node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
10,986 | 7 | My_Windows_Phone:windows phone windows phone previously windows phone live free online companion service windows phone mobile devices microsoft service released conjunction launch windows phone 7 october 21 2010 provides users free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments photos onenote notebooks various tightly-integrated windows live services including people outlook.com calendar microsoft onedrive users access manage information stored windows phone devices via password protected online portal using microsoft account windows phone also includes find phone service facilitates tracking lost stolen phone internet messages similar phone finder services various names available families smartphones similar service windows mobile devices available microsoft phone withdrawn 2011 service updated september 27 2011 conjunction release windows phone 7.5 mango update adding support microsoft scrapbook account management features including viewing app purchase history reinstall apps windows phone store windows phone 8 apollo update windows phone also added family feature allowing parents manage child accounts running windows phone 8 february 2015 microsoft moved find phone feature windows phone site microsoft account website preparation windows 10 windows phone offers following features | [
4704,
5057,
7456,
11559,
2443,
430,
4624,
10388,
6709,
254,
9434,
1083,
2589,
2046
] | Test |
10,987 | 4 | PC_Tools_(company):pc tools company pc tools founded 2003 formerly known winguides.com software company acquired symantec 2008 new owner eventually discontinued pc tools name company headquarters australia offices luxembourg united states united kingdom ireland ukraine company previously developed distributed security optimization software mac os x microsoft windows platforms 29 november 2006 software owned pc tools downloaded 125 million times pc tools browser defender also called browser defender short browser toolbar internet explorer mozilla firefox browsers windows based computers browser defender allows safe web surfing iantivirus updated 2012 rebranded symantec norton brand pc tools iantivirus free antivirus software intel based apple macintosh computers running mac os 10.5 leopard mac os 10.6 snow leopard initially released june 2008 used detect remove malware spyware malicious exploits using signature-based heuristic detection iantivirus criticized scans macintosh viruses ignoring windows linux viruses praised speed low usage system resources pc tools internet security combination spyware doctor product firewall product anti spam product provided functionality three stand alone products single seamless product symantec longer offering product 18 may 2013 payware designed windows 8 32-/64-bit windows 7 32-/64-bit windows vista 32-/64-bit windows xp 32-bit pc tools registry mechanic first software pc tools released scanned windows registry find errors version 11 released 31 october 2011 last one pc tools spyware doctor anti-malware software spyware doctor detects malware based indicators compromise using spider technology recent version spyware doctor 9 released 31 october 2011 symantec longer offering product 18 may 2013 pc tools spyware doctor antivirus features spyware doctor added anti-virus capabilities symantec sold since 2013 v9 last one available threatexpert web site says advanced automated threat analysis system initialized atas built analyze report actions malware fully automated mode latest version beta version 1.0.1.0 1 march 2008 updates since march 2008 web site seems inactive 18 august 2008 symantec announced signing agreement acquire pc tools pc tools would maintain separate operations financial terms acquisition disclosed symantec acquired pc tools us 262,000,000 6 october 2008 symantec withdrew entire pc tools security portfolio comprising pc tools internet security spyware doctor spyware doctor antivirus 18 may 2013 pc tools sold could renewed 4 december 2013 symantec said would affect pc tools utilities products spyware doctor received pc world best buy award october 2007 issue magazine saying pc tools spyware doctor 5.0 winner outperforming competition detecting removing test set adware spyware samples spyware doctor received several editors choice awards pc magazine including one spyware doctor antivirus 5.5 2008 product also received numerous awards around globe reviews positive early versions spyware doctor 5.0 company rewrote scratch received negative commentary cnet download.com reviews justifies 3-star rating saying trial scans spyware doctor repeatedly flagged several dozen harmless cookies potential threats antispyware product tested also unable learn threat spyware doctor flagged symantec unsuccessfully sued washington resident running fake scans get people pay subscriptions pc tools registry mechanic performance toolkit norton utilities lawsuit claims company intentionally ran fake scans results real new wrinkle adware using stolen certificates disables anti-malware virus protection technical remedies available | [
1792,
2049,
4480,
6797,
3473,
1172,
9496,
10392,
3482,
1436,
4511,
6431,
5924,
2213,
550,
8998,
10790,
1708,
3885,
8753,
823,
569,
5178,
11577,
3065,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10708,
4568,
9048,
2907,
6364,
... | Train |
10,988 | 7 | ZetaGrid:zetagrid zetagrid one time largest distributed computing project designed explore roots riemann zeta function checking one billion roots day roots zeta function particular interest mathematics since presence even single one line rest would disprove riemann hypothesis far-reaching consequences mathematics far every single one failed provide counterexample riemann hypothesis project ended november 2005 due instability hosting provider 10 first zeroes checked results analyzed project administrator stated posted american mathematical society website | [] | Test |
10,989 | 2 | List_of_features_removed_in_Windows_8:list features removed windows 8 windows 8 version windows nt successor windows 7 several features present windows vista windows 7 longer present windows 8 | [
2432,
641,
8576,
3463,
651,
5643,
6797,
8080,
8976,
10896,
11283,
2196,
10900,
4248,
4505,
11677,
5281,
4515,
8227,
11301,
3496,
6441,
6697,
1581,
3250,
3890,
5300,
9910,
5435,
6972,
6462,
7615,
321,
7106,
582,
200,
1098,
1741,
10957,
392... | Test |
10,990 | 4 | ShieldsUP:shieldsup shieldsup online port scanning service created steve gibson gibson research corporation purpose utility alert users ports opened firewalls nat routers utility scan common file sharing ports well service ports 1-1056 user defined ports sets 64 often recommended checking port vulnerabilities scanning servers static ip addresses 4.79.142.192 4.79.142.207 | [
6993,
11051
] | Validation |
10,991 | 9 | TypeScript:typescript typescript open-source programming language developed maintained microsoft strict syntactical superset javascript adds optional static typing language typescript designed development large applications transcompiles javascript typescript superset javascript existing javascript programs also valid typescript programs typescript may used develop javascript applications client-side server-side node.js execution multiple options available transcompilation either default typescript checker used babel compiler invoked convert typescript javascript typescript supports definition files contain type information existing javascript libraries much like c++ header files describe structure existing object files enables programs use values defined files statically typed typescript entities third-party header files popular libraries jquery mongodb d3.js typescript headers node.js basic modules also available allowing development node.js programs within typescript typescript compiler written typescript compiled javascript licensed apache 2.0 license typescript included first-class programming language microsoft visual studio 2013 update 2 later beside c microsoft languages official extension allows visual studio 2012 support typescript well anders hejlsberg lead architect c creator delphi turbo pascal worked development typescript typescript first made public october 2012 version 0.8 two years internal development microsoft soon announcement miguel de icaza praised language criticized lack mature ide support apart microsoft visual studio available linux os x time today support ides particularly eclipse via plug-in contributed palantir technologies various text editors including emacs vim sublime webstorm atom microsoft visual studio code also support typescript typescript 0.9 released 2013 added support generics typescript 1.0 released microsoft build developer conference 2014 visual studio 2013 update 2 provides built-in support typescript july 2014 development team announced new typescript compiler claiming 5× performance gains simultaneously source code initially hosted codeplex moved github 22 september 2016 typescript 2.0 released introduced several features including ability programmers optionally prevent variables assigned values sometimes referred billion-dollar mistake typescript originated shortcomings javascript development large-scale applications microsoft among external customers challenges dealing complex javascript code led demand custom tooling ease developing components language typescript developers sought solution would break compatibility standard cross-platform support knowing current ecmascript standard proposal promised future support class-based programming typescript based proposal led javascript compiler set syntactical language extensions superset based proposal transforms extensions regular javascript sense typescript preview expect ecmascript 2015 unique aspect proposal added typescript optional static typing enables static language analysis facilitates tooling ide support typescript adds support features classes modules arrow function syntax defined ecmascript 2015 standard typescript language extension adds features ecmascript 6 additional features include following features backported ecmascript 2015 syntactically typescript similar jscript .net another microsoft implementation ecma-262 language standard added support static typing classical object-oriented language features classes inheritance interfaces namespaces typescript strict superset ecmascript 2015 superset ecmascript 5 commonly referred javascript javascript program also valid typescript program typescript program seamlessly consume javascript default compiler targets ecmascript 5 current prevailing standard also able generate constructs used ecmascript 3 2015 typescript possible use existing javascript code incorporate popular javascript libraries call typescript-generated code javascript type declarations libraries provided source code typescript provides static typing type annotations enable type checking compile time optional ignored use regular dynamic typing javascript annotations primitive types codice_1 codice_2 codice_3 weakly- dynamically-typed structures type codice_4 type annotations exported separate declarations file make type information available typescript scripts using types already compiled javascript annotations declared existing javascript library done node.js jquery typescript compiler makes use type inference infer types types given example codice_5 method code would inferred returning codice_1 even return type annotation provided based static types codice_7 codice_8 codice_9 compiler knowledge result adding two codice_9 always codice_1 however explicitly declaring return type allows compiler verify correctness type inferred lack declarations defaults dynamic codice_4 type value codice_4 type supports operations value javascript minimal static type checking performed operations codice_4 values typescript script gets compiled option generate declaration file extension codice_15 functions interface components compiled javascript process compiler strips away function method bodies preserves signatures types exported resulting declaration file used describe exported virtual typescript types javascript library module third-party developer consumes typescript concept declaration files analogous concept header file found c/c++ type declaration files written hand existing javascript libraries done jquery node.js large collections declaration files popular javascript libraries hosted github definitelytyped typescript supports ecmascript 2015 classes integrate optional type annotations support typescript supports generic programming typescript distinguishes modules namespaces features typescript support encapsulation classes interfaces functions variables containers namespaces formerly internal modules utilize immediately-invoked function expression javascript encapsulate code whereas modules formerly external modules leverage javascript library patterns amd commonjs typescript compiler named codice_16 written typescript result compiled regular javascript executed javascript engine e.g browser compiler package comes bundled script host execute compiler also available node.js package uses node.js host also alpha version client-side compiler javascript executes typescript code fly upon page load current version compiler supports ecmascript 5 default option allowed target ecmascript 2015 make use language features exclusive version e.g generators classes despite part ecmascript 2015 standard available modes using plug-ins typescript integrated build automation tools including grunt grunt-ts apache maven typescript maven plugin gulp gulp-typescript gradle typescript gradle plugin tslint scans typescript code conformance set standards guidelines eslint standard javascript linter also provided support typescript via community plugins however eslint inability leverage typescript language services precluded certain forms semantic linting program-wide analysis early 2019 tslint team announced linter deprecation favor codice_17 joint effort tslint eslint typescript teams consolidate linting eslint umbrella improved performance community unity developer accessibility | [
10243,
6154,
4623,
10769,
9234,
1043,
9245,
3102,
1055,
6176,
2083,
8227,
1577,
5677,
4143,
9263,
9780,
1077,
6709,
8246,
11316,
8251,
574,
6718,
8262,
4171,
4174,
4178,
83,
84,
6228,
9813,
603,
608,
2145,
8289,
5219,
1130,
1656,
3705,
... | Test |
10,992 | 5 | GPRP:gprp gprp global position routing protocol internet routing protocol like ipv4 ipv6 uses spatial position determined gps host network establish routes host intended supplement ultimately replace traditional internet routing protocols requires cooperation many luminal-speed radio fiber optic hosts route packets efficient way straight line protocol consists mainly concepts ipv4 removing abstraction layer routing table ip address simpler model attempts send packets close straight line possible since change introduces physical constraints geometry network special techniques implemented overcome problems dead zones project began submission 2008 google contest ted coffman goals democratizing internet away need isps vulnerable regulation world governments interest generated idea submitted reddit.com internet community little feedback reddit nothing done concept two years january 2011 coffman decided move forward development due recent surge open platform smart phones wi-fi gps built right coffman sees perfect medium widespread implementation gprp january 2011 gprp c++ class developed tested ted coffman maintain backward-compatibility current internet framework ipv4 gateways discovered using similar techniques dns lookups many traditional ipv4 concepts considered physical forms gprp | [
5469,
5470
] | None |
10,993 | 2 | Windows_Resource_Protection:windows resource protection windows resource protection feature windows vista replaces windows file protection protects registry keys folders addition critical system files way protects resources differs entirely method used windows file protection windows resource protection works registering notification file changes winlogon changes detected protected system file modified file restored cached copy located compressed folder windir \system32\dllcache windows resource protection works setting discretionary access control lists dacls access control lists acls defined protected resources permission full access modify wrp-protected resources restricted processes using windows modules installer service trustedinstaller.exe administrators longer full rights system files use setupapi take ownership resource add appropriate access control entries aces modify replace trusted installer account used secure core operating system files registry keys windows resource protection protects large number file types wrp also protects several critical folders folder containing wrp-protected files may locked trusted installer able create files subfolders folder folder may partially locked enable administrators create files subfolders folder essential registry keys installed windows vista also protected key protected wrp sub-keys values protected also wrp copies files needed restart windows cache directory located windir \winsxs\backup critical files needed restart windows copied cache directory unlike windows file protection cached entire set protected file types dllcache folder size cache directory list files copied cache modified windows resource protection applies stricter measures protect files result windows file protection available windows vista order replace single protected file windows file protection disabled completely windows resource protection works per-item basis setting acls therefore taking ownership single item particular item replaced items remain protected system file checker also integrated wrp windows vista sfc.exe used check specific folder paths including windows folder boot folder | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
3723,
6797,
2193,
9... | Test |
10,994 | 9 | IgniteFusion:ignitefusion ignitefusion freeware cfml script engine runs cfm script files similar perl php script engines ignitefusion script engine runs executable server cfml engines include adobe coldfusion new atlanta bluedragon railo lucee coral web builder coldfusion | [
4512,
5314,
8644,
8262,
8582,
9144,
5048,
4507
] | Test |
10,995 | 7 | BitChute:bitchute bitchute video hosting service uses peer-to-peer webtorrent technology founded way avoid content rules enforced platforms like youtube creators banned channels demonetized barred receiving advertising revenue youtube migrated bitchute platform accommodates far-right individuals conspiracy theorists southern poverty law center accuses site hosting hate-fueled material company launched ray vahey january 2017 based peer-to-peer webtorrent system javascript torrenting program run web browser users watch video also seed bitchute rely advertising users send payments video creators directly november 2018 bitchute banned paypal alex jones proud boys tommy robinson several anti-fascists also banned time january 2019 bitchute announced post gab would move domains epik small domain registrar known accepting registration websites host far-right content bitchute accommodated far-right groups individuals criticized southern poverty law center hosting hate-fueled material conflict youtube right-wing video creators inclusion hate speech misinformation videos youtube responded cases banning creators blocking videos channel demonetization vahey described bitchute alternative option avoid bannings demonetization tweaking algorithms send certain content obscurity views increased levels censorship established services like youtube users groups banned youtube migrated bitchute including alex jones far-right conspiracy theory channel infowars prominent far-right alt-right video creators banned youtube cross-post videos bitchute including lauren southern stefan molyneux millennial woes paul joseph watson | [
10368,
3428,
708,
3462,
3813,
10924,
7761,
82,
8244,
11029,
11413,
4120,
441,
8413,
10270,
735
] | None |
10,996 | 4 | INVITE_of_Death:invite death invite death type attack voip-system involves sending malformed otherwise malicious sip invite request telephony server resulting crash server telephony usually critical application damage causes significant disruption users poses tremendous acceptance problems voip kinds attacks necessarily affect sip-based systems implementations vulnerabilities voip area affected dos attack also transported messages invite example december 2007 report vulnerability bye message bye bye using obsolete header name also however sending invite packets popular way attacking telephony systems name reference ping death attack caused serious trouble 1995-1997 invite death vulnerability found february 16 2009 vulnerability allows attacker crash server causing remote denial service dos sending single malformed packet impersonator using malformed packet overflow specific string buffers add large number token characters modify fields illegal fashion result server tricked undefined state lead call processing delays unauthorized access complete denial service problem specifically exists opensbc version 1.1.5-25 handling “ via ” field maliciously crafted sip packet invite death packet also used find new vulnerability patched opensbc server network dialog minimization popular open source-based asterisk pbx security advisories cover signaling-related problems also problems protocols resolution problems may malformed sdp attachments codex numbers valid range obsolete headers “ also ” invite death specifically problem operators run servers public internet sip allows usage udp packets easy attacker spoof source address internet send invite death untraceable locations sending kinds requests periodically attackers completely interrupt telephony service choice service provider upgrade systems attack crash system anymore large number voip vulnerabilities exist ip phones dos attacks voip phones less critical attacks central devices like ip-pbx usually endpoint affected | [
3024,
10271,
11671,
6735
] | Test |
10,997 | 4 | Kiss_(cryptanalysis):kiss cryptanalysis cryptanalysis kiss pair identical messages sent using different ciphers one broken term used bletchley park world war ii deciphered message breakable system provided crib piece known plaintext could used read unbroken messages one example messages read german meteorological cipher could used provide cribs reading difficult 4-wheel naval enigma cipher | [
9156,
1941
] | None |
10,998 | 1 | Data_system:data system data system term used refer organized collection symbols processes may used operate symbols organised collection symbols symbol-manipulating operations considered data system hence human-speech analysed level phonemes considered data system incan artefact khipu image stored pixels data system defined terms data model bears resemblance idea physical symbol system symbols within data systems may persistent hence sounds human speech non-persistent symbols decay rapidly air contrast pixels stored peripheral storage device persistent symbols education data system computer system aims provide educators student data help solve educational problems examples data systems include student information systems siss assessment systems instructional management systems imss data-warehousing systems distinctions different types data systems blurring separate systems begin serve functions data systems present data educators over-the-counter data format embed labels supplemental documentation help system make key package/display content decisions improve accuracy data system users ’ data analyses | [] | Validation |
10,999 | 3 | Nobunaga's_Ambition:nobunaga ambition games franchise released nintendo entertainment system game boy mega drive 3do super nes playstation sega saturn playstation 2 playstation 3 xbox 360 wii playstation portable playstation vita playstation 4 nintendo switch title also released macintosh well msx amiga ms-dos march 2018 series shipped 10 million copies worldwide player may choose four campaign scenarios including battle east beginning 1560 daimyo power struggles 1560 ambition untamed 1571 road towards unification 1582 scenario player must allocate resources raise capable military force provide productive economy support military civilian expansion support peasants order sustain respect loyalty gameplay taken turns turn map view corresponding season turn battle corresponding day player may achieve victory numerous means among forcing enemy retreat destroying enemy command unit outlasting invading force prolonging battle opposing force exhausted supplies player make many choices campaign according evan brooks computer gaming world one may transfer soldiers fiefs go war increase taxes causes decrease peasant loyalty may lead rebellion transfer rice gold another fief raise level flood control decreases productivity make non-aggression pact arrange marriage cultivate increases productivity decreases peasant loyalty use merchant buy/sell rice borrow funds purchase weapons recruit military soldiers ninja train army increases fighting efficiency spy rival expand town increases taxes collected decreases peasant loyalty give food/rice peasants/soldiers raise morale steal peasants rival daimyos allocate military strength recuperate even daimyo get sick turn controlled fief computer administration pass turn sony playstation vita released asia traditional chinese versions physically copies versions without power kit top japanese versions released nobunaga ambition series garnered several awards years according koei website various releases series log-in magazine bhs prize minister post telecommunications prize nikkei bp 12th 13th 14th annual best pc software awards cd-rom fan fan year 2001 grand prize north america released five years japanese release critical reception also positive game positively reviewed computer gaming world reviewer evan brooks gave four stars five introduced game detailed economic diplomatic political military simulation unification japan sixteenth century praised graphics among best reviewer ever seen ibm 5x10 hex map battles noted used role-playing game elements including assigning various statistics selected persona time system turn represents year daimyo ages eventually dies old age multiplayer option stated thoroughly enjoyed nobunaga ambition concluded highly recommended rating compute similarly praised ibm pc version calling one best strategic war games ever designed personal computer citing game play user interface documentation console versions lukewarm reception reviewing snes version gamepro praised control interface combat system opined game essentially offers nothing set apart koei previous historical simulators magazine rated genesis version similarly saying like koei games nobunaga easy-to-use detailed menu-driven interface activates load complex commands 1996 next generation listed series collectively number 34 top 100 games time commenting lead designer shou kibasawa tactical genius realizes domestic military strategies interconnected fielding armies accomplished building infrastructure support result nobunaga ambition boasts level strategic complexity series come close matching | [
1120,
10273,
4706,
8937,
3180,
6797,
9006,
9166,
400,
10316,
9077,
3325
] | None |
11,000 | 5 | NetNewsWire:netnewswire netnewswire news aggregator macos netnewswire developed brent sheila simmons company ranchero software introduced july 12 2002 netnewswire lite free version missing advanced features commercial version introduced weeks later version 1.0 released february 11 2003 version 2.0 released may 2005 time included custom feed views custom downloading opening podcasts synchronization feeds feed status computers bloglines support built-in tabbed browser october 2005 newsgator bought netnewswire bringing newsgator online rss synchronization service mac brent simmons hired newsgator continue developing software netnewswire 3.0 released june 5 2007 version added spotlight indexing news items integration ical iphoto address book voodoopad growl support new user interface performance enhancements application originally shareware became free release netnewswire 3.1 january 10 2008 netnewswire lite discontinued time netnewswire 3.2 moved advertisement-supported model option purchase application remove ads ios version netnewswire support iphone ipod touch later ipad released first day app store includes syncing unread articles desktop version netnewswire lite 4.0 introduced march 3 2011 mac app store misses several advanced features included netnewswire 3.2 includes completely rewritten code base future used ios versions app netnewswire 4.0 shareware june 3 2011 acquisition netnewswire black pixel announced two years development apparently stalled gap updates 2011 release version 4 open beta june 24 2013 netnewswire 4.0 announced released open beta black pixel announcement also brought news product would commercial product free component though beta would free use final release final release netnewswire 4.0 occurred september 3 2015 august 31 2018 black pixel announced returned netnewswire intellectual property brent simmons september 1 2018 brent simmons released netnewswire 5.0d1 renamed version open source mac rss reader netnewswire well regarded many users reviewers according feedburner netnewswire popular desktop newsreader platforms 2005 software received macworld editor choice award 2003 2005 maintained 4.8 five stars rating among reviewers versiontracker cnet ars technica called netnewswire built-in browser hands-down best mac newsreader walter mossberg technology columnist wall street journal said netnewswire favorite mac | [
1664,
3971,
9732,
8584,
4490,
6539,
10126,
11418,
2076,
1960,
1834,
4013,
559,
7983,
9908,
7488,
1346,
10057,
5205,
4310,
5078,
6231,
6237,
10722,
5605,
231,
9063,
8169,
9451,
8557,
5114
] | Test |
11,001 | 5 | Remote_Shell:remote shell remote shell rsh command line computer program execute shell commands another user another computer across computer network remote system rsh connects runs rsh daemon rshd daemon typically uses well-known transmission control protocol tcp port number 514 rsh originated part bsd unix operating system along rcp part rlogin package 4.2bsd 1983. rsh since ported operating systems rsh command name another common unix utility restricted shell first appeared pwb/unix system v release 4 restricted shell often located /usr/bin/rsh described rlogin article rsh protocol secure network use sends unencrypted information network among reasons implementations also authenticate sending unencrypted passwords network rsh largely replaced secure shell ssh program even local networks example rsh use following executes command mkdir testdir user remoteuser computer host.example.com running unix-like system command finished rsh terminates command specified rsh log remote system using rlogin network location remote computer looked using domain name system | [
2947,
260,
10631,
10387,
8992,
10924,
7983,
311,
8504,
5433,
9151,
8386,
2887,
6993,
2132,
10341,
5225,
10732,
2558
] | None |
11,002 | 5 | List_of_Internet_chess_servers:list internet chess servers list notable internet chess servers | [
469
] | None |
11,003 | 9 | Duff's_device:duff device c programming language duff device way manually implementing loop unrolling interleaving two syntactic constructs c loop switch statement discovery credited tom duff november 1983 duff working lucasfilm used speed real-time animation program loop unrolling attempts reduce overhead conditional branching needed check whether loop done executing batch loop bodies per iteration handle cases number iterations divisible unrolled-loop increments common technique among assembly language programmers jump directly middle unrolled loop body handle remainder duff implemented technique c using c case label fall-through feature jump unrolled body duff problem copy 16-bit units shorts c implementations array memory-mapped output register denoted c pointer original code k r c looked follows code assumes initial pointer incremented would required memory-to-memory copy always divisible eight unrolling loop eight-fold would produce following duff realized handle cases divisible eight assembly programmer technique jumping loop body could implemented interlacing structures switch statement loop putting switch labels points loop body correspond remainder duff device similarly applied size unrolled loop eight example based algorithm used widely programmers coding assembly minimizing number tests branches copy duff device appears place implemented c. device valid c virtue two attributes c leads jargon file calls dramatic use yet seen fall c c default fall-through case statements long one controversial features duff said code forms sort argument debate 'm sure whether basic idea loop unrolling number instructions executed loop reduced reducing number loop tests sometimes reducing amount time spent loop example case loop single instruction block code loop test typically performed every iteration loop every time instruction executed instead eight copies instruction placed loop test performed every eight iterations may gain time avoiding seven tests however handles multiple eight iterations requiring something else handle remainder iterations duff device provides solution first performing remainder iterations followed iterating many times necessary multiple eight similar instructions determine number remainder iterations code first calculates total number iterations modulo eight according remainder program execution jump codice_1 statement followed exactly number iterations needed done everything straightforward code continues iterations groups eight instructions become possible since remaining number iterations multiple eight duff device provides compact loop unrolling using case keyword inside outside loop unusual contents case statement traditionally thought block code nested inside case statement reader would typically expect end next case statement according specifications c language necessary indeed case statements appear anywhere inside switch code block depth program execution simply jump next statement wherever may many compilers optimize switch jump table would done assembly implementation primary increase speed versus simple straightforward loop comes loop unwinding reduces number performed branches computationally expensive due need flushand hence stallthe instruction pipeline codice_2 statement used handle remainder data evenly divisible number operations unrolled example eight byte moves unrolled codice_2 handles extra 1–7 bytes automatically automatic handling remainder may best solution systems compilers cases two loops may actually faster one loop unrolled main copy second loop handle remainder problem appears come ability compiler correctly optimize device may also interfere pipelining branch prediction architectures numerous instances duff device removed xfree86 server version 4.0 improvement performance noticeable reduction size executable. ref name= lkml-0008.2/0171 /ref therefore considering code program optimization may worth running benchmarks verify actually fastest code target architecture target optimization level target compiler well weighing risk optimized code later used different platforms fastest code purpose memory-to-memory copies mentioned original use duff device standard c library provides function codice_4 perform worse memory-to-memory copy version code may contain architecture-specific optimizations make significantly faster | [
477,
10469,
9739,
10796,
4877,
5236,
2036,
2045
] | Test |
11,004 | 0 | DialogOS:dialogos dialogos graphical programming environment design computer system converse voice user dialogs clicked together flowchart dialogos includes bindings control lego mindstorms robots voice bindings sql databases well generic plugin architecture integrate types backends dialogos used computer science courses schools universities teach programming introduce beginners basic principles human/computer interaction dialog design also used research systems dialogos initially developed commercially clt sprachtechnologie gmbh liquidation 2017 rights acquired saarland university software released open-source dialogos control lego mindstorms nxt series uses sensor-nodes obtain values following sensors | [
4768,
3533,
7983,
214,
823,
6838,
2590
] | Test |
11,005 | 9 | Radhia_Cousot:radhia cousot radhia cousot 6 august 1947 – 1 may 2014 french computer scientist known inventing abstract interpretation radhia cousot born 6 august 1947 sakiet sidi youssef tunisia survived went sousse algiers polytechnic school algiers ranked 1st woman specialized mathematical optimization integer linear programming supported unesco fellowship 1972–1975 obtained master degree computer science joseph fourier university grenoble 1972 obtained mathematics nancy 1985 supervision radhia cousot appointed associate research scientist imag laboratory joseph fourier university grenoble 1975–1979 1980 centre national de la recherche scientifique junior research scientist research scientist senior research scientist senior research scientist emerita computer science laboratories henri poincaré university nancy 1980–1983 university paris-sud orsay 1984–1988 école polytechnique 1989–2008 1991 headed research team “ semantics proof abstract interpretation ” école normale supérieure 2006–2014 together husband patrick radhia cousot originator abstract interpretation influential technique formal methods abstract interpretation based three main ideas thesis radhia cousot advanced semantics proof static analysis methods concurrent parallel programs radhia cousot origin contacts airbus january 1999 lead development astrée run-time error analyzer 2001 onwards tool sound static program analysis embedded control/command software developed école normale supérieure distributed absint gmbh german software company specialized static analysis astrée used transportation space medical software industries patrick cousot received acm sigplan programming languages achievement award 2013 ieee computer society ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” since september 2014 radhia cousot best young researcher paper award attributed annually program chair behalf program committee static analysis symposia sas | [
5977,
1783
] | Test |
11,006 | 4 | Packet_Sender:packet sender typical applications packet sender include packet sender comes built-in tcp udp ssl server multiple ports user specifies remains running listening packets sending packets version v6.2.3 packet sender supports following features packet sender mobile also open source available ios android mit license written xamarin core features desktop packet sender send receive tcp udp cloud | [
7140,
2569,
842,
5612,
10924,
7983,
4369,
3443,
11413,
823,
5657,
7515,
10173,
11486
] | Validation |
11,007 | 3 | ShaBLAMM!_NiTro-VLB:shablamm nitro-vlb shablamm nitro-vlb computer system used qed r4600 microprocessor implemented vesa local bus peripheral card designed function connected host computer system using intel i486 nitro-vlb conformed arc standard produced marketed shablamm computer upgrade card accelerating windows nt nitro-vlb notable various unique characteristics among personal computer accessories example although system marketed upgrade computers already using 486 processor nitro-vlb fact entirely different architecture specifically mips architecture ia32-based 486 parasitic symbiotic coprocessor nitro-vlb designed co-opt host 486 processor running used four megabytes host 486 motherboard system memory dma buffer although nitro-vlb required separate dram main memory addition memory installed host 486 motherboard type parasite host upgrade card configuration entire motherboard processor implemented expansion card designed connect host motherboard expansion slot configurations rare among computer systems designed run microsoft windows nitro-vlb qed r4600 processor running 100 mhz rated 73.8 specint92 63 specfp92 similar figures first-generation pentium running 66 mhz faster costlier versions designed run 133 mhz 150 mhz initially nitro-vlb system priced 1,095 100 mhz card main memory 1,995 100 mhz card 16 mb main memory copy windows nt 2,595 150 mhz card | [
7234,
6854,
8711,
11627,
6797,
6415,
7215,
8976,
11058,
2071,
6942
] | Test |
11,008 | 3 | Compaq_Portable:compaq portable compaq portable early portable computer one first 100 ibm pc compatible systems compaq computer corporation first product followed others compaq portable series later compaq deskpro series compaq portable announced november 1982 first shipped march 1983 priced us 2,995 single half-height 5¼ 360 kb diskette drive 3,590 dual full-height diskette drives compaq portable folded luggable case size portable sewing machine computer early all-in-one becoming available two years cp/m-based osborne 1 kaypro ii year ms-dos-based entirely ibm pc compatible dynalogic hyperion year commodore sx-64 design influenced xerox notetaker prototype computer developed xerox parc 1976 ibm responded compaq portable ibm portable developed sales force needed comparable computer sell compaq compaq sold 53,000 units first year total 111 million revenue american business record second year revenue hit 329 million setting industry record third year revenue 503.9 million another us business record compaq portable basically hardware ibm pc transplanted luggable case specifically designed fit carry-on luggage airplane compaq bios instead ibm portables shipped 128k ram 1-2 double-sided double-density 360 kb disk drives machine uses unique hybrid ibm mda cga supports latter graphics modes contains cards text fonts rom using internal monochrome monitor 9x14 font used 8x8 one external monitor used user switches internal external monitors pressing user use ibm video standards graphics capabilities high-resolution text larger external monitor graphics hardware also used original compaq deskpro desktop computer despite success compaq portable flaws hardware foam pads keyboards used make contact circuit board pressed would eventually disintegrate time due wear normal use natural wear would render keyboard useless would require full replacement foam pad affected crt display also suffered low refresh rate heavy ghosting compaq efforts possible ibm used mostly off-the-shelf parts pc published full technical documentation microsoft kept right license ms-dos computer manufacturers difficulty bios contained ibm copyrighted code compaq solved problem producing clean room workalike performed documented functions ibm pc bios completely written scratch although numerous companies soon also began selling pc compatibles matched compaq remarkable achievement essentially-complete software compatibility ibm pc typically reaching 95 compatibility best phoenix technologies others began selling similarly reverse-engineered bioss open market first portables used compaq dos 1.13 essentially identical pc dos 1.10 except standalone basic require ibm pc rom cassette basic superseded months dos 2.00 added hard disk support advanced features aside using dos 1.x initial portables similar 16k-64k models ibm pc bios limited 544k ram support expansion roms thus making unable use ega/vga cards hard disks similar hardware dos 2.x ibm xt came compaq upgraded bios although portable offered factory hard disk users commonly installed starting 1984 compaq began offering hard disk-equipped version portable plus 1985 compaq introduced portable 286 replaced compact portable ii redesigned case within months byte wrote testing prototype compaq portable looks like sure winner portability cost high degree compatibility ibm pc reviewer tested ibm pc dos cp/m-86 wordstar supercalc several software packages found worked except one game pc magazine also rated compaq portable highly compatibility reporting tested applications ran praised rugged hardware design sharp display concluded certainly worth consideration anyone seeking run ibm pc software without ibm pc machine first series compaq portable machines | [
6148,
10692,
11100,
1515,
8301,
9166,
7983,
1776,
4337,
6129,
8786,
4409,
5756,
1501,
1535
] | Test |
11,009 | 9 | TIOBE_index:tiobe index tiobe programming community index measure popularity programming languages created maintained tiobe company based eindhoven netherlands tiobe stands importance earnest title comedy play oscar wilde first performed 1895 index calculated number search engine results queries containing name language index covers searches google google blogs msn yahoo baidu wikipedia youtube index updated month current information free long term statistics many years observation sale index authors think may valuable accepting various strategic decisions tiobe focuses turing complete languages provide information popularity instance html according site tiobe index best programming language language lines code written however site claim number web pages may reflect number skilled engineers courses jobs worldwide tiobe index sensitive ranking policy search engines based instance april 2004 google performed cleanup action get rid unfair attempts promote search rank consequence large drop languages java c++ yet languages stayed top table avoid fluctuations tiobe uses multiple search engines august 2016 c reached lowest ratings score since index launched still second popular language java since languages substantially gone still maintaining top two positions tiobe programming language year award goes language biggest annual popularity gain index e.g. go programming language year 2016 pierre carbonnelle challenges tiobe naming objective-c programming language year 2012 arguing may many objective-c pages web rarely read proposes pypl index instead based google trends data shows popularity trends since 2004 worldwide 5 different countries tim bunce author perl dbi critical index methods ranking | [
477,
10470,
5833,
8554,
10345,
5677,
11219,
3705,
1435,
2045,
8735
] | Train |
11,010 | 9 | Modula-2+:modula-2+ modula-2+ programming language descended modula-2 language developed dec systems research center src acorn computers ltd research centre palo alto california modula-2+ modula-2 exceptions threads group developed language led p. rovner 1984 main differences modula-2 modula-2+ used develop topaz operating system dec src firefly multiprocessor topaz applications written modula-2+ programming language grew along development system also build programming environment acorn research center arc language completely disappeared great influence programming languages modula-3 original developers modula-2+ bought acorn olivetti digital equipment corporation compaq compaq bought hewlett-packard olivetti also sold olivetti research center olivetti software technology laboratory bought acorn arc oracle later absorbed dec made src-reports available public | [
512,
9345,
8262,
5384,
11625,
5612,
8524,
7983,
4341,
7158,
6558
] | Test |
11,011 | 6 | AppleShare:appleshare appleshare product apple computer implemented various network services main purpose act file server using afp protocol network services implemented later versions appleshare included print server using printer access protocol pap web server electronic mail server smb cifs server support file sharing microsoft windows clients earlier versions appleshare supported appletalk network transport protocol later versions sold name appleshare ip allowed use tcp/ip protocol stack used modern networks appleshare provided three different protocols application-layer services appleshare file server appleshare print server appleshare pc appleshare would operate physical network medium early installations used mainly localtalk recently ethernet physical medium could used could directly indirectly connected appleshare server system equivalent third party server products include open-source netatalk suite unix-like systems services macintosh microsoft windows nt 2000 versions mac os system 7 onwards included personal file sharing limited afp implementation obvious difference personal file sharing appleshare former supports small number concurrent remote users versions mac os capable acting client appleshare server via afp later smb appletalk tcp/ip protocols although recent versions macos gradually removed support appletalk favor standard tcp/ip third-party vendors created client software pc maclan discontinued dave implement client functionality windows systems developers offered server software provided similar functionality windows servers grouplogic extremez-ip cyan software macserverip netatalk linux later versions appleshare also implemented smb cifs protocols native file sharing protocols windows machines apple discontinued appleshare product line following release macos server provides equivalent functionality appleshare ip support 3.0.1 macintosh | [
576,
225,
8544,
9952,
11554,
5093,
7269,
11688,
6797,
1712,
6993,
8976,
5492,
8404,
5784,
7706,
3007
] | Test |
11,012 | 6 | MINIX_file_system:minix file system minix file system native file system minix operating system minix written scratch andrew s. tanenbaum 1980s unix-like operating system whose source code could used freely education minix file system designed use minix copies basic structure unix file system avoids complex features interest keeping source code clean clear simple meet overall goal minix useful teaching aid linus torvalds first started writing linux operating system kernel 1991 working machine running minix adopted file system layout soon proved problematic since minix restricted filename lengths fourteen characters thirty later versions limited partitions 64 megabytes file system designed teaching purposes performance extended file system ext april 1992 developed replace minix second version ext2 linux obtained commercial-grade file system 1994 minix file system scarcely use among linux users minix file system six components | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
10851,
4708,
8298,
9836,
7789,
7279,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
671,
6309,
1190,
5286,
10405,
5... | None |
11,013 | 2 | Amiga_Unix:amiga unix amiga unix informally known amix discontinued full port unix system v release 4 operating system developed commodore-amiga inc. 1990 amiga computer family alternative amigaos shipped default bundled amiga 3000ux commodore unix one first ports svr4 68k architecture amiga a3000ux model even got attention sun microsystems though ultimately nothing came unlike apple a/ux amiga unix contained compatibility layer allow amigaos applications run unix native applications available take advantage amiga significant multimedia capabilities failed find niche quite-competitive unix workstation market early 1990s a3000ux price tag 4,998 also attractive compared unix workstations time nextstation 5,000 base system full api many times number applications available sgi indigo starting 8,000 personal decstation 5000 model 25 starting 5,000 sun hp ibm similarly priced systems a3000ux 68030 noticeably underpowered compared risc-based competitors unlike typical commercial unix distributions time amiga unix included source code vendor-specific enhancements platform-dependent device drivers essentially part n't owned allowing interested users study enhance parts system however source code subject license terms binary part system free software amiga unix also incorporated depended upon many open source components gnu c compiler x window system included source code like many proprietary unix variants small market shares amiga unix vanished mists computer history vendor commodore went business today unix-like operating systems minix netbsd linux available amiga platform | [
2179,
6787,
7299,
6412,
6675,
5397,
1304,
3487,
3241,
7983,
3248,
2995,
9141,
823,
9784,
7483,
9151,
9665,
10051,
10436,
6369,
5873,
5363,
5492,
2424,
633
] | Test |
11,014 | 1 | Zentralblatt_MATH:zentralblatt math zbmath formerly zentralblatt math major international reviewing service providing reviews abstracts articles pure applied mathematics produced berlin office fiz karlsruhe – leibniz institute information infrastructure gmbh editors european mathematical society ems fiz karlsruhe heidelberg academy sciences zbmath distributed springer science+business media uses mathematics subject classification codes organising reviews topic mathematicians richard courant otto neugebauer harald bohr together publisher ferdinand springer took initiative foundation new mathematical reviewing journal harald bohr brother famous physicist niels bohr worked copenhagen courant neugebauer professors university göttingen time göttingen considered one central places mathematical research appointed mathematicians like david hilbert hermann minkowski carl runge felix klein great organiser mathematics physics göttingen dream building independent mathematical institute spacious rich reference library realised four years death credit achievement particularly due richard courant convinced rockefeller foundation donate large amount money construction service founded 1931 otto neugebauer zentralblatt für mathematik und ihre grenzgebiete contained bibliographical data recently published mathematical articles book together peer reviews done mathematicians world preface first volume intentions zentralblatt formulated follows zentralblatt für mathematik und ihre grenzgebiete aims publish — efficient reliable manner — reviews entire world literature mathematics related areas issues initially appearing monthly name suggests main focus journal mathematics however areas closely related mathematics treated seriously so-called pure mathematics zentralblatt jahrbuch essence agenda zentralblatt published several issues per year issue published soon sufficiently many reviews available frequency three four weeks late 1930s began rejecting jewish reviewers number reviewers england united states resigned protest helped start mathematical reviews competing publication electronic form provided name inka-math acronym information system karlsruhe-database mathematics since least 1980 name later shortened zentralblatt math zentralblatt math abstracting service provides reviews brief accounts contents current articles conference papers books publications mathematics applications related areas reviews predominantly english occasional entries german french reviewers volunteers invited editors based published work recommendation existing reviewer zentralblatt math provided web printed form service reviews 2,300 journals serials worldwide well books conference proceedings zentralblatt math edited european mathematical society fiz karlsruhe heidelberg academy sciences zentralblatt database also incorporates 200,000 entries earlier similar publication jahrbuch über die fortschritte der mathematik jfm 1868 1942 added 2003 access subscription currently first three records search provided free without subscription | [
1488,
5496,
3468
] | Test |
11,015 | 3 | Rambo_III_(video_game):rambo iii video game rambo iii series video games based film rambo iii 1988 like film main plots center former vietnam-era green beret john rambo recalled duty one last time rescue former commander colonel sam trautman captured covert operation mission soviet union-controlled afghanistan console versions developed published sega pc dos version developed ocean published taito ocean developed published rest atari st amiga spectrum c64 amstrad taito also released arcade game based film sega master system version released 1988 light gun rail shooter lines operation wolf light phaser supported makes game also unique unlike nes sega master system port ironically port operation wolf long player ammunition game light phaser trigger held supply full automatic shooting ammunition runs though player pull trigger time shooting sega mega drive version released 1989 follows rambo six missions one various objectives besides finding exit level missions prisoners must freed enemy ammunition supplies destroyed rambo controlled overhead perspective several weapons disposal besides machine gun never runs ammo use knife close range kills set timed bombs use famous longbow explosive arrows ammunition bow bombs limited collected dead enemies rambo hand vulnerable killed one hit missions perspective switches view behind rambo additional boss fights take place soviet tanks helicopters must destroyed using crossbow aiming bow rambo move otherwise hide behind rocks obstacles enemy fire reminiscent taito arcade game name also player firing screen helicopters jeeps instead single segment stage whole game played perspective taito released rail shooter based film well features rambo sam trautman playable characters zx spectrum atari st commodore amiga commodore 64 amstrad cpc versions three missions varied console version drastically terms gameplay graphics music | [
9006,
6390
] | Test |
11,016 | 7 | Kyvos:kyvos kyvos big data business intelligence software developed american privately held company named kyvos insights company headquartered los gatos california founded praveen kankariya ceo impetus technologies 2012 software provides olap-based multidimensional analysis big data cloud platforms launched officially june 2015 december year company listed among 10 coolest big data startups 2015 crn magazine software uses olap technology enable business intelligence big data platforms report published forrester research 2016 evaluated several native hadoop business intelligence bi platforms 22 parameters kyvos referred platform gave new life olap bringing hadoop per report kyvos enables analysis hadoop based olap schemas aggregations predefined drill-down paths pre-calculates aggregates multiple levels dimensional hierarchies improve query response times compared sql-on-hadoop platforms users analyze data kyvos visualization tool using bi platforms kyvos originally built hadoop later added support cloud platforms amazon web services aws google cloud microsoft azure initially supported mdx queries integrated data visualization tools excel tableau 2017 kyvos 4.0 added support sql connectivity extending integration bi tools business objects cognos microstrategy power bi qlik late 2018 version 5 software built specifically cloud elastic olap provide cloud native way scale changing data workloads | [
9344,
6348,
1935,
7248,
5332
] | Test |
11,017 | 1 | RocksDB:rocksdb rocksdb high performance embedded database key-value data fork leveldb facebook optimized exploit many central processing unit cpu cores make efficient use fast storage solid-state drives ssd input/output i/o bound workloads based log-structured merge-tree lsm tree data structure written c++ provides official application programming interface api language bindings c++ c java alongside many third-party language bindings rocksdb open-source software originally released bsd 3-clause license however july 2017 project migrated dual license apache 2.0 gplv2 license possibly response apache software foundation blacklist previous bsd+patents license clause rocksdb used production systems various web-scale enterprises including facebook yahoo linkedin rocksdb like leveldb stores keys values arbitrary byte arrays data sorted byte-wise key providing custom comparator rocksdb provides features leveldb plus others list rocksdb features leveldb rocksdb sql database although myrocks combines rocksdb mysql like nosql dbm stores relational data model support sql queries also direct support secondary indexes however user may build internally using column families externally applications use rocksdb library provide server command-line interface rocksdb created facebook dhruba borthakur april 2012 fork leveldb initial stated goal improving performance server workloads embeddable database rocksdb used storage engine within larger database management system dbms example cockroachdb uses rocksdb storage engine mostly transactional workloads rockset uses rocksdb mostly analytical data processing shows rocksdb used storage engine online_transaction_processing online_analytical_processing following projects started replace offer alternative storage engines already-established database systems rocksdb arangodb added rocksdb previous storage engine mmfiles starting arangodb 3.4 rocksdb default storage engine arangodb mongorocks project provides storage module mongodb storage engine rocksdb related program rocks strata tool written go allows managing incremental backups mongodb rocksdb used storage engine myrocks project creates new rocksdb based storage engine mysql in-depth details myrocks presented percona live 2016 mariadb creates myrocks forked rocksdb storage engine since mariadb 10.2.5 cassandra rocksdb improve performance apache cassandra significantly 3-4 times faster general 100 times faster use-cases instagram team facebook developed open-sourced code along benchmarks performance results following database systems applications chosen use rocksdb embedded storage engine ceph bluestore storage layer uses rocksdb metadata management osd devices logdevice logsdb built atop rocksdb facktory background job system uses rocksdb storage ssdb-rocks project uses rocksdb storage engine ssdb nosql database tidb project uses rocksdb storage engine rockset service used operational data analytics uses rocksdb storage engine apache flink uses rocksdb store checkpoints third-party programming language bindings available rocksdb include | [
2051,
6555,
1435,
9245,
8735,
3876,
3366,
10921,
4781,
5165,
5677,
7983,
9518,
10413,
10292,
5047,
823,
5560,
7359,
8644,
1222,
7889,
2130,
2901,
10470,
9320,
8554,
7147,
7022,
1776,
8691,
4598,
5879,
7802,
7292,
2045,
3582
] | None |
11,018 | 2 | Absolute_OpenBSD:absolute openbsd absolute openbsd unix practical paranoid comprehensive guide openbsd operating system michael w. lucas author absolute freebsd cisco routers desperate book assumes basic knowledge design commands user permissions unix-like operating systems book contains troubleshooting tips background information system commands examples assist learning first edition released june 2003 information book became outdated openbsd 3.4 released months later second edition released april 2013 peter n. m. hansteen author book pf technical reviewer | [
5397,
1509,
7983
] | Test |
11,019 | 4 | VirusBuster:virusbuster virusbuster ltd. one hungarian it-security software vendors fully hungarian owned company develops products – brand name virusbuster – hungarian international market protect users computers malware programs various it-security threats august 2012 virusbuster ltd. announced cancellation anti-virus products https //web.archive.org/web/20120810040828/http //www.virusbuster.hu/termekek/termekhirek/virusbuster-termekek-kivezetese-0 1 nowiki /nowiki virusbuster shut entire developing malware analyst team joined sophos legal trade predecessor firm began develop antiviral products end 1980s software named virsec came time well known vendors appeared similar solutions 1992 virsec renamed virusbuster later official formation firm name became name company well 1997 official foundation virusbuster ltd took place next years company produced mainly anti-viral products hungarian market primarily governmental sector 2000 year international opening virusbuster products began participating international test summer year firm began build international partnerships also 2000 2000 2003 virusbuster steadily extended portfolio developments manifested increasing number protected platforms systems also new layered security products target new threats management system firm security products achievements company could offer effective security solutions every organizational customers 2001 first year international foreigner company – australian leprechaun – licensed virusbuster antiviral technology integrate security products 2003 2006 virusbuster strengthened eastern european worldwide market positions antiviral engine company became independent product thus integrated several firms security solutions years virusbuster appeared american market august 2012 agnitum pc security expert manufacturer outpost range security products announced acquisition antivirus technology infrastructure long-term partner virusbuster october 2012 owner virusbuster made decision products services going removed market entire developing malware analyst team joined sophos virusbuster provided customized multi-level virus protection solutions – individual home size organizational – customer groups furthermore virusbuster internet security suite provides full it-protection home users company security products cover important operating systems including workstation server platforms. br according independent it-professionals international test labs products company pretty good solutions aspects speed efficiency security analysts said virusbuster user interface rather traditional according others almost old fashioned gui provides better transparency easier manageability according general opinions products company cover important business platforms protect every it-security threats beside retail solutions different market segments also important company antiviral engine became independent product several international companies licensing virusbuster technology integrated products outpost security suite kaspersky microsoft proteatools beside companies mentioned important strategic partners company different international collaboration projects beginning 2008 virusbuster security researchers found computer malware using name company trick users worm spreading attachment infected e-mails name virusbuster.personal.v3.20.regfile.by.arcade.exe analysis classification virus difficult task since worm variant well known rather old bagle malware family. br first example name misuse virusburst fake antispyware program 2006 name similar virusbusters name – probably accidentally another case similarity perfect br also 2008 29a virus-writing group announced shut one prominent members 29a team also used 'virusbuster alias | [
7809,
9665,
2213,
5384,
3243,
7948,
4464,
9055
] | None |
11,020 | 9 | Dana_Scott:dana scott dana stewart scott born october 11 1932 emeritus hillman university professor computer science philosophy mathematical logic carnegie mellon university retired lives berkeley california research career involved computer science mathematics philosophy work automata theory earned acm turing award 1976 collaborative work christopher strachey 1970s laid foundations modern approaches semantics programming languages worked also modal logic topology category theory received ba mathematics university california berkeley 1954 wrote ph.d. thesis convergent sequences complete theories supervision alonzo church princeton defended thesis 1958 solomon feferman 2005 writes period completing ph.d. studies moved university chicago working instructor 1960 1959 published joint paper michael o. rabin colleague princeton titled finite automata decision problem scott rabin 1959 introduced idea nondeterministic machines automata theory work led joint bestowal turing award two introduction fundamental concept computational complexity theory scott took post assistant professor mathematics back university california berkeley involved classical issues mathematical logic especially set theory tarskian model theory period started supervising ph.d. students james halpern contributions study independence axiom choice edgar lopez-escobar infinitely long formulas countable quantifier degrees scott also began working modal logic period beginning collaboration john lemmon moved claremont california 1963 scott especially interested arthur prior approach tense logic connection treatment time natural-language semantics began collaborating richard montague copeland 2004 known days undergraduate berkeley later scott montague independently discovered important generalisation kripke semantics modal tense logic called scott-montague semantics scott 1970 john lemmon scott began work modal-logic textbook interrupted lemmon death 1966 scott circulated incomplete monograph amongst colleagues introducing number important techniques semantics model theory importantly presenting refinement canonical model became standard introducing technique constructing models filtrations core concepts modern kripke semantics blackburn de rijke venema 2001 scott eventually published work introduction modal logic lemmon scott 1977 following initial observation robert solovay scott formulated concept boolean-valued model solovay petr vopěnka likewise around time 1967 scott published paper proof independence continuum hypothesis used boolean-valued models provide alternate analysis independence continuum hypothesis provided paul cohen work led award leroy p. steele prize 1972 scott took post professor mathematical logic philosophy faculty university oxford 1972 member merton college oxford honorary fellow college period saw scott working christopher strachey two managed despite administrative pressures work providing mathematical foundation semantics programming languages work scott best known together work constitutes scott–strachey approach denotational semantics constitutes one pieces work theoretical computer science perhaps regarded founding one schools computer science one scott contributions formulation domain theory allowing programs involving recursive functions looping-control constructs given denotational semantics additionally provided foundation understanding infinitary continuous information domain theory theory information systems scott work period led bestowal carnegie mellon university scott proposed theory equilogical spaces successor theory domain theory among many advantages category equilogical spaces cartesian closed category whereas category domains 1994 inducted fellow association computing machinery 2012 became fellow american mathematical society | [
7048,
6306,
10668,
10031,
2482,
1976,
1982,
4799,
4800,
10049,
4930,
70,
3529,
5456,
5585,
3929,
1883,
7775,
9315,
11242,
2283,
2798,
1783,
511
] | Test |
11,021 | 4 | Peter_Tippett:peter tippett peter tippett born 1953 dearborn michigan american physician researcher inventor known contributions information security clinical medicine technology contributions include development anti-virus program corporate vaccine tippett vice president verizon innovations incubator chief medical officer verizon enterprise services 2009 2015 currently founder ceo healthcelerate inc. born 1953 raised dearborn michigan tippett alumnus kalamazoo college holds ph.d. m.d case western reserve university school medicine studied rockefeller university new york nobel prize winner robert bruce merrifield directing doctoral research efforts toward metabolic indicators peptide synthesis completed internship residency internal medicine cleveland metropolitan general hospital spent 1975-1985 engaged biochemical research engaged research case western reserve tippett moonlighted emergency room physician instructor emergency outpatient medicine spent much early clinical career 1989-1995 emergency medicine ohio california received board certification internal medicine 1987 1993 2000 served board computer ethics institute served executive director pacific foundation science medicine 1988 1992 intersection clinical career emerging focus technology particularly arena cybersecurity well use access protocols internet role president chairman certus international publisher developer pc anti-virus security software tippett applied research insights biochemist concept computer viruses develop anti-virus software vaccine later purchased symantec 1992 ceo role cybertrust led merger cybertrust verizon tippett role verizon healthcare security innovations divisions tippett served chairman alliance internet security 2000 represented verizon board directors open identity exchange oix information card foundation addition credited development one first anti-virus programs vaccine tippett pioneered commercialized string now-common technologies including called recovery disk processor image signatures using hash-tables trusted file execution anomaly detection aspects mail merge un-do ran bulletin board system cp/m software first ibm pc created president cleveland osborne group user group computers osborne computer corporation early 1980s chief scientist icsa.net tippett one handful experts identify address iloveyou virus broke may 2000 provided key information department justice david smith writer melissa virus featured cover august 2000 issue time digital magazine tippett work cybersecurity space led roles speaker contributor advisor government private sector organizations 2003-2005 served president information technology committee pitac established congress 1997 high performance computing act 1991 guide administration efforts accelerate development adoption information technologies vital american prosperity 21st century u.s. chamber commerce awarded tippett first leadership health care award chamber ’ first annual health care summit 2012 leadership verizon incubator tippett also chief scientist icsa labs previously served president international computer security association tippett currently adjunct professor division general medical sciences case western reserve university school medicine november 2017 t.e.n. technology information security executive networking relationship-marketing firm announced tippett recipient 2017 ise® luminary leadership award | [
9569,
2213,
8807,
6516,
4409,
5373,
30
] | Test |
11,022 | 4 | Transshipment_(information_security):transshipment information security information security transshipment technique protecting software services applications ensuring receive data known able handle safely term analogous logistics industry cargo offloaded one means transport another port entry transshipment information extracted data used send encoded data handled safely transshipment messages intercepted business information carry extracted information encoded new message using data format receiving application safely handle example email client may known handle messages simple structure without failure full generality allowed standards transshipment used protect mail client attackers exploit weaknesses ability handle general case transshipment process extracts business information email messages creates new message conveys information using simple structures mail client protected without knowing details weaknesses implementation transshipment function must handle data sent potential attackers useful function must implemented without vulnerable attack achieved using guard technology separates implementation three parts destination proxy interacts message originator extracts business information messages verifier source proxy creates new message carry business information interacts message recipient verifier role ensure source proxy presented business information using simple data format expecting result attack surface limited verifier interface part source proxy interface visible verifier unlike antivirus software use transshipment defends unknown attacks hence zero-day attacks require routine updates signatures heuristics | [
5636,
2213,
3930,
5373,
8094
] | Test |
11,023 | 9 | Troff:troff troff short typesetter roff major component document processing system developed corporation unix operating system troff features commands designate fonts spacing paragraphs margins footnotes unlike many text formatters troff position characters arbitrarily page even overlapping fully programmable input language separate preprocessors used convenient production tables diagrams mathematics inputs troff plain text files created text editor extensive macro packages created various document styles typical distribution troff includes macros formatting research papers man mdoc macros creating unix man pages mv macros creating mountable transparencies ms mm macros letters books technical memoranda reports troff origins traced text-formatting program called runoff written jerome h. saltzer mit ctss operating system mid-1960s name allegedly came phrase 'll run document bob morris ported ge 635 architecture called program roff abbreviation runoff rewritten rf pdp-7 time 1969 doug mcilroy rewrote extended simplified version roff bcpl programming language first version unix developed pdp-7 sitting around bell labs 1971 developers wanted get pdp-11 work operating system order justify cost system proposed would implement document-formatting system patents division first formatting program reimplementation mcillroy roff written joe f. ossanna needed flexible language new version roff called nroff newer roff written provided basis future versions got graphic systems cat phototypesetter ossanna modified nroff support multiple fonts proportional spacing dubbed troff typesetter roff sophisticated output amazed typesetter manufacturer confused peer reviewers thought manuscripts using troff published name troff pronounced rather troff came nroff actually almost program producing output line printers character terminals understood everything troff ignored commands applicable e.g. font changes ossanna troff written pdp-11 assembly language produced output specifically cat phototypesetter rewrote c although 7000 lines uncommented code still dependent cat cat became less common longer supported manufacturer need make support devices became priority ossanna died task completed brian kernighan took task rewriting troff newly rewritten version produced device-independent code easy post-processors read translate appropriate printer codes also new version troff often called ditroff device independent troff several extensions included drawing functions program documentation defines output format ditroff used many modern troff clones like gnu groff troff collection tools including pre- post-processors eventually called documenter workbench dwb continuous development bell labs later spin-off unix system laboratories usl 1994 time softquad took maintenance although brian kernighan continued improve troff thus least following variants original bell labs troff use troff supplanted programs interleaf framemaker latex still used quite extensively remains default formatter unix documentation software reimplemented groff gnu system beginning 1990 addition due open sourcing ancient unix systems well modern successors ditroff based open-sourced versions found opensolaris plan 9 bell labs several versions troff cat ditroff-based available various open-source licenses troff includes sets commands called macros run starting process document macros include setting page headers footers defining new commands generally influencing output formatted command-line argument including macro set -m name led many macro sets known base filename leading m. standard macro sets leading comprehensive list macros available usually listed codice_2 manual page troff evolved since several things done easily troff several preprocessors developed programs transform certain parts document troff input fitting naturally use pipelines unix — sending output one program input another see pipes filters typically preprocessor translates sections input file specially marked passing rest file unchanged embedded preprocessing instructions written simple application-specific programming language provides high degree power flexibility three preprocessors provide troff drawing capabilities defining domain-specific language describing picture yet preprocessors allow drawing complex pictures generating output pic | [
5896,
9,
7188,
5397,
6304,
5418,
7983,
8879,
310,
823,
3134,
319,
1347,
9027,
1349,
8262,
9926,
9419,
4433,
9298,
2132,
4564,
345,
477,
6369,
10083,
11363,
10732,
7539,
5492,
9075,
2045
] | Test |
11,024 | 1 | IBM_Information_Management_System:ibm information management system ibm information management system ims joint hierarchical database information management system extensive transaction processing capabilities ibm designed ims rockwell caterpillar starting 1966 apollo program used inventory large bill materials bom saturn v moon rocket apollo space vehicle first ims ready message appeared ibm 2740 terminal downey california august 14 1968 interim period ims undergone many developments ibm system/360 technology evolved current z/os ibm zenterprise system technologies example ims supports java programming language jdbc xml since late 2005 web services vern watts ims chief architect many years watts joined ibm 1956 worked ibm silicon valley development labs death april 4 2009 continuously worked ims since 1960s ims database component stores data using hierarchical model quite different ibm later released relational database db2 ims hierarchical model implemented using blocks data known segments segment contain several pieces data called fields example customer database may root segment segment top hierarchy fields phone name age child segments may added underneath another segment instance one order segment customer segment representing order customer placed company likewise order segment may many children segments item order unlike databases need define data segment ims segment may defined size 40 bytes define one field six bytes long key field use find segment performing queries ims retrieve save 40 bytes directed program may understand care bytes represent practice often data segment may map cobol copybook besides dl/i query usage field may defined ims data hidden certain applications security reasons database component ims purchased standalone without transaction manager component used systems cics three basic forms ims hierarchical databases dedb performance comes use high performance media manager access method asynchronous write commit optimized code paths logging minimized data updated disk commit undo image logging needed backout function uncommitted changes simply discarded starting ims version 11 dedbs use z/os 64-bit storage database buffers dedbs architecture includes unit work uow concept made effective online reorganization utility simple implement function included base product fast path dedbs built atop vsam dl/i databases built atop either vsam osam restrictions depending database organization although maximum size z/os vsam dataset increased 128 tb years ago ims still limits vsam dataset 4 gb osam 8 gb limitation simply means ims customers use multiple datasets large amounts data vsam osam usually referred access methods ims logical view database referred database organization hdam hidam hisam etc internally data linked using 4-byte pointers addresses database datasets dbdss pointers referred rbas relative byte addresses collectively database-related ims capabilities often called ims db ims db grown evolved nearly four decades support myriad business needs ims assistance z/os hardware coupling facility supports n-way inter-ims sharing databases many large configurations involve multiple ims systems managing common databases technique providing scalable growth system redundancy event hardware software failures ims also robust transaction manager ims tm also known ims dc one big three classic transaction managers along cics bea oracle tuxedo transaction manager interacts end user connected vtam tcp/ip including 3270 web user interfaces another application processes business function banking account withdrawal maintains state throughout process making sure system records business function correctly data store thus ims tm quite like web application operating cgi program example provide interface query update database ims tm typically uses either ims db db2 backend database used alone db2 ims tm component purchased without ims db component ims tm uses messaging queuing paradigm ims control program receives transaction entered terminal web browser application stores transaction message queue memory dataset ims invokes scheduler queued transaction start business application program message processing region message processing region retrieves transaction ims message queue processes reading updating ims and/or db2 databases assuring proper recording transaction required ims enqueues response message back onto ims message queue output message complete available ims control program sends back originating terminal ims tm handle whole process thousands even tens thousands times per second 2013 ibm completed benchmark ims version 13 demonstrating ability process 100,000 transactions per second single ims system prior ims businesses governments write transaction processing environments ims tm provides straightforward easy-to-use reliable standard environment high performance transaction execution fact much world banking industry relies ims including u.s. federal reserve example chances withdrawing money automated teller machine atm trigger ims transaction several chinese banks recently purchased ims support country burgeoning financial industry today ims complements db2 ibm relational database system introduced 1982 general ims performs faster db2 common tasks may require programming effort design maintain non-primary duties relational databases generally proven superior cases requirements especially reporting requirements change frequently require variety viewpoint angles outside primary original function relational data warehouse may used supplement ims database example ims may provide primary atm transactions performs well specific task however nightly copies ims data may copied relational systems variety reports processing tasks may performed data allows kind database focus best relative strength | [
10883,
7053,
11541,
4630,
5658,
284,
4255,
9631,
7076,
5677,
10413,
7983,
4913,
9138,
2485,
3894,
8502,
9397,
9782,
5562,
5051,
10040,
10048,
4546,
6850,
11131,
3398,
9286,
2901,
10072,
479,
863,
7650,
868,
10471,
3816,
2168,
7930,
6395
] | None |
11,025 | 7 | Maxisun:maxisun maxisun interface system infor sunsystems/sap business one/other erp systems third party business applications original maxisun software developed integrate maximo sunsystems 2001 sapphire systems early versions software “ black box ” systems little could modified client installation taken place history always two main components comprising system data extraction component data conversion component first version system data extraction component sqr script authored originally mro software sapphire data transformation engine originally authored sapphire visual basic since early days maxisun modified make capable configured client sqr extraction tool replaced dedicated program called origin maxisun data conversion engine gained benefit user interface allowed source destination files mapped field line level mapping settings needed dynamic storage facility created using microsoft access database initially later upgraded sql server etl describes methodology behind maxisun middleware interface task broken three distinct parts 1 extract extraction phase records meeting certain pre-defined criteria extracted source system ’ database either series files file system typically xml csv files memory case certain specific interfaces 2 transform transformation phase file data data memory manipulated series rules meet data entry requirements destination system manipulations include limited trimming fields given length creating balanced double entry records performing calculations joining values together etc maxisun supports range standard data manipulation features right box since full user definable .net macro capability literally transformation achieved 3 load load phase transformed data uploaded end point application method appropriate application typically applications receiving data perform level validation data sometimes feedback result sending application examples loading transactions sunsystems via sun systems connect ssc web service loading data maximo interface tables maximo enterprise adapter mea version 7 maximo integration framework mif validates processes data application tables maxisun combines extraction transformation tasks one action – speeds process dramatically means fewer steps interface task check event issue maxisun middleware creates integration hub enabling point point integrations two third party systems uses number methods communicate systems fully configurable perform etl extract transform load tasks meet individual interfacing requirements given third party applications | [
8122,
7523,
479
] | None |
11,026 | 9 | Isabelle_(proof_assistant):isabelle proof assistant isabelle automated theorem prover interactive theorem prover higher order logic hol theorem prover lcf-style theorem prover written standard ml based small logical core ease logical correctness isabelle generic provides meta-logic weak type theory used encode object logics like first-order logic fol higher-order logic hol zermelo–fraenkel set theory zfc isabelle main proof method higher-order version resolution based higher-order unification though interactive isabelle also features efficient automatic reasoning tools term rewriting engine tableaux prover well various decision procedures isabelle used formalize numerous theorems mathematics computer science like gödel completeness theorem gödel theorem consistency axiom choice prime number theorem correctness security protocols properties programming language semantics isabelle theorem prover free software released revised bsd license isabelle named lawrence paulson gérard huet daughter isabelle allows proofs written two different styles procedural declarative procedural proofs specify series tactics procedures apply reflecting procedure human mathematician might apply proving result typically hard read describe outcome steps declarative proofs supported isabelle proof language isar hand specify actual mathematical operations performed therefore easily read checked humans procedural style deprecated recent versions isabelle archive formal proofs also recommends declarative style example declarative proof contradiction isar square root two rational written follows isabelle used aid formal methods specification development verification software hardware systems larry paulson keeps list research projects use isabelle following programs provide similar functionality isabelle | [
823,
7983,
11032,
7187,
11028,
4791,
9816,
3705,
1019,
8924,
10813,
4446
] | Validation |
11,027 | 7 | Quasi-opportunistic_supercomputing:quasi-opportunistic supercomputing quasi-opportunistic supercomputing computational paradigm supercomputing large number geographically disperse computers quasi-opportunistic supercomputing aims provide higher quality service opportunistic resource sharing quasi-opportunistic approach coordinates computers often different ownerships achieve reliable fault-tolerant high performance control opportunistic computer grids computational resources used whenever may become available opportunistic match-making approach task scheduling computer grids simpler merely matches tasks whatever resources may available given time demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time quasi-opportunistic approach enables execution demanding applications within computer grids establishing grid-wise resource allocation agreements fault tolerant message passing abstractly shield failures underlying resources thus maintaining opportunism allowing higher level control general principle grid computing use distributed computing resources diverse administrative domains solve single task using resources become available traditionally grid systems approached task scheduling challenge using opportunistic match-making approach tasks matched whatever resources may available given time boinc developed university california berkeley example volunteer-based opportunistic grid computing system applications based boinc grid reached multi-petaflop levels using close half million computers connected internet whenever volunteer resources become available another system folding home based boinc computes protein folding reached 8.8 petaflops using clients include gpu playstation 3 systems however results applicable top500 ratings run general purpose linpack benchmark key strategy grid computing use middleware partitions pieces program among different computers network although general grid computing success parallel task execution demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time opportunistic internet primenet server supports gimps one earliest grid computing projects since 1997 researching mersenne prime numbers gimps distributed research currently achieves 60 teraflops volunteer-based computing project use computing resources volunteer grids gimps usually purely opportunistic geographically disperse distributively owned computers contributing whenever become available preset commitments resources available given time hence hypothetically many volunteers unwittingly decide switch computers certain day grid resources become significantly reduced furthermore users find exceedingly costly organize large number opportunistic computing resources manner achieve reasonable high performance computing example structured grid high performance computing deisa supercomputer project organized european community uses computers seven european countries although different parts program executing within deisa may running computers located different countries different ownerships administrations control coordination purely opportunistic approach deisa two level integration scheme inner level consists number strongly connected high performance computer clusters share similar operating systems scheduling mechanisms provide homogeneous computing environment outer level consists heterogeneous systems supercomputing capabilities thus deisa provide somewhat controlled yet dispersed high performance computing services users quasi-opportunistic paradigm aims overcome achieving control assignment tasks distributed resources use pre-negotiated scenarios availability systems within network quasi-opportunistic distributed execution demanding parallel computing software grids focuses implementation grid-wise allocation agreements co-allocation subsystems communication topology-aware allocation mechanisms fault tolerant message passing libraries data pre-conditioning approach fault tolerant message passing essential abstractly shield failures underlying resources quasi-opportunistic approach goes beyond volunteer computing highly distributed systems boinc general grid computing system globus allowing middleware provide almost seamless access many computing clusters existing programs languages fortran c distributed among multiple computing resources key component quasi-opportunistic approach qoscos grid economic-based resource allocation model resources provided based agreements among specific supercomputer administration sites unlike volunteer systems rely altruism specific contractual terms stipulated performance specific types tasks however tit-for-tat paradigms computations paid back via future computations suitable supercomputing applications avoided key component quasi-opportunistic approach reliable message passing system provide distributed checkpoint restart mechanisms computer hardware networks inevitably experience failures way part large computation fails entire run need abandoned restart last saved checkpoint | [
8122,
5956,
5029,
1480,
7497,
8937,
6421,
11353,
2394,
8447
] | Test |
11,028 | 9 | HOL_(proof_assistant):hol proof assistant hol higher order logic denotes family interactive theorem proving systems using similar higher-order logics implementation strategies systems family follow lcf approach implemented library programming language library implements abstract data type proven theorems new objects type created using functions library correspond inference rules higher-order logic long functions correctly implemented theorems proven system must valid way large system built top small trusted kernel systems hol family use ml programming language successors ml originally developed along lcf serve purpose meta-language theorem proving systems fact name stands meta-language hol systems use variants classical higher-order logic simple axiomatic foundations axioms well-understood semantics logic used hol provers closely related isabelle/hol widely used logic isabelle four hol systems sharing essentially logic still maintained developed although hol predecessor isabelle various hol derivatives hol4 hol light remain active use cakeml project developed formally proven compiler ml previously hol used developed formally proven lisp implementation running arm x86 powerpc hol also used develop formal semantics x86 multiprocessors well semantics machine code power isa arm architectures | [
4612,
6502,
9320,
9865,
10985,
9964,
2062,
7185,
11026,
4791,
11032,
7386,
1019,
8924
] | Validation |
11,029 | 5 | BitTorrent_tracker:bittorrent tracker bittorrent tracker special type server assists communication peers using bittorrent protocol peer-to-peer file sharing software client end-user pc requests file portions requested file residing peer machines sent client reassembled full copy requested file tracker server keeps track file copies reside peer machines ones available time client request helps coordinate efficient transmission reassembly copied file clients already begun downloading file communicate tracker periodically negotiate faster file transfer new peers provide network performance statistics however initial peer-to-peer file download started peer-to-peer communication continue without connection tracker since creation distributed hash table dht method trackerless torrents bittorrent trackers largely become redundant however still often included torrents improve speed peer discovery public open trackers used anyone adding tracker address existing torrent used newly created torrent like openbittorrent pirate bay operated one popular public trackers disabling 2009 amid legal trouble thereafter offered magnet links private tracker bittorrent tracker restricts use requiring users register site method controlling registration used among many private trackers invitation system active contributing members given ability grant new user permission register site new user goes interview process several circumstances legal distribute copyrighted material parts thereof also experiments legally selling content distributed bittorrent using secure tracker system trackers primary reason damaged bittorrent swarm reasons mostly related damaged hacked clients uploading corrupt data reliability trackers improved two main innovations bittorrent protocol multi-tracker torrents contain multiple trackers single torrent file provides redundancy case one tracker fails trackers continue maintain swarm torrent one disadvantage becomes possible multiple unconnected swarms single torrent users connect one specific tracker unable connect another create disjoint set impede efficiency torrent transfer files describes additional extensions peer exchange dht mitigate effect rapidly merging otherwise disjoint graphs peers vuze formerly azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht developed simultaneously later adopted bittorrent mainline µtorrent transmission rtorrent ktorrent bitcomet deluge clients current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 vuze also supports mainline dht addition distributed database use optional application plugin mainlinedht plugin potentially allows vuze client reach bigger swarm bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange one options http based tracker protocol compact flag flag defined bep 23 specifies tracker compact response encoding ipv4 addresses set 4 bytes 32 bits ipv6 though 128 bits long compact would break ipv6 support handle situation clients trackers must either avoid using compact announces ipv6 implement bep 07 opentracker dirk engling powered one biggest bittorrent trackers pirate bay tracker atrack high performance open source tracker designed run google app engine bitstorm small tracker written php require database server runs php compatible web server bitstorm 2 uses mysql database instead flat file improve scalability bittorious open source commercially supported tracker integrated web-based management portal hefur standalone bittorrent tracker written c++ mit license ocelot bittorrent tracker written c++ gazelle project | [
4229,
4490,
1172,
11413,
10522,
157,
10924,
8640,
11073,
708,
6351,
6991,
7761,
3676,
5085,
5469,
5470,
5344,
3428,
3813,
7022,
10995,
1908,
9332
] | Validation |
11,030 | 1 | Microsoft_SQL_Server:microsoft sql server microsoft sql server relational database management system developed microsoft database server software product primary function storing retrieving data requested software applications—which may run either computer another computer across network including internet microsoft markets least dozen different editions microsoft sql server aimed different audiences workloads ranging small single-machine applications large internet-facing applications many concurrent users history microsoft sql server begins first microsoft sql server product—sql server 1.0 16-bit server os/2 operating system 1989—and extends current day following versions supported microsoft sql server 2016 onward product supported x64 processors current version microsoft sql server 2017 released october 2 2017 rtm version 14.1709.3807.1 sql server 2019 released community technology preview slated release manufacturing second half 2019 microsoft makes sql server available multiple editions different feature sets targeting different users editions protocol layer implements external interface sql server operations invoked sql server communicated via microsoft-defined format called tabular data stream tds tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server tds packets encased physical transport dependent protocols including tcp/ip named pipes shared memory consequently access sql server available protocols addition sql server api also exposed web services data storage database collection tables typed columns sql server supports different data types including primitive types integer float decimal char including character strings varchar variable length character strings binary unstructured blobs data text textual data among others rounding floats integers uses either symmetric arithmetic rounding symmetric round fix depending arguments codice_1 gives 3 microsoft sql server also allows user-defined composite types udts defined used also makes server statistics available virtual tables views called dynamic management views dmvs addition tables database also contain objects including views stored procedures indexes constraints along transaction log sql server database contain maximum 2 objects span multiple os-level files maximum file size 2 bytes 1 exabyte data database stored primary data files extension codice_2 secondary data files identified codice_3 extension used allow data single database spread across one file optionally across one file system log files identified codice_4 extension storage space allocated database divided sequentially numbered pages 8 kb size page basic unit i/o sql server operations page marked 96-byte header stores metadata page including page number page type free space page id object owns page type defines data contained page data stored database index allocation map holds information pages allocated tables indexes change map holds information changes made pages since last backup logging contain large data types image text page basic unit i/o operation space actually managed terms extent consists 8 pages database object either span 8 pages extent uniform extent share extent 7 objects mixed extent row database table span one page limited 8 kb size however data exceeds 8 kb row contains varchar varbinary data data columns moved new page possibly sequence pages called allocation unit replaced pointer data physical storage table rows divided series partitions numbered 1 n partition size user defined default rows single partition table split multiple partitions order spread database computer cluster rows partition stored either b-tree heap structure table associated clustered index allow fast retrieval rows rows stored in-order according index values b-tree providing index data leaf node leaves nodes storing index values leaf data reachable respective nodes index non-clustered rows sorted according index keys indexed view storage structure indexed table table without clustered index stored unordered heap structure however table may non-clustered indices allow fast retrieval rows situations heap structure performance advantages clustered structure heaps b-trees span multiple allocation units sql server buffers pages ram minimize disk i/o 8 kb page buffered in-memory set pages currently buffered called buffer cache amount memory available sql server decides many pages cached memory buffer cache managed buffer manager either reading writing page copies buffer cache subsequent reads writes redirected in-memory copy rather on-disc version page updated disc buffer manager in-memory cache referenced time writing pages back disc asynchronous i/o used whereby i/o operation done background thread operations wait i/o operation complete page written along checksum written reading page back checksum computed matched stored version ensure page damaged tampered meantime sql server allows multiple clients use database concurrently needs control concurrent access shared data ensure data integrity—when multiple clients update data clients attempt read data process changed another client sql server provides two modes concurrency control pessimistic concurrency optimistic concurrency pessimistic concurrency control used sql server controls concurrent access using locks locks either shared exclusive exclusive lock grants user exclusive access data—no user access data long lock held shared locks used data read—multiple users read data locked shared lock acquire exclusive lock latter would wait shared locks released locks applied different levels granularity—on entire tables pages even per-row basis tables indexes either entire index index leaves level granularity used defined per-database basis database administrator fine-grained locking system allows users use table index simultaneously requires resources automatically yield higher performance sql server also includes two lightweight mutual exclusion solutions—latches spinlocks—which less robust locks less resource intensive sql server uses dmvs resources usually busy sql server also monitors worker threads acquire locks ensure end deadlocks—in case sql server takes remedial measures many cases kill one threads entangled deadlock roll back transaction started implement locking sql server contains lock manager lock manager maintains in-memory table manages database objects locks along metadata lock access shared object mediated lock manager either grants access resource blocks sql server also provides optimistic concurrency control mechanism similar multiversion concurrency control used databases mechanism allows new version row created whenever row updated opposed overwriting row i.e. row additionally identified id transaction created version row old well new versions row stored maintained though old versions moved database system database identified codice_5 row process updated requests blocked unlike locking executed older version row request update statement result two different versions rows—both stored database identified respective transaction ids main mode retrieving data sql server database querying query expressed using variant sql called t-sql dialect microsoft sql server shares sybase sql server due legacy query declaratively specifies retrieved processed query processor figures sequence steps necessary retrieve requested data sequence actions necessary execute query called query plan might multiple ways process query example query contains join statement select statement executing join tables executing select results would give result selecting table executing join result different execution plans case sql server chooses plan expected yield results shortest possible time called query optimization performed query processor sql server includes cost-based query optimizer tries optimize cost terms resources take execute query given query query optimizer looks database schema database statistics system load time decides sequence access tables referred query sequence execute operations access method used access tables example table associated index whether index used index column unique columns low selectivity might worthwhile use index access data finally decides whether execute query concurrently concurrent execution costly terms total processor time execution actually split different processors might mean execute faster query plan generated query temporarily cached invocations query cached plan used unused plans discarded time sql server also allows stored procedures defined stored procedures parameterized t-sql queries stored server issued client application case general queries stored procedures accept values sent client input parameters send back results output parameters call defined functions stored procedures including stored procedure set number times selectively provided access unlike queries stored procedures associated name used runtime resolve actual queries also code need sent client every time accessed name reduces network traffic somewhat improves performance execution plans stored procedures also cached necessary t-sql transact-sql microsoft proprietary procedural language extension sql server provides repl read-eval-print-loop instructions extend standard sql instruction set data manipulation dml data definition ddl instructions including sql server-specific settings security database statistics management exposes keywords operations performed sql server including creating altering database schemas entering editing data database well monitoring managing server client applications consume data manage server leverage sql server functionality sending t-sql queries statements processed server results errors returned client application exposes read-only tables server statistics read management functionality exposed via system-defined stored procedures invoked t-sql queries perform management operation also possible create linked servers using t-sql linked servers allow single query process operations performed multiple servers sql server native client native client side data access library microsoft sql server version 2005 onwards natively implements support sql server features including tabular data stream implementation support mirrored sql server databases full support data types supported sql server asynchronous operations query notifications encryption support well receiving multiple result sets single database session sql server native client used hood sql server plug-ins data access technologies including ado ole db sql server native client also directly used bypassing generic data access layers november 28 2011 preview release sql server odbc driver linux released microsoft sql server 2005 includes component named sql clr common language runtime via integrates .net framework unlike applications use .net framework sql server hosts .net framework runtime i.e. memory threading resource management requirements .net framework satisfied sqlos rather underlying windows operating system sqlos provides deadlock detection resolution services .net code well sql clr stored procedures triggers written managed .net language including c vb.net managed code also used define udt user defined types persist database managed code compiled cli assemblies verified type safety registered database invoked like procedure however subset base class library available running code sql clr apis relating user interface functionality available writing code sql clr data stored sql server databases accessed using ado.net apis like managed application accesses sql server data however creates new database session different one code executing avoid sql server provides enhancements ado.net provider allows connection redirected session already hosts running code connections called context connections set setting codice_6 parameter codice_7 connection string sql server also provides several enhancements ado.net api including classes work tabular data single row data well classes work internal metadata data stored database also provides access xml features sql server including xquery support enhancements also available t-sql procedures consequence introduction new xml datatype query value nodes functions sql server also includes assortment add-on services essential operation database system provide value added services top core database management system services either run part sql server component out-of-process windows service presents api control interact sql server machine learning services operates within sql server instance allowing people machine learning data analytics without send data across network limited memory computers services come microsoft r python distributions contain commonly used packages data science along proprietary packages e.g revoscalepy revoscaler microsoftml used create machine models scale analysts either configure client machine connect remote sql server push script executions run r python scripts external script inside t-sql query trained machine learning model stored inside database used scoring used inside instance programming environment cross-instance applications service broker communicates tcp/ip allows different components synchronized via exchange messages service broker runs part database engine provides reliable messaging message queuing platform sql server applications sql server replication services used sql server replicate synchronize database objects either entirety subset objects present across replication agents might database servers across network database caches client side lulla follows publisher/subscriber model i.e. changes sent one database server publisher received others subscribers sql server supports three different types replication sql server analysis services adds olap data mining capabilities sql server databases olap engine supports molap rolap holap storage modes data analysis services supports xml analysis standard underlying communication protocol cube data accessed using mdx linq queries data mining specific functionality exposed via dmx query language analysis services includes various algorithms—decision trees clustering algorithm naive bayes algorithm time series analysis sequence clustering algorithm linear logistic regression analysis neural networks—for use data mining sql server reporting services report generation environment data gathered sql server databases administered via web interface reporting services features web services interface support development custom reporting applications reports created rdl files reports designed using recent versions microsoft visual studio visual studio.net 2003 2005 2008 business intelligence development studio installed included report builder created rdl files rendered variety formats including excel pdf csv xml bmp emf gif jpeg png tiff html web archive originally introduced post-release add-on sql server 2000 notification services bundled part microsoft sql server platform first time sql server 2005 sql server notification services mechanism generating data-driven notifications sent notification services subscribers subscriber registers specific event transaction registered database server trigger event occurs notification services use one three methods send message subscriber informing occurrence event methods include smtp soap writing file filesystem notification services discontinued microsoft release sql server 2008 august 2008 longer officially supported component sql server database platform sql server integration services ssis provides etl capabilities sql server data import data integration data warehousing needs integration services includes gui tools build workflows extracting data various sources querying data transforming data—including aggregation de-duplication de-/normalization merging data—and exporting transformed data destination databases files sql server full text search service specialized indexing querying service unstructured text stored sql server databases full text search index created column character based text data allows words searched text columns performed sql codice_8 operator using sql server full text search service efficient full allows inexact matching source string indicated rank value range 0 1000—a higher rank means accurate match also allows linguistic matching inflectional search i.e. linguistic variants word verb different tense also match given word lower rank exact match proximity searches also supported i.e. words searched occur sequence specified query near also considered match t-sql exposes special operators used access fts capabilities full text search engine divided two processes filter daemon process codice_9 search process codice_10 processes interact sql server search process includes indexer creates full text indexes full text query processor indexer scans text columns database also index binary columns use ifilters extract meaningful text binary blob example microsoft word document stored unstructured binary file database ifilters hosted filter daemon process text extracted filter daemon process breaks sequence words hands indexer indexer filters noise words i.e. words like etc. occur frequently useful search remaining words inverted index created associating word columns found sql server includes gatherer component monitors changes tables invokes indexer case updates full text query received sql server query processor handed fts query processor search process fts query processor breaks query constituent words filters noise words uses inbuilt thesaurus find linguistic variants word words queried inverted index rank accurateness computed results returned client via sql server process sqlcmd command line application comes microsoft sql server exposes management features sql server allows sql queries written executed command prompt also act scripting language create run set sql statements script scripts stored codice_11 file used either management databases create database schema deployment database sqlcmd introduced sql server 2005 continues sql server 2012 2014 2016 predecessor earlier versions osql isql functionally equivalent pertains tsql execution many command line parameters identical although sqlcmd adds extra versatility microsoft visual studio includes native support data programming microsoft sql server used write debug code executed sql clr also includes data designer used graphically create view edit database schemas queries created either visually using code ssms 2008 onwards provides intellisense sql queries well sql server management studio gui tool included sql server 2005 later configuring managing administering components within microsoft sql server tool includes script editors graphical tools work objects features server sql server management studio replaces enterprise manager primary management interface microsoft sql server since sql server 2005 version sql server management studio also available sql server express edition known sql server management studio express ssmse central feature sql server management studio object explorer allows user browse select act upon objects within server used visually observe analyze query plans optimize database performance among others sql server management studio also used create new database alter existing database schema adding modifying tables indexes analyze performance includes query windows provide gui based interface write execute queries sql server operations studio preview cross platform query editor available optional download tool allows users write queries export query results commit sql scripts git repositories perform basic server diagnostics sql server operations studio supports windows mac linux systems business intelligence development studio bids ide microsoft used developing data analysis business intelligence solutions utilizing microsoft sql server analysis services reporting services integration services based microsoft visual studio development environment customized sql server services-specific extensions project types including tools controls projects reports using reporting services cubes data mining structures using analysis services sql server 2012 later ide renamed sql server data tools ssdt | [
5120,
9729,
3,
6147,
3080,
8201,
9224,
1035,
1549,
9234,
2068,
4116,
1560,
1049,
5658,
8227,
5669,
8230,
4135,
4647,
5673,
3629,
6190,
9263,
10286,
3636,
5173,
6709,
8246,
8757,
9268,
9780,
5691,
9789,
10302,
4674,
9286,
6219,
8781,
4174,... | Train |
11,031 | 2 | Userful:userful userful corporation canadian software company specializes video walls digital signage interactive displays desktop virtualization founded 2003 userful develops software turns standard pc high end video wall controller video wall processor userful head office located calgary alberta privately held for-profit company resellers around world founder chief technology officer timothy griffin founded userful corporation 2003 company commenced work multi-screen desktop computing platform core userful software first userful software release 2002 quickest market uptake low cost approach desktop virtualization schools public libraries locations needed locked virtual desktops military oilfields deployment 2014 userful launched video wall digital signage software built pc network zero client infrastructure desktop virtualization product october 2018 userful named john marshall new chief executive officer february 2009 userful announced claimed world largest desktop virtualization deployment 356,800 virtual desktops brazil may 2012 userful launched version 5 multiseat software added ethernet zero client support april 2012 userful announced partnership viewsonic produce linux-based zero-client product february 2013 userful launched userful multiplatform 6 enables running windows linux browser desktops multiseat environment february 2014 userful launched userful multiplatform 7.0 provides desktop virtualization central management desktops touch screens kiosks october 2014 userful partnered viewsonic create sc-u25 value vdi client userful multiplatform software december 2014 userful launched userful network video wall software turns standard pc video wall controller video wall processor supports ultra-high definition content one core i7 pc multiple video walls 25 standard displays august 2015 version 8.0 userful network video wall released updating core platform userful products improving performance reliability january 2016 version 8.5 userful released updating core platform include core enhancements enhanced support features vdi video walls may 2016 version 8.6 userful released update supports 8k video walls including enhanced features support vdi video walls september 2016 userful released version 8.7 featuring enhancements minor updates december 2016 userful released version 9.0 added many interactive features enhancements video walls digital signage see list userful software products built combination centos linux userful ’ software provisions manages zero clients userful software turns standard pc video wall controller video wall processor delivers content gigabit ethernet network userful software utilizes cpu gpu intel platform process render high resolution real time content release userful network video wall december 2014 world first commercially available video wall solution deliver real-time 4k content standard ethernet network one pc january 2016 userful updated video wall solution world first network video wall capable 6k source content real time ability support 40 screens one standard pc 60 screens high-end pc userful merged virtual desktop platform 8.5 release enabling delivery virtual desktops video wall userful also announced support multi-zone configurations allowing video wall broken sections different real time content played different zones within video wall may 2016 userful released version 8.6 improving display quality use discrete compatible gpus announced support 8k video content playback december 2016 userful launched version 9.0 increased number screens supported 1 pc 100 release also included interactivity tools ability store invoke presets change content zone configurations fly userful multiplatform multiseat desktop virtualization product works oracle virtualbox enable creation management multiple windows linux cloud desktops commercially available hardware userful desktop combines customized configurable gnome desktop managed remotely in-house tools product specifically designed full public computing solution kiosks public access computers desktop settings managed session profiles created stored central web portal pre-book open source pc reservation system originally client software userful/linux windows however opensource windows software since discontinued pre-book feature available people using userful platform public computing wanting advance reservations multi-location time management available cloud subscription feature starting release 8.5 userful ’ desktop virtualization video wall features joined single platform offers virtual desktops video wall digital signage solutions starting release 8.9 public computing features userful desktop pre-book also merged unified platform called userful userful multiseat linux replaced userful multiplatform software turns one linux computer 20 independent computer stations includes educational applications userful multiseat linux software linux-based equivalent windows multipoint server multiseat solutions education sector userful multiseat formerly userful multiplier commercial linux-based multiseat configuration software package allows multiple independent users connect single host pc time monitor keyboard mouse applications | [
4194,
9438
] | Test |
11,032 | 9 | Logic_for_Computable_Functions:logic computable functions logic computable functions lcf interactive automated theorem prover developed universities edinburgh stanford robin milner others 1972 lcf introduced general-purpose programming language ml allow users write theorem-proving tactics theorems system terms special theorem abstract data type ml type system ensures theorems derived using inference rules given operations abstract type successors include hol higher order logic isabelle | [
10049,
8262,
11026,
11028,
3929,
7386
] | Test |
11,033 | 6 | Disc_Filing_System:disc filing system disc filing system dfs computer file system developed acorn computers initially add-on eurocard-based acorn system 2 1981 education departments western australia south australia announced joint tenders calling supply personal computers schools acorn australian computer distributor barson computers convinced joint managing directors hermann hauser chris curry allow soon released acorn bbc microcomputer offered disk storage part bundle agreed condition barson adapted acorn dfs system 2 without assistance acorn resources available required minor hardware software changes make dfs compatible bbc micro barson tenders states dfs fitted year ahead uk early initiative resulted bbc micro heavily focused education market australia little penetration home computer market arrival acorn electron dfs shipped rom disk controller chip fitted bbc micro motherboard filing system extremely limited functionality storage capability using flat directory structure filename seven letters long plus one letter directory file stored dfs remarkable unlike filing systems single vendor implementation original dfs written acorn continued maintain codebase various disc drive vendors wrote implementations companies wrote dfs implementations included cumana opus watford electronics watford electronics implementation notable supporting 62 files per disc instead usual 31 using non-standard disc format features third-party implementations included able review free space built-in codice_1 codice_2 commands shipped utility disc original acorn dfs acorn followed original dfs series acorn 1770 dfs used disc format earlier version added set extra commands supported improved wd1770 floppy drive controller chip dfs conventionally uses one side double-density 5¼ floppy disc discs formatted either 40 80 track giving capacity 100 200 kb per side ten 256-byte sectors per track fm encoding capacity limited choice intel 8271 controller original bbc micro supports fm encoding mfm encoding already common use time bbc micro launch fm encoding gives half recording capacity mfm given physical disc density fm mfm encoding commonly referred single density double density although discs drives unlike high density uses different drives discs double-density 3½ discs formatted used 1770 dfs intel 8271-based dfs problems many 3½ drives giving single-density capacity fm encoding originally standard practice 3½ discs normally formatted mfm double density using later advanced disc filing system present acorn machines supplied 3½ drives 2009 3½ drives commonly used bbc micros past including use dfs due greater availability easier data interchange recent computers high-density 5¼ 3½ discs supported dfs dfs directly support double-sided discs instead two heads double-sided drive treated two separate logical drives dfs support four volumes numbered 0 3 drive 0 default drive 1 representing second drive attached cable drive 2 referred reverse side drive 0 drive 3 reverse drive 1 support two physical drives due installed base single-sided drives commercial software normally provided single-sided discs flippy discs manually reversed access side discs formatted using 40 80 tracks using codice_3 codice_4 commands drives either 40 80 track common compatibility issue dfs users 40-track discs norm commercial software distribution due installed base 40-track drives 80-track drives became common prices dropped allowing users store data 80-track drive automatically read 40-track discs disc capacity stored sector count catalogue track zero track zero located place 40- 80-track discs allowing disc file system set motor stepping accordingly however intel 8271-based acorn dfs dual-format capability addressed number ways failure use correct setting would result errors dfs codice_5 damage disc drive trying step heads beyond physical end disc surface switching 80 tracks extend catalogue way leaving user prone running filename slots running space disc situation resulted codice_6 error dfs case-preserving case-sensitive prevalence all-capitals filenames likely due bbc micro defaulting caps lock enabled hard soft reset character set quite permissive printable characters 7-bit ascii allowed including spaces excluding sake portability third-party dfs implementations best avoid codice_12 codice_16 leaf names quotation marks allowed although bbc basic requires escaped twice fully qualified filename file specification fsp short contains colon drive number dot directory letter another dot name example file default directory drive 2 called codice_31 would complete specification codice_32 drive directory specifiers optional directories dfs single character prefixes filenames codice_21 codice_34 used group files arrangement flat default directory codice_35 used instead root directory requesting catalogue disc codice_36 codice_37 commands files current directory shown directory prefix one block listed files second block directory prefixes visible example acorn dfs third party dfs implementations may vary slightly top seven files current directory codice_35 drive 0 files directories case codice_39 codice_40 codice_21 codice_42 filename codice_43 shows file locked modification deletion first line contains disc title modification count dfs provides working space divided directory library directory working directory current volume much like working directory command line system library second alternative working directory functions like path benefit able volume requests open files unqualified names first searched working directory failing library directory also searched directory library default directory catalogue file table occupies first two disc sectors one names directories file matching sector holding file locations sizes metadata eight bytes sector used file eight bytes sector reserved 12-byte disc title volume information total number files disc irrespective directory file limited 31 interests saving space significant bit directory letter file used locked read-only flag although physical disks usually formatted either 100 kb 200 kb dfs supports volume sizes 256 kb largest dfs file size allowed volume size minus ½ kb catalogue file sizes stored 18-bit quantity dfs support data fragmentation meaning file data must stored single run consecutive sectors free space prone becoming fragmented random-access file writes fail end file reaches beginning next even though may free sectors elsewhere disc cases dfs aborts codice_44 error codice_45 split file fit available space either failure occurs sector allocation stage error returned codice_46 codice_47 command provided relocate files disc solid block placing free space second block allows next file created fill disc last existing file extended without moved codice_45 virtually deletes existing file copies specified block memory wherever space disc contrast codice_47 command uses program memory buffer relocate files overwriting program data memory like cassette filing system acorn dfs supports bbc micro standard file metadata load address execution address required acorn mos operating system used bbc micro support relocation binary code file loaded address programmer intended contents may refer internal locations absolute addresses execution address also recorded entry point necessarily beginning even within file file attributes limited single bit locked set codice_42 appears right file name catalogue file may altered overwritten deleted dfs discs track dates acorn mos prior version 3 maintain real-time clock instead offer peculiar feature modification count every time catalogue updated count increments count shown parentheses title first line disc catalogue codice_51 catalogue listing shown earlier dfs also supports means start disc software based key sequence shift key held machine soft hard reset dfs checks drive 0 disc containing positive boot flag boot flag either 0 ignore 1 load file 2 run machine code file 3 execute script boot flag positive file called codice_52 looked loaded memory 1 loaded executed machine code 2 fed keyboard buffer 3 option 3 reads exec files text macro files used primitive shell scripts true shell scripts simply series keys typed like recording play back thus loop branch unless input code basic interpreter well used reset executed time operating system codice_53 command exec files file system independent variant dfs called dnfs disc/network filing system contained econet network filing system nfs standard disc filing system tube co-processor support software single rom rom installed two filing systems os initial design dfs based around intel corporation fdc 8271 disc drive controller immediate predecessor 8272 design found ibm personal computer 8271 controller limited functionality obsolete later versions file system various vendors including solidisk acorn watford electronics based later wd1770 wd1772 drive controllers 1770 controller quickly became standard controller acorn range following advent adfs dfs superseded advanced disc filing system adfs fully hierarchical suitable running hard drives bbc micro adfs default filing system bbc master users likely reverted dfs compatibility reasons adfs could read dfs discs adfs also chosen standard filing system risc os | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
10862,
9333,
6263,
9335,
11384,
2687,
9343,
3722,
7818,
654,
2193,
2194,
10387,
2197,
2199,
11419,
6309,
1190,
5286,
... | Validation |
11,034 | 9 | LEGO_(proof_assistant):lego proof assistant lego proof assistant developed randy pollack university edinburgh implements several type theories edinburgh logical framework lf calculus constructions coc generalized calculus constructions gcc unified theory dependent types utt | [
6070,
4791
] | Test |
11,035 | 1 | Liberian_companies:liberian companies companies republic liberia regulated variety laws corporate laws liberia promulgated 50 years ago provide offshore jurisdiction ship owners international financial community liscr liberian international ship corporate registry appointed government liberia agent manage corporate registry act sole registered agent corporations registered liberia place business elsewhere corporate registry managed liscr located dulles virginia us office zurich switzerland two income tax treaties sweden germany force additionally liberia corporate jurisdiction oecd ’ white-list countries substantially implemented tax transparency meet internationally agreed tax standard liberian registry – second largest world – includes 4,300 ships 160 million gross tons accounts 12 percent world ’ oceangoing fleet liberian fleet one youngest nations average vessel age 12 years according u.s. maritime administration liberian-flagged vessels carry one-third oil imported united states liberian registry administered liberian international ship corporate registry liscr llc u.s. owned operated company provides day-to-day management republic liberia rol ship corporate registry addition regional offices many major maritime centers world liberian registry also supported worldwide network 400 nautical inspectors auditors liberian registry open ship owner world order enter liberian registry vessel must less 20 years age must meet high safety standards liberian flagged ships able trade anywhere world crew nationality restrictions taxes liberian vessels conservative rates based net tonnage registration vessels eligible liberian entities registered business entities incorporated jurisdictions registered liberian foreign maritime entity liberian corporations llcs partnerships not-for-profit businesses easily formed special documents required submitted order form confirming details entity requested however accept formation instructions professional user offshore corporations including ship managers manning agents ship owners etc. well trust company managers lawyers accountants investment companies etc accept instructions directly individuals engaged professionally company management acting professional advisor lawyer articles incorporation include minimum name corporation purpose corporation type shares total authorized share capital name incorporator names subscribers shares number initial directors directors shareholders officers need registered liberia thus possible obtain public record form evidence directors shareholders officers particular feature makes administration liberian company particularly simple offshore trust companies unfortunately sometimes create difficulties liberian company enter contract since counter-party must follow paper trail ensure dealing duly elected officials company purpose liberian corporations voluntarily file information needed conduct business liberian companies shall keep correct complete books records account shall keep minutes meetings shareholders actions taken consent shareholders meetings board directors actions taken consent directors meetings executive committee requirement file information public register instead corporation responsible safekeeping records requirement audited accounts liberian corporation decision audit accounts one shareholders take costs 713.50 register company liberia annual registration fee 450.00 requirement company director physically present liberia time capital investment requirements start liberian company maintain non-resident domestic corporation status least 75 previously 50 company shares share subscription rights must owned controlled non-residents liberia liberia special bank secrecy laws like tax havens deterrent liberian offshore corporations actually handle banking transactions within liberia ’ territory borders moreover requirement must bank liberia certified copies filed corporate records available order public | [
3090
] | Validation |
11,036 | 9 | PDF/UA:pdf/ua pdf/ua pdf/universal accessibility informal name iso 14289 international standard accessible pdf technology technical specification intended developers implementing pdf writing processing software pdf/ua provides definitive terms requirements accessibility pdf documents applications equipped appropriate software conformance pdf/ua ensures accessibility people disabilities use assistive technology screen readers screen magnifiers joysticks technologies navigate read electronic content february 18 2015 us access board announced proposed rule us federal policy accessibility commonly known section 508 proposed rule identifies pdf/ua equivalent wcag 2.0 appropriate content pdf/ua separate file-format simply way use familiar pdf format invented adobe systems standardized iso 32000 general pdf/ua requires tagged pdf iso 32000-1 14.8 adds variety qualitative requirements especially regarding semantic correctness tags employed pdf/ua complements wcag 2.0 used make pdf files also conform wcag 2.0 2014 update pdf/ua published december 2014 first fully accessible standard iso ever published pdf file distributed iso conforms pdf/ua formal name pdf/ua iso 14289-1 document management applications -- electronic document file format enhancement accessibility -- part 1 use iso 32000-1 pdf/ua-1 pdf/ua specification written software developers pdf/ua support interest persons disabilities require benefit assistive technology reading electronic content pdf/ua conforming files readers assistive technology users guaranteed – far pdf format provide – equal access information benefits pdf/ua extend beyond people disabilities support pdf/ua reader software able reliably reflow text onto small screens provide powerful navigation options transform text appearance improve search engine functionality aid selection copying text pdf/ua project began 2004 aiim standards committee pdf/ua wiki operated aiim contains agendas meeting-minutes public-access documents pertaining development pdf/ua chaired since 2005 duff johnson 2009 aiim pdf/ua committee became u.s. committee iso/awi accepted work item 14289 cherie ekholm microsoft international project leader us committee continued main driver standard development wd cd dis fdis phases iso standards development review comment balloting member bodies iso tc 171 iso 14289-1:2012 pdf/ua published july 2012 minor update iso 14289-1:2014 published december 2014 document available directly iso webstore october 2012 us library congress added pdf/ua list archivable file formats loc guidance states pdf/ua ... preferred format page-oriented content library congress adobe systems largest implementer interactive pdf software announced intention support pdf/ua december 2014 iso published iso 14289-1:2014 minor revision original 2012 document march 2016 aiim ansi published pdf/ua american national standard aiim us committee pdf/ua published following documents support pdf/ua work iso 14289-2 pdf/ua-2 ongoing pdf/ua-2 based pdf 2.0 aiim us committee pdf/ua led development document 2004 2010 draft became iso nwi us iso committees maintain work aiim pdf standards wiki participation subject matter experts software developers interested parties invited encouraged pdf association helps promote pdf/ua variety ways 2011 pdf association created pdf/ua competence center way vendors develop educational resources share experiences regarding implementation pdf/ua matterhorn protocol see product pdf/ua competence center 2012 2013 pdf association helped raise money awareness nv access nvda development world first pdf/ua conforming screen reader august 2013 pdf association pdf/ua competence center published matterhorn protocol set 31 checkpoints 136 failure conditions help software developers make easier document authors create fully accessible pdf files forms june 2014 pdf association pdf/ua competence center published first iteration pdf/ua reference suite set reference-quality documents conforming pdf/ua-1. ref name= pdf/ua reference suite /ref december 2015 pdf association pdf/ua competence center unveiled first public draft tagged pdf best practice guide publication expected summer 2016 pdf association conducted numerous educational seminars pdf/ua throughout europe north america australia 2012 2013 book pdf/ua nutshell produced english german informational brochure also produced languages | [
10752,
8854,
5149,
2206,
9245,
5413,
10413,
11056,
8627,
3126,
1079,
5816,
6977,
8904,
1610,
9290,
8524,
2519,
2904,
4058,
4064,
8421,
8426,
5614,
1010,
3447,
2045,
10238
] | Test |
11,037 | 2 | DVD_Player_(Mac_OS):dvd player mac os dvd player formerly apple dvd player default dvd player macos supports standard dvd features multiple audio video subtitle tracks well dolby digital 5.1 passthrough dvd access urls closed captions instances users choose vob file open dvd player also fully compatible dvds authored dvd studio pro idvd including hd dvds dvd studio pro macos mojave updated 64-bit sports new icon better touch bar support dvd player complies copyright laws thus enforce restrictive measures dvd technology region-restrictive encodings user-inhibited operations disabled actions even using all-region dvd drive even force apple grab screen-grabbing program cease functioning finder interface dvd player application quit effectively preventing user taking screen captures visual dvd content software contain dts decoder dts tracks played mac built speakers analog output however dts tracks output devices decoder playback supported outputs s/pdif displayport hdmi | [
1542,
4615,
3598,
5647,
1042,
6700,
4657,
1074,
1592,
576,
9802,
5713,
3670,
4184,
2141,
4702,
3167,
2149,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
9358,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
172... | None |
11,038 | 8 | Amazon_Simple_Queue_Service:amazon simple queue service amazon simple queue service amazon sqs distributed message queuing service introduced amazon.com late 2004 supports programmatic sending messages via web service applications way communicate internet sqs intended provide highly scalable hosted message queue resolves issues arising common producer-consumer problem connectivity producer consumer amazon sqs described commoditization messaging service well-known examples messaging service technologies include ibm websphere mq microsoft message queuing unlike technologies users need maintain server amazon sells sqs service per-use rate amazon provides sdks several programming languages including java ruby python .net php javascript java message service jms 1.1 client amazon sqs released december 2014 amazon sqs provides authentication procedures allow secure handling data amazon uses amazon web services aws identification requiring users aws enabled account amazon.com created amazon web services aws cloud computing services aws assigns pair related identifiers aws access keys aws enabled account perform identification first identifier public 20-character access key key included aws service request identify user user using soap protocol ws-security digital signature calculated using secret access key secret access key 40-character private identifier aws uses access key id provided service request look account secret access key amazon.com calculates digital signature key match user considered authentic authentication fails request processed amazon sqs guarantees at-least-once delivery messages stored multiple servers redundancy ensure availability message delivered server available may removed server queue may resent amazon sqs guarantee recipient receive messages order sent sender message ordering important required application place sequencing information within messages allow reordering delivery messages type data contained within restricted message bodies initially limited 8kb size later raised 64kb 2010-07-01 256kb 2013-06-18 larger messages user options get around limitation large message split multiple segments sent separately message data stored using amazon simple storage service amazon s3 amazon dynamodb pointer data transmitted sqs message amazon made extended client library available purpose extension amazon sqs client enables sending receiving messages 2gb via amazon s3 awslabs/amazon-sqs-java-extended-client-lib service supports unlimited queues message traffic sqs automatically delete messages sent message delivered receipt handle generated delivery sent recipient receipts sent message addition sqs requires recipient provide receipt order delete message feature new 2008 message id required message deletion system distributed message may sent case recent receipt handle needed delete message message delivered visibility timeout prevent components consuming clock visibility timeout starts message sent default time 30 seconds queue told delete message time message becomes visible resent queue also consists retention parameter defaulting 4 days message residing queue longer purged automatically retention modified 1 minute 14 days user retention changed messages already queue message queue longer new retention purged dropbox netflix nextdoor examples companies use sqs extensively sqs also widely used within amazon.com first 1 million monthly requests free pricing follows regions date transfer price | [
8962,
8451,
3462,
6027,
4236,
10893,
911,
1935,
4623,
8592,
2965,
2328,
4377,
8986,
5660,
9245,
6307,
11556,
9766,
5159,
2217,
6444,
5677,
6522,
8495,
3121,
7352,
10681,
2496,
4289,
11201,
8644,
1224,
5960,
8520,
10185,
4429,
590,
7248,
1... | Test |
11,039 | 3 | Exchange_to_exchange:exchange exchange exchange exchange sometimes exchange-to-exchange abbreviated e2e integration certain pairs computer systems qualify e2e paired systems must primary use acting exchange gateway among customers common example connection stock brokerage firms internal systems systems stock market broker trades connections often facilitated middleware services object request brokers e2e partner system primary function clients allowing transfer information conduct transactions form business business b2b commerce model e2e partner b2b gateway clients turn exchanges information least one b2b gateway connection two b2b systems exchanges exchange exchange integration e2e alternative direct application application integration a2a though a2a classified e2e | [
8122,
8100,
8581
] | None |
11,040 | 8 | WS-Federation_Active_Requestor_Profile:ws-federation active requestor profile ws-federation active requestor profile web services specification intended work ws-federation specification defines identity authentication authorization mechanisms work across trust realms specification deals specifically applications soap-enabled applications make requests using mechanisms way contrast ws-federation passive requestor profile deals passive requestors web-browsers ws-federation active requestor profile created ibm bea systems microsoft verisign rsa security | [
10020,
7878,
2154,
10486,
3323,
317
] | None |
11,041 | 7 | Borg_(cluster_manager):borg cluster manager borg cluster manager used google led widespread use similar approaches docker kubernetes | [
2834,
4149,
2910
] | Test |
11,042 | 0 | MUSA_(MUltichannel_Speaking_Automaton):musa multichannel speaking automaton musa multichannel speaking automaton early prototype speech synthesis machine started 1975 consisted stand-alone computer hardware specialized software implemented diphone-synthesis technology one first real-time tts systems able read italian intellegibile robotic voice also sing managing 8 synthesis channels parallel thanks linear predictive coding technology 1978 released building working prototype 45 rpm audio disk containing trial content synthesis including song fra martino campanaro cappella multiple voices style attached commercial reviews experiment conducted cselt turin italy led giulio modena | [
5362,
3533
] | None |
11,043 | 0 | Sliding_window_based_part-of-speech_tagging:sliding window based part-of-speech tagging sliding window based part-of-speech tagging used part-of-speech tag text high percentage words natural language words context assigned one part speech percentage ambiguous words typically around 30 although depends greatly language solving problem important many areas natural language processing example machine translation changing part-of-speech word dramatically change translation sliding window based part-of-speech taggers programs assign single part-of-speech given lexical form word looking fixed sized window words around word disambiguated two main advantages approach let set grammatical tags application set possible tags may assigned word let vocabulary application let function morphological analysis assigns formula_4 set possible tags formula_5 implemented full-form lexicon morphological analyser let set word classes general partition formula_7 restriction formula_8 words formula_9 receive set tags words word class formula_10 belong ambiguity class normally formula_11 constructed way high frequency words word class contains single word low frequency words word class corresponds single ambiguity class allows good performance high frequency ambiguous words n't require many parameters tagger definitions possible state problem following way given text formula_12 word formula_13 assigned word class formula_14 either using lexicon morphological analyser order get ambiguously tagged text formula_15 job tagger get tagged text formula_16 formula_17 correct possible statistical tagger looks probable tag ambiguously tagged text formula_18 using bayes formula converted formula_21 probability particular tag syntactic probability formula_22 probability tag corresponds text formula_23 lexical probability markov model probabilities approximated products syntactic probabilities modelled first order markov process formula_25 formula_26 delimiter symbols lexical probabilities independent context one form tagging approximate first probability formula formula_29 right context size formula_30 way sliding window algorithm take account context size formula_31 applications formula_32 example tag ambiguous word run sentence runs danger tags words needed taken account | [
7780,
538,
7164
] | None |
11,044 | 4 | Downgrade_attack:downgrade attack downgrade attack form cryptographic attack computer system communications protocol makes abandon high-quality mode operation e.g encrypted connection favor older lower-quality mode operation e.g cleartext typically provided backward compatibility older systems example flaw found openssl allowed attacker negotiate use lower version tls client server one common types downgrade attacks another example intercepting web traffic redirecting user secure https version website unencrypted http version downgrade attacks often implemented part man-in-the-middle attack may used way enabling cryptographic attack might possible otherwise downgrade attacks consistent problem ssl/tls family protocols examples attacks include poodle attack downgrade attacks tls protocol take many forms researchers classified downgrade attacks respect four different vectors represents framework reason downgrade attacks follows recent proposals removing backward compatibility often way prevent downgrade attacks however sometimes client server recognize up-to-date manner prevents example web server user agent implement http strict transport security user agent knows server either previously accessed https hsts preload list user agent refuse access site vanilla http even malicious router represents server https-capable | [
9412,
3657,
11345,
1688,
10908,
1501,
2558,
4863
] | None |
11,045 | 2 | ArchOne:archone archone arch linux based operating system optimized acer aspire one netbooks usable pcs similar hardware archone preconfigured support hardware acer aspire one drivers network sound graphics special keys webcam active make hardware ready use immediately upon first boot archone uses rolling-release model upgrades archone three versions different desktop manager openbox edition gnome edition kde edition. application software including firefox google chrome skype keepassx hsoconnect gparted gimp openoffice.org vlc mplayer | [
5067,
5363,
5397,
5078,
7483
] | Test |
11,046 | 4 | Email_encryption:email encryption email encryption encryption email messages protect content read entities intended recipients email encryption may also include authentication email prone disclosure information emails currently transmitted clear encrypted form emails sent using gmail outlook encrypted default possible send unencrypted email using gmail warning icon appear address bar means available tools persons designated recipients read email contents email encryption rely public-key cryptography users publish public key others use encrypt messages keeping secret private key use decrypt messages digitally encrypt sign messages send original design email protocol communication email servers plain text posed huge security risk years various mechanisms proposed encrypt communication email servers encryption may occur transport level aka hop hop end-to-end transport layer encryption often easier set use end-to-end encryption provides stronger defenses difficult set use one commonly used email encryption extensions starttls tls ssl layer plaintext communication allowing email servers upgrade plaintext communication encrypted communication assuming email servers sender recipient side support encrypted communication eavesdropper snooping communication mail servers use sniffer see email contents similar starttls extensions exist communication email client email server see imap4 pop3 stated rfc 2595 starttls may used regardless whether email contents encrypted using another protocol encrypted message revealed altered intermediate email relays words encryption takes place individual smtp relays sender recipient good bad consequences key positive trait transport layer encryption users need change anything encryption automatically occurs send email addition since receiving organizations decrypt email without cooperation end user receiving organizations run virus scanners spam filters delivering email recipient however also means receiving organization anyone breaks organization email system unless steps taken easily read modify email receiving organization considered threat end-to-end encryption necessary electronic frontier foundation encourages use starttls launched 'starttls everywhere initiative make simple easy everyone help ensure communications email ’ vulnerable mass surveillance support starttls become quite common google reports gmail 90 incoming email 90 outgoing email encrypted using starttls 2018-07-24 mandatory certificate verification historically viable internet mail delivery without additional information many certificates verifiable want email delivery fail case result email delivered tls uses opportunistic encryption dane proposed standard makes incremental transition verified encryption internet mail delivery possible starttls everywhere project uses alternative approach support “ preload list ” email servers promised support starttls help detect prevent downgrade attacks end-to-end encryption data encrypted decrypted end points words email sent end-to-end encryption would encrypted source unreadable service providers like gmail transit decrypted endpoint crucially email would decrypted end user computer would remain encrypted unreadable form email service like gmail would n't keys available decrypt email services integrate end-to-end encryption automatically notable protocols end-to-end email encryption include openpgp data encryption standard allows end-users encrypt email contents various software email-client plugins allow users encrypt message using recipient public key sending core openpgp uses public key cryptography scheme email address associated public/private key pair openpgp provides way end users encrypt email without support server sure intended recipient read however usability issues openpgp — requires users set public/private key pairs make public keys available widely also protects content email metadata — untrusted party still observe sent email general downside end end encryption schemes—where server decryption keys—is makes server side search almost impossible thus impacting usability signed encrypted email internet demonstration shown organizations collaborate effectively using secure email previous barriers adoption overcome including use pki bridge provide scalable public key infrastructure pki use network security guards checking encrypted content passing corporate network boundaries avoid encryption used hide malware introduction information leakage transport layer encryption using starttls must set receiving organization typically straightforward valid certificate must obtained starttls must enabled receiving organization email server prevent downgrade attacks organizations send domain 'starttls policy list' full-featured email clients provide native support s/mime secure email digital signing message encryption using certificates encryption options include pgp gnu privacy guard gnupg free commercial software desktop application webmail add-ons available well pgp protect messages also hard use correct way researchers carnegie mellon university published paper 1999 showing people could n't figure sign encrypt messages using current version pgp eight years later another group carnegie mellon researchers published follow-up paper saying although newer version pgp made easy decrypt messages people still struggled encrypting signing messages finding verifying people public encryption keys sharing keys encryption difficult users security compliance managers companies government agencies automate process employees executives using encryption appliances services automate encryption instead relying voluntary co-operation automated encryption based defined policies takes decision process users hands emails routed gateway appliance configured ensure compliance regulatory security policies emails require automatically encrypted sent recipient works organization uses encryption gateway appliance emails automatically decrypted making process transparent user recipients behind encryption gateway need take extra step either procuring public key logging online portal retrieve message | [
2050,
3590,
8202,
2187,
8331,
9744,
1169,
1297,
5016,
3495,
8744,
3629,
9909,
5433,
7117,
10831,
3161,
3930,
8283,
4573,
8674,
2800,
3701,
1529,
8061
] | Test |
11,047 | 3 | AMD_K9:amd k9 amd k9 represents microarchitecture amd designed replace k8 processors featuring dual-core processing k9 appears originally ambitious 8 issue per clock cycle core redesign k7 k8 processor core one point k9 greyhound project amd worked k7 design team beginning early 2001 tape-out revision a0 scheduled 2003 l1 instruction cache said hold decoded instructions essentially intel trace cache existence massively parallel cpu design concept heavily multi threaded applications also revealed planned successor k8 reportedly canceled conceptualization phase 6 months work one time k9 internal codename dual-core amd64 processors brand athlon 64 x2 however amd distanced old k series naming convention seeks talk portfolio products tailored different markets | [
3586,
8322,
5380,
9092,
6151,
8327,
10375,
5645,
7963,
2719,
5541,
2094,
6978,
7234,
11080,
2764,
473,
5356,
1005,
9964,
1137,
2549,
3070
] | Validation |
11,048 | 4 | Chain_of_trust:chain trust computer security chain trust established validating component hardware software end entity root certificate intended ensure trusted software hardware used still retaining flexibility chain trust designed allow multiple users create use software system would difficult keys stored directly hardware starts hardware boot software digitally signed signing authority sign boot programs enforce security running programs signed allowing signed code access certain features machine process may continue several layers process results chain trust final software trusted certain properties illegally modified signature would invalid previous software would executed previous software trusted turn would loaded signature invalid trustworthiness layer guaranteed one back trust anchor would possible hardware check suitability signature every single piece software however would produce flexibility chain provides chain given link replaced different version provide different properties without go way back trust anchor use multiple layers application general technique improve scalability analogous use multiple certificates certificate chain computer security digital certificates verified using chain trust trust anchor digital certificate root certificate authority ca certificate hierarchy structure certificates allows individuals verify validity certificate issuer certificates issued signed certificates reside higher certificate hierarchy validity trustworthiness given certificate determined corresponding validity certificate signed chain trust certificate chain ordered list certificates containing end-user subscriber certificate intermediate certificates represents intermediate ca enables receiver verify sender intermediate certificates trustworthy process best described page intermediate certificate authority see also x.509 certificate chains description concepts widely used standard digital certificates | [
517,
510,
9356,
9744,
2558
] | Validation |
11,049 | 7 | Trace-based_simulation:trace-based simulation computer science trace-based simulation refers system simulation performed looking traces program execution system component access purpose performance prediction trace-based simulation may used variety applications analysis solid state disks message passing performance large computer clusters traced-based simulators usually two components one executes actions stores results i.e traces another reads log files traces interpolates new often complex scenarios instance case large computer cluster design execution takes place small number nodes traces left log files simulator reads log files simulates performance much larger number nodes thus providing view performance large applications based execution traces much smaller number nodes | [
11618,
5029
] | None |
11,050 | 3 | Architectural_state:architectural state architectural state part cpu holds state process typically held processor registers includes include actual computation units alu instance | [
8352,
3630,
1776,
4465,
7313,
499,
7858,
8501,
10612,
9911
] | Test |
11,051 | 4 | Steve_Gibson_(computer_programmer):steve gibson computer programmer steven steve tiberius gibson born 26 march 1955 american software engineer security researcher security proponent early 1980s gibson worked light pen technology use apple atari systems 1985 founded gibson research corporation best known spinrite software gibson started working computers teenager got first computing job stanford university artificial intelligence lab 15 years old studied electrical engineering computer science university california berkeley gibson hired programmer california pacific computer company 1980 worked copy protection company products gibson founded gibson laboratories laguna hills california 1981 gibson labs developed light pen apple ii atari platforms went business 1983.. 1985 gibson founded gibson research corporation grc computer software development firm 1986 1993 gibson wrote tech talk column infoworld magazine 1999 gibson created one first adware removal programs called optout 2001 gibson predicted microsoft implementation sock_raw protocol initial release windows xp would lead widespread chaos making easier windows xp users create denial service dos attacks year company website brought dos attack attacks continued two weeks gibson blogged attacks ultimately successful efforts track hacker three years windows xp release microsoft limited raw socket support service pack 2 2005 gibson launched weekly podcast called security leo laporte twit.tv archives hosted grc website 2006 gibson raised possibility windows metafile vulnerability bug actually backdoor intentionally engineered system response microsoft mark russinovich microsoft technet stated bug appeared coding error gibson reasoning based upon microsoft abort procedure documentation misleading 2013 proposed sqrl way simplify process authentication without risk revelation information transaction third party grc created number utilities freeware | [
9862,
107,
2508,
1069,
877,
10990,
3445,
6550,
8732,
9085
] | Test |
11,052 | 4 | SigSpoof:sigspoof sigspoof family security vulnerabilities affected software package gnu privacy guard gnupg since version 0.2.2 released 1998 several software packages make use gnupg also affected pass enigmail un-patched versions affected software sigspoof attacks allow cryptographic signatures convincingly spoofed certain circumstances potentially enables wide range subsidiary attacks succeed according marcus brinkmann discovered sigspoof vulnerabilities june 2018 existence fact present wild long throws question integrity past emails backups software updates ... source code version control systems like git | [
1024,
8320,
2050,
3843,
5636,
5764,
10502,
2187,
4240,
11152,
10003,
10132,
4117,
8726,
535,
1688,
2717,
9375,
1440,
5024,
9761,
4644,
4133,
5028,
11175,
297,
2857,
5547,
8489,
9518,
9904,
7601,
1970,
9395,
8886,
1337,
441,
1979,
4027,
10... | None |
11,053 | 3 | Jack_the_Nipper:jack nipper jack nipper video game gremlin graphics released 1986 zx spectrum commodore 64 amstrad cpc msx followed sequel character loosely based british comic strip character sweeny toddler jack nipper side-view flip screen game puzzle solving platform elements graphics rendered 2d illusion depth achieved allowing characters move forward back within playing area player controls jack naughty child wants break record naughtiness recorded naughtyometer needs carry various wicked pranks unsuspecting inhabitants town comes contact angry adults spanked spanking nappy rash meter increases grows high jack loses life contact monsters ghosts inhabit town also increase nappy rash game went number 2 uk sales charts behind ghosts n'goblins sinclair user described wallyish style reminiscent pyjamarama running wild village searching houses shops gardens objects use create havoc elsewhere environment populated beano -type characters review noted tempting come across well-tended garden happen bottle weed killer ... tin glue false teeth factory ... zx computing praised graphics spectrum version voted number 40 sinclair readers top 100 games time starting april 1987 sinclair magazine published monthly comic strip based character | [
10931,
11139,
9006
] | None |
11,054 | 3 | WDC_65C265:wdc 65c265 western design center wdc w65c265s microcontroller complete fully static 16-bit computer fabricated single chip using hi-rel low power cmos process w65c265s complements established growing line 65xx products wide range microcomputer applications w65c265s developed hi-rel applications minimum power required w65c265s consists w65c816s static central processing unit cpu 8 kb read memory rom 576 bytes random access memory ram processor defined cache software control eight 16-bit timers maskable interrupts high performance interrupt-driven parallel interface bus pib four universal asynchronous receivers transmitters uart baud rate timers monitor watch dog timer restart interrupt twenty-nine priority encoded interrupts built-in emulation features time day tod clock features twin tone generators tgx bus control register bcr external memory bus control interface circuitry peripheral devices abort input low cost virtual memory interface many low power features innovative architecture demonstrated high performance w65c265s cpu well instruction simplicity result system cost-effectiveness wide range computational power | [
7170,
11395,
6925,
10767,
1170,
7445,
664,
10784,
4385,
4773,
7589,
9638,
682,
2224,
11314,
10945,
3010,
7235,
9928,
6607,
3157,
6485,
9685,
4569,
10969,
5862,
9964,
11374,
10351,
1776,
5617,
7281,
7282,
7284,
8700
] | Test |
11,055 | 7 | YellowDog:yellowdog yellowdog limited uk software company headquartered bristol yellowdog hybrid multi-cloud management platform intelligent predictive analytics company currently applications two industries 3d rendering media entertainment batch processing financial services company vision creating world people create discover unleashed limited computing power yellowdog founded gareth williams january 2015 incorporated yellowdog limited january 2015 first render application launched sale november 2015 launched second application batch processing financial services march 2018 originally envisioned peer peer power sharing network yellowdog soon changed power source private providers public cloud infrastructure idle capacity handful company data centers uses power give creative firms processing power need produce complex 3d renderings work yellowdog received crowdfunding seedrs 2015 subsequent investment private equity networks vc investment yellowdog gives creative firms processing power need produce complex 3d renderings work standard yellowdog released october 2015 standard yellowdog yellowdog widely used application supports 3ds max maya cinema 4d v-ray corona redshift mental ray software use across visual effects animation cgi naked yellowdog yellowdog deployed first customer october 2016 allows yellowdog support multiple combinations software supported standard yellowdog yellowdog premise released march 2018 finovate europe 2018 support batch processing banks financial services first public presentation product given live finovate europe 2018 yellowdog headquarters located bristol uk engine shed located bristol quarter enterprise zone engine shed new use part old temple meads station brunel original building partnership university bristol hosts business incubators including setsquared supports hi-tech startup companies public consultation engine shed 2 took place november 2016 yellowdog base engine shed encourages innovation collaboration networks based growth plans yellowdog double size 2018 | [
8640,
10116
] | Test |
11,056 | 0 | Lexical_Markup_Framework:lexical markup framework language resource management lexical markup framework lmf iso 24613:2008 iso international organization standardization iso/tc37 standard natural language processing nlp machine-readable dictionary mrd lexicons scope standardization principles methods relating language resources contexts multilingual communication goals lmf provide common model creation use lexical resources manage exchange data among resources enable merging large number individual electronic resources form extensive global electronic resources types individual instantiations lmf include monolingual bilingual multilingual lexical resources specifications used small large lexicons simple complex lexicons written spoken lexical representations descriptions range morphology syntax computational semantics computer-assisted translation covered languages restricted european languages cover natural languages range targeted nlp applications restricted lmf able represent lexicons including wordnet edr parole lexicons past lexicon standardization studied developed series projects like genelex edr eagles multext parole simple isle iso/tc37 national delegations decided address standards dedicated nlp lexicon representation work lmf started summer 2003 new work item proposal issued us delegation fall 2003 french delegation issued technical proposition data model dedicated nlp lexicons early 2004 iso/tc37 committee decided form common iso project nicoletta calzolari cnr-ilc italy convenor gil francopoulo tagmatica france monte george ansi usa editors first step developing lmf design overall framework based general features existing lexicons develop consistent terminology describe components lexicons next step actual design comprehensive model best represented lexicons detail large panel 60 experts contributed wide range requirements lmf covered many types nlp lexicons editors lmf worked closely panel experts identify best solutions reach consensus design lmf special attention paid morphology order provide powerful mechanisms handling problems several languages known difficult handle 13 versions written dispatched national nominated experts commented discussed various iso technical meetings five years work including numerous face-to-face meetings e-mail exchanges editors arrived coherent uml model conclusion lmf considered synthesis state art nlp lexicon field iso number 24613 lmf specification published officially international standard 17 november 2008 iso/tc37 standards currently elaborated high level specifications deal word segmentation iso 24614 annotations iso 24611 a.k.a maf iso 24612 a.k.a laf iso 24615 a.k.a synaf iso 24617-1 a.k.a semaf/time feature structures iso 24610 multimedia containers iso 24616 a.k.a mlif lexicons iso 24613 standards based low level specifications dedicated constants namely data categories revision iso 12620 language codes iso 639 scripts codes iso 15924 country codes iso 3166 unicode iso 10646 two level organization forms coherent family standards following common simple rules linguistics constants like /feminine/ /transitive/ defined within lmf recorded data category registry dcr maintained global resource iso/tc37 compliance iso/iec 11179-3:2003 constants used adorn high level structural elements lmf specification complies modeling principles unified modeling language uml defined object management group omg structure specified means uml class diagrams examples presented means uml instance object diagrams xml dtd given annex lmf document lmf composed following components extensions specifically dedicated morphology mrd nlp syntax nlp semantics nlp multilingual notations nlp morphological patterns multiword expression patterns constraint expression patterns following example lexical entry associated lemma clergyman two inflected forms clergyman clergymen language coding set whole lexical resource language value set whole lexicon shown following uml instance diagram elements lexical resource global information lexicon lexical entry lemma word form define structure lexicon specified within lmf document contrary languagecoding language partofspeech commonnoun writtenform grammaticalnumber singular plural data categories taken data category registry marks adorn structure values iso 639-3 clergyman clergymen plain character strings value eng taken list languages defined iso 639-3 additional information like dtdversion feat data expressed following xml fragment example rather simple lmf represent much complex linguistic descriptions xml tagging correspondingly complex first publication lmf specification ratified iso paper became 2015 9th cited paper within language resources evaluation conferences lrec papers semantic representation african languages asian languages european languages semitic languages book published 2013 lmf lexical markup framework entirely dedicated lmf first chapter deals history lexicon models second chapter formal presentation data model third one deals relation data categories iso-dcr 14 chapters deal lexicon system either civil military domain either within scientific research labs industrial applications wordnet-lmf prolmf duelme uby-lmf lg-lmf relish globalatlas global atlas wordscape | [
10752,
11529,
8854,
8087,
11036,
5149,
2206,
7839,
416,
9245,
5413,
10413,
8627,
2100,
3126,
1079,
5816,
6977,
8904,
1737,
1610,
9290,
8524,
717,
2519,
2904,
4058,
2522,
479,
4064,
4322,
7780,
8421,
874,
8426,
5614,
1010,
3447,
7164,
2045... | Test |
11,057 | 2 | Smolt_(Linux):smolt linux smolt computer program used gather hardware information computers running linux submit central server statistical purposes quality assurance support initiated fedora release fedora 7 soon combined effort various linux projects information collection voluntary opt-in anonymous smolt run automatically requested permission uploading new data smolt server october 10 2012 announced smolt would discontinued november 1 2013 effect server http //www.smolts.org responds message smolts project retired smolt widely accepted system assembling linux statistics one place smolt first attempt first accepted major linux distributions collecting kind data across distributions smolt included smolt server stored collected data | [
11135,
823
] | None |
11,058 | 3 | DeskStation_Tyne:deskstation tyne deskstation tyne line computer workstations made deskstation technology based mips r4000 r4400 risc microprocessors deskstation tyne designed run windows nt designed conform advanced risc computing standard run associated firmware | [
7234,
6854,
6252,
7215,
8976,
2452,
6942,
11007
] | None |
11,059 | 3 | Burroughs_Medium_Systems:burroughs medium systems burroughs b2500 burroughs b4900 series mainframe computers developed manufactured burroughs corporation pasadena california united states 1966 1991 aimed business world instruction set optimized cobol programming language also known burroughs medium systems contrast burroughs large systems burroughs small systems b2500 b3500 computers announced 1966 operated directly cobol-68 primary decimal data types strings 100 digits one ebcdic ascii digit character two 4-bit binary-coded decimal bcd digits per byte portable cobol programs use binary integers b2500 either even memory addresses memory addressed 4-bit digit big-endian style using 5-digit decimal addresses floating point numbers also used base 10 rather binary base 100 mantissa digits typical cobol statement 'codice_1 may use operands different lengths different digit representations different sign representations statement compiled single 12-byte instruction 3 memory operands complex formatting printing accomplished executing single codice_2 instruction detailed format descriptors high level instructions implemented translate buffer e.g ebcdic ascii conversion table buffer sort table using sort requirements table extreme cases single instructions could run several hundredths second mcp could terminate over-long instructions could interrupt resume partially completed instructions resumption prerequisite page style virtual memory operands cross page boundaries machine matched cobol closely cobol compiler simple fast cobol programmers found easy assembly programming well original instruction set operations memory-to-memory visible data registers arithmetic done serially one digit time beginning most-significant digits working rightwards least-significant digits backwards manual right-to-left methods complicated allowed result writing suppressed overflow cases serial arithmetic worked well cobol languages like fortran bpl much less efficient standard word-oriented computers three reserved memory locations used address indexing 'registers third index register dedicated pointing current procedure stack frame call/return stack reserved memory locations controlled operand sizes size constant b3500 similar b2500 faster cycle time expansion choices b2500 maximum 60 k bytes core memory 2 microsecond cycle time b3500 maximum 500 k bytes 1-microsecond cycle time b2500/3500 weighed b2500/b3500 machines followed b2700/b3700/b4700 1972 b2800/b3800/b4800 1976 b2900/b3900/b4900 1980 first range load microcode floppy disk rather implementing hardware read-only memory finally unisys v series machines v340-v560 1985-90 machines prior b4800 cache memory every operand byte result byte required separate main memory cycle limited program performance compensate b3700/b4700 generation used semiconductor main memory faster expensive power hungry dram used competing machines unusual use decimal numbers memory addresses initially problem merely involved using 1-in-5 rather 1-in-8 decoder logic core memory row selects bank selects later machines used standard memory chips expected binary addresses 1000-byte block logical memory could trivially mapped onto subset 1024 bytes chip 2.3 waste denser chips larger total memories entire decimal address crunched shorter quasi binary form sending address chips done cache memory cycle conversion logic slowed machine cycle somewhat attempted redesign 1975 address space called ms-3 medium systems 3rd generation project cancelled machines b2900 allowed input numbers 'undigit values 9 arithmetic gave unspecified results used form hexadecimal arithmetic within mcp also application programmers later versions discontinued instead supported two new opcodes binary decimal decimal binary support addressing hard drives available burroughs acquisition memorex unisys cancelled v series hardware development 1991 support ended 2004 b4900 later machines integer operations 10 digits less handled parallel longer operands continued use serial method floating point operations limited 17 digits precision later medium systems machines added accumulator register accumulator/memory instructions using 32-bit 7-digit integers 48-bit 80-bit floating point values aligned 16-bit word boundaries operating system called mcp master control program shared many architectural features mcp burroughs large systems stack machines entirely different internally coded assembly language algol-derivative programs separate address spaces dynamically relocated base register otherwise virtual memory paging segmentation larger programs squeezed limited code address space explicit overlays nonresident parts mcp also heavily overlaid initially code data shared single 300,000 digit address space later machines separate million-digit spaces program code process data instructions address fields extended 5 digits 6 digits 4 real index registers added early machines used burroughs head-per-track disk systems rather now-standard movable head platter disks one attempt speed mcp overlays carefully laid likely-next overlays would soon arrive read head current overlay completed similar time-dependent layout optimizations early delay-line drum computers turned impractical maintain software changes better results consistently achieved totally randomized layout mcp overlays operating system system software coded bpl burroughs programming language systems programming language derived algol large system espol systems language initial cobol compiler supported ansi 68 specification supported codice_3 syntax allow inline assembly language coding lacked support relative indexed file support later added ansi 74 version compiler released 1982 mcp allowed programs communicate via core-to-core transmissions codice_4 using storage queues codice_5 implemented system calls using codice_6 instruction exposed languages cobol codice_7 unheard except largest ibm s/360 systems time even major operational headache manage interactions multiple program streams medium systems series effective multi-programming machines even basic versions b2500 could support multiprogramming usable scale larger medium systems processors supported major data center activities banks financial institutions well many businesses government customers medium system preferred platform many data processing professionals medium system computer could simultaneously running batch payroll system inputting bank checks micr reader sorter compiling cobol applications supporting on-line transactions test runs new applications colloquially called 'the mix console command 'codice_8 would shows jobs executing unusual running eight ten programs medium-size b2500 medium system installations often tape clusters four drives integrated mid-height cabinet magnetic tape input output free-standing tape drives also available much expensive tape major storage medium computers early days often used father-son batch updating additional disk becoming cheaper time moved became relegated library/backup device contained data files sometimes program files using mfsolt utility particular application customer/client cobol machine code tape resident disk files job headers card input card print spooling accounting system parameter driven —a blank verse unknown b2500 user | [
512,
3716,
1029,
7173,
11539,
11295,
8352,
1702,
8231,
2477,
11059,
8001,
4424,
5840,
2002,
5714,
477,
2533,
3443,
7032,
634
] | Test |
11,060 | 9 | Chakra_(JScript_engine):chakra jscript engine chakra jscript engine developed microsoft 32-bit version internet explorer 9 ie9 web browser jscript engine developed closed source proprietary software microsoft developed different javascript engine based jscript newer microsoft edge browser also called chakra chakra javascript engine open-sourced mit license distinctive feature engine jit compiles scripts separate cpu core parallel web browser though microsoft past pointed elements rendering marshalling important browser overall performance improvements engine response evolving competing browsers compared ie8 lagging behind terms client-side script processing speed sunspider tests performed november 18 2009 showed pdc version ie9 executing scripts much faster ie8 slower firefox 3.6 chrome 4 webkit nightly test performed march 15 2010 showed first ie9 platform preview using then-current version chakra faster firefox spidermonkey slower safari squirrelfish extreme chrome v8 opera carakan march 8 2011 microsoft published results showing 32-bit internet explorer 9 faster safari firefox tracemonkey chrome opera march 2011 performance tests zdnet concluded internet explorer 9 32-bit chrome 10 firefox 4 release candidate pretty evenly matched 2012 subsequent versions chakra version included internet explorer 10 introduced additional performance changes including jit compilation x64 arm architectures optimizations related floating point math garbage collection last call jsconf 2015 microsoft announced open sourcing chakracore engine january 2016 github chakracore essentially chakra engine powers microsoft edge browser platform-agnostic bindings i.e without specific interfaces utilised within windows universal app platform january 13 2016 microsoft released chakracore mit license github promised | [
6171,
3102,
7713,
10282,
8757,
10808,
4171,
9808,
84,
8281,
603,
10338,
5219,
617,
9328,
5765,
6791,
6797,
10900,
8854,
6827,
3761,
5311,
7871,
4289,
10957,
4822,
2777,
7396,
4326,
9964,
10991,
1776,
2304,
259,
4356,
11524,
10507,
782,
79... | Validation |
11,061 | 3 | TwinBee:twinbee various twinbee sequels released arcade home console markets following original game spawned audio drama anime adaptations japan twinbee played 2-players simultaneously player takes control cartoon-like anthropomorphic spacecraft player 1 taking control twinbee titular ship player 2 controls winbee game control consists eight-way joystick two buttons one shooting enemies air dropping bombs ground enemies similarly xevious player primary power-ups bells uncovered shooting floating clouds 're hidden player continues shooting bell appears change one four colors regular yellow bells grant bonus points white bell upgrade player gun twin cannon blue bell increases player speed five speed levels green bell allow player create image copies ship additional firepower red bell provide player ship barrier allows sustain damage green red bells combined together power-ups also retrieved ground enemies alternate bell gives player ship three-way gun star eliminates on-screen enemies games genre getting shot single enemy bullet cause player lose life however bullet strikes either side ship instead player ship lose one arms player ship loses arms lose ability throw bombs player must wait ambulance arrive player must navigate ship ambulance repair arms however player ship loses arms second time ambulance arrive two players playing time align ships vertically horizontally together perform powerful attacks twinbee originally appeared arcade game later ported msx family computer famicom version re-released japan famicom mini label game boy advance game officially released first time outside japan part nintendo ds march 2007 name rainbowbell north america although twinbee name restored european release twinbee released japan august 10 2011 regions september 22 2011 nintendo 3ds part 3d classics series release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 arcade version twinbee made available microsoft game room service xbox 360 console windows-based pcs december 1 2010 also msx version re-released windows egg project august 19 2014 playstation 4 published hamster corporation japan nes port re-released nintendo switch online november 14 2018 worldwide sp version titled twinbee second helping donburi island released june 12 2019 twinbee version nintendo 3ds received total 68/100 metacritic mixed positive average user score 6.8 | [
1763,
6797,
9006,
10931,
11231
] | Test |
11,062 | 3 | ARM_Cortex-A8:arm cortex-a8 arm cortex-a8 32-bit processor core licensed arm holdings implementing armv7-a architecture compared arm11 cortex-a8 dual-issue superscalar design achieving roughly twice instructions per cycle cortex-a8 first cortex design adopted large scale consumer devices key features cortex-a8 core several system-on-chips soc implemented cortex-a8 core including arm cortex force drives mobile devices | [
9732,
11282,
9235,
11289,
1057,
38,
8231,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
630,
10361,
638,
644,
7300,
8842,
146,
659,
5267,
7833,
666,
5786,
10393,
6815,
4258,
4259,
4773,
9913,
4283,
8383,
1728,
10945,
1... | None |
11,063 | 2 | The_Core_Pocket_Media_Player:core pocket media player core pocket media player tcpmp software media player operates portable devices windows-based pcs discontinued still available official mirror site supported operating systems include palm os symbian os microsoft windows ce mobile also available microsoft zune hd via hack called liberate tcpmp also hardware accelerated playback ati intel 2700g mobiles tapwave zodiac dell axim x50v/x51v development free version software discontinued corecodec favour commercially licensed coreplayer though tcpmp still regarded one versatile media players pocketpc palm os mobile devices according corecodec.com website september 2002 development team planned continue development releases open source version player offsite code would also incorporated commercial player 2004 corecodec.org open source player released betaplayer 0.01a windows ce windows mobile renamed core pocket media player july 2005 upon release palm os windows ce/mobile operating systems release tcpmp symbian os remarked upon information available forums tcpmp project page indicates development languages used assembly c 2006 corecodec inc. discontinued development tcpmp focus commercial coreplayer platform tcpmp supports many audio video image formats including ac3 he-aac later removed amr divx flac h.263 h.264 jpeg monkey audio mjpeg mpeg-1 mp2 mp3 musepack ms-mpeg4-v3 png speex tiff tta vorbis wav wavpack xvid supports many container formats including 3gp asf avi matroska mpeg ogg ogm quicktime windows desktop platform third-party codec support h.264 third-party plugin support youtube videos flash video formats program received consistently positive reviews performance versatility functionality minor criticism user interface issues hpc factor magazine evaluating version 0.66 declared excellent noting need improvement menu space usage complete lack documentation version 0.70 described best free multimedia player pocket pc palm os platform smartphone pocket pc magazine november 2005 2006 treo central review gave score 4/5 use palm os-equipped treo devices pretty cool logical interface albeit drawbacks supporting almost every video encapsulation known humankind without conversion prior playback smartdevice central reviewed version 0.71 palm treo 700 2007 called impressive solid piece software summarizing user interface resembling black-and-white macintosh app late 1980s absolutely eye candy whatsoever corecodec inc. discontinued development tcpmp 2006 renamed coreplayer developed commercial sale one review referred quirky rock solid tcpmp bulletproof compared early version new player later reviews mentioned problems stability | [
321,
5612,
6797,
9358,
7983,
753,
823,
11037,
11487
] | Test |
11,064 | 9 | JAWS_Scripting_Language:jaws scripting language jaws scripting language proprietary programming language facilitates interoperability jaws windows screen reading program practically application–both proprietary off-the-shelf jaws scripting language jsl compiled language allowing source code protection jaws scripting commonly also cumulatively refers customization jaws use built-in user-editable utilities called managers editing configuration files directly combination writing actual scripts scripting language api exposes functionality including combination traditional jaws scripting msaa server direct scripting document object model scripting ensure optimal performance jaws end-users | [
3613
] | Validation |
11,065 | 4 | NetBackup:netbackup computing veritas netbackup called symantec netbackup prior symantec divestiture veritas enterprise-level heterogeneous backup recovery suite provides cross-platform backup functionality large variety windows unix linux operating systems netbackup features central master server manages media servers containing backup media clients core server platforms include solaris hp-ux aix tru64 linux windows netbackup opscenter comes bundled netbackup 7.0 distribution replaces netbackup operations manager nom component used previous versions manage multiple netbackup environments netbackup comes support many hardware devices like tape drives tape libraries disk units supports among many features hot backups major database products like oracle natively backup restore virtual machines major virtualization products like vmware infrastructure use network data management protocol ndmp tape vaulting netbackup also enables lan-free server-free backups san fabric environments | [
2051,
5512,
6797,
7955,
10903,
6297,
5924,
3366,
1708,
8368,
2994,
2870,
823,
3520,
11201,
10051,
2378,
1358,
8398,
6993,
5470,
7905,
9569,
5612,
6643,
10872,
8572,
9983
] | Test |
11,066 | 3 | Macintosh_LC_III:macintosh lc iii macintosh lc iii personal computer designed manufactured sold apple computer inc. february 1993 february 1994 replaced commercially successful macintosh lc ii apple lineup mid-range computers significantly faster macworld magazine benchmarks showing 2x performance major categories cpu disk video math also significantly less expensive lc iii 80 mb hard disk priced 1,349 usd introduction 700 less lc ii lc iii sold primarily exclusively educational institutions corresponding performa variant called performa 450 sold consumer market speed-bumped version called macintosh lc iii+ released october year 33 mhz cpu three performa variants model released 460 466 467 faster models replaced lc iii performa 450 sales original models continuing end 1993 dealers depleted stocks new sales lc iii+ ended early 1994 apple neared completion transition away 68030 processors 68lc040-based lc 475 performa 475 replacements introduced february 10 1993 introduced october 18 1993 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
... | None |
11,067 | 4 | John_Viega:john viega john viega born february 22 1974 american computer security author researcher professional earned ba university virginia undergraduate worked randy pausch stage 3 research group early contributor alice viega earned ms computer science also university virginia john viega co-authored widely used gcm mode operation aes along david a. mcgrew also co-designed predecessor cwc mode john viega also pioneer static analysis security vulnerabilities responsible first publicly available tool its4. well prominent open source rough auditing tool security rats also founded secure software first commercial vendor tools bought fortify software john viega also original author owasp clasp lightweight process relating software development security also former editor-in-chief ieee security privacy magazine addition viega original author gnu mailman mailing list program john viega executive vice president products engineering bae systems applied intelligence joined bae systems 2014 acquisition silversky cloud security provider funded goldman sachs bessemer ventures prior silversky viega mcafee cto saas prior mcafee chief security architect currently teaches nyu previously taught virginia tech co-author building secure software addison wesley 2001 first book teach developers write secure software since co-authored number additional books computer security including myths security o'reilly 2009 beautiful security o'reilly 2009 network security openssl ’ reilly 2002 secure programming cookbook ’ reilly 2003 19 deadly sins software security mcgraw hill 2005 | [
4320,
7556,
7144,
7019,
9293,
11505
] | Validation |
11,068 | 4 | Monoculture_(computer_science):monoculture computer science computer science monoculture community computers run identical software computer systems community thus vulnerabilities like agricultural monocultures subject catastrophic failure event successful attack concept significant discussing computer security viruses clifford stoll wrote 1989 dealing morris worm dan geer argued microsoft monoculture since majority overall number workstations connected internet running versions microsoft windows operating system many vulnerable attacks | [
4228,
6797,
8301,
7983,
6129,
6419,
5492,
8635,
9363,
11604,
7739,
2558,
9151
] | None |
11,069 | 2 | Michael_Simms_(software_developer):michael simms software developer michael simms creator tux games website founder linux game publishing simms began using linux university 1992 writing contributing open source software since 1993 strong belief operating systems file formats need open source order make computing competitive 2000 2001 also worked wcities london lead product architect simms beta tester loki software linux ports descent 3 response unable order versions loki titles british reseller spurred create tux games one first online linux game stores website went live ten seconds midnight 1 january 2000 selling first title 3 january response loki demise effect would tux games simms invested £350,000 company porting windows game titles linux linux game publishing founded 15 october 2001 port publish new games linux simms remained ceo well head development decade likes play majesty strategy games 31 january 2012 simms announced stepping ceo handing control clive crous | [
1026,
5644,
4367,
8848,
657,
10642,
1939,
2581,
3478,
6808,
7450,
6302,
7584,
802,
5410,
6691,
6947,
8354,
5931,
8364,
1717,
823,
2109,
10687,
10822,
8263,
843,
589,
6352,
4177,
11602,
8787,
4437,
6489,
3802,
4831,
9696,
11232,
7793,
1394... | Test |
11,070 | 7 | Logicworks:logicworks logicworks cloud computing managed hosting company headquartered new york city offices seattle washington d.c. london logicworks enterprise cloud automation managed service provider company founded february 1993 1998 logicworks changed focus standard web hosting complex types managed hosting high points years included logicworks getting first mysql enterprise partner designation 2003 expanding private cloud hosting 2007 focus cloud continues today starting logicworks cloud 2010 adding another data center bring company three 2011 april 2011 logicworks received 7.6 million venture funding round logicworks cloud offerings marketed traditional cloud computing offers instead remote hosting solutions december 14 2016 logicworks announced raised 135 million private equity firm pamplona capital grow automation consulting business logicworks provides managed services amazon web services cloud infrastructure called managed amazon web services logicworks adds management layer top aws cloud strategize architect implement scale aws cloud instances tools applications 2015 logicworks added aws premier partner network since logicworks added many services including logicworks private cloud offerings based vmware ’ virtualization platform logicworks specializes hipaa pci compliance hosting infrastructure design aws private cloud environments | [
4236,
10893,
911,
1935,
4623,
8592,
2965,
8471,
2328,
4377,
8986,
6307,
9766,
5159,
6444,
8495,
3121,
7352,
2496,
4289,
1224,
8520,
4429,
7248,
1362,
467,
9682,
6367,
4194,
11646,
5732,
10090,
3819,
7660,
2170,
5499,
253,
8446
] | Test |
11,071 | 2 | Debug_new:debug new debug_new refers technique c++ overload and/or redefine operator new operator delete order intercept memory allocation deallocation calls thus debug program memory usage often involves defining macro named debug_new makes new become something like new __file__ __line__ record file/line information allocation microsoft visual c++ uses technique microsoft foundation classes ways extend method avoid using macro redefinition still able display file/line information platforms many inherent limitations method applies c++ catch memory leaks c functions like malloc however simple use also fast compared complete memory debugger solutions | [
10654,
2045,
814
] | Test |
11,072 | 6 | Next3:next3 next3 journaled file system linux based ext3 adds snapshots support yet retains compatibility ext3 on-disk format next3 implemented open-source software licensed gpl license snapshot read-only copy file system frozen point time versioning file systems like next3 internally track old versions files make snapshots available special namespace advantage copy-on-write next3 writes new data blocks containing old data retained allowing snapshot version file system maintained next3 snapshots created quickly since data composing snapshot already stored also space efficient since unchanged data shared among file system snapshots traditional linux logical volume manager volume level snapshots implementation requires storage space allocated advance next3 uses dynamically provisioned snapshots meaning require pre-allocation storage space snapshots instead allocating space needed storage space conserved sharing unchanged data among file system snapshots since next3 aims forward backward compatible earlier ext3 on-disk structures identical ext3 file system mounted read existing ext3 implementations modification next3 like ext3 lacks number features recent designs extents snapshots next3 performance equivalent ext3 performance snapshots minor overhead per write metadata block copy-on-write smaller overhead ~1 per write data block move-on-write 2011 next4 project porting next3 snapshot capabilities ext4 file system mostly completed porting attributed members pune institute computer technology pict chinese academy sciences | [
5120,
2051,
6669,
3598,
10257,
6677,
5142,
8214,
10265,
9762,
5158,
11323,
8772,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1212,
8380,
10951,
9420,
... | Test |
11,073 | 4 | PeerBlock:peerblock peerblock free open-source personal firewall blocks packets coming going maintained list black listed hosts peerblock windows successor software peerguardian currently maintained linux blocks incoming outgoing connections ip addresses included blacklists made available internet addresses specified user peerblock mainly uses blacklists provided iblocklist.com peerblock 1.0 based code peerguardian 2 rc1 test3 vista version adds support 32- 64-bit windows vista windows 7 windows 8 peerguardian project ended developer phoenix labs encouraged current peerguardian users migrate peerblock peerblock development small team developers led mark bulas hosting well signed driver funded donations public future donations intended contribute future signed drivers hosting possibly rent virtual private server team able build real online-update feature future releases peerblock introduced 2017 peerblocklist.com offers modern blocklists p2p format compatible peerblock peerblock multiple features latest version program include constantly updating blocklist managed home site manager lets choose lists include block program allows user turn ip http trackers well including log showing time source ip address destination protocol tracker list settings allows users customize program interface well operations september 2013 i-blocklist supplier blocking lists peerblock uses supported unlimited free list updating since september 2013 updates limited weekly except paid subscribers peerblock hard-coded use i-blocklist lists entered revenue-sharing agreement i-blocklist late 2015 blocklists longer available without payment subscription late 2017 peerblocklist.com began offering free blocklists malicious hosts ad-servers peerblock peerguardian users | [
1792,
2049,
4480,
2563,
4229,
4490,
1163,
6797,
1172,
11029,
3350,
9496,
3482,
10522,
1436,
4511,
5407,
6431,
10531,
5924,
550,
3366,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
3770,
5178,
11577,
9279,
5057,
1858,
10433,
708,
21... | Test |
11,074 | 9 | Harlequin_RIP:harlequin rip harlequin rip raster image processor first released 1990 name scriptworks running command-line application render postscript language files unix developed harlequin software company based cambridge england harlequin rip started life 1986 final year university project software developer andy cave project build subset postscript interpreter could preview result converting tex/latex files postscript phd students would n't waste much paper new laserwriter although subset required cave ended creating quite complete implementation 1987 cave joined harlequin limited founding rip division bringing work 'd done bath university early 1990s harlequin commissioned xenotron develop raster image processor rip run macintosh computers drive ultre-based image setters exposing onto film resin-coated rc paper macintosh version proved successful harlequin signed number original equipment manufacturer oem partners sell including pongrass ecrm autologic xitron koronix purup graphic enterprises compose 1992 dos variation core rip developed also sold oem partners replaced version running microsoft windows 1993 1999 harlequin group went receivership bought global graphics harlequin group including staff assets renamed global graphics software limited unix-based command-line version rip phased years later rip finally renamed scriptworks harlequin rip 2004 onwards global graphics expanded reach harlequin rip producing number variants different market sectors harlequin rip sold oem partners builds prepress system digital front end dfe controller therefore sold variety names always easy identify whether system uses harlequin rip current versions harlequin rip interpret harlequin embedded sdk also supports printer command language 5e pcl 5c pcl xl including hpgl printer job language pjl file formats interpreted natively without conversion intermediate format pdf converted postscript vice versa example global graphics claims processing without conversion allows higher speeds avoids artifacts arising conversion native processing live transparency pdfs recognized several awards publishing essential impact award rip year 1997 1998 silver award pre-press news publishing awards 1997 rip/server product year harlequin rip also explicitly supports pdf/x-1a:2001 pdf/x-1a:2003 pdf/x-3:2002 pdf/x-3:2003 pdf/x-4 pdf/x-4p pdf/x-5g pdf/x-5pg set reject files comply standards include conformance information control strip proof harlequin oem partners built dfes full support additional formats personalized print markup language ppml around harlequin rip number extra components available variants harlequin rip leading descriptions harlequin server rip prepress workflow box included additional options include harlequin host renderer launched 2005 version 1.3 released late 2009 core rip functionality hhr tracked harlequin server rip except hhr currently following additional features comparison hsr 8.3 hhr supported linux windows harlequin embedded sdk ebd optimized use within home office printers end supports several versions printer control language pcl well printer job language pjl hewlett-packard graphics language hpgl ebd version 3 released 2009 supported variety real-time near-real-time operating systems including embedded windows xp linux vxworks threadx variety hardware architectures including intel freescale arm without system-on-a-chip soc around cpu global graphics announced partnership conexant provide combination hardware page description language pdl software home small office printers | [
6977,
9795,
8426,
9964,
6797,
6830,
11694,
8627,
5492,
8628,
823,
8763
] | Test |
11,075 | 2 | Time-sharing:time-sharing computing time-sharing sharing computing resource among many users means multiprogramming multi-tasking time introduction 1960s emergence prominent model computing 1970s represented major technological shift history computing allowing large number users interact concurrently single computer time-sharing dramatically lowered cost providing computing capability made possible individuals organizations use computer without owning one promoted interactive use computers development new interactive applications earliest computers extremely expensive devices slow comparison later models machines typically dedicated particular set tasks operated control panels operator manually entering small programs via switches order load run series programs programs might take hours even weeks run computers grew speed run times dropped soon time taken start next program became concern batch processing methodologies evolved decrease dead periods queuing programs soon one program completed next would start support batch processing operation number comparatively inexpensive card punch paper tape writers used programmers write programs offline typing punching complete programs submitted operations team scheduled run important programs started quickly long less important programs started unpredictable program run finally completed output generally printed returned programmer complete process might take days time programmer might never see computer alternative allowing user operate computer directly generally far expensive consider users might long periods entering code computer remained idle situation limited interactive development organizations could afford waste computing cycles large universities part programmers universities decried behaviors batch processing imposed point stanford students made short film humorously critiquing experimented new ways interact directly computer field today known human–computer interaction time-sharing developed realization single user would make inefficient use computer large group users together would due pattern interaction typically individual user entered bursts information followed long pauses group users working time would mean pauses one user would filled activity others given optimal group size overall process could efficient similarly small slices time spent waiting disk tape network input could granted users concept claimed first described john backus 1954 summer session mit later bob bemer 1957 article consider computer automatic control magazine paper published december 1958 w. f. bauer wrote computers would handle number problems concurrently organizations would input-output equipment installed premises would buy time computer much way average household buys power water utility companies implementing system able take advantage initially difficult batch processing effectively methodological development top earliest systems since computers still ran single programs single users time primary change batch processing time delay one program next developing system supported multiple users time completely different concept state user programs would kept machine switched quickly would take computer cycles slow machines era concern however computers rapidly improved speed especially size core memory users states retained overhead time-sharing continually decreased relatively speaking first project implement time-sharing user programs initiated john mccarthy mit 1959 initially planned modified ibm 704 later additionally modified ibm 709 one first computers powerful enough time-sharing one deliverables project known compatible time-sharing system ctss demonstrated november 1961 ctss good claim first time-sharing system remained use 1973 another contender first demonstrated time-sharing system plato ii created donald bitzer public demonstration robert allerton park near university illinois early 1961 special-purpose system bitzer long said plato project would gotten patent time-sharing university illinois lost patent two years joss began time-sharing service january 1964 first commercially successful time-sharing system dartmouth time sharing system throughout late 1960s 1970s computer terminals multiplexed onto large institutional mainframe computers centralized computing systems many implementations sequentially polled terminals see whether additional data available action requested computer user later technology interconnections interrupt driven used parallel data transfer technologies ieee 488 standard generally computer terminals utilized college properties much places desktop computers personal computers found today earliest days personal computers many fact used particularly smart terminals time-sharing systems dartmouth time sharing system creators wrote 1968 response time averages 10 seconds destroys illusion one computer conversely timesharing users thought terminal computer rise microcomputing early 1980s time-sharing became less significant individual microprocessors sufficiently inexpensive single person could cpu time dedicated solely needs even idle however internet brought general concept time-sharing back popularity expensive corporate server farms costing millions host thousands customers sharing common resources early serial terminals web sites operate primarily bursts activity followed periods idle time bursting nature permits service used many customers usually perceptible communication delays unless servers start get busy genesis 1960s several companies started providing time-sharing services service bureaus early systems used teletype model 33 ksr asr teletype model 35 ksr asr machines ascii environments ibm selectric typewriter-based terminals especially ibm 2741 two different seven-bit codes would connect central computer dial-up bell 103a modem acoustically coupled modems operating 10–15 characters per second later terminals modems supported 30–120 characters per second time-sharing system would provide complete operating environment including variety programming language processors various software packages file storage bulk printing off-line storage users charged rent terminal charge hours connect time charge seconds cpu time charge kilobyte-months disk storage common systems used time-sharing included sds 940 pdp-10 ibm 360 companies providing service included ge geisco ibm subsidiary service bureau corporation tymshare founded 1966 national css founded 1967 bought dun bradstreet 1979 dial data bought tymshare 1968 bolt beranek newman bbn time sharing ltd. u.k.. 1968 32 service bureaus serving us national institutes health nih alone auerbach guide timesharing 1973 lists 125 different timesharing services using equipment burroughs cdc dec hp honeywell ibm rca univac xds 1975 said one major super-mini computer manufacturers biggest end-user market currently time-sharing dec second largest computer company ibm also true pdp-10 ibm 360/67 widely used commercial timesharing services compuserve on-line systems ols rapidata time sharing ltd although many time-sharing services simply closed rapidata held became part national data corporation still sufficient interest 1982 focus user guide statistics programs rapidata timesharing system even revenue fell 66 national data subsequently developed problems attempts made keep timesharing business going beginning 1964 multics operating system designed computing utility modeled electrical telephone utilities 1970s ted nelson original xanadu hypertext repository envisioned service seemed computer industry grew consolidation computing resources would occur timesharing systems 1990s concept however revived somewhat modified form banner cloud computing time-sharing first time multiple processes owned different users running single machine processes could interfere one another example one process might alter shared resources another process relied variable stored memory one user using system would result possibly wrong output multiple users might mean users got see information meant see prevent happening operating system needed enforce set policies determined privileges process example operating system might deny access certain variable certain process first international conference computer security london 1971 primarily driven time-sharing industry customers significant early timesharing systems | [
2560,
9224,
3082,
6155,
6675,
7187,
7188,
10776,
25,
8732,
4637,
9762,
4643,
6180,
5158,
557,
5678,
7217,
10803,
9780,
7733,
4151,
9784,
10809,
7228,
576,
2625,
3650,
11328,
1099,
6221,
2132,
2647,
3160,
2650,
11356,
10333,
97,
1121,
4194... | None |
11,076 | 6 | LHA_(file_format):lha file format lha freeware compression utility associated file format created 1988 originally named lharc complete rewrite lharc tentatively named lhx eventually released lh renamed lha avoid conflicting then-new ms-dos 5.0 lh load high command according early documentation lha pronounced like la although longer much used west lha remains popular japan used id software compress installation files earlier games including doom quake lha ported many operating systems still main archiving format used amiga computer although competed lzx mid 1990s due aminet world largest archive amiga-related software files standardising stefan boberg implementation lha amiga microsoft released windows xp add-on microsoft compressed lzh folder add-on designed japanese version operating system japanese version windows 7 ships lzh folder add-on built-in users non-japanese versions windows 7 enterprise ultimate also install lzh folder add-on installing optional japanese language pack windows update lzh archive compression method stored five-byte text string third seventh bytes file lharc compresses files using algorithm yoshizaki earlier lzhuf product modified lzari developed uses huffman coding instead arithmetic coding lzari uses lempel–ziv–storer–szymanski arithmetic coding compression method applied source data method introduced lharc version 1 supports 4 kib sliding window support maximum 60 bytes matching length dynamic huffman encoding used method supports 8 kib sliding window support maximum 256 bytes matching length dynamic huffman encoding used methods 4 5 6 7 support 4 8 32 64 kib sliding window respectively support maximum 256 bytes matching length static huffman encoding used lh5 first introduced lharc 2 followed lh6 lha 2.66 msdos lh7 lha 2.67 beta msdos lha never compresses lh4 technically compression method used .lzh archive indicate compressed object empty directory joe jared extended lzss use larger dictionaries dictionary sizes 64 128 256 512 1024 2048 kib respectively unlha32.dll uses method testing purposes uses 128–256 kib dictionary compression methods created pmarc cp/m archiver created miyo archive usually .pma extension popcom compressed executable archive compression method applied source data used indicate pmarc self-extracting archive larc uses file format .lzh written kazuhiko miki haruhiko okumura ken masuyama extension name .lzs supports 2 kib sliding window support maximum 17 bytes matching length similar lzs except dictionary size match length changed compression method applied source data supports 4 kib sliding window support maximum 17 bytes matching length copies lhice marked version 1.14 according okumura lhice written yoshi bug timestamps since year 2011 set 1980 meaning utilities need patched | [
9988,
6022,
10121,
139,
1420,
5264,
2193,
1940,
9236,
3222,
9880,
3233,
9249,
3114,
8618,
10027,
6062,
2095,
432,
8369,
11184,
8115,
4406,
4409,
6713,
6075,
10817,
2755,
10317,
1352,
4296,
10570,
3659,
5709,
1742,
4174,
9166,
3921,
850,
7... | Test |
11,077 | 7 | Scalable_Source_Routing:scalable source routing scalable source routing ssr routing protocol unstructured networks mobile ad hoc networks mesh networks sensor networks combines source routing routing along virtual ring based idea pushing chord underlay ssr operates flat address space organized virtual ring popular concept peer-to-peer overlay networks like chord common knowledge ring structure enables nodes route packets without knowing topology underlying physical network physical network dynamic structure virtual ring remains rather static therefore flooding physical network avoided packets travel along ring decrease virtual distance destination absolute difference addresses node knows correct predecessor successor virtual ring delivery correct receiving node guaranteed ring said consistent often routing assumed defined orientation ring merely help simplify theory practice necessary even detrimental performance finger table chord provides shortcuts virtual ring replaced route cache physical network ssr utilizes source routing relaying nodes opportunistically cache traversed part source route given packet facilitates collection routing information inhibiting polluting nodes route caches outdated information node need complete path destination route cache make use cache line instead message routed towards physical nearest node makes progress virtual ring message arrives intermediate node node adds information route cache source route step repeated needed message arrives final destination path optimization using dijkstra algorithm route update message sent originator node thus updating originators route cache technique facilitates usage fixed size route caches limits per-node state makes ssr viable option low memory environments ssr complete routing protocol cf osi model network layer also provides semantics distributed hash table reduces overhead overlay protocol top traditional routing protocol greatly expedites lookup operations manets otherwise would rely flooding provided application supports modified support key-based routing provided dht functionality also used implement scalable network services absence servers every node periodically broadcasts hello message physical neighbors notifying neighbors existence hello messages include list physical neighbors node node finds included hello message another node assumes bidirectional connection adds node list physical peers later use routing node also sends neighbor notification message assumed successor join virtual ring contacted node detects correct successor replies message containing best guess successor inquiring node repeated correct virtual neighbors found detailed description process called isprp see another way bootstrapping linearization node routes message ssr reactive well proactive components making hybrid routing protocol virtual ring routing conceptually similar biggest difference usage source routing ssr compared building per-node state routing tables vrr | [
8640,
9098,
5725
] | None |
11,078 | 4 | Law_Enforcement_Information_Exchange:law enforcement information exchange law enforcement information exchange database maintained naval criminal investigative service eugene r. fidell described database constituting domestic spying according ncis website naval criminal investigative service ncis launched law enforcement information exchange linx initiative 2003 linx designed enhance information sharing local state federal law enforcement areas strategic importance department navy linx provides participating law enforcement partner agencies secure access regional crime incident data tools needed process enabling investigators search across jurisdictional boundaries help solve crimes resolve suspicious events linx designed facilitate cooperation sharing ownership control data remains agency provided | [
6344,
4086
] | Test |
11,079 | 2 | Fira_OS:fira os fira os linux-based mobile operating system software platform developed fira subsidiary indonesian electronic giant polytron member djarum group introduced january 28 2016 forked android installed newer polytron smartphones since 2016 fira os based android open source project aosp linux kernel built comply indonesian regulation requiring 40 minimum local content 4g lte smartphones sold indonesia starting 2017 fira os features applications usually available aosp-based operating systems fira check pulsa fira store fira pay fira directory others | [
8829,
11271,
4364,
5397,
6301,
4383,
10016,
3626,
5677,
7727,
3248,
7857,
823,
1083,
7492,
8262,
5067,
7246,
4305,
2259,
7253,
3542,
3162,
607,
10080,
8423,
10215,
10599,
6763,
9964,
2925,
495,
5363,
8315,
8316,
2045,
11391
] | None |
11,080 | 3 | Jaguar_(microarchitecture):jaguar microarchitecture amd jaguar family 16h low-power microarchitecture designed amd used apus succeeding bobcat family microarchitecture 2013 succeeded amd puma architecture 2014 two-way superscalar capable out-of-order execution used amd semi-custom business unit design custom processors used amd four product families kabini aimed notebooks mini pcs temash aimed tablets kyoto aimed micro-servers g-series aimed embedded applications playstation 4 xbox one use chips based jaguar microarchitecture powerful gpus amd sells commercially available jaguar apus jaguar core support following instruction sets instructions mmx sse sse2 sse3 ssse3 sse4a sse4.1 sse4.2 avx f16c clmul aes bmi1 movbe move big-endian instruction xsave/xsaveopt abm popcnt/lzcnt amd-v. socs using socket am1 2017 derivative jaguar microarchitecture announced apu microsoft xbox one x project scorpio revision xbox one project scorpio apu described 'customized derivative jaguar microarchitecture utilizing eight cores clocked 2.3 ghz puma successor jaguar released 2014 targeting entry level notebooks tablets | [
3585,
3586,
6151,
10761,
5645,
11282,
10260,
4124,
2088,
8237,
2094,
6705,
8250,
7234,
2635,
7783,
8815,
1137,
8322,
3204,
11396,
8327,
10375,
1682,
9369,
666,
2719,
6815,
9400,
9913,
10945,
2764,
9427,
5844,
11485,
5859,
2788,
5356,
9964,
... | None |
11,081 | 4 | Anti-tamper_software:anti-tamper software anti-tamper software tamper-resistant software software makes harder attacker modify measures involved passive obfuscation make reverse engineering difficult active tamper-detection techniques aim make program malfunction operate modified essentially tamper resistance implemented software domain shares certain aspects also differs related technologies like copy protection trusted hardware though often used combination anti-tampering technology typically makes software somewhat larger also performance impact provably secure software anti-tampering methods thus field arms race attackers software anti-tampering technologies tampering malicious gain control aspect software unauthorized modification alters computer program code behaviour examples include installing rootkits backdoors disabling security monitoring subverting authentication malicious code injection purposes data theft achieve higher user privileges altering control flow communication license code bypassing purpose software piracy code interference extract data algorithms counterfeiting software applications vulnerable effects tampering code changes throughout lifecycle development deployment operation maintenance anti-tamper protection applied either internally externally application protected external anti-tampering normally accomplished monitoring software detect tampering type defense commonly expressed malware scanners anti-virus applications internal anti-tampering used turn application security system generally done specific code within software detect tampering happens type tamper proofing defense may take form runtime integrity checks cyclic redundancy checksums anti-debugging measures encryption obfuscation execution inside virtual machine become common anti-tamper method used recent years commercial software used example starforce securom anti-tamper software uses white-box cryptography cryptographic keys revealed even cryptographic computations observed complete detail debugger recent research trend tamper-tolerant software aims correct effects tampering allow program continue unmodified simple easily defeated scheme kind used diablo ii video game stored critical player data two copies different memory locations one modified externally game used lower value anti-tamper software used many types software products including embedded systems financial applications software mobile devices network-appliance systems anti-cheating games military license management software digital rights management drm systems general-purpose packages developed wrap existing code minimal programing effort example securom similar kits used gaming industry though downside semi-generic attacking tools also exist counter malicious software observed using anti-tampering techniques example mariposa botnet | [
2213,
107,
3724,
8171,
9677,
9488,
5586,
11188,
5404,
10173,
2558
] | Train |
11,082 | 2 | List_of_features_in_Android:list features android list features android operating system android devices include still/video cameras touchscreens gps accelerometers gyroscopes barometers magnetometers dedicated gaming controls proximity pressure sensors thermometers accelerated 2d bit blits hardware orientation scaling pixel format conversion accelerated 3d graphics | [
6657,
5637,
8719,
3600,
2579,
7700,
9244,
11294,
1578,
9770,
5677,
559,
4661,
3639,
1083,
9275,
10303,
64,
6212,
69,
8262,
9286,
5707,
4685,
3664,
10834,
6231,
8280,
8794,
6747,
8285,
2658,
1642,
9834,
115,
9843,
4728,
5755,
11391,
1664,
... | Test |
11,083 | 9 | ACL2:acl2 acl2 computational logic applicative common lisp software system consisting programming language extensible theory first-order logic automated theorem prover acl2 designed support automated reasoning inductive logical theories mostly purpose software hardware verification input language implementation acl2 written common lisp acl2 free open-source software acl2 programming language applicative side-effect free variant common lisp acl2 untyped acl2 functions total — every function maps object acl2 universe another object universe acl2 base theory axiomatizes semantics programming language built-in functions user definitions programming language satisfy definitional principle extend theory way maintains theory logical consistency core acl2 theorem prover based term rewriting core extensible user-discovered theorems used ad-hoc proof techniques subsequent conjectures acl2 intended industrial strength version boyer–moore theorem prover nqthm toward goal acl2 many features support clean engineering interesting mathematical computational theories acl2 also derives efficiency built common lisp example specification basis inductive verification compiled run natively 2005 authors boyer-moore family provers includes acl2 received acm software system award pioneering engineering effective theorem prover ... formal methods tool verifying safety-critical hardware software acl2 numerous industrial applications 1995 j strother moore matt kaufmann tom lynch used acl2 prove correctness floating point division operation amd k5 microprocessor wake pentium fdiv bug interesting applications page acl2 documentation summary uses system industrial users acl2 include amd centaur technology ibm intel oracle rockwell collins | [
4865,
8834,
9345,
2438,
9865,
2062,
9492,
9877,
4122,
1952,
1448,
4779,
7983,
8883,
4791,
6201,
6969,
7867,
8258,
8771,
4550,
8262,
5064,
10571,
8908,
1613,
9299,
1365,
2392,
473,
7896,
9816,
6493,
11488,
7267,
6502,
3176,
9320,
2667,
138... | Test |
11,084 | 2 | P.I.P.S.:p.i.p.s p.i.p.s term recursive acronym symbian software libraries means p.i.p.s posix symbian os intended help c language programmers migration desktop server middleware applications symbian os based mobile smartphone devices pips software libraries provides c c++ application programming interfaces standard c libraries p.i.p.s environment support true signalling basic signal support emulated using threads open c open c++ extensions nokia p.i.p.s contrast mere p.i.p.s. series 60 phones name result internal competition symbian developer marketing department organised bruce carney developer marketing erik jacobson product manager full-stops inserted symbian legal department ensure trademark copyright infringements | [
7877,
7983,
2804,
8122,
1083,
2045
] | Test |
11,085 | 9 | Forte_4GL:forte 4gl forté 4gl proprietary application server developed forté software used developing scalable highly available enterprise applications forté 4gl created integrated solution developing managing client/server applications forté 4gl consists application server tools deploying monitoring application object oriented proprietary programming language tool transactional object oriented language given tool runs forté application server many users simply refer tool applications forté applications first release forté 4gl published august 1994 releasing initial product forté inc. proceeded build several extensions including 1999 forté software came version forte based java instead tool named synerj also referred forté java original tool-based products consisted development ide code repository runtime environment new java product interest sun microsystems bought company tool-based extensions listed bundled together re-branded unified development server uds integration server iplanet division server modules later bundled together enterprise application integration eai sun declared product end-of-life indicating future plans continue development product sun official support forte ended april 2009 enterprise application development system forté 4gl supported close linkage number different relational database systems including oracle sybase microsoft sql server informix db2 linkages could via sql embedded within tool code via sql constructed fly also support distributed applications developer would create instance specific class would placed user-specified server calls methods instance would sent across network transparently developer would need know underlying details call would transmitted tool object-oriented language following features among others tool code case-insensitive statement always terminated semicolon compound statements enclosed keywords codice_2 codice_3 comments indicated // -- remainder line becomes comment /* ... */ data types simple data types corresponding object data types examples arrays indicated keywords codice_4 first element array indexed 1 variable declaration conditional statements if-statement case-statement iteration loops events event posted e.g following statement statement posts event named codice_5 event one argument named id events handled event handlers example exception handling multithreading new thread launched statement like codice_6 | [
9665,
6850,
9286,
4042,
5677,
9268,
11030
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.