiler fulfills goal better even though takes longer choice platform programming language occur level changing frequently requires complete rewrite though modular system may allow rewrite component – example python program may rewrite performance-critical sections c. distributed system choice architecture client-server peer-to-peer etc occurs design level may difficult change particularly components replaced sync e.g. old clients given overall design good choice efficient algorithms data structures efficient implementation algorithms data structures comes next design choice algorithms data structures affects efficiency aspect program generally data structures difficult change algorithms data structure assumption performance assumptions used throughout program though minimized use abstract data types function definitions keeping concrete data structure definitions restricted places algorithms primarily consists ensuring algorithms constant 1 logarithmic log n linear n cases log-linear n log n input space time algorithms quadratic complexity n fail scale even linear algorithms cause problems repeatedly called typically replaced constant logarithmic possible beyond asymptotic order growth constant factors matter asymptotically slower algorithm may faster smaller simpler asymptotically faster algorithm faced small input may case occurs reality often hybrid algorithm provide best performance due tradeoff changing size general technique improve performance avoid work good example use fast path common cases improving performance avoiding unnecessary work example using simple text layout algorithm latin text switching complex layout algorithm complex scripts devanagari another important technique caching particularly memoization avoids redundant computations importance caching often many levels caching system cause problems memory use correctness issues stale caches beyond general algorithms implementation abstract machine concrete source code level choices make significant difference example early c compilers codice_1 slower codice_2 unconditional loop codice_1 evaluated 1 conditional jump tested true codice_4 unconditional jump optimizations one nowadays performed optimizing compilers depends source language target machine language compiler difficult understand predict changes time key place understanding compilers machine code improve performance loop-invariant code motion return value optimization examples optimizations reduce need auxiliary variables even result faster performance avoiding round-about optimizations source compile level directives build flags used tune performance options source code compiler respectively using preprocessor defines disable unneeded software features optimizing specific processor models hardware capabilities predicting branching instance source-based software distribution systems bsd ports gentoo portage take advantage form optimization use optimizing compiler tends ensure executable program optimized least much compiler predict lowest level writing code using assembly language designed particular hardware platform produce efficient compact code programmer takes advantage full repertoire machine instructions many operating systems used embedded systems traditionally written assembler code reason programs small programs seldom written start finish assembly due time cost involved compiled high level language assembly hand optimized efficiency size less important large parts may written high-level language modern optimizing compilers greater complexity recent cpus harder write efficient code compiler generates projects need ultimate optimization step much code written today intended run many machines possible consequence programmers compilers n't always take advantage efficient instructions provided newer cpus quirks older models additionally assembly code tuned particular processor without using instructions might still suboptimal different processor expecting different tuning code typically today rather writing assembly language programmers use disassembler analyze output compiler change high-level source code compiled efficiently understand inefficient just-in-time compilers produce customized machine code based run-time data cost compilation overhead technique dates earliest regular expression engines become widespread java hotspot v8 javascript cases adaptive optimization may able perform run time optimization exceeding capability static compilers dynamically adjusting parameters according actual input factors profile-guided optimization ahead-of-time aot compilation optimization technique based run time profiles similar static average case analog dynamic technique adaptive optimization self-modifying code alter response run time conditions order optimize code common assembly language programs cpu designs perform optimizations run time examples include out-of-order execution speculative execution instruction pipelines branch predictors compilers help program take advantage cpu features example instruction scheduling code optimization also broadly categorized platform-dependent platform-independent techniques latter ones effective platforms platform-dependent techniques use specific properties one platform rely parameters depending single platform even single processor writing producing different versions code different processors might therefore needed instance case compile-level optimization platform-independent techniques generic techniques loop unrolling reduction function calls memory efficient routines reduction conditions etc impact cpu architectures similar way great example platform-independent optimization shown inner loop observed loop inner loop performs computations per unit time loop without one inner loop generally serve reduce total instruction path length required complete program and/or reduce total memory usage process hand platform-dependent techniques involve instruction scheduling instruction-level parallelism data-level parallelism cache optimization techniques i.e. parameters differ among various platforms optimal instruction scheduling might different even different processors architecture computational tasks performed several different ways varying efficiency efficient version equivalent functionality known strength reduction example consider following c code snippet whose intention obtain sum integers 1 n code assuming arithmetic overflow rewritten using mathematical formula like optimization sometimes performed automatically optimizing compiler select method algorithm computationally efficient retaining functionality see algorithmic efficiency discussion techniques however significant improvement performance often achieved removing extraneous functionality optimization always obvious intuitive process example optimized version might actually slower original version n sufficiently small particular hardware happens much faster performing addition looping operations multiplication division cases however optimization relies using elaborate algorithms making use special cases special tricks performing complex trade-offs fully optimized program might difficult comprehend hence may contain faults unoptimized versions beyond eliminating obvious antipatterns code level optimizations decrease maintainability optimization generally focus improving one two aspects performance execution time memory usage disk space bandwidth power consumption resource usually require trade-off — one factor optimized expense others example increasing size cache improves run time performance also increases memory consumption common trade-offs include code clarity conciseness instances programmer performing optimization must decide make software better operations cost making operations less efficient trade-offs may sometimes non-technical nature — competitor published benchmark result must beaten order improve commercial success comes perhaps burden making normal usage software less efficient changes sometimes jokingly referred pessimizations optimization may include finding bottleneck system – component limiting factor performance terms code often hot spot – critical part code primary consumer needed resource – though another factor i/o latency network bandwidth computer science resource consumption often follows form power law distribution pareto principle applied resource optimization observing 80 resources typically used 20 operations software engineering often better approximation 90 execution time computer program spent executing 10 code known 90/10 law context complex algorithms data structures perform well many items simple algorithms suitable small amounts data — setup initialization time constant factors complex algorithm outweigh benefit thus hybrid algorithm adaptive algorithm may faster single algorithm performance profiler used narrow decisions functionality fits conditions cases adding memory help make program run faster example filtering program commonly read line filter output line immediately uses enough memory one line performance typically poor due latency disk read caching result similarly effective though also requiring larger memory use optimization reduce readability add code used improve performance may complicate programs systems making harder maintain debug result optimization performance tuning often performed end development stage donald knuth made following two statements optimization forget small efficiencies say 97 time premature optimization root evil yet pass opportunities critical 3 premature optimization phrase used describe situation programmer lets performance considerations affect design piece code result design clean could code incorrect code complicated optimization programmer distracted optimizing deciding whether optimize specific part program amdahl law always considered impact overall program depends much much time actually spent specific part always clear looking code without performance analysis better approach therefore design first code design profile/benchmark resulting code see parts optimized simple elegant design often easier optimize stage profiling may reveal unexpected performance problems would addressed premature optimization practice often necessary keep performance goals mind first designing software programmer balances goals design optimization modern compilers operating systems efficient intended performance increases often fail materialize example caching data application level cached operating system level yield improvements execution even rare case programmer remove failed optimizations production code also true advances hardware often obviate potential improvements yet obscuring code persist future long purpose negated optimization code development using macros takes different forms different languages procedural languages c c++ macros implemented using token substitution nowadays inline functions used type safe alternative many cases cases inlined function body undergo compile-time optimizations compiler including constant folding may move computations compile time many functional programming languages macros implemented using parse-time substitution parse trees/abstract syntax trees claimed makes safer use since many cases interpretation used one way ensure computations performed parse-time sometimes way lisp originated style macro macros often called lisp-like macros similar effect achieved using template metaprogramming c++ cases work moved compile-time difference c macros one side lisp-like macros c++ template metaprogramming side latter tools allow performing arbitrary computations compile-time/parse-time expansion c macros perform computation relies optimizer ability perform additionally c macros directly support recursion iteration turing complete optimization however often difficult predict tools impact project complete see also optimization automated compilers performed programmers gains usually limited local optimization larger global optimizations usually powerful optimization find superior algorithm optimizing whole system usually undertaken programmers complex automated optimizers situation programmers system administrators explicitly change code overall system performs better although produce better efficiency far expensive automated optimizations since many parameters influence program performance program optimization space large meta-heuristics machine learning used address complexity program optimization use profiler performance analyzer find sections program taking resources — bottleneck programmers sometimes believe clear idea bottleneck intuition frequently wrong optimizing unimportant piece code typically little help overall performance bottleneck localized optimization usually starts rethinking algorithm used program often particular algorithm specifically tailored particular problem yielding better performance generic algorithm example task sorting huge list items usually done quicksort routine one efficient generic algorithms characteristic items exploitable example already arranged particular order different method used even custom-made sort routine programmer reasonably sure best algorithm selected code optimization start loops unrolled lower loop overhead although often lead lower speed overloads cpu cache data types small possible used integer arithmetic used instead floating-point see algorithmic efficiency article techniques performance bottlenecks due language limitations rather algorithms data structures used program sometimes critical part program re-written different programming language gives direct access underlying machine example common high-level languages like python modules written c greater speed programs already written c modules written assembly programs written use inline assembler rewriting sections pays circumstances general rule thumb known 90/10 law states 90 time spent 10 code 10 time remaining 90 code putting intellectual effort optimizing small part program huge effect overall speed — correct part located manual optimization sometimes side effect undermining readability thus code optimizations carefully documented preferably using in-line comments effect future development evaluated program performs automated optimization called optimizer optimizers embedded compilers operate compilation optimizers often tailor generated code specific processors today automated optimizations almost exclusively limited compiler optimization however compiler optimizations usually limited fixed set rather general optimizations considerable demand optimizers accept descriptions problem language-specific optimizations allowing engineer specify custom optimizations tools accept descriptions optimizations called program transformation systems beginning applied real software systems c++ high-level languages eiffel esterel optimize programs using intermediate language grid computing distributed computing aims optimize whole system moving tasks computers high usage computers idle time sometimes time taken undertake optimization therein may issue optimizing existing code usually add new features worse might add new bugs previously working code change might manually optimized code might sometimes less readability unoptimized code optimization might impact maintainability well optimization comes price important sure investment worthwhile automatic optimizer optimizing compiler program performs code optimization may optimized either improve efficiency target programs else speed operation compilation performed optimization turned usually takes longer although usually problem programs quite large particular just-in-time compilers performance run time compile component executing together target code key improving overall execution speed
[ 5896, 1801, 6926, 788, 9112, 1952, 8609, 2339, 4775, 3624, 8231, 7983, 9141, 8502, 5948, 2620, 6718, 2623, 8640, 9151, 4930, 9788, 5956, 8262, 7627, 10703, 10584, 477, 2666, 2283, 8554, 2798, 8815, 10734, 9330, 4980, 11003, 2045, 5503 ]
None
10,470
2
Objective-C:objective-c objective-c general-purpose object-oriented programming language adds smalltalk-style messaging c programming language main programming language supported apple macos ios ipados operating systems respective application programming interfaces apis cocoa cocoa touch introduction swift programming language objective-c originally developed early 1980s selected main language used next nextstep operating system macos ios derived portable objective-c programs use cocoa cocoa touch libraries using parts may ported reimplemented systems also compiled system supported gnu compiler collection gcc clang objective-c source code 'implementation program files usually filename extensions objective-c 'header/interface files extensions c header files objective-c++ files denoted file extension objective-c created primarily brad cox tom love early 1980s company stepstone introduced smalltalk itt corporation programming technology center 1981 earliest work objective-c traces back around time cox intrigued problems true reusability software design programming realized language like smalltalk would invaluable building development environments system developers itt however tom love also recognized backward compatibility c critically important itt telecom engineering milieu cox began writing pre-processor c add abilities smalltalk soon working implementation object-oriented extension c language called oopc object-oriented pre-compiler love hired schlumberger research 1982 opportunity acquire first commercial copy smalltalk-80 influenced development brainchild order demonstrate real progress could made cox showed making interchangeable software components really needed practical changes existing tools specifically needed support objects flexible manner come supplied usable set libraries allow code resources needed code bundled one cross-platform format love cox eventually formed new venture productivity products international ppi commercialize product coupled objective-c compiler class libraries 1986 cox published main description objective-c original form book object-oriented programming evolutionary approach although careful point problem reusability language objective-c often found compared feature feature languages 1988 next licensed objective-c stepstone new name ppi owner objective-c trademark extended gcc compiler support objective-c. next developed appkit foundation kit libraries nextstep user interface interface builder based next workstations failed make great impact marketplace tools widely lauded industry led next drop hardware production focus software tools selling nextstep openstep platform custom programming order circumvent terms gpl next originally intended ship objective-c frontend separately allowing user link gcc produce compiler executable initially accepted richard m. stallman plan rejected stallman consulted gnu lawyers next agreed make objective-c part gcc work extend gcc led steve naroff joined next stepstone compiler changes made available per gpl license terms runtime libraries rendering open source contribution unusable general public led parties developing runtime libraries open source license later steve naroff also principal contributor work apple build objective-c frontend clang gnu project started work free software implementation cocoa named gnustep based openstep standard dennis glatting wrote first gnu objective-c runtime 1992 gnu objective-c runtime use since 1993 one developed kresten krab thorup university student denmark thorup also worked next 1993 1996 acquiring next 1996 apple computer used openstep then-new operating system mac os x included objective-c next objective-c-based developer tool project builder interface design tool interface builder merged one application xcode apple current cocoa api based openstep interface objects significant objective-c environment used active development wwdc 2014 apple introduced new language swift characterized objective-c without c objective-c thin layer atop c strict superset c meaning possible compile c program objective-c compiler freely include c language code within objective-c class objective-c derives object syntax smalltalk syntax non-object-oriented operations including primitive variables pre-processing expressions function declarations function calls identical c syntax object-oriented features implementation smalltalk-style messaging objective-c model object-oriented programming based message passing object instances objective-c one call method one sends message unlike simula-style programming model used c++ difference two concepts code referenced method message name executed simula-style language method name cases bound section code target class compiler smalltalk objective-c target message resolved runtime receiving object interpreting message method identified selector — unique identifier message name often -terminated string representing name — resolved c method pointer implementing consequence message-passing system type checking object message directed — receiver — guaranteed respond message raises exception sending message object pointed pointer would require following code c++ obj- method argument objective-c written follows obj method argument styles programming strengths weaknesses object-oriented programming simula c++ style allows multiple inheritance faster execution using compile-time binding whenever possible support dynamic binding default also forces methods corresponding implementation unless abstract smalltalk-style programming used objective-c allows messages go unimplemented method resolved implementation runtime example message may sent collection objects expected respond without fear producing runtime errors message passing also require object defined compile time implementation still required method called derived object see dynamic typing section advantages dynamic late binding objective-c requires interface implementation class separately declared code blocks convention developers place interface header file implementation code file header files normally suffixed .h similar c header files implementation method files normally suffixed .m similar c code files called class declaration interface class usually defined header file common convention name header file name class e.g would contain interface class interface declaration takes form interface classname superclassname classmethod1 return_type classmethod2 return_type classmethod3 param1_type param1_varname return_type instancemethod1with1parameter param1_type param1_varname return_type instancemethod2with2parameters param1_type param1_varname param2_callname param2_type param2_varname end plus signs denote class methods methods called class instance minus signs denote instance methods called particular instance class class methods also access instance variables code roughly equivalent following c++ interface class classname public superclassname note demonstrates interleaving selector segments argument expressions direct equivalent c/c++ return types standard c type pointer generic objective-c object pointer specific type object nsarray nsimage nsstring pointer class method belongs instancetype default return type generic objective-c type method arguments begin name labeling argument part method name followed colon followed expected argument type parentheses argument name label omitted void setrangestart int start end int end void importdocumentwithname nsstring name withspecifiedpreferences preferences prefs beforepage int insertpage interface declares class interface methods actual code written implementation file implementation method files normally file extension codice_1 originally signified messages implementation classname return_type classmethod return_type instancemethod end methods written using interface declarations comparing objective-c c int method int int function int syntax allows pseudo-naming arguments void changetored float red green float green blue float blue //called like mycolor changecolortored:5.0 green:2.0 blue:6.0 internal representations method vary different implementations objective-c mycolor class instance method might internally labeled refer instance method class method names appended colons changed underscores order parameters part method name changed suit coding style expression true named parameters however internal names function rarely used directly generally messages converted function calls defined objective-c runtime library necessarily known link time method called class receiver object sent message need known runtime objective-c class written instantiated done first allocating uninitialized instance class object initializing object fully functional steps completed steps accomplished one line code never allocated object n't undergone initialization unwise keep intermediate result since codice_2 return different object called instantiation default no-parameter initializer myobject *foo end interface integer display id showstars id showint end implementation integer display id showstars id showint end int main void compilation performed example one experiment leaving lines omitting compilation program still run means possible mix-and-match added categories needed category need ability simply compile objective-c permits class wholly replace another class within program replacing class said pose target class class posing declared deprecated mac os x v10.5 unavailable 64-bit runtime similar functionality achieved using method swizzling categories swaps one method implementation another signature versions still supporting posing messages sent target class instead received posing class several restrictions posing similarly categories allows global augmentation existing classes posing permits two features absent categories example interface customnsapplication nsapplication end implementation customnsapplication void setmainmenu nsmenu* menu end class_poseas customnsapplication class nsapplication class intercepts every invocation setmainmenu nsapplication c language codice_3 pre-compile directive always causes file contents inserted source point objective-c codice_4 directive equivalent except file included per compilation unit obviating need include guards objective-c features often allow flexible often easy solutions programming issues objective-c++ language variant accepted front-end gnu compiler collection clang compile source files use combination c++ objective-c syntax objective-c++ adds c++ extensions objective-c adds c. nothing done unify semantics behind various language features certain restrictions apply 2006 worldwide developers conference apple announced release objective-c 2.0 revision objective-c language include modern garbage collection syntax enhancements runtime performance improvements 64-bit support mac os x v10.5 released october 2007 included objective-c 2.0 compiler gcc 4.6 supports many new objective-c features declared synthesized properties dot syntax fast enumeration optional protocol methods method/protocol/class attributes class extensions new gnu objective-c runtime api objective-c 2.0 provided optional conservative generational garbage collector run backwards-compatible mode runtime turned reference counting operations retain release no-ops objects subject garbage collection garbage collection enabled regular c pointers could qualified __strong also trigger underlying write-barrier compiler intercepts thus participate garbage collection zero-ing weak subsystem also provided pointers marked __weak set zero object simply gc memory collected garbage collector exist ios implementation objective-c 2.0 garbage collection objective-c runs low-priority background thread halt user events intention keeping user experience responsive garbage collection deprecated mac os x v10.8 favor automatic reference counting arc objective-c ios 7 running arm64 uses 19 bits 64-bit word store reference count form tagged pointers objective-c 2.0 introduces new syntax declare instance variables properties optional attributes configure generation accessor methods properties sense public instance variables declaring instance variable property provides external classes access possibly limited e.g read property property may declared readonly may provided storage semantics codice_5 codice_6 codice_7 default properties considered codice_8 results lock preventing multiple threads accessing time property declared codice_9 removes lock interface person nsobject property copy nsstring *name property readonly int age id initwithage int age end properties implemented way codice_10 keyword generates getter setter read-only methods according property declaration alternatively getter setter methods must implemented explicitly codice_11 keyword used indicate accessor methods provided means compiled using clang 3.1 higher properties explicitly declared codice_11 marked codice_13 complete user-implemented getter setter automatically implicitly codice_10 'd implementation person synthesize name id initwithage int initage int age end properties accessed using traditional message passing syntax dot notation key-value coding name via valueforkey setvalue forkey methods person *aperson person alloc initwithage 53 aperson.name steve // note dot notation uses synthesized setter nslog access message dot notation property name direct instance variable access order use dot notation invoke property accessors within instance method self keyword used void introducemyselfwithproperties bool usegetter // note getter vs. ivar access class protocol properties may dynamically type introspection|introspected int int propertycount 0 objc_property_t *propertylist class_copypropertylist aperson class propertycount 0 propertycount i++ objective-c 2.0 provides non-fragile instance variables supported runtime i.e building code 64-bit macos ios modern runtime extra layer indirection added instance variable access allowing dynamic linker adjust instance layout runtime feature allows two important improvements objective-c code instead using nsenumerator object indices iterate collection objective-c 2.0 offers fast enumeration syntax objective-c 2.0 following loops functionally equivalent different performance traits // using nsenumerator nsenumerator *enumerator thepeople objectenumerator person *p p enumerator nextobject nil // using indexes int 0 thepeople count i++ // using fast enumeration person *p thepeople fast enumeration generates efficient code standard enumeration method calls enumerate objects replaced pointer arithmetic using nsfastenumeration protocol class extension syntax category declaration category name methods properties declared added directly main class mostly used alternative category add methods class without advertising public headers advantage class extensions compiler checks privately declared methods actually implemented objective-c applications developed macos make use improvements objective-c 2.0 incompatible operating systems prior 10.5 leopard since fast enumeration generate exactly binaries standard enumeration use cause application crash mac os x version 10.4 earlier blocks nonstandard extension objective-c c programming language |c c++ uses special syntax create closure programming |closures blocks supported mac os x snow leopard|mac os x 10.6 snow leopard later ios 4 later gnustep libobjc2 1.7 compiling clang 3.1 later typedef int ^intblock intblock makecounter int start int increment int main void /* output automatic reference counting arc compile-time feature eliminates need programmers manually manage retain counts using codice_7 codice_16 unlike garbage collection computer science |garbage collection occurs run time arc eliminates overhead separate process managing retain counts arc manual memory management mutually exclusive programmers continue use non-arc code arc-enabled projects disabling arc individual code files xcode also attempt automatically upgrade project arc next apple obj-c runtimes long included short-form way create new strings using literal syntax codice_17 drop corefoundation constants codice_18 codice_19 codice_20 boolean values using format saves programmer use longer codice_21 similar methods certain operations using apple llvm compiler 4.0 later arrays dictionaries numbers codice_22 codice_23 codice_20 classes also created using literal syntax instead methods example without literals nsarray *myarray nsarray arraywithobjects object1 object2 object3 nil nsdictionary *mydictionary1 nsdictionary dictionarywithobject someobject forkey key nsdictionary *mydictionary2 nsdictionary dictionarywithobjectsandkeys object1 key1 object2 key2 nil nsnumber *mynumber nsnumber numberwithint myint nsnumber *mysumnumber= nsnumber numberwithint 2 3 nsnumber *myboolnumber nsnumber numberwithbool yes example literals nsarray *myarray object1 object2 object3 nsdictionary *mydictionary1 key someobject nsdictionary *mydictionary2 key1 object1 key2 object2 nsnumber *mynumber myint nsnumber *mysumnumber 2+3 nsnumber *myboolnumber yes nsnumber *myintegernumber 8 however different string literal compile constants executable literals compile code equivalent method calls particular manually reference-counted memory management objects autoreleased requires added care e.g. used function-static variables kinds globals using apple llvm compiler 4.0 later arrays dictionaries codice_22 codice_23 classes manipulated using subscripting subscripting used retrieve values indexes array keys dictionary mutable objects also used set objects indexes keys code subscripting represented using brackets codice_27 example without subscripting id object1 somearray objectatindex:0 id object2 somedictionary objectforkey key somemutablearray replaceobjectatindex:0 withobject object3 somemutabledictionary setobject object4 forkey key example subscripting id object1 somearray 0 id object2 somedictionary key somemutablearray 0 object3 somemutabledictionary key object4 purchase next apple attempts made make language acceptable programmers familiar java programming language |java smalltalk one attempts introducing dubbed modern syntax objective-c time opposed current classic syntax change behaviour merely alternative syntax instead writing method invocation like instead written similarly declarations went form modern syntax longer supported current dialects objective-c language besides gnu compiler collection|gcc next apple inc.|apple implementation added several extensions original stepstone implementation another free open source software|free open-source objective-c implementation called portable object compiler also exists set extensions implemented portable object compiler differs gcc/next/apple implementation particular includes smalltalk -like blocks objective-c lacks protocols categories two features used extensively openstep derivatives relatives overall poc represents older pre-next stage language evolution roughly conformant brad cox 1991 book also includes runtime library called objectpak based cox original icpak101 library turn derives smalltalk-80 class library quite radically different openstep foundationkit geos 16-bit operating system |pc geos system used programming language known geos objective-c goc despite name similarity two languages similar overall concept use keywords prefixed sign clang compiler suite part llvm project implements objective-c languages winobjc also known bridge open-source objc compiler project started microsoft github way allow reuse ios application code inside windows universal applications windows objective-c development tools provided download gnustep website gnustep development system consists following packages gnustep msys system gnustep core gnustep devel gnustep cairo projectcenter ide like xcode complex gorm interface builder like xcode nib builder objective-c today often used tandem fixed library standard objects often known kit framework cocoa api |cocoa gnustep objfw libraries often come operating system gnustep libraries often come linux -based distributions cocoa comes macos programmer forced inherit functionality existing base class nsobject ofobject objective-c allows declaration new root classes inherit existing functionality originally objective-c-based programming environments typically offered object class base class almost classes inherited introduction openstep next created new base class named nsobject offered additional features object emphasis using object references reference counting instead raw pointers example almost classes cocoa inherit nsobject renaming serve differentiate new default behavior classes within openstep api allowed code used object—the original base class used nextstep less objective-c class libraries —to co-exist runtime code used nsobject limitations introduction two letter prefix also became simplistic form namespaces objective-c lacks using prefix create informal packaging identifier became informal coding standard objective-c community continues day recently package managers started appearing cocoapods aims package manager repository packages lot open-source objective-c code written last years installed using cocoapods objective-c implementations use thin run time system|runtime system written c adds little size application contrast object-oriented systems time created used large virtual machine runtimes programs written objective-c tend much larger size code libraries generally need included software distribution contrast smalltalk systems large amount memory used open window objective-c applications tend larger similar c c++ applications objective-c dynamic typing allow methods stripped inlined since programmer freedom delegate forward calls build selectors fly pass runtime system objective-c compiler assume safe remove unused methods inline calls likewise language implemented atop extant c compilers gnu compiler collection|gcc first preprocessor module rather new compiler allows objective-c leverage huge existing collection c code libraries tools etc existing c libraries wrapped objective-c adapter pattern|wrappers provide oo-style interface aspect similar gobject library vala programming language |vala language widely used development gtk applications practical changes lowered barriers entry|barrier entry likely biggest problem widespread acceptance smalltalk 1980s common criticism objective-c language support namespaces instead programmers forced add prefixes class names traditionally shorter namespace names thus prone collisions 2007 macos classes functions cocoa software |cocoa programming environment prefixed ns e.g nsobject nsbutton identify belonging macos ios core ns derives names classes defined development nextstep since objective-c strict superset c treat c primitive types first-class object s. unlike c++ objective-c support operator overloading also unlike c++ objective-c allows object directly inherit one class forbidding multiple inheritance however cases categories protocols may used alternative ways achieve results objective-c uses dynamic runtime typing method calls function calls cases syscalls many common performance optimizations applied objective-c methods example inlining constant propagation interprocedural optimizations scalar replacement aggregates limits performance objective-c abstractions relative similar abstractions languages c++ optimizations possible first versions objective-c support garbage collection computer science |garbage collection time decision matter debate many people considered long dead times smalltalk performed collection render entire system unusable 3rd party implementations added feature notably gnustep apple implemented mac os x v10.5 however recent versions macos ios garbage collection deprecated favor automatic reference counting arc introduced 2011 arc compiler inserts retain release calls automatically objective-c code based static program analysis|static code analysis automation relieves programmer write memory management code arc also adds weak references objective-c language design implementation c++ objective-c represent fundamentally different approaches extending c. addition c style procedural programming c++ directly supports certain forms object-oriented programming generic programming metaprogramming c++ also comes c++ standard library|a large standard library includes sequence container c++ |several container classes similarly objective-c adds polymorphism object-oriented programming|object-oriented programming dynamic typing reflection computer science |reflection c. objective-c provide standard library per se places objective-c used used openstep -like library openstep cocoa api |cocoa gnustep provides functionality similar c++ standard library one notable difference objective-c provides runtime support reflection computer science |reflective features whereas c++ adds small amount runtime support c. objective-c object queried properties e.g. whether respond certain message c++ possible without use external libraries use reflection part wider distinction dynamic run-time features static compile-time features language although objective-c c++ employ mix features objective-c decidedly geared toward run-time decisions c++ geared toward compile-time decisions tension dynamic static programming involves many classic trade-offs programming dynamic features add flexibility static features add speed type checking generic programming metaprogramming implemented languages using runtime polymorphism c++ takes form virtual function runtime type identification objective-c offers dynamic typing reflection objective-c lacks compile-time polymorphism generic function entirely c++ supports via function overloading template c++ |templates category c programming language family category class-based programming languages category dynamically typed programming languages category gnustep category next category object-oriented programming languages category objective-c category programming languages created 1986
[ 10755, 8201, 4112, 2585, 541, 3613, 5663, 9245, 10783, 5154, 3107, 2603, 2605, 5165, 5677, 5684, 1591, 9783, 9784, 6718, 8771, 8262, 4173, 9295, 6228, 4182, 10841, 4190, 2658, 5219, 1130, 3691, 7274, 9323, 5743, 8303, 2673, 8304, 9848, 37...
None
10,471
1
Database_model:database model database model type data model determines logical structure database fundamentally determines manner data stored organized manipulated popular example database model relational model uses table-based format common logical data models databases include object-relational database combines two related structures physical data models include models include given database management system may provide one models optimal structure depends natural organization application data application requirements include transaction rate speed reliability maintainability scalability cost database management systems built around one particular data model although possible products offer support one model various physical data models implement given logical model database software offer user level control tuning physical implementation since choices made significant effect performance model way structuring data also defines set operations performed data relational model example defines operations select project join although operations may explicit particular query language provide foundation query language built flat table model consists single two-dimensional array data elements members given column assumed similar values members row assumed related one another instance columns name password might used part system security database row would specific password associated individual user columns table often type associated defining character data date time information integers floating point numbers tabular format precursor relational model models popular 1960s 1970s nowadays found primarily old legacy systems characterized primarily navigational strong connections logical physical representations deficiencies data independence hierarchical model data organized tree-like structure implying single parent record sort field keeps sibling records particular order hierarchical structures widely used early mainframe database management systems information management system ims ibm describe structure xml documents structure allows one one-to-many relationship two types data structure efficient describe many relationships real world recipes table contents ordering paragraphs/verses nested sorted information hierarchy used physical order records storage record access done navigating downward data structure using pointers combined sequential accessing hierarchical structure inefficient certain database operations full path opposed upward link sort field also included record limitations compensated later ims versions additional logical hierarchies imposed base physical hierarchy network model expands upon hierarchical structure allowing many-to-many relationships tree-like structure allows multiple parents popular replaced relational model defined codasyl specification network model organizes data using two fundamental concepts called records sets records contain fields may organized hierarchically programming language cobol sets confused mathematical sets define one-to-many relationships records one owner many members record may owner number sets member number sets set consists circular linked lists one record type set owner parent appears circle second record type subordinate child may appear multiple times circle way hierarchy may established two record types e.g. type owner b time another set may defined b owner thus sets comprise general directed graph ownership defines direction network construct access records either sequential usually record type navigation circular linked lists network model able represent redundancy data efficiently hierarchical model one path ancestor node descendant operations network model navigational style program maintains current position navigates one record another following relationships record participates records also located supplying key values although essential feature model network databases generally implement set relationships means pointers directly address location record disk gives excellent retrieval performance expense operations database loading reorganization popular dbms products utilized cincom systems total cullinet idms idms gained considerable customer base 1980s adopted relational model sql addition original tools languages object databases invented 1990s use navigational concept provide fast navigation across networks objects generally using object identifiers smart pointers related objects objectivity/db instance implements named one-to-one one-to-many many-to-one many-to-many named relationships cross databases many object databases also support sql combining strengths models inverted file inverted index contents data used keys lookup table values table pointers location instance given content item also logical structure contemporary database indexes might use contents particular columns lookup table inverted file data model put indexes set files next existing flat database files order efficiently directly access needed records files notable using data model adabas dbms software ag introduced 1970 adabas gained considerable customer base exists supported today 1980s adopted relational model sql addition original tools languages document-oriented database clusterpoint uses inverted indexing model provide fast full-text search xml json data objects example relational model introduced e.f. codd 1970 way make database management systems independent particular application mathematical model defined terms predicate logic set theory implementations used mainframe midrange microcomputer systems products generally referred relational databases fact implement model approximation mathematical model defined codd three key terms used extensively relational database models relations attributes domains relation table columns rows named columns relation called attributes domain set values attributes allowed take basic data structure relational model table information particular entity say employee represented rows also called tuples columns thus relation relational database refers various tables database relation set tuples columns enumerate various attributes entity employee name address phone number example row actual instance entity specific employee represented relation result tuple employee table represents various attributes single employee relations thus tables relational database adhere basic rules qualify relations first ordering columns immaterial table second ca n't identical tuples rows table third tuple contain single value attributes relational database contains multiple tables similar one flat database model one strengths relational model principle value occurring two different records belonging table different tables implies relationship among two records yet order enforce explicit integrity constraints relationships records tables also defined explicitly identifying non-identifying parent-child relationships characterized assigning cardinality 1:1 0 1 tables also designated single attribute set attributes act key used uniquely identify tuple table key used uniquely identify row table called primary key keys commonly used join combine data two tables example employee table may contain column named location contains value matches key location table keys also critical creation indexes facilitate fast retrieval data large tables column key multiple columns grouped together compound key necessary define keys advance column used key even originally intended one key external real-world meaning person name book isbn car serial number sometimes called natural key natural key suitable think many people named brown arbitrary surrogate key assigned giving employees id numbers practice databases generated natural keys generated keys used internally create links rows break natural keys used less reliably searches integration databases example records two independently developed databases could matched social security number except social security numbers incorrect missing changed common query language used relational model structured query language sql dimensional model specialized adaptation relational model used represent data data warehouses way data easily summarized using online analytical processing olap queries dimensional model database schema consists single large table facts described using dimensions measures dimension provides context fact participated happened type used queries group related facts together dimensions tend discrete often hierarchical example location might include building state country measure quantity describing fact revenue important measures meaningfully aggregated—for example revenue different locations added together olap query dimensions chosen facts grouped aggregated together create summary dimensional model often implemented top relational model using star schema consisting one highly normalized table containing facts surrounding denormalized tables containing dimension alternative physical implementation called snowflake schema normalizes multi-level hierarchies within dimension multiple tables data warehouse contain multiple dimensional schemas share dimension tables allowing used together coming standard set dimensions important part dimensional modeling high performance made dimensional model popular database structure olap products offering general data model relational model sometimes classified post-relational alternate terms include hybrid database object-enhanced rdbms others data model products incorporates relations constrained e.f. codd information principle requires extensions relational model integrate concepts technologies pre-date relational model example allow representation directed graph trees nodes german company sones implements concept graphdb post-relational products extend relational systems non-relational features others arrived much place adding relational features pre-relational systems paradoxically allows products historically pre-relational pick mumps make plausible claim post-relational resource space model rsm non-relational data model based multi-dimensional classification graph databases allow even general structure network database node may connected node multivalue databases lumpy data store exactly way relational databases also permit level depth relational model approximate using sub-tables nearly identical way xml expresses data given field/attribute multiple right answers time multivalue thought compressed form xml example invoice either multivalue relational data could seen invoice header table one entry per invoice b invoice detail table one entry per line item multivalue model option storing data table embedded table represent detail invoice table one entry per invoice tables needed advantage atomicity invoice conceptual invoice data representation one-to-one also results fewer reads less referential integrity issues dramatic decrease hardware needed support given transaction volume 1990s object-oriented programming paradigm applied database technology creating new database model known object databases aims avoid object-relational impedance mismatch overhead converting information representation database example rows tables representation application program typically objects even type system used particular application defined directly database allowing database enforce data integrity invariants object databases also introduce key ideas object programming encapsulation polymorphism world databases variety ways tried storing objects database products approached problem application programming end making objects manipulated program persistent typically requires addition kind query language since conventional programming languages ability find objects based information content others attacked problem database end defining object-oriented data model database defining database programming language allows full programming capabilities well traditional query facilities object databases suffered lack standardization although standards defined odmg never implemented well enough ensure interoperability products nevertheless object databases used successfully many applications usually specialized applications engineering databases molecular biology databases rather mainstream commercial data processing however object database ideas picked relational vendors influenced extensions made products indeed sql language alternative translating objects relational databases use object-relational mapping orm library
[ 5632, 8201, 4107, 10258, 2068, 1049, 5658, 9248, 8742, 10793, 10286, 1076, 4155, 11324, 11327, 9286, 72, 2632, 9290, 8788, 10326, 7767, 11357, 7775, 11362, 8291, 9828, 10340, 8808, 2669, 9837, 2681, 1146, 3196, 2688, 9345, 10389, 4255, 1697...
Test
10,472
9
Ox_(programming_language):ox programming language ox object-oriented matrix programming language mathematical statistical function library developed jurgen doornik designed econometric programming available windows mac os x linux platforms downloadable console version ox free academic use commercial version available non-academic use according documentation cited whenever results published programming environment econometric modelling oxmetrics based ox
[ 8262, 5833, 7945, 6797, 7983, 6962, 823 ]
None
10,473
2
F6_disk:f6 disk f6 disk colloquial name floppy disk containing microsoft windows nt device driver scsi raid system f6 disks used nt-based versions windows including windows 2000 windows server 2003 windows xp starting windows vista floppy f6 disks obsolete setup process supports loading third-party drivers usb drives cd-roms f6 disk named manner used installation process windows setup program must load device drivers disk system windows installed unless disk system established market finalization particular windows release installed drivers included windows installation discs must loaded means f6 disk f6 disk loaded windows setup pressing f6 key immediately windows setup starts message press f6 need install third party scsi raid driver ... briefly flashed screen every time windows setup starts f6 disk contains device drivers root directory prior windows vista f6 disks always floppy disks point f6 prompt shown windows setup loaded drivers media type floppy disks support usb drives cd-roms added windows vista device drivers raid disk controllers often provided cd-roms manufacturers must copied f6 disk used windows setup alternative approach slipstream required sata/scsi/sas/raid/eide drivers windows installation files directory e.g i386 x86 variety means software like nlite create iso image burned cd dvd media
[ 8976, 4074, 9972, 10839 ]
Test
10,474
9
DMS_Software_Reengineering_Toolkit:dms software reengineering toolkit dms software reengineering toolkit proprietary set program transformation tools available automating custom source program analysis modification translation generation software systems arbitrary mixtures source languages large scale software systems dms used implement wide variety practical tools include domain-specific languages code generation factory control test coverage profiling tools clone detection language migration tools c++ component reengineering. research difficult topics refactoring c++ reliably toolkit provides means defining language grammars produce parsers automatically construct abstract syntax trees asts prettyprinters convert original modified asts back compilable source text parse trees capture prettyprinters regenerate complete detail original source program including source position comments radix format numbers etc. ensure regenerated source text recognizable programmer original text modulo applied transformations many program analysis transformation tools limited ascii western european character sets iso-8859 dms handle well utf-8 utf-16 ebcdic shift-jis variety microsoft character encodings dms uses glr parsing technology enabling handle practical context-free grammars semantic predicates extend capability interesting non-context-free grammars fortran requires matching multiple loops shared continue statements label glr semantic predicates enables dms fortran parser produce asts correctly nested loops parses dms provides attribute grammar evaluators computing custom analyses asts metrics including special support symbol table construction program facts extracted built-in control- data- flow analysis engines local global pointer analysis whole-program call graph extraction symbolic range analysis abstract interpretation changes asts accomplished procedural methods coded parlanse source-to-source tree transformations coded rewrite rules using surface-syntax conditioned extracted program facts using dms rule specification language rsl rewrite rule engine supporting rsl handles associative commutative rules rewrite rule c replace complex condition codice_1 operator written rewrite rules names e.g simplify_conditional_assignment rule match replace pattern pair separated example separate lines readability patterns must correspond language syntax categories case patterns must syntax category statement also separated sympathy patterns target language e.g. c surface syntax coded inside meta-quotes separate rewrite-rule syntax target language backslashes inside meta-quotes represent domain escapes indicate pattern meta variables e.g. \v \e1 \e2 match language construct corresponding metavariable declaration signature line e.g. e1 must syntactic category expression metavariable mentioned multiple times match pattern must match identical subtrees identically shaped v must occur assignments match pattern example metavariables replace pattern replaced corresponding matches left side conditional clause provides additional condition must met rule apply e.g. matched metavariable v arbitrary left-hand side must side effect e.g. form i++ no_side_effects predicate defined analyzer built dms mechanisms achieving complex transformation code accomplished providing number rules cooperate achieve desired effect ruleset focused portions program metaprograms coded parlanse complete example language definition source-to-source transformation rules defined applied shown using high school algebra bit calculus domain-specific language dms variety predefined language front ends covering real dialects c c++ including c++0x c java python php egl fortran cobol visual basic verilog vhdl 20 languages predefined languages enable customizers immediately focus reengineering task rather details languages processed dms additionally unusual implemented parallel programming language parlanse uses symmetric multiprocessors available commodity workstations enables dms provide faster answers large system analyses conversions dms originally motivated theory maintaining designs software called design maintenance systems dms design maintenance system registered trademarks semantic designs
[ 1552, 5399, 3363, 932, 5677, 3762, 1459, 9138, 10560, 8644, 2374, 9926, 847, 7634, 11475, 605, 10089, 8554, 3443, 4980, 11125, 3960, 2045 ]
Test
10,475
2
DEC_BATCH-11/DOS-11:dec batch-11/dos-11 batch-11/dos-11 also known simply dos-11 discontinued operating system digital equipment corporation dec maynard massachusetts first version dos-11 v08-02 released 1970 first operating system run digital pdp-11 minicomputer dos-11 known easy use even day became much less used 1973 release rt-11 operating system dos-11 included dos-11 came xxdp diagnostics monitor program pdp-11 like digital operating systems dos-11 also fortran-iv ansi-66 compiler fortran-iv supported pdp-11 systems less 12k memory dos-11 systems running 8k 12k configurations ran limited version macro-11 assembler pal-11r overlaid form dos-11 operating system kernel one file called monlib.lcl lcl extension acronym linked core image library licil licil could stored type media dos-11 operating system distributed disk dectape punched tape magnetic tape licil file installed hooked onto disk drive contiguous file monitor library name changed monlibcil could booted cil extension acronym core image library core term core memory systems common pdp-11 core image library could created cilus core image library update save program monlibcil typically contained resident monitor rmon keyboard command routine device drivers emt routines clock routines transient monitor dos-11 used compile install early versions rsts-11 rsts/e operating systems however ancestor rsx-11 family operating systems
[ 2179, 6664, 1804, 273, 6675, 9759, 1952, 7076, 8876, 7983, 6448, 6837, 8503, 3650, 8262, 2507, 10590, 1253, 5359, 3056, 2933, 3960 ]
None
10,476
6
Comparison_of_disc_image_software:comparison disc image software article comparison notable software applications access manipulate disk image files compares disk image handling features article compares two features supported file formats capabilities software treat image format
[ 4615, 8976, 2193, 9874, 2197, 5397, 2199, 8214, 6297, 11543, 9762, 5413, 3114, 6062, 7983, 3760, 8114, 823, 2107, 8254, 576, 451, 7379, 7254, 9953, 5858, 10857, 4459, 877, 5492, 10101, 894 ]
Train
10,477
4
Metulji_botnet:metulji botnet metulji botnet discovered june 2011 botnet mainly involved cyberscamming denial service attacks botnet dismantled consisted 12 million individual zombie computers infected butterfly bot making june 2011 largest known botnet known type computers vulnerable tell computer part botnet
[ 1024, 3072, 5636, 10756, 4117, 8726, 535, 9761, 4644, 4133, 4648, 46, 10297, 3643, 7739, 1608, 3657, 8779, 81, 8789, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 3724, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 10952, 3789, 4304, 10457...
Test
10,478
2
Xcode:xcode xcode integrated development environment ide macos containing suite software development tools developed apple developing software macos ios ipados watchos tvos first released 2003 latest stable release version 10.3 available via mac app store free charge macos mojave users registered developers download preview releases prior versions suite apple developer website xcode supports source code programming languages c c++ objective-c objective-c++ java applescript python ruby resedit rez swift variety programming models including limited cocoa carbon java third parties added support gnu pascal free pascal ada c perl d. xcode build fat binary files containing code multiple architectures mach-o executable format called universal binary files allow software run powerpc intel-based x86 platforms include 32-bit 64-bit code architectures using ios sdk xcode also used compile debug applications ios run arm architecture processors xcode includes gui tool instruments runs atop dynamic tracing framework dtrace created sun microsystems released part opensolaris main application suite integrated development environment ide also named xcode xcode suite includes apple developer documentation built-in interface builder application used construct graphical user interfaces xcode 4.1 xcode suite included modified version gnu compiler collection xcode 3.1 xcode 4.6.3 included llvm-gcc compiler front ends gnu compiler collection code generator based llvm xcode 3.2 later included clang c/c++/objective-c compiler newly-written front ends code generator based llvm clang static analyzer starting xcode 4.2 clang compiler became default compiler starting xcode 5.0 clang compiler provided xcode 4.6.3 xcode suite used gnu debugger gdb back-end ide debugger starting xcode 4.3 lldb debugger also provided starting xcode 4.5 lldb replaced gdb default back-end ide debugger starting xcode 5.0 gdb longer supplied formerly xcode supported distributing product build process multiple systems one technology involved named shared workgroup build used bonjour protocol automatically discover systems providing compiler services modified version free software product distcc facilitate distribution workloads earlier versions xcode provided system named dedicated network builds features absent supported versions xcode xcode also includes apple webobjects tools frameworks building java web applications web services formerly sold separate product xcode 3.0 apple dropped webobjects development inside xcode wolips used instead xcode 3 still includes webobjects frameworks xcode 1.0 released fall 2003 xcode 1.0 based project builder updated user interface ui zerolink fix continue distributed build support code sense indexing next significant release xcode 1.5 better code completion improved debugger xcode 2.0 released mac os x v10.4 tiger included quartz composer visual programming language better code sense indexing java ant support also included apple reference library tool allows searching reading online documentation apple website documentation installed local computer xcode 2.1 could create universal binary files supported shared precompiled headers unit testing targets conditional breakpoints watchpoints also better dependency analysis final version xcode mac os x v10.4 2.5 xcode 3.0 released mac os x v10.5 leopard notable changes since 2.1 include dtrace debugging tool named instruments refactoring support context-sensitive documentation objective-c 2.0 garbage collection also supports project snapshots provide basic form version control message bubbles show build errors debug values alongside code building four-architecture fat binaries 32 64-bit intel powerpc xcode 3.1 update release developer tools mac os x version included iphone sdk could target non-mac os x platforms including iphone os 2.0 included gcc 4.2 llvm gcc 4.2 compilers another new feature since xcode 3.0 xcode scm support includes subversion 1.5 xcode 3.2 released mac os x v10.6 snow leopard installs earlier version os x supports static program analysis among features also drops official support targeting versions earlier iphone os 3.0 still possible target older versions simulator supports iphone os 2.0 3.1 also java support exiled 3.2 organizer xcode 3.2.6 last version downloaded free users mac os x v10.6 downloading requires free registration apple developer site june 2010 apple worldwide developers conference version 4 xcode announced developer tools state union address version 4 developer tools consolidates xcode editing tools interface builder one application among enhancements apple released final version xcode 4.0 march 9 2011 software made available free registered members 99 per year mac developer program 99 per year ios developer program also sold 4.99 non-members mac app store longer available xcode 4.0 drops support many older systems including powerpc development software development kits sdks mac os x 10.4 10.5 ios sdks older 4.3 deployment target still set produce binaries older platforms mac os platforms one limited creating x86 x86-64 binaries later xcode free general public version 4.1 xcode cost 4.99 xcode 4.1 made available free july 20 2011 day mac os x lion release users mac os x lion mac app store august 29 2011 xcode 4.1 made available mac os x snow leopard members paid mac ios developer programs xcode 4.1 last version include gnu compiler collection gcc instead llvm gcc clang october 12 2011 xcode 4.2 released concurrently release ios 5.0 included many improved features storyboarding automatic reference counting arc xcode 4.2 last version support mac os x 10.6 snow leopard available registered developers paid accounts without paid account 3.2.6 latest download appears snow leopard xcode 4.3 released february 16 2012 distributed one application bundle xcode.app installed mac app store xcode 4.3 reorganizes xcode menu include development tools xcode 4.3.1 released march 7 2012 add support ios 5.1 xcode 4.3.2 released march 22 2012 enhancements ios simulator suggested move lldb debugger versus gdb debugger appear undocumented changes xcode 4.3.3 released may 2012 featured updated sdk mac os x 10.7.4 lion bug fixes xcode 4.4 released july 25 2012 runs mac os x lion 10.7 os x mountain lion 10.8 first version xcode contain os x 10.8 mountain lion sdk xcode 4.4 includes support automatic synthesizing declared properties new objective-c features literal syntax subscripting improved localization august 7 2012 xcode 4.4.1 released bug fixes september 19 2012 ios 6 xcode 4.5 released xcode added support ios 6 4-inch retina display iphone 5 ipod touch 5th generation also brought new objective-c features ios simplified localization added auto-layout support ios october 3 2012 xcode 4.5.1 released bug fixes stability improvements less month later xcode 4.5.2 released support ipad mini ipad retina display bug fixes stability improvements january 28 2013 ios 6.1 xcode 4.6 released june 2013 apple worldwide developers conference version 5 xcode announced september 18 2013 xcode 5.0 released added support ios 7 sdk always support os x 10.8 mountain lion sdk support os x 10.9 mavericks sdk latest included betas version also added version clang generating 64-bit arm code ios 7 apple removed support building garbage collected cocoa binaries xcode 5.1 june 2 2014 worldwide developers conference apple announced version 6 xcode one notable features support swift all-new programming language developed apple xcode 6 also included features like playgrounds live debugging tools september 17 2014 time ios xcode 6 released xcode could downloaded mac app store june 8 2015 apple worldwide developers conference xcode version 7 announced introduced support swift 2 metal os x added support deploying ios devices without apple developer license xcode 7 released september 16 2015 june 13 2016 apple worldwide developers conference xcode version 8 announced introduced support swift 3 xcode 8 released september 13 2016 june 5 2017 apple worldwide developers conference xcode version 9 announced introduced support swift 4 metal 2 also introduced remotely debugging ios tvos devices wirelessly wifi xcode 9 publicly released september 19 2017 june 4 2018 apple worldwide developers conference xcode version 10 announced beta version released day xcode 10 introduced support dark mode announced macos mojave collaboration platforms bitbucket gitlab addition github training machine learning models playgrounds new features swift 4.2 metal 2.1 well improvements editor project build system xcode 10 also dropped support building 32-bit macos apps longer supports subversion integration xcode 10 publicly released september 17 2018 june 3 2019 apple worldwide developers conference xcode version 11 announced beta version released day xcode 11 introduced support new features swift 5.1 well new swiftui framework although interactive ui tools available running macos 10.15 also supports building ipad applications run macos includes integrated support swift package manager contains improvements editor including minimap gives overview source code file quick navigation xcode 11 requires macos 10.14.4 later
[ 10755, 6154, 1549, 4111, 7697, 541, 9245, 5663, 3107, 6186, 5165, 5677, 8754, 9784, 576, 5696, 8262, 4171, 6731, 1623, 3681, 11363, 2149, 3691, 8303, 8304, 5747, 6264, 7292, 7806, 10878, 1666, 1668, 9354, 5784, 10406, 11430, 171, 3248, 17...
Test
10,479
4
Norton_System_Insight:norton system insight norton system insight part performance monitoring system found norton 2010–2012 lines monitors displays information downloaded files installed applications scans detected security risks also shows number performance alerts addition represents cpu memory usage 30 days graphical way easier understanding provides links norton insight startup manager optimize button defragments system drive system insight launched click performance link
[ 10872, 9569, 8398 ]
Test
10,480
2
Simple_DirectMedia_Layer:simple directmedia layer simple directmedia layer sdl cross-platform software development library designed provide hardware abstraction layer computer multimedia hardware components software developers use write high-performance computer games multimedia applications run many operating systems android ios linux macos windows sdl manages video audio input devices cd-rom threads shared object loading networking timers 3d graphics handle opengl vulkan direct3d context common misconception sdl game engine true however library suited building games directly usable indirectly engines built top library internally written c possibly depending target platform c++ objective-c provides application programming interface c bindings languages available free open-source software subject requirements zlib license since version 2.0 prior versions subject gnu lesser general public license zlib license sdl 2.0 freely available static linking closed-source projects unlike sdl 1.2 sdl extensively used industry large small projects 700 games 180 applications 120 demos posted library website sam lantinga created library first releasing early 1998 working loki software got idea porting windows application macintosh used sdl port doom beos see doom source ports several free libraries developed work alongside sdl smpeg openal also founded galaxy gameworks 2008 help commercially support sdl although company plans currently hold due time constraints soon putting galaxy gameworks hold lantinga announced sdl 1.3 would later become sdl 2.0 would licensed zlib license lantinga announced sdl 2.0 14 july 2012 time announcing joining valve corporation first version announced day joined company lantinga announced stable release sdl 2.0.0 13 august 2013 sdl 2.0 major update sdl 1.2 codebase different backwards-compatible api replaces several parts 1.2 api general support multiple input output options feature additions include multiple window support hardware-accelerated 2d graphics better unicode support support mir wayland added sdl 2.0.2 enabled default sdl 2.0.4 version 2.0.4 also provided better support android sdl wrapper around operating-system-specific functions game needs access purpose sdl provide common framework accessing functions multiple operating systems cross-platform sdl provides support 2d pixel operations sound file access event handling timing threading often used complement opengl setting graphical output providing mouse keyboard input since opengl comprises rendering game using simple directmedia layer automatically run every operating system adaptations must applied reduced minimum since sdl also contains abstraction apis frequent functions offered operating system syntax sdl function-based operations done sdl done passing parameters subroutines functions special structures also used store specific information sdl needs handle sdl functions categorized several different subsystems sdl divided several subsystems besides basic low-level support also separate official libraries provide functions comprise standard library provided official website included official documentation non-standard libraries also exist example sdl_collide sourceforge created amir taaki sdl 2.0 library language bindings way sdl designed much source code split separate modules operating system make calls underlying system sdl compiled appropriate modules selected target system following back-ends available sdl 1.2 support risc os dropped 2.0 unofficial sixel back-end available sdl 1.2 rockbox mp3 player firmware also distributes version sdl 1.2 used run games quake years sdl used many commercial non-commercial video game projects instance mobygames listed 120 games using sdl 2013 sdl website listed around 700 games 2012 important commercial examples angry birds unreal tournament ones open-source domain openttd battle wesnoth freeciv cross-platform game releases popular humble indie bundles linux mac android often sdl based sdl also often used later ports new platforms legacy code instance pc game homeworld ported pandora handheld jagged alliance 2 android via sdl also several non video game software uses sdl examples emulators dosbox visualboyadvance several books written development sdl see readings sdl used university courses teaching multimedia computer science instance workshop game programming using libsdl university cadiz 2010 game design discipline utfpr ponta grossa campus 2015
[ 1666, 9604, 9605, 8454, 136, 2186, 6797, 2062, 9491, 3734, 2583, 4758, 5754, 1435, 10654, 10016, 3491, 3876, 6180, 10149, 9128, 4777, 2730, 2603, 428, 5165, 8618, 7983, 8116, 823, 1849, 11322, 6718, 2368, 1347, 1348, 8771, 4550, 5451, 852...
Test
10,481
3
Mac_NC:mac nc mac nc sometimes referred macintosh nc network thin client expected released apple april 1998 device widely promoted then-apple director larry ellison apparently part oracle network computer initiative mac nc ultimately never released although key components technology inherited original imac released august 1998 may 21 1996 oracle corporation along 30 hardware software vendors announced intent build computers designed around network computer platform idea design technology based profile included diskless computers commonly coded applications using languages java interface internet using common software netscape navigator may 1996 apple became partner network computing effort used apple pippin platform implementation july 9 1997 gil amelio ousted ceo apple board directors steve jobs stepped interim ceo begin critical restructuring company product line would eventually become ceo served position august 2011 oracle corporation ceo apple board member larry ellison announced december 1997 talking harvard computer society apple would release product called macintosh nc april 1998 suggested network computer would near-300 mhz processor 17-inch screen would sell less us 1,000 hard disk drive available extra costing additional 100 steve jobs agree stating unfortunately ellison pretty far base e-mail maybe trying deflect interest really oracle ellison overseen development business alliance produced number network computer-branded devices companies sun ibm apple never manufactured devices oracle alliance endorse network computer reference profile steve jobs already stopped macintosh clone efforts would shut apple pippin concept prospects mac nc ultimately technology shipped netboot release mac os x server 1.0 january 1999
[ 9732, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 5677, 8253, 1090, 4679, 8783, 4180, 10325, 10838, 10840, 9312, 9826, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, ...
Test
10,482
2
Xenomai:xenomai xenomai real-time development framework cooperating linux kernel provide pervasive interface-agnostic hard real-time support user space applications seamlessly integrated linux environment xenomai project launched august 2001 2003 merged real-time application interface rtai project produce production-grade real-time free software platform linux called rtai/fusion top xenomai abstract real-time operating system rtos core eventually rtai/fusion effort became independent rtai 2005 xenomai project xenomai based abstract rtos core usable building kind real-time interface nucleus exports set generic rtos services number rtos personalities called “ skins ” built nucleus providing specific interface applications using services single generic core implement long list differences xenomai rtai though projects share ideas support rtdm layer major differences derive goals projects aim respective implementation rtai focused lowest technically feasible latencies xenomai also considers clean extensibility rtos skins portability maintainability important goals xenomai path towards ingo molnár preempt_rt support another major difference compared rtai objectives
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 6207, 4161, 8772, 6213, 8268, 589, 593, 5220, 6244, 1126, 5222, 10856, 4207, 11383, 5244, 4734, 11391, 10883, 6276, 7812, 7821, 4238, 10382, 2195, 9366, 2711, 6808, 2201, 7319, 9882, 1694, ...
Test
10,483
3
FeiTeng_(processor):feiteng processor feiteng 飞腾 fēiténg name several computer central processing units designed produced china supercomputing applications microprocessors developed tianjin phytium technology processors also described yinhefeiteng 银河飞騰 yhft family cpu family developed team directed nudt professor xing zuocheng first generation binary compatible intel itanium 2 second generation ft64 system chip cpu 64-bit stream processor ft64 chips used yinhe 银河 supercomputers accelerators feiteng-1000 third generation cpu family manufactured 65 nm technology contains 350 million gates clock frequency 0.8–1 ghz compatible sparcv9 instruction set architecture chip contains 8 cores capable executing 64 threads 3 hypertransport channels coherent links 4 ddr3 memory controllers 8x pcie 2.0 link tianhe-1a supercomputer uses 2,048 feiteng 1000 processors tianhe-1a theoretical peak performance 4.701 petaflops also employing 7,168 nvidia tesla m2050 gpus 14,336 intel xeon x5670 cpus addition ft1000 processors feiteng-1000 eight-core processor based sparc system used operate service nodes tianhe-1 2012 report european high performance computing service stated feiteng used work opensparc project tianhe-2 supercomputer uses 4096 processors galaxy ft-1500 16 cores opensparc architecture based 65 w tdp made 40 nm technology processor cores work 1.8 ghz peak performance ft-1500 115–144 gflops every core may execute 8 interleaving threads supports 256-bit wide simd vector operations including fused mul-add fma cache soc works 2 ghz frequency 16 kb l1i 16 kb l1d 512 kb l2 per core shared 4 mb l3 cache l3 cache 4 segments 1 segment per block 4 cpu cores 1 mb 32-way associative cache uses directory-based cache coherency protocol ft-1500 also ft-1500a arm64 soc designed phytium includes 16 cores armv8 processor 32-lane pcie host 2 gmac on-chip ethernet controller gicv3 interrupt controller support
[ 11618, 10789, 1480, 5358, 1776, 8508, 1399, 2394, 508, 11487 ]
Train
10,484
5
Rdate:rdate unix-like operating systems rdate tool querying current time network server optionally setting system time rdate uses time protocol time protocol generally considered obsolete replaced network time protocol ntp used set local system time rdate operates changing system time immediately time date returned server abrupt changes clock settings found cause problems software relying timing led development network time protocol gradually changes system time skip ticks due problems described rdate generally used systems ntp available specialized circumstances required system time set correctly soon possible initial setup services may vulnerable abrupt time-changes started
[ 515, 9733, 9735, 3976, 4750, 5397, 2198, 6812, 7847, 4398, 823, 1336, 7356, 965, 8522, 3659, 9557, 9946, 6120, 10344, 4850, 5492, 9204, 6138, 891, 5759 ]
None
10,485
3
Microsequencer:microsequencer computer architecture engineering sequencer microsequencer generates addresses used step microprogram control store used part control unit cpu stand-alone generator address ranges usually addresses generated combination counter field microinstruction subset instruction register counter used typical case next microinstruction one execute field microinstruction used jumps logic since cpus implement instruction set useful able decode instruction bits directly sequencer select set microinstructions perform cpu instructions modern cisc processors use combination pipelined logic process lower complexity opcodes completed one clock cycle microcode implement ones take multiple clock cycles complete one first integrated microcoded processors ibm palm processor emulated processor instruction microcode used ibm 5100 one first personal computers recent examples similar microsequencer-based processors microcore labs mcl86 mcl51 mcl65 cores emulate intel 8086/8088 8051 mos 6502 instruction sets entirely microcode
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 2638, 3175, 8815, 6268, 3197, 4742, 7313, 6815, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911, 8890, 4286, 2241, 2243, 9932, 5329, 10966, 7...
Test