node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
10,786
3
NOP_(code):nop code computer science nop no-op noop pronounced op short operation assembly language instruction programming language statement computer protocol command nothing computer instruction sets include instruction whose explicit purpose change state programmer-accessible registers status flags memory often takes well-defined number clock cycles execute instruction sets nop simulated executing instruction operands cause effect e.g sparc processor instruction codice_1 recommended solution nop commonly used timing purposes force memory alignment prevent hazards occupy branch delay slot render void existing instruction jump place-holder replaced active instructions later program development replace removed instructions reorganizing would problematic time-consuming cases nop minor side effects example motorola 68000 series processors nop opcode causes synchronization pipeline listed nop instruction cpu architectures hardware design point view unmapped areas bus often designed return zeroes since nop slide behavior often desirable gives bias coding all-zeroes opcode nop sometimes used description action performed function sequence programming language statements function code effect might also called redundant code common compiler optimization detection removal kind code code may required grammar programming language allow blank ada codice_2 statement serves nop syntax forbids control statements functions empty codice_2 statement must used specify action required thus programmer forgets write sequence statements program fail compile second line example single c statement behaves like nop practice compilers generate code statement statement performs addition discards result indeed statement without side effects affect control flow e.g. break return removed result computation discarded simplest possible statement c behaves like nop so-called null statement semi-colon context requiring statement compiler required generate nop instruction case typically instructions whatsoever would generated alternatively empty block compound statement may used may legible cases body function block must used empty c statements empty – simple statements must end semicolon compound statements enclosed braces need following semicolon thus contexts statement grammatically required null statement used null statement useless syntactic use wider context e.g. within context loop alternatively tersely note last form may confusing generates warning compilers compiler options semicolon usually indicates end function call instruction placed round parenthesis end line code continues calling function getchar returns \n newline character essentially fast-forwarding current reading location standard input beginning next line fortran codice_4 statement used contexts last statement loop although used anywhere functionality c used used null statement fact due specification language begin end block semicolon optional end statement thus semicolon used superfluous also block consisting codice_5 may used placeholder indicate action even placed inside another begin end block python programming language codice_6 statement effect executed thus serves nop primarily used ensure correct syntax due python indentation-sensitive syntax example syntax definition class requires indented block class logic expressed codice_6 empty jquery library provides function codice_8 nothing angular framework provides angular.noop function performs operations 'codice_9 colon character shell builtin similar effect nop do-nothing operation technically nop changes special parameter exit status last command 0 may considered synonym shell builtin 'true exit status true 0 lodash library provides function codice_10 returns undefined nothing many computer protocols telnet include nop command client issue request response server without requesting actions command used ensure connection still alive server responsive noop command part following protocols partial list note unlike protocols listed imap4 noop command specific purpose allows server send pending notifications client telnet ftp servers respond noop command ok +ok programmers added quirky responses client example codice_11 daemon minix responds noop message nops often involved cracking software checks serial numbers specific hardware software requirements presence absence hardware dongles etc accomplished altering functions subroutines bypass security checks instead simply return expected value checked instructions security check routine unused would replaced nops thus removing software security functionality without attracting attention nop opcode used form nop slide allows code execute exact value instruction pointer indeterminate e.g. buffer overflow causes function return address stack overwritten
[ 8450, 255, 518, 8715, 8716, 10508, 11537, 1298, 2322, 3218, 5651, 7445, 8732, 8861, 10781, 7071, 6818, 4389, 7717, 9639, 9003, 428, 2732, 10796, 7471, 2224, 4144, 8501, 9909, 7607, 9911, 11447, 2618, 2620, 4928, 7234, 6596, 7364, 8262, 85...
Test
10,787
5
ESobi:esobi esobi integrated desktop-based information management tool standalone news aggregator delivered worldwide acer computers esobi shareware application full version esobi consists four functions 1 rss reader 2 podcast receiver 3 meta-search engine 4 data library esobi supports 32-bit 64-bit windows 7 windows vista well windows xp esobi first developed esobi inc. taipei taiwan 2006 windows computers started first market combine rss reader meta-search engine scrapbook one application aiming ease information overload web recent updates september 2009 added podcast receiver features new ui design since 2008 acer bundled simpler version esobi computers including popular netbook acer aspire one version esobi includes rss reader data library free purchase acer computers esobi also software partner transcend information inc. 90-day trial version delivered selected transcend jetflash usb flash drives esobi windows mobile android platforms also available esobi received cnet download.com 5-star editor ’ review softpedia 4-star “ good ” editor ’ review 2009
[ 106, 6797, 7983, 5681, 119 ]
None
10,788
4
Promiscuous_mode:promiscuous mode computer networking promiscuous mode mode wired network interface controller nic wireless network interface controller wnic causes controller pass traffic receives central processing unit cpu rather passing frames controller specifically programmed receive mode normally used packet sniffing takes place router computer connected wired network one part wireless lan interfaces placed promiscuous mode software bridges often used hardware virtualization ieee 802 networks ethernet ieee 802.11 frame includes destination mac address non-promiscuous mode nic receives frame drops unless frame addressed nic mac address broadcast multicast addressed frame promiscuous mode however nic allows frames thus allowing computer read frames intended machines network devices many operating systems require superuser privileges enable promiscuous mode non-routing node promiscuous mode generally monitor traffic nodes within broadcast domain ethernet ieee 802.11 ring token ring computers attached ethernet hub satisfy requirement network switches used combat malicious use promiscuous mode router may monitor traffic routes promiscuous mode often used diagnose network connectivity issues programs make use feature show user data transferred network protocols like ftp telnet transfer data passwords clear text without encryption network scanners see data therefore computer users encouraged stay away insecure protocols like telnet use secure ones ssh promiscuous mode used malicious way capture private data transit network computer security professionals might interested detecting network devices promiscuous mode promiscuous mode software might send responses frames even though addressed another machine however experienced sniffers prevent e.g. using carefully designed firewall settings example sending ping icmp echo request wrong mac address right ip address adapter operating normal mode drop frame ip stack never sees responds adapter promiscuous mode frame passed ip stack machine mac address meaning respond would ping sniffer prevent configuring firewall block icmp traffic following applications applications classes use promiscuous mode
[ 7426, 6153, 1941, 3486, 1580, 7983, 9142, 8121, 700, 7364, 842, 7502, 10705, 9939, 2006, 8922, 6624, 9440, 4580, 10341, 10343, 11112, 10346, 10349, 1776, 7411, 2292, 4085, 2558 ]
Test
10,789
3
OpenSPARC:opensparc opensparc open-source hardware project started december 2005 initial contribution project sun microsystems register-transfer level rtl verilog code full 64-bit 32-thread microprocessor ultrasparc t1 processor march 21 2006 sun released source code t1 ip core gnu general public license v2 full opensparc t1 system consists 8 cores one capable executing four threads concurrently total 32 threads core executes instruction order logic split among 6 pipeline stages december 11 2007 sun also made ultrasparc t2 processor rtl available via opensparc project also released gnu general public license v2 opensparc t2 8 cores 16 pipelines 64 threads
[ 3328, 9090, 9731, 1801, 4235, 1809, 2710, 8863, 7072, 9343, 8994, 1316, 1707, 5677, 3886, 3247, 6322, 10675, 2871, 6716, 8508, 7104, 9665, 6338, 6979, 10436, 8007, 1480, 2895, 597, 3285, 10327, 10200, 5471, 1376, 4960, 9955, 11363, 10984, ...
Validation
10,790
4
NuFW:nufw nufw software package extends netfilter linux kernel-internal packet filtering firewall module nufw adds authentication filtering rules nufw also provided hardware firewall edenwall firewalling appliance nufw restarted ffi renamed ufwi nufw ufwi extension netfilter brings notion user ip filtering nufw ufwi nufw ufwi refuses idea ip == user ip address easily spoofed thus uses algorithm perform authentication depends two subsystems nufw connected netfilter nuauth connected clients nufw algorithm following algorithm realizes posteriori authentication connection time-based association ensures identity user sent packet nufw real authentication firewall never associates user machine
[ 1792, 2049, 4480, 2563, 6797, 1172, 9496, 3482, 1436, 4511, 6431, 6559, 10531, 5924, 550, 8998, 3243, 1708, 3885, 7983, 8753, 823, 569, 5178, 5433, 11577, 9279, 5057, 1858, 4163, 10433, 11073, 2118, 5451, 4814, 9423, 10574, 7121, 10451, 1...
Test
10,791
8
Libwww:libwww libwww library world wide web modular client-side web api unix windows also name reference implementation libwww api used applications varying sizes including web browsers editors internet bots batch tools pluggable modules provided libwww add support http/1.1 caching pipelining post digest authentication deflate purpose libwww serve testbed protocol experiments software developers reinvent wheel libcurl considered modern replacement libwww 1991 1992 tim berners-lee student cern named jean-françois groff rewrote various components original worldwideweb browser nextstep operating system portable c code order demonstrate potential world wide web beginning libwww referred common library available separate product becoming generally available libwww integrated cern program library cernlib july 1992 library ported decnet may 1993 world wide web newsletter berners-lee announced common library called libwww licensed public domain encourage development web browsers initially considered releasing software gnu general public license rather public domain decided due concerns large corporations ibm would deterred using restrictions gpl rapid early development library caused robert cailliau problems integrating macwww browser 25 november 1994 version 2.17 henrik frystyk nielsen responsible libwww 21 march 1995 release version 3.0 cern put full responsibility libwww world wide web consortium w3c 1995 onwards line mode browser longer released separately part libwww package w3c created arena web browser testbed testing tool html3 css png features like libwww beta 3 arena replaced amaya 2 september 2003 w3c stopped development library due lack resources expectation development would come open source community libwww supports following protocols features include libwww supports plug-ins 19 applications used libwww integrated applications libwww developers libcurl criticised libwww portable thread-safe lacking several http authentication types neither libcurl libwww lightweight enough projects
[ 6657, 9736, 2579, 6171, 9757, 7713, 3110, 9770, 559, 4661, 3639, 10808, 64, 5707, 8268, 10834, 6231, 8281, 6747, 1642, 9834, 113, 115, 9843, 4213, 6775, 3191, 4728, 119, 124, 637, 1664, 6797, 3218, 10910, 8351, 4768, 7340, 10413, 9908, ...
Test
10,792
7
Content_addressable_network:content addressable network content addressable network distributed decentralized p2p infrastructure provides hash table functionality internet-like scale one original four distributed hash table proposals introduced concurrently chord pastry tapestry like distributed hash tables designed scalable fault tolerant self-organizing architectural design virtual multi-dimensional cartesian coordinate space type overlay network multi-torus n-dimensional coordinate space virtual logical address completely independent physical location physical connectivity nodes points within space identified coordinates entire coordinate space dynamically partitioned among nodes system every node possesses least one distinct zone within overall space node maintains routing table holds ip address virtual coordinate zone neighbors node routes message towards destination point coordinate space node first determines neighboring zone closest destination point looks zone node ip address via routing table join joining node must find node already overlay network bootstrapping nodes may used inform joining node ip addresses nodes currently overlay network joining node receives ip address node already attempt identify zone joining node randomly picks point coordinate space sends join request directed random point one received ip addresses nodes already overlay network route join request correct device via zone-to-ip routing tables node managing destination point zone receives join request may honor join request splitting zone half allocating first half allocating joining node second half honor join request joining node keeps picking random points coordinate space sending join requests directed random points successfully joins network zone split allocation complete neighboring nodes updated coordinates two new zones corresponding ip addresses routing tables updated updates propagated across network handle node departing must detecting node departure done instance via heartbeat messages periodically broadcast routing table information neighbors predetermined period silence neighbor neighboring node determined failed considered departing node alternatively node willingly departing may broadcast notice neighbors departing node identified zone must either merged taken first departed node zone analyzed determine whether neighboring node zone merge departed node zone form valid zone example zone 2d coordinate space must either square rectangle l-shaped validation test may cycle neighboring zones determine successful merge occur one potential merges deemed valid merge zones merged none potential merges deemed valid neighboring node smallest zone takes control departing node zone take-over take-over node may periodically attempt merge additionally controlled zones respective neighboring zones merge successful routing tables neighboring zones nodes updated reflect merge network see subsection overlay network one single zone merge treat routing processing mindset effectuate take-over take-over node updates neighboring zones nodes routing tables requests either zone resolve take-over node network still sees subsection overlay network two separate zones treats routing processing mindset sylvia ratnasamy paul francis mark handley richard karp scott shenker
[ 8640, 7802, 5933, 5438 ]
Test
10,793
1
Synonym_(database):synonym database synonym alias alternate name table view sequence schema object used mainly make easy users access database objects owned users hide underlying object identity make harder malicious program user target underlying object synonym alternate name object requires storage definition application uses synonym dbms forwards request synonym underlying base object coding programs use synonyms instead database object names insulate changes name ownership object locations frequently refer database object long name might appreciate able refer shorter name without rename alter code referring synonyms powerful point view allowing users access objects lie within schema synonyms created explicitly create synonym command underlying objects located database databases connected two major uses synonyms create table procedure created schema users access using schema name prefix object name way around schema owner creates synonym name table name public synonyms owned special schema oracle database called public mentioned earlier public synonyms referenced users database public synonyms usually created application owner tables objects procedures packages users application see objects following code shows create public synonym employee table user see table typing original table name wish could provide different table name table create synonym statement remember dba must create public synonyms see table public private synonym ’ mean also perform select insert update delete operations table able perform operations user needs specific privileges underlying object either directly roles application owner private synonym synonym within database schema developer typically uses mask true name table view stored procedure database object application schema private synonyms unlike public synonyms referenced schema owns table object may want create private synonyms want refer table different contexts private synonym overrides public synonym definitions create private synonyms way create public synonyms omit public keyword create statement following example shows create private synonym called addresses locations table note create private synonym refer synonym exactly would original table name synonyms private public dropped manner using drop synonym command one important difference dropping public synonym need add keyword public keyword drop all_synonyms dba_synonyms view provides information synonyms database
[ 10632, 8201, 8979, 2068, 10389, 7446, 2456, 1049, 5658, 5403, 9631, 9634, 4263, 2344, 7080, 10286, 9397, 3004, 10048, 5953, 9286, 2901, 10326, 987, 2780, 4065, 9828, 10340, 10471, 6124, 2669, 6383, 2544, 10737, 9075, 1146 ]
None
10,794
0
Noisy_text_analytics:noisy text analytics noisy text analytics process information extraction whose goal automatically extract structured semistructured information noisy unstructured text data text analytics growing mature field great value huge amounts data produced processing noisy text gaining importance lot common applications produce noisy text data noisy unstructured text data found informal settings online chat text messages e-mails message boards newsgroups blogs wikis web pages also text produced processing spontaneous speech using automatic speech recognition printed handwritten text using optical character recognition contains processing noise text produced circumstances typically highly noisy containing spelling errors abbreviations non-standard words false starts repetitions missing punctuations missing letter case information pause filling words “ um ” “ uh ” texting speech disfluencies text seen large amounts contact centers chat rooms optical character recognition ocr text documents short message service sms text etc documents historical language also considered noisy respect today knowledge language text contains important historical religious ancient medical knowledge useful nature noisy text produced contexts warrants moving beyond traditional text analysis techniques missing punctuation use non-standard words often hinder standard natural language processing tools part-of-speech tagging parsing techniques learn noisy data able process noisy data developed
[ 5857, 1890, 7780, 2059, 5197, 5399, 8440, 10557 ]
Test
10,795
3
Semantic_heterogeneity:semantic heterogeneity semantic heterogeneity database schema datasets domain developed independent parties resulting differences meaning interpretation data values beyond structured data problem semantic heterogeneity compounded due flexibility semi-structured data various tagging methods applied documents unstructured data semantic heterogeneity one important sources differences heterogeneous datasets yet multiple data sources interoperate one another essential reconcile semantic differences decomposing various sources semantic heterogeneities provides basis understanding map transform data overcome differences one first known classification schemes applied data semantics william kent two decades ago kent approach dealt structural mapping issues differences meaning pointed data dictionaries potentially solving one comprehensive classifications pluempitiwiriyawej hammer classification scheme semantic schematic heterogeneities xml data sources classify heterogeneities three broad classes moreover mismatches conflicts occur set elements population mismatch attributes description mismatch michael bergman expanded upon schema adding fourth major explicit category language also added examples kind semantic heterogeneity resulting 40 distinct potential categories table shows combined 40 possible sources semantic heterogeneities across sources different approach toward classifying semantics integration approaches taken sheth et al concept split semantics three forms implicit formal powerful implicit semantics either largely present easily extracted formal languages though relatively scarce occur form ontologies description logics powerful soft semantics fuzzy limited rigid set-based assignments sheth et al main point first-order logic fol description logic inadequate alone properly capture needed semantics besides data interoperabiity relevant areas information technology depend reconciling semantic heterogeneities include data mapping semantic integration enterprise information integration among many others conceptual actual data differences perspective vocabularies measures conventions two data sources brought together explicit attention semantic heterogeneities one means get information integrate interoperate mere twenty years ago information technology systems expressed stored data multitude formats systems internet web protocols done much overcome sources differences large number categories semantic heterogeneity categories also patterned anticipated corrected patterned sources inform kind work must done overcome semantic differences still reside
[ 49, 2948, 7180 ]
Test
10,796
3
Branch_(computer_science):branch computer science branch instruction computer program cause computer begin executing different instruction sequence thus deviate default behavior executing instructions order branch branching branched may also refer act switching execution different instruction sequence result executing branch instruction branch instructions used implement control flow program loops conditionals i.e. executing particular sequence instructions certain conditions satisfied branch instruction either unconditional branch always results branching conditional branch may may cause branching depending condition also depending specifies address new instruction sequence target address branch instruction generally classified direct indirect relative meaning instruction contains target address specifies target address found e.g. register memory location specifies difference current target addresses mechanically branch instruction change program counter pc cpu program counter stores memory address next instruction executed therefore branch cause cpu begin fetching instructions different sequence memory cells branch taken cpu program counter set argument jump instruction next instruction becomes instruction address memory therefore flow control changes branch taken cpu program counter unchanged therefore next instruction executed instruction branch instruction therefore flow control unchanged term branch used referring programs high level languages well programs written machine code assembly language high-level programming languages branches usually take form conditional statements various forms encapsulate instruction sequence executed conditions satisfied unconditional branch instructions goto used unconditionally jump begin execution different instruction sequence machine level branch instructions sometimes called jump instructions machine level jump instructions typically unconditional conditional forms latter may taken taken depending condition usually distinct forms one-way jumps often called jump subroutine invocations known call automatically save originating address return address stack allowing single subroutine invoked multiple locations code cpus flag registers earlier instruction sets condition flag register earlier instruction may arithmetic logic instruction often close branch though necessarily instruction immediately branch stored condition used branch jump overflow-flag set temporary information often stored flag register may also located elsewhere flag register design simple slower simple computers fast computers flag register place bottleneck speed instructions could otherwise operate parallel several execution units need set flag bits particular sequence also machines particular instructions condition may checked jump instruction branch label register x negative simple computer designs comparison branches execute arithmetic use power flag register branches fast computer designs comparison branches run faster flag register branches comparison branches access registers parallelism using cpu mechanisms calculation early simple cpu architectures still found microcontrollers may implement conditional jump rather conditional skip next instruction operation conditional jump call thus implemented conditional skip unconditional jump call instruction depending computer architecture assembly language mnemonic jump instruction typically shortened form word jump word branch often along informative letters extra parameter representing condition sometimes details included well range jump offset size special addressing mode used locate actual effective offset table lists machine level branch jump instructions found several well-known architectures achieve high performance modern processors pipelined consist multiple parts partially process instruction feed results next stage pipeline start working next instruction program design expects instructions execute particular unchanging sequence conditional branch instructions make impossible know sequence conditional branches cause stalls pipeline restarted different part program several techniques improve speed reducing stalls conditional branches historically branch prediction took statistics used result optimize code programmer would compile test version program run test data test code counted branches actually taken statistics test code used compiler optimize branches released code optimization would arrange fastest branch direction taken would always frequently taken control flow path permit cpus must designed least predictable branch timing cpus instruction sets power isa designed branch hints compiler tell cpu branch taken problem software branch prediction requires complex software development process run software hardware branch predictors moved statistics electronics branch predictors parts processor guess outcome conditional branch processor logic gambles guess beginning execute expected instruction flow example simple hardware branch prediction scheme assume backward branches i.e smaller program counter taken part loop forward branches larger program counter taken leave loop better branch predictors developed validated statistically running simulation variety test programs good predictors usually count outcomes previous executions branch faster expensive computers run faster investing better branch prediction electronics cpu hardware branch prediction branch hints let compiler presumably superior branch prediction override hardware simplistic branch prediction logic written without branches fewer branches often possible use bitwise operations conditional moves branch predication instead branches another technique branch delay slot approach one instruction branch always executed therefore computer use instruction useful work whether pipeline stalls approach historically popular risc computers family compatible cpus complicates multicycle cpus pipeline faster cpus longer-than-expected pipelines superscalar cpus execute instructions order
[ 3457, 8450, 7940, 1798, 8715, 8716, 9739, 3854, 6926, 6032, 8078, 1298, 8590, 10508, 7445, 663, 27, 10781, 10786, 5412, 6821, 8231, 936, 9599, 9003, 7471, 2224, 1841, 5682, 1462, 7607, 11447, 7997, 11003, 4928, 7234, 6084, 74, 9932, 2253,...
Test
10,797
7
HP_Network_Management_Center:hp network management center hp network management center nmc suite integrated hp software solutions used network managers information technology departments solutions allows network operators see catalog monitor routers switches devices network alerts staff network device fails predicts network node connection point may go designed improve operational efficiency hp longer packages network management solutions hp network management center hp offers automation orchestration cloud management software automating lifecycle services.. hp software assets first became part hewlett packard enterprise finally micro focus hp bsa security compliance subscription service attacks vulnerabilities automation providing industry compliance security alerts hp business service automation bsa software alerts come vendor bulletins agencies like national vulnerability database pci security standards council center internet security originally acquired stratavia 2010 hp database middleware automation software automates administrative tasks like provisioning configuration compliance patching release management associated databases application servers version 10 announced may 2013 hp network automation software designed simplify management complex distributed multi-vendor networks large enterprise data centers provides process-powered automation automate complete operational lifecycle network devices provisioning policy-based change management compliance security administration hp network node manager nnmi 10.00 hp nnmi smart plug-in modules use continuous spiral discovery network discovery technology provides up-to-date network topology root cause analysis allows network administrators ascertain level congestion networks identify root cause congestion product helps departments monitor networks isolate issues find outages improve network availability performance solution supports multitenancy architecture including tenant user-level map incident security allows teams manage customers departments sites one console hp network node manager smart plug-in modules ispis extend hp network node manager software ’ nnmi fault availability management hp nnm ispis performance advanced network services hp smart plug-ins integrate fault availability performance advanced network services physical virtualized network infrastructure allow network operators determine display network fault availability performance advanced services status one view progress unified workflow drill context hp automated network management anm software bundles hp network node manager hp network automation several hp smart plug-ins unify network fault availability change configuration compliance performance monitoring automated diagnostics single solution package hp network node manager delivers common console unified fault performance configuration networks second product bundle hp nnm ispis performance metrics traffic quality assurance designed monitor ensure performance network third product bundle hp ispi network engineering toolset net automates common operator tasks provides trap analytics map export capabilities hp network automation handles network change configuration management fourth product bundle hp operations orchestration software creates “ runbooks ” automate provisioning infrastructure deployment faster automated previously version 10 announced may 2013 out-of-the-box support 5,000 operations including amazon s3 storage hp arcsight hp fortify openstack sap applications hp server automation software provides enterprise server lifecycle automation tasks provisioning patching configuration compliance version 10 announced may 2013 allows organizations deploy maintain patching updating thousands servers version also update virtual servers sleeping well active may 2013 hp also released hp server automation software appliance called hp server automation standard includes much core configuration deployment compliance checking functionality found full software edition hp storage essentials single tool provides storage optimization capacity planning june 2013 hp announced version 9.6 expanded support third-party storage arrays including emc vnx block storage brocade access gateway also provided deeper integration hp 3par hp 6000 eva management server development support oracle sap business objects
[ 1638, 5384, 9353, 7983, 8756, 823, 1304 ]
None
10,798
9
PHP_Standard_Recommendation:php standard recommendation php standard recommendation psr php specification published php framework interop group similar java specification request java serves standardization programming concepts php aim enable interoperability components provide common technical basis implementation proven concepts optimal programming testing practices php-fig formed several php frameworks founders psr suggested members voted according established protocol act consistently line agreed upon processes php-fig official website psr documentation follows nowiki rfc 2119 /nowiki written scott bradner march 1997 harvard university
[ 4960, 8965, 8644, 5677 ]
Test
10,799
5
Optical_add-drop_multiplexer:optical add-drop multiplexer optical add-drop multiplexer oadm device used wavelength-division multiplexing systems multiplexing routing different channels light single mode fiber smf type optical node generally used formation construction optical telecommunications networks add drop refer capability device add one new wavelength channels existing multi-wavelength wdm signal and/or drop remove one channels passing signals another network path oadm may considered specific type optical cross-connect traditional oadm consists three stages optical demultiplexer optical multiplexer method reconfiguring paths demultiplexer multiplexer set ports adding dropping signals demultiplexer separates wavelengths input fiber onto ports reconfiguration achieved fiber patch panel optical switches direct wavelengths multiplexer drop ports multiplexer multiplexes wavelength channels continue demultiplexer ports add ports onto single output fiber lightpaths directly pass oadm termed cut-through lightpaths added dropped oadm node termed added/dropped lightpaths oadm remotely reconfigurable optical switches example 1×2 middle stage called reconfigurable oadm roadm ones without feature known fixed oadms term oadm applies types often used interchangeably roadm physically several ways make oadm variety demultiplexer multiplexer technologies including thin film filters fiber bragg gratings optical circulators free space grating devices integrated planar arrayed waveguide gratings switching reconfiguration functions range manual fiber patch panel variety switching technologies including microelectromechanical systems mems liquid crystal thermo-optic switches planar waveguide circuits although add/drop functionality oadms distinct add-drop multiplexers former function photonic domain wavelength-division multiplexing latter implicitly considered function traditional sonet/sdh networks
[ 5321, 3754, 1967, 2994, 6267 ]
Test
10,800
8
Caudium_(web_server):caudium web server caudium open source web server originally created fork roxen challenger server server written c pike pike also used create extensions server caudium different apache configuration process different directory structure different generally languages used program server extensions dynamic pages different although support php according caudium website caudium offers different performance profile apache n't fork external processes making better suited cope sudden spikes traffic
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 7443, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 11439, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 7646, 225, 1250, 865, 2404, 4837, 6379, 9580, 2287, 11376, 8691, 1061...
Test
10,801
4
Security_token:security token security token physical device used gain access electronically restricted resource token used addition place password acts like electronic key access something examples include wireless keycard opening locked door case customer trying access bank account online use bank-provided token prove customer claim tokens may store cryptographic keys may used generate digital signature biometric data fingerprint details may also store passwords designs incorporate tamper resistant packaging others may include small keypads allow entry pin simple button start generating routine display capability show generated key number connected tokens utilize variety interfaces including usb near-field communication nfc radio-frequency identification rfid bluetooth tokens audio capability designed vision-impaired people tokens contain secret information used prove identity four different ways information used time-synchronized one-time passwords change constantly set time interval e.g. per minute sort synchronization must exist client token authentication server disconnected tokens time-synchronization done token distributed client token types synchronization token inserted input device main problem time-synchronized tokens time become unsynchronized however systems rsa securid allow user resynchronize server token sometimes entering several consecutive passcodes also replaceable batteries last 5 years replaced – additional cost another type one-time password uses complex mathematical algorithm hash chain generate series one-time passwords secret shared key password unguessable even previous passwords known open source oauth algorithm standardized algorithms covered us patents password observably unpredictable independent previous ones wherefore adversary would unable guess next password may even knowledge previous passwords tokens contain chips functions varying simple complex including multiple authentication methods simplest security tokens need connection computer tokens physical display authenticating user simply enters displayed number log tokens connect computer using wireless techniques bluetooth tokens transfer key sequence local client nearby access point alternatively another form token widely available many years mobile device communicates using out-of-band channel like voice sms ussd still tokens plug computer may require pin depending type token computer os either read key token perform cryptographic operation ask token firmware perform operation related application hardware dongle required computer programs prove ownership software dongle placed input device software accesses i/o device question authorize use software question commercial solutions provided variety vendors proprietary often patented implementation variously used security features token designs meeting certain security standards certified united states compliant fips 140 federal security standard tokens without kind certification sometimes viewed suspect often meet accepted government industry security standards put rigorous testing likely provide level cryptographic security token solutions designs independently audited third-party agencies disconnected tokens neither physical logical connection client computer typically require special input device instead use built-in screen display generated authentication data user enters manually via keyboard keypad disconnected tokens common type security token used usually combination password two-factor authentication online identification connected tokens tokens must physically connected computer user authenticating tokens category automatically transmit authentication information client computer physical connection made eliminating need user manually enter authentication information however order use connected token appropriate input device must installed common types physical tokens smart cards usb tokens require smart card reader usb port respectively increasingly universal 2nd factor u2f tokens supported open specification group fido alliance become popular consumers mainstream browser support beginning 2015 supported popular websites social media sites older pc card tokens made work primarily laptops type ii pc cards preferred token half thick type iii audio jack port relatively practical method establish connection mobile devices iphone ipad android accessories well known device called square credit card reader iphone android use special purpose interface e.g crypto ignition key deployed united states national security agency tokens also used photo id card cell phones pdas also serve security tokens proper programming many connected tokens use smart card technology smart cards cheap around ten cents contain proven security mechanisms used financial institutions like cash cards however computational performance smart cards often rather limited extreme low power consumption ultra-thin form-factor requirements smart-card-based usb tokens contain smart card chip inside provide functionality usb tokens smart cards enable broad range security solutions provide abilities security traditional smart card without requiring unique input device computer operating system point view token usb-connected smart card reader one non-removable smart card present unlike connected tokens contactless tokens form logical connection client computer require physical connection absence need physical contact makes convenient connected disconnected tokens result contactless tokens popular choice keyless entry systems electronic payment solutions mobil speedpass uses rfid transmit authentication info keychain token however various security concerns raised rfid tokens researchers johns hopkins university rsa laboratories discovered rfid tags could easily cracked cloned another downside contactless tokens relatively short battery lives usually 5–6 years low compared usb tokens may last 10 years tokens however allow batteries changed thus reducing costs bluetooth low energy protocols serve long lasting battery lifecycle wireless transmission however automatic transmission power control antagonizes attempts radial distance estimates escape available apart standardised bluetooth power control algorithm provide calibration minimally required transmission power bluetooth tokens often combined usb token thus working connected disconnected state bluetooth authentication works closer 32 feet 10 meters bluetooth link properly operable token may inserted usb input device function another combination smart card store locally larger amounts identity data process information well another contactless ble token combines secure storage tokenized release fingerprint credentials usb mode operation sign-off requires care token mechanically coupled usb plug advantage bluetooth mode operation option combining sign-off distance metrics respective products preparation following concepts electronic leash near-field communication nfc tokens combined bluetooth token may operate several modes thus working connected disconnected state nfc authentication works closer 1 foot 0.3 meters nfc protocol bridges short distances reader bluetooth connection serves data provision token enable authentication also bluetooth link connected token may serve locally stored authentication information coarse positioning nfc reader relieves exact positioning connector types single sign-on sso solutions like enterprise single sign-on use token store software allows seamless authentication password filling passwords stored token users need remember passwords therefore select secure passwords secure passwords assigned usually tokens store cryptographic hash password token compromised password still protected programmable tokens marketed drop-in replacement mobile applications google authenticator miniotp used mobile app replacement well parallel backup means measures securing data may overcome applies well security tokens major threat incautious operation users shall aware permanent options threat simplest vulnerability password container theft loss device chances happening happening unawares reduced physical security measures locks electronic leash body sensor alarm stolen tokens made useless using two factor authentication commonly order authenticate personal identification number pin must entered along information provided token time output token system allows users authenticate via untrusted network internet vulnerable man-in-the-middle attacks type attack fraudster acts go-between user legitimate system soliciting token output legitimate user supplying authentication system since token value mathematically correct authentication succeeds fraudster granted access citibank made headline news 2006 hardware-token-equipped business users became victims large ukrainian-based man-in-the-middle phishing attack 2012 prosecco research team inria paris-rocquencourt developed efficient method extracting secret key several pkcs 11 cryptographic devices including securid 800 findings documented inria technical report rr-7944 id hal-00691958 published crypto 2012 trusted regular hand-written signature digital signature must made private key known person authorized make signature tokens allow secure on-board generation storage private keys enable secure digital signatures also used user authentication private key also serves proof user ’ identity tokens identify user tokens must kind number unique approaches fully qualify digital signatures according national laws tokens on-board keyboard another user interface used signing scenarios confirming bank transaction based bank account number funds transferred
[ 6916, 10631, 9745, 8978, 278, 4760, 5918, 1054, 32, 7327, 8865, 11175, 3880, 11432, 939, 6316, 1069, 7983, 6064, 3382, 5433, 10046, 3521, 10566, 3271, 7368, 2889, 7887, 10961, 5077, 9817, 7260, 6750, 4575, 7268, 3941, 2154, 11244, 8174, 7...
None
10,802
2
Nokia_C5-03:nokia c5-03 nokia c5-03 budget resistive touchscreen smartphone wlan cseries released december 2010 phone shazam music identification software social networking software included available download assisted gps ovi maps 3.0 integrated
[ 1537, 8577, 6276, 3205, 11271, 11655, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 1833, 3626, 5290, 10410, 9137, 7220, 821, 5175, 7866, 1083, 1216, 1728, 7617, ...
Validation
10,803
2
VP/CSS:vp/css vp/css time-sharing operating system developed national css began life 1968 copy ibm cp/cms time distributed ibm customers charge source code form without support part ibm type-iii library extensive in-house development today would termed software fork national css took vp/css different direction cp/cms although two systems would eventually share many capabilities technical implementations diverged substantive ways vp/css ran ibm ibm plug compatible hardware owned ncss customers site licenses including bank america standard oil california initial period running ibm system/360-67 platform used cp/cms vp/css ported system/370 series made possible ibm added virtual memory capabilities s/370 series 1972 vp/css notable supporting large numbers interactive users per machine compared ibm mainframe operating systems technical operations commercial factors played role making national css commercially viable service business vp/css shared basic architecture concepts cp/cms revolutionary time control program called cp cp/cms vp vp/css created multiple independent virtual machines vms implementing full virtualization underlying hardware – meaning time-sharing user provided private virtual machine appeared entire stand-alone computer capable running software could run bare machine including operating systems concept pioneered ibm research system cp-40 first version cp/cms design departure ibm monolithic operating systems isolating users improved system stability bug one user software could crash another user virtual machine underlying control program approach made cp/cms superior choice commercial time-sharing thus strong foundation national css broke new ground would become important new industry vm created vp ran simple single-user operating system called css derived ibm cambridge monitor system css allowed users run programs manipulate file system manage virtual devices since vp css began life cp cms respectively closely resembled systems particularly early days continuous development introduction new features vp/css ibm vm led significant differences time systems retained obvious family resemblance ibm decision add virtualization virtual memory features s/370 reflects success virtual machine approach time-sharing credit belated decision attributed ibm awareness commercial success national css 1968 founders national css saw cp/cms operating system would good foundation time-sharing business – system technical merits ability share mainframe resources among many interactive users availability source code form cost another firm interactive data corporation reached conclusion firm lured away key cp/cms technical personnel csc mit union carbide national css quickly discovered however cp/cms initial performance adequate sustain profitable operations – literally selling every available minute interactive time would pay 50k/month equipment lease crash technical project began improve performance led number fundamental enhancements soon allowed business make money thus began lengthy reimplementation effort would occupy large development team course fifteen years end lifespan vp/css diverged long way cp/cms roots boasted surprising array features would considered quite modern even today key enhancements original cp/cms system included changes dispatching algorithm paging system virtual memory course new concept time ibm system/360-67 address translation technology enabled various technical approaches ultimately vp/css page migration algorithm three-queue dispatcher became well-known ncss personnel eventually joined ibm thomas j. watson research center work vm technologies another area throughput improvement performance css single-user operating system one important change replacing channel command words ccws expensive simulated instructions something like today termed bios calls simulating complex s/360 i/o architecture virtualization amazing feat – done cp complex innermost core routine called ccwtrans i/o operations trapped within virtual machine however proved enormously cheaper make direct hypervisor calls targeted functions rather simulating operation low-level i/o commands vp/css done using paravirtualization via non-virtualized diag diagnose instruction technique used ibm cp/cms release 3.1 carried forward vm/370 unclear implementation came first – whether invented independently early national css technical efforts quickly established vp/css commercially viable version cp/cms vp/css reputed much better performance ibm reimplementation cp/cms vm/370 – turn reputed substantial performance advantage ibm preferred timesharing solution tso unfortunately documented period performance statistics hard find today however several data points support claims following relative performance believed accurate although documented sources remain located described history cp/cms ibm primary emphasis mvs successors core mainframe operating system led ibm waste substantial technical advantage represented vm/370 made possible independent vendor like ncss strike new territory industry observers pointed hardware vendor natural preference selling hardware increasing number users per machine ncss gained technical advantages ultimately became successful commercially despite fact optimization techniques used enhance vp css performance well understood well-documented literature day ultimately amdahl corporation publicized sales wins several large vp/css data centers ibm began pay public attention ncss technical innovations long thereafter time-sharing industry began feel pressure personal computer revolution need super-optimized multiuser mainframe operating system waned ncss moved away vp/css mid 80s retargeting nomad vm platforms unknown long ncss site-license customers continued use vp/css equipment though seems unlikely could continue long without ongoing ncss operating system support
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 5678, 7217, 7733, 9784, 10809, 573, 576, 10333, 97, 9829, 6248, 8298, 6772, 7285, 9335, 2168, 1147, 2172, 3197, 1150, 2179, 10883, 6797, 9361, 9366, 6296, 9370, 7325, 9887, 3238, 7848, 8879, 3248, ...
Test
10,804
4
NetIQ:netiq netiq enterprise software company based houston texas whose products provide identity access management security data center management flagship offerings netiq identity manager netiq access manager key software titles include appmanager secure configuration manager sentinel micro focus international owned netiq since 2014 mfi acquired attachmate acquired netiq 2006 six years latter acquired mission critical software .. netiq founded ching-fa hwang her-daw che hon wong ken prayoon cheng tom kemp september 1995 appmanager introduced 1996 february 2000 merger mission critical software widened company focus include systems management well performance 2001 netiq acquired webtrends whose software monitors corporate internet traffic 2006 netiq acquired attachmate attachmate acquired novell 2011 netiq added identity security products well data center virtualization offerings attachmate acquisition led today ’ alignment netiq products three categories 2014 attachmate merged micro focus international
[ 3521, 5860, 9708, 3791, 7983, 7729, 3125, 2901, 11513, 479 ]
None
10,805
2
Cleanup_stack:cleanup stack cleanup stack concept widely used symbian os suitable use places dynamic memory used allocated programming problem dynamic memory sole discretion underlying os whether request memory allocation shall succeed applications requester memory must prepared handle rejection large programs dynamic memory used almost everywhere application frequently adds code handle failure increase code size significantly symbian used mostly phones increase code size amplify memory allocation failures symbian features ingenious solution problem application notes memory allocation may fail places earlier allocated memory address location symbian aware location called cleanup stack event failure symbian knows whatever resource placed cleanup stack needs freed way resources freed program crashes leaves freeing performed automatically symbian os applications die peacefully without worrying would clean mess left cleanup stack make idea keep copy pointer allocated memory elements cleanup stack popped destroyed using push pop popanddestroy example
[ 7983 ]
Validation
10,806
4
Meet-in-the-middle_attack:meet-in-the-middle attack meet-in-the-middle attack mitm generic space–time tradeoff cryptographic attack encryption schemes rely performing multiple encryption operations sequence mitm attack primary reason double des used triple des key 168-bit bruteforced attacker 2 space 2 operations trying improve security block cipher tempting idea encrypt data several times using multiple keys one might think doubles even n -tuples security multiple-encryption scheme depending number times data encrypted exhaustive search possible combination keys simple brute-force would take 2 attempts data encrypted k -bit keys n times mitm generic attack weakens security benefits using multiple encryptions storing intermediate values encryptions decryptions using improve time required brute force decryption keys makes meet-in-the-middle attack mitm generic space–time tradeoff cryptographic attack mitm attack attempts find keys using range ciphertext domain plaintext composition several functions block ciphers forward mapping first functions backward mapping inverse image last functions quite literally meeting middle composed function example although double des encrypts data two different 56-bit keys double des broken 2 encryption decryption operations multidimensional mitm md-mitm uses combination several simultaneous mitm attacks like described meeting happens multiple positions composed function diffie hellman first proposed meet-in-the-middle attack hypothetical expansion block cipher 1977 attack used space–time tradeoff break double-encryption scheme twice time needed break single-encryption scheme 2011 bo zhu guang gong investigated multidimensional meet-in-the-middle attack presented new attacks block ciphers gost ktantan hummingbird-2 assume someone wants attack encryption scheme following characteristics given plaintext p ciphertext c enc encryption function dec decryption function defined enc inverse mapping k k two keys naive approach brute-forcing encryption scheme decrypt ciphertext every possible k decrypt intermediate outputs every possible k total 2 2 2 operations meet-in-the-middle attack uses efficient approach decrypting c k one obtains following equivalence attacker compute enc p values k dec c possible values k total 2 2 2 k k size operations result enc p operations matches result dec c operations pair k k possibly correct key potentially-correct key called candidate key attacker determine candidate key correct testing second test-set plaintext ciphertext mitm attack one reasons data encryption standard des replaced triple des double des attacker use mitm attack bruteforce double des 2 operations 2 space making small improvement des triple des uses triple length 168-bit key also vulnerable meet-in-the-middle attack 2 space 2 operations considered secure due size keyspace compute following match found keep k k candidate key-pair table test pairs new pair confirm validity key-pair work new pair mitm new pair keysize k attack uses 2encryptions decryptions 2 memory case look-up table built set forward computations contrast naive attack needs 2 encryptions 1 space 1d-mitm efficient sophisticated attack developed multidimensional meet-in-the-middle attack also abbreviated md-mitm preferred data encrypted using 2 encryptions different keys instead meeting middle one place sequence md-mitm attack attempts reach several specific intermediate states using forward backward computations several positions cipher assume attack mounted block cipher encryption decryption defined plaintext p encrypted multiple times using repetition block cipher md-mitm used cryptanalysis among many gost block cipher shown 3d-mitm significantly reduced time complexity attack compute following possible guess intermediate state formula_18 compute following whether matches formula_38 case use found combination sub-keys formula_39 another pair plaintext/ciphertext verify correctness key note nested element algorithm guess every possible value done guess previous make element exponential complexity overall time complexity md-mitm attack time complexity attack without brute force formula_40⋅formula_41⋅formula_42 regarding memory complexity easy see formula_43 much smaller first built table candidate values formula_44 increases candidate values contained formula_45 must satisfy conditions thereby fewer candidates pass end destination formula_38 upper bound memory complexity md-mitm denotes length whole key combined data complexity depends probability wrong key may pass obtain false positive formula_48 intermediate state first mitm phase size intermediate state block size often considering also many keys left testing first mitm-phase formula_49 therefore first mitm phase formula_50 |⋅| denotes length main memory consumption restricted construction sets b much smaller others data complexity see subsection complexity md-mitm
[ 7556, 2567, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 4389, 10662, 9640, 169, 11185, 2357, 1847, 9528, 2110, 9541, 10315, 6863, 8273, 9170, 7635, 212, 9556, 10963, 11349, 2265, 7643, 9697, 8674, 229, 618, 1898, 881, 1654, 7161, 7034, ...
Validation
10,807
5
Query_flooding:query flooding query flooding method search resource p2p network simple scales poorly thus rarely used early versions gnutella protocol operated query flooding newer versions use efficient search algorithms p2p network generally consists large number nodes connected nodes small subset nodes node wants find resource network may node know could simply broadcast search query immediate neighbours neighbours resource asks neighbours forward query neighbours turn repeated resource found nodes contacted perhaps network-imposed hop limit reached query flooding simple implement practical small networks requests contacts reachable nodes network precisely determine whether resource found network freenet example returns probabilistic result hand every request may cause every node contacted node might generate small number queries however query floods network thus larger network would generate far traffic per node smaller one making inherently unscalable additionally node flood network simply issuing request nonexistent resource could possible launch denial-of-service attack network version 0.6 gnutella protocol mandates query routing query routing specification explains ideas original research implemented file sharing networks kad network use distributed hash tables index files keyword searches bittorrent creates individual overlay networks sharing individual files archives searches performed mechanisms locating torrent files indexed web site similar mechanism use gnutella network magnet links instance bitzi provides web interface search magnet links earlier p2p networks napster used centralized database locate files scaling problem central server single point failure
[ 8640, 2409, 7802, 4229 ]
Train
10,808
5
Internet_Explorer_for_Mac_OS_X:internet explorer mac os x internet explorer mac os x also referred internet explorer macintosh internet explorer macintosh edition internet explorer mac ie mac unsupported inactive proprietary web browser developed microsoft macintosh platform initial versions developed code base internet explorer windows later versions diverged particularly release version 5 included cutting edge fault-tolerant highly standards-compliant tasman layout engine result five-year agreement apple microsoft 1997 default browser classic mac os mac os x 1998 superseded apple safari web browser 2003 release mac os x 10.3 panther june 13 2003 microsoft announced ceasing development internet explorer mac final update released july 11 2003 browser included default installation mac os x 10.4 tiger released april 29 2005 microsoft stopped releases product december 31 2005 removed application macintosh downloads site january 31 2006 microsoft recommended users migrate recent web browsing technologies apple safari archived version download available softonic.com works mac os x 10.6 earlier versions discontinuation rosetta versions internet explorer macintosh released starting version 2 1996 version 5 received last patch 2003 ie versions mac typically lagged several months year behind windows versions included unique developments including layout engine tasman first version internet explorer macintosh operating system beta version internet explorer 2.0 macintosh released january 23 1996 free download microsoft website first version based spyglass mosaic web browser licensed spyglass available 68k ppc based macs running system 7.0.1 later supported embedding number multimedia formats web pages including avi quicktime formatted video aiff wav formatted audio final version released three months later april 23 version 2.1 released august year mostly aimed fixed bugs improving stability also added features support npapi first version internet explorer platform support quicktime vr aol 3.0 macintosh used ie 2.1 rendering engine built-in web browser november 5 1996 microsoft announced release beta version internet explorer version 3.0 macintosh release added support html version 3.2 cascading style sheets java applets activex controls final version made available january 8 1997 also added support ssl ntlm security protocols pics rsaci rating systems used control access websites based content ratings problem operating system extension used mac os called cfm68k runtime enabler led delay release version 3.0 macs based 68k line processors four months later may 14 microsoft released version 3.01 included version 68k-based machines version also included features windows version internet explorer 4.0 autocomplete monitoring favorites notified users sites favorites list updated also included support javascript introduced download manager cookie manager 1997 macworld expo boston august 6 steve jobs bill gates announced partnership microsoft apple amongst things apple agreed make internet explorer default browser instead netscape navigator five months later january 6 1998 macworld expo san francisco microsoft announced release final version internet explorer version 4.0 macintosh version 4 included support offline browsing dynamic html new faster java virtual machine security zones allow users administrators limit access certain types web content depending zone example intranet internet content coming publicized feature internet explorer 4.0 support microsoft active channel technology intended deliver regularly updated content users could personally tailor interests however active channel failed reach wide audience event apple announced release mac os 8.1 first version macintosh operating system bundle internet explorer default browser per agreement microsoft however version 4.0 ready time included version 3.01 bundled cds following year san francisco macworld expo january 9 1999 microsoft announced release internet explorer 4.5 macintosh edition new version dropped 68k processor support introduced form autofill print preview page holder pane let user hold page links one side screen opened pages right hand support mac os technology like sherlock year later january 5 2000 microsoft announced new version internet explorer san francisco macworld expo internet explorer 5 macintosh edition released two months later march 27 2000 windows version internet explorer 5 released year earlier used trident layout engine macintosh edition introduced new rendering engine called tasman designed compliant emerging w3c standards html 4.0 css level 1 dom level 1 ecmascript also introduced number features later added browsers complete support png image standard previous versions support doctype switching text zoom xml source view also included auction manager tracking auctions sites like ebay internet scrapbook allow users quickly easily store organize web content example image piece selected text preview releases browser included feature called mediabar integrated mp3 internet radio playback feature dropped final version initial release mac os 8 mac os 9 however two months release may 15 mac os x version released bundled mac os x dp4 release handed developers 2000 worldwide developers conference mac os x public beta included another preview mac os x version ie release mac os x 10.0 march 24 2001 included yet another preview mac os x version ie 5 updated later release mac os x v10.1 september 25 2001 included final version internet explorer 5.1 mac os x. ie 5.1 mac os 8 9 released december 18 2001 according jorg brown one ie mac developers microsoft version 5 team produced ie mac moved another project ie mac relegated something expected work spare time june 17 2002 microsoft announced release version 5.2 first mac os x-only release included performance security fixes support mac os x features likes quartz text smoothing 2002 microsoft reassigned developers develop version 6 internet explorer mac intended used base new product msn mac os x would subscription-only browser worked online msn service incorporate features like address book junk mail filters msn messenger client however hearing apple started development browser canceled standalone browser development concentrated msn browser released may 15 2003 june 13 2003 pc pro reported macintosh business unit general manager roz ho confirmed aside updates fix security problems would new versions internet explorer microsoft three days later june 16 2003 microsoft released final version mac os x ppc version 5.2.3 month later july 11 2003 released final version mac os 8 9 version 5.1.7 last versions internet explorer mac os x ppc distinguishing blue logo base logo used internet explorer 6 windows windows one lighter blue less 3-d features found internet explorer mac found common contemporary browsers possible exception internet explorer windows still features many browsers features found internet explorer mac contemporaries acid1 included offline easter egg accessible typing 'tasman internet explorer 5 mac os text replaced names developers
[ 6657, 2579, 6171, 7713, 3110, 10791, 9770, 10282, 559, 4661, 3639, 10808, 64, 576, 5707, 9808, 10834, 6231, 8281, 603, 6747, 3167, 7269, 9834, 1642, 9328, 9843, 115, 2676, 3191, 4728, 124, 1664, 5765, 6797, 8854, 10910, 8351, 7340, 9908, ...
None
10,809
3
Exokernel:exokernel exokernel operating system kernel developed mit parallel distributed operating systems group also class similar operating systems operating systems generally present hardware resources applications high-level abstractions virtual file systems idea behind exokernels force abstractions possible application developers enabling make many decisions possible hardware abstractions exokernels tiny since functionality limited ensuring protection multiplexing resources considerably simpler conventional microkernels implementation message passing monolithic kernels implementation high-level abstractions implemented applications called library operating systems may request specific memory addresses disk blocks etc kernel ensures requested resource free application allowed access low-level hardware access allows programmer implement custom abstractions omit unnecessary ones commonly improve program performance also allows programmers choose level abstraction want high low exokernels seen application end-to-end principle operating systems force application program layer abstractions top abstractions designed different requirements mind example mit exokernel project cheetah web server stores preformatted internet protocol packets disk kernel provides safe access disk preventing unauthorized reading writing disk abstracted application libraries application uses traditionally kernel designers sought make individual hardware resources invisible application programs requiring programs interact hardware via abstraction model models include file systems disk storage virtual address spaces memory schedulers task management sockets network communication abstractions hardware make easier write programs general limit performance stifle experimentation new abstractions security-oriented application might need file system leave old data disk reliability-oriented application might need file system keeps data failure recovery one option remove kernel completely program directly hardware entire machine would dedicated application written conversely entire application codebase would dedicated machine exokernel concept compromise let kernel allocate basic physical resources machine e.g disk blocks memory pages processor time multiple application programs let program decide resources program link support library implements abstractions needs implement mit developed two exokernel-based operating systems using two kernels aegis proof concept limited support storage xok applied exokernel concept thoroughly essential idea mit exokernel system operating system act executive small programs provided application software constrained requirement exokernel must able guarantee use hardware safely mit exokernel manages hardware resources follows available library operating systems exokernel include custom exos system emulator bsd addition exokernel team created cheetah web server uses kernel directly exokernel concept around since least 1994 exokernels still research effort used major commercial operating systems concept operating exokernel system nemesis written university cambridge university glasgow citrix systems swedish institute computer science mit also built several exokernel-based systems including exos
[ 2560, 6155, 6675, 7187, 10776, 25, 4637, 9762, 4643, 6180, 5158, 7217, 10803, 9784, 576, 2625, 6221, 3160, 10333, 97, 10851, 11363, 6760, 10856, 8298, 9835, 7285, 4727, 2168, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10891, 6...
Train
10,810
1
Threat_Matrix_(database):threat matrix database threat matrix intelligence-based measure thorough assessments database program pakistani government officials military science circles use evaluating perceived external internal threats challenge national security pakistan development began 2011 government prime minister yousaf raza gillani program identifies military operational priorities goes beyond comprehensively describing existential non-existential threats country threat matrix program viewed become permanent fixture national security policy pakistan database comprehensive existence revealed political scientist dr. farrukh saleem work published news international 2013 earlier mentioned ispr press briefing given media published thesis saleem critically opined source existential threats always state actor non-state armed forces threat matrix two defined dimensions conventional threats sub-conventional threats conventional threats external threats national security outside country sub-conventional threats refer internal threats national security within country january 2013 major-general asif salim inter-services public relations ispr briefed news media new recent studies conducted pakistan military according ispr armed forces programmed conventional warfare current situation necessitated change forces fighting front-line tribal regions program according requirements sub-conventional warfare interview military scientist talat masood noted new doctrine india viewed 1 enemy first time realised pakistan faces real threat within threat concentrated areas along western borders conflict northwest closely tied war afghanistan factors like militant insurgency future us pullout afghanistan intertwined effect conflict pakistan according lieutenant-general khalid rabbani commander xi corps peshawar withdrawal foreign combat troops afghanistan since 2014 may trigger challenging ramifications pakistan terms threat matrix afghanistan leaving giving notion success taliban afghanistan notion success may snowballing effect threat matrix afghanistan along challenges posed western front india still retains important focus threat assessments pakistan civil-military foreign policy doctrine according express tribune editorial potential threat arch-rival india east effect state threat matrix western front dwindling capacity state cope terrorism owed pakistan 'vigilance eastern border pakistan static 'threat matrix expects india attack occupy pakistan never accepted creation pakistan harsh v. pant outlook india thinks pakistan fast-growing nuclear arsenal expanding greater rate india charged sociopolitical atmosphere country rapidly changing dynamics nuclear matrix region tactically underscores pakistani military establishment india-centric threat matrix 2016 pakistan navy revealed developing maritime doctrine response evolving conventional subconventional threat matrix region indian ocean doctrine would aim protect pakistan maritime interests region according j. berkshire miller diplomat military establishment pakistan meanwhile still views threat matrix india-centric lens—pakistan genuinely believes rightly wrongly india continues work aggressively strategic interests bribery espionage afghanistan comprehensive thesis minimum deterrence pakistan dilemma published royal united services institute rusi nuclear strategist theorist brigadier-general retired feroz hassan khan states pakistan threat matrix dramatically changed events 1971 war india nuclear bomb test 1974 country threat perception became dominated twin threat india conventional force superiority nuclear weapons capability acquisition nuclear weapons hence became pakistan highest national security objective unanimity across parts political spectrum augmented strong perception outside powers could relied upon moments crisis war term also economic connotations instance us secretary state hillary clinton outlined downturn global financial crisis effect pakistan especially context war militancy economic crisis left unresolved create massive unemployment upend governments unfortunately breed instability ... appreciated putting context threat matrix look pakistan country know stabilized benefit south asia beyond june 2013 pakistan armed forces started joint-war game exercise codenamed azm-i-nau iv aim update military readiness strategy dealing complex security threat environment objective exercise assess military tactics procedures techniques event emerging threat environment explore joint operations strategies response combating threat three branches military army air force navy exercise took place amid renewed fears situation afghanistan post-withdrawal coalition forces 2014 well continuing internal threat terrorism india growing regional ambitions newspaper dawn reported senior military official said war games meant coming comprehensive response threats explained threat matrix evolving transforming includes internal challenge terror groups various shades conventional threat external aggression 2009 azm-i-nau exercises aimed preempting india cold start doctrine improving joint armed forces response conventional threat work published dr. farrukh saleem current threat matrix five major elements military nuclear terrorism cyber economic according saleem first two threats military nuclear existential nature threaten basis state physical existence existential threats essentially threaten unity demography integrity nation-state pakistan last three threats terrorism cyber economic non-existential nature asymmetric sense belligerents possess unequal military resources weaker opponent uses unconventional weapons tactics exploit vulnerabilities enemy government military science officials describing threat matrix program legally morally sound recent joint military exercises conducted rapidly respond threat matrix falls category low-intensity conflict confronted areas country soon revelation program international media ispr international media quoted change policy seen paradigm shift country policy however pakistani political science scholar ghazi salahuddin remains uncertain described paradigm shift
[]
Test
10,811
2
Hybrid_array:hybrid array hybrid array form hierarchical storage management combines hard disk drives hdds solid-state drives ssds i/o speed improvements hybrid storage arrays aim mitigate ever increasing price-performance gap hdds dram adding non-volatile flash level memory hierarchy hybrid arrays thus aim lower cost per i/o compared using ssds storage hybrid architectures simple involving single ssd cache desktop laptop computers complex configurations data centers cloud computing commercial products building hybrid arrays include
[ 8353, 4194, 2339, 7106, 8900, 935, 8328, 10382, 2066, 823, 10202, 3323, 9343 ]
Validation
10,812
2
Sticky_Notes:sticky notes sticky notes desktop notes application included windows 7 windows 8 windows 10 present windows vista gadget windows sidebar originated windows xp tablet edition 2002 program allows users take notes using post-it note–like windows desktop according microsoft employee eight million monthly sticky notes users april 2016 original sticky notes gadget one many included vista although gadgets continued windows 7 sticky notes removed list made standalone app built win32 platform could still open startup version directly support pen input default color yellow five colors offered sticky notes jumplists taskbar preview shows notes stack sticky notes automatically saved version reused windows 8 initial releases windows 10 windows 10 anniversary update new version built universal windows platform introduced launched standalone app part windows ink workspace latter method causes space behind notes become blurred new version directly accepts pen input recognize words letters handwritten text new sticky notes provides stock information ticker typed written provides flight info flight number typed written cortana integration create reminders notes include date unlike windows 7 version version taskbar preview shows stock image rather notes user created originally jump list added back version 1.6.2 february 6 2017 sticky notes sync notes across multiple devices windows 10 also ios android devices running microsoft onenote web client edit sticky notes also available onenote website obscure codice_1 location
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 8315, 10879, 8841, 6797, 2193, 9874, 10...
Test
10,813
3
L4_microkernel_family:l4 microkernel family l4 family second-generation microkernels generally used implement unix-like operating systems also used variety systems l4 like predecessor l3 microkernel created german computer scientist jochen liedtke response poor performance earlier microkernel-based operating systems liedtke felt system designed start high performance rather goals could produce microkernel practical use original implementation hand-coded intel i386-specific assembly language code 1993 sparked intense interest computer industry since introduction l4 developed platform independence also improving security isolation robustness various re-implementations original binary l4 kernel interface abi successors including l4ka :pistachio uni karlsruhe l4/mips unsw fiasco tu dresden wrmos wrmlab reason name l4 generalized longer refers liedtke original implementation applies whole microkernel family including l4 kernel interface different versions l4 widely deployed one variant okl4 open kernel labs shipped billions mobile devices specifying general idea microkernel liedtke states concept tolerated inside microkernel moving outside kernel i.e. permitting competing implementations would prevent implementation system required functionality spirit l4 microkernel provides basic mechanisms address spaces abstracting page tables providing memory protection threads scheduling abstracting execution providing temporal protection inter-process communication controlled communication across isolation boundaries operating system based microkernel like l4 provides services servers user space monolithic kernels like linux older generation microkernels include internally example order implement secure unix-like system servers must provide rights management mach included inside kernel poor performance first-generation microkernels mach led number developers re-examine entire microkernel concept mid-1990s asynchronous in-kernel-buffering process communication concept used mach turned one main reasons poor performance induced developers mach-based operating systems move time-critical components like file systems drivers back inside kernel somewhat ameliorated performance issues plainly violates minimality concept true microkernel squanders major advantages detailed analysis mach bottleneck indicated among things working set large ipc code expresses poor spatial locality results many cache misses in-kernel analysis gave rise principle efficient microkernel small enough majority performance-critical code fits first-level cache preferably small fraction said cache jochen liedtke set prove well designed thinner ipc layer careful attention performance machine-specific opposed platform independent design could yield massive real-world performance improvements instead mach complex ipc system l3 microkernel simply passed message without additional overhead defining implementing required security policies considered duties user space servers role kernel provide necessary mechanism enable user-level servers enforce policies l3 developed 1988 proved safe robust operating system used many years example tüv süd experience using l3 liedtke came conclusion several mach concepts also misplaced simplifying microkernel concepts even developed first l4 kernel primarily designed high performance mind order wring every bit performance entire kernel written assembly language ipc 20 times faster mach dramatic performance increases rare event operating systems liedtke work triggered new l4 implementations work l4-based systems number universities research institutes including ibm liedtke started work 1996 tu dresden unsw ibm thomas j. watson research center liedtke colleagues continued research l4 microkernel based systems general especially sawmill os 1999 liedtke took systems architecture group university karlsruhe continued research microkernel systems proof concept high performance microkernel could also constructed higher level language group developed l4ka :hazelnut c++ version kernel ran ia-32- arm-based machines effort success — performance still acceptable — release pure assembly language versions kernels effectively discontinued parallel development l4ka :hazelnut 1998 operating systems group tud os tu dresden dresden university technology started develop c++ implementation l4 kernel interface called l4/fiasco contrast l4ka :hazelnut allow concurrency kernel successor l4ka :pistachio allows interrupts kernel specific preemption points l4/fiasco fully preemptible exception extremely short atomic operations achieve low interrupt latency considered necessary l4/fiasco used basis drops hard real-time capable operating system also developed tu dresden however complexities fully preemptible design prompted later versions fiasco return traditional l4 approach running kernel interrupts disabled except limited number preemption points release l4ka :pistachio newer versions fiasco l4 microkernels inherently tied close underlying cpu architecture next big shift l4 development development platform-independent api still retained high performance characteristics despite higher level portability although underlying concepts kernel new api provided many significant changes relative previous l4 versions including better support multi-processor systems looser ties threads address spaces introduction user-level thread control blocks utcbs virtual registers releasing new l4 api version x.2 a.k.a version 4 early 2001 system architecture group university karlsruhe implemented new kernel l4ka :pistachio completely scratch focus high performance well portability released two-clause bsd license l4/fiasco microkernel also extensively improved years supports several hardware platforms ranging x86 amd64 several arm platforms notably version fiasco fiasco-ux run user-level application top linux l4/fiasco implements several extensions l4v2 api exception ipc enables kernel send cpu exceptions user-level handler applications help alien threads possible perform fine-grained control system calls x.2-style utcbs added furthermore fiasco contains mechanisms controlling communication rights well kernel-level resource consumption top fiasco collection basic user level services developed called l4env amongst others used para-virtualise current linux version 4.19 may 2019 called l4linux development also took place university new south wales unsw developers implemented l4 several 64-bit platforms work resulted l4/mips l4/alpha resulting liedtke original version retrospectively named l4/x86 like liedtke original kernels unsw kernels written mixture assembly c unportable implemented scratch release highly portable l4ka :pistachio unsw group abandoned kernels favor producing highly tuned ports l4ka :pistachio including fastest-ever reported implementation message passing 36 cycles itanium architecture group also demonstrated user-level device drivers perform well in-kernel drivers developed wombat highly portable version linux l4 runs x86 arm mips processors xscale processors wombat demonstrates context-switching costs 50 times lower native linux later unsw group new home nicta forked l4ka :pistachio new l4 version called nicta :l4-embedded name implies aimed use commercial embedded systems consequently implementation trade-offs favored small memory footprints aimed reduce complexity api modified keep almost system calls short enough need preemption points ensure high real-time responsiveness november 2005 nicta announced qualcomm deploying nicta l4 version mobile station modem chipsets led use l4 mobile phone handsets sale late 2006 august 2006 ertos leader unsw professor gernot heiser spun company called open kernel labs ok labs support commercial l4 users develop l4 commercial use brand name okl4 close collaboration nicta okl4 version 2.1 released april 2008 first generally available version l4 featured capability-based security okl4 3.0 released october 2008 last open-source version okl4 recent versions closed source based rewrite support native hypervisor variant called okl4 microvisor ok labs also distributed paravirtualized linux called ok linux descendant wombat well paravirtualized versions symbianos android ok labs also acquired rights sel4 nicta okl4 shipments exceeded 1.5 billion early 2012 mostly qualcomm wireless modem chips deployments include automotive infotainment systems apple mobile application processors beginning a7 contain secure enclave coprocessor running l4 operating system based l4-embedded kernel developed nicta 2006 implies l4 shipping ios devices total shipment estimated 310 million year 2015 2006 nicta group commenced from-scratch design third-generation microkernel called sel4 aim providing basis highly secure reliable systems suitable satisfying security requirements common criteria beyond beginning development aimed formal verification kernel ease meeting sometimes conflicting requirements performance verification team used middle-out software process starting executable specification written haskell sel4 uses capability-based access control enable formal reasoning object accessibility formal proof functional correctness completed 2009 proof provides guarantee kernel implementation correct specification implies free implementation bugs deadlocks livelocks buffer overflows arithmetic exceptions use uninitialised variables sel4 claimed first-ever general-purpose operating-system kernel verified sel4 takes novel approach kernel resource management exporting management kernel resources user level subjects capability-based access control user resources model also adopted barrelfish simplifies reasoning isolation properties enabler later proofs sel4 enforces core security properties integrity confidentiality nicta team also proved correctness translation c executable machine code taking compiler trusted computing base sel4 implies high-level security proofs hold kernel executable sel4 also first published protected-mode os kernel complete sound worst-case execution-time wcet analysis prerequisite use hard real-time systems 29 july 2014 nicta general dynamics c4 systems announced sel4 end end proofs released open-source licenses kernel source proofs gplv2 libraries tools 2-clause bsd license researchers state cost formal software verification lower cost engineering traditional high-assurance software despite providing much reliable results specifically cost one line code development sel4 estimated around compared traditional high-assurance systems darpa high-assurance cyber military systems hacms program nicta together project partners rockwell collins galois inc university minnesota boeing developed high-assurance drone based sel4 along assurance tools software planned technology transfer onto optionally piloted autonomous unmanned little bird helicopter development boeing final demonstration hacms technology took place sterling va april 2017 darpa also funded several small business innovative research sbir contracts related sel4 program started dr. john launchbury small businesses receiving sel4-related sbir included dornerworks techshot wearable inc real time innovations critical technologies osker os written haskell targeted l4 specification although project focused use functional programming language os development microkernel research per se codezero l4 microkernel targeting embedded systems focus virtualization implementation native os services gpl-licensed version version relicensed developers closed source forked 2010 f9 microkernel bsd-licensed l4 implementation built scratch deeply embedded devices performance arm cortex-m3/m4 processors power consumption memory protection mind fiasco.oc third generation microkernel evolved predecessor l4/fiasco fiasco.oc capability based supports multi-core systems hardware assisted virtualization completely redesigned user-land environment running top fiasco.oc called l4 runtime environment l4re provides framework build multi-component systems including client/server communication framework common service functionality virtual file-system infrastructure popular libraries c library libstdc++ pthreads platform also offers l4linux multi-architecture virtualized linux system l4re fiasco.oc run x86 ia-32 amd64 arm powerpc wip supersede previous system l4env l4/fiasco nova os virtualization architecture research project focus constructing secure efficient virtualization environment small trusted computing base nova consists microhypervisor user level virtual-machine monitor unprivileged componentised multi-server user environment running top called nul nova runs x86-based multi-core systems wrmos open source real time operating system rtos based l4 microkernel implementations kernel standard libraries network stack following architectures supported sparc arm x86 x86_64 wrmos kernel based l4 kernel reference manual version x.2 paravirtualized linux kernel w4linux working top wrmos
[ 256, 4225, 2179, 2951, 9863, 7561, 3082, 7566, 6415, 11026, 5523, 7187, 5397, 5529, 6300, 6813, 3999, 1952, 10016, 10146, 3876, 11180, 9646, 7983, 823, 7480, 1849, 5049, 7483, 10813, 4929, 4034, 7234, 9921, 3142, 8904, 2761, 9931, 7884, 1...
Test
10,814
8
Webalizer:webalizer webalizer web log analysis software generates web pages analysis access usage logs one commonly used web server administration tools initiated bradford l. barrett 1997 statistics commonly reported webalizer include hits visits referrers visitors countries amount data downloaded statistics viewed graphically presented different time frames day hour month website traffic analysis produced grouping aggregating various data items captured web server form log files website visitor browsing website webalizer analyzes web server log files extracting items client ip addresses url paths processing times user agents referrers etc grouping order produce html reports web servers log http traffic using different file formats common file formats common log format clf apache custom log format extended log file format example clf log line shown apache custom log format customized log http parameters including request processing time size request format custom log controlled format line typical apache log format configuration shown microsoft internet information services iis web server logs http traffic w3c extended log file format similarly apache custom log format iis logs may configured capture extended parameters request processing time w3c extended logs may recognized presence one format lines one shown webalizer process clf apache w3c extended log files well http proxy log files produced squid servers log file formats usually converted clf order analyzed addition logs compressed either gzip .gz bzip2 .bz2 processed directly without need uncompress use webalizer command line application launched operating system shell prompt typical command shown command instructs webalizer analyze log file access_log run incremental mode -p interpret log clf log file -f use domain name en.wikipedia.org report links -n produce output subdirectory current directory use -h option see complete list command line options besides command line options webalizer may configured parameters configuration file default webalizer reads file webalizer.conf interprets line processing instruction alternatively user-specified file may provided using -c option example webmaster would like ignore requests made particular group hosts use ignoresite parameter discard log records ip address matching specified pattern one hundred available configuration parameters make webalizer highly configurable web traffic analysis application complete list configuration parameters please refer readme file shipped every source binary distribution default webalizer produces two kinds reports yearly summary report detailed monthly report one analyzed month yearly summary report provides information number hits file page requests hosts visits well daily averages counters month report accompanied yearly summary graph monthly reports generated single html page containing monthly summary report listing overall number hits file page requests visits hosts etc daily report grouping counters days month aggregated hourly report grouping counters hour day together url report grouping collected information url host report ip address website entry exit url reports showing common first last visit urls referrer report grouping referring third-party urls leading analyzed website search string report grouping items search terms used search engines google user agent report grouping browser type country report grouping host country origin standard html reports described lists top entries item e.g top 20 urls actual number lines reports controlled configuration webalizer may also configured produce separate report items list every single item website visitors requested urls etc addition html reports webalizer may configured produce comma-delimited dump files list report data plain-text file dump files may imported spreadsheet applications databases analysis html reports may produced reports 30 languages including catalan croatian czech danish dutch english estonian finnish french galician german greek hungarian icelandic indonesian italian japanese korean latvian malay norwegian polish portuguese portuguese brazil romanian russian serbian simplified chinese slovak slovene spanish swedish turkish ukrainian generate reports alternate language requires separate webalizer binary compiled specifically language
[ 4640, 7078, 9768, 3401, 5612, 7983, 6576, 5524, 1943, 2045 ]
None
10,815
8
.htaccess:.htaccess .htaccess hypertext access file directory-level configuration file supported several web servers used configuration website-access issues url redirection url shortening access control different web pages files 'dot period full stop file name makes hidden file unix-based environments site could one .htaccess file files placed inside web tree i.e inside directories sub-directories hence name distributed configuration files .htaccess files act subset server global configuration file like httpd.conf directory sub-directories original purpose .htaccess—reflected name—was allow per-directory access control example requiring password access world wide web content commonly however .htaccess files define override many configuration settings content type character set common gateway interface handlers etc .htaccess files written apache directives variant perl compatible regular expressions pcre language learning basic pcre help mastering work files historical reasons format .htaccess files limited subset apache http server global configuration file httpd.conf even used web servers oracle iplanet web server zeus web server different native global configuration files controlling apache using main server configuration file httpd.conf often preferred security performance reasons
[ 3330, 10125, 5012, 8350, 8994, 3237, 46, 2737, 2485, 1206, 5433, 7368, 7370, 7644, 865, 225, 113, 5492, 119 ]
None
10,816
5
Internet_Content_Adaptation_Protocol:internet content adaptation protocol internet content adaptation protocol icap lightweight http-like protocol specified rfc 3507 used extend transparent proxy servers thereby freeing resources standardizing way new features implemented icap generally used implement virus scanning content filters transparent http proxy caches content adaptation refers performing particular value added service content manipulation associated client request/response icap concentrates leveraging edge-based devices caching proxies help deliver value-added services core process cache proxy client transactions process web servers icap servers focused specific function example ad insertion virus scanning multi-av scanning opswat content translation language translation content filtering off-loading value-added services web servers icap servers allows web servers scaled according raw http throughput versus handle extra tasks icap proposed late 1999 peter danzig john schuster network appliance gillies took project spring 2000 enhanced protocol three main ways gillies prototyped first icap client server netcache series internet caches mid-2000 known icap 0.9 protocol produced training materials vendors client written c++ core netcache server demonstration icap server written perl employed debian word-replacement filters rewrite web pages skipping html tags translating web pages swedish chef jive real time knowledge learned prototyping experience gillies revised ietf draft standard make rpcs using chunked encoding greatly simplifying icap protocol
[ 225, 10210, 2213, 4423, 6569, 4490, 6993, 4725, 7578, 7739, 4797 ]
None
10,817
2
Package_format:package format package format type archive containing computer programs additional metadata needed package managers archive file format may unchanged package formats bear additional metadata manifest file certain directory layouts packages may contain either source code executable files packages may converted one type another software alien arch linux pacman slackware use tar archives generic naming specific internal structures
[ 2560, 3079, 10760, 5644, 7181, 5139, 8213, 9237, 6680, 10780, 4637, 3618, 5670, 9257, 3114, 2095, 1584, 9266, 8248, 3131, 3649, 10817, 8772, 3659, 10317, 4174, 3667, 6227, 2134, 3162, 2658, 6244, 10857, 6763, 9324, 6257, 1138, 7293, 11391, ...
Validation
10,818
2
DOS_XL:dos xl dos xl discontinued disk operating system dos written paul laughton mark rose bill wilkinson mike peters published optimized systems software atari 8-bit family home computers designed compatible atari dos came shipped atari inc. disk drives direct descendant os/a+ dos xl provided additional features atari equipped floppy disk drives included single double density support command-line mode called command processor cp menu mode executable loaded memory batch file support support xl extended memory oss supercartridge banked memory later versions included axlon ramdisk support mosaic ramdisk support bit-3 support bug/65 addition supporting auto-booting codice_1 files dos xl batch features provided auto-booting batch feature naming batch file codice_2 would execute batch commands startup os/a+ unfortunately feature n't compatible programs e.g atariwriter dos xl distributed flippy disk one side single-density version double-density version features add-ons included placed double-density side due lack disk space manual dos xl subset os/a+ oss considered manual addendum os/a+ 150+ pages bound spine loose-leaf form like os/a+ manual dos xl came two versions 2.20 2.30 2.20 users pay 20 upgrade 2.30 last version 2.30p dos xl originally sold 30 price later increased 39 file writing verify turned dos xl due oss experience resulted faster writes virtually risk errors command file verify.com included reenable writes verify atari dos 2.0s default verified file writes disk several disk drive manufacturers shipped dos xl drives trak percom astra indus amdek rana c copy files p protect files version 2.30p newer version 2.30 fix two problems patch dos xl 2.30 make 2.30p plans dos xl 4 scrapped due low demand competition oss reissued os/a+ 4.1 mainly double-sided support dos xl along oss products became part icd catalog atari products january 1988 however dos xl dropped favor icd spartados
[ 6289, 2933, 1750, 5359 ]
Test
10,819
9
Comparison_of_multi-paradigm_programming_languages:comparison multi-paradigm programming languages programming languages grouped number types paradigms supported concise reference programming paradigms listed article
[ 7172, 9224, 2062, 2069, 1051, 3613, 9245, 5165, 5677, 5680, 9780, 1591, 6718, 8771, 8262, 603, 5729, 2666, 2670, 9330, 9331, 2680, 3705, 7292, 9345, 2691, 9875, 9877, 8854, 7326, 4770, 4777, 7851, 7341, 692, 191, 5830, 9926, 5833, 7889, ...
Test
10,820
7
CloudBook:cloudbook cloudbook discontinued x86 subnotebook ultra-mobile pc developed everex using via processor chipset nanobook reference design competed asus eee pc olpc xo-1 classmate pc device categorized netbook around 2008 term cloudbook resurrected refer small-storage laptops depend networked storage services cloud come packaged device google chrome os cloudbooks chromebooks installed google drive windows os cloudbooks bundled microsoft onedrive sales gpc tc2502 everex desktop left company inquiries customers seeking similar additional open source mobile platforms everex decided build two systems classic laptop also running gos v2 called gbook system based via nanobook reference design also used packard bell easynote xs release originally planned january 25 2008 everex pushed release back citing problems version gos wanted use delay needed everex wanted rewrite gos v2 cloudbook would use gnome window manager instead enlightenment 17 making even compatible ubuntu e17 dock replaced avant window navigator approach looks functionality older gos versions cloudbook expected released united states february 15 2008 wal-mart zareason pushed back february 21 wal-mart zareason received part shipment price device set us 399 came one year limited warranty 24/7 toll free technical support nivio also created cloudbook based nokia/intel meego platform owned us trademark cloudbook cloudpc aiming use linux platform delivering full windows experience desktop service appstore renting software launched airtel india nivio co-founded sachin dev duggal saurabh p dhoot everex cloudbook uniquely located built-in pointing device stamp-sized touchpad upper right side computer instead bottom keyboard common notebook computers cloudbook intended held one hand typing two hands using mouse-cursor control left thumb controlling two mouse buttons right thumb small trackpad mousepad keys placed directly screen design chosen system could even used standing walking around instead sitting cloudbook sold ultra-mobile pc umpc feature even though touch-screen cloudbook came completely new version compared version used gpc gos linux distribution based ubuntu application software mozilla skype facebook faqly openoffice.org google originally gos came enlightenment 0.17 window manager though pre-installed operating system gos everex released windows xp hardware drivers making simple install microsoft windows xp however everex warns software outside original gos covered warranty though hardware warranty unaffected next generation cloudbook advertised processor running 1.6 ghz 80gb disk drive touch pad wimax however company ceased operations
[ 1537, 3585, 7938, 2308, 4236, 10893, 911, 1935, 4623, 1682, 8592, 405, 2965, 2328, 4377, 8986, 5019, 10393, 6178, 6307, 9766, 5159, 3883, 6444, 10109, 7983, 8495, 3121, 5681, 9266, 7352, 1849, 1728, 2496, 4289, 7492, 1224, 8520, 11337, 44...
None
10,821
4
Department_of_Defense_Information_Assurance_Certification_and_Accreditation_Process:department defense information assurance certification accreditation process dod information assurance certification accreditation process diacap united states department defense dod process means ensure companies organizations apply risk management information systems diacap defines dod-wide formal standard set activities general tasks management structure process certification accreditation c dod maintains information assurance ia posture throughout system life cycle note march 12 2014 though official transition take place may 2015 diacap replaced risk management framework rmf dod information technology although re-accreditations continue late 2016 systems yet started accreditation may 2015 transition rmf processes dod rmf aligns national institute standards technology nist risk management framework rmf diacap resulted nsa directed shift underlying security approaches interim version diacap signed july 6 2006 superseded interim ditscap guidance final version called department defense instruction 8510.01 signed march 12 2014 previous version november 28 2007 dodi 8500.01 cybersecurity http //www.dtic.mil/whs/directives/corres/pdf/850001_2014.pdf dodi 8510.01 risk management framework rmf dod information technology http //www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf diacap differs ditscap several ways—in particular embrace idea information assurance controls defined dodd 8500.1 dodi 8500.2 primary set security requirements automated information systems aiss ia controls determined based system mission assurance category mac confidentiality level cl
[ 7979, 10831, 1875, 5780, 6360 ]
Test
10,822
2
Federico_Heinz:federico heinz federico heinz argentinian programmer free software advocate living london co-founder current president fundación vía libre non-profit organization promotes free flow knowledge motor social progress use development free software helped legislators argentina ing dragan dr. conde peru dr. villanueva draft defend legislation demanding use free software areas public administration works google uk office speaks fluent spanish english german
[ 1026, 2050, 1028, 5644, 2581, 3618, 6691, 2109, 8258, 5703, 8263, 589, 4177, 8787, 1112, 3674, 8304, 7793, 3189, 5759, 2180, 4230, 9865, 8848, 657, 6808, 6302, 3744, 8354, 4265, 8364, 1717, 2233, 5833, 6352, 3802, 4831, 7904, 10464, 3817,...
Test
10,823
4
Cyber_Essentials:cyber essentials cyber essentials uk government information assurance scheme operated national cyber security centre ncsc encourages organisations adopt good practice information security includes assurance framework simple set security controls protect information threats coming internet developed collaboration industry partners including information security forum isf information assurance small medium enterprises consortium iasme british standards institution bsi endorsed uk government launched 2014 department business innovation skills organisations earn two levels certification badges annual recertification recommended certifying bodies turn licensed accreditation bodies appointed uk government five current accreditation bodies apmg crest iasme irm security qg council registered ethical security testers crest developed assessment framework iasme incorporated cyber essentials wider iasme information assurance standard iso/iec 27001 organisations may choose limit scope certification certain subset business five main technical controls cyber essentials guidance breaks finer details controls mapped controls required iso/iec 27001 standard good practice iasme governance although cyber essentials narrower focus emphasising technical controls rather governance risk policy cyber essentials scheme launched 5 june 2014 several organisations quickly certified end june since october 2014 cyber essentials certification required suppliers central uk government handle certain kinds sensitive personal information intended encourage adoption businesses wishing bid government contracts insurers suggested certified bodies may attract lower insurance premiums 6,000 cyber essentials certificates awarded businesses organisations wannacry ransomware attack nhs digital refused finance £1 billion estimated cost meeting cyber essentials plus standard saying would constitute value money invested £60 million planned plan spend £150 million address key cyber security weaknesses next two years
[ 11172, 4678, 8998, 4904, 6648, 399, 433, 2737, 6360, 7515, 9375 ]
Validation
10,824
9
MIVA_Script:miva script miva script proprietary computer scripting language mainly used internet applications e-commerce 2015 developed maintained owned miva merchant inc. based san diego california many web hosting companies support miva script servers significantly less widespread popular web languages language first developed name htmlscript joe austin others 1995 company htmlscript corporation formed following year origins miva script began 1993 david haldy joseph austin built first version htmlscript first version written programming language perl called logic enhanced html lehtml joseph austin wrote wrapper programming language c let start root process downgrade immediately ownership permissions owner script file wrapper made suitable use hosting service called volant turnpike time joseph austin eventually sold volant turnpike dave haldy perl allowed self-executing code lehtml expression analyzer parsed expression perl syntax passed perl volant turnpike users liked using lehtml joseph austin ron ahern wrote expression analyzer re-implemented lehtml syntax c language joseph austin called end result htmlscript registered name united states patent trademark office uspto joseph austin troy mccasland derek finley founders company called htmlscript corporation htmlscript concept loop low server processing power time would enough bring whole server even one program ran away joseph austin implement loop make impossible htmlscript server process run away also implemented macro first version htmlscript would allow self-executing code macro powerful eventually security issues 1997 jon burchmore extensively rewrote language make syntactically consistent although new engine supported old htmlscript new named mivascript syntaxes jon burchmore rewrote htmlscript syntax joe developed help softquad using emerging xml standard jon burchmore wrote replacement koolkat became miva merchant new end-product supported old htmlscript syntax new named miva script syntaxes october 14 1997 htmlscript ’ name changed miva script company name changed miva soon afterward miva merchant followed suit name product name miva comes egyptian hieroglyphics word cat word cat combination two symbols milk basin followed quail milk basin pronounced mee quail pronounced waa combined say cat joseph austin thought clever called koolkat “ electronic cat alog. ” joseph showed german friend could pronounce waa sound instead kept pronouncing va joseph austin registered domain miva.com filed trademark 1998 firm renamed miva corporation 1998 first version miva merchant came 2002 miva script compiler delivered htmlscript syntax macros dropped engine miva corporation sold 2003 mid-cap public company called findwhat subsequently findwhat bought name miva 2007 russell carroll group investors bought original miva technologies customer base miva started miva merchant inc. miva script often described 'xml-like although something misnomer consists tags may interspersed html xhtml start mv paired stand-alone empty tags version 4.14 miva script interpreted miva script engine empresa version 4.00 introduced compiler boosting performance significantly one distinguishing features miva script native support variation dbase database platform dbf iii tables proprietary index format support sql many installations today running mysql database variables untyped pre-declared miva script uses file extensions .mv .mvc .mvt common file extension runtime compiled template source files empresa underlying engine miva script versions numbered less 4.0 miva merchant empresa script interpreter available web servers running *nix microsoft windows operating systems recent interpreter version 3.9705 interpreted miva script still widely supported many web hosts versions numbered 3.9x transitional form language implementing new features found version 4 arrays since 4.0 miva merchant empresa virtual machine running compiled miva script available versions *nix microsoft windows current version level 5.x added new language constructs native sql support new access-methodology dbase3 tables called miva-sql new templating syntax empresa virtual machine compile fly version 5.08 later support gd graphics library miva merchant mia version empresa engine designed run windows pc localhost server watching specified port usually 8000 8080 server software needed unless post office protocol pop smtp functions used provides portable stand-alone development environment miva merchant mia updated miva merchant empresa release like empressa versions pre-4 interpreters post-4.0 work compiled script minor differences miva merchant script compiler introduced mid-2002 claiming offer better performance closure application source code compilability required changes language support old htmlscript syntax macros evaluated runtime often considered security risk dropped compiler produces platform-independent bytecode runs miva merchant empresa miva merchant mia virtual machines minor variations exist empresa mia virtual machines may 2005 miva corporation made script compiler available free 2011 built licensing code removed simplifying installation august 2007 miva merchant separated parent company due management buy-out ref press release miva script 5.0 introduced page template compiler command basis miva merchant storemorph trade page template system compiler within compiler offers simplified subset full language suitable end user creation editing web page templates storemorph trade pages allow modular components created mivascript added template extending capabilities february 2011 introduced new mivascript.com website fully documenting latest version language including gd graphics library
[ 1952, 9345, 4614, 8582, 11625, 5612, 5677, 6797, 7022, 7983, 9780, 9909, 2045, 479 ]
Test
10,825
4
LAIM_Working_Group:laim working group laim log anonymization information management working group nsf onr funded research group national center supercomputing applications direction adam slagell work group focuses upon log anonymization internet privacy laim group established 2005 released 3 different log anonymization tools canine scrub-pa flaim flaim tool still active development
[]
Test
10,826
4
Daniel_Balsam:daniel balsam daniel balsam american lawyer best known lawsuits e-mail spammers violations internet spam laws balsam filing lawsuits spammers since 2002 earned 1 million court judgments filing lawsuits balsam aims publicize names principals profiting spam advertising aims make spamming less profitable cause companies reconsider decision market products spam balsam describes practice cleaning internet although critics accuse taking advantage legal system balsam decided begin suing spammers became enraged volume breast enlargement spam received working marketing began filing lawsuits small claims court 2002 initially seeing lawsuits hobby balsam soon decided make vocation attended university california hastings college law graduated 2008 time graduated law school balsam filed several dozen lawsuits files lawsuits based spam receives e-mail addresses makes enough money court judgments support full-time help attorney timothy walton judgments 1,000 per e-mail spam messages identify company sending message often difficult identify source balsam frequently faced fictitious business names registered post office boxes balsam awarded 1.125 million verdict pornography company sent 1,125 e-mails able collect judgment however domain registrar tucows refused identify owner company sent spam balsam lawsuits brought california anti-spam laws although many cases tried small claims court filed first spam lawsuit brought trial california superior court— balsam v. trancos inc. —which currently appeal among companies balsam sued small claims court various inc. dba adult friendfinder tagged.com deniro marketing llc dba amateurmatch stockton asparagus festival balsam critical can-spam act arguing tough enough spammers also believes u.s. government enough enforce laws spam still law school balsam helped draft bill ab 2950 sponsored california state assemblyman jared huffman would toughened california anti-spam laws bill aimed close proponents characterized loopholes tighten ambiguous language business professions code 17529.5 clearly set forth practices unlawful make easier bring lawsuits deceptive spammers spamvertisers although bill passed state assembly governor arnold schwarzenegger vetoed bennet kelley internet lawyer balsam faced court vocally critical balsam tactics balsam also sued valueclick inc. twice bloosky interactive llc allegedly violating settlement confidentiality and/or non-disparagement agreements shortly entering settlement balsam maintains suits retaliatory
[ 4272, 6762, 10263 ]
None
10,827
7
Bracket_Computing:bracket computing bracket computing cloud computing company founded 2011 tom gillis jason lango previously ironport systems based mountain view california 2015 company raised 45 million investment round led fidelity goldman sachs bringing funding total 130 million primary software offering called computing cell october 2015 company employed 70 people planned hire software engineers 1 may 2018 vmware announced tom gillis lead vmware network security business unit vmware intends acquire bracket computing intellectual property members bracket staff bracket computing website redirects 403 forbidden page
[ 6153, 4194 ]
Test
10,828
2
Mandatory_Integrity_Control:mandatory integrity control context microsoft windows family operating systems mandatory integrity control mic core security feature introduced windows vista implemented subsequent desktop line windows operating systems adds integrity levels il -based isolation running processes il represents level trustworthiness object mechanism goal use pre-existing integrity control policies involved objects il selectively restrict access permissions contexts considered potentially less trustworthy compared contexts running user account trusted mandatory integrity control defined using new access control entry ace type represent object il security descriptor windows access control lists acls used grant access rights read write execute permissions privileges users groups il assigned subject access token initialized subject tries access object example file security reference monitor compares integrity level subject access token integrity level object security descriptor windows restricts allowed access rights depending whether subject il higher lower object depending integrity policy flags new access control entry ace security subsystem implements integrity level mandatory label distinguish discretionary access user control acls provide windows vista defines four integrity levels low sid s-1-16-4096 medium sid s-1-16-8192 high sid s-1-16-12288 system sid s-1-16-16384 default processes started regular user gain medium il elevated processes high il introducing integrity levels mic allows classes applications isolated enabling scenarios like sandboxing potentially-vulnerable applications internet-facing applications processes low il called low-integrity processes less access processes higher ils access control enforcement windows objects access control lists named objects including files registry keys even processes threads entry system access control list governing access defines minimum integrity level process use object windows makes sure process write delete object integrity level equal higher requested integrity level specified object additionally privacy reasons process objects higher il out-of-bounds even read access processes lower il consequently process interact another process higher il process perform functions inject dll higher il process using codice_1 api function send data different process using codice_2 function processes inherit integrity level process spawned integrity level customized time process creation well defining boundary window messages user interface privilege isolation uipi technology mandatory integrity control used applications like adobe reader google chrome internet explorer windows explorer isolate documents vulnerable objects system internet explorer 7 introduces mic-based protected mode setting control whether web page opened low-integrity process provided operating system supports mic based security zone settings thereby preventing classes security vulnerabilities since internet explorer case runs low il process modify system level objects—file registry operations instead virtualized adobe reader 10 google chrome two notable applications introducing technology order reduce vulnerability malware microsoft office 2010 introduced protected view isolated sandbox environment excel powerpoint word prohibits potentially unsafe documents modifying components files resources system protected view operates low-integrity process windows vista later versions windows uses mic uipi restrict sandbox however cases higher il process need execute certain functions lower il process lower il process need access resources higher il process access example viewing webpage protected mode save file downloaded internet folder specified user high il low il processes still communicate using files named pipes lpc shared objects shared object must integrity level low low il process shared low il high il processes since mic prevent low il process sharing objects higher il process trigger flaws higher il process work behalf low il process thereby causing squatting attack shatter attacks however prevented using user interface privilege isolation takes advantage mic
[ 11270, 5643, 4624, 537, 540, 3102, 7713, 9762, 8227, 8740, 1577, 5673, 10281, 2101, 3643, 10812, 3648, 10310, 1098, 7754, 4173, 4174, 9808, 4178, 10839, 1113, 603, 9819, 3170, 11364, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8...
Test
10,829
8
Devices_Profile_for_Web_Services:devices profile web services devices profile web services dpws defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices objectives similar universal plug play upnp addition dpws fully aligned web services technology includes numerous extension points allowing seamless integration device-provided services enterprise-wide application scenarios dpws specification initially published may 2004 submitted standardization oasis july 2008 dpws 1.1 approved oasis standard together ws-discovery 1.1 soap-over-udp 1.1 june 30 2009 dpws defines architecture devices run two types services hosting services hosted services hosting services directly associated device play important part device discovery process hosted services mostly functional depend hosting device discovery addition hosted services dpws specifies set built-in services dpws builds following core web services standards wsdl 1.1 xml schema soap 1.2 ws-addressing comprises ws-metadataexchange ws-transfer ws-policy ws-security ws-discovery ws-eventing microsoft windows vista windows embedded ce6r2 platforms natively integrate dpws stack called wsdapi included part windows rally technologies support osgi way dpws supports dynamic discovery part evolving vision distributed applications leverage ws-* standards application automation environments clear 2007 consumer electronics show “ next gen ” home highlighted automation system life|ware exceptional innovation uses dpws communicate lighting system audio distribution system security system motorized shades security cameras thermostats washers dryers motorized television mount show demonstrated tremendous consumer interest prospect bringing controllable devices environment digital entertainment manufacturers taking notice many manufacturers first step towards dpws adoption creation small “ device bridge ” native usually proprietary code web services least 117 automation av products 37 different vendors currently support dpws either natively bridge international security controls isc trade show major security company demonstrated security system supported dpws kitchen bath show kbis saw two major appliance manufacturers demonstrating washers dryers communicated using dpws communicative oven demonstrated international building show past two years even greater sign drive towards market acceptance dpws introduced-in-2006 connectedlife.home home automation package offered us retailer best buy package uses automation software controllable devices leverage dpws communications within sirena project auspices european research initiative itea schneider electric produced early dpws implementation targeted embedded devices implementation open-sourced soa4d.org soa devices website dpws stack c java versions add-ons like ws-management ws-security implementations freely downloaded also stemming sirena project web services devices ws4d.org website provides information downloads news three dpws implementations one c implementation integrating gsoap one java implementation using axis another java implementation use different java editions including java following sirena project new european research project itea named soda service oriented device delivery architecture went development implementation embedded dpws stack devices associated tools eu research project socrades composed heavyweights like abb sap schneider electric siemens focusing implementing testing piloting prototypes dpws-enabled devices industrial automation domain extending work eu aesop project several proposals and/or projects worked integration dpws osgi i.e mainly providing implementation java framework
[ 8070, 8203, 6284, 7320, 6811, 10396, 7198, 10020, 425, 5677, 2501, 7878, 8391, 1098, 6357, 2013, 4979, 10229, 10486 ]
Test
10,830
5
XSwitch:xswitch xswitch interconnect used xcore processor interconnect protocol defined xmos based around routing messages comprising 9-bit tokens cores network protocol specifically designed on-chip board-level communication using lvds drivers also run longer cables interconnect routes sequences messages message consists header specifies core address sequence tokens end-token 512 tokens 256 data tokens 256 control tokens data tokens used transport data e.g audio data stream control tokens used send in-band control data order implement protocols interconnect message routed sequence switches interconnected xlinks two control tokens used end message end ends message pause suspends message tokens free route switches difference end pause end token delivered receiver whereas pause token silently thrown away last switch since messages terminated token rather packet length sender may choose terminate message creates open circuit guaranteed bandwidth latency applications use example one series links form circuit stream audio use another series links small packets containing control data circuits guarantee order delivery tokens transmitted messages may delivered order multiple paths circuits permanently occupy series links whereas messages occupy links short periods time xswitch interconnect architecture implements media layer osi model physical layer signal either transmitted using serial protocol two wires using fast protocol five wires cases signal transmitted series transitions using 1 code two-wire system transition wire 0 signals 0 bit transition wire 1 signals 1 bit token transmitted sequence exactly 10 transitions first eight signal eight data bits msb first one bit signal whether control token finally return-to-zero bit returns wires zero nine transitions one wire high five-wire system four data wires 0 1 2 3 transition 0 signals '00 transition 1 signals '01 etc sequence four transitions transmits eight data bits fifth wire escape wire used transmit control tokens unlike two-wire system even number wires high token wires return zero end message modes degree asynchronous clock transitions signal data order transitions signal order bits transmitter must transmit data faster receiver interpret data must make sure sufficient gaps edges overtake pads data transmission suspended time link layer protocol relies use credits order signal whether data transmitted receivers always issue credits transmitter transmitter allowed send data link give 8 32 64 credits never issue 127 credits guarantees side always record credits using 7 bit counters conversely large numbers credits given link needs large receive buffers minimum size receive buffer 8 tokens 72 bits network layer routes messages interconnect nodes network identified means 16-bit address messages routed successively matching bits destination address every node message brought closer destination taking first non matching bit looking set links used destination message routed link route rolled end pause control token found given header precedes packet implements wormhole routing routing set deadlock free free starvation interconnects arbitrate incoming messages without locking link switches xcore xs1-g4 xcore xs1-l1 xcore-200 processors implementations xswitch implementations differ terms number internal external links supported xs1-g4 switch 32 links 16 links external links operate speed 400 mbits per second 16 links connected four cores four links per core internal links operate 3.2 gbits per second maximum throughput implementation xswitch 57.6 gbits per second 6.4 gbit per second external links 51.2 gbits per second internal links xs1-l1 switch 12 links eight links external links operate speed 400 mbits per second four links connected internally core internal links operate 3.2 gbits per second maximum throughput implementation xswitch 16 gbits per second 3.2 gbit per second external links 12.8 gbits per second internal links xcore200 switch 17 links eight input links links external links operate speed 400 mbits per second eight links internal connected cores four core internal links operate 4 gbits per second final link connected on-chip usb phy maximum throughput implementation xswitch 35.25 gbits per second 3.2 gbit per second external links 32 gbits per second internal links plus 0.05 gbit/s final internal link
[ 7865, 2802 ]
Test
10,831
4
Public_key_infrastructure:public key infrastructure public key infrastructure pki set roles policies hardware software procedures needed create manage distribute use store revoke digital certificates manage public-key encryption purpose pki facilitate secure electronic transfer information range network activities e-commerce internet banking confidential email required activities simple passwords inadequate authentication method rigorous proof required confirm identity parties involved communication validate information transferred cryptography pki arrangement binds public keys respective identities entities like people organizations binding established process registration issuance certificates certificate authority ca depending assurance level binding may carried automated process human supervision pki role assures valid correct registration called registration authority ra ra responsible accepting requests digital certificates authenticating entity making request microsoft pki registration authority usually called subordinate ca entity must uniquely identifiable within ca domain basis information entity third-party validation authority va provide entity information behalf ca x.509 standard defines commonly used format public key certificates public key cryptography cryptographic technique enables entities securely communicate insecure public network reliably verify identity entity via digital signatures public key infrastructure pki system creation storage distribution digital certificates used verify particular public key belongs certain entity pki creates digital certificates map public keys entities securely stores certificates central repository revokes needed pki consists broadly speaking traditionally three approaches getting trust certificate authorities cas web trust wot simple public key infrastructure spki primary role ca digitally sign publish public key bound given user done using ca private key trust user key relies one trust validity ca key ca third party separate user system called registration authority ra may may separate ca key-to-user binding established depending level assurance binding software human supervision term trusted third party ttp may also used certificate authority ca moreover pki often used synonym ca implementation model trust relationships ca trusted third party – trusted subject owner certificate party relying upon certificate according netcraft industry standard monitoring active transport layer security tls certificates states that- although global tls ecosystem competitive dominated handful major cas — three certificate authorities symantec comodo godaddy account three-quarters issued tls certificates public-facing web servers top spot held symantec verisign purchased symantec ever since survey began currently accounting third certificates illustrate effect differing methodologies amongst million busiest sites symantec issued 44 valid trusted certificates use — significantly overall market share approach involves server acts offline certificate authority within single sign-on system single sign-on server issue digital certificates client system never stores users execute programs etc temporary certificate common find solution variety x.509-based certificates alternative approach problem public authentication public key information web-of-trust scheme uses self-signed certificates third party attestations certificates singular term web trust imply existence single web trust common point trust rather one number potentially disjoint webs trust examples implementations approach pgp pretty good privacy gnupg implementation openpgp standardized specification pgp pgp implementations allow use e-mail digital signatures self-publication public key information relatively easy implement one web trust one benefits web trust pgp inter-operate pki ca fully trusted parties domain internal ca company willing guarantee certificates trusted introducer web trust completely trusted nature web trust trusting one certificate granting trust certificates web pki valuable standards practices control issuance certificates including pgp personally instituted web trust could significantly degrade trustworthiness enterprise domain implementation pki web trust concept first put forth pgp creator phil zimmermann 1992 manual pgp version 2.0 another alternative deal public authentication public key information simple public key infrastructure spki grew three independent efforts overcome complexities x.509 pgp web trust spki associate users persons since key trusted rather person spki use notion trust verifier also issuer called authorization loop spki terminology authorization integral design emerging approach pki use blockchain technology commonly associated modern cryptocurrency since blockchain technology aims provide distributed unalterable ledger information qualities considered highly suitable storage management public keys cryptocurrencies support storage different public key types ssh gpg rfc 2230 etc provides open source software directly supports pki openssh servers blockchain technology approximate proof work often underpinning confidence trust relying parties pki issues remain administrative conformance policy operational security software implementation quality certificate authority paradigm issues regardless underlying cryptographic methods algorithms employed pki seeks endow certificates trustworthy properties must also address issues list known blockchain-based pki developments pki occurred early 1970s british intelligence agency gchq james ellis clifford cocks others made important discoveries related encryption algorithms key distribution however developments gchq highly classified results work kept secret publicly acknowledged mid-1990s public disclosure secure key exchange asymmetric key algorithms 1976 diffie hellman rivest shamir adleman changed secure communications entirely development high-speed digital electronic communications internet predecessors need became evident ways users could securely communicate consequence ways users could sure actually interacting assorted cryptographic protocols invented analyzed within new cryptographic primitives could effectively used invention world wide web rapid spread need authentication secure communication became still acute commercial reasons alone e.g. e-commerce online access proprietary databases web browsers sufficient taher elgamal others netscape developed ssl protocol 'https web urls included key establishment server authentication prior v3 one-way pki structure thus created web users/sites wishing secure communications vendors entrepreneurs saw possibility large market started companies new projects existing companies began agitate legal recognition protection liability american bar association technology project published extensive analysis foreseeable legal aspects pki operations see aba digital signature guidelines shortly thereafter several u.s. states utah first 1995 jurisdictions throughout world began enact laws adopt regulations consumer groups raised questions privacy access liability considerations taken consideration jurisdictions others enacted laws regulations differed technical operational problems converting pki schemes successful commercial operation progress much slower pioneers imagined would first years 21st century underlying cryptographic engineering clearly easy deploy correctly operating procedures manual automatic easy correctly design even designed execute perfectly engineering required standards existed insufficient pki vendors found market quite market envisioned mid-1990s grown slowly somewhat different ways anticipated pkis solved problems expected several major vendors gone business acquired others pki success government implementations largest pki implementation date defense information systems agency disa pki infrastructure common access cards program pkis one type another several vendors many uses including providing public keys bindings user identities used argue purchasing certificates securing websites ssl securing software code signing costly venture small businesses however emergence free alternatives let encrypt changed presently symantec holds major share pki certificate market sold one third certificates issued globally 2013 http/2 latest version http protocol allows unsecured connections theory practice major browser companies made clear would support state-of-art protocol pki secured tls connection web browser implementation http/2 including edge microsoft chrome google firefox mozilla opera supports http/2 tls using alpn extension tls protocol would mean get speed benefits http/2 website owners would forced purchase ssl certificates controlled corporations symantec current web browsers carry pre-installed intermediary certificates issued signed certificate authority means browsers need carry large number different certificate providers increasing risk key compromise key known compromised could fixed revoking certificate compromise easily detectable huge security breach browsers issue security patch revoke intermediary certificates issued compromised root certificate authority practical security vulnerabilities x.509 certificates known cases keys stolen major certificate authority listed
[ 513, 2050, 7683, 517, 7686, 9744, 9745, 3097, 2083, 3629, 5677, 7736, 62, 7231, 64, 9281, 10821, 3657, 11345, 3671, 3161, 8283, 7264, 10341, 9320, 119, 2169, 3707, 11387, 1157, 4746, 651, 1683, 1688, 8859, 9884, 3742, 160, 8865, 6308, 8...
Test
10,832
4
Joseph_Wenger:joseph wenger joseph numa wenger june 7 1901 – september 2 1970 rear-admiral united states navy served first deputy director armed forces security agency afsa later first vice director national security agency december 1952 november 1953 separate divisions afsa merged nsa wenger one leaders responsible development nsa native patterson louisiana wenger one architects centralized cryptology february 1942 navy power struggles led ousting laurance safford op-20-g two new sections headed wenger communications decryption translation john r. redman communications combat intelligence safford removed current intelligence support research role safford sidelined remainder war ultimately joseph rochefort wenger integral starting afsa armed forces security agency predecessor nsa world war ii suggested navy spend 2 million build 360 four wheel bombes break effective british monopoly bombe died 1970
[ 289, 4898, 6755, 7137, 10305, 11302, 327, 266, 6668, 365, 9357, 4719, 7887, 2897, 1714, 4566, 2712, 6749 ]
Test
10,833
5
Serial_communication:serial communication telecommunication data transmission serial communication process sending data one bit time sequentially communication channel computer bus contrast parallel communication several bits sent whole link several parallel channels serial communication used long-haul communication computer networks cost cable synchronization difficulties make parallel communication impractical serial computer buses becoming common even shorter distances improved signal integrity transmission speeds newer serial technologies begun outweigh parallel bus advantage simplicity need serializer deserializer serdes outstrip disadvantages clock skew interconnect density migration pci pci express example many serial communication systems originally designed transfer data relatively large distances sort data cable practically long-distance communication transmits data one bit time rather parallel reduces cost cable cables carry data serial cable computer ports plug usually referred specific name reduce confusion keyboard mouse cables ports almost invariably serial—such ps/2 port apple desktop bus usb cables carry digital video almost invariably serial—such coax cable plugged hd-sdi port webcam plugged usb port firewire port ethernet cable connecting ip camera power ethernet port fpd-link etc cables ports transmitting data one bit time include serial ata serial scsi ethernet cable plugged ethernet ports display data channel using previously reserved pins vga connector dvi port hdmi port many communication systems generally designed connect two integrated circuits printed circuit board connected signal traces board rather external cables integrated circuits expensive pins reduce number pins package many ics use serial bus transfer data speed important examples low-cost serial buses include rs-232 spi i²c dc-bus uni/o 1-wire pci express ic serial bus may typically implemented using multiplexer utilizes technique called multiplexing communication links across computers parts computers talk one another may either serial parallel parallel link transmits several streams data simultaneously along multiple channels e.g. wires printed circuit tracks optical fibers whereas serial link transmits single stream data although serial link may seem inferior parallel one since transmit less data per clock cycle often case serial links clocked considerably faster parallel links order achieve higher data rate several factors allow serial clocked higher rate many cases serial cheaper implement parallel many ics serial interfaces opposed parallel ones fewer pins therefore less expensive
[ 11536, 7698, 7445, 6807, 2968, 408, 799, 4767, 2598, 6187, 2989, 3886, 1967, 8625, 2994, 1203, 11314, 6837, 7865, 11196, 4543, 5825, 7108, 1478, 1997, 3156, 11477, 9686, 4567, 2523, 3042, 4963, 1894, 7400, 11627, 5486, 8432, 5617, 3445, 8...
Validation
10,834
5
Kylo_(web_browser):kylo web browser kylo discontinued open-source web browser developed hillcrest labs microsoft windows mac os x initially released 2010 browser features 10-foot user interface large fonts buttons make easy see across room making especially suitable use home theater pc connected directly high-definition television 2011 kylo ces consumer electronics show innovations awards honoree category online audio/video content may 15 2012 kylo released open source software terms mozilla public license
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 4728, 637, 1664, 2182, 6797, 10910, 8351, 7340, 9394, 9908, 185, 11449, 4797, 11466, 7885, ...
None
10,835
4
Principle_of_least_privilege:principle least privilege information security computer science fields principle least privilege polp also known principle minimal privilege principle least authority requires particular abstraction layer computing environment every module process user program depending subject must able access information resources necessary legitimate purpose principle means giving user account process privileges essential perform intended function example user account sole purpose creating backups need install software hence rights run backup backup-related applications privileges installing new software blocked principle applies also personal computer user usually work normal user account opens privileged password protected account superuser situation absolutely demands applied users terms least user access least-privileged user account lua also used referring concept user accounts times run privileges possible also launch applications privileges possible principle least privilege widely recognized important design consideration enhancing protection data functionality faults fault tolerance malicious behavior computer security benefits principle include practice exist multiple competing definitions true least privilege program complexity increases exponential rate number potential issues rendering predictive approach impractical examples include values variables may process addresses need precise time things required object capability systems allow instance deferring granting single-use privilege time used currently closest practical approach eliminate privileges manually evaluated unnecessary resulting set privileges typically exceeds true minimum required privileges process another limitation granularity control operating environment privileges individual process practice rarely possible control process access memory processing time i/o device addresses modes precision needed facilitate precise set privileges process require original formulation jerome saltzer peter j. denning paper fault tolerant operating systems set broader perspective among four fundamental principles fault tolerance dynamic assignments privileges earlier discussed roger needham 1972 historically oldest instance least privilege probably source code login.c begins execution super-user permissions and—the instant longer necessary—dismisses via setuid non-zero argument demonstrated version 6 unix source code kernel always runs maximum privileges since operating system core hardware access one principal responsibilities operating system particularly multi-user operating system management hardware availability requests access running processes kernel crashes mechanisms maintains state also fail therefore even way cpu recover without hard reset security continues enforced operating system properly respond failure possible detect failure kernel execution either halted program counter resumed execution somewhere endless and—usually—non-functional loop would akin either experiencing amnesia kernel execution failure trapped closed maze always returns starting point closed loops execution picks crash loading running trojan code author trojan code usurp control processes principle least privilege forces code run lowest privilege/permission level possible means code resumes code execution-whether trojan simply code execution picking unexpected location—would ability perform malicious undesirable processes one method used accomplish implemented microprocessor hardware example intel x86 architecture manufacturer designed four ring 0 ring 3 running modes graduated degrees access-much like security clearance systems defence intelligence agencies implemented operating systems processes execute potential privilege set active privilege set privilege sets inherited parent determined semantics fork executable file performs privileged function—thereby technically constituting component tcb concomitantly termed trusted program trusted process—may also marked set privileges logical extension notions set user id set group id inheritance file privileges process determined semantics exec family system calls precise manner potential process privileges actual process privileges file privileges interact become complex practice least privilege practiced forcing process run privileges required task adherence model quite complex well error-prone trusted computer system evaluation criteria tcsec concept trusted computing base tcb minimization far stringent requirement applicable functionally strongest assurance classes viz b3 a1 evidentiarily different functionally identical least privilege often associated privilege bracketing assuming necessary privileges last possible moment dismissing soon longer strictly necessary therefore ostensibly reducing fallout erroneous code unintentionally exploits privilege merited least privilege also interpreted context distribution discretionary access control dac permissions example asserting giving user u read/write access file f violates least privilege u complete authorized tasks read permission
[ 256, 6403, 10756, 2951, 10631, 9739, 13, 6797, 10511, 8466, 7187, 8344, 537, 10392, 9244, 6813, 2975, 3488, 3999, 10146, 5030, 4777, 2221, 174, 2477, 7983, 2737, 7480, 3643, 700, 3516, 7739, 9791, 10813, 4034, 4423, 4552, 7368, 7884, 2253...
Test
10,836
4
Justine_Tunney:justine tunney justine alexandra roberts tunney born c. 1985 software developer former occupy movement activist blogger like many former black hat hackers kevin mitnick tunney participated sides cybersecurity black hat white hat tunney case first computer hacker later life volunteer fixing security vulnerabilities open source software 1999 age 14 operating online name oogle tunney built rampage toolz 2.o exploiting security vulnerabilities aol sending spam tunney said rampage toolz popular third-party aol prog time ran ads site height dot-com boom earned hundreds dollars month teenager know tunney stated never heard google time similar name oogle coincidence tunney published screenshots rampage toolz oogle.net website source code tool statute limitations expired 2016 employee google tunney discovered open source projects github vulnerable security vulnerability discovered five months previously software library projects used called apache commons collections started raising pull requests github fix problems recruiting volunteers scale problem became apparent team volunteers swelled 50 google employees working 20 time ultimately tunney coworkers used bigquery discover vulnerable github software projects discovered 2,600 projects time directly indirectly vulnerable sent pull requests close security holes also raised public awareness severe cybersecurity threat posed continued use vulnerable versions libraries subsequent post google open source blog effort noting san francisco municipal transportation agency recently hacked ransomware due usage vulnerable version apache commons collections 2011 kalle lasn founder left-wing magazine adbusters put call activists occupy wall street response perceived political corruption american democracy wall street context 2008 financial crisis aftermath tunney one first individuals respond lasn call quickly creating occupywallst twitter handle occupywallst.org web site july 14 2011 became main online hub occupy movement february 2014 tunney took back exclusive control occupy wall street twitter account originally created removing posting access activists previously access stated founding organizer movement wrote locked twitter account partly order keep mouthpiece democratic party also said large number twitter users misogynist transphobic tunney described occupy wall street far-left movement former comrades described technocratic fascist written viewed activists within occupy wall street disagreed taking initiative ows movement sat meetings trying devise ways boss around unskilled unintelligent parasites tunney vocal supporter gamergate movement contributed unsuccessful crowdfunding campaign create gamergate movement website posted support gamergate movement occupy wall street twitter account tunney prolific blogger twitter user often writes political topics twitter personal blogs websites political writing sometimes controversial extreme degree daily dot vice various twitter users speculated might trolling performing online performance art might expressing sincerely held views daily dot cited tunney saying free speech rights respected techies progressives hopefully 'll live see day muckraking progressive reporters/bloggers sent prisons tunney characterised activities trolling multiple times since march 2014 response question put askfm regards asker suspicion tunney trying deliberately piss liberals tunney wrote answer included sentence favorite tactic trolling progressives simply use newspeak tunney also said trolling way get away saying certain things current regime tunney said entirely different person offline 2014 tunney petitioned us government people hold referendum asking support retire government employees full pensions transfer administrative authority technology industry appoint google chairman eric schmidt ceo america tunney works software engineer google petition expired failed meet people signature threshold doctors found tumor 2012 since removed
[ 488, 1970, 5636, 3269 ]
Test
10,837
3
HAL_SPARC64:hal sparc64 sparc64 microprocessor developed hal computer systems fabricated fujitsu implements sparc v9 instruction set architecture isa first microprocessor sparc64 hal first microprocessor first sparc64 brand operates 101 118 mhz sparc64 used exclusively fujitsu systems first systems fujitsu halstation model 330 model 350 workstations formally announced september 1995 introduced october 1995 two years late succeeded sparc64 ii previously known sparc64+ 1996 sparc64 superscalar microprocessor issues four instructions per cycle executes order multichip design consisting seven dies cpu die mmu die four cache dies clock die cpu die contains majority logic execution units level 0 l0 instruction cache execution units consist two integer units address units floating-point units fpus memory units fpu hardware consists fused multiply add fma unit divide unit fma instructions really fused single rounding sparc64 vi fma unit pipelined four-cycle latency one-cycle-throughput divide unit pipelined significantly longer latencies l0 instruction cache capacity 4 kb direct-mapped one-cycle latency cpu die connected cache mmu dies ten 64-bit buses four address buses carrying virtual addresses lead cache die two data buses write data register file two cache dies implement data cache four buses one cache die deliver data instructions cpu cpu die contained 2.7 million transistors dimensions 17.53 mm 16.92 mm area 297 mm 817 signal bumps 1,695 power bumps mmu die contains memory management unit cache controller external interfaces sparc64 separate interfaces memory input/output i/o bus used access memory 128 bits wide system interface hal i/o hio bus 64-bit asynchronous bus mmu die area 163 mm four dies implement level 1 l1 instruction data caches require two dies caches capacity 128 kb latency caches three cycles caches four-way set associative data cache protected error correcting code ecc parity uses 128-byte line size cache die implements 64 kb cache portion cache tags cache die contains 4.3 million transistors dimensions 14.0 mm 10.11 mm die area 142 mm 1,854 solder bumps 446 signals 1408 power sparc64 consisted 21.9 million transistors fabricated fujitsu cs-55 process 0.40 µm four-layer metal complementary metal–oxide–semiconductor cmos process seven dies packaged rectangular ceramic multi-chip module mcm connected underside mcm solder bumps mcm 565 pins 286 signal pins 218 power pins organized pin grid array pga mcm wide buses connect seven dies sparc64 ii sparc64+ development sparc64 second-generation sparc64 microprocessor operated 141 161 mhz used fujitsu halstation model 375 141 mhz model 385 161 mhz workstations introduced november 1996 december 1996 respectively sparc64 ii succeeded sparc64 iii 1998 sparc64 ii higher performance due higher clock frequencies enabled new process circuit tweaks higher instructions per cycle ipc count due following microarchitecture improvements fabricated fujitsu cs-60 process 0.35 µm five-layer metal cmos process new process reduced area dies cpu die measuring 202 mm mmu die 103 mm cache die 84 mm sparc64 gp series related microprocessors developed hal fujitsu used fujitsu gp7000f primepower servers first sparc64 gp development sparc64 ii third-generation sparc64 microprocessor known sparc64 iii introduced sparc64 gp operated clock frequencies 225 250 275 mhz first microprocessor hal support multiprocessing main competitors hp pa-8500 ibm power3 sun ultrasparc ii sparc64 gp taped july 1997 announced 11 april 1998 225 250 mhz versions introduced december 1998 275 mhz version introduced march 1999 single-die implementation sparc64 ii integrated modifications cpu die two four cache dies numerous modifications improvements made microarchitecture replacement mmu new system interface using ultra port architecture improved branch prediction extra pipeline stage improve clock frequencies second fpu could execute add subtract instructions fpu less functionality added instead duplicate first save die area second fpu half size first three-cycle latency instructions complex sparc64 ii memory management unit mmu replaced simpler one compatible solaris operating system previously sparc64 systems ran sparc64/os derivative solaris developed hal supported sparc64 l1 caches halved capacity 64 kb 128 kb reduce die area reason two four cache dies integrated sparc64 ii associated performance loss mitigated provision large external l2 cache capacity 1 16 mb l2 cache accessed dedicated 128-bit data bus operates half clock frequency microprocessor l2 cache inclusive super-set l1 caches l1 l2 cache data protected ecc tags parity sparc64 ii proprietary system interface replaced one compatible ultra port architecture enabled sparc64 iii use chipsets sun microelectronics system bus operates half third quarter fifth frequency microprocessor maximum 150 mhz contained 17.6 million transistors 6 million logic 11.6 million contained caches tlbs die area 210 mm fabricated fujitsu cs-70 process 0.24 µm five-layer metal cmos process packaged 957-pad flip-chip land grid array lga package dimensions 42.5 mm 42.5 mm 957 pads 552 signals 405 power ground internal voltage 2.5 v i/o voltage 3.3 v. peak power consumption 60 w 275 mhz ultra port architecture upa signals compatible 3.3 v low voltage transistor transistor logic lvttl levels exception differential clock signals compatible 3.3 v pseudo emitter coupled logic pecl levels second third sparc64 gps fourth generation sparc64 microprocessors second sparc64 gp development first operated 400 563 mhz first versions operating 400 450 mhz introduced 1 august 2000 larger l1 instruction data caches doubled capacity 128 kb better branch prediction result larger bht consisting 16,384 entries support visual instruction set vis l2 cache built double data rate ddr sram contained 30 million transistors fabricated fujitsu cs80 process 0.18 µm cmos process six levels copper interconnect used 1.8 v internal power supply 2.5 3.3 v power supply i/o packaged 1,206-contact ball grid array bga measuring 37.5 mm 37.5 mm 1,206 contacts 552 signals 405 power ground third sparc64 gp identical second terms microarchitecture operated 600 810 mhz first versions introduced 2001 700 788 810 mhz versions introduced 17 july 2002 fabricated fujitsu 0.15 µm cs85 process six levels copper interconnect used 1.5 v internal power supply 1.8 2.5 v power supply i/o
[ 6926, 6815, 36, 9766, 8231, 1707, 9137, 1725, 9920, 4172, 3919, 5329, 1503, 3431, 5358, 1776, 1399, 9976, 10108 ]
None
10,838
2
IPad_2:ipad 2 ipad 2 tablet designed developed marketed apple inc compared first ipad second model ipad line gained faster dual core a5 processor lighter build structure first ipad feature vga front-facing 720p rear-facing cameras designed facetime video calling device available initially three storage sizes – 16 32 64gb – two varying connectivity options – wi-fi wi-fi cellular variation device available either black white front glass panel however upon release 3rd generation ipad march 2012 16gb variation two connectivity options two front color options remained available product became available march may 2011 device received mixed positive reception various blogs publications although praised hardware improvement new apple a5 chip software restriction ipad 2 ios general drew criticism various technology commentators device sold well first month sales 2.4–2.6 million units sold 11.12 million units sold third quarter 2011 popular product lower screen resolution performance two retina models followed lighter build longer battery life remained apple line-up entry-level ipad model three years march 2014 latterly silent upgrade die-shrunk version a5 processor basic design formed core first ipad mini screen pixel count similar features smaller size ipad 2 device receive six major versions ios 4 9 ios 12 released iphone 5s ipad air ipad mini 2 apple sent invitations journalists february 23 2011 media event march 2 march 2 2011 ceo steve jobs unveiled device yerba buena center arts despite medical leave upon announcement ipad 2 original ipad discontinued sales online apple authorized retail stores apple began selling ipad 2 website march 11 u.s. retail stores 5 pm local time date many stores major cities new york sold within hours online shipping delays increased three four weeks sunday four five weeks tuesday ipad 2 released internationally 25 countries march 25 2011 countries included australia austria belgium canada czech republic denmark finland france germany greece iceland italy ireland hungary luxembourg mexico netherlands new zealand norway poland portugal spain sweden switzerland united kingdom april 29 2011 release date japan postponed due earthquake tsunami struck nation march 11 2011 ipads delayed due nand flash storage chip used ipads created toshiba affected earthquake tsunami thus resulting suspension operations indefinite period time slowdown caused analysts downgrade apple stock ipad 2 later released hong kong south korea singapore philippines malaysia countries including japan april 29 2011 released numerous nations include china estonia thailand brazil russia taiwan two major release dates may 6 27 32 64gb models discontinued march 7 2012 upon introduction third generation ipad 16gb wi-fi 16gb wi-fi 3g models discontinued march 18 2014 late march 2011 ipad 2 released alongside ios 4.3 primarily introduced airplay mirroring home sharing among features october 12 2011 upon release iphone 4s ipad upgradable ios 5 firmware brought 200 new user features ios compatible devices including notification center imessage reminders updated notifications system using new banner style instead previously used pop-up alert style ipad 2 comes several applications default including safari mail photos video music itunes store maps notes calendar photo booth contacts app store also available default application enables users download database 800,000 applications price applications set developers like ios devices ipad 2 sync music videos apps photos mac pc using itunes although using ios 5 later user connect ipad computer icloud also allows users backup sync data compatible ios devices via internet game center available native social gaming platform ios games downloaded via app store feature enabled able integrate achievement points high-scores bonus system across ios devices single accumulative points social platform although tablet designed make phone calls cellular network user use wired headset built-in speaker microphone place phone calls wi-fi cellular using voip application ipad 2 also adds ability run garageband imovie iwork apps pages keynote numbers applications come ipad instead official applications apple sold within app store march 7 2012 unveiling third generation ipad firmware ipad 2 upgradable ios 5.1 scott rohde senior sony executive described ipad game console disguised device appropriated business workplace september 19 2012 almost week announcement iphone 5 ios 6 released numerous ios devices including ipad 2 however ios 6 features available ipad 2 software upgrade downloadable air ota update package contains two-hundred new features including mapping software designed apple dubbed apple maps clock app features timer stopwatch alarm facebook integration among new features tweaks ipad 2 compatible ios 7 released september 18 2013 however features available example like iphone 4 notification center control center use transparent style instead translucent style later ios models also airdrop first released ios 7 supported ipad 4 later ipad 2 run ios 8 released september 17 2014 making first ios device run five major versions ios including ios 4 5 6 7 8 os runs device new features work relatively aged hardware therefore performance limited users also reported numerous problems receiving update including accessibility features battery-related issues many users predicted ipad 2 going dropped updating ios 8 along iphone 4 process happened iphone 3gs ipod touch fourth generation earlier models considering model 3 years old confirmed june 8 2015 apple wwdc ipad 2 would run ios 9 made ipad 2 first ios device run six major versions ios previous releases though many headline features unavailable ipad 2 including predictive siri translucency effects split-view slide-over picture-in-picture multitasking health app ios 9 said feature performance improvements may help aging device function smoothly initial tests suggest significantly impact available space a5-based devices also run ios 9 including iphone 4s five major ios versions ipad mini four major ios versions ipod touch 5g four major ios versions june 13 2016 release ios 10 apple dropped continuing compatibility ipad 2 hardware limitations goes ipad 3rd generation ipad mini 1st generation making ios 9 final version run device ipad 2 one many computers mobile devices susceptible broadpwn exploit publicized july 2017 apple quickly released update ios 10 fix problem fix never released ios 9 earlier versions ios result older apple devices incompatible ios 10 including ipad 2 left vulnerable indefinitely raised concerns potentially widespread attacks using exploit particularly locations concentrated ipad 2 deployment certain primary secondary schools january 2018 apple suddenly started firmware signing ios 6.1.3 ipad 2 iphone 4s allowing users downgrade devices ios 6. ios 8 available over-the-air update ios 6 allowing users update devices ios 8.4.1 august 2019 still supported ipad 2 features apple a5 package-on-package pop system-on-chip soc comprises 1 ghz dual-core 32-bit cortex-a9 cpu 512 mb ram dual-core powervr sgx543mp2 gpu features include front rear cameras three-axis gyroscope headset controls proximity ambient light sensors microphone magnetometer accelerometer 9.7 inch multi-touch screen maximum resolution 1024×768 hence resulting 132 ppi ipad 2 four physical switches including home button near display returns user home screen three plastic physical switches sides wake/sleep volume up/down third switch either screen rotation lock mute home button ipad 2 easier double tap previous generation ipad apple reduced size ipad eliminating stamped sheet metal frame display integrating new thinner glass technology touch screen overlay slightly reducing space display battery ipad 2 screen thinner lighter yet stronger original ipad ipad 2 also supports screen mirroring via digital av adapter airplay ios 5 ipad 2 25 w·h rechargeable lithium-ion polymer battery lasts 10 hours like original ipad charged via usb included 10 w 2 power adapter battery 2.5 mm thick 59 smaller original three cells instead two improvements allowed injection-molded plastic support frame omitted 10 w usb power adapter provides 4x power conventional usb port tablet audio frequency response 20 hz 20 khz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav revised tablet adds front- rear-facing cameras allow facetime video calls ipad 2s third generation ipad iphone 4 4s fourth-generation ipod touch macintosh computers running mac os x 10.6.6 later webcam 0.3 mp front camera shoots vga-quality 30 frame/s video vga-quality still photos 0.7 mp back camera shoot 720p hd video 30 frame/s 5× times digital zoom shoot photo fullscreen aspect ratio rear camera shoots video 16:9 widescreen match 720p standard although central 4:3 part recording shown screen recording forward-facing camera shoots 4:3 apple a5 chip doubles processing speed graphics processing nine times faster previous ipad however benchtests hardware assessments performed various third party news sources technology blogs indicate claims exaggerated benchmark assessment conducted anandtech showed gpu ipad 2 3 times faster original ipad cpu benchmarks conducted ipad 2 iosnoops indicate 66 performance increase compared original ipad 3g versions ipad 2 offer cdma2000 support customers using device cdma network gsm/umts support customers using device gsm/umts network ipad wi-fi 3g model includes a-gps receiver tracking user location given permission also ipad 2 3g model includes plastic cap-like band top back 3g antenna metallic grille microphone replaced matching plastic black grille 3g model gsm models ipad 2 use sim card cdma models use esn connect cellular network device 15 lighter 33 thinner original ipad thinner iphone 4 0.5 mm wi-fi version gsm cdma versions known respectively verizon versions us differ weight slightly due mass difference gsm cdma cellular radios gsm model cdma model size ipad 2 also less original ipad 9.50×7.31×0.34 241.2×185.7×8.8 mm compared original ipad size 9.56×7.47×0.5 242.8×189.7×13.4 mm announcement release third generation ipad ipad 2 continued available purchase received hardware upgrade upgraded variant ipad 2 features smaller version apple a5 soc able reduce battery consumption benchmark tests conducted anandtech concluded upgraded variant able last longer least hour half depending task conducted device maximum temperature device heated also less original ipad 2 tests conducted organisation revealed upgraded variant able operate 1 degree lower performing intensive tasks performance difference two variants according anandtech negligible smart cover first introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets original ipad owners could purchase black case included similarly folding cover smart cover meant minimal easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes ipad cover removed five different colors polyurethane leather leather expensive polyurethane version apple offers several accessories ipad 2 adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger also used ipods iphones 10 w charger included ipad ipad 2 received mixed positive reviews praising apple a5 processor 720p camera joshua topolsky engadget said n't yet made leap feel free take deep breath dive – ipad 2 good gets right really quite good jason snell macworld said following though ipad 2 improvement original ipad numerous ways ’ still evolutionary product revolutionary one ’ happy current ipad ’ reason dump ’ shinier newer one say millions people ’ mean shiny ’ invested ipad accessories dock case keep mind probably ’ able use new ipad techcrunch mg siegler stated let sum simple way ipad 2 buy one maybe — depends factors want buy one yes use information wisely closed proprietary nature ios garnered criticism particularly digital rights advocates electronic frontier foundation computer engineer activist brewster kahle internet-law specialist jonathan zittrain free software foundation protested ipad introductory event targeted ipad defective design campaign competitor microsoft via pr spokesman also criticized apple control platform issue restrictions imposed design ios namely drm intended lock purchased media apple platform development model requiring yearly subscription distribute apps developed ios centralized approval process apps well apple general control lockdown platform particularly issue ability apple remotely disable delete apps tech community expressed concern locked-down ios represents growing trend apple approach computing particularly apple shift away machines hobbyists tinker note potential restrictions stifle software innovation ipad 2 users reported performance issues running ios 8 apple improved performance ipad 2 iphone 4s ios 8.1.1 update however 2 devices still n't run fast later models first weekend sale one million units sold soon first weekend ashok kumar technology analyst financial firm predicted apple would sell 35 million ipad 2s 2011 investment banking firm piper jaffray monitored initial sales ipad 2 reported 70 ipad 2 sales first-time ipad buyers 49 buyers owning pc compared initial buyers original ipad 26 buyers owned pc 12,000 units sold auction site ebay first two weeks release iphone 4s released rumors third generation ipad caused decline ipad 2 sales official figures released fourth quarter 2011 indicate apple sold 11.4 million ipads third quarter 166 increase third quarter 2010 product helped create newer larger markets apple south east asia 2011 two ipad 2 tablets taken international space station approved apple products taken iss include ipod also two iphone 4 phones personal computing system aboard iss various versions thinkpad laptop ibm later lenovo brand applications ipads used include angry birds game iss fit international space station food intake tracker tracking astronauts food consumption
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 1083, 8253, 576, 7745, 1090, 8783, 4180, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, 4...
None
10,839
2
Windows_NT_startup_process:windows nt startup process windows nt startup process process windows nt 4.0 windows 2000 windows xp windows server 2003 operating systems initialize windows vista later process changed significantly see windows vista startup process information changed windows nt installer works similarly regular windows nt install except runs cd-rom boot method work bios must compatible el torito specification iso 9660 file system install cd fully compatible standard although level 1 file names n't file version appended boot image emulation type 1 sector long 2048 bytes loaded segment 0x7c0 extracted iso image using file-extraction program 7-zip winzip iso image also hybridized like iso images linux distributions therefore contain master boot record mbr makes unable boot copying image block device pen drive installer also run ms-dos command prompt previous versions microsoft windows already installed upgraded run installer ms-dos based operating system windows 98 windows user must start system dos mode execute i386/winnt.exe cd-rom floppy disk containing ms-dos used start installer versions installer floppies also available sale windows vista onwards installer runs boot.wim contains bootable version windows pe windows pe 2.0 based windows vista kernel later windows pe versions based later windows versions regular cd-rom install bios executes post searches boot descriptor cd-rom boot descriptor points boot catalog file iso 9660 file system bios searches boot image compatible current architecture loads memory runs boot image analogous boot sector hard drive boot image loads setupldr.bin analogous ntldr fails reason message displayed saying ntldr found may misleading moreover ntldr cd never used loading phase installer process also assumes file versions unavailable starting boot loader boot image checks whether windows install system already present starts codice_1 install found disk mbr starts boot loader directly thus obviating need codice_1 codice_1 started displays string press key boot cd waits user input none detected seconds boots next device behavior essential booting second stage installer starts hard disk codice_4 codice_5 composed two binary files concatenated also found installation cd compressed cab files first file codice_6 flat binary file loads second file second file regular exe file portable executable format codice_4 second file codice_8 codice_5 second file codice_10 codice_8 codice_10 embedded file system drivers basic access fat ntfs iso 9660 differently regular *.sys drivers boot loader uses bios interrupts access boot disk also contain built-in ini parser cab decompressor installer starts running prints string setup inspecting computer hardware configuration ... codice_13 called system information stored memory displays blue screen vga text mode title windows setup white line bottom behaves status bar looks codice_14 parses file works key-value database like *.ini *.inf registry keys may either contain list files associated install location script line therefore database stores data code parsing blank lines ignored sections name merged file codice_15 also loaded resolve hardware quirks key-value syntax codice_16 section follows installer asks additional drivers need loaded loads text mode drivers loaded floppy disk hidden feature shows screen prompting user select computer type f5 pressed first message text mode drivers different pnp drivers loaded regardless hardware present loading phase installer displays messages screen current file loaded message setup loading files file description ... files loaded phase located sections ending codice_17 sections key gives driver name value gives file driver name looked section without codice_17 suffix find driver user-friendly name kernel also needs registry hive mounted load registry codice_19 also loaded file names files loaded boot loader hard-coded except drivers pnp devices identified bus driver address checked section codice_20 corresponding driver name given used step boot files loaded boot loader message setup starting windows displayed kernel starts like normal install starts drivers loads service codice_21 runs kernel mode starts gui still text mode drivers nt based bios interrupts used anymore user asked choose file system layout selected partition formatted necessary files txtsetup.sif copied system creates registry hives automatically restart system nt system start bootstrap section hiveinfs points files used fill hives default values fresh install section named codice_22 files reg files also ini files understood ini interpreter bundled installer disk formatter program statically linked codice_21 many freeware tools available internet customize txtsetup.sif creation unattended installs integrate drivers hotfixes process sometimes referred slipstreaming following command shows remastered cd created minimum set options linux assumes current directory cd mount point image created home directory file codice_24 used make install unattended required present model file cd named codice_25 setup tries detect winnt.sif codice_26 directory root directory floppy disk windows nt startup process starts computer finds windows boot loader portion windows operating system responsible finding microsoft windows starting prior windows vista however boot loader ntldr microsoft also released operating systems intel itanium processors use ia-64 architecture boot loader editions windows ia64ldr.efi later referred simply ia64ldr extensible firmware interface efi program boot loader executed searches windows operating system windows boot manager reading boot configuration data bcd complex firmware-independent database boot-time configuration data predecessor codice_5 reading simpler codice_28 boot.ini file missing boot loader attempt locate information standard installation directory windows nt 2000 machines attempt boot codice_29 windows xp 2003 machines boot codice_30 databases may contain list installed microsoft operating systems may loaded local hard disk drive remote computer local network ntldr supports operating systems installed disks whose file system ntfs fat file systems cdfs iso 9660 udfs windows boot manager also supports operating systems installed inside vhd file stored ntfs disk drive windows 2000 later versions windows hibernation supported windows boot loader starts search operating systems searching hiberfil.sys ntldr looks root folder default volume specified boot.ini windows boot manager looks location hiberfil.sys bcd file found active memory set found boot loader loads contents file compressed version physical memory dump machine memory restores computer state prior hibernation next boot loader looks list installed operating system entries one operating system installed boot loader shows boot menu allow user select operating system non nt-based operating system windows 98 selected specified ms-dos style path e.g c boot loader loads associated boot sector file listed boot.ini bcd default bootsect.dos file name specified passes execution control otherwise boot process continues operating system starts certain basic drivers flagged boot loaded memory appropriate file system driver partition type ntfs fat fat32 windows installation resides amongst point boot process boot loader clears screen displays textual progress bar often seen due initialization speed windows 2000 also displays text starting windows ... underneath user presses f8 phase advanced boot menu displayed containing various special boot modes including safe mode last known good configuration debugging enabled case server editions directory services restore mode boot mode selected f8 never pressed booting continues following files loaded sequentially next ntdetect.com windows nt kernel ntoskrnl.exe hardware abstraction layer hal.dll loaded memory multiple hardware configurations defined windows registry user prompted point choose one kernel memory boot-time device drivers loaded yet initialized required information along information detected hardware windows services stored codice_31 portion registry set registry keys collectively called control set multiple control sets typically two kept event settings contained currently-used one prohibit system booting codice_31 contains control sets labeled codice_33 codice_34 etc. well codice_35 regular operation windows uses codice_35 read write information codice_35 reference one control sets stored registry windows picks real control set used based values set codice_38 registry key control set chosen codice_44 key gets set accordingly codice_40 key also set codice_44 end boot process codice_42 also set codice_44 boot process completes successfully services started order group started provided following keys purposes booting driver may one following finished control passed boot loader kernel initialization kernel subsystem windows executive subsystems done two phases first phase basic internal memory structures created cpu interrupt controller initialized memory manager initialized creating areas file system cache paged non-paged pools memory object manager initial security token assignment first process system process manager system idle process well system process created point second phase involves initializing device drivers identified ntldr system drivers process loading device drivers progress bar visible bottom display windows 2000 systems windows xp windows server 2003 replaced animated bar represent actual progress prior windows xp part boot process took significantly longer drivers would initialized one time windows xp server 2003 drivers initialized asynchronously boot system drivers loaded kernel system thread starts session manager subsystem codice_51 files opened autochk started smss.exe autochk mounts drives checks one time see whether cleanly unmounted autochk determines one volumes dirty automatically run chkdsk provides user short window abort repair process pressing key within 10 seconds introduced windows nt 4.0 service pack 4 earlier versions would allow user abort chkdsk since windows 2000 xp 2003 show text screen point unlike nt 3.1 4.0 displayed blue text screen user see different background picture holding mini-text-screen center screen show progress chkdsk boot time session manager subsystem session manager stores configuration codice_58 exact operation items based configuration set registry winlogon starts local security authority subsystem service lsass service control manager scm turn start windows services set auto-start also responsible responding secure attention sequence sas loading user profile logon optionally locking computer screensaver running login process follows user trying log local host codice_70 key used database user trying log another host netlogon service used carry data windows xp gina shown user presses secure attention sequence winlogon support plugins get loaded notified specific events lsass also supports plugins security packages rootkits bundle winlogon plugins loaded user logs keys allow multiple comma-separated values supplied allow malicious program executed time legit system file hashing algorithms stored sam database known broken winlogon responsibilities login process changed significantly windows vista userinit first program runs user credentials responsible start programs compose user shell environment shell program typically codice_71 started registry entry codice_72 pointed registry entry key codice_73 default value codice_74 evaluates codice_75 userinit runs startup programs following locations successfully boot client must support pxe booting windows deployment services wds component must installed server installed default wds successor remote installation services ris pxe program found bios rom chip network card pxe booting technology specific windows also used start linux system fact linux system act server service dhcp tftp pxe used start windows setup install system client computer run operating system ram latter called remote boot introduced windows xp embedded sp1 available flavor windows general process methods follows boot information negotiation layer binl windows 2000 service running server communicates client nbp already loaded pxe
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 3109, 7207, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 5754, 4731, 7290, 10879, 8841, 6797, 21...
None
10,840
3
Macintosh_Quadra_660AV:macintosh quadra 660av macintosh quadra 660av originally called macintosh centris 660av personal computer designed manufactured sold apple computer inc. july 1993 september 1994 introduced alongside quadra 840av av model numbers signifies video input output capabilities enhanced audio 660av discontinued months introduction power macintosh 6100/60av apple also sold power macintosh upgrade card upgraded 660av match 6100/60av specifications users ready move powerpc quadra 630 also suitable replacement 660av uses pizza box form factor earlier centris 610 660av full motorola 68040 instead 610 fpu-less 68lc040 like 840av 660av features video input/output capability onboard 3210 digital signal processor clocked 55 mhz make video handling less burden cpu 660av also first macintosh include geoport optional geoport telecom adapter enables fax modem capabilities earliest centris 660avs older auto-inject floppy drive opening similar 610 centris models quadra models drive similar power macintosh 6100 lacking ‘ auto-inject ’ feature models deep round indent center floppy drive slot make possible insert disk way quadra av macs introduced new universal rom codenamed supermario would later used powerpc systems includes scsi manager 4.3 sound manager 3.0 also vectorized making easier patch introduced july 29 1993 introduced october 1 1993
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 3167, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 7305, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, 4807, ...
Validation
10,841
9
McCLIM:mcclim mcclim free software implementation common lisp interface manager project named mike mcdonald person started
[ 10752, 11269, 2062, 9231, 9749, 8728, 4633, 9245, 8226, 2603, 5165, 5677, 3631, 2105, 6717, 576, 8771, 1613, 9299, 3675, 2658, 7267, 8293, 2666, 5743, 8303, 2673, 8304, 5751, 9848, 5754, 7292, 7805, 1664, 1666, 6797, 9875, 9877, 3734, 477...
Test
10,842
4
White_Ops:white ops white ops ad verification bot detection cybersecurity firm white ops cofounded chief scientist dan kaminsky 2012 white ops president michael tiffany ash kalb tamer hassan ceo company gene fay company ’ coo headquartered new york city international offices 2016 discovered methbot network bots six thousand online publishers platforms affected including facebook generating 3- 5 million fraudulent ad revenue per day 2017 white ops uncovered 3ve bot network one largest ad fraud enterprises yet discovered 1.7 infected computers leading thirteen department justice indictments 2018 investigation network google fbi originally operating prevent ad fraud online 2018 white ops expanded ad fraud activities include television detects bots bot networks uses human verification part process processes trillion transactions per month 2018 white ops produced reports ad fraud association national advertisers since 2014 2017 white ops began partnering trade desk block fraudulent impressions advertisers make bids following year 2018 whiteops began similar partnership beachfront media video management platform telaria white ops also partners adobe advertising cloud provide independent third-party bot detection 2019 white ops began partnering media.net
[ 11 ]
Validation
10,843
2
Adaptive_replacement_cache:adaptive replacement cache adaptive replacement cache arc page replacement algorithm better performance lru least recently used accomplished keeping track frequently used recently used pages plus recent eviction history algorithm developed ibm almaden research center 2006 ibm granted patent adaptive replacement cache policy basic lru maintains ordered list cache directory resource entries cache sort order based time recent access new entries added top list bottom entry evicted cache hits move top pushing entries arc improves basic lru strategy splitting cache directory two lists t1 t2 recently frequently referenced entries turn extended ghost list b1 b2 attached bottom two lists ghost lists act scorecards keeping track history recently evicted cache entries algorithm uses ghost hits adapt recent change resource usage note ghost lists contain metadata keys entries resource data i.e entry evicted ghost list data discarded combined cache directory organised four lru lists t1 b1 together referred l1 combined history recent single references similarly l2 combination t2 b2 whole cache directory visualised single line inner brackets indicate actual cache although fixed size move freely across b1 b2 history l1 displayed right left starting top indicated marker indicates target size t1 may equal smaller larger actual size indicated entries re- entering cache t1 t2 cause move towards target marker free space exists cache marker also determines whether either t1 t2 evict entry arc currently deployed ibm ds6000/ds8000 storage controllers sun microsystems scalable file system zfs uses variant arc alternative traditional solaris filesystem page cache virtual memory modified allow locked pages currently use vacated postgresql used arc buffer manager brief time version 8.0.0 quickly replaced another algorithm citing concerns ibm patent arc vmware vsan formerly virtual san hyper-converged software-defined storage sds product developed vmware uses variant arc caching algorithm
[ 9665, 6153, 2250, 8539, 9343 ]
Test
10,844
5
Distributed_Universal_Number_Discovery:distributed universal number discovery distributed universal number discovery dundi voip routing protocol provides directory services asterisk systems dundi peered nodes share dialplan information protocol actually carry calls rather provides addressing information peers dundi cluster query peers telephone number call requested user result query dial string asterisk application dial protocol invented mark spencer author asterisk asterisk pbx systems use dundi peered cooperating system dundi nodes certain configuration access dundi instance least one node dundi configuration one limit number consecutive lookups peers setting ttl dundi peer advertise extensions context e.g connect local e.164 number advertise dundi configuration assigns priority weight advertised extension low values represent high priority must chosen first one answer received lookup asterisk cli one lookup hand test dundi configuration works dundi lookup tells pbx ask known peers know reach extension 301 priv network answer consists 6 parts order prevent network overloading time keep responses quick possible involved peers cache lookups see used keys may become invalid period lookup expiry date defaults one hour context given lookup dundi defaults e.164 context means looking normal international phone-numbers like 0031201234567 bogus number amsterdam netherlands order peer least one peer e164 trust group peers group bound digium gpa digium general peering agreement pdf
[ 11250, 8627 ]
None
10,845
4
Layered_security:layered security layered security also known layered defense describes practice combining multiple mitigating security controls protect resources data like security methods layered security designed protect assets asset anything want protect include people property data etc layered security used environment military operations individuals community residents homeowners neighborhood watch groups etc words layered security practice using many different security controls different levels protect assets provides strength depth reduce effects threat goal create redundancies backups case security measures fail bypassed defeated placing assets innermost perimeter provide layers security measures increasing distances protected asset number layers security measures use depend threat importance asset term bears similarity defense depth term adopted military strategy involves multiple layers defense resist rapid penetration attacker yield rather exhaust too-rigid tactics incursion progresses resources consumed progress slowed halted turned back information assurance use term defense depth assumes merely technical security tools deployment also implies policy operations planning user training physical access security measures direct information assurance personnel involvement dealing attempts gain unauthorized access information resources within defense depth security strategy layered security regarded merely delaying tactic used buy time bring security resources bear deal malicious security cracker activities layered security example swiss cheese model cumulative act effect used risk analysis risk management model security systems likened multiple slices swiss cheese stacked side side risk threat becoming reality mitigated fact must pass holes defenses i.e trapped detected different defense defenses different kinds locations layered behind therefore theory lapses weaknesses one defense easily allow risk materialize since defenses also exist prevent single point weakness every category threat effective control deployed mitigate threat security vendors sometimes cite differing solutions grouped consumer enterprise categories ad hoc security strategy numerous vendors abundance different sometimes incompatible security solutions products leave gaps protection whereas vertically integrated vendor stack could provide comprehensive defense single-vendor solutions improve interoperability components complete security strategy may offer performance price benefits multi-vendor approach contrasting commercial security product argument best breed approach provides effective protection single vendor vertically integrated product stack may offering choice vendors want monopolize client customer business could also argued component comprehensive security strategy evaluated performance within niche open compatibility non-integrated components whole
[ 2948, 8998, 8838, 7979, 5082 ]
Validation
10,846
4
Collateral_circulation:collateral circulation collateral circulation alternate circulation around blocked artery vein via another path nearby minor vessels may occur via preexisting vascular redundancy analogous engineered redundancy circle willis brain may occur via new branches formed adjacent blood vessels neovascularization eye retinal embolism formation may provoked pathological conditions high vascular resistance ischaemia example usefulness collateral circulation systemic thromboembolism cats thrombotic embolus lodges external iliac artery common iliac artery blocking external internal iliac arteries effectively shutting blood supply hind leg even though main vessels leg blocked enough blood get tissues leg via collateral circulation keep alive blood flow brain humans animals maintained via network collateral arteries anastomose join circle willis lies base brain circle willis so-called communicating arteries exist front anterior back posterior parts circle willis well left right side circle willis another example humans animals acute myocardial infarction heart attack collateral circulation heart tissue sometimes bypass blockage main artery supply enough oxygenated blood enable cardiac tissue survive recover central retinal vein occlusion neovascularization may restore blood flow retina new vessels bulk also presents risk causing acute glaucoma blocking drainage aqueous humour hepatic cirrhosis arising congestion hepatic portal vein may give rise collateral circulation branches portal caval veins liver two caval veins consequences newly established venous collaterals arising portal hypertension include esophageal varices hemorrhoids portocaval collateral circulation
[]
Train
10,847
0
Document_structuring:document structuring document structuring subtask natural language generation involves deciding order grouping example paragraphs sentences generated text closely related content determination nlg task assume four sentences want include generated text 24 4 orderings messages including orderings better others example texts shown human readers prefer 1234 2314 4321 ordering also many ways sentences grouped paragraphs higher-level structures sections example 8 2**3 ways sentences 1234 grouped paragraphs including ordering human readers prefer groupings others example 12 34 preferred 1 23 4 document structuring task choose ordering grouping sentences results coherent well-organised text reader perspective three basic approaches document structuring schemas corpus-based heuristic schemas templates explicitly specify sentence ordering grouping document well content determination information typically constructed manually analysing corpus human-written texts target genre extracting document template texts schemas work well practice texts short 5 sentences less and/or standardised structure problems generating texts longer fixed structure corpus-based structuring techniques use statistical corpus analysis techniques automatically build ordering and/or grouping models techniques common automatic summarisation computer program automatically generates summary textual document principle could applied text generated non-linguistic data work infancy part challenge texts generated natural language generation systems generally expected fairly high quality always case texts generated automatic summarisation systems final approach heuristic-based structuring algorithms perform structuring task based heuristic rules come theories rhetoric psycholinguistic models and/or combination intuition feedback pilot experiments potential users heuristic-based structuring appealing intellectually difficult get work well practice part heuristics often depend semantic information sentences relate always available hand heuristic rules focus best text readers whereas approaches focus imitating authors many human-authored texts well structured perhaps ultimate document structuring challenge generate good narrative—in words text starts setting scene giving introduction/overview describes set events clear fashion readers easily see individual events related link together concludes summary/ending note narrative sense applies factual texts well stories current nlg systems good job generating narratives major source user criticism generating good narratives challenge aspects nlg fundamental challenge probably document structuring
[ 2440, 7599, 5197, 3663 ]
Test
10,848
9
SHAZAM_(software):shazam software shazam comprehensive econometrics statistics package estimating testing simulating forecasting many types econometrics statistical models shazam originally created 1977 kenneth white shazam version 11 available windows platforms server workstation desktop windows xp later shazam editions read write fixed free format text formats using read format statements data stored observation row variable column without variable names supplied windows environment formats comma-separated values csv microsoft excel xls xlsx may also read written shazam professional edition contains comprehensive data import capabilities data connector sql editor allowing import machine data source tab space comma separated text formats file-based proprietary binary formats including various microsoft excel formats well microsoft access lan wan internet data source user driver system addition shazam import data database management systems dbms shazam ships drivers common data database management systems shazam extensible development shazam procedures included reused shazam command files numerous shazam procedures written available shazam website many sites throughout internet shazam currently available four editions shazam command line edition shazamd shazamq text user interface versions allow batch processing operate double quad precisions shazam standard edition shazamw adds native windows application incorporates multiple document interface mdi interface including command data matrix graph editors workspace viewer along integrated online help samples examples shazam professional edition shazamp adds menu wizard driven facilities executing shazam techniques data connector sql editor well integrated debugger main guide available using shazam offers detailed descriptions shazam features commands options well providing guidance statistical techniques performed algorithms used construction shazam techniques contains numerous theoretical explanations practical examples sample code
[ 5129, 7945, 3980, 2317, 6797, 7950, 2457, 7580, 7326, 7983, 6962, 6718, 5830, 5703, 4808, 5833, 5450, 8262, 2000, 9944, 2652, 7523, 4840, 6248, 363, 5612, 7924, 3573 ]
Train
10,849
1
Result_set:result set sql result set set rows database well metadata query column names types sizes column depending database system number rows result set may may known usually number known front result set built on-the-fly result set effectively table codice_1 clause used query impose certain sort condition rows without clause guarantee whatsoever order rows returned
[ 9634, 9286, 11339, 2669, 10413, 10737, 8979, 9075, 2901, 5403 ]
Test
10,850
6
E4M:e4m encryption masses e4m free disk encryption software windows nt windows 9x families operating systems e4m longer maintained author paul le roux joined shaun hollingworth author scramdisk produce commercial encryption product drivecrypt security company securstar popular source-available freeware program truecrypt based e4m source code however truecrypt uses different container format e4m makes impossible use one programs access encrypted volume created shortly truecrypt version 1.0 released february 2004 truecrypt team reported receiving emails wilfried hafner manager securstar claiming paul le roux stolen source code e4m securstar employee according truecrypt team emails stated le roux illegally distributed e4m authored illegal license permitting anyone base derivative work e4m distribute freely hefner alleges le roux right claiming versions e4m always belonged securstar time led truecrypt team stop developing distributing truecrypt
[ 8640, 9281, 2050, 7139, 10631, 1801, 4746, 8331, 7983, 8976, 7794, 3572, 5749, 3382, 3350, 8283 ]
None
10,851
2
Comparison_of_open-source_operating_systems:comparison open-source operating systems tables compare free software open-source operating systems versions support feature first version supports listed
[ 2051, 10255, 3603, 7187, 8725, 2073, 4636, 9245, 5663, 546, 9762, 3114, 3629, 5677, 7223, 10809, 4669, 6718, 10813, 7234, 8772, 3142, 3654, 5703, 8262, 1101, 10317, 593, 1618, 4192, 11363, 10341, 9320, 1646, 8816, 5747, 9333, 6263, 9335, ...
Test
10,852
4
Stacheldraht:stacheldraht stacheldraht german barbed wire malware written mixter linux solaris systems acts distributed denial-of-service ddos agent tool detects automatically enables source address forgery stacheldraht uses number different denial-of-service dos attacks including user datagram protocol udp flood internet control message protocol icmp flood transmission control protocol tcp syn flood smurf attack combines features trinoo tribe flood network tfn adds encryption
[ 2060, 4495, 4883, 11413, 5402, 10924, 1965, 7983, 823, 2754, 9282, 6347, 4558, 2007, 11351, 7515, 2018, 2409, 2299, 2045, 9727 ]
None
10,853
5
TCP_offload_engine:tcp offload engine tcp offload engine toe technology used network interface cards nic offload processing entire tcp/ip stack network controller primarily used high-speed network interfaces gigabit ethernet 10 gigabit ethernet processing overhead network stack becomes significant term toe often used refer nic although circuit board engineers may use refer integrated circuit included card processes transmission control protocol tcp headers toes often suggested way reduce overhead associated internet protocol ip storage protocols iscsi network file system nfs originally tcp designed unreliable low speed networks early dial-up modems growth internet terms backbone transmission speeds using optical carrier gigabit ethernet 10 gigabit ethernet links faster reliable access mechanisms dsl cable modems frequently used data centers desktop pc environments speeds 1 gigabit per second tcp software implementations host systems require extensive computing power early 2000s full duplex gigabit tcp communication could consume 80 2.4 ghz pentium 4 processor see freed-up cpu cycles resulting small processing resources left applications run system tcp connection-oriented protocol adds complexity processing overhead aspects include moving functions dedicated hardware tcp offload engine frees system main cpu tasks 2012 consumer network interface cards support toe instead replacing tcp stack toe entirely alternative techniques offload operations co-operation operating system tcp stack tcp checksum offload large segment offload supported majority today ethernet nics newer techniques like large receive offload tcp acknowledgment offload already implemented high-end ethernet hardware effective even implemented purely software generally accepted rule thumb 1 hertz cpu processing required send receive 1 bit/s tcp/ip example 5 gbit/s 625 mb/s network traffic requires 5 ghz cpu processing implies 2 entire cores 2.5 ghz multi-core processor required handle tcp/ip processing associated 5 gbit/s tcp/ip traffic since ethernet 10ge example bidirectional possible send receive 10 gbit/s aggregate throughput 20 gbit/s using 1 hz/ bit/s rule equates eight 2.5 ghz cores many cpu cycles used tcp/ip processing freed-up tcp/ip offload may used cpu usually server cpu perform tasks file system processing file server indexing backup media server words server tcp/ip offload server work server without tcp/ip offload nics addition protocol overhead toe address also address architectural issues affect large percentage host based server pc endpoints many older end point hosts pci bus based provides standard interface addition certain peripherals network interfaces servers pcs pci inefficient transferring small bursts data main memory across pci bus network interface ics efficiency improves data burst size increases within tcp protocol large number small packets created e.g acknowledgements typically generated host cpu transmitted across pci bus network physical interface impacts host computer io throughput toe solution located network interface located side pci bus cpu host address i/o efficiency issue data sent across tcp connection sent toe cpu across pci bus using large data burst sizes none smaller tcp packets traverse pci bus one first patents technology udp offload issued auspex systems early 1990 auspex founder larry boucher number auspex engineers went found alacritech 1997 idea extending concept network stack offload tcp implementing custom silicon introduced first parallel-stack full offload network card early 1999 company ’ slic session layer interface card predecessor current toe offerings alacritech holds number patents area tcp/ip offload 2002 emergence tcp-based storage iscsi spurred interest said least dozen newcomers founded toward end dot-com bubble chasing opportunity merchant semiconductor accelerators storage protocols applications vying half dozen entrenched vendors in-house asic designs 2005 microsoft licensed alacritech patent base along alacritech created partial tcp offload architecture become known tcp chimney offload tcp chimney offload centers alacritech communication block passing patent time broadcom also obtained license build tcp chimney offload chips parallel-stack full offload gets name concept two parallel tcp/ip stacks first main host stack included host os second parallel stack connected application layer transport layer tcp using vampire tap vampire tap intercepts tcp connection requests applications responsible tcp connection management well tcp data transfer many criticisms following section relate type tcp offload hba host bus adapter full offload found iscsi host adapters present disk controllers host system connecting via tcp/ip iscsi storage device type tcp offload offloads tcp/ip processing also offloads iscsi initiator function hba appears host disk controller used iscsi devices appropriate general tcp/ip offload tcp chimney offload addresses major security criticism parallel-stack full offload partial offload main system stack controls connections host connection established local host usually server foreign host usually client connection state passed tcp offload engine heavy lifting data transmit receive handled offload device almost tcp offload engines use type tcp/ip hardware implementation perform data transfer without host cpu intervention connection closed connection state returned offload engine main system stack maintaining control tcp connections allows main system stack implement control connection security unlike kernels linux kernel include support toe hardware patches hardware manufacturers chelsio qlogic add support linux kernel developers opposed technology several reasons including much current work toe technology manufacturers 10 gigabit ethernet interface cards broadcom chelsio communications emulex mellanox technologies qlogic
[ 5472, 1121, 2723, 7863, 10924, 112, 10675, 343, 5531, 11487 ]
None
10,854
7
PaizaCloud_Cloud_IDE:paizacloud cloud ide paizacloud cloud ide cloud ide online integrated development environment supports programming languages including c c++ php ruby perl python javascript node.js go enables developers get started coding immediately browser-based development environment written almost entirely javascript uses node.js back-end editor component uses ace dec 2017 uses docker containers workspaces gino inc. company actively maintains paizacloud cloud ide company offices tokyo
[ 8068, 3462, 8582, 1435, 9245, 6176, 5031, 4777, 5677, 10413, 5048, 6074, 8644, 8262, 2910, 479, 8554, 2936, 3705, 2045 ]
Validation
10,855
3
Tetris:tetris tetris portmanteau tetromino tennis tile-matching puzzle video game originally designed programmed soviet russian game designer alexey leonidovich pajitnov first playable version completed june 6 1984 working dorodnitsyn computing centre academy science soviet union moscow derived name greek numerical prefix tetra- game pieces contain four segments tennis pajitnov favorite sport name also used in-game refer play four lines cleared tetris first entertainment software exported soviet union united states published spectrum holobyte commodore 64 ibm pc game popular use tetrominoes four-element case polyominoes used popular puzzles since least 1907 name figures given mathematician solomon w. golomb 1953 game one many variants available nearly every video game console computer operating system well devices graphing calculators mobile phones portable media players pdas network music players easter egg non-media products like oscilloscopes inspired tetris serving dishes even played sides various buildings versions tetris sold range 1980s home computer platforms well arcades successful handheld version game boy launched 1989 established game one popular video games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 came second place ign 100 greatest video games time 2019 moved 7th january 2010 announced games franchise sold 170 million copies—approximately 70 million physical copies 100 million copies cell phones—making second best selling paid-downloaded game time behind minecraft tetriminos game pieces shaped like tetrominoes geometric shapes composed four square blocks random sequence tetriminos fall playing field rectangular vertical shaft called well matrix objective game manipulate tetriminos moving one sideways and/or rotating quarter-turns form solid horizontal line without gaps line formed disappears blocks fall fill space certain number lines cleared game enters new level game progresses level causes tetriminos fall faster game ends stack tetriminos reaches top playing field new tetriminos able enter games also end finite number levels lines tetriminos fill clear singles doubles j l able clear triples tetrimino capacity clear four lines simultaneously referred tetris may vary depending rotation compensation rules specific tetris implementation instance super rotation system used recent implementations certain situations allow z 'snap tight spots clear triples pajitnov original version electronika 60 computer used green brackets represent blocks versions tetris original game boy/game boy color dedicated handheld games use monochrome grayscale graphics popular versions use separate color distinct shape prior tetris company standardization early 2000s colors varied widely implementation implementation scoring formula majority tetris products built idea difficult line clears awarded points example single line clear tetris zone worth 100 points clearing four lines known tetris worth 800 subsequent back-to-back tetris worth 1,200 conjunction players awarded combos exist certain games reward multiple line clears quick succession exact conditions triggering combos amount importance assigned vary game game nearly tetris games allow player press button increase speed current piece descent cause piece drop lock place immediately known soft drop hard drop respectively performing soft drop player also stop piece increased speed releasing button piece settles place games allow either soft drop hard drop others separate buttons many games award number points based height piece fell locking using hard drop generally awards points although first tetris game feature new kind tetris easy spin see next tetris also called infinite spin critics tetris worlds first game fall major criticisms easy spin refers property tetrimino stop falling moment left right movement rotation effectively allowing someone suspend tetrimino thinking place feature implemented tetris company official guideline type play differs traditional tetris takes away pressure higher level speed reviewers went far say mechanism broke game goal tetris worlds however complete certain number lines fast possible ability hold piece placement make achieving goal faster later gamespot received easy spin openly saying infinite spin issue honestly really affects single-player gameplay modes tetris ds competitive mode requires lay pieces quickly humanly possible response issue henk rogers stated interview infinite spin intentional part game design allowing novice players expend available scoring time decide best placement piece rogers observed gratuitous spinning occur competitive play expert players require much time think piece placed limitation placed infinite lock delay later games franchise certain amount inputs i.e rotations movements piece instantly lock defaulted 15 inputs tetris created june 1984 alexey pajitnov artificial intelligence researcher working soviet academy sciences computer center moscow tasked testing capabilities new hardware pajitnov would writing simple games initially considered creating game around pentominoes featured puzzle games enjoyed child felt might complicated twelve different shape variations concept switched tetrominoes seven variants electronika 60 working text-based display tetrominoes formed letter characters realizing completed lines resulted screen filling quickly pajitnov decided delete creating key part tetris gameplay pajitnov game proved popular colleagues academy sciences co-workers dmitry pavlovsky vadim gerasimov ported game ibm pc gerasimov reports pajitnov chose name tetris combination 'tetromino 'tennis pc game became popular began spreading around moscow gerasimov removed 1988 version game website october 2003 response demand counsel tetris company resumed making available august 2006 pc version made way budapest hungary ported various platforms discovered british software house andromeda attempted contact pajitnov secure rights pc version deal firmly settled already sold rights spectrum holobyte failing settle deal pajitnov andromeda attempted license hungarian programmers instead meanwhile legal rights settled spectrum holobyte ibm pc version tetris contained background graphics featuring russian scenes released united states 1987 game popularity tremendous computer gaming world called game deceptively simple insidiously addictive details licensing issues uncertain point 1987 andromeda managed obtain copyright licensing ibm pc home computer system commodore 64 release 1988 26-minute soundtrack composed game musician wally beben amiga atari st two different versions mirrorsoft 1987 spectrum holobyte 1988 became available mirrorsoft version feature background graphics spectrum holobyte version similar pc version contained similar images also distributed infogrames regions games sold budget titles due game simplicity spectrum apple ii package contained three diskettes three different versions game apple ii+ apple iie separate dos 3.3 prodos diskettes apple iigs diskette none copy-protected included documentation specifically charged purchaser honor give away copy extra diskettes unsure publish game fearful response soviet regime pajitnov took opportunity offered perestroika gave rights soviet government ten years 1988 soviet government began market rights tetris following promotional trip country gerald hicks one-time united states champion game organization called elektronorgtechnica elorg short time elorg still paid andromeda andromeda licensing sub-licensing rights game different version tetris originally released late 1988 bullet-proof software bps several japanese home computers well msx family computer japan predating nintendo version unlicensed arcade version released south korea well unlicensed master system titled super tetris 슈퍼 테트리스 syupeo teteuriseu 1989 half dozen different companies claimed rights create distribute tetris software home computers game consoles handheld systems elorg meanwhile held none companies legally entitled produce arcade version signed rights atari games signed non-japanese console handheld rights nintendo tetris show january 1988 consumer electronics show las vegas picked dutch games publisher henk rogers based japan eventually led agreement brokered nintendo saw tetris bundled every game boy rogers later stated tetris made game boy game boy made tetris tengen console software division atari games regardless applied copyright tetris game nintendo entertainment system loosely based arcade version proceeded market distribute name tetяis soviet mind game faux cyrillic typography incorporating cyrillic letter ya disregarding nintendo license elorg nintendo contacted atari games claiming stolen rights tetris whereupon atari games sued believing rights four weeks shelf courts ruled nintendo company rights tetris home game systems tengen tetяis recalled unknown number copies sold lawsuits tengen nintendo nes version carried 1993 tengen version tetяis considered rare nintendo released version tetris nintendo entertainment system nes developed gunpei yokoi nes version sold 8 million copies worldwide nintendo nes version lacked side-by-side 2-player option featured tengen version nintendo power reviewed version november december 1989 edition classic tetris world championship commenced 2010 uses nintendo version tetris nintendo released game super nintendo entertainment system snes along dr mario new version used different colors older versions makes squares look connected version similar version released nes february 13 2019 nintendo announced released new version classic game called tetris 99 tetris 99 features battle royale-style game mode 99 players play match addition complying tetris guideline version game features unique mechanic known badges badges lessen severity attacks received amplifies attacks sent players gain badges knocking others tetris 99 available nintendo switch 1988 arcade version released sega japan sega system 16 system e arcade boards japanese gamest award game year following year version sega mega drive originally planned release japan pulled following licensing issues resulting less ten copies printed new port arcade version m2 unrelated rare mega drive version included sega genesis mini microconsole scheduled release september 2019 sega arcade version commercially successful japanese arcades famicom tsūshin arcade earnings chart number-three august 1989 september 1989 rose number two october 1989 overtaking namco racing video game winning run 2014 conjunction 30th anniversary series sega released puyo puyo tetris multi-platform game blends gameplay elements tetris puyo puyo franchises 1996 rights game reverted russian state pajitnov previously made little money game year tetris company founded claiming hold copyright registrations tetris products u.s. taking trademark registrations tetris almost every country world licensed brand number companies u.s. court international trade u.s. customs times issued seizure orders preclude unlicensed tetris -like games imported u.s. though bulletins circulated u.s copyright office state copyright apply rules game late 1997 mid-2006 ttc legal counsel sent cease desist letters web sites basis tetris -type games infringing tetris trademark trade dress and/or look feel copyright around 2009 ttc tetris holding llc brought legal action biosocia inc. grounds biosocia blockles game infringed proprietary rights held ttc tetris holding llc september 10 2009 legal case biosocia resolved biosocia agreeing discontinue making blockles game available public may 2010 ttc legal counsel sent cease desist letters google insisting 35 tetris clones removed android market us district court judge ruled june 2012 tetris clone mino xio interactive infringed tetris company copyrights replicating elements playfield dimensions shapes blocks addition ruled tetris holding llc trade dress infringed mino replicated form brightly colored style tetris tetriminos higher-than-wide rectangular tetris playfield based success tetris 99 tetris company n3twork developing tetris royale ios android version tetris include battle royale mode 100 players along solo multiplayer modes expected release 2019 tetris subject many changes throughout releases since 1980s newer tetris games emphasized pace rather endurance older releases game boy nes tetris offer records according points since meter points restricted specific number digits games records maxed experienced player next big game boy release tetris tetris dx marathon mode—comparable mode previous releases—allowed additional digit point meter even players still maxed 9,999,999 points hours play new tetris world record competitors spent 12 hours playing game tetris dx new tetris new modes sprint ultra added modes require player act timer either gain lines points time releases like tetris worlds removed point records particular game kept records fast certain number lines could cleared depending level critics tetris worlds said flawed virtue ability piece hover bottom long player needs many different modes play added recent years modes appearing one major release include classic marathon game sprint otherwise game b 40 lines ultra square cascade field dimension tetris perhaps least deviated among releases almost always 10 cells wide 20 high releases handheld platforms small screens smaller fields example tetris jr. keychain game 8 12 tetris game boy 10 18 traditionally blocks spawn within four central columns two highest rows tetrimino occupies columns 4 5 6 7 tetrimino occupies columns 5 6 remaining 5 tetriminos occupy columns 4 5 6 especially older versions 5 6 7 recent games pieces spawn visible playfield traditional games level-up would occur every ten lines cleared newer games tetris worlds number lines required varies upon new level level-up points awarded increased blocks fall slightly faster example nes tetris operates 60 frames per second level 0 piece falls one step every 48 frames level 19 piece falls one step every 2 frames level increments either terminate certain point game boy tetris tops level 20 increase forever yet speed certain point nes tetris level speed level 29 due limitations game engine pieces capable dropping faster tool-assisted emulation show level indicator increases indefinitely—eventually leading glitch meter displays non-numeric characters modern games tetris grand master tetris worlds highest levels opt drop piece one row per frame pieces appear reach bottom soon spawn result games delay lets player slide piece bottom moment help deal otherwise unplayable fall speed games hover time regenerated piece moved rotated soft drops first implemented nintendo releases tetris pieces would able drop faster locking slide gaps option hard dropping originated early pc games microsoft tetris game developed dave edson bundled microsoft entertainment pack hard dropping piece falls locks one frame newer tetris games feature options games locking roles reversed soft dropping making pieces drop faster locking hard dropping making pieces drop instantly lock single direction rotation older restriction since ruled nearly every new official release favor separate buttons clockwise one counter clockwise rotation traditional games unsymmetrical vertical orientation i- z- s-pieces fill columns clockwise counter clockwise rotation games vary allowing two possible column orientations one counter clockwise one clockwise rotations double rotation—only seen progressive clones quadra dtet —rotates piece 180° one features appreciated skilled players wall kick ability rotate pieces even touch left right walls nes version example z piece vertically aligned falling touching left wall player rotate piece giving impression rotate buttons locked situation player move piece one position right rotating losing precious time proper implementations wall kick first appeared arcade version tetris atari games piece preview allows look next piece enter field feature implemented since earliest games though early games preview turned made score increase slowly several tetris variants exist feature alternate rules pieces feature alternate topologies dimensions others completely different gameplay popular variant called grand master eventually becomes fast players use every second time optimally even mode dubbed invisible tetris blocks shown falling – revealed game popularity relatively simple code required produce game game nearly rules tetris often used hello world project programmers coding new system programming language resulted availability large number ports different platforms instance µtorrent gnu emacs contain similar shape-stacking games easter eggs players lose typical game tetris longer keep increasing speed player find appropriate solution tetriminos 've given tetriminos stack top playing field commonly referred topping question would possible play forever first considered thesis john brzustowski 1992 conclusion reached game statistically doomed end reason z tetriminos player receives sufficiently large sequence alternating z tetriminos naïve gravity used standard game eventually forces player leave holes board holes necessarily stack top ultimately end game pieces distributed randomly sequence eventually occur thus game example ideal uniform uncorrelated random number generator played long enough player top practice occur tetris variants variants allow player choose play z tetriminos good player may survive well 150 consecutive tetriminos way implementation ideal uniform randomizer probability given time next 150 tetriminos z approximately implementations use pseudorandom number generator generate sequence tetriminos s–z sequence almost certainly contained sequence produced 32-bit linear congruential generator many implementations roughly states evil algorithm bastet unofficial variant often starts game series seven z pieces modern versions tetris released 2001 use bag-style randomizer guarantees players never receive four z pieces row one indispensable rules enforced tetris guideline officially licensed tetris games must follow recent versions tetris tetris worlds allow player repeatedly rotate block hits bottom playfield without locking place see easy spin dispute permits player play infinite amount time though necessarily land infinite number blocks computer science common analyze computational complexity problems including real life problems games proven offline version tetris player knows complete sequence pieces dropped i.e hidden information following objectives np-complete also difficult even approximately solve first second fourth problem np-hard given initial gameboard sequence p pieces approximate first two problems within factor constant np-hard approximate last problem within factor constant prove np-completeness shown polynomial reduction 3-partition problem also np-complete tetris problem atari arcade version tetris nes port subsidiary tengen original pieces composed brad fuller well traditional russian tunes also arranged fuller according research dr. richard haier et al prolonged tetris activity also lead efficient brain activity play first playing tetris brain function activity increases along greater cerebral energy consumption measured glucose metabolic rate tetris players become proficient brains show reduced consumption glucose indicating efficient brain activity task moderate play tetris half-an-hour day three months boosts general cognitive functions critical thinking reasoning language processing increases cerebral cortex thickness january 2009 oxford university research group headed dr. emily holmes reported plos one healthy volunteers playing tetris soon viewing traumatic material laboratory reduced number flashbacks scenes following week believe computer game may disrupt memories retained sights sounds witnessed time later re-experienced involuntary distressing flashbacks moment group hopes develop approach potential intervention reduce flashbacks experienced post-traumatic stress disorder emphasized preliminary results professor jackie andrade jon may plymouth university cognition institute ph.d. student jessica skorka-brown conducted research shows playing tetris could give quick manageable fix people struggling stick diets quit smoking drinking another notable effect according canadian study april 2013 playing tetris found treat older adolescents amblyopia lazy eye better patching victim well eye train weaker eye dr. robert hess research team said much better patching – much enjoyable faster seems work better. tested united kingdom experiment also appears help children problem game noted cause brain involuntarily picture tetris combinations even player playing tetris effect although occur computer game situation showcasing repeated images scenarios jigsaw puzzle debates tetris cognitive benefits continue least researchers view milestone gamification education 2013 tetris company signed contract hasbro make bop jenga themed version tetris games shown new york toy fair bop tetris sold amazon.com june 2013 jenga tetris like jenga using tetris shapes bop tetris audio game several game modes including marathon pass marathon mode player four lives complete puzzles square lights game unit three actions slam slams top part device slide screen rotate left right spin device spin player fails complete puzzle voice buddy rubino make santa claus type laugh encourage player comment squares man 're squares shapes hard buddy say life lost one four squares top screen disappear every stage completed buddy tell player comment level 45-second bonus round player score two bonus points pass mode marathon mode except buddy rubino say pass let people join compute called ibm version tetris one addictive computer games side berlin wall ... game start work appointment keep consider warned orson scott card joked game proves russia still wants bury us shudder think blow economy computer productivity drops 0 noting tetris copy-protected wrote obviously game meant find way onto every american machine ibm version game reviewed 1988 dragon 135 hartley patricia kirk lesser role computers column reviewers gave game 4.5 5 stars lessers later reviewed spectrum holobyte macintosh version tetris 1989 dragon 141 giving version 5 5 stars 1993 zx spectrum version game voted number 49 sinclair official top 100 games time 1996 tetris pro ranked 38th best game time amiga power entertainment weekly picked game 8 greatest game available 1991 saying thanks nintendo ’ endless promotion tetris become one popular video games computer gaming world gave tetris 1989 compute choice award arcade game describing far addictive game ever game three software publishers association excellence software awards 1989 including best entertainment program critic choice award consumers computer gaming world 1996 ranked 14th magazine list innovative computer games year next generation listed number 2 top 100 games time commenting something perfect zen falling blocks tetris game captured interest everyone ever played march 12 2007 new york times reported tetris named list ten important video games time so-called game canon announced 2007 game developers conference library congress took video game preservation proposal began 10 games including tetris 2007 video game website gamefaqs hosted sixth annual character battle users nominate favorite video game characters popularity contest characters participate l-shaped tetris piece l-block called entered contest joke character november 4 2007 contest june 6 2009 google honored tetris 25-year anniversary changing logotype version drawn tetris blocks – l letter long tetris block lowering place seen 2009 game informer put tetris 3rd list top 200 games time saying game could considered ageless tetris game informer staff also placed third 2001 list 100 best games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 tetris came second place ign 100 greatest video games time january 2010 announced tetris franchise sold 170 million copies approximately 70 million physical copies 100 million copies cell phones making best-selling paid-downloaded game time 1991 pc format named tetris one 50 best computer games ever editors called incredibly addictive one best games time guinness world records recognized game ported history video gaming appearing excess 65 different platforms 2011 tetris subject academic research vladimir pokhilko first clinical psychologist conduct experiments using tetris subsequently used research several fields including theory computation algorithmic theory cognitive psychology game tetris blocks appear adsorb onto lower surface window led scientists use tetrominoes proxy molecules complex shape model adsorption flat surface study thermodynamics nanoparticles threshold entertainment teamed tetris company develop film adaptation tetris threshold ceo describes film epic sci-fi adventure film says story big 'll part trilogy 2016 sources reported press release claiming film would shot china 2017 80 million budget however 2017 later sources confirm film ever actually went production tetris appeared 2010 short animated film pixels 2015 movie pixels inspired former
[ 9735, 2469, 9006, 7983, 9262, 10931, 4152, 9917, 8767, 8774, 9166, 4305, 11477, 986, 3675, 7772, 6109, 11228, 481, 3300, 6378, 5995, 7916, 1773 ]
Test
10,856
2
Kdump_(Linux):kdump linux kdump feature linux kernel creates crash dumps event kernel crash triggered kdump exports memory image also known vmcore analyzed purposes debugging determining cause crash dumped image main memory exported executable linkable format elf object accessed either directly handling kernel crash automatically saved locally accessible file system raw device remote system accessible network event kernel crash kdump preserves system consistency booting another linux kernel known dump-capture kernel using export save memory dump result system boots clean reliable environment instead relying already crashed kernel may cause various issues causing file system corruption writing memory dump file implement dual kernel layout kdump uses kexec booting dump-capture kernel immediately kernel crash using kexec ability boot currently running kernel avoiding execution bootloader hardware initialization performed system firmware bios uefi dump-capture kernel either separate linux kernel image built specifically purpose primary kernel image reused architectures support relocatable kernels contents main memory ram preserved booting running dump-capture kernel reserving small amount ram advance dump-capture kernel preloaded none ram used primary kernel overwritten kernel crash handled reserved amount ram used solely dump-capture kernel otherwise unused normal system operation architectures including x86 ppc64 require small fixed-position portion ram boot kernel regardless loaded case kexec creates copy portion ram also accessible dump-capture kernel size optional position reserved portion ram specified kernel boot parameter command-line utility used primary kernel boots preload dump-capture kernel image associated initrd image reserved portion ram addition functionality part linux kernel additional userspace utilities support kdump mechanism including utility mentioned besides official utilities provided patch kexec suite userspace utilities linux distributions provide additional utilities simplify configuration kdump operation including setup automated saving memory dump files created memory dump files analyzed using gnu debugger using red hat dedicated utility kdump functionality together kexec merged linux kernel mainline kernel version 2.6.13 released august 29 2005
[ 4616, 3082, 5139, 6675, 7187, 10776, 25, 10780, 4637, 10785, 9762, 6180, 5158, 7217, 8242, 9266, 9784, 10809, 576, 4161, 8772, 6213, 8268, 589, 593, 10333, 97, 6244, 5222, 8298, 4207, 7285, 9335, 2168, 1147, 5244, 3197, 4734, 1150, 11391,...
None
10,857
2
Apple_Disk_Image:apple disk image apple disk image disk image format commonly used macos operating system opened apple disk image mounted volume within macintosh finder apple disk image structured according one several proprietary disk image formats including universal disk image format udif new disk image format ndif apple disk image file name usually .dmg extension apple disk image files published mime type application/x-apple-diskimage different file systems contained inside disk images also support creating hybrid optical media images contain multiple file systems file systems supported include hierarchical file system hfs hfs plus file allocation table fat iso9660 universal disk format udf apple disk images created using utilities bundled mac os x specifically disk copy mac os x v10.2 earlier disk utility mac os x v10.3 later utilities also use apple disk image files images burning cds dvds disk image files may also managed via command line interface using hdiutil utility mac os x v10.2.3 apple introduced compressed disk images internet-enabled disk images use apple utility disk copy later integrated disk utility 10.3 disk copy application ability display multi-lingual software license agreement mounting disk image image mounted unless user indicates agreement license apple disk image allows secure password protection well file compression hence serves security file distribution functions disk image commonly used distribute software internet apple originally created disk image formats resource fork used mac applications could easily transferred mixed networks make internet even use resource forks declined mac os x disk images remained standard software distribution format disk images allow distributor control finder presentation window commonly used instruct user copy application correct folder previous version format intended floppy disk images usually referred disk copy 4.2 format version disk copy utility used handle images similar format supported compression floppy disk images called dart new disk image format ndif previous default disk image format mac os 9 disk images format generally .img confused raw .img disk image files .smi file extension files .smi extension actually applications mount embedded disk image thus self mounting image intended mac os 9 earlier universal disk image format udif native disk image format mac os x disk images format typically .dmg extension apple released documentation format attempts reverse engineer parts format successful encrypted layer reverse engineered implementation called vilefault spoonerism filevault apple disk image files essentially raw disk images i.e contain block data added metadata optionally one two layers applied provide compression encryption hdiutil layers called cudifencoding cencryptedencoding udif supports adc old proprietary compression format apple zlib bzip2 mac os x v10.4 lzfse mac os x v10.11 compression internally trailer described using following c structure values big-endian powerpc byte ordering explanation options available extract files mount proprietary apple disk image format cross-platform conversion utilities windows dmg images opened using several programs ultraiso isobuster macdrive also mount simple dmg files drives windows sparse disk encrypted dmgs free apple dmg disk image viewer also exists linux possibly unix flavors .dmg files burned cd/dvd using cd-burner program using cdrecord directly front-end k3b brasero directly mounted mountpoint e.g darling-dmg fuse module enabling easy dmg file mounting linux
[ 11137, 9988, 8582, 4615, 9874, 1940, 3222, 9762, 5413, 3114, 811, 5677, 6062, 2095, 11568, 3889, 8114, 4406, 823, 10817, 2755, 11076, 3659, 7244, 10317, 4174, 3921, 722, 4561, 7379, 2389, 7254, 3804, 3167, 9953, 5096, 10857, 8940, 237, 48...
Test
10,858
4
AT&T_Cybersecurity:amp cybersecurity cybersecurity developer commercial open source solutions manage cyber attacks including open threat exchange world largest crowd-sourced computer-security platform july 2017 platform 65,000 participants contributed 14 million threat indicators daily company raised 116 million since founded 2007 july 10 2018 acquired communications becoming wholly owned subsidiary transaction completed august 22 2018 february 2019 alienvault renamed cybersecurity ossim project began 2003 started dominique karg julio casal ignacio cabrera alberto román became basis alienvault founded 2007 madrid spain company hired management team hewlett packard fortify group 2012 including alienvault ceo barmak meftah cto roger thornton five others 2015 company partnered intel coordinate real-time threat information similar deal hewlett packard announced year 2015 alienvault researchers released study disclosing chinese hackers circumventing popular privacy tools june 2015 alienvault chief scientist jaime blasco released report saying chinese hackers found way circumvent virtual private networks vpns tor anonymity software hides computer ’ location routing requests series internet service providers alienvault open threat exchange 26,000 participants 140 countries reporting one million potential threats daily june 2015 february 2017 alienvault released usm anywhere saas security monitoring platform designed centralize threat detection incident response compliance management cloud hybrid cloud on-premises environments cloud-based console july 2017 alienvault open threat exchange platform 65,000 participants contributed 14 million threat indicators daily july 10 2018 announced acquire alienvault undisclosed amount acquisition completed august 22 2018 company became subsidiary communications unit february 26 2019 alienvault renamed cybersecurity addition free products cybersecurity offers paid security platform called unified security management integrates threat detection incident response compliance management one solution threat applications offered via hardware virtual machines cloud service open threat exchange otx free enables security experts research collaborate new threats better compare data integrate threat information security systems big data platform otx leverages natural language processing machine learning cybersecurity also runs open source security information management ossim project helps network administrators computer security intrusion detection response august 2015 firm raised 52 million expand security business round led institutional venture partners included ggv capital kleiner perkins trident capital jackson square ventures company said 2015 adding 300 400 new clients quarter hired chief financial officer help prepare possible initial public offering ipo end fiscal year 2016 alienvault recorded 53 percent year-over-year sales growth increased install base 65 percent approximately 5,000 commercial customers alienvault raised 116 million since founded 2007 2017 alienvault best cloud computing security solution emea presented sc magazine uk year forbes featured alienvault forbes cloud 100 list deloitte featured alienvault deloitte technology fast 500 list 2015 2016 2015 alienvault advanced persistent threat apt solution year presented computing security awards 2014 alienvault nominated “ best smb security product ” jaime blasco director alienvault labs nominated “ technology hero year ” v3 technology industry publication alienvault competes siem network security industry hp arcsight ibm qradar logrhythm among others
[ 4194, 8580, 3497, 939, 5749, 1111, 9048, 2558, 5495 ]
Test
10,859
4
Presidential_Policy_Directive_20:presidential policy directive 20 presidential policy directive 20 ppd-20 provides framework u.s. cybersecurity establishing principles processes signed president barack obama october 2012 directive supersedes national security presidential directive nspd-38 integrating cyber tools national security directive complements nspd-54/homeland security presidential directive hspd-23 classified unreleased national security agency nsa nspd-54 authorized george w. bush gives u.s. government power conduct surveillance monitoring existence made public june 2013 former intelligence nsa infrastructure analyst edward snowden private industry issues surrounding international domestic law public-private-partnership became cornerstone america cybersecurity strategy suggestions private sector detailed declassified 2003 national strategy secure cyberspace companion document national security presidential directive nspd-38 signed secret george w. bush following year although contents nspd 38 still undisclosed u.s. military recognize cyberspace theater operations u.s. national defense strategy 2005 report declared ability operate global commons-space international waters airspace cyberspace important ... project power anywhere world secure bases operation three years later george w. bush formed classified comprehensive national cybersecurity initiative cnci citing economic national security obama administration prioritized cybersecurity upon taking office in-depth review communications information infrastructure cnci partially declassified expanded president obama outlines key elements broader updated national u.s. cybersecurity strategy 2011 pentagon announced capability run cyber attacks u.s. senate failed pass cybersecurity act 2012 august presidential policy directive 20 ppd-20 signed secret electronic privacy information center epic filed freedom information request see nsa would comply details reported november 2012 washington post wrote ppd-20 extensive white house effort date wrestle constitutes 'offensive 'defensive action rapidly evolving world cyberwar cyberterrorism following january obama administration released ten-point factsheet june 7 2013 ppd-20 became public released edward snowden posted guardian part 2013 mass surveillance disclosures u.s. factsheet claims ppd-20 acts within law consistent values promote domestically internationally previously articulated international strategy cyberspace n't reveal cyber operations directive snowden disclosure called attention passages noting cyberwarfare policy possible consequences directive calls defensive offensive measures defensive cyber effects operations dceo offensive cyber effects operations oceo respectively
[ 3495, 11561, 7887, 9426, 7893 ]
Test
10,860
2
GNewSense:gnewsense gnewsense linux distribution based debian developed sponsorship free software foundation goal user-friendliness proprietary e.g binary blobs non-free software removed free software foundation considers gnewsense composed entirely free software gnewsense takes relatively strict stance proprietary software example documentation gives instructions installing proprietary software excluded project launched brian brazil paul o'malley 2006. gnewsense originally based ubuntu since 1.0 release free software foundation assists gnewsense releases two years 8 august 2011 distrowatch classified gnewsense dormant september 2012 distrowatch changed status active 6 august 2013 first version directly based debian gnewsense 3 parkes released discussions trisquel forums gnewsense said inactive gnewsense activities 2017 default gnewsense uses gnome graphical user interface customized user choice x display manager window managers desktop environments available install hosted repositories ubiquity installer allows installing hard disk within live cd environment without need restarting computer prior installation besides standard system tools small applications gnewsense comes installed following software libreoffice productivity suite gnome web internet browser empathy instant messenger gimp editing photos raster graphics common software development tools including gcc installed default live cd used run operating system install onto disk cd images available download gnewsense made four major releases 2016 gnewsense announced next version gnewsense would 5.0 non-free software repositories provided gnewsense project non-free documentation artwork removed based ubuntu universe package repository enabled default order avoid trademark problems stem modification mozilla firefox gnewsense 1.1 rebranded burningdog burningdog likewise offer install non-free plugins various web media adobe flash gnewsense 2.0 abandoned burningdog adopted epiphany web browser later renamed simply web component gnome default browser application came recommendations instructions optionally compile run gnu icecat gnewsense 3.0 retains web default browser also comes modified version debian iceweasel offer access proprietary add-ons debian another linux distribution known strict licensing requirements adherence free software principles debian gnewsense rigorously exclude non-free software binary blobs official releases debian maintains hosts unofficial repositories non-free software firmware binaries debian free software sometimes depends upon suggests optional installation proprietary software theory users informed discretion use software paramount expressed clause 5 debian social contract though debian democratic project management seen stance become source recurrent controversy gnewsense contrast provide packages depend suggest use non-free software firmware extensions plugins gnewsense project provide convenience-access proprietary software reason seeing abrogation commitment development free software solutions similar debian gnewsense policies allow including documentation licensed gnu free documentation license invariant sections includes many manuals documentation released gnu project gnewsense initially forked ubuntu originally fork debian result founding developer paul o'malley prior work ubuntu gnewsense 3.0 distribution tracked debian base software distribution part debian project carefully disaggregate free software official distribution proprietary software provides courtesy access indeed many packages including debian-particular packages iceweasel icedove ported gnewsense simply modified way longer provide courtesy access non-free software options since gnewsense repositories contain free software support hardware requires firmware free firmware exists wireless network cards available may 1 2008 3d graphics application support also removed licensing issues mesa 3d january 13 2009 issues resolved 3d support became standard starting 2.2 release reviewing gnewsense 3.0 august 2013 jesse smith distrowatch noted many applications provided including openoffice.org 3 debian de-blobbed 2.6.32 linux kernel based linux-libre tools iceweasel 3.5 gnome 2.30 quite date smith concluded review following words generally speaking happy gnewsense 3.0 based debian distribution counted provide stability amazing performance distribution lean fast uncluttered flip side gnewsense system installer default package management tools geared toward experienced users probably provide steep learning curve novice linux users much automated minimum hand holding main feature gnewsense lack proprietary software also double-edged blade one hand means entire operating system audited modified redistributed great perspective software freedom fact distribution play multimedia formats handled flash content fairly well testament power free open source software one problem ran gnewsense software policy regards wireless network card distributions ship non-free intel firmware gnewsense n't include means distribution n't good fit laptop hand great match desktop system richard stallman founder president free software foundation said used gnewsense january 2010 still using april 2014 since stallman switched trisquel serdar yegulalp reviewed gnewsense infoworld said post network world gnewsense 3.1 february 2014 bryan lunduke reviewed linux distribution following words
[ 4611, 3079, 9736, 3089, 4113, 8209, 10257, 8727, 9757, 543, 11297, 3618, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 3649, 4673, 9281, 3654, 5190, 3147, 2125, 1107, 1110, 6231, 89, 5721, 4192, 3685, 5742, 2671, 4728, 9851, 11388, ...
Test
10,861
5
Cone_(software):cone software cone text-based e-mail client news client unix-like operating systems developed courier mail server developers name stands console newsreader emailer notable features include support unicode support smap
[ 1664, 9986, 3465, 9747, 5397, 11418, 9642, 1075, 2101, 9909, 3015, 10956, 6231, 7255, 9451, 9459, 3578, 8443, 7036 ]
None
10,862
3
Acorn_Archimedes:acorn archimedes acorn archimedes family personal computers designed acorn computers ltd cambridge england sold late-1980s mid-1990s acorn first general-purpose home computer based arm architecture first archimedes launched 1987 arm risc design 32-bit cpu using 26-bit addressing running 8 mhz stated achieving 4.5+ mips provided significant upgrade 8-bit home computers acorn previous machines claims fastest micro world running 18 mips also made tests models family omitted either acorn archimedes part name first models named bbc archimedes yet name acorn archimedes commonly used describe acorn contemporary designs based architecture archimedes machines longer sold computers raspberry pi still run operating system risc os least later versions use arm chips mostly compatible acorn archimedes first risc-based home computer first models released june 1987 300 400 series 400 series included four expansion slots although two slot backplane could added 300 series official upgrade third parties produced 4-slot backplanes st-506 controller internal hard drive models included arthur operating system later replaced risc os paid-for upgrade bbc basic programming language emulator acorn earlier bbc micro mounted two-part cases small central unit monitor top separate keyboard three-button mouse middle one used pop-up context menus operating system models featured eight-channel 8-bit stereo sound capable displaying 256 colours screen three models initially released different amounts memory a305 a310 a440 soon replaced a410/1 a420/1 a440/1 featured upgraded memc1a a540 supported 16mib ram included higher speed scsi provision connecting genlock devices unveiled september 1990 300 400 followed number machines minor changes upgrades work began successor arthur operating system initially named arthur 2 renamed risc os 2 new computers shipped pre-installed number new machines introduced along risc os 2 may 1989 300 series phased favour new acorn a3000 400 series kept production earlier models shipped arthur could upgraded risc os 2 replacing rom chips containing operating system a3000 used 8 mhz arm2 supplied ram unlike previous models a3000 came single-part case similar bbc micro amiga 500 atari st computers keyboard integrated base unit kind housing consumes lot desktop space problem acorn tried overcome offering monitor stand attached base unit new model sported single internal expansion slot physically different earlier models although electronically similar external connector could interface existing expansion cards although really needed housed external case joined main unit a300 series a400 series r140 a3000 machines vidc1a video chip provided wide variety screen resolutions provided officially operating system chip could made run others palette range 4096 colours 12-bit vidc1a 16 hardware palette registers meant screen modes sixteen colours fewer colours could mapped 4096 available however 256 colour modes 4 bits colour data hardware derived could adjusted net result 256 colours 16 could assigned desired covering range 4096 available colours also horizontal sync interrupt meaning difficult display additional colours changing palette scan line impossible thanks 2 mhz ioc timer 1 many demos managed display 4096 colour screen dithering also one hardware sprite 32 pixels width unlimited height default used mouse pointer pixel coded two bits value 0 transparency three others freely chosen 4096 colour palette 1991 a5000 launched featured new 25 mhz arm3 processor 2 4 mb ram either 40 mb 80 mb hard drive conventional pizza box-style two-part case hxwxd 100 mm × 430 mm × 340 mm enhanced video capabilities allowed a5000 comfortably display vga resolutions 800×600 pixels first archimedes feature high density capable floppy disc drive standard natively supported various formats including dos atari discs risc os adfs floppy format relatively large capacity 800 kb double low density 1600 kb high density later version a5000 featured 33 mhz arm3 4 8 mb ram 80 120 mb hard drive a5000 initially ran new 3.0 version risc os although several bugs identified shipped risc os 3.10 3.11 earlier machines capable upgraded new risc os 3 though needed additional daughterboard installed first earlier models could also benefit video performance a5000 via third party upgrade 1992 new range produced utilising first arm system-on-chip arm250 microprocessor single-chip design including functionality arm3 chip without cache ioc1 input output controller vidc1a video sound controller memc1a memory controller chips integrated one chip increase clock frequency 8 mhz 12 mhz gave performance 7 mips machines supplied risc os 3.10 3.11 a30x0 series one-piece design similar a3000 far smaller a4000 looked like slightly slimmer a5000 a3010 model intended home computing machine featuring tv modulator standard 9-pin joystick ports a3020 targeted home office educational markets featuring built-in 2.5 hard drive dedicated network interface socket technically a4000 almost identical a3020 differing hard disk size 3.5-inch a4000 though sported different appearance three arm250-based machines could upgraded 4 mb plug-in chips though a3010 designed 2 mb third party upgrades overcame one mini-podule slot used internal expansion a3000 also 1992 acorn introduced a4 laptop computer featuring slower 24 mhz compared 25 mhz a5000 version arm3 processor lcd screen capable displaying maximum resolution 15 levels grey however feature monitor port offered display capabilities a5000 notable omission machine built-in pointing device requiring users navigate cursor keys attach conventional acorn three-button mouse a7000 despite name reminiscent archimedes naming conventions actually similar riscpc line risc os computers succeeded archimedes 1994 lacked however debi expansion slots multi-slice case characterized riscpc though removing cdrom backplane one slot could fitted also produced never sold commercially archimedes one powerful home computers available late 1980s early 1990s main cpu faster motorola 68000 microprocessors found popular amiga atari st machines 68000 average performance roughly 16-bit workloads 32-bit workloads peak performance simpler 16-bit instructions yielded 32-bit workloads repeatable benchmark tests computer exhibited 1987 personal computer world show along amiga atari st video game consoles commenting show crash magazine reported despite whiz-bang demos acorn ’ archimedes 8-bit machines dead archimedes significant market share education markets uk ireland australia new zealand success archimedes british schools due partly predecessor bbc micro later computers schools scheme organised tesco supermarket chain association acorn students pupils countries early 1990s exposed archimedes a-series computer archimedes range available us canada via olivetti canada mid late 1990s uk educational market began turn away archimedes apple macintosh computers ibm compatible pcs eclipsed archimedes multimedia capabilities led erosion archimedes market share tesco computers schools scheme later changed partnership acorn rm plc many computer-related suppliers also led decrease archimedes educational market share acorn gradually moved focus away computers instead began exploiting lucrative arm processor technology separate enterprise spin arm holdings founded 1990 1994 2008 model superseding archimedes computer riscpc also used television broadcast automation programmed company named omnibus systems ltd uk original desktop models custom made 19-inch rack models used control/automate multiple television broadcast devices manufactures way unusual time used several large european television stations including bbc nrk tmf nl uk also 1994 2004 archimedes riscpc models used teleprompters television studios hardware easy adapt tv broadcast use cheaper hardware available time
[ 8199, 6152, 3722, 8830, 9363, 8725, 3350, 11033, 5275, 2594, 10029, 7983, 9391, 1849, 3911, 4679, 1611, 9163, 8415, 7269, 7912, 9322, 7019, 9964, 8429, 1776, 2289, 4341, 1527, 11384, 9978, 1790 ]
Test
10,863
2
Hostapd:hostapd hostapd host access point daemon user space daemon software enabling network interface card act access point authentication server three implementations jouni malinen hostapd openbsd hostapd devicescape hostapd jouni malinen hostapd user space daemon access point authentication servers used create wireless hotspot using linux computer implements ieee 802.11 access point management ieee 802.1x/wpa/wpa2/eap authenticators radius client eap server radius authentication server current version supports linux host ap madwifi prism54 drivers use kernel mac80211 subsystem qnx freebsd net80211 dragonflybsd openbsd hostapd user space daemon helps improve roaming monitoring openbsd-based wireless networks implements inter access point protocol iapp exchanging station association information access points trigger set actions like frame injection logging receiving specified ieee 802.11 frames open wireless linux version hostapd kept close possible original open source release owl specific packaging defaults website appears dead april 2013 probably project
[ 7850, 10058, 5612, 7983, 10332, 823, 6904, 9336 ]
Test
10,864
5
Signalling_Connection_Control_Part:signalling connection control part signalling connection control part sccp network layer protocol provides extended routing flow control segmentation connection-orientation error correction facilities signaling system 7 telecommunications networks sccp relies services mtp basic routing error detection base sccp specification defined itu-t recommendations q.711 q.714 additional information implementors provided q.715 q.716 however regional variations defined local standards bodies united states ansi publishes modifications q.713 ansi t1.112 ttc publishes jt-q.711 jt-q.714 europe etsi publishes etsi en 300-009-1 document modifications itu-t specifications although mtp provides routing capabilities based upon point code sccp allows routing using point code subsystem number global title point code used address particular node network whereas subsystem number addresses specific application available node sccp employs process called global title translation determine point codes global titles instruct mtp route messages sccp messages contain parameters describe type addressing used message routed sccp provides 4 classes protocol applications connectionless protocol classes provide capabilities needed transfer one network service data unit nsdu data field xudt ludt udt message one connectionless message sufficient convey user data contained one nsdu segmenting/reassembly function protocol classes 0 1 provided case sccp originating node relay node provides segmentation information multiple segments prior transfer data field xudt network option ludt messages destination node nsdu reassembled connection-oriented protocol classes protocol classes 2 3 provide means set signalling connections order exchange number related nsdus connection-oriented protocol classes also provide segmenting reassembling capability nsdu longer 255 octets split multiple segments originating node prior transfer data field dt messages segment less equal 255 octets destination node nsdu reassembled sccp class 0 protocol class basic sccp protocol classes network service data units passed higher layers sccp originating node delivered sccp higher layers destination node transferred independently therefore may delivered sccp user out-of-sequence thus protocol class corresponds pure connectionless network service connectionless protocol network connection established sender receiver sccp class 1 builds capabilities class 0 addition sequence control parameter nsdu allows sccp user instruct sccp given stream messages delivered sequence therefore protocol class 1 corresponds enhanced connectionless protocol assurances in-sequence delivery sccp class 2 provides facilities class 1 also allows entity establish two-way dialog another entity using sccp class 3 service builds upon class 2 also allows expedited urgent messages sent received errors sequencing segment re-assembly detected sccp restart connection occur sigtran suite protocols two primary methods transporting sccp applications across internet protocol networks sccp transported indirectly using mtp level 3 user adaptation protocol m3ua protocol provides support users mtp-3—including sccp alternatively sccp applications operate directly sccp user adaptation protocol sua form modified sccp designed specifically use ip networking itu-t also provides transport sccp users internet protocol using generic signalling transport service specified q.2150.0 signalling transport converter sctp specified q.2150.3 specialized transport-independent signalling connection control part ti-sccp specified t-rec-q.2220 ti-sccp also used generic signalling transport adapted mtp3 mtp3b described q.2150.1 adapted sscop sscopmce described q.2150.2
[ 5472, 706, 7811, 614, 5704, 2701, 7120, 4918, 7865, 1437, 3006 ]
Test
10,865
4
Structural_vulnerability_(computing):structural vulnerability computing computing structural vulnerability system weakness consists several so-called component vulnerabilities type weakness generally emerges due several system architecture flaws example structural vulnerability person working critical part system security training ’ follow software patch cycles likely disclose critical information phishing attack
[ 1453 ]
Test
10,866
4
Sieve_(mail_filtering_language):sieve mail filtering language sieve programming language used email filtering owes creation cmu cyrus project creators cyrus imap server language tied particular operating system mail architecture requires use rfc 2822-compliant messages otherwise generalize systems meet criteria current version sieve base specification outlined rfc 5228 published january 2008 sieve data-driven programming language similar earlier email filtering languages procmail maildrop earlier line-oriented languages sed awk specifies conditions match actions take matching differs general-purpose programming languages highly limited – base standard variables loops allow conditional branching preventing runaway programs limiting language simple filtering operations although extensions devised extend language include variables limited degree loops language still highly restricted thus suitable running user-devised programs part mail system also significant number restrictions grammar language order reduce complexity parsing language language also supports use multiple methods comparing localized strings fully unicode-aware sieve scripts may generated gui-based rules editor may entered directly using text editor scripts transferred mail server server-dependent way managesieve protocol defined rfc 5804 allows users manage sieve scripts remote server mail servers local users may allow scripts stored e.g .sieve file users home directories language standardized now-obsolete rfc 3028 january 2001 tim showalter ietf sieve working group updated base specification 2008 rfc 5228 brought following extensions proposed standard status number extensions still developed sieve working group example sieve script
[ 515, 8262, 9735, 3465, 5612, 10956, 7983, 9909, 9053 ]
Test
10,867
4
Panama_Papers:panama papers panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source documents contain personal financial information wealthy individuals public officials previously kept private offshore business entities legal see offshore magic circle reporters found mossack fonseca shell corporations used illegal purposes including fraud tax evasion evading international sanctions john doe whistleblower leaked documents german journalist bastian obermayer newspaper süddeutsche zeitung sz remains anonymous even journalists worked investigation life danger told may 6 2016 statement john doe cited income inequality reason action said leaked documents simply understood enough contents realize scale injustices described added never worked government intelligence agency expressed willingness help prosecutors granted immunity prosecution sz verified statement fact come source panama papers international consortium investigative journalists icij posted full document website sz asked icij help amount data involved journalists 107 media organizations 80 countries analyzed documents detailing operations law firm year analysis first news stories published april 3 2016 along 150 documents project represents important milestone use data journalism software tools mobile collaboration documents dubbed panama papers country leaked however panamanian government expressed strong objections name concerns would tarnish government country image worldwide entities panama elsewhere led advertising campaign weeks leak titled panama papers media outlets covering story used name mossack fonseca papers addition much-covered business dealings british prime minister david cameron icelandic prime minister sigmundur davíð gunnlaugsson leaked documents also contain identity information shareholders directors 214,000 shell companies set mossack fonseca well financial transactions generally law offshore shell company although offshore shell companies may sometimes used illegal purposes journalists investigative team found business transactions many important figures world politics sports art many transactions legal since data incomplete questions remain many cases still others seem clearly indicate ethical legal impropriety disclosures – tax avoidance poor countries wealthy entities individuals example – lead questions moral grounds according namibian instance shell company registered beny steinmetz octea owes 700,000 us property taxes city koidu sierra leone 150 million red even though exports twice average month 2012–2015 period steinmetz personal worth 6 billion offshore shell company transactions described documents seem broken exchange laws violated trade sanctions stemmed political corruption according icij reporters example named leak 12 current former world leaders 128 public officials politicians hundreds celebrities businessmen wealthy individuals 200 countries individuals entities may open offshore accounts number reasons legal ethically questionable canadian lawyer based dubai noted example businesses might wish avoid falling islamic inheritance jurisprudence owner dies businesses countries may wish hold funds dollars also said brazilian lawyer estate planning another example legal tax avoidance american film-maker stanley kubrick estimated personal worth 20 million died 1999 much invested 18th-century english manor bought 1978 lived manor rest life filming scenes shining full metal jacket eyes wide shut well three holding companies set mossack fonseca property turn held trusts set children grandchildren since kubrick american living britain without trust estate would pay transfer taxes governments possibly forced sell property obtain liquid assets pay kubrick buried grounds along one daughters rest family still lives uses ambiguous chinese companies may incorporate offshore order raise foreign capital normally law china world hereditary dictatorships law may side elite use offshore companies award oil contracts gold concessions children however dealings sometimes prosecuted international law standard official definition exists economist international monetary fund describe offshore financial center tax jurisdiction whose banking infrastructure primarily provides services people businesses live requires little disclosure information business offers low taxes obvious use offshore financial centers avoid taxes economist added oxfam blamed tax havens 2016 annual report income inequality much widening gap rich poor tax havens core global system allows large corporations wealthy individuals avoid paying fair share said raymond c. offenheiser president oxfam america depriving governments rich poor resources need provide vital public services tackle rising inequality international monetary fund imf researchers estimated july 2015 profit shifting multinational companies costs developing countries around us 213 billion year almost two percent national income igor angelini head europol financial intelligence group said shell companies play important role large-scale money laundering activities often means transfer bribe money tax justice network concluded 2012 report designing commercial tax abuse schemes turning blind eye upon suspicious transactions become inherent part work bankers accountants money-laundering affects first world well since favored shell company investment real estate europe north america london miami new york paris vancouver san francisco affected practice parking assets luxury real estate frequently cited fueling skyrocketing housing prices miami miami association realtors said cash sales accounted 90 new home sales 2015 huge amount dirty money flowing miami disguised investment according former congressional investigator jack blum miami 76 condo owners pay cash practice considered red flag money-laundering real estate london housing prices increased 50 2007 2016 also frequently purchased overseas investors donald toon head britain national crime agency said 2015 london property market skewed laundered money prices artificially driven overseas criminals want sequester assets uk three quarters londoners 35 afford buy home andy yan urban planning researcher adjunct professor university british columbia studied real estate sales vancouver—also thought affected foreign purchasers—found 18 transactions vancouver expensive neighborhoods cash purchases 66 owners appeared chinese nationals recent arrivals china calls data foreign investors rejected provincial government chinese nationals accounted 70 2014 vancouver home sales ca 3 million june 24 2016 china citic bank corp filed suit canada chinese citizen borrowed cn¥50 million lumber business china withdrew roughly ca 7.5 million line credit left country bought three houses vancouver surrey british columbia together valued ca 7.3 million three-month period june 2014 issue surely raised g20 summit predicted tomasz kozlowski ambassador european union eu india need strengthen international cooperation exchange tax information tax authorities panama vanuatu lebanon may find list uncooperative tax havens organisation economic co-operation development oecd re-activated july 2016 request g20 nations warned le monde french newspaper participated investigation three countries followed none oecd three broad guidelines international banking cooperation oecd g20 european union could also institute another list countries inadequate one area countries meeting none criteria panama vanuatu lebanon would go blacklist countries meet one criterion would go greylist april 2016 greylist place would included nine countries antigua barbuda bahrain brunei dominica liberia nauru samoa tobago united arab emirates international consortium investigative journalists helped organize research document review süddeutsche zeitung realized scale work required validate authenticity 2.6 terabytes leaked data enlisted reporters resources guardian bbc le monde sonntagszeitung falter la nación german broadcasters ndr wdr austrian broadcaster orf eventually many others ultimately reporters 100 news media outlets working 25 languages used documents investigate individuals organizations associated mossack fonseca security factored number project management considerations saying life danger john doe insisted reporters communicate encrypted channels agree would never meet face-to-face sz also concerns security source leaked documents data also safety partners investigation living corrupt regimes might want money-handling practices made public stored data room limited physical access air gapped computers never connected internet guardian also limited access journalists project work area make even harder sabotage computers steal drives sz journalists made tamper-evident painting screws holding drives place glitter nail polish reporters sorted documents huge file structure containing folder shell company held associated emails contracts transcripts scanned documents mossack fonseca generated business company administering client behalf 4.8 million leaked files emails 3 million database entries 2.2 million pdfs 1.2 million images 320,000 text files 2242 files formats journalists indexed documents using open software packages apache solr apache tika accessed means custom interface built top blacklight süddeutsche zeitung reporters also used nuix proprietary software donated australian company also named nuix using nuix süddeutsche zeitung reporters performed optical character recognition ocr processing millions scanned documents making data contained become searchable machine-readable project reporters used neo4j linkurious extract individual corporate names documents analysis access nuix used well reporters cross-referenced compiled lists people processed documents analyzed information trying connect people roles monetary flow structure legality us banking sec expert david p. weber assisted journalists reviewing information panama papers additional stories released based data full list companies released early may 2016 icij later announced release may 9 2016 searchable database containing information 200,000 offshore entities implicated panama papers investigation 100,000 additional companies implicated 2013 offshore leaks investigation mossack fonseca asked icij publish leaked documents database sent cease desist letter company said statement sheer quantity leaked data greatly exceeds wikileaks cablegate leak 2010 1.7 gb offshore leaks 2013 260 gb 2014 lux leaks 4 gb 3.3 gb swiss leaks 2015 comparison 2.6 tb panama papers equals approximately 2,660 gb mossack fonseca notified clients april 1 2016 sustained email hack mossack fonseca also told news sources company hacked always operated within law data security experts noted however company encrypting emails furthermore seemed running three-year-old version drupal several known vulnerabilities according james sanders techrepublic drupal ran apache 2.2.15 version march 6 2010 worse oracle fork apache default allows users view directory structure network architecture also inherently insecure email web servers segmented client database way reports also suggest parts site may running wordpress out-of-date version revolution slider plugin whose previously-announced vulnerabilities well-documented grey hat hacker named 1×0123 announced april 12 mossack fonseca content management system secured sql injection well-known database attack vector able access customer database computer security expert chris kubecka announced may 24 2016 mossack fonseca client login portal running four different government grade remote access trojans rats kubecka confirmed still numerous critical vulnerabilities many open ports infrastructure internet access archive server due weak security kubecka explained data security issue discovered detail full-length book titled rabbit hole osint journey gerard ryle director international consortium investigative journalists called leak probably biggest blow offshore world ever taken extent documents edward snowden described release twitter message biggest leak history data journalism icij also said leak likely one explosive leaks inside information history nature revelations unique opportunity test effectiveness leaktivism said micah white co-founder occupy ... panama papers dissected via unprecedented collaboration hundreds highly credible international journalists working secretly year global professionalization leaktivism days wikileaks amateurism wikileaks spokesperson kristinn hrafnsson icelandic investigative journalist worked cablegate 2010 said withholding documents time maximise leak impact called full online publication panama papers eventually tweet wikileaks criticized decision icij release everything ethical reasons censor 99 documents engaged 1 journalism definition offshore business entities illegal jurisdictions registered often illegal reporters found mossack fonseca shell corporations seem used illegal purposes including fraud kleptocracy tax evasion evading international sanctions reports april 3 note law firm many connections high-ranking political figures relatives well celebrities business figures among things leaked documents illustrate wealthy individuals including public officials keep personal financial information private initial reports identified five then-heads state government leaders argentina iceland saudi arabia ukraine united arab emirates well government officials close relatives close associates various heads government forty countries names then-current national leaders documents include president khalifa bin zayed al nahyan united arab emirates petro poroshenko ukraine king salman saudi arabia prime minister iceland sigmundur davíð gunnlaugsson former heads state mentioned papers include former prime ministers leaked files identified 61 family members associates prime ministers presidents kings including clients included less-senior government officials close relatives associates forty countries £10 million cash sale gold stolen 1983 brink's-mat robbery laundered first unwittingly later complicity mossack fonseca panamanian company feberion inc company set behalf unnamed client twelve months robbery brinks money put feberion front companies banks switzerland liechtenstein jersey isle man issued bearer shares two nominee directors sark appointed feberion jersey-based offshore specialist centre services offshore firms recycled funds land property transactions united kingdom although metropolitan police service raided offices centre services late 1986 cooperation jersey authorities seized papers two feberion bearer shares n't 1995 brink's-mat solicitors finally able take control feberion assets actor jackie chan mentioned leaked documents shareholder six companies based british virgin islands law firms play central role offshore financial operations mossack fonseca one biggest field biggest financial institutions refer customers services clients include incorporating operating shell companies friendly jurisdictions behalf include creating complex shell company structures legal also allow firm clients operate behind often impenetrable wall secrecy leaked papers detail intricate multilevel multinational corporate structures mossack fonseca acted global consultancy partners like emirates asset management ltd ryan mohanlal ltd sun hedge invest blue capital ltd behalf 300,000 companies registered british overseas territories leaked documents also indicate firm would also backdate documents request based 2007 exchange emails leaked documents routinely enough establish price structure 8.75 per month past 2008 mossack fonseca hired 90-year-old british man pretend owner offshore company marianna olszewski us businesswoman blatant breach anti-money laundering rules according bbc anonymity offshore shell companies also used circumvent international sanctions 30 mossack fonseca clients one time another blacklisted us treasury department including businesses linked senior figures russia syria north korea three mossack fonseca companies started clients helene mathieu legal consultants later sanctioned us treasury office foreign assets control ofac pangates international corporation accused july 2014 supplying government syria large amount specialty petroleum products limited civilian application syria two maxima middle east trading morgan additives manufacturing co owners wael abdulkarim ahmad barqawi said engaged deceptive measures supply oil products syria mossack fonseca also ran six businesses rami makhlouf cousin syrian president bashar al-assad despite us sanctions internal mossack fonseca documents show 2011 mossack fonseca rejected recommendation compliance team sever ties mr. makhlouf agreed months later firm said never knowingly allowed anyone connected rogue regimes use companies frederik obermaier co-author panama papers story investigative reporter german newspaper süddeutsche zeitung told democracy mossack fonseca realised makhlouf cousin realised sanctioned realised allegedly one financiers syrian regime said 'oh bank still business still keep well hsbc also appeared reassure mossack fonseca comfortable makhlouf client suggested could rapprochement assad family us makhlouf already known long-standing client hsbc swiss private bank holding least 15 million multiple accounts 2006 panamanian files also show hsbc provided financial services makhlouf company called drex technologies hsbc said company good standing dcb finance virgin islands-based shell company founded north korean banker kim chol-sam british banker nigel cowie also ignored international sanctions continued business north korea help panamanian firm us treasury department 2013 called dcb finance front company daedong credit bank announced sanctions companies providing banking services north korean arms dealer korea mining development trading corporation attempting evade sanctions country helping sell arms expand north korea nuclear weapons programme cowie said holding company used legitimate business aware illicit transactions mossack fonseca required international banking standards avoid money-laundering fraudster clients like banks supposed particularly alert signs corruption politically exposed persons pep words clients either close ties government officials however somehow failed turn red flags concerning tareq abbas even though shares family name president palestine sat board directors company four fellow directors firm deem pep ties palestinian politics yet mossack fonseca actually documented due diligence research including google search mossack fonseca managed 300,000 companies years number active companies peaked 80,000 2009 210,000 companies twenty-one jurisdictions figure leaks half incorporated british virgin islands others panama bahamas seychelles niue samoa mossack fonseca clients come 100 countries corporate clients hong kong switzerland united kingdom luxembourg panama cyprus mossack fonseca worked 14,000 banks law firms incorporators others set companies foundations trusts clients 3,100 companies listed database appear ties us offshore specialists 3,500 shareholders offshore companies list us addresses mossack fonseca offices nevada wyoming leaked documents indicate us 2 trillion passed firm hands several holding companies appear documents business sanctioned entities arms merchants relatives dictators sanctions place firm provided services seychelles company named pangates international us government believes supplied aviation fuel syrian government current civil war continued handle paperwork certify company good standing despite sanctions august 2015 500 banks registered nearly 15,600 shell companies mossack fonseca hsbc affiliates accounting 2,300 total dexia j. safra sarasin luxembourg credit suisse channel islands swiss ubs requested least 500 offshore companies clients hsbc spokesman said allegations historical cases dating back 20 years predating significant well-publicized reforms implemented last years response queries miami herald icij mossack fonseca issued 2,900-word statement listing legal requirements prevent using offshore companies tax avoidance total anonymity fatf protocols require identifying ultimate beneficial owners companies including offshore companies opening account transacting business miami herald printed statement editor note said statement address specific due diligence failings uncovered reporters monday april 4 mossack fonseca released another statement facts may victim data breach nothing 've seen illegally obtained cache documents suggests 've done anything illegal much keeping global reputation 've built past 40 years business right way co-founder ramón fonseca mora told cnn reports false full inaccuracies parties many circumstances cited icij never clients mossack fonseca firm provided longer statements icij official statement april 6 mossack fonseca suggested responsibility legal violations might lie institutions approximately 90 clientele professional clients ... act intermediaries regulated jurisdiction business clients obliged perform due diligence clients accordance kyc aml regulations subject interview bloomberg jürgen mossack said cat bag deal aftermath said leak inside job —the company hacked servers based abroad filed complaint panamanian attorney general office april 7 2016 mossack resigned panama council foreign relations conarex even though officially serving time brother peter mossack still serves honorary consul panama since 2010 may 5 2016 mossack fonseca sent cease desist letter icij attempt stop icij releasing leaked documents panama papers scandal despite icij released leaked documents may 9 2016 march 2018 mossack fonseca announced would close 5:00 april 3 news first broke ramón fonseca mora told television channel tvn responsible accused tribunal said firm victim hack responsibility clients offshore companies purchased mossack fonseca legal panamanian law later day independent movement movin called calm expressed hope panamanian justice system would allow culprits go impunity april 8 government understood media reports addressing tax evasion attacking panama president met wednesday april 7 candif committee representatives different sectors economy includes chamber commerce chamber industry agriculture national lawyers association international lawyers association banking association stock exchange entered full crisis management mode.on day announced creation new judiciary tribunal high-level commission led nobel prize laureate joseph stiglitz accussations foreign forces attacking panama panama stable robust economy isabel saint malo de alvarado vice president panama said op-ed piece published april 21 guardian president juan carlos varela administration strengthened panama controls money-laundering twenty months power panama setting independent commission co-chaired nobel laureate joseph stiglitz evaluate financial system determine best practices recommend measures strengthen global financial legal transparency expect findings within next six months share results international community however early august 2016 stiglitz resigned committee learned panamanian government would commit making final report public said always assumed final report would transparent april 8 president varela denounced france proposal return panama list countries cooperate information exchange minister presidency alvaro alemán categorically denied panama tax said country would scapegoat alemán said talks french ambassador panama begun april 25 meeting panamanian french finance ministers resulted agreement panama provide information france french nationals taxable assets country ministry economy finance panama dulcidio de la guardia formerly offshore specialist mossack fonseca competitor morgan morgan said legal often murky niche establishing offshore accounts firms trusts make less half percentage point panama gdp appeared suggest publication papers attack panama high level economic growth country shown eduardo morgan panamanian firm morgan morgan accused oecd starting scandal avoid competition panama interests countries panama papers affect image panama unfair manner come light result investigation hack said adolfo linares president chamber commerce industries agriculture panama cciap colegio nacional de abogados de panama cna urged government sue political analyst mario rognoni said world perceives panama tax government president juan carlos varela might become implicated tries cover involved rognoni said economist rolando gordon said affair hurts panama emerged greylist fatf added country especially panama must conduct investigations determine whether illegal improper acts committed panama lawyers movement called panama papers leak cyber bullying press conference condemned attack 'panama brand fraguela alfonso president said called direct attack country financial system invite organized forces country create great crusade rescue country image offshore companies legal said panamanian lawyer former controller republic alvin weeden illegality arises used money laundering arms smuggling terrorism tax evasion october 19 2016 became known government executive spent 370 million u.s. dollars order clean country image october 22 2016 midst state visit germany varela told journalist jenny pérez deutsche welle progress transparency many agreements exchange tax information tax evasion global problem asked ties ramón fonseca mora managing partner firm mossack fonseca acknowledged friend procuraduría de la nación announced would investigate mossack fonseca panama papers april 12 newly formed second specialized prosecutor organized crime raided mossack fonseca searched bella vista office part investigation initiated panama papers attorney general office issued press release following raid lasted 27 hours stating purpose obtain documents relevant information published news articles establishes possible use law firm illegal activities search ended without measures law firm confirmed prosecutor javier caraballo second prosecutor organized crime april 22 unit raided another panama location secured large amount evidence municipality regulation supervision financial subjects ministry economy finance mef initiated special review law firm mossack fonseca determine whether followed tax law carlamara sanchez charge proceeding said press conference quartermaster come verify whether firm complied since april 8 due diligence customer knowledge final beneficiary reporting suspicious transactions financial analysis unit uaf operations said law 23 2015 empowers regulation supervision said firms monitored since late last year special attention panama papers noted law carries fines 5,000 1 million even suspension firm icij investigation mossack fonseca reported public ministry samid dan sandoval former candidate mayor santiago de veraguas 2014 filed legal action journalists participated said project name damaged integrity dignity sovereignty country consortium would assume legal responsibility damage caused panamanian nation change.org petition requested icij stop using name panama panama papers request said generally- accepted name investigation damage image panama attorney general panama kenia isolda porcell diaz announced january 24 2017 suspending investigations mossack fonseca filed appeal protection constitutional rights first superior court justice panama requested deliver original documents issue judgment mossack fonseca detained february 8 2017 money-laundering charges march 2018 mossack fonseca announced would cease operations end march due irreversible damage image direct result panama papers many senior eu figures implicated panama papers scandal european commissioner taxation pierre moscovici said european union whole duty prevent kind tax avoidance uncovered panama papers scandal moscovici told reporters use offshore companies hide called shocking amounts financial assets tax authorities unethical estimated tax shelters resulted annual loss €1 trillion public finances adding european commission attempted tighten tax rules across union since november 2014 due luxembourg leaks scandal also revealed icij hoped extent panama papers revelations would spur countries action 2013 letter unearthed financial times president european council herman van rompuy prime minister united kingdom david cameron said offshore trusts automatically subject transparency requirements shell companies panama papers revealed minister finance andorra jordi cinca ceo orfund sa maintained offshore company called mariette holdings inc dissolution 2002 fear discovery participation businesses business activities orfund ties blood diamond trade refining sale african gold company closed shortly civil war ivory coast opposition demanded resignation result response cinca said connection would affect government andorra step still panama papers show major-general justice head armenia compulsory enforcement service mihran poghosyan connected three panama-registered companies sigtem real estates inc. hopkinten trading inc. bangio invest s.a. issued bearer shares poghosyan degree economics sole owner sigtem hopkinten together owned best realty ltd recently awarded government contracts poghosian resigned april 18 saying unacceptable caused armenia name mentioned alongside azerbaijan whose president ilham aliyev actually embezzled billions dollars april 8 armenian transparency international anti-corruption center filed petition ethics committee high level officials requesting investigation poghosyan members families poghosyan uncles grigor mikhail haroutyunyan also mentioned connection business varuzhan hotkanian head armenian branch anti-corruption watchdog transparency international said perhaps poghosian forced resign country leadership since evidence pointed directly said still questions government commitment fighting corruption leading opposition figure levon zourabian demanded answers matter floor parliament austria financial market authority announced audit two austrian banks mentioned panama papers – raiffeisenbank international rbi specifically examining whether banks complied obligation prevent money laundering hypo vorarlberg subsequently announced complied laws past planning retreat completely offshore sector 2018 investigative media bivol.bg accessed panama papers agreement international consortium investigative journalists later published story offshore company viafot attempting acquire key asset bulgaria defense industry arms producer dunarit panama papers show viafot owned alexander angelov lawyer media mogul delyan peevski bulgarian media reported state institutions help viafot acquire dunarit illegitimate means however inquiry opened bulgaria general prosecutor sotir tsatsarov initially 2016 access panama papers granted journalist alekseniya dimitrova however spokesperson ministry foreign affairs bulgaria raised concern dimitrova worked communist secret services work papers may biased central bank cyprus officially declared regard press reports citing leaked documents known panama papers central bank cyprus announces assessing information extent may concern cypriot banking system taking necessary appropriate action cypriot online paper said cyprus link stems fact fonseca runs office cyprus specifically limassol chart leaks name cyprus tax countries offer little tax although corporate tax rate 12.5 ireland september 2016 danish tax authorities purchased panama papers data 320 companies 500-600 individuals investigate although data came anonymous source vetted credible sample data french financial prosecutors opened probe former president françois hollande declared tax evaders would brought trial punished also result leak france restored panama list tax havens panama recently removed former french budget minister jérôme cahuzac spearheaded crackdown tax fraud office client mossack fonseca owned seychelles company named cerman group limited incorporated 2009 france investigated 2013 allegations mediapart 2000 cahuzac held undeclared assets account first switzerland singapore resigned cabinet post protesting innocence admitted months later indeed hidden €600,000 ubs account moved keep hidden continuing lead france clampdown tax evasion french socialist party unanimously voted expel week later heels april 2013 cahuzac affair president hollande created parquet national financier pnf judiciary investigation unit specializing large-scale fraud corruption investigations jean-marie le pen founder long-time leader far-right-wing front national fn member european parliament already subject along daughter marine le pen staff pnf tax fraud investigation drawing official scrutiny undeclared hsbc account containing €2.2m gold coins managed geneva aide trust based british virgin islands closed moved bahamas 2014 allegations overbilling misuse comingling campaign funds tax evasion jean-marie le pen also suspected using european parliament funds campaign administrative expenses french political party jean-marie le pen mentioned documents along daughter marine le pen current party leader frederic chatillon fn insider also close friend marine among three may hidden much million pounds offshore accounts bidzina ivanishvili became wealthy russia returning georgia becoming prime minister 2012 public official asset declaration 72 pages long however list lynden management mossack fonseca company held 20 shares raptor pharmaceuticals declare us-based company listed new york stock exchange refused nearly four years provide copy passport proof address law firm needed comply money-laundering regulations well inquiries company financial investigation agency british virgin islands forbes calculates ivanishvili net worth 4.8 billion panama papers confirmed politician stavros papastavrou advisor former prime ministers kostas karamanlis antonis samaras member council panamanian foundations green shamrock foundation diman foundation 2005 2014 2006 became deputy chairman aisios foundation still exists today however papstavrou resigned aisios foundation 2012 number greek families significant art collections implicated scandal prime minister sigmundur davíð gunnlaugsson elected 2008 banking collapse iceland pledged clean corruption banking system sigmundur davíð took seat disclose 50 interest wintris company owned bonds one bankrupt banks divest day new law took effect january 1 2010 would required declare conflict interest sold share wife owns half couple come wealthy families bought wintris working journalist anthropologist failure disclose asset apparently broke laws country remembers 2008 financial crisis well thought put past since sigmundur davíð negotiated behalf iceland creditors failed icelandic banks discovery sigmundur davíð wife bondholder caused much outrage 22,000–24,000 people attended anti-government protest outside parliament april 4 2016 almost 8 population sigmundur davíð suggested snap election members coalition government want elections resignation april 5 2016 prime minister iceland sigmundur davíð gunnlaugsson announced resignation reykjavik grapevine news site kjarninn revealed president ólafur ragnar grímsson connections lasca finance limited registered 2005 british virgin islands ólafur ragnar categorically denied personal family ties companies tax havens parents wife dorrit moussaieff operated company 1999–2005 financial statements moussaieff family business show received nearly £7 million 10.2 million us €9.1 million interest payments lasca 2000–2005 2005 moussaieff jewelers limited sold 10 stake lasca s. dorrit moussaieff deceased father mother 86 years old registered owner lasca ownership stake dorrit sisters tamara sharon inherit fortune considered among largest world bjarni benediktsson iceland finance minister chairman gunnlaugsson coalition partner comes one iceland wealthiest families confirmed owned 33 falson co. seychelles shell company founded 2005 purchase real estate dubai still active 2009 benediktsson already member parliament financial disclosure requirements said registered company tax authorities aware registered seychelles minister interior ólöf nordal husband powers attorney dooley securities s.a. offshore company located panama said company founded husband never used think disclose hrólfur ölvisson managing director gunnlaugsson progressive party says mossack fonseca companies list name inactive long time legal businesswoman ingibjörg pálmadóttir husband jón ásgeir jóhannesson several years financed business dealings panamanian company guru invest owns shares retailer sports direct rhapsody investments europe based luxembourg guru invest paid around us 16 million glitnir bank crashed cover debt gaumur one jón ásgeir companies loaned isk 100 million jón ásgeir company þú blásól offshore company owns named jovita asked journalists kjarninn money came ingibjörg reply ingibjörg primary owner 365 media group owns icelandic news outlets vísir.is television channel stöð 2 radio stations bylgjan fm 957 none seem reporting disclosure irish times newspaper handled irish component leak prominent irish names listed included golfer pádraig harrington property developer sean mulryan manager irish rock group u2 paul mcguinness lists also included stanley watson senior partner ireland largest tax-law firm matheson led creation many irish corporate tax management tools used us multinationals ireland avoid billions us taxes list also included irish fine gael political advisor frank flannery april 6 2016 italy procura turin ordered guardia di finanza investigate 800 italians contained panama papers documents former long-time prime minister silvio berlusconi already convicted tax evasion expelled parliament included papers notable people whose names mentioned papers include entrepreneurs luca cordero di montezemolo flavio briatore adriano galliani actor carlo verdone investigation icij partner namibian found imprisoned mafioso vito roberto palazzolo shielded finances italian namibian south african authorities shell companies british virgin islands set german banker hong kong wolf-peter berthold also used transfer control palazzolo assets son panama papers linked minister government prime minister joseph muscat konrad mizzi prime minister chief staff keith schembri shell companies panama furthermore mizzi wife sai mizzi liang malta trade envoy china consul general malta shanghai china also named beneficiary together children trust based new zealand holding mizzi panama shell company mizzi april 28 2016 minister health energy currently minister tourism listed panama papers owner panama shell company called hearnville inc indications maltese press mizzi links offshore trust prevent mizzi elected deputy leader party affairs ruling labour party february 25 2016 following change party statutes enable sitting mp appointed mizzi stepped deputy leader labour party april 28 2016 schembri businessman managed electoral campaign labour party 2013 maltese general elections serves chief staff muscat reported hold offshore company based british virgin islands owns anonymous shell company panama called tillgate inc held trust established new zealand konrad mizzi keith schembri acquired shell companies panama hearnville inc tillgate inc respectively via mossack fonseca representatives malta also tried open bank accounts linked two shell companies two politically exposed persons various jurisdictions owner third anonymous shell company panama egrant inc whose existence revealed document referring two companies remains unknown although strict secrecy observed acquisition including avoidance e-mail communications utilization communications via skype fuelled strong suspicions third top maltese politically exposed person involved 2015 declaration assets dated february 8 submitted maltese parliament end march 2016 muscat said 'd shown draft form panama papers leaked mizzi listed trust new zealand shell company panama april 28 2016 report matter commissioned government malta unnamed international audit firm still pending april 28 2016 muscat announced cabinet reshuffle mizzi lost ministerial portfolio health energy retained minister without portfolio office prime minister malta member european union minister implicated scandal date withstanding mizzi schembri involvement scandal still hold high positions maltese government mark a. sammut wrote book case called l-aqwa fl-ewropa il-panama papers u l-poter best europe panama papers power october 2017 daphne caruana galizia blogger led panama papers investigation corruption malta killed car bomb near home norwegian tax administration expects demand access information dnb norway largest financial services group approximately 30 companies formed dnb owned norwegians 20 living norway 200 norwegians client list mossack fonseca icij offshore leaks database shows portugal 246 offshore entities 300 officers 40 intermediaries 175 addresses linked activities described mossack-fonseca papers newspapers reporting involvement several politicians government officials bankers company managers may 2017 criminal judicial consequences involved süddeutsche zeitung one newspapers participating project made papers public described connections various individuals listed russian president vladimir putin quoted nobel-winning economist paul krugman us state department documents saying russia kleptocracy mafia state respectively süddeutsche zeitung reported 2 billion moved network companies associated russian firms individuals years companies appeared used questionable business transactions putin criticized offshore companies unpatriotic several occasions since 2011 2013 law passed banning foreign bank accounts government officials putin name appear records released date associates construction billionaires arkady boris rotenberg musician sergei roldugin business magnate alisher usmanov mentioned leaked documents putin long-standing friend billionaire gennady timchenko well press secretary spouse cousin former kgb colleagues well several oligarchs connected mossack fonseca shell companies sergei roldugin cellist st petersburg orchestra godfather putin eldest daughter described putin best friend appears prominently panama papers according leaked papers roldugin acquired assets worth least 100 million including 12.5 stake video international russia largest television advertising firm companies stock options russia biggest companies rights loans worth hundreds millions dollars 2008 company controlled roldugin joined several offshore companies help another putin insider acquire control kamaz russia largest truck manufacturer obtain investment german carmaker daimler ag 250 million 10 kamaz sandalwood another company roldugin insiders interest issued lines credit 2009 2012 worth 800,000 russian commercial bank rcb cyprus wholly owned subsidiary vtb bank largely owned russian state panama papers documents indicate roldugin companies received several loans collateral low interest rates never repaid 2013 several shell companies linked brothers boris arkady rotenberg loaned worth us 200 million company roldugin network leaked documents show whether repaid shortly loan granted arkady rotenberg company awarded tender south stream pipeline project worth billions asked companies rodulgin said take look find say ca n't financial matters delicate putin spokesperson dmitry peskov called western reporting panama papers putinophobia said target putin part conspiracy russia orchestrated central intelligence agency united states department state others putin denied element corruption said opponents trying destabilize russia putin also said wikileaks showed us official people official organs us behind 2016 annual direct line vladimir putin called leaked documents reliable confined comments roldugin saying western media understand musician spent off-shore income musical instruments russia putin also said goldman sachs owned shares parent company süddeutsche zeitung fact owned munich family german media group kremlin apologized mistake initially mainstream russian media almost entirely ignored leak neither state-owned channel 1 rossiya 1 privately owned ren-tv ntv mentioned story april 4 day story broke minimal coverage story ran middle night vesti tv relation lionel messi michel platini exception russian opposition newspaper novaya gazeta described icij russian partner reported story hard copy online end april occrp published analysis batch leaked documents demonstrating cash flow rodulgin accounts 2007 tax theft 230m moscow tax inspectors uncovered reported sergei magnitsky april 15 2016 josé manuel soria forced leave post acting minister industry energy tourism panama papers revealed family maintained several offshore societies tax havens previous decades soria initially denied reports kept leaking contradicted april 14 company came light owned jersey 2002 mayor las palmas soria put critical political position result confusing changing explanations issue resigned next day prominent spanish politician offshore companies former imf president rodrigo rato vice-president conservative government prime minister josé maría aznar €3.6 million two offshore companies charged spain alleged tax offenses money laundering corruption among individuals cases corruption micaela domecq-solís wife miguel arias cañete currently european commissioner climate action energy formerly eu minister agriculture food environment also opened shell societies spanish royal family also involved tax scandal princess pilar borbón duchess badajoz sister former king juan carlos aunt current king felipe vi offshore corporation 40 years abdication brother assembled company called delantera financiera 1974 president administrator initially denied name appeared panama papers husband died 1991 secretary-general corporation son bruno gomez-acebes treasurer manager company name count ripalda brother jaime de marichalar former husband king daughter elena de borbón also appears moreover huge corruption scandal involving royal house iñaki urdangarin business associate nóos foundation advised mossack fonseca move funds two great-grandchildren dictator francisco franco francisco juan josé franco suelves set registered societies british virgin islands mossack fonseca juan josé franco opened malini investments 1997 director 2012 closed 2013 told newspaper el confidencial absolutely ignorant francisco franco suelves older brother also opened vamfield alliance limited 1997 director son jordi pujol former president generalitat catalonia considered linchpin catalan independence granted diversion commission 6.8 million euros sale office opaque society repaid another offshore company 5 million pujol family parents children charged several counts tax fraud corruption among crimes current wife former prime minister spain felipe gonzález maría garcía vaquero opened account switzerland carmingo ltd 2004 tax niue island south pacific lawyer cándido conde-pumpido jr. son former general prosecutor spain magistrate supreme court spain cándido conde-pumpido asked open mossack fonseca offshore company 2008 though transaction n't completed intended offshore company intermediary project build skyscraper capital panama hide money francisco paesa important spy cni working ministry interior opened offshore account faking death 1998 top bankers spanish businessmen used firm open accounts companies miguel blesa president caja madrid tried spanish courts numerous cases corruption jesus barderas businessman close ex-prime minister felipe gonzález children lawyer javier de la rosa also linked corruption cases carlos ortega ceo pepe jeans families major hotel chains riu riu hotels resorts escarrer meliá hotels international martinón group martinón art collectors marina ruiz-picasso borja thyssen mossack fonseca companies thyssen lawyer said company fully declared tax authorities ruiz-picasso declined comment celebrities involved include spanish director pedro almodóvar oscar 2003 habla con ella brother agustin created company 1991 called glen valley british virgin islands agustin responded saying closed company 1994 paid taxes showbiz personality carmen lomana said death husband owner offshore company took care without knowing anything business tax bertín osborne host spanish singer famous actor imanol arias protagonist one longest important series spanish television cuéntame cómo pasó named osborne said account legal used recommended save money also involved scandal fraud treasury actress fellow protagonist series ana duato juan luis cebrián journalist co-founder el país ceo prisa spanish media conglomerate owns 2 star petroleum related oil corporation tax havens named decided take legal action la sexta revealed involvement scandal former president fc barcelona josep lluís núñez current vicepresident carles vilarrubí eduardo fernando de blas vicepresident real madrid offshore companies mossack fonseca swedish financial supervisory authority fi said april 4 2016 would investigate actions nordea one largest financial institutions nordic countries panama papers revealed bank luxembourg office helped set nearly 400 offshore companies clients 2004 2014 panama british virgin islands customers swedish financial supervisory authority fi said serious deficiencies exist nordea monitors money laundering given bank two warnings 2015 nordea pay largest possible fine—over five million eur 2012 nordea asked mossack fonseca change documents retroactively three danish customers power attorney documents would appear force since 2010 director nordea private banking thorben sanders admitted 2009 nordea screen tax evaders end 2009 decided bank shall means tax evasion said sanders swedish banks also present documents nordea occurs 10,902 times next frequently mentioned bank occurs 764 times swedish financial supervisory authority fi later said would also investigate three big banks sweden handelsbanken skandinaviska enskilda banken seb swedbank nordea cut ties mossack fonseca following interview nordea ceo casper von koskull svt april 4 response leaks prime minister stefan löfven said critical nordea conduct role minister finance magdalena andersson characterized bank conduct totally unacceptable april 6 federal police searched uefa headquarters nyon part criminal mismanagement probe champions league television rights deal signed fifa new president gianni infantino day geneva attorney general opened several procedures reaction report misconduct swiss lawyers trustees april 8 hours publication new series articles focusing art hidden behind offshore companies prosecutor sequestered modigliani worth 25 million geneva freeport litigation new york alleged painting stolen nazis world war ii defendants said leaked documents show control international art center shell company registered panama yves bouvier russian billionaire dmitry rybolovlev litigation art pricing mossack fonseca companies leaked papers also shed light ownership shell companies protracted litigation lausanne ownership artwork gstaad chalet late greek shipping tycoon basil goulandris april 11 another investigation abuse name charities like red cross wwf launched swiss-based diacore mossack fonseca client approximately thirty companies diacore run daniel steinmetz recently brother beny steinmetz power attorney company diacore part steinmetz group ukrainian president petro poroshenko took office 2014 popular uprising toppled predecessor viktor yanukovych poroshenko pledged sell candy business roshen elected leaked documents indicate august 21 2014 instead mossack fonseca set offshore holding company prime asset partners ltd british virgin islands moved company roughly two months election move potential save millions dollars ukrainian taxes records cyprus show firm shareholder legal experts say explanation may sound however n't making difference ukrainian media making point poroshenko opened offshore account august 2014 ukrainian soldiers massacred russians ilovaisk panama papers report may also figured defeat trade deal netherlands referendum april 6 anti-corruption group transparency international believes creation businesses serving president direct violation constitution also journalists organized crime corruption reporting project believe move poroshenko committed two illegalities starting new business office failing afterwards report disclosure statements poroshenko denied wrongdoing spokesman said offshore company active assets legitimate corporate restructure aimed helping sell poroshenko roshen group analysts ukraine responded secretive way poroshenko set accounts certain undermine trust party ukraine news poroshenko offshore business came government campaigned offshore companies oleh lyashko leader radical party urged lawmakers begin impeachment proceedings even allies backed calls parliamentary commission investigate allegations ukrainian parliament relations poroshenko bloc people front party prime minister arseniy yatsenyuk previous months already soured mutual accusations corruption prime minister arseniy yatsenyuk also announced would resign panama papers leaks according guardian £170bn uk property held overseas ... nearly one 10 31,000 tax companies british property linked mossack fonseca included among panama paper documents names six members house lords several donors cameron conservative party well conservative donors include united kingdom still exercises varying degrees control british overseas territories crown dependencies make large number many tax havens secrecy jurisdictions exist pressure mounted prime minister david cameron make changes according wall street journal panama papers shining light constellation offshore centers last remnants british empire gibraltar british virgin islands bvi companies created mossack fonseca included leaked data bvi companies topped list 113,000 nearly 215,000 companies mossack fonseca managed incorporated british overseas territory anguilla 7th list cameron criticized complex offshore structures 2013 saying fair right companies saying 've got lots sales uk 'm going pay sort royalty fee another company another country special tax dispensation said would bring issue g8 summit year summit cameron demanded transparency arguing would better business 2014 cameron asked overseas territories crown dependencies set open register firms individuals investments registered jurisdictions time panama papers leak april 2016 montserrat gibraltar agreed leader opposition jeremy corbyn said government needs stop pussyfooting around tax dodging called direct rule imposed british overseas territories crown dependencies act tax havens former business secretary vince cable agreed although former attorney general dominic grieve described proposal bit nuclear option would destroy livelihoods bvi inhabitants finance industry labour party also said cameron planned anti-corruption summit may would charade cameron chairman summit require representatives crown dependencies overseas territories attend jennie granger spokeswoman hmrc said department received great deal information offshore companies including panama wide range sources currently subject intensive investigation said hmrc asked icij share data private eye revealed edward troup appointed executive chair hmrc april 2016 former partner simmons simmons london-based legal firm whose clients included panama-registered fund created david cameron father blairmore holdings papers obtained süddeutsche zeitung icij reveal simmons simmons close relationship running offshore companies major overseas property owners including investment company run behalf sheikh hamad bin abdullah al thani troup senior tax partner ian cameron late father uk prime minister david cameron ran offshore fund blairmore holdings inc. mossack fonseca avoided uk taxes 30 years company moved ireland david cameron became prime minister april 6 cameron admitted owned shares blairmore said sold shares becoming pm prominent politicians criticized involvement cameron family scandal leader opposition jeremy corbyn urged immediate independent investigation tax affairs cameron family well tighter laws uk tax avoidance opponents also called cameron resignation admitted owning shares blairmore azerbaijan international mineral resources operating company ltd aimroc consortium partners spent nearly us 230 million open mine build refinery western azerbaijani village chovdar aimroc possibly produced us 30 million gold suddenly disappearing without making payroll may 2014 mine employees officially remain vacation azerbaijani law full-time employees seek work elsewhere even though paid two years 2012 investigation radio free europe organized crime corruption reporting project occrp discovered overseas holding companies daughters azerbaijani president ilham aliyev owned interest gold mine operation created 2006 presidential decree forming consortium awarding 30-year lease environmental transparency objections parliament panama papers made possible trace elaborate network shell companies manage ownership mines 2016 occrp able establish fact daughters control mining operation aliyev awarded gold mines globex international llp londex resources s.a. willy meyris s.a. fargate mining corporation thirty percent proceeds allocated government azerbaijan 11 remaining 70 went globex 45 londex 29 willy meyris remaining 15 fargate companies registered panama according documents obtained panama registry companies one fargate mining corporation founded tagiva management ltd. tagiva services ltd. verda management ltd issued general power attorney granted favour azerbaijan-born individual mr. nasib hasanov later londex resources s.a. globex international llp fargate mining corporation willy meyris s.a. registered st. kitts nevis addresses already used registering offshore energy holding – nobel oil ltd. partner state oil company socar azerbaijan umid gas field founder nobel oil group also mr. n. hasanov 2012 investigation reporters established globex owned shell companies panama shell companies belonged president daughters swiss businessman whose name appears shell companies manage azerphone family telecommunications monopoly villagers told reporters hoped work mine paid 12 day asked intervene president problems mine causing water supply became angry believe reporters said president family stake mine following may publication report national assembly passed law making illegal report company ownership another giving former presidents first ladies lifelong legal immunity khadija ismayilova radio free europe reporter 2012 investigation subjected escalating legal public harassment threatened eventually arrested currently serving 7.5 year sentence tax evasion abuse power leaked mossack fonseca documents made possible establish daughters also owned londex majority partner gold enterprise entirely clear shut operation industry experts familiar consortium say seem experienced may rushed production according icij aliyev daughter arzu financial stakes gold rights also azerfon country largest mobile phone business shares sw holding controls nearly every operation related azerbaijan airlines azal meals airport taxis sisters brother heydar property dubai valued roughly 75 million 2010 heydar legal owner nine luxury mansions dubai purchased 44 million leaked documents show daughters leyla arzu aliyeva hold shares exaltation limited incorporated april 2015 holding uk property child child london law firm registered obtained nominee directors though jersey branch mossack claimed women political connections family azerbaijan president ilham aliyev leads well-off life thanks part financial interests various sectors nation economy wife ascendants privileged powerful family owns banks insurance construction companies television station line cosmetics well known pre-eminent charity work led construction schools hospitals country major sports complex april 7 2016 anti corruption commission bangladesh launched inquiry obtain details businesses individuals allegedly affiliated mossack fonseca allegations made thirty-two bangladeshi individuals two corporations however media outlets staking claim referenced old icij database information compiled investigation 2013 offshore leaks relatives highly placed chinese officials including seven current former senior leaders politburo communist party china named including former premier li peng daughter li xiaolin former communist party general secretary hu yaobang son hu dehua deng jiagui brother-in-law current general secretary xi jinping deng two shell companies british virgin islands xi member politburo standing committee dormant time xi became general secretary communist party paramount leader november 2012 others named include son daughter-in-law propaganda chief liu yunshan son-in-law vice-premier zhang gaoli official chinese statistics show investment british overseas territories acting tax havens much significant places 44 billion invested cayman islands 49 billion british virgin islands despite figures probably exclud ing private investments many family members ruling elite channelled money bvi figures exceed chinese investment united states united kingdom china government suppressing mention panama papers social media search engines results reportedly told news organizations delete content related panama papers leak chinese authorities consider material concerted foreign media attack china ordered internet information offices delete reports reprinted panama papers exceptions follow related content hong lei spokesman china foreign ministry responded comment groundless accusations april 5 news conference screenshot showed authorities forced websites delete content panama papers foreign websites wikileaks china digital times blocked mainland china sina weibo twitter-like social media website censors deleted content panama paper however name xi brother-in-law got weibo users tried circumvent less obvious language brother-in-law canal papers panama canal despite censorship weibo search ranking topped phrases seemingly related panama papers tax evasion document leak putin chinese entertainment magnate art collector wang zhongjun also appears documents respond request comment according tax justice network chinese investors sometimes use overseas companies take advantage incentives china offers foreign investors canadian broadcaster radio canada reported hong kong-based citic pacific mossack fonseca set manage 90 subsidiaries chinese government majority stakeholder according fiscal expert marwah rizqy professor tax law université de sherbrooke mossack fonseca hong kong office busiest says icij chinese officials wealthy figures would carry funds across border deposit channeled offshore entities hong kong invested hk 4.6 trillion £360 billion bvi – hong kong invested mainland china – received hk 4.1 trillion £300 billion bvi £20 billion placed cayman islands bermuda individually newspaper ming pao fired deputy editor keung kwok-yuen following front-page article panama papers mentioned many prominent hong kong citizens paper blamed difficult business environment previously fired another editor 2014 another leak offshore documents employees publishing blank columns scattered newspaper protest dismissal polytechnic university two offshore companies set mossack fonseca 2012 2013 one created vice-president nicholas yang wei-hsiung became minister hong kong bollywood celebrities amitabh bachchan daughter-in-law actress aishwarya rai bachchan actor ajay devgan listed papers bachchan denied connection overseas companies spokesman rai also questioned documents authenticity bachchan repeated denial response august 21 report listed director two companies participated board meetings also listed real estate developer dlf ceo kushal pal singh sameer gehlaut indiabulls group gautam adani elder brother vinod adani shares companies fell following release papers well apollo tyres also mentioned dlf said invested existing overseas companies compliance lrs scheme set 2004 reported indian tax agency apollo spokesman said family members chairman onkar kanwar reported owning offshore companies live india complied law resided gehlaut said paid full taxes made full disclosures indian politicians list include shishir bajoria west bengal anurag kejriwal former chief delhi lok satta party bajoria said owned two isle man companies one ascribed leaked documents corporate services provider first names group acknowledged erroneously providing information mossack fonseca mf records show kejriwal director three offshore companies based british virgin islands bvi holding two private foundations panama power attorney another bvi company acknowledged offshore companies said shut short period time name deceased drug kingpin iqbal mirchi also surfaced papers 500 indian citizens appear mentioned indian government ordered inquiry subsequently announced constituting special multi-agency group comprising officers investigative unit central board direct taxes foreign tax tax research division financial intelligence unit reserve bank india 600 israeli companies 850 israeli shareholders listed among israeli names found leaked documents top attorney dov weissglass bureau chief deceased prime minister ariel sharon jacob engel businessman active african mining industry idan ofer member one israel wealthiest families according haaretz weissglass name appears sole owner one four companies set business partner assaf halkin company talaville global registered british virgin islands may 2012 according haaretz seven months later shares mortgaged loan vienna bank weissglass halkin told haaretz company registered purpose receiving loan bank order invest european properties bank would allow loan corporation ... company activity reported tax authorities israel required tax said activity paid israel many leaked documents reference bank leumi primarily branch island tax jersey one customers billionaire teddy sagi made fortune developing online gambling technology england recently developed camden market commercial real estate space sagi sole shareholder least 16 mossack fonseca offshore companies mostly real estate ventures israeli businessman beny steinmetz also mossack fonseca customer 282 companies nawaz sharif second top official ruled result information disclosures panama papers supreme court disqualified office one judge said mr sharif longer eligible honest member parliament pakistan ruling party pakistan muslim league-nawaz pml-n permitted speaker national assembly select interim prime minister 2018 general election supreme court verdict announced context heightened security capital 3,000 armed police members pakistan rangers paramilitary force deployed around supreme court verdict followed months dramatic news coverage social media debates divisions falling largely along party lines hearing october 18 2017 resulted indictment sharif faced allegations corruption since 1980s panama papers corroborated federal inquiry mid-1990s name nawaz sharif younger brother punjab chief minister shebaz sharif also link in-laws shebaz sharif children nawaz sharif offshore companies mossack fonseca records tie nawaz daughter maryam nawaz brothers hussein hassan four offshore companies nescoll limited nielson holdings limited coomber group inc. hangon property holdings limited companies acquired luxury real estate london 2006–2007 real estate collateral loans 13.8 million according panama papers prime minister children say money came sale family business saudi arabia offshore companies assets disclosed family wealth statement suspicion companies meant hide launder ill-gotten wealth avoid taxes called sharif ethics question prior ruling maryam nawaz tweeted denial wrongdoing adding company/property abroad except trustee brother corporation entitles distribute assets brother hussain family/children needed leaked documents name trustee nescoll created 1993 nielson first registered 1994 two companies subscribed mossack fonseca services july 2006 mossack fonseca managing nescoll nielsen holdings coomber group three companies obtained £7 million mortgage swiss bank deutsche bank suisse sa purchased four flats avenfield house 118 park lane london hassan brother bought hangon holdings stock 2007 £5.5 million hangon bought property financed bank scotland 1 hyde park place london samina durrani mother shebaz sharif second wife ilyas mehraj brother first also figure documents habib waqas group/ilyas mehraj listed shareholder 127,735 shares haylandale limited registered july 24 2003 bahamas mehraj denied knowing anything company whether incorporated commonwealth bahamas anywhere else name haylandale ltd. rainbow limited newest three offshore companies owned samina durrani registered september 29 2010 british virgin islands bvi armani river limited registered bahamas may 16 2002 describes assets property london currently rented assets star precision limited registered bvi may 21 1997 reported cash investment portfolio also holding 1,165,238 shares orix leasing pakistan limited hussain nawaz said family wo n't hamper investigation urged one former president pervez musharraf well government april 15 announced investigation inquiry commission pakistanis named documents opposition politicians said judge retired judge investigate numerous judges recused july 28 2017 supreme court pakistan disqualified sharif holding office late benazir bhutto also mossack fonseca client 2001 firm set bvi company petroline international inc. bhutto nephew hassan ali jaffery bhutto aide head security rehman malik later became senator interior minister government yousaf raza gillani mossack fonseca deemed bhutto first company similarly named petrofine fzc politically sensitive declined accept mrs bhutto client united nations committee chaired former us federal reserve head paul volcker determined 2005 investigation abuses oil-for-food program petrofine fzc paid us 2 million iraqi government saddam hussein obtain us 115–145 million oil contracts 2006 pakistani national accountability bureau nab accused bhutto malik ali jaffery owning petrofine established since 2000 sharjah united arab emirates bhutto pakistan peoples party denied april 2006 nab court froze assets owned pakistan elsewhere bhutto husband asif ali zardari saying assets totaling 1.5 billion result corrupt practices swiss charges criminal money laundering filed 1997 still litigation tareq abbas son mahmoud abbas president palestinian authority revealed hold 1 million shares arab palestinian investment company apic offshore company associated palestinian authority partially owned authority palestine investment fund hamad bin jassim bin jaber al thani prime minister 2007 2013 2002 acquired three shell companies incorporated bahamas another british virgin islands moorage mallorca 300 million yacht named al mirqab panama papers indicate owns owned eight shell companies subsequent reporting forbes found al thani bought 700 million deutsche bank shares 2014 paramount services holdings 2015 transferred roughly half stock supreme universal holdings owned relative left office emir qatar also 2013 king salman mentioned leaks relation two companies based british virgin islands—verse development corporation incorporated 1999 inrow corporation incorporated 2002 companies took mortgages totaling us 34 million purchased properties central london role companies specified bvi company crassus limited incorporated 2004 registered yacht london named erga king salman palace riyadh vessel boasts banquet hall comfortably sleep 30 king salman described documents principal user former crown prince muhammad bin nayef also named papers irish times found link iran-contra panama papers persons one america colourful political donors farhad azima multi-billionaire adnan khashoggi employed mossack fonseca services important figures iran-contra scandal mossack fonseca files show khashoggi appeared early 1978 became president panamanian company isis overseas s.a documents reveal fonseca clients included sheikh kamal adham saudi arabia first intelligence chief 1963–79 brother-in-law king faisal named us senate committee cia “ principal liaison entire middle east mid-1960s 1979 ” adham controlled offshore companies involved b.c.c.i banking scandal ministry finance monetary authority singapore said statement singapore takes serious view tax evasion tolerate business financial centre used facilitate tax related crimes evidence wrongdoing individual entity singapore hesitate take firm action sri lankan finance minister ravi karunanayake said panel investigate sri lankan names come panama papers well 46 appear 2013 offshore leaks according daily mail since earlier leadership apparently country many large outstanding foreign loans taken administration former president mahinda rajapakse current government recently obtain us 1.5 billion imf bailout rajapakse denied diverting funds current government came power january 2016 anti-corruption platform rami makhlouf maternal cousin bashar al-assad worth estimated 5 billion syrian civil war control 60 economy subject sanctions united states european union controlled syria oil telecommunications business us treasury charged pangates company registered supplied assad government thousand tonnes aviation fuel however makhloufs able continue operate via panama shell companies registered british virgin islands subject us law – however may 9 2011 eu issued sanctions extended order council british virgin islands july 2011 mossack fonseca decided september 6 resign makhlouf companies makhlouf already cut ties bank hsbc told law firm swiss authorities frozen makhlouf accounts contact beneficial owner company since last 3 months bangkok post reported anti-money laundering office amlo seeking information foreign counterparts regarding twenty-one thai nationals reportedly included list people worldwide using panama-based law firm apparently specializing money laundering tax evasion clear amlo investigating twenty-one panama papers include least 780 names individuals based thailand another 50 companies based thailand foreigners foreign-owned companies 634 individual addresses thailand appear documents surfaced date including ceos giant companies bangkok land phatra finance investigations icij sole east asian partner commonwealth magazine taiwan found least 2,725 offshore companies registered addresses taiwan ninety taiwanese including singer actor nicky wu included papers according report released commonwealth magazine wu used firm horizon sky technology ltd. co-operate hong kong-based sun entertainment culture limited publisher concludes taiwanese companies individuals believed extensively using offshore shelters avoid evade taxes ... scouring panama papers documents mossack fonseca one main conduits time appears big taiwanese banks law firms accounting firms often use services mossack fonseca presence taiwan forty-six taiwanese brokers work mossack fonseca relatively small-scale consulting firms operating greater china taiwanese entities set shell companies panamanian law firm small unlisted companies individuals icij guardian independent reported uae president khalifa bin zayed al nahyan owns london real estate worth £1.2 billion structure thirty shell companies mossack fonseca set british virgin islands administer using manage control luxury properties london december 2015 mossack fonseca held nearly shares companies trust structures behalf president wife son daughter trust beneficiaries canadian prime minister justin trudeau denied involvement affair saying entirely completely transparent mine family finances something learned early canadians expect leaders canada revenue agency said statement current tax evasion audits include canadian clients associated law firm mossack fonseca added would communicate treaty partners obtain information may currently possession cra tax treaties 92 different countries 22 tax information exchange agreements cra begun completed 116 audits 234 planned investigations expected recoup least 11 million taxes fines fewer 10 related criminal investigations progress royal bank canada rbc denied wrongdoing associated 370+ clients referred mossack fonseca years extensive due diligence process ... rbc works within legal regulatory framework every country operate said bank spokesman ceo david mckay said bank review four decades documentation problems ceo bill downe bank montreal said canadian banks 'dramatically beefed anti-money laundering control last seven 10 years added link canadian businesses panama papers companies would originated long time ago canadian banks took action stop money laundering individuals surface leaked documents according icij partner investigation toronto star canadians tax fairness calculated legal tax avoidance corporations alone cost canadian treasury almost 8 billion canadian year calculated 2015 numbers found corporations individuals combined sent 40 billion declared assets tax havens ten popular alone held 270 billion canadian assets administration president luis guillermo solís suggested activity unveiled leaked documents suggests attempts evade taxes administration effort implement tax increases reforms met strong resistance opposition business figures leaked documents suggest mossack fonseca helped tuna export company borda azul set shell company british virgin islands order avoid costa rican taxes firm business headed hermes navarro president costa rican football federation 1999 2006 late 1990s finance ministry prosecutor office investigated borda azul export companies allegedly misusing tax credit certificates 1997 dozens companies accused using certificates fraud launder drug profits according icij investigative partners databasear seminario universidad mossack fonseca helped borda azul fabricate invoices allow report inflated costs—to reduce taxes—and inflated exports allow continue qualify tax credit certificates letter dated october 19 1998 mossack fonseca lawyer explained investigation panama city office concluded thirty costa rican law firms mentioned panama papers referring clients mossack fonseca resulting creation 360 shell companies particular gonzalo fajardo asociados founded former finance ministry official later economy minister gonzalo fajardo salas nearly two decades helped costa rican companies set 82 offshore corporations tax havens according databasear finance vice minister fernando rodríguez said costa rica push sign tax information exchange agreement panama legislators several parties trying line political consensus seek approval administration tax fraud bill form legislative commission investigate named panama papers according emilia molina cruz citizens action party opposition parties maintained country financial problems stem excess spending according finance department sums costa rica loses tax evasion equal 8 country gross domestic product deficits run 6 aristóteles núñez charge time government tax administration said people involved panama papers case still make tax declarations pay taxes investments mexican foreign investments bank accounts crime income declaring illegal investments categorized tax evasion fines 100 omitted tax payment result well three months nine years imprisonment according forbes hinojosa prominent mexicans mostly businessmen close ties government including least one member forbes billionaires list subject extensive articles published online icij investigation partners proceso aristegui noticias sunday proceso also said mexicans mentioned leaked documents included individuals linked drug cartels ken emrith member opposition united national congress unc linked bribery scandal brazil panamanian shell companies used transfer millions us dollars offshore bank accounts brazilian construction company awarded contract 2011 national infrastructure development company nidco people partnership administration build highway trinidad tt 5.2 billion highway 49 complete estimated highway cost tt 8 billion done investigators found emirth companies received 6 million nidco emirth also director pembury consultants trinidad tobago limited oas hired highway project consultant 44,800 month may 2013 oas paid pembury least tt 896,000 totals beyond date currently available emrith described low-level unc party official second mossack fonseca company pendrey associates speaking parliament attorney general faris al-rawi said leaked documents tied offshore company key players petrobras scandal brazil including convicted jose luiz pires queluz dealings swiss ag pires investigation said according icij investigative partner trinidad express emrith close associate jack warner also owns half shares proteus holding sa investment refuses discuss says responsibility confidentiality fellow shareholders express also says oas used namibian port development project camouflage 1 million payment procopio shell company santa tereza services ltd emirth president barack obama critical caribbean tax havens 2008 election campaign 2010 united states implemented foreign account tax compliance act law required financial firms around world report accounts held us citizens internal revenue service us hand refused sign common reporting standard set organisation economic co-operation development alongside vanuatu bahrain means us receives tax asset information american assets income abroad share information happens united states countries words means united states become attractive tax least 2,400 us-based clients found papers many transactions legal mossack fonseca offered advice many us clients evade us tax financial disclosure laws panama free trade agreement supported obama clinton accused enabling practices detailed within panama papers regulatory oversight however obama administration official said argument zero merit john cassidy new yorker said panama free trade agreement actually forced panama release information american regulatory authorities ownership companies partnerships trusts foundations persons citing leaked diplomatic cables fortune writer chris matthews speculated obama clinton may supported agreement opposing campaigning office quid pro quo panamanian support us efforts drug trafficking event notes true agreement abolished limits fund transfers us panama obama administration insisted two countries first sign tax information exchange agreement well facilitated exchange tax information countries president barack obama addressed overseas shell companies listed leak press conference 're breaking laws said laws poorly designed allow people 've got enough lawyers enough accountants wiggle responsibilities ordinary citizens abide although leader us mentioned panama papers obama said frankly folks america taking advantage stuff senators sherrod brown elizabeth warren requested treasury department investigate us-linked companies appeared leaks addition justice department given role financial markets former secretary state 2016 democratic presidential candidate hillary clinton condemned outrageous tax havens loopholes ... panama elsewhere pennsylvania afl–cio event clinton added behavior clearly law everyone violates law anywhere held accountable scandalous much actually legal clinton promised going scams make sure everyone pays fair share america manhattan us attorney preet bharara opened criminal investigation matters related panama papers sent letter april 3 international consortium investigative journalists icij saying office would greatly appreciate opportunity speak soon possible icij received many requests many countries icij director gerard ryle said policy turn materials new york department financial services asked 13 foreign banks including deutsche bank ag credit suisse group ag commerzbank ag abn amro group nv societe generale sa information dealings mossack fonseca banks accused wrongdoing must provide telephone logs records transactions new york branches law firm mcclatchy newspapers initially found four americans offshore shell companies named documents previously either accused convicted financial crimes fraud tax evasion three reasons suggested explain scarcity americans leak asked paucity american individuals documents digital editor süddeutsche zeitung stefan plöchinger said via twitter wait coming next plöchinger later clarified advocating jumping conclusions copies least 200 american passports – indicating owners applied banking services – discovered papers us politicians yet named leak names americans however mentioned former south african president thabo mbeki head african union panel illicit financial flows april 9 called leak welcome called african nations investigate citizens nations appear papers panel 2015 report found africa loses 50 billion year due tax evasion illicit practices 50-year losses top trillion dollars furthermore said seychelles african nation fourth mentioned tax documents minister industry mines abdeslam bouchouareb sole owner panamanian-registered offshore company known royal arrival corp since 2015 company active turkey great britain algeria managed compagnie d'etude et de conseil cec based luxembourg account swiss nbad private bank cec confirmed ownership royal arrival said managed minister inherited assets transparency algeria estimates lost 16 billion dollars offshore 2004 2014 cause concern given drop price oil accounts 95 algeria external revenue panama papers exposed link american oil company oil concessions several powerful politicians angola according leaked documents approximately fifteen shell companies funneled money ubs bank accounts elites portugal direct ties helder bataglia dos santos escom describes one largest investors angola democratic republic congo account one company markwell inc received sent 12 million 2008 2009 petroleum minister josé maria botelho de vasconcelos power attorney offshore company 2002 became petroleum minister previously employed number years executive sonangol according leaked documents denies wrongdoing icij partner le monde says seen documents show proxyholder medea investments limited founded niue 2001 moved samoa five years later company issued bearer bonds capitalization 1 million closed 2009 never previously accused corruption angola 5 billion sovereign wealth fund fundo soberano de angola fsdea promotes vehicle development prosperity angola fsdea headed josé filomeno de sousa zenu dos santos son president josé eduardo dos santos power since 1979 funded state-owned petroleum company sonangol fsdea critics say record-keeping murky seems engage nepotism cronyism ian kirby head court appeal owns seven holding companies british virgin islands said intended investment lost money 2015 congo produced 290,000 barrels oil day philia attorney denied receiving advantageous pricing said received 2.5 coraf oil denis christel sassou-nguesso son denis sassou nguesso power 32 years re-elected march disputed election daniel representative oyo member ruling parti congolais du travail congolese party labour also assistant director-general société nationale des pétroles du congo snpc general manager national refinery coraf according leaked documents mossack fonseca establish shell company british virgin islands named phoenix best finance ltd. name also appears 2002 director geneva-based philia sa alongside oil merchant jean-philippe amvame ndong denied knowledge matters according swiss non-profit berne declaration philia exclusive no-bid contract congolese oil exports coraf refinery last three years country received payment oil shipped refinery bruno itoua president advisor oil director-general snpc 2005 us federal court found diverted funds fictitious companies nonetheless became minister energy panama papers documents seen le monde reveal also held power attorney since 2004 denvest capital strategies grafin associated sa registered mossack fonseca panama british virgin islands itoua currently minister scientific research 1999 2002 kabila regime transferred ownership least 5 billion assets state-mining sector private companies control ... compensation benefit state treasury united nations investigation found us dodd-frank act supposed help bring end conflict diamonds minerals us idea public opinion would force divestment time section 1502 require divestment mandate disclosure instead disclosure requirement simply meant new business opportunities money launderers recently 2014 un found 70 percent drc gold sold dubai without problem gold continued provide important funding army armed rebel groups march 2005 dan gertler international formed new company global enterprises corporate gec global resources owned beny steinmetz former drc mines minister simon tuma-waku special adviser company formed joint copper cobalt mining venture drc agency la générale des carriers et des mines gécamines held 25 gec 75 placed isle man holding company nikanor plc ipo raised £400 million london company eventually reached market capitalization 1.5 billion initial investment 3 million steinmetz appears 282 leaked documents gertler dan gertler inc ties joseph kabila closest aide 200 presidential decree ratified agreement issued despite recommendation anti-corruption lutundula commission according panama papers kabila twin sister owns part offshore company interests congo include part mobile-phone company vodacom congo government called press conference warn journalists printing names congolese figures might appear documents kabila sister jaynet désirée kabila kyungu feruzi kalume nyembwe advisor late father former president laurent-désiré kabila directors keratsu holding limited company registered niue mossack fonseca months elder kabila assassination keratsu held 19.6 shares congolese wireless network held 49 vodacom congo lucien ebata kinshasa businessman runs orion group sa registered seychelles 2009 mossack fonseca luxembourg-based figed according panama papers ebata receives salary million dollars business volume around billion counts shell société nationale des pétroles du congo snpc among customers theory american european buyers gold africa required review supply chain report use conflict resources gold eastern congo practice requirement widely ignored investigation african network centers investigative reporting ancir found examples leaked mossack fonseca documents anonymous shell companies sourcing start drc gold winds dubai way uganda dubai 75 billion gold industry regulated light hand quasi-private dubai multi commodities centre dmcc kalotti exports 40 dubai gold bought 5.2 billion gold 2012 little paperwork according ernst young partner amjad rihan rijan said dmcc employer squashed concerns dmcc changed audit procedures ensure favorable outcome future ancir journalists obtained records showing kalotti sold scrap gold refiners including valcambi leaked documents show pamp holding mauritius signed agreement mks holding bv two shell companies described beneficial owners panama-based mountside investment hong kong-based dynamic bonus limited 2010 mks holdings owned 72 joint venture mmtc ltd. owned state india switzerland pamp joint venture supply big multinationals like apple alaa mubarak son former president hosni mubarak cited owning holding companies real estate properties london assets virgin islands-registered firm pan world investments frozen response european union order father stepped 2011 arab spring mossack fonseca fined 37,500 2013 lack due diligence alaa brother convicted last year embezzling state funds still face trial insider trading egyptian businessmen mohamed abu el-enein ahmed bahgat ashraf marwan ibrahim kamal mohamed nosseir mohamed mansour raouf ghabbour mohamed al-maghraby named leaked documents well orascom development holding company headed samih sawiris also bank alexandria banque misr banque du caire former sudanese president ahmed al-mirghani client mossack fonseca also al-mirghani lived egypt 1989 coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million every ramadan fed 500 people financed 20 pilgrimages mecca every year described billionaire seydou kane holds diplomatic passports senegal gabon mali protocol officer senegalese embassy paris waiting plane landed roissy-charles-de-gaulle november 2015 kane close associate gabonese ruling family questioned jailed nanterre ten hours anti-corruption agents connection investigation opened july 2007 january 2013 kane briefly questioned transit miami le bourget french authorities whose curiosity piqued €2.5 million cash person according senegalese daily libération money-laundering unit tracfin became interested 2006 €300,000 payment groupe marck french company specializing military uniforms anti-riot gear monaco-based entity called citp citp managed kane close friend president chief staff maixent accrombessi held paris interrogated august 2015 french officials wanted ask accrombessi contract marck gabonese ministry interior €7 million head marck philippe belin also held questioned investigation assigned also conducted so-called ill-gotten goods investigation targeted number african leaders including father predecessor ali bongo ondimba current president gabon mossack fonseca opened two holding companies kane 2013 2014 maxi gold international limited smart key ltd according paperwork traded sundries one hand gym equipment john addo kufuor son john agyekum kufuor mossack fonseca manage trust starting 2001 father took office trust held 75,000 bank account panama mother also beneficiary linked two offshore companies also registered father term inactive kojo annan son former secretary-general united nations kofi annan appears laolu saraki son late nigerian senator abubakar olusola saraki shareholders blue diamond holding management corp registered mossack fonseca british virgin islands 2002 two directors sutton energy ltd also registered british virgin islands 2002 transferred samoa 2015 annan used another shell company first registered british virgin islands transferred samoa purchase apartment london 500,000 2008–2009 beny steinmetz group resources bsgr owner beny steinmetz paid 165 million mining rights northern portion simandou mine located nzérékoré region guinea interior soon sold 51 percent rights vale 2.5 billion rio tinto previously held concession invested 450 million infrastructure site global witness says bsgr fact paid nothing rights 165 million represents bsgr self-reported investment improvements site adds either way bsgr profit exceeded national budget guinea us authorities say steinmetz paid mamadie touré 5.3 million help obtaining concession husband lansana conté president guinea shortly died according global witness offshore company belonging touré matinda received payment 2.4 million company named pentler holdings several payments promised well 5 bsgr shares simandou pentler owned 17.65 bsgr guinea guinean president alpha condé launched investigation elected 2010 separately us federal bureau investigation fbi us justice department suspecting violations foreign corrupt practices act august 2014 mossack fonseca received tax information exchange agreement tiea notice us government inquiring ownership pentler two bsgr companies administered mossack fonseca geneva office however president pentler financial management firm menachem eitan fugitive us sec facing charges 55 million ponzi scheme guinea mines minister mohamed lamine fofana said 2012 bsgr n't follow law jean-claude n'da ametchi advisor former president laurent gbagbo refused accept lost election 2010 also mentioned leaked documents european union sanctioned banker n'da ametchi 2011 helping finance gbagbo regime offshore company cadley house ltd registered seychelles bearer bonds bank account morocco n'da ametchi sent email 2011 geneva office mossack fonseca naming geneva bank pasche financial managers company september 2012 acted sole director request transfer registration abidjan neither mossack fonseca banks mentioned european sanctions eventually lifted 2012 company apparently still active 2015 according documents seen le monde currently advisor former prime minister charles konan banny lost october 2015 presidential election former deputy chief justice kalpana rawal director shareholder four holding companies active two took office husband owns another seven companies used real estate transactions britain rawal husband shareholders directors highworth management services ajay shah former director trust bank also shareholder director central bank kenya ordered shah assets auctioned repay depositors trust bank collapsed went hiding assets recovered mounir majidi personal secretary king mohammed vi designated march 2006 representative smcd limited created 2005 geneva financial advisor dextima conseils according icij smcd majidi bought aquarius w 1930s-era luxury sailboat registered morocco el boughaz belonging king smcd according icij also made loan luxembourg company logimed investissements co sarl details available following loan smcd liquidated 2013 diamond ocean enterprises mossack fonseca entity set 2005 reported purpose financial consulting namibian diamond manufacturer polisher according law firm records deutsche investment consultants asia limited mossack fonseca company set british virgin islands now-imprisoned mafioso vito palazzolo wolf-peter berthold german banker based hong kong director firm shareholders include peter von palace kolbatschenko palazzolo son berthold giovanni agusta also 2005 zacharias zacky nujoma youngest son sam nujoma set two holding companies avila investments marbella investments licensed buy cut diamonds shortly afterwards 90 stock transferred diamond ocean 2006 nujoma established ancash investments obtained seven exclusive uranium prospecting licenses palazzolo loaned company us 10 million canadian mining company announced would partner ancash uranium contracts said based decision part ancash strong international support natural earth international ltd. hong kong natural earth another deutsche investment company corrupt officials stolen 150 billion nigeria last 10 years said nigerian president muhammadu buhari said april 7 2016 added planned ask united states president barack obama help president nigerian senate bukola saraki found panama papers leak ties least four offshore companies failed declare code conduct bureau nigerian law requires wife toyin also shell companies listed name mossack fonseca documents girol properties ltd sandon development limited *landfield international developments ltd. saraki said assets holding companies belong wife family therefore required report ancir dismisses however leaked documents link firm handwritten note suggests mossack fonseca aware nominee director aliko dangote chief executive dangote group tied leaked documents four offshore companies many 13 family business associates included dangote estimated 17 billion worth currently involved construction 14 billion oil refinery lagos former delta state governor james ibori also mentioned leak ibori pleaded guilty london 2012 siphoning 75 million nigeria office 1999–2007 charges nigeria dropped nigeria following election ibori sentenced 13 years mossack fonseca registered agent four offshore entities received request 2008 information accounts british crown prosecutors family julex foundation shareholder stanhope investments company incorporated 2003 island niue funneled millions dollars could buy private jet united kingdom returned £6.8 million nigeria funds seized accounts determined belonged ibori anti-corruption taskforce olusegun obasanjo government economic financial crimes commission questioned time whether yar'adua administration refrained loath pursue members nigerian elite suspected corruption including leading financiers ruling party like ibori supported election former senate president david mark also listed owner eight shell companies leaked panama papers sikera overseas s.a. colsan enterprises limited goldwin transworld limited hartland estates limited marlin holdings limited medley holdings limited quetta properties limited centenary holdings limited portion wealth owned former chairman united bank africa uba hakeem belo-osagie domiciled trusts shell companies notorious tax havens around world government rwanda uses offshore company lease private jet senior politicians leaked documents show brigadier-general emmanuel ndahiro using london address become director british virgin islands company debden investments ltd. 1998 owner jet aircraft ndahiro close advisor president paul kagame spokesman kagame military according panama papers owner company hatari sekoko ran number real estate hotel ventures marriott kigali icij partner ouestaf.com able establish panama papers existence secret contracts dp world fze dp mamadou pouye bribery codefendant karim wade son former prime minister abdoulaye wade information available trial ouestaf confirmed financial ties corporation first time panama papers investigation wade sentenced 2015 six-year prison term cour de répression de l'enrichissement illicite crei specialized anti-corruption court wade accused illegally amassing assets 240 million childhood friend pouye sentenced five years allegedly helping denied wrongdoing united nations amnesty international said rights violated trial ouestaf investigation address legality trial conclude succeeded tracing payment pouye oversea shell company subsidiary dp wade remains member senegalese democratic party pds still pds candidate 2017 presidential election mossack fonseca documents show pouye owned three offshore companies seabury inc regory invest latvae inc. seabury seems set solely business dp world started 2008 year senegal signed contract dp world rights container terminal autonomous port dakar april 2009 wade became minister international cooperation territorial development air transport infrastructure remained father defeat macky sall 2012 election regory invest acted seabury subcontractor receiving €65,000 euros month according documents according ouestaf documents make clear crei investigators interested funds pouye monaco account know source offshore account created two contracts prove fact relationship defendants dp world investigator papa alboury ndao told court february discovered two payments 13 million subsidiary dp world fze singapore bank account belonging karim wade however bank singapore refused cooperate ndao forced drop line inquiry mossack fonseca opened several offshore companies multinationals example anglogold owner anglogold investments senegal ltd et anglogold exploration senegal ltd based british virgin islands senegalese architect pierre atepa goudiaby special advisor former president abdoulaye wade also mentioned leaked documents swiss law firm fidinam sa mossack fonseca open offshore atepa engineering corp en 2006 year goudiaby opened paris office champs-elysées icij investigation traces many levels offshore holdings multiple countries related business dealings beny steinmetz many serious findings request mossack fonseca backdate revocation power attorney mossack fonseca records show sierra leone diamond exporter octea based british virgin islands steinmetz family beneficiaries wholly owned guernsey-based bsgr resources linked bribery scandal guinea foundations switzerland liechtenstein among nysco balda bsgr 2007 one nysco bank accounts contained 27.7 million steinmetz personal fortune 6 billion supplies diamonds tiffany debeers sierra leone largest private investor yet according detailed report namibian octea subsidiary owes among debts property taxes 700,000 city koidu unpaid taxes discounted according mayor saa emerson lamina octea promised 5 profit−sharing agreement payment 1 annual profit community development fund either octea subsidiary koidu holdings obtained mine 28 million supposed deposit 2002 fighting stopped sierra leone mine previously held worked south african firm branch energy payment services parent company executive outcomes effectively ... military battalion hire rebel fighters area steinmetz since put 300 million project according reporting african network centers investigative reporting ancir company produces 60–90 sierra leone diamond exports months 2012 2015 exported us 330 million rough diamonds octea owes us 150 million unpaid loans although government records show taxes paid diamond companies none listed octea national mineral agency nma 2005 valued diamonds export using price book based 1996 figures companies also often seek minimize value diamond exports reduce taxes move profits abroad transferred subsidiary elsewhere value taxed diamonds frequently worth diamonds koidu average 330 carat roughly 50 de beers jwaneng mine botswana world biggest tiffany first pick best stones mined koidu remainder sold trade buyers according bloomberg according world bank sierra leone long time based growth forecasts success two companies one octea parent bsgr two men linked fidentia south african asset management company looted 1.2 billion rand pension funds meant provide 46,000 widows orphans mineworkers accounts mossack fonseca willing help hide money even south africa made names public former chief executive fidentia j. arthur brown sentenced 2014 concurrent 15-year sentences fbi arrested one man steven goodwin los angeles 2008 sent back south africa goodwin sentenced 10 years prison fraud money laundering graham maddock also later jailed south africa fraud khulubuse zuma nephew south african president jacob zuma links documents offshore company oil interests democratic republic congo denied wrongdoing according leaked documents president zuma also ties oil mining deal british virgin islands-based oil company caprikat limited joseph kabila president democratic republic congo drc helped caprikat obtain oil fields drc sent nephew drc run firm former president ahmed al-mirghani surfaced client mossack fonseca al-mirghani president 1986 1989 created orange star corporation british virgin islands panama firm 1995 living egypt coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million trial court prosecutor tunis ordered judicial inquiry panama papers tunisian political figures suspected hiring firm judge tunisian court specializing financial crimes assigned case tunisian assembly representatives people established parliamentary commission inquiry well newspaper inkyfada access documents reported dozen politicians former government officials lawyers implicated well leading media figure monday april 4 2016 reported former secretary-general nidaa tounes political party mohsen marzouk also coordinator new political party machrouu tounes point creating account december 2014 first presidential elections marzouk written mossack fonseca company virgin islands emphasizing desire hold funds conduct business overseas marzouk denies filed defamation complaint inkyfada forced briefly shut website following report due cyberattack attempted insert names politicians mentioned leaked documents mossack fonseca documents provide new insight confirmation previously-litigated tax case offshore company transferred registration avoid paying capital gains tax uganda documents show heritage oil gas limited hogl knew advance capital gains tax uganda planned enact hogl operating uganda planned sell half ugandan assets urgently moved registration bahamas mauritius avoid tax mauritius double taxation agreement uganda meaning hogl would pay tax one two countries mauritius capital gains tax moving heritage reduced capital gains tax zero emails clearly show reason transfer although company attorneys deny 2010 hogl sold 50 percent stake ugandan oil fields tullow uganda us 1.5 billion uganda revenue authority ura applied us 404 million capital gains tax transaction hogl refused pay four-year battle various courts ensued ugandan officials including president yoweri museveni then-ura commissioner-general allen kagina demanded payment tullow threatening renew exploration licenses expire unless deducted tax payment heritage remitted ura eventually tullow made payment deposited rest escrow pending legal resolution appeal came 2013 tullow also successfully sued hogl recover taxes paid behalf heritage gas oil subsidiary heritage oil founded conservative party donor tony buckingham given party £100,000 december 31 2008 still owned 33.1 heritage oil uganda ratio tax gross domestic product less 14 one lowest east africa arms dealer mining tycoon close links president robert mugabe operated offshore companies despite us european sanctions 2013 four years sanctions announced according leaked documents according panama papers zimplats holdings large platinum mining concern set shell company pay salaries senior managers zimplats denies knowledge company hr consultancy company still active 2015 unknown reserve bank zimbabwe may indicate externalization funds tax evasion appears salaries citizens zimbabwe performing work zimbabwe april 22 2016 australia said would create public register showing beneficial actual owners shell companies part effort stamp tax avoidance multinational corporations australian taxation office announced investigating 800 individual australian taxpayers mossack fonseca list clients cases may referred country serious financial crime task force eighty names match organized crime intelligence database leaked documents examined abc pierced veil anonymous shell companies linked sydney businessman brisbane geologist mining deals north korea rather applying sanctions australian government asx seem allowed coach horses ridden people involved forming relationship corporate relationship one primary arms manufacturers north korea said thomas clark university technology sydney david sutton director aat corporation ehg corporation held mineral licenses north korea business korean natural resources development investment corporation united nations sanctions north korea primary arms dealer main exporter goods equipment related ballistic missiles conventional weapons responsible approximately half arms exported north korea geologist louis schurmann said british billionaire kevin leech key putting deal together leaked documents also reveal involvement another briton gibraltar-based john lister according abc department foreign affairs trade aware mining deals also brought australian senate nobody ever referred matter australian federal police may 12 2016 names former prime minister australia malcolm turnbull former premier new south wales neville wran found panama papers due pair former directorship mossack fonseca-incorporated company star technology systems limited turnbull wran resigned positions 1995 prime minister denied impropriety stating star technology made profits—which regrettably—it certainly would paid tax australia media initially reported panama papers lists 500 entities created jurisdiction cook islands population 10,000 almost many singapore whose population 5.7 million winebox affair cook islands gave new zealand jurisdiction tax matters new zealand inland revenue department said working obtain details people tax residence country may involved arrangements facilitated mossack fonseca gerard ryle director international consortium investigative journalists told radio new zealand april 8 2016 new zealand well-known tax nice front criminals new zealand provides overseas investors foreign trusts look-through companies new zealand government policy request disclosure identity either settlor beneficiaries trust thus ownership remains secret consequence thus hiding assets trust-holder home jurisdictions trusts taxed new zealand trusts used acquire new zealand registered companies become vehicle trust owners exercise day day control assets new zealand-registered companies designed make profit using loans tax havens profit shifting techniques result tax free income general respectability typically associated companies registered new zealand prime minister john key responded may 7 john doe remark curiously quiet tax evasion cook islands saying whistleblower confused probably european cook islands use new zealand currency much responsibility tax cook islands taxing russia new zealand represent cook islands defence foreign policy taxation said distancing new zealand cook islands key ignored close ties two countries crucial role new zealand setting cook island taxation system mossack fonseca approached niue 1996 offered help set tax tiny south sea island law firm drafted necessary legislation permitting offshore companies operate total secrecy took care paperwork island got modest fee filing seemed like quite deal even required law provide banking paperwork russian chinese well english soon filings almost covered island year budget us government however made official noises 2001 laundering criminal proceeds chase bank blacklisted island bank new york followed suit caused inconvenience population let contract mossack fonseca expire many privacy-seekers banking world moved stay however apparently panama papers database lists nearly 10,000 companies trusts set niue population 1200 many recently created shell companies set samoa perhaps niue revised tax laws panama papers database lists 13,000 companies trusts set samoa population roughly 200,000 may 27 2015 us department justice indicted number companies individuals conspiracy corruption racketeering connection bribes kickbacks paid obtain media marketing rights fifa tournaments immediately entered guilty pleas among indicted jeffrey webb jack warner current former presidents concacaf continental confederation fifa headquartered united states charged racketeering bribery offenses others us south american sports marketing executives paid agreed pay well 150 million bribes kickbacks december 12 2014 josé hawilla owner founder traffic group brazilian sports marketing conglomerate waived indictment pleaded guilty four-count information charging racketeering conspiracy wire fraud conspiracy money laundering conspiracy obstruction justice hawilla also agreed forfeit 151 million 25 million paid time plea torneos traffic subsidiary fox international channels since 2005 investments since 2002 company involved corrupt practices acquisition rights major south american soccer tournaments many individuals mentioned panama papers connected world governing body association football fifa including former president conmebol eugenio figueredo former president uefa michel platini former secretary general fifa jérôme valcke argentine player barcelona lionel messi italy head manager metro antonio guglielmi leak also revealed extensive conflict interest member fifa ethics committee former fifa vice president eugenio figueredo swiss police searched offices uefa european football governing body naming former secretary-general gianni infantino president fifa signed television deal uefa company called cross trading fbi since accused bribery contract emerged among leaked documents infantino denied wrongdoing april 2019 icij european newspapers reported global tally payments exceeded one billion usd 1.2 billion comparison great britain recovered largest position 253 million followed denmark 237 million germany 183 million spain 164 million france 136 million australia 93 million colombia 89 million recuperated highest amount south central american countries heavily involved financial scandal investigations ongoing austria canada switzerland payments expected many countries conducting continued inspections companies private individuals revealed report
[ 865, 3522, 899, 1251, 5636, 5857, 3495, 6410, 2451, 7893, 8408, 8574 ]
None
10,868
9
Canonical_S-expressions:canonical s-expressions canonical s-expression csexp binary encoding form subset general s-expression sexp designed use spki retain power s-expressions ensure canonical form applications digital signatures achieving compactness binary form maximizing speed parsing particular subset general s-expressions applicable composed atoms byte strings parentheses used delimit lists sub-lists s-expressions fully recursive s-expressions typically encoded text spaces delimiting atoms quotation marks used surround atoms contain spaces using canonical encoding atom encoded length-prefixed byte string whitespace separating adjacent elements list permitted length atom expressed ascii decimal number followed sexp becomes csexp note quotation marks required escape space character internal atom canonical s-expression length prefix clearly points end atom note also whitespace separating atom next element list csexps generally permit empty lists empty atoms forth certain uses csexps impose additional restrictions example csexps used spki one limitation compared csexps general every list must start atom therefore empty lists typically list first atom treated one treats element name xml encodings common use generally csexp parser one two decimal orders magnitude smaller either xml asn.1 small size corresponding speed give csexp main advantage addition parsing advantage differences csexp xml differ csexp data-representation format xml includes data-representation format also schema mechanism thus xml configured particular kinds data conform grammar say html atom svg mathml new ones needed languages defining document grammars dtd defined xml standard xsd relaxng schematron commonly used xml additional features xml also work schema csexp data course operated schemas implemented higher level provides mechanism terms characters bytes csexp string may byte sequence whatsoever length prefix atom xml like regular scheme s-expressions json literals programming languages requires alternate representations characters control characters however effect range structures semantics represented xml also provides mechanisms specify given byte sequence intended interpreted say unicode utf-8 string jpeg file integer csexp leaves distinctions external mechanisms basic level csexp xml represent trees external representations surprising since xml described differently-punctuated form lisp-like s-expressions vice versa however xml includes additional semantics commonly achieved csexp various conventions rather part language first every xml element name csexp applications commonly use first child expression second xml provide datatyping firstly via schema grammar schema also however distinguish integers strings data objects types e.g jpeg especially xsd types xml element may also attributes construct csexp share represent xml data csexp one must choose representation attributes obvious one reserve second item s-expression list name value pairs analogous lisp association list xml id idref attributes equivalent csexp easily implemented csexp application program finally xml element may contain comments and/or processing instructions csexp specific equivalents trivial represent merely reserving name example naming *com *pi prevents ever colliding xml element type names csexp xml fully recursive first atom csexp list convention roughly corresponds xml element type name identifying type list however csexp atom encoding e.g. jpeg unicode string wav file … xml element names identifiers constrained certain characters like programming-language identifiers csexp method obviously general hand identifying encoding item thus interpret determined particular user conventions meaning csexp application must build conventions code documentation forth similarly csexp atoms binary consisting length prefix followed totally arbitrary bytes xml designed human-readable arguably less json yaml arbitrary bytes xml must encoded somehow example bitmapped image included using base64 means storing large amounts non-readable information uncompressed xml takes space hand survive translation alternate character sets including transmission network hosts may apply differing character sets line-end conventions etc. suggested xml merges sequence strings within one element single string csexp allows sequence atoms within list atoms remain separate one another incorrect exactly like s-expressions csexp xml notion sequence strings strings separated somehow asn.1 popular binary encoding form however expresses syntax data types semantics two different structures sequence two integers identical representations wire barring special tag choices distinguish parse asn.1 structure one must tell parser set structures one expecting parser must match data type parsed structure options adds complexity asn.1 parser csexp structure carries indication semantics encoded element names parser csexp structure care structure parsed wire-format expression parsed internal tree form similar xml dom consumer structure examine conformance expected noted xml document without schema works like csexp respect xml document work like asn.1
[ 7805, 6502, 479 ]
Test
10,869
3
Mercury_Systems:mercury systems mercury systems inc. high-tech commercial company serving aerospace defense industries headquartered andover massachusetts processing subsystems used intelligence surveillance reconnaissance isr radar electronic warfare ew storage guidance defense applications mercury based andover massachusetts 1000 employees offices around world annual revenues approximately us 493 million fiscal year ended june 30 2018 meet department defense dod defense electronics procurement reform objectives mercury created next generation business model defense procurement reform objectives captured department ’ better buying power 3.0 bbp3.0 overarching theme “ achieving dominant capabilities technical excellence innovation. ” mercury systematic approach creation defense processing subsystems using sensor processing chain methodology define reusable building blocks business approach leverages best commercial technology making mercury processing building blocks interoperable standardized defense processing subsystems quickly developed open system architectures osa fundamental meeting dod ’ bbp 3.0 objectives aligned mercury ’ business posture company pioneered many today ’ embedded protocols processing standards including rapidio openvpx ansi/vita 65 standard de facto embedded digital processing standard currently company investing openrfm radio frequency rf microwave processing bring interoperability rf/microwave domain openvpx digital realm openrfm standardizes profiles interfaces protocols rf microwave processing enabling sensor chain applications fully open systems compliant mercury applies open systems architectures software well hardware approach applied middleware preserves software application investments adding new capabilities tech-refreshes mercury headquartered andover massachusetts facility incorporates design engineering capability innovation center mercury innovation centers showcase company ’ sensor mission processing solutions mercury redundant scalable advanced microelectronic centers amcs amcs production defense industry subsystems amcs operated new england new york metro-area southern california trusted dmea facility southwest mercury three major product lines br • advanced microelectronic rf digital br • sensor mission processing mercury mission systems safety-critical avionics mission processing networking communication secure high-performance sensor processing storage networking br • mercury defense systems – electronic warfare secure processing test simulation mercury ’ businesses supported several dedicated international operations including toronto canada silchester united kingdom tokyo japan geneva switzerland
[ 8700 ]
Test
10,870
3
Codan:codan codan limited manufacturer supplier communications metal detection mining technology headquartered adelaide south australia revenue 132.3 million 2014 2017 revenue 226.1 million codan limited communications business unit parent company codan group engaged business operating segment radio communications product range sold customers 150 countries addition global service support network codan group regional sales offices washington d.c. usa victoria bc canada chicago il usa farnham uk beijing china dubai united arab emirates company maintains quality assurance systems approved standard company established 1959 three friends university adelaide alastair wood ian wall jim bettison company established electronics instrument lighting company limited eilco renaming codan 1970 codan listed australian stock exchange 2003 expanded military technology 2006 2005 ceo mike heard denied codan knowingling supplied technology al-quaeda operative 2001 mike heard acted company ceo 1990s held position retirement 2010 2009 codan established military security division usa 30 june 2012 codan limited sold satellite communications assets cpi international holding corp wholly owned subsidiary cpi international inc cpi 2016 codan defence electronics established leverage core competencies military radio countermine technology codan designs manufactures range hf equipment including transceivers base portable mobile modems power supplies amplifiers antennas accessories also provides hf solutions ranging basic voice communication data email fax chat gps tracking interoperability according fed mil standards codan hf transceivers initially developed provide communications people living working travelling central australia codan supplier hf radio products aid humanitarian markets since 1980 markets include public private security sectors well significant recreational vehicle user market australia codan military hf radio transceivers comply mil-std-188-141b ale jitc certified fed-std-1045 ale interoperable military grade radios provide frequency hopping voice encryption codan supplier us army provided around 3000 transceivers support security rebuilding programs afghanistan iraq 13 september 2011 dsei industry conference codan announced branding change hf radio division renaming division radio communications reflect broader focus company integrated radio communications systems 11 june 2012 eurosatory international defence security tradeshow codan radio communications announced launch codan envoy – software-defined radio enables users add new capabilities radio software updates 7 august 2012 codan announced acquisition daniels electronics limited daniels leading designer manufacturer supplier land mobile radio communications lmr solutions north america since launched tactical solutions stratus p25/lte hivenet p25 transportable repeaters secure mobile voice operations minelab specialises advanced electronic technologies including detection equipment military humanitarian de-mining projects also produce metal detectors consumer market company manufacturing distribution customer service operations adelaide australia cork ireland naperville usa iso 9001:2000 quality endorsed company minelab established 1985 acquired codan march 2008 minetec established technology service partner mining industry company provides integrated safety productivity communications solutions surface underground mining operations including advanced tracking mine operations management collision avoidance systems
[]
Test
10,871
2
Steve_Sakoman:steve sakoman steve sakoman american computing executive retired apple computer 2005 independent consultant originally worked hewlett-packard manufacturing engineer project manager industry first battery-powered portable ms-dos pc hp 110 sakoman moved apple computer 1984 would oversee hardware groups responsible apple ii macintosh product lines 1987 formed team behind apple newton realize vision world first pda sakoman left apple 1990 newton shipped set inc. former apple executive jean-louis gassée led development original bebox personally developed beos support brooktree video-capture devices eventually worked company chief operating officer time ran webcam inside offices using codycam application 1994 moved silicon graphics director consumer products technologies group included work nintendo 64 graphics system returned 1996 palmsource acquired 2001 sakoman took role chief products officer key member team behind palm os 6 sakoman rejoined apple 2003 vice-president software technology reporting avie tevanian sakoman also set gutentalk 2004 site discuss ebooks specially formatted pdas hand-held readers
[ 5384, 10051, 4251, 11118 ]
Test
10,872
4
Norton_Internet_Security:norton internet security norton internet security developed symantec corporation computer program provides malware prevention removal subscription period uses signatures heuristics identify viruses features included product personal firewall email spam filtering phishing protection release 2015 line summer 2014 symantec officially retired norton internet security 14 years chief norton product superseded norton security rechristened adaptation norton 360 security suite symantec distributed product download boxed compact disc cd copy oem software retailers also distributed usb flash drive norton internet security held 61 market share united states retail security suite category first half 2007 study competitors terms market share included security suites ca inc. trend micro kaspersky lab august 1990 symantec acquired peter norton computing peter norton norton company developed various applications dos including antivirus symantec continued development acquired technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark featured norton product packaging however pose later moved spine packaging later dropped altogether users 2006 later versions upgrade latest version norton software without buying new subscription upgraded product retains number days left user subscription releases named year internal version numbers well internal version number advanced 15.x 2008 edition match norton antivirus release year 2013 20.x release product dropped year name although still referenced places norton internet security 2000 released january 10 2000 symantec first foray beyond virus protection content control filters release followed alliance internet provider excite home antivirus vendor mcafee.com provide internet subscribers mcafee new firewall software mcafee personal firewall version 2000s firewall based atguard wrq filters traffic packet level block activex controls java applets functionalities include cookie removal banner ad blocking zdnet found ad blocker removed graphics ads breaking pages adjusting settings fixed problem however process complicated zdnet noted lack information presented concerning attacks firewall blocked norton liveupdate downloads installs program updates family edition adds parental controls parental controls backed quality control team 10 searching web inappropriate content found content categorized subject matter placed blacklist 36,000 sites designed administrator add blocked sites however pre-supplied blacklist viewed edited since hard coded administrators block certain subject matters another option block sites create whitelist allowed sites family edition also block transmission specified personal information information replaced letter x however cnn noted x-rated sites retrieved personal information queried search engine version 2.0 released june 12 2000 version 2001 2.5 released september 18 2000 adding support windows addition windows 9x series windows nt windows 2000 following attacks iloveyou anna kournikova script viruses version block malicious scripts without virus signatures analyzing behavior firewall scans internet-enabled applications creates access rules based knowledge base maintained symantec installation pc magazine testing installation took 24 minutes complete 750 mhz pentium iii 92 internet-enabled applications using firewall users determine whether accept cookies java applets activex controls global per-site basis new feature intrusion detection autoblock detect port scans block intrusion attempts program provides notifications intrusion attempts stating severity level providing access threat details alternatively firewall put computer stealth essentially hiding system users configure security level affecting number notifications testing conducted pc magazine using shields symantec security check found firewall successfully stealthed ports hiding computer view leak test conducted see firewall ability detect outbound connections attempt detected suite offered block attempts family edition like prior version includes parental controls information filtering feature parental controls come list objectionable sites separated 32 categories list updated every two weeks norton liveupdate using list alone norton blocks sites present list consequently norton may block sites next update parents customize list adding removing sites list allowed sites created restrict children specific sites version uses application blocking rather protocol port filtering control internet access children restricted applications used access internet parental controls profile set child settings automatically configured based age group whether child teenager adult administrator internet usage violations noted report presented parents pc magazine found enabling parental controls added minute computer boot time version 3.0 released march 19 2001 version 2002 announced august 28 2001 family edition dropped parental controls information filtering bundled release installation noted quick simple pc magazine cnet installation requires reboot afterwards security assistant guides users questionnaire best configure settings problem cnet encountered upgrading prior release loss customized settings pc magazine found default settings aimed avoiding frequent notifications somewhat permissive windows 95 support also dropped running full scan complies list internet-enabled applications users set permissions accept norton default settings firewall detects blocks port scans logs intrusion attempts version run trace attackers however symantec planning online tool ensure rogue programs masquerade trustworthy applications norton verifies programs list digital signatures known programs update tracker warns users hackers attempt gain access users computers firewall blocked access attempts shields port checker version includes wizard simplify firewall setup accommodate multiple computers sharing internet connection release norton prevent specified personal information transmitted via compatible instant messenger client e-mail websites ad-blocking includes ad trashcan users place ads slipped past ad-filtering professional edition announced december 11 2001 marketing aimed towards business owners version features norton intrusion detection intercepts suspicious connections attacks code red worm intrusion detection focuses windows-based attacks central management also present version administrators configure firewall productivity settings client computers productivity settings allow administrators block newsgroups websites advertisements suite integrates xp user accounts settings personalized user version 2003 announced september 16 2002 scheduled available purchase later month version adds norton spam alert reduce spam filtering scans whole message context rather looking keywords ensure accuracy pop3 client must used message identified spam norton inserts identifier default spam alert subject line using mail client users create rule delete move flagged messages users also create strings text spam alert look classifying e-mail pc magazine testing spam alert mistakenly classified 2.8 percent legitimate e-mail spam 47 percent spam slipped past filter although false positive rate low feature fare well finding actual spam updated main interface green red indicators show features active need attention firewall several updated features version block traffic button present main interface blocks incoming outgoing internet traffic another new feature visual tracker graphically maps attacks back origin firewall blocked port scans conducted cnet stealthing port following nimda code red worms version scans incoming outgoing traffic suspicious data exchanges routinely updated database feature ported norton internet security 2002 professional edition connection offending computer automatically severed traffic matches database item symantec announced professional edition november 19 2002 data recovery tools version allow users recover deleted malware-damaged files inclusion data erasure tool allows users delete files minimizing chance recovery web cleanup removes browser cache files history cookies maintain dial-up connections connection keep alive simulates online activity periods user inactivity norton productivity control enables users filter internet content block newsgroups used user access manager multiple filtering profiles created assigned different users announced september 8 2003 version 2004 adds adware spyware keylogger protection pc magazine found added protection weak spyware samples norton detected significant number removed completely requiring manual removal norton also little prevent spyware infections norton antispam renamed spam filtering feature set spam rules viewed edited whitelists blacklists senders created users may also create spam definitions antispam integrates outlook outlook express eudora allowing users tag e-mail spam on-the-fly e-mail identified spam either quarantined default however feature configured delete messages automatically cnet testing antispam correctly identified 94 percent spam messages product activation introduced release installation users allowed 15-day grace period activate copy norton internet security 2004 program work deadline without 24-character product key product key used activate copy norton internet security ties alphanumeric code based computer hardware configuration users may activate product five times product key however licensing terms dictate users allowed install norton internet security 2004 one computer symantec introduced version 2005 august 17 2004 version sometimes referred tagline antispyware edition since spyware detection integrated norton default enabled found threats listed separating ones already dealt ones requiring user interaction detailed information provided link symantec website however pc pro pc magazine noted lengthy scan times full scan took 24 minutes half hour respectively pc pro testing norton detected 61 percent spyware samples compared average 68 percent tested products removal rates average 72 percent versus average 68 percent norton blocked reinstallation score 48 percent compared group average 43 percent overall norton ranked fifth among tested products pc magazine testing norton installed slowly infected systems failed install one altogether contacting symantec resolve issue new features include internet worm protection block worms scan ip addresses open ports also blocks inbound ports based known suspected exploits using signatures heuristics addition feature follows msblast 2003 sasser 2004 worms exploited vulnerability microsoft windows operating systems response emerging privacy threats — 75 percent threats last 12 months attempted steal confidential information — version adds phishing protection using firewall component users create whitelist sites confidential information transmitted users alerted information transmitted site list outbreak alert feature warns users major threats classified symantec users press fix button applies set changes close vulnerabilities blocking necessary ports used propagating worm browser privacy suppress information website generally receive visitors browser operating system used feature also block advertisements privacy control warn users sending confidential information also configured block transmission allows users specify information sent via im e-mail item-specific exceptions allow users control data sent however pc pro found flaw information filtering feature way information formatted list confidential information affect effectiveness example entering last six digits credit card number stop numbers leaking grouped four digits pc magazine also noted fact anyone login computer view database private information reason symantec recommends entering last portion sensitive information norton antispam scans e-mails spoofed urls deals offending e-mail spam e-mails also blocked based language however default filter allows languages antispam sync list allowed senders pop3 address books users train spam filter pointing valid e-mail marked spam vice versa support yahoo mail hotmail added release norton internet security 2006 debuted september 26 2005 new main interface norton protection center aggregates information central location security status shown secure computer tasks e-mail internet browsing context features enabled protection center also recognize third-party software protecting computer new interface advertises additional products symantec categories protection data protection read coverage user purchases installs norton systemworks additional system tray icon created protection center installation noted lengthy pc magazine especially malware-infected systems spyware detection tweaked since last release updated better identify keyloggers pc magazine testing norton successfully detected 11 spyware threats removed two pc magazine give norton credit even manual removal required suite also removed three four commercial keyloggers attempting install spyware clean system norton blocked 11 two four commercial keyloggers cases block installation however norton call scan spyware installed pc pro testing norton detected 78 percent spyware removed 82 percent blocked 65 percent installing norton antispam discontinued separate product symantec available norton internet security feature block e-mail unknown senders automatically blocks messages suspicious elements invisible text html forms phishing urls improve accuracy norton analyzes outgoing e-mails messages whose categorization corrected users hitting spam spam buttons pc magazine testing feature marked one ten valid e-mail spam let one every six spam messages inbox 400 messages used program allowed process messages week pc pro testing feature performed better blocking 96 percent spam false positive rate 0.2 percent norton recommends disabling windows firewall avoid redundant alerts firewall stealthed significant ports pc magazine testing attacking firewall unsuccessful pc magazine unable stop service terminate process disable firewall using simulated mouse clicks firewall also passed pc pro tests successfully stealthing ports features include bloodhound technology looks virus-like behavior better find zero day viruses security inspector looks common vulnerabilities including insecure user account passwords browser insecurities advertisement blocking rewrites website html prevent advertisements displayed parental controls optional component block certain programs accessing internet im clients restrict newsgroup access restrictions assigned different windows users accounts sites classified 31 categories four profiles assigned block different categories sites supervisors define exceptions add global blocked sites block access sites user-created whitelist pc magazine pc pro noted exclusion time-based restrictions information filtering controlled per-user basis windows 98 compatibility dropped release 2007 version announced september 12 2006 tabbed interface allows users access norton protection center program settings without separate tray icons windows open symantec revised norton internet security made version modularized reduced suite memory usage 10–15 megabytes scan times 30–35 percent another result spam filtering parental controls separate components install installed features consume 100 mb disk space anti-phishing integrates internet explorer analyzes sites examining website url title form page layout visible text links uses blacklist detect phishing sites users blocked access suspected phishing sites however presented option continue pc magazine testing feature blocked 22 24 phishing sites internet explorer 7 recognized 17 24 sites pc pro testing feature successfully blocked access every phishing site tested spam filtering longer includes language feature symantec claims less useful current spam created false positives tested 1,500 messages pc magazine norton let half spam inbox five percent valid mail marked spam version utilizes symantec veritas vxms technology better identify rootkits vxms allows norton find inconsistencies among files within directories files volume level startup application manager allows users prevent applications launching login release drops support windows 2000 compatible windows vista upon release update firewall makes decisions lessen chance weakened misinformed decision applications known safe allowed internet access vice versa malicious applications unknown ones analyzed blocked exhibit malicious behavior pc magazine pc pro testing firewall incorrectly block safe applications internet access malware blocked firewall pc magazine testing reflected results firewall also stealthed ports exploits blocked intrusion prevention system prevents threats leveraging vulnerabilities system updated whenever vulnerability identified windows-based computers attempts disable firewall unsuccessful registry changes process termination simulated mouse clicks failed disabling windows services effect firewall since works kernel driver level version automatically adjusts configuration different networks based physical address gateway rather ip addresses pc magazine testing norton detected 15 16 spyware samples 13 16 removed eight commercial keyloggers suite removed samples clean system norton blocked 14 16 spyware samples installing stopped seven eight keyloggers installing 2008 version announced august 28 2007 adding support windows vista 64-bit new features include sonar norton identity safe browser defender sonar monitors applications malicious behavior identity safe supersedes information filtering function instead blocking personal information leaving computer stores personal information fill webforms password protected checks website authenticity filling forms browser defender inspects blocks suspicious api calls intended stop drive-by downloads network map identifies networked computers norton internet security 2008 installed remote monitoring allows checking status installations different computers problems identified red x icon using feature users also control network traffic computers also warns users using unencrypted wireless network startup application manager advertisement blocking features dropped release information filtering although superseded identity safe suite available separately used conjunction identity safe phishing protection integrates mozilla firefox testing pc magazine found norton blocked 94 percent phishing sites compared 83 percent internet explorer 7 77 percent firefox 2 cnet identified issue feature anti-phishing disabled identity safe still offers users automatically submit personal information websites including phishing sites symantec declined call flaw stating recommended use identity safe anti-phishing enabled alternatively identity safe could used firefox internet explorer built-in anti-phishing capability pc magazine found firewall put ports stealth mode firewall blocked ten 12 leak tests used see malware evade firewall control network traffic previous versions identify tests none carried malicious payload another test conducted using core impact successfully exploited one vulnerability test computer however components norton stopped exploit causing harm attempts unsuccessful either system invulnerable norton intrusion prevention system stopped attempts disable firewall unsuccessful pc magazine contrary pc pro identified 15 open ports computer norton installed pc magazine testing norton completely detected malware samples two-thirds samples traces removed norton found removed commercial keyloggers full scan took nearly hour complete though twice long 2007 version suite blocked malware installing commercial keyloggers regardless modifications made samples pc world noted norton removed 80 percent malware-associated files registry entries spam filtering imports users address books compile whitelist allowed senders addresses users send mail e-mail tagged valid mail automatically added whitelist using several thousand messages pc magazine found norton marked 40 percent valid e-mail spam 80 percent valid newsletters marked spam norton correctly identify 90 percent spam e-mail 2009 version released sale september 9 2008 symantec set several goals version 2009 development complete installations minute footprint 100 mb average installation times range eight ten minutes previous 2008 version 400 mb footprint goals included reducing load time computer starts 20–30 seconds 10 seconds file scanning times technology allowing norton skip certain trusted files technology works basis piece software runs significant proportion computers safe public beta released july 14 reduction memory consumption made prompted fact 40 percent people contacting symantec support 512 mb ram beta uses 6 mb memory compared 11 mb prior version reduce scan times norton insight uses data norton community participants avoid scanning files found statistically significant number computers citing npd group study finding 39 percent consumers switching antiviruses blamed performance cpu usage meter available within final product allow users find cause high cpu usage whether norton another program version features frequent updates change called norton pulse updates rather deliver update every eight hours 2008 version pulse updates delivered five fifteen minutes silent mode automatically suspends alerts updates program enters mode manually enabled suite activities take place computer idle terminate user activity registered final release 16.5 bundles spam filtering used free download symantec release also bundles norton safe web identifies malicious websites compatible internet explorer firefox norton safe web color codes search results famous search engine google yahoo safety norton safe web toolbar also includes ask.com search box search box share code ask toolbar instead box redirects queries ask search engine norton safe web compatible internet explorer firefox norton safe web benchmarking conducted passmark software highlights 2009 version 52 second install time 32 second scan time 7 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software tests conducted windows vista running dual core processor pc magazine found suite added 15 seconds boot time baseline 60 seconds norton added less 5 percent time takes complete file operations 25 percent time taken unzip zip set files pc magazine testing norton removed traces 40 percent malware similar test specifically using commercial keyloggers norton able remove keyloggers beating tested products norton blocked attempts install malware clean system modifications made samples fool norton norton able block installation commercial keyloggers phishing protection blocked 90 percent verified phishing websites pc magazine testing internet explorer 7 caught 75 percent firefox caught 60 percent norton stealthed ports according pc magazine port scans unsuccessful firewall blocked exploit attempts core impact malware blocking removal garnered good results pc magazine testing one malware samples contained within folder removed folder opened last one removed executed modifications made samples affect detection similar test specifically using commercial keyloggers norton successfully detect removing threats norton almost completely removed 40 percent malware samples related executables norton also able remove commercial keyloggers product version 2010 released officially september 8 2009 version features technology code named project quorum introduces reputation-based threat detection keep 200 million attacks month many symantec claims evade signature based detection new approach relies norton community watch participants send information applications running computers safe applications exhibit common attributes known origin known publishers conversely new malware may unknown publisher among attributes using data reputation score calculated used infer likelihood unknown application safe malicious facets quorum parental controls spam filtering norton internet security 2010 bundles free subscription onlinefamily.norton pc magazine found improvement parental controls bundled prior releases spam filtering uses technologies symantec acquired brightmail two filters used find spam locally installed one check symantec servers see message known spam pc magazine testing valid e-mail marked spam however 11 percent spam still made inbox significant improvement prior releases another improvement product improved heuristic feature called sonar 2 leverages reputation data judge program malicious clean norton insight also expanded showing users number norton community participants certain program installed impact system resources long released information program origin graph resource usage also provided new feature codenamed autospy helps users understand norton malware found malware actions norton resolution presented user previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software another addition product new flip screen compatible graphics card main display flips show opposite side main interface consisting chart cpu memory usage timeline security events without one flip screen link replaced back link opens back windows separate window product also adds search engine labeled safe search custom search allows user filter unsafe sites get insight keep track http cookies malware removal blocking performed well setting meeting records pc magazine testing achieved detection rate 98 highest 12 tested antivirus products exception blocking commercial keyloggers norton made average score file operations took 2 percent longer file compression extraction test took 4 percent longer area norton introduced significant delay system booting beta version suite added 31 percent boot time significantly longer prior versions according norton performance comparison website norton internet security scans 31 percent faster 70 percent lighter installs 76 percent faster leading anti-virus product according av-comparatives norton internet security best product 2009 bronze award 98.6 detection rate 2010 norton internet security 2010 blocked 99/100 internet threats infecting user computer norton internet security 2011 released beta testing april 21 2010 changes include new user interface improved scanning internet sites malware 2011 version symantec also released application scans user facebook feed malware links application require valid subscription test sponsored symantec norton internet security 2011 security suite ever achieve 100 percent protection score new third-party test dennis labs improved reputation scan provides user easy understand interface files stored user computer marking trusted good poor bad final version norton internet security 2011 released august 31 2010 new features version 2011 also include norton rescue tools tools include norton bootable recovery tool norton power eraser december 9 2010 symantec released 18.5 version norton liveupdate however update later pulled due numerous reports norton forums update causing system instability freeze ups system scans full quick scans issue affects customers users affected update advised uninstall product run norton removal tool reinstall 18.1 version http //www.norton.com/nis11 symantec later fixed bugs re-released update following acquisition verisign security norton parent company symantec several verisign features incorporated 2011 edition new product features new norton logo uses verisign checkmark formerly seen verisign logo well several new icon changes norton safe web norton identity safe features released 19.1.0.28 september 6 2011 norton internet security 2012 brought new features one new features included new release download insight 2.0 monitors files safety also stability given file means file stable windows 7 unstable windows xp xp users notified file instability enhanced removal tools tightly integrated better cleanup already infected systems triggered new powerful version norton power eraser restarts system locate remove fake antivirus software fake antivirus software deeply embedded threats otherwise hard remove new tool called norton management helps manage different computers devices equipped norton software single location changes release include sonar 4 google chrome compatibility identity safe safe web ability store passwords notes cloud however license agreement guarantee passwords stored securely provides remedy cloud vault compromised user interface also simplified three buttons third button opens advanced complicated menu user able manage settings access different product features cpu meter removed norton 2011 also makes return advanced screen combining netbook desktop line norton internet security integrates bandwidth metering controls product traffic usage takes minimum necessary ideal networks limited traffic also user interface window adjusts accordingly size computer screen version norton internet security includes several easter eggs pressing shift+1 2 3 4 would change theme default background plain black ray animals floral respectively also holding control win key alt pressing performance button activate crazy flip make window flip head heels effect would continue main window closed reopened furthermore scans longer scheduled windows task scheduler symantec proprietary one performs tasks computer idle i.e. user away computer version 20 2013 began version-less approach dropping 20xx naming convention automatically update new releases become available notable changes include new user interface better suited touchscreen devices social networking protection intends protect threats targeted social networks also first release officially support windows 8 version released october 7 2013 became last version marketed symantec norton internet security along norton antivirus norton 360 replaced norton security version 22.5 update released june 2015 includes restyled user interface windows 10 support september 2014 norton internet security folded norton security part symantec streamlined norton line symantec released special edition norton internet security optimized netbooks available download symantec website usb thumb drive symantec states netbook edition optimized netbooks main display optimized provide support 800 x 480 screen resolution addition non-critical tasks delayed netbook battery furthermore netbook edition contains complimentary access norton secure online backup parental control protect children surf web norton internet security version 1.0 mac released november 1 2000 identify remove windows mac viruses features include firewall advertisement blocking browser parental controls ability prevent confidential information transmitted outside computer users prompted information able transmitted incorporation aladdin systems iclean allows users purge browser cache cookies browsing history within norton interface operating system requirements call mac os 8.1 hardware requirements call 24 mb ram 12 mb disk space powerpc processor norton internet security version 2.0 mac released date unknown know please provide version 2.0 also ties whois database allowing users trace attacking computers users inform network administrators attacking computers corrective actions running mac os 8.1 9 powerpc processor 24 mb ram 25 mb free space required mac os x 10.1 powerpc g3 processor 128 mb ram 25 mb free space required norton internet security version 3.0 mac released date unknown know please provide subsequent release version 3.0 maintained feature set found version 2.0 firewall allocates internet access needed rather relying user input using predefined rules compatibility os 8 dropped running os 9.2 powerpc processor 24 mb ram 25 mb free space required os x 10.1.5 10.3 powerpc g3 128 mb ram 150 mb free space required however version 3.0 compatible mac os x 10.4 tiger version 4.0 released december 18 2008 symantec also markets bundle version 4.0 2009 version windows intended users microsoft windows mac os x installed iclean dropped release firewall blocks access malicious sites using blacklist updated symantec prevent attackers leveraging insecurities mac installed software exploit protection introduced release phishing protection introduced release well operating system requirements call mac os x 10.4.11 higher powerpc intel core processor 256 mb ram 150 mb free space required features norton internet security underwent considerable changes performance symantec rewrote code 2009 release norton products two running processes using 15 mb ram according passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pc magazine recognized 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 first place 2011 test conducted pc world norton internet security winner dennis technology labs tests sponsored symantec confirmed performance effectiveness norton 2011 2012 lines symantec compliance federal bureau investigation fbi whitelisted magic lantern keylogger actively developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response question whether magic lantern needed court order deployed said like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes unlike predecessor carnivore implementing magic lantern require physical access suspect computer would necessitate court order older versions norton hard slow uninstall leaving many traces sometimes completing errors however 2009 versions symantec featured uninstaller removes products better quickly usually less minute norton removal tool well known instrument removes norton products completely without trace tool downloaded symantec website symantec reports norton 2010 range products feature cleaner uninstall over-installs recommended update route 2011 link norton internet security 2008 installed users may encounter incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole symantec vice president general manager acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries also available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits often hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions
[ 2049, 2563, 5636, 10756, 8204, 9746, 1052, 9757, 550, 10790, 2601, 6699, 8753, 9780, 569, 7739, 9279, 576, 9791, 10308, 4165, 2118, 8283, 2654, 3167, 11368, 8816, 4722, 3702, 9341, 127, 7809, 131, 1172, 10903, 10392, 6297, 156, 2721, 2213...
Test
10,873
1
HeidiSQL:heidisql heidisql free open-source administration tool mysql forks well microsoft sql server postgresql codebase originally taken ansgar becker mysql-front 2.5 software due sold mysql-front branding unrelated party becker chose heidisql replacement name suggested friend tribute heidi klum reinforced becker nostalgia heidi girl alps version written java jheidi designed work mac linux computers discontinued march 2010 favor wine support ansgar becker began development mysql front-end 1999 naming project mysql-front used direct api layer written matthias fichtner interface mysql servers contained databases private development continued 2003 version 2.5 2004 period inactivity becker sold mysql-front branding nils hoyer continued development cloning original software april 2006 becker open-sourced application sourceforge renaming project heidisql heidisql re-engineered use newer popular database-interface layer zeoslib debuted version 3.0 database layer replaced single-unit approach october 2009 becker later extended supporting database servers support microsoft sql server added march 2011 7.0 release since 8.0 release heidisql offers gui 22 languages english translations contributed users various countries via transifex postgresql support introduced march 2014 9.0 release early 2018 slightly extended v9.5 release published microsoft store heidisql following gui features capabilities
[ 11392, 8195, 9868, 6797, 10258, 11030, 7453, 1950, 9503, 7339, 5677, 7983, 9010, 6721, 5964, 5198, 7506, 9687, 9177, 8539, 10459, 1632, 6245, 8295, 8683, 2413, 7022, 3188, 2810 ]
Test
10,874
7
GameSpy_Technology:gamespy technology gamespy technology also known gamespy industries inc. division glu mobile developer gamespy technology product suite middleware tools software services use computer video game industry gamespy technology acquired glu mobile 2012 company service shut may 2014 gamespy shut gamespy technology consisted array portable c sdks plug hosted web services provided following functionality game engines
[ 9732, 8937, 10316, 6797, 3792, 823 ]
Test
10,875
4
ZeroAccess_botnet:zeroaccess botnet zeroaccess trojan horse computer malware affects microsoft windows operating systems used download malware infected machine botnet remaining hidden using rootkit techniques zeroaccess botnet discovered least around may 2011 zeroaccess rootkit responsible botnet spread estimated present least 9 million systems estimates size botnet vary across sources antivirus vendor sophos estimated botnet size around 1 million active infected machines third quarter 2012 security firm kindsight estimated 2.2 million infected active systems bot spread zeroaccess rootkit variety attack vectors one attack vector form social engineering user persuaded execute malicious code either disguising legitimate file including hidden additional payload executable announces example bypassing copyright protection keygen second attack vector utilizes advertising network order user click advertisement redirects site hosting malicious software third infection vector used affiliate scheme third party persons paid installing rootkit system december 2013 coalition led microsoft moved destroy command control network botnet attack ineffective though c c seized peer-to-peer command control component unaffected meaning botnet could still updated system infected zeroaccess rootkit start one two main botnet operations bitcoin mining click fraud machines involved bitcoin mining generate bitcoins controller estimated worth 2.7 million us dollars per year september 2012 machines used click fraud simulate clicks website advertisements paid pay per click basis estimated profit activity may high 100,000 us dollars per day costing advertisers 900,000 day fraudulent clicks typically zeroaccess infects master boot record mbr infected machine may alternatively infect random driver c \windows\system32\drivers giving total control operating system also disables windows security center firewall windows defender operating system zeroaccess also hooks tcp/ip stack help click fraud software also looks tidserv malware removes finds
[ 1024, 3072, 5636, 10756, 4117, 8726, 535, 9761, 4644, 4133, 4648, 46, 10297, 3643, 7739, 1087, 9791, 1608, 3657, 8779, 81, 8789, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 3724, 6797, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 10952,...
Test
10,876
4
NEC_HYDRAstor:nec hydrastor nec hydrastor disk-based grid storage system data deduplication backups archiving developed nec corporation hydrastor storage system composed multiple nodes starting one 100+ nodes node contains standard hardware including disk drives cpu memory network interfaces integrated hydrastor software single storage pool hydrastor software incorporates multiple features distributed storage systems content-addressable storage global data deduplication variable block size rabin fingerprinting erasure codes data encryption load balancing hydrastor project started 2002 cezary dubnicki cristian ungureanu nec research princeton nj prototype version implemented evaluated 2004 another 3 years development first version hydrastor brought market us japan subsequent version improved software hardware released following years latest version hs8-5000 providing 72tb raw storage per node 11.88pb raw capacity maximum configuration hydrastor scaled single node 165 nodes multi-rack grid appliance capacity bandwidth scaled independently using different types nodes hydrastor supports online expansion automatic data migration downtime standard configuration hydrastor provides resiliency 3 concurrent disk node failures failures automatically detected data reconstruction automatically performed means time failures enough reconstruct data system withstand number
[ 8355, 3366, 5612, 3629, 8671 ]
None
10,877
8
GlassFish_Metro:glassfish metro metro opensource web service stack part glassfish project though also used stand-alone configuration components metro include jaxb ri jax-ws ri saaj ri stax sjsxp implementation wsit available cddl gplv2 classpath exception originally glassfish project developed two semi-independent projects june 2007 decided bundle two components single component named metro metro bundled java se 6 order allow consumers java se 6 consume web services metro bundled numerous application servers jaxb reference implementation developed metro used virtually every java web services framework apache axis2 codehaus xfire apache cxf application servers metro compares well web service frameworks terms functionality comparison provided codehaus compares apache axis 1.x axis 2.x celtix glue jbossws xfire 1.2 jax-ws ri wsit bundle yet named metro time
[ 4740, 10020, 1128, 8425, 3562, 3573, 1851, 7261 ]
None
10,878
2
IPad_Mini_2:ipad mini 2 ipad mini 2 stylized marketed ipad mini 2 previously marketed ipad mini retina display second-generation ipad mini tablet computer produced marketed apple inc design almost identical first generation ipad mini features internal revisions addition a7 system-on-a-chip 2,048 × 1,536 resolution retina display ipad mini 2 nearly hardware larger sibling ipad air apple released ipad mini 2 space gray silver colors november 12 2013 successor ipad mini 3 unveiled october 16 2014 featuring internals adding touch id differing storage sizes additional gold color ipad mini 2 discontinued march 21 2017 following press announcement new lower cost ipad replaces ipad air 2 ipad mini 2 first ipad mini support six major versions ios ios 7 ios 12 ipad mini 2 announced keynote yerba buena center arts october 22 2013 theme keynote named 'we still lot cover ipad mini 2 originally marketed ipad mini retina display however successor ipad mini 3 announced october 16 2014 apple started marketing former device ipad mini 2 ipad mini 2 comes ios 7 operating system released september 18 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colourful design act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad mini 2 bluetooth function attaches wireless keyboard headset allows user access wireless keyboard used apple pages writing program needs editing ipad mini 2 comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s enables users speak ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech ipad mini 2 ibooks application originally optional app though since release ios 8 comes pre-installed displays books epub-format content downloaded ibooks store several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad siri intelligent personal assistant knowledge navigator included application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store june 2 2014 announced ipad mini 2 would receive ios 8 update june 13 2016 announced ipad mini 2 support ios 10 update june 5 2017 also announced ipad mini 2 support ios 11 update apple announced ipad mini 2 support ios 12 update together apple a7 cousins make first ipad mini support six major versions ios ios 7 ios 12 longest supported ipad mini june 2019 apple announced drop support ipad mini 2 release ipados along a7 cousins ipad mini 2 sized 7.9-inch screen largely design first generation ipad mini 1st generation one notable change inclusion retina display matching screen resolution full-sized retina ipad models mini 2 features resolution ipad air makes mini 2 screen even pixel dense compared larger sibling slate-colored back panel first-generation ipad mini discontinued favor space gray lighter grey tone whilst silver color option still remained ipad mini 2 shares hardware components ipad air iphone 5s notably 64-bit apple a7 system-on-chip apple m7 motion processor mini 2 a7 system-on-chip clocked slightly slower otherwise one ipad air iphone 5s three released q4 2013 mini 2 uses home button predecessor therefore support touch id feature added succeeding ipad mini 3 mini 2 also includes 5 megapixel rear-facing camera 1.2 mp facetime hd front-facing camera support 802.11n estimated 10 hours battery life previous generations ipad hardware four buttons one switch ipad mini 2 device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings functioning either switch device silent mode lock/unlock orientation screen addition wifi version weighs 331 grams cellular model weighs 341 grams – slightly respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes audio playback ipad mini 2 stereo two speakers located either side lightning connector ipad mini 2 originally available 16 32 64 128gb internal flash memory expansion option however announcement ipad mini 3 october 16 2014 64 128gb versions ipad mini 2 discontinued september 7 2016 16gb model discontinued well final model 32gb discontinued march 21 2017 following unveiling new lower-cost ipad apple also sells camera connection kit sd card reader used transfer photos videos ipad mini 2 models connect wireless lan offer dual band wi-fi support also manufactured either without capability communicate cellular network tablet cellular model comes two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction mini 2 praised packing essentially hardware larger expensive ipad air significantly compact lighter featuring even pixel-dense screen keeping resolution despite smaller display 100 usd cheaper air mini 2 essentially rendered obsolete similarly-priced ipad 2 ipad 4 remained apple ipad lineup first year mini 2 availability budget alternative ipad air writing techradar gareth beavis awarded ipad mini 2 rating 4.5 5 beavis praises retina display a7 chip performance states design still best tablet category however criticize price increase website anandtech anand lal shimpi highly compliments design increased speed ipad mini 2 lamenting limited color palette stating ... ’ shame tradeoff exists two ipads especially given good apple srgb coverage nearly displays despite criticisms quality camera jeffrey van camp digital trends gave tablet score 4.5 5 writes ipad mini 2 favorite tablet 2013 powerful 64-bit a7 processor high-resolution ‘ retina ’ screen finishes job apple started first ipad mini addressing main complaints original mini under-powered processor low-resolution display like contemporary ipads mini 2 rear camera photo quality mediocre compared iphones ipad mini 2 also considerably expensive closest android competitor nexus 7 although mini 2 significantly powerful better build quality well apple larger tablet-specific app selection established ecosystem ipad mini 2 criticized thicker heavier original ipad mini also criticized taking longer time charge
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, 4220, ...
Test
10,879
2
Windows_Meeting_Space:windows meeting space windows meeting space codenamed windows shared view also referred windows collaboration peer-to-peer collaboration program developed microsoft windows vista replacement older windows netmeeting application however features microphone support ability set audio video conferences removed meeting space enables application sharing collaborative editing desktop sharing file sharing projecting simple text-based ink-based instant messaging across 10 users connected network across internet meeting space ability automatically set ad hoc wireless network connection network internet available also enables participants invite people meeting sessions one first applications new peer-to-peer infrastructure windows vista hence requires ipv6 meeting space available editions windows vista functionality unavailable starter edition home basic edition allows users join sessions meeting space exist edition windows 7 microsoft recommended microsoft office live meeting replacement meeting space result microsoft peer-to-peer collaboration efforts—with emphasis mobile computing—discussed windows hardware engineering conference 2004 windows vista codenamed longhorn time reported windows vista would enable users create ad hoc wireless networks file sharing discover people connected nearby meeting space relies functionality services meeting space demonstrated jim allchin darryn dieken professional developers conference pdc 2005 projected shared powerpoint presentation allchin stated demonstration illustrate functions application itself—development complete time—but illustrate select capabilities peer-to-peer framework windows vista later interview paul thurrott allchin expressed desire developers create applications supporting peer-to-peer capabilities starting session workspace contains presentation area displayed list notes also shown list users local subnet collaboration session started automatically detected using people near functionality based ws-discovery peer-to-peer networking implementation windows vista users outside local subnet must sent e-mail file invitation participate applications shared session local session application shared windows meeting space switches presentation mode participants see presenter working collaboratively edit review shared application instance
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 8798, 3170, 5225, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 8841, 6797, 2193, 98...
Test
10,880
4
ValidSoft:validsoft validsoft security software company providing telecommunications-based multi-factor authentication identity transaction verification technology company founded 2003 current ceo patrick carroll company provides business-to-business mobile security cloud security products including multi-factor authentication platform called smart secure mobile architecture real-time transactions uses mobile telecommunication channels devices includes proprietary voice biometric engine solutions designed reduce electronic fraud safeguard consumer privacy using internet mobile banking credit/debit card mobile fixed line telephony channels validsoft products designed verify authenticity parties transaction mutual authentication ensure fidelity telecommunication channels secure communications confirm integrity transactions transaction verification
[ 9488, 5433, 9356, 11244 ]
Validation
10,881
9
Peter_J._Weinberger:peter j. weinberger peter jay weinberger born august 6 1942 computer scientist best known early work bell labs works google weinberger undergraduate swarthmore college graduating 1964 received phd mathematics number theory 1969 university california berkeley derrick henry lehmer thesis entitled proof conjecture gauss class number two holding position department mathematics university michigan ann arbor continued work analytic number theory moved bell labs bell labs weinberger contributed design awk programming language w awk fortran compiler f77 detailed explanation contributions awk unix tools found interview transcript princeton university another interview sheds light work google interviews also confirm rumors involvement early digital photography especially abuse photograph face demonstrating digital imaging effects peter weinberger promoted head computer science research bell labs picture merged death star logo mid-80s creating pjw face image appeared innumerable locations including t-shirts coffee mugs cds least one water tower sole remaining pjw face bell labs somewhat disarray plans afoot repair prior joining google weinberger chief technology officer renaissance technologies weinberger member jason defense advisory group since 1990 erdos number 2
[ 515, 3468, 9298, 1783, 3960, 6617 ]
None
10,882
4
Key_ring_file:key ring file key ring file contains multiple public keys certificate authority ca key ring file necessary secure sockets layer ssl connection web securely stored server hosts website contains public/private key pair particular website also contains public/private key pairs various certificate authorities trusted root certificate various certification authorities entity website administrator send certificate signing request csr ca ca returns signed certificate entity certificate received ca stored key ring
[ 9744, 8674, 517 ]
Test
10,883
2
Transaction_Processing_Facility:transaction processing facility transaction processing facility tpf ibm real-time operating system mainframe computers descended ibm system/360 family including zseries system z9 tpf delivers fast high-volume high-throughput transaction processing handling large continuous loads essentially simple transactions across large geographically dispersed networks industrial-strength transaction processing systems notably ibm cics ims tpf specialty extreme volume large numbers concurrent users fast response times example visa credit card transaction processing peak holiday shopping season tpf passenger reservation application pars international version ipars used many airlines one tpf major optional components high performance specialized database facility called tpf database facility tpfdf close cousin tpf transaction monitor alcs developed ibm integrate tpf services common mainframe operating system mvs z/os tpf evolved airlines control program acp free package developed mid-1960s ibm association major north american european airlines 1979 ibm introduced tpf replacement acp — priced software product new name suggests greater scope evolution non-airline related entities tpf traditionally ibm system/370 assembly language environment performance reasons many tpf assembler applications persist however recent versions tpf encourage use c. another programming language called sabretalk born died tpf ibm announced delivery current release tpf dubbed z/tpf v1.1 september 2005 significantly z/tpf adds 64-bit addressing mandates use 64-bit gnu development tools gcc compiler dignus systems/c++ systems/c supported compilers z/tpf dignus compilers offer reduced source code changes moving tpf 4.1 z/tpf current users include sabre reservations visa inc. authorizations american airlines american express authorizations dxc technology shares reservations formerly eds hpes holiday inn central reservations amtrak marriott international travelport galileo apollo worldspan axess japan gds citibank air canada trenitalia reservations delta air lines reservations operations japan airlines tpf capable running multiprocessor systems one cpu within lpar cpus referred instruction streams simply i-streams running lpar one i-stream tpf said running tightly coupled tpf adheres smp concepts concept numa-based distinctions memory addresses exist depth cpu ready list measured incoming transaction received queued i-stream lowest demand thus maintaining continuous load balancing among available processors cases loosely coupled configurations populated multiprocessor cpcs central processing complex i.e physical machine packaged one system cabinet smp takes place within cpc described whereas sharing inter-cpc resources takes place described loosely coupled tpf architecture memory except 4kb-sized prefix area shared among i-streams instances memory-resident data must kept separated i-stream programmer typically allocates storage area number subsections equal number i-streams accesses desired i-stream associated area taking base address allocated area adding product i-stream relative number times size subsection tpf capable supporting multiple mainframes size — single i-stream multiple i-stream connecting operating common database currently 32 ibm mainframes may share tpf database system operation would called 32-way loosely coupled simplest loosely coupled system would two ibm mainframes sharing one dasd direct access storage device case control program would equally loaded core program record dasd could potentially accessed either mainframe order serialize accesses data records loosely coupled system practice known record locking must used means one mainframe processor obtains hold record mechanism must prevent processors obtaining hold communicate requesting processors waiting within tightly coupled system easy manage i-streams via use record hold table however lock obtained offboard tpf processor dasd control unit external process must used historically record locking accomplished dasd control unit via rpq known llf limited locking facility later ellf extended llf ellf replaced multipathing lock facility mplf run clustered loosely coupled z/tpf requires either mplf disk control units alternative locking device called coupling facility records absolutely must managed record locking process processor shared tpf record accesses done using record type ordinal defined record type tpf system 'fred gave 100 records ordinals processor shared scheme record type 'fred ordinal 5 would resolve exactly file address dasd — clearly necessitating use record locking mechanism processor shared records tpf system accessed via exactly file address resolve exactly location processor unique record one defined processor expected loosely coupled complex record type 'fred perhaps 100 ordinals however user 2 processors examines file address record type 'fred ordinal 5 resolves note different physical address used tpf general-purpose operating system gpos tpf specialized role process transaction input messages return output messages 1:1 basis extremely high volume short maximum elapsed time limits tpf built-in graphical user interface functionality tpf never offered direct graphical display facilities implement host would considered unnecessary potentially harmful diversion real-time system resources tpf user interface command-line driven simple text display terminals scroll upwards mouse-driven cursors windows icons tpf prime cras computer room agent set — best thought operator console character messages intended mode communications human users work accomplished via use command line similar unix without x several products available connect prime cras provide graphical interface functions tpf operator tpf operations server graphical interfaces end users desired must provided external systems systems perform analysis character content see screen scrape convert message to/from desired graphical form depending context specialized purpose operating system tpf host compiler/assembler text editor implement concept desktop one might expect find gpos tpf application source code commonly stored external systems likewise built offline starting z/tpf 1.1 linux supported build platform executable programs intended z/tpf operation must observe elf format s390x-ibm-linux using tpf requires knowledge command guide since support online command directory man /help facility users might accustomed commands created shipped ibm system administration tpf called functional messages -- commonly referred z-messages prefixed letter z letters reserved customers may write commands tpf implements debugging distributed client-server mode necessary system headless multi-processing nature pausing entire system order trap single task would highly counter-productive debugger packages developed 3rd party vendors took different approaches break/continue operations required tpf host implementing unique communications protocols used traffic human developer running debugger client server-side debug controller well form function debugger program operations client side two examples 3rd party debugger packages step step trace bedford associates cmstpf tpf/gi ztpfgi tpf software inc.. neither package wholly compatible ibm offering ibm debugging client offering packaged ide called ibm tpf toolkit tpf highly optimized permit messages supported network either switched another location routed application specific set programs permit extremely efficient accesses database records historically data tpf system fit fixed record core block sizes 381 1055 4k bytes due part physical record sizes blocks located dasd much overhead saved freeing part operating system breaking large data entities smaller ones file operations reassembling read operations since ibm hardware i/o via use channels channel programs tpf would generate small efficient channel programs i/o — name speed since early days also placed premium size storage media — memory disk tpf applications evolved powerful things using little resource today much limitations removed fact legacy support smaller-than-4k dasd records still used advances made dasd technology read/write 4k record efficient 1055 byte record advances increased capacity device longer premium placed ability pack data smallest model possible tpf also program segments allocated 381 1055 4k byte-sized records different points history segment consisted single record typically comprehensive application requiring perhaps tens even hundreds segments first forty years tpf history segments never link-edited instead relocatable object code direct output assembler laid memory internally self-referential relocatable symbols resolved entire image written file later loading system created challenging programming environment segments related one another could directly address control transfer implemented enter/back system service acp/tpf earliest days circa 1965 memory space severely limited gave rise distinction file-resident core-resident programs -- frequently used application programs written memory never removed core-residency rest stored file read demand backing memory buffers released post-execution introduction c language tpf version 3.0 first implemented conformant segment conventions including absence linkage editing scheme quickly demonstrated impractical anything simplest c programs tpf 4.1 truly fully linked load modules introduced tpf compiled z/os c/c++ compiler using tpf-specific header files linked iewl resulting z/os-conformant load module manner could considered traditional tpf segment tpf loader extended read z/os-unique load module file format lay file-resident load modules sections memory meanwhile assembly language programs remained confined tpf segment model creating obvious disparity applications written assembler written higher level languages hll z/tpf 1.1 source language types conceptually unified fully link-edited conform elf specification segment concept became obsolete meaning program written source language -- including assembler -- may size furthermore external references became possible separate source code programs segments could directly linked together shared object value point critical legacy applications benefit improved efficiency simple repackaging -- calls made members single shared object module much shorter pathlength run time compared calling system enter/back service members shared object may share writeable data regions directly thanks copy-on-write functionality also introduced z/tpf 1.1 coincidentally reinforces tpf reentrancy requirements concepts file- core- residency also made obsolete due z/tpf design point sought programs resident memory times since z/tpf maintain call stack high-level language programs gave hll programs ability benefit stack-based memory allocation deemed beneficial extend call stack assembly language programs optional basis ease memory pressure ease recursive programming z/tpf executable programs packaged elf shared objects historically step previous core blocks— memory— also 381 1055 4 k bytes size since memory blocks size overhead obtaining memory found systems discarded programmer merely needed decide size block would fit need ask tpf would maintain list blocks use simply hand first block available list physical memory divided sections reserved size 1055 byte block always came section returned overhead needed add address appropriate physical block table list compaction data collection required applications got advanced demands memory increased c became available memory chunks indeterminate large size required gave rise use heap storage memory management routines ease overhead tpf memory broken frames— 4 kb size 1 mb z/tpf application needs certain number bytes number contiguous frames required fill need granted
[ 2560, 5120, 6148, 6664, 6155, 6675, 7187, 10776, 25, 4637, 10273, 9762, 4643, 6180, 5158, 7217, 10803, 7733, 9784, 10809, 4668, 573, 6207, 576, 2625, 8262, 6221, 3160, 10333, 97, 11363, 5220, 9829, 1126, 6248, 6760, 8298, 9835, 10856, 728...
Test
10,884
2
GeeksPhone_Keon:geeksphone keon geeksphone keon entry-level smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers keon higher-end peak first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours
[ 7492, 9863, 5963, 9964, 1776, 2259, 8919, 9913, 1083 ]
None
10,885
9
PostScript_Printer_Description:postscript printer description postscript printer description ppd files created vendors describe entire set features capabilities available postscript printers ppd also contains postscript code commands used invoke features print job ppds function drivers postscript printers providing unified interface printer capabilities features example generic ppd file models hp color laserjet contains specifies printer understands postscript level 2 color device forth ppd describe allowable paper sizes memory configurations minimum font set printer even specify tree-based user interface printer-specific configuration ppd also often called postscript page description instead printer description postscript concept page devices postscript page description configuration read saved ppd file cups uses ppd drivers postscript printers even extended concept allow postscript printing non-postscript printing devices directing output cups filter file longer standard ppd rather cups-ppd cups clients usually read current ppd file server every time new print job created microsoft windows also uses ppd files converts binary .bpd file format using normally stored c \windows\system32\spool\drivers\w32x86\3 x86 system c \windows\system32\spool\drivers\x64\3 64 bit system updating ppd files requires removing reinstalling printer mime type cups variant ppd application/vnd.cups.ppd
[ 3974, 7626, 6797, 6830, 10352, 3921, 8628, 1877 ]
Test