node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
10,686
7
Talarian:talarian talarian provider real-time infrastructure software part tibco veteran provider message-oriented middleware talarian member business integration group big internet protocol multicast initiative ipmi securities industry middleware council simc object management group omg internet engineering task force ietf smartsockets main product talarian real-time message-oriented middleware mom scalable fault tolerant programming model built specifically offer high-speed interprocess communication ipc multiprocessor architecture scalability reliability supports variety communication paradigms including publish-subscribe adaptive multicast redundant connections peer-to-peer rpc included part smartsockets package graphical tools monitoring debugging applications supported wide range platforms applications using smartsockets developed following languages smartsockets product tibco see acquisition january 2002 tibco acquired talarian approximately 115 million primary competitor delivery high-performance messaging solutions tibco paid 5.30 per share half stock half cash talarian outstanding shares talarian customers large end-users oems systems integrators need solutions real-time data flow supports high information volumes list famous customers
[ 1280, 8122, 8640, 9441, 5384, 1197, 7802 ]
Test
10,687
2
Benjamin_Mako_Hill:benjamin mako hill benjamin mako hill born december 2 1980 free software activist hacker author contributor free software developer part debian ubuntu projects well co-author three technical manuals subject debian gnu/linux 3.1 bible official ubuntu server book official ubuntu book hill assistant professor communication university washington serves member free software foundation board directors hill master degree mit media lab received phd interdepartmental program involving mit sloan school management mit media lab fall 2013 assistant professor department communication university washington also fellow mit center civic media coordinates development software civic organizing worked advisor contractor one laptop per child project speaker gnu project serves board software freedom international organization organizes software freedom day 2006 married mika matsuzaki used mathematically constrained wedding vows marriage ceremony since 1999 hill active member debian served delegate debian project leader founder coordinator debian non-profit debian custom distribution designed fill needs small non-profit organizations addition served board software public interest march 2003 july 2006 serving organisation vice-president august 2004 hill also core developer founding member ubuntu continues active contributor project addition technical responsibilities coordinated construction community around ubuntu project project community manager later ceding role jono bacon ubuntu first year half period worked full-time canonical ltd within project served community council governance board oversees non-technical aspects project october 2011 work included contributing code conduct diversity statement project addition software development hill writes extensively published academic books magazines newsletters online journals slate magazine republished one blog posts author free software project management howto canonical document managing foss projects published academic work foss anthropological sociological management software engineering perspectives written spoken intellectual property copyright collaboration generally also studied sociology community involvement web communities widely published cited projects like scratch wikipedia talked topics publicly well giving keynote address 2008 oscon hill worked several years consultant foss projects specializing coordinating releases software free open software structuring development efforts encourage community involvement spends significant amount time traveling giving talks foss intellectual property primarily europe north america previous current positions hill pursued research full-time graduate researcher mit media laboratory lab worked electronic publishing computing culture groups collaborative writing decision-making software one project selectricity award-winning voting tool received prizes grants mtv cisco fellow harvard berkman center internet society mit center civic media served advisory board wikimedia foundation advisory council open knowledge foundation board free software foundation founding member ubuntu community council 2009 2019 research symbiont award -- general symbiont
[ 1026, 2050, 1028, 5644, 2581, 8727, 4123, 10780, 546, 3618, 6691, 2109, 10817, 8258, 3654, 5703, 8263, 10822, 589, 1101, 4177, 1107, 8787, 1112, 3674, 4192, 10851, 3685, 9320, 9324, 8304, 7793, 3189, 5755, 5759, 2180, 7812, 4230, 8326, 98...
Test
10,688
3
Amstrad_PC2286:amstrad pc2286 amstrad 286 pc2286 launched 1989 2000 series launched professional follow pc1512/1640 2000 series consisted 2086 8086 2286 80286 2386 80386dx series used plastic case similar 1512/1640 time main computer unit power supply unit built machines bios setting battery backed however unusually used 4x aa battery mounted top based unit 2286 came 3.5 floppy drives standard side port connecting external 5 1/4 inch disk drive package contained one range monitors screen 12 14 vga mono vga color 16-bit intel 80286 cpu 12.5 mhz 1 mb ram 40 mb vga adaptor supporting mda cga hercules ega mcga evga serial parallel 5.25 inch 3.5 inch fdd mouse
[ 4674, 9166 ]
Validation
10,689
3
MOVHPD:movhpd x86 assembly programming language movhpd name specific action performable modern x86 processors 2nd-generation streaming simd extensions sse2 action involves either copying number memory temporary space copying number temporary space memory specifically movhpd causes value 8-byte memory region either copied assigned upper half xmm register source operand either xmm register xmm memory address m64 source operand xmm register destination operand must memory address source operand memory address destination operand must xmm register note lower half xmm register unaffected operation x86 instruction listings
[ 6596, 6025, 499, 5844, 8853, 1915 ]
Validation
10,690
9
BEAM_(Erlang_virtual_machine):beam erlang virtual machine beam virtual machine core erlang open telecom platform otp beam part erlang run-time system erts compiles erlang elixir source code bytecode executed beam beam bytecode files codice_1 file extension originally beam short bogdan erlang abstract machine named bogumil bogdan hausman wrote original version name may also referred björn erlang abstract machine björn gustavsson wrote maintains current version developers worked system ericsson
[ 11488, 8226, 5031 ]
None
10,691
3
Macintosh_Classic:macintosh classic macintosh classic personal computer designed manufactured sold apple computer inc. october 1990 september 1992 first macintosh sell less us 1,000 production classic prompted success macintosh plus macintosh se system specifications classic similar predecessors monochrome crt display 512×342 pixel resolution 4 megabyte mb memory limit older macintosh computers apple decision update classic newer technology 68010 cpu higher ram capacity color display resulted criticism reviewers macworld describing nothing gloat beyond low price unexceptional ensured compatibility mac by-then healthy software base well enabled fit lower price apple intended nevertheless classic featured several improvements aging macintosh plus replaced apple low-end mac computer 25 percent faster plus included apple superdrive floppy disk drive standard classic adaptation jerry manock terry oyama 1984 macintosh 128k industrial design earlier macintosh se apple released two versions ranged price 1,000 1,500 price availability education software led classic popularity education sold alongside powerful macintosh classic ii 1991 discontinuation next year apple co-founder steve jobs left apple 1985 product development handed jean-louis gassée formerly manager apple france gassée consistently pushed apple product line two directions towards openness terms expandability interoperability towards higher price gassée long argued apple market computers towards low end market profits thin instead concentrate high end higher profit margins illustrated concept using graph showing price/performance ratio computers low-power low-cost machines lower left high-power high-cost machines upper right high-right goal became mantra among upper management said fifty-five die referring gassée goal 55 percent profit margin high-right policy led series machines ever-increasing prices original macintosh plans called system around 1,000 time morphed jef raskin original vision easy-to-use machine composing text documents jobs concept incorporating ideas gleaned trip xerox parc mac list price ballooned 2,495 price mac systems continued climb macintosh plus slightly expensive 2,599 se 2,900 3,900 depending model basic macintosh ii 40 mb hard drive least 5,500 launch price increasing late 1988 modern machines cost even macintosh iicx 5,369 iici 6,269 iifx 9,900 without monitors keyboards color crts relatively expensive late 1980s apple 14-inch 640×480 monitor list price 999 apple adb keyboards high quality similarly expensive inexpensive machine lineup late 1980s several-year-old mac plus selling around 1,800 low-left market abandoned years earlier booming turbo xts ignored high end unix workstations likes sun sgi apple fortunes 1980s quickly reversed christmas season 1989 drove point home first decrease sales years accompanying 20 percent drop apple stock price quarter january 1990 gassée resigned authority product development divided among several successors many apple engineers long pressing lower-cost options order build market share increase demand across entire price spectrum gassée rush started quickly introduce series low-cost machines three market points identified low-cost machine aimed costing 1,000 low-cost machine color graphics upscale color machine small business use time would develop classic macintosh lc macintosh iisi unlike '020 '030 based models macintosh classic original macintosh startup sound macweek magazine reported july 10 1990 apple paid 1 million modular computer systems inc. subsidiary daimler-benz ag right use classic name part five-year contract apple renew contract ended macweek speculated macintosh classic would use 8 megahertz mhz motorola 68000 microprocessor display predecessors classic would priced 1,500 2,150 december 12 1990 john sculley apple ceo introduced classic press conference announcing pricing would start 1,000 saying reach new customers n't lower prices existing products redesigned computers ground features customers told us value apple new pricing strategy caused concern among investors thought would reduce profit margins brodie keast apple product marketing manager said prepared whatever takes reach people macintosh ... plan get aggressive price need release classic apple share price closed 27.75 per share 50 cents october 12 1990 far previous 12-month high 50.37 classic released europe japan concurrently united states release japan classic retailed 198,000 yen 1,523 us matching price toshiba dynabook laptop computer spending 40 million marketing classic first-time buyers apple difficulty meeting high demand apple doubled manufacturing space 1990 expanding singapore cork ireland factories classic assembled air freight rather sea shipping used speed delivery shortage caused concern among dealers blamed apple poor business planning macintosh classics lcs given scholastic software 12 weeks officially announced scholastic planned release 16 new macintosh products 1991 peter kelman scholastic publisher predicted macintosh would become school machine nineties classic sold schools 800 availability educational software led classic popularity education sector low-end model sold 1 mb memory 1.44 mb floppy drive hard disk included keyboard 999 high-end model cost 1,499 contained additional 1 mb memory expansion card 40 mb hard disk classic features several improvements macintosh plus replaced apple low-end mac computer 25 percent faster plus fast se includes apple superdrive 3.5 floppy disk drive standard superdrive read write macintosh ms-dos os/2 prodos disks also classic last compact mac use motorola 68000 central processing unit cpu classic uses system 6.0.7 operating system support versions system 7.5.5 hidden hierarchical file system hfs disk volume contained read-only memory rom includes system 6.0.3 mac classic booted system 6.0.3 holding keys boot dealers included software bundle called smartbundle classic also sold separately 349 includes t/maker writenow word processor ashton-tate full impact spreadsheet program recordholderplus database silicon beach software superpaint 2.0 paint draw program macintosh classic final adaptation jerry manock terry oyama macintosh 128k industrial design bringing back elements original retaining little snow white design language used macintosh se design remnant se stripe across front panel bezel floppy drive distinctive front bezel lines se used classic vertical lines around base replaced four horizontal vent lines reminiscent original design also curve front bezel increased radial curve front macintosh lc macintosh iisi screen brightness dial bezel also removed favor software control broad curved front bezel became signature apple product design much 1990s logic board central circuit board computer based macintosh se design size however reduced using surface mount technology 9×5 inches 23×13 cm half size se board redesign absence expansion slots kept manufacturing costs low lack expansion abilities along small screen size macintosh popularity desktop publishing led oddities video displays connected scsi port users seeking connect larger full- dual-page display mac classic design used 1991 classic ii succeeded classic replaced macintosh se/30 reviewers macintosh classic focused processor performance lack expansion slots liza schafer home office computing praised classic ease use price criticized display full us letter page × 11 inches would fit full size warned required high-end graphics desktop publishing capabilities buying classic schafer concluded classic value impressive performance performance get working novel database spreadsheet pc week criticized lack faster processor stating 7.8 mhz speed adequate text applications limited graphics work suitable power users classic appropriate home computer limited computing road similarly pc user review concluded slow processor lack expansion slots macintosh classic offset low prices macweek described fine inexpensive replacement macintosh plus best embodies original macintosh vision six half years later computer gaming world skeptical doubting consumers would purchase black-and-white computer hard drive slightly faster mac plus february 1991 edition electronic learning robert mccarthy wrote teachers educational administrators software developers enthusiastic new lower cost apple macintosh computers steve taffe manager instructional strategy mecc developer publisher educational software explained excitement classic terrific – mac low price everyone afford macintosh scholastic educational software developer also confident apple ability compete ms-dos machines stating cost-effective powerful ms-dos computers apples superior comfort-level sue talley apple manager strategic planning education said classic see going applications need fair number powerful stations color big issue talley mentioned suited writing labs basic productivity uses many schools decided buy macintosh classic lack color monitor option higher-priced macintosh lc popular apple iie card also increased lc appeal schools although classic popular first may 1992 lc 560,000 sold outselling classic 1.2 million
[ 2058, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 8767, 576, 1090, 4180, 10838, 10840, 9312, 7269, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, ...
Train
10,692
3
Tandy_2000:tandy 2000 tandy 2000 personal computer introduced radio shack september 1983 based 8 mhz intel 80186 microprocessor running ms-dos comparison ibm pc xt introduced march 1983 used older 4.77 mhz 8088 processor ibm pc introduced 1984 would later use newer 6 mhz intel 80286 due 16-bit-wide data bus efficient instruction decoding 80186 tandy 2000 ran significantly faster pc compatibles slightly faster pc later ibm upgraded 80286 new pc models 8 mhz though wait states tandy 2000 company first computer built around intel x86 series microprocessor previous models used z80 68000 cpus touted compatible ibm xt tandy 2000 different enough existing pc software purely text-oriented failed work properly tandy 2000 special version ms-dos supported 768 kb ram significantly 640 kb limit imposed ibm architecture used 80-track double-sided quad-density floppy drives 720 kb capacity ibm standard time introduction tandy 2000 360 kb tandy 2000 tandy trs-80 logos case marking start phaseout trs-80 brand introduction ibm model 5150 personal computer august 1981 created entirely new market microcomputers many hardware software companies founded specifically exploit ibm microsoft new presence standard-setter small computers established manufacturers shifted focus well date tandy/radio shack small-computer market four years since august 1977 introduction trs-80 model new computer division followed october 1979 trs-80 model ii—a high-end business-oriented system 1983 trs-80 model 4 succeeded model iii replaced model consumer educational markets business segment trs-80 model 12 model 16 succeeded model ii adding higher-end features thus far tandy/radio shack computer lines occupied niches market proprietary system software applications tandy attempted monopolize software peripheral sales offering third-party products company stores ibm pc introduced nearest thing industry standard small computers cp/m-80 single manufacturer dominated 1983 ibm pc tandy discouraging third-party products halved company market share stopped profit growth tandy motive moving new ms-dos domain twofold capitalize new market leverage sales opportunities afforded solid position small computers marketing management believed many tandy customers would prefer stay tandy products inevitably seemed made jump onto burgeoning ibm/microsoft bandwagon figured company well-positioned regard large base customers consumer business markets z80-based trs-80 models i/iii/4 68000-based models 12 16 respectively tandy large presence computer retailer several thousand radio shack stores throughout us deemed advantage well pc manufacturers especially ibm relied mainly sales corporate accounts consumer retail tandy/radio shack thus company would become market leader offering hottest new trend—affordable 16-bit computers running ms-dos—directly computing public therefore tandy would produce ibm-style computer running industry-standard ms-dos company decided distinguish similar products producing better computer new machine would aimed mid-price market high-end consumers low-end businesses deemed prudent order seriously cannibalize current product lines serving market segments big-name computer manufacturers made leap pc/ms-dos market half 100 popular pc programs incompatible 2000 including killer app lotus 1-2-3 tandy realize similar non-compatible computers dec ti eagle successful strategy offering high-performance pc genesis tandy 2000 technical specifications rival computers improved pc hardware matched tandy 2000 one two dimensions none offered across-the-board enhancement except noted ran ms-dos incompatible ibm pc hardware level copycat computers competed primarily lower pricing like tandy exploiting installed customer bases tandy described 2000 'next generation true 16-bit cpu speed disk storage expansion ibm pc ms-dos computers admitting 1984 many ms-dos programs support computer company stated popular sophisticated software market available either immediately next six months two models tandy 2000 introduced dual-drive floppy-only model 2,750 2000hd single floppy drive half-height 10 mb hard drive 4,250 dual-floppy model 128 kb ram hard-drive-equipped 2000hd 256 kb comparison time low-end trs-80 model 4 two floppy drives cost 1,999 high-end model 16 two floppy drives cost 4,699 tandy executive ed juge said within six months tandy realized erred 2000 early 1985 infoworld reported tandy introduced tandy 1000 found market prefers true pc compatibility 2000 incomplete compatibility tandy 2000 received lukewarm welcome market computer press inability run popular ms-dos applications anticipated tandy time accepted practice new software created new computer came market also many pc-style computers manufacturers hardware-compatible ibm pc though company supported machine hardware add-ons software tailored specially including bestsellers like lotus 1-2-3 autocad computer failed gain popular acceptance never developed would late 1986 introduction tandy 3000 tandy offered pc-style computer performance comparable tandy 2000 tandy 2000 marketed early 1988 continual price cuts eventually closed 999 remaining unsold computers converted radio shack store operations terminals coincidentally one backup plans original trs-80 model four card slots back could accept expansion boards without need open case using rail system available expansion boards/cards included tandy 2000 nominally bios-compatible ibm xt allowed well-behaved dos software run platforms however dos software time bypassed operating system bios directly accessed hardware especially video external ports achieve higher performance rendering software incompatible tandy 2000 base-model tandy 2000 supported text-mode display monochrome tandy vm-1 monitor used 8-pin video port computer rear panel text-mode address space different location third-party memory-resident software hacks remedied copying pc-compatible text-mode memory tandy 2000 text space rate 5–10 times per second sometimes caused choppiness display produced fast text display rate—often fast read—but 'hold key keyboard could used pause text output bit pattern text character raster image maintained ram could modified user clever programming display ability present fine lines provided 640x400 screen resolution could accessed text mode even without optional graphics board display upgradable support pixel-addressable graphics via tandy 2000 graphics adapter circuit board fit expansion slot connector monochrome vm-1 monitor video connector rear-panel cabinet disabled expansion board installed graphics resolution 640x400 supported high intensity pixels color capability provided color graphics option set chips inserted empty sockets monochrome graphics adapter provided purpose resolution color board 640x400 non-interlaced eight colors palette sixteen available colors displayable tandy cm-1 monitor 799 particularly high-resolution colorful display day cm-1 accepted input color graphics board digital rgbi signals indicating separate red green blue signals intensity bit cga compatibility hit-or-miss three non-tandy monitors worked tandy 2000 graphics card long production original 1986–88 mitsubishi diamond scan nippon electronics corporation nec multisync multisync gs grayscale required horizontal scan frequency tandy 2000 26.4 khz modern flat-screen multisync computer monitors sync frequencies 30 khz cm-1 monitor also digital rgb modern crt monitors analog-only tandy 2000 used quad-density 5.25 floppy disks formatted 720k format 80-track disks double-density bitrate used pc-compatibles although cp/m machines commodore 8050/8250 drives normal pcs time 40-track double-density floppy drives could read quad-density due drive heads wide read narrower tracks 1.2mb 5.25 drives introduced ibm could read quad-density disks 80-track thinner heads various utility programs dos existed allowed nonstandard formats tandy 2000 disks read much like 1.2mb drives tandy 2000 problems reliably writing 360k pc disks due smaller heads completely erasing tracks causing 40-track drives become confused residual magnetic signals outer edge track tandy distributed computer utility called pc-maker would read format 40-track disks 2000s 80-track drives readable drives ordinary pcs floppy controller tandy 2000 accept 3.5 low-density 720 kb floppy drives may 2019 abandonware site winworldpc.com available download disk image latest version ms-dos tandy 2000 includes instructions using ibm 1.2mb 5.25-inch disk drive 80-track create system disk bootable tandy 2000 5.25-inch drive procedure also used create bootable 3.5-inch system disk using ordinary 720kb 3.5-inch pc drive boot tandy 2000 5.25-inch boot drive replaced low-density 720 kb 3.5 inch pc drive keyboard entirely new design made expressly tandy 2000 would later keyboard shipped tandy 1000 successors arrangement function keys changed ibm pc/xt ten left hand side keyboard two columns five tandy among first pc manufacturers change modern arrangement twelve function keys arranged horizontally across top ibm gave nod new standard making arrangement pc-at keyboard serial port hardware completely different pc/xt pc-compatible terminal emulation software either maintain strict bios usage serial hardware else use fossil driver software wrapper virtualized serial hardware see also dec rainbow allowing terminal software work wider variety hardware several terminal programs available tandy 2000 making possible log bbs e-mail remote systems tandy 2000 required specific version ms-dos would run machine standard ms-dos pc dos generic ibm-compatibles would run tandy 2000 standard practice microsoft expectation time customized version ms-dos would prepared different machine i/o drivers designed hardware model highest version dos tandy corporation released tandy 2000 2.11.03 minor third-party patches fact modified version windows 1.0 able run tandy 2000 ms-dos tandy 2000 resided entirely ram unlike ibm pcs contained bios portion os rom complete ms-dos system bios bdos occupied 53 kb ram means ram required run applications tandy 2000 little greater however tandy 2000 fared better comparison later ibm pc-at required run ms-dos version 3.x order operate 1.2 mb floppy drives hard drive version 3 ms-dos rather larger version 2.x running tandy 2000 also proved advantageous tandy 2000 os resided entirely ram therefore could updated hacked rather less effort microsoft basic interpreter supplied computer highly customized tandy 2000 hardware particularly high-resolution color graphics although ibm produced enhanced graphics adapter little year later october 1984 microsoft basic interpreter would support greater color resolution capabilities 1988 tandy/radio shack produced print advertising featuring bill gates microsoft extolling superior performance tandy 2000 advantageous microsoft development windows 1.0 software packages released tandy 2000 included wordperfect 4.2 wp5.1 could work software patches lotus 1-2-3 ashton-tate framework dbase multimate autocad lumena time arts shareware office programs complete line microsoft language products microsoft released version xenix tandy 2000 used western digital vianet network card distributed tandy better basic tandy 2000 pc used write bbs software tandy 2000 later ported ibm pc radio shack deskmate also used tandy 2000 tandy 1000 micropro wordstar versions 3.3 4.0 would run tandy 2000 provided user ran winstall installation utility prompted type video display used selected rom bios would result functional installation none t2000 special features would operative except increased speed version lotus 1-2-3 offered tandy 2000 release 1a customized take advantage unique hardware computer including full 768k ram high resolution color graphics two extra function keys release 1a executable code 60 kb smaller later release 2 provided greater macro programming facilities extra space data additional 128 kb ram available fully expanded tandy 2000 made possible construct larger worksheets later pcs running release 2 advent machines expanded memory nearly two years following introduction tandy 2000 top performer processing large models lotus 1-2-3 tandy 2000 720 kb floppy drives distinct advantage running lotus large enough store even largest worksheets single diskette stark contrast ibm pc xt 360 kb floppy disks order store largest worksheets pc user would split save two disks—and 'd recombine memory later although xt hard drive could store large lotus worksheets single file user could rely single storage device permanent storage important data files 'd forced segment worksheets storage separate disks tandy 2000 large-capacity floppy disks made backup maintenance relatively effortless tandy dropped support tandy 2000 group users formed tandy 2000 orphans software reviews software hardware hacks shareware/freeware repository discovered amateur programmers many commercial ms-dos applications needed minor modifications function tandy 2000 unique hardware also bbs based texas extensive library compatible software available download neither bbs web-based descendant active today
[ 11008, 6787, 4614, 5384, 9363, 5756, 1324, 7983, 1202, 563, 2745, 7495, 9166, 3557, 7269, 2159, 1776, 6129, 3323, 9212 ]
Test
10,693
1
InfinityDB:infinitydb infinitydb all-java embedded database engine client/server dbms extended java.util.concurrent.concurrentnavigablemap interface subinterface java.util.map deployed handheld devices servers workstations distributed settings design based proprietary lockless concurrent b-tree architecture enables client programmers reach high levels performance without risk failures new client/server version 5.0 alpha testing wrapping established embedded version provide shared access via secure remote server embedded system data stored retrieved single embedded database file using infnitydb api allows direct access variable length item spaces database client programmers construct traditional relations well specialized models directly satisfy needs dependent application limit number items database size jvm size infinitydb function smallest environment provides random access storage scaled large settings traditional relations specialized models directed database file infinitydb optimized standard relations well types data allowing client applications perform minimum one million operations per second virtual 8-core system airconcurrentmap in-memory map implements java concurrentmap interface internally uses multi-core design performance memory make fastest java map ordering performed holds medium large numbers entries airconcurrentmap iteration faster java map iterators regardless specific map type infinitydb accessed extended standard java.util.concurrent.concurrentnavigablemap via low-level 'itemspace api concurrentnavigablemap interface subinterface java.util.map special ordering concurrency methods api java.util.concurrent.concurrentskiplistmap maps may nested form complex structures maps standard semantics work internally 'tuple space maps actually stored helpers representing nothing immutable tuple prefix maps may created dynamically high speed needed access thread-safe multi-core concurrent key value types available include java primitive data types dates strings small char byte arrays 'bytestrings 'huge array indexes character long objects binary long objects plus special-purpose types 'entityclass 'attribute maps may multi-valued applications may choose use map-based access alone may mix lower-level 'itemspace access tuples map access wrapper tuple-level distinction 12 primitive data types called 'components atomic components concatenated short composites called 'items unit storage retrieval higher-level structures combine items client-devised include example unlimited size records unlimited number columns attributes complex attribute values unlimited size keys may composition components attribute values ordered sets composite components character large objects clob binary large objects blob unlimited sparse arrays higher-level structures built multiple items include key/value associations like ordered maps ordered sets entity-attribute-value nets quadruples trees dag taxonomies full-text indexes mixtures occur along custom client-defined structures itemspace may represented extended json document json printers parsers provided json documents native mapped sets items desired scale determined item prefix represents path sub-document hence entire database subtree single value represented extended json items always kept sorted json keys object always order 'itemspace represents entire database simple ordered set items state item actually stored component encoded variable-length binary form char array components self-describing standard format sorts correctly programmers deal components primitives stored data strongly typed data stored text parsed weak typing json xml parsed programmer-defined binary stream representations custom client-devised binary formats grow brittle security documentation upgrade testing versioning scaling debugging problems case java object serialization access system via basic methods store retrieve order one variable-length 'item 'tuple time speed order 1m operations/second aggregated multiple threads memory operations either standard map api codice_1 codice_2 iterators lower level codice_3 codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 typical items 30 bytes uncompressed memory lob example use 1 kb items operation affects one item small data structures fast access contrast chunked access example formatting parsing entire json xml texts entire java object serialization graphs space performance scaling itemspace smooth size client-imposed multi-item structure created grows shrinks disappears on-storage performance like block-oriented b-tree blocks 4 kb log n per access block cache 2.5 mb default unlimited size often 100 mb cache grows needed performance efficiency items stored inside single b-tree prefix-compressed variable length uninterpreted sequence bytes compression b-tree may typically grow 100 gb range limits one file log files write flush infinitydb minimizes size database file four types compression prefix suffix zlib utf-8 schema upgrade structures extended modified done adding removing items new ways runtime upgrade scripts hence data model nosql schemaless besides normal java primitive types 'entityclass 'attribute types identified name number optional 'metadata mixed components item used represent tables example table given particular entityclass near front item column given different attribute items table start particular entityclass therehe one normal primitives representing 'entity like key particular attribute corresponding column finally normal primitives representing value attribute simple pattern extended time allow nested tables inside attribute nested attributes inside attributes multi-valued attributes much fixed schema elsewhere new data arrives system describes item-level granularity entityclass attribute numbers names represented extended json data displayed web-based client/server database browser viewed manipulated transferred list sorted formatted items json documents nestable tables whose visible structure determined entityclass attributes mixed items dynamic loose flexibility json formality tables combined global 'acd per-thread 'acid transactions provided infinitydb instance stores data single database file require additional log rollback files event catastrophe except power failure hardware malfunction database guaranteed consistent status completion last global commit recovery abrupt termination immediate requires slow log replay bulk loading globally transactional unlimited data size concurrent uses global transactions provide inter-thread isolation semantics 'acd rather 'acid alternatively acid transactions employ optimistic locking allow inter-thread isolation data structures grow shrink freed space reclaimed immediately made available structures systems run indefinitely without gradual space leaks long interruptions garbage reclamation phases data structure becomes empty space recycled rather leaving behind 'tombstones place holders example possibly large multi-value attribute may shrink one value becoming efficient single-valued attribute last value deleted space reclaimed including space attribute attached row attributes values row reclaimed completely well table loses rows space table reclaimed size type data structure property reference counters hence type graph incrementally collected automatically infinitydb client/server alpha-testing state features infinitydb encrypted version 5 beta-testing state features infinitydb embedded version 4 features airconcurrentmap java concurrentnavigablemap implementation features infinitydb airconcurrentmap roger l. deran designed developed infinity database engine 20 years ago holds us patent 5283894 infinity database engine first deployed intel 8088 assembly language roscor sports video editor rsve licensed nfl teams 1980s lexicon purchased rsve 1989 greatly expanded deployment types professional college sports java version 2.0 added transactionality version 3.0 added concurrency features patent pending apply infinitydb well airconcurrentmap infinity db remains active use thousands sites various kinds airconcurrentmap new uses all-java infinitydb marketed boiler bay inc. since 2002 include
[ 8291, 10921, 5677, 4781, 1136, 5872, 6770, 1594, 479 ]
Test
10,694
2
Lycoris_(company):lycoris company lycoris formerly redmond linux corp. started year 2000 intent make free software easy enough anyone use redmond linux founded joseph cheek entrepreneur previously worked linuxcare late 2001 merged embedded systems company deeplinux merged entity named redmond linux corporation company first product redmond linux personal easy-to-use linux desktop operating system company renamed lycoris january 2002 assets acquired mandriva june 15 2005 flagship product lycoris lycoris desktop/lx linux distribution company based maple valley washington usa lycoris currently part mandriva lycoris desktop/lx installer originally based caldera international openlinux workstation 3.1 distribution rest distribution built kernel desktop applications looked lot like microsoft windows xp right background image shipped software
[ 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 3369, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 10192, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920,...
None
10,695
3
Track_&_Field_(video_game):track amp field video game track field known japan europe olympic-themed sports arcade game developed konami released 1983 japanese release sported official license 1984 summer olympics players compete series events involving alternately pressing two buttons quickly possible make onscreen character run faster followed sequel hyper sports original arcade game player uses two run buttons trackball later units replaced buttons damaged overuse one action button control athlete competing following six events event qualifying time level player must achieve advance next event failing qualify one heat running events three tries events reduce player number lives one none present his/her disposal game end players earn extra lives per 100,000 points scored game accommodate four players compete pairs running events individually others fewer four players remaining slots played computer player cpu multiplayer heats though relative performance players effect game advancing based solely qualifying times multiplayer arcade games set controls relative players going left right game two sets controls somewhat different setup left set controls players 2 4 right set players 1 3 one classic arcade games single player mode played right set controls rather left player completes six events brief medal ceremony sent back field another round higher qualifying levels however game configured conclude final event game responded repeatedly pressing run buttons high frequency players arcade version resorted various tricks rapidly swiping coin ping-pong ball buttons using metal ruler repeated struck would vibrate press buttons result arcade operators reported high rates damage buttons later versions modifications prevent actions game sold 38,000 arcade hardware units japan end 1983 also hit north america 1996 next generation listed track field series collectively number 78 top 100 games time remarking ok games play style little skill even knowledge actual sports test pure button pushing endurance nothing beat track field especially play four players allgame gave game three stars five calling physically exhausting game invented new genre addition challenging events pure originality track field offers nice cartoonish graphics rich colors smooth animation terrific rendition theme chariots fire konami continued releasing games series follow-up hyper sports seven events 100-meter freestyle skeet shooting vault archery triple jump weight lifting pole vault track field initially ported atari inc. atari 2600 console atari 8-bit computers atarisoft label also apple ii commodore 64 port atari 5200 identical atari 8-bit computer version developed 1984 cancelled zx spectrum amstrad cpc versions released part game set match ii compilation 1988 poorly regarded fans konami ported track field famicom hyper olympic included four six events afterwards converted hyper sports famicom well time including three hyper sports events one event track field time nes gained popularity united states konami retooled game release america including eight events games one cartridge original six events track field hammer throw missing place however skeet shooting archery triple jump nes version track field re-released europe 1992 track field barcelona kemco light 1992 summer olympics opening song nes version chariots fire theme vangelis also used arcade version high score screen game boy version also re-released part konami gb collection series xbox live arcade version game released xbox 360 august 8 2007 features updated graphics sounds leaderboards online play xbox live service game also appears nintendo ds altered version chariots fire theme december 18 2008 héctor rodriguez california usa scored world record 95,350 points rodriguez beat 23-year-old record 95,040 points set june 30 1985 kelly kobashigawa los angeles twin galaxies 1985 video game masters tournament victoria british columbia canada twin galaxies official video game pinball book world records arcade volume lists history largest video game contest 1984 march dimes international konami/centuri track field challenge editors say 1 million contestants played track field april 30 may 26 hoping among three finalists going japan represent usa fundraiser march dimes event held aladdin castle arcades national convenience stores gary west oklahoma city u.s. finals phil britt riverside california world championship tokyo june 10 1984
[ 4357, 9957, 6923, 4524, 9006, 10576, 6449, 498, 10931, 8887 ]
Test
10,696
4
SMTP_proxy:smtp proxy smtp proxies specialized mail transfer agents mtas similar types proxy servers pass smtp sessions mtas without using store-and-forward approach typical mta smtp proxy receives connection initiates another smtp session destination mta errors status information destination mta passed back sending mta proxy smtp proxies commonly used process filter inbound outbound email traffic smtp proxies often serve initial network-facing layer email system processing smtp connections clients forwarding data second layer mail servers smtp proxies often implement first and/or layer defence inbound anti-spam filtering system analyze messages using spam content filter antivirus program block rate limit connections using dns blacklists reputation system load balance smtp connections prevent overloading mail servers smtp proxies store messages like mail transfer agent mta reject smtp connections message content real-time away need out-of-band non delivery reports ndrs cause backscatter email serious problem internet email system certain smtp proxies implement tcp connection management otherwise known flow control help reduce damage downstream mail servers resulting spikes tcp traffic malicious smtp clients tcp connection management context smtp typically involves bandwidth throttling and/or introducing delays smtp command responses also known tarpitting slowed certain malicious sources smtp traffic spam bots tend give rather continuing deliver full email message network tarpitting challenging implement within email server since smtp connection processed slowly normal often holding precious system resources memory cpu smtp proxies implemented using lighter-weight programming techniques asynchronous io example nginx node.js netty libevent thousands connections juggled using resources much smaller number connections context full-blown store forward email server smtp proxies sometimes inserted sending mail servers local network receiving counterparts internet smtp proxies often used context order filter outgoing spam however applications domain keys identified mail dkim signing also exist smtp proxies come fundamental flavors
[ 8224, 9824, 2213, 3237, 6246, 6762, 8202, 10924, 4272, 10167, 2994, 7764, 4725, 4918, 9588, 9909, 9053 ]
Test
10,697
4
Citizenfour:citizenfour citizenfour 2014 documentary film directed laura poitras concerning edward snowden nsa spying scandal film us premiere october 10 2014 new york film festival uk premiere october 17 2014 bfi london film festival film features snowden glenn greenwald co-produced poitras mathilde bonnefoy dirk wilutzky steven soderbergh others serving executive producers citizenfour received critical acclaim upon release recipient numerous accolades including academy award best documentary feature 2015 oscars january 2013 laura poitras american documentary film director/producer working several years film monitoring programs united states result september 11 attacks receives encrypted e-mail stranger calls citizenfour offers inside information illegal wiretapping practices us national security agency nsa intelligence agencies june 2013 accompanied investigative journalist glenn greenwald guardian intelligence reporter ewen macaskill travels hong kong camera first meeting stranger hotel reveals edward snowden scenes meeting take place snowden hotel room maintains privacy shots snowden bed front mirror hotel distance form character snowden trapped political agent four days interviews june 9 snowden identity made public request media outlets begin discover location mira hong kong snowden relocates poitras room attempt elude phone calls made room facing potential extradition prosecution united states snowden schedules meeting united nations high commissioner refugees applies refugee status poitras believes followed leaves hong kong berlin june 21 us government requests hong kong government extradite snowden snowden manages depart hong kong us passport cancelled connect havana stranding sheremetyevo international airport moscow august 1 2013 russian government grants snowden temporary asylum period one year meanwhile greenwald returns home rio de janeiro speaks publicly united states utilization nsa programs foreign surveillance greenwald poitras maintain correspondence wherein express reluctance return united states throughout film offers smaller vignettes precede follow snowden hong kong interviews including william binney speaking nsa programs eventually testifying german parliament regarding nsa spying germany film closes greenwald snowden poitras meeting time russia greenwald snowden discuss new emerging details us intelligence programs careful write speak critical pieces information greenwald tears documents creating pile scraps slowly removing table born june 21 1983 elizabeth city north carolina edward snowden first became involved united states government upon enrollment army reserves spring 2004 snowden claims left program months broke legs training accident us house representatives report claims shin splints began working cia 2006 stationed diplomatic cover agency geneva switzerland 2007 nearly three years agency snowden resigned position february 2009 order begin working contractor nsa point career snowden could sense views changing watched obama advanced policies thought would reigned ... nsa intent making every conversation every form behaviour world known 2012 snowden reassigned base japan base honolulu hawaii working variety different contractors serving consultant booz allen hamilton words longer continued work nsa worked secret resist feelings regarding various programs place agency served hawaiian base approximately 15 months prior leaving united states leaking thousands classified documents 2012 poitras begun work third film 9/11 trilogy country country 2006 oath 2010 intended focus broadly topic domestic surveillance interviewed assange greenwald binney appelbaum first contacted snowden january 2013 unable establish encrypted communications greenwald flew hong kong late may 2013 course eight days filmed snowden hotel room mira hotel hong kong later traveled moscow filmed second interview snowden conducted greenwald production company praxis films involved production documentary film distributed radius twc us britdoc foundation artificial eye uk piffl media germany broadcast rights television obtained channel 4 united kingdom hbo documentary films usa norddeutscher rundfunk germany international film premiere took place october 10 2014 united states new york film festival europe documentary shown first time october 17 bfi london film festival first showing germany october 27 part leipzig film festival director laura poitras present hamburg abaton cinema preview november 4–5 official germany premiere kino international german cinemas film running since november 6 widest release 105 theaters weekend december 12–18 2014 premiered home box office february 23 2015 day 87th academy awards subsequently released streaming hbo go channel 4 broadcast united kingdom february 25 2015 released view-on-demand march 4 2015 citizenfour received widespread critical acclaim approval rating 96 rotten tomatoes based 144 reviews average score 8.26/10 site critics consensus reads part real-life thriller part sobering examination 21st century civil liberties citizenfour transcends ideology offer riveting must-see cinema metacritic gave film score 88 100 based 38 reviews indicating universal acclaim ronnie scheib variety wrote amount familiarity whistleblower edward snowden shocking revelations u.s. government wholesale spying citizens prepare one impact laura poitras extraordinary documentary citizenfour ... far reconstructing analyzing fait accompli film tersely records deed real time poitras fellow journalist glenn greenwald meet snowden eight-day period hong kong hotel room plot unleash bombshell shook world adapting cold language data encryption recount dramatic saga abuse power justified paranoia poitras brilliantly demonstrates information weapon cuts ways spencer ackerman writes guardian citizenfour must maddening documentary film subject pervasive global surveillance enveloping digital act spreads without visibility scenes unfold courtrooms hearing chambers hotels yet virtuosity laura poitras director architect makes 114 minutes crackle nervous energy revelation time magazine rated film 3 top 10 movies 2014 called film halloween scariest chiller vanity fair rated 4 top 10 grantland rated 3 top 10 writing chicago tribune former defense department intelligence analyst alex lyda penned negative review calling snowden narcissist patriot david edelstein reviewed film mostly favorably jocularly advised viewers n't buy ticket online credit card film site fandor published extensive survey articles reviews citizenfour updated december 25 2014 sept. 18 2018 ruled european court human rights u.k. spy agency bulk collection telecom data violated european convention human rights strasburg-based court ruled 5-2 practice failed safeguard rights privacy guaranteed human rights convention complaint brought ten groups including aclu privacy international amnesty international civil liberties groups around world december 2014 retired naval officer oil executive horace edwards kansas filed suit film producers behalf american people aiding abetting snowden leaks hollywood reporter provided legal analysis noting observers opining edwards may legal standing pursue lawsuit edwards also challenged film oscar eligibility grounds poitras 2013 short film showing greenwald interviewing snowden constituted previous release citizenfour rendering ineligible oscar rules academy rejected claim noting guardian interview appears less two minutes documentary ruled citizenfour eligible oscar consideration february 2015 filmmakers asked u.s. district court district kansas dismiss lawsuit standing jurisdictional grounds first amendment grounds citing bartnicki v. vopper edwards officially dropped case april 3 2015 dok leipzig 2014 citizenfour leipziger ring award edward snowden gave video message festival citizenfour 2015 academy award best documentary feature considered frontrunner heading awards brent lang variety called citizenfour receive nomination academy award best picture thr gregg kilday discussing prospects nominated category poitras also received several journalistic humanitarian awards reporting snowden disclosures depicted film including george polk award greenwald macaskill ridenhour truth-telling prize edward snowden carl von ossietzky medal human rights greenwald snowden henri nannen prize efforts independence press guardian washington post received pulitzer prize public service reporting poitras greenwald macaskill barton gellman poitras took many security precautions related film described military writer peter maass among others moved berlin germany detained repeatedly border controls entering us edited film germany flying directly hong kong snowden footage prevent fbi showing search warrant hard drives film footage kept encrypted drives multiple levels nested protection computer uses reading sensitive documents separated internet air gap greenwald credited complete expert level understanding story like total technical operational safety maass called poitras security skills particularly vital — far journalistic norm — era pervasive government spying quotes snowden stating n wake year disclosure clear unencrypted journalist-source communication unforgivably reckless bonnefoy also discussed encrypted workflow used making film adding conversation particularly confidential 'll move electronics room 'll meet somewhere outside editing room without phones film society lincoln center selects films new york film festival reported poitras changed location initial screening nyff selection committee several times case someone tracking movements committee shown rough cut sensitive material redacted nyff keep movie inclusion festival wraps mid-september kept festival schedules documents could talk openly last-minute inclusion festival main slate unprecedented event nyff tickets screenings sold within hours film ending credits unusually name several free software projects security tools without film would possible programs named include tor tails debian gnu/linux off-the-record messaging gnu privacy guard truecrypt securedrop october 2014 electronic frontier foundation published informational page software credited film november 2015 poitras prominently featured tor fund-raising campaign soundtrack consists portions nine inch nails album ghosts i–iv released creative commons license by-nc-sa 2008
[ 2050, 8356, 3495, 6344, 7887, 208, 4595, 7893, 2906, 8574, 959 ]
None
10,698
5
ARPA_Host_Name_Server_Protocol:arpa host name server protocol arpa host name server protocol nameserver obsolete network protocol used translating host name internet address iana transmission control protocol tcp user datagram protocol udp port 42 nameserver port commonly used windows internet name service wins microsoft operating systems nameserver protocol used darpa trivial name server server process called tnamed provided implementations unix support nameserver protocol deprecated may available latest implementations unix operating systems domain name system dns replaced arpa host name server protocol darpa trivial name server
[ 9665, 4423, 2887, 6412, 10924, 6993, 4051, 2996, 5492, 11413, 7806, 3487 ]
Test
10,699
1
Database_engine_tuning_advisor:database engine tuning advisor database engine tuning advisor deta computer software tool microsoft sql server enables database tuning improve performance query tuning indexes creating modifying deleting partition indexes configured enabled online offline tuning
[ 10505, 11030 ]
Test
10,700
1
Windows_Azure_Caching:windows azure caching windows azure caching in-memory distributed caching feature designed windows azure applications caching available part windows azure sdk azure managed cache in-role cache services retired microsoft recommended migration azure redis cache windows azure caching allows cloud service host caching windows azure role cache distributed across running instances role therefore amount available memory cache determined number running instances role hosts caching amount physical memory reserved caching instance two deployment topologies caching dedicated topology define worker role dedicated caching means worker role available memory used caching operating overhead following diagram shows caching dedicated topology cloud service shown three roles web1 worker1 cache1 two running instances role example cache distributed across instances dedicated cache1 role dedicated topology advantage scaling caching tier independently role cloud service best caching performance dedicated topology recommended role instances share resources application code services co-located topology use percentage available memory existing web worker roles caching following diagram shows caching co-located topology cloud service two roles web1 worker1 two running instances role example cache distributed across instances web1 role role also hosts web front-end cloud service cache configured use percentage physical memory instance web1 role co-located cache cost-effective way make use existing memory role within cloud service following sections show windows azure caching configuration code examples visual studio caching configured caching tab properties role hosts caching makes underlying changes serviceconfiguration.cscfg file settings determine topology used dedicated co-located number named caches settings roles must configured use caching one way nuget package includes modifying web.config contain properly configured datacacheclients section following example datacacheclients section specifies role hosts caching named “ cacheworker1 ” datacacheclients /datacacheclients note code samples section shown c hosting caching roles datacache class constructor used specify named cache datacacheclient section cache client settings following code shows create named cache namedcache2 using settings datacacheclient section named customclient datacache cache new datacache namedcache2 customclient following method shows use cache object retrieve data cache example user identifier userid key associated user information object code first attempts get user information cache using userid key succeed code retrieves information database query stores returned user data cache next time code run user information returned cache rather database assumes cached data expired evicted datatype getuserdata string userid following method shows update data already cache void updateuserdata string userid datatype data following call removes item cache cache.remove userid windows azure shared caching provides caching managed service unlike co-located dedicated topologies cache hosted windows azure roles single cloud service deployment instead cache provided multitenant service usage quotas service divided tiers range 128 mb 4 gb addition storage capacity tier provides increasing processor network capabilities shared caching provides way multiple cloud services access cache windows azure caching roots on-premises technology appfabric originally released one several windows azure appfabric services appfabric designation windows azure since abandoned many assembly names namespaces apis identical windows azure caching appfabric caching first release caching windows azure april 2011 provided caching managed service windows azure offering called shared caching october 2012 support added hosting caching roles within cloud service deployment called windows azure caching windows azure caching related microsoft caching technologies technologies share similar features assembly name namespace types however differences table describes technologies
[ 2401, 4194, 10700, 860 ]
None
10,701
7
OpenEMIS:openemis openemis open education management information system emis education management information system education sector main purpose collect analyze report data related management educational activities initially conceived unesco openemis serves response member states ’ need area tools educational strategic planning ‘ open ’ refers software open-source gnu gpl available royalty-free member states unesco openemis initiative launched unesco initiative line unesco effort promote emis address issues access equity quality relevance education subsequent gaps member states providing adequate decision support system since early 2000s keeping education goals adopted dakar 2000 openemis conceived royalty-free software customized meet specific needs implementing countries without conditions restrictions use purpose encouraging country-level capacity development helping countries upgrade local skills managing tool initiative coordinated unesco partnership nonprofit organization npo community systems foundation csf implementation technical support since 2012 openemis suite interrelated software solutions supports data collection survey classroom staffroom management core school integrator analysis visualizer monitoring dashboard analyzer datamanager profiles application designed provide unique standalone features support different information management requirements different levels features could customized integrated existing systems open-source solutions openemis benefits coding contributions larger community openemis initiative utilizes end-user license agreements contributor license agreements ensure maintenance standards quality assurance product remains free commercialization openemis implemented following countries nearly cases ministry education central implementation support engagement wide range stakeholders support available implementing countries aspects country implementation technical support team support activities include services policy planning analysis implementation custom software development training others needed system set may involve cost additional technical support setup configuration migration capacity building
[ 8644, 7980, 7983 ]
Test
10,702
4
Anti-hijack_system:anti-hijack system anti-hijack system electronic system fitted motor vehicles detect criminals hijacking although types systems becoming common newer cars caused decrease insurance premiums widely known common anti-theft systems alarms steering locks also part alarm immobiliser system approved anti-hijacking system achieve safe quick shutdown vehicle attached also mechanical anti-hijack devices company south africa diversify solutions announced research development nelson mandela university gsm based anti hijacking system system works verification process added features alcohol sensors signal jamming capabilities comes incresasing rates hijackings south africa alarming rates accidents caused driving influence texting whilst driving three basic principles systems work lockout system armed driver turns ignition key position carries specified action usually flicking hidden switch depressing brake pedal twice activated vehicle drops certain speed becomes stationary cause vehicles doors automatically lock prevent thieves stealing vehicle stopped example traffic light pedestrian crossing transponder system system always armed device usually small rfid transponder enters vehicle transmitter radius since device carried driver usually wallet pocket driver leaves immediate vicinity vehicle transponder causing system assume vehicle hijacked disable transponder concealed thief would aware system active vehicle ejected driver moved vehicle range driver usually couple meters probably common anti-hijack system central locking system uses concept demonstrated jeremy clarkson old episode bbc top gear program teased butler asking put bags mercedes-benz s600 n't give rfid transponder butler confused s600 doors would n't open tried jeremy approached transponder pocket system acknowledged unlocked car allowing jeremy simply pull door handle gain entry vehicle microswitch system always armed usually activated one vehicle doors opened closed vehicle engine running system activated driver set time limit disarm entering code vehicle takes measures system disarmed time window warn driver sounding vehicle horn every 10 seconds 30 seconds point system start sounding horn much shorter intervals usually activate vehicle hazard lights point immobiliser circuit also start rapidly pulsing 40 seconds completely disabling engine eventually bringing vehicle stop thief switches ignition position back position horn restart operate constantly hazard lights flash 60 seconds immobiliser circuit close 15 seconds rapidly pulse 15 seconds re-opening circuit allowing vehicle driven safe location immobilised hazard lights continue flash every subsequent attempt start vehicle cause horn operate 30 seconds immobilizer circuit open vehicle start hazard lights keep flashing vehicle battery drained system disarmed blocks steering shaft rotation prevent rotation steering wheel set mechanical anti-hijack device wheels turn car travel straight forward backward side back forth installing mechanical anti-hijack device lock wheels turn go car established mechanical anti-hijack device possible information photo mechanicals anti-hijack devices cars
[]
None
10,703
9
Intermediate_representation:intermediate representation intermediate representation ir data structure code used internally compiler virtual machine represent source code ir designed conducive processing optimization translation good ir must accurate – capable representing source code without loss information – independent particular source target language ir may take one several forms in-memory data structure special tuple- stack-based code readable program latter case also called intermediate language canonical example found modern compilers linear human-readable text representing program transformed intermediate graph structure allows flow analysis re-arrangement creating sequence actual cpu instructions use intermediate representation allows compiler systems like gnu compiler collection llvm used many different source languages generate code many different target architectures intermediate language language abstract machine designed aid analysis computer programs term comes use compilers source code program translated form suitable code-improving transformations used generate object machine code target machine design intermediate language typically differs practical machine language three fundamental ways popular format intermediate languages three-address code term also used refer languages used intermediates high-level programming languages output object machine code output intermediate language intermediate language submitted compiler language outputs finished object machine code usually done ease process optimization increase portability using intermediate language compilers many processors operating systems c. languages used fall complexity high-level languages low-level languages assembly languages though explicitly designed intermediate language c nature abstraction assembly ubiquity de facto system language unix-like operating systems made popular intermediate language eiffel sather esterel dialects lisp lush gambit haskell glasgow haskell compiler squeak smalltalk-subset slang cython seed7 systemtap vala others make use c intermediate language variants c designed provide c features portable assembly language including c -- c intermediate language language targeting virtual machine p-code machine considered intermediate language gnu compiler collection gcc uses several intermediate languages internally simplify portability cross-compilation among languages llvm compiler framework based llvm ir intermediate language compact binary serialized representation also referred bitcode productized apple iloc intermediate language used classes compiler design simple target language static analysis tools often use intermediate representation instance radare2 toolbox binary files analysis reverse-engineering uses intermediate languages esil et reil analyze binary files
[ 1409, 4865, 7173, 3462, 4998, 2440, 3085, 3854, 4112, 5395, 11411, 5397, 2582, 10395, 10012, 10013, 7326, 1952, 8609, 5154, 3876, 6821, 7462, 8868, 7978, 10284, 814, 5679, 4656, 6965, 9911, 2105, 3386, 2620, 7486, 9152, 5826, 8644, 1349, ...
Test
10,704
2
KIDO'Z:kido z kidoz content discovery network designed children platform based upon sophisticated coppa compliant machine learning technology platform analyses big data knows recommend relevant content every kid based usage behaviour kidoz offer several solutions stand-alone state-of-the-art child mode app allows children explore world wide web full array mobile tablet devices safely parents may download app free google play store begin empower children explore interests independently safely https //play.google.com/store/apps/details id=com.kidoz password-protected parental control account parents set account parameters features account security enhancement content customisation tools tools addition new content kidoz businesses provides kid developers publishers sdk/js integrate within property begin monetizing safely easily kid-friendly recommendation widget creates engagement users offering free videos games apps discover enjoy advertisers may promote children content network get exposed millions targeted kids enjoy high conversion rates positive brand engagement system designed platform user-generated content content moderated approved moderation team allowed system blocks links scripts attempts lead sites content approved system internally developed around termed smart content engine filters individualizes content users based certain variables age gender languages kidoz came beta testing phase may 2009 v1.0 available 30 languages english german chinese traditional chinese simplified french greek italian japanese korean portuguese russian spanish czech dutch swedish turkish polish kidoz available free download maker website current categories websites videos games children disclosed future freemium versions include additional features premium model offering certain specialized features small monthly fee kidoz kid web environment operating system developed kido z ltd israeli start-up based tel aviv ceo gai havkin kidoz currently follows freemium model application available free download website future versions include additional features e-mail instant messaging closed network revealed next months kido ’ z launch premium package offer additional tools services content
[]
Validation
10,705
4
Microsoft_Network_Monitor:microsoft network monitor microsoft network monitor deprecated packet analyzer enables capturing viewing analyzing network data deciphering network protocols used troubleshoot network problems applications network microsoft network monitor 1.0 codenamed bloodhound originally designed developed raymond patch transport protocol network adapter device driver engineer microsoft lan manager development team network monitor replaced microsoft message analyzer lan manager development team one shared hardware-based analyzer time netmon conceived hardware analyzer taken test reproduce networking bug first windows prototype coded christmas holiday first 4 bytes netmon capture file format used validate file values 'rtss ray tom steve steve first four members team code originally written os/2 user interface symbol placed device driver packet buffers kept received data could dumped hex within kernel debugger netmon caused bit stir microsoft since networks e-mail encrypted time software engineers access hardware analyzers due cost netmon many engineers around company access network traffic free request microsoft two simple identification features added non-cryptographic password identification protocol named bloodhound-oriented network entity bone created named raymond patch play codename bloodhound network monitor 3 complete overhaul earlier network monitor 2.x version originally versions network monitor available microsoft products systems management server sms fully featured product public parsers available free download microsoft network monitor superseded microsoft message analyzer key features network monitor 3.4 include following
[ 9440, 10788, 1064, 6345, 842, 6797, 7983, 3250, 9939, 6997, 11221 ]
Test
10,706
3
Runahead:runahead runahead technique allows microprocessor pre-process instructions cache miss cycles instead stalling pre-processed instructions used generate instruction data stream prefetches detecting cache misses would otherwise occur using idle execution resources calculate instruction data stream fetch addresses using available information independent cache miss principal hardware cost means checkpointing register file state preventing pre-processed stores modifying memory checkpointing accomplished using little hardware since results computed runahead discarded cache miss serviced time normal execution resumes using checkpointed register file state branch outcomes computed runahead mode saved shift register used highly accurate branch predictor normal operation resumes runahead initially investigated context in-order microprocessor however technique extended use order microprocessors runahead processor detects level one instruction data cache miss records instruction address faulting access enters runahead mode demand fetch missing instruction data cache line generated necessary processor checkpoints register file one several mechanisms discussed later state memory hierarchy checkpointed disabling stores store instructions allowed compute addresses check hit allowed write memory value returned cache miss known ahead time possible pre-processed instructions dependent upon invalid data denoted adding invalid inv bit every register register file runahead initiated load instruction load destination register marked inv processor continues execute instructions miss however results strictly temporary used attempt generate additional load store instruction cache misses turned prefetches designer opt allow runahead skip instructions present instruction cache understanding quality prefetches generated reduced since effect missing instructions unknown registers target instruction one source registers marked inv marked inv allows processor know register values reasonably trusted runahead mode branch instructions resolved due inv sources simply assumed direction predicted correctly branch outcomes saved shift register later use highly accurate predictions normal operation note possible perfectly track inv register values runahead mode required since runahead used optimize performance results computed runahead mode discarded fact impossible perfectly track invalid register values runahead initiated instruction cache miss instruction cache miss occurred runahead load dependent upon store inv address assumes hardware present allow store load forwarding runahead branch outcome runahead dependent upon inv register register file state restored checkpoint processor redirected original faulting fetch address fetch initiated runahead mode serviced obvious method checkpointing register file rf simply perform flash copy shadow register file backup register file brf processor enters runahead mode perform flash copy brf rf normal operation resumes simpler options available one way eliminate flash copy operations write brf rf normal operation read rf normal operation read/write brf runahead mode even aggressive approach eliminate brf rely upon forwarding paths provide modified values runahead mode checkpointing accomplished disabling register file writes modified values runahead mode provided forwarding paths
[ 2113, 7142, 3175, 8231, 1801, 6926, 10734, 2066, 2226, 8447 ]
None
10,707
4
Shnakule:shnakule shnakule biggest malware network existence averages 2000 hosts many 4357 targets users visiting trusted sites routes malware using relays exploits payload servers continually shifted new domains
[ 7515 ]
Train
10,708
4
Trend_Micro_Internet_Security:trend micro internet security trend micro internet security known pc-cillin internet security australia virus buster japan antivirus online security program developed trend micro consumer market according nss lab comparative analysis software products market 2014 trend micro internet security fastest responding new internet threats addition anti-malware web threat protection premium version software includes compatibility pcs macs android ios mobile devices parental controls identity theft prevention privacy scanner major social networking sites 25 gb cloud storage features trend micro internet security 2015 include software also includes trend micro premium security includes additional features including av-comparatives awarded trend micro three-star advanced rating–the highest ranking given organization–in av-comparatives ’ whole product dynamic “ real-world ” protection test 2014 av-test october 2014 gave trend micro internet security 2015 score 17 possible 18 points trend micro maximum security scored highest success rate blocking malware downloads nss labs ’ 2014 consumer endpoint protection test focused socially engineered malware results based continuous series tests determine participants ’ effectiveness socially engineered malware nss labs independent network testing facility security consultancy organization nss labs also found trend micro quickest time adding protection unknown threats less 15 minutes january 2016 discovered consumer version trend micro av allowed website visited users execute arbitrary code read browser passwords windows pc purportedly protected patch later issued close issue june 2014 av-test published results mobile security endurance tests assessed 30 apps six-month period trend micro ’ mobile security tied highest overall score 13 13 points previous versions include january 2015 trend micro supported trend micro internet security versions 19/2011 higher pc-cillin 2000 earlier versions virus scanners without additional features pc-cillin 2002 2003 stand-alone virus scanners also included firewall component improved software ’ scanning virus detection engine newer versions trend micro internet security offer additional features spyware protection antispam integrated firewall along improved scanning virus detection engine enhanced heuristics pc-cillin 2003 last stand-alone antivirus product offered trend micro 2007 company released standalone anti-malware product offered protection malicious software including viruses spyware adware
[ 2049, 2563, 1052, 550, 10790, 2601, 6699, 8753, 569, 5178, 7739, 9279, 9791, 10308, 2118, 2654, 8816, 10872, 9341, 127, 7809, 131, 6797, 1172, 156, 2721, 2213, 6823, 3243, 1708, 6834, 704, 10433, 7362, 202, 4814, 9423, 10451, 1242, 6364, ...
Validation
10,709
4
Bulk_personal_datasets:bulk personal datasets bulk personal datasets uk government euphemism datasets containing personally identifiable information large number individuals part mass surveillance united kingdom citizens around world term first used publicly march 2015 intelligence security committee parliament subject significant controversy uk government departments programmes utilising bulk personal datasets one care.data programme department health national health service health bulk personal datasets created by-product providing direct care judicial body oversees intelligence services united kingdom investigatory powers tribunal ruled legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance special report published intelligence security committee parliament also came view although found past shortcomings oversight said legal framework simplified improve transparency view supported independent reports interception communications commissioner however notable campaign groups broadsheet newspapers continue express strong views contrary others criticised viewpoints turn
[ 6344, 4595, 2901 ]
Validation
10,710
7
Velocify:velocify velocify inc. cloud computing company headquartered el segundo california provides cloud-based intelligent sales automation software designed fast-paced sales environments velocify co-founded 2004 jeff solomon charles chase tony christopoulos company specializing software service saas company raised 3.25m series funding october 2007 rustic canyon partners initial investor may 2011 velocify named nick hedges president chief executive officer 2011 2012 nick hedges named one “ 50 influential sales lead management ” sales lead management association february 2012 velocify completed 15 million series b fundraising round led volition capital participation existing investor rustic canyon partners november 2012 velocify became marketo solution partner company announced changed name velocify leads360 june 19 2013 reflect solutions become vision future october 2017 velocify acquired ellie mae inc. leading cloud-based platform mortgage finance industry velocify offers two products sales automation solution- leadmanager integrated cloud-based dialing solution dial-iq august 2014 company released velocify salesforce offers sales automation dialing solutions within cloud-based crm platform
[ 3969, 10756, 9771, 877, 1970, 467, 7515, 3320, 2041, 2075, 10392 ]
Test
10,711
4
Glossary_of_backup_terms:glossary backup terms subject computer backups rife jargon highly specialized terminology page glossary backup terms aims clarify meaning jargon terminology backup policy backup rotation scheme backup site backup software backup window copy backup daily backup data salvaging/recovery differential backup disaster recovery disk cloning disk image full backup hot backup incremental backup media spanning multiplexing multistreaming normal backup near store open file backup remote store restore time retention time site-to-site backup synthetic backup tape library trusted paper key virtual tape library vtl
[ 9025, 3366, 1801, 4170, 3692, 1358, 6286, 9134, 2322, 6514, 11157, 11581 ]
None
10,712
9
EuLisp:eulisp eulisp statically dynamically scoped lisp dialect developed loose formation industrial academic lisp users developers around europe standardizers intended create new lisp less encumbered past compared common lisp minimalist scheme another objective integrate object-oriented programming paradigm well third-generation programming language language definition process first began meeting 1985 paris took several years complete specification first implementation interpreted-only available 1990 main traits lisp-1 separate function variable namespaces common lisp object system clos style generic-function type object-oriented system named eulisp object system telos integrated ground built-in module system defined layers promote use lisp small embedded hardware educational machines supports continuations though powerfully scheme simple lightweight process mechanism threads early implementation eulisp free eventually eulisp feel successor feel youtoo interpreted compiled versions university bath united kingdom interpreter basic level eulisp level-0 written russell bradford xscheme implementation scheme david michael betz originally named euschemeeuscheme recent version renamed euxlisp avoid confusion also eu2c eulisp optimizing compiler created fraunhofer isst apply project germany dialect eulisp developed named plural eulisp eulisp parallel computing programming extensions example use classes algorithm solve towers hanoi problem
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 2585, 4122, 4633, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 1613, 9299, 10841, 3675, 11361, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 9877, 5803, 2225, 6840, 7867, 4799, ...
Test
10,713
8
SEMrush:semrush semrush software service saas company based boston sells online visibility marketing analytics software subscriptions founded oleg shchegolev dmitry melnikov seo tool browser extension adopting saas model software provides intelligence data including website traffic information keywords projected adwords spend site audit topic research lead generation seo-related data company customers include ebay quora booking.com hewlett packard enterprise bnp paribas oleg shchegolev dmitry melnikov started seo enthusiasts interested industry developments new technologies wanted build tool could identify market trends best industry practices sharing first findings friends local influencers people curious started using daily word mouth tool started increasing popularity community influencers grew result software first launched seodigger launched firefox extension subsequently renamed seoquake company 2007 eventually semrush 400 employees offices boston philadelphia czech republic cyprus russia 2016 reached milestone 1,000,000 users clients 100 countries april 2018 company received 40m usd funding round co-led venture capital firms greycroft e.ventures siguler guff expansion various search platforms including owned amazon microsoft baidu
[ 1638, 3688, 8639, 467, 5524, 5078, 8921, 735 ]
Validation
10,714
2
BeeSafe:beesafe beesafe personal safety mobile app launched 2015 slovak startup location-based next generation security service notifies family members friends case user app gets danger app received numerous awards app 700 downloads 250 active logins 60 countries worldwide beesafe founded march 20 2015 peter stražovec michal kačerík project winner žilina ’ startup weekend 2013 startupawards.sk 2015 finalist later app released android ios marketplace whole beesafe project spot booster incubator bratislava three months beesafe entered agreement city piešťany november 2015 increase security citizen connecting mobile app police platform first city started using beesafe platform application tries help people slovak cities cities see users danger beesafe next generation corporate personal emergency app tracking application neither panic button application user ’ press panic button process help call fully automated beesafe app includes silent alarm system system trigger alarm notify user ’ family friends security service police user dangerous situation available android apple smartphones smart devices b beesafe app received via bona award winner slovak startup nominations
[ 7983 ]
Test
10,715
3
Mini-ITX:mini-itx mini-itx motherboard developed via technologies 2001 commonly used small-configured computer systems originally niche product designed fan-less cooling low power consumption architecture made useful home theater pc systems fan noise detract cinema experience four mounting holes mini-itx board line four holes atx-specification motherboards locations backplate expansion slot though one holes used optional earlier versions atx spec mini-itx boards therefore often used cases designed atx micro-atx atx variants desired design provides one expansion slot earlier motherboards conventionally standard 33 mhz 5v 32-bit pci slot many older case designs use riser cards even two-slot riser cards although two-slot riser cards compatible boards boards based around non-x86 processors 3.3v pci slot mini-itx 2.0 2008 boards pci-express ×16 slot boards compatible standard pci riser cards supplied older itx cases march 2001 chipset manufacturer via technologies released reference design itx motherboard promote low power c3 processor bought centaur technology combination chipsets designed robert kuo via chief r expert 215×191 mm vt6009 itx reference board demonstrated information pc set-top box configurations later designed mini-itx specification point manufacturers took itx design shuttle jetway etc produced many itx based cube computers manufactures instead produced smaller boards based similar 229×191 mm flexatx configuration october 2001 via announced decision create new motherboard division provide standardized infrastructure lower-cost pc iterations focus embedded devices result november 2001 release vt6010 mini-itx reference design touted information pc low cost entry level x86 computing platform manufacturers still reluctant customer response much receptive via decided manufacture sell boards april 2002 first mini-itx motherboards—via epia 5000 fanless 533 mhz eden processor epia 800 800 mhz c3 —were sold industrial customers enthusiasts soon noticed advantages small size low noise power consumption started push boundaries case modding something else—building computers nearly every object imaginable sometimes even creating new cases altogether hollowed vintage computers humidors toys electronics musical instruments even 1960s-era toaster become homes relatively quiet even silent mini-itx systems capable many tasks modern desktop pc mini-itx boards primarily appeal industrial embedded pc markets majority sold bulk components integrated finished system single-purpose computing applications produced much longer sales life-cycle consumer boards original epias still available quality industrial users typically require manufacturers prototype using standard cases power supplies build enclosures volumes get high enough typical applications include playing music supermarkets powering self-service kiosks driving content digital displays via continues expand mini-itx motherboard line earlier generations included original pl133 chipset boards dubbed classic boards cle266 chipset boards adding mpeg-2 acceleration cn400 boards added mpeg-4 acceleration second generation boards featured epia mii cl pd tc ms — tailored slightly different markets legacy via boards use x86-compatible cpus — c3 c7 low-power eden variants newer boards featuring via nano cpu launched may 2008 manufacturers also produced boards designed around layout using via also intel amd transmeta powerpc technology intel introduced line mini-itx boards atom cpu demonstrates significant increase processing performance without added power consumption older via c3 c7 offerings helps make design viable personal computers manufacturers saw potential design followed suit even limiting atom evidenced zotac geforce 9300-itx board supports core 2 duo cpus fsb frequencies 1333 mhz two separate-channeled 800 mhz memory slots fully functional pci express 2.0 x16 slot could connect sli onboard video new wave offerings made mini-itx much popular among home users hobbyists even overclockers intel currently one mini-itx mainboard manufacturers list mechanical dimensions manuals number manufacturers released mini-itx motherboards feature embedded cpus often mobile low-tdp versions processors designed draw minimal power resulting lower tdp ideal fanless passively cooled configurations embedded applications starting lga 775 socketed intel mini-itx motherboards released intel zotac followed lga 1156 motherboards starting lga 1155 mini-itx motherboards started become mainstream many different manufacturers releasing products partly almost sandy bridge ivy bridge intel celeron pentium core series cpus integrated processor graphics eliminating need motherboard graphics discrete graphics cards trend continues lga 1150 lga 1151 cpus due limitations mini-itx design physical size lga 2011 socket mini-itx motherboards socket support single pci express expansion slot require using narrow-ilm version lga 2011 socket despite manufacturers released lga 2011 based mini-itx motherboards also mini-itx motherboards lga 2066 socket released four sodimm slots number manufacturers released several socketed amd mini-itx motherboards supporting socket am2 socket am2+ socket am3 socket fm1 socket fm2 socket fm2+ socket am1 socket am4 cpus socket am2+ am3 itx motherboards integrated motherboard graphics discrete graphics processor integrated graphics required platforms mini-itx motherboards integrated amd cpus also released motherboards often use mobile cpus passive cooling feature powerful integrated graphics compared intel counterparts makes suitable htpc ibase made first transmeta-based mini-itx motherboard mb860 board uses transmeta™ efficeon™ processors run 1.2 ghz supports sodimm ddr modules capacities 1 gb onboard 16 mb ati m7 graphics controller supports 3d games graphical intensive programs provides four usb 2.0 ports realtek 8100c 10/100mbit/s baset ethernet optional 8110s gigabit ethernet controller first powerpc motherboards produced eyetech 2005 stopped activity 2005 company acube systems made new board sam440ep primarily amigaos market cadia networks developed mini itx arm board comes arm cortex-a8 freescale i.mx53 series cpu according official website board offers ultra-low power soc variety i/o os support android linux2.6 windows embedded compact 7 kontron also developed mini itx arm board according website features arm cortex-a9 quad core 900mhz processor neon technology nvidia graphics processor 2 gb ram targeted power consumption 7w entire board appliedmicro offers xc-1 server development platform motherboard uses x-gene armv8 system chip 8 2.4 ghz cpu cores supports 128 gb ddr3 dram using 16 gb dimms baseboard management controller mini-itx standard define standard computer power supply though suggests possible options conventionally mini-itx boards use 20- 24-pin original atx power connector usually connected dc-dc converter board connects external power adapter generally vendors provide power adapter dc-dc board case boards built dc-dc converters converters also made plug directly atx connector e.g picopsu either options avoids need mount separate dc-dc converter case saving space design effort boards using full-power intel amd cpus typically use atx12v 2.x connections require case appropriate power supply cooling power-hungry chips defined atx specification power supplies atx12v connector separate 12 volts rail must idle 12 volts rail
[ 6804, 10260, 4886, 8855, 11417, 8730, 9122, 10019, 3883, 11183, 8627, 8629, 7105, 10945, 2500, 9157, 455, 7113, 8394, 3403, 7247, 5073, 9945, 6618, 9307, 3037, 2525, 10337, 4451, 5859, 8552, 1260, 4334, 7151, 10095, 2161, 499, 2803, 4217, ...
Validation
10,716
0
Babelfy:babelfy babelfy software algorithm disambiguation text written language specifically babelfy performs tasks multilingual word sense disambiguation i.e. disambiguation common nouns verbs adjectives adverbs entity linking i.e disambiguation mentions encyclopedic entities like people companies places etc. babelfy based babelnet multilingual semantic network performs disambiguation entity linking three steps result text written 271 languages supported babelnet output possibly overlapping semantic annotations
[ 1890, 396, 8262, 5778 ]
Test
10,717
4
ISACA:isaca isaca international professional association focused governance irs filings known information systems audit control association although isaca goes acronym isaca originated united states 1967 group individuals working auditing controls computer systems started become increasingly critical operations organizations identified need centralized source information guidance field 1969 stuart tyrnauer employee douglas aircraft company incorporated group edp auditors association edpaa tyrnauer served body founding chairman first three years 1976 association formed education foundation undertake large-scale research efforts expand knowledge value accorded fields governance control information technology association became information systems audit control association 1994 march 2016 isaca bought cmmi institute behind capability maturity model integration isaca currently serves 110,000 constituents members professionals holding isaca certifications 180 countries job titles members auditor consultant educator security professional regulator chief information officer chief information security officer internal auditor work nearly industry categories network isaca chapters 200 chapters established 80 countries chapters provide education resource sharing advocacy networking benefits csx-p isaca first cybersecurity certification introduced summer 2015 one certifications require individual work live environment real problems obtain certification specifically exam puts test takers live network real incident taking place student efforts respond incident fix problem results type score awarded
[ 5636, 9607, 7692, 5752, 2190, 399, 8462, 5010, 11159, 3994, 10398, 1312, 11567, 10940, 5699, 10307, 1479, 4936, 1493, 3552, 357, 3447, 6648, 5373 ]
Validation
10,718
4
Information_Technology_Security_Assessment:information technology security assessment information technology security assessment security assessment explicit study locate security vulnerabilities risks assessment assessor full cooperation organization assessed organization grants access facilities provides network access outlines detailed information network etc parties understand goal study security identify improvements secure systems assessment security potentially useful security tests goal security assessment also known security audit security review network assessment ensure necessary security controls integrated design implementation project properly completed security assessment provide documentation outlining security gaps project design approved corporate security policies management address security gaps three ways management decide cancel project allocate necessary resources correct security gaps accept risk based informed risk reward analysis following methodology outline put forward effective means conducting security assessment security assessment report include following information security risk assessments like many risk assessments actually quantitative represent risk actuarially-sound manner measuring risk quantitatively significant impact prioritizing risks getting investment approval quantitative risk analysis applied security major us government study 2000 federal cio council commissioned study 100 million security investment department veterans affairs results shown quantitatively united states department veterans affairs common vendor-neutral professional certifications performing security assessment casas iii victoriano 2006 information security risk assessment model public university administrators applied research project texas state university http //ecommons.txstate.edu/arp/109/
[ 10307, 5636, 3887, 1907, 7989, 7352, 2558 ]
Validation
10,719
7
Apache_Ambari:apache ambari apache ambari software project apache software foundation ambari enables system administrators provision manage monitor hadoop cluster also integrate hadoop existing enterprise infrastructure ambari sub-project hadoop top-level project right ambari used companies including ibm hortonworks cardinal health ebay expedia kayak.com lending club neustar macy pandora radio samsung shutterfly spotify
[ 3462, 10377, 8460, 7567, 1296, 6161, 1047, 8217, 11161, 6555, 8860, 3877, 10661, 11303, 5677, 1327, 7983, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 4944, 1363, 5332, 8408, 9179, ...
Train
10,720
9
Speedcoding:speedcoding speedcoding speedcode first high-level programming language created ibm computer language developed john backus 1953 ibm 701 support computation floating point numbers high level means symbolic aiming natural language expressivity goal opposed machine hardware instruction oriented coding idea arose difficulty programming ibm ssec machine backus hired calculate astronomical positions early 1950 speedcoding system interpreter focused ease use expense system resources provided pseudo-instructions common mathematical functions logarithms exponentiation trigonometric operations resident software analyzed pseudo-instructions one one called appropriate subroutine speedcoding also first implementation decimal input/output operations although substantially reduced effort writing many jobs running time program written help speedcoding usually ten twenty times machine code interpreter took 310 memory words 30 memory available 701
[ 477, 9345, 7076, 9804, 9330, 3960, 8502, 1976, 7421, 3323, 2045 ]
Test
10,721
7
Nordic_Data_Grid_Facility:nordic data grid facility nordic data grid facility ndgf common e-science infrastructure provided nordic countries denmark finland norway sweden iceland scientific computing data storage first far internationally distributed wlcg tier1 center providing computing storage services experiments cern nordic data grid facility traces history back end-2001 intrinsically related nordugrid project success latter indicated need larger pan-nordic facility storage resources high priority need addressed establishing pilot ndgf infrastructure operational 2002-2005 provided distributed storage addition nordugrid computing resources phase ndgf committed provide nordic tier1 regional computing center worldwide lhc computing grid project cern specifics tier1 internationally distributed facility nordic data grid facility present function provider nordic grid infrastructure established april 2006 nordic research councils came operation june 1 2006 initial priority live original commitment establishing nordic tier1 traditional focus storage facilities ndgf team includes software experts take part various grid middleware development 2012 ndgf became part wider initiative nordic e-infrastructure collaboration ndgf tier1 production grid facility leverages existing national computational resources grid infrastructures qualify support research groups form virtual organization vo vo provides compute resources sharing ndgf tier1 operates grid interface sharing resources currently computational resources ndgf tier1 accessible arc middleware resources also available via alien software distributed storage facility realised dcache storage management solution today dominant user community ndgf tier1 high energy physics alice atlas cms virtual organizations operation nordic tier1 together tier0 cern 12 tier1s collects stores processes data produced large hadron collider cern since 2010 ndgf tier1 part european grid infrastructure ndgf tier1 hosted nordunet 2006-2011 since 2012 hosted nordforsk many confuse ndgf nordugrid surprising especially since second phase ndgf proposed assume name nordugrid however decided distinguish mostly development-oriented project nordugrid mostly operations-oriented one ndgf rule thumb ndgf provides mostly services nordugrid provides mostly arc middleware
[ 2129, 11658, 5956, 198 ]
None
10,722
5
Netscape_Navigator_9:netscape navigator 9 netscape navigator 9 discontinued web browser produced netscape communications division parent aol first announced january 23 2007 ninth major release netscape line browsers aol outsourced development netscape browser 8 mercurial communications 2004 netscape navigator 9 marked first netscape browser produced in-house since netscape 7 suite also saw return classic navigator name previously used netscape heyday versions 1.0 4.08 1990s netscape navigator 9 based mozilla firefox 2.0 program first beta released june 5 2007 beta 2 july 12 beta 3 august 16 release candidate final release issued october 15 2007 december 28 2007 netscape developers announced aol would discontinue web browser february 1 2008 january 28 2008 netscape revised date march 1 2008 offered support migration flock mozilla firefox last web browser netscape series beta releases netscape navigator 9 included enhanced newsfeed support integrated netscape.com internet portal including enhanced methods discussion submission voting web pages however starting netscape navigator 9 beta 3 netscape.com integration optional certain aspects integration could manually enabled disabled integration totally removed navigator 9.0rc1 portal relaunched propeller user interface program also updated theme also later released use mozilla firefox like netscape version 8.x navigator 9 based upon mozilla firefox time version 2.0 full support firefox add-ons plugins netscape providing netscape also released features extensions firefox including site mail notifier friends activity sidebar digg tracker well netstripe new default theme netscape 9 browser also included url self-correction corrected common url misspellings improved ftp listing interface dedicated news menu integration netscape.com news portal quick link pad also included web pages could quickly added pad later viewing without adding bookmark lists navigator 9 also sees browser return multi-platform support across windows linux mac os x. netscape signature splash screen also reappeared release candidate final program unlike netscape 8 browser use internet explorer trident layout engine alternative engine option netscape navigator include newsgroup instant messaging email clients netscape 6 7 netscape however plan produce companion email client complement navigator confirmed netscape messenger 9 software development netscape advised users use netscape 7 series suites includes email client alongside navigator 9 browsing purposes new verse 8:20 easter egg book mozilla written release netscape 9 consisting thus creator looked upon beast reborn saw good could reference either re-development netscape in-house mozilla foundation contributors based user feedback netscape decided return splash screen navigator 9 september 10 2007 netscape decided give design team break let users submit idea splash screen look winning image would used splash screen final 9.0 release navigator designer would listed browser credits many designs submitted end mario herbert chosen winner design used final navigator 9 splash screen cnet download.com claimed navigator 9 neat components contained many tricks love backup browser previously used describe browser 8 bundled features version 8 removed
[ 6657, 9736, 2579, 6171, 2076, 9757, 7713, 3110, 10791, 9770, 559, 4661, 3639, 64, 9281, 5707, 10834, 5205, 6231, 8281, 6747, 4189, 6237, 106, 1642, 9834, 115, 9843, 3191, 4728, 637, 1664, 6791, 6797, 11418, 10910, 8351, 7340, 1713, 9908, ...
None
10,723
5
Reverse_Address_Resolution_Protocol:reverse address resolution protocol reverse address resolution protocol rarp obsolete computer networking protocol used client computer request internet protocol ipv4 address computer network available link layer hardware address mac address client broadcasts request need prior knowledge network topology identities servers capable fulfilling request rarp described internet engineering task force ietf publication rfc 903 rendered obsolete bootstrap protocol bootp modern dynamic host configuration protocol dhcp support much greater feature set rarp rarp requires one server hosts maintain database mappings link layer addresses respective protocol addresses media access control mac addresses need individually configured servers administrator rarp limited serving ip addresses reverse arp differs inverse address resolution protocol inarp described rfc 2390 designed obtain ip address associated local frame relay data link connection identifier inarp used ethernet although original uses rarp overcome different protocols modern day protocols use rarp examples cisco overlay transport virtualization otv rarp used update layer 2 forwarding tables mac address moves data centers
[ 10242, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 2509, 4687, 5843, 2904, 5469, 5470, 5471, 5472, 3297, ...
Test
10,724
0
Linguee:linguee linguee web service provides online dictionary number language pairs unlike similar services leo linguee incorporates search engine provides access large amounts bilingual sentence pairs found online translation aid linguee therefore differs machine translation services like babelfish similar function translation memory linguee uses specialized webcrawlers search internet appropriate bilingual texts divide parallel sentences paired sentences identified undergo automatic quality evaluation human-trained machine learning algorithm estimates quality translation user set number pairs using fuzzy search access ranking search results previous quality assurance compliance influenced search term users also rate translations manually machine learning system trained continuously addition serving bilingual web patent translated texts well eu parliament protocols laws european union eur-lex sources addition officially translated text eu sources french language service relies translated texts canadian government documents websites transcripts along canadian national institutions organisations often provide bilingual services according operator linguee offers access approximately 100 million translations concept behind linguee conceived fall 2007 former google employee dr. gereon frahling developed following year along leonard fink business idea recognized 2008 main prize competition founded federal ministry economics technology germany april 2009 web service available public linguee operated deepl gmbh formerly linguee gmbh based cologne august 2017 linguee team publicly announced launch deepl translator freely available translation service capable translating seven major european languages
[ 113, 6655 ]
Test
10,725
3
Qualcomm_Hexagon:qualcomm hexagon hexagon qdsp6 brand family 32-bit multi-threaded microarchitectures implementing instruction set digital signal processor dsp developed qualcomm according 2012 estimation qualcomm shipped 1.2 billion dsp cores inside system chip socs average 2.3 dsp core per soc 2011 year 1.5 billion cores planned 2012 making qdsp6 shipped architecture dsp ceva around 1 billion dsp cores shipped 2011 90 ip-licenseable dsp market hexagon architecture designed deliver performance low power variety applications features hardware assisted multithreading privilege levels long instruction word vliw single instruction multiple data simd instructions geared toward efficient signal processing cpu capable in-order dispatching 4 instructions packet 4 execution units every clock hardware multithreading implemented barrel temporal multithreading threads switched round-robin fashion cycle 600 mhz physical core presented three logical 200 mhz cores v5 hexagon v5 switched dynamic multithreading dmt thread switch l2 misses interrupt waiting special instructions hot chips 2013 qualcomm announced details hexagon 680 dsp qualcomm announced hexagon vector extensions hvx hvx designed allow significant compute workloads advanced imaging computer vision processed dsp instead cpu march 2015 qualcomm announced snapdragon neural processing engine sdk allow ai acceleration using cpu gpu hexagon dsp qualcomm snapdragon 855 contains 4th generation on-device ai engine includes hexagon 690 dsp hexagon tensor accelerator hta ai acceleration port linux hexagon runs hypervisor layer hexagon virtual machine merged 3.2 release kernel original hypervisor closed-source april 2013 minimal open-source hypervisor implementation qdsp6 v2 v3 hexagon minivm released qualcomm bsd-style license support hexagon added 3.1 release llvm tony linthicum hexagon/hvx v66 isa support added 8.0.0 release llvm also non-fsf maintained branch gcc binutils qualcomm hexagon dsps available qualcomm snapdragon soc since 2006 snapdragon s4 msm8960 newer three qdsp cores two modem subsystem one hexagon core multimedia subsystem modem cores programmed qualcomm multimedia core allowed programmed user also used femtocell processors qualcomm including fsm98xx fsm99xx fsm90xx march 2016 announced semiconductor company conexant audiosmart audio processing software integrated qualcomm hexagon six versions qdsp6 architecture released v1 2006 v2 2007–2008 v3 2009 v4 2010–2011 qdsp6 v5 2013 snapdragon 800 qdsp6 v6 2016 snapdragon 820 v4 20 dmips per milliwatt operating 500 mhz clock speed hexagon varies 400–2000 mhz qdsp6 256–350 mhz previous generation architecture qdsp5 hexagon qdsp6 pre-hexagon qdsp5 cores used modern qualcomm socs qdsp5 mostly low-end products modem qdsps often pre-hexagon shown table qdsp5 usage qdsp6 hexagon usage single instruction packet inner loop fft packet claimed qualcomm equal 29 classic risc operations includes vector add 4x 16-bit complex multiply operation hardware loop support instructions packet done cycle
[ 1377, 3457, 2339, 3911, 9863, 9911, 9932, 398, 6415, 6001, 5363, 10612, 823, 9913, 731, 5276, 4286 ]
Test
10,726
4
The_Tor_Project:tor project tor project inc. massachusetts-based 501 c 3 research-education nonprofit organization founded computer scientists roger dingledine nick mathewson five others tor project primarily responsible maintaining software tor anonymity network tor project founded computer scientists roger dingledine nick mathewson five others december 2006 electronic frontier foundation eff acted tor project fiscal sponsor early years early financial supporters tor project included u.s. international broadcasting bureau internews human rights watch university cambridge google netherlands-based stichting.net october 2014 tor project hired public relations firm thomson communications order improve public image particularly regarding terms dark net hidden services educate journalists technical aspects tor may 2015 tor project ended tor cloud service december 2015 tor project announced hired shari steele former executive director electronic frontier foundation new executive director roger dingledine acting interim executive director since may 2015 remained tor project director board member later month tor project announced open technology fund sponsoring bug bounty program coordinated hackerone program initially invite-only focus finding vulnerabilities specific tor project applications may 25 2016 core developer public face tor project jacob appelbaum stepped position announced june 2 two-line statement tor following days allegations sexual mistreatment made public several people june 4 shari steele executive director tor project published statement saying recent allegations sexual mistreatment regarding appelbaum consistent rumors us hearing time asserted ... recent allegations much serious concrete anything heard previously appelbaum denounced allegations part concerted strategy damage reputation july 13 2016 complete board tor project – meredith hoban dunn ian goldberg julius mittenzwei rabbi rob thomas wendy seltzer roger dingledine nick mathewson – replaced matt blaze cindy cohn gabriella coleman linus nordberg megan price bruce schneier july 2016 tor project announced results seven-week investigation led private investigator allegations jacob appelbaum determined accurate shari steele noted everything power treat mr. appelbaum fairly determined allegations appear true investigation concluded many people inside outside tor project reported incidents humiliated intimidated bullied frightened jacob appelbaum several experienced unwanted sexually aggressive behavior two unnamed individuals involved inappropriate behavior longer part project institutionally despite top-down management organization working volunteers employees organizations new anti-harassment policy approved new board well conflicts interest policy procedures submitting complaints internal complaint review process initially affair caused split wider still close-knit privacy community coming appelbaum defense others presenting even allegations affair continues controversial considerable dissent within tor community 80 tor project 2 million annual budget came united states government u.s. state department broadcasting board governors national science foundation major contributors aid democracy advocates authoritarian states swedish government organizations provided 20 including ngos thousands individual sponsors dingledine said united states department defense funds similar research grant procurement contract tor executive director andrew lewman said even though accepts funds u.s. federal government tor service collaborate nsa reveal identities users june 2016 tor project received award mozilla open source support program moss award significantly enhance tor network metrics infrastructure performance stability network monitored improvements made appropriate march 2011 tor project received free software foundation 2010 award projects social benefit citation read using free software tor enabled roughly 36 million people around world experience freedom access expression internet keeping control privacy anonymity network proved pivotal dissident movements iran recently egypt september 2012 tor project received 2012 eff pioneer award along jérémie zimmermann andrew huang november 2012 foreign policy magazine named dingledine mathewson syverson among top 100 global thinkers making web safe whistleblowers 2014 roger dingledine nick mathewson paul syverson received usenix test time award paper titled tor second-generation onion router published proceedings 13th usenix security symposium august 2004
[ 8640, 9762, 1315, 1764, 711, 8331, 9965, 82, 9240, 5085, 8671 ]
Validation
10,727
5
Finger_protocol:finger protocol computer networking name/finger protocol finger user information protocol simple network protocols exchange human-oriented status user information name/finger protocol based request comments document december 1977 interface codice_1 codice_2 programs provide status reports particular computer system particular person network sites finger program written 1971 les earnest created program solve need users wanted information users network information logged-in useful check availability person meet probably earliest form presence information remote network users prior finger program way get information codice_3 program showed ids terminal line numbers server internal number communication line user terminal connected logged-in users earnest named program idea people would run fingers codice_3 list find looking term finger 1970s connotation snitch made finger good reminder/mnemonic semantic unix codice_2 command client protocol context finger daemon runs tcp port 79 client case remote hosts open connection port 79 ruip remote user information program started remote end connection process request local host sends ruip one line query based upon finger query specification waits ruip respond ruip receives processes query returns answer initiates close connection local host receives answer close signal proceeds close end connection finger user information protocol based finger user information protocol december 1991 typically server side protocol implemented program codice_6 finger daemon client side implemented codice_1 codice_2 programs supposed return friendly human-oriented status report either system moment particular person depth required format protocol consists mostly specifying single command line program would supply information whether user currently logged-on e-mail address full name etc well standard user information finger displays contents codice_9 codice_10 files user home directory often file maintained user contains either useful information user current activities similar micro-blogging alternatively manner humor supplying detailed information e-mail addresses full names considered acceptable convenient early days networking later considered questionable privacy security reasons finger information used hackers way initiate social engineering attack company computer security system using finger client get list company employee names email addresses phone numbers hacker call email someone company requesting information posing another employee finger daemon also several exploitable security holes crackers used break systems example 1988 morris worm exploited overflow vulnerability codice_6 among others spread finger protocol also incompatible network address translation nat private network address ranges e.g 192.168.0.0/16 used majority home office workstations connect internet routers firewalls nowadays reasons finger widely used early days internet late 1990s vast majority sites internet longer offered service implemented unix unix-like systems current versions windows finger.exe command software finger support
[ 10242, 515, 1028, 9733, 9735, 2568, 4620, 8204, 6674, 8729, 10269, 10271, 10786, 35, 2085, 562, 9780, 3133, 574, 5181, 8265, 3659, 4174, 4687, 10341, 10344, 5225, 6761, 9834, 1647, 9839, 9843, 3191, 5759, 8834, 5251, 649, 9868, 6797, 4750...
Test
10,728
3
PPC_512:ppc 512 amstrad ppc512 amstrad ppc640 first portable ibm pc compatible computers made amstrad released 1988 development desktop pc-1512 pc-1640 models portable computers contained elements necessary perform computing move keyboard monochrome lcd display built also space disposable batteries power pc suitable alternative power source i.e mains 12 volt vehicle power available pcs came either one two double density double side floppy disc drives ppc640 model also featured modem models supplied 'ppc organiser software ppc640 additionally supplied 'mirror ii communications software two computers similar specifications ppc512 nec v30 processor running 8 mhz 512 kib memory full-size 102-key keyboard numeric keypad built-in liquid crystal display backlit could emulate cga mda either one two 720k 3.5 floppy drives model either ppc512s ppc512d depending number drives ppc640 otherwise identical except 640 kib memory built-in 1200 baud modem unusually fast day case darker shade grey versions machine empty socket main circuit board intel 8087 coprocessor could installed permit hardware processing floating point arithmetic ppc included standard connectors rs-232 centronics cga/mda video allowing existing peripherals used signals used 8-bit isa bus also available pair expansion connectors available external card cage expansion cards four possible power sources could used physical layout components unlike laptop designs instead lid containing screen contained keyboard hinges therefore front main unit rather back lcd hinged separately folded recess top system unit one two floppy drives located right-hand side closed size ppc 45 cm wide × 10 cm high × 23 cm deep bank six dip switches used select whether video hardware emulated cga mda whether use internal external monitor official hard drive option docking station manufactured sold third-party manufacturers ms-dos 3.3 supplied ppcs along 'organizer memory-resident suite utilities including card file diary calculator telephone dialler addition ppc 640 supplied mirror ii communications package use built-in modem ms-dos boot disk also included utility could used switch internal display external monitor without rebooting late 1988 amstrad created desktop computer based ppc design intended home market lcd replaced rf modulator display cga video domestic television keyboard system unit combined integrated case similar original atari st amiga 500 second floppy drive bay replaced two isa slots though design case cards fitted would protrude top computer pc200 black case 'sinclair branding pc20 white branded 'amstrad pc20s also omitted rf modulator support circuitry addition ms-dos 3.3 organizer pc20/pc200 supplied gem four cga-compatible games graphical capabilities cga sound output pc speaker greatly inferior compared home computers time consequently pc20/pc200 commercial success although pc20/pc200 support today floppy disk drives built-in fdd connector uses compatible floppy disk controller zilog z765a work modification fdd connector though 720k disks
[ 1121, 7849, 9166, 6129, 3091 ]
Test
10,729
9
Ad_hoc_polymorphism:ad hoc polymorphism programming languages ad hoc polymorphism kind polymorphism polymorphic functions applied arguments different types polymorphic function denote number distinct potentially heterogeneous implementations depending type argument applied also known function overloading operator overloading term ad hoc context intended pejorative refers simply fact type polymorphism fundamental feature type system contrast parametric polymorphism polymorphic functions written without mention specific type thus apply single abstract implementation number types transparent way classification introduced christopher strachey 1967 ad hoc polymorphism dispatch mechanism control moving one named function dispatched various functions without specify exact function called overloading allows multiple functions taking different types defined name compiler interpreter automatically ensures right function called way functions appending lists integers lists strings lists real numbers could written called append —and right append function would called based type lists appended differs parametric polymorphism function would need written generically work kind list using overloading possible function perform two completely different things based type input passed possible parametric polymorphism another way look overloading routine uniquely identified name combination name number order types parameters type polymorphism common object-oriented programming languages many allow operators overloaded manner similar functions see operator overloading languages dynamically typed lack ad hoc polymorphism including type classes longer function names codice_1 codice_2 etc seen advantage descriptive disadvantage overly verbose depending one point view advantage sometimes gained overloading appearance specialization e.g. function name implemented multiple different ways optimized particular data types operates provide convenient interface code needs specialized multiple situations performance reasons downside type system guarantee consistency different implementations since overloading done compile time substitute late binding found subtyping polymorphism previous section notwithstanding ways ad hoc polymorphism work consider example smalltalk language smalltalk overloading done run time methods function implementation overloaded message overloaded function resolved executed happens run time program compiled therefore polymorphism given subtyping polymorphism languages also extended functionality ad hoc polymorphism run time closer look also reveal smalltalk provides slightly different variety ad hoc polymorphism since smalltalk late bound execution model since provides objects ability handle messages understood possible go ahead implement functionality using polymorphism without explicitly overloading particular message may generally recommended practice everyday programming quite useful implementing proxies also general terms common class method constructor overloading considered polymorphism uniform languages classes regular objects smalltalk instance classes regular objects turn means messages sent classes overloaded also possible create objects behave like classes without classes inheriting hierarchy classes effective techniques used take advantage smalltalk powerful reflection capabilities similar arrangements also possible languages self newspeak imagine operator codice_3 may used following ways handle six function calls four different pieces code needed—or three strings considered lists characters thus name codice_3 actually refers three four completely different functions example overloading
[ 1952, 11361, 5456, 5585, 7889, 9714, 9875, 11574, 8251, 3263 ]
None
10,730
2
Universal_Time-Sharing_System:universal time-sharing system universal time-sharing system uts discontinued operating system xds sigma series computers succeeding batch processing monitor bpm /batch time-sharing monitor btm uts announced 1966 delays actually ship 1971 designed provide multi-programming services online interactive user programs addition batch-mode production jobs symbiont spooled i/o critical real-time processes system daemons called ghost jobs used run monitor code user space final release d00 shipped january 1973 succeeded cp-v operating system combined uts heavily batch-oriented xerox operating system xos cp-v pronounced sea-pea-five operating system compatible successor uts released august 1973 cp-v supported cpus uts plus xerox 560 cp-v offers single-stream multiprogrammed batch timesharing remote processing mode including intelligent remote batch realtime processing added release b00 april 1974 transaction processing release c00 november 1974 cp-v version c00 f00 telefile tcp-v version i00 still run sigma emulator developed 1997 cp-r control program real-time discontinued realtime operating system xerox 550 sigma 9 computer systems cp-r supports three types tasks foreground primary tasks foreground secondary tasks batch tasks 1975 xerox decided exit computer business purchased scientific data systems 1969 honeywell offered purchase xerox data systems initially provide field service support existing customer base cp-6 system including os program products developed beginning 1976 honeywell convert xerox cp-v users run honeywell equipment first beta site installed carleton university ottawa canada june 1979 three sites installed end 1979 support cp-6 transferred actc canada 1993 cp-6 systems continued run many years us canada sweden uk germany final system shutdown carleton university 2005 cp-6 accomplishments developers customers commemorated plaque community wall computer history museum mountain view california cp-v software release b00 1974 cp-v supporrted cp-6 team honeywell los angeles development center ladc 1977 thereafter xerox maintained library xerox user-written software exchange user group
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 5022, 7325, 8606, 9887, 9762, 10016, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7...
Test
10,731
2
OS/7:os/7 os/7 discontinued operating system sperry univac 90/60 90/70 computer systems system first announced november 1971 univac 9700 system originally scheduled delivery march 1973. ref name= univac 90/60 90/70 univac 90/60 90/70 /ref however delivery slipped nearly year impacted 9700 marketing effort first demonstrated univac new 90/60 system october 1973 official release planned january 1974 os/7 abruptly discontinued 1975 favor vs/9 univac name rca vmos operating system os/7 multi-tasking multi-programming system utilizes roll-in roll-out capability keep cpu optimally busy
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 8889, 6075, 7483, 10809, 6...
Validation
10,732
2
Linux_From_Scratch:linux scratch linux scratch lfs type linux installation name book written gerard beekmans currently mainly maintained bruce dubbs book gives readers instructions build linux system source book available freely linux scratch site linux scratch way install working linux system building components manually naturally longer process installing pre-compiled linux distribution according linux scratch site advantages method compact flexible secure system greater understanding internal workings linux-based operating systems keep lfs small focused book beyond linux scratch blfs created presents instructions develop basic linux system created lfs introduces guides reader additions system including networking x sound printer scanner support since release 5.0 blfs book version matches lfs book version book cross linux scratch clfs focuses cross compiling including compiling headless embedded systems run linux lack resources needed compile linux clfs supports broad range processors addresses advanced techniques included lfs book cross-build toolchains multilibrary support 32 64-bit libraries side-by-side alternative instruction set architectures itanium sparc mips alpha book hardened linux scratch hlfs focuses security enhancements hardened kernel patches mandatory access control policies stack-smashing protection address space layout randomization besides main purpose creating security-focused operating system hlfs secondary goal security teaching tool automated linux scratch alfs project designed automate process creating lfs system aimed users gone lfs blfs books several times wish reduce amount work involved secondary goal act test lfs blfs books directly extracting running instructions xml sources lfs blfs books clean partition working linux system compiler essential software libraries required build lfs instead installing existing linux system one also use live cd build lfs system project formerly maintained linux scratch live cd lfs live cd contains source packages full version live cd lfs book automated building tools except minimal live cd version xfce gui environment work official lfs live cd longer maintained used build lfs version7 later however two unofficial builds used build 32-bit 64-bit kernel userspace respectively lfs 7.x first toolchain must compiled consisting tools used compile lfs like gcc glibc binutils necessary utilities root directory must changed using chroot toolchain partition start building final system one first packages compile glibc toolchain linker must adjusted link newly built glibc packages make finished system linked well chroot phase bash hashing feature turned temporary toolchain bin directory moved end path way newly compiled programs come first path new system builds new components list packages included clfs version 1.1.0 unless otherwise noted list applicable supported architectures standard build unit sbu term used initial bootstrapping system represents amount time required build first package lfs given computer creation prompted long time required build lfs system desire many users know long source tarball take build ahead time linux scratch version 6.3 first package built user gnu binutils building users encouraged measure build process using shell constructs dub time system standard build unit number known estimate time required build later packages expressed relative known sbu several packages built compilation take much longer build binutils including gnu c library rated 4.1 sbus gnu compiler collection rated 8.4 sbus unit must interpreted approximation various factors influence actual time required build package lwn.net reviewed lfs 2004 tux machines wrote review linux scratch 6.1 2005 tux machines also second part review third part source-based linux distributions
[ 9735, 6664, 10780, 3618, 9762, 5677, 9780, 10292, 5176, 10817, 7234, 3142, 8262, 10341, 9320, 9843, 9851, 7812, 8326, 6797, 2195, 2197, 2199, 10394, 1694, 11442, 692, 10433, 10967, 1761, 6371, 10470, 4841, 5356, 237, 5358, 1776, 5363, 2804,...
Test
10,733
7
VMScluster:vmscluster vmscluster computer cluster involving group computers running openvms operating system whereas tightly coupled multiprocessor systems run single copy operating system vmscluster loosely coupled machine runs copy openvms disk storage lock manager security domain cluster-wide machines join leave vmscluster without affecting rest cluster enhanced availability vmsclusters support use dual-ported disks connected two machines storage controllers simultaneously openvms ported alpha ia-64 machines facility originally named vaxclustering renamed vmsclustering digital equipment corporation first announced vaxclusters may 1983 stage clustering required specialised communications hardware well major changes low-level subsystems vms software hardware designed jointly center cluster star coupler every node computer data storage device cluster connected one two pairs ci cables ci stands computer interconnect pair cables transmission rate 70 megabits per second high speed era using two pairs gave aggregate transmission rate 140 megabits per second redundancy case one cable failed star couplers also redundant wiring better availability ci cable connected computer via ci port could send receive packets without cpu involvement send packet cpu create small data structure memory append send queue similarly ci port would append incoming message receive queue tests showed vax-11/780 could send receive 3000 messages per second even though nominally 1-mips machine closely related mass storage control protocol mscp allowed similarly high performance mass storage subsystem addition mscp packets easily transported ci allowing remote access storage devices vaxclustering first clustering system achieve commercial success major selling point vax systems 1986 dec added vaxclustering support microvax minicomputers running ethernet instead special-purpose hardware giving high-availability advantages ci hardware local area vaxclusters provided attractive expansion path buyers low-end minicomputers later versions openvms v5.0 later supported mixed interconnect vaxclusters using ci ethernet vaxclustering dssi digital systems storage interconnect fddi among transports eventually high-bandwidth wide area networking became available clustering extended allow satellite data links long-distance terrestrial links allowed creation disaster-tolerant clusters locating single vaxcluster several diverse geographical areas cluster could survive infrastructure failures natural disasters vaxclustering greatly aided introduction terminal servers using lat protocol allowing ordinary serial terminals access host nodes via ethernet became possible terminal rapidly easily connect host node made much simpler accomplish fail user terminals one node cluster another eventually vaxclusters reached point cluster whole essentially never went rolling upgrades even allowed system operators upgrade openvms system software shutting upgrading rebooting individual nodes cluster whole continued processing cluster uptimes frequently measured years current longest uptime least sixteen years mentioned openvms also runs alpha ia-64 systems term vaxcluster replaced vmscluster gigabit ethernet common 10 gigabit ethernet introduced standard networking cables cards quite sufficient support vmsclustering
[ 3142, 7303, 2986, 10220, 7983, 11604, 757, 118, 3927, 7134, 3450, 2395, 3326 ]
None
10,734
3
CPU_cache:cpu cache cpu cache hardware cache used central processing unit cpu computer reduce average cost time energy access data main memory cache smaller faster memory closer processor core stores copies data frequently used main memory locations cpus different independent caches including instruction data caches data cache usually organized hierarchy cache levels l1 l2 l3 l4 etc. modern fast cpus specialized exceptions multiple levels cpu caches first cpus used cache one level cache unlike later level 1 caches split l1d data l1i instructions almost current cpus caches split l1 cache also l2 caches larger processors l3 caches well l2 cache usually split acts common repository already split l1 cache every core multi-core processor dedicated l2 cache usually shared cores l3 cache higher-level caches shared cores split l4 cache currently uncommon generally dynamic random-access memory dram rather static random-access memory sram separate die chip also case historically l1 bigger chips allowed integration generally cache levels possible exception last level extra level cache tends bigger optimized differently types caches exist counted towards cache size important caches mentioned translation lookaside buffer tlb part memory management unit mmu cpus caches generally sized powers two 4 8 16 etc kib mib larger non-l1 sizes although ibm z13 96 kib l1 instruction cache trying read write location main memory processor checks whether data location already cache processor read write cache instead much slower main memory modern desktop server cpus least three independent caches instruction cache speed executable instruction fetch data cache speed data fetch store translation lookaside buffer tlb used speed virtual-to-physical address translation executable instructions data single tlb provided access instructions data separate instruction tlb itlb data tlb dtlb provided data cache usually organized hierarchy cache levels l1 l2 etc see also multi-level caches however tlb cache part memory management unit mmu directly related cpu caches data transferred memory cache blocks fixed size called cache lines cache blocks cache line copied memory cache cache entry created cache entry include copied data well requested memory location called tag processor needs read write location memory first checks corresponding entry cache cache checks contents requested memory location cache lines might contain address processor finds memory location cache cache hit occurred however processor find memory location cache cache miss occurred case cache hit processor immediately reads writes data cache line cache miss cache allocates new entry copies data main memory request fulfilled contents cache make room new entry cache miss cache may evict one existing entries heuristic uses choose entry evict called replacement policy fundamental problem replacement policy must predict existing cache entry least likely used future predicting future difficult perfect method choose among variety replacement policies available one popular replacement policy least-recently used lru replaces least recently accessed entry marking memory ranges non-cacheable improve performance avoiding caching memory regions rarely re-accessed avoids overhead loading something cache without reuse cache entries may also disabled locked depending context data written cache point must also written main memory timing write known write policy write-through cache every write cache causes write main memory alternatively write-back copy-back cache writes immediately mirrored main memory cache instead tracks locations written marking dirty data locations written back main memory data evicted cache reason read miss write-back cache may sometimes require two memory accesses service one first write dirty location main memory another read new location memory also write main memory location yet mapped write-back cache may evict already dirty location thereby freeing cache space new memory location intermediate policies well cache may write-through writes may held store data queue temporarily usually multiple stores processed together reduce bus turnarounds improve bus utilization cached data main memory may changed entities e.g peripherals using direct memory access dma another core multi-core processor case copy cache may become out-of-date stale alternatively cpu multiprocessor system updates data cache copies data caches associated cpus become stale communication protocols cache managers keep data consistent known cache coherence protocols cache performance measurement become important recent times speed gap memory performance processor performance increasing exponentially cache introduced reduce speed gap thus knowing well cache able bridge gap speed processor memory becomes important especially high-performance systems cache hit rate cache miss rate play important role determining performance improve cache performance reducing miss rate becomes one necessary steps among steps decreasing access time cache also gives boost performance time taken fetch one cache line memory read latency due cache miss matters cpu run things waiting cache line cpu reaches state called stall cpus become faster compared main memory stalls due cache misses displace potential computation modern cpus execute hundreds instructions time taken fetch single cache line main memory various techniques employed keep cpu busy time including out-of-order execution cpu pentium pro later intel designs example attempts execute independent instructions instruction waiting cache miss data another technology used many processors simultaneous multithreading smt orin intel terminologyhyper-threading ht allows alternate thread use cpu core first thread waits required cpu resources become available replacement policy decides cache copy particular entry main memory go replacement policy free choose entry cache hold copy cache called fully associative extreme entry main memory go one place cache cache direct mapped many caches implement compromise entry main memory go one n places cache described n-way set associative example level-1 data cache amd athlon two-way set associative means particular location main memory cached either two locations level-1 data cache choosing right value associativity involves trade-off ten places replacement policy could mapped memory location check location cache ten cache entries must searched checking places takes power chip area potentially time hand caches associativity suffer fewer misses see conflict misses cpu wastes less time reading slow main memory general guideline doubling associativity direct mapped two-way two-way four-way effect raising hit rate doubling cache size however increasing associativity four improve hit rate much generally done reasons see virtual aliasing cpus dynamically reduce associativity caches low-power states acts power-saving measure order worse simple better complex cache organization location main memory go one entry cache therefore direct-mapped cache also called one-way set associative cache replacement policy since choice cache entry contents evict means two locations map entry may continually knock although simpler direct-mapped cache needs much larger associative one give comparable performance unpredictable let block number cache block number memory number blocks cache mapping done help equation location main memory cached either two locations cache one logical question one two simplest commonly used scheme shown right-hand diagram use least significant bits memory location index index cache memory two entries index one benefit scheme tags stored cache include part main memory address implied cache memory index since cache tags fewer bits require fewer transistors take less space processor circuit board microprocessor chip read compared faster also lru especially simple since one bit needs stored pair one advantages direct mapped cache allows simple fast speculation address computed one cache index might copy location memory known cache entry read processor continue work data finishes checking tag actually matches requested address idea processor use cached data tag match completes applied associative caches well subset tag called hint used pick one possible cache entries mapping requested address entry selected hint used parallel checking full tag hint technique works best used context address translation explained schemes suggested skewed cache index way 0 direct index way 1 formed hash function good hash function property addresses conflict direct mapping tend conflict mapped hash function less likely program suffer unexpectedly large number conflict misses due pathological access pattern downside extra latency computing hash function additionally comes time load new line evict old line may difficult determine existing line least recently used new line conflicts data different indexes way lru tracking non-skewed caches usually done per-set basis nevertheless skewed-associative caches major advantages conventional set-associative ones true set-associative cache tests possible ways simultaneously using something like content addressable memory pseudo-associative cache tests possible way one time hash-rehash cache column-associative cache examples pseudo-associative cache common case finding hit first way tested pseudo-associative cache fast direct-mapped cache much lower conflict miss rate direct-mapped cache closer miss rate fully associative cache cache row entries usually following structure data block cache line contains actual data fetched main memory tag contains part address actual data fetched main memory flag bits discussed size cache amount main memory data hold size calculated number bytes stored data block times number blocks stored cache tag flag error correction code bits included size although affect physical area cache effective memory address goes along cache line memory block split msb lsb tag index block offset index describes cache set data put index length formula_1 bits cache sets block offset specifies desired data within stored data block within cache row typically effective address bytes block offset length formula_2 bits number bytes per data block tag contains significant bits address checked rows current set set retrieved index see set contains requested address cache hit occurs tag length bits follows authors refer block offset simply offset displacement original pentium 4 processor four-way set associative l1 data cache 8 kib size 64-byte cache blocks hence 8 kib 64 128 cache blocks number sets equal number cache blocks divided number ways associativity leads 128 4 32 sets hence 2 32 different indices 2 64 possible offsets since cpu address 32 bits wide implies 32 5 6 21 bits tag field original pentium 4 processor also eight-way set associative l2 integrated cache 256 kib size 128-byte cache blocks implies 32 8 7 17 bits tag field instruction cache requires one flag bit per cache row entry valid bit valid bit indicates whether cache block loaded valid data power-up hardware sets valid bits caches invalid systems also set valid bit invalid times multi-master bus snooping hardware cache one processor hears address broadcast processor realizes certain data blocks local cache stale marked invalid data cache typically requires two flag bits per cache line valid bit dirty bit dirty bit set indicates associated cache line changed since read main memory dirty meaning processor written data line new value propagated way main memory cache miss failed attempt read write piece data cache results main memory access much longer latency three kinds cache misses instruction read miss data read miss data write miss cache read misses instruction cache generally cause largest delay processor least thread execution wait stall instruction fetched main memory cache read misses data cache usually cause smaller delay instructions dependent cache read issued continue execution data returned main memory dependent instructions resume execution cache write misses data cache generally cause shortest delay write queued limitations execution subsequent instructions processor continue queue full detailed introduction types misses see cache performance measurement metric general purpose cpus implement form virtual memory summarize either program running machine sees simplified address space contains code data program programs run common virtual address space program executes calculating comparing reading writing addresses virtual address space rather addresses physical address space making programs simpler thus easier write virtual memory requires processor translate virtual addresses generated program physical addresses main memory portion processor translation known memory management unit mmu fast path mmu perform translations stored translation lookaside buffer tlb cache mappings operating system page table segment table purposes present discussion three important features address translation early virtual memory systems slow required access page table held main memory every programmed access main memory caches effectively cut speed memory access half first hardware cache used computer system actually data instruction cache rather tlb caches divided four types based whether index tag correspond physical virtual addresses speed recurrence load latency crucial cpu performance modern level-1 caches virtually indexed least allows mmu tlb lookup proceed parallel fetching data cache ram virtual indexing best choice cache levels cost dealing virtual aliases grows cache size result level-2 larger caches physically indexed caches historically used virtual physical addresses cache tags although virtual tagging uncommon tlb lookup finish cache ram lookup physical address available time tag compare need virtual tagging large caches tend physically tagged small low latency caches virtually tagged recent general-purpose cpus virtual tagging superseded vhints described cache relies virtual indexing tagging becomes inconsistent virtual address mapped different physical addresses homonym solved using physical address tagging storing address space identifier cache line however latter approach help synonym problem several cache lines end storing data physical address writing locations may update one location cache leaving others inconsistent data issue may solved using non-overlapping memory layouts different address spaces otherwise cache part must flushed mapping changes great advantage virtual tags associative caches allow tag match proceed virtual physical translation done however coherence probes evictions present physical address action hardware must means converting physical addresses cache index generally storing physical tags well virtual tags comparison physically tagged cache need keep virtual tags simpler virtual physical mapping deleted tlb cache entries virtual addresses flushed somehow alternatively cache entries allowed pages mapped tlb entries flushed access rights pages changed page table also possible operating system ensure virtual aliases simultaneously resident cache operating system makes guarantee enforcing page coloring described early risc processors sparc rs/6000 took approach used recently hardware cost detecting evicting virtual aliases fallen software complexity performance penalty perfect page coloring risen useful distinguish two functions tags associative cache used determine way entry set select used determine cache hit missed second function must always correct permissible first function guess get wrong answer occasionally processors e.g early sparcs caches virtual physical tags virtual tags used way selection physical tags used determining hit miss kind cache enjoys latency advantage virtually tagged cache simple software interface physically tagged cache bears added cost duplicated tags however also miss processing alternate ways cache line indexed probed virtual aliases matches evicted extra area latency mitigated keeping virtual hints cache entry instead virtual tags hints subset hash virtual tag used selecting way cache get data physical tag like virtually tagged cache may virtual hint match physical tag mismatch case cache entry matching hint must evicted cache accesses cache fill address one hint match since virtual hints fewer bits virtual tags distinguishing one another virtually hinted cache suffers conflict misses virtually tagged cache perhaps ultimate reduction virtual hints found pentium 4 willamette northwood cores processors virtual hint effectively two bits cache four-way set associative effectively hardware maintains simple permutation virtual address cache index content-addressable memory cam necessary select right one four ways fetched large physically indexed caches usually secondary caches run problem operating system rather application controls pages collide one another cache differences page allocation one program run next lead differences cache collision patterns lead large differences program performance differences make difficult get consistent repeatable timing benchmark run understand problem consider cpu 1 mib physically indexed direct-mapped level-2 cache 4 kib virtual memory pages sequential physical pages map sequential locations cache 256 pages pattern wraps around label physical page color 0–255 denote cache go locations within physical pages different colors conflict cache programmers attempting make maximum use cache may arrange programs access patterns 1 mib data need cached given time thus avoiding capacity misses also ensure access patterns conflict misses one way think problem divide virtual pages program uses assign virtual colors way physical colors assigned physical pages programmers arrange access patterns code two pages virtual color use time wide literature optimizations e.g loop nest optimization largely coming high performance computing hpc community snag pages use given moment may different virtual colors may physical colors fact operating system assigns physical pages virtual pages randomly uniformly extremely likely pages physical color locations pages collide cache birthday paradox solution operating system attempt assign different physical color pages different virtual colors technique called page coloring although actual mapping virtual physical color irrelevant system performance odd mappings difficult keep track little benefit approaches page coloring simply try keep physical virtual page colors operating system guarantee physical page maps one virtual color virtual aliases processor use virtually indexed caches need extra virtual alias probes miss handling alternatively os flush page cache whenever changes one virtual color another mentioned approach used early sparc rs/6000 designs modern processors multiple interacting on-chip caches operation particular cache completely specified cache size cache block size number blocks set cache set replacement policy cache write policy write-through write-back cache blocks particular cache size associativity typically lower-level caches called level 1 cache smaller number blocks smaller block size fewer blocks set short access times higher-level caches i.e level 2 progressively larger numbers blocks larger block size blocks set relatively longer access times still much faster main memory cache entry replacement policy determined cache algorithm selected implemented processor designers cases multiple algorithms provided different kinds work loads pipelined cpus access memory multiple points pipeline instruction fetch virtual-to-physical address translation data fetch see classic risc pipeline natural design use different physical caches points one physical resource scheduled service two points pipeline thus pipeline naturally ends least three separate caches instruction tlb data specialized particular role victim cache cache used hold blocks evicted cpu cache upon replacement victim cache lies main cache refill path holds blocks data evicted main cache victim cache usually fully associative intended reduce number conflict misses many commonly used programs require associative mapping accesses fact small fraction memory accesses program require high associativity victim cache exploits property providing high associativity accesses introduced norman jouppi dec 1990 intel crystalwell variant haswell processors equipped intel iris pro gt3e embedded graphics 128 mb edram introduced on-package level 4 cache serves victim cache processors level 3 cache skylake processors level 4 cache longer works victim cache one extreme examples cache specialization trace cache also known execution trace cache found intel pentium 4 microprocessors trace cache mechanism increasing instruction fetch bandwidth decreasing power consumption case pentium 4 storing traces instructions already fetched decoded trace cache stores instructions either decoded retired generally instructions added trace caches groups representing either individual basic blocks dynamic instruction traces pentium 4 trace cache stores micro-operations resulting decoding x86 instructions providing also functionality micro-operation cache next time instruction needed decoded micro-ops write coalescing cache special cache part l2 cache amd bulldozer microarchitecture stores l1d caches module go wcc buffered coalesced wcc task reducing number writes l2 cache micro-operation cache μop cache uop cache uc specialized cache stores micro-operations decoded instructions received directly instruction decoders instruction cache instruction needs decoded μop cache checked decoded form re-used cached available instruction decoded cached one early works describing μop cache alternative frontend intel p6 processor family 2001 paper micro-operation cache power aware frontend variable instruction length isa later intel included μop caches sandy bridge processors successive microarchitectures like ivy bridge haswell amd implemented μop cache zen microarchitecture fetching complete pre-decoded instructions eliminates need repeatedly decode variable length complex instructions simpler fixed-length micro-operations simplifies process predicting fetching rotating aligning fetched instructions μop cache effectively offloads fetch decode hardware thus decreasing power consumption improving frontend supply decoded micro-operations μop cache also increases performance consistently delivering decoded micro-operations backend eliminating various bottlenecks cpu fetch decode logic μop cache many similarities trace cache although μop cache much simpler thus providing better power efficiency makes better suited implementations battery-powered devices main disadvantage trace cache leading power inefficiency hardware complexity required heuristic deciding caching reusing dynamically created instruction traces branch target cache branch target instruction cache name used arm microprocessors specialized cache holds first instructions destination taken branch used low-powered processors need normal instruction cache memory system capable delivering instructions fast enough satisfy cpu without one however applies consecutive instructions sequence still takes several cycles latency restart instruction fetch new address causing cycles pipeline bubble control transfer branch target cache provides instructions cycles avoiding delay taken branches allows full-speed operation much smaller cache traditional full-time instruction cache smart cache level 2 level 3 caching method multiple execution cores developed intel smart cache shares actual cache memory cores multi-core processor comparison dedicated per-core cache overall cache miss rate decreases cores need equal parts cache space consequently single core use full level 2 level 3 cache cores inactive furthermore shared cache makes faster share memory among different execution cores another issue fundamental tradeoff cache latency hit rate larger caches better hit rates longer latency address tradeoff many computers use multiple levels cache small fast caches backed larger slower caches multi-level caches generally operate checking fastest level 1 l1 cache first hits processor proceeds high speed smaller cache misses next fastest cache level 2 l2 checked accessing external memory latency difference main memory fastest cache become larger processors begun utilize many three levels on-chip cache price-sensitive designs used pull entire cache hierarchy on-chip 2010s highest-performance designs returned large off-chip caches often implemented edram mounted multi-chip module fourth cache level benefits l3 l4 caches depend application access patterns examples products incorporating l3 l4 caches include following finally end memory hierarchy cpu register file considered smallest fastest cache system special characteristic scheduled software—typically compiler allocates registers hold values retrieved main memory example loop nest optimization however register renaming compiler register assignments reallocated dynamically hardware runtime register bank allowing cpu break false data dependencies thus easing pipeline hazards register files sometimes also hierarchy cray-1 circa 1976 eight address eight scalar data registers generally usable also set 64 address b 64 scalar data registers took longer access faster main memory b registers provided cray-1 data cache cray-1 however instruction cache considering chip multiple cores question whether caches shared local core implementing shared cache inevitably introduces wiring complexity one cache per chip rather core greatly reduces amount space needed thus one include larger cache typically sharing l1 cache undesirable resulting increase latency would make core run considerably slower single-core chip however highest-level cache last one called accessing memory global cache desirable several reasons allowing single core use whole cache reducing data redundancy making possible different processes threads share cached data reducing complexity utilized cache coherency protocols example eight-core chip three levels may include l1 cache core one intermediate l2 cache pair cores one l3 cache shared cores shared highest-level cache called accessing memory usually referred last level cache llc additional techniques used increasing level parallelism llc shared multiple cores including slicing multiple pieces addressing certain ranges memory addresses accessed independently separate cache structure instructions data cached separately meaning cache line used cache either instructions data various benefits demonstrated separate data instruction translation lookaside buffers unified structure constraint present cache lines used cache instructions data multi-level caches introduce new design decisions instance processors data l1 cache must also somewhere l2 cache caches called strictly inclusive processors like amd athlon exclusive caches data guaranteed one l1 l2 caches never still processors like intel pentium ii iii 4 require data l1 cache also reside l2 cache although may often universally accepted name intermediate policy two common names non-exclusive partially-inclusive advantage exclusive caches store data advantage larger exclusive l1 cache comparable l2 cache diminishes l2 cache many times larger l1 cache l1 misses l2 hits access hitting cache line l2 exchanged line l1 exchange quite bit work copying line l2 l1 inclusive cache one advantage strictly inclusive caches external devices processors multiprocessor system wish remove cache line processor need processor check l2 cache cache hierarchies enforce inclusion l1 cache must checked well drawback correlation associativities l1 l2 caches l2 cache least many ways l1 caches together effective associativity l1 caches restricted another disadvantage inclusive cache whenever eviction l2 cache possibly corresponding lines l1 also get evicted order maintain inclusiveness quite bit work would result higher l1 miss rate another advantage inclusive caches larger cache use larger cache lines reduces size secondary cache tags exclusive caches require caches size cache lines cache lines swapped l1 miss l2 hit secondary cache order magnitude larger primary cache data order magnitude larger cache tags tag area saved comparable incremental area needed store l1 cache data l2 illustrate specialization multi-level caching cache hierarchy k8 core amd athlon 64 cpu k8 four specialized caches instruction cache instruction tlb data tlb data cache caches specialized k8 also multiple-level caches second-level instruction data tlbs store ptes mapping 4 kb instruction data caches various tlbs fill large unified l2 cache cache exclusive l1 instruction data caches means 8-byte line one l1 instruction cache l1 data cache l2 cache however possible line data cache pte also one tlbs—the operating system responsible keeping tlbs coherent flushing portions page tables memory updated k8 also caches information never stored memory—prediction information caches shown diagram usual class cpu k8 fairly complex branch prediction tables help predict whether branches taken tables predict targets branches jumps information associated instructions level 1 instruction cache unified secondary cache k8 uses interesting trick store prediction information instructions secondary cache lines secondary cache protected accidental data corruption e.g alpha particle strike either ecc parity depending whether lines evicted data instruction primary caches since parity code takes fewer bits ecc code lines instruction cache spare bits bits used cache branch prediction information associated instructions net result branch predictor larger effective history table better accuracy processors kinds predictors e.g store-to-load bypass predictor dec alpha 21264 various specialized predictors likely flourish future processors predictors caches store information costly compute terminology used discussing predictors caches one speaks hit branch predictor predictors generally thought part cache hierarchy k8 keeps instruction data caches coherent hardware means store instruction closely following store instruction change following instruction processors like alpha mips family relied software keep instruction cache coherent stores guaranteed show instruction stream program calls operating system facility ensure coherency computer engineering tag ram used specify possible memory locations currently stored cpu cache simple direct-mapped design fast sram used higher associative caches usually employ content-addressable memory cache reads common cpu operation takes single cycle program execution time tends sensitive latency level-1 data cache hit great deal design effort often power silicon area expended making caches fast possible simplest cache virtually indexed direct-mapped cache virtual address calculated adder relevant portion address extracted used index sram returns loaded data data byte aligned byte shifter bypassed next operation need tag checking inner loop fact tags need even read later pipeline load instruction retired tag loaded data must read checked virtual address make sure cache hit miss cache updated requested cache line pipeline restarted associative cache complicated form tag must read determine entry cache select n-way set-associative level-1 cache usually reads n possible tags n data parallel chooses data associated matching tag level-2 caches sometimes save power reading tags first one data element read data sram adjacent diagram intended clarify manner various fields address used address bit 31 significant bit 0 least significant diagram shows srams indexing multiplexing 4 kb 2-way set-associative virtually indexed virtually tagged cache 64 byte b lines 32-bit read width 32-bit virtual address cache 4 kb 64 b lines 64 lines cache read two time tag sram 32 rows pair 21 bit tags although function virtual address bits 31 6 could used index tag data srams simplest use least significant bits similarly cache 4 kb 4 b read path reads two ways access data sram 512 rows 8 bytes wide modern cache might 16 kb 4-way set-associative virtually indexed virtually hinted physically tagged 32 b lines 32-bit read width 36-bit physical addresses read path recurrence cache looks similar path instead tags vhints read matched subset virtual address later pipeline virtual address translated physical address tlb physical tag read one vhint supplies way cache read finally physical address compared physical tag determine hit occurred sparc designs improved speed l1 caches gate delays collapsing virtual address adder sram decoders see sum addressed decoder early history cache technology closely tied invention use virtual memory scarcity cost semi-conductor memories early mainframe computers 1960s used complex hierarchy physical memory mapped onto flat virtual memory space used programs memory technologies would span semi-conductor magnetic core drum disc virtual memory seen used programs would flat caching would used fetch data instructions fastest memory ahead processor access extensive studies done optimize cache sizes optimal values found depend greatly programming language used algol needing smallest fortran cobol needing largest cache sizes early days microcomputer technology memory access slightly slower register access since 1980s performance gap processor memory growing microprocessors advanced much faster memory especially terms operating frequency memory became performance bottleneck technically possible main memory fast cpu economically viable path taken use plenty low-speed memory also introduce small high-speed cache memory alleviate performance gap provided order magnitude capacity—for price—with slightly reduced combined performance first documented uses tlb ge 645 ibm 360/67 used associative memory tlb first documented use data cache ibm system/360 model 85 68010 released 1982 loop mode considered tiny special-case instruction cache accelerates loops consist two instructions 68020 released 1984 replaced typical instruction cache 256 bytes first 68k series processor feature true on-chip cache memory 68030 released 1987 basically 68020 core additional 256-byte data cache process shrink added burst mode caches 68040 released 1990 split instruction data caches four kilobytes 68060 released 1994 following 8 kb data cache four-way associative 8 kb instruction cache four-way associative 96-byte fifo instruction buffer 256-entry branch cache 64-entry address translation cache mmu buffer four-way associative x86 microprocessors reached clock rates 20 mhz 386 small amounts fast cache memory began featured systems improve performance dram used main memory significant latency 120 ns well refresh cycles cache constructed expensive significantly faster sram memory cells time latencies around 10 ns 25 ns early caches external processor typically located motherboard form eight nine dip devices placed sockets enable cache optional extra upgrade feature versions intel 386 processor could support 16 256 kb external cache 486 processor 8 kb cache integrated directly cpu die cache termed level 1 l1 cache differentiate slower on-motherboard level 2 l2 cache on-motherboard caches much larger common size 256 kb popularity on-motherboard cache continued pentium mmx era made obsolete introduction sdram growing disparity bus clock rates cpu clock rates caused on-motherboard cache slightly faster main memory next development cache implementation x86 microprocessors began pentium pro brought secondary cache onto package microprocessor clocked frequency microprocessor on-motherboard caches enjoyed prolonged popularity thanks amd k6-2 amd k6-iii processors still used socket 7 previously used intel on-motherboard caches k6-iii included 256 kb on-die l2 cache took advantage on-board cache third level cache named l3 motherboards 2 mb on-board cache produced socket 7 became obsolete on-motherboard cache disappeared x86 systems three-level caches used first introduction multiple processor cores l3 cache added cpu die became common total cache sizes increasingly larger newer processor generations recently 2011 uncommon find level 3 cache sizes tens megabytes intel introduced level 4 on-package cache haswell microarchitecture crystalwell haswell cpus equipped gt3e variant intel integrated iris pro graphics effectively feature 128 mb embedded dram edram package l4 cache shared dynamically on-die gpu cpu serves victim cache cpu l3 cache early cache designs focused entirely direct cost cache ram average execution speed recent cache designs also consider energy efficiency fault tolerance goals researchers also explored use emerging memory technologies edram embedded dram nvram non-volatile ram designing caches several tools available computer architects help explore tradeoffs cache cycle time energy area tools include open-source cacti cache simulator open-source simplescalar instruction set simulator modeling 2d 3d sram edram stt-ram reram pcm caches done using destiny tool multi-ported cache cache serve one request time accessing traditional cache normally use single memory address whereas multi-ported cache may request n addresses time n number ports connected processor cache benefit pipelined processor may access memory different phases pipeline another benefit allows concept super-scalar processors different cache levels
[ 4098, 4108, 2066, 2071, 6181, 8231, 8233, 4139, 2097, 8253, 2113, 6221, 6247, 6250, 4204, 6252, 6253, 6256, 4211, 4217, 10361, 6268, 10375, 146, 4252, 10399, 8352, 4258, 6311, 6314, 2224, 2226, 2234, 2237, 4286, 2241, 2243, 6339, 2269, 22...
Validation
10,735
7
SnapLogic:snaplogic snaplogic commercial software company provides integration platform service ipaas tools connecting cloud data sources saas applications on-premises business software applications headquartered san mateo ca snaplogic founded 2006 snaplogic headed ex-ceo co-founder informatica gaurav dhillon venture backed andreessen horowitz ignition partners floodgate fund brian mcclendon naval ravikant 2017 company raised 136.3 million december 10 2015 snaplogic announced 37.5 million funding round led microsoft silver lake waterman along existing investors andreessen horowitz ignition partners triangle peak partners made total investment raised 96.3 million snaplogic time announcement snaplogic elastic integration platform consists integration cloud prebuilt connectors called snaps snaplex data processing cloud behind firewall company products referred targeting internet things marketplace connecting data applications devices integration cloud approaches big data integration following tools snaplex self-upgrading elastic execution grid streams data applications databases files social big data sources snaplex run cloud behind firewall hadoop snaps modular collections integration components built specific application data source available analytics big data sources identity management social media online storage erp databases technologies xml json oauth soap rest snap patterns introduced march 2014 help connecting cloud services like amazon redshift salesforce.com workday servicenow on-premises applications databases files company winter 2015 release focused adding tighter security added support hadoop big data integration product line
[ 4194, 4388, 5960, 10090, 467, 10134, 11646 ]
Validation
10,736
9
Autovivification:autovivification perl programming language autovivification automatic creation new arrays hashes required every time undefined value dereferenced perl autovivification allows programmer refer structured variable arbitrary sub-elements structured variable without expressly declaring existence variable complete structure beforehand contrast programming languages either 1 require programmer expressly declare entire variable structure using referring part 2 require programmer declare part variable structure referring part 3 create assignment part variable referring assigning composing expression refers part perl autovivification contrasted languages python php ruby many c style languages dereferencing null undefined values generally permitted compared html standard named access window object results corresponding globally scoped variables automatically accessible browser-based javascript important remember autovivification happens undefined value dereferenced assignment necessary debugger session illustrates autovivification hash examining debugger session illustrates autovivification hash assigning inner hash hashes several layers deep created automatically without declarations autovivification prevent excessive typing perl support autovivification structure would created follows perl 5.6.1 newer support autovivification file directory handles calling codice_1 undefined variable set filehandle according perl561delta largely eliminates need typeglobs opening filehandles must passed around following example c++ associative containers like codice_2 use codice_3 get value associated key nothing associated key construct another example counting occurrences string similar trick achieved codice_4 method returns iterator element associated key even already exists python built-in codice_5 class subclassed implement autovivificious dictionaries simply overriding codice_6 method added class python v2.5 ways implementing behavior following one simplest instances class print like normal python dictionary objects ruby hashes take block specifying object returned non-existing indexes used implement autovivificious maps java map method computeifabsent used emulate autovivificous maps php arrays natively autovivificious however applies assignment array access es6 introduces new proxy class used implement autovivification features javascript reduced single line code c using indexers c 4.0 dynamics dynamicobject used implementing different syntaxes also
[ 8644, 8582, 3462, 8554, 11674, 10043, 10333 ]
Test
10,737
1
Table_(database):table database table collection related data held table format within database consists columns rows relational databases flat file databases table set data elements values using model vertical columns identifiable name horizontal rows cell unit row column intersect table specified number columns number rows row identified one values appearing particular column subset specific choice columns uniquely identify rows called primary key table another term relation although difference table usually multiset bag rows relation set allow duplicates besides actual data rows tables generally associated metadata constraints table values within particular columns data table physically stored database views also function relational tables data calculated query time external tables informix oracle example also thought views terms relational model databases table considered convenient representation relation two strictly equivalent instance sql table potentially contain duplicate rows whereas true relation contain duplicate rows call tuples similarly representation table implies particular ordering rows columns whereas relation explicitly unordered however database system guarantee ordering rows unless codice_1 clause specified codice_2 statement queries table equally valid representation relation n -dimensional chart n number attributes table columns example relation two attributes three values represented table two columns three rows two-dimensional graph three points table graph representations equivalent ordering rows significant table duplicate rows non-relational systems hierarchical databases distant counterpart table structured file representing rows table row file column row structure implies row repeating information generally child data segments data stored sequence physical records unlike spreadsheet datatype column ordinarily defined schema describing table sql systems sqlite less strict column datatype definitions
[ 8195, 8201, 1034, 10258, 2068, 6166, 1049, 5658, 5151, 9248, 8230, 10793, 10286, 5691, 11324, 9286, 2632, 4680, 9290, 7756, 8788, 10326, 7767, 10849, 9828, 10340, 8808, 2669, 1146, 3196, 10367, 128, 8340, 10389, 4255, 5795, 4261, 9893, 4263...
None
10,738
7
Hue_(Software):hue software hue open-source sql cloud editor licensed apache v2 license hue open source sql cloud editor browsing querying visualizing data goal make self service data querying widespread organizations hue team works provides releases website hue also present major hadoop distributions cdh hdp mapr aws emr demo vms
[ 9344, 8554 ]
Test
10,739
9
Nim_(programming_language):nim programming language nim formerly named nimrod imperative general-purpose multi-paradigm statically typed systems compiled programming language designed developed andreas rumpf designed efficient expressive elegant supporting metaprogramming functional message passing procedural object-oriented programming styles providing several features compile time code generation algebraic data types foreign function interface ffi c c++ compiling c c++ objective-c javascript nim statically typed supports compile-time metaprogramming features syntactic macros term rewriting macros term rewriting macros enable library implementations common data structures bignums matrices implemented efficiently builtin language facilities iterators supported used first class entities functions allowing use functional programming methods object-oriented programming supported inheritance multiple dispatch functions generic also overloaded generics enhanced support type classes operator overloading also supported nim includes tunable automatic garbage collection based deferred reference counting cycle detection turned altogether 2014 andrew binstock editor-in-chief dr. dobb journal said nimrod former name ... presents original design straddles pascal python compiles c code javascript today nim compiles c c++ javascript objective-c goal nim fast c expressive python extensive lisp nim initial development started 2006 andreas rumpf project made public 2008 first version nim compiler written pascal using free pascal compiler 2008 version compiler written nim released compiler free open-source software developed community volunteers working andreas rumpf language officially renamed nimrod nim release version 0.10.2 december 2014 syntax nim highly resembles python code blocks nesting statements identified use white-space according offside-rule many keywords identical python equivalents mostly english keywords programming languages use punctuation even though nim supports indentation based syntax like python introduced flexibility whereby one could break statement comma binary operator next line nim also supports user-defined operators nim almost fully style-insensitive two identifiers considered equal differ capitalization underscores long first characters identical details influenced also nim supports uniform function call syntax ufcs identifier equality nim compiler emits optimized c code defers compiling external compiler leverage optimizing portability abilities many compilers supported including clang gnu compiler collection gcc compiler also emit c++ objective-c javascript code allow easy interfacing application programming interfaces apis written languages allows writing applications ios android nim compiler self-hosting meaning written nim language nimble standard package manager used nim package nim modules initially developed dominik picheta also core nim developer newer releases nim come nimble included nimble packages defined codice_1 files contain information package version author license description dependencies files support limited subset nim syntax called nimscript main limitation access ffi scripts allow changing test procedure custom tasks written list packages stored json file freely accessible nim-lang/packages repository github json file provides nimble mapping names packages git mercurial repository urls nimble comes nim compiler possible test nimble environment running codice_2 command reveal version number compilation date time git hash nimble nimble utilizes git must available nimble function well nimble command-line used interface installing removing uninstalling upgrading/patching module packages c2nim transcompiler/transpiler helps generate new bindings translating ansi c code nim code output human-readable nim code meant tweaked hand translation process choosenim developed dominik picheta tool enables developer multiple versions nim compile his/her machine choosenim installs nim official downloads sources enabling easy switching stable development compilers nimfix tool helps convert old-style nimrod code nim code nimfix currently beta-quality pas2nim tool translate object pascal wrappers nim code used translate original pascal sources nim compiler maps easily nim supported free pascal delphi-style classes features unsupported time development maintenance mostly stalled py2nim tool used transpiling python code idiomatic nim code development active plans extend amount python code fully translated nim nim program use library used c c++ program language bindings exist many libraries including gtk+ sdl2 cairo opengl winapi zlib libzip openssl curl nim works postgresql mysql sqlite databases nim interface lua python interpreter following code examples valid nim 0.19.0. subsequent releases nim 1.0 release syntax semantics may change later versions hello world program nim echo hello world echo hello world another version coding hello world ... stdout.write hello world simple demonstration showing many nim features proc reverse string string let str1 reverse echo reversed reverse str1 one exotic features implicit codice_3 variable every procedure nim non-void return type implicit result variable represents value returned loop see invocation codice_4 iterator iterator omitted compiler attempt use codice_5 iterator one defined type specified run overridden oloop stropping method mark explicitly letter sequence special purpose stropping used modern languages instead keywords reserved words used identifiers variables functions stropping allows letter sequence used keyword identifier simplifies parsing example allowing variable named codice_6 without clashing keyword codice_6 nim achieved via backticks allowing reserved word used identifier var type int example metaprogramming nim using template facilities template gentype name fieldname untyped fieldtype typedesc gentype test foo int var x test foo 4566 echo x.foo 4566 codice_8 invoked compile-time codice_9 type created nim ffi used call functions written programming languages compile means libraries written c c++ objective-c javascript used nim source code one aware javascript c c++ objective-c libraries combined program compatible javascript c++ objective-c based compatible c javascript incompatible dynamic client-side web-based language following program demonstrates ease extant c code used directly nim printf d\n foo 5 code codice_10 function imported nim used project bug tracker wiki hosted github forum presentation nim given o'reilly open source convention oscon 2015
[ 2304, 9345, 5380, 8068, 3462, 4998, 1673, 1802, 6154, 8973, 8082, 5651, 9490, 9875, 3734, 1435, 3613, 10013, 5663, 1952, 1698, 5029, 10744, 4777, 5546, 428, 5165, 7983, 10033, 1203, 438, 4920, 1470, 7871, 963, 5067, 8524, 7889, 339, 5588,...
None
10,740
4
Ahn_Cheol-soo:ahn cheol-soo ahn cheol-soo born 26 february 1962 south korean politician medical doctor businessperson software entrepreneur two-time former presidential election candidate 2012 2017 ahn currently bareunmirae party candidate seoul mayorship ran independent candidate presidential election 2012 withdrew month election took place support moon jae-in ran 2017 people party nominee founding co-leader party leader people party party bareun party merged bareunmirae party february 2018 prior politics ahn founded ahnlab inc. antivirus software company 1995 chairman board chief learning officer ahnlab september 2012 remains company largest stakeholder prior entering politics ahn served dean graduate school convergence science technology seoul national university september 2012 ahn born 26 february 1962 miryang south korea father military service subsequently moved family busan grew ahn academic child number academic hobbies reading received doctor medicine md master science ms doctor philosophy phd degrees physiology seoul national university 1980 1991 became youngest chief professors dankook university medical college 27 years age marking first career medical doctor ahn met wife whilst university whilst working graduate student pursuing md ahn began gain interest computer software hobby particular antivirus software ahn soon began working antivirus software confronted virus mass-infecting computers korea ahn soon infected virus reverse engineered virus attempt erase disk drive successful program wrote help get rid virus eventually called vaccine ahn distributed free finishing military service medical officer south korean navy leaving behind career medical profession cheol-soo went establish venture company ahnlab inc march 1995 advised software company official ahn previously attempted distribute v3 via samsung brand though samsung rejected ahn offer ahn knowing run business first struggled first several years whilst managing company ahn also attempting get master degree engineering university pennsylvania graduated 1997 ahn eventually received 10 million offer us software giant mcafee ahn met john mcafee personally mcafee struggling expand south korea due ahnlab inc wanted purchase company attempt monopolize anti-virus software market south korea ahn rejected offer despite ahnlab inc struggling selling company would lead widespread redundancies 1999 company began run surplus cih virus became widespread korea people needed buy v3 protect end 1999 ahnlab inc became second biggest computer security company south korea company later became largest computer security company south korea included annual lists korea admired companies korea management association consulting 2004 2008 resigned ceo 2005 served chairman board 2012 ahn revealed john mcafee suggested would acquire ahnlab 10,000,000 rejected offer mentioned patriotic reasons decision saying selling ahnlab might allow foreign firm dominate korean market ahn became outside director posco 2005 2010 2011 chairman company ahn awarded executive master business administration emba degree wharton school san francisco campus 2008 became professor kaist 2008 later beginning 2011 became dean graduate school convergence science technology seoul national university since 2006 ahn offered places main political parties constantly denied chance run independent due opposing factions early september 2011 speculation spread ahn would enter politics competing 26 october seoul mayoral by-election democratic party liberty korea party attempted recruit ahn mayoral by-election though failed due ahn feeling like many voters become disenfranchised main two choices ahn eventually made announcement denouncing opposition ruling party saying sure candidacy deciding watch polls making choice though shared sentiment felt like 'd take lot work help seoul saying ten years work would needed help city analysts stated positioned independent ahn would attract degree support disaffected mainstream political parties wake corruption allegations continuing policy failures ahn polling higher potential candidates 35 second place coming 17 approval rating subsequently polled afterwards reaching 50 ahn eventually n't run despite positive poll ratings instead endorsing park won-soon went win by-election park win attributed ahn endorsement due centrist voters moving park side endorsement alluded standing presidential candidate 2012 book thoughts ahn cheol-soo 19 september 2012 3 p.m. korea standard time ahn held press conference announced intention run 2012 presidential election announcement came months speculation whether ahn going run presidency south korean presidential election held 19 december 2012 address lasted around 20 minutes ahn spent considerable amount time explaining came decision run president republic korea quoting people met exploring candidacy expressed desire new politics ahn one point showed polling stronger moon jae-in polls showing could win park geun-hye candidate would go win election 23 november 2012 8:20 p.m. kst ahn announced would drop race endorsing moon jae-in democratic united party presidential candidate 11 march 2013 ahn announced would run seat national assembly south korea independent candidate by-election district seoul nowon c. election 24 april entering first elected office may 2013 launched new think tank named policy network tomorrow entered assembly ahn began explore creation new party provisionally named new political vision party basis public surveys 26 march 2014 however party process set ahn merged faction liberal democratic party form new politics alliance democracy npad becoming co-chairman new party alongside kim han-gil ahn kim resigned position three months later july following new party disappointing performance by-elections year seen liberals lose seat jeolla conservatives first time 26 years ahn remained npad came increasing conflict moon jae-in taken sole leadership party resignation pro-roh faction moon represented december 2015 ahn issued ultimatum moon demanding convention held beginning 2016 elect new party leader moon rejected demand ahn left npad along range lawmakers opposed moon including kim han-gil announcing would form new party subsequently joined forces chun jung-bae left party earlier year form people party january 2016 moon resigned leader ahn defection describing experience series difficult days without single one respite ahn positioned new people party anti-establishment centrist force attracting support political wings labeled remaining npad anachronistic progressives accused contemporary korean politicians lacking policies beyond short-term gimmicks lead-up april 13 parliamentary election came conflict co-leader chun members party kim chong-in interim leader democratic party npad successor called two parties form electoral alliance kim han-gil ahn co-leader chun supported plan ahn rejected prospect alliance former party proposal ultimately scotched kim han-gil withdrawing upcoming election protest event people party performed better anticipated coming second party-list voting winning 38 seats overall including 23 28 districts liberal stronghold jeolla people party held balance power new assembly establishing three-party system ahn credited victory seen giving position kingmaker support contesting presidential elections following year following election ahn rejected continued calls regroup minjoo party stating would inappropriate speak politically realigning point time added people party would mere tie-breaking third party ... new opinion leader parliamentary affairs ahn widely known likely contender 2017 south korean presidential election selected people party nominee defeating sohn hak-kyu park joo-sun despite rapid increase opinion polling briefly bypassed moon jae-in ahn floundered tv debates led loss finishing third field five total candidates underperformance presidential campaign party scandal found people party members fabricating evidence smear moon jae-in campaign led ahn declare july 2017 apologize take step back politics self-reflection returned month later run later win party chairmanship head people party ahn strong advocate merging center-right bareun party two leaders respective parties ahn former presidential contender yoo seung-min pushed forward merger completed february 2018 although yoo retained leadership position within new party ahn stepped leadership role march 2018 took role leading party talent recruiting committee formal position speculated signal preparation run seoul mayorship later year ahn stated considers franklin d. roosevelt role model referred bernie sanders korea supports increased capital gains tax higher public welfare spending cautious approach free trade agreements ahn also made appeals conservatives however associated people party reformative currents korean conservatism september 2012 ahn visited graves syngman rhee park chung-hee kim dae-jung park rhee often praised korean conservatives kim liberals ahn stated time would hypocritical paint half people enemies time call 'unity ahn considered palatable conservative voters part due business background ahn among first opposed american deployment terminal high altitude area defense system commonly referred thaad alongside moon jae-in however changed stance suggesting irresponsible future president reverse agreement already made united states korea ahn stated opposes legalization same-sex marriage although detailed article broadcasting network sbs website said same-sex marriage needs achieved social discussion december 2011 ahn expressed willingness donate half shares ahnlab education children low-income families owns 37.1 percent ahnlab shares 9 december 2011 value shares donated 250 billion 218 million september 2012 ahn made public apology reports surfaced wife evaded taxes under-pricing 2001 apartment bought worth ₩450 million ₩250 million thus reducing acquisition registration taxes ₩10 million however statement korea taxpayers association claimed contract accordance trade customs thus unlawful due flaws local tax law 1996 2005 1988 married kim mi-kyung currently professor seoul national university college medicine ahn daughter kim
[ 704, 2213, 1355, 4475, 2558 ]
Test
10,741
4
Vanish_(computer_science):vanish computer science vanish project give users control lifetime personal data stored web led roxana geambasu university washington project proposes allow user enter information send across internet thereby relinquishing control however user able include expiration date information longer usable anyone may copy even creator vanish approach found vulnerable sybil attack thus insecure team called unvanish university texas university michigan princeton vanish acts automating encryption information entered user encryption key unknown user along actual information user enters also enters metadata concerning long information remain available system encrypts information store either encryption key original information instead breaks decryption key smaller components disseminated across distributed hash tables dhts via internet dhts refresh information within nodes set schedule unless told persist information time-delay entered user metadata controls long dhts allow information persist time period dhts reuse nodes making information decryption stored irretrievable long decryption key may reassembled dhts information retrievable however time initially entered user lapsed information recoverable user never informed decryption key vanish currently exists firefox plug-in allows user enter text either standard gmail email facebook message choose send message via vanish message encrypted sent via normal networking pathways cloud recipient recipient must firefox plug-in decrypt message plugin accesses bittorrent dhts 8-hour lifespans means user may select expiration date message increments 8 hours expiration user-defined time span information dht overwritten thereby eliminating key user recipient may copies original encrypted message key used turn back plain text gone although particular instance data become inaccessible important note information always saved means expiration copied even via screen shots published
[ 7600, 4380, 5078 ]
Test
10,742
7
CITIC_Telecom_CPC:citic telecom cpc citic telecom international cpc limited formerly known psinet hk cpcnet wholly owned subsidiary citic telecom international holdings limited technological company involved managed cloud computing ip networking information security data center services company owns operates computing security networking facilities communications linkages in-country local sales offices 2016 citic telecom cpc extended global reach acquiring linx telecommunication b.v. linx telecommunications became one first asian ict service providers points-of-presence along “ one belt one road ” infrastructure framework including amsterdam frankfurt warsaw vilnius lithuania stockholm helsinki finland saint petersburg russia moscow tallinn estonia riga latvia kiev ukraine budapest hungary almaty kazakhstan tibilisi georgia baku azerbaijan locations citic pacific acquired psinet hk 2001 following year psinet hk renamed cpcnet subsequently renamed “ citic telecom cpc ” six 6 points-of-presence beijing shanghai guangzhou shenzhen hong kong taiwan citic telecom cpc began providing mpls vpn services hong kong taiwan companies business operations mainland china 2006 citic telecom cpc launched information security services year citic telecom cpc expanded presence greater china south-east asia 2010 citic telecom international holdings limited acquired china enterprise ict solutions limited citic telecom cpc 2011 cloud computing solution launched 2011 cpcnet renamed citic telecom international cpc limited citic telecom cpc became one first vmware vcloud ® powered service providers greater china 2016 saw citic telecom cpc commence acquired acquiring linx telecommunications linx telecommunication b.v. renamed merged company citic telecom cpc europe acquisition extended citic telecom cpc global infrastructure points-of-presence central asia central eastern europe markets including regions encompassed china “ one belt one road ” economic cooperation initiative 2017 citic telecom cpc also became first iaas provider receive new cloud-centric iso27017 certification hong kong citic telecom cpc thus became first asian managed services provider points-of-presence across multitude countries along new “ digital silk road ” including amsterdam frankfurt warsaw vilnius lithuania stockholm helsinki finland saint petersburg russia moscow tallinn estonia riga latvia kiev ukraine budapest hungary almaty kazakhstan tibilisi georgia baku azerbaijan locations acquisition expanded citic telecom cpc global footprint asia pacific north america western europe encompass central asia eastern europe parent company citic telecom international holdings limited hkse 1883 ict service provider asia pacific subsidiary company china enterprise ict solutions limited “ china entercom ” “ cec ” founded 2000 information communications technology ict service provider china
[ 4194, 5373 ]
None
10,743
0
Voice_activity_detection:voice activity detection voice activity detection vad also known speech activity detection speech detection technique used speech processing presence absence human speech detected main uses vad speech coding speech recognition facilitate speech processing also used deactivate processes non-speech section audio session avoid unnecessary coding/transmission silence packets voice internet protocol applications saving computation network bandwidth vad important enabling technology variety speech-based applications therefore various vad algorithms developed provide varying features compromises latency sensitivity accuracy computational cost vad algorithms also provide analysis example whether speech voiced unvoiced sustained voice activity detection usually language independent first investigated use time-assignment speech interpolation tasi systems typical design vad algorithm follows may feedback sequence vad decision used improve noise estimate noise reduction stage adaptively vary threshold feedback operations improve vad performance non-stationary noise i.e noise varies lot representative set recently published vad methods formulates decision rule frame frame basis using instantaneous measures divergence distance speech noise different measures used vad methods include spectral slope correlation coefficients log likelihood ratio cepstral weighted cepstral modified distance measures independently choice vad algorithm must compromise voice detected noise noise detected voice false positive false negative vad operating mobile phone must able detect speech presence range diverse types acoustic background noise difficult detection conditions often preferable vad fail-safe indicating speech detected decision doubt lower chance losing speech segments biggest difficulty detection speech environment low signal-to-noise ratios snrs encountered may impossible distinguish speech noise using simple level detection techniques parts speech utterance buried noise wide range applications digital mobile radio digital simultaneous voice data dsvd speech storage desirable provide discontinuous transmission speech-coding parameters advantages include lower average power consumption mobile handsets higher average bit rate simultaneous services like data transmission higher capacity storage chips however improvement depends mainly percentage pauses speech reliability vad used detect intervals one hand advantageous low percentage speech activity hand clipping loss milliseconds active speech minimized preserve quality crucial problem vad algorithm heavy noise conditions one controversial application vad conjunction predictive dialers used telemarketing firms order maximize agent productivity telemarketing firms set predictive dialers call numbers agents available knowing calls end either “ ring – answer ” answering machines person answers typically speak briefly “ hello ” “ good evening ” etc brief period silence answering machine messages usually contain 3–15 seconds continuous speech setting vad parameters correctly dialers determine whether person machine answered call person transfer call available agent detects answering machine dialer hangs often system correctly detects person answering call agent available leaves called party frustratedly repeating “ hello hello ” phone combined volume agents get created impetus develop “ call ” lists across us evaluate vad output using test recordings compared “ ideal ” vad – created hand-annotating presence/absence voice recordings performance vad commonly evaluated basis following four parameters although method described provides useful objective information concerning performance vad approximate measure subjective effect example effects speech signal clipping times hidden presence background noise depending model chosen comfort noise synthesis clipping measured objective tests reality audible therefore important carry subjective tests vads main aim ensure clipping perceived acceptable kind test requires certain number listeners judge recordings containing processing results vads tested listeners give marks following features marks obtained listening several speech sequences used calculate average results features listed thus providing global estimate behavior vad tested conclude whereas objective methods useful initial stage evaluate quality vad subjective methods significant however expensive since require participation certain number people days generally used proposal standardized
[ 7834, 10557, 3165 ]
None
10,744
9
AtScript:atscript atscript proposed javascript-based scripting language extending microsoft typescript transcompiling javascript introduced october 2014 ng-europe conference developers google angularjs web development framework language upcoming angular 2.0 would built atscript originally intended run top typescript including features dart october 2014 google announced angular 2.0 would written atscript march 2015 microsoft announced many atscript features would implemented typescript 1.5 release angular 2.0 would built pure typescript name “ atscript ” comes “ ” symbol used annotations many languages
[ 8068, 3462, 6791, 1802, 6154, 8605, 6176, 1698, 803, 5031, 1203, 9780, 438, 4920, 1470, 7871, 5311, 5067, 339, 4056, 9560, 9561, 8923, 8289, 482, 9195, 5101, 10991, 10739 ]
Test
10,745
4
Finjan:finjan finjan holdings finjan publicly traded company nasdaq fnjn centers licensing intellectual property finjan claims patented technology used enterprise web security solutions finjan filed large number lawsuits leading software security companies asserting patents including cisco palo alto networks symantec blue coat systems sophos trend micro eset bitdefender check point qualys rapid7 fortinet others finjan named patent troll original hardware software divisions finjan acquired m86 security 2009 finjan continues hold patents various web security technologies licenses patents trustwave formerly m86 among others finjan commitment innovation security space continues investments culminated recent launch finjan consulting services business cyberisk development mobile applications consumer subsidiary finjan mobile incubation up-and-coming technology startups pioneering new generation security technologies company investment jerusalem venture partners jvp fund vii cyber labs invested alongside companies like cisco technology companies company headquartered east palo alto california finjan founded 1997 shlomo touboul serial entrepreneur founded first company shani computers 1985 sold intel 1994 worked intel starting finjan 1998 touboul decided bring experienced seasoned ceo would able develop grow company quickly left start venture capital fund 2001 company ran financial difficulties touboul asked board directors rejoin company ceo touboul realigned company strategy moving away developing software solutions combined hardware software security appliances additionally company moved channel sales model december 2002 finjan acquired assets alchemedia software developer drm product called clever content several drm patents alchemedia also ties israel founder daniel schreiber israeli though company technically headquartered dallas area 2005 following disagreements board touboul left started new company yoggie security systems october 2007 eric benhamou former ceo chairman 3com appointed chairman finjan also invested company venture capital fund benhamou global ventures november 2009 hardware software divisions finjan sold m86 security global computer security firm based orange california international headquarters london offices worldwide m86 subsequently acquired trustwave still use finjan technology patents licensing agreement finjan appliances sold trustwave secure web gateway june 2013 finjan became publicly traded company capitalized 30m installed new management team began focused program license company landmark intellectual property may 2014 finjan listed nasdaq capital market trading symbol fnjn continue trade today finjan initial shareholders included cisco microsoft bessemer venture partners benchmark capital harbourvest partners israel seed partners november 2008 company secured additional investment 22m brought total capital invested finjan since founding 67 million june 2013 finjan became publicly traded company capitalized 30m installed new management team began focused program license company landmark intellectual property may 2014 finjan listed nasdaq capital market trading symbol fnjn finjan claims invented concept proactive content security behavior-based content analysis technology claim shared others selected technology patents licensed microsoft july 2005 april 2009 finjan intellectual property portfolio included granted pending patents areas behavior-based security digital rights management finjan portfolio includes processes enable networks execute security plans counteract effects polymorphic code designed hide malware
[ 3520, 4471, 9569, 131, 4487, 7851, 3116, 10574, 1907, 9055, 119, 10166, 11577, 9215, 8668, 127 ]
Train
10,746
3
Re-order_buffer:re-order buffer re-order buffer rob used tomasulo algorithm out-of-order instruction execution allows instructions committed in-order normally three stages instructions issue execute write result tomasulo algorithm additional stage commit stage results instructions stored register memory write result stage results put re-order buffer contents buffer used executing instructions depending additional fields every entry buffer additional benefits re-order buffer include precise exceptions easy rollback control target address mispredictions branch jump rob works storing instructions original fetched order rob also accessed side since reservation station tomasulo algorithm additional parameter points instruction rob jump prediction correct nonrecoverable exception encountered instruction stream rob cleared instructions reservation stations re-initialized
[ 7173, 9739, 7699, 5655, 27, 10779, 10781, 8231, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 630, 8822, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 7858, 9911, 8890, 4286, 2241, 2243, 5329, 10966, 731, 7911, 10985, 9964, 5358...
Test
10,747
5
Remote_Desktop_Protocol:remote desktop protocol remote desktop protocol rdp proprietary protocol developed microsoft provides user graphical interface connect another computer network connection user employs rdp client software purpose computer must run rdp server software clients exist versions microsoft windows including windows mobile linux unix macos ios android operating systems rdp servers built windows operating systems rdp server unix os x also exists default server listens tcp port 3389 udp port 3389 microsoft currently refers official rdp client software remote desktop connection formerly terminal services client protocol extension itu-t t.128 application sharing protocol every version microsoft windows windows xp onwards includes installed remote desktop connection rdc terminal services client mstsc.exe whose version determined operating system last applied windows service pack terminal services server supported official feature windows nt 4.0 terminal server edition windows 2000 server editions windows xp except windows xp home edition windows server 2003 windows home server windows fundamentals legacy pcs windows vista ultimate enterprise business editions windows server 2008 windows server 2008 r2 windows 7 professional microsoft provides client required connecting newer rdp versions downlevel operating systems since server improvements available downlevel features introduced newer rdp version work downlevel operating systems connecting higher version rdp server older operating systems using rdp server older operating system based itu-t t.128 application sharing protocol draft also known t.share t.120 recommendation series first version rdp named version 4.0 introduced microsoft terminal services part product windows nt 4.0 server terminal server edition terminal services edition nt 4.0 relied citrix multiwin technology previously provided part citrix winframe atop windows nt 3.51 order support multiple users login sessions simultaneously microsoft required citrix license multiwin technology microsoft order allowed continue offering terminal-services product named citrix metaframe atop windows nt 4.0 citrix-provided dlls included windows nt 4.0 terminal services edition still carry citrix copyright rather microsoft copyright later versions windows integrated necessary support directly t.128 application sharing technology acquired microsoft uk software developer data connection limited version introduced windows 2000 server added support number features including printing local printers aimed improve network bandwidth usage version introduced windows xp professional included support 24-bit color sound client available windows 2000 windows 9x windows nt 4.0 version name client changed terminal services client remote desktop connection heritage remains day however underlying executable still named mstsc.exe version introduced windows server 2003 included support console mode connections session directory local resource mapping also introduces transport layer security tls 1.0 server authentication encrypt terminal server communications version built windows xp professional x64 edition windows server 2003 x64 x86 editions version introduced windows vista incorporated support windows presentation foundation applications network level authentication multi-monitor spanning large desktop support tls 1.0 connections version 6.0 client available windows xp sp2 windows server 2003 sp1/sp2 x86 x64 editions windows xp professional x64 edition microsoft remote desktop connection client macintosh os x also available support intel powerpc mac os versions 10.4.9 greater server 2012 support rdc 6.0 later version released february 2008 included windows server 2008 well windows vista service pack 1 client included windows xp sp3 addition changes related remote administrator connects console version new functionality introduced windows server 2008 connecting remotely individual programs new client-side printer redirection system makes client print capabilities available applications running server without install print drivers server version released manufacturing july 2009 included windows server 2008 r2 well windows 7 release also changed terminal services remote desktop services version new functions windows media player redirection bidirectional audio multi-monitor support aero glass support enhanced bitmap acceleration easy print redirection language bar docking rdp 7.0 client available windows xp sp3 windows vista sp1/sp2 kb969084 rdp 6.1 client rdp 7.0 client supported windows server 2003 x86 windows server 2003 windows xp professional x64 editions rdp 7.0 also supported windows server 2008 rdp 7.0 clients also support connecting terminal servers running windows 2000 server rdp 7.0 features like aero glass remote use bidirectional audio windows media player redirection multiple monitor support remote desktop easy print available windows 7 enterprise ultimate editions release 7.1 rdp included windows 7 service pack 1 windows server 2008 r2 sp1 2010 introduced remotefx provides virtualized gpu support host-side encoding version released windows 8 windows server 2012 version new functions adaptive graphics progressive rendering related techniques automatic selection tcp udp transport protocol multi touch support directx 11 support vgpu usb redirection supported independently vgpu support etc connection quality button displayed rdp client connection bar rdp 8.0 connections clicking provides information connection including whether udp use rdp 8.0 client server components also available add-on windows 7 sp1 rdp 8.0 client also available windows server 2008 r2 sp1 server components add-on requires dtls protocol installed prerequisite installing updates rdp 8.0 protocol enabled windows 7 machines extra configuration step needed using group policy editor new feature rdp 8.0 limited support rdp session nesting works windows 8 server 2012 though windows 7 server 2008 r2 even rdp 8.0 update support feature shadow feature rdp 7 allowed administrator monitor snoop rdp connection removed rdp 8 aero glass remoting feature applicable windows 7 machines connecting also removed rdp 8 version released windows 8.1 windows server 2012 r2 rdp 8.1 client update exists windows 7 sp1 well unlike rdp 8.0 update windows 7 add rdp 8.1 server component windows 7 furthermore rdp 8.0 server function desired windows 7 kb 2592687 rdp 8.0 client server components update must installed installing rdp 8.1 update support session shadowing added back rdp version 8.1 version also fixes visual glitches microsoft office 2013 running remoteapp version 8.1 rdp also enables restricted admin mode logging mode requires knowledge hashed password rather plaintext therefore making pass hash attack possible microsoft released 82-page document explaining mitigate type attack version 10.0 rdp includes following new features autosize zoom useful hidpi clients addition graphics compression improvements included utilizing h.264/avc microsoft introduced following features release rdp 6.0 2006 release 7.1 rdp 2010 introduced following feature version 5.2 rdp default configuration vulnerable man-in-the-middle attack administrators enable transport layer encryption mitigate risk rdp sessions also susceptible in-memory credential harvesting used launch pass hash attacks march 2012 microsoft released update critical security vulnerability rdp vulnerability allowed windows computer compromised unauthenticated clients computer worms rdp client version 6.1 used reveal names pictures users rdp server matter windows version order pick one username specified rdp connection march 2018 microsoft released patch remote code execution vulnerability credssp security support provider involved microsoft remote desktop windows remote management discovered preempt may 2019 microsoft issued security patch bluekeep vulnerability allows possibility remote code execution microsoft warned wormable potential cause widespread disruption unusually patches also made available several versions windows reached end-of-life windows xp immediate malicious exploitation followed experts unanimous likely could cause widespread harm based number systems appeared remained exposed unpatched july 2019 microsoft issued security patch rdp vulnerability affects hyper-v numerous non-microsoft implementations rdp clients servers implement subsets microsoft functionality instance open-source command-line client rdesktop available linux/unix microsoft windows operating systems many gui clients like tsclient krdc built top rdesktop cord client macintosh 2009 rdesktop forked freerdp new project aiming modularizing code addressing various issues implementing new features freerdp comes command-line-client xfreerdp supports seamless windows rdp6 ’ also gtk-application named remmina open-source implementation remote desktop protocol server unix freerdp xrdp windows remote desktop connection client used connect server proprietary rdp client solutions rdpclient available stand-alone application embedded client hardware new access paradigm browser-based access enabled users access windows desktops applications rdp hosts microsoft remote desktop rds session hosts terminal services virtual desktops well remote physical pcs also so-called vrdp used virtualbox virtual machine implementation oracle protocol compatible rdp clients provided windows unlike original rdp configured accept unencrypted password unprotected connections may useful secure trusted networks home office lans default microsoft rdp server refuses connections user accounts empty passwords changed group policy editor external guest authorization options provided vrdp well matter operating system installed guest vrdp implemented virtual machine host level guest system proprietary virtualbox extension pack required microsoft requires third-party implementations license relevant rdp patents extent open-source clients meet requirement remains unknown security researchers reported cybercriminals selling compromised rdp servers underground forums well specialized illicit rdp shops compromised rdps may used staging ground conducting types fraud access sensitive personal corporate data researchers report instances cybercriminals using rdps directly drop malware computers
[ 8576, 771, 6150, 4235, 6797, 4240, 8080, 8466, 2196, 2709, 5652, 7188, 11413, 2713, 3867, 3868, 2041, 9505, 4771, 6436, 11301, 7207, 10924, 7983, 1970, 3250, 5682, 823, 9655, 6204, 6972, 6462, 1348, 4552, 1098, 6993, 9173, 11097, 6622, 94...
Test
10,748
5
SIMPLE_(instant_messaging_protocol):simple instant messaging protocol simple session initiation protocol instant messaging presence leveraging extensions instant messaging im presence protocol suite based session initiation protocol sip managed internet engineering task force contrary vast majority im presence protocols used software deployed today simple open standard like xmpp simple applies sip problems implementations simple based protocols found sip softphones also sip hardphones simple presence specifications broken sip defines two modes instant messaging
[ 10242, 5251, 3460, 5382, 3847, 649, 4746, 1036, 9868, 11408, 3218, 9365, 10005, 11413, 3610, 5402, 3228, 5531, 3742, 10271, 3105, 9380, 2085, 9381, 3751, 3752, 9511, 1962, 10924, 9519, 562, 2996, 9909, 8758, 1467, 10171, 3133, 3006, 4797, ...
None
10,749
3
Toshiba_T3100:toshiba t3100 t3100 laptop manufactured toshiba released 1986 featured hard drive 8 mhz intel 80286 cpu black orange 9.6 gas-plasma display resolution 640x400 pixels laptop time special high-resolution 640 x 400 display mode similar partially compatible olivetti/at 6300 graphics single proprietary expansion slot 1200 bit/s modem expansion chassis 5x 8-bit isa cards ethernet nic 2400 bit/s modem 1 mb memory card thus 3.6 mb max total base model 1mb memory could upgraded 5mb toshiba t3100 true portable needed external power source except last version five versions existed japan japanese version t3100 marketed j-3100 byte 1989 listed t3100/20 among distinction winners byte awards citing amazingly clear display hard drive
[ 10273, 6311, 11657, 9166, 7983, 1776, 6004, 1141, 859 ]
Test
10,750
9
TI_Extended_BASIC:ti extended basic ti extended basic discontinued implementation basic programming language interpreter texas instruments ti-99/4a home computer ti produced extended basic cartridge greatly enhanced functionality accessible ti basic users sprites could generated set move automatically simple one-line commands custom call subprograms access memory expansion larger programs multiple statement lines statement separator boolean logic statements assembly language linkage well ability display text location screen added largely retaining compatibility ti basic equipped ti speech synthesizer ti extended basic users could also generate speech predefined vocabulary easily writing text on-screen example following line text entered command-line prompt would cause speech synthesizer identify computer multi-word phrases delimited symbol codice_1 example using word included speech synthesizer built-in vocabulary 338 words phrases would cause slowly spell word ti terminal emulator ii cartridge provided text-to-speech functionality ti extended basic also provided raw access speech synthesizer developers resources generate speech data function rarely used ti extended basic several statements present ti basic accept image linput break error warning sub subend subexit
[ 3718, 7691, 1805, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 3233, 5925, 8101, 4136, 10666, 8494, 303, 7343, 315, 7355, 7486, 7870, 4160, 4674, 8262, 712, 3533, 847, 2383, 1879, 477, 11229, 2915, 9188, 5733, 11243, 2541, 8429, 5747, 7...
None
10,751
6
Briefcase_(Microsoft_Windows):briefcase microsoft windows microsoft windows briefcase special folder supports simple two-way file synchronization another folder briefcase designed mobile pc users may transfer removable drive synchronize computer removable drive attached follows metaphor file file folder file management tasks performed windows explorer briefcase behaves like another folder i.e support copy-paste drag-and-drop additional functions toolbar buttons updating out-of-sync files windows briefcase introduced windows 95 windows briefcase synchronizes files folders within folder even removable writable media network intended users portable media multiple computers use briefcase users need use windows explorer drag copy files briefcase changes either files disk briefcase synchronized whenever user right-clicks briefcase selects update differences copies briefcase shows dialog box icon description indicating action take synchronizing whether replace copy briefcase external file vice versa action briefcase take configurable right clicking icon example users skip synchronizing individual items selecting skip action upon right clicking icon items deleted either briefcase main original folder briefcase create copy missing item users also sync individual items briefcase selecting item first clicking update button instead update update status item stored briefcase item link original item outside briefcase example drive containing briefcase inserted secondary computer original deleted main computer called orphan special folders windows briefcase folders hidden file system attribute called desktop.ini may also windows registry entries describing desktop.ini briefcase contains following lines second file called briefcase database bearing hidden system attributes filename extension serves briefcase index fourcc ddsh briefcase folder must read-only system file attributes default read-only order display briefcase desktop.ini briefcase database files required hidden system attributes order parent folder display briefcase user wishes sync file one another folder filename must exactly item renamed moved splits original longer synchronized becomes orphan item deleted associated copy default deleted well using update briefcase medium becomes full update space writing updated briefcase database effect making many folders files orphans easy way restore link counterparts source medium limitations others make briefcase files brittle easily corrupted limits robustness folder file backup mechanism
[ 2432, 3330, 5158, 5225, 6797, 9819, 9694 ]
Test
10,752
9
ISLISP:islisp islisp also capitalized islisp programming language lisp family standardized international organization standardization iso international electrotechnical commission iec joint working group iso/iec jtc 1/sc 22/wg 16 commonly termed simply sc22/wg16 wg16 primary output working group international standard published iso standard updated 2007 republished iso/iec 13816:2007 e although official publication iso versions islisp language specification available believed public domain goal standards effort define small core language help bridge gap differing dialects lisp attempted accomplish goal studying primarily common lisp eulisp le lisp scheme standardizing features shared islisp design goals islisp separate function variable namespaces hence lisp-2 islisp object system ilos mostly subset common lisp object system clos islisp implementations made many operating systems including windows unix posix based linux macos freebsd openbsd netbsd solaris hp-ux aix cygwin qnx android dos os/2 pocket pc openvms z/os implementations hardware computer architectures include x86 x86-64 ia-64 sparc sparc9 powerpc mips alpha pa-risc arm aarch64 two older implementations longer available
[ 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 5149, 9245, 8226, 5677, 3119, 3126, 1079, 2105, 3132, 6717, 7234, 8258, 8771, 3142, 8262, 1610, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 9320, 2666, 5751, 2168, 7805, 9345, 11...
None
10,753
2
Joseph_Henry_Condon:joseph henry condon joseph henry 'joe condon born february 15 1935 january 2 2012 american computer scientist engineer physicist spent career bell labs son edward condon distinguished american nuclear physicist pioneer quantum mechanics participant development radar nuclear weapons world war ii part manhattan project emilie honzik condon named 19th century american physicist joseph henry condon developed interest physics electronics early age credited introduction analytical thinking anonymous instrument maker attended johns hopkins university received bs degree physics 1958 northwestern university received ph.d. physics 1963 graduate school condon joined metallurgy research division bell laboratories murray hill new jersey arrived time division split formerly physics metallurgy chemistry one executive director split physics director chemistry metallurgy another worked five years solid-state physics metals low temperatures electronic band structure metals means oscillatory diamagnetic susceptibility de haas–van alphen effect studies beryllium silver 19661968 showed magnetic domains later called 'condon domains form non-ferromagnetic metals oscillating differential magnetic susceptibility greater unity developed theory verified experimentally condon became interested electronics engineering moving physics exposed unix honeywell 516 machines early 1970s 1960s condon contributed development local area network digital telephone switching condon ken thompson promoted use c programming language switching system control programs condon acquired small pbx telephone switch handled 50 phones made necessary hardware changes thompson wrote necessary software programs pbx code rewrite c success hastened adoption c switching system software within circa 19681969 condon head department 13 owned pdp-7 computer computer loaned dennis ritchie ken thompson used create famous early computer game space travel port various features recently cancelled multics project developments directly led development unix operating system modern derivatives 1975 condon joined computer research center bell labs c programming language unix operating system created condon colleagues automated laborious error-prone task manually converting drawings fabricate circuit boards system unix circuit design system ucds enabling rapid prototyping collaboration thompson condon created chess-playing machine belle condon designed custom hardware ken designed software 1982 condon collaborated andrew ogielski create spin glass machine single-purpose computer 5-10 times faster cray-1 designed facilitate monte carlo calculations theoretical physicists determine properties class recently discovered complex magnetic materials spin glasses various random antiferromagnets thus combining interests digital systems physics condon obituary physics today called work spin glass machine classic remain accurate day despite immense increases computing power condon retired 1989 continued consult bell labs another 10 years condon died january 2 2012 joe said natural teacher drew deep understanding physics explaining problem either basic physics digital design addition unlimited curiosity extensive knowledge delightful sense humor designs said parsimonious personal interests included american indian crafts classical music theater travel wife carol rv quaker frequent volunteer fish hospitality program local charity providing shelter homeless people single mothers
[ 6772, 9507, 5492, 2045 ]
None
10,754
2
Accredited_Symbian_Developer:accredited symbian developer accredited symbian developer asd defunct accreditation program software developers using symbian os mobile phone operating system terminated april 2011 closure symbian foundation scheme operated independently foundation behalf majinate limited also closed business foundation closed primary qualification accredited asd pass on-line multiple choice examination adhered principles symbian os curriculum curriculum reviewed annual basis ensure accreditation kept date developments symbian operating system final release curriculum made 2009 although still adhered closely asd primer learning aid published wiley symbian press imprint final version curriculum contained following major topics topic assessed marked separately examination pass required high score coverage majority topics
[ 6276, 8423, 10599, 3626, 7246, 7983, 9262, 4305, 7253, 1687, 2556, 5406 ]
Validation
10,755
2
IOS_7:ios 7 ios 7 seventh major release ios mobile operating system developed apple inc. successor ios 6 announced company worldwide developers conference june 10 2013 released september 18 2013 succeeded ios 8 september 17 2014. ios 7 introduced completely redesigned user interface design credited team led apple senior vice president design jony ive new look featuring flatter icons new slide-to-unlock function new animations described ive profound enduring beauty simplicity new design implemented throughout operating system including notification center updated three tabs offering different views information notifications visible lock screen redesigned siri voice assistant offering visual indicators control center offering easy access commonly used features ios 7 also introduced airdrop wireless sharing technology carplay phone car integration automatic app updates app store reception ios 7 mixed new design language criticized critics noting implementation design changes rather actual productivity improvements citing examples animations delaying access lack icon consistency buttons hidden negative aspects user experience addition control center praised updates siri multitasking shortly release reports new design causing sickness trend explained caused animations similar effects car sickness user adoption ios 7 fast ios market share reported high 35 one day installed 200 million devices within 5 days apple claimed fastest software upgrade history ios 7 introduced apple worldwide developers conference june 10 2013 beta release made available registered developers announcement ios 7 officially released september 18 2013. ios 7.0.1 released september 20 2013 specifically iphone 5c iphone 5s update included bug fixes allow users purchase itunes content touch id fingerprint recognition scanner rather passcode ios 7.0.2 released september 26 2013 update fixed bugs could allow someone bypass lock screen passcode reintroduced greek keyboard option passcode entry ios 7.0.3 released october 23 2013 support ipad air ipad mini 2 also included support icloud keychain password generator safari web browser updated lock screen delay slide unlock text touch id use many bug fixes ios 7.0.4 released november 14 2013 bug fixes addressing facetime calls failing ios 7.0.5 released january 29 2014 fix correcting network provisioning iphone 5s iphone 5c models china ios 7.0.6 released february 21 2014 fix ssl connection verification issue ios 7.1 released march 10 2014 update included improvements touch id fingerprint technology support carplay fix home screen crash issue also brought visual updates shift caps lock keys keyboard refined icons several apple standard apps redesign aspects phone dialer shutdown screens ios 7.1.1 released april 22 2014 bug fixes ios 7.1.2 released june 30 2014 bug fixes improved ibeacon connectivity stability last version ios supported iphone 4. ios 7 introduced complete visual overhaul user interface sharper flatter icons slimmer fonts new slide-to-unlock function new control panel slides bottom screen frequently accessed settings operating system also significantly redesigned standard pre-installed apps apple jony ive apple head design commented profound enduring beauty simplicity clarity efficiency true simplicity derived much absence clutter ornamentation bringing order complexity ... ios 7 clear representation goals whole new structure coherent applied across entire system ios 7 introduced airdrop wireless sharing technology accessible share icon lets users send files local device nearby ios devices enabled control center options controlling discovery devices including contacts everyone launch airdrop available iphone 5 later fourth-generation ipad later ipad minis fifth-generation ipod touch ios 7 introduced control center menu users access swiping bottom screen providing access frequently used settings airplane mode wi-fi bluetooth disturb mode rotation lock slider adjusting screen brightness controls music playback along volume slider flashlight toggle also available icon quickly accessing camera ios 7 overhauled notification center visual functional changes three tabs today information coming day missed notifications visible phone lock screen notifications synchronized across devices users n't need dismiss notification multiple times different devices ios 7 expanded screen app switching users double-tapped home button taken current app view full-screen thumbnails recently accessed apps carplay formerly ios car released part ios 7.1 integrates selected car models offer phone interaction including music controls maps navigation car display users also talk siri send messages hands-free supports lightning-equipped iphones ios 7.1 later siri features new design assistant fades background app blurred speaking visual vocal waves appear form spinning circle device communicates apple servers siri control limited set device settings including bluetooth assistant alternatively send user directly settings menu query controlled voice otherwise displays error request ca n't processed searching internet bing became default search engine siri web resources expanded include wikipedia siri also deeply connected twitter offering full tweet search ios 7 also allowed user change siri gender new options male female voices spotlight search accessed holding dragging home screen ios 7 came new wallpapers included parallax effect icons appear moving user moves phone around producing illusion icons floating background wallpaper settings users option make custom vibrations certain types notifications turn parallax wallpaper animation effect using reduce motion setting block callers block applying across multiple devices apps including phone messages facetime home screen newly installed apps recently updated apps blue dot next user opens app first time folders updated incorporate different pages similar home screen layout allowing significant expansion folder functionality page folder contain nine apps 15 pages total allowing total 135 apps single folder app store received several significant changes ios 7 users enable automatic app updates users view history updates installed app location services enabled app store near tab recommends popular apps based user geographic location also became possible download older versions apps case new ios versions left older devices incompatible system updates allowing users maintain working copy last supported update app ios 7 introduced square photo mode camera app enabling instagram-style photos also new live filters nine different filter options change photo appearance improvements camera included ability pinch-to-zoom video recording burst mode easily taking successive photos holding shutter button causing phone take 10 frames per second iphone 5s slow-motion video option added ability shoot video high frame rate 120 frames per second edited photos app users decide start end slow-motion part photos app updated new categorization options three tabs bottom photos shared albums open different app sections featuring galleries main photos interface app displays timeline photos sorted years collections moments filters added allowing users choose several types filters add photos alongside existing options sharing pictures app updated support new airdrop functionality music app integrated apple itunes radio service station-based music service let users choose artist service generating station based similar artists songs users able skip songs search history previous songs addition able purchase songs directly itunes store playing itunes radio also feature showed songs currently trending twitter itunes radio free ad-supported users could subscribe itunes match enabled ad-free playback two years release itunes radio eventually discontinued january 2016 features moving new apple music music subscription service beats 1 radio station ios 7 safari web browser received multiple significant updates two search bars found previous iterations browser combined single smart search field tab management improved allow eight open tabs well stacking tabs top vertically opposed horizontal card view option enter private tab built app rather settings menus new track button allows user manage privacy levels apple maps features turn-by-turn walking directions design maps updated feature full-screen view interface elements search bar disappear view alongside new translucent search lower toolbars night mode automatically activates users drive night separate siri volume control available maps enabling users change relative volume siri voice feedback independently system volume n't shout loud background music weather app ios 7 received significant changes including new icon absence static weather indicator app thumbnail home screen new dynamic visual representations current weather ios 7 facetime app iphone facetime audio feature allows users call wi-fi facetime audio accessible phone app contacts app facetime app available devices running ios 7 later messages app allows users see timestamps every message sent received reception ios 7 mixed mark rogowsky forbes criticized multiple aspects new design including 3d effect home screen wallpaper writing interaction ios 7 screen background challenging best writing new overall design language operating system icons fly screen whenever unlock like kind videogame effect pointless delays access phone fraction second arguably distracting joshua topolsky verge also criticized design noting lack icon consistency different parts os well writing instead correcting issues notification panel alerts apple simply given fresh coat paint several layers sub-navigation ... nothing actually speed productivity device nielsen norman group research company wrote extensive report user-experience ios 7 summarizing report flat design hides calls action swiping around edges interfere carousels scrolling david pogue new york times however liked minimalist design ios 7 writing longer spend new os 're grateful fixing de-annoyifying display swipe upward bottom screen open control center compact visual palette controls settings functions 're likely need also praised improvements siri voice assistant writing siri much better concluded writing structure layout features represent apple best work look ios 7 — well judgment darrell etherington techcrunch focused many new features introduced praising control center incredibly useful airdrop great although noting lack interoperability ios mac time siri generally useful new multitasking features smarter multitasking screen much better conclusion wrote question ios 7 dramatic change ios many users already know love balance update packed plenty new features make using apple mobile devices easier enjoyable critics noted influence competition mobile platforms design functionality ios 7 note use concepts android windows phone similarly minimal typographic design control center equivalent similar settings toggles notification shade android similar multitasking menu webos even design weather app almost identical windows 8 htc sense sascha segan pc magazine stated apple brilliance putting pieces together marketing apple developer apis history making money developers still reign supreme—there less piracy android bigger audience design flexibility windows phone adoption rate ios 7 reported high 35 one day within five days ios 7 installed 200 million devices apple claimed fastest software upgrade history august 2014 reported 91 ios devices ran ios 7 time september 2013 pranav dixit fast company reported user complaints shared apple support forums new design ios 7 including many zoom animations multitasking opening closing apps addition slight parallax effect causing users feel sick dixit noted parallax effect could turned animations option dr. george kikano division chief family medicine uh case medical center ohio told fox news ’ validity people susceptible fox news wrote dr. kikano said new parallax function causes background phone subtly move back forth feature leads effect unlike car sickness inner ear responsible balance eyes vision things sync feel dizzy nauseous people get people n't people get used adrian kingsley-hughes zdnet wrote march 2014 iphone ipad users reported battery drain ios 7.1 update lab testing andrew cunningham ars technica found hardware models experienced minor battery depletion others experienced statistically significant changes dom esposito 9to5mac reported june 2014 new lock screen bypass method discovered ios 7 allowing access phone 5 seconds certain circumstances issue later fixed ios 7 release fake advertisements claimed update would cause devices become waterproof airdrop mechanism protecting device screen breaking dropped release apple dropped support older devices specifically iphone 3gs fourth-generation ipod touch
[ 9732, 1549, 4111, 5647, 7697, 6675, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8767, 576, 5696, 2630, 8774, 8783, 4180, 10838, 1623, 3672, 9308, 3167, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 5784, 1177, 42...
None
10,756
4
Trojan_horse_(computing):trojan horse computing computing trojan horse trojan malware misleads users true intent term derived ancient greek story deceptive trojan horse led fall city troy trojans generally spread form social engineering example user duped executing e-mail attachment disguised appear suspicious e.g. routine form filled clicking fake advertisement social media anywhere else although payload anything many modern forms act backdoor contacting controller unauthorized access affected computer trojans may allow attacker access users personal information banking information passwords personal identity also delete user files infect devices connected network ransomware attacks often carried using trojan unlike computer viruses worms trojans generally attempt inject files otherwise propagate terminology occurred first time us air force report 1974 analysis vulnerability computer systems made popular ken thompson 1983 turing award acceptance lecture reflections trusting trust subtitled mentioned knew possible existence trojan horses report security multics unfortunately unable find reference however paul karger roger schell affirm cited report trojan way may require interaction malicious controller necessarily distributing trojan fulfil purpose possible involved trojans scan computers network locate trojan installed hacker control trojans take advantage security flaw older versions internet explorer google chrome use host computer anonymizer proxy effectively hide internet usage enabling controller use internet illegal purposes potentially incriminating evidence indicates infected computer ip address host computer may may show internet history sites viewed using computer proxy first generation anonymizer trojan horses tended leave tracks page view histories host computer later generations trojan tend cover tracks efficiently several versions sub7 widely circulated us europe became widely distributed examples type trojan german-speaking countries spyware used made government sometimes called govware govware typically trojan software used intercept communications target computer countries like switzerland germany legal framework governing use software examples govware trojans include swiss minipanzer megapanzer german state trojan nicknamed r2d2 german govware works exploiting security gaps unknown general public accessing smartphone data becomes encrypted via applications due popularity botnets among hackers availability advertising services permit authors violate users privacy trojans becoming common according survey conducted bitdefender january june 2009 trojan-type malware rise accounting 83 global malware detected world trojans relationship worms spread help given worms travel across internet bitdefender stated approximately 15 computers members botnet usually recruited trojan infection
[ 3072, 11266, 4100, 5636, 10245, 3595, 5131, 9227, 9233, 9746, 8726, 535, 9242, 2041, 9761, 2084, 3620, 4648, 4649, 9256, 9771, 3116, 3629, 46, 6707, 8243, 5689, 10297, 3643, 7739, 3135, 1088, 9791, 2114, 4165, 10309, 9800, 5707, 81, 4689,...
None
10,757
2
IBM_TopView:ibm topview topview first object-oriented multitasking windowing personal computer operating environment pc dos developed ibm announced august 1984 shipped march 1985 topview provided text-mode although also ran graphics mode operating environment allowed users run one application time pc ibm demonstrated early version product key customers making generally available around time shipped new pc computer microsoft announced windows 1.0 november 1983 international business machines ibm microsoft important partner popularizing ms-dos ibm pc notably announce support forthcoming window environment ibm determined microcomputer market needed multitasking environment released topview 1985 press speculated software start ibm plan increase control ibm pc even though nothing ibm pc proprietary including bios published world creating proprietary operating system similar ibm offered years larger computers topview also allowed ibm serve customers surprised new ibm come operating system able use hardware multitasking protected mode features new 80286 cpu dos applications still running 8086/8088 real mode even given topview virtual memory management capabilities hardware limitations still held new environment back—a base 256 kb ram room 80 kb application code data ram dos topview loaded 512-640 kb recommended load two typical application programs time maximum earlier ibm xt could installed loaded topview took back much memory consumed dos still enough satisfy industry critics topview ran real mode x86 processor could run well behaved dos programs i.e programs write directly screen used bios int 10h dos int 21h ibm assistant series productivity programs arrangement windows well behaved applications would use standard dos bios function calls access system services hardware misbehaving programs i.e programs write directly screen lotus 1-2-3 wordstar dbase iii would still run topview environment would consume entire screen object-oriented applications written using topview api topview updated make use virtual 8086 mode added intel 80386 processors allowed better virtualization initially compatibility extended features limited mainly ibm applications along third-party products like wordperfect volkswriter chicken-and-egg situation developed third-party developers reluctant add extended feature support block insert delete allow users cut/copy/paste applications see market demand dos programs however support functions allow user perform cut copy paste operations using topview pop-up menus believed ibm planned use topview force rely comply new technical specifications later versions topview released able successfully make challenging dos apps run multitasking fashion intercepting direct access system services hardware topview first introduced program information files pif files defined given dos program run multi-tasking environment notably avoid giving unnecessary resources could remain available programs topview pif files inherited extended quarterdeck desqview microsoft windows concept program information files also used digital research operating systems concurrent dos multiuser dos datapac system manager real/32 however using pifed command necessary program information got directly embedded .exe .com executable file version 1.1 introduced june 1986 added support ibm pc network ibm 3270 terminal emulation importantly support swapping non-resident programs added—onto hard disk computers high memory area machines equipped 286 cpu initially poor support dos batch files improved version 1.12 introduced april 1987 added support new ibm ps/2 series dos 3.30 operating system new ps/2 mice could also use four serial ports topview sold expectations start many potential users already satisfied cheaper less memory-intensive tsr task switchers like ready spotlight borland sidekick n't need multitasking environment topview ran graphics mode topview /g however rarely used mid-1987 ibm began shift focus away topview promoting use os/2 developers end users alike os/2 1.0 pre-emptive multitasking multithreading os allowed one real mode multiple 16-bit protected mode sessions run time pc/at based 80286 provided dos alternative announced april 1987 made available later december graphical user interface presentation manager added os/2 1.1 october 1988 1.1 could run without presentation manager well embedded system screen keyboard mouse interface required ibm officially stopped marketing final release topview version 1.12 3 july 1990 topview concept carried forward dos multitaskers notably quarterdeck desqview retained topview user interface many features plus added features support special features 80286 80386 compatible processors desqview/x released june 1992 true gui interface running dos variety similar programs topview also available including one dynamical systems called mondrian microsoft bought 1986 stated intention implementing topview api compatibility windows never happened later april 1992 ibm introduced os/2 2.0 included virtual 8086 mode full 32-bit support intel 80386 superseding even desqview similar environments os/2 2.0 priority based preemptive multitasking multithreading os including 32 levels priority time critical idle time 386 topview requires ibm pc dos versions 2.0 5.0 ms-dos 2.0 6.0 run later releases key contributors topview included david morrill father topview code-named orion glass project moved boca raton dennis mckinley tasking ross cook memory management bob hobbs topview toolkit neal whitten product manager bill gates steve ballmer gordon letwin key microsoft executives accepted invitation ibm executive estridge ibm boca raton see special demonstration topview gates disturbed windows multitasking windows used cooperative method share cpu windowing capabilities i.e overlapping windows etc topview gates witnessed topview running multiple copies microsoft basic interpreter running windows overlapping side-by-side multitasking fashion microsoft later released multitasking version ms-dos 4.0 multitasking learned meeting even though joint development agreement microsoft development topview estridge asked later told whitten whitten topview team wishes turn source code documentation topview microsoft within short time meeting estridge request granted gates gave code documentation group headed nathan myhrvold code modified according gates specifications purchased company product mondrian never released gates however gave members team key positions microsoft led joint development agreement microsoft agreement previously included dos co-develop os/2 agreement lasted 1990 done order satisfy usa vs. ibm anti-trust court case filed 1969 even though dismissed 1982 ibm mired antitrust troubles decade dismissal recover legal morass early mid-90s june 1990 ftc probe launched possible collusion microsoft ibm pc software market infoworld 1985 described topview bland plain vanilla software hogs far much memory byte also criticized topview memory usage stated find software written ibm pc topview-compatible noting low price innovative multitasking features magazine predicted software attract lot takers 1985 digital research positioned multitasking concurrent dos 4.1 gem alternative topview
[ 6148, 6797, 5006, 2201, 6311, 2345, 7849, 7983, 7986, 2355, 9397, 10040, 5450, 6730, 2380, 5080, 8792, 1247, 5856, 8301, 9455, 1776, 6129, 242, 499, 7285, 3960, 3323 ]
Test
10,758
4
Excellent_SME:excellent sme excellent sme international project aiming establish white list small medium enterprises sme means certification system project brings emphasis web site certification since internet becoming prevailing media promotion search business opportunities partners project built three pillars excellent sme certificate obtained companies meeting basic criteria certificate issued period 1 year however credit score permanent monitoring certificate revoked prematurely holder credit score drops 6 publishing certificate holder exposes good standing business successful practices publishing possible holder web site stationery promotional materials vehicles etc observer thus instantly establish level trust would otherwise require inquiries credit rating agencies consequence selection business partner becomes easier faster cheaper risk free growing number certified companies business environment becomes transparent good enterprises exposed visible client easier task finding partner project initiated 2012 slovenia partners chamber commerce industry slovenia credit rating agency technology provider connet d.o.o serbia joined project year 2013 macedonia romania followed 2014 bulgaria joined
[]
Train
10,759
1
Registry_of_Open_Access_Repositories:registry open access repositories registry open access repositories roar searchable international database indexing creation location growth open access institutional repositories contents roar created eprints university southampton uk 2003 began institutional archives registry renamed registry open access repositories 2006 date 3,000 institutional cross-institutional repositories registered 2015 roar uk-based directory open access repositories opendoar considered two leading open access directories worldwide roar larger directory allows direct submissions directory opendoar controls submission materials dependent discretion staff opendoar requires open access scholarly publications whereas roar allows types materials included roar allows filtering country type repository sorting repository name roar companion registry open access repository mandates policies roarmap searchable international database policies charts growth open access mandates policies adopted universities research institutions research funders require researchers provide open access peer-reviewed research article output depositing open access repository created eprints university southampton 2003 institutional self-archiving policy registry became registry open access repository material archiving policies 2006 registry open access repositories mandatory archiving policies registry open access repository mandates policies around 2014 roarmap mandates classified terms strength effectiveness melibea october 2015 open-access mandates adopted 520 universities 75 research funders worldwide
[ 4984, 1857, 7923, 7575 ]
None
10,760
2
Ipkg:ipkg ipkg itsy package management system lightweight package management system designed embedded devices resembles debian dpkg used unslung operating system linksys nslu2 optware openwrt openmoko webos gumstix ipaq qnap nas appliances elsewhere early 2017 still used synology nas appliances luneos operating system although opkg increasingly common replacement usual package management systems ipkg command-line utility allows installation new packages upgrading removal existing packages querying package repositories available packages listing already installed packages development project discontinued many projects formerly used ipkg adopted ipkg fork opkg replacement
[ 4225, 2178, 11525, 2310, 2955, 7435, 7181, 7947, 9487, 2448, 3089, 1682, 788, 1813, 8213, 10900, 6680, 8476, 5670, 4775, 7847, 6828, 10109, 6446, 7983, 1842, 823, 2872, 6583, 3131, 5819, 10172, 190, 3649, 10817, 9671, 5067, 3918, 463, 366...
None
10,761
2
PlayStation_4_system_software:playstation 4 system software playstation 4 system software updatable firmware operating system playstation 4 operating system orbis os based freebsd 9 native operating system playstation 4 orbis os fork freebsd version 9.0 released 12 january 2012 playstation 4 features two graphics apis low level api named gnm high level api named gnmx developers start gnmx wraps around gnm turn manages esoteric gpu details familiar way work developers used platforms like direct3d 11 another key area game programmable pixel shaders sony playstation shader language pssl introduced playstation 4 suggested playstation shader language similar hlsl standard directx 11 subtle differences could eliminated part preprocessor macros besides kernel related components components included worth mentioning cairo jquery lua mono openssl webkit pixman rendering library many open-source software although playstation 4 open console software development kit sdk based llvm clang sony chosen due conformant c c++ front-ends c++11 support compiler optimization diagnostics playstation 4 uses playstation dynamic menu graphical shell contrast xrossmediabar xmb used playstation portable playstation 3 well livearea used playstation vita playstation tv named dynamic menu options offers players context sensitive changing based player actually playstation 4 given time makes navigation simpler previous iteration dynamic menu alter little time possible users placing game disc drive actual gameplay beginning playstation 4 user interface attempts simplicity priority main place entertainment options content area prominently displayed large square icons horizontal line arranged recently used users scroll gamer newsfeed alternating brick-like formation reminiscent social media site pinterest many main objects display additional information cursor selected game may news updates advertisements downloadable content recently played games receive tiles along number mandatory items like live playstation internet browser applications content icon customization options sort would give players way mold display better suit needs augmented reality application playroom comes pre-installed playstation 4 console demonstrated e3 2013 utilizes sony playstation camera technology according sony fantastically fresh augmented reality entertainment experience created combining light bar located front dualshock 4 controller playstation camera players allowed produce small floating robot called asobi interacts players scans faces shoots fireballs playstation camera identifies player help light bar front flick touchpad dualshock 4 controller brings augmented reality bots function playroom creates illusion hundreds little bots inside controller released simply tap track pad functions like playstation vita ps4 owners view smartphone playstation vita drawing object flick anywhere augmented reality bots play remote play users operate ps4 uses playstation vita handheld game console allowing play ps4 games media small device via streaming games except exceptions require playstation move playstation camera compatible second screen used display unique content playing games support option confused split screen second screen may used show extra contents example maps alternate camera angles radar even playbooks sports games apart playstation vita mobile devices ipad android tablet also used second screen comes form official playstation app game companion apps knack quest heavy emphasis social features placed playstation 4 console loading ps4 number share-centric apps features new feature allows users check friends latest activities via landing page full pictures trophies recent events easy way find friends hand cross-chat feature dubbed party chat interesting way keep touch gives gamers ability chat users whether 're playing title ps4 sharing capabilities adds another layer console gaming ps4 owners able capture livestream gameplay simple button touch record 60 minutes latest gaming exploits quick press share button controller footage shared facebook twitter youtube also ability broadcast gameplay real time twitch ustream addition recording videos also social features community creation introduced via system updates favorite groups new section within friends app acts way quickly access people user plays feature aimed making easier faster get game session friends hand communities new hubs formed around shared interests like games activities play styles also exist smaller social features ps4 ability message friend request watch gameplay live playstation 4 console function without internet connection provide functionality connected internet example updates system software may downloaded internet users may play online internet properly connected online play main pillar playstation 4 playstation plus subscription required play majority ps4 titles online unlike playstation 3 titles according sony developing many new ways play connect ps4 requires large investment resources result sony claim keep service free maintain quality time considering cost thus decided would better charge fee order continue offer good service web browser included playstation 4 console based open source webkit layout engine unlike playstation 3 uses netfront browser using modern webkit core safari apple ps4 web browser receives high score html5 compliance testing however support adobe flash means websites require flash might display properly function intended also pdf format supported however one clear advantage gamers able cut gaming browsing back loss gameplay due multitasking feature web browser additionally ps4 web browser limited support usb keyboards seem support usb mice furthermore internet connection enabled playstation 4 allows users access variety playstation network psn services including playstation store playstation plus subscription service users may download buy games contents services also gamers able play selection ps3 titles via internet-based playstation gaming service playstation 4 supports playing 2d 3d blu-rays dvds. previously system software update required standard new consoles instead console needs go online activate player first time used system support audio cds internally year console launch sony partnered spotify bring music streaming service playstation 4 well predecessor february 2015 including ability stream music background game application plus ability control music playback via smartphone computers etc available free premium subscribers spotify sony later added blu-ray 3d support console via system update users also use media player application enjoy videos photos music saved usb storage devices media servers ps4 may serve good portable device video enjoyment addition game playing following multimedia file formats supported although according playstation support website ps4 could play mp4 videos support mp4 files encoded h.264/mpeg-4 avc high profile aac-lc playstation 4 backward compatible games previous playstation consoles launch though playstation 4 users play playstation 3 games directly 2014 playstation cloud-based streaming service allowed streaming selected ps3 games december 2015 sony added playstation 2 backward compatibility republished ps2 games dark cloud grand theft auto iii ps4 via playstation store americas europe supported ps2 games run via software emulation upscaled high definition ps4 systems instead remastered one updated access various ps4 features including trophies share play broadcasting remote play second-screen features however original ps2 game discs ps2 classics re-released ps3 compatible ps4 system arabic chinese simplified chinese traditional czech danish dutch english united kingdom english united states french canada french france finnish german greek hungarian indonesian italian japanese korean norwegian polish portuguese brazil portuguese portugal russian romanian spanish latin america spanish spain swedish thai turkish vietnamese initial version system software playstation 4 1.01 pre-installed original consoles support remote play second screen experiences added version 1.50 launched day playstation 4 console released north america november 15 2013 features accessible playstation vita console using ps4 link application second screen functionality also accessible smartphones tablets playstation mobile app also able record share video clips well broadcasting gameplay twitch.tv ustream supports blu-ray dvd-video playback version 1.60 released february 4 2014 improving dvd playback version 1.60 also adds support pulse elite wireless headsets version 1.70 released april 30 2014 adds number new features addition rich video editor called sharefactory offers users tools combine edit personalize captured video clips update also adds abilities share video clips screenshots streaming copy video clips screenshots usb storage version 1.75 released july 29 2014 adding support playback blu-ray 3d also improves sound quality 1.5-speed playback blu-ray dvd video version 1.76 released september 2 2014 came minor changes last update version 2.0 released october 28 2014 version 2.00 major upgrade playstation 4 system software among features introduced share play allows playstation plus users invite online friend join play session via streaming even copy game users pass control game entirely remote user partake cooperative multiplayer physically present version also adds youtube app ability upload video clips youtube users play music stored usb storage devices also support custom themes ability change background color users set themes home screens function screens user version version 2.50 released march 26 2015 adding suspend/resume feature allow players jump games ps button games suspended low-power rest mode instead closing completely version also allows console hard drive backed restored usb flash drive september 30 2015 sony released ps4 update 3.00 introduced entirely new features user-interface enhancements among new features ability share videos directly twitter dedicated playstation plus section tweaks interface streaming youtube improvements social features messages group creation ability save screenshots pngs increase online storage capacity 1 gb 10 gb also introduced playstation plus members sony states update create new ways connect friends players around world expanding social capabilities system even april 6 2016 sony released ps4 update 3.50 would enable ps4 use remote play functionality windows macos formerly named os x vg247 reported update allow remote play functionality computers running windows 8.1 windows 10 os x yosemite os x el capitan furthermore article explains remote play support resolution options 360p 540p 720p frame rate options 30 fps 60 fps one dualshock 4 controller connected via computer usb port september 13 2016 sony released ps4 update 4.00 added high dynamic range hdr home screen folder support 1080p streaming tweaks menus game info screens greater overview streamlined interfaces march 9 2017 sony released next major firmware update version 4.50 update includes support installing applications external hard drives custom wallpapers refined quick menu simplified notifications list custom status updates new 3d blu-ray support playstation vr includes support preloading game patches however developer make use first game take advantage feature littlebigplanet 3 october 3 2017 sony released ps4 update 5.00 overhauling master/sub-account system update allows customization accounts family members roles applying parental controls account groups system replaced new friends management system along support 5.1 7.1 surround sound configurations playstation vr new tournament bracket viewer made along tweaks broadcasting 1080p streaming 60 frames per second twitch possible changes ps message notifications quick menu lastly introduces localization czech greek hungarian indonesian romanian thai vietnamese languages 5.50 released march 8 2018 includes playtime restrictions child accounts ability hide applications library custom wallpapers via usb supersampling mode ps4 pro ability delete notifications september 13 2018 sony released ps4 update 6.00 major feature added ability use remote play ios devices minor improvements may 10 2019 sony interactive entertainment added ability remove purchased games download list playstation store delete games profile gaming platforms sony gaming platforms generation gaming platforms seventh generation
[ 3077, 2061, 9743, 8725, 4636, 1067, 1587, 1080, 5177, 1083, 1091, 3651, 7748, 8266, 6732, 10316, 7249, 6738, 9306, 607, 9320, 5746, 9844, 7801, 633, 8316, 8829, 6781, 1148, 9343, 643, 11398, 4745, 6799, 7325, 2212, 6311, 4777, 684, 1718, ...
Test
10,762
9
Tim_Teitelbaum:tim teitelbaum ray tim teitelbaum born april 12 1943 united states american computer scientist known early work integrated development environments ides syntax-directed editing incremental computation educator faculty member cornell university computer science department since 1973 recognized large-scale teaching introductory programming mentoring highly successful graduate students businessman known co-founded grammatech inc. sole ceo since 1988 teitelbaum educated massachusetts institute technology carnegie mellon university 1978 teitelbaum created cornell program synthesizer one seminal systems demonstrated power tightly integrating collection program development tools deeply knowledgeable programming language semantics one unified framework 45 lectures demonstrations early ide 1979-82 well credo 1981 paper co-authored thomas reps asserted programs text hierarchical compositions computational structures edited executed debugged environment consistently acknowledges reinforces viewpoint motivated importance immediate feedback interactive systems ides teitelbaum ’ research 1980s 1990s focused problem incremental computation given program p written language l result executing p input x one efficiently determine result running p input x ’ difference x x ’ small increment x ’ -x body work graduate students teitelbaum investigated problem range languages l included attribute grammars sql first-order functional languages lambda calculus addition incremental evaluation methods work also included program transformation methods i.e. automatic derivation p incremental program p ’ executing p ’ previous result p x increment x ’ -x auxiliary information retained previous executions efficiently performs computation executing p input x ’ teitelbaum recent work aimed design implementation tools assist making software safer secure techniques include static program analysis dynamic program analysis source code machine code teitelbaum co-recipient association computing machinery sigsoft retrospective impact paper award 2010 1984 paper co-authored thomas reps synthesizer generator
[ 8262, 10413, 7634, 2675, 4980, 1783, 7421 ]
Test
10,763
6
2_GB_limit:2 gb limit 2 gb limit refers physical memory barrier process running 32-bit operating system use maximum 2 gb memory problem mainly affects 32-bit versions operating systems like microsoft windows linux although variants latter overcome barrier also found servers like ftp servers embedded systems like xbox use physical address extension pae help overcome barrier linux freebsd unix-likes support pae long hardware windows needs boot option enabled manually known 4-gigabyte tuning 4gt /3gb switch enabled executables large address aware flag set increase memory limit 3gb 32-bit processes 64-bit windows also limited 2gb however use large address aware flag well except n't require /3gb switch increases limit 4gb could also refer maximum partition size fat16 file system versions windows prior xp
[ 9762, 5356, 5293, 6797, 7983, 823, 4763 ]
None
10,764
9
Dymola:dymola dymola commercial modeling simulation environment based open modelica modeling language large complex systems composed component models mathematical equations describe dynamic behavior system developed european company dassault systèmes dymola available standalone product integrated 3dexperience part catia dymola 2020 supports version 3.4 modelica language version 3.2.3 modelica standard library well versions 1.0 2.0 functional mock-up interface fmi dymola initially designed 1978 hilding elmqvist phd thesis lund institute technology later part lund university first version dymola based dynamic modeling language also called dymola implemented simula 67 later re-implemented pascal c++ 1992 elmqvist created swedish company dynasim ab continue development dymola 2006 dassault systèmes acquired dynasim ab started integrate dymola catia 1996 elmqvist initiated modelica design effort goal develop object-oriented language modeling technical systems reuse exchange dynamic system models standardized format modelica based dymola language experience modeling languages taken account september 1997 version 1.0 modelica specification released basis prototype implementation within dymola year 2000 non-profit modelica association formed manage continually evolving modelica language development free modelica standard library since 2002 modelica language supported dymola dymola multi-engineering capabilities mean models consist components many engineering domains using modelica language sub-systems represented interconnected components lowest level dynamic behavior described mathematical equations algorithms connections components form additional equations dymola processes complete system equations order generate efficient simulation code domain-specific knowledge represented modelica libraries containing components mechanical electrical control thermal pneumatic hydraulic power train thermodynamics vehicle dynamics air conditioning etc commercial libraries dymola supports information hiding encryption typical application areas facilitated modelica libraries include automotive applications fall three main categories engine drive train modeled using engines powertrain libraries flexibility open modelica language particularly suitable modeling hybrid alternative drive trains using battery brushless dc drives electrified powertrains libraries modal bodies flexible shafts available flexible bodies library engine battery cooling supported cooling library combined hvac library human comfort library adds models occupant comfort complete vehicle thermal modeling controller components available modelica standard library hierarchically structured open-source modelica models offer unprecedented flexibility multiple vehicle configurations reusing common components multitude libraries offer capacity model complex thermo-fluid systems aircraft ranging fuel systems environmental control human comfort library provides additional models occupant comfort cabin thermal modeling flight dynamics library enables rapid modeling simulation analysis flight dynamic characteristics wide range aircraft uavs actuators flight control subsystems use brushless dc drives electrified powertrains libraries flexible beams modal bodies finite element models managed flexible bodies library ever stringent requirements environmental impact drive trend towards detailed modeling physics control systems heat ventilation air conditioning hvac library allows minimize building hvac operating costs selecting correct system control strategy avoid costly hvac system design errors early building design process human comfort library provides integrated approach simulate thermal comfort within occupied building vehicle thermo-fluid system typically modeled thermalsystem library industrial process simulation library focused paper pulp industries kinds industrial equipment modeled using mechanical libraries modelica standard library including 3d multi-body systems options flexible beams modal bodies originating finite element model actuators control systems modeled battery brushless dc drives electrified powertrains libraries thermal properties industrial machinery easily modeled cooling library addition libraries available dymola product portfolio several libraries developed third parties claytex modelon ab tlk-thermo xrg simulation additional free commercial libraries available modelica association homepage model calibration option based process measured data real device used tune parameters simulation results good agreement measured data design optimization option used tune parameters device controller improve system dynamics multiple criteria multiple cases model management includes support encryption models version control dymola utilities checking testing comparing models also included support common version management tools cvs svn git steps system development dimensioning detailed design implementation important access c code image model run hardware loop rapid prototyping simulations build simulators validation training purposes several options available achieve activities dymola supports import export according functional mockup interface fmi appropriate options exported code generated export without run-time license source code exported functional mockup units used several simulation platforms
[ 9376, 8162, 1668, 4454, 10568, 587, 8524, 4919, 6797, 3567, 7983, 499, 823, 1917 ]
Test
10,765
2
Bundle_(macOS):bundle macos nextstep openstep gnustep lineal descendants macos ios bundle file directory defined structure file extension allowing related files grouped together conceptually single item examples bundles contain executable code include applications frameworks plugins kind bundle usually contains one file representing executable code files represent resources nibs templates images sounds media systems microsoft windows resources usually included directly executable file compile time older macintoshes similar technique used additional metadata added file resource fork similar concept application directories used risc os rox desktop examples bundles contain executable code include document packages iwork documents media libraries iphoto library bundles programmatically accessed codice_1 class cocoa nextstep gnustep foundation frameworks codice_2 core foundation uniform type identifier uti apple bundle codice_3 application bundles directory hierarchies top-level directory name ends codice_4 extension application bundle first directory bundle underneath top-level directory usually named codice_5 within codice_5 usually another directory called codice_7 macs using application name gnustep contains application executable code within codice_5 folder usually also directory called codice_9 contains resources application among things codice_9 folder contains localized versions application nib files common subdirectories include codice_11 codice_12 codice_13 codice_12 directory contains frameworks used application used even another version framework exists system codice_13 directory contains frameworks used application contains applications used newer version exist elsewhere system codice_11 contains extensible code used application default finder displays application bundles also referred packages opaque files underlying structure contents bundle shown show package contents context menu item macos frameworks also stored bundles top-level directory framework bundle name name framework followed extension codice_17 top-level directory codice_18 directory subdirectories one versions framework subdirectory containing dynamic library code framework file whose name name framework possibly codice_19 folder containing header files framework subfolders codice_9 codice_18 directory also contains symbolic link codice_22 directory current version framework top-level directory symbolic links contents codice_23 finder displays framework bundles directories rather opaque files loadable bundles bundles contain code loaded runtime loadable bundles usually extension codice_24 often used plug-ins macos way load bundles even applications n't support allowing third party hacks popular applications safari apple mail default finder displays loadable bundles also referred packages opaque files underlying structure contents bundle shown show package contents context menu item many third-party macos applications utilize custom bundle format e.g candybar codice_25 aperture codice_26 vmware fusion codice_27 etc. .lproj file bundle contains localization files macos software typically contains .nib files given language along string files images need example readme license files localized files used install makers customize install packages also included application bundle
[ 4544, 10176, 10406, 3691, 9035, 6797, 3790, 8303, 8304, 3889, 9451, 10221, 2804, 4406, 4571, 7422 ]
Validation
10,766
4
Centre_for_Cybersecurity_&_Cybercrime_Investigation:centre cybersecurity amp cybercrime investigation university college dublin centre cybersecurity cybercrime investigation ucd cci centre research education cybersecurity cybercrime digital forensic science dublin ireland ucd centre cybersecurity cybercrime investigation established early 2000s developed collaborative relationships law enforcement industry across world centre cybersecurity cybercrime investigation widely regarded europe leading centre research education cybersecurity cybercrime digital forensics ucd cci trains specialist officers irish national police service garda síochána irish military personnel defence forces well international law enforcement agencies interpol europol authorities 40 countries cci also runs educational qualifications training industry sector multinational corporations memorandum understanding centre cybersecurity cybercrime investigation ucd national cyber security centre ncsc dccae irish government computer emergency response team ucd cci network formal relationships garda síochána irish defence forces interpol europol visa inc. irish banking federation well collaborations united nations office drugs crime unodc organization security co-operation europe osce european anti-fraud office olaf microsoft citibank ebay director ucd centre cybersecurity cybercrime investigation professor joe carthy bsc. phd
[ 11089, 2558 ]
Validation
10,767
3
WDC_65C134:wdc 65c134 western design center wdc w65c134s microcontroller complete fully static 8-bit computer fabricated single chip using low power cmos process w65c134s complements established growing line 65xx products wide range microcomputer applications w65c134s developed hi-rel applications minimum power required w65c134s consists w65c02s static central processing unit cpu 4096 bytes read memory rom 192 bytes random access memory ram two 16 bit timers low power serial interface bus sib configured token passing local area network universal asynchronous receiver transmitter uart baud rate timer one 16-bit monitor watch-dog timer restart interrupt twenty-two priority encoded interrupts ice interface real-time clock features including time day tod clock bus control register bcr external memory bus control interface circuitry peripheral devices many low power features innovative architecture demonstrated high performance w65c02s cpu well instruction simplicity result system cost-effectiveness wide range computational power features make w65c134s leading candidate hi-rel microcomputer applications product description assumes reader familiar w65c02s cpu hardware programming capabilities refer w65c02s data sheet additional information
[ 7170, 11395, 6925, 1170, 7445, 664, 10784, 4385, 4773, 7589, 9638, 682, 11054, 2224, 11314, 10945, 3010, 7235, 9928, 6607, 3157, 6485, 9685, 4569, 10969, 5862, 9964, 11374, 10351, 1776, 5617, 7281, 7282, 7284, 8700 ]
Train
10,768
3
Palmtop_PC:palmtop pc palmtop pc approximately pocket calculator-sized battery-powered computer compatible ibm personal computer horizontal clamshell design integrated keyboard display could used like subnotebook light enough comfortably used handheld well palmtop pcs small enough stored user shirt jacket pocket palmtop pcs distinguish palmtop computers using mostly ibm-compatible pc architecture bios well intel-compatible x86 processor devices dos-based dos stored rom many palmtop pcs came number pda office applications pre-installed rom could also run generic off-the-shelf pc software little modifications could also run operating systems geos windows 1.0-3.0 real mode minix 2.0 palmtop pcs based static hardware design low power consumption instant-on/off without need reboot depending model battery could power device several hours several days running week year standby mode combined instant-on/off feature battery would typically last week several months practical use pda first palmtop pc dip pocket pc aka atari portfolio 1989 palmtop pcs include touch-screen computers may also counted category clamshell design now-discontinued ultra-mobile pcs umpc seen successors class example
[ 1480, 6090, 7243, 8044, 9166, 10223, 3281, 3537, 499, 5681, 6129, 5080, 6618, 1083 ]
Test
10,769
2
WinG:wing computing wing pronounced win gee application programming interface designed provide faster graphics performance windows 3.x operating environments initially positioned way help game developers easily port dos games microsoft windows although quickly discontinued favor directx wing fixed two problems first problem wing fixed windows 3.x support creating device contexts dcs based device independent bitmaps actual display devices one major limitation gdi dcs write-only data written could retrieved second problem gdi drawing implemented windows 3.x video drivers included drawing bitmaps obviously performance routines varied across drivers alex st. john one creators directx said 2000 interview microsoft announced wing 1994 game developers conference demonstrating port id software doom wing shipped september 21 1994 wing interesting still fundamentally based drawing bitmaps memory outputting frames drawing done result wing deprecated directx built however windows nt 3.5 windows 95 introduced createdibsection provide support creating dcs based dibs video drivers also eventually improved wing introduced new type dc called wingdc allowed programmers read write directly using device-independent bitmaps dibs wingdib.drv driver effectively gave programmers ability windows 'd without hardware access limitations dos years programmers could write dibs wingdc yet would still access individual bits image data meant fast graphics algorithms could written allow fast scrolling overdraw dirty rectangles double buffering animation techniques wing also provided much better performance blitting graphics data physical graphics device memory since wing used dib format possible mix original gdi api calls wing calls wing would also perform graphics hardware/driver profiling test first execution program order determine best way draw dibs test showed window full red curved lines sections would wobble performance tested wing determined fastest calls cause graphics corruption profile would saved test would need performed wing out-of-the-box support i.e separate api win32 dropped windows 98 second edition integrated directx 6 absolutely nothing pass win32 apis wrapping including createdibsection wing dlls sometimes distributed application point merely became matter copying files wing.dll wing32.dll wingde.dll wingdib.drv wngpal.wnd system32 directory 32 bit windows syswow64 directory 64 bit windows regain system-wide support
[ 5761, 10243, 9348, 5765, 10886, 2183, 9609, 5259, 653, 6797, 6927, 9234, 1043, 3224, 5401, 5913, 5119, 11546, 10654, 1055, 4384, 8607, 10658, 2083, 4771, 8227, 2854, 7846, 10024, 1577, 10026, 6827, 10029, 10414, 4143, 9263, 11570, 8246, 658...
None
10,770
2
Nokia_N86_8MP:nokia n86 8mp nokia n86 8mp high-end smartphone announced 17 february 2009 released may 2009 runs symbian os 9.3 s60 3rd edition fp2 part nseries shares similar design features n97 one main selling points carl zeiss photography features nokia first camera phone 8 megapixel sensor although late compared manufacturers features multiple aperture settings mechanical shutter uncommon features standards camera phones carl zeiss lens wide angle view 28 mm equivalent also auto focus dual led flash 3rd generation dual-leds af assist light video capture resolution 640 × 480 pixels vga 30 frames per second n86 continuous form factor nokia n95 n85 dual-sliding form factor whilst adding toughened glass front cover metal detailing keypad making look feel premium 2.6-inch amoled display fast 434 mhz processor 8 gb internal memory also kickback stand n85 possible use small standalone screen possible configure opening stand launch applications video player also supports n-gage gaming platform n86 8mp regarded spiritual successor n95 8gb due feature set sliding form factor commercial failure n96 regard successor n82 due camera n86 8mp 3.5g 3.75g 3gpp device dual-band hsdpa support quad-band gsm wi-fi a-gps receiver links location-based services via nokia maps photographs automatically geo-tagged also built-in digital compass fm radio also fm transmitter rated give 6 hours talktime 25 hours music playback 11 days standby full charge optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone ovi maps 3.03 free navigation released 17 march 2010 nokia n86 new version available via sw update application file size 8.24 mb n86 e72 e55 e52 6730 6710 s60 3rd edition feature pack 2 nokia symbian^1 s60 5th edition devices get experience beta-testing free navigation 6 july 2009 nokia n86 8mp received big firmware upgrade v11.043 brought official ovi store compatibility ovi web site shortcut option download dedicated client camera tweaks usual early firmware bug fixes improvements 30 september 2009 nokia n86 8mp received v20 firmware upgrade full week ahead schedule 8 mb large air ota update significant changes improved still image video quality close-up focus face detection indicated yellow square red-eye removal added new focus point indication shows scene camera focusing 11 january 2010 nokia n86 8mp got minor update v21 firmware version 21.006 replaced v20.115 maintenance release improving performance fixing number minor bugs 15 april 2010 version 30.009 firmware mainly features latest ovi maps client available via nokia software update 142 mb air 5085 kb includes latest ovi maps 3.03 free navigation sharing location via facebook realplayer interface tweaked d-pad problem playing videos usual minor fixes improvements 20 may 2010 includes latest ovi maps 3.04 new version adds formal support wifi positioning method part overhaul positioning functionality plus significant performance improvements search zooming map panning number consumer-friendly ui tweaks addition qype information places database nokia n87 successor n86 leaked internet full specifications december 2009 early 2010 however never released instead touchscreen nokia n8 introduced november 2010 prototype n87 appeared ebay shows running probably symbian^3 listing removed time seller nokia would never release another high-end non-touchscreen device n86 8mp
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 9262, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, ...
Validation
10,771
9
Pry_(software):pry software pry interactive shell ruby programming language notable smalltalk-inspired ability start repl within running program lets programmers debug modify current state system pry exposes introspective capabilities using filesystem metaphor example codice_1 command start interacting particular object uses codice_2 list methods variables possible start pry point inside running program due reflective nature ruby lets programmer inspect program change current state correct source code without restarting process number third party plugins available pry add tighter integration ruby projects enhance abilities pry make pry available remote connection
[ 7430, 9229, 2191, 655, 7695, 7325, 9245, 7983, 564, 4277, 5945, 1852, 5567, 6338, 11208, 5578, 9946, 10973, 2786, 1379, 6502, 11625, 8554, 5612, 2804, 6134 ]
None
10,772
4
Forcepoint:forcepoint forcepoint previously known websense raytheon|websense austin-based company owned u.s. defense contractor raytheon private equity firm vista equity partners develops markets cybersecurity software prevent employees viewing inappropriate malicious content leaking confidential data also sells firewall cloud access cross-domain security products forcepoint founded 1994 reseller called netpartners renamed websense 1999 went public following year vista equity partners acquired websense 2013 906 million taking public market raytheon acquired 80 interest websense april 2015 1.9 billion afterwards websense acquired network security vendor stonesoft intel renamed combined company forcepoint websense founded 1994 phil trubey dot-com boom name netpartners company began reseller network security products developed software controlling internet use employees 1998 netpartners raised 6 million venture capital funding 6 million annual revenue later year investors pushed trubey ceo position appointed john carrington replacement 1999 netpartners renamed websense following year websense raised 65.7 million initial public offering 2006 former mcafee ceo gene hodges succeeded carrington websense ceo year websense acquired fingerprint security company called portauthority 90 million followed 400 million acquisition email security vendor surfcontrol 2007 2009 websense acquired defensio spam malware company focused social media undisclosed sum 2009 websense 1,400 employees offices england china australia israel two years later facebook deployed websense check every link users shared site 2013 websense became private company vista equity partners acquired 906 million websense headquarters moved san diego year austin texas 2014 raytheon acquired 80 interest websense april 2015 1.9 billion followed 389 million purchase two companies stonesoft sidewinder october 2015 intel stonesoft network security product previously known mcafee next-generation firewall sidewinder firewall previously known mcafee firewall enterprise january 2016 three companies combined rebranded forcepoint new company also included raytheon cyber products business time forcepoint 2,000 employees one-third customers departments federal government united states forcepoint became smallest five major businesses owned raytheon highest profit margins following year forcepoint began shuffling executives re-organization effort included layoffs company divided four business units cloud security network security data insider threat security global governments february 2017 forcepoint announced acquisition cloud-based access broker casb security product imperva called skyfence undisclosed sum april 2016 matthew moynahan appointed ceo forcepoint august 2017 forcepoint acquired user entity behavior analytics company redowl undisclosed amount company products used block certain websites portions website inspect network traffic filter e-mails control sensitive files accessed forcepoint products also used prevent employees accessing websites deemed inappropriate workplace viewing employer example employers may prevent employees viewing pornographic content work material sex education religion dating politics forcepoint also develops markets firewall products based part technology acquired mcafee former stonesoft business intel security sidewinder product. ref name= http //www.channelweb.co.uk 2017 /ref company develops markets cloud access security broker casb products using technology acquired previously imperva skyfence product also sells analytics software detect insider data leaks several cross domain security products using forcepoint products employees internet browsers usually modified direct traffic proxy server server hosts local copies frequently-visited websites order improve download speed software also checks every url employee visits databases websites identified malware prohibited subject-matter employee url history analyzed identify risky behaviors 1997 three years forcepoint founded company published version 3 software version 3.0 introduced software first graphical web-based administrative user interface time forcepoint software used prevent employees viewing certain types content work 2006 features added detect employees attempting visit websites suspected hosting malicious code 2007 websense introduced product control content user see social media websites endpoint security product website reputation ranker small business version additionally product added websense suite identifies sensitive files un-secure locations corporate network looks records files transmitted websense introduced first appliance product 2009 following year products consolidated triton software became responsible increasingly large portions company revenue february 2012 forcepoint released cloud-based suite security products smartphones tablets laptops usb drives mobile devices upgrades suite 2012 added ability identify confidential information image file three new products revisions introduced 2016 focused security risks caused employees forcepoint policy selling governments isps engage internet censorship however criticized perceived link censorship free speech dissemination knowledge 2009 discovered yemeni government using forcepoint products monitor public internet use block tools allow citizens hide internet use government software alkasir created circumvent forcepoint responded cutting country access forcepoint database updates 2011 forcepoint said would join global network initiative focused privacy internet freedom left initiative 2014 2002 study jama found forcepoint best-performing web-filtering products terms blocking pornography allowing health information contrast 2005 report rhode island branch american civil liberties union said forcepoint blunt instrument public libraries equipped forcepoint people ages still denied access wide range legitimate material 2006 report brennan center justice found forcepoint often blocked websites discussed pornography actually feature pornography forcepoint software also blocked furniture website called the-strippers.com pornographic instead website furniture refinisher author study 0-15 percent sites blocked forcepoint viewable user 10 percent objectionable websites let rather blocked according blogger jillian york forcepoint blocks pages contain pornographic links anywhere content even comments section said malicious attacker could get whole site blocked time simple procedure leaving dangerous malicious pornographic links blog comments approximately 15 minutes 2009 forcepoint classified router company cisco website 'hack sites due one cisco ip addresses named hacking website ip address reviewed deemed threat
[ 3520, 11104, 1994, 3885, 11470, 9855, 9817, 3962, 10523, 5373, 4863 ]
Test
10,773
4
AssureSign:assuresign assuresign electronic signature software solution deployed software service saas application installed customer premises documents signed using computer internet connection assuresign electronic signature technology first use patent-pending biometric handwritten mouse-based signatures assuresign documentnow documenttrak api tools enable users integrate existing environments assuresign maintains partner program includes integration partners resellers available via microsoft dynamics marketplace salesforce.com appexchange assuresign also integrated third party applications including microsoft sharepoint oracle duck creek technologies insurance applications assuresign electronic signature technology developed 2006 offering third party verification inc. 3pv assuresign llc formed separate company 2008 david brinkman dale combs assuresign 3pv consistently ranked orlando sentinel top 100 companies working families
[ 10090, 467, 10207 ]
Test
10,774
6
Union_mount:union mount computer operating systems union mounting way combining multiple directories one appears contain combined contents union mounting supported linux bsd several successors plan 9 similar subtly different behavior example application union mounting consider need update information contained cd-rom dvd cd-rom writable one overlay cd mount point writable directory union mount updating files union directory cause end writable directory giving illusion cd-rom contents updated plan 9 operating system bell labs mid-1980s onward union mounting central concept replacing several older unix conventions union directories example several directories containing executables unioned together single directory replace variable command lookup shell plan 9 union semantics greatly simplified compared implementations posix-style operating systems union two directories simply concatenation contents directory listing union may display duplicate names also effort made recursively merge subdirectories leading extremely simple implementation directories unioned controllable order union directory denotes file called first constituent directory contains file unix/posix implementations unions different requirements plan 9 implementation due constraints traditional unix file system behavior greatly complicates implementation often leads compromises problems union mounting unix-like operating systems encounters include early attempts add unioning unix filesystems included 3-d filesystem bell labs translucent file service sunos sun microsystems 1988 implementation union mounting added bsd version unix version 4.4 1994 taking inspiration earlier attempts plan 9 stackable file systems spring sun 1994 4.4bsd implements stack-of-directories approach outlined like plan 9 operations traverse stack top-down resolve names unlike plan 9 bsd union mounts recursive contents subdirectories appear merged union directory also unlike plan 9 version layers except top read-only modifying files union causes contents first copied top layer stack modifications applied deletion files implemented writing special type file called whiteout top directory effect marking file name non-existent hiding files name lower layers stack whiteouts require support underlying file system union mounting implemented linux 0.99 1993 initial implementation called inheriting file system abandoned developer complexity next major implementation unionfs grew fist project stony brook university attempt replace unionfs aufs released 2006 followed 2009 overlayfs 2014 last union mount implementation added standard linux kernel source code similarly glusterfs offers possibility mount different filesystems distributed across network rather located machine
[ 8214, 6947, 5158, 2479, 7728, 7983, 1844, 2230, 823, 9151, 9665, 8772, 10436, 8395, 9693, 2397, 2910, 8298, 5363, 5492 ]
None
10,775
4
Anatoly_Kucherena:anatoly kucherena anatoly grigorievich kucherena born 23 august 1960 russian attorney public figure doctor law professor mid-2013 kucherena represented former nsa contractor edward snowden interests russian federation kucherena continues represent snowden pro bono occasional basis 2013 according izvestia known person spoke favour banning anonymizer software advocating prosecution development distribution usage including malware software category view contradicts terminology used industry june 2014 american film director oliver stone acquired rights screen adaptation kucherena novel time octopus story fictional american whistleblower joshua kold threatened government waiting decision request russian asylum cold spends three weeks transit area moscow airport stone said anatoly written 'grand inquisitor'-style russian novel weighing soul fictional whistleblower gravity 1984 tyranny achieved global proportions book first psychological-political thriller trilogy released 3 march 2015 russian 29 january 2017 english moscow times reported kucherena said snowden received copy book liked april 2015 wikileaks revealed oliver stone paid 1 million movie rights kucherena novel different times kucherena also represented
[ 7515, 2958, 3495 ]
Test
10,776
3
Unikernel:unikernel unikernel specialised single address space machine image constructed using library operating systems developer selects modular stack minimal set libraries correspond os constructs required application run libraries compiled application configuration code build sealed fixed-purpose images unikernels run directly hypervisor hardware without intervening os linux windows first systems exokernel nemesis late 1990s library operating system protection boundaries pushed lowest hardware layers resulting library os architecture several advantages disadvantages compared conventional os designs one advantages since single address space need repeated privilege transitions move data user space kernel space therefore library os provide improved performance allowing direct access hardware without transition user mode kernel mode traditional kernel transition consists single trap instruction context switch performance gains may realised elimination need copy data user space kernel space although also possible zero-copy device drivers traditional operating systems disadvantage separation trying run multiple applications side side library os strong resource isolation become complex addition device drivers required specific hardware library os runs since hardware rapidly changing creates burden regularly rewriting drivers remain date os virtualization overcome drawbacks commodity hardware modern hypervisor provides virtual machines cpu time strongly isolated virtual devices library os running virtual machine needs implement drivers stable virtual hardware devices depend hypervisor drive real physical hardware however protocol libraries still needed replace services traditional operating system creating protocol libraries bulk work lies implementing modern library os additionally reliance hypervisor may reintroduce performance overheads switching unikernel hypervisor passing data hypervisor virtual devices reducing amount code deployed unikernels necessarily reduce likely attack surface therefore improved security properties unikernels shown around 4 size equivalent code bases using traditional os due nature construction possible perform whole-system optimisation across device drivers application logic thus improving specialisation unikernels regularly shown boot extremely quickly time respond incoming requests requests time-out unikernels lend creating systems follow service-oriented microservices software architectures high degree specialisation means unikernels unsuitable kind general purpose multi-user computing traditional operating systems used adding additional functionality altering compiled unikernel generally possible instead approach compile deploy new unikernel desired changes number new approaches constructing unikernels varying degrees maturity
[ 2560, 6155, 6675, 7187, 25, 4637, 9245, 9762, 4643, 6180, 5158, 7217, 10803, 9784, 10809, 576, 2625, 6221, 3160, 10333, 97, 11363, 6760, 10856, 8298, 9835, 7285, 4727, 2168, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10891, 67...
None
10,777
4
Cooperative_Cyber_Defence_Centre_of_Excellence:cooperative cyber defence centre excellence nato ccd coe officially nato cooperative cyber defence centre excellence nato küberkaitsekoostöö keskus one nato centres excellence located tallinn estonia centre established 14 may 2008 received full accreditation nato attained status international military organisation 28 october 2008 nato cooperative cyber defence centre excellence international military organisation mission enhance capability cooperation information sharing among nato member nations partners cyber defence virtue education research development lessons learned consultation 2003 prior country official accession nato estonia proposed creation centre excellence 2006 riga summit listed possible cyber attacks among asymmetric threats common security acknowledged need programs protect information systems long term cyber attacks estonia 2007 highlighted first time potential vulnerability nato countries institutions societies even nato disruption penetration information communications systems estonia proposals nato cyber excellence center received strong support alliance secretary-general jaap de hoop scheffer nato completed assessment situation partly light estonia experience april 2007 approved nato policy cyber defence january 2008 nato summit communiqué bucharest april announced nato readiness provide capability assist allied nations upon request counter cyber attack august 30 2018 colonel jaak tarien replaced merle maigre director organisation cyber defence center tallinn one 21 accredited centres excellence coes training technically sophisticated aspects nato operations funded nationally multi-nationally centers closely linked allied command transformation promote alliance-approved transformation goals main agenda facility centre also responsibilities include currently 22 sponsoring nations joined centre addition centre three contributing participants nato ccd coe founding nations estonia germany italy latvia lithuania slovakia spain hungary poland united states netherlands joined following years 2014 france united kingdom czech republic austria first non-nato country joined centre november 2015 finland greece turkey joined june 2019 bulgaria denmark norway romania joined membership nato ccd coe open nato nations nato ccd coe also establish cooperative relations non-nato nations universities research institutions businesses contributing participants
[ 9688, 4689, 9246 ]
Validation
10,778
9
Big_ball_of_mud:big ball mud big ball mud software system lacks perceivable architecture although undesirable software engineering point view systems common practice due business pressures developer turnover code entropy type design anti-pattern term popularized brian foote joseph yoder 1997 paper name defines term foote yoder credited brian marick originator 'big ball mud term sort architecture programmers control big ball mud project strongly encouraged study understand accomplishes use loose basis formal set requirements well-designed system could replace technology shifts client-server web-based file-based database-based may provide good reasons start scratch discussion lisp programming language term big ball mud used differently case describe malleability lisp system lisp generally possible result confluence features lisp extraordinarily flexible even extent language implementation may completely rewritten runtime i.e reflective metaprogramming result lisp systems becoming muddy time due fluidity ease may extended evolve simple use metalinguistic abstraction prominent characteristic lisp also allows programmers develop entirely new idiosyncratic conceptual vocabularies describe processes functions programs go tackling problem domain combined poor software documentation result lisp systems work quite well indeed quite well-structured design perspective comprehensible original coders anyone else willing invest time sift layers highly recursive code joel moses credited coining phrase 1970s apl like beautiful diamond – flawless beautifully symmetrical ca n't add anything try glue another diamond n't get bigger diamond lisp like ball mud add still ball mud – still looks like lisp moses strongly denies claiming instead called lisp bean bag always returns original shape
[ 2519, 10211, 6502, 7189, 11255 ]
Validation
10,779
3
Tomasulo_algorithm:tomasulo algorithm tomasulo ’ algorithm computer architecture hardware algorithm dynamic scheduling instructions allows out-of-order execution enables efficient use multiple execution units developed robert tomasulo ibm 1967 first implemented ibm system/360 model 91 ’ floating point unit major innovations tomasulo ’ algorithm include register renaming hardware reservation stations execution units common data bus cdb computed values broadcast reservation stations may need developments allow improved parallel execution instructions would otherwise stall use scoreboarding earlier algorithms robert tomasulo received eckert–mauchly award 1997 work algorithm following concepts necessary implementation tomasulo algorithm common data bus cdb connects reservation stations directly functional units according tomasulo preserves precedence encouraging concurrency two important effects instructions issued sequentially effects sequence instructions exceptions raised instructions occur order would in-order processor regardless fact executed out-of-order i.e non-sequentially tomasulo algorithm uses register renaming correctly perform out-of-order execution general-purpose reservation station registers hold either real value placeholder value real value unavailable destination register issue stage placeholder value initially used placeholder value tag indicating reservation station produce real value unit finishes broadcasts result cdb placeholder replaced real value functional unit single reservation station reservation stations hold information needed execute single instruction including operation operands functional unit begins processing free source operands needed instruction real practically speaking may exceptions enough status information exception available case processor may raise special exception called imprecise exception imprecise exceptions occur non-oooe implementations processor state changed program order see risc pipeline exceptions programs experience precise exceptions specific instruction took exception determined restart re-execute point exception however experience imprecise exceptions generally restart re-execute system determine specific instruction took exception three stages listed stages instruction passes time issued time execution complete issue stage instructions issued execution operands reservation stations ready else stalled registers renamed step eliminating war waw hazards execute stage instruction operations carried instructions delayed step operands available eliminating raw hazards program correctness maintained effective address calculation prevent hazards memory write result stage alu operations results written back registers store operations written back memory concepts reservation stations register renaming common data bus tomasulo algorithm presents significant advancements design high-performance computers reservation stations take responsibility waiting operands presence data dependencies inconsistencies varying storage access time circuit speeds thus freeing functional units improvement overcomes long floating point delays memory accesses particular algorithm tolerant cache misses additionally programmers freed implementing optimized code result common data bus reservation station working together preserve dependencies well encouraging concurrency tracking operands instructions reservation stations register renaming hardware algorithm minimizes read-after-write raw eliminates write-after-write waw write-after-read war computer architecture hazards improves performance reducing wasted time would otherwise required stalls equally important improvement algorithm design limited specific pipeline structure improvement allows algorithm widely adopted multiple-issue processors additionally algorithm easily extended enable branch speculation tomasulo algorithm outside ibm unused several years implementation system/360 model 91 architecture however saw vast increase usage 1990s 3 reasons many modern processors implement dynamic scheduling schemes derivative tomasulo ’ original algorithm including popular intel x86-64 chips
[ 7173, 9739, 7699, 5655, 10781, 8231, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 630, 8822, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 7858, 9911, 8890, 4286, 2241, 2243, 9932, 5329, 10966, 731, 7911, 10985, 5356, 9964, 535...
Train
10,780
2
List_of_Linux_adopters:list linux adopters linux adopters organizations individuals moved operating systems linux local governments come pressure institutions world trade organization international intellectual property alliance turned linux free software affordable legal alternative pirated software expensive proprietary computer products microsoft apple commercial companies spread linux affords leverage countries companies developed world bid government contracts since low-cost option exists furnishing alternative path development countries like india pakistan many citizens skilled computer applications afford technological investment first world prices cost factor one considered though – many governmental institutions public military sectors north america european union make transition linux due superior stability openness source code turn leverages information security linux often used technical disciplines universities research centres due several factors including linux available free charge includes large body free/open-source software extent technical competence computer science software engineering academics also contributor stability maintainability upgradability ibm ran advertising campaign entitled linux education featuring young boy supposed linux examples large scale adoption linux education include following linux used extensively servers businesses long time linux also used corporate environments desktop platform employees commercially available solutions including red hat enterprise linux suse linux enterprise desktop ubuntu
[ 2560, 4616, 3082, 5644, 5139, 9237, 8727, 4637, 10785, 3618, 6180, 9257, 1584, 5681, 8242, 9266, 4161, 10817, 8772, 6213, 8268, 589, 10316, 593, 2134, 5721, 3162, 3677, 2658, 6244, 5222, 10856, 6763, 4207, 9851, 5244, 4734, 11391, 7812, 8...
Test
10,781
3
Hazard_(computer_architecture):hazard computer architecture domain central processing unit cpu design hazards problems instruction pipeline cpu microarchitectures next instruction execute following clock cycle potentially lead incorrect computation results three common types hazards data hazards structural hazards control hazards branching hazards several methods used deal hazards including pipeline stalls/pipeline bubbling operand forwarding case out-of-order execution scoreboarding method tomasulo algorithm instructions pipelined processor performed several stages given time several instructions processed various stages pipeline fetch execute many different instruction pipeline microarchitectures instructions may executed out-of-order hazard occurs two simultaneous possibly order instructions conflict data hazards occur instructions exhibit data dependence modify data different stages pipeline ignoring potential data hazards result race conditions also termed race hazards three situations data hazard occur consider two instructions occurring program order read write raw data hazard refers situation instruction refers result yet calculated retrieved occur even though instruction executed prior instruction prior instruction processed partly pipeline example first instruction calculating value saved register second going use value compute result register however pipeline operands fetched 2nd operation results first yet saved hence data dependency occurs data dependency occurs instruction dependent completion instruction write read war data hazard represents problem concurrent execution example situation chance may finish i.e. concurrent execution must ensured result register stored chance fetch operands write write waw data hazard may occur concurrent execution environment example write back wb must delayed finishes executing structural hazard occurs part processor hardware needed two instructions time canonical example single memory unit accessed fetch stage instruction retrieved memory memory stage data written and/or read memory often resolved separating component orthogonal units separate caches bubbling pipeline detected using hazard control unit branching hazards also termed control hazards occur branches many instruction pipeline microarchitectures processor know outcome branch needs insert new instruction pipeline normally fetch stage bubbling pipeline also termed pipeline break pipeline stall method preclude data structural branch hazards instructions fetched control logic determines whether hazard could/will occur true control logic inserts pipeline thus next instruction would cause hazard executes prior one sufficient time finish prevent hazard number equals number stages pipeline processor cleared instructions proceed free hazards forms stalling introduce delay processor resume execution flushing pipeline occurs branch instruction jumps new memory location invalidating prior stages pipeline prior stages cleared allowing pipeline continue new instruction indicated branch several main solutions algorithms used resolve data hazards case out-of-order execution algorithm used task removing data dependencies delegated compiler fill appropriate number instructions dependent instructions ensure correct operation re-order instructions possible example write value 3 register 1 already contains 6 add 7 register 1 store result register 2 i.e following execution register 2 contain value 10 however i1 write 3 register 1 fully exit pipeline i2 starts executing means r1 contain value 3 i2 performs addition event i2 adds 7 old value register 1 6 register 2 contains 13 instead i.e error occurs i2 reads register 1 i1 committed/stored result write operation register 1 i2 reading contents register 1 register 1 still contains 6 3 forwarding described helps correct errors depending fact output i1 3 used subsequent instructions value 3 committed to/stored register 1 forwarding applied example means wait commit/store output i1 register 1 example output 3 making output available subsequent instruction case i2 effect i2 uses correct recent value register 1 commit/store made immediately pipelined forwarding enabled instruction decode/execution id/ex stage pipeline two inputs value read register specified example value 6 register 1 new value register 1 example value 3 sent next stage instruction execute/memory access ex/mem added control logic used determine input use avoid control hazards microarchitectures event branch causes pipeline bubble incorrect instructions entered pipeline care must taken prevent wrongly-loaded instructions effect processor state excluding energy wasted processing discovered loaded incorrectly memory latency another factor designers must attend delay could reduce performance different types memory different accessing time memory thus choosing suitable type memory designers improve performance pipelined data path
[ 7173, 9224, 9739, 2066, 7699, 5655, 10779, 10786, 6181, 8231, 6184, 10796, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 604, 1122, 3175, 8815, 630, 8822, 6268, 3197, 7313, 3226, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 785...
Train
10,782
7
Visual_Cloud:visual cloud visual cloud implementation visual computing applications rely cloud computing architectures cloud scale processing storage ubiquitous broadband connectivity connected devices network edge devices cloud data centers model providing visual computing services consumers business users allowing service providers realize general benefits cloud computing low cost elastic scalability high availability providing optimized infrastructure visual computing application requirements rise cloud computing enabled convergence powerful low-cost computer hardware high-capacity networks advances hardware virtualization satisfy high consumer demand visually-based entertainment video gaming well online social interaction service providers began deploy visually oriented applications centralized data centers use distributed content delivery networks make content accessible users mobile consumption video content particular makes cloud delivery video attractive remote processing storage compensate limitations mobile devices much 75 world ’ mobile data traffic expected video 2020 first generation visual cloud technologies mostly oriented around streaming media applications mid-2000s saw introduction professional user generated video-on-demand services like netflix youtube multiplayer online games mogs like call duty massively multiplayer online games mmogs like world warcraft another common usage visual cloud emerged timeframe desktop virtualization based remote desktop instances hosted using cloud infrastructure visual cloud technology become capable demanding usages begun emerge use visual cloud virtual reality augmented reality 3d scene understanding interactivity immersive live experiences visual cloud applications roughly divided four primary domains overall amount video delivered throughout world increasing significantly new sources develop processing distribution content may increasingly addressed means visual cloud sources content include applications cloud communications media/entertainment enterprise environments global mobile data traffic forecast increase nearly 7x 2016 2021 three primary models content distribution compute-intensive visual workloads media content creation delivery segment include media processing e.g. compression transcoding enhancement restoration compositing content stored data centers ultimately transmitted end-users workloads many others may applied content factors bit rate resolution tailored match transmission medium capabilities end-consumer device interactive 3d e.g. virtual desktop infrastructure batch rendering e.g. renderman operations may performed scale visual cloud usages user remote site rendering operations example usages domain include following varying requirements scale performance density among workloads implications cloud resources optimally support example visual cloud infrastructure support remote desktops would likely configured goal supporting greatest practical number desktop instances per server cloud game streaming hand requires far greater attention meeting peak graphics performance likely requiring lower density per server interactive usages also highly latency sensitive remote batch rendering values time completion latency playing far less important role computations based media visual cloud used manipulate provide deeper understanding media content well provide insights based users interact media analytics treats visual information unstructured data processed fed analytics engines interpretation images audio video implement usages web visual search autonomous transportation surveillance smart cities robotics visual computing technologies media analytics segment include three subdomains media analytics often makes use “ deep learning ” frameworks involve training algorithm using large amounts source data training portion approach typically takes place extended period time involves teaching algorithm mapping large amounts input data specific output classifications resulting trained algorithm make rapid instantaneous interpretations new input data based rules developed training stage making use capabilities three usage areas described i.e. media content creation delivery cloud graphics media analytics visual data manipulated based contents support emerging usages live panoramic video augmented virtual reality vr immersive reality gaming example builds game experience top physical surroundings player real time experiences consumed purpose-built displays vr head-mounted displays conventional devices pcs tablets phones visible usages technologies include google street view pokémon go commercially available examples immersive media include voke vr live streaming freed virtual replay technology facebook 360° photos oculus rift microsoft hololens vr goggles usages immersive media segment require compute-intensive scene analysis must often performed real time near-real time visual cloud applications workloads distributed end devices cloud example head-mounted display rendering might done locally user minimize latency live vr content distribution could done predominantly cloud
[ 2720, 10368, 4194, 9508, 6153, 3123, 5371, 10270 ]
None
10,783
2
Object_resurrection:object resurrection object-oriented programming languages garbage collection object resurrection object comes back life process object destruction side effect finalizer executed object resurrection causes number problems particularly possibility object resurrection – even occur – makes garbage collection significantly complicated slower major reason finalizers discouraged languages deal object resurrection various ways solutions problems rare circumstances object resurrection used implement certain design patterns notably object pool circumstances resurrection undesired bug caused error finalizers general resurrection discouraged object resurrection occurs via following process first object becomes garbage longer reachable program may collected destroyed deallocated object destruction garbage collector deallocates object finalizer method may run may turn make object another garbage object reachable object finalizer reachable creating references finalizer may contain arbitrary code happens referenced object – necessarily finalized object – longer garbage deallocated otherwise references would become dangling references cause errors used generally program crash unpredictable behavior instead order maintain memory safety object returned life resurrected order detect garbage collector generally two-phase collection presence finalizers first finalize garbage finalizer re-check garbage garbage reachable objects finalizers case finalizers resurrected garbage adds overhead delays memory reclamation resurrected object may treated objects may treated specially many languages notably c java python python 3.4 objects finalized avoid possibility object repeatedly resurrected even indestructible c objects finalizers default finalized re-registered finalization cases resurrected objects considered errors notably objective-c treated identically objects notably python prior python 3.4 resurrected object sometimes called zombie term used various object states related object destruction usage depending language author zombie object specialized meaning objective-c however detailed zombie objects somewhat analogous zombie processes undergone termination state change close deallocation details significantly different .net framework notably c vb.net object resurrection instead refers state object finalization object brought back life inaccessible finalizer run returned inaccessible longer registered future finalization .net objects need finalization tracked object-by-object instead stored finalization queue rather notion resurrected objects sense article one speaks objects queued finalization objects re-enqueued finalization via codice_1 taking care multiply enqueue objects two main ways object resurrect another object creating reference object reach garbage reachable garbage reference non-garbage objects creating reference environment global variables cases static variables variables closure python examples follow object resurrecting also possible object resurrect objects collected given garbage collection cycle mechanisms resurrects creating reference object reach resurrects creating reference global environment examples cpython prior 3.4 run finalizers repeatedly objects garbage-collected cpython 3.4 later finalizers called objects garbage-collected second time become unreachable object resurrection causes large number problems languages adopted several different methods coping object resurrection commonly two-phase garbage collection presence finalizers prevent dangling references finalizing objects particularly marking objects finalized via flag ensure objects destroyed java free object proven object unreachable run finalizer python prior python 3.4 standard cpython implementation would treat resurrected objects identically objects never finalized making indestructible objects possible would garbage collect cycles contained object finalizer avoid possible problems object resurrection starting python 3.4 behavior largely java objects finalized marked already finalized garbage collection cycles two phases second phase checking resurrected objects objective-c 2.0 put resurrected objects zombie state log messages sent nothing else see also automatic reference counting zeroing weak references handling weak references .net framework notably c vb.net object finalization determined finalization queue checked object destruction objects finalizer placed queue creation dequeued finalizer called manually dequeued prior finalization codice_3 re-enqueued codice_4 thus default objects finalizers finalized finalization suppressed objects finalized multiple times resurrected made accessible re-enqueued finalization weak references default track resurrection meaning weak reference updated object resurrected called short weak references weak references track resurrection called long weak references object resurrection useful handle object pool commonly used objects obscures code makes confusing used objects may frequently used construction/destruction time-consuming example could array random numbers large number created destroyed short time actually small number use time object resurrection pooling technique would reduce unnecessary overhead creation destruction pool manager would get onto object stack information form reference object currently destructed pool manager keep object reuse later
[ 2304, 1954, 10470, 4747, 1715, 3573, 541 ]
Test
10,784
3
Ricoh_2A03:ricoh 2a03 ricoh 2a03 rp2a03 ntsc version ricoh 2a07 rp2a07 pal version 8-bit microprocessor manufactured ricoh nintendo entertainment system video game console contained second sourced mos technology 6502 core modified disable 6502 binary-coded decimal mode 22 memory-mapped i/o registers controlled apu rudimentary dma game controller polling also used sound chip secondary cpu nintendo arcade games punch-out donkey kong 3 pal versions nes sold europe asia australia used ricoh 2a07 rp2a07 processor identical 2a03 except different clock divider 50 hz vertical refresh rate used pal television standard exception 16 hard-coded sampling rates delta modulation-encoded sample playback unit changes made order sampled sounds maintain original pitch rp2a03 new clock divider
[ 7170, 11395, 4751, 10767, 659, 664, 4385, 6949, 7589, 4136, 11054, 2874, 3010, 6981, 2635, 3157, 6485, 4569, 10969, 6878, 5862, 10351, 1776, 5617, 7281, 4211, 7282, 5237, 7284 ]
Test
10,785
2
Smack_(software):smack software smack full name simplified mandatory access control kernel linux kernel security module protects data process interaction malicious manipulation using set custom mandatory access control mac rules simplicity main design goal officially merged since linux 2.6.25 release main access control mechanism meego mobile operating system also used sandbox html5 web applications tizen architecture commercial wind river linux solutions embedded device development philips digital tv products. intel ostro os iot devices since 2016 smack required automotive grade linux agl implementations provides association linux facilities base agl security framework smack consists three components smack criticized written new lsm module instead selinux security policy provide equivalent functionality selinux policies proposed none demonstrated smack author replied would practical due selinux complicated configuration syntax philosophical difference smack selinux designs
[ 4616, 3082, 5139, 10780, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, 2762, 8909, 6352, 8...
Test