node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
11,086
2
OpenOSPFD:openospfd openospfd isc licensed implementation open shortest path first protocol network routing software suite allows ordinary general purpose computers used routers exchanging routes computer systems speaking ospf protocol openospfd developed esben nørby claudio jeker openbsd project companion daemon openbgpd software developed alternative packages quagga routing software suite licensed gpl openospfd developed openbsd ports exist freebsd netbsd design goals openospf include secure non-exploitable reliable lean easy use configuration language intended powerful easy enough users
[ 4611, 9223, 10631, 2825, 3465, 1932, 3473, 274, 1814, 7702, 10105, 1436, 3751, 7082, 3885, 686, 6702, 7983, 9520, 3007, 9279, 10303, 10433, 2245, 5959, 9927, 1993, 5322, 8778, 3404, 7887, 5970, 10451, 9048, 1754, 5978, 5084, 7139, 1637, 4...
Test
11,087
9
Narcissus_(JavaScript_engine):narcissus javascript engine narcissus open source javascript engine written brendan eich also wrote first javascript engine spidermonkey name based mythical figure narcissus fell love relates fact javascript engine metacircular interpreter engine also written javascript albeit using non-standard extensions specific spidermonkey narcissus engine plugged firefox via zaphod add-on run scripts web pages since narcissus simpler code-base real javascript engines used prototype new language features less effort
[ 1409, 259, 3462, 6791, 10507, 8854, 4378, 8605, 7455, 8479, 803, 3761, 11060, 438, 5311, 2880, 7871, 9152, 4171, 339, 84, 4822, 4056, 9560, 603, 482, 5219, 7396, 487, 5483, 9195, 10991, 10097, 119, 6143 ]
None
11,088
4
Gpg4win:gpg4win gpg4win email file encryption package versions microsoft windows uses gnupg public-key cryptography data encryption digital signatures original creation gpg4win supported germany federal office information security however gpg4win included tools free open source software typically non-proprietary option privacy recommended windows users
[ 8640, 9281, 2050, 7139, 8674, 10631, 10600, 4746, 8331, 6797, 7983, 5749, 8283 ]
Test
11,089
4
Communications_&_Information_Services_Corps:communications amp information services corps communications information services corps cis – formerly army corps signals – one combat support corps irish defence forces military ireland responsible installation maintenance operation communications information systems command control administration defence forces facilitation accurate real-time sharing intelligence army naval service air corps branches home overseas cis corps headquartered mckee barracks dublin comes command officer colonel rank known director cis corps formerly army corps signals communications information services corps responsible development operation information technology telecommunications systems support defence forces tasks also responsible coordinating communications – radio line – information systems communications research updating communications line modern developments operational requirements cis corps tasked utilising networking information technologies order dramatically increase defence force operational effectiveness provision timely accurate information appropriate commander along real time efficient sharing information intelligence army naval service air corps well multinational partners involved international peacekeeping actors required role includes development maintenance secure nationwide defence forces telecommunications network dftn support protected voice data services provision maintenance encrypted military communications equipment use defence forces personnel home abroad cis corps units dispersed throughout df giving communications support army brigades naval service air corps defence forces training centre dftc defence forces headquarters dfhq cis corps base workshops detailed maintenance research development conducted cis corps collar flash features angel gabriel messenger god behind signal shield caption cór comharthaíochta irish translation 'signals corps translation communications information services corps cór seirbhísí cumarsáide agus eolais communications information services cis corps works defence forces intelligence branch directorate military intelligence j2 regards signals intelligence sigint houses dedicated sigint element within corps df cis corps ability intercept monitor communications remotely collect data process irish legislation criminal justice surveillance act 2009 interception postal packets telecommunications messages regulation act 1993 provides defence forces legal authority conduct domestic intelligence operations involving espionage electronic communications stored electronic information order safeguard maintain security state cis corps along garda síochána national police force provide significant domestic support role national cyber security centre ncsc department communications climate action environment countering cyber-attacks protecting critical national infrastructure securing government communications cis responsible cyber security within defence forces maintains capability area purpose protecting networks users domestic foreign 2016 establishment computer incident response team cirt dfhq cis company revealed july 2015 leaked email correspondence hacking team – private italian spying eavesdropping software company – reportedly showed members irish cis corps discussions company purchase intrusion surveillance solutions lawful interception online communications monitoring incoming outgoing emails browsing activity skype calls remotely switching webcams microphones remotely taking control devices defence forces spokesperson said operational security reasons could comment specific elements activities cis corps confirmed goods services purchased company question soldiers join communications information services corps one following apprenticeship trades personnel basic military training cis school runs large number cis related courses including degree programme military communications cis technicians association institute technology carlow 3 sections cis school providing training areas operational procedures technical proficiency simulation procedural operations section proc/ops technical section simulation section dirt range digital indoor shooting range trainees assessed marksmanship skills various small arms weapons used df helps develop proficiencies methodically without firing live ammunition regular basis €1 million facility based department defence properties kilworth camp county cork reserve defence forces rdf units integrated permanent defence forces pdf units part single force concept
[ 5024, 4937, 3629, 10766, 7887, 1169, 4595, 8564, 7893 ]
Test
11,090
9
Hop_(software):hop software hop lisp-like programming language manuel serrano web 2.0 also name web broker server proxy implements language written bigloo scheme project funded inria hop stratified language means single program file contains instructions server client server executes cpu demanding computations operations require system privileges accessing files resources clients may many browsers cell phones etc dedicated executing actions related programming graphical user interfaces code snippet illustrates concepts given recent introduction hop currently exhibits number weaknesses
[ 225, 9345, 10083, 6502, 8262, 2225 ]
None
11,091
4
MinID:minid minid electronic login system used secure range internet services norwegian public sector communication done minid encrypted secure information unauthorized usage everyone registered norwegian population register age 13 years create public id minid april 2010 2 million people living norway created user accounts minid create public id pin-codes norwegian tax administration needed purpose minid communicate electronic identity users authorized use electronic services secure way minid user database social security numbers pin-codes saved minid used access 50 online services various norwegian public agencies including norwegian labour welfare administration directorate taxes state educational loan agency public management e-government difi controller personal data handled minid agency public management egovernment norwegian direktoratet forvaltning og informasjons- og kommunikasjonsteknologi difi government agency subordinate norwegian ministry government administration reform responsible help public sector achieve quality efficiency user friendliness openness participation well helping public sector organized led good way good intersectoral cooperation users minid user profile contains mobile phone number and/or e-mail address data used administrate minid use e-mail address needed order send user temporary password forgets password phone number needed order send sms-code log temporary password user forgets password according law users claim full access handling personal data users also right information data handled saved correct delete inaccurate data users time choose delete user minid user profile deleted minid user database minid passes user social security number chosen language public services logs user go public services without new login
[]
None
11,092
4
Sam_Spade_(software):sam spade software sam spade name windows software tool designed assist tracking sources e-mail spam also name free web service provides access similar online tools sam spade utility authored steve atkins 1997 named fictional character sam spade main features query tools last fully functional version website available 2004-02-26 since experienced various outage problems due blackholing samspade.org several rirs general heavy usage longer online url currently redirects https //tools.wordtothewise.com/ contains similar set web tools brand name wisetools hosted atkins email software business word wise
[ 11607 ]
None
11,093
7
Squirrel_Systems:squirrel systems squirrel systems burnaby-based point sale vendor specializing hospitality management systems squirrel based burnaby canada squirrel systems founded 1984 released first restaurant point sale system use integrated diskless touchscreen terminal order management originally wholly owned subsidiary sulcus hospitality technologies corporation 1998 sulcus merged eltrax systems incorporated nasdaq smallcap eltx squirrel currently wholly owned subsidiary marin investments ltd. one unique characteristics squirrel original product use hardened lcd touchscreen terminals unlike systems used keyboards crt monitors squirrel terminals moving parts easily adapted operating environment original squirrel terminals reached 35,000 installed units worldwide first integrate lcd panel credit card reader employee id reader cpu inside single unit later units would incorporate ip connectivity remote booting customized linux operating system java virtual machine 1998 squirrel systems released squirrel embedded linux sel customized distribution linux thin client terminal architecture sel several characteristics unique time development including primary support diskless workstations customized high-volume touchscreen drivers integrated java virtual machine hardware control two-stage booting windows server
[ 10926, 1776, 8976, 5872, 11030, 823 ]
None
11,094
7
Bluetooth_mesh_networking:bluetooth mesh networking bluetooth mesh networking conceived 2015 adopted protocol based upon bluetooth low energy allows many-to-many communication bluetooth radio defined mesh profile specification mesh model specification communication carried messages may 384 bytes long using segmentation reassembly sar mechanism messages fit one segment 11 bytes message starts opcode may single byte special messages 2 bytes standard messages 3 bytes vendor-specific messages every message source destination address determining devices process messages devices publish messages destinations single things groups things everything message sequence number protects network replay attacks message encrypted authenticated two keys used secure messages 1 network keys – allocated single mesh network 2 application keys – specific given application functionality e.g turning light vs reconfiguring light messages time live ttl time message received retransmitted ttl decremented limits number hops eliminating endless loops bluetooth mesh flood network based nodes relaying messages every relay node receives network packet authenticates known network key message cache ttl ≥ 2 retransmitted ttl ttl 1 message cache used prevent relaying messages recently seen bluetooth mesh layered architecture multiple layers yet determined practical limits bluetooth mesh technology limits built specification though version 1.0 bluetooth mesh specification following standard models model groups defined foundation models defined core specification two mandatory mesh nodes provisioning process installing device network mandatory step build bluetooth mesh network provisioning process provisioner securely distributes network key unique address space device provisioning protocol uses p256 elliptic curve diffie-hellman key exchange create temporary key encrypt network key information provides security passive eavesdropper also provides various authentication mechanisms protect network information active eavesdropper uses man-in-the-middle attack provisioning process key unique device known device key derived elliptic curve shared secret provisioner device provisioning process device key used provisioner encrypt messages specific device security provisioning process analyzed paper presented ieee cns 2018 conference provisioning performed using bluetooth gatt connection advertising using specific bearer
[ 10021, 9863, 9098, 11405, 11250, 3511, 5276, 4863 ]
None
11,095
2
Uswsusp:uswsusp uswsusp abbreviated userspace software suspend stylized µswsusp set userspace command-line utilities linux act primarily wrappers around linux kernel hibernation functionality implement sleep mode utility referred suspend ram hibernation utility referred suspend disk hybrid sleep utility referred suspend supports linux kernel versions 2.6.17 newer uswsusp supports image checksumming data compression disk encryption integration splashy fbsplash
[ 3082, 5139, 10780, 10785, 3618, 6180, 3109, 8242, 9266, 4161, 10817, 6213, 8268, 5222, 10856, 4207, 7794, 4734, 7812, 8326, 4238, 10382, 2195, 2711, 9882, 1694, 2723, 10933, 5815, 5822, 1736, 2762, 8909, 7375, 8410, 10971, 8928, 1761, 2278,...
None
11,096
3
Goody_(video_game):goody video game goody platform game developed gonzalo gonzo suárez released 1987 spanish company opera soft game released amstrad cpc ms-dos msx zx spectrum platforms experienced thief john nelson brainner stravinsky known goody mission break bank spain equipped ladder goody explores catacombs city buildings along way may collect treasure needed purchase tools dynamite drill find access code main vault many objects enemies remote-control combat helicopters vipers gorillas policeman rodríguez ghosts evil moon try stop goody remake game linux windows titled goody remake released coptron game studios 2007 version brings brand new graphics music theme sound effects keeps gameplay atmosphere authentic goody version mobile phones created exelweiss published ebrain mobile 2007 called goody returns version uses 2.5d graphics video game called speakerman released 2019 art style game world heavily inspired goody
[ 10931, 9166, 9006, 823 ]
Validation
11,097
4
Virtual_private_server:virtual private server virtual private server vps virtual machine sold service internet hosting service virtual dedicated server vds also similar meaning vps runs copy operating system os customers may superuser-level access operating system instance install almost software runs os many purposes functionally equivalent dedicated physical server software-defined able much easily created configured priced much lower equivalent physical server however share underlying physical hardware vpses performance may lower depending workload executing virtual machines force driving server virtualization similar led development time-sharing multiprogramming past although resources still shared time-sharing model virtualization provides higher level security dependent type virtualization used individual virtual servers mostly isolated may run full-fledged operating system independently rebooted virtual instance partitioning single server appear multiple servers increasingly common microcomputers since launch vmware esx server 2001 physical server typically runs hypervisor tasked creating releasing managing resources guest operating systems virtual machines guest operating systems allocated share resources physical server typically manner guest aware physical resources save allocated hypervisor vps runs copy operating system customers superuser-level access operating system instance install almost software runs os however due number virtualization clients typically running single machine vps generally limited processor time ram disk space ultimately used decrease hardware costs condensing failover cluster single machine thus decreasing costs dramatically providing services server roles features generally designed operate isolation example windows server 2019 requires certificate authority domain controller exist independent servers independent instances windows server additional roles features adds areas potential failure well adding visible security risks placing certificate authority domain controller poses potential root access root certificate directly motivates demand virtual private servers order retain conflicting server roles features single hosting machine also advent virtual machine encrypted networks decreases pass-through risks might otherwise discouraged vps usage legitimate hosting server many companies offer virtual private server hosting virtual dedicated server hosting extension web hosting services several challenges consider licensing proprietary software multi-tenant virtual environments unmanaged self-managed hosting customer left administer server instance unmetered hosting generally offered limit amount data-transferred fixed bandwidth line usually unmetered hosting offered 10 mbit/s 100 mbit/s 1000 mbit/s high 10gbit/s means customer theoretically able use ~3 tb 10 mbit/s ~300 tb 1000 mbit/s line per month although practice values significantly less virtual private server shared bandwidth fair usage policy involved unlimited hosting also commonly marketed generally limited acceptable usage policies terms service offers unlimited disk space bandwidth always false due cost carrier capacities technological boundaries
[ 9088, 5378, 6018, 4238, 10522, 6435, 6565, 6438, 7078, 9766, 7983, 1840, 9655, 10747, 700, 318, 11073, 5314, 11075, 4958, 354, 4194, 7660, 9202, 5749, 5371, 4734 ]
Test
11,098
1
Comparison_of_triplestores:comparison triplestores comparison triplestores also known subject-predicate-object databases database management systems built database engines scratch others built top existing commercial relational database engines e.g. sql-based like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development long-term though seems native triplestores advantage performance difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model e.g. mapping sparql onto sql queries difficult following table overview available triplestores technical implementation support sparql world wide web consortium w3c recommendations available application programming interfaces api
[ 2688, 5632, 8451, 3462, 8582, 8201, 2062, 9631, 1697, 5031, 4777, 5677, 10413, 9397, 5047, 6074, 9147, 7868, 11324, 11457, 8644, 6085, 6470, 2512, 2901, 7767, 7650, 3171, 8291, 6629, 6502, 9828, 9320, 10340, 8554, 10471, 3573, 1146, 6395, ...
Validation
11,099
9
Roger_Moore_(computer_scientist):roger moore computer scientist roger d. moore november 16 1939 – march 21 2019 1973 recipient larry breed richard lathwell grace murray hopper award association computing machinery acm given work design implementation apl\ 360 setting new standards simplicity efficiency reliability response time interactive systems moore cofounder i. p. sharp associates held senior position company many years contributed subalgol compiler stanford university wrote algol 60 compiler ferranti-packard 6000 ict 1900 along work programming language apl also instrumental development ipsanet private packet switching data network roger d. moore born redlands california graduation worked operator burroughs 220 computer stanford time provided support larry breed ’ card stunt system also spent time studying burroughs 220 balgol compiler resulted butterfly described george forsythe grader program written balgol-language procedure compiled together procedure called butterfly written moore result relocatable machine-language procedure mechanism equating variables variables balgol program form balgol compiler ’ machine-language library procedures sin write read etc forsythe anticipated problem described bob braden balgol stanford outlived b220 hardware 1962 stanford contracted ibm obtain ibm 7090 campus computing created great consternation forsythe ’ office significant body faculty students familiar balgol high compiling speed bac vital academic environment subject community production-oriented system software offered ibm including slow fortran compiler cumbersome operating system would moved academic computing stanford backward several years address problem december 1961 moore hired forsythe work subalgol compiler ibm 7090 braden breed hired soon afterward completion subalgol hired ferranti-packard write algol 60 compiler fp6000 compiler part software package included sale fp6000 international computers tabulators december 1964 employees ferranti-packard computer group laid along six former fp employees formed i. p. sharp associates vice-president incorporation retirement 1989 1966 larry breed richard lathwell began work apl\360 interpreter lastly apl\360 owes much superior time-sharing performance roger d. moore i.p sharp associates toronto principally responsible supervisor design described extent deserves team received grace murray hopper award association computing machinery acm given work design implementation apl\360 setting new standards simplicity efficiency reliability response time interactive systems 1970 moore became project leader ipsa speculative dos/360 cobol compiler project although compiler satisfactory performance market accept ipsa offered apl time-sharing service starting 1969 1975 inflexibility communication error intolerance time-division multiplexing longer tolerable became chief architect ipsanet packet switching computer network 1976 system deployed north america london 1984 ipsa released sharp apl ibm pc package included 370 emulator written moore retiring ipsa early 1989 became interested opera chamber music along attending many performances supported concerts commissions advanced music education moore funded composing many works
[ 512, 9993, 10008, 1178, 667, 8987, 1952, 1316, 10668, 4921, 9019, 1219, 3267, 11075, 1610, 1099, 9804, 1613, 7630, 1236, 2519, 1883, 7775, 3168, 9825, 11625, 4331, 2670, 2798, 8695, 505, 3323 ]
Test
11,100
3
Compaq_Portable_series:compaq portable series compaq first computers portable 'lunchbox 'luggable computers belong compaq portable series computers measured approximately 1×1 foot side approx 2½ ft wide products evolved laptops notebooks created offing new level portability caused market explode portables portable portable ii crt monitors others portable iii portable 386 flat single-color usually amber plasma displays portables came/could come internal hard disk drives .5 shock mount springs diskette drives usually 5 double- quadruple-density drives batteries and/or dual-isa expansion chassis one full-drive-height wide later products included mono color lcd screens battery powered
[ 11008, 5384, 3214, 8212, 1304, 8229, 5571, 7243, 3281, 2258, 1874, 8786, 1638, 3943, 6765, 6129, 11505, 5368, 5756 ]
Validation
11,101
3
Helix_HeadRoom:helix headroom headroom dos context switching multitasking memory manager produced helix software company late 1980s early 1990s headroom managed multiple terminate stay resident programs first tsr manager allow sharing address space interrupts among tsrs dos headroom v1.0 released september 1988 april 1989 helix software released headroom v1.1 together headroom network extensions version added support network communications processes headroom network extensions intercepted buffered netbios tcp/ip communications requests allowing headroom manage network communications software mainframe terminal emulators e-mail programs background communications programs would continue programs swapped headroom would reactivate swapped-out programs activity occurred netbios tcp/ip sockets october 1989 helix software released headroom v2.0 included support microsoft windows lim ems v4.0 starting march 1990 version headroom bundled ast research rampage rampage plus sixpack memory expansion boards june 1990 helix software licensed technology headroom digital communications associates use irma boards irmalan software january 1991 helix released final version headroom v2.03 thereafter incorporated headroom features netroom lan memory manager decision caused market confusion
[ 6321, 6797, 4589, 5598 ]
Test
11,102
9
Zonnon:zonnon zonnon programming language along oberon modula pascal language line jürg gutknecht author programming language zonnon general purpose programming language pascal modula-2 oberon family conceptual model based objects definitions implementations modules computing model concurrent based active objects interact via syntax controlled dialogs language developed eth zürich institute computer systems prof. jürg gutknecht zonnon introduces concept 'active objects used represent real world concurrent objects within computer programs zonnon language report written brian kirk director robinsons associates david lightfoot oxford brookes university working prof. jürg gutknecht eth zürich dr. eugene zueff евгений зуев moscow state university first book zonnon published n. i. lobachevsky state university nizhny novgorod a.k.a nizhni novgorod state university zonnon member pascal family languages two beneficial consequences general purpose language b immediately familiar pascal modula-2 oberon programmers pascal programs domain algorithms data structures successfully compiled zonnon compiler minor modifications however perspective “ programming-in-the-large ” zonnon much elaborate compared predecessors four different kinds program units zonnon objects modules definitions implementations first two instantiated runtime third compile time unit abstraction fourth unit composition brief characterization zonnon uses compositional inheritance model based aggregation typically object module composed number functional components presenting clients form abstract definition set definitions plus object ’ intrinsic interface set public elements object constitutes interface object clients zonnon allows adding behavior objects modules purpose notion active object imported active oberon language generalized towards unified model hierarchic activities activities encapsulated threads come two flavors local activities agent activities local activities express intrinsic object dynamics typical context block statements representing “ launch logic ” set mutually independent activities assumption end block acts barrier passed activities terminated agent activities control interoperability objects terms formal dialogs agent activity within “ callee ” object serves template formal dialog caller callee agent activities typically implement parser predefined syntax constitutes kind contract two communication partners formal dialogs generalization asynchronous method calls reflected form syntax borrowed ordinary method calls
[ 9345, 8262, 8524, 8082, 8219, 6558 ]
Test
11,103
2
Criticism_of_Windows_XP:criticism windows xp criticism windows xp deals issues security performance presence product activation errors specific microsoft operating system windows xp windows xp criticized vulnerabilities due buffer overflows susceptibility malware viruses trojan horses worms nicholas petreley register notes windows xp first version windows reflect serious effort isolate users system users private files limited system privileges however users default receive administrator account provides unrestricted access underpinnings system administrator account compromised limit control asserted pc windows xp home edition also lacks ability administer security policies denies access local users groups utility microsoft executives stated release security patches often causes spread exploits flaws crackers figure problems patches fix launch attacks unpatched systems example august 2003 blaster worm exploited vulnerability present every unpatched installation windows xp capable compromising system even without user action may 2004 sasser worm spread using buffer overflow remote service present every installation patches prevent well-known worms already released microsoft increasingly widespread use service pack 2 greater use personal firewalls may also contribute making worms like less common many attacks windows xp systems come form trojan horse e-mail attachments contain worms user opens attachment unknowingly infect computer may e-mail worm people notable worms sort infected windows xp systems include mydoom netsky bagle discourage users running programs service pack 2 includes attachment execution service records origin files downloaded internet explorer received attachment outlook express user tries run program downloaded untrusted security zone windows xp service pack 2 prompt user warning spyware adware continuing problem windows xp versions windows spyware also concern microsoft regard service pack updates barry goff group product manager microsoft said spyware could cause computers freeze upon installation service pack 2 january 2005 microsoft released free beta version windows defender removes spyware adware computers windows xp offers useful security benefits windows update set install security patches automatically built-in firewall user n't install updates long time windows update icon displayed toolbar windows automatically install restart computer lead loss unsaved data user away computer updates installed service pack 2 enables firewall default also adds increased memory protection let operating system take advantage new execute technology built cpus amd64 allows windows xp prevent buffer overflow exploits april 8 2014 extended support windows xp ended means security vulnerabilities longer patched general advice given microsoft security specialists longer use windows xp light united states v. microsoft corp. case resulted microsoft convicted illegally abusing operating system monopoly overwhelm competition markets windows xp drawn fire integrating user applications windows media player windows messenger operating system well close ties windows live id microsoft account service 2001 procomp – group including several microsoft rivals including oracle sun netscape – claimed bundling distribution windows media player windows xp continuance microsoft anticompetitive behavior integration windows live id time microsoft passport windows xp example microsoft attempting gain monopoly web services claims rebutted association competitive technology act computing technology industry association comptia partially funded microsoft battle fought fronts side subject heated exchange oracle larry ellison microsoft bill gates microsoft responded freedom innovate web site pointing earlier versions windows microsoft integrated tools disk defragmenters graphical file managers tcp/ip stacks protest microsoft anti-competitive microsoft asserted tools moved special general usage therefore belonged operating system avoid possibility injunction might delayed release windows xp microsoft changed licensing terms allow pc manufacturers hide access internet explorer remove competitors dismissed trivial gesture later microsoft released utility part service pack 1 sp1 allows icons links bundled software internet explorer windows media player windows messenger confused similar-named windows live messenger formerly msn messenger removed components remain system microsoft maintains necessary key windows functionality html help system windows desktop removing completely may result unwanted consequences one critic shane brooks argued internet explorer could removed without adverse effects demonstrated product xplite dino nuhagic created nlite software remove many components xp prior installation product addition first release windows xp buy music online feature always used microsoft internet explorer rather web browser user may set his/her default pressure united states department justice microsoft released patch early 2004 corrected problem migrating windows 9x xp issue users dependent upon ms-dos although xp comes ability run dos programs virtual dos machine still trouble running many old dos programs largely windows nt system use dos base os windows nt architecture different windows 9x dos programs run natively xp notably programs rely direct access hardware run emulators dosbox virtual machines like vmware virtual pc virtualbox also applies programs require direct access certain common emulated hardware components like memory keyboard graphics cards serial ports dos emulators 32-bit versions windows xp run almost program designed previous microsoft operating system 64-bit versions xp major backward-compatibility issues old 16-bit windows programs require tool called ntvdm present 32-bit version os however true every version windows comes 32-bit 64-bit versions specific xp attempt reduce piracy microsoft introduced product activation windows xp activation required computer user activate microsoft either online phone within certain amount time order continue using operating system user computer system ever changes — example two relevant components computer upgraded — windows return unactivated state need activated within defined grace period user tried reactivate frequently system refuse activate online user must contact microsoft telephone obtain new activation code however activation applied retail system builder intended use small local pc builders copies windows royalty oem used large pc vendors copies instead locked special signature machine bios demand activation moved system whose motherboard signature volume license copies require activation led pirates simply using volume license copies volume license keys widely distributed internet addition activation windows xp service packs refuse install windows xp systems product keys known widely used unauthorized installations product keys either intended use one copy retail system builder one oem bios locked copies one company volume license copies included product however number volume licence product keys mentioned avoid need activation posted internet used large number unauthorized installations service packs contain list keys update copies windows xp use microsoft developed new key verification engine windows xp service pack 2 could detect illicit keys even never used outcry security consultants feared denying security updates illegal installations windows xp would wide-ranging consequences even legal owners microsoft elected disable new key verification engine service pack 2 checks small list commonly used keys service pack 1 means service pack 2 install copies windows xp use older set copied keys use keys posted recently may able update systems try curb piracy based leaked generated volume license keys microsoft introduced windows genuine advantage wga wga comprises two parts verification tool must used get certain downloads microsoft user notification system wga windows followed verification systems internet explorer 7 windows media player 11 windows defender microsoft office 2007 certain updates late 2007 microsoft removed wga verification installer internet explorer 7 saying purpose change make ie7 available windows users license key judged genuine displays nag screen regular intervals asking user buy license microsoft addition user access microsoft update restricted critical security updates new versions enhancements microsoft products longer able downloaded installed august 26 2008 microsoft released new wga activation program displays plain black desktop background computers failing validation background changed reverts 1 hour common criticisms wga included description critical security update causing automatic updates download without user intervention default settings behavior compared spyware phoning home microsoft every time computer connected internet failure inform end users exactly wga would installed rectified 2006 update failure provide proper uninstallation method beta testing users given manual removal instructions work final build sensitivity hardware changes cause repeated need reactivation hands developers also user connection internet phone difficult activate normally strictly speaking neither download install notifications mandatory user change automatic update settings allow choose updates may downloaded installation update already downloaded user choose accept supplemental eula provided notifications cases user also request update presented newer critical security updates may still installed update hidden however setting effect existing version notifications appear new version 2006 california resident brian johnson attempted bring class action lawsuit microsoft grounds windows genuine advantage notifications violated spyware laws state lawsuit dismissed 2010
[ 10756, 6150, 6153, 11283, 3605, 5666, 11301, 6697, 1581, 7215, 8757, 7739, 582, 1098, 9812, 8797, 8798, 4704, 10338, 8296, 617, 5225, 8299, 7796, 6265, 8315, 636, 639, 641, 651, 6797, 10896, 2196, 10900, 3224, 10392, 7838, 6827, 3250, 991...
None
11,104
5
Web_Cache_Communication_Protocol:web cache communication protocol web cache communication protocol wccp cisco-developed content-routing protocol provides mechanism redirect traffic flows real-time built-in load balancing scaling fault tolerance service-assurance failsafe mechanisms cisco ios release 12.1 later releases allow use either version 1 wccpv1 version 2 wccpv2 protocol wccp allows utilization cisco cache engines caches running wccp localize web traffic patterns network enabling content requests fulfilled locally traffic localization reduces transmission costs download time wccpv1 wccpv2 whilst originally designed cisco content cache appliance since added support products including vendors also implemented wccp support products allows clustering transparent deployment networks using cisco routers/switches without additional hardware wccp particular use vendors web cache/proxy/security appliances redirection web traffic list includes
[ 704, 3520, 6569, 10924, 10574, 5491, 7411, 4725, 9055, 10772, 11413, 3673, 5178, 5371, 127 ]
Validation
11,105
8
List_of_web_service_frameworks:list web service frameworks list web service frameworks
[ 8070, 11413, 4000, 10020, 10924, 6328, 1851, 8640, 4419, 8644, 7878, 7261, 479, 8425, 9834, 4974, 6127, 3573, 10486 ]
Test
11,106
2
Storage_violation:storage violation computing storage violation hardware software fault occurs task attempts access area computer storage permitted access storage violation instance consist reading writing freeing storage owned task common type storage violation known stack buffer overflow program attempts exceed limits set call stack also refer attempted modification memory owned another thread incomplete memory protection storage violations occur transaction systems cics circumstances possible write storage owned transaction violations reduced enabling features storage protection transaction isolation storage violations difficult detect program often run period time violation crashes example pointer freed area memory retained later reused causing error result efforts focus detecting violations occur rather later problem observed systems cics storage violations sometimes detected cics kernel use signatures tested see overlaid alternative runtime library may used better detect storage violations cost additional overhead programming languages use software bounds checking prevent occurrences program debugging software also detect violations testing
[ 8551, 1801, 5040, 4562, 9432, 3323, 10333 ]
None
11,107
3
Parity_flag:parity flag computer processors parity flag indicates numbers set bits odd even binary representation result last operation normally single bit processor status register example assume machine set parity flags indicates even parity result last operation 26 11010 binary parity flag would 0 since number set bits odd similarly result 10 1010 binary parity flag would 1 x86 processors parity flag reflects parity least significant byte result set number set bits ones even put another way parity bit set sum bits even according 80386 intel manual parity flag changed x86 processor family following instructions conditional jumps parity flag used e.g jp instruction jumps given target parity flag set jnp instruction jumps set flag may also read directly instructions pushf pushes flags register stack one common reason test parity flag check unrelated fpu flag fpu four condition flags c0 c3 tested directly must instead first copied flags register happens c0 placed carry flag c2 parity flag c3 zero flag c2 flag set e.g incomparable floating point values nan unsupported format compared fucom instructions
[ 6596, 9028, 9158, 3630, 4465, 5234, 3699, 499, 1461, 7997 ]
None
11,108
2
Boot_image:boot image boot image type disk image computer file containing complete contents structure computer storage media transferred onto boot device allows associated hardware boot usually includes operating system utilities diagnostics well boot data recovery information also includes applications used organization-wide specialized image particular type user department called typically departmental boot image building image take days weeks involve complex decisions licensing permissions including passwords store boot image require users type requires experts software integration however built boot image simply copied onto devices patched within reasonable limits remains disposable case problems viruses particular possible unlike hard drive images may contain data et al pure boot images contain mission-critical data definition pure boot image contains data reproduced configurations off-the-shelf executables particular end-user data part boot image although operating systems require copy user preferences configuration files kept within boot image e.g microsoft windows registry utilities like norton ghost keep backup copy boot image quick re-imaging often called re-installation event problem thus avoiding need diagnose specific problem specific machine virtual machine infrastructure directly import export boot image direct installation bare metal i.e disk standard technique oems install identical copies operating system many identical machines boot image created virtual machine exported created one disk copied via boot image control infrastructure also makes virtual machine copies vmware vcenter converter instance lets users convert physical machines virtual machines free part company suite products make images easier back manage equivalents exist xen vm systems keeping boot image entirely separate disposable mandating boot image control organizations seek keep total cost operations including total cost ownership component low often organizations look uptime service one goal boot image control minimize number boot images used organization reduce support costs includes least many organizations use thin clients applications require high security involve unreliable users repurpose older machines continued use cascading strategy involves re-imaging older off-spec machines thin client boot images may continue use less demanding access-controlled applications
[ 3297, 6153, 5370, 6797, 3086, 5296, 7739, 2714, 2811, 5596 ]
None
11,109
4
General_Dynamics_Mission_Systems:general dynamics mission systems general dynamics mission systems business unit american defense aerospace company general dynamics general dynamics mission systems integrates secure communication information systems technology general dynamics mission systems core manufacturing secure communications networks radios satellite technology defense cyber public safety intelligence communities general dynamics mission systems formed january 2015 general dynamics combined company c4 systems advanced information systems general dynamics c4 systems originally owned gte operated gte government systems general dynamics acquired gte government systems 1999 general dynamics advanced information systems provided mission-related systems development integration operations support general dynamics c4 systems leading integrator secure communications information systems technology lte general dynamics mission systems cell wheels cow deployable emergency lte solution used first responders public safety officials mobile cell tower able cover six square miles network created 2013 fortress lte technology includes virtual core network vcn enodeb base stations lte band 14 outdoor omni-directional user equipment c-band lte user equipment lte usb stick modem 4g evolved node b enodeb base stations software defined radios house digital baseband radio frequency rf circuits compact rugged mountable enclosure eliminate external interfaces reduce installation errors setup time range enodeb form factors offered different deployment scenarios support standard 4g lte band classes frequency ranges 400 mhz 6 ghz virtual core network vcn virtual 4g core network deployed wide range cots computing platforms vcn evolved packet core epc solution cyber cyber defense products include taclane network encryptors protecd r data-at-rest encryptors gem x™ encryptor manager pitbull operating system trusted network environment maritime strategic systems general dynamics mission systems acquired bluefin robotics february 2016 manufacturer unmanned undersea vehicles uuvs perform wide range missions u.s. military commercial customers independence-variant littoral combat ship lcs built general dynamics mission systems open architecture computing infrastructure open ci austal contracted build u.s. navy prime contractor subsequent 3.5 billion block buy 2010 august 2016 company successfully completed at-sea testing matador torpedo detection system build canada innovation program bcip tests conducted boat royal canadian navy ship matador acoustic processing system detecting tracking heavyweight anti-ship torpedoes radio communications cm-300/350 series version 2 radios latest additions air traffic control atc radios based faa nexcom segment 2 radio requirements rack mounted transmitter receiver systems specifically designed meet dynamic mission requirements air traffic control centers commercial airports military air stations range installations radio astronomy meerkat telescope array precursor telescope south africa ’ planned square kilometer array ska comprises 64 radio antennas south africa ’ northern cape province completed 2016 meerkat largest powerful radio telescope southern hemisphere ska array completed 2024 meerkat covers eight kilometers facilitate research cosmic magnetism galactic evolution large-scale structure cosmos dark matter nature transient radio sources among science projects space general dynamics mission systems provides integrated ground segments mobile user objective system muos used u.s. navy soon provide cell phone-like communications warfighters move intelligence systems tac-maas motion imagery processing exploitation system stanag 4609 nga motion imagery standard profile misp compliant international equivalent product d-vex sold australian-based subsidiary general dynamics mediaware win-t program win-t warfighter information network-tactical win-t army tactical communications system general dynamics army prime contractor win-t part general dynamics mission systems tactical voice data communications systems soldier network increment 1 fully deployed began fielding 2004 completed fielding 2012 november 2007 general dynamics announced 78 million order indefinite delivery quantity contract win-t increment 1 april 2015 general dynamics mission systems awarded 36 million army contract maintenance repair products related increment 1 june 2015 general dynamics secured contract increment 2 valued 219 million increment 2 includes additional capabilities mobile broadband increment 1 2 equipment remain field battalion company levels increment 3 completed
[ 10813, 2346, 7887, 2384, 3478, 125 ]
Test
11,110
4
BCODE:bcode bcode identifier sent mobile phone/device used ticket/voucher/identification type token bcode sms message read electronically screen mobile device bcodes sent text message standard sms received 99 devices bcodes many uses advertising loyalty programs promotions ticketing bcode developed australian company 2003-2005 bcode simple sms text message looks something like text message read screen mobile phone/device decoded unique token id id used supply consumer unique experience
[]
None
11,111
7
Apache_Kudu:apache kudu apache kudu free open source column-oriented data store apache hadoop ecosystem compatible data processing frameworks hadoop environment provides completeness hadoop storage layer enable fast analytics fast data open source project build apache kudu began internal project cloudera first version apache kudu 1.0 released 19 september 2016 kudu designed optimized olap workloads like hbase real-time store supports key-indexed record lookup mutation kudu differs hbase since kudu datamodel traditional relational model hbase schemaless kudu on-disk representation truly columnar follows entirely different storage design hbase/bigtable
[ 9344, 3, 7816, 10377, 8460, 7567, 1296, 6161, 1047, 8217, 11161, 6555, 8860, 6943, 3877, 10661, 11303, 1327, 7983, 823, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 4944, 1363, 7767...
None
11,112
5
Telnet:telnet telnet application protocol used internet local area network provide bidirectional interactive text-oriented communication facility using virtual terminal connection user data interspersed in-band telnet control information 8-bit byte oriented data connection transmission control protocol tcp telnet developed 1969 beginning rfc 15 extended rfc 855 standardized internet engineering task force ietf internet standard std 8 one first internet standards name stands teletype network historically telnet provided access command-line interface usually operating system remote host including network equipment operating systems configuration utility including systems based windows nt however serious security concerns using telnet open network internet use purpose waned significantly favor ssh term telnet also used refer software implements client part protocol telnet client applications available virtually computer platforms telnet also used verb telnet means establish connection using telnet protocol either command line client graphical interface example common directive might change password telnet server log run passwd command cases user would telnetting unix-like server system network device router telnet client-server protocol based reliable connection-oriented transport typically protocol used establish connection transmission control protocol tcp port number 23 telnet server application telnetd listening telnet however predates tcp/ip originally run network control program ncp protocols even though telnet ad hoc protocol official definition march 5 1973 name actually referred teletype network protocol rfc 206 nic 7176 telnet makes connection clear many extensions made telnet negotiable options protocol architecture extensions adopted internet standards ietf documents std 27 std 32 extensions widely implemented others proposed standards ietf standards track see telnet best understood context user simple terminal using local telnet program known client program run logon session remote computer user communications needs handled telnet server program telnet initially developed 1969 users networked computers computer departments academic institutions large private government research facilities environment security nearly much concern became bandwidth explosion 1990s rise number people access internet extension number people attempting hack people servers made encrypted alternatives necessary experts computer security sans institute recommend use telnet remote logins discontinued normal circumstances following reasons security-related shortcomings seen usage telnet protocol drop rapidly especially public internet favor secure shell ssh protocol first released 1995 ssh practically replaced telnet older protocol used days rare cases access decades old legacy equipment support modern protocols ssh provides much functionality telnet addition strong encryption prevent sensitive data passwords intercepted public key authentication ensure remote computer actually claims happened early internet protocols extensions telnet protocol provide transport layer security tls security simple authentication security layer sasl authentication address concerns however telnet implementations support extensions relatively little interest implementing ssh adequate purposes note large number industrial scientific devices telnet available communication option built standard rs-232 port use serial server hardware appliance provide translation tcp/telnet data rs-232 serial data cases ssh option unless interface appliance configured ssh ibm 5250 3270 workstation emulation supported via custom telnet clients tn5250/tn3270 ibm servers clients servers designed pass ibm 5250 data streams telnet generally support ssl encryption ssh include 5250 emulation os/400 also known ibm port 992 default port secured telnet data octets except 0xff transmitted telnet sometimes used telnet client applications establish interactive raw tcp session due commonly mistaken belief session use iac functionally identical example user could make http request hand using command line version telnet client application follows case however network virtual terminal nvt rules requirement bare carriage return character cr ascii 13 followed nul ascii 0 character distinguish telnet protocol raw tcp sessions hand many systems possess true raw tcp clients netcat socat unix putty windows also used manually talk services without specialized client software nevertheless telnet still sometimes used debugging network services smtp irc http ftp pop3 servers issue commands server examine responses protocols ftp really uses telnet data format another difference telnet raw tcp session telnet 8-bit clean default 8-bit mode may negotiated high-bit-set octets may garbled mode requested requested non-telnet connection 8-bit mode named binary option intended transmit binary data characters though standard suggests interpretation codes 0000–0176 ascii offer meaning high-bit-set data octets attempt introduce switchable character encoding support like http nothing known actual software support
[ 6657, 10242, 516, 5636, 1030, 3592, 9736, 8204, 8211, 7188, 7702, 6681, 6682, 6171, 9757, 10269, 10271, 6689, 7713, 35, 9251, 2085, 10786, 10788, 7208, 10791, 3629, 7214, 8238, 562, 1586, 2610, 4661, 9269, 3639, 11319, 11321, 5179, 6204, ...
Test
11,113
7
Microsoft_Dynamics_365:microsoft dynamics 365 dynamics 365 product line enterprise resource planning erp customer relationship management crm applications announced microsoft july 2016 general release november 1 2016 part microsoft dynamics product line dynamics 365 sold two editions business edition small medium-sized enterprises smes smbs enterprise edition medium large organizations business edition includes financials application based project code-named 'madeira enterprise edition comprises dynamics crm applications field service sales project service automation customer service plus microsoft powerapps together microsoft premier erp product known dynamics 365 operations july 1 2017 dynamics 365 line repackaged crm applications called customer engagement plan erp application called microsoft dynamics 365 finance operations however available part unified operations plan also includes standalone applications dynamics 365 talent dynamics 365 retail together two plans form dynamics 365 plan microsoft dynamics 365 contains 11 core modules
[ 7489, 1539, 5224, 11113, 1612, 6797, 7532, 7983, 1008, 1680, 10509, 5750 ]
Train
11,114
2
Active_object_(Symbian_OS):active object symbian os active object framework callback-based form multitasking computer systems specifically form cooperative multitasking important feature symbian operating system within framework active objects may make requests asynchronous services e.g sending sms message asynchronous request made control returned calling object immediately i.e without waiting call complete caller may choose things returns control back operating system typically schedules tasks puts machine sleep makes request calling object includes reference asynchronous task completes operating system identifies thread containing requesting active object wakes active scheduler thread identifies object made request passes control back object implementation active objects symbian based around thread request semaphore incremented thread makes asynchronous request decremented request completed outstanding requests thread put sleep practice may many active objects thread task interact requesting things active objects threads may even request things implementation old idea developed handle software interruptions 70s operating system acting first object peripheral second one
[ 2345, 7983 ]
Test
11,115
0
Text_nailing:text nailing text nailing tn information extraction method semi-automatically extracting structured information unstructured documents tn combines two concepts 1 human-interaction narrative text identify highly prevalent non-negated expressions 2 conversion expressions notes non-negated alphabetical-only representations create homogeneous representations traditional machine learning approaches text classification human expert required label phrases entire notes supervised learning algorithm attempts generalize associations apply new data contrast using non-negated distinct expressions eliminates need additional computational method achieve generalizability tn developed massachusetts general hospital tested multiple scenarios including extraction smoking status family history coronary artery disease identifying patients sleep disorders improve accuracy framingham risk score patients non-alcoholic fatty liver disease classify non-adherence type-2 diabetes comprehensive review regarding extracting information textual documents electronic health record available importance using non-negated expressions achieve increased accuracy text-based classifiers emphasized letter published communications acm october 2018 sample code extracting smoking status narrative notes using nailed expressions available github july 2018 researchers virginia tech university illinois urbana–champaign referred tn example progressive cyber-human intelligence pchi chen asch 2017 wrote machine learning situated peak inflated expectations soften subsequent crash “ trough disillusionment ” fostering stronger appreciation technology ’ capabilities limitations letter published communications acm beyond brute force emphasized brute force approach may perform better traditional machine learning algorithms applied text letter stated ... machine learning algorithms applied text rely assumption language includes infinite number possible expressions contrast across variety medical conditions observed clinicians tend use expressions describe patients conditions viewpoint published june 2018 concerning slow adoption data-driven findings medicine uri kartoun co-creator text nailing states ... text nailing raised skepticism reviewers medical informatics journals claimed relies simple tricks simplify text leans heavily human annotation tn indeed may seem like trick light first glance actually fairly sophisticated method finally caught attention adventurous reviewers editors ultimately accepted publication human in-the-loop process way generate features using domain experts using domain experts come features novel concept however specific interfaces method helps domain experts create features likely novel case features experts create equivalent regular expressions removing non-alphabetical characters matching smokesppd equal regular expression /smokes ^a-za-z *ppd/ using regular expressions features text classification novel given features classifier manually set threshold authors decided performance set documents classifier parameters classifier case threshold set manually given features documents almost machine learning algorithm able find threshold likely better one authors note using support vector machines svm hundreds documents give inferior performance specify features documents svm trained/tested fair comparison would use features document sets used manual threshold classifier
[ 11221 ]
Validation
11,116
4
Actiance:actiance actiance inc formerly known facetime communications american-based multinational corporation develops platforms required enable security management compliance unified communications web 2.0 social media channels headquartered redwood city california actiance supports leading social networks unified communications providers instant messaging platforms including facebook linkedin twitter aol google yahoo skype microsoft ibm cisco established 1997 actiance provided call center crm enablement instant messaging web chat email working closely aol yahoo msn microsoft actiance established industry first cap agreements certified access programs providing enhanced access public im networks 2000 actiance awarded innovative use real-time collaboration microsoft exchange conference 2001 company launched first compliance security solution im networks im auditor aimed specifically financial services sector needed comply government regulations enabled financial services organizations ability leverage power public instant messaging networks aol microsoft yahoo time-sensitive communications ensuring administrative controls place comply government regulations 2003 50 top 100 financial services firms worldwide needed comply securities exchange commission nasd record retention supervisory requirements using im auditor whilst others still questioning whether im place business networks actiance introduced first network appliance control use im enterprise 2004 capable preventing unauthorized im connections stopping peer-to-peer p2p filesharing sites kazaa grokster morpheus real time guardian rtg identified controlled access growing number applications traversed network without department ’ knowledge actiance continued add features rtg including support unified communication platforms microsoft office communications server ibm lotus sametime 2005 response growing threat worms spyware traversing im networks zero day defence system added 2008 actiance added new capabilities rtg ’ successor unified security gateway usg providing managers management security control 140 social networking sites 20,000 individual facebook widgets 400 web real-time applications making usg first secure web gateway combine content monitoring management security web 2.0 applications social networks instant messaging unified communications url filtering malware web antivirus protection 2010 saw another first actiance launched vantage imauditor ’ successor included stringent security compliance controls skype enterprise vantage provides granular security policy controls compliance features real time unified communications uc – providing management widest variety uc real time communications platforms including microsoft office communications server ibm lotus sametime public instant messaging platforms windows live skype web conferencing industry focused networks like reuters bloomberg yellowjacket later year include support microsoft lync server also 2010 actiance launched socialite enable security management compliance solution enterprises using social networks socialite provides granular control applications facebook linkedin twitter allows organisations comply regulatory compliance demanded organizations financial industry regulatory authority finra financial services authority available software-as-a-service deployment saas on-premises installation module usg socialite enable allows organizations control social media features communications users corporate network situated remotely january 2011 facetime communications announced changed name actiance following purchase facetime brand apple june 2011 actiance announced socialite engage new platform allows distributed teams share content engage clients prospects analyze impact content social media sites designed specifically enable investment insurance professionals distribute pre-approved content socialite engage enables organization manage social media secure compliant environment allowing users see glance content impact also leverages third party data sources internal systems data feeds highlights channels effective identifies potential sales leads
[ 8640, 4068, 488, 3323, 1467, 2558, 8735 ]
Test
11,117
7
Cloud-based_design_and_manufacturing:cloud-based design manufacturing cloud-based design manufacturing cbdm refers service-oriented networked product development model service consumers able configure products services reconfigure manufacturing systems infrastructure-as-a-service iaas platform-as-a-service paas hardware-as-a-service haas software-as-a-service saas adapted original cloud computing paradigm introduced realm computer-aided product development cloud-based design manufacturing gaining significant momentum attention academia industry cloud-based design manufacturing includes two aspects cloud-based design cloud-based manufacturing another related concept cloud manufacturing general popular cloud-based design cbd refers networked design model leverages cloud computing service-oriented architecture soa web 2.0 e.g. social network sites semantic web technologies support cloud-based engineering design services distributed collaborative environments cloud-based manufacturing cbm refers networked manufacturing model exploits on-demand access shared collection diversified distributed manufacturing resources form temporary reconfigurable production lines enhance efficiency reduce product lifecycle costs allow optimal resource allocation response variable-demand customer generated tasking enabling technologies cloud-based design manufacturing include cloud computing web 2.0 internet things iot service-oriented architecture soa term cloud-based design manufacturing cbdm initially coined dazhong wu david rosen dirk schaefer georgia tech 2012 purpose articulating new paradigm digital manufacturing design innovation distributed collaborative settings main objective cbdm reduce time cost associated maintaining information communication technology ict infrastructures design manufacturing enhancing digital manufacturing design innovation distributed collaborative environments adapting rapidly changing market demands 2014 research group also published worldwide first two books subjects cloud-based design manufacturing cbdm social product development spd springer edited dirk schaefer cbdm exhibits following key characteristics cbdm differs traditional collaborative distributed design manufacturing systems web-based systems agent-based systems number perspectives including 1 computing architecture 2 data storage 3 sourcing process 4 information communication technology infrastructure 5 business model 6 programming model 7 communication similar cloud computing cbdm services categorized four major deployment models public cloud private cloud hybrid cloud community cloud
[ 4194, 9797, 4107, 9932, 5202, 10452, 1048, 7802 ]
Train
11,118
2
Jean-Louis_Gassée:jean-louis gassée jean-louis gassée born march 1944 paris france business executive best known former executive apple computer worked 1981 1990 also founded inc. creators beos computer operating system leaving became chairman palmsource inc. november 2004 gassée worked six years hewlett-packard 1968 1974 responsible overseeing launching company ’ first desktop scientific computer development sales organization france promotion sales manager europe geneva switzerland 1974 1981 gassée served chief executive officer french affiliates data general exxon office systems 1981 gassée became director european operations apple computer 1985 learning steve jobs plan oust ceo john sculley memorial day weekend sculley china gassée preemptively informed board directors eventually led jobs resignation apple later sculley personally appointed gassée jobs old position head macintosh development gassée introduced several macintosh products on-stage late 1980s including macintosh portable 1989 also macintosh iifx product introductions often comical gassée less formal many executives wore tailored suits necessary often addressed employees wearing black lambskin leather jacket single diamond-stud earring idea licensing mac os companies use brought various members apple jean-louis refused give idea maintaining macintosh powerful computer present superior architectural roadmap future expansion computer although many companies interested use os equipment—they interested idea then-ceo made personal phone call sculley gassée would none idea licensing mac os shelved mid-80s gassée started skunkworks project create eventually became newton messagepad 1987 apple ceo john sculley published memoir odyssey hope inspiring excellence ordered hardback copy apple employee apple expense shortly afterward gassée ordered paperback copy fred brooks mythical man-month product-development employees hope inspiring good sense project management brooks gave lecture nearby de anza college room filled apple employees copies book told stories confirmed conclusions 1988 gassée became head apple advanced product development worldwide marketing rumors taking president apple sculley circling rumors concerning michael spindler also circulating one point 1990 number apple employees held demonstration marching around circles carrying signs lawn front one apple building petition apple management retain gassée usa today reporter saw demonstration asked employee employee well aware apple rules divulging trade secrets press succinctly explained issues next day usa today reported apple employees many wearing black leather jackets berets honor gassée demonstrated persuade management keep apple fact person wearing leather jacket brown goatskin a-2 beret person asked explain purpose demonstration 1989 gassée successfully killed claris project 'drama aimed start new brand sell low-end macintosh computers gassée argued consumers would continue willing pay price premium full macintosh experience despite gassée efforts supporters 1990 left apple forced sculley apple board members dissatisfied performance delivering new products spindler got top job 1991 gassée started new venture inc. ambitious goal creating entire new computer platform hardware software ground number apple employees left including steve sakoman developer apple newton developed new operating system optimized multiple cpus multithreaded applications became known simply operating system beos beos written dual-processor machine bebox later development releases beos ported run macintosh macintosh clone makers including power computing motorola signed deals ship beos hardware os finalized light stopped production bebox selling around 2000 units focused entirely development beos 1996 apple computer decided abandon copland project rewrite modernize macintosh operating system beos many features apple sought around christmas time offered buy 120 million later raising bid 200 million however despite estimates total worth approximately 80 million gassée held 275 million apple balked surprise move apple went purchase next company former co-founder steve jobs earlier left apple found 429 million high price justified apple getting jobs next engineers tow nextstep used basis new operating system mac os x return jobs apple withdrew license make macintosh clones intel assistance beos moved plan b port x86 platform arguably never grew past cult following sold enough copies nascent development user community several thousand programs available including several dozen commercial products beos also used embedded operating system multimedia production systems edirol teac level control systems however partially due behind-the-scenes pressure microsoft successful getting top-tier oems bundle beos hardware hitachi ast major europe time gassée saw fundamental success end 1999 focus shift giving desktop os away free commercial distributions sold third-party vendors similar linux distributions focus beia build beos specifically targeted internet appliances company lost several employees disagreed strategy desire work appliance os vendor interest beia least one shipping product based sony evilla market internet appliances proved nearly non-existent laid employees 2001 assets remaining engineers bought palm inc. 11 million august gassée stayed transition left january 2002 leaving gassée served president ceo computer access technology corporation catc company made network protocol analyzers left within year catc purchased fall 2004 lecroy corporation competitor gassée resurfaced general partner allegis capital venture capital fund based palo alto california still position november 2004 gassée became chairman palmsource inc. several former executives engineers still worked beos technology worked use palm os cobalt version 6 february 2006 major customers—including palm inc. itself—who committed using cobalt release march 2006 started writing blog french called le blog de jean-louis gassée english jean-louis gassée blog blog active month contains four entries seen google tech talk february 2007 2009 started contributing regularly monday note blog newsletter covering intersection media technology 2010 gassée says asked nokia consult future company suggested nokia fire ceo olli-pekka kallasvuo drop symbian operating system favour google android february 2019 gassée member medium
[ 11649, 4741, 5384, 9999, 10386, 6807, 6554, 4251, 9123, 1576, 7983, 9778, 4665, 1339, 10691, 6234, 2282, 1389, 1776, 6258, 10871, 7806, 511 ]
None
11,119
4
Chosen-plaintext_attack:chosen-plaintext attack chosen-plaintext attack cpa attack model cryptanalysis presumes attacker obtain ciphertexts arbitrary plaintexts goal attack gain information reduces security encryption scheme modern ciphers aim provide semantic security also known ciphertext indistinguishability chosen-plaintext attack therefore design generally immune chosen-plaintext attacks correctly implemented chosen-plaintext attack adversary possibly adaptively ask ciphertexts arbitrary plaintext messages formalized allowing adversary interact encryption oracle viewed black box attacker ’ goal reveal part secret encryption key may seem infeasible practice attacker could obtain ciphertexts given plaintexts however modern cryptography implemented software hardware used diverse range applications many cases chosen-plaintext attack often feasible see also practice chosen-plaintext attacks become extremely important context public key cryptography encryption key public attackers encrypt plaintext choose two forms chosen-plaintext attacks general batch chosen-plaintext attack carried follows consider following extension situation last step cipher indistinguishable encryptions chosen-plaintext attack running experiment =1 adversary ca n't guess correctly probability non-negligibly better 1/2 following examples demonstrate ciphers meet security definitions may broken chosen-plaintext attack following attack caesar cipher allows full recovery secret key intricate complex encryption methodologies decryption method becomes resource-intensive however core concept still relatively following attack one-time pad allows full recovery secret key suppose message length key length equal world war ii us navy cryptanalysts discovered japan planning attack location referred af believed af might midway island locations hawaiian islands codewords began prove hypothesis af corresponded midway island asked us forces midway send plaintext message low supplies japanese intercepted message immediately reported superiors af low water confirming navy hypothesis allowing position force win battle also world war ii allied codebreakers bletchley park would sometimes ask royal air force lay mines position n't abbreviations alternatives german naval system grid reference hope germans seeing mines would use enigma machine encrypt warning message mines clear message removed giving allies enough information message break german naval enigma process planting known-plaintext called gardening allied codebreakers also helped craft messages sent double agent juan pujol garcía whose encrypted radio reports received madrid manually decrypted re-encrypted enigma machine transmission berlin helped codebreakers decrypt code used second leg supplied original text modern day chosen-plaintext attacks cpas often used break symmetric ciphers considered cpa-secure symmetric cipher must vulnerable chosen-plaintext attacks thus important symmetric cipher implementors understand attacker would attempt break cipher make relevant improvements chosen-plaintext attacks small part plaintext may need chosen attacker attacks known plaintext injection attacks chosen-plaintext attack powerful known-plaintext attack attacker directly target specific terms patterns without wait appear naturally allowing faster gathering data relevant cryptanalysis therefore cipher prevents chosen-plaintext attacks also secure known-plaintext ciphertext-only attacks however chosen-plaintext attack less powerful chosen-ciphertext attack attacker obtain plaintexts arbitrary ciphertexts cca-attacker sometimes break cpa-secure system example el gamal cipher secure chosen plaintext attacks vulnerable chosen ciphertext attacks unconditionally malleable
[ 9058, 9156, 1797, 11241, 618, 3084, 2957, 177, 4497, 5107, 11185, 1941, 7161, 3707, 8286, 895 ]
Test
11,120
8
Scuttle_(software):scuttle software scuttle php/mysql-based open source social bookmarking application contains code php-based projects drupal jquery scuttle offers functionality social bookmarking websites tagging rss multiple languages security settings public private also supports bookmark imports delicious delicious api means programs widgets might also work backups available via xml mysql backend lacks administrator backend although one commercially available called scuttle plus advanced semantic scuttle provides anti-spam protection structured tags collaborative tag description
[ 546, 8644, 5612, 7022, 7983, 479 ]
Test
11,121
2
WinLinux:winlinux winlinux linux distribution installer runs inside windows operating system also configuration tool run inside windows set hardware options linux os installed directory existing fat32 partition means ability share windows partition disk space latest version winlinux 2003 launched like windows application shortcut causes pc reboot winlinux exiting winlinux allow pc go back windows next bootup able run linux applications ships kde default desktop distribution currently inactive
[ 8837, 7435, 6797, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 5721, 9693, 2914, 485, 3685, 9064, 1513, 4841, 6890, 7020, 7913, 7534, 2671, 7920, 8177, ...
Validation
11,122
4
Interest_Flooding_Attack:interest flooding attack interest flooding attack ifa denial-of-service attack information-centric network content-centric networking ccn named data networking ndn attacker requests existing non-existing content order overload distribution infrastructure implemented sending interest packets resolved resolved fast enough thus lead malicious cpu memory consumption attack previously denoted open problem icn heuristic countermeasures available 2016 aubrey alston tamer refaei mitre corporation presented exact solution problem utilizes in-packet cryptographic mechanism remove ability high-volume interest traffic overload distribution infrastructure network
[ 2409, 5890 ]
Test
11,123
3
Exec_(Amiga):exec amiga exec kernel amigaos 13 kb multitasking microkernel enabled pre-emptive multitasking little 256 kb memory supplied first amiga 1000s exec provided functions multitasking memory management handling interrupts dynamic shared libraries acts scheduler tasks running system providing pre-emptive multitasking prioritized round-robin scheduling exec also provides access libraries high-level inter-process communication via message passing comparable microkernels performance problems need copy messages address spaces since amiga one address space exec message passing quite efficient fixed memory address amiga software address 4 pointer codice_1 used access libraries exec designed implemented carl sassenrath unlike newer modern operating systems exec kernel run privileged contemporary operating systems 68000 atari tos sunos used trap instructions invoke kernel functions made kernel functions run 68000 supervisor mode user software ran unprivileged user mode contrast exec function calls made library jump table kernel code normally executes user mode whenever supervisor mode needed either kernel user programs library functions codice_2 codice_3 used one limit exec kernel uncooperative program could disable multitasking long time indefinitely invoking exec calls codice_4 codice_5 later invocation corresponding codice_6 codice_7 causing environment run one task multitasking could also disabled programs software bug intent modify exec data structures code stored random-access memory ram possibly due lack memory management unit mmu support even limits exec satisfies definition preemptive scheduling algorithm using preemptive scheduling routine basing interrupt intervals clock linux kernel developer linus torvalds described amiga design cooperative even though uses preemptive scheduling policy reason argued lack memory protection tasks meant task could hinder system operating preemptively tasks would need choose stop preemptive mechanism would reduce kind inverted cooperative system kind conflation protection scheduler policy nonstandard execsg second generation kernel used amigaos 4 kernel licensed hyperion entertainment thomas frieden hans-jörg frieden exposes functions structures commodore amiga exec kernel runs powerpc cpus ultimate origin execsg unspecified
[ 7561, 139, 5264, 2193, 8976, 7187, 9236, 3350, 6300, 3233, 9249, 5029, 2345, 8618, 11180, 6062, 7983, 432, 8369, 8115, 5049, 58, 6075, 10813, 10176, 10436, 11076, 2761, 10570, 9931, 5709, 1742, 2383, 6352, 5457, 850, 4564, 5976, 6233, 917...
Test
11,124
0
TERMIUM_Plus:termium plus termium plus electronic terminological database operated maintained translation bureau government canada database offers millions english french terms various specialized fields terms spanish portuguese also available multilingual database termium plus initially developed université de montréal october 1970 database initially named banque de terminologie de l ’ université de montréal btum direction marcel paré vision produce flexible bilingual language file would available btum initially funded private donors government subsidies grew help professionals field translation following years 1975 btum able obtain data user responses collaboration language services bell canada end 1974 however translation bureau canadian secretary state department showed interest operation btum goal translation bureau time standardize terminology throughout public service well federal public administration january 1976 canadian secretary state department officially acquired btum renamed database termium terminologie université de montréal system transferred central computer federal government ottawa began integrate approximately 175,000 files btum initially compiled files translation bureau working years follow bureau began sorting process along input process onto computer database grew 900,000 records 1987 terminological records grew termium database canadian government received proposal 1985 toronto-based company launch termium cd-rom format order make database accessible users fall 1987 pilot project cd-rom launched investigate responses users included services translation bureau private canadian companies data compilation investigation bureau incorporated indexing system improve speed accuracy term extraction 1990 termium cd-rom commercially available subscription annual fee 1,100 1,500 updates released every three four months 1996 termium cd-rom received award atio association translators interpreters ontario october 2009 termium plus array language tools language portal canada launched free online access termium initially developed contain terminological records canada ’ official languages english french system upgraded third-generation version 1985 contained records languages spanish order accommodate growing range users worth noting however “ multilingual ” records term source language would english french equivalent non-official language currently vast collection specialized domains fields covered termium plus ranging administration including appellations arts sciences law justice aside millions entries recorded termium plus database also contains writing tools english french language canadian style writing style guide dictionnaire des cooccurrences guide french collocations archived glossaries well link language portal canada containing various french english writing resources
[]
Test
11,125
9
Verilog:verilog verilog standardized ieee 1364 hardware description language hdl used model electronic systems commonly used design verification digital circuits register-transfer level abstraction also used verification analog circuits mixed-signal circuits well design genetic circuits 2009 verilog standard ieee 1364-2005 merged systemverilog standard creating ieee standard 1800-2009 since verilog officially part systemverilog language current version ieee standard 1800-2017 hardware description languages verilog similar software programming languages include ways describing propagation time signal strengths sensitivity two types assignment operators blocking assignment non-blocking assignment non-blocking assignment allows designers describe state-machine update without needing declare use temporary storage variables since concepts part verilog language semantics designers could quickly write descriptions large circuits relatively compact concise form time verilog introduction 1984 verilog represented tremendous productivity improvement circuit designers already using graphical schematic capture software specially written software programs document simulate electronic circuits designers verilog wanted language syntax similar c programming language already widely used engineering software development like c verilog case-sensitive basic preprocessor though less sophisticated ansi c/c++ control flow keywords if/else case etc equivalent operator precedence compatible c. syntactic differences include required bit-widths variable declarations demarcation procedural blocks verilog uses begin/end instead curly braces many minor differences verilog requires variables given definite size c sizes assumed 'type variable instance integer type may 8 bits verilog design consists hierarchy modules modules encapsulate design hierarchy communicate modules set declared input output bidirectional ports internally module contain combination following net/variable declarations wire reg integer etc concurrent sequential statement blocks instances modules sub-hierarchies sequential statements placed inside begin/end block executed sequential order within block however blocks executed concurrently making verilog dataflow language verilog concept 'wire consists signal values 4-state 1 0 floating undefined signal strengths strong weak etc. system allows abstract modeling shared signal lines multiple sources drive common net wire multiple drivers wire readable value resolved function source drivers strengths subset statements verilog language synthesizable verilog modules conform synthesizable coding style known rtl register-transfer level physically realized synthesis software synthesis software algorithmically transforms abstract verilog source netlist logically equivalent description consisting elementary logic primitives flip-flops etc available specific fpga vlsi technology manipulations netlist ultimately lead circuit fabrication blueprint photo mask set asic bitstream file fpga verilog one first popular hardware description languages invented created prabhu goel phil moorby chi-lai huang douglas warmke late 1983 early 1984 chi-lai huang earlier worked hardware description lalsd language developed professor s.y.h su phd work wording process automated integrated design systems later renamed gateway design automation 1985 hardware modeling language gateway design automation purchased cadence design systems 1990 cadence full proprietary rights gateway verilog verilog-xl hdl-simulator would become de facto standard verilog logic simulators next decade originally verilog intended describe allow simulation automated synthesis subsets language physically realizable structures gates etc developed language achieved widespread usage verilog portmanteau words verification logic increasing success vhdl time cadence decided make language available open standardization cadence transferred verilog public domain open verilog international ovi known accellera organization verilog later submitted ieee became ieee standard 1364-1995 commonly referred verilog-95 time frame cadence initiated creation verilog-a put standards support behind analog simulator spectre verilog-a never intended standalone language subset verilog-ams encompassed verilog-95 extensions verilog-95 submitted back ieee cover deficiencies users found original verilog standard extensions became ieee standard 1364-2001 known verilog-2001 verilog-2001 significant upgrade verilog-95 first adds explicit support 2 complement signed nets variables previously code authors perform signed operations using awkward bit-level manipulations example carry-out bit simple 8-bit addition required explicit description boolean algebra determine correct value function verilog-2001 succinctly described one built-in operators » generate/endgenerate construct similar vhdl generate/endgenerate allows verilog-2001 control instance statement instantiation normal decision operators case/if/else using generate/endgenerate verilog-2001 instantiate array instances control connectivity individual instances file i/o improved several new system tasks finally syntax additions introduced improve code readability e.g always named parameter override c-style function/task/module header declaration verilog-2001 version verilog supported majority commercial eda software packages confused systemverilog verilog 2005 ieee standard 1364-2005 consists minor corrections spec clarifications new language features uwire keyword separate part verilog standard verilog-ams attempts integrate analog mixed signal modeling traditional verilog advent hardware verification languages openvera verisity e language encouraged development superlog co-design automation inc acquired synopsys foundations superlog vera donated accellera later became ieee standard p1800-2005 systemverilog systemverilog superset verilog-2005 many new features capabilities aid design verification design modeling 2009 systemverilog verilog language standards merged systemverilog 2009 ieee standard 1800-2009 current version ieee standard 1800-2017 simple example two flip-flops follows operator verilog another aspect hardware description language opposed normal procedural language known non-blocking assignment action register always block executed means order assignments irrelevant produce result flop1 flop2 swap values every clock assignment operator referred blocking assignment assignment used purposes logic target variable updated immediately example statements used blocking operator instead flop1 flop2 would swapped instead traditional programming compiler would understand simply set flop1 equal flop2 subsequently ignore redundant logic set flop2 equal flop1 example counter circuit follows example delays always clause illustrates type method use i.e executes whenever entities list b e changes one changes immediately assigned new value due blocking assignment b assigned new value afterward taking account new value delay 5 time units c assigned value b value c e tucked away invisible store 6 time units assigned value tucked away signals driven within process initial always block must type reg signals driven outside process must type wire keyword reg necessarily imply hardware register definition constants verilog supports addition width parameter basic syntax width bits base letter number examples several statements verilog analog real hardware e.g display consequently much language used describe hardware examples presented classic subset language direct mapping real gates next interesting structure transparent latch pass input output gate signal set pass-through captures input stores upon transition gate signal hold output remain stable regardless input signal gate set hold example pass-through level gate would value clause true i.e gate 1 read gate true din fed latch_out continuously clause false last value latch_out remain independent value din flip-flop next significant template verilog d-flop simplest modeled significant thing notice example use non-blocking assignment basic rule thumb use posedge negedge statement within always clause variant d-flop one asynchronous reset convention reset state first clause within statement next variant including asynchronous reset asynchronous set condition convention comes play i.e reset term followed set term note model used model set/reset flip flop simulation errors result consider following test sequence events 1 reset goes high 2 clk goes high 3 set goes high 4 clk goes high 5 reset goes low followed 6 set going low assume setup hold violations example always statement would first execute rising edge reset occurs would place q value 0 next time always block executes would rising edge clk would keep q value 0 always block executes set goes high reset high forces q remain 0 condition may may correct depending actual flip flop however main problem model notice reset goes low set still high real flip flop cause output go 1 however model occur always block triggered rising edges set reset — levels different approach may necessary set/reset flip flops final basic variant one implements d-flop mux feeding input mux d-input feedback flop allows gated load function note initial blocks mentioned description split fpga asic synthesis tools structure fpga tools allow initial blocks reg values established instead using reset signal asic synthesis tools n't support statement reason fpga initial state something downloaded memory tables fpga asic actual hardware implementation two separate ways declaring verilog process always initial keywords always keyword indicates free-running process initial keyword indicates process executes exactly constructs begin execution simulator time 0 execute end block always block reached end rescheduled common misconception believe initial block execute always block fact better think initial-block special-case always-block one terminates completes first time classic uses two keywords two significant additional uses common always keyword without ... sensitivity list possible use always shown always keyword acts similar c language construct 1 .. sense execute forever interesting exception use initial keyword addition forever keyword example functionally identical always example fork/join pair used verilog create parallel processes statements blocks fork/join pair begin execution simultaneously upon execution flow hitting fork execution continues join upon completion longest running statement block fork join way written possible either sequences abc bac print order simulation first write second write depends simulator implementation may purposefully randomized simulator allows simulation contain accidental race conditions well intentional non-deterministic behavior notice vhdl dynamically spawn multiple processes like verilog order execution n't always guaranteed within verilog best illustrated classic example consider code snippet printed values b depending order execution initial blocks could zero zero alternately zero arbitrary uninitialized value display statement always execute assignment blocks completed due 1 delay note operators shown order precedence ieee 1364 standard defines four-valued logic four states 0 1 z high impedance x unknown logic value competing vhdl dedicated standard multi-valued logic exists ieee 1164 nine levels system tasks available handle simple i/o various design measurement functions simulation system tasks prefixed distinguish user tasks functions section presents short list frequently used tasks means comprehensive list pli provides programmer mechanism transfer control verilog program function written c language officially deprecated ieee std 1364-2005 favor newer verilog procedural interface completely replaces pli pli vpi enables verilog cooperate programs written c language test harnesses instruction set simulators microcontroller debuggers example provides c functions codice_1 codice_2 used write read argument current verilog task function respectively information verilog simulators see list verilog simulators
[ 9345, 7170, 8450, 8708, 7045, 9090, 5768, 5896, 7049, 7819, 398, 2450, 659, 5270, 5786, 1051, 9371, 8863, 4773, 10789, 5671, 682, 6187, 4396, 1917, 3886, 7471, 2224, 6904, 434, 3762, 692, 11321, 6716, 8508, 2623, 5439, 3010, 3780, 11333, ...
Test
11,126
5
DICOM:dicom digital imaging communications medicine dicom standard communication management medical imaging information related data dicom commonly used storing transmitting medical images enabling integration medical imaging devices scanners servers workstations printers network hardware picture archiving communication systems pacs multiple manufacturers widely adopted hospitals making inroads smaller applications like dentists doctors offices dicom files exchanged two entities capable receiving image patient data dicom format different devices come dicom conformance statements clearly state dicom classes support standard includes file format definition network communications protocol uses tcp/ip communicate systems national electrical manufacturers association nema holds copyright published standard developed dicom standards committee whose members also partly members nema also known nema standard ps3 iso standard 12052:2017 health informatics -- digital imaging communication medicine dicom including workflow data management dicom used worldwide store exchange transmit medical images dicom central development modern radiological imaging dicom incorporates standards imaging modalities radiography ultrasonography computed tomography ct magnetic resonance imaging mri radiation therapy dicom includes protocols image exchange e.g. via portable media dvds image compression 3-d visualization image presentation results reporting dicom standard divided related independent parts dicom standard developed american college radiology acr national electrical manufacturers association nema beginning 1980s difficult anyone manufacturers computed tomography magnetic resonance imaging devices decode images machines generated radiologists medical physicists wanted use images dose-planning radiation therapy acr nema joined forces formed standard committee 1983 first standard acr/nema 300 entitled digital imaging communications released 1985 soon release became clear improvements needed text vague internal contradictions 1988 second version released version gained acceptance among vendors image transmission specified dedicated 2 pair cable eia-485 first demonstration acr/nema v2.0 interconnectivity technology held georgetown university may 21–23 1990 six companies participated event dejarnette research systems general electric medical systems merge technologies siemens medical systems vortech acquired kodak year 3m commercial equipment supporting acr/nema 2.0 presented annual meeting radiological society north america rsna 1990 vendors many soon realized second version also needed improvement several extensions acr/nema 2.0 created like papyrus developed university hospital geneva switzerland spi standard product interconnect driven siemens medical systems philips medical systems first large-scale deployment acr/nema technology made 1992 us army air force part mdis medical diagnostic imaging support program based ft. detrick maryland loral aerospace siemens medical systems led consortium companies deploying first us military pacs picture archiving communications system major army air force medical treatment facilities teleradiology nodes large number us military clinics dejarnette research systems merge technologies provided modality gateway interfaces third party imaging modalities siemens spi network veterans administration navy also purchased systems contract 1993 third version standard released name changed digital imaging communications medicine abbreviated dicom new service classes defined network support added conformance statement introduced initially dicom standard referred dicom 3.0 distinguish predecessors dicom constantly updated extended since 1993 intent changes backward compatible except rare cases earlier specification incorrect ambiguous officially version standard except current standard hence 3.0 version number longer used minor versions standard e.g. thing dicom 3.1 current plans develop new incompatible version standard i.e. dicom 4.0 standard referenced without specification date release particular published edition except specific conformance requirements invoked depend retired feature longer documented current standard dicom standard achieved near universal level acceptance amongst medical imaging equipment vendors healthcare organizations standard limitations dicom standard directed addressing technical interoperability issues medical imaging framework architecture achieving useful clinical workflow integrating healthcare enterprise ihe initiative layered top dicom hl-7 defines profiles select features standards implement transactions specific medical imaging interoperability use cases though always internet compatible based transport tcp time increasing need support port 80 http transport make use easier within web browser recently family dicom restful web services defined allow mobile device friendly access dicom objects services include wado-rs stow-rs qido-rs together constitute dicomweb initiative derivations dicom standard application areas include diconde digital imaging communication nondestructive evaluation established 2004 way nondestructive testing manufacturers users share image data dicos digital imaging communication security established 2009 used image sharing airport security dicom groups information data sets example file chest x-ray image may contain patient id within file image never separated information mistake similar way image formats jpeg also embedded tags identify otherwise describe image dicom data object consists number attributes including items name id etc. also one special attribute containing image pixel data i.e logically main object header merely list attributes including pixel data single dicom object one attribute containing pixel data many modalities corresponds single image however attribute may contain multiple frames allowing storage cine loops multi-frame data another example nm data nm image definition multi-dimensional multi-frame image cases three- four-dimensional data encapsulated single dicom object pixel data compressed using variety standards including jpeg lossless jpeg jpeg 2000 run-length encoding rle lzw zip compression used whole data set pixel data rarely implemented dicom uses three different data element encoding schemes explicit value representation vr data elements vrs ob ow sq ut un format data element group 2 bytes element 2 bytes vr 2 bytes lengthinbyte 2 bytes data variable length explicit data elements implicit data elements see section 7.1 part 5 dicom standard basic format used applications including network file usage written file usually true header containing copies key attributes details application wrote added promote identical grayscale image display different monitors consistent hard-copy images various printers dicom committee developed lookup table display digitally assigned pixel values use dicom grayscale standard display function gsdf images must viewed printed devices lookup curve devices calibrated gsdf curve addition value representation attribute also value multiplicity indicate number data elements contained attribute character string value representations one data element encoded successive data elements separated backslash character dicom consists services involve transmission data network file format offline media later addition standard dicom store service used send images persistent objects structured reports etc picture archiving communication system pacs workstation dicom storage commitment service used confirm image permanently stored device either redundant disks backup media e.g burnt cd service class user scu similar client modality workstation etc. uses confirmation service class provider scp similar server archive station instance make sure safe delete images locally enables workstation find lists images objects retrieve picture archiving communication system dicom modality worklist service provides list imaging procedures scheduled performance image acquisition device sometimes referred modality system items worklist include relevant details subject procedure patient id name sex age type procedure equipment type procedure description procedure code procedure order referring physician accession number reason exam image acquisition device ct scanner queries service provider ris get information presented system operator used imaging device populate details image metadata prior use dicom modality worklist service scanner operator required manually enter relevant details manual entry slower introduces risk misspelled patient names data entry errors complementary service modality worklist enables modality send report performed examination including data images acquired beginning time end time duration study dose delivered etc helps give radiology department precise handle resource acquisition station use also known mpps service allows modality better coordinate image storage servers giving server list objects send actually sending objects dicom print service used send images dicom printer normally print x-ray film standard calibration defined dicom part 14 help ensure consistency various display devices including hard copy printout format off-line media files specified part 10 dicom standard files sometimes referred part 10 files dicom restricts filenames dicom media 8 characters systems wrongly use 8.3 conform standard information must extracted names ps3.10 section 6.2.3.2 common source problems media created developers read specifications carefully historical requirement maintain compatibility older existing systems also mandates presence media directory dicomdir file provides index summary information dicom files media dicomdir information provides substantially greater information file filename could less need meaningful file names dicom files typically .dcm file extension part dicom media requires without extension mime type dicom files defined rfc 3240 application/dicom uniform type identifier type dicom files org.nema.dicom also ongoing media exchange test connectathon process cd media network operation organized ihe organization core application dicom standard capture store distribute medical images standard also provides services related imaging managing imaging procedure worklists printing images film digital media like dvds reporting procedure status like completion imaging acquisition confirming successful archiving images encrypting datasets removing patient identifying information datasets organizing layouts images review saving image manipulations annotations calibrating image displays encoding ecgs encoding cad results encoding structured measurement data storing acquisition protocols dicom information object definitions encode data produced wide variety imaging device types including ct computed tomography mri magnetic resonance imaging ultrasound x-ray fluoroscopy angiography mammography breast tomosynthesis pet positron emission tomography spect single photon emission computed tomography endoscopy microscopy whole slide imaging oct optical coherence tomography dicom also implemented devices associated images imaging workflow including pacs picture archiving communication systems image viewers display stations cad computer-aided detection/diagnosis systems 3d visualization systems clinical analysis applications image printers film scanners media burners export dicom files onto cds dvds etc media importers import dicom files cds dvds usbs etc ris radiology information systems vna vendor-neutral archives emr electronic medical record systems radiology reporting systems many fields medicine dedicated working group within dicom dicom applicable field medicine imaging prevalent including radiology cardiology oncology nuclear medicine radiotherapy neurology orthopedics obstetrics gynecology ophthalmology dentistry maxillofacial surgery dermatology pathology clinical trials veterinary medicine medical/clinical photography dicom reserved following tcp udp port numbers internet assigned numbers authority iana 104 well-known port dicom transmission control protocol tcp user datagram protocol udp since 104 reserved subset many operating systems require special privileges use 2761 registered port dicom using integrated secure communication layer iscl tcp udp 2762 registered port dicom using transport layer security tls tcp udp 11112 registered port dicom using standard open communication tcp udp standard recommends require use port numbers according paper presented international symposium 2008 dicom standard problems related data entry major disadvantage dicom standard possibility entering probably many optional fields disadvantage mostly showing inconsistency filling fields data image objects often incomplete fields left blank filled incorrect data hand file format admits executable code maybe exists possibility contains malware dvtk open source project testing validating diagnosing communication protocols scenarios medical environments supports dicom hl7 ihe integration profiles health level 7 non-profit organization involved development international healthcare informatics interoperability standards hl7 dicom manage joint working group harmonize areas two standards overlap address imaging integration electronic medical record integrating healthcare enterprise ihe industry sponsored non-profit organization profiles use standards address specific healthcare use cases dicom incorporated variety imaging related ihe profiles systematized nomenclature medicine snomed systematic computer-processable collection medical terms human veterinary medicine provide codes terms synonyms definitions cover anatomy diseases findings procedures microorganisms substances etc dicom data makes use snomed encode relevant concepts xnview supports codice_1 codice_2 mime type codice_3
[ 8134, 10022, 296, 10924, 6797, 2222, 2990, 6993, 884, 11413, 11385, 6650, 7515, 4797, 7422 ]
Validation
11,127
6
Macfusion:macfusion macfusion open-source network file-system client based fuse curlftpfs sshfs 64-bit macintosh computers using 64-bit os macfusion needs instead old unmaintained macfuse one newer implementations fuse like osxfuse fuse4x
[ 7364, 7983, 6935 ]
Test
11,128
6
Xiafs:xiafs xiafs file system linux kernel conceived developed frank xia based minix file system today obsolete use except possibly historic installations linux originally used minix file system number limitations example length filenames limited 14 characters partition size limited 64 mb replace minix file system extended file system ext developed however ext retained problems poor performance lack date stamps two contenders replacing ext quickly developed ext2 xiafs two file systems included standard kernel december 1993 linux 0.99.15 ext2 xiafs goal offer good performance reasonable limitations fixing flaws ext initially xiafs stable ext2 fairly minimalistic modification minix file system well suited future extension end result xiafs changed little ext2 evolved considerably rapidly improving stability performance adding extensions ext2 shakedown time quickly became standard file system linux since ext2 developed mature robust file system xiafs original ext removed linux version 2.1.21 longer use maintained ext2 ext3 successor ext4 linux kernel exercise computer history file system tutorial xiafs ported modern linux 2013 xiafs less powerful offered less functionality ext2 maximum size file 64 mib maximum size partition 2 gib improvement ext measure ext2 xiafs used less disk space control structures greater stability time
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1...
Validation
11,129
3
SPARCstation_20:sparcstation 20 sparcstation 20 a.k.a ss20 codename kodiak discontinued sun microsystems workstation based supersparc hypersparc cpu last model sparcstation family sun pizza box computers superseded ultrasparc design 1995 sparcstation 20 dual 50 mhz mbus ports allow use faster cpus sparcstation 10 two dual-cpu modules updated firmware sparcstation 20 supports maximum 4 cpus fastest cpu produced sparcstation 20 200 mhz ross hypersparc prom sparcstation 20 determines cpu compatibility version 2.25r last prom release sparcstation 20 sparcstation 20 8 200-pin dsimm slots supports maximum 512 mb memory 64 mb modules memory modules sparcstation 20 compatible sparcstation 10 sun ultra 1 computers sun4m sun4u families physically incompatible simm slots found pc computers 2 8 simm slots wider others used non-memory peripherals like caching nvsimm video vsimm cards sparcstation 20 two internal sca bays external scsi connector two bays cd-rom floppy drives earlier revisions sparcstation20 case contain cd-rom floppy bays slightly shorter standard 3.5 bay regular devices intended pc compatible computers usually fit later revisions sparcstation20 sparcstation5 narrower slot floppy drive more-standard cd-rom fit scsi host controller integrated motherboard sparcstation 20 support ide devices limitation releases openboot prom sparcstation 20 prevents booting point disk past 2 gigabyte mark sparcstation 20 one integrated amd lance 10baset ethernet interface additional ethernet interfaces added sbus card sparcstation 20 built 13w3 video socket driven optional sx cg14 framebuffer built onto vsimm vsimm available 4mb 8mb capacity capable 1280x1024 8mb 1152x900 4mb 24-bit color two vsimms installed auxiliary video board must also installed provide second 13w3 video socket alternatively sbus cards used including zx leo turbo gx cg6 others sparcstation 20 integrated sound 4 standard 3.5 mm audio jacks headphones microphone line line sparcstation 20 uses battery-backed nvram module hold data system host id serial number mac address battery chip dies nvram module must replaced modified use external battery nvram must reprogrammed mac address host id optionally m48t08-100pc1 used sunos 4.1.3_u1b onwards solaris 2.3 9 linux debian gentoo suse 7.0 7.3 probably others miros bsd netbsd openbsd run sparcstation 20 certain cpu modules sun supersparc nextstep 3.3 openstep 4.x also run
[ 3328, 9731, 1801, 4235, 1809, 2710, 1818, 11426, 1316, 10789, 7594, 1707, 3247, 6322, 6333, 7104, 9665, 6338, 10436, 8007, 1480, 4172, 2895, 597, 10200, 4960, 9955, 11363, 11626, 7148, 7022, 5233, 6129, 7411, 8179, 9333, 1399, 9343 ]
Validation
11,130
3
Graphics_Core_Next:graphics core next graphics core next gcn codename series microarchitectures well instruction set gcn developed amd gpus successor terascale microarchitecture/instruction set first product featuring gcn launched january 9 2012 gcn risc simd rather simt microarchitecture contrasting vliw simd architecture terascale gcn requires considerably transistors terascale offers advantages gpgpu computation makes compiler simpler also lead better utilization gcn graphics chips fabricated cmos 28 nm finfet 14 nm samsung electronics globalfoundries 7 nm tsmc available selected models radeon hd 7000 hd 8000 200 300 400 500 vega series amd radeon graphics cards including separately released radeon vii gcn also used graphics portion amd accelerated processing units apu playstation 4 xbox one apus gcn instruction set owned amd also owns x86-64 instruction set gcn instruction set developed specifically gpus gpgpu example micro-operation division documentation available llvm code generator compiler back-end available gcn instruction set used mesa 3d miaow open-source rtl implementation amd southern islands gpgpu instruction set aka graphics core next november 2015 amd announced boltzmann initiative amd boltzmann initiative shall enable porting cuda-based applications common c++ programming model super computing 15 amd showed heterogeneous compute compiler hcc headless linux driver hsa runtime infrastructure cluster-class high performance computing hpc heterogeneous-compute interface portability hip tool porting cuda-based applications common c++ programming model july 2017 family microarchitectures implementing identically called instruction set graphics core next seen five iterations differences instruction set rather minimal differentiate much one another exception fifth generation gcn architecture heavily modified stream processors improve performance support simultaneous processing two lower precision numbers place single higher precision number graphics command processor gcp functional unit gcn microarchitecture among tasks responsible asynchronous shaders short video amd asynchronous shaders visualizes differences multi thread preemption asynchronous shaders asynchronous compute engine ace distinct functional block serving computing purposes purpose similar graphics command processor since third iteration gcn hardware contains two schedulers one schedule wavefronts shader execution cu scheduler see new one schedule execution draw compute queues latter helps performance executing compute operations cus underutilized graphics commands limited fixed function pipeline speed bandwidth limited functionality known async compute given shader gpu drivers also need select good instruction order order minimize latency done cpu sometimes referred scheduling geometry processor contains geometry assembler tesselator vertex assembler gcn tesselator geometry processor capable tessellation hardware defined direct3d 11 opengl 4.5 see amd january 21 2017 gcn tesselator amd current sip block earlier units ati truform hardware tessellation terascale one compute unit combines 64 shader processors 4 tmus compute unit separate feed render output units rops compute unit consists cu scheduler branch message unit 4 simd vector units 16-lane wide 4 64kib vgpr files 1 scalar unit 4 kib gpr file local data share 64 kib 4 texture filter units 16 texture fetch load/store units 16 kib l1 cache four compute units wired share instruction cache 16 kib size scalar data cache 32kib size backed l2 cache simd-vu operates 16 elements time per cycle su operate one time one/cycle addition su handles operations like branching every simd-vu private memory stores registers two types registers scalar registers s0 s1 etc hold 4 bytes number vector registers v0 v1 etc represent set 64 4 bytes numbers operate vector registers every operation done parallel 64 numbers every time work actually work 64 inputs example work 64 different pixels time inputs slightly different thus get slightly different color end every simd-vu room 512 scalar registers 256 vector registers cu scheduler hardware functional block choosing simd-vu wavefronts execute picks one simd-vu per cycle scheduling confused schedulers hardware software gcn-gpus “ wavefront ” consists 64 threads nvidia gpus “ warp ” consists 32 threads amd solution attribute multiple wavefronts simd-vu hardware distributes registers different wavefronts one wavefront waiting result lies memory cu scheduler decides make simd-vu work another wavefront wavefronts attributed per simd-vu simd-vus exchange wavefronts max 10 wavefronts attributed per simd-vu thus 40 per cu amd codexl shows tables relationship number sgprs vgprs number wavefronts basically sgprs min 104 512/numwavefronts vgprs 256/numwavefronts note conjunction sse instructions concept basic level parallelism often called vector width vector width characterized total number bits simd vector unit simd-vu 10 wavefront instruction buffer takes 4 cycles execute one wavefront many implementations gcn typically accompanied several amd asic blocks including limited unified video decoder video coding engine amd trueaudio preview 2011 anandtech wrote unified virtual memory supported graphics core next specific hsa features implemented hardware need support operating system kernel subsystems and/or specific device drivers example july 2014 amd published set 83 patches merged linux kernel mainline 3.17 supporting graphics core next-based radeon graphics cards special driver titled hsa kernel driver resides directory /drivers/gpu/hsa drm-graphics device drivers reside /drivers/gpu/drm augments already existent drm driver radeon cards first implementation focuses single works alongside existing radeon kernel graphics driver kgd used perform scheduling offload assignment compute queues aces driver hardware buffering queues least one empty queue least one ace causing hws immediately assign buffered queues aces queues full queues safely assign part scheduling work performed includes prioritized queues allow critical tasks run higher priority tasks without requiring lower priority tasks preempted run high priority task therefore allowing tasks run concurrently high priority tasks scheduled hog gpu much possible letting tasks use resources high priority tasks using essentially asynchronous compute engines lack dispatch controllers first introduced fourth generation gcn microarchitecture present third generation gcn microarchitecture internal testing purposes driver update enabled hardware schedulers third generation gcn parts production use unit discards degenerate triangles enter vertex shader triangles cover fragments enter fragment shader unit introduced fourth generation gcn microarchitecture asynchronous compute engines controlling computation dispatching zerocore power long idle power saving technology shutting functional units gpu use amd zerocore power technology supplements amd powertune discrete gpus southern islands family gcn 2nd generation introduced radeon hd 7790 also found radeon hd 8770 r7 260/260x r9 290/290x r9 295x2 r7 360 r9 390/390x well steamroller-based desktop kaveri apus mobile kaveri apus puma-based beema mullins apus multiple advantages original gcn including freesync support amd trueaudio revised version amd powertune technology gcn 2nd generation introduced entity called shader engine se shader engine comprises one geometry processor 44 cus hawaii chip rasterizers rops l1 cache part shader engine graphics command processor 8 aces l2 cache memory controllers well audio video accelerators display controllers 2 dma controllers pcie interface a10-7850k kaveri contains 8 cus compute units 8 asynchronous compute engines independent scheduling work item dispatching amd developer summit apu november 2013 michael mantor presented radeon r9 290x discrete gpus sea islands family integrated apus gcn 3rd generation introduced 2014 radeon r9 285 r9 m295x tonga gpu features improved tessellation performance lossless delta color compression order reduce memory bandwidth usage updated efficient instruction set new high quality scaler video new multimedia engine video encoder/decoder delta color compression supported mesa however double precision performance worse compared previous generation discrete gpus integrated apus gpus arctic islands-family introduced q2 2016 amd radeon 400 series 3d-engine i.e gca graphics compute array gfx identical found tonga-chips polaris feature newer display controller engine uvd version 6.3 etc polaris-based chips polaris 30 produced 14 nm finfet process developed samsung electronics licensed globalfoundries slightly newer refreshed polaris 30 built 12 nm lp finfet process node developed samsung globalfoundries fourth generation gcn instruction set architecture compatible third generation optimization 14 nm finfet process enabling higher gpu clock speeds 3rd gcn generation architectural improvements include new hardware schedulers new primitive discard accelerator new display controller updated uvd decode hevc 4k resolutions 60 frames per second 10 bits per color channel discrete gpus fp64 performance gcn 4th generation gpus fp32 performance amd began releasing details next generation gcn architecture termed 'next-generation compute unit january 2017 new design expected increase instructions per clock higher clock speeds support hbm2 larger memory address space discrete graphics chipsets also include hbcc high bandwidth cache controller integrated apus additionally new chips expected include improvements rasterisation render output units stream processors heavily modified previous generations support packed math rapid pack math technology 8-bit 16-bit 32-bit numbers significant performance advantage lower precision acceptable example processing two half-precision numbers rate single single precision number nvidia introduced tile-based rasterization binning maxwell big reason maxwell efficiency increase january anandtech assumed vega would finally catch nvidia regarding energy efficiency optimizations due new dsbr draw stream binning rasterizer introduced vega also added support new shader stage – primitive shaders primitive shaders provide flexible geometry processing replace vertex geometry shaders rendering pipeline december 2018 primitive shaders ca n't used required api changes yet done vega 10 vega 12 use 14 nm finfet process developed samsung electronics licensed globalfoundries vega 20 uses 7 nm finfet process developed tsmc discrete gpus integrated apus double-precision floating-point fp64 performance gcn 5th generation gpus except vega 20 fp32 performance vega 20 fp32 performance gcn 5th generation gpus support half-precision floating-point fp16 calculations double fp32 performance
[ 3586, 9475, 3204, 9092, 10375, 5645, 398, 10512, 9489, 7699, 3615, 2719, 2850, 6818, 9122, 10658, 9391, 11183, 6705, 9400, 8126, 6978, 8514, 1480, 3272, 11080, 2764, 9551, 7122, 9427, 10966, 344, 10971, 11485, 5598, 5859, 2277, 1510, 9707, ...
Test
11,131
2
Start_Input/Output:start input/output mvs/370 successor versions ibm mainframe operating systems start input/output startio macro instruction branch entry low-level device access programmer responsible providing list device-specific ccws channel program executed i/o channels control units devices number exits several may immediate returns input/output supervisor ios invokers startio must supervisor mode key 0 startio interfaces directly ios component mvs start input/output differs excp including xdap simply dasd-only subset excp excpvr following fundamental way start input/output low level facility supports e.g. selection channel paths selection exposures execute channel program high level facility supports e.g. ccw translation page fixing serialization related requests vio callers execute channel program must tcb mode ibm documents excpvr privileged unprivileged access method code uses sam-e processing dasd data sets except special cases application may use execute channel program data control block dcb opened made accessible application system open/close/end-of-volume supervisor services svcs 19 20 55 respectively callers startio must privileged must page fix storage areas related request must use global storage srb/iosb may refer device real ucb even device allocated address space device need opened startio initiation sequence usually referred front end may tcb mode srb mode startio termination sequence usually referred back end always srb mode startio always utilizes srb/iosb pair srb service request block utilized schedule processor activity required available processor connection related i/o request i/o request necessarily run processor caller running indeed cases iosb input/output supervisor block describes related i/o request passes parameters receives responses ios ios generally calls appendages enabled srb mode special cases calls appendage disabled interrupt exit die unit control block ucb device points device descriptor table ddt identified routines needed device dependent processing e.g. handling attention interrupts appending reserve ccws appending set file mask seek although use startio customers supported ibm nevertheless macro instruction associated branch entry remained remarkably stable throughout forty-year-long 2014 transition mvs/370 z/os startio sole method performing lowest-level physical i/o operations channel-attached devices mvs/370 subsequent instances os particular vsam vtam use startio course excp xdap excpvr certain instances ims/vs jes particularly channel-to-channel operations involved additional branch entry added es/390 performs essentially function original retained compatibility existing programs additional branch entry implicitly obtains address related tcb psatold rather explicitly obtaining tcb= keyword parameter original branch entry catastrophic error occur ios processing related i/o request tcb usually caller job step tcb abnormally terminated whichever tcb happened active error detected basic design ios run asynchronously tasks address spaces could tcb address space indeed tcb e.g. srb perhaps likely system wait task runs os master scheduler address space perhaps best description startio application white paper entitled start input/output interface mvs written peter haas amdahl corp subsequently liquidated haas white paper contained application program example illustrated required optional parameters exits employed startio interface detailed description excp vr startio available logic manual
[ 11656, 7312, 11024, 663, 7195, 7836, 4645, 7983, 10415, 4535, 2616, 8393, 10958, 8911, 3669, 10072, 8290, 868, 7272, 4586, 10094, 11381, 6647 ]
Test
11,132
9
Turing_(programming_language):turing programming language turing pascal-like programming language developed 1982 ric holt james cordy university toronto toronto ontario canada turing descendant euclid pascal sp/k features clean syntax precise machine-independent semantics turing 4.1.0 latest stable version turing turing 4.1.1 turing 4.1.2 allow stand alone .exe files created versions turing 4.1.0 outdated syntax outdated functions named british computer scientist alan turing turing used primarily teaching language high school university level two versions exist object-oriented turing turing plus systems programming variant september 2001 object oriented turing renamed turing original turing renamed classic turing turing longer supported holt software associates toronto ontario currently microsoft windows supported platform turing widely used high schools ontario introduction programming november 28 2007 turing previously commercial programming language became freeware available download developer website free charge personal commercial educational use. ref name= holtsoft/old_index /ref makers turing holt software associates since ceased operations turing seen development since november 25 2007 turing designed lightweight readable intuitive syntax entire hello world program turing syntax highlighting turing avoids semicolons braces using explicit end markers language constructs instead allows declarations anywhere complete program defining using traditional recursive function calculate factorial currently two open source alternative implementations turing open turing open source version original interpreter tplus native compiler concurrent systems programming language variant turing plus opent project develop compiler turing longer development open turing open-source implementation original turing interpreter windows written tristan hume includes speed improvements new features opengl 3d new code editor fully backwards compatible closed-source implementation tplus open-source implementation original non-object-oriented turing systems programming extensions developed university toronto ported linux solaris mac os x queen university late 1990s tplus implements turing+ turing plus concurrent systems programming language based original turing programming language features turing plus eventually subsumed present object-oriented turing language turing plus extends original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features opent abandoned open-source language compiler ide developed members dteam computer science canada shares many similarities turing fully backwards compatible addition usual graphics drawing functions turing features special functions drawing maple leaves allow easier drawing canadian flag turing+ turing plus concurrent systems programming language based turing programming language designed james cordy ric holt university toronto canada 1987 features turing+ eventually subsumed object-oriented turing turing+ extended original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features turing+ explicitly designed replace concurrent euclid systems-programming applications tunis operating system originally written concurrent euclid recoded turing+ minitunis implementation turing+ used implement several production software systems including txl programming language object-oriented turing extension turing programming language replacement turing plus created ric holt university toronto canada 1991 imperative object-oriented concurrent modules classes single inheritance processes exception handling optional machine-dependent programming integrated development environment x window system demo version versions exist sun-4 mips rs-6000 nextstep windows 95 others
[ 9345, 7234, 2820, 8262, 4423, 11625, 6218, 5612, 6797, 2830, 2895, 7983, 8524, 1016, 4057, 2556 ]
Test
11,133
5
Dead_Peer_Detection:dead peer detection dead peer detection dpd method detecting dead internet key exchange ike peer method uses ipsec traffic patterns minimize number messages required confirm availability peer dpd used reclaim lost resources case peer found dead also used perform ike peer failover
[ 4874, 10908, 3742, 8039 ]
Validation
11,134
8
JEUS:jeus jeus abbreviation java enterprise user solution korean web application server developed tmaxsoft jeus provides web application server component tmaxsoft middleware-tier framework solution widely adopted korea holds largest 42.1 share market tmaxsoft released jeus 1.0 2000 2001 received j2ee 1.2 certification jeus 3.0. 2013 received world ’ first java ee 7 certification jeus 8 jeus launched april 2000 following table shows list versions release dates jeus 7 provides following features domain architecture jeus 7 supports massive scale computing environment lightweight speedy distributed clustering dynamic clustering core function enables rapid elasticity allows administrator easily add delete idle resources needed graceful redeployment application redeployment needed operation continuous service environment provided guaranteeing completion processing session requests prior redeployment superior performance provided large-scale requests improved caching function memory managed efficiently use optimized lru processing algorithm improves performance connected webtob server stable large-scale transaction processing ability exhibited due multiplexing i/o request queuing dynamic load balancing stream pipe communication reloading modified class instead entire class function modified development productivity dramatically improved webtob web server component complements jeus tmaxsoft middleware-tier solution webtob uses multi-thread architecture allows address multiple requests single process features include disk memory caching load balancing clustering dynamic queuing ability add additional nodes without interrupting operations help improve server speed stability webtob uses secure sockets layer operates without open firewall ports inherently provides stronger data security administrators also configure access control lists following shows minimum installation requirements jeus windows 2000 2003 xp vista solaris hp-ux aix linux two editions jeus available
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 7443, 8350, 7457, 3746, 2339, 2596, 3237, 8994, 8998, 9125, 11682, 7338, 9387, 44, 5677, 7983, 10800, 11439, 6714, 8122, 10622, 1991, 595, 1363, 4439, 3545, 225, 1250, 865, 2404, 4837, 6379, 5612,...
Validation
11,135
2
Fedora_version_history:fedora version history fedora popular linux distribution developed community-supported fedora project sponsored red hat fedora attempts maintain six-month release schedule offering new versions may november although releases experienced minor delays releases red hat linux listed fedora 30 released april 30 2019 fedora 29 released october 30 2018. notable new features fedora modularity across variants new optional package repository called modular also referred application stream appstream gnome 3.30 zram arm images fedora scientific vagrant images fedora 28 released may 1 2018 red hat enterprise linux 8 derivatives based fedora 28. notable new features modular software repository curated 3rd-party software repositories fedora 27 released november 14 2017 workstation edition fedora 27 features gnome 3.26 display network configuration panels updated along overall settings panel appearance improvement system search shows results including system actions release also features libreoffice 5.4 fedora 26 released july 11 2017 fedora 25 released november 22 2016 notable changes see use wayland display system unicode 9 php 7.0 node.js 6 ibus emoji typing fedora 24 released june 21 2016 notable system wide changes see use gnome 3.20 gcc 6 python 3.5 fedora 23 released november 3 2015 see also fedora 22 released may 26 2015 major features include fedora 21 first version without codename released december 9 2014 fedora 20 codenamed heisenbug released december 17 2013 features fedora 20 include fedora 19 codenamed schrödinger cat released july 2 2013 red hat enterprise linux 7 derivatives based fedora 19 features fedora 19 include fedora 18 codenamed spherical cow released january 15 2013 features fedora 18 include next release operating system fedora 17 codenamed beefy miracle released may 29 2012 features fedora 17 include fedora 16 codenamed verne released november 8 2011 fedora 16 also dedicated memory dennis ritchie died month release features fedora 16 included fedora 15 codenamed lovelock released may 24 2011 features fedora 15 include fedora 14 codenamed laughlin released november 2 2010 features fedora 14 include fedora 13 codenamed goddard released may 25 2010 early development fedora project-leader paul frields anticipated looking fit finish issues tended build really tight ship fedora want make décor cabins little sumptuous polish deck chairs railings features fedora 13 include fedora 12 codenamed constantine released november 17 2009 red hat enterprise linux 6 derivatives based fedora 12 features fedora 12 fedora 11 codenamed leonidas released june 9 2009 first release whose artwork determined name instead users voting themes features fedora 11 fedora 10 codenamed cambridge released november 25 2008 flaunts new solar artwork features include fedora 9 codenamed sulphur released may 13 2008 new features fedora 9 included fedora 9 featured new artwork entitled waves like infinity fedora 8 changes wallpaper reflect time day fedora 8 codenamed werewolf released november 8 2007 new features updates fedora 8 included fedora 8 also included new desktop artwork entitled infinity new desktop theme called nodoka unique feature infinity wallpaper change day reflect time day february 2008 new xfce live cd spin announced x86 x86-64 architectures live cd version uses xfce desktop environment aims fast lightweight still visually appealing easy use like gnome kde spins xfce spin installed hard disk fedora 7 codenamed moonshine released may 31 2007 biggest difference fedora core 6 fedora 7 merging red hat core community extras repositories dropping core name fedora core new build system put place manage packages release used entirely new build compose tools enabled user create fully customized fedora distributions could also include packages third party provider three official spins available fedora 7 fedora 7 featured gnome 2.18 kde 3.5 new theme entitled flying high openoffice.org 2.2 firefox 2.0 fast user switching fully integrated enabled default also number updates selinux including new setroubleshoot tool debugging selinux security notifications new comprehensive system-config-selinux tool fine-tuning selinux setup two core releases introduced specific artwork defined trend continued later fedora versions fedora core 5 released march 20 2006 codename bordeaux introduced fedora bubbles artwork first fedora release include mono tools built beagle f-spot tomboy also introduced new package management tools pup pirut see yellowdog updater modified also first fedora release include long deprecated kept compatibility linuxthreads replaced native posix thread library fedora core 6 released october 24 2006 codenamed zod release introduced fedora dna artwork replacing fedora bubbles artwork used fedora core 5 codename derived infamous villain general zod superman dc comic books version introduced support compiz compositing window manager aiglx technology enables gl-accelerated effects standard desktop shipped firefox 1.5 default web browser smolt tool allows users inform developers hardware use fedora core 1 first version fedora released november 6 2003 codenamed yarrow fedora core 1 based red hat linux 9 shipped version 2.4.19 linux kernel version 2.4 gnome desktop environment k desktop environment 3.1 fedora core 2 released may 18 2004 codenamed tettnang shipped linux 2.6 gnome 2.6 kde 3.2 selinux selinux disabled default due concerns radically altered way fedora core ran xfree86 replaced newer x.org merger previous official x11r6 release additionally included number updates xrender xft xcursor fontconfig libraries significant improvements fedora core 3 released november 8 2004 codenamed heidelberg first release fedora core include mozilla firefox web browser well support indic scripts release also saw lilo boot loader deprecated favour grub selinux also enabled default new targeted policy less strict policy used fedora core 2 fedora core 3 shipped gnome 2.8 kde 3.3 first release include new fedora extras repository fedora core 4 released june 13 2005 codename stentz shipped linux 2.6.11 kde 3.4 gnome 2.10 version introduced new clearlooks theme inspired red hat bluecurve theme also shipped openoffice.org 2.0 office suite well xen high performance secure open source virtualization framework also introduced support powerpc cpu architecture 80 new policies selinux
[ 9353, 2955, 2197, 2199, 411, 929, 9762, 6694, 8998, 5165, 8621, 1584, 11057, 6338, 8772, 8520, 6910, 3033, 11610, 2651, 8439, 9564, 9438, 4961, 5988, 5222, 5096, 8554, 8683, 5356, 9964, 7022, 9455, 499, 4852, 246, 8438, 5243, 8700, 1150, ...
Test
11,136
7
Oracle_RAC:oracle rac database computing oracle real application clusters rac — option oracle database software produced oracle corporation introduced 2001 oracle9i — provides software clustering high availability oracle database environments oracle corporation includes rac enterprise edition provided nodes clustered using oracle clusterware oracle rac allows multiple computers run oracle rdbms software simultaneously accessing single database thus providing clustering non-rac oracle database single instance accesses single database database consists collection data files control files redo logs located disk instance comprises collection oracle-related memory background processes run computer system oracle rac environment 2 instances concurrently access single database allows application user connect either computer access single coordinated set data instances connected interconnect enables instances sync accessing data main aim oracle rac implement clustered database provide performance scalability resilience high availability data instance level oracle rac depends infrastructure component oracle clusterware coordinate multiple servers sharing data storage fan fast application notification technology detects down-states rac administrators use codice_1 tool manage rac configurations prior oracle 9 network-clustered oracle databases used storage device data-transfer medium meaning one node would write data block disk another node would read data disk inherent disadvantage lackluster performance oracle 9i addressed issue rac uses dedicated network connection communications internal cluster since computers/instances rac access database overall system must guarantee coordination data changes different computers whenever computer queries data receives current version — even another computer recently modified data oracle rac refers functionality cache fusion cache fusion involves ability oracle rac fuse in-memory data cached physically separately computer single global cache oracle grid naming service gns handles name resolution cluster registry trace file analyzer tfa aids collecting rac diagnostic data relative single-instance oracle database oracle rac adds additional complexity database automation makes sense single-instance databases becomes even necessary clustered databases increased complexity oracle real application clusters rac introduced oracle 9i 2001 supersedes oracle parallel server ops database option whereas oracle9i required external clusterware known vendor clusterware like trucluster veritas cluster server sun cluster unix flavors except linux windows oracle provided free clusterware called cluster ready services crs oracle 10g oracle clusterware product available operating systems release oracle database 10g release 2 10.2 cluster ready services renamed oracle clusterware using oracle 10g higher oracle clusterware clusterware need platforms oracle rac operates except tru cluster case need vendor clusterware still use clusterware vendors clusterware certified oracle rac rac write-transaction must take ownership relevant area database typically involves request across cluster interconnection local ip network transfer data-block ownership another node one wishing write takes relatively long time tens milliseconds compared single database-node using in-memory operations many types applications time spent coordinating block access across systems low relative many operations system rac scale comparably single system moreover high read-transactional databases data-warehousing applications work well rac need ownership-transfer exists oracle 11g made many enhancements area performs lot better earlier versions read-only workloads overhead resource mastering ownership-transfer minimal fewer three nodes request resource cluster obtained maximum three hops owner-master-requestor makes oracle rac horizontally scalable many nodes application vendors sap use oracle rac demonstrate scalability application biggest oltp benchmarks oracle rac oracle rac 11g supports 100 nodes applications rac may require careful application partitioning enhance performance application scales linearly smp machine may scale linearly rac however application scale linearly smp scale ported rac short application scalability based well application scales single instance shared-nothing shared-everything architectures advantages dbms vendors industry analysts regularly debate matter example microsoft touts comparison sql server 2005 oracle 10g rac oracle corporation offered shared nothing architecture rdbms advent ibm sp sp2 release 7.x mpp editions virtual shared drives vsd used create shared everything implementation shared nothing architecture shared-everything architectures share data disk data memory nodes cluster contrast shared-nothing architectures share none commercially available databases offer shared-everything architecture ibm db2 z/os ibm mainframe operating-system provided high-performance data-sharing option since mid-1990s ibm released mainframe hardware software-clustering infrastructure late 2009 ibm announced db2 purescale shared-disk clustering scheme db2 9.8 aix mimics parallel sysplex implementation behind db2 data sharing mainframe february 2008 sybase released adaptive server enterprise cluster edition resembles oracle rac shared-everything design although technically shared-everything sybase also provides column-based relational database focused analytic datawarehouse applications called sybase iq configured run shared disk mode shared-nothing architectures share neither data disk data memory nodes cluster contrast shared-everything architectures share competitive products offering shared-nothing architectures include
[ 8195, 8969, 9867, 270, 10511, 19, 10389, 11030, 11552, 6433, 8229, 9782, 5047, 8128, 6480, 4817, 2901, 4696, 5210, 7649, 10340, 6383, 2168, 7802, 3323, 4604 ]
Test
11,137
2
IPSW:ipsw ipsw ipod software file format used itunes install ios firmware apple devices share ipsw file format ios firmware allowing users flash devices itunes macos windows .ipsw file compressed archive file similar zip archive containing three apple disk image files one containing root file system ios two ram disks restore update file also holds firmware folder contains ibss ibec dfu battery images low full charging also baseband firmware files .bbfw format baseband firmware two files named build manifest restore manifest apple property list .plist format checks compatibility holds hashes base64 format instructs device find specific firmware parts restore buildmanifest.plist sent apple tss server checked order obtain shsh blob every restore without shsh blobs firmware refuse restore thus making downgrades impossible official fashion due apple limitation archive password-protected dmg images inside encrypted aes apple release keys extracted using different iboot bootloader exploits limera1n created george hotz commonly known geohot since many tools created decryption modification root file system 2015 san bernardino attack fbi recovered shooter iphone 5c belonged san bernardino county department public health fbi recovered icloud backups one half months shooting wanted access encrypted files device u.s. government ordered apple produce ipsw file would allow investigators brute force passcode iphone order used writs act originally created judiciary act 1789 demand firmware way smartphone manufacturers ordered comply tim cook responded company webpage outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users
[ 9732, 11173, 11430, 10857, 107, 9518, 2095, 4657, 3921, 8115, 1276, 4957, 7614 ]
Test
11,138
4
PARAFE:parafe parafe abbreviation passage automatisé rapide aux frontières extérieures automated fast-track crossing external borders passport verification program operated france direction centrale de la police aux frontières dcpaf border police parafe incorporating automated self-service barriers operated dcpaf located immigration checkpoints arrival departure halls paris marseille nice lyon airports london st. pancras train station offering alternative using desks staffed immigration officers gates use facial recognition technology verify user identity data stored chip biometric passport present european economic area swiss citizens use parafe egates provided aged 18 years holding valid biometric passports minors aged 12-17 also use gates certain arrival controls never departure french authorities strict rules unaccompanied minors leaving country use parafe gates traveller must biometric passport france certain countries epassports biometric logo front cover passports biometric logo front cover computer gate scanner reads information contained chip inside passport camera takes picture passenger biometric patterns verified picture saved passport chip epassport gate scanner reads information contained chip inside passport runs data numerous databases determine traveller security risk camera takes picture traveller officer control station behind gates checks image captured camera matches one passport facial recognition data verification facial recognition process complete doors automatically either open signifying traveller permitted enter and/or exit country remain closed stop icon illuminate demonstrating traveller failed security checks personally meet immigration officials present parafe egates available following locations previous generation parafe egates used fingerprint technology verify identity passenger first introduced 2010 phased since considered insufficiently intuitive hand finger slower process non-french citizens actively sign french airport every 5 years able use egates first egates replaced early 2017 pilot project facial recognition technology extended airports st pancras station throughout rest 2017 2018 still gates left work fingerprint technology new registrations still accepted
[ 10685, 8038 ]
None
11,139
3
Jack_the_Nipper_II:_In_Coconut_Capers:jack nipper ii coconut capers jack nipper ii coconut capers video game gremlin graphics released 1987 several home computer systems sequel jack nipper following naughty exploits jack nipper jack family exiled australia unhappy jack jumped plane using nappy parachute finds middle african jungle surrounded dangerous animals natives father also following close behind determined give boy good spanking jack must cause much mischief possible avoiding punishment previous game jack nipper ii side-view flip screen game puzzle solving platform elements however false-3d effect removed making gameplay pure 2d jack must perform naughty pranks time human animal inhabitants jungle evading father hot pursuit game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 3½ 5 stars calling rather cute arcade game on-screen character running around africa
[ 10931, 11053, 9006 ]
None
11,140
4
VPNFilter:vpnfilter vpnfilter malware designed infect routers certain network attached storage devices 24 may 2018 estimated infected approximately 500,000 routers worldwide though number at-risk devices larger steal data contains kill switch designed disable infected router command able persist user reboot router fbi believes created russian fancy bear group vpnfilter malware infecting number different kinds network routers storage devices seems designed part target serial networking devices using modbus protocol talk control industrial hardware factories warehouses malware special dedicated code target control systems using scada initial infection vector still unknown cisco talos security group hypothesizes malware exploits known router security vulnerabilities infect devices software installs multiple stages vpnfilter uses multiple third stage operations initial infection one function vpnfilter sniff network data network connected infected device gather credentials supervisory control data data encrypted exfiltrated via tor network also serve relay point hide origin subsequent attacks cisco symantec suggest people affected devices factory reset typically accomplished using small pointed object straightened paperclip push small reset button back unit 10 30 seconds time varies model remove malware also restores router original settings router remote management enabled factory reset often disable default setting many routers remote management thought one possible vector initial attack connecting factory-reset router internet device default passwords changed prevent reinfection initial worm installs vpnfilter attack devices running embedded firmware based busybox linux compiled specific processors include non-embedded linux devices workstations servers manufacturer-provided firmware following router models known risk vpnfilter described cisco talos infected many 500,000 devices worldwide perhaps 54 different countries though proportionately focus ukraine fbi taken high-profile role addressing malware conducting investigation resulted seizure domain name toknowall.com ostensibly used redirect queries stage 1 malware allowing locate install copies stages 2 3 us justice department also compelled site photobucket disable known urls used distribute malware stage 2 25 may 2018 fbi recommended users reboot at-risk devices would temporarily remove stages 2 3 malware stage 1 would remain leading router try re-downloading payload infecting router however prior recommendation us justice department seized web endpoints malware uses stage 2 installation without urls malware must rely fallback socket listener stage 2 installation method requires threat actor command control systems contact system install stage 2 increasing threat actor risk identified fbi recommended users disable remote management devices update firmware firmware update removes stages malware though possible device could reinfected fbi said would help find servers distributing payload
[ 9569, 8997, 5000, 823, 2041, 7515 ]
Test
11,141
9
Expression_problem:expression problem expression problem term used discussing strengths weaknesses various programming paradigms programming languages philip wadler coined term response discussion rice university programming languages team plt expression problem new name old problem goal define datatype cases one add new cases datatype new functions datatype without recompiling existing code retaining static type safety e.g. casts ecoop '98 krishnamurthi et al presented design pattern solution problem simultaneously extending expression-oriented programming language tool-set dubbed expressivity problem thought programming language designers could use problem demonstrate expressive power creations plt problem shown construction drscheme drracket solved via rediscovery mixins avoid using programming language problem paper programming languages krishnamurthi et al used old geometry programming problem explain pattern-oriented solution conversations felleisen krishnamurthi ecoop presentation wadler understood pl-centric nature problem pointed krishnamurthi solution used cast circumvent java type system discussion continued types mailing list corky cartwright rice kim bruce williams showed type systems oo languages might eliminate cast response wadler formulated essay stated challenge whether language solve expression problem salient indicator capacity expression label expression problem puns expression much language express expression terms trying represent language expressions others co-discovered variants expression problem around time rice university plt particular thomas kühne dissertation smaragdakis batory parallel ecoop 98 article follow-up work used expression problem showcase power programming language designs expression problem also fundamental problem multi-dimensional software product line design particular application special case fosd program cubes various solutions expression problem solution varies amount code user must write implement language features require
[ 10246, 5031, 4392, 2666, 369, 9245 ]
Test
11,142
4
Enrique_Salem:enrique salem enrique salem born 1965 president ceo software company symantec 2009 2012 member u.s. president management advisory board salem joined bain capital ventures 2014 focuses infrastructure software services specialization cybersecurity serves boards several bain capital venture portfolio companies including docusign serves independently boards fireeye feye atlassian team forescout fsct currently serves board directors number privately held startups including cloudgenix attivo networks shieldx leapyear awake security shiftleft red balloon security bettercloud rubrik.. salem served board city year san jose 2015 2018 trustee city year salem attended dartmouth college earned bachelor arts ba degree computer science vice president peter norton computing acquired symantec 1990 manager project create norton desktop windows left symantec returned via brightmail acquisition enrique named 2004 entrepreneur year ernst young 2007 corporate executive year hispanic net salem held vice-president positions security pacific merchant bank ask jeeves oblix inc. salem ceo brightmail company made email program designed screen spam email brightmail acquired symantec 2004 brightmail almost two years salem spent total 19 years symantec took john w. thompson symantec ceo april 2009 july 2012 salem became member president barack obama ’ u.s. president management advisory board march 2011 served til end administration
[ 9569 ]
None
11,143
8
Leaf_Group:leaf group leaf group formerly demand media inc american content company operates online brands including ehow livestrong.com marketplace brands saatchi art society6 company also provides social media platforms existing large company websites distributes content bundled social media tools outlets around web demand media created 2006 former private equity investor shawn colo former chairman myspace richard rosenblatt company employs algorithm identifies topics high advertising potential based search engine query data bids advertising auctions topics typically advice how-to field commissions freelancers produce corresponding text video content content posted variety sites including youtube company sites ehow livestrong.com demand media content media service offering includes leading owned operated online properties publish content text video photography designed visual formats content published across several key categories ehow.com how-to reference do-it-yourself destination livestrong.com health healthy living destination certain niche properties focused specific interests also owns operates leaftv lifestyle resource women produces short-form how-to videos covering stylish living food fashion additionally studiod business develops executes content marketing strategies creates custom content third-party brands agencies publishers marketplaces service offering demand media operates two art design marketplaces large communities artists market sell original artwork original designs printed wide variety products society6.com acquired june 2013 provides artists online commerce platform feature sell original images designs consumer products art prints phone tablet cases t-shirts mugs blankets tapestries wall clocks duvet covers shower curtains throw pillows saatchiart.com acquired august 2014 online art gallery featuring wide selection original paintings drawings sculptures photography provides global community artists curated environment exhibit sell work directly consumers around world 2017 leaf group acquired deny designs modern home furnishings company original designs based colorado demand media co-founded may 2006 richard rosenblatt shawn colo. rosenblatt long history building selling internet media companies chief executive officer intermix media chairman myspace.com rosenblatt one innovators internet social networking colo financial acquisition specialist worked 10 years private equity industry principal spectrum equity investors specializing media communications companies demand media raised 355 million financing first two years investors oak investment partners spectrum equity investors generation partners goldman sachs june 2007 demand media hired charles hilliard former morgan stanley investment banker netzero/united online senior executive initial public offering ipo specialist president chief financial officer acquired byron reese how-to website expertvillage.com austin tx 20 million reese became company chief innovation officer developed algorithm company uses identify topics high advertising potential 2008 demand media acquired 30 domain-name portfolios owned 65 destination websites said 2009 revenue nearly 200 million making profit later reported company never profitable july 2008 reported yahoo interested buying demand media 1.5 billion 2 billion sources close companies said yahoo executives attracted demand media ’ generation advertising impressions ability create niche social networks media sites demand media ceo richard rosenblatt later said company sale deal never got past talking stage reported rosenblatt wanted price closer 3 billion demand media august 2014 demand media acquired online art-gallery marketplace saatchi art named startup top executive sean moriarty new ceo demand media inc company changed name 2016 reflect focus marketplaces media content lifestyle platforms since 2006 demand media acquired collection relatively unknown sites relaunched social networking features video capabilities serve specific niche interests company ’ first six months made nine acquisitions including purchase major registrars enom bulkregister november 6 2008 shawn colo head demand media mergers acquisitions said company would continue buy niche well-trafficked sites company profitable still lot cash bank 2008 demand media acquired pluck company providing social networking commenting solutions websites reported 75 million cash indieclick rss graffiti acquired august 2011 name.com domain name registrar acquired january 7 2013 society6 acquired june 25 2013 saatchi online acquired august 11 2014 august 2014 demand media announced successfully separated rightside group ltd. brands enom name.com online auction site namejet result separation demand media longer provider domain name services april 2016 demand media announced sale brand cracked.com e.w scripps may 2016 demand media announced sale brand trails.com lovetoknow corp owned howard love february 2017 demand media airliners.net site acquired verticalscope majority-owned torstar 2018 leaf acquired website well+good 2018/19 leaf acquired website onlyinyourstate demand media executives say websites content-driven attract visitors showing multiword search-engine queries words typed search engine specific search called long tail search demand media attempts get visitors websites long-tail searches tries retain visitors related content social media tools social media platforms get 3 billion interactions per month clients already well-established brands demand media commissions specific website content distributes websites others advertising revenue sharing agreements demand media owned 135,000 videos 340,000 articles largest contributor youtube uploading 10,000 20,000 new videos per month gets 1.5 million page views per day youtube content generated via process demand media uses algorithms generate titles posts titles screened pool freelance writers video creators list available titles used 100,000 severely curtailed second half 2011 typically writers claim ten titles week submit articles format length dictated guidelines submitted articles go editor also freelancer either clean request rewrite writers submit revised article either accepted rejected payment via paypal twice week demand media ’ acquisition pluck.com 2008 gave means provide specialized content social media platforms website content comes advertising attached website owners get free content sites split advertising revenue demand media april 2010 financial times reported demand media planning initial public offering shares ipo would mean acquisitions would question ipo filing completed august year shares first expected offered december 2010 tender would give demand media value 1.5 billion however result securities exchange commission investigation regarding company novel accounting long-lived content pricing delayed january 12 2011 company announced would price shares 14 16 giving valuation approximately 1.3 billion questions raised demand media claim profitable given ipo filings reported losses past several years demand media attracted criticism internet watchdogs one largest buyers articles videos often commissioning low quality articles cut costs effort mass-produce articles videos appear highly google search results purchasing thousands search-engine-driven content low-paid freelancers use websites attract advertisers israeli startup owned google adsense simpli demand media also criticized methods accounting capitalizing costs content amortizing five years giving appearance profitability
[ 6696, 8735 ]
Validation
11,144
4
Microsoft_Office_password_protection:microsoft office password protection microsoft office password protection security feature protect microsoft office word excel powerpoint documents user-provided password office 2007 uses modern encryption earlier versions used weaker systems considered secure office 2007–2013 employed 128-bit key aes password protection remains secure office 2016 employed 256-bit key aes password protection also remains secure office 97–2003 password protection used 40-bit key rc4 contains multiple vulnerabilities rendering insecure microsoft office applications offer use two main groups passwords set document depending whether encrypt password-protected document passwords encrypt password-protected document different security level features microsoft office applications mentioned lack document encryption passwords mentioned reliably protect document hacker password cracking software remove protection password-protected document little time password encrypts document also restricts user opening document possible set type password microsoft office applications user fails enter correct password field appears attempt open password-protected document viewing editing document possible due encryption document protected password open hacker needs decrypt document get access contents provide improved security microsoft consistently enhancing office encryption algorithm strength excel word 95 prior editions weak protection algorithm used converts password 16-bit key hacking software readily available find 16-bit key decrypt password-protected document instantly excel word 97 2000 key length increased 40 bits protection algorithm also currently considered weak presents difficulties hacking software default protection office xp 2003 changed opportunity use custom protection algorithm added choosing non-standard cryptographic service provider allows increasing key length key used encrypt document ’ found however password-cracking programs enter multiple random passwords speed use csps slow password recovery weak passwords still recovered fast enough even custom csp office 2007 word excel powerpoint protection significantly enhanced since modern protection algorithm named advanced encryption standard used present software break encryption help sha-1 hash function password stretched 128-bit key 50,000 times opening document result time required crack vastly increased excel word 2010 still employ aes 128-bit key number sha-1 conversions doubled 100,000 increasing time required crack password office 2013 access excel onenote powerpoint project word uses 128-bit aes hash algorithm sha-1 default office 2016 access excel onenote powerpoint project word uses 256-bit aes sha-1 hash algorithm cbc cipher block chaining default protection worksheets macros necessarily weaker entire workbook software must able display use excel particularly weak equivalent password easily found form abababababax first 11 chars either b last ascii character number attacks employed find password remove password protection excel word documents password removal done help precomputation tables guaranteed decryption attack attacks target original password set microsoft excel word include dictionary attack rule-based attack brute-force attack mask attack statistics-based attack efficiency attacks considerably enhanced one following means applied multiple cpus distributed attack gpgpu applicable microsoft office 2007–2010 documents cloud computing due weak passwords moment cloud computing facilities capable unlocking many ca 80 files saved office 2007–2010 format passwords sufficient length complexity typically brute-forced office 2013 introduces sha-512 hashes encryption algorithm making brute-force rainbow table attacks slower however noted sha hash algorithms never designed password hashing thus considered secure anymore modern slower thus secure hashes pbkdf2 scrypt kdfs yet implemented office specialized software designed recover lost microsoft office passwords pre-aes encryption ultimately security password-protected document dependent user choosing password sufficient complexity password determined guesswork social engineering underlying cipher important
[ 4194, 7523, 6916, 7556, 7557, 2632, 8040, 460, 3629, 10029, 1904, 3984, 9328, 5619, 440, 2046 ]
Test
11,145
2
MOS_(operating_system):mos operating system mos signifies 'mobile operating system soviet clone unix 1980s operating system commonly found sm evm minicomputers also ported es evm elbrus mos also used high-end pdp-11 clones several modifications mos named mnos demos etc
[ 6787, 8713, 3722, 6412, 7823, 5267, 5397, 1304, 3487, 3241, 10156, 7983, 3248, 2995, 9141, 823, 7224, 3129, 9784, 1853, 9151, 10436, 4039, 6369, 4076, 5492, 2424, 633 ]
Validation
11,146
4
Secureworks:secureworks secureworks inc. united states-based subsidiary provides information security services protecting customers computers networks information assets malicious activity cybercrime company approximately 4,400 customers across 61 countries ranging fortune 100 companies mid-sized businesses variety industries became part dell february 2011 branched become public organization april 2016 still majority-owned dell secureworks founded privately held company 1998 michael pearson joan wilbanks 2002 michael r. cote became president ceo 2005 2006 company named inc. 500 inc. 5000 lists 2006 deloitte ’ fast 500 2006 secureworks merged lurhq corporation new entity continued secureworks corporate name lurhq founded 1996 myrtle beach sc provided managed security services large enterprises similar company cultures leadership secureworks according gartner merger created stronger company merger secureworks able leverage sherlock lurhq portal unify combined customer base onto single integrated security management platform 2009 secureworks acquired managed security services mss business verisign inc. provider internet infrastructure services networked world grew 500 employees worldwide acquisition expanded clients approximately 2,600 50 countries including united kingdom saudi arabia taiwan finland spain brazil mexico includes four fortune 10 also 2009 secureworks acquired 10-year-old dns limited acquisition expanded secureworks operation include uk-based operations center additional offices london edinburgh january 4 2011 dell announced would acquire secureworks part dell services dell secureworks officially began operating dell subsidiary february 7 2011 dell secureworks continued expand portfolio around world may 2013 arrived anz region move australia new zealand put dell ring security services market companies like ibm hp verizon dell secureworks opened operations center sydney meet demands local australia businesses demand services area penetration testing forensic investigations ongoing monitoring environments attacks december 17 2015 dell subsidiary secureworks filed go public april 22 2016 secureworks announced ipo raising 112 million pricing ipo 14 per share however company expecting initial price 15.50- 17.50 first tech ipo u.s. 2016 august 2017 secureworks rebranded logo changed capitalization w name lower case
[ 2976, 8288, 8515, 6153, 11146, 4945, 7089, 54, 7126, 1400, 8022, 9630, 10615 ]
Test
11,147
2
List_of_Unix_daemons:list unix daemons list unix daemons found various unix-like operating systems unix daemons typically name ending
[ 225, 6273, 9762, 7364, 3750, 10727, 8360, 1801, 10344, 5840, 11539, 2996, 5397, 9909, 11292, 4797, 5471 ]
Test
11,148
3
Comic_Bakery:comic bakery comic bakery computer game msx made konami 1984 later ported commodore 64 imagine software game set bakery town baker tries bake deliver bread croissants msx version fighting raccoons pieces bread move along factory line raccoons try eat bread switch machines player required keep machinery running also scare away raccoons player succeeds delivery truck loaded bread drives advancing player next level level maintains format last difficulty increasing player progresses levels music sound effects c64 version made martin galway title chiptune covered press play tape visa röster instant remedy msx version unique music using yankee doodle instead song comic bakery also used games jurassic park game boy color platypus pc
[ 10931, 9006 ]
None
11,149
2
Unicode_in_Microsoft_Windows:unicode microsoft windows microsoft one first companies implement unicode back ucs-2 evolved utf-16 products still 2019 improving operating system support utf-8 windows nt first operating system used wide characters system calls using ucs-2 encoding scheme first upgraded utf-16 starting windows 2000 allowing representation additional planes surrogate pairs current windows versions back windows xp prior windows nt 3.x 4.0 shipped system libraries support string encoding two types 16-bit unicode utf-16 since windows 2000 sometimes multibyte encoding called code page incorrectly referred ansi code page 16-bit functions names suffixed -w wide codice_1 code page oriented functions use suffix -a ansi codice_2 conventions used apis copied systems codice_3 codice_4 split necessary many languages including c provide clean way pass 8-bit 16-bit strings function functions implemented wrapper translates text using current code page utf-16 calls w function functions return strings opposite conversion apparently put characters n't exist current locale microsoft attempted support unicode portably providing unicode switch compiler switches unsuffixed generic calls w interface converts string constants wide utf-16 versions actually work translate utf-8 outside string constants resulting code attempts open files compiling earlier independent unicode switch windows also provides mbcs api switch changes functions n't work mbcs codice_5 mbcs-aware one codice_6 notice lot microsoft documentation uses term unicode mean 8-bit text windows ce utf-16 used almost exclusively api mostly missing limited set ansi api available windows ce 5.0 use reduced set locales may selectively built onto runtime image 2001 microsoft released special supplement microsoft ’ old windows 9x systems includes dynamic link library unicows.dll 240 kb containing 16-bit flavor ones letter w end basic functions windows api microsoft windows code page designated utf-8 code page 65001 prior windows 10 insider build 17035 november 2017 impossible set locale code page 65001 leaving code page available microsoft claimed utf-8 locale might break functions possible example _mbsrev written assume multibyte encodings used 2 bytes per character thus code pages bytes gb 18030 cp54936 utf-8 could set locale means narrow functions particular codice_8 opens files called utf-8 strings fact way open possible files using codice_8 matter locale set and/or bytes put string none available locales produce possible utf-16 characters problem also applies api takes returns 8 bit strings including windows ones codice_10 modern non-windows platforms string passed codice_8 effectively utf-8 produces incompatibility platforms windows normal work-around add windows-specific code convert utf-8 utf-16 using multibytetowidechar call wide function another popular work-around convert name 8.3 filename equivalent necessary codice_8 inside library function takes string filename altered proposals add new apis portable libraries boost necessary conversion adding new functions opening renaming files functions would pass filenames unchanged unix translate utf-16 windows would allow code portable required many code changes calling wide functions insider build 17035 april 2018 update nominal build 17134 windows 10 beta use unicode utf-8 worldwide language support checkbox appeared setting locale code page utf-8 allows calling narrow functions including codice_8 codice_2 utf-8 strings microsoft compilers often fail producing utf-8 string constants utf-8 source files reliable method turn unicode mark input file utf-8 i.e use bom arrange string constants utf-8 bytes bom added microsoft compiler interpret strings utf-8 convert utf-16 convert back current locale thus destroying utf-8 without bom using single-byte locale microsoft compilers leave bytes quoted string unchanged
[ 3840, 321, 9840, 8976, 5754 ]
None
11,150
9
FXScript:fxscript fxscript scripting language final cut pro final cut express fxbuilder scripting utility users able modify existing fcp fxscripts program completely new ones example scale image two lines necessary scale image full size half size first region might rectangle scaled statement scale parameters statement blitrect copies region image changed region origregion new region different sizes final cut pro scales image fit new region statement command accomplishes single action example statements scale blitrect fxbuilder users create test fxscripts optionally multiple windows inside final cut pro/express fxscript three types effects fxscript two parts normally flow script top bottom users take flow control using loops example for/next conditional branches example if/else fxscript also allows breaking scripts subroutines called parts script using names
[ 9780 ]
Test
11,151
3
MSX_character_set:msx character set msx character sets group single- double-byte character sets developed microsoft msx computers based code page 437 since graphic characters corresponding unicode representation portably displayed web browser following table shows msx characters corresponding unicode glyph code point otherwise unicode replacement character u+fffd � hyphen code point control characters non-printing characters represented names character set differences exist depending target market machine variations german din international character sets identical apart style zero 0 character international character set zero slash din character set dotted zero msx terminal compatible vt-52 escape codes plus extra control codes shown brazilian manufacturer gradiente initially included modified msx character set v1.0 machines allow writing correct portuguese differences shown boxed symbol 0x9e 158 currency symbol brazilian cruzado used anymore later brazilian msx models v1.1 higher included standardized character set named brascii solved accentuation incompatibility problems amongst different makers
[ 5384, 3563, 9006, 7504, 3443, 3708, 2078 ]
Test
11,152
4
Shamoon:shamoon shamoon also known w32.distrack modular computer virus discovered 2012 targeting recent 32-bit nt kernel versions microsoft windows virus noted behavior differing malware attacks due destructive nature cost attack recovery known years later biggest hack history virus apparently intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable virus used cyber warfare national oil companies saudi arabia saudi aramco qatar rasgas discovery announced 16 august 2012 symantec kaspersky lab seculert similarities highlighted kaspersky lab seculert shamoon flame malware malware unique used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well-staged according chris kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident behalf anti-oppression hacker group fed crimes atrocities taking place various countries around world especially neighboring countries syria bahrain yemen lebanon egypt ... also dual approach world community nations want hit main supporters disasters action one main supporters disasters al-saud corrupt regime sponsors oppressive measures using muslims oil resources al-saud partner committing crimes hands infected blood innocent children people first step action performed aramco company largest financial source al-saud regime step penetrated system aramco company using hacked systems several countries sended malicious virus destroy thirty thousand computers networked company destruction operations began wednesday aug 15 2012 11:08 local time saudi arabia completed within hours shamoon attack designed two things replace data hard drives image burning american flag report addresses infected computers back computer inside company ’ network virus consisted three components dropper wiper reporter dropper main component source infection component drops wiper reporter onto infected computer copies network shares executes creates service start whenever windows starts wiper destructive component component gathers files locations infected computers erases sends information files attacker erased files overwritten corrupted files recovered reporter component sends infected information back attacker 15 august 11:08 local time 30,000 windows based systems began overwritten symantec found affected systems image american flag whilst data deleted overwritten saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable saudi aramco restored main internal network services impacted august 15 2012 malicious virus originated external sources affected 30,000 workstations workstations since cleaned restored service precaution remote internet access online resources restricted saudi aramco employees returned work august 25 2012 following eid holidays resuming normal business company confirmed primary enterprise systems hydrocarbon exploration production unaffected operate isolated network systems production plants also fully operational control systems also isolated august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password aramco ceo khalid al-falih attackers also referenced portion shamoon malware proof pastie internet service routers three info follows core router sa-ar-co-1 password telnet c1sc0p ss-ar-cr-tl enable c1sc0p ss-ar-cr-bl backup router sa-ar-co-3 password telnet c1sc0p ss-ar-bk-tl enable c1sc0p ss-ar-bk-bl middle router sa-ar-co-2 password telnet c1sc0p ss-ar-st-tl enable c1sc0p ss-ar-st-bl khalid a. al-falih ceo email info follows khalid.falih aramco.com password kal ram sa1960 security appliances used according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner unclear attacker may interest actually destroying infected pc kaspersky labs hinted 900 kb malware could related wiper used cyber attack iran april 2-day analysis company erroneously concluded malware likely come scriptkiddies inspired wiper later blog post eugene kaspersky clarified use shamoon categorizing cyber warfare virus hit companies within oil energy sectors group named cutting sword justice claimed responsibility attack 35,000 saudi aramco workstations causing company spend week restoring services group later indicated shamoon virus used attack computer systems rasgas also knocked offline unidentified computer virus security experts attributing damage shamoon shamoon made surprise comeback november 2016 according symantec involved new attack 23 january 2017 malware logic bomb triggered master boot record data wiping payload 11:08am local time wednesday august 15 attack occurred month ramadan 2012 would appear attack timed occur staff gone holiday reducing chance discovery maximum damage could caused hampering recovery shamoon uses number components infect computers first component dropper creates service name ‘ ntssrv ’ remain persistent infected computer spreads across local network copying computers drop additional components infected computers dropper comes 32-bit 64-bit versions 32-bit dropper detects 64-bit architecture drop 64-bit version malware also contains disk wiping component utilizes eldos-produced driver known rawdisk achieve direct user-mode access hard drive without using windows apis component overwrites files portions image 2012 attack used image burning u.s. flag 2016 attack used photo body alan kurdi
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 3116, 7739, 1608, 3657, 8779, 4703, 8288, 8292, 5754, 10875, 3711, 8320, 7809, 5764, 2187, 6797, 4240, 1688, 3225, 2717, 9375, 3235, 7855, 9904, 9395, 8886, 9932, 3789, 4304, 4314, 9435, 4830...
Test
11,153
2
General_Comprehensive_Operating_System:general comprehensive operating system general comprehensive operating system gcos originally gecos general electric comprehensive operating supervisor family operating systems oriented toward 36-bit ge/honeywell mainframe computers original version gcos developed general electric 1962 operating system still used today recent versions gcos 7 gcos 8 servers mainframes produced groupe bull primarily emulation provide continuity legacy mainframe environments note gcos 7 gcos 8 separate branches operating system continue developed alongside gecos-ii operating system developed general electric 36-bit ge-635 1962-1964 bore close resemblance architecturally ibsys ibm 7094 less dos/360 system/360 however ge-635 architecture different ibm system/360 gecos ambitious dos/360 gecos-ii supported time-sharing tss batch processing dynamic allocation memory ibm fixed partitions time making true second-generation operating system honeywell acquired ge computer division gecos-iii renamed gcos 3 heart 24-bits ge-400 series hardware line renamed h-6000 adding eis enhanced instruction set character oriented instead word oriented later honeywell marketing created series 60 renamed h-6000 level 66 later dps 8 honeywell along european affiliate cii-honeywell bull launched new 32-bit product line called level 64 later became dps 7 name gcos extended operating systems honeywell-marketed product lines gcos-64 completely different 32-bit operating system level 64 series similar parallel development called multics designed honeywell honeywell bull developers france boston gcos-62 operating system another 32-bit low-end line machines level 62 series designed italy gcos-61 operating system new version small system made france model 58 later level 61/58 operating system new 16-bit minicomputer line massachusetts billerica level 6 got name gcos 6 another renaming hardware product lines occurred 1979 level 6 becoming dps 6 level 62 becoming dps 4 level 64 becoming dps 7 level 66 becoming dps 8 operating systems retained gcos brand-name gcos 6 gcos 4 gcos 7 gcos 8 introduced gcos 8 extensive rewrite gcos 3 changes made support true virtual memory management demand paging changes also required new hardware gcos 3 supported maintenance several years announcement renaming gcos 3 later gcos 7 gcos 8 featured good codasyl relational database called integrated data store ids model successful idms several transaction processing monitors designed gcos 3 gcos 8 early attempt tp gcos 3 transaction processing executive assumed unix new process started handle transaction enjoyed limited success another tp system transaction driven system tds soon developed gcos 3 using single process potentially multiple threads service transactions tds essentially honeywell development later replaced backward-compatible transaction processing 8 tp8 gcos 8 profited overhaul gcos system architecture came gcos 8 make full use virtual memory concepts tp8 used multiple static processes way similar unix daemons handle incoming transactions multiplexed way tds tp8 successor commercially successful tds predated ibm cics similar architecture similar product also called tds developed gcos-7 internal architecture completely different dps 6 dps 4 ex-level 62 superseded motorola 68000- later powerpc minicomputers running unix product lines discontinued though gcos 6 ran emulator top aix dps 7 line along gcos 7 continued evolve dps 7000 hardware base late 1980s honeywell sold computer business joint venture initially included nec bull honeywell still holding stake time couple years bull took company nec supplied several generations mainframe hardware high end would run gcos 8 acos-4 operating system bull used nomenclature dps-9000 entire gcos 8-based mainframe line included models designed bull nec late 1990s early 2000s bull desire center development single hardware base running commodity intel chips bull value-adds platform called novascale based itanium 2 processors runs windows linux natively however instruction set simulators dps 7000 dps 9000 allowed gcos 7 gcos 8 run platform gcos 7 also ported lower-end xeon-based platform bull publicly stated gcos 8 continue developed itanium systems bull continues invest development money support gcos 7 gcos 8 still customers countries around world support gcos 7 gcos 8 bull planned least 2025 including regular hardware software upgrades trace gcos influence remains today modern unix systems early unix systems bell labs used gcos machines print spooling various services field added /etc/passwd carry gcos id information called gecos field survives today pw_gecos member used user full name human-id information due historically important far-reaching influence gcos sometimes known king operating systems gcos multithreading multiprogramming operating system originally oriented towards batch processing although later versions incorporated enhancements timesharing online transaction processing environments systems running gcos today use mainly batch oltp backend enterprise server although gcos basic architecture similar ibm 360 earlier ibm 7090 series abandoned ibm 360 subsequent operating systems competed also heavily influenced projects medinet multics wwmccs inherited strong security structure consequence hardware software features combine render operating system unusually secure operating system generation class multics influenced design hardware gate-oriented secure transfer-of-control instructions hardware-enforced system security levels similar famous multics rings operational environments wwmccs drove development special security features allow secure hosting classified information compartmentalization time separate versions gcos system special security features turned maintained specifically government customers gcos process-oriented os process hosts one execution threads executes virtual memory space virtual memory divided segments arbitrary size reminiscent multics segments second level address translation converts pure virtual addresses pageable addresses converted real addresses main memory backing store segments pages constructs include hardware-enforced security parameters top-level virtual memory architecture also simplifies sharing code data secure fashion way reminiscent multics gcos requires specific hardware designed operating system although recent machines capable running os emulation hardware originally much common multics hardware much mainframe equipment could switched gcos mode multics mode turn dial much peripheral equipment used gcos shared great deal multics although front-end network processors different two systems program languages available gcos included gcos algol algol-68 cobol snobol jovial apl fortran 68 coral 66 fortran 77 b become accustomed almost universal terminology units storage modern terminology applies across various operating systems computer vendors part everyday conversation terms like megabyte gigabyte mean much everyone terms like mebibyte gibibyte formally standardised however gcos8 system pre-dates mono-culture colourful units follows note system byte contains 9 bits values ranging 000 777 0–511 unlike usual 8-bit-bytes values ranging 00 ff 0-255 due 36-bit cpu architecture permanent file sizes specified llinks 1280 bytes temporary file sizes specified links 15,360 bytes since early 1970s gcos 3 gcos 8 disk drives used logical block addressing lba
[ 2179, 10508, 6797, 5523, 6675, 5397, 5658, 2211, 7983, 823, 10040, 2625, 11075, 4423, 8136, 5065, 8137, 1611, 3916, 10569, 2519, 9436, 3429, 7269, 3816, 10089, 623, 5492, 6772, 3323, 8700 ]
Test
11,154
9
Server_Side_Includes:server side includes server side includes ssi simple interpreted server-side scripting language used almost exclusively web useful including contents one files web page web server using codice_1 directive could commonly common piece code throughout site page header page footer navigation menu ssi also contains control directives conditional features directives calling external programs supported apache litespeed nginx iis well w3c jigsaw roots ncsa httpd order web server recognize ssi-enabled html file therefore carry instructions either filename end special extension default codice_2 codice_3 codice_4 server configured allow set execution bit file simple programming language ssi supports one type text control flow rather simple choice supported loops natively supported done recursion using include using http redirect simple design language makes easier learn use server-side scripting languages complicated server-side processing often done one feature-rich programming languages ssi turing complete ssi simple syntax codice_5 directives placed html comments ssi enabled users see ssi directives page unless look source note syntax allow spaces leading directive apache tutorial ssi stipulates format requires space character -- closes element web page containing daily quotation could include quotation placing following code file web page one change codice_6 file pages include file display latest daily quotation inclusion limited files may also text output program value system variable current time following ssi directives times ncsa httpd 1990s supported implementations control directives later added ssi include ubiquitous if-elif-else-endif flow control variable writing well exotic features like loops found implementations
[ 4485, 1802, 1803, 10506, 9229, 1556, 5012, 7965, 8350, 11167, 7457, 10145, 10020, 3237, 7847, 7338, 9387, 7212, 10026, 10284, 4658, 2485, 1468, 4797, 10622, 8644, 1223, 10953, 11466, 3920, 4439, 5593, 5849, 6366, 225, 865, 4837, 7784, 9834,...
None
11,155
2
The_Code_(2001_film):code 2001 film code english-language finnish documentary linux 2001 featuring influential people free software movement free open-source advocates programmers film
[ 2560, 5644, 5139, 9237, 10780, 4637, 3618, 9257, 1584, 9266, 10817, 8772, 2134, 3162, 2658, 6244, 6763, 11391, 7812, 8326, 10382, 657, 2195, 6808, 9882, 6301, 1694, 10933, 4803, 6352, 3289, 3802, 10464, 1761, 4841, 7920, 7938, 4360, 1813, ...
None
11,156
7
Cloud_robotics:cloud robotics cloud robotics field robotics attempts invoke cloud technologies cloud computing cloud storage internet technologies centred benefits converged infrastructure shared services robotics connected cloud robots benefit powerful computation storage communication resources modern data center cloud process share information various robots agent machines smart objects humans etc. humans also delegate tasks robots remotely networks cloud computing technologies enable robot systems endowed powerful capability whilst reducing costs cloud technologies thus possible build lightweight low cost smarter robots intelligent brain cloud brain consists data center knowledge base task planners deep learning information processing environment models communication support etc cloud robots potentially least six significant components funded european union seventh framework programme research technological development projects specifically explore field cloud robotics goal roboearth allow robotic systems benefit experience robots paving way rapid advances machine cognition behaviour ultimately subtle sophisticated human-machine interaction roboearth offers cloud robotics infrastructure roboearth ’ world-wide-web style database stores knowledge generated humans – robots – machine-readable format data stored roboearth knowledge base include software components maps navigation e.g. object locations world models task knowledge e.g. action recipes manipulation strategies object recognition models e.g. images object models roboearth cloud engine includes support mobile robots autonomous vehicles drones require lots computation navigation rapyuta open source cloud robotics framework based roboearth engine developed robotics researcher ethz within framework robot connected rapyuta secured computing environment rectangular boxes giving ability move heavy computation cloud addition computing environments tightly interconnected high bandwidth connection roboearth knowledge repository myrobots service connecting robots intelligent devices internet regarded social network robots smart objects i.e facebook robots socialising collaborating sharing robots benefit interactions sharing sensor information giving insight perspective current state ros robot operating system provides eco-system support cloud robotics ros flexible distributed framework robot software development collection tools libraries conventions aim simplify task creating complex robust robot behaviour across wide variety robotic platforms library ros pure java implementation called rosjava allows android applications developed robots since android booming market billion users would significant field cloud robotics davinci project proposed software framework seeks explore possibilities parallelizing robotics algorithms map/reduce tasks hadoop project aims build cloud computing environment capable providing compute cluster built commodity hardware exposing suite robotic algorithms saas share data co-operatively across robotic ecosystem initiative available publicly c2ro c2ro cloud robotics platform processes real-time applications collision avoidance object recognition cloud previously high latency times prevented applications processed cloud thus requiring on-system computational hardware e.g graphics processing unit gpu c2ro published peer-reviewed paper ieee pimrc17 showing platform could make autonomous navigation ai services available robots- even limited computational hardware e.g raspberry pi cloud c2ro eventually claimed first platform demonstrate cloud-based slam simultaneous localization mapping robobusiness september 2017 noos cloud robotics service providing centralised intelligence robots connected service went live december 2017 using noos-api developers could access services computer vision deep learning slam noos developed maintained ortelio ltd. rocos centralized cloud robotics platform provides developer tooling infrastructure build test deploy operate automate robot fleets scale founded october 2017 platform went live january 2019 though robots benefit various advantages cloud computing cloud solution robotics research development cloud robotics following potential issues challenges term cloud robotics first appeared public lexicon part talk given james kuffner 2010 ieee/ras international conference humanoid robotics entitled cloud-enabled robots early days robot development common computation done computer separated actual robot mechanism connected wires power control wireless communication technology developed new forms experimental remote brain robots developed controlled small onboard compute resources robot control safety wirelessly connected powerful remote computer heavy processing term cloud computing popularized launch amazon ec2 2006 marked availability high-capacity networks low-cost computers storage devices well widespread adoption hardware virtualization service-oriented architecture correspondence popular science july 2006 kuffner wrote robot programmed successfully learned perform task could share model relevant data cloud-connected robots publications events related cloud robotics chronological order
[ 2818, 4194, 4964, 5956, 4107, 3412, 7802, 8446 ]
None
11,157
4
Disaster_recovery_and_business_continuity_auditing:disaster recovery business continuity auditing given organizations increasing dependency information technology run operations business continuity planning covers entire organization disaster recovery focuses auditing documents covering organization business continuity disaster recovery plans provides third-party validation stakeholders documentation complete contain material misrepresentations lack completeness result overlooking secondary effects vastly increased work-at-home overloads incoming recovery site telecommunications capacity bi-weekly payroll critical within first 48 hours causing perceived problems ever recovering complicated governmental possibly union reaction often used together terms business continuity disaster recovery different business continuity refers ability business continue critical functions business processes occurrence disaster whereas disaster recovery refers specifically information technology data-centric functions business subset business continuity primary objective protect organization event part operations and/or computer services rendered partially completely unusable minimizing downtime data loss disaster recovery measured terms two concepts auditor examines assess maximize effectiveness disaster recovery plans effective updated frequently adequate records need retained organization auditor examines records billings contracts verify records kept one record current list organization hardware software vendors list made periodically updated reflect changing business practice copies stored site made available accessible require auditor tests procedures used meet objective determine effectiveness disaster recovery plan drp documented process set procedures execute organization disaster recovery processes recover protect business infrastructure event disaster comprehensive statement consistent actions taken disaster disaster could natural environmental man-made man-made disasters could intentional example act terrorist unintentional accidental breakage man-made dam although one-size-fits-all plan three basic strategies latter may include securing proper insurance policies holding lessons learned brainstorming session business continuity plan bcp comprehensive organizational plan includes disaster recovery plan consists five component plans first three business resumption occupant emergency continuity operations plans deal infrastructure incident management plan imp deal infrastructure since establishes structure procedures address cyber attacks organization ’ systems generally represent agent activating disaster recovery plan leaving disaster recovery plan bcp component interest like every insurance plan benefits obtained proper planning including according geoffrey h. wold disaster recovery journal entire process involved developing disaster recovery plan consists 10 steps initial testing plan done sections normal business hours minimize disruptions subsequent tests occur normal business hours types tests include checklist tests simulation tests parallel tests full interruption tests due high cost various plans without critics dell identified five common mistakes organizations often make related bcp/dr planning auditor determines adequacy company insurance coverage particularly property casualty insurance review company insurance policies research among items auditor needs verify scope policy including stated exclusions amount coverage sufficient cover organization ’ needs policy current force auditor also ascertains review ratings assigned independent rating agencies insurance company companies providing coverage financial viability cover losses event disaster effective dr plans take account extent company responsibilities entities ability fulfill commitments despite major disaster good dr audit include review existing moa contracts ensure organization legal liability lack performance event disaster unusual circumstance minimized agreements pertaining establishing support assisting recovery entity also outlined techniques used evaluating area include examination reasonableness plan determination whether plan takes factors account verification contracts agreements reasonableness documentation outside research auditor must verify planning ensures management recovery team effective communication hardware contact information internal communication external issues business partners key customers audit techniques include procedures sustain staff round-the clock disaster recovery effort included good disaster recovery plan procedures stocking food water capabilities administering cpr/first aid dealing family emergencies clearly written tested generally accomplished company good training programs clear definition job responsibilities review readiness capacity plan often includes tasks inquires personnel direct physical observation examination training records certifications auditor must review procedures take account possibility power failures situations non-it nature
[ 9184, 6020, 5636, 3366, 6280, 3692, 6514, 10711, 1400, 7352 ]
Test
11,158
4
NTP_server_misuse_and_abuse:ntp server misuse abuse ntp server misuse abuse covers number practices cause damage degradation network time protocol ntp server ranging flooding traffic effectively ddos attack violating server access policy ntp rules engagement one incident branded ntp vandalism open letter poul-henning kamp router manufacturer d-link 2006 term later extended others retroactively include incidents however evidence problems deliberate vandalism usually caused shortsighted poorly chosen default configurations deliberate form ntp server abuse came note end 2013 ntp servers used part amplification denial-of-service attacks ntp servers would respond single monlist udp request packet packets describing 600 associations using request spoofed ip address attackers could direct amplified stream packets network resulted one largest distributed denial-of-service attacks known time troublesome problems involved ntp server addresses hardcoded firmware consumer networking devices major manufacturers oems produced hundreds thousands devices using ntp coupled customers almost never upgrading firmware devices ntp query storms problems persist long devices service one particularly common ntp software error generate query packets short less five second intervals response received might technically reasonable send initial packets short intervals essential health network client connection re-attempts generated logarithmically exponentially decreasing rates prevent denial service protocol exponential logarithmic backdown applies connectionless protocol extension many portions connection-based protocols examples backing method found tcp specification connection establishment zero-window probing keepalive transmissions october 2002 one earliest known cases time server misuse resulted problems web server trinity college dublin traffic ultimately traced misbehaving copies program called tardis thousands copies around world contacting web server obtaining timestamp via http ultimately solution modify web server configuration deliver customized version home page greatly reduced size return bogus time value caused clients choose different time server updated version tardis later released correct problem first widely known case ntp server problems began may 2003 netgear hardware products flooded university wisconsin–madison ntp server requests university personnel initially assumed malicious distributed denial service attack took actions block flood network border rather abating ddos attacks flow increased reaching 250,000 packets-per-second 150 megabits per second june subsequent investigation revealed four models netgear routers source problem found sntp simple ntp client routers two serious flaws first relies single ntp server university wisconsin–madison whose ip address hard-coded firmware second polls server one second intervals receives response total 707,147 products faulty client produced netgear released firmware updates affected products dg814 hr314 mr814 rp614 query netgear servers poll every ten minutes give five failures update fixes flaws original sntp client solve larger problem consumers never update router firmware particularly device seems operating properly university wisconsin–madison ntp server continues receive high levels traffic netgear routers occasional floods 100,000 packets-per-second netgear donated 375,000 university wisconsin–madison division information technology help identifying flaw also 2003 another case forced ntp servers australian commonwealth scientific industrial research organisation csiro national measurement laboratory close public traffic shown come bad ntp implementation smc router models ip address csiro server embedded firmware smc released firmware updates products 7004vbr 7004vwbr models known affected 2005 poul-henning kamp manager danish stratum 1 ntp server available general public observed huge rise traffic discovered 75 90 originating d-link router products stratum 1 ntp servers receive time signal accurate external source gps receiver radio clock calibrated atomic clock convention stratum 1 time servers used applications requiring extremely precise time measurements scientific applications stratum 2 servers large number clients home networking router meet either criteria addition kamp server access policy explicitly limited servers directly connected danish internet exchange dix direct use stratum 1 servers d-link routers resulted huge rise traffic increasing bandwidth costs server load many countries official timekeeping services provided government agency nist u.s. since danish equivalent kamp provides time service pro bono publico return dix agreed provide free connection time server assumption bandwidth involved would relatively low given limited number servers potential clients increased traffic caused d-link routers dix requested pay yearly connection fee approximately kamp contacted d-link november 2005 hoping get fix problem compensate time money spent tracking problem bandwidth charges caused d-link products company denied problem accused extortion offered amount compensation kamp asserted cover expenses 7 april 2006 kamp posted story website story picked slashdot reddit news sites going public kamp realized d-link routers directly querying stratum 1 time servers violating access policies least 43 process april 27 2006 d-link kamp announced amicably resolved dispute 20 years eth zurich provided open access time server swisstime.ethz.ch operational time synchronization due excessive bandwidth usage averaging upwards 20 gb day become necessary direct external usage public time server pools ch.pool.ntp.org misuse caused mostly it-providers synchronizing client infrastructures made unusually high demands network traffic thereby causing eth take effective measures availability swisstime.ethz.ch changed closed access access server blocked entirely ntp protocol december 2016 operator community ntppool.org noticed significant increase ntp traffic starting december 13 investigation showed snapchat application running ios prone querying ntp servers hardcoded third party ios ntp library request snapchat-owned domain followed ntp request flood snap inc. contacted developers resolved problem within 24 hours notification update application apology assist dealing load generated snap also contributed timeservers australia south america ntp pools positive side effect ntp library used open source error-prone default settings improved feedback ntp community firmware tp-link wi‑fi extenders 2016 2017 hardcoded five ntp servers including fukuoka university japan australia new zealand ntp server pools would repeatedly issue one ntp request five dns requests every five seconds consuming 0.72 gb per month per device excessive requests misused power internet connectivity check displayed device connectivity status web administration interface issue acknowledged tp-link branch japan pushed company redesign connectivity test issue firmware updates addressing issue affected devices affected devices unlikely install new firmware wifi extenders tp-link install firmware updates automatically notify owner firmware update availability tp-link firmware update availability also varies country even though issue affects wifi range extenders sold globally servers fukuoka university reported shutdown sometime february april 2018 removed ntp public time server lists incidents became clear apart stating server access policy technical means enforcing policy needed one mechanism provided extending semantics reference identifier field ntp packet stratum field 0 january 2006 rfc 4330 published updating details sntp protocol also provisionally clarifying extending related ntp protocol areas sections 8 11 rfc 4330 particular relevance topic kiss-o'-death packet good network citizen best practices security considerations section 8 introduces kiss-o'-death packets new requirements ntp protocol work retroactively old clients implementations earlier version protocol recognize kod act time good technical means counteract misuse ntp servers 2015 possible attacks network protocol time network time security ntp internet draft codice_1 proposed using transport layer security implementation june 21 2019 cloudflare started trial service around world based previous internet draft
[ 2947, 8998, 10344, 2409, 10924, 9306, 8956, 8671 ]
Test
11,159
4
RiskIQ:riskiq riskiq cyber security company based san francisco california provides cloud-based software service saas organizations detect phishing fraud malware online security threats company co-founded 2009 lou manousos chris kiernan david pon received 10 million series funding summit partners february 2013 25 million series b funding battery ventures may 2014 riskiq member cloud security alliance csa isaca riskiq monitors advertising networks malware malvertising spyware also provides mobile app security services may 2018 standard bank deployed riskiq software automate threat analysis brand infringement cybercrime web-based attacks digital presence
[ 10717, 4194, 997, 7304, 467, 10392, 7515, 8413 ]
Test
11,160
9
Link_time:link time computer science link time refers period time creation computer program linker applied program link time occurs compile time runtime program executed common speak link time operations operations performed linker link time requirements programming language requirements must met compiled source code successfully linked operations performed link time usually include fixing addresses externally referenced objects functions various kinds cross module checks e.g type checks externally visible identifiers languages instantiation templates optimizing compilers delay code generation link time information complete program available resolving external variables program also done link time definition programming language may specify link time requirements source code must meet successfully compiled e.g maximum number characters externally visible identifier must considered significant programming languages may necessary compilation linking occur runtime
[ 10145, 1922, 8262, 6664, 2386, 2804, 2620, 10013 ]
Test
11,161
5
Apache_Avro:apache avro avro row-oriented remote procedure call data serialization framework developed within apache hadoop project uses json defining data types protocols serializes data compact binary format primary use apache hadoop provide serialization format persistent data wire format communication hadoop nodes client programs hadoop services avro uses schema structure data encoded two different types schema languages one human editing avro idl another machine-readable based json similar thrift protocol buffers require running code-generation program schema changes unless desired statically-typed languages apache spark sql access avro data source avro object container file consists file header consists data blocks avro specifies two serialization encodings binary json applications use binary encoding smaller faster debugging web-based applications json encoding may sometimes appropriate avro schemas defined using json schemas composed primitive types null boolean int long float double bytes string complex types record enum array map union fixed simple schema example data avro might stored corresponding schema meaning serialized item read without knowing schema ahead time serialization import avro.schema avro.datafile import datafilereader datafilewriter avro.io import datumreader datumwriter schema avro.schema.parse open user.avsc rb .read need know schema write according 1.8.2 apache avro writer datafilewriter open users.avro wb datumwriter schema writer.append name alyssa favorite_number 256 writer.append name ben favorite_number 7 favorite_color red writer.close file users.avro contain schema json compact binary representation data od -v -t x1z users.avro 0000000 4f 62 6a 01 04 14 61 76 72 6f 2e 63 6f 64 65 63 obj ... avro.codec 0000020 08 6e 75 6c 6c 16 61 76 72 6f 2e 73 63 68 65 6d .null.avro.schem 0000040 61 ba 03 7b 22 74 79 70 65 22 3a 20 22 72 65 63 a.. type rec 0000060 6f 72 64 22 2c 20 22 6e 61 6d 65 22 3a 20 22 55 ord name u 0000100 73 65 72 22 2c 20 22 6e 61 6d 65 73 70 61 63 65 ser namespace 0000120 22 3a 20 22 65 78 61 6d 70 6c 65 2e 61 76 72 6f example.avro 0000140 22 2c 20 22 66 69 65 6c 64 73 22 3a 20 5b 7b 22 fields 0000160 74 79 70 65 22 3a 20 22 73 74 72 69 6e 67 22 2c type string 0000200 20 22 6e 61 6d 65 22 3a 20 22 6e 61 6d 65 22 7d name name 0000220 2c 20 7b 22 74 79 70 65 22 3a 20 5b 22 69 6e 74 type int 0000240 22 2c 20 22 6e 75 6c 6c 22 5d 2c 20 22 6e 61 6d null nam 0000260 65 22 3a 20 22 66 61 76 6f 72 69 74 65 5f 6e 75 e favorite_nu 0000300 6d 62 65 72 22 7d 2c 20 7b 22 74 79 70 65 22 3a mber type 0000320 20 5b 22 73 74 72 69 6e 67 22 2c 20 22 6e 75 6c string nul 0000340 6c 22 5d 2c 20 22 6e 61 6d 65 22 3a 20 22 66 61 l name fa 0000360 76 6f 72 69 74 65 5f 63 6f 6c 6f 72 22 7d 5d 7d vorite_color 0000400 00 05 f9 a3 80 98 47 54 62 bf 68 95 a2 ab 42 ef ... gtb.h ... b. 0000420 24 04 2c 0c 41 6c 79 73 73 61 00 80 04 02 06 42 ..alyssa ... b 0000440 65 6e 00 0e 00 06 72 65 64 05 f9 a3 80 98 47 54 en ... red ... gt 0000460 62 bf 68 95 a2 ab 42 ef 24 b.h ... b. 0000471 deserialization reader datafilereader open users.avro rb datumreader need know schema read user reader reader.close outputs though theoretically language could use avro following languages apis written addition supporting json type protocol definitions avro includes experimental support alternative interface description language idl syntax known avro idl previously known genavro format designed ease adoption users familiar traditional idls programming languages syntax similar c/c++ protocol buffers others apache avro logo defunct british aircraft manufacturer avro originally a.v roe company football team avro f.c uses logo
[ 9344, 8582, 10377, 8460, 7567, 1296, 6161, 1047, 1913, 8217, 1435, 6555, 8860, 9245, 6433, 3876, 3877, 10661, 11303, 5677, 1327, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 8644, 11332, 1222, 1991, 4294, 7750, 5066, ...
Test
11,162
4
VPN_blocking:vpn blocking vpn blocking technique used block encrypted protocol tunneling communications methods used virtual private network vpn systems often used large organizations national governments corporations act tool computer security internet censorship preventing use vpns bypass network firewall systems blocking vpn access done different ways ports used common vpn tunneling protocols pptp l2tp establish connections transfer data closed system administrators prevent use certain networks similarly website prohibit access content blocking access ip addresses known belong vpn providers governments known block access overseas ip addresses since vpn use involve connecting remote hosts operate government jurisdiction organizations ramped efforts block vpn access bypasses firewalls vpn providers responded utilizing sophisticated techniques make connections less conspicuous instance chinese government began using deep packet inspection identify vpn protocols golden frog began scrambling openvpn packet metadata popular vyprvpn service attempt avoid detection chinese internet users started reporting unstable connections may 2011 using vpns connect overseas websites services apple app store universities businesses began issuing notices stop using tools circumvent firewall late 2012 companies providing vpn services claimed great firewall china became able learn discover block encrypted communications methods used number different vpn systems 2017 telecommunications carriers china instructed government block individuals use vpns february 2018 government iran began blocking access non-government sanctioned vpns march 2013 months prior 2013 elections prosecute users violating state laws take offenders national courts supervision judiciary service use vpns approved government reportedly led surveillance inspection private data july 2017 state duma passed bill requiring internet providers block websites offer vpns order prevent spreading extremist materials internet.. unclear exactly russia plans implement new regulation though seems like federal security service fsb isps tasked identifying cracking vpns russian internet users also reported block expressvpn vpn service november 2017 bbc made clear russia banned vpn usage entirely vpn usage banned attempting access sites already blocked roskomnadzor russia governing body telecommunications mass media communications using vpn business personal reasons access legal sites russia permitted government syria activated deep packet inspection uprising 2011 order block vpn connections censorship targeted different vpn protocols like openvpn l2tp pptp government egypt activated deep packet inspection egyptian revolution 2011 order block vpn connections block access objection media newspaper sites censorship targeted different vpn protocols like openvpn l2tp ikev2 pptp sites government turkey using deep packet inspection detecting possible openvpn connections attempt stop unauthorized access users outside us hulu began blocking users accessing site ip addresses linked vpn services april 2014 however company also restricted access legitimate u.s.-based users using vpns security reasons vpn providers vikingvpn nordvpn torguard stated would seek ways address issue customers speaking directly hulu resolution rolling dedicated ip addresses respectively netflix came pressure major film studios september 2014 block vpn access 200,000 australian subscribers using netflix despite available yet australia vpn access netflix like streaming services allowed users view content securely country netflix users also used vpns means bypassing throttling efforts made service providers verizon also important note vpns might slow internet connection trying stream netflix however cases using vpn might improve connection isp throttling netflix traffic june 2018 netflix vpn proxy ban still active ceo netflix reed hastings made comment 2016 vpn market whole “ ’ small quite vocal minority ’ really inconsequential us. ” bbc started blocking users connecting via vpns october 2015 bbc able detect vpn connections monitoring number simultaneous connections coming ip address number connections ip becomes abnormal bbc block future connections offending ip address iplayer remains unavailable uk tv licence holders connecting eu countries bbc said interested able allow uk licence fee payers access bbc iplayer holiday welcome european union regulation help make feasible wikipedia often blocks editing vpns many vpns use open proxies wikipedia allow open proxies however still view articles vpns use proxies use closed proxies usually still edit wikipedia
[ 10889, 9868, 9722, 8211, 3742, 8998, 4268, 10417, 7859, 2228, 8386, 2884, 5959, 8265, 11468, 7376, 11606, 9048, 2136, 6490, 5084, 9318, 8039, 9063, 11248, 5749, 3322, 2558 ]
Test
11,163
4
GTUBE:gtube gtube generic test unsolicited bulk email 68-byte test string used test anti-spam systems particular based spamassassin spamassassin carries antispam score 1000 default would sufficient trigger installation contents string follows placed message body rfc 5322 compliant email message without linebreaks whitespaces exist varieties notably naitube carry variable weight gtphish trigger specifically phishing mail used mcafee implementation spamassassin
[ 704, 898, 37, 4294, 7739, 7515, 2588 ]
Validation
11,164
3
Data_portability:data portability data portability concept protect users data stored silos walled gardens incompatible one another i.e closed platforms thus subjecting vendor lock-in data portability requires common technical standards facilitate transfer one data controller another thus promoting interoperability data portability applies personal data involves access personal data without implying data ownership per se global level proponents seeing protection digital data human right thus emerging civil society draft declaration one finds mention following concepts statutes right privacy internet right digital data protection rights consumer protection internet united nations guidelines consumer protection regional level least three main jurisdictions data rights seen differently china/india united states european union latter personal data given special protection 2018 general data protection regulation gdpr gdpr thus became fifth 24 types legislation listed annex 1 table existing proposed european directives regulations relation data personal data basis behavioral advertising early 21st century value began grow exponentially least measured market capitalization major platforms holding personal data respective users european union regulators reacted perceived power imbalance platforms users although much still hinges terms consent given users platforms concept data portability comprises attempt correct perceived power imbalance introducing element competition allowing users choose among platforms right data portability laid european union general data protection regulation gdpr passed april 2016 regulation apply data processors whether inside outside eu process data individuals physically located within eu member state earlier european data protection supervisor stated data portability could let individuals benefit value created use personal data european-level article 29 data protection working party held consultation english lasting end january 2017 guidelines faq right data portability contain call action april 2017 new guidelines published article 29 working party website french national data supervisor cnil hosted discussion french current participants offer opinions legislation provides benefits companies many users although united kingdom voted withdraw eu intends incorporate much gdpr legislation include data portability ... gdpr contains noteworthy innovations – instance… introduction new right data portability likewise switzerland nation-state related eu bilateral basis efta member state trend moving direction swiss view officially published march 2018 document pdf cooperative proposed right data portability anchored constitution swiss confederation law passed includes data portability cooperative called midata.coop besides proposing legislation offer users place store data longer term swiss may consider data portability gdpr given gdpr raise compliance costs eu-based companies unlikely eu would tolerate situation third-party countries swiss companies would held standard order keep competition fair legal terms involved adequacy reciprocity always tricky legislators regulate right level precision everyone understands technology evolve faster law far european union formalized expectations around data portability requiring data structured commonly used machine-readable interoperable format touches least two distinct technical requirements effective interoperability list rights grown data portability right slightly different right access personal data see gdpr seventh item list cited immediately right access mandates data subject gets see personal data old eu data protection directive used require explicitly cases data provided intelligible form interpreted far human readable requirement still somewhat present eu general data protection regulation implicitly conjunction recital_ law since right portability mostly concerned reuse services i.e likely automated could human readable raw format would inappropriate effective data portability intermediate level might need sought addition gdpr limits scope data portability cases processing made basis either consent data subject performance contract data portability right related right explanation i.e automated decisions made legal effect significant impact individual data subjects display algorithm one way decision tree right however found useful empirical study right explanation related right evaluated basis automated processing shown last item list shown gabel hickman includes decisions based profiling right included eu data protection directive 1995 much enforcement followed article wired emphasised poignancy discussion issue discussed bygrave hildebrandt claimed one important transparency rights era machine learning big data contrary hildebrandt high expectations 2012 four years later many revisions gdpr text finalized three well-known authors contest whether right explanation still exists gdpr see united states description related developments seminal book law professor frank pasquale relevant passages reviewed electronic privacy information center epic even u.s. defense advanced research projects agency darpa explainable ai xai program cited critically blogger artur kiulian several papers published topics 2016 first goodman flaxman outlines development right explanation pasquale think approach goes far enough stated blog entry london school economics lse fact lse whole series algorithmic accountability one entry feb. 2016 notable ones joshua kroll mireille hildebrandt another 2016 paper one published katarinou et al. includes remarks right appeal individuals would right appeal machine decision made human third 2016 paper one co-authored mittelstadt et al. maps literature relates gdpr pages 13–14 fourth paper one co-authored wachter mittelstadt floridi refutes idea right might included gdpr proposes limited ‘ right informed ’ instead calls creation agency implement transparency requirement paper edwards veale claims right unlikely apply cases 'algorithmic harms attracting recent media attention insufficient attention paid computer science literature explanation gdpr provisions data protection impact assessments data portability might help almost two years later paper appeared challenges earlier papers especially wachter mittelstadt floridi sides atlantic recent activity pertaining ongoing debate early 2016 experts artificial intelligence uk government officials met number meetings developed data science ethical framework november 7 2016 event held brussels organized mep marietje schaake european parliament described danah boyd eleven days later new york university conference fairness accountability transparency machine learning principles accountable algorithms social impact statement algorithms articulated placed online discussion mid-december ieee came document whose editing backed public comments invited march 2017 ethically aligned design later 2017 data portability analysed professors data protection central innovation new gdpr
[ 2948, 9901, 9967, 7897, 7359 ]
None
11,165
4
Warchalking:warchalking warchalking drawing symbols public places advertise open wi-fi network inspired hobo symbols warchalking marks conceived group friends june 2002 publicised matt jones designed set icons produced downloadable document containing within days jones publishing blog entry warchalking articles appeared dozens publications stories appeared several major television news programs around world word formed analogy wardriving practice driving around area car detect open wi-fi nodes term turn based wardialing practice dialing many phone numbers hoping find modem found wi-fi node warchalker draws special symbol nearby object wall pavement lamp post offering wi-fi service might also draw symbol advertise availability wi-fi location whether commercial personal
[ 1121, 10021, 7222, 6712, 61 ]
Validation
11,166
4
Norman_Safeground:norman safeground norman safeground develops sells data security software anti-virus anti-spam anti-spyware backup local support company headquarters oslo norway norman safeground global partner-network main market europe norman competes antivirus industry avira bullguard f-secure frisk kaspersky mcafee panda security sophos symantec trend micro among others norman founded 1 october 1984 oslo company pioneer proactive security software solutions forensics malware tools utilizing patented sandbox technology 1995 norman acquired 50 percent ibas norwegian data recovery company company listed oslo stock exchange 11 august 1997 norman asa bought remaining 50 percent stake ibas 1999 2004 two companies de-merged ibas listed separate entity oslo stock exchange norman de-listed oslo stock exchange october 2009 acquired private equity fund fsn capital partners late 2012 norman asa split two companies br norman safeground focusing consumers smes norman shark focusing enterprise market intrusion prevention solutions services november 2014 norman safeground acquired avg technologies
[ 3201, 156, 11166, 2213, 3366, 2601, 704, 9537, 7362, 202, 1994, 2005, 1242, 7515, 9055, 9569, 4972, 4464, 127 ]
Test
11,167
4
SuEXEC:suexec apache suexec feature apache web server allows users run common gateway interface cgi server side includes ssi applications different user normally web server processes run default web server user often wwwrun www-data apache nobody suexec feature consists module web server binary executable acts wrapper suexec introduced apache 1.2 often included default apache package provided linux distributions client requests cgi suexec activated call suexec binary wraps cgi scripts executes user account server process virtual host defined virtual host directive additionally suexec perform multi-step check executed cgi ensure security server including path-checks limit permitted commands etc user alice website including common gateway interface script files codice_1 common web root directory name folder accessed codice_2 user bob views alice webpage requires apache run one cgi scripts instead running scripts wwwrun results need scripts readable executable wwwrun group file owned group users otherwise scripts codice_3 wrapped using suexec run alice user id resulting higher security eliminating need make scripts readable executable users everyone wwwrun group instead alice needs able run script
[ 225, 11154, 2485, 865 ]
Validation
11,168
4
Kronos_(malware):kronos malware kronos type banking malware first reported 2014 sold 7,000 similar zeus focused stealing banking login credentials browser sessions 2015 attacks focused british banks august 2017 british security researcher marcus hutchins aka 'malwaretech previously notable involvement stopping may 2017 wannacry ransomware attack arrested fbi whilst visiting united states alleged created software 2014 sold 2015 via alphabay forums
[ 10297, 7515, 9375 ]
Test
11,169
3
ES_PEVM:es pevm es pevm ес пэвм soviet clone ibm pc 1980s es pevm models lineup also included analogues ibm pc xt ibm pc ibm xt/370 computers software adapted minsk belarus scientific research institute electronic computer machines нии эвм manufactured minsk well minsk production group computing machinery минское производственное объединение вычислительной техники мпо вт first models es pevm es-1840 es-1841 es-1842 unlike ibm pc two units system unit floppy drives unit models used backplane instead main board although system bus compatible isa bus used different type connector ibm pc expansion cards could installed es pevm later models es-1843 es-1849 etc fully compatible ibm pc xt ibm pc unlike ibm pc using intel 8088 processor early es pevm models used k1810vm86 processor 16-bit bus clock frequency 5 mhz processor placed separate board early versions board socket floating point coprocessor following boards produced es-1840 es-1841 volume production number models computers shipped alphados entirely russified version ms-dos/pc-dos 2.x 3.x commands entered russian example сменкат chdir files file extensions also russian атриб.исп attrib.exe operating system used main code page hardwired display rom compatible neither cp 866 cp 855 although partially iso/iec 8859-5 early models es pevm prone failures due manufacturing defects mean time failures mtbf around 350 hours
[ 9861, 1515, 6415, 5368, 3098 ]
Test
11,170
4
Caller_ID:caller id caller id caller identification cid also called calling line identification clid calling line identification cli calling number delivery cnd calling number identification cnid calling line identification presentation clip call display telephone service available analog digital telephone systems including voip transmits caller telephone number called party telephone equipment call set caller id service may include transmission name associated calling telephone number service called cnam service first defined 1993 international telecommunication union telecommunication standardization sector itu-t recommendation q.731.3 recipient may inspect information answering call display telephone set separately attached device digital displays cable television sets telephone television service provided vendor caller id information may inaccurate false forged hence caller id information fully relied upon identify caller.. root cause lack authenticity accountability transmission telephone identities countries terms caller display calling line identification presentation clip call capture calling line identity used call display predominant marketing name used canada although customers still refer colloquially caller id idea cnid service pots subscribers originated automatic number identification ani part toll free number service united states however cnid ani thing ani originally term given system identified telephone number placing call non-electronic central office switch previous calling number could identified electronically caller id made two separate pieces information calling number billing subscriber name available call made given name name passed number different methods example caller name may datafilled originating switch case sent along number commonly database accessed receiving switch order match number name name exist city state province designation may sent databases may shared among several companies paying every time name extracted reason mobile phone callers appear wireless caller location phone number registered e.g cell phone ga cell phone registered georgia u.s.a. vary based company owns block numbers provider number may ported additionally nothing ensures number sent switch actual number call originated telephone switch initiating call may send digit string desired caller id telephone switch therefore operating entity must also trusted provide secure authentication displayed caller id also depends equipment originating call call originates pots line standard loop start line caller id provided service provider local switch since network connect caller callee phone answered generally caller id signal altered caller service providers however allow caller block caller id presentation vertical service code *67 call placed behind private branch exchange pbx options typical telephony environment pbx connects local service provider primary rate interface pri trunks generally although absolutely service provider simply passes whatever calling line id appears pri access trunks transparently across public switched telephone network pstn opens opportunity pbx administrator program whatever number choose external phone number fields ip phone services itsps internet telephony service providers support pstn gateway installations throughout world gateways egress calls local calling area thus avoiding long distance toll charges itsps also allow local user number located foreign exchange new york caller could los angeles number example user places call calling line id would los angeles number although actually located new york allows call return without incur long distance calling charges cellphones biggest issue appears passing calling line id information network cellphone companies must support interconnecting trunks significant number wireline pstn access carriers cli localisation describes process presenting localised cli calling line identity recipient telephone call cli localisation utilised various organisations including call centres debt collectors insurance companies cli localisation allows companies increase contact rate increasing chance called party answer phone call localised cli displayed called party device call perceived local recognisable caller rather withheld unknown premium rate number presented telephone number adjusted depending area code dialed number 1968 theodore george ted paraskevakos working communications engineer sita athens greece began developing system automatically identify telephone caller call recipient several attempts experiments developed method caller number transmitted receiver device method basis modern-day caller id technology 1969 1975 paraskevakos issued twenty separate patents related automatic telephone line identification since significantly predated similar patents appear prior art later united states patents issued kazuo hashimoto carolyn a. doughty 1971 paraskevakos working boeing huntsville alabama constructed reduced practice transmitter receiver representing world first prototypes caller-identification devices installed peoples telephone company leesburg alabama demonstrated several telephone companies original historic working models still possession paraskevakos patents related devices paraskevakos also proposed send alphanumeric information caller name receiving apparatus make banking telephone feasible also proposed identify calling telephone special code e.g. pf public phone ho home phone office phone pl police may 1976 kazuo hashimoto prolific japanese inventor one thousand patents worldwide first built prototype caller id display device could receive caller id information work caller id devices early prototypes received smithsonian institution national museum american history 2000 u.s. patent 4,242,539 filed originally may 8 1976 resulting patent re-examined patent office successfully licensed major telecommunications computer companies world initially operating telephone companies wanted caller id function performed central office voice announcement charged per-call basis john harris employee northern telecom telephone set manufacturing division london ontario promoted idea caller id telephone set display telephone coded eccs enhanced custom calling services video prototype used leverage feature central office telephone set 1977 brazilian inventor valdir bravo salinas filed patent application caller id device brazilian patent trademarks office inpi patent issued 1982 patent pi7704466 first patent ever issued caller id equipment brazil later 1980 two brazilian inventors joão da cunha doya nélio josé nicolai filed different patent applications caller id devices doya ’ application filed may 2 1980 issued patent pi8003077 nicolai ’ application filed july 2 1980 rejected copy salinas invention 1981 another application caller id equipment filed inpi josé daniel martin catoira afonso feijó da costa ribeiro neto application granted patent issued patent pi8106464 first market trial caller id custom local area signaling services conducted bell atlantic may 1984 bell communications research bellcore named service caller id regional bell operating companies later adopted name eventually became generally accepted name united states planning trial initiated team bell laboratories western electric bell system divestiture participation bell atlantic purpose trials assess revenue potential services depend deployment common channel signaling network needed transmit calling number originating terminating central offices trial results analyzed bellcore members original team 1987 bell atlantic verizon communications conducted another market trial hudson county new jersey followed limited deployment bellsouth first company deploy caller id december 1988 memphis tennessee full deployment nine-state region next four years bell atlantic second local telephone company deploy caller id new jersey hudson county followed us west communications centurylink 1989 1995 bellcore released another type modulation similar bell 202 became possible transmit caller id information even provide call-disposition options user already telephone service became known markets call waiting id combined call-disposition options call waiting deluxe technically referred analog display services interface call waiting deluxe bellcore telcordia technologies term type ii caller id disposition options class-based pots-telephone calling feature works combining services call waiting caller id also introduces options feature conjunction certain screen-based telephones capable equipment gives telephone user option data checksum united states caller id information sent called party telephone switch analog data stream similar data passed two modems using bell 202 modulation first second rings telephone unit still hook telephone call answered quickly first ring caller id information transmitted recipient two types caller id number name+number number-only caller id called single data message format sdmf provides caller telephone number date time call name+number caller id called multiple data message format mdmf addition information provided sdmf format also provide directory listed name particular number caller id readers compatible mdmf also read simpler sdmf format sdmf caller id reader recognize mdmf data stream act caller id information present e.g line equipped caller id instead sending caller id first second ring systems uk use line reversal announce caller id caller id signals simply sent without announcement instead bell 202 european alternative v.23 sometimes used without 75-baud reverse channel data sent using dtmf signalling general cid transmitted origin call calling party full phone number including area code including international access code country code international call calling party name added consumer terminating central office consumer subscribed service calling name delivery automatic ss7 signalling system 7 tcap query may launched called party central office order retrieve information calling name delivery caller id equipment consumer location caller name already associated calling party line originating central office canadian systems using ccs7 automatically cases send calling name call set-up routing information time call look name associated phone number carrier instances access information third-party database database providers charge small fee access databases cnam dip fee small – less penny per call starts negotiations cnam dip fees .004 per lookup opencnam fees bit expensive .0048 per lookup avoid charges carriers report name unavailable report name city state based phone number particularly wireless callers toll-free numbers may report string tollfree number name available database smartphones use third-party mobile app name lookup third-party database telemarketing organisations often spoof caller id instances done provide central number consumers call back toll-free number rather consumers call back outbound call centre call actually originated however telemarketers block fraudulently spoof caller id prevent traced united states federal law telemarketers block send false caller id individuals bring civil suits federal communications commission fcc fine companies individuals illegally spoofing blocking caller id telemarketers used caller id marketing using toll-free number registering text string free money free plane tickets name displayed caller id internet service providers isps providing dial-up access require customer use cnid prevent abuse account unauthorised callers systems dial-up access programmed accept calls specific caller id strings mobile phone providers used caller id automatically connect voice mail call voice mail number made associated mobile phone number bypassing need enter password convenient many users spoofing practice replaced secure authentication many carriers caller id transmission implemented using different technologies standards countries united states bellcore fsk standard prevalent whereas taiwan uses etsi fsk sometimes individual service providers within country use different standards caller id converters used translate one standard another telephone equipment usually displays clid information difficulty modems notoriously problematic modems support british telecom standard hardware drivers often errors prevent clid information recognised uk telephone companies use slight variations bellcore standard clid support hit miss cnd currently available australia subscribers integrated services digital network isdn legislation section 276 australia industry code calling number display acif c522 february 2003 united states telemarketers required transmit caller id requirement went effect january 29 2004 courts ruled caller id admissible providers required fcc rules offer per-call blocking caller id customers legislation united states made caller id spoofing illegal fraudulent purposes starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir caller id blocking common term service caller prevent display calling number recipient telephone blocking number formally referred calling line identification restriction clir telecommunications regulators vary requirements use effectiveness assorted technologies prevent numbers displayed generally unlisted numbers always blocked non-published regular listed numbers usually blocked varying treatment determination call display blocking many factors desired customers inquire carefully make sure number displayed telephone service provider may also vertical service codes dialed configure blocking active calls call-by-call basis locations united states regulations allow require blocking automatic transparent caller blocking applied call-by-call basis time call made subscribers block caller id dialing special code vertical service code vsc making call north america regions code *67 1167 rotary dial united kingdom ireland 141 special code block information companies using call capture technology means equipment caller id simply display word private withheld cnid blocked caller request number actually transmitted entire telephone network presentation withheld flag set destination co expected honor flag sometimes not—especially destination phone number served isdn pri alternatively cases caller id blocked automatically released call-by-call basis dialing special code *82 north america 1470 uk see enabling similarly countries offer anonymous caller rejection rejects calls subscriber name number blocked telephone companies protect clients receiving blocked information routing anonymous calls service privacy manager caller required announce service asks called party want accept reject call telephone companies play recording caller advising called party rejection configuration often offer advice prefixing dialing *82 get call intended called party emergency services likely able show restricted number using service called calling line identification restriction override cliro using general ani services features create cat-and-mouse game type situation whereby subscribers must purchase additional services order cancel services prefixing telephone number following codes disables caller id per-call basis countries networks vary however gsm mobile networks callers may dial 31 number wish call disable countries network providers allow caller id blocking based domestic telecommunications regulations clir available external app value-added service depending operator country number prefix codes unblock caller id gsm mobile networks callers may dial *31 enable caller id subsequent calls caller id spoofing practice causing telephone network display number recipient caller id display different actual originating station many telephone services isdn pri based pbx installations voice ip services permit caller configure customized caller id information corporate settings permits announcement switchboard number customer service numbers caller id spoofing may illegal countries certain situations consumer telephone company must pay small fee caller id text transmitted call fee called cnam dip fee named dip fee consumer carrier pays fee dip originating telephone company database get caller id information several companies engage generating dip fees catering companies make large number outbound calls callerid4u pacific telecom communications group cater telemarketers generate revenue fees caller id information telemarketers enter agreement companies like callerid4u pacific telecom communications group share revenue produced telemarketing call consumers face significant barriers exiting call list often removed list calling opt-out numbers often results fast-busy call never completes consumer remains list according reports companies like callerid4u thousands phone numbers thousands ftc complaints filed month violating call registration large number phone numbers dilute number complaints company phone number
[ 8192, 9732, 11671, 1949, 10660, 5163, 4273, 7221, 1083, 5052, 10299, 448, 4163, 1121, 9572, 2920, 5225, 7400, 1899, 1518, 4590, 9073, 8950 ]
Test
11,171
2
System_6:system 6 system 6 also referred system software 6 graphical user interface-based operating system macintosh computers released 1988 apple computer inc. part classic mac os series operating systems system 6 included new macintosh computers succeeded system 7 1991 boxed version system 6 cost 49 introduced system 6 classed monolithic operating system features improved multifinder allows co-operative multitasking new utility called macromaker included system 6 enabled allowed users record mouse keyboard input macros macromaker unique user interface aimed look act like tape recorder macromaker criticized lack features compared microsoft automac iii already available commercially macromaker recorded locations mouse-clicks inside windows clicked exactly users soon found could used automate sophisticated programs pre-recorded clicks would miss buttons moved failed appear upon playback addition macromaker limitations recorded start end locations mouse movements precise path movements macros handle situations required macro wait period time action macromaker compatible system 7 marked introduction applescript alternative cooperative multitasking made macintosh debut march 1985 program called switcher andy hertzfeld allowed user launch multiple applications switch many programs features function correctly switcher also switcher display windows applications beside selected one included operating system available apple separate purchase system 5 system 6 feature called multifinder instead much mature widely used system 6 multifinder could enabled disabled reboot disabled finder would quit user launched another application thus freeing ram enabled system behaved nowadays familiar multitasking tradition desktop windows applications screen background system 6 included support apple imagewriter lq postscript laser printers new software drivers allowed imagewriter lq used appletalk local area networks supports use tabloid b size paper system 6 also included quickergraf originally called quickerdraw piece system software used accelerate drawing color screen images macintosh ii licensed apple radius inc programmer andy hertzfeld system 6 apple menu used launch applications current application icon upper right-hand corner menu bar cycles open applications menu system 6 supports 24 bits addressable ram random access memory allowed maximum 8 megabytes ram provision virtual memory limitations fixed system 7 version hfs file system used system 6 also volume size limit supports 2 gigabytes gb 65,536 files volume limitation increased system 7.5 first increased limit 4 gb trash known wastebasket british versions empties finder terminates multifinder running occurs soon application launches icons desktop system 6 organized single folder later operating systems instead system records whether file desktop inefficient confusing user browse desktop applications besides finder even within standard open save dialog boxes furthermore dialogs primitive mostly unchanged since 1984 lack aliases shortcuts files another limitation file management system 6 custom file folder icons also supported problems remedied system 7 maximum 15 desk accessories may installed one time including chooser scrapbook control panel system 6 uses control panel desk accessory access installed control panels imposes severe user interface limitations desk accessories installed removed within finder requires font/da mover utility system 7 also fixed control panels however contained separate files methods exist interface personalization finder allows icon assigned color desktop background limited 8x8 pixel color tiled pattern color patterns introduced system 5 standard window frames black white however many init extension files existed add color customization system 7 later allowed user change color various aspects user interface 1989 system 6 user interface need change comparison nextstep operating system time system 6 make use sound user interface presented several limitations terms file management way windows displayed initial releases system 6 unstable many third party software developers receive copies release resulting widespread compatibility problems first many common software programs microsoft excel microsoft works 4th dimension fully compatible system 6 also software bugs color manager script manager sound manager extension files apple announced 66 bugs fixed 6.0.1 update released september 1988 however major bug involving text spacing screen fonts found 6.0.1 distribution began led quick release 6.0.2 solved problem customers waited longer moving system 6 poor reputation already gained system 6 officially supported apple many different machines shipped system 6 may apple computers system 6 officially supported may nevertheless able run perhaps limitations
[ 10755, 9732, 1542, 1549, 3598, 4114, 6675, 6165, 6186, 7211, 8754, 9778, 1592, 9784, 8767, 576, 8774, 7244, 1623, 9308, 3167, 3681, 3691, 6258, 10357, 7292, 4741, 7307, 147, 7830, 6807, 5784, 11430, 3241, 3248, 1215, 4807, 713, 4810, 2768...
Validation
11,172
4
HMG_Infosec_Standard_No.1:hmg infosec standard no.1 hmg information assurance standard no.1 usually abbreviated is1 security standard applied government computer systems uk standard used assess – suggest responses – technical risks confidentiality integrity availability government information modelling technique used standard adaptation domain based security confidentiality terms is1 apply information protectively marked may still used assess risks integrity availability information uk cabinet office security policy framework requires ict systems manage government information interconnected assessed identify technical risks is1 standard method mandated previous versions security policy framework methods may used results is1 assessment responses risks recorded using hmg information assurance standard no.2 usually abbreviated is2 concerns risk management relevant accreditation government computer systems cesg provides is1 risk assessment tools hmg is2 full accreditation statement based hmg is1 itshc security health check deloitte subsequent remediation recipero interface recipero nmpr uk government pnc systems used track mobile devices law enforcement purposes posted publicly public hmg is2 full accreditation statement based actual itshc deloitte case puts auditor reputation line way confidential statement
[ 10823, 7979, 5870, 5423, 8274, 4595, 10034, 7740, 2558 ]
Test
11,173
2
UDID:udid udid acronym unique device id udid feature apple ios devices unique identifier single device fetched apple servers user tries activate device using icloud setup app id also used itunes detect phone communicate restoring ipsw firmware unique id formatted two ways devices introduced 2007 2018 represented 40-digit lowercase hex code device models introduced 2018 25-digit uppercase hex code written device cover imei retrieved itunes normal mode apple usually uses id assign apple id icloud id device also holds find iphone activation status udid calculated follows verizon iphone 4 devices use
[ 11137, 9732, 1290, 3338, 6539, 1549, 9999, 784, 7697, 4888, 5784, 3483, 4251, 6264, 9123, 10023, 171, 6700, 8109, 4399, 3248, 9784, 4283, 2492, 7869, 446, 7614, 576, 9022, 1346, 838, 2502, 456, 6654, 1482, 10878, 3790, 464, 4180, 3286, ...
Test
11,174
2
Pieter_Van_den_Abeele:pieter van den abeele pieter van den abeele computer programmer founder powerpc-version gentoo linux foundation connected distribution linux computer operating system founded gentoo os x received scholarship apple computer 2004 pieter invited opensolaris pilot program assisted sun microsystems building development eco-system around solaris pieter nominated opensolaris community advisory board managed team developers make gentoo available solaris operating system well pieter co-author gentoo handbook teams managed pieter van den abeele shaped powerpc landscape several firsts gentoo/powerpc first distribution introduce powerpc live cds gentoo also beat apple releasing full 64-bit powerpc userland environment ibm powerpc 970 g5 processor gentoo-based home media communication system based freescale semiconductor powerpc 7447 processor best show award inaugural 2005 freescale technology forum orlando florida pieter also member power.org consortium participates committees workgroups focusing disruptive business plays around power architecture
[ 9665, 11363, 8102, 3472, 823, 8700, 9342 ]
Test
11,175
4
RSA_SecurID:rsa securid rsa securid formerly referred securid mechanism developed security dynamics later rsa security rsa security division emc performing two-factor authentication user network resource rsa securid authentication mechanism consists token — either hardware e.g key fob software soft token — assigned computer user creates authentication code fixed intervals usually 60 seconds using built-in clock card factory-encoded almost random key known seed seed different token loaded corresponding rsa securid server rsa authentication manager formerly ace/server tokens purchased on-demand tokens also available provide tokencode via email sms delivery eliminating need provision token user token hardware designed tamper-resistant deter reverse engineering software implementations algorithm software tokens appeared market public code developed security community allowing user emulate rsa securid software access current rsa securid code original 64-bit rsa securid seed file introduced server later 128-bit rsa securid algorithm published part open source library rsa securid authentication scheme seed record secret key used generate one-time passwords newer versions also feature usb connector allows token used smart card-like device securely storing certificates user authenticating network resource—say dial-in server firewall—needs enter personal identification number number displayed moment rsa securid token though increasingly rare systems using rsa securid disregard pin implementation altogether rely password/rsa securid code combinations server also real-time clock database valid cards associated seed records authenticates user computing number token supposed showing moment time checking user entered older versions securid duress pin may used—an alternate code creates security event log showing user forced enter pin still providing transparent authentication using duress pin would allow one successful authentication token automatically disabled duress pin feature deprecated available currently supported versions rsa securid system adds layer security network difficulty occur authentication server clock becomes sync clock built authentication tokens normal token clock drift accounted automatically server adjusting stored drift value time sync condition result normal hardware token clock drift correcting synchronization authentication manager server clock sync token tokens accomplished several different ways server clock drifted administrator made change system clock tokens either resynchronized one-by-one stored drift values adjusted manually drift done individual tokens bulk using command line utility rsa security pushed forth initiative called ubiquitous authentication partnering device manufacturers ironkey sandisk motorola freescale semiconductor redcannon broadcom blackberry embed securid software everyday devices usb flash drives cell phones reduce cost number objects user must carry token codes easily stolen mutual-authentication exists anything steal password also steal token code significant since principal threat users believe solving technology simplest practical vulnerability password container losing special key device activated smart phone integrated key function vulnerability healed single token container device within preset time span activation consideration presumes loss prevention e.g additional electronic leash body sensor alarm rsa securid tokens offer level protection password replay attacks designed offer protection man middle type attacks used alone attacker manages block authorized user authenticating server next token code valid able log server risk-based analytics rba new feature latest version 8.0 provides significant protection type attack user enabled authenticating agent enabled rba rsa securid prevent man browser mitb based attacks securid authentication server tries prevent password sniffing simultaneous login declining authentication requests two valid credentials presented within given time frame documented unverified post john g. brainard attacker removes user ability authenticate however securid server assume user actually authenticating hence allow attacker authentication attack model system security improved using encryption/authentication mechanisms ssl although soft tokens may convenient critics indicate tamper-resistant property hard tokens unmatched soft token implementations could allow seed record secret keys duplicated user impersonation occur hard tokens hand physically stolen acquired via social engineering end users small form factor makes hard token theft much viable laptop/desktop scanning user typically wait one day reporting device missing giving attacker plenty time breach unprotected system could occur however users userid pin also known risk-based analytics provide additional protection use lost stolen tokens even users userid pin known attackers batteries go flat periodically requiring complicated replacement re-enrollment procedures 2003 rsa securid commanded 70 two-factor authentication market 25 million devices produced date number competitors vasco make similar security tokens mostly based open oath hotp standard study otp published gartner 2010 mentions oath securid competitors network authentication systems opie s/key sometimes generally known otp s/key trademark telcordia technologies formerly bellcore attempt provide something level authentication without requiring hardware token 17 march 2011 rsa announced victims extremely sophisticated cyber attack concerns raised specifically reference securid system saying information could potentially used reduce effectiveness current two-factor authentication implementation however formal form 8-k submission indicated believe breach would material impact financial results breach cost emc parent company rsa 66.3 million taken charge second quarter earnings covered costs investigate attack harden systems monitor transactions corporate customers according emc executive vice president chief financial officer david goulden conference call analysts breach rsa network carried hackers sent phishing emails two targeted small groups employees rsa attached email excel file containing malware rsa employee opened excel file malware exploited vulnerability adobe flash exploit allowed hackers use poison ivy remote administration tool gain control machines access servers rsa network hints breach involved theft rsa database mapping token serial numbers secret token seeds injected make one unique reports rsa executives telling customers ensure protect serial numbers tokens lend credibility hypothesis barring fatal weakness cryptographic implementation token code generation algorithm unlikely since involves simple direct application extensively scrutinized aes-128 block cipher circumstance attacker could mount successful attack without physical possession token token seed records leaked rsa stated release details extent attack give potential attackers information could use figuring attack system 6 june 2011 rsa offered token replacements free security monitoring services 30,000 securid customers following attempted cyber breach defense customer lockheed martin appeared related securid information stolen rsa spite resulting attack one defense customers company chairman art coviello said believe still believe customers protected april 2011 unconfirmed rumors cited l-3 communications attacked result rsa compromise may 2011 information used attack lockheed martin systems however lockheed martin claims due aggressive actions company information security team customer program employee personal data compromised significant tenacious attack department homeland security us defense department offered help determine scope attack
[ 1024, 5636, 3590, 9744, 9745, 4117, 8726, 535, 9761, 4644, 4133, 10801, 1083, 1608, 3657, 8779, 9817, 4703, 8288, 8292, 10341, 2154, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 2208, 161, 9904, 9395, 8886, 3789, 4304, 4314, 943...
Test
11,176
1
Integrated_manufacturing_database:integrated manufacturing database integrated database system used small large businesses means incorporate manufacturing process updates stores records information view rapid retrieval examples could include capable performing searches particular part may present many different products
[]
Validation
11,177
4
Microsoft_Exchange_Hosted_Services:microsoft exchange hosted services microsoft exchange hosted services also known frontbridge email filtering system owned microsoft acquired 2005 frontbridge inc. frontbridge technologies began 2000 bigfish communications marina del rey california service sold directly partnership sprint nextel 30 march 2006 microsoft announced new branding new licensing model road map microsoft exchange hosted services ehs formerly known frontbridge technologies inc. microsoft exchange hosted services ehs four new products introduced ehs filtering filter actively help protect inbound outbound e-mail spam viruses phishing scams e-mail policy violations ehs archive message archiving system e-mail instant messages ehs continuity security-enhanced web interface allowed ongoing access e-mail unplanned outages on-premises e-mail environment ehs encryption preserve e-mail confidentiality allowing users send receive encrypted e-mail
[ 7809, 1948, 9053 ]
Test
11,178
4
Backblaze:backblaze backblaze data storage provider offers two products founded 2007 backblaze raised total 5.3 million capital profitable backblaze first product computer backup offering allows user back data continuously manually computer idle hourly schedule service makes use aes encryption security uses data compression bandwidth optimization reduce upload download times files need restored delivered form digital download external usb hard drive 8 tb usb flash drive 256 gb september 2015 backblaze launched new product b2 cloud storage infrastructure service iaas targeted software integration though web frontend apis also available directly competes similar services amazon s3 microsoft azure google cloud april 2018 backblaze announced cloud computing partnerships directly connect backblaze data centers partners packet servercentral offering high-performance cloud computing data stored b2 cloud storage transfer fees data uploaded onto backblaze data center sharded 17 data shards plus three parity shards file parity shard bits computed reed–solomon error correction algorithm shards stored 20 storage pods separate cabinet increase resilience power loss entire cabinet backblaze states vault architecture designed 99.999999999 eleven 9s annual durability computer backup backblaze uses combination aes ssl encryption protect user data data stored backblaze storage pods vaults using reed-solomon erasure coding encrypted user private key secured user password username default encryption private keys done server side unlikely protect government subpoena serious data breach users desiring additional security privacy use optional private encryption key pek backblaze b2 cloud storage data stored backblaze storage pods vaults using reed-solomon erasure coding encryption handled entirely user client software used manage stored data making immune government subpoena data breach protecting data transfer ultimate storage backblaze data centers 2009 2011 backblaze released cad drawings computer case used storage servers datacenters commercial off-the-shelf components x64 processors disks motherboards high-density storage servers built lower cost commercial ones february 2013 version 3.0 pod introduced increased storage capacity upgrades march 2014 version 4.0 pod introduced faster simpler less expensive tweaked version 4.5 march 2015 november 2015 version 5.0 storage pod released motherboard cpu sata cards upgraded memory increased 32gb april 2016 version 6.0 storage pod released
[ 5504, 11201, 4194, 6565, 3366, 10088, 6797, 1935, 7983, 1142, 2487, 3800, 7546, 11581, 8446 ]
Test
11,179
6
Mdadm:mdadm mdadm linux utility used manage monitor software raid devices used modern gnu/linux distributions place older software raid utilities raidtools2 raidtools mdadm free software maintained copyrighted neil brown suse licensed terms version 2 later gnu general public license name derived md multiple device device nodes administers manages replaced previous utility mdctl original name mirror disk changed functions added name understood short multiple disk device management linux software raid configurations include anything presented linux kernel block device includes whole hard drives example partitions example raid 10 distinct raid 0+1 consists top-level raid 1 mirror composed high-performance raid 0 stripes directly across physical hard disks single-drive failure raid 10 configuration results one lower-level mirrors entering degraded mode top-level stripe performing normally except performance hit single-drive failure raid 0+1 configuration results one lower-level stripes completely failing top-level mirror entering degraded mode two setups preferable depends details application question whether spare disks available spun original standard form names md devices number 0 99 recent kernels support names 2.4.x kernels earlier two options non-partitionable since 2.6.x kernels new type md device introduced partitionable array device names modified changing partitions identified adding partition number thus example since version 2.6.28 linux kernel mainline non-partitionable arrays partitioned partitions referred way partitionable arrays example since version 3.7 linux kernel mainline md supports trim operations underlying solid-state drives ssds linear raid 0 raid 1 raid 5 raid 10 layouts since support md found kernel issue using kernel running specifically present boot loader either e lilo grub legacy although normally present may present grub 2 order circumvent problem filesystem must used either without md support else raid1 latter case system boot treating raid1 device normal filesystem system running remounted md second disk added result catch-up filesystems usually small recent bootloaders possible load md support kernel module initramfs mechanism approach allows filesystem inside raid system without need complex manual configuration besides formats raid volumes metadata linux software raid also supports external metadata formats since version 2.6.27 linux kernel version 3.0 userspace utility allows linux use various firmware- driver-based raid volumes also known fake raid two supported formats external metadata mdmpd daemon used monitoring md multipath devices developed red hat part mdadm package program used monitor multipath raid devices usually started boot time service afterwards running daemon enterprise storage requirements often include desire one way talk single disk drive event failure talk disk drive via one controller system automatically switch another controller keep going called multipath disk access linux kernel implements multipath disk access via software raid stack known md multiple devices driver kernel portion md multipath driver handles routing i/o requests proper device handling failures active path try find path previously failed might working daemon upon startup reads current state md raid arrays saves state waits kernel tell something interesting happened wakes checks see paths multipath device failed starts poll failed path every 15 seconds starts working starts working daemon add path back multipath md device originally part new spare path one using filesystem lists active md devices information mdmpd requires find arrays monitor paths get notification interesting events
[ 1891, 8676, 1990, 1993, 7983, 8602, 9455, 9882, 6003, 823, 7802, 2045, 6014 ]
Validation
11,180
3
GNU_Mach:gnu mach gnu mach implementation mach microkernel default microkernel gnu hurd gnu mach runs ia-32 machines gnu mach maintained developers gnu project distributed terms gnu general public license gpl early versions hurd developed top cmu mach 3.0 1994 cmu stopped working mach gnu project switched university utah mach 4 kernel known gnu mach derived mach 4 utah stopped development first changelog entry thomas bushnell rather utah researcher 16 december 1996 2002 roland mcgrath branched oskit-mach branch gnu mach 1.2 intending replace device drivers hardware support code oskit release gnu mach 1.3 branch intended become gnu mach 2.0 main line however 2006 oskit-mach developed gnu mach 1.4 released 27 september 2013 eleven years 1.3
[ 2050, 2180, 5380, 11654, 7561, 4493, 1939, 7187, 5397, 6300, 802, 3618, 7983, 5555, 5049, 9148, 10813, 10687, 10822, 5703, 2761, 5833, 9931, 8147, 5976, 9176, 3674, 2010, 10464, 8673, 9579, 8304, 1394, 5363, 8436, 11123, 8700 ]
Test
11,181
5
Time-division_multiple_access:time-division multiple access time-division multiple access tdma channel access method shared-medium networks allows several users share frequency channel dividing signal different time slots users transmit rapid succession one using time slot allows multiple stations share transmission medium e.g radio frequency channel using part channel capacity tdma used digital 2g cellular systems global system mobile communications gsm is-136 personal digital cellular pdc iden digital enhanced cordless telecommunications dect standard portable phones tdma first used satellite communication systems western union westar 3 communications satellite 1979 used extensively satellite communications combat-net radio systems passive optical network pon networks upstream traffic premises operator usage dynamic tdma packet mode communication see tdma type time-division multiplexing tdm special point instead one transmitter connected one receiver multiple transmitters case uplink mobile phone base station becomes particularly difficult mobile phone move around vary timing advance required make transmission match gap transmission peers 2g cellular systems notable exception is-95 based tdma gsm d-amps pdc iden phs examples tdma cellular systems gsm combines tdma frequency hopping wideband transmission minimize common types interference gsm system synchronization mobile phones achieved sending timing advance commands base station instructs mobile phone transmit earlier much compensates propagation delay resulting light speed velocity radio waves mobile phone allowed transmit entire time slot guard interval end time slot transmission moves guard period mobile network adjusts timing advance synchronize transmission initial synchronization phone requires even care mobile transmits way actually know offset required reason entire time slot dedicated mobiles attempting contact network known random-access channel rach gsm mobile attempts broadcast beginning time slot received network mobile located next base station time delay succeed however mobile phone less 35 km base station time delay mean mobile broadcast arrives end time slot case mobile instructed broadcast messages starting nearly whole time slot earlier would expected otherwise finally mobile beyond 35 km cell range gsm rach arrive neighbouring time slot ignored feature rather limitations power limits range gsm cell 35 km special extension techniques used changing synchronization uplink downlink base station however limitation overcome although major 3g systems primarily based upon cdma time-division duplexing tdd packet scheduling dynamic tdma packet oriented multiple access schemes available 3g form combined cdma take advantage benefits technologies popular form umts 3g system uses cdma frequency division duplexing fdd instead tdma tdma combined cdma time-division duplexing two standard umts utra itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables based tdma scheme g.hn master device allocates contention-free transmission opportunities cftxop slave devices network one device use cftxop time thus avoiding collisions flexray protocol also wired network used safety-critical communication modern cars uses tdma method data transmission control radio systems tdma usually used alongside frequency-division multiple access fdma frequency division duplex fdd combination referred fdma/tdma/fdd case gsm is-136 example exceptions include dect personal handy-phone system phs micro-cellular systems umts-tdd umts variant china td-scdma use time-division duplexing different time slots allocated base station handsets frequency major advantage tdma radio part mobile needs listen broadcast time slot rest time mobile carry measurements network detecting surrounding transmitters different frequencies allows safe inter frequency handovers something difficult cdma systems supported is-95 supported complex system additions universal mobile telecommunications system umts turn allows co-existence microcell layers macrocell layers cdma comparison supports soft hand-off allows mobile phone communication 6 base stations simultaneously type same-frequency handover incoming packets compared quality best one selected cdma cell breathing characteristic terminal boundary two congested cells unable receive clear signal often negate advantage peak periods disadvantage tdma systems create interference frequency directly connected time slot length buzz sometimes heard tdma phone left next radio speakers another disadvantage dead time time slots limits potential bandwidth tdma channel implemented part difficulty ensuring different terminals transmit exactly times required handsets moving need constantly adjust timings ensure transmission received precisely right time move base station signal take longer arrive also means major tdma systems hard limits cell sizes terms range though practice power levels required receive transmit distances greater supported range would mostly impractical anyway dynamic time-division multiple access dynamic tdma scheduling algorithm dynamically reserves variable number time slots frame variable bit-rate data streams based traffic demand data stream dynamic tdma used
[ 10112, 4609, 2306, 388, 8708, 3847, 2057, 1550, 11288, 2458, 5020, 9373, 4256, 5664, 1192, 11560, 7723, 1969, 2994, 7490, 11075, 3140, 9284, 11591, 5321, 6857, 7498, 9038, 4691, 3156, 2911, 2912, 2785, 3168, 5092, 5863, 361, 2802, 4594, 9...
Test
11,182
4
EnCase:encase encase shared technology within suite digital investigations products guidance software acquired opentext software comes several products designed forensic cyber security security analytics e-discovery use encase traditionally used forensics recover evidence seized hard drives encase allows investigator conduct depth analysis user files collect evidence documents pictures internet history windows registry information company also offers encase training certification data recovered encase used various court systems cases btk killer murder danielle van dam additional encase forensic work documented cases evidence provided casey anthony unabomber mucko wakefield massacre cases encase originally created shawn mccreight founder guidance software 1997 home 1998 encase forensic officially released originally named expert witness windows time gui forensic tools available 2002 encase enterprise released allowing first network enabled digital forensic tool used forensic investigative security matters 2005 encase ediscovery released enabled network abilities encase allow identification collection preservation analysis esi litigation investigative purposes 2007 encase airs automated incident response suite released discontinued evolved encase endpoint security automate scanning documenting remediation abilities encase enterprise also 2007 release encase information assurance encase data audit policy enforcement also effectively integrated encase endpoint security 2008 encase cybersecurity released combined many tools automation previous security functions streamlined workflow incident response 2015 encase endpoint security released evolution endpoint security user friendly web interface well integration many security tools expedite shorten response time attack event 2016 encase enterprise needed face lift distributed agent formerly referred servlet given abilities redesign encase endpoint investigator also 2016 release encase risk manager data risk assessment audit dlp-like services compliance 2017 guidance software acquired opentext company name guidance software longer used encase technology available within number products currently including encase forensic encase endpoint investigator encase ediscovery includes encase legal hold encase endpoint security encase portable guidance software also runs training courses foundations computer forensics several expert series courses include enscripting course automate various functions within encase certification os offered train toward prove knowledge within various fields include ence encase certified examiner encep encase certified ediscovery practitioner cfsr certified forensic security responder encase training team trained 100000 individuals date encase contains tools several areas digital forensic process acquisition analysis reporting software also includes scripting facility called enscript various api interacting evidence encase contains functionality create forensic images suspect media images stored proprietary expert witness file format compressible file format prefixed case data information consists bit-by-bit i.e exact copy media inter-spaced crc hashes every 64k data file format also appends md5 hash entire drive footer encase v7 mobile phone analysis possible addition add-ons available guidance software
[ 3841, 2437, 6797, 5010, 4500, 8469, 3099, 7968, 6177, 5284, 7983, 10290, 4789, 2231, 4408, 8635, 830, 2494, 7369, 6475, 10189, 1873, 4049, 4834, 5475, 7525, 9319, 9458, 7160, 11642 ]
Test
11,183
3
Socket_FM2+:socket fm2+ socket fm2+ fm2b cpu socket used amd desktop steamroller-based godavari apus steamroller-based connect motherboard fm2+ slightly different pin configuration socket fm2 two additional pin sockets socket fm2+ apus compatible socket fm2 motherboards due aforementioned additional pins however socket fm2 apus richland trinity compatible fm2+ socket pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate available chipsets consult fusion controller hubs fch mobile counterpart socket fp3 µbga906 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
[ 3586, 9475, 3588, 8452, 9092, 10375, 3464, 4872, 5645, 398, 6033, 7058, 10260, 4246, 7963, 2719, 2463, 4767, 2850, 7712, 9122, 1322, 2094, 1329, 6705, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 11080, 2764, 7247, 9551, 7122, 9427, 10715, ...
Test
11,184
2
Comparison_of_operating_systems:comparison operating systems tables provide comparison operating systems computer devices listing general technical information number widely used currently available pc handheld including smartphone tablet computer operating systems article usage share operating systems provides broader general comparison operating systems includes servers mainframes supercomputers large number variety available linux distributions grouped single entry see comparison linux distributions detailed comparison also variety bsd dos operating systems covered comparison bsd operating systems comparison dos operating systems information views operating system see operating system advocacy posix compliant partly compliant systems like freebsd linux macos solaris basic commands standardized note linux systems may vary distribution specific program even 'command called via posix alias function example wanted use dos dir give directory listing one detailed file listing per line could use alias dir='ls -lahf e.g session configuration file
[ 2560, 6155, 11277, 3598, 1555, 6675, 7187, 5142, 8213, 8725, 25, 9236, 10776, 4637, 9249, 9762, 4643, 6180, 8229, 5158, 5677, 3631, 7217, 10803, 7733, 2614, 9784, 5177, 10809, 1083, 6207, 576, 2625, 7234, 8772, 3142, 6221, 5714, 3160, 103...
Test
11,185
4
Weak_key:weak key cryptography weak key key used specific cipher makes cipher behave undesirable way weak keys usually represent small fraction overall keyspace usually means one generates random key encrypt message weak keys unlikely give rise security problem nevertheless considered desirable cipher weak keys cipher weak keys said flat linear key space virtually rotor-based cipher machines 1925 onwards implementation flaws lead substantial number weak keys created machines problems weak keys others modern block stream ciphers first stream cipher machines also rotor machines problems weak keys traditional rotor machines t52 one stream cipher machine weak key problems british first detected t52 traffic summer autumn 1942 one link sicily libya codenamed sturgeon another aegean sicily codenamed mackerel operators links habit enciphering several messages machine settings producing large numbers depths several mostly incompatible versions t52 t52a t52b differed electrical noise suppression t52c t52d t52e t52a/b t52c cryptologically weak last two advanced devices movement wheels intermittent decision whether advance controlled logic circuits took input data wheels addition number conceptual flaws including subtle ones eliminated one flaw ability reset keystream fixed point led key reuse undisciplined machine operators block cipher des specific keys termed weak keys semi-weak keys keys cause encryption mode des act identically decryption mode des albeit potentially different key operation secret 56-bit key broken 16 subkeys according des key schedule one subkey used sixteen des rounds des weak keys produce sixteen identical subkeys occurs key expressed hexadecimal implementation consider parity bits corresponding keys inverted parity bits may also work weak keys using weak keys outcome permuted choice 1 pc-1 des key schedule leads round keys either zeros ones alternating zero-one patterns since subkeys identical des feistel network encryption function self-inverting despite encrypting giving secure-looking cipher text encrypting twice produces original plaintext des also semi-weak keys produce two different subkeys used eight times algorithm means come pairs k k property e encryption algorithm encrypting message key k six semi-weak key pairs also 48 possibly weak keys produce four distinct subkeys instead 16 found nist publication weak semi-weak keys considered fatal flaws des 2 7.21 × 10 72 quadrillion possible keys des four weak twelve semi-weak tiny fraction possible keyspace users need worry desire check weak semi-weak keys keys generated easy recognize note however currently des longer recommended general use since des keys brute-forced decades since deep crack machine cracking order days computers tend recent solutions vastly cheaper time scale examples progress deep crack article goal 'flat keyspace i.e. keys equally strong always cipher design goal case des sometimes small number weak keys acceptable provided identified identifiable algorithm unknown weak keys inspire much trust two main countermeasures inadvertently using weak key large number weak keys serious flaw cipher design since perhaps large chance randomly generated one weak one compromising security messages encrypted also take longer check randomly generated keys weakness cases tempt shortcuts interest 'efficiency however weak keys much often problem adversary control keys used block cipher used mode operation intended construct secure cryptographic hash function e.g davies–meyer
[ 7556, 262, 2567, 3084, 2957, 7056, 2961, 658, 660, 1173, 1941, 4128, 4389, 10662, 169, 2357, 10806, 1847, 9528, 5433, 2110, 9156, 9541, 10315, 6863, 8273, 7635, 212, 9556, 10963, 11349, 2265, 10329, 7643, 9697, 8674, 229, 4965, 618, 1898,...
None