node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
11,186
4
Jscrambler:jscrambler jscrambler technology company specializing client-side application security solutions web mobile applications javascript application shielding solution enables applications become self-defensive resilient tampering malware injection ip code theft reverse-engineering company also provides webpage monitoring solution enables real-time detection mitigation supply chain attacks dom tampering user interface changes customer hijacking jscrambler solutions used protect web mobile applications number sectors including finance broadcasting advertising media gaming jscrambler started auditmark back 2009 founded 2009 pedro fortuna rui ribeiro company initial focus developing solution fight click-fraud advertising campaigns since traffic audit mechanism javascript dependent name flagship product jscrambler also became name company 2014 jscrambler raised 800,000 seed funding portugal ventures public vc pe firm 2018 jscrambler raised us 2.3 million series round led sonae im co-investment portugal ventures jscrambler also recognized gartner ’ 2018 market guide application shielding 2019 market guide online fraud detection jscrambler products address specific client-side security concerns following dimensions jscrambler ’ products fully compliant main technological frameworks stacks including node.js react angular ionic
[ 803, 3941, 3462, 10348, 5404 ]
None
11,187
2
Record_Management_Services:record management services record management services rms procedures vms rsts/e rt-11 high-end rsx-11 operating systems programs may call process files records within files file formats procedures similar virtual storage access method vsam product offered ibm mainframe computers vendors file record management vms rms integral part system software procedures run executive mode rms integrated rt-11 rsts/e available layered product rms supports four record access methods rms supports four record formats
[ 2432, 1253, 8393, 1804, 7983, 8402, 6837, 8312, 7930, 3323, 10590 ]
None
11,188
4
Hardening_(computing):hardening computing computing hardening usually process securing system reducing surface vulnerability larger system performs functions principle single-function system secure multipurpose one reducing available ways attack typically includes changing default passwords removal unnecessary software unnecessary usernames logins disabling removal unnecessary services various methods hardening unix linux systems may involve among measures applying patch kernel exec shield pax closing open network ports setting intrusion-detection systems firewalls intrusion-prevention systems also hardening scripts tools like lynis bastille linux jass solaris systems apache/php hardener example deactivate unneeded features configuration files perform various protective measures binary hardening software security technique binary files analyzed modified protect common exploits binary hardening independent compilers involves entire toolchain example one binary hardening technique detect potential buffer overflows substitute safer code advantage manipulating binaries vulnerabilities legacy code fixed automatically without need source code may unavailable obfuscated secondly techniques applied binaries multiple compilers may less secure others binary hardening often involves non-deterministic modification control flow instruction addresses prevent attackers successfully reusing program code perform exploits common hardening techniques
[ 8066, 7812, 4119, 1304, 8094, 2975, 9646, 823, 1208, 5176, 5435, 3643, 11198, 9791, 10433, 8644, 5065, 11081, 6092, 6606, 719, 1111, 10344, 10732, 11502, 7920, 4081, 5492, 5245, 2558 ]
None
11,189
8
Embedded_HTTP_server:embedded http server embedded http server component software system implements http protocol examples usage within application might advantages using http perform natural limitations platforms embedded http server runs contribute list non-functional requirements embedded precise embeddable http server requirements every specific project requirements vary significantly example rom ram footprints serious constraint limit choices system designer c++ jvm availability system another constraint frequently performance issue typical embedded systems run multiple simultaneous tasks http server one may configured low priority task
[ 225, 9762, 10020, 8998, 9580, 2287, 2383, 7983, 9360, 1747, 2456, 4797, 479 ]
Test
11,190
7
Coda.io:coda.io coda cloud-based document editor founded shishir mehrotra alex deneui software provides word-processing spreadsheet database functions 2017 coda reported raised 60 million capital
[ 5202 ]
Test
11,191
4
Sqlmap:sqlmap sqlmap open source software used detect exploit database vulnerabilities provides options injecting malicious codes penetration testing tool automates process detecting exploiting sql injection flaws providing user interface terminal software run command line available download different operating systems linux distributions windows mac os operating systems addition mapping detecting vulnerabilities software enables access database editing deleting data viewing data tables users passwords backups phone numbers e-mail addresses credit cards confidential sensitive information sqlmap full support multiple dbmss including mysql oracle postgresql microsoft sql server microsoft access ibm db2 sqlite firebird sap maxdb full support injection techniques boolean error stack time union standard use software unix environment follows sqlmap -u http //172.16.0.0/files/file.php id=1 additional values combined help file prompted command sqlmap -h
[ 899, 7523, 10340, 5546, 9389, 7022, 3473, 7989, 11030, 823, 11221, 8539, 4445 ]
Validation
11,192
5
Wireless_Internet_Protocol:wireless internet protocol wireless internet protocols suite wireless protocols wireless application protocol 2.0 wap includes xhtml basic nokia xhtml mobile profile future developments wap open mobile alliance wireless internet protocols able deliver xhtml pages appropriate wireless devices without need http wap proxies using wireless internet protocols web pages rendered differently web browsers handhelds without need two different versions page
[ 5875 ]
Validation
11,193
6
Direct_Access_File_System:direct access file system direct access file system dafs network file system based nfsv4 virtual interface vi data transfer mechanism dafs uses remote direct memory access rdma perform efficient network access data remote files lowers latency reducing number steps needed process transfer remote data file locking cached client side eliminating need access file server subsequent data access dafs initially developed network appliance inc. 85-member industry association named dafs collaborative assembled complete specification draft release v1.0 passed internet engineering task force ietf version 1.0 dafs application programming interface completed 2001 year working version dafs demonstrated using oracle database dafs beta version 1.0 available sourceforge bsd license last updated 2004
[ 9320, 11193, 2322, 3820 ]
None
11,194
3
Daedalian_Opus:daedalian opus game essentially series 36 jigsaw puzzles pentominos must assembled specific shape puzzles start rectangular shapes simple solutions puzzles quickly grow complex odder shapes like rocket ship gun even enlarged versions pentominoes level timed timer started stopped level finished one starts game three pentomino pieces completion early level new piece awarded player final level player given 2x2 square tetromino must complete 8x8 square puzzle completing level player given password access level later time password common english four-letter word guessing common four-letter words players could potentially access levels actually reached playing game name game inspired daedalus mythical character greek legend created labyrinth faithful fan version later coded msx computer system karoshi corporation 2006 game development contest msxdev'06 game ported different platforms pc gp2x
[ 9006 ]
Test
11,195
4
Shawn_Carpenter:shawn carpenter shawn carpenter american navy veteran whistleblower previously employed sandia national laboratories tracked chinese cyberespionage ring code-named titan rain fbi came national attention story reported september 5 2005 issue time magazine carpenter employee sandia national laboratories investigating security breaches networks however upon tracking several breaches sandia lockheed martin corporation redstone arsenal even nasa dating back 2003 carpenter noticed patterns began appear link attacks single group impressed meticulous voracious incredibly fast manner sometimes completed less 30 minutes hackers operated observations led alert federal government findings titan rain hacking operation first reported august 25 2005 washington post article bradley graham n't mention carpenter graham listed anonymous governmental officials sources informing supervisors breaches told concern sandia computers drop issue employment later terminated carpenter disobeyed management communicated information security breaches first united states army cyber counterintelligence special agents verified information later brought fbi fbi requested senior dac counterintelligence agent known counterintelligence community nickname doc handle carpenter lead operation behalf fbi carpenter confidential informant fbi almost half year sandia discovered actions carpenter reportedly felt betrayed termination viewed actions service country similar previous military service according carpenter termination hearing sandia bruce held sandia chief counterintelligence yelled 're lucky understanding management ... worked would decapitate would least blood office subsequent court case held testified use word decapitate recall using word blood would contest also apologized carpenter sued sandia national laboratories wrongful termination defamation jury awarded almost 4.7 million compensatory punitive damages february 13 2007 jury doubled punitive damages requested carpenter attorneys thad guyer stephani ayers philip davis 13-person new mexico state district court jury determined sandia handling shawn carpenter termination malicious willful reckless wanton fraudulent bad faith juror ed dzienis said sandia interest protecting us certainly n't show way handled shawn ms. alex scott jury forewoman said jurors upset lack documentation process reckless behavior part sandia adequate policies place employees hacking cavalier attitude national security global security carpenter wife dr. jennifer jacobs testified trial dr. jacobs former sandia scientist nuclear engineer west point graduate army reserve major said sandia management questioned loyalty company husband fired dr. jacobs left sandia later appointed white house fellow director united states national security council interview albuquerque journal dr. jacobs stated point us along bad country contractors like sandia corporation behaving way -- impunity citizens n't beginning end country kept coming back expect others sandia corporation private entity manages sandia national laboratories behalf national nuclear security administration department energy federal government united states wholly owned subsidiary for-profit lockheed martin corporation ironic twist carpenter testified trial found hundreds pages detailed schematics sensitive documents labeled lockheed martin proprietary information export controlled regarding mars reconnaissance orbiter stashed foreign server south korea helping fbi investigate stolen lockheed martin information along hundreds network breaches military united states defense contractors sandia officials fired carpenter employed netwitness corporation startup headed amit yoran former director national cyber security division within united states department homeland security march 2007 sandia national laboratories retained three additional attorneys international corporate defense firm baker botts post-trial motions sandia attorneys unsuccessfully argued throw jury verdict reduce judgment zero new trial carpenter attorneys successfully argued motion post-judgment interest sandia ordered pay interest rate 15 per year final judgment 4,742,146.66 plus attorney fees appeals process april 2007 sandia attorneys filed motion appeal jury verdict sandia national laboratories posted 5.8 million supersedeas bond prevent carpenter seizing sandia assets appeals process interest amount almost 60,000 month accumulates sandia pursues appeals according news reports sandia plans appeal new mexico supreme court necessary could take years october 14 2007 albuquerque journal published story analyst sandia settle suit stated sandia dropped appeal verdict according story judgment accumulating 15 percent interest since verdict favor february 2007 piece also related carpenter continues work national security area clients intelligence community federal agencies military
[ 184, 9688, 5087 ]
Test
11,196
2
ZOC_(software):zoc software zoc popular computer-based terminal emulator telnet software client microsoft windows apple macintosh macos operating systems supports telnet modem ssh 1 2 isdn serial tapi rlogin means communication terminal emulator supports xterm emulation full colors meta-keys local printing vt102 vt220 several types ansi well wyse tvi tn3270 sun cde supports full keyboard remapping scripting rexx languages support named pipes zoc commercial software developed markus schmidt emtec innovative software germany firm produces software various aspects communications via telephone pc isdn like price us 80 free evaluation period 30 days zoc downloaded evaluation emtec several shareware distribution sites emtec produce two associated independent telecommunications programmes use tcp/ip modem isdn etc pyrotrans ftp package including client server pyrobatchftp programmable ftp tool zoc first released os/2 october 1993 v0.95 windows november 1996 v3.02 1997 selected runner-up os/2 e-zine readers choice awards zoc released version 3.11 january 1999 support os/2 discontinued release version 5 mac os x supported version 6
[ 1121, 7364, 10341, 11112, 6797, 4590, 7983, 10833, 9780, 9813, 8504, 10428 ]
Test
11,197
4
Beast_(Trojan_horse):beast trojan horse beast windows-based backdoor trojan horse commonly known hacking community remote administration tool rat capable infecting versions windows 95 10 written delphi released first author tataye 2002 became quite popular due unique features used typical client–server model client would operation attacker server would infect victim beast one first trojans feature reverse connection victims established gave attacker complete control infected computer virus would harmless opened opened virus would use code injection method inject applications machine running windows xp removal three files safe mode system restore turned would disinfect system default ports used direct reverse connections 6666 9999 respectively though attacker option changing beast came built-in firewall bypasser ability terminating anti-virus firewall processes also came file binder could used join two files together one executable
[ 8386, 11266, 10756, 8998, 4956, 4490, 107, 6797, 2222, 7983, 5500 ]
Test
11,198
4
Cyber_self-defense:cyber self-defense cybersecurity cyber self-defense refers self-defense cyberattack generally emphasizes active cybersecurity measures computer users sometimes used refer self-defense organizations whole corporate entities entire nations surveillance self-defense variant cyber self-defense largely overlaps active passive cybersecurity measures provide defenders higher levels cybersecurity intrusion detection incident handling remediation capabilities various sectors organizations legally obligated adhere cyber security standards organizations may conduct penetration test via internal team hire third-party organization audit organization systems larger organizations may conduct internal attacker-defender scenarios red team attacking blue team defending defenders namely threat hunters system administrators programmers proactively manage information systems remediate vulnerabilities gather cyber threat intelligence harden operating systems code connected devices networks blue teams may include information physical security personnel employed organization physical security may tested weaknesses employees may target social engineering attacks security audits digital physical systems may audited varying degrees knowledge relevant systems simulate realistic conditions attackers employees frequently trained security practices measures full-knowledge test scenarios known white box tests attacking party knows available information regarding client systems black box tests attacking party provided information regarding client systems gray box tests provide limited information attacking party cybersecurity researcher jeffrey carr compares cyber self-defense martial art one computer network attack surface may shrunk reduce risk exploitation legal theorists policy makers increasingly considering authorizing private sector take active measures hacking-back also known hackbacks contrast active attack measures passive defense measures present reduced risk cyberwarfare legal political economic fallout contemporary topic debate research question 'when cyber-attack threat thereof give rise right self-defense march 2017 tom graves proposed active cyber defense certainty act acdc would enhance computer fraud abuse act cfaa allow individuals private sector use certain tools currently restricted cfaa identify attackers prevent attacks hacking presents chicken egg problem wherein everyone allowed hack anyone everyone would hack everyone skilled resourced would remain brad maryman warns unintended consequences stating view notion legislate accept level undocumented unmonitored cyber actions anyone thinks hacked unfathomable
[ 5636, 3717, 7556, 8580, 8329, 6797, 4494, 1169, 3473, 3858, 1557, 5373, 5531, 3742, 8094, 9375, 2213, 3366, 8998, 939, 10539, 3629, 7983, 1918, 11188, 7222, 823, 5433, 700, 4797, 7228, 8637, 11198, 2128, 4689, 1111, 6360, 9688, 11225, 828...
Validation
11,199
1
Pakistan_MNP_Database:pakistan mnp database pakistan mnp database guarantee limited subsidiary four cellular mobile operators pakistan maintains country central number portability clearing house pakistan mobile number portability database guarantee limited pmd incorporated 2005 companies ordinance 1984 launch mnp pakistan pursuant ‘ mobile number portability regulations 2005 ’ s.r.o 763 2005 pakistan first country south asia implement mobile number portability telenor first operator pakistan secure 1 million subscribers mnp
[]
None
11,200
3
Red_Pitaya_(hardware):red pitaya hardware red pitaya open-source hardware project intended alternative many expensive laboratory measurement control instruments core selling point inclusion 2x 125ms/s rf input 2x 125ms/s rf outputs 50 mhz analogue bandwidth 14 bit analog-to-digital digital-to-analog converters software includes oscilloscope spectrum analyzer signal generator lcr meter lcr add costs additional 400 euros 50 mhz 2x2 mimo pid controller re-programmed become devices io ports connected common field-programmable gate array fpga also auxiliary adc 250ks/s digital io three usb 2.0 ports wifi ethernet connector internally uses linux operating system mass storage device operating system micro-sd card due wide bandwidth adc dac red pitaya used software defined radio receiver transmitter radio frequency applications hamlab fully featured sdr hf tranceiver output power 10 w based red pitaya board expected released amateur radio market october 2016 although software including hdl source code project made freely available device fully open source hardware project device electrical schematics made openly available
[ 7745, 823, 3886, 7983, 1776, 3159, 1849 ]
Test
11,201
6
Amazon_S3:amazon s3 amazon s3 amazon simple storage service service offered amazon web services aws provides object storage web service interface amazon s3 uses scalable storage infrastructure amazon.com uses run global e-commerce network amazon s3 employed store type object allows uses like storage internet applications backup recovery disaster recovery data archives data lakes analytics hybrid cloud storage service-level agreement amazon s3 guarantees 99.9 monthly uptime works less 43 minutes downtime per month aws launched amazon s3 united states march 14 2006 europe november 2007 although amazon web services aws publicly provide details s3 technical design amazon s3 manages data object storage architecture aims provide scalability high availability low latency 99.999999999 durability 99.95 99.99 availability though service-level agreement durability basic storage units amazon s3 objects organized buckets object identified unique user-assigned key buckets managed using either console provided amazon s3 programmatically using aws sdk amazon s3 rest application programming interface api objects managed using aws sdk amazon s3 rest api five terabytes size two kilobytes metadata additionally objects downloaded using http get interface bittorrent protocol requests authorized using access control list associated object bucket support versioning disabled default note since buckets typically size entire file system mount systems access control scheme coarse-grained i.e unique access controls associated individual files bucket names keys chosen objects addressable using http urls amazon s3 used replace significant existing static web-hosting infrastructure http client accessible objects amazon aws authentication mechanism allows bucket owner create authenticated url valid specified amount time every item bucket also served bittorrent feed amazon s3 store act seed host torrent bittorrent client retrieve file drastically reduce bandwidth cost download popular objects use bittorrent reduce bandwidth aws provide native bandwidth limiting users access automated cost control lead users free-tier amazon s3 small hobby users amassing dramatic bills aws representatives stated bandwidth limiting feature design table 2006 2010 2011 feature longer development bucket configured save http log information sibling bucket used data mining operations various user mode file system fuse -based file systems unix-like operating systems linux etc used mount s3 bucket file system s3ql semantics amazon s3 file system posix file system file system may behave entirely expected amazon s3 provides option host static html websites index document support error document support support added result user requests dating least 2006 example suppose amazon s3 configured cname records host codice_5 past visitor url would find xml-formatted list objects instead general landing page e.g. index.html accommodate casual visitors however websites hosted s3 may designate default page display another page display event partially invalid url 404 error amazon s3 allows users enable disable logging enabled logs stored amazon s3 buckets analyzed logs contain useful information logs analyzed managed using third-party tools like s3stat cloudlytics qloudstat awstats splunk amazon s3 provides api developers aws console provides tools managing uploading files capable managing large buckets editing files third-party websites like s3edit.com software like cloudberry explorer forklift webdrive capability edit files amazon s3 amazon s3 offers four different storage classes offer different levels durability availability performance requirements broad adoption amazon s3 related tooling given rise competing services based s3 api services use standard programming interface however differentiated underlying technologies supporting business models cloud storage standard like electrical networking standards enables competing service providers design services clients using different parts different ways yet still communicate provide following benefits examples competing amazon s3-compliant storage implementations amazon web services introduced amazons3 2006 amazon s3 reported store 2 trillion objects 10 billion objects october 2007 14 billion objects january 2008 29 billion objects october 2008 52 billion objects march 2009 64 billion objects august 2009 102 billion objects march 2010
[ 4623, 19, 1047, 10265, 5660, 9762, 9766, 5159, 3121, 590, 7248, 4194, 5732, 10340, 5737, 8810, 9844, 7802, 2170, 4224, 6281, 4236, 10893, 11410, 5791, 10912, 6307, 5797, 11429, 2217, 9906, 7352, 4797, 4289, 7364, 1222, 1224, 10447, 3794, ...
Test
11,202
4
ZMap_(software):zmap software zmap free open-source security scanner developed faster alternative nmap zmap designed information security research used white hat black hat purposes tool able discover vulnerabilities impact detect affected iot devices using one gigabit per second network bandwidth zmap scan entire ipv4 address space hour single port zmap iterates techniques utilized predecessor nmap altering scanning method key areas nmap sends individual signals ip address waits reply replies return nmap compiles database keep track responses process slows scanning process contrast zmap uses cyclic multiplicative groups allows zmap scan space roughly 1,300 times faster nmap zmap software takes every number 1 2-1 creates iterative formula ensures possible 32-bit numbers visited pseudorandom order building initial list numbers every ip address takes upfront time fraction required aggregate list every sent received probe process ensures zmap starts sending probes different ips accidental denial service could occur abundance transmissions would converge one subnet time zmap also speeds scanning process sending probe every ip address default whereas nmap resends probe detects connection delay fails get reply results 2 ip addresses missed typical scan processing billions ip address potential iot devices targeted cyberattackers 2 acceptable tolerance zmap used vulnerability detection exploitation application used port 443 scans estimate power outages hurricane sandy 2013 one developers zmap zakir durumeric used software determine computer online state vulnerabilities operating system services zmap also used detect vulnerabilities universal plug play devices search weak public keys https website logs
[ 8386, 8674, 2084, 5598, 5636, 5612, 7983, 1232, 3473, 4689, 2739, 3539, 5373, 5469, 2045, 2558 ]
None
11,203
1
EXtremeDB:extremedb extremedb high performance low-latency acid-compliant embedded database management system using in-memory database system imds architecture designed linked c/c++ based programs works windows linux real-time embedded operating systems building core imds several editions supporting high availability database clustering hybrid in-memory disk-based data storage columnar layout time series data financial market data specialized abilities mcobject introduced extremedb 2001 targeting embedded systems running resource-constrained environments i.e limited random-access memory relatively low-powered central processing units extremedb characteristics appealing market include small code size approximately 150 kb native c language application programming interface available source code high degree portability support varied processors operating systems used embedded systems early deployments customers included integration digital tv set-top boxes manufacturing industrial control systems telecom/networking devices extremedb emerged manage industry analysts mcobject portray significant growth amount data managed devices company claims extremedb first embedded database management system dbms developed specifically environments later editions targeted high performance non-embedded software market including capital markets applications algorithmic trading order matching engines real-time caching web-based applications including social networks e-commerce features added support focus include sql odbc jdbc interfaces 64-bit support multiversion concurrency control mvcc transaction management increasingly popular term “ internet things ” especially since 2009 encompasses real-time embedded systems extremedb supports following features across product family extremedb supports multiple concurrent users offering acid-compliant transactions defined jim gray using either two transaction managers multiple-reader single writer mursiw locking mechanism multiversion concurrency control mvcc transaction manager optimistic non-locking model extremedb work virtually c language data types including complex types including structures arrays vectors blobs unicode supported extremedb high availability edition supports synchronous 2-safe asynchronous 1-safe database replication automatic failover extremedb cluster edition provides shared-nothing database clustering extremedb also supports distributed query processing database partitioned horizontally dbms distributes query processing across multiple servers cpus and/or cpu cores extremedb supports heterogeneous client platforms e.g mix windows linux rtoss clustering high availability features single partitioned database include shards running mix hardware os platforms extremedb fusion edition provides option persistent storage disk flash specific tables via database schema notation extremedb transaction logging edition keeps record changes made database uses log provide recovery event device system failure edition includes extremedb data relay technology replicates selected changes external systems enterprise applications database systems extremesql edition provides sql odbc support extremedb version 4 level 4 jdbc driver extremedb kernel mode edition deploys database system within operating system kernel provide database functions kernel-based applications logic extremedb financial edition provides features managing market data tick data applications algorithmic trading order matching “ sequences ” data type supports columnar data layout enables extremedb offer benefits column-oriented database handling time series data financial edition also provides library vector-based statistical functions analyze data sequences performance monitor mcobject published reports benchmark tests employing extremedb main-memory vs. ram-disk databases linux-based benchmark examined imds performance versus traditional on-disk dbms deployed ram disk identical application tasks benchmark ’ stated goal test thesis imds streamlined architecture delivers performance benefit beyond provided memory-based storage another benchmark terabyte-plus in-memory database system imds benchmark documented imds scalability performance size range large enterprise application versus embedded systems databases test engineers created 1.17 terabyte 15.54 billion row database extremedb 160-core sgi altix 4700 system running suse linux enterprise server 9 november 2012 marketing report published dell servers mellanox infiniband late 2014 two additional audited benchmark reports focused extremedb financial edition october 29 report assessed mcobject ’ dbms ibm power8 hardware november 18 report documented use cloud computing 2016. another report measured extremedb financial edition
[ 3, 6797, 3219, 9366, 10921, 4781, 10286, 7983, 10413, 823, 5178, 10048, 3784, 2383, 4817, 7767, 4572, 4194, 8554, 5612, 1776, 3573, 1400, 3450, 2045 ]
None
11,204
2
Minerva_(QDOS_reimplementation):minerva qdos reimplementation written laurence reeves england minerva reimplementation sinclair qdos built-in operating system sinclair ql line personal computers minerva incorporated many bug fixes enhancements qdos superbasic programming language later versions also provided ability multi-task several instances superbasic interpreter something supported qdos minerva distributed rom chip daughterboard replaced ql original rom chips minerva mk ii daughterboard also produced also incorporated i²c interface non-volatile real-time clock version 1.89 minerva source code licensed gnu general public license reimplementations qdos include sms2 smsq/e
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 10666, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7483, ...
Test
11,205
2
Livermore_Time_Sharing_System:livermore time sharing system livermore time sharing system ltss supercomputer operating system originally developed lawrence livermore laboratories control data corporation 6600 7600 series supercomputers ltss resulted cray time sharing system network livermore timesharing system nltss
[ 2179, 10499, 10883, 394, 1147, 1804, 3978, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7483, 6...
Test
11,206
0
Semantic_similarity:semantic similarity semantic similarity metric defined set documents terms idea distance based likeness meaning semantic content opposed similarity estimated regarding syntactical representation e.g string format mathematical tools used estimate strength semantic relationship units language concepts instances numerical description obtained according comparison information supporting meaning describing nature term semantic similarity often confused semantic relatedness semantic relatedness includes relation two terms semantic similarity includes relations example car similar bus also related road driving computationally semantic similarity estimated defining topological similarity using ontologies define distance terms/concepts example naive metric comparison concepts ordered partially ordered set represented nodes directed acyclic graph e.g. taxonomy would shortest-path linking two concept nodes based text analyses semantic relatedness units language e.g. words sentences also estimated using statistical means vector space model correlate words textual contexts suitable text corpus concept semantic similarity specific semantic relatedness latter includes concepts antonymy meronymy similarity however much literature uses terms interchangeably along terms like semantic distance essence semantic similarity semantic distance semantic relatedness mean much term term b answer question usually number -1 1 0 1 1 signifies extremely high similarity intuitive way visualizing semantic similarity terms grouping together terms closely related spacing wider apart ones distantly related also common practice mind maps concept maps sometimes subconscious direct way visualizing semantic similarity two linguistic items seen semantic folding approach approach linguistic item term text represented generating pixel active semantic features e.g 128 x 128 grid allows direct visual comparison semantics two items comparing image representations respective feature sets semantic similarity measures applied developed biomedical ontologies mainly used compare genes proteins based similarity functions rather sequence similarity also extended bioentities diseases comparisons done using tools freely available web similarity also applied find similar geographic features feature types several metrics use wordnet manually constructed lexical database english words despite advantages human supervision constructing database since words automatically learned database measure relatedness multi-word term non-incremental vocabulary natural language processing nlp field computer science linguistics sentiment analysis natural language understanding machine translation automatically translate text one human language another major areas used example knowing one information resource internet often immediate interest find similar resources semantic web provides semantic extensions find similar data content arbitrary descriptors essentially two types approaches calculate topological similarity ontological concepts measures calculate similarity ontological instances examples statistical similarity approaches learned data predefined similarity learning often outperform predefined similarity measures broadly speaking approaches build statistical model documents use estimate similarity researchers collected datasets similarity judgements pairs words used evaluate cognitive plausibility computational measures golden standard today old 65 word list humans judged word similarity list datasets overview state art see https //www.aclweb.org/
[ 416, 2561, 7780, 7910, 5197, 2575, 7599, 9935, 10577, 10452, 538, 447 ]
None
11,207
9
Scicos:scicos scicos graphical dynamical system modeler simulator users create block diagrams model simulate dynamics hybrid dynamical systems continuous discrete time compile models executable code applications include signal processing systems control queuing systems study physical biological systems scilab includes toolbox called xcos based scicos scicos developed distributed scientific software package scicoslab scicos 4.4.1 released april 2011 book modeling simulation scilab/scicos scicoslab 4.4 campbell chancelier nikoukhah provides overview software
[ 9376, 2691, 4454, 11239, 587, 6797, 7983, 8079, 823, 3960, 2045 ]
Validation
11,208
1
RadRails:radrails radrails rapid application development ide ruby rails framework goal radrails provide ruby rails developers everything need develop manage test deploy applications features include source control code assist refactoring debugging webrick servers generator wizards syntax highlighting data tools much radrails ide built eclipse rcp includes rdt subclipse plug-in radrails tools also available eclipse +plug-ins eclipsecon 2006 radrails community award best open-source eclipse-based tool radrails started kyle shank marc baumbach matt kent september 2005 time three developers worked co-ops rochester institute technology ibm rational raleigh nc development continued 2006 including contributions andy gianfagna ryan lowe joined team mid-2006 deploy maintain automated build system project november 2006 kyle shank matt kent began working idea startup company would eventually become persai march 2007 kyle matt devoting spare time persai little time left maintain radrails kyle met aptana founder paul colton eclipsecon 2007 became clear handing project would best interests radrails community march 8 2007 aptana took project renamed aptana radrails although radrails still open source project work done aptana employee christopher williams lead developer rdt project radrails built upon radrails 1.0 released open source license march 13 2008 plug-in aptana studio eclipse-based ide web ajax development run either standalone within eclipse may 2008 book aptana radrails ide rails development written javier ramírez published packt publishing book covers features community edition 1.0
[ 7430, 9229, 2191, 7695, 10771, 1687, 9245, 2465, 9509, 7983, 564, 4277, 11446, 5945, 1852, 5567, 6338, 5578, 4171, 6998, 10973, 2658, 1379, 11625, 5612, 2804, 3583 ]
None
11,209
3
Toric_code:toric code toric code topological quantum error correcting code example stabilizer code defined two-dimensional spin lattice simplest well studied quantum double models also simplest example topological order— z topological order first studied context z spin liquid 1991 toric code also considered z lattice gauge theory particular limit introduced alexei kitaev toric code gets name periodic boundary conditions giving shape torus conditions give model translational invariance useful analytic study however experimental realization requires open boundary conditions allowing system embedded 2d surface resulting code typically known planar code identical behaviour toric code cases toric code defined two-dimensional lattice usually chosen square lattice spin-½ degree freedom located edge chosen periodic stabilizer operators defined spins around vertex formula_1 plaquette face formula_2 lattice follows formula_3 use formula_4 denote edges touching vertex formula_1 formula_6 denote edges surrounding plaquette formula_2 stabilizer space code stabilizers act trivially hence formula_8 state formula_9 toric code space four-dimensional used store two qubits quantum information proven considering number independent stabilizer operators occurrence errors move state stabilizer space resulting vertices plaquettes condition hold positions violations syndrome code used error correction unique nature topological codes toric code stabilizer violations interpreted quasiparticles specifically code state formula_10 formula_11 quasiparticle known formula_12 anyon said exist vertex formula_1 similarly violations formula_14 associated called formula_15 anyons plaquettes stabilizer space therefore corresponds anyonic vacuum single spin errors cause pairs anyons created transported around lattice errors create anyon pair move anyons one imagine path connecting two composed links acted upon anyons meet annihilated path describes loop loop topologically trivial effect stored information annihilation anyons case corrects errors involved creation transport however loop topologically non-trivial though re-annihilation anyons returns state stabilizer space also implements logical operation stored information errors case therefore corrected consolidated consider noise model bit phase errors occur independently spin probability p p low create sparsely distributed pairs anyons moved far point creation correction achieved identifying pairs anyons created equivalence class re-annihilating remove errors p increases however becomes ambiguous anyons may paired without risking formation topologically non-trivial loops gives threshold probability error correction almost certainly succeed mapping random-bond ising model critical probability found around 11 error models may also considered thresholds found cases studied far code found saturate hashing bound error models biased errors bit errors occur often phase errors vice versa lattices square lattice must used achieve optimal thresholds thresholds upper limits useless unless efficient algorithms found achieve well-used algorithm minimum weight perfect matching applied noise model independent bit flip errors threshold around 10.5 achieved falls little short 11 maximum however matching work well correlations bit phase errors depolarizing noise means perform quantum computation logical information stored within toric code considered properties code providing fault-tolerance shown extending stabilizer space using 'holes vertices plaquettes stabilizers enforced allows many qubits encoded code however universal set unitary gates fault-tolerantly implemented unitary operations additional techniques required achieve quantum computing example universal quantum computing achieved preparing magic states via encoded quantum stubs called tidbits used teleport required additional gates replaced qubit furthermore preparation magic states must fault tolerant achieved magic state distillation noisy magic states measurement based scheme quantum computation based upon principle found whose error threshold highest known two-dimensional architecture since stabilizer operators toric code quasilocal acting spins located near two-dimensional lattice unrealistic define following hamiltonian formula_16 ground state space hamiltonian stabilizer space code excited states correspond anyons energy proportional number local errors therefore energetically suppressed gap shown stable local perturbations however dynamic effects perturbations still cause problems code gap also gives code certain resilience thermal errors allowing correctable almost surely certain critical time time increases formula_17 since arbitrary increases coupling unrealistic protection given hamiltonian still limits means make toric code planar code fully self-correcting quantum memory often considered self-correction means hamiltonian naturally suppress errors indefinitely leading lifetime diverges thermodynamic limit found possible toric code long range interactions present anyons proposals made realization lab another approach generalization model higher dimensions self-correction possible 4d quasi-local interactions mentioned called formula_12 formula_15 quasiparticles associated vertices plaquettes model respectively quasiparticles described anyons due non-trivial effect braiding specifically though species anyons bosonic respect braiding two formula_12 formula_15 effect full monodromy formula_12 formula_15 yield phase formula_24 result consistent either bosonic fermionic statistics hence anyonic anyonic mutual statistics quasiparticles demonstrate logical operations performed topologically non-trivial loops consider creation pair formula_12 anyons followed transport one around topologically nontrivial loop shown torus blue figure pair reannhilated state returned stabilizer space loop implements logical operation one stored qubits formula_15 anyons similarly moved red loop logical operation also result phase formula_24 resulting braiding anyons shows operations commute rather anticommute may therefore interpreted logical formula_28 formula_29 pauli operators one stored qubits corresponding logical pauli qubit correspond formula_15 anyon following blue loop formula_12 anyon following red braiding occurs formula_12 formula_15 pass parallel paths phase formula_24 therefore arise corresponding logical operations commute expected since form operations acting different qubits due fact formula_12 formula_15 anyons created pairs clear see quasiparticles antiparticles composite particle composed two formula_12 anyons therefore equivalent vacuum since vacuum yield pair pair annihilate vacuum accordingly composites bosonic statistics since braiding always completely trivial composite two formula_15 anyons similarly equivalent vacuum creation composites known fusion anyons results written terms fusion rules case take form formula_39 formula_40 denotes vacuum composite formula_12 formula_15 trivial therefore constitutes another quasiparticle model sometimes denoted formula_43 fusion rule formula_44 braiding statistics anyons see since single exchange two formula_43 involve full monodromy constituent formula_12 formula_15 phase formula_24 result implies fermionic self-statistics formula_43 use torus required form error correcting code surfaces may also used topological properties determining degeneracy stabilizer space general quantum error correcting codes defined two-dimensional spin lattices according principles known surface codes also possible define similar codes using higher-dimensional spins quantum double models string-net models allow greater richness behaviour anyons may used advanced quantum computation error correction proposals include models abelian anyons also non-abelian statistics explicit demonstration properties toric code state based approaches rather attempting realize hamiltonian simply prepare code stabilizer space using technique experiments able demonstrate creation transport statistics anyons recent experiments also able demonstrate error correction properties code realizations toric code generalizations hamiltonian much progress made using josephson junctions theory hamiltonians may implemented developed wide class topological codes experiment also performed realizing toric code hamiltonian small lattice demonstrating quantum memory provided degenerate ground state theoretical experimental works towards realizations based cold atoms toolkit methods may used realize topological codes optical lattices explored
[ 2680, 9801, 2781 ]
Test
11,210
5
Type-length-value:type-length-value within data communication protocols tlv type-length-value tag-length-value encoding scheme used optional information element certain protocol type length fixed size typically 1-4 bytes value field variable size fields used follows advantages using tlv representation data system solution imagine message make telephone call first version system might use two message elements command phonenumbertocall codice_1 codice_2 codice_3 integer constants 4 8 lengths value fields respectively later version 2 new field containing calling number could added version 1 system received message version 2 system would first read codice_1 element read element type codice_5 version 1 system understand codice_5 length field read i.e 14 system skips forward 14 bytes read understands message parsing carries example usage link layer discovery protocol allows sending organizational-specific information tlv element within lldp packets another example rr protocol used gsm cell phones defined 3gpp 04.18 rr protocol message defined sequence information elements many protocols use tlvs cops is-is radius core tcp/ip protocols particularly ip tcp udp use predefined static fields common tcp/ip-based protocols http ftp smtp pop3 sip use text-based field value pairs formatted according rfc 2822 asn.1 specifies several tlv-based encoding rules ber der well non-tlv based ones per xer csn.1 describes encoding rules using non-tlv semantics recently xml used implement messaging different nodes network messages typically prefixed line-based text commands beep
[ 5472, 7361, 7364, 3751, 904, 10058, 172, 10924, 432, 6577, 4723, 9909, 11413, 11321, 10271, 4797, 2206, 479 ]
None
11,211
4
Cure53:cure53 cure53 german cybersecurity firm company found dr.ing mario heidrich client side security researcher report firm south korean security app smart sheriff described security holes catastrophic south korean government ordered app shut
[ 3590, 11399, 8172, 5813, 2558 ]
Test
11,212
9
Comparison_of_C_Sharp_and_Visual_Basic_.NET:comparison c sharp visual basic .net c visual basic .net two primary languages used program .net framework c vb.net syntactically different languages different histories name suggests c syntax based core c programming language originally developed dennis ritchie bell labs 1970s java c++ two programming languages whose syntax also based c syntax share common look feel see comparison java c sharp topic basic roots go back dartmouth college basic beginner all-purpose symbolic instruction code developed 60 method overcome difficulties using assembly language written processor specific and/or brand name specific main frames hardware may recall programming hardware dependent design marketing reasons preserve logical composition programming transcend hardware microsoft claim fame operating system free consumers hardware specific devices encapsulating task within operating system code became portable due compiler fact visual basic .net c use clr common language runtime today microsoft hp interested creating iso standard language original goal however hp dropped support iso computer language never materialized international standard vb.net roots basic language '60s name acronym beginner all-purpose symbolic instruction code beginning basic used college community basic language first exposure computer programming acronym represented language accurately '70s language picked microcomputer manufacturers era used simple rom embedded programming language well quasi operating system input/output control early '80s language picked microsoft expanded significantly beyond original intent visual basic language/platform sold throughout 1990s rapid application development rad tool windows programming competed directly rad tools 1990s powerbuilder even though visual basic successful development platform discontinued 6th version vb6 microsoft introduced .net framework related visual studio development platform early 2000s time current c++ vb6 languages used microsoft basis two new programming languages new integrated development environment ide languages named c vb.net february 2017 microsoft communicated intent end co-evolution strategy two languages existed since 2010 allow two languages evolve independently c dominant microsoft-based development language developers notice vb 15 first appearing visual studio 2017 lacks certain language capabilities contained new c 7.3 though c vb.net syntactically different differences mostly end microsoft developed languages part .net framework development platform developed managed supported language development team microsoft compile intermediate language il runs .net framework runtime libraries although differences programming constructs discussed differences primarily syntactic assuming one avoids visual basic compatibility libraries provided microsoft aid conversion vb6 almost every command vb equivalent command c vice versa lastly languages reference base classes .net framework extend functionality result exceptions program written either language run simple syntax converter translate many open source commercially available products task fundamental differences languages found implementation interfaces declaration raising handling events although languages high-level programming languages vb.net maintains slightly higher level abstraction respects one main goals .net multi-language support intent design various microsoft languages level access os features able expose level power usability simplify calling module one language written another language implementation .net programming languages share runtime engine uniform abstract syntax tree common intermediate language additionally .net languages access platform features including garbage collection cross language inheritance exception handling debugging allows output binary produced .net programming language visual studio provides minor differences development environment c vb.net subsequent release visual studio differences development environments languages reduced instance early versions visual studio poor support intellisense c compared visual basic .net offer background compilation c currently main differences development environments additional features visual basic .net originated vb6 including background compilation feature visual studio ide whereby code compiled written programmer purpose identifying compilation errors without requiring solution built feature available visual basic since .net 1.1 present early versions visual studio visual basic .net however background compilation relatively new concept visual c available service pack 1 visual studio 2008 standard edition distinct disadvantage c error list panel update solution rebuilt refactoring large projects c made difficult need frequently rebuild solution order highlight compilation errors case visual basic error list panel synchronized background compiler background compilation less demanding system resources results faster build cycles particular advantage large projects significantly reduce time required start debugging ide bulk differences c vb.net technical perspective syntactic sugar features languages things easier one language another many differences two languages actually centered around ide although default codice_53 backward compatibility reasons recommended microsoft widely considered good practice turn codice_53 due fact increases application performance reduces possibility naming errors programming mistakes visual basic .net terminates block code codice_59 statements codice_60 statements loop familiar programmers experience using t-sql c braces codice_61 used delimit blocks familiar programmers experience widely deployed languages c++ java additionally c block consists single statement braces may omitted c case sensitive visual basic .net thus c possible two variables apparent name example codice_62 codice_63 visual studio correct make uniform case variables typed vb.net cases however case sensitivity useful c programmers typically capitalize type member names leave field variable names lowercase allows example fairly natural naming method arguments codice_64 however cause problems converting c code case-insensitive language visual basic unaccustomed reading case sensitive language visual basic case sensitive means combinations upper lower case letters keywords acceptable visual studio automatically converts visual basic keywords default capitalised forms e.g public c case sensitive c keywords lower cases visual basic c share keywords difference default visual basic keywords capitalised versions c keywords e.g codice_65 vs codice_66 codice_18 vs codice_68 keywords different versions visual basic c c keywords codice_80 represent different things applied methods opposed applied class definitions vb.net hand uses different keywords different contexts c vb.net high adoption rates active developer communities microsoft fully supports communities .net framework developers widely use vb.net c primary languages however c community activity internet books available c may indicate either adoption c users need help examples community industry adoption include c++/cli replacement managed extensions c++ adoption rate c vb.net significant following c++/cli syntactically stylistically culturally closest c however c++/cli stays closer c++ roots c c++/cli directly supports pointers destructors unsafe program concepts supported limited languages allows direct use .net code standard c++ code c++/cli used porting native/legacy c++ applications .net framework cases programmer wants take control code control comes significant cost ease use readability many automated tools come visual studio reduced functionality interacting c++ code reflection provide much information code c vb.net j runs distant fourth terms adoption j language primarily designed ease transition java applications .net framework allows developers leave much java j++ code unchanged still running .net framework thus allowing migrate small pieces another .net language c individually j receive level updates languages level community support example visual studio 2005 team system supports automatic generation unit tests c vb.net c++ excludes j j discontinued included visual studio 2008 newer versions since existing j feature set largely meets customer needs usage j declining .net languages compile common intermediate language cil contains rich metadata functionally logically equivalent original .net language code reasons possible code directly cil rarely done equivalency cil .net language code permits tools .net reflector transform .net assembly source code nearly identical original source code obfuscators often used guard operate directly modifying cil assembly order make difficult impossible de-compile higher level .net language
[ 1931, 6411, 6414, 10510, 6160, 5521, 3350, 3736, 155, 10145, 5796, 11559, 5677, 5806, 7983, 9008, 3765, 7479, 10043, 10684, 1856, 5952, 963, 10435, 5961, 1610, 1611, 9804, 3577, 8397, 11219, 5588, 7894, 4057, 10586, 4572, 11617, 4069, 7274,...
Train
11,213
4
High-Tech_Bridge:high-tech bridge high-tech bridge sa web security company based geneva switzerland develops machine learning artificial intelligence technologies application security via ast platform immuniweb ai started december 2007 vendor-neutral penetration testing boutique high-tech bridge named industry leader best service provider among ethical hacking penetration testing companies frost sullivan market research 2012 high-tech bridge founded ilia kolochenko swiss application security expert sc media thought leader forbes technology council member contributing editor sc magazine uk dark reading idg cso online november 2013 international telecommunication union high-tech bridge agreed use immuniweb part itu toolset ensuring websites itu member states secure july 2015 high-tech bridge pricewaterhousecoopers switzerland announced strategic partnership based around immuniweb web penetration testing continuous monitoring vulnerability assessment capabilities partnership afterward expanded pwc global offices including pwc singapore high-tech bridge security research team released 500 security advisories affecting various software issues identified products many well-known vendors sony mcafee novell addition many web vulnerabilities affecting popular open source commercial web applications oscommerce zen cart microsoft sharepoint sugarcrm others high-tech bridge security research lab registered cve cwe compatible mitre high-tech bridge one 24 organizations globally first switzerland able achieve cwe certification company listed among 81 organizations august 2013 include cve identifiers security advisories high-tech bridge launched ssl/tls configuration testing tool october 2015 tool validates email web tls ssl server configuration nist guidelines checks pci dss compliance cited articles covering talktalk data breach discovery vulnerabilities yahoo sites high-tech bridge widely reported leading t-shirt gate affair changes yahoo bug bounty program high-tech bridge identified reported four xss vulnerabilities yahoo domains company awarded two gift vouchers value 25 sparse reward offered security researchers identifying vulnerabilities yahoo criticized sparking came called t-shirt-gate campaign yahoo sending t-shirts thanks discovering vulnerabilities high-tech bridge discovery vulnerabilities subsequent criticism yahoo reward program led yahoo rolling new vulnerability reporting policy offers 150 15,000 reported issues based pre-established criteria december 2013 high-tech bridge research privacy popular social networks email services cited class action lawsuit allegedly violating members privacy scanning private messages sent social network october 2014 high-tech bridge discovered remote code execution vulnerabilities php december 2014 high-tech bridge identified ransomweb attack development ransomware attacks hackers started taking webs servers encrypting data demanding payment unlock files april 2014 discovery sophisticated drive-by download attacks revealed drive-by download attacks used target specific website visitors authentication compromised web resource december 2015 high-tech bridge tested popular free email service providers ssl/tls email encryption hushmail previously considered one secure email providers received failing f grade company updated ssl configuration received score b+ march 2015 immuniweb recognized frost sullivan 2015 market insight 'the complete hybrid offering available april 2016 high-tech bridge selected red herring europe 2016 winner sc media reboot 2016 named immuniweb industry innovator analysis testing category april 2017 frost sullivan research machine learning application security testing ast recognized high-tech bridge innovative player ast marketplace outperforming hpe ibm security may 2017 gartner named high-tech bridge garter cool vendor cool vendors security midsize enterprises 2017 adam hils june 2017 high-tech bridge selected sc awards europe 2017 winner best emerging technology category june 2018 immuniweb named winner “ best usage machine learning ai ” category sc awards europe 2018 outperforming six finalists including ibm watson cybersecurity high-tech bridge member number security-related organizations including
[ 3555, 8644, 1638, 711, 7228, 1970, 11476, 2709, 6423, 5404, 4062, 8735 ]
Validation
11,214
4
Ticket_punch:ticket punch ticket punch control nippers hand tool permanently marking admission tickets similar items paper card stock makes perforation corresponding chad ticket punch resembles hole punch differing ticket punch longer jaw reach option distinctive die shape ticket punch resembles needle punch makes distinctive pattern item punched differs makes chad ticket punches widely used mark railway passenger tickets particularly important ticket punched ticket punches also widely used orienteering replaced needle punches see control point orienteering ticket punches also decorative uses involving perforations chads available die shapes include many geometric shapes silhouettes objects animals die shapes company logos proprietary images manufactured special arrangement used punch decorative holes margins pieces paper make small confetti punched tickets issued best buses mumbai till 2011 replaced electronic ticketing systems older tickets reportedly used artwork well games
[]
None
11,215
4
Machine_Identification_Code:machine identification code machine identification code mic also known printer steganography yellow dots tracking dots secret dots digital watermark certain color laser printers copiers leave every single printed page allowing identification device document printed giving clues originator developed xerox canon mid-1980s existence became public 2004 2018 scientists developed privacy software anonymize prints order support whistleblowers publishing work mid-1980s xerox pioneered encoding mechanism unique number represented tiny dots spread entire print area xerox developed machine identification code assuage fears color copiers could used counterfeit bills received u.s. patent 5515451 describing use yellow dots identify source copied printed document october 2004 consumers first heard hidden feature used dutch authorities track counterfeiters used canon color laser printer november 2004 pc world broke news machine identification code used decades printers allowing law enforcement identify track counterfeiters central bank counterfeit deterrence group cbcdg denied developed feature 2005 civil rights group electronic frontier foundation eff encouraged public send sample printouts subsequently decoded pattern pattern demonstrated wide range printers different manufacturers models eff stated 2015 documents previously received foia suggested major manufacturers color laser printers entered secret agreement governments ensure output printers forensically traceable 2007 european parliament asked question invasion privacy pattern consists dot-matrix spread yellow dots barely seen naked eye dots diameter tenth millimeter 0.004 spacing one millimeter 0.039 arrangement encodes serial number device date time printing repeated several times across printing area case errors example code consists 8 × 16 dots square hexagonal pattern spreads surface appears sheet size din-a4 paper 150 times thus analyzed even fragments excerpts available printers arrange yellow dots seemingly random point clouds according chaos computer club 2005 color printers leave code matrix 32 × 16 dots thus store 64 bytes data 64×8 xerox one manufacturers draw attention marked pages stating product description digital color printing system equipped anti-counterfeit identification banknote recognition system according requirements numerous governments copy shall marked label necessary allows identification printing system created code visible normal conditions 2018 scientists tu dresden analyzed patterns 106 printer models 18 manufacturers found four different encoding schemes machine identification code made visible printing copying page subsequently scanning small section high-resolution scanner yellow color channel enhanced image processing program make dots mic clearly visible good lighting conditions magnifying glass may enough see pattern uv-light yellow dots clearly recognizable using steganographic process high-quality copies original e.g bank note blue light made identifiable using process even shredded prints restored 2011 shredder challenge initiated darpa solved team called shreds belong u.s. consisting otavio good two colleagues copies printouts documents confidential personal information example health care information account statements tax declaration balance sheets traced owner printer creation date documents revealed traceability unknown many users inaccessible manufacturers publicize code produces patterns unclear data may unintentionally passed copy printout particular mentions technique support materials affected printers exceptions see 2005 electronic frontier foundation eff sought decoding method made available python script analysis 2018 scientists tu dresden developed published tool extract analyze steganographic codes given color printer subsequently anonymize prints printer anonymization works printing additional yellow dots top machine identification code scientists made software available order support whistleblowers efforts publicize grievances methods identification easily recognizable yellow dots example modulation laser intensity variation shades grey texts already feasible unknown whether manufacturers using techniques
[ 10976, 4617, 8329, 8554, 11221 ]
Test
11,216
3
Edholm's_law:edholm law edholm law named phil edholm says three categories communication namely wireless mobile nomadic wireless without mobility wired network fixed lockstep converge edholm law also holds data rates telecommunications categories increase similar exponential curves slower rates trailing faster ones predictable time lag soon even slower communications channels like cellphones radio modems eclipse capacity early ethernet due developments standards known umts mimo boost bandwidth maximizing antenna usage extrapolating forward indicates convergence rates nomadic wireless technologies around 2030 addition wireless technology could end wireline communication cost latter infrastructure remains high edholm law predicted required data rates double every 18 months proven true last decade trend evident 16 years cases cellular wireless lan wireless personal area networks
[]
None
11,217
5
Synchronous_transmit-receive:synchronous transmit-receive synchronous transmit-receive str early ibm character-oriented communications protocol preceded bisync str point-to-point employed four-of-eight transmission code communicating 5100 characters per second half-duplex full-duplex communication lines ibm 1009 data transmission unit ibm 1130 synchronous communications adapter ibm system/360 model 20 communications adapter ibm 2701 data transmission unit provided host computer support str ibm 7701 ibm 7702 magnetic tape transmission terminal ibm 1013 card transmission terminal ibm 7710 ibm 7711 data communication units among remote devices supported str str still supported 1972 although generally faded use four-of-eight code 64 character set plus six control characters encoded eight bits exactly four bits character one bits — 70 possible bit combinations four-of-eight code first column graphics 7701 graphic shown code unassigned plus zero minus zero distinct values many machines shown +0 -0 second column graphics 1130 sca graphics shown different 7701 mostly characters ebcdic character set present bcd synchronous transmit-receive control codes control characters reserved provision transparent operation longitudinal redundancy check byte character could four one bits byte contains zero bit position data record contained even number one bits one odd number idle characters control sequences included lrs data transmitted line maintained synchronize mode — terminal transmits idle characters approximately 1.3 seconds followed end-of-idle sequence codice_1 listens sequence approximately three seconds four wire operation data transmitted wire pair maintained synchronize mode least one idle character sent transmission ownership line established transmitting station sending inquiry sequence codice_2 receiving terminal responds acknowledge codice_3 following initiation sequence transmitting terminal sends codice_4 followed first block data data terminated end-of-transmittal-record codice_5 receiving terminal replies codice_6 codice_7 longitudinal redundancy check indicates transmission error process continues even/odd codice_8 codice_9 sending terminal transmitted data sends end-of-transmission sequence codice_10 receiving terminal responds codice_10 re-enters synchronize mode
[ 8138, 4938, 10508, 1997, 3443, 3323 ]
None
11,218
9
OpenLisp:openlisp openlisp programming language lisp family developed christian jullien conforms international standard islisp published jointly international organization standardization iso international electrotechnical commission iec iso/iec 13816:1997 e revised iso/iec 13816:2007 e written programming languages c lisp runs common operating systems openlisp designated islisp implementation also contains many common lisp-compatible extensions hashtable readtable package defstruct sequences rational numbers libraries network socket regular expression xml portable operating system interface posix sql lightweight directory access protocol ldap openlisp includes interpreter associated read–eval–print loop repl lisp assembly program lap backend compiler language c. main goal lisp version implement fully compliant islisp system launched codice_1 flag strictly restricted iso/iec 13816:2007 e specification secondary goal provide complete embeddable lisp system linkable c/c++ java via java native interface jni callback mechanism used communicate external program goals usable scripting language glue language produce standalone program executables despite name openlisp proprietary software interpreter available free charge noncommercial use openlisp mainly runs console mode codice_2 microsoft windows terminal emulator unix-based systems alternate solutions include running openlisp emacs via setting emacs codice_3 using integrated development environment ide supports openlisp syntax lispide daansystems natively internally openlisp uses virtual memory allocate extend objects automatically small objects type allocated using bibop big bag pages memory organization large objects use proxy point real object lisp heap conservative garbage collection mark sweep coalescing heap sweep phase configured use threads openlisp uses tagged architecture 4 bits tag 32-bit 5 bits tag 64-bit fast type checking small integer float symbol cons string vector small integers 28 bits 32-bit 59 bits 64-bit unboxed large 32/64-bit integers boxed required islisp arbitrary-precision arithmetic bignums also implemented characters hence strings either 8-bit ansi ebcdic 16/32-bit unicode support enabled lisp kernel native interpreter basic libraries hand coded language c lap intermediate language produced compiler translated c c backend code generator 1988 first motive behind openlisp implement lisp subset extend emact emacs clone islisp became obvious choice quickly development ensued openlisp claims extremely portable runs many operating systems including windows unix posix based linux macos freebsd openbsd netbsd solaris hp-ux aix cygwin qnx dos os/2 pocket pc openvms z/os official website download section contains 50 different versions openlisp interact modules written c using foreign function interface ffi islisp streams extended support network socket codice_4 directory includes samples hypertext transfer protocol http javascript object notation json post office protocol 3 pop3 simple mail transfer protocol smtp telnet rss simplified extensible markup language xml reader convert xml lisp basic sql module used mysql odbc sqlite postgresql comma-separated values csv module read write csv files developer tools include data logging pretty-printer profiler design contract programming unit tests well known algorithms available codice_5 directory dantzig simplex algorithm dijkstra algorithm ford–fulkerson algorithm modules shipped using bsd licenses prefix open refers open systems open-source model name chosen 1993 replace mlisp internal code name already used gosling emacs successor mocklisp openlisp programming language different openlisp project begun 1997 implement locator/identifier separation protocol section describes compiler transforms lisp code c. fibonacci number function classic definition used benchmarks efficient way compute codice_6 lisp compiler translates lisp source code following intermediate code followed peephole optimization pass uses intermediate format analyze optimize instructions optimization final lap code finally c code generator uses lap code translate instructions c. static pointer oldefcompiled1 olfib_00 p1 _l003 _l004 openlisp accepts lines unlimited length recommended style line text code 80 characters per line chosen sdf public access unix system nonprofit public access unix systems internet one programming languages available online bricsys uses openlisp implement autolisp bricscad computer-aided design cad system meva entirely written openlisp università degli studi di palermo uses openlisp teach lisp
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 5677, 3119, 9780, 2105, 3132, 6717, 7234, 8258, 8771, 3142, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 9320, 2666, 5751, 2168, 7805, 9345, 1159, 9865, 6797, 9...
None
11,219
9
Comparison_of_programming_languages:comparison programming languages programming languages used controlling behavior machine often computer like natural languages programming languages conform rules syntax semantics thousands programming languages new ones created every year languages ever become sufficiently popular used people professional programmers may use dozens languages career programming languages standardized international national standard even widely used ones perl standard ml despite name notable standardized programming languages include algol c c++ javascript name ecmascript smalltalk prolog common lisp scheme ieee standard ada fortran cobol sql xquery following table compares general technical information selection commonly used programming languages see individual languages articles information please note following table may missing information programming languages print error message throw exception input/output operation system call e.g. chmod kill fails unless programmer explicitly arranged different handling events thus languages fail safely regard mostly older languages require programmer explicitly add checks kinds errors psychologically different cognitive biases e.g. optimism bias may affect novice experts alike omissions lead erroneous behavior literature programming languages contains abundance informal claims relative expressive power framework formalizing statements deriving interesting consequences table provides two measures expressiveness two different sources additional measure expressiveness gzip bytes found computer language benchmarks game benchmarks designed mimic particular type workload component system computer programs used compiling benchmark data section may fully optimized relevance data disputed accurate benchmarks customized particular situation people benchmark data may value others proper interpretation brings many challenges computer language benchmarks game site warns over-generalizing benchmark data contains large number micro-benchmarks reader-contributed code snippets interface generates various charts tables comparing specific programming languages types tests
[ 512, 10752, 6147, 9224, 2062, 6160, 5658, 9245, 8225, 2605, 5165, 5677, 5168, 1591, 2617, 6718, 10819, 8262, 1610, 1611, 9804, 6228, 10345, 1130, 2666, 7274, 2670, 623, 6775, 3705, 7292, 9345, 2691, 9875, 10387, 8854, 3736, 155, 3229, 732...
None
11,220
1
Metadata_repository:metadata repository metadata repository database created store metadata metadata information structures contain actual data metadata often said data data misleading data profiles example actual data data metadata one layer abstraction removed – data structures contain data metadata may describe structure data subject stored format well-designed metadata repository typically contains data far beyond simple definitions various data structures typical repositories store dozens hundreds separate pieces information data structure comparing metadata couple data items one digital one physical help one understand metadata really first digital data stored database one may table called patient many columns containing data describes different attribute patient one columns may named patient_last_name metadata column contains actual surnames patients database already used two items name column contains data patient_last_name name table contains column patient metadata might include maximum length last name may entered whether last name required patient without patient_last_name whether database converts surnames entered lower case upper case metadata security nature may show restrictions limit may view names second physical data stored brick mortar library one many volumes may various media including books metadata books would include isbn binding_type page_count author etc within binding_type metadata would include possible bindings material etc contextual information business data include meaning content policies govern technical attributes specifications transform programs manipulate metadata repository responsible physically storing cataloging metadata data metadata repository generic integrated current historical generic meta model store metadata generic terms instead storing applications-specific defined way data base standard changes one product another physical meta model metadata repository would need change integration metadata repository allows business areas metadata integrated fashion covering domains subject areas organization metadata repository accessible current historical metadata metadata repositories used referred data dictionary transition needs metadata usage business intelligence increased scope metadata repository increased earlier data dictionaries closest place interact technology business data dictionaries universe metadata repository initial stages scope increased business glossary tags variety status flags emerged business side consumption technology metadata lineage linkages made repository source valuable reports bring business technology together helped data management decisions easier well assess cost changes metadata repository explores enterprise wide data governance data quality master data management includes master data reference data integrates wealth information integrated metadata across organization provide decision support system data structures even though reflects structures consumed various systems repository additional functionalities compared registry metadata repository stores metadata like metadata registry also adds relationships related metadata types metadata related flow point entry organization deliverables considered lineage data point metadata related across related metadata types called linkages providing relationships metadata points across organization maintaining integrity architecture handle changes metadata repository provides basic material understanding complete data flow definitions impact also important feature maintain version control though statement contrasting open discussion definitions still evolving accuracy definitions needs refinement purpose registry define metadata element maintained across organization data models data management teams refers registry changes follow metadata repository sources metadata various metadata systems organizations reflects upstream repository never acts upstream registry used upstream metadata changes metadata repository enables structure organizations data containers one integrated place opens plethora resourceful information making calculated business decisions tool uses one generic form data model integrate models thus brings applications programs organization one format top applying business definitions business processes brings business technology closer help organizations make reliable roadmaps definite goals one stop information business control changes impact analysis tool usually business spends lots time money make decisions based discovery research impacts make changes add new data structures remove structures data management organization structured well maintained repository moving product ideation delivery takes least amount time considering variables constant sum database management system dbms database tools language metadata components within database applications already repositories registries expected provide necessary functionality access data stored within vendors want companies capable easily migrating data away products competitors products proprietary way handle metadata case tools dbms dictionaries etl tools data cleansing tools olap tools data mining tools handle store metadata differently metadata repository designed store metadata components tools metadata repositories store metadata four classifications ownership descriptive characteristics rules policies physical characteristics ownership showing data owner application owner descriptive characteristics define names types lengths definitions describing business data business processes rules policies define security data cleanliness timelines data relationships physical characteristics define origin source physical location like building logical data model creating database logical meta model help identify metadata requirements business data metadata repository centralized decentralized distributed centralized design means one database metadata repository stores metadata applications business wide centralized metadata repository advantages disadvantages centralized database easier manage data one database disadvantage bottlenecks may occur decentralized metadata repository stores metadata multiple databases either separated location departments business makes management repository involved centralized metadata repository advantage metadata broken individual departments distributed metadata repository uses decentralized method unlike decentralized metadata repository metadata remains original application xml gateway created acts directory accessing metadata within different application advantages disadvantages distributed metadata repository mirror distributed database design information model include various layers metadata types overlapped create integrated view data various metadata types stitched related metadata elements top model linking business glossary layers metadata metadata repositories designed either entity-relationship model object-oriented design
[ 479 ]
Test
11,221
7
GitHub:github github american company provides hosting software development version control using git subsidiary microsoft acquired company 2018 7.5 billion offers distributed version control source code management scm functionality git well adding features provides access control several collaboration features bug tracking feature requests task management wikis every project github offers plans free professional enterprise accounts free github accounts commonly used host open source projects january 2019 github offers unlimited private repositories plans including free accounts may 2019 github reports 37 million users 100 million repositories including least 28 million public repositories making largest host source code world github developed chris wanstrath p. j. hyett tom preston-werner scott chacon using ruby rails started february 2008 company github inc. existed since 2007 located san francisco february 24 2009 github team members announced talk yahoo headquarters within first year online github accumulated 46,000 public repositories 17,000 formed previous month alone time 6,200 repositories forked least 4,600 merged july 5 2009 github announced site harnessed 100,000 users july 27 2009 another talk delivered yahoo preston-werner announced github grown host 90,000 unique public repositories 12,000 forked least total 135,000 repositories july 25 2010 github announced hosting 1 million repositories april 20 2011 github announced hosting 2 million repositories june 2 2011 readwriteweb reported github surpassed sourceforge google code total number commits period january may 2011 july 9 2012 peter levine general partner github investor andreessen horowitz stated github growing revenue 300 annually since 2008 profitably nearly entire way january 16 2013 github announced passed 3 million users mark hosting 5 million repositories december 23 2013 github announced reached 10 million repositories june 2015 github opened office japan first office outside u.s. july 29 2015 github announced raised 250 million funding round led sequoia capital round valued company approximately 2 billion 2016 github ranked 14 forbes cloud 100 list february 28 2018 github fell victim second largest distributed denial-of-service ddos attack history incoming traffic reaching peak 1.35 terabits per second june 4 2018 microsoft announced reached agreement acquire github 7.5 billion purchase closed october 26 2018 june 19 2018 github expanded github education offering free education bundles schools june 4 2018 microsoft announced intent acquire github us 7.5 billion deal closed oct. 26 2018 github continue operate independently community platform business microsoft service led xamarin nat friedman reporting scott guthrie executive vice president microsoft cloud ai current ceo chris wanstrath retained technical fellow also reporting guthrie microsoft become significant user github using host open source projects development tools chakra core powershell visual studio code backed open source projects linux developed virtual file system git vfs git formerly git virtual file system gvfs —a git extension managing large-scale repositories adopted github concerns developers kyle simpson javascript trainer author rafael laguna ceo open-xchange microsoft purchase citing uneasiness microsoft handling previous acquisitions nokia mobile business skype saw culmination microsoft recent changes business strategy ceo satya nadella seen larger focus sale cloud computing services main line business alongside development contributions open source software linux opposed microsoft windows operating system harvard business review argued microsoft intending acquire github get access userbase used loss leader encourage use development products services concerns sale bolstered interest competitors bitbucket owned atlassian gitlab commercial open source product also runs hosted service version sourceforge owned bizx llc reported seen spikes new users intending migrate projects github respective services github inc. originally flat organization middle managers words everyone manager self-management employees could choose work projects interested open allocation salaries set chief executive 2014 github inc. introduced layer middle management github.com start-up business first years provided enough revenue funded solely three founders start taking employees july 2012 four years company founded andreessen horowitz invested 100 million venture capital july 2015 github raised another 250 million venture capital series b round investors sequoia capital andreessen horowitz thrive capital venture capital funds august 2016 github making 140 million annual recurring revenue github mascot anthropomorphized octocat five octopus-like arms character created graphic designer simon oxley clip art sell istock website enables designers market royalty-free digital images github became interested oxley work twitter selected bird designed logo illustration github chose character oxley named octopuss since github wanted octopuss logo use istock license disallows negotiated oxley buy exclusive rights image github renamed octopuss octocat trademarked character along new name later github hired illustrator cameron mcefee adapt octocat different purposes website promotional materials mcefee various github users since created hundreds variations character available octodex march 2014 github programmer julie ann horvath alleged founder ceo tom preston-werner wife theresa engaged pattern harassment led leaving company april 2014 github released statement denying horvath allegations however following internal investigation github confirmed claims github ceo chris wanstrath wrote company blog investigation found tom preston-werner capacity github ceo acted inappropriately including confrontational conduct disregard workplace complaints insensitivity impact spouse presence workplace failure enforce agreement spouse work office preston-werner resigned company 2017 allegations made discriminatory unsupportive behavior github developer recruited following commitment github improve diversity inclusivity development github platform began october 19 2007 site launched april 2008 tom preston-werner chris wanstrath p. j. hyett scott chacon made available months prior beta release projects github accessed manipulated using standard git command-line interface standard git commands work github also allows registered non-registered users browse public repositories site multiple desktop clients git plugins also created github third parties integrate platform site provides social networking-like functions feeds followers wikis using wiki software called gollum social network graph display developers work versions forks repository fork branch within fork newest user must create account order contribute content site public repositories browsed downloaded anyone registered user account users able discussions manage repositories submit contributions others repositories review changes code github began offering unlimited private repositories cost january 2019 limited three contributors per project previously public repositories free fundamental software underpins github git written linus torvalds creator linux additional software provides github user interface written using ruby rails erlang github inc. developers wanstrath hyett preston-werner github mostly used code addition source code github supports following formats features github terms service require public software projects hosted github meet open source definition reason essential users developers intending use piece software found github read software license repository usually found top-level file called license license.txt similar determine meets needs terms service state setting repositories viewed publicly agree allow others view fork repositories github enterprise similar github public service designed use large-scale enterprise software development teams enterprise wishes host repositories behind corporate firewall cloud enterprises privately run github cloud premises two environments linked work together github pages static web hosting service offered github since 2008 github users hosting user blogs project documentation even whole books created page github pages content stored git repository either files served visitors verbatim markdown format github seamlessly integrated jekyll static web site blog generator github continuous integration pipelines time content source updated jekyll regenerates website automatically serves via github pages infrastructure rest github includes free paid tiers service instead supported web advertising web sites generated service hosted either subdomains github.io domain custom domains bought third-party domain name registrar github also operates services pastebin-style site called gist hosting code snippets github proper hosting larger projects tom preston-werner presented then-new gist feature punk rock ruby conference 2008 gist builds traditional simple concept pastebin adding version control code snippets easy forking ssl encryption private pastes gist git repository multiple code snippets contained single paste pushed pulled using git forked code pushed back original author form patch gists pastes become like mini-projects github launched new program called github student developer pack give students free access popular development tools services github partnered bitnami crowdflower digitalocean dnsimple hackhands namecheap orchestrate screenhero sendgrid stripe travis ci unreal engine launch program 2016 github announced launch github campus experts program train encourage students grow technology communities universities campus experts program open university students 18 years older across world github campus experts one primary ways github funds student oriented events communities campus experts given access training funding additional resources run events grow communities become campus expert applicants must complete online training course consisting multiple modules designed grow community leadership skills github also provides software service integrations adding extra features projects services include site https //github.community/ github maintains community forum users ask questions publicly answer questions users site https //github.com/sponsors github sponsors allows users make monthly money donations projects hosted github public beta announced may 23 2019 currently project accepts wait list registrations verge said github sponsors works exactly like patreon developers offer various funding tiers come different perks ’ receive recurring payments supporters want access encourage work except zero fees use program furthermore github offer incentives early adopters first year pledges cover payment processing costs match sponsorship payments 5,000 per developer furthermore users still use similar services like patreon open collective link websites july 25th 2019 developer based iran wrote medium github blocked private repositories prohibited access github pages soon github confirmed blocking developers iran crimea cuba north korea syria accessing private repositories however github reopened access github pages days later public repositories regardless location also revealed using github visiting sanctioned countries could result similar action occurring user account github responded complaints media spokesperson saying github subject us trade control laws committed full compliance applicable law time github vision global platform developer collaboration matter developers reside result take seriously responsibility examine government mandates thoroughly certain users customers impacted beyond required law includes keeping public repositories services including open source projects available accessible support personal communications involving developers sanctioned regions developers feel restrictions appeal removal said restrictions including travel reside countries github forbidden use vpns ip proxies access site sanctioned countries purchase history ip addresses flag users among sources december 3 2014 github blacklisted russia github initially refused take user-posted suicide manuals day russia withdrew block december 31 2014 github blocked india along 31 websites pro-isis content posted users january 10 2015 github unblocked march 26 2015 github fell victim massive ddos attack lasted 118 hours attack appeared originate china primarily targeted github-hosted user content describing methods circumventing internet censorship october 8 2016 github access blocked turkish government prevent email leakage hacked account belonging country energy minister july 25 2019 github started blocking developers countries facing us trading sanctions prominent open source organizations projects use github primary place collaboration including
[ 6150, 2058, 6154, 6156, 10250, 10258, 19, 8217, 8225, 8226, 6191, 2098, 10290, 2105, 58, 10298, 2108, 6209, 4171, 4194, 10338, 4200, 10345, 10353, 6265, 4231, 2186, 142, 2191, 10394, 10405, 2224, 2228, 10422, 4282, 6331, 10428, 4289, 194, ...
Validation
11,222
3
Lavarand:lavarand lavarand hardware random number generator designed silicon graphics worked taking pictures patterns made floating material lava lamps extracting random data pictures using result seed pseudorandom number generator although secondary part random number generation uses pseudorandom number generator full process essentially qualifies true random number generator due random seed used however applicability limited low bandwidth covered titled method seeding pseudo-random number generator cryptographic hash digitization chaotic system 1997 2001 web site lavarand.sgi.com demonstrating technique landon curt noll one originators went help develop lavarnd use lava lamps despite short life lavarand.sgi.com often cited example online random number source 2017 cloudflare maintains similar system lava lamps securing approximately 10 internet traffic
[ 10051, 8956 ]
Test
11,223
5
Tasman_(layout_engine):tasman layout engine tasman discontinued browser engine developed microsoft inclusion macintosh version internet explorer 5 tasman attempt improve support web standards defined world wide web consortium time release tasman seen layout engine best support web standards html css internet explorer mac longer supported newer versions tasman incorporated microsoft products tantek çelik led software team developed tasman engine tasman later became used layout engine msn mac os x office 2004 mac first version tasman referred v0 released internet explorer 5 macintosh edition march 27 2000 upgraded version version 0.1 followed release internet explorer 5.1 mac may 15 2003 microsoft released subscription-only msn mac os x browser used upgraded version tasman version 0.9 layout engine posting mac internet explorer talk list internet explorer mac program manager jimmy grewal listed improvements tasman improved part number tv set-top box projects microsoft reaching version 1.0 tasman engine used microsoft tv mediaroom edition may 11 2004 microsoft started shipping microsoft office 2004 mac incorporates version tasman layout engine email client entourage since microsoft office mac 2011 entourage replaced macintosh version microsoft outlook uses webkit-based layout engine used safari instead
[ 5765, 9609, 6028, 7951, 790, 6171, 417, 7713, 11683, 10026, 10282, 7346, 11060, 10808, 3790, 3407, 4048, 9167, 9808, 8281, 2777, 603, 8923, 487, 5101, 9328, 2676, 4728, 124 ]
Train
11,224
4
Telecom_network_protocol_analyzer:telecom network protocol analyzer telecom network protocol analyzer protocol analyzer analyze switching signaling telecommunication protocol different nodes pstn mobile telephone networks 2g 3g gsm networks cdma networks wimax mobile telecommunication network analyze traffic msc bsc bsc bts msc hlr msc vlr vlr hlr protocol analyzers mainly used performance measurement troubleshooting devices connect network calculate key performance indicators monitor network speed-up troubleshooting activities
[ 9440 ]
Test
11,225
4
Malwarebytes:malwarebytes malwarebytes inc. american internet security company offices santa clara california clearwater florida tallinn estonia cork ireland specializes protecting home computers smartphones companies malwarebytes formally established january 2008 marcin kleczynski bruce harrison ceo vice president research malwarebytes respectively though origins company date back 2004 kleczynski became involved forums discussing computer viruses 2011 malwarebytes acquired hphosts website blacklisting company tracks blacklisted websites ad servers june 2015 company announced moving headquarters 10 almaden boulevard san jose california new office space two top floors 12-story 3979 freedom circle santa clara company reported growth 10 million users one year 2014–2015 increase revenue 1653 2014 2015 malwarebytes fixed 250 million computers five billion malware threats worldwide several malwarebytes products become well known computer world malwarebytes anti-malware available two different versions one free download home computers professional version 14-day free trial advance malwarebytes anti-exploit uses exploit mitigation protect vulnerable programs attack endpoint security advanced anti-ransomware technology package unveiled january 2016 three products incorporated single program called malwarebytes 3.0 premium paid program 14-day free trial period malwarebytes anti-exploit longer available free standalone product malwarebytes inc. informally established 2004 ceo founder marcin kleczynski originally poland still teenager attending high school bensenville illinois time working technician computer repair shop chicago noticed whenever infected computers arrived would generally reformat computer regardless infection minor mother computer became infected kleczynski learned virus n't directly attacked finding neither mcafee symantec would remove malware system later recalled 've never angry got computer infected professed mother told fix penalty death kleczynski posted forum spywareinfo popular time able learn cure took three days company unofficially founded kleczynski conversed became friends several editors forum tempted buy unused domain one site regulars bruce harrison kleczynski wrote inaugural version company software 2006 worked college roommate produce freely available program called rogueremover utility specialized fighting type infection known rogues scam computer users giving away credit card information fake anti-virus software rogueremover proved instrumental developing malwarebytes anti-malware kleczynski able set forum enabled improve software feedback kleczynski harrison formally launched malwarebytes january 21 2008 kleczynski studying computer science university illinois bruce became vp research malwarebytes hired doug swanson experience freeware development work new company marcus chung e-commerce expert formerly worked greenborder hired chief operating officer kleczynski harrison reportedly made 600,000 first year selling software despite met personally time 2011 malwarebytes acquired hphosts website blacklisting company tracks blacklisted websites ad servers necessary development protect new internet protocol addresses web servers distribute malware advise internet service providers shut malicious activity year company claimed removed five billion pieces malware three years following year company launched corporate market enterprise product aimed desktop-based anti-malware detection protection 2013 malwarebytes acquired zerovulnerabilitylabs inc. security research development company founded pedro bustamante protects software applications known zero-day exploits used exploit kits web-based vulnerability exploits corporate-targeted attacks expanded malware removal protection android platform launch malwarebytes anti-malware mobile launched usb-based product called malwarebytes techbench aimed helping technicians remove malware 2014 malwarebytes received 30 million funding highland capital following year announced treated 250 million computers worldwide representing 20–25 working business computers 2013 claimed removed five billion malware threats computers first five years june 2015 company announced moving headquarters 10 almaden boulevard san jose california new office space two top floors 12-story 3979 freedom circle santa clara california new office twice size former office company reported growth 10 million users one year 25 35 million active users time increase revenue 1653 2014 2015 kleczynski named one forbes magazine '30 30 january 2016 malwarebytes unveiled advanced anti-ransomware package endpoint security announced raised 50 million investment fidelity management research company kleczynski stated funds would used primarily company hiring product development marketing assets june malwarebytes announced strong growth sales 75 percent first quarter year compared 2015 billings surpassing 100 million corporate subscription base company reported grown 90 september proofpoint inc. ceo gary steele joined company board directors kleczynski citing deep expertise security software industry proven ability increasing sales revenue main reasons appointment october company purchased adwcleaner windows program used clean adware computers february 2017 company acquired saferbytes italian security start-up specialized anti-malware anti-exploit anti-rootkit cloud av sandbox technologies december 2016 malwarebytes anti-malware updated built ground combined 3 flagship products anti-malware anti-exploit anti-ransomware renamed malwarebytes anti-malware malwarebytes malwarebytes also functions anti-virus according release statement ceo marcin kleczynski states malwarebytes engine advantage many traditional antivirus programs developed 2008 many others developed late 1990s little idea malware would look like 15 years line states makes easier us adapt malware evolves new york times describes system hybrid heuristics behavior signature engine designed detect block malware vendors ca n't detect according dean takahashi venturebeat malwarebytes complements antivirus software vendors symantec mcafee anti-malware working anti-virus software attack problem different directions remarked malwarebytes cleans machines already infected pro version stops machine getting infected first place early development days rogueremover malwarebytes thrives community feedback runs two sub-forums complementing main forum known false positives malware contribution false positives reported allowing company update database within hours malware contribution allowing quickly report missing download kleczynski quoted saying still try work like bootstrapped company 'd rather build products customers buy rather sell something may need. ” malwarebytes several products 2011 available 36 different languages malwarebytes anti-malware offers two different versions one free download home computers professional version 14-day free trial advance offering real-time protection malware automated scanning automatic updating malwarebytes anti-malware mobile free android app protects smartphones mobile malware preventing unauthorized access personal data identifying tracking applications rating 4.4 google play store 2014 company launched malwarebytes anti-malware 2.0 improved user interface dashboard 2014 company launched malwarebytes anti-exploit shields selected applications attacks exploit mitigation protect vulnerable programs anti-exploit also comes free paid version windows computers free version stops exploits browsers java whilst paid product adds protection wider range software applications anti-exploit received four stars pc magazine v3 magazine security innovation year award 2016 malwarebytes anti-exploit merged premium version malwarebytes version 3.0 standalone application offered perpetual beta july 2015 malwarebytes acquired adwaremedic released malwarebytes anti-malware mac detects malware adware potentially unwanted programs macintosh computers january 2016 malwarebytes unveiled malwarebytes endpoint security advanced anti-ransomware technology described first solution offer multiple layers protection unknown ransomware company sponsored survey osterman research 540 firms united states united kingdom canada germany found nearly 40 companies experienced ransomeware incidents 34 percent accounted loss revenue guardian reported one-fifth british companies charged 10,000 unlock files increasing demand anti-ransomeware technology endpoint inception beta reportedly downloaded 200,000 businesses consumers first six months year malwarebytes also numerous tools junkware removal tool remove adware anti-rootkit beta remove repair rootkits startuplite boost speed windows reboot fileassassin prevent locked files software license requires arbitration county reside forbids class action suits reverse engineering sharing limits warranties liability even free version may shared since track use separately user malwarebyte privacy policy lists many types information collect store including software running user computer programs installed use malwarebytes says collect name email address mailing address phone number ... company name company size business type ... internet protocol ip addresses browser type internet service provider isp referring/exit pages files viewed site ... operating system date/time stamp and/or clickstream data ... type device use operating system version unique device identifier ... language ... 32- 64-bit ... information windows security/action center including security settings programs installed use ... license ... represents console system number seats managed installation console endpoint domain information ... organization ip address licensed different limits use sale sharing data general put time limits long keep data except ip address users ask deletion pii text says save locations ip addresses including mobile devices go get gps locations mobile devices ask access track location based information mobile device time downloading using mobile apps services say get antenna locations also collect detailed information malware exploits find tied user license number device identifier vendor ... file path exploit process ... command-line arguments passed exploit ... potentially copy exploit executable list license number pii certificate truste among things certifies company limits information collected limits use specified privacy notice 2018 key individuals working malwarebytes included
[ 2049, 7809, 131, 5891, 1417, 3595, 3981, 10637, 9488, 3473, 9341, 4374, 1052, 156, 6431, 8735, 2721, 9121, 9375, 5924, 37, 550, 679, 1318, 2601, 2213, 2859, 3243, 6699, 6823, 5935, 8615, 9771, 6834, 4403, 4659, 9523, 10166, 11198, 7103, ...
None
11,226
9
Fexpr:fexpr lisp programming languages fexpr function whose operands passed without evaluated fexpr called body fexpr evaluated evaluations take place except explicitly initiated fexpr contrast ordinary lisp function called operands evaluated automatically results evaluations provided function traditional lisp macro called operands passed unevaluated whatever result macro function returns automatically evaluated early lisp environment mapped symbol association list rather directly value standard keys lists included two keys used store data value looked symbol occurred argument four keys used store function looked symbol occurred operator function keys indicated compiled ordinary function whose operands evaluated passed indicated compiled special form whose operands passed unevaluated indicated user-defined ordinary function indicated user-defined special form difference fexpr expr whether operands automatically evaluated strict original usage fexpr therefore user-defined function whose operands passed unevaluated however later usage term fexpr may describe first-class function whose operands passed unevaluated regardless whether function primitive user-defined simple illustration fexprs work fexpr definition written kernel programming language similar scheme convention kernel names fexprs always start definition provides fexpr called takes three operands fexpr called local environment created extending static environment fexpr defined local bindings created symbols bound three operands call fexpr symbol bound dynamic environment fexpr called body fexpr ... evaluated local environment result evaluation becomes result call fexpr net effect first operand evaluated dynamic environment depending whether result evaluation non-negative either second third operand evaluated result returned operand either third second evaluated example statically scoped local environment extension static environment 1980 lisp languages supported fexprs mainly dynamically scoped local environment extension dynamic environment rather static environment however still sometimes necessary provide local name dynamic environment avoid capturing local parameter names fexpr support continued lisp 1.5 last substantially standard dialect lisp fragmented multiple languages 1970s two dominant lisp languages — maclisp interlisp — supported fexprs 1980 conference lisp functional programming kent pitman presented paper special forms lisp discussed advantages disadvantages macros fexprs ultimately condemned fexprs central objection lisp dialect allows fexprs static analysis determine generally whether operator represents ordinary function fexpr — therefore static analysis determine whether operands evaluated particular compiler tell whether subexpression safely optimized since subexpression might treated unevaluated data run-time since decline maclisp interlisp two lisp languages risen dominance 1993 — scheme common lisp — support fexprs newlisp support fexprs calls macros picolisp built-in functions fsubrs lisp-level functions exprs fexprs lexprs mixture starting brian smith 3-lisp 1982 several experimental lisp dialects devised explore limits computational reflection support reflection lisps support procedures reify various data structures related call — including unevaluated operands call makes procedures fexprs late 1990s fexprs become associated primarily computational reflection theoretical results fexprs obtained 1993 john c. mitchell used lisp fexprs example programming language whose source expressions formally abstract concrete syntax source expression always extracted context operand fexpr 1998 mitchell wand showed adding fexpr device lambda calculus — device suppresses rewriting operands — produces formal system trivial equational theory rendering impossible make source-to-source optimizations without whole-program analysis 2007 john n. shutt proposed extension lambda calculus would model fexprs without suppressing rewriting operands attempt avoid wand result following languages implement fexprs near equivalents
[ 7392, 10083, 11269, 6502, 4839, 5033, 5833, 205, 2062, 3119, 3408, 2577, 9454, 10510, 10198, 5783, 4799 ]
Test
11,227
9
TADS:tads text adventure development system tads prototype-based domain-specific programming language set standard libraries creating interactive fiction games original tads 1 released high energy software shareware 1988 followed tads 2 long early 1990s tads established number one development tool interactive fiction place simpler systems like agt adventure game toolkit late 1990s joined inform popular interactive fiction development language tads 2 syntax based c bits pascal tads 2 maintained updated regular intervals creator michael j. roberts even became freeware july 1996 graham nelson creator inform describes inform tads two systems ... widely used last half 1990s tads called second commonly used programming language today multimedia tads introduced 1998 allows games display graphics animation play sounds platform supports 2006 tads received major overhaul release tads 3 complete rewrite tads engine retaining platform-dependent code ease porting tads 3 uses language syntax resembles c++ java many new features efficient dynamic objects automatic garbage collection structured exceptions native utf-8 strings many useful function classes tads 3 compiler interpreter ported dos macintosh unix platforms several tads 3 games released games written tads compiled platform-independent format played computer suitable virtual machine vm exists virtual machines exist several platforms respect tads closely follows example original infocom z-machine well modern languages java c whereas tads 1 2 vms parse commands entered player sending results game tads 3 employs general-purpose virtual machine command-parsing done game code akin inform rationale easier customize parser
[ 1952, 2304, 9345, 8262, 9926, 8524, 5677, 6797, 5053, 7983, 9714, 9875, 5492, 823, 11228, 2045 ]
Test
11,228
9
Inform:inform inform programming language design system interactive fiction originally created 1993 graham nelson inform generate programs designed z-code glulx virtual machines versions 1 5 released 1993 1996 around 1996 nelson rewrote inform first principles create version 6 inform 6 following decade version 6 became reasonably stable popular language writing interactive fiction 2006 nelson released inform 7 briefly known natural inform completely new language based principles natural language new set tools based around book-publishing metaphor versions inform generate files z-code also called story files source code files run z-code interpreter – program properly implements z-code virtual machine z-machine specification z-machine originally developed infocom 1979 interactive fiction titles least one interpreter nearly every major minor platform means z-code file run multitude platforms alterations andrew plotkin created unofficial version inform 6 also capable generating files glulx virtual machine designed overcome many limitations several-decades-old z-machine starting inform 6.3 released february 29 2004 inform 6 included official support virtual machines based andrew plotkin work early release inform 7 support glulx august 2006 glulx support released inform originally created graham nelson 1993 1996 nelson rewrote inform first principles create version 6 inform 6 following decade version 6 became reasonably stable popular language writing interactive fiction inform 6 system consists two major components inform compiler generates story files inform source code inform library suite software handles difficult work parsing player text input keeping track world model name inform also refers inform programming language compiler understands although inform 6 z-machine originally designed interactive fiction mind many programs developed including basic interpreter lisp tutorial complete interpreter tetris game version game snake inform compiler generates files z-machine glulx also called story files inform 6 source code inform programming language object-oriented procedural key element language objects objects maintained object tree lists parent–child relationships objects since parent–child relationship often used represent location object parent another object often said hold objects moved throughout tree typically top level objects represent rooms locations within game may hold objects representing room contents physical items non-player characters player character background effects objects hold objects codice_1 object might hold codice_2 object holding codice_3 object contains codice_4 object early versions inform objects different notion objects object-oriented programming thing class later versions added support class definitions allowed objects members classes objects classes inherit multiple classes interactive fiction games typically contain many unique objects many objects inform inherit class metaclass object however objects frequently attributes boolean properties codice_5 codice_6 recognized inform library languages would normally implemented via inheritance simple example inform 6 source code inform system also contains inform library automates nearly difficult work involved programming interactive fiction specifically includes text parser makes sense player input world model keeps track things objects properties rooms doors player inventory etc inform compiler require use inform library several replacement libraries available platypus informate library codes inform spanish example inform 6 source code makes use inform library inform 6 code sample usable inform 7 without special demarcation indicating embedded legacy code april 30 2006 graham nelson announced beta release inform 7 rec.arts.int-fiction newsgroup inform 7 consists three primary parts inform 7 ide development tools specialized testing interactive fiction inform 7 compiler new language standard rules form core library inform 7 inform 7 also relies inform library inform compiler inform 6 compiler compiles inform 7 source code inform 6 source code compiled separately inform 6 generate glulx z-code story file inform 7 also defaults writing blorb files archives include z-code together optional cover art metadata intended indexing purposes full set inform 7 tools currently available mac os x microsoft windows linux march 25 2007 release added command line support linux new releases include ide using gnome desktop environment gnome inform 7 sourceforge project language tools remain development march 25 2007 release included number changes language inform 7 named natural inform brief period time later renamed inform 7 old name inform 7 compiler named ni inform 7 comes integrated development environment ide mac os x microsoft windows linux mac os x ide developed andrew hunter microsoft windows ide developed david kinder linux ide known gnome inform developed philip chimento inform 7 ide includes text editor editing inform 7 source code like many programming editors features syntax highlighting marks quoted strings one color headings organizational sections volumes books chapters parts sections bolded made larger comments set different color made slightly smaller ide includes built-in z-code interpreter mac os x ide interpreter based zoom interpreter andrew hunter contributions jesse mcgrew microsoft windows ide interpreter based winfrotz developer tests game built-in interpreter progress tracked skein transcript views ide skein tracks player commands tree branching possibilities branch tree quickly re-followed making possible retry different paths game development without replaying portions game paths also annotated notes marked solutions exported text walkthroughs transcript hand tracks player commands game responses correct responses game marked blessed replaying transcript branch skein variations blessed version highlighted help developer find errors ide also provides various indices program development code shown class hierarchy traditional map book-like table contents forms clicking items index jumps relevant source code ide presents two side-by-side panes working pane contain source code worked current status compilation skein transcript indices source code running version game documentation inform 7 installed extensions settings concept imitate author manuscript book presenting two facing pages instead multitude separate windows notable features include strong bias towards declarative rule-based style programming ability infer types properties objects way used example statement john wears hat creates person called john since people capable wearing things creates thing wearable property since objects marked wearable capable worn sets john wearing hat another notable aspect language direct support relations track associations objects includes automatically provided relations like one object containing another object worn developer add his/her relations developer might add relations indicating love hatred beings track characters game met inform 7 highly domain-specific programming language providing writer/programmer much higher level abstraction inform 6 highly readable resulting source code statements inform 7 take form complete sentences blank lines indentation places structurally significant basic form inform 7 program follows following reimplementation hello deductible example written inform 7 relies library known standard rules automatically included inform 7 compilations mystery house possessed 2005 emily short first inform 7 game released public released part mystery house taken project march 1 2006 short announced release three games bronze example traditional puzzle-intensive game damnatio memoriae follow-up award-winning inform 6 game savoir-faire joined graham nelson reliques tolti-aph 2006 inform 7 public beta announced april 30 2006 six worked examples medium large scale works made available along source code including three games previously released march 1 emily short floatpoint first inform 7 game take first place interactive fiction competition also 2006 xyzzy awards best setting best npcs rendition nespresso 2007 political art experiment form text adventure game approach tragedy discussed academically association computing machinery cambridge university
[ 1952, 9345, 4486, 8262, 10855, 7019, 6797, 7983, 3350, 823, 11227, 5399, 3230 ]
None
11,229
9
True_BASIC:true basic true basic variant basic programming language descended dartmouth basic—the original basic created college professors john g. kemeny thomas e. kurtz true basic traces history offshoot dartmouth basic called structured basic sbasic short released sometime 1975 1976 installed mainline version basic dartmouth time sharing system dtss supported campus shortly kemeny became involved effort produce ansi standard basic attempt bring together many small variations language developed late 1960s early 1970s effort initially focused system known minimal basic similar early dartmouth basic string variables added later work aimed standard basic essentially sbasic early 1980s tens millions home computers running variation microsoft basic become de facto standard ansi efforts eventually became pointless became clear versions going market impact world dominated ms versions eventually ratified saw little adoption standards later withdrawn kemeny kurtz however decided continue efforts introduce concepts sbasic ansi standard basic efforts became true basic initially based dartmouth basic 7—otherwise known ansi basic—true basic introduced 1985 versions true basic compiler ms-dos microsoft windows classic mac os one time versions trs-80 color computer amiga atari st computers offered well unix command-line compiler structured programming implementation language dispenses need line numbers goto statements although still used true basic provides statements matrix arithmetic feature present dartmouth basic since early times dropped almost microcomputer versions basic interpreters supports global local variables permits recursive functions subroutines written designers wanted make language hardware-independent allow true basic source code run equally well version compiler part succeed endeavor drawback users direct access features machines available could remedied callable functions subroutines specially written assembly language using newer versions true basic older functions blocked example recent code would like simple program plots text welcome ... top left-hand corner screen continues never-ending loop plotting fabulous wikipedia random coordinates example simple animation could like jerry pournelle 1985 asked need true basic n't seem anything regular basic n't n't attacked logical intuitive manner criticized lack output encountering error preventing interactive debugging inserting print statements diagnostics pournelle concluded think 'll pass opportunity become born-again true basic believer 'll enjoy microsoft cbasic heresies users complained programs editor using 100 cpu core appears caused editor user programs using loop constantly polls keyboard mouse events problem known since least end 2010 yet early 2014 still worked
[ 3718, 7691, 4492, 1805, 6797, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 3233, 11683, 5925, 8101, 4136, 10666, 9644, 8494, 303, 7343, 11315, 315, 7355, 7486, 7870, 576, 4160, 4674, 11328, 10750, 712, 9166, 847, 9557, 1879, 92, 477, 29...
None
11,230
7
Fatpaint:fatpaint fatpaint free online web-based graphic design desktop publishing software product image editor includes integrated tools creating page layout painting coloring editing pictures photos drawing vector images using dingbat vector clipart writing rich text creating ray traced 3d text logos displaying graphics products zazzle purchased sold fatpaint integrates desktop publishing features brush painting vector drawing custom printed products single flash application supports use pressure-sensitive pen tablet allows user add images searching wikimedia picasa flickr google yahoo bing fatpaint collection public domain images completed project saved fatpaint server locally fatpaint affiliated zazzle owned mersica also developer makewebvideo fatpaint launched may 2010 five years development danish-brazilian software developer mario gomes cavalcanti cavalcanti ceo graduated object oriented software developer worked computer games industry departure involved development two denmark visited websites responsible developing running fatpaint partner kenneth christensen mastered assembler graphics programming amiga computer spent years mario amiga demo scene according ceo kenneth helped linux servers handled development administration promotion video production testing content founder fatpaint also created make web video video maker web application creating video presentations business families individuals video maker allows users give videos personal business use simple affordable way fatpaint provides free online logo maker graphic design vector drawing photo editor paint design english danish portuguese users change photo colours manipulating r g b channels saturation contrast brightness hue gamma sharpness tint rgba matrix users also remove unwanted background artifacts using paint tools added effects cloning multiple photos combined single image users pick different blend modes multiple layers users also extract change parts photo cropping resizing skewing bending distorting rotating 2d 3d hence users graphics printed custom products bought sold personal business purposes users choose 5000 vector images draw vector graphics art scratch using fatpaint vector shape creation tools also provides advanced symmetric vector transformation 2d 3d well support colour gradients multiple drawings combined form complex vector shapes different blend modes effects supported vector drawings cropped resized skewed distorted rotated 2d 3d similar fatpaint photo editor vector graphics displayed custom printed products purchased sold users personal business uses fatpaint full support pen tablets users pick pen brush airbrush paint bucket clone painting eraser smudging tools fatpaint offers 8 palettes painting plus 13 palettes clone painting fatpaint allows users import create brushes thousands free clipart drawings brush sets dynamic brushes effects blend modes paintings combined different layers objects similarly paintings cropped resized skewed bent distorted rotated 2d 3d moreover graphics displayed custom printed products users buy sell personal business uses fatpaint supports firefox google chrome opera internet explorer cookies javascript enabled browsers may work correctly due support java applets fatpaint requires adobe flash 10 newer sun java 6 newer recommended run windows 7 apple linux java disabled editor works firefox linux java flash integration work linux apple browsers wikimedia search disabled browsers fatpaint works best least 2gb ram 1gb video memory well decent graphics card
[ 3462 ]
None
11,231
3
Fantasy_Zone:fantasy zone game design main character many similarities earlier twinbee together games credited creation cute 'em subgenre numerous sequels made years space year 1422 6216 master system version fantasy zone cast panic collapse interplanetary monetary system space guild brings light plans planet menon whose forces stealing planets currencies fund huge fortress fantasy zone opa-opa sent stop invading army discover behind end turns leader none opa-opa long lost father revelation leaves opa-opa mixed emotions game player ship placed level number bases destroy bases gone stage boss appears must defeated order move next stage eight stages except final one scroll fixed player move either left right although stage loops final level consists rematch previous bosses succession facing final boss opa-opa uses two different attacks standard weapon initially bullets bombs also move land ground sprouting feet walking around flies possible upgrade opa-opa weapons bombs flying engine increase speed well get extra lives player must get money defeating enemies bases bosses access shop touching marked balloon time new item bought become expensive player chooses exit time runs another screen appears select upgrades opa-opa use one engine weapon bomb equipped time new weapons time limit starts soon shop left bombs used moment limited quantity engine upgrades permanent powerups also reassigned reentering shop touch balloon word select written player loses life upgrades lost fantasy zone originally arcade game later ported sega mark iii/master system game eventually saw ports consoles home computers msx famicom/nes snk neo geo sharp x68000 pc engine/turbografx 16 ports play similarly original version several omissions changes instance master system version lacks features radar indicates location bases gauge indicates much energy left two bosses replaced original ones versions several changes well two different versions released famicom/nes japanese version released 1987 developed published sunsoft american unlicensed version released 1989 developed pixel published tengen 1997 fantasy zone released sega ages label japan sega saturn fantasy zone later remade playstation 2 sega ages label although similar appearance arcade version even incorporating original arcade sounds version used polygons instead sprites added stages including bonus levels game takes view behind opa-opa tries collect coins boss defeated moment game mode similar space harrier unreleased space fantasy zone also even though 2up seen score display version single player mode version released north america along remade classic sega titles sega classics collection compilation fantasy zone released mobile phones 2002 japan august 2003 united states due hardware limitations version game divided three different parts march 11 2008 master system version saw re-release japan virtual console europe australia released april 11 2008 north america april 14 2008 territories released price 500 wii points september 18 year sega released another sega ages disc devoted series title fantasy zone complete collection making final release ages series time instead 3d remake disc compiled games series including spin-offs sega ports also included remake fantasy zone ii created system 16 hardware original arcade release also included sonic ultimate genesis collection unlockable game 3d port game released march 19 2014 nintendo 3ds titled 3d fantasy zone opa-opa bros. new features 3ds port involve stereoscopic 3d visuals adjustable difficulty settings ability save game ability switch japanese versions us versions game stage select feature new mode involves player playing upa-upa opa-opa brother addition satisfying certain conditions game enables player confront two replacement bosses master system release entering boss fight literally replacing standard boss fantasy zone also included minigame yakuza 0 unlocked completing one game friendship sidequests identical original arcade release change addition rapid fire button fantasy zone proved successful japanese arcades helping give rise popular system 16 arcade board despite game largely ignored gaming media arcade games time game reviewed 1988 dragon 136 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars
[ 8355, 3307, 4716, 6797, 8300, 9006, 10316, 4690, 5011, 11061, 11448, 986, 1854 ]
Validation
11,232
2
Pamela_Jones:pamela jones pamela jones commonly known pj creator editor groklaw website covered legal news interest free open-source software community jones open source advocate previously trained worked paralegal jones articles appeared linux journal lwn linuxworld magazine linux today linuxworld.com also wrote monthly opinion column uk print publication linux user developer one contributors book open sources 2.0 continuing evolution 2010 electronic frontier foundation awarded pioneer award pamela jones groklaw website legal blogging jones web site groklaw covered open source legal issues notably sco-linux controversies web site started blog grew groklaw covered various lawsuits involving sco group detail also covered general legal news interest free software open source community site numerous awards including electronic frontier foundation pioneer award 2010 american bar association journal blawg 100 2012 groklaw shut august 20 2013 following lavabit email shutdown way groklaw without email inability privately collaborate without ca n't groklaw without input jones also launched grokline unix ownership timeline project february 2004 grokdoc groklaw spinoff whose original goal create useful manual basic linux tasks new linux users find simple clear easy follow using learn study site also supports many collaborative projects benefit wiki-like structure jones reveals little personal information considers private expressed beginning strong preference avoiding fame reasons gave early days using initials originally wanted stay anonymous sense saying pj eventually media attention factors made impossible remain pj would could desire famous one thing creatively influenced scott mccloud work points understanding comics p. 45–51 section iconic representation people respond strongly drawing character simplifies point anyone identify character guess hoping effect words hoping people could assume whatever wanted focus said rather saying reason chose pj could anyone either sex nationality anyone one particular wanted participation anyone interested sco story politics nothing extraneous effort locate provide evidence could useful knew community could answer sco knew needed
[ 1026, 7938, 7812, 8326, 4360, 5644, 4493, 4367, 8848, 657, 10642, 1939, 2195, 1813, 2581, 3478, 2584, 6808, 7450, 11155, 10780, 1694, 6302, 7584, 802, 3618, 5410, 6691, 6947, 7204, 8354, 4011, 5931, 8364, 9646, 9135, 178, 1717, 823, 9660,...
Test
11,233
7
VCE_(company):vce company vce abbreviation virtual computing environment division emc corporation manufactured converged infrastructure appliances enterprise environments founded 2009 name acadia originally joint venture emc cisco systems additional investments intel emc subsidiary vmware emc acquired 90 controlling stake vce cisco october 2014 giving majority ownership beginning 2016 vce fully integrated emc became converged platform division emc september 7 2016 emc acquired dell converged platform division emc currently known converged platform solutions division dell emc company initially manufactured converged datacenter units known vblock incorporate cisco servers networking hardware emc storage systems vmware virtualization later vxblock added providing ability customers run vmware nsx 2015 vxrack 2016 vxrail added separate products cisco systems emc corporation vmware partially owned emc unveiled joint partnership november 2009 develop cloud computing platforms called vblock infrastructure packages partnership originally called vmware-cisco-emc alliance though name later shortened vce “ virtual computing environment coalition ” emc world trade show cisco emc introduced joint venture named acadia goal acadia originally set separate legal entity build vblock infrastructure packages standardized repeatable fashion customer data centers michael capellas also board member cisco named chairman acadia first chief executive officer ceo may 2010 sales initially encountered confusion among customers often different staffs storage networking example different fiscal quarter sales cycles end 2010 capellas told analysts venture 65 customers average system costing 2.5 million acadia virtual computing environment coalition combined single entity january 2011 called vce virtual computing environment company originally located silicon valley dallas texas expansion announced march 2011 richardson texas investment texas enterprise fund october 2011 another office opened marlboro massachusetts close vce emc-owned manufacturing plant franklin massachusetts july 2012 cisco executive praveen akkiraju appointed ceo frank hauck president estimated vce 1200 employees time undisclosed revenues accumulated losses publicized customers included babson college mississippi community college board press debated venture considered startup company one headline joking vce virtual cash erosion questioning millions dollars executive compensation others considered arrangement wise investment 2012 mixture success speculation layoffs continued confusion due products competing partners netapp flexpod xsigo systems cisco announced framework called cloudverse late 2011 specific vmware august 2012 emc announced vspex reference architecture partnership lenovo distributors seen competing lower-cost option november 2012 report gartner vce 57.4 share integrated infrastructure systems second quarter 2012 based revenue gartner previously tracked server networking external controller-based storage individual markets vce named one “ 2013 virtualization 50 ” crn magazine may 2013 vce estimated 1 billion annual sales rate 1,000 vblock systems sold however us securities exchange commission filings emc accounted cumulative loss 430 million september 2012 cisco loss 457 million early 2013 since revenues recorded owning companies vce emc reported investment 667.2 million cash 13.2 million stock-based compensation vce stake 58 cisco reported gross investment 457 million stake 35 2013 press writers initially criticized vce came view structure vce good business investors press highlighted vce source innovation financial performance investors total vce 2013 reported 1b 50 year-over-year growth rate october 2014 emc announced acquired majority control vce venture cisco maintaining 10 stake january 2016 emc announced vce become converged platform division emc chad sakac president vce marketed converged infrastructure servers known vblocks combine vmware vsphere software running cisco unified computing systems ucs connected cisco nexus switches attached emc symmetrix storage despite block name storage accessed either block device file server vblock systems marketed large-scale datacenters run software applications microsoft exchange server microsoft sharepoint sap erp delivered standard 19-inch rack units aid planning cooling power requirements 2009 virtual computing environment coalition announced three models vblock infrastructure packages vblock 2 intended high-end data centers designed support 3,000 6,000 virtual machines using cisco ucs cisco nexus 1000v multilayer director switches mds well emc symmetrix vmax storage vmware vsphere software vblock 1 intended midmarket designed 800 3,000 virtual machines similar configuration vblock 2 emc clariion storage rather emc symmetrix vmax vblock 0 intended low-end configuration projected release 2010 support 300 800 virtual machines use similar configuration emc celerrastorage term infrastructure package later changed infrastructure platform vblock system vblock brand name vce uses racks containing components data center products prepackaging called converged infrastructure allows customers select preconfigured integrated solutions predictable units power weight cooling geometry data center planning purposes vblock two series based following compositional elements vblock brand naming changed since inception 2009 term vblock infrastructure packages announced acadia technical partnership virtual computing environment coalition well primary investors late 2010 continuing 2011 term packages replaced platforms mid-2012 term infrastructure platforms replaced systems wider circulation arrive simply vblock™ systems meanwhile constituent elements technology included upgrades product lines cisco emc vmware originally combined reference architecture physical logical configuration step initially customer data center colocation data center later within pre-manufacturing environment shipment customer data center colocation data center options limited time marketed sold models named ex fx gx hx later 320 340 350 confirmed numbers announced publicly vce investors 2013 disclosed numbers provided conservatively 800 customers almost 60 countries nearly 2000 vce manufactured vblock systems sold lack manufactured physical logical build actual vce manufacturing floor previous deployments 2009 early 2010 called referred vblock often various use upper lower case spelling considered vblock pundits infrastructure professionals since so-called reference architectures varied greatly project project compared late 2010 manufactured vblock anecdotally institutions companies using vblock involved published testimonials may 2011 vblock system series 300 announced models ex fx gx hx smallest largest vblock 2 renamed 700 series vblock system 700 lx announced emc world may 2012 trade show expensive vblock system supporting thousands virtual machines vce introduced inclusion emc software backup recovery replication business continuity data mobility virtualized environments applications included emc avamar emc data domain emc recoverpoint vblock system 700 included emc vplex workload mobility business continuity software well support new features emc unified infrastructure manager improved vmware integration centralized monitoring multiple vblock systems february 2013 vce announced vblock 300 vblock 700 models increased performance data throughput using upgraded server storage components 2013 vce announced products midrange remote branch office market models included vblock system 100 vblock system 200 vblock 100 designed host 200 virtual machines 24u 42u rack mount space eight cisco c220 m3 blade servers two cisco catalyst 3750-x switches 8 tb storage capacity emc vnxe3150 vnxe3300 array vblock 200 comes configured 12 cisco servers two nexus 5548up unified ethernet san switches cisco catalyst 3750 management switch 105 hard drives via included vnx 5300 array vce introduced specialized system sap hana february 2013 combined vblock system sap hana in-memory computing database application software later september 2013 vce introduced specialized system high performance database oracle well extreme applications vmware citrix vdi environments dell introduced hyperconverged system emc world 2015 february 2015 first model vxrack 1032 based emc scaleio software defined storage second model announced vmware world september 2015 called vxrack 1034 based around vmware vsan models use commodity hardware rumoured sourced quanta attached local disk presented via scaleio vsan software desktop virtualization management software uses vmware view called fastpath announced august 2011 upgraded june 2012 february 2013 vce announced management software application vision intelligent operations software vce vision software enables single management pane components vblock systems manages via plugins third party management automation orchestration tools vmware cisco bmc ca others via restful api snmp unified logging vce provides services partners plan design deploy vblock systems
[ 4194, 9218, 6852, 10951, 6153, 2154, 7563, 11504, 6834, 4604, 10237, 10302, 127 ]
Validation
11,234
3
Classic_Adventure:classic adventure classic adventure also known adventure 1 fantasy text-based video game released abersoft 1982 originally released adventure 1 zx specturm 1982 changed classic adventure 1984-1985 re-released platforms classic adventure remake 1976 text adventure game colossal cave adventure text based game starts opening standing end road small brick building around forest small stream flows building gully player decide explore caves game obstacles must overcome treasure bring back house
[ 9006 ]
None
11,235
7
Deltacloud:deltacloud deltacloud application programming interface api developed red hat apache software foundation abstracts differences cloud computing implementations announced september 3 2009 infrastructure-as-a-service cloud existing today provides api purpose deltacloud provide one unified rest-based api used manage services cloud particular cloud controlled adapter called driver june 2012 drivers exist following cloud platforms amazon ec2 fujitsu global cloud platform gogrid opennebula rackspace rhev-m rimuhosting terremark vmware vcloud next 'classic front-end also offers cimi ec2 front-ends deltacloud used applications aeolus prevent need implement cloud-specific logic may 17 2010 red hat contributed deltacloud apache incubator project graduated incubator october 26 2011 became apache software foundation tlp top-level project july 2013 fujitsu vmware used deltacloud demonstration cimi management developers conference manage cloud infrastructure im may 2013 redhat announced scaling back sponsorship apache deltacloud project effective immediately july 2015 deltacloud moved apache attic due inactivity
[ 6153, 10377, 8460, 7567, 1296, 6161, 1047, 8217, 11161, 6555, 8860, 9245, 6307, 3877, 9766, 10661, 11303, 1327, 7983, 1079, 823, 4919, 4538, 1851, 5047, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 4944, 1...
Test
11,236
2
Houston_Automatic_Spooling_Priority:houston automatic spooling priority houston automatic spooling priority program commonly known hasp extension ibm os/360 operating system successors providing extended support job management data management task management remote job entry os/360 included spooling routines called reader/interpreters output writers reader/interpreter responsible reading one input job stream – one input device likewise output writer responsible controlling one printer punch spooled data stored os temporary datasets controlled standard os services reader/interpreter output writer separate operating system task partition region system large number readers printers punches might large number spooling tasks hasp developed ibm federal systems division contractors lyndon b. johnson space center houston developers tom simpson bob crabtree hasp program ran mainframe performed functions scheduling control job flow spooling printing/punching hasp support ibm system/360 operating system remote job entry 360s-rc-536 provided roughly equivalent facilities hasp ii v3 nih created shared spool capability hasp used many mainframe sites allowed hasp system share common spool checkpoint enabled workload balancing multi-mainframe environment hasp ii v4 mellon bank greb dave miko moved shared spool version carried forward jes2 multi-access spool ibm formal support hasp mvs 350 copies hasp ii v4 shared spool mods distributed around world shared spool mellon mods added share distribution process could widely accessed program sometimes referred various names indication ibm ever using official documents program became classified part ibm type-iii library competitor asp attached support processor ran one mainframe controlled scheduling attached mainframes asp later became jes3 mvs hasp became jes2 one two job entry subsystems many years hasp labels removed jes2 source messages issued jes2 still prefixed hasp modified version hasp used provide batch spooling remote job entry services michigan terminal system late 1960s 1970s 1980s hasp bypassed operating system services code specially tailored efficiency hasp operated single operating system task used cooperative multitasking internally run processors perform tasks running card readers printers punches managing spool files communicating system operator driving multiple communication lines remote job entry hasp written entirely system/360 assembler typical hasp system might require 86kb memory could virtual memory os/vs systems much would become jes2 jecl part hasp hasp supported ibm terminals 2770 2780 3780 additionally provided support multi-leaving communication intelligent workstations ibm 1130 system/360 model 20 multi-leaving fully synchronous pseudo-simultaneous bi-directional transmission variable number data streams two computers utilizing binary-synchronous communications facilities third party vendors developed variety 2770/2780/3780 simulators multi-leaving implementations use hasp asp vendors incorrectly referred products hasp emulators products actually terminals talked hasp perform functions hasp rje console operator could enter restricted set hasp console operator commands hasp commands precursor jes2 job entry control language jes2 jecl operands restricted remote site hence dj1-999 would display typically still outstanding operator remote site hasp rje console commands could entered short single letter form spelled command line c rm1.rdr meant cancel rather submit current deck cards read might use card jam made sensible let jobs go ahead one cards replaced nearby keypunch hasp job log output provided summary resources used job output appeared caps
[ 868, 6248, 2345, 3916, 7053, 5936, 340, 4535, 4667, 8606 ]
Train
11,237
8
Adobe_JRun:adobe jrun jrun j2ee application server originally developed 1997 java servlet engine live software subsequently purchased allaire brought first j2ee compliant version acquired macromedia prior 2001 takeover allaire subsequently adobe systems bought macromedia 2005 latest patch updater 7 released adobe 2007 updater 7 added sun jdk 1.6 support apache 2.2 support windows vista/iis7 support mac os x 10.4 intel support adobe announced august 2007 would discontinue new feature development jrun coldfusion team continue make changes underlying java engine required coldfusion 9 replaced jrun favor apache tomcat coldfusion 10
[ 225, 3560, 9097, 3469, 6797, 7983, 10097, 1363, 8627, 8628, 5048, 823, 1304, 11291 ]
None
11,238
3
Commando_(video_game):commando video game commando released japan run gun vertically scrolling arcade game released 1985 unrelated 1985 film name influence seen various later games shooter game genre versions released various home computers consoles game also appears capcom classics collection activision anthology wii virtual console arcade well capcom arcade cabinet playstation 3 xbox 360 player takes control soldier named super joe starts dropped jungle helicopter fight way singlehandedly fending massive assault enemy soldiers super joe armed sub-machine gun unlimited ammunition well limited supply hand grenades joe fire gun eight directions faces grenades thrown vertically towards top screen irrespective direction joe facing unlike submachine gun bullets grenades thrown clear obstacles explosions well-placed grenades kill several enemies end level screen stops player must fight several soldiers streaming gate fortress ordered cowardly officer immediately runs away although shooting back awards player bonus points along way one attempt free prisoners war transported across screen enemy nes version powerful machine gun upgrade well glasses let player view hidden bunkers unlimited grenade upgrade player lose upgrades losing life extra lives given 10,000 points per 50,000 scored 960,000 thereafter lives home version game developed capcom released nintendo entertainment system activision released port game atari 2600 intv released port intellivision also atari 7800 version sculptured software released 1989 elite released versions many home computers bbc micro acorn electron versions developed contract catalyst coders elite developed amiga atari st acorn electron zx spectrum amstrad cpc commodore 64 versions commodore 64 port theme complex extended version arcade music created less 12 hours rob hubbard started working late night worked night took one listen original arcade version started working c64 version ... time everyone arrived 8:00 morning loaded main tune every c64 building got cheque train home 10:00 arcade version re-released virtual console wolf battlefield commando japan october 5 2010 north america december 6 2010 pal region december 17 2010 atari 8-bit version created sculptured software 1989 intended released atari corporation xe game system however although game appeared atari catalogs time never reached market spite completed 2000s game prototype cartridge found computer gaming world said cartridges equal commando non-stop action nes game award best shooting game year according readers crash magazine also voted best arcade-style game year 1986 golden joystick awards nes version sold 1.1 million copies worldwide commando followed sequel titled mercs 1989 known senjō ōkami ii japan second sequel released downloadable title xbox live arcade playstation network 2008 outside japan arcade version bionic commando marketed sequel commando main character nameless soldier game identified super joe american brochure game super joe would appear actual supporting character later versions bionic commando nintendo entertainment system game boy well 2009 version bionic commando playstation 3 xbox 360 character super joe identified joseph gibson one three player characters mercs game duet elite systems ltd also called first commando '86 commando '87
[ 8034, 8937, 9006, 8496, 4082, 10931, 3256, 4540, 2333 ]
Test
11,239
9
ScicosLab:scicoslab scicoslab software package providing multi-platform environment scientific computation based official scilab 4.x build4 distribution includes modeling simulation tool scicos number toolboxes latest stable version scicoslab scicoslab 4.4.2 possible scilab/scicos currently complete alternative commercial packages dynamic systems modeling simulation packages matlab/simulink matrixx/systembuild scicoslab runs available binary format main available platforms like unix/linux workstations microsoft windows macosx scicoslab based scilab scicos forked currently separated new versions evolution order maintain compatibility among
[ 2691, 7301, 5129, 3980, 6797, 15, 8079, 5148, 7580, 7326, 7341, 9133, 7983, 6962, 823, 6718, 2242, 5830, 5703, 11207, 5833, 4840, 363, 7148, 5741, 1917 ]
Train
11,240
5
WBXML:wbxml wap binary xml wbxml binary representation xml developed wap forum since 2002 maintained open mobile alliance standard allow xml documents transmitted compact manner mobile networks proposed addition world wide web consortium wireless application protocol family standards mime media type application/vnd.wap.wbxml defined documents use wbxml wbxml used number mobile phones usage includes exchange activesync synchronizing device settings address book calendar notes emails syncml transmitting address book calendar data wireless markup language wireless village oma drm rights language over-the-air programming sending network settings phone
[ 1696, 7396, 1285, 8262, 1160, 479, 5875, 9207, 2679, 124, 1695 ]
Test
11,241
4
Ciphertext-only_attack:ciphertext-only attack cryptography ciphertext-only attack coa known ciphertext attack attack model cryptanalysis attacker assumed access set ciphertexts attacker channel providing access plaintext prior encryption practical ciphertext-only attacks attacker still knowledge plaintext instance attacker might know language plaintext written expected statistical distribution characters plaintext standard protocol data messages commonly part plaintext many deployed systems usually guessed known efficiently part ciphertext-only attack systems attack completely successful corresponding plaintexts deduced even better key ability obtain information underlying plaintext beyond pre-known attacker still considered success example adversary sending ciphertext continuously maintain traffic-flow security would useful able distinguish real messages nulls even making informed guess existence real messages would facilitate traffic analysis history cryptography early ciphers implemented using pen-and-paper routinely broken using ciphertexts alone cryptographers developed statistical techniques attacking ciphertext frequency analysis mechanical encryption devices enigma made attacks much difficult although historically polish cryptographers able mount successful ciphertext-only cryptanalysis enigma exploiting insecure protocol indicating message settings advanced ciphertext-only attacks enigma mounted bletchley park world war ii intelligently guessing plaintexts corresponding intercepted ciphertexts every modern cipher attempts provide protection ciphertext-only attacks vetting process new cipher design standard usually takes many years includes exhaustive testing large quantities ciphertext statistical departure random noise see advanced encryption standard process also field steganography evolved part develop methods like mimic functions allow one piece data adopt statistical profile another nonetheless poor cipher usage reliance home-grown proprietary algorithms subject thorough scrutiny resulted many computer-age encryption systems still subject ciphertext-only attack examples include
[ 7652, 1797, 262, 9156, 2957, 11119, 1105, 9617, 1941, 5749, 10329, 2074, 8286 ]
Test
11,242
9
Ole-Johan_Dahl:ole-johan dahl ole-johan dahl 12 october 1931 – 29 june 2002 norwegian computer scientist dahl professor computer science university oslo considered one fathers simula object-oriented programming along kristen nygaard dahl born mandal norway son finn dahl 1898–1962 ingrid othilie kathinka pedersen 1905–80 seven family moved drammen thirteen whole family fled sweden occupation norway nazi germany end war dahl studied numerical mathematics university oslo dahl became full professor university oslo 1968 gifted teacher well researcher worked hierarchical program structures probably influential publication appeared co-authored c.a.r hoare influential book structured programming 1972 dahl edsger dijkstra hoare perhaps best-known academic book concerning software 1970s career progressed dahl became increasingly interested use formal methods rigorously reason object-orientation example expertise ranged practical application ideas formal mathematical underpinning ensure validity approach dahl widely accepted norway ’ foremost computer scientist kristen nygaard produced initial ideas object-oriented oo programming 1960s norwegian computing center nr part simula 1961–1965 simula 67 1965–1968 simulation programming languages dahl nygaard first develop concepts class subclass allowing implicit information hiding inheritance dynamic object creation etc. important aspects oo paradigm object self-contained component data structure associated procedures methods software system combined form complete system object-oriented approach pervasive modern software development including widely used imperative programming languages java c++ received turing award work 2001 kristen nygaard received 2002 ieee john von neumann medal kristen nygaard named commander royal norwegian order st. olav 2000
[ 512, 9345, 4483, 7048, 9224, 4107, 11020, 10617, 10668, 5677, 2482, 1976, 6652, 4799, 4800, 10049, 4930, 11457, 70, 10568, 3529, 10061, 5585, 1883, 2012, 7775, 9315, 4201, 2283, 2798, 8057, 2556, 511 ]
Test
11,243
9
Atari_ST_BASIC:atari st basic atari st basic st basic first dialect basic produced atari st line computers bundled new sts early years st lifespan quickly became standard basic platform however many users disliked improved dialects basic quickly came replace atari commissioned metacomco write version basic would take advantage gem environment atari st based version already written digital research called dr-basic bundled dr cp/m-86 operating system result called st basic time st launched st basic bundled new sts port language called abasic ended supplied time amiga commodore quickly replaced microsoft-developed amigabasic user interface consisted four windows edit-window one could enter source code list-window entire source code could browsed command/debug-window instructions entered immediately executed output-window however windows could selected mouse became cumbersome st basic many bugs compute september 1987 reported one flaw described among worst basic bugs time typing codice_1 resulted similar commands codice_2 codice_3 crashed computer magazine described results last command bad crash get st without seeing machine rip free cables drag edge desk leap trash bin citing flaws codice_4 codice_5 equivalent magazine recommended avoid ing st basic serious programming regarding reports metacomco one bug away releasing long-delayed update language jokingly wondered whether atari one bug eliminate st basic one add relatively low quality st basic quickly opened market third-party basics st. fast basic gfa basic two first third-party basics released basics free program written one basics could listed run user basic however compilers run-time executables started appear basics produced executable code could run sts type-in programs became less fashionable longer need standard basic hisoft basic omikron basic stos basic appeared basics even started bundled new sts later years
[ 3718, 7691, 1805, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 1952, 3233, 11683, 5925, 8101, 4136, 7849, 10666, 8494, 303, 7343, 11315, 315, 7355, 7486, 7870, 4160, 4674, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 2541, 8429, ...
Test
11,244
4
Multi-factor_authentication:multi-factor authentication multi-factor authentication mfa authentication method computer user granted access successfully presenting two pieces evidence factors authentication mechanism knowledge something user user knows possession something user user inherence something user user two-factor authentication also known 2fa type subset multi-factor authentication method confirming users claimed identities using combination two different factors 1 something know 2 something 3 something good example two-factor authentication withdrawing money atm correct combination bank card something user possesses pin something user knows allows transaction carried two examples supplement user-controlled password one-time password otp code generated received authenticator e.g security token smartphone user possesses two-step verification two-step authentication method confirming user claimed identity utilizing something know password second factor something something example second step user repeating back something sent out-of-band mechanism second step might six digit number generated app common user authentication system use multiple authentication factors prove one identity based premise unauthorized actor unlikely able supply factors required access authentication attempt least one components missing supplied incorrectly user identity established sufficient certainty access asset e.g. building data protected multi-factor authentication remains blocked authentication factors multi-factor authentication scheme may include knowledge factors commonly used form authentication form user required prove knowledge secret order authenticate password secret word string characters used user authentication commonly used mechanism authentication many multi-factor authentication techniques rely password one factor authentication variations include longer ones formed multiple words passphrase shorter purely numeric personal identification number pin commonly used atm access traditionally passwords expected memorized many secret questions born poor examples knowledge factor may known wide group people able researched possession factors something user user used authentication centuries form key lock basic principle key embodies secret shared lock key principle underlies possession factor authentication computer systems security token example possession factor disconnected tokens connections client computer typically use built-in screen display generated authentication data manually typed user connected tokens devices physically connected computer used devices transmit data automatically number different types including card readers wireless tags usb tokens software token a.k.a soft token type two-factor authentication security device may used authorize use computer services software tokens stored general-purpose electronic device desktop computer laptop pda mobile phone duplicated contrast hardware tokens credentials stored dedicated hardware device therefore duplicated absent physical invasion device soft token may device user interacts typically x.509v3 certificate loaded onto device stored securely serve purpose factors associated user usually biometric methods including fingerprint face voice iris recognition behavioral biometrics keystroke dynamics also used increasingly fourth factor coming play involving physical location user hard wired corporate network user could allowed login utilizing pin code network entering code soft token well could required could seen acceptable standard access office controlled systems network admission control work similar ways level network access contingent specific network device connected wifi vs wired connectivity also allows user move offices dynamically receive level network access many multi-factor authentication vendors offer mobile phone-based authentication methods include push-based authentication qr code based authentication one-time password authentication event-based time-based sms-based verification sms-based verification suffers security concerns phones cloned apps run several phones cell-phone maintenance personnel read sms texts least cell phones compromised general meaning phone longer something user major drawback authentication including something user possesses user must carry around physical token usb stick bank card key similar practically times loss theft risks many organizations forbid carrying usb electronic devices premises owing malware data theft-risks important machines usb ports reason physical tokens usually scale typically requiring new token new account system procuring subsequently replacing tokens kind involves costs addition inherent conflicts unavoidable trade-offs usability security two-step authentication involving mobile phones smartphones provides alternative dedicated physical devices authenticate people use personal access codes device i.e something individual user knows plus one-time-valid dynamic passcode typically consisting 4 6 digits passcode sent mobile device sms generated one-time passcode-generator app cases advantage using mobile phone need additional dedicated token users tend carry mobile devices around times sms broadly-adopted multi-factor authentication method consumer-facing accounts notwithstanding popularity sms verification security advocates publicly criticized july 2016 united states nist draft guideline proposed deprecating form authentication year later nist reinstated sms verification valid authentication channel finalized guideline 2016 2017 respectively google apple started offering user two-step authentication push notification alternative method security mobile-delivered security tokens fully depends mobile operator operational security easily breached wiretapping sim cloning national security agencies advances research two-factor authentication mobile devices consider different methods second factor implemented posing hindrance user continued use improvements accuracy mobile hardware gps microphone gyro/acceleromoter ability use second factor authentication becoming trustworthy example recording ambient noise user location mobile device comparing recording ambient noise computer room user trying authenticate one able effective second factor authentication also reduces amount time effort needed complete process payment card industry pci data security standard requirement 8.3 requires use mfa remote network access originates outside network card data environment cde beginning pci-dss version 3.2 use mfa required administrative access cde even user within trusted network second payment services directive require strong customer authentication electronic payments european economic area september 14 2019 details authentication federal employees contractors usa defined homeland security presidential directive 12 hspd-12 existing authentication methodologies involve explained three types basic factors authentication methods depend one factor difficult compromise single-factor methods regulatory standards access federal government systems require use multi-factor authentication access sensitive resources example logging network devices perform administrative tasks accessing computer using privileged login nist special publication 800-63-3 discusses various forms two-factor authentication provides guidance using business processes requiring different levels assurance 2005 united states federal financial institutions examination council issued guidance financial institutions recommending financial institutions conduct risk-based assessments evaluate customer awareness programs develop security measures reliably authenticate customers remotely accessing online financial services officially recommending use authentication methods depend one factor specifically user knows determine user identity response publication numerous authentication vendors began improperly promoting challenge-questions secret images knowledge-based methods multi-factor authentication due resulting confusion widespread adoption methods august 15 2006 ffiec published supplemental guidelineswhich states definition true multi-factor authentication system must use distinct instances three factors authentication defined use multiple instances single factor according proponents multi-factor authentication could drastically reduce incidence online identity theft online fraud victim password would longer enough give thief permanent access information however many multi-factor authentication approaches remain vulnerable phishing man-in-the-browser man-in-the-middle attacks multi-factor authentication may ineffective modern threats like atm skimming phishing malware may 2017 o2 telefónica german mobile service provider confirmed cybercriminals exploited ss7 vulnerabilities bypass sms based two-step authentication unauthorized withdrawals users bank accounts criminals first infected account holder computers attempt steal bank account credentials phone numbers attackers purchased access fake telecom provider set-up redirect victim phone number handset controlled finally attackers logged victims online bank accounts requested money accounts withdrawn accounts owned criminals sms passcodes routed phone numbers controlled attackers criminals transferred money many multi-factor authentication products require users deploy client software make multi-factor authentication systems work vendors created separate installation packages network login web access credentials vpn connection credentials products may four five different software packages push client pc order make use token smart card translates four five packages version control performed four five packages check conflicts business applications access operated using web pages possible limit overheads outlined single application multi-factor authentication solutions virtual tokens hardware token products software must installed end users drawbacks multi-factor authentication keeping many approaches becoming widespread consumers difficulty keeping track hardware token usb plug many consumers technical skills needed install client-side software certificate generally multi-factor solutions require additional investment implementation costs maintenance hardware token-based systems proprietary vendors charge annual fee per user deployment hardware tokens logistically challenging hardware tokens may get damaged lost issuance tokens large industries banking even within large enterprises needs managed addition deployment costs multi-factor authentication often carries significant additional support costs 2008 survey 120 u.s. credit unions credit union journal reported support costs associated two-factor authentication report software certificates software toolbar approaches reported highest support costs research deployments multi-factor authentication schemes shown one elements tends impact adoption systems line business organization deploys multi-factor authentication system examples cited include u.s. federal government employs elaborate system physical tokens backed robust public key infrastructure well private banks tend prefer multi-factor authentication schemes customers involve accessible less expensive means identity verification app installed onto customer-owned smartphone despite variations exist among available systems organizations may choose multi-factor authentication system deployed within organization tends remain place users invariably acclimate presence use system embrace time normalized element daily process interaction relevant information system 2013 kim dotcom claimed invented two-factor authentication 2000 patent briefly threatened sue major web services however european patent office revoked patent light earlier 1998 us patent held several popular web services employ multi-factor authentication usually optional feature deactivated default many internet services among google amazon aws use open time-based one-time password algorithm totp support two-step authentication
[ 5636, 10756, 9745, 2084, 3629, 10801, 7739, 9791, 6220, 10831, 7248, 107, 9336, 5245, 5246, 10880, 9356, 8849, 10392, 2213, 7855, 2737, 5813, 1208, 3262, 7368, 5325, 6350, 2262, 6360, 6373, 3309, 9966, 10492, 5373, 4863, 2315, 9488, 6929, ...
Test
11,245
2
Overlapped_I/O:overlapped i/o overlapped i/o name used asynchronous i/o windows api introduced extension api windows nt utilizing overlapped i/o requires passing overlapped structure api functions normally block including readfile writefile winsock wsasend wsarecv requested operation initiated function call returns immediately completed os background caller may optionally specify win32 event handle raised operation completes alternatively program may receive notification event via i/o completion port preferred method receiving notification used symmetric multiprocessing environments handling i/o large number files sockets so-called overlapped api presents differences depending windows version used asynchronous i/o particularly useful sockets pipes unix linux implement posix asynchronous i/o api aio
[ 1577, 6797, 11674, 8976, 8275, 5492, 8499, 823, 5754 ]
None
11,246
2
Name_Service_Switch:name service switch name service switch nss facility unix-like operating systems provides variety sources common configuration databases name resolution mechanisms sources include local operating system files /etc/passwd /etc/group /etc/hosts domain name system dns network information service nis ldap system administrator usually configures operating system name services using file /etc/nsswitch.conf lists databases passwd shadow group one sources obtaining information examples sources files local files ldap lightweight directory access protocol nis network information service nisplus nis+ wins windows internet name service nsswitch.conf file line entries service consisting database name first field terminated colon list possible source databases mechanisms second field typical file might look like order services listed determines order nss attempt use services resolve queries specified database earlier unix-like systems notable exception ultrix either accessed configuration files hard-coded rules files databases access ultrix offered nearly identical functionality name service switch using configuration file /etc/svc.conf sun microsystems first developed nss solaris operating system subsequently programmers ported many operating systems including freebsd netbsd linux hp-ux irix aix
[ 9665, 7908, 2887, 168, 6888, 8266, 7983, 5397, 823, 1304, 6651, 700, 2143 ]
Train
11,247
2
DirectDraw:directdraw directdraw ddraw.dll deprecated api used part microsoft directx api directdraw used accelerate rendering 2d graphics applications directdraw also allows applications run fullscreen embedded window ms windows applications directdraw uses hardware acceleration available client computer directdraw allows direct access video memory hardware overlays hardware blitters page flipping video memory manager manipulate video memory ease taking full advantage blitting color decompression capabilities different types display adapters directdraw 2d api contains commands 2d rendering support 3d hardware acceleration programmer could use directdraw draw 3d graphics rendering would slow compared api direct3d support 3d hardware acceleration directdraw introduced windows mobile windows mobile 5.0 replacing graphics component gapi deprecated directdraw deprecated since version 7 directx version 8.0 directdraw merged new package called directx graphics extended direct3d directdraw api additions directdraw still used programmers must use older directx interfaces directx 7 release june 2010 directx sdk package directdraw header file library longer included concurrent deprecation directdraw deterioration windows compatibility old games relied old api command conquer warcraft 2 theme hospital among affected newer windows versions games refuse run 32-bit bit depth others showing black screen glitching switched re-implementation ddraw result vital many communities still hosting games commonly used replacements include
[ 10243, 10769, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 1632, 2145, 1656, 5754, 9340, 5761, 5765, 10886, 2183, 5259, 653, 6797, 4771, 7846, 10414, 8391, 214, 9943, 9434, 11487, 2783, 736, 4321, 63...
None
11,248
4
Microsoft_Forefront_Unified_Access_Gateway:microsoft forefront unified access gateway microsoft forefront unified access gateway uag software suite provides secure remote access corporate networks remote employees business partners services include reverse proxy virtual private network vpn directaccess remote desktop services uag released 2010 successor microsoft intelligent application gateway iag released 2007 uag part microsoft forefront offering microsoft discontinued product 2014 although web application proxy feature windows server 2012 r2 later offers functionalities web application proxy direct feature-for-feature replacement companies like portsys f5 offer direct migration paths uag deployments unified access gateway originally developed startup company named whale communications rosh haayin israel one challenges tried solve 1990s develop remote access solution based vpn mechanism without direct network access remote client corporate network type solution specifically required israeli military government meet national information security standards technology developed called air gap communication external network internal network managed two separate 1u rack-mount servers linked together memory bank accessed scsi interface 18 may 2006 microsoft announced would acquiring whale communications microsoft completed acquisition 26 july 2006 following acquisition product renamed microsoft intelligent application gateway server 2007 version scsi-based air gap dropped product unified single-server appliance instead using air gap security barrier iag used microsoft isa server firewall product iag offered public pre-installed appliance celestix networks ivo networks portsys nappliance 2009 release service pack 2 iag product also offered directly public microsoft form virtual appliance pre-installed vhd could run hyper-v vmware workstation april 2008 microsoft announced next generation iag named forefront unified access gateway product released 24 december 2009 service pack 1 product released 3 december 2010 update 1 service pack 1 released 17 october 2011 service pack 2 product released 6 august 2011 service pack 3 released 19 february 2013 service pack 4 released 27 november 2013 17 december microsoft announced microsoft deliver future full version releases forefront uag product removed price lists 1 july 2014 microsoft uag provides secure socket layer ssl virtual private network vpn web application firewall endpoint security management compliance security enable access control authorization content inspection wide variety line-of-business applications included customized granular access policy security capabilities microsoft exchange server 2003 2007 2010 microsoft sharepoint portal server 2003 2007 2010 microsoft terminal services citrix presentation server product highly customizable almost application published uag box uag server able work many authentication vendors mi-token rsa security onespan gridsure swivel activcard aladdin also works numerous authentication systems protocols active directory radius ldap ntlm lotus domino pki tacacs+ possible customizations include single-sign-on sso well look-and-feel dynamic customization current release uag update 2 product also offers support many third-party systems linux macintosh iphone product also supports mozilla firefox uag performs particularly well providing portal web applications web-based email intranets also provides full ssl vpn network access using either activex using internet explorer java components using firefox opera non windows client red hat mac os components also perform end-point compliance checks allowing access test attributes pc domain name antivirus definitions date running processes inclusion directaccess uag big influence success directaccess provides seamless vpn-like integration high-demand many organizations directaccess part windows uag provides user-friendly configuration interface making easier configure administrators uag also adds two additional components dns64 nat64 make deploying directaccess existing network easier without need deploy ipv6 product sold appliance form vendors ivo networks portsys celestix networks nappliance also offered installable dvd product installed windows server 2008 r2
[ 9732, 2309, 8584, 1417, 10889, 2443, 9722, 8211, 4760, 537, 3482, 11162, 3742, 7838, 9764, 5799, 5673, 10026, 4268, 5677, 7983, 7473, 10417, 7859, 2228, 10675, 823, 9655, 3777, 5057, 2884, 5959, 8265, 10828, 11468, 6222, 2383, 7376, 11606, ...
Test
11,249
4
Traceroute:traceroute computing codice_1 codice_2 computer network diagnostic commands displaying route path measuring transit delays packets across internet protocol ip network history route recorded round-trip times packets received successive host remote node route path sum mean times hop measure total time spent establish connection traceroute proceeds unless three sent packets lost twice connection lost route evaluated ping hand computes final round-trip times destination point internet protocol version 6 ipv6 tool sometimes name traceroute6 tracert6 command codice_1 available many modern operating systems unix-like systems freebsd macos linux available command line tool traceroute also graphically accessible macos within network utilities suite microsoft windows reactos provide program named codice_2 performs route-tracing function windows nt-based operating systems also provide pathping similar functionality reactos version developed ged murphy licensed gpl unix-like operating systems traceroute sends default sequence user datagram protocol udp packets destination port numbers ranging 33434 33534 implementations traceroute shipped linux freebsd netbsd openbsd dragonfly bsd macos include option use icmp echo request packets -i arbitrary protocol -p udp tcp using tcp syn packets icmp windows tracert sends icmp echo request packets rather udp packets traceroute sends default time-to-live ttl value also known hop limit used determining intermediate routers traversed towards destination traceroute sends packets ttl values gradually increase packet packet starting ttl value one routers decrement ttl values packets one routing discard packets whose ttl value reached zero returning icmp error message icmp time exceeded first set packets first router receives packet decrements ttl value drops packet ttl value zero router sends icmp time exceeded message back source next set packets given ttl value two first router forwards packets second router drops replies icmp time exceeded proceeding way traceroute uses returned icmp time exceeded messages build list routers packets traverse destination reached returns icmp destination unreachable message udp packets used icmp echo reply message icmp echo messages used timestamp values returned router along path delay latency values typically measured milliseconds packet sender expects reply within specified number seconds packet acknowledged within expected interval asterisk displayed internet protocol require packets take route towards particular destination thus hosts listed might hosts packets traversed host hop n reply hop skipped output network firewall operates windows unix-like systems one protocol must enabled inbound firewall traceroute work receive replies traceroute implementations use tcp packets tcptraceroute layer four traceroute pathping utility introduced windows nt combines ping traceroute functionality mtr enhanced version icmp traceroute available unix-like windows systems various implementations traceroute rely icmp time exceeded type 11 packets sent source linux tracepath utility similar traceroute primary difference requiring superuser privileges cisco implementation traceroute also uses sequence udp datagrams incrementing ttl values invalid port number remote host default udp port 33434 used extended version command known extended traceroute command change destination port number used udp probe messages implementations include least options specify number queries send per hop time wait response hop limit port use invoking traceroute specified options displays list available options man traceroute presents details including displayed error flags simple example linux example selected options wait three seconds instead five send one query hop instead three limit maximum number hops 16 giving instead 30 example.com final host help identify incorrect routing table definitions firewalls may blocking icmp traffic high port udp unix ping site note firewall may permit icmp packets permit packets protocols traceroute also used penetration testers gather information network infrastructure ip ranges around given host also used downloading data multiple mirrors available piece data one trace mirror get good idea mirror would fastest use traceroute manual page states original traceroute program written van jacobson 1987 suggestion steve deering particularly cogent suggestions fixes c. philip wood tim seaver ken adelman author ping program mike muuss states website traceroute written using kernel icmp support earlier coded enable raw icmp sockets first wrote ping program traceroute limitations well known taken account using tool example traceroute discover paths router level interface level another limitation appears routers respond probes routers limit icmp responses presence traffic load balancing traceroute may indicate path actually exist minimize problem traceroute modification called paris-traceroute maintains flow identifier probes avoid load balancing
[ 515, 516, 9733, 9735, 2568, 6674, 8729, 1580, 9780, 3659, 4174, 1647, 9839, 4725, 5759, 8834, 6281, 6797, 4750, 11413, 2198, 4248, 6812, 7329, 4771, 7847, 7336, 3755, 10924, 700, 7356, 10428, 8386, 11464, 1741, 1750, 9946, 4850, 7411, 639...
Train
11,250
5
Time_to_live:time live time live ttl hop limit mechanism limits lifespan lifetime data computer network ttl may implemented counter timestamp attached embedded data prescribed event count timespan elapsed data discarded revalidated computer networking ttl prevents data packet circulating indefinitely computing applications ttl commonly used improve performance manage caching data internet protocol ttl 8-bit field ipv4 header ttl 9th octet 20 ipv6 header 8th octet 40 maximum ttl value 255 maximum value single octet recommended initial value 64 time-to-live value thought upper bound time ip datagram exist internet system ttl field set sender datagram reduced every router route destination ttl field reaches zero datagram arrives destination datagram discarded internet control message protocol icmp error datagram 11 time exceeded sent back sender purpose ttl field avoid situation undeliverable datagram keeps circulating internet system system eventually becoming swamped immortals theory ipv4 time live measured seconds although every host passes datagram must reduce ttl least one unit practice ttl field reduced one every hop reflect practice field renamed hop limit ipv6 ttls also occur domain name system dns set authoritative name server particular resource record caching recursive nameserver queries authoritative nameserver resource record cache record time seconds specified ttl stub resolver queries caching nameserver record ttl expired caching server simply reply already cached resource record rather retrieve authoritative nameserver ttl nxdomain non-existent domain responses set minimum minimum field soa record ttl soa indicates long resolver may cache negative answer shorter ttls cause heavier loads authoritative name server useful changing address critical services like web servers mx records therefore often lowered dns administrator prior service moved order reduce possible disruptions units used seconds older common ttl value dns 86400 seconds 24 hours ttl value 86400 would mean dns record changed authoritative nameserver dns servers around world could still showing old value cache 24 hours change newer dns methods part disaster recovery dr system may records deliberately set extremely low ttl example 300-second ttl would help key records expire 5 minutes help ensure records flushed quickly worldwide gives administrators ability edit update records timely manner ttl values per record setting value specific records sometimes honored automatically standard dns systems worldwide however problem persists caching dns nameservers set ttls regardless authoritative records thus guaranteed downstream dns servers new records ttl expired time live may also expressed date time record expires codice_1 header http responses codice_2 header field requests responses codice_3 field http cookies express time-to-live way
[ 11, 2960, 5402, 5405, 3742, 7965, 7329, 2339, 7336, 3755, 4396, 5166, 6209, 2887, 842, 3018, 11094, 10844, 5469, 5470, 5472, 225, 7908, 11249, 6514, 3187, 8692, 9339 ]
None
11,251
6
Trash_(computing):trash computing computing trash also known recycle bin microsoft windows names operating systems temporary storage files deleted file manager user yet permanently erased file system typically recycle bin presented special file directory user whether actually single directory depends implementation allowing user browse deleted removed files undelete deleted mistake delete permanently either one one empty trash function within trash folder record kept file and/or directory original location certain operating systems files must moved trash accessed whether files deleted program go recycle bin depends level integration particular desktop environment function low-level utilities usually bypass layer entirely delete files immediately program includes file manager functionality may may send files recycle bin may allow user choose options small icon waste container deleting files implemented development apple lisa user interface 1982 called “ wastebasket. ” concept carried apple macintosh “ trash ” except pre-os 9 “ international english ” localization retained “ wastebasket. ” apple inc. sued prevent software companies offering graphical user interfaces similar apple lost claims courts agreed apple trash icon original protected copyright non-apple software may use metaphors file deletion recycle bin smart eraser shredder early versions macintosh finder trash contents listed volatile memory files moved trash would appear finder session ended would automatically erased system 7 released trash became folder retained contents user chose empty trash microsoft first implemented trash concept ms-dos 6 name delete sentry file deleted moved hidden sentry folder root drive microsoft introduced current trash system recycle bin windows 95 area store review files folders prior deletion version original location record file stored folder n't allow subdirectories folder deleted containing files moved bin mixed deleted files directory structure restored batch files undeleted current revised recycle bin allows subdirectory trees exist within folders moved recycle bin functionality usually integrated desktop environment file manager examples include implementations may contain shredding functionality counter data remanence kde gnome xfce implementations comply freedesktop.org trash specification ensuring applications written specification mind interoperable trash implementation although various linux desktop environments gnome kde xfce provide trash mechanism traditionally simple way trash something command line interface third-party applications trash-cli provide commands command-line use trash compatible freedesktop.org trash specification macos file deleted finder moved .trashes folder viewing device available space space occupied deleted files shown occupied macos sierra user turn option trash delete 30 days microsoft recycle bin implemented special folder columns like date deleted original location typically files deleted via file explorer necessarily windows graphical interfaces file selection dialogs put recycle bin files deleted via command prompt permanently deleted default files deleted via operating system apis applications windows explorer operating system apis however allow applications recycle files rather delete previous windows operating systems ms-dos undeletion way recover accidentally intentionally deleted files standard recycle bin stores files deleted hard drives removable media memory cards thumb drives floppy disks store files deleted network drives methods make work network paths however recycle bin setting configure amount deleted files store free disk space allocated actually used files deleted folders stored recycle bin versions windows prior windows vista default configuration recycle bin global setting drives hold 10 total capacity host hard drive volume store deleted files example volume capacity 20 gigabytes recycle bin hold 2 gigabytes deleted files changed anywhere 0 100 drive space allowed exceed 3.99gb space even user-indicated drive space larger 3.99gb recycle bin fills maximum capacity oldest files deleted order accommodate newly deleted files file large recycle bin user prompted immediately permanently delete file instead 3.99gb limit apply windows vista later windows versions actual location recycle bin depends type operating system file system older fat file systems typically windows 98 prior located drive \recycled ntfs filesystem windows 2000 xp nt drive \recycler windows vista windows 7 drive recycle.bin folder recycle bin accessed desktop windows explorer typing shell recyclebinfolder run dialog box icon shown default windows xp desktop accessed desktop recycle bin options information different physical recycle bin folders seen partition windows explorer windows xp onwards ntfs different users see contents recycle bins prior windows vista file recycle bin stored physical location renamed original drive letter file original extension hidden file called info2 info windows 95 without windows desktop update stores file original path original name binary format since windows vista meta information file saved number original extension original file renamed r number original extension user views recycle bin files displayed original names file restored recycle bin returned original directory name windows explorer files moved recycle bin number ways possible bypass recycle bin directly delete file holding shift key performing action would normally send file trash apple ’ macos long allowed dragging disk icon trash method unmounting and/or physically ejecting disk place disk trash folder erase disk macos trash icon temporarily changes eject disconnect symbol whenever storage volumes dragged gnome human interface guidelines cite behavior example discouraged metaphor
[ 2432, 6797, 8080, 2193, 4114, 9249, 5292, 7983, 823, 576, 9166, 9819, 8540, 6494, 2534, 11368, 6377, 10221, 5619 ]
None
11,252
2
Optimus_UI:optimus ui optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system optimus ui used internally lg sophisticated feature phones tablet computers available licensing external parties latest version optimus ui 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared previous version 4.1.1 would include voice shutter quick memo optimus ui used devices based android
[ 4995, 5892, 5637, 1670, 7428, 9610, 2828, 5262, 8719, 3600, 10129, 5522, 1427, 7700, 10645, 280, 10009, 10393, 7835, 9244, 10525, 798, 11294, 288, 673, 2978, 2852, 8486, 1191, 424, 937, 1578, 1959, 5546, 5677, 6057, 7595, 10537, 3380, 543...
Test
11,253
9
Elliott_ALGOL:elliott algol elliott algol algol 60 compiler elliott 803 computer implemented tony hoare others differed slightly reference version algol particularly supported character set first released february 1962 believed first implementation algol 60 compiler commercial context unexpectedly popular product company
[ 512, 3716, 1702, 8262, 1610, 2283 ]
Validation
11,254
2
Asphalt_6:_Adrenaline:asphalt 6 adrenaline asphalt 6 adrenaline 2010 racing video game developed published gameloft part asphalt series released ios december 21 2010 mac os x february 17 2011 android june 15 symbian^3 july 20 mobile phones august 31 webos september 3 blackberry playbook october 12 bada 2.0 january 10 2012 gameplay asphalt 6 adrenaline similar asphalt 5 player given option either tilting device touching side screen steer game also multiplayer mode local wi-fi bluetooth global internet connection player acquire five stars race performance based conditions set prior race concerning primary secondary objectives destroying certain number opponents drifting certain amount time new feature asphalt 6 adrenaline mode achieved hitting nitro meter full adrenaline mode player car becomes virtually indestructible ability easily wreck opponents upon slightest contact 42 licensed vehicles available game player starts dmc delorean abarth 500 ss nissan nismo 370z cars motorcycles custom painted tuned vehicles become available player progresses include shelby gt500 ktm x-bow tesla roadster sport audi s5 bmw z4 sdrive35is spyder citroën survolt maserati gran turismo bmw m3 gts ducati hypermotard bentley gt speed lamborghini estoque ferrari california nissan gt-r ducati 1198 ferrari f430 scuderia dodge viper srt10 acr-x ruf rt 12 mercedes-benz slr mclaren stirling moss lamborghini gallardo lp 570-4 superleggera ferrari 458 italia mclaren mp4-12c lamborghini murciélago lp 670-4 sv ruf ctr3 pagani zonda cinque ktm rc8 aston martin one-77 bugatti veyron 16.4 grand sport fastest car available player bentley speed 8 however acceleration bugatti veyron 16.4 grand sport due electronic arts ownership porsche license porsche vehicles although tuned variants ruf locations include nassau chamonix cape town havana new orleans moscow tokyo los angeles reykjavík new york city monte carlo shanghai exclusive android version rio de janeiro detroit hong kong game consists variety events java version asphalt 6 mobile phones consists slightly different gameplay style game consists free play mode well career mode racer must race way across number leagues winning races additional challenges one ultimately become lord asphalt game reaches 100 completion upon release asphalt 6 adrenaline received generally favorable reviews ios version holds aggregate score 79 100 metacritic based thirteen reviews 82 gamerankings based six reviews pocket gamer keith andrew scored game 9 10 arguing overall gameplay second-to-none elements come together – boosting burning bashing racers – asphalt 6 really finds rhythm delivering kind heart-hammering experience usually confined racers adorning big screen living room gameloft limits comes asphalt 6 adrenaline mobile game efforts marry exploits every racing franchise sun ends delivering experience outstrips almost felix xiao appadvice similar reaction praising graphics concluding 're looking action-packed racer pass time look asphalt 6 provide plus much dollars greatly improved artwork another set fantastic rides massive amount gameplay almost guarantee wo n't ever get enough 6.99 asphalt 6 must buy likely remain best arcade racing game time chris hall 148apps also reacted positively awarding score 4.5 5 praising feel game going fast asphalt 6 feels like going really fast engine explodes sound high rpm adrenaline boosts turbo look like straight tron crazy speed effects make game quite entertaining n't go thinking going looking next real racing 2 ... question racing fans get kick asphalt 6 fans arcade racers love bit graphics solid sound good driving mechanics exciting maybe bit forgiving racing sim fans game plain fun like kinds games definitely wo n't regret purchase ign levi buchanan slightly less impressed awarding game score 7.5 10 praising graphics controls arguing asphalt series become somewhat predictable asphalt 6 adrenaline fun arcade racer bunch cars tracks want speed exotic locations game let honest asphalt series starting get really familiar though still reliable fun series needs something next time offer slide play andrew podolsky similar mind ign feeling series become stagnant scoring game 3 4 score awarded asphalt 5 gameloft got us bit bind games consistently push technical limits iphone new iteration long-running series like asphalt looking sounding better one without bit creativity asphalt series starting feel like stuck second gear sixth asphalt game third iphone another brilliant technical achievement environments detailed colorful distinctive detected almost graphical pop-in frame rate slowdown played 4th generation ipod touch time huge leap saw asphalt 5 ... really missing asphalt 6 adrenaline graphical flair well-balanced gameplay progression gameloft found way churn iphone games look good feel viscerally exciting hollywood blockbusters like blockbusters sometimes left looking product lacks basic creativity basically events last game little incentive buy year asphalt
[ 9408, 10080, 1346, 9732, 9063, 3561, 7029, 6940 ]
Test
11,255
9
Richard_P._Gabriel:richard p. gabriel richard p. gabriel born 1949 american computer scientist known work computing related programming language lisp especially common lisp best known work 1990 essay lisp good news bad news win big introduced phrase worse better set benchmarks lisp termed gabriel benchmarks published 1985 performance evaluation lisp systems became standard way benchmark lisp implementations born 1949 town merrimac northeastern massachusetts two dairy farmers studied northeastern university boston earned b.a mathematics 1967–1972 resides redwood city california wife jo son named joseph daughter named mariko doctor physical therapy los altos california subsequently pursued graduate studies mathematics mit 1972–73 tapped patrick winston become permanent member artificial intelligence ai lab mit funding difficulties made impossible retain gabriel tried start dave waltz ai lab university illinois urbana–champaign two years lab fell due general apathy time 1973–75 gabriel managed earn ms mathematics mathematical work gabriel admitted stanford university time 1975–1981 served teaching assistant john mccarthy founder lisp ported maclisp native operating system incompatible timesharing system waits earned phd computer science topic natural language generation wife kathy son around time became spokesperson league programming freedom earning phd continued work ai projects mccarthy although thesis advisor terry winograd eventually began working lawrence livermore national laboratory recruited several researchers programmers company lucid incorporated founded 1984 would leave 1992 survived 1994 gabriel various times president chairman lucid inc product company shipped lisp integrated development environment ide sun microsystems ’ reduced instruction set computer risc hardware architecture named sparc sidestepped main failure lisp machines essence rewriting lisp machine ide use cost-effective less moribund architecture time gabriel married second wife daughter later divorced second wife 1993 eventually lucid focus shifted ai winter ide c++ core component ide richard stallman ’ version emacs gnu emacs gnu emacs lucid ’ needs however several lucid programmers assigned help develop gnu emacs friction arose programmers stallman handle graphical user interface gui issues lucid forked emacs thus became mainly responsible birth would come called xemacs one hires another notable programmer jamie w. zawinski gabriel left lucid inc. good became vice president development parcplace systems 1994–1995 consultant among others aspen smallworks joining sun microsystems distinguished engineer gabriel influential contributor evolution open source software strategy culminating publication book innovation happens elsewhere 2007 joined ibm research distinguished engineer gabriel received association computing machinery acm 1998 fellows award 2004 acm-aaai allen newell award citation reads “ innovations programming languages software design promoting interaction computer science disciplines notably architecture poetry. ” chairman object-oriented programming systems languages applications oopsla conference 2007 1998 received mfa poetry warren wilson college published poems literary journals chapbook drive published hollyridge press 2005
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 10778, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 1613, 9299, 2135, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 1147, 7805, 1159, 9865, 3728, 9877, 5803, 9391, 2225, 7867, ...
None
11,256
6
Versioning_file_system:versioning file system versioning file system computer file system allows computer file exist several versions time thus form revision control common versioning file systems keep number old copies file limit number changes per minute per hour avoid storing large numbers trivial changes others instead take periodic snapshots whose contents accessed similar semantics normal file access ... versioning file system similar periodic backup several key differences versioning file systems provide features revision control systems however unlike revision control systems transparent users requiring separate commit step record new revision versioning file systems confused journaling file systems whereas journaling file systems work keeping log changes made file committing changes file system overwriting prior version versioning file system keeps previous copies file saving new changes two features serve different purposes mutually exclusive object storage implementations offers object versioning amazon s3 early implementation versioning possibly first mit filename consisted two six-character parts second part numeric consisted digits treated version number specifying file open read write one could supply second part reading meant open highest-numbered version file writing meant increment highest existing version number create new version writing another early implementation versioning tenex became tops-20 powerful example file versioning system built rsx-11 openvms operating system digital equipment corporation essence whenever application opens file writing file system automatically creates new instance file version number appended name version numbers start 1 count upward new instances file created application opens file reading either specify exact file name including version number file name without version number case recent instance file opened purge dcl/ccl command used time manage number versions specific directory default highest numbered versions files current directory deleted behavior overridden /keep=n switch and/or specifying directory path and/or filename patterns vms systems often scripted purge user directories regular schedule sometimes misconstrued end-users property versioning system mainstream linux file system supports versioning number experimental/research lesser-known solutions namely lisp machine file system supports versioning provided implementations mit lmi symbolics texas instruments operating system symbolics genera starting lion 10.7 macos feature called versions allows time machine-like saving browsing past versions documents applications written use versions functionality however takes place application layer filesystem layer lion later releases incorporate true versioning file system htfs adopted primary filesystem sco openserver 1995 supports file versioning versioning enabled per-directory basis setting directory setuid bit inherited subdirectories created versioning enabled new file version created file directory removed existing file opened truncation non-current versions remain filesystem namespace name original file suffix attached consisting semicolon version sequence number current version hidden directory reads unless showversions environment variable set versions otherwise accessible normal operations environment variable general accessibility allow versions managed usual filesystem utilities though also undelete command used purge restore files enable disable versioning directories etc following versioning filesystems allow similar functionality
[ 5120, 2051, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9245, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 1147, 11390, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, ...
None
11,257
2
MacOS_version_history:macos version history history macos apple current mac operating system originally named mac os x 2012 os x 2016 began company project replace classic mac os system including final release mac os 9 direct descendant operating system apple used macintosh computers since introduction 1984 however current macos unix operating system built technology developed next 1980s apple purchased company early 1997 although originally marketed simply version 10 mac os indicated roman numeral x completely different codebase mac os 9 well substantial changes user interface transition technologically strategically significant one ease transition versions 10.4 able run mac os 9 applications compatibility layer first released 1999 mac os x server 1.0 widely released desktop version—mac os x 10.0—following march 2001 since several distinct desktop server editions macos released starting mac os x 10.7 lion macos server longer offered separate operating system instead server management tools available purchase add-on starting intel build mac os x 10.5 leopard releases certified unix systems conforming single unix specification macos retained major version number 10 throughout development history date releases macos also named big cats versions 10.0–10.8 locations california 10.9–present apple removed steve jobs management 1985 left company attempted create next big thing funding ross perot result next computer first workstation include digital signal processor dsp high-capacity optical disc drive next hardware advanced time expensive relative rapidly commoditizing workstation market marred design problems hardware phased 1993 however company object-oriented operating system nextstep lasting legacy nextstep based mach kernel developed cmu carnegie mellon university bsd implementation unix dating back 1970s featured object-oriented programming framework based objective-c language environment known today mac world cocoa also supported innovative enterprise objects framework database access layer webobjects application server development environment among notable features abandoning idea operating system next managed maintain business selling webobjects consulting services never commercial success nextstep underwent evolution openstep separated object layers operating system allowing run less modification platforms openstep short time adopted sun microsystems however point number companies — notably apple ibm microsoft even sun — claiming would soon releasing similar object-oriented operating systems development tools efforts taligent fully come fruition others like java gained widespread adoption february 4 1997 apple computer acquired next 427 million used openstep basis mac os x called time traces next software heritage still seen macos example cocoa development environment objective-c library classes ns prefixes history section manual page codice_1 command macos straightforwardly states command first appeared nextstep meanwhile apple facing commercial difficulties decade-old macintosh system software reached limits single-user co-operative multitasking architecture once-innovative user interface looking increasingly outdated massive development effort replace known copland started 1994 generally perceived outside apple hopeless case due political infighting conflicting goals 1996 copland nowhere near ready release project eventually cancelled elements copland incorporated mac os 8 released july 26 1997 considering purchase beos — multimedia-enabled multi-tasking os designed hardware similar apple company decided instead acquire next use openstep basis new os avie tevanian took os development steve jobs brought consultant first plan develop new operating system based almost entirely updated version openstep addition virtual machine subsystem — known blue box — running classic macintosh applications result known code name rhapsody slated release late 1998 apple expected developers would port software considerably powerful openstep libraries learned power flexibility instead several major developers adobe told apple would never occur would rather leave platform entirely rejection apple plan largely result string previous broken promises apple watching one next os another disappear apple market share dwindle developers interested much work platform let alone re-write apple financial losses continued board directors lost confidence ceo gil amelio asking resign board asked steve jobs lead company interim basis essentially giving carte blanche make changes return company profitability jobs announced world wide developer conference developers really wanted modern version mac os apple going deliver met thunderous applause next two years major effort applied porting original macintosh apis unix libraries known carbon mac os applications could ported carbon without need complete re-write making operate native applications new operating system meanwhile applications written using older toolkits would supported using classic mac os 9 environment support c c++ objective-c java python added furthering developer comfort new platform time lower layers operating system mach kernel bsd layers top re-packaged released apple public source license became known darwin darwin kernel provides stable flexible operating system takes advantage contributions programmers independent open-source projects outside apple however sees little use outside macintosh community period java programming language increased popularity effort started improve mac java support consisted porting high-speed java virtual machine platform exposing macos-specific cocoa apis java language first release new os — mac os x server 1.0 — used modified version mac os gui client versions starting mac os x developer preview 3 used new theme known aqua aqua substantial departure mac os 9 interface evolved little change original macintosh operating system incorporated full color scalable graphics anti-aliasing text graphics simulated shading highlights transparency shadows animation key new feature dock application launcher took advantage capabilities despite os x maintained substantial degree consistency traditional mac os interface apple apple human interface guidelines pull-down menu top screen familiar keyboard shortcuts support single-button mouse development aqua delayed somewhat switch openstep display postscript engine one developed in-house free license restrictions known quartz exception mac os x server 1.0 original public beta first several macos versions named big cats prior release version 10.0 code named cheetah internally apple version 10.1 code named internally puma code name jaguar version 10.2 received publicity media apple began openly using names promote operating system 10.3 marketed panther 10.4 tiger 10.5 leopard 10.6 snow leopard 10.7 lion 10.8 mountain lion panther tiger leopard registered trademarks apple registered lynx cougar allowed lapse apple instead using name iconic locations california subsequent releases 10.9 mavericks named mavericks popular surfing destination 10.10 yosemite named yosemite national park 10.11 el capitan named el capitan 10.12 sierra named sierra nevada mountain range 10.13 high sierra named area around high sierra camps september 13 2000 apple released 29.95 preview version mac os x internally codenamed kodiak order gain feedback users marked first public availability aqua interface apple made many changes ui based customer feedback mac os x public beta expired ceased function spring 2001 march 24 2001 apple released mac os x 10.0 internally codenamed cheetah initial version slow incomplete applications available time launch mostly independent developers many critics suggested operating system ready mainstream adoption recognized importance initial launch base improve simply releasing mac os x received macintosh community great accomplishment attempts completely overhaul mac os underway since 1996 delayed countless setbacks following bug fixes kernel panics became much less frequent mac os x 10.1 internally codenamed puma released september 25 2001 better performance provided missing features dvd playback apple released 10.1 free upgrade cd 10.0 users apple released upgrade cd mac os 9 january 7 2002 apple announced mac os x default operating system macintosh products end month august 23 2002 apple followed mac os x 10.2 jaguar first release use code name part branding brought great raw performance improvements sleeker look many powerful user-interface enhancements 150 according apple including quartz extreme compositing graphics directly ati radeon nvidia geforce2 mx agp-based video card least 16 mb vram system-wide repository contact information new address book instant messaging client named ichat happy mac appeared mac os startup sequence almost 18 years replaced large grey apple logo introduction mac os x 10.2 mac os x panther released october 24 2003 addition providing much improved performance also incorporated extensive update yet user interface panther included many new features jaguar year including updated finder incorporating brushed-metal interface fast user switching exposé window manager filevault safari ichat av added videoconferencing features ichat improved portable document format pdf rendering much greater microsoft windows interoperability support early g3 computers power macintosh powerbook discontinued mac os x tiger released april 29 2005 apple stated tiger contained 200 new features panther certain older machines longer supported tiger requires mac built-in firewire port among new features tiger introduced spotlight dashboard smart folders updated mail program smart mailboxes quicktime 7 safari 2 automator voiceover core image core video initial release apple tv used modified version tiger different graphical interface fewer applications services january 10 2006 apple released first intel-based macs along 10.4.4 update tiger operating system functioned identically powerpc-based macs new intel-based machines exception intel release dropping support classic environment powerpc macs booted retail copies tiger client dvd universal dvd tiger server 10.4.7 8k1079 boot powerpc intel macs mac os x leopard released october 26 2007 called apple largest update mac os x leopard supports powerpc- intel x86-based macintosh computers support g3 processor dropped g4 processor required minimum clock rate 867 mhz least 512 mb ram installed single dvd works supported macs including 64-bit machines new features include new look updated finder time machine spaces boot camp pre-installed full support 64-bit applications including graphical applications new features mail ichat number new security features leopard open brand unix 03 registered product intel platform also first bsd-based os receive unix 03 certification leopard dropped support classic environment classic applications final version mac os x support powerpc architecture mac os x snow leopard released august 28 2009 last version available disc rather delivering big changes appearance end user functionality like previous releases development snow leopard deliberately focused hood changes increasing performance efficiency stability operating system users noticeable changes disk space operating system frees clean installation compared mac os x 10.5 leopard responsive finder rewritten cocoa faster time machine backups reliable user friendly disk ejects powerful version preview application well faster safari web browser update introduced support mac app store apple digital distribution platform macos applications subsequent macos upgrades snow leopard supports machines intel cpus requires least 1 gb ram drops default support applications built powerpc architecture rosetta installed additional component retain support powerpc-only applications mac os x lion released july 20 2011 brought developments made apple ios easily navigable display installed applications launchpad greater use multi-touch gestures mac release removed rosetta making incapable running powerpc applications dropped support 32-bit intel processors requires 2gb memory changes made gui graphical user interface include launchpad similar home screen ios devices auto-hiding scrollbars appear used mission control unifies exposé spaces dashboard full-screen applications within single interface apple also made changes applications resume state closed similar ios documents auto-save default os x mountain lion released july 25 2012 incorporates features seen ios 5 include game center support imessage new messages messaging application reminders to-do list app separate ical renamed calendar like ios app also includes support storing iwork documents icloud 2gb memory required notification center makes debut mountain lion desktop version similar one ios 5.0 higher application pop-ups concentrated corner screen center pulled right side screen mountain lion also includes chinese features including support baidu option safari search engine notification center added providing overview alerts applications notes added application separate mail synching ios counterpart icloud service messages instant messaging software application replaces ichat os x mavericks released october 22 2013 free update mac app store worldwide placed emphasis battery life finder enhancements enhancements power users continued icloud integration well bringing apple ios apps os x platform ibooks apple maps applications added mavericks requires 2gb memory operate first version named apple then-new theme places california dubbed mavericks surfing location unlike previous versions os x progressively decreasing prices since 10.6 10.9 available charge users compatible systems running snow leopard 10.6 later beginning apple policy free upgrades life operating system business software os x yosemite released general public october 16 2014 free update mac app store worldwide featured major overhaul user interface replaced skeuomorphism flat graphic design blurred translucency effects following aesthetic introduced ios 7 introduced features called continuity handoff allow tighter integration paired os x ios devices user handle phone calls text messages either mac iphone edit pages document either mac ipad later update os included photos replacement iphoto aperture os x el capitan revealed june 8 2015 wwdc keynote speech made available public beta july made available publicly september 30 2015 apple described release containing refinements mac experience improvements system performance rather new features refinements include public transport built maps application gui improvements notes application well adopting san francisco system font metal api application enhancing software debuted operating system available macs since 2012 macos sierra announced june 13 2016 wwdc keynote speech update brought siri macos featuring several mac-specific features like searching files also allowed websites support apple pay method transferring payment using either nearby ios device touch id authenticate icloud also received several improvements ability store user ’ desktop documents folders icloud could synced macs apple id released publicly september 20 2016. macos high sierra announced june 5 2017 wwdc keynote speech released september 25 2017 release includes many under-the-hood improvements including switch apple file system apfs introduction metal 2 support hevc video improvements vr support addition numerous changes made standard applications including photos safari notes spotlight macos mojave announced june 4 2018 wwdc keynote speech released september 24 2018 key new features dark mode desktop stacks dynamic desktop changes desktop background image correspond user current time day macos catalina announced june 3 2019 wwdc keynote speech primarily focuses updates built-in apps replacing itunes separate music podcasts tv apps redesigned reminders books apps new find app also features sidecar allows user use ipad second screen computer even simulate graphics tablet apple pencil first version macos support 32-bit applications
[ 10755, 9732, 4615, 1549, 5647, 7697, 1042, 4114, 11289, 6186, 6700, 5677, 4657, 1074, 8754, 9784, 8253, 8767, 576, 8774, 9802, 8783, 5713, 4180, 3670, 1623, 4184, 10838, 9308, 2141, 4702, 3167, 3681, 9826, 2149, 5733, 8806, 3691, 8303, 83...
None
11,258
9
NPL_(programming_language):npl programming language npl functional programming language pattern matching designed rod burstall john darlington 1977 language allows certain sets logic constructs appear right hand side definitions e.g npl interpreter evaluates list generators left right conditions mention bound variables occur left known set comprehensions npl eventually evolved hope lost set comprehensions made reappearance form list comprehensions later functional languages
[ 8262, 5623 ]
None
11,259
8
Li3_(software):li3 software li₃ formerly lithium full-stack web framework producing web applications written php supporting php 5.3 onwards based model–view–controller development architecture described adhering no-nonsense philosophies project sponsored engine yard radify atelier disko october 2009 cakephp project manager garrett woodworth developer nate abele resigned project focus lithium framework code base originally developed cakephp project cake3 2012 project gained official sponsorship engine yard january 2014 project rebranded name li₃ release version 1.0 june 6th 2016 david persson followed nate abele lead developer project
[ 1920, 3462, 8582, 1034, 6154, 2062, 9614, 2576, 148, 1812, 6941, 9245, 10526, 2465, 8739, 3876, 4777, 2348, 5165, 7983, 4529, 7987, 692, 8883, 5048, 6074, 190, 6338, 9666, 2372, 8644, 1353, 4171, 595, 84, 4056, 10587, 6493, 11357, 3553, ...
None
11,260
7
IQRF:iqrf iqrf technology wireless packet-oriented communication via radio frequency rf sub-ghz ism bands intended general use wireless connectivity needed either point-to-point complex networks e.g telemetry industrial control automation buildings cities internet things fully open functionality depends solely user-specific application basic iqrf communication device transceiver module tr including mcu built-in operating system os implementing link layer network layer supporting mesh networking utilizing iqmesh protocol application software written directly os c language unlike solution stack used e.g zigbee application program compiled development higher communication level transport layer dpa optional open protocol framework enabling control sending commands receiving responses via standard wired interface uart spi via rf dpa implemented ready-to-use software plug-in called hardware profile hwp uploaded transceiver programming needed however possible modify existing hwp functionality user-specific custom dpa handler programmed c. transceivers supporting dpa called dctr data controlled transceivers iqrf connectivity 3rd party devices programmable c java supported open source development sdk package iqrf sdk gateways datalogger option lan connectivity utilize cloud server providing plug-and-play worldwide access end iqrf wireless devices iqrf alliance international community developers manufacturers system integrators others engaged wireless connectivity based iqrf technology main goal interoperability products dctrs inside
[ 11267, 2948, 2920, 5677, 7983, 10005, 8446 ]
Test
11,261
3
Yamaha_V9958:yamaha v9958 yamaha v9958 video display processor used msx2+ msx turbo r series home computers tim upgrade ti-99/4a also known msx-video chip successor yamaha v9938 main new features three graphical yjk modes 19268 colours horizontal scrolling registers v9958 widely adopted v9938 following features added removed yamaha v9938 specifications msx screen modes often referred assigned number msx-basic mapping follows
[ 10018, 11462, 9006, 1403, 11487 ]
None
11,262
2
Separation_of_mechanism_and_policy:separation mechanism policy separation mechanism policy design principle computer science states mechanisms parts system implementation control authorization operations allocation resources dictate overly restrict policies according decisions made operations authorize resources allocate commonly discussed context security mechanisms authentication authorization actually applicable much wider range resource allocation problems e.g cpu scheduling memory allocation quality service general question good object abstraction per brinch hansen introduced concept separation policy mechanism operating systems rc 4000 multiprogramming system artsy livny 1987 paper discussed approach operating system design extreme separation mechanism policy 2000 article chervenak et al described principles mechanism neutrality policy neutrality separation mechanism policy fundamental approach microkernel distinguishes monolithic one microkernel majority operating system services provided user-level server processes important operating system flexibility providing adequate mechanisms support broadest possible spectrum real-world security policies almost impossible envision different ways system might used different types users life product means hard-coded policies likely inadequate inappropriate perhaps even potential users decoupling mechanism implementations policy specifications makes possible different applications use mechanism implementations different policies means mechanisms likely better meet needs wider range users longer period time possible enable new policies without changing implementing mechanisms costs risks policy changes greatly reduced first instance could accomplished merely segregating mechanisms policies distinct modules replacing module dictates policy e.g cpu scheduling policy without changing module executes policy e.g scheduling mechanism change behaviour system cases wide variable range policies anticipated depending applications needs makes sense create non-code means specifying policies i.e policies hardcoded executable code specified independent description instance file protection policies e.g unix user/group/other read/write/execute might parametrized alternatively implementing mechanism could designed include interpreter new policy specification language cases systems usually accompanied deferred binding mechanism e.g late binding configuration options via configuration files runtime programmability via apis permits policy specifications incorporated system replaced another delivered customer everyday example mechanism/policy separation use card keys gain access locked doors mechanisms magnetic card readers remote controlled locks connections security server impose limitations entrance policy people allowed enter doors times decisions made centralized security server turn probably makes decisions consulting database room access rules specific authorization decisions changed updating room access database rule schema database proved limiting entire security server could replaced leaving fundamental mechanisms readers locks connections unchanged contrast issuing physical keys want change open door issue new keys change lock intertwines unlocking mechanisms access policies hotel significantly less effective using key cards
[ 11361, 8259, 9507, 7368, 745, 4201, 5452, 7983, 5363, 7187, 1013, 7483 ]
None
11,263
2
Linspire:linspire linspire commercial operating system based debian gnu/linux ubuntu currently owned pc/opensystems llc 2001 2008 owned linspire inc. 2008 2017 xandros july 1 2008 linspire stockholders elected change company name digital cornerstone assets acquired xandros august 8 2008 andreas typaldos ceo xandros announced linspire would discontinued favor xandros freespire would change base code ubuntu debian linspire brand would cease exist january 1 2018 announced pc/opensystems llc purchased linspire freespire xandros linspire 7 available 79.99 freespire 3 available free based san diego california lindows inc. founded august 2001 michael robertson goal developing linux-based operating system capable running major microsoft windows applications based windows compatibility wine api company later abandoned approach favor attempting make linux applications easy download install use end program named cnr developed based debian advanced packaging tool provides easy-to-use graphical user interface slightly modified package system annual fee first public release lindows version 1.0 released late 2001 2002 microsoft sued lindows inc. claiming name lindows constituted infringement windows trademark microsoft claims rejected court asserted microsoft used term windows describe graphical user interfaces windows product ever released windowing technique already implemented xerox apple computer many years microsoft sought retrial postponed february 2004 offered settle case part licensing settlement microsoft paid estimated 20 million lindows inc. transferred lindows trademark microsoft changed name linspire inc. 15 june 2005 michael robertson stepped ceo linspire inc continues chairman replaced ceo kevin carmony carmony resigned linspire july 31 2007 linspire became member interop vendor alliance founded 2006 february 8 2007 linspire inc. canonical ltd lead sponsor developer ubuntu operating system announced plans new technology partnership linspire aiming begin basing ... desktop linux offerings ubuntu 13 june 2007 linspire microsoft announced interoperability collaboration agreement focus document format compatibility instant messaging digital media web search patent covenants linspire customers agreement criticised notably groklaw website disingenuously short-lived limited spirit gnu general public license kevin carmony one regular linspire letters asserted agreement would bring even choices desktop linux users ... offer better linux experience linspire bases product code names fish found near headquarters linspire/lindowsos 4.5 code named coho linspire five-0 5.0 5.1 freespire 1.0 marlin freespire 2.0 linspire 6.0 skipjack linspire cnr originally click n'run software distribution service based debian apt designed serve gui-based user-accessible means downloading installing various applications free proprietary service allowed users install available applications using single click cnr also included set click buy cnb software included many commercial applications members discounted rate cnr 38,000 different software packages ranging simple applications major commercial works win4lin staroffice cnr originally subscription-based two tiers basic service cost 20 annually gold featuring discounts commercial applications 50 2006 linspire announced basic service made available free linspire planned port cnr ubuntu distribution company announced april 24 2006 cnr would released open source license release free cnr client planned coincide release freespire 2.0 linspire 6.0 january 23 2007 linspire announced intended provide cnr linux distributions apt- rpm-based including debian fedora opensuse ubuntu support expected appear mid-2007 february 8 2007 linspire inc. announced partnership canonical ltd. publisher ubuntu linux distribution deal would see linspire freespire migrate unpredictable debian release process semiannual ubuntu release cycle intended main ubuntu distribution would become first recipient opening click n'run service linux distributions besides linspire august 2005 andrew betts released freespire live cd based linspire users mistook product linspire inc. linspire inc. offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 april 24 2006 linspire announced project named freespire followed model community-oriented releases red hat novell form fedora opensuse freespire community-driven -supported project tied commercial linspire distribution included previously proprietary elements linspire cnr client elements linspire inc. licenses like windows media audio compatibility libraries remain closed-source consequently two versions freespire one closed source libraries one called freespire oss edition includes open-source components freespire 1.0 released august 7 2006 three weeks ahead schedule known freespire change code base ubuntu debian future releases july 10 2007 linspire released linspire 6.0 based freespire 2.0 final release freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 supported 18 months reached end-of-life 19 october 2008 freespire therefore receives security updates upstream present distribution considered discontinued distrowatch linspire inc. sponsored open source projects including pidgin kopete instant messaging clients mozilla firefox web browser reiserfs file system nvu wysiwyg website editor kde-apps.org kde-look.org websites past linspire hosted several linux open source events annual desktop linux summit debconf kde developers conference linspire drawn criticism linux free software community included criticism including proprietary software gnu founder richard stallman commenting gnu/linux distribution backslided far away freedom switching ms windows linspire bring freedom gets different master addition following initial freespire announcement pamela jones groklaw website published article entitled freespire linux distro could n't care less freedom highly critical linspire inc. freespire project including closed-source components advertising favourable point—an action classed ignoring free open-source software foss community values community-driven distribution asserting free software n't proprietary drivers proprietary codecs drivers applications open source open way response linspire inc. ceo kevin carmony stated via journalist linspire website ten years holding foss community made relatively gains many users already using proprietary software although would hold would prefer something works rather nothing also asserted company believed open source software also freedom individuals choose whatever software want
[ 4123, 9253, 11305, 56, 3131, 59, 4673, 3654, 1107, 1110, 6230, 5721, 1632, 4192, 3685, 9324, 10860, 2671, 3189, 5755, 11388, 1150, 8837, 6797, 2194, 10394, 673, 3745, 3245, 7854, 2738, 4790, 8907, 5343, 4841, 6890, 7913, 9455, 7920, 5363,...
Validation
11,264
1
Seabird_Colony_Register:seabird colony register seabird colony register scr database managed british joint nature conservation committee contains counts breeding seabirds british seabird colonies made 1969 1998 used analysing past changes breeding seabird numbers changes colony size britain ireland data included scr include results two complete seabird censuses britain ireland operation seafarer 1969/70 seabird colony register census 1985–1987 well ad hoc counts counts surveys data held 25 species seabird breeding throughout britain ireland scr partially superseded seabird 2000 database
[ 2901 ]
Validation
11,265
9
Mohol_programming_languages:mohol programming languages mohol refers machine oriented high order languages dijkstra terminology
[ 3529, 8262, 11295 ]
Test
11,266
4
File_binder:file binder file binders utility software allow user bind multiple files together resulting single executable commonly used hackers insert programs trojan horses otherwise harmless files making difficult detect malware builders keyloggers stealers often include binder default polymorphic packer file binder ability make signature mutate time difficult detect remove commonly used hackers insert malware packages contain user content
[ 10208, 1892, 901, 10756, 9800, 4649, 7851, 9771, 5261, 11197, 7515, 4956, 10141 ]
None
11,267
7
Zigbee:zigbee zigbee ieee 802.15.4-based specification suite high-level communication protocols used create personal area networks small low-power digital radios home automation medical device data collection low-power low-bandwidth needs designed small scale projects need wireless connection hence zigbee low-power low data rate close proximity i.e. personal area wireless ad hoc network technology defined zigbee specification intended simpler less expensive wireless personal area networks wpans bluetooth general wireless networking wi-fi applications include wireless light switches home energy monitors traffic management systems consumer industrial equipment requires short-range low-rate wireless data transfer low power consumption limits transmission distances 10–100 meters line-of-sight depending power output environmental characteristics zigbee devices transmit data long distances passing data mesh network intermediate devices reach distant ones zigbee typically used low data rate applications require long battery life secure networking zigbee networks secured 128 bit symmetric encryption keys zigbee defined rate 250 kbit/s best suited intermittent data transmissions sensor input device zigbee conceived 1998 standardized 2003 revised 2006 name refers waggle dance honey bees return beehive zigbee low-cost low-power wireless mesh network standard targeted battery-powered devices wireless control monitoring applications zigbee delivers low-latency communication zigbee chips typically integrated radios microcontrollers zigbee operates industrial scientific medical ism radio bands 2.4 ghz jurisdictions worldwide though devices also use 784 mhz china 868 mhz europe 915 mhz usa australia however even regions countries still use 2.4 ghz commercial zigbee devices home use data rates vary 20 kb/s 868 mhz band 250 kb/s 2.4 ghz band zigbee builds physical layer media access control defined ieee standard 802.15.4 low-rate wireless personal area networks wpans specification includes four additional key components network layer application layer zigbee device objects zdos manufacturer-defined application objects zdos responsible tasks including keeping track device roles managing requests join network well device discovery security zigbee network layer natively supports star tree networks generic mesh networking every network must one coordinator device within star networks coordinator must central node trees meshes allow use zigbee routers extend communication network level another defining feature zigbee facilities carrying secure communications protecting establishment transport cryptographic keys ciphering frames controlling device builds basic security framework defined ieee 802.15.4 zigbee-style self-organizing ad-hoc digital radio networks conceived 1990s ieee 802.15.4-2003 zigbee specification ratified december 14 2004 zigbee alliance announced availability specification 1.0 june 13 2005 known zigbee 2004 specification september 2006 zigbee 2006 specification announced obsoleting 2004 stack 2006 specification replaces message/key value pair structure used 2004 stack cluster library library set standardised commands organised groups known clusters names smart energy home automation zigbee light link january 2017 zigbee alliance renamed library dotdot announced new protocol represented emoticon || also announced additionally run network types using internet protocol interconnect standards thread since unveiling dotdot functioned default application layer almost zigbee devices zigbee pro also known zigbee 2007 finalized 2007 zigbee pro device may join operate legacy zigbee network vice versa due differences routing options zigbee pro devices must become non-routing zigbee end devices zeds legacy zigbee network legacy zigbee devices must become zeds zigbee pro network operates 2.4 ghz band also sub-ghz band zigbee protocols intended embedded applications requiring low power consumption tolerating low data rates resulting network use little power—individual devices must battery life least two years pass zigbee certification typical application areas include zigbee situations high mobility among nodes hence suitable tactical ad hoc radio networks battlefield high data rate high mobility present needed established 2002 zigbee alliance group companies maintain publish zigbee standard term zigbee registered trademark group single technical standard alliance publishes application profiles allow multiple oem vendors create interoperable products relationship ieee 802.15.4 zigbee similar ieee 802.11 wi-fi alliance years alliance membership grown 500 companies including likes comcast ikea legrand samsung smartthings amazon zigbee alliance three levels membership adopter participant promoter adopter members allowed access completed zigbee specifications standards participant members voting rights play role zigbee development early access specifications standards product development requirements membership zigbee alliance cause problems free software developers annual fee conflicts gnu general public licence requirements developers join zigbee alliance also conflict free software licenses zigbee alliance board asked make license compatible gpl refused bluetooth gpl licensed implementations first zigbee application profile home automation announced november 2 2007 additional application profiles since published specifications define internet protocol monitor control inform automate delivery use energy water enhancement zigbee smart energy version 1 specifications adds services plug-in electric vehicle charging installation configuration firmware download prepay services user information messaging load control demand response common information application profile interfaces wired wireless networks developed partners including zigbee smart energy relies zigbee ip network layer routes standard ipv6 traffic ieee 802.15.4 using 6lowpan header compression 2009 rf4ce radio frequency consumer electronics consortium zigbee alliance agreed deliver jointly standard radio frequency remote controls zigbee rf4ce designed broad range consumer electronics products tvs set-top boxes promised many advantages existing remote control solutions including richer communication increased reliability enhanced features flexibility interoperability line-of-sight barrier zigbee rf4ce specification lifts networking weight support mesh features traded smaller memory configurations lower cost devices remote control consumer electronics introduction second zigbee rf4ce application profile 2012 increased momentum mso market zigbee rf4ce team provides overview current status standard applications future technology radio design used zigbee analog stages uses digital circuits wherever possible though radios inexpensive zigbee qualification process involves full validation requirements physical layer radios derived validated semiconductor mask set would enjoy rf characteristics uncertified physical layer malfunctions could cripple battery lifespan devices zigbee network zigbee radios tight constraints power bandwidth thus radios tested guidance given clause 6 802.15.4-2006 standard products integrate radio microcontroller single module available standard specifies operation unlicensed 2.4 2.4835 ghz worldwide 902 928 mhz americas australia 868 868.6 mhz europe ism bands sixteen channels allocated 2.4 ghz band channel spaced 5 mhz apart though using 2 mhz bandwidth radios use direct-sequence spread spectrum coding managed digital stream modulator binary phase-shift keying bpsk used 868 915 mhz bands offset quadrature phase-shift keying oqpsk transmits two bits per symbol used 2.4 ghz band raw over-the-air data rate 250 kbit/s per channel 2.4 ghz band 40 kbit/s per channel 915 mhz band 20 kbit/s 868 mhz band actual data throughput less maximum specified bit rate due packet overhead processing delays indoor applications 2.4 ghz transmission distance may 10–20 depending construction materials number walls penetrated output power permitted geographical location outdoors line-of-sight range may 1500 depending power output environmental characteristics output power radios generally 0-20 dbm 1-100 mw zigbee devices three kinds current zigbee protocols support beacon non-beacon enabled networks non-beacon-enabled networks unslotted csma/ca channel access mechanism used type network zigbee routers typically receivers continuously active requiring robust power supply however allows heterogeneous networks devices receive continuously others transmit external stimulus detected typical example heterogeneous network wireless light switch zigbee node lamp may constantly receive since connected mains supply battery-powered light switch would remain asleep switch thrown switch wakes sends command lamp receives acknowledgment returns sleep network lamp node least zigbee router zigbee coordinator switch node typically zigbee end device beacon-enabled networks special network nodes called zigbee routers transmit periodic beacons confirm presence network nodes nodes may sleep beacons thus lowering duty cycle extending battery life beacon intervals depend data rate may range 15.36 milliseconds 251.65824 seconds 250 kbit/s 24 milliseconds 393.216 seconds 40 kbit/s 48 milliseconds 786.432 seconds 20 kbit/s however low duty cycle operation long beacon intervals requires precise timing conflict need low product cost general zigbee protocols minimize time radio reduce power use beaconing networks nodes need active beacon transmitted non-beacon-enabled networks power consumption decidedly asymmetrical devices always active others spend time sleeping except smart energy profile 2.0 zigbee devices required conform ieee 802.15.4-2003 low-rate wireless personal area network lr-wpan standard standard specifies lower protocol layers—the physical layer phy media access control portion data link layer dll basic channel access mode carrier sense multiple access/collision avoidance csma/ca nodes talk way humans converse briefly check see one talking start three notable exceptions beacons sent fixed timing schedule use csma message acknowledgments also use csma finally devices beacon-enabled networks low latency real-time requirements may also use guaranteed time slots gts definition use csma software designed easy develop small inexpensive microprocessors detail please use one sources listed references section go directly zigbee alliance web site using external links provided main functions network layer enable correct use mac sublayer provide suitable interface use next upper layer namely application layer capabilities structure typically associated network layers including routing network layer function exactly sounds deals network functions connecting disconnecting setting networks add network allocate addresses add/remove certain devices layer makes use star mesh tree topologies adds interface application layer one hand data entity creates manages network layer data units payload application-layer performs routing according current topology hand layer control used handle configuration new devices establish new networks determine whether neighboring device belongs network discovers new neighbors routers control also detect presence receiver allows direct communication mac synchronization routing protocol used network layer aodv aodv find destination device aodv broadcasts route request neighbors neighbors broadcast request neighbors onward destination reached destination reached sends route reply via unicast transmission following lowest cost path back source source receives reply update routing table destination address next hop path path cost application layer highest-level layer defined specification effective interface zigbee system end users comprises majority components added zigbee specification zdo management procedures together application objects defined manufacturer considered part layer layer binds tables sends messages bound devices manages group addresses reassembles packets also transports data responsible providing service zigbee device profiles zdo zigbee device object protocol zigbee protocol stack responsible overall device management security keys policies responsible defining role device either coordinator end device mentioned also discovery new one-hop devices network identification offered services may go establish secure links external devices reply binding requests accordingly application support sublayer aps main standard component layer offers well-defined interface control services works bridge network layer elements application layer keeps up-to-date binding tables form database used find appropriate devices depending services needed different devices offer union specified layers also routes messages across layers protocol stack application may consist communicating objects cooperate carry desired tasks focus zigbee distribute work among many different devices reside within individual zigbee nodes turn form network said work typically largely local device instance control household appliance collection objects form network communicates using facilities provided aps supervised zdo interfaces application layer data service follows typical request-confirm/indication-response structure within single device 240 application objects exist numbered range 1-240 0 reserved zdo data interface 255 broadcast 241-254 range currently use may future two services available application objects use zigbee 1.0 addressing also part application layer network node consists 802.15.4-conformant radio transceiver one device descriptions basically collections attributes polled set monitored events transceiver base addressing devices within node specified endpoint identifier range 1-240 applications communicate comprising devices must use common application protocol types messages formats sets conventions grouped profiles furthermore binding decided upon matching input output cluster identifiers unique within context given profile associated incoming outgoing data flow device binding tables contain source destination pairs depending available information device discovery may follow different methods network address known ieee address requested using unicast communication petitions broadcast ieee address part response payload end devices simply respond requested address network coordinator router also send addresses devices associated extended discovery protocol permits external devices find devices network services offer endpoints report queried discovering device previously obtained addresses matching services also used use cluster identifiers enforces binding complementary entities using binding tables maintained zigbee coordinators table must always available within network coordinators likely permanent power supply backups managed higher-level layers may needed applications binding requires established communication link exists whether add new node network decided according application security policies communication happen right association direct addressing uses radio address endpoint identifier whereas indirect addressing uses every relevant field address endpoint cluster attribute requires sent network coordinator maintains associations translates requests communication indirect addressing particularly useful keep devices simple minimize need storage besides two methods broadcast endpoints device available group addressing used communicate groups endpoints belonging set devices one defining features zigbee provides facilities carrying secure communications protecting establishment transport cryptographic keys cyphering frames controlling devices builds basic security framework defined ieee 802.15.4 part architecture relies correct management symmetric keys correct implementation methods security policies basic mechanism ensure confidentiality adequate protection keying material trust must assumed initial installation keys well processing security information implementation globally work general conformance specified behaviors assumed keys cornerstone security architecture protection paramount importance keys never supposed transported insecure channel momentary exception rule occurs initial phase addition network previously unconfigured device zigbee network model must take particular care security considerations ad hoc networks may physically accessible external devices also state working environment predicted within protocol stack different network layers cryptographically separated access policies needed conventional design assumed open trust model within device allows key sharing notably decreases potential cost nevertheless layer creates frame responsible security malicious devices may exist every network layer payload must ciphered unauthorized traffic immediately cut exception transmission network key confers unified security layer grid new connecting device zigbee uses 128-bit keys implement security mechanisms key associated either network usable zigbee layers mac sublayer link acquired pre-installation agreement transport establishment link keys based master key controls link key correspondence ultimately least initial master key must obtained secure medium transport pre-installation security whole network depends link master keys visible application layer different services use different one-way variations link key avoid leaks security risks key distribution one important security functions network secure network designate one special device devices trust distribution security keys trust center ideally devices center trust address initial master key preloaded momentary vulnerability allowed sent described typical applications without special security needs use network key provided trust center initially insecure channel communicate thus trust center maintains network key provides point-to-point security devices accept communications originating key supplied trust center except initial master key security architecture distributed among network layers follows security levels infrastructure based ccm* adds encryption- integrity-only features ccm according german computer magazine website zigbee home automation 1.2 using fallback keys encryption negotiation known changed makes encryption highly vulnerable network simulators like ns2 omnet++ opnet netsim used simulate ieee 802.15.4 zigbee networks simulators come open source c c++ libraries users modify way users determine validity new algorithms hardware implementation
[ 4609, 11267, 11396, 3847, 4359, 8714, 9098, 10897, 9365, 5664, 8736, 5028, 4773, 10021, 682, 7341, 7983, 9779, 7865, 62, 1221, 2117, 8262, 4691, 10206, 479, 5472, 2030, 7411, 11383, 11260, 2045 ]
Test
11,268
7
SimPRO:simpro simpro private saas company provides cloud-based job project management software field service trade contracting industries company customers partners australia new zealand united kingdom united states simpro offices located countries recent opening operation colorado united states simpro founded 2002 electrical business owner steve bradshaw approached software engineering student vaughan mckillop creating website electrical contracting business mckillop explained bradshaw strengths lay writing software rather web design two men created simpro first iteration using web-based php mysql languages initially focused making digital job lists moved building scheduling tool could allocate time technicians mckillop bradshaw continued expand software capability functionality realised new tool could also offered customers company first started trading acorn software service management pty ltd 2003 changed name simpro software 2011 simpro 2017 february 2019 simpro board management executive team five members chief executive officer sean diljore chief operating officer chief financial officer alan bignell chief technology officer jonathan eastgate executive financial controller rhiza lahoylahoy chief learning development officer erika entz peter darley currently general manager simpro australia ricky sevta general manager simpro new zealand 2009 simpro launched united kingdom current general manager richard pratley previously managed new zealand office 2015 company opened location colorado united states effort grow presence local market current president glenn nott october 2016 simpro received usd 31 million capital funding new york-based growth equity firm level equity marked first time company accepted external investment since founding level equity partner benjamin levin principal charles chen sit simpro board directors 2013 simpro acquired vehicle fleet tracking management company simtrac aud 2.5 million designed help business managers monitor work vehicles road real time minimise travel times simpro key features include quoting estimating scheduling service project management inventory management asset maintenance invoicing payment processing integration accounting software designed eliminate double entry data provide transfer financial data assist financial reporting simpro mobile applications used smartphones tablets ios android operation systems keep remote staff connected office simpro connect app field users process payment job complete customer credit card simpro eforms app used digitise company existing paper forms use field simpro ’ add-ons include simpro software integrates range third-party applications cloud accounting software sage xero myob quickbooks among others
[ 4194, 8644, 7022, 467, 8627 ]
Test
11,269
9
NewLISP:newlisp newlisp scripting language dialect lisp family programming languages designed developed lutz mueller newlisp free open-source software released gnu general public license version 3 later newlisp design influenced two main lisp dialects common lisp scheme languages like pascal c. newlisp originated 1991 originally developed sun-4 workstation later moved windows 3.0 version 1.3 released compuserve around 1993 became available windows graphical user interface gui graphics-capable application dos console application 16-bit 1995 release windows 95 newlisp moved 32-bit april 1999 newlisp ported linux core algorithms rewritten windows-specific code removed newlisp released open-source software project licensed gpl development windows stopped version 6.0.25 first half 2001 newlisp ported back windows cygwin platform without graphics abilities second half 2001 cross-platform tcl/tk frontend named newlisp-tk released around version 6.3.0 2006 64-bit precision introduced integer arithmetic operations files version 9.0 since release 6.5 mid-2002 development active many new features added newlisp attempts provide fast powerful cross-platform full-featured scripting version language lisp using modest system resources data storage e.g. disk space memory provides lisp features lists symbol processing function mapping anonymous functions lambda expressions s-expressions excluding improper lists macros also provides functions expected modern scripting language including supporting regular expressions xml unicode utf-8 networking via transmission control protocol tcp internet protocol ip user datagram protocol udp matrix array processing advanced math statistics bayesian statistical analysis mathematical finance distributed computing newlisp runs operating systems berkeley software distribution bsd linux macos solaris windows supports mysql sqlite odbc database access common gateway interface cgi simple mail transfer protocol smtp post office protocol pop 3 file transfer protocol ftp xml remote procedure call xml-rpc run server mode daemon newlisp supports namespaces termed contexts assigned variables passed functions associated globally unique symbols limiting use first-class citizens objects prototype-based object-oriented style programming possible newlisp using contexts prototypes construct objects variables inside contexts interfere variables name contexts inside context variables behave according rules dynamic scoping newlisp uses dynamic scoping function called function see variables caller caller caller within context namespace supports explicitly implicitly defined local dynamic variables shadow variables name outer environment thus preventing accidental use change variables caller environment parameter variables called function automatically shadow caller variable environment globally variables grouped separate namespaces newlisp uses method automatic memory management different traditional garbage collection schemes termed one reference oro memory management variable referenced context context referenced globally sharing subobjects among objects cyclic structures multiple variables pointing object unsupported newlisp objects copied stored data structures passed functions except certain built-in functions exceptions symbols contexts shared instead copied thus used indirection symbols contexts globally named deleted explicitly deleting symbol context scans objects replace references codice_1 newlisp graphical user interface gui server newlisp-gs java-based internet protocol suite tcp/ip server providing graphical programming interface newlisp-gs based development environment included newlisp binary distributions gtk-server opengl tcl/tk-based programming interfaces available newlisp version allows building executable files portable applications deployment self-contained need installing newlisp import function allows importing functions dynamic-link library dll windows api win32 shared library linux unix web frameworks available newlisp include dragonfly rockets
[ 10752, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 2585, 4122, 4633, 8226, 5677, 3119, 9780, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 5754, 7805, 9345, 1159, 9865, 6797, 655, 9877, 11413, 58...
Test
11,270
2
Windows_DreamScene:windows dreamscene windows dreamscene utility allows videos .gif optimized animations used desktop wallpapers one windows ultimate extras windows vista prior official announcement dreamscene rumored creation names motion desktop borealis several months testing final version released september 25 2007 rendered content included dreamscene animated realization windows aurora background produced stardock photographic content provided discovery channel third-party video content mpeg wmv format may also used addition avi files played altering file extension additionally partnership dell microsoft released separate dreamscene alongside product red version ultimate edition windows vista one purported advantages dreamscene previous methods desktop animation makes use gpu display instead cpu leaving latter free perform user tasks extent achieved specified full-screen program run game window maximized video automatically stop since video seen means uses less gpu cpu video also stopped manually content encoders need strive balance compression file size decompression requires cpu larger files take memory may cause disk accessed frequently running video background would significant impact battery life mobile computers whether rendered gpu dreamscene may display static background computer running batteries software relies heavily desktop window manager dwm part windows aero stardock offers chargeable add-on windows dreamscene called deskscapes software allows implementation dynamic wallpapers .dream files released new version 3.5 makes program compatible non-ultimate editions vista newer versions windows 7 8 windows 7 dreamscene replaced desktop slideshow feature produces slideshow background wallpapers support videos however still enabled via third-party tools
[ 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 10281, 2101, 10812, 3648, 1098, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 8798, 3170, 5225, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8841, 2193, 9874, 10900, 4248, 9377, 3235, 4771, 68...
Test
11,271
2
UIQ:uiq uiq formerly known user interface quartz software platform based upon symbian os created uiq technology essentially graphical user interface layer provides additional components core os enable development feature-rich mobile phones open expanded capabilities third-party applications uiq result 'quartz user interface pen pdas one three provisional interfaces designed symbian ltd first three quartz phones never made market including psion odin joint venture motorola cancelled january 2001 causing psion shares deteriorate engineers thereafter created lighter version software presented 2002 first shipped year sony ericsson p800 sony ericsson main oem using uiq platform products motorola also developed products using uiq abandoned platform 2003 favour linux along stake symbian ltd 2007 returned uiq launch motorola rizr z8 nokia using competing series 60 later s60 platform created one uiq device called nokia 6708 rebadged benq p31 released asia pacific region sony ericsson bought uiq technology november 2006 next year motorola bought half creation symbian foundation favouring s60 ui choice uiq future uncertain could longer develop software symbian os many motorola uiq devices planned 2009 cancelled including motorola razr3 codenamed ruby uiq technology filed bankruptcy january 2009 final nail coffin uiq platform sony ericsson moved windows mobile open source symbian foundation whilst motorola adopted google android software uiq 3.3 last version platform based upon symbian os v9.3 developers developed uiq 3.x platform much better story previous releases since uiq 3.x phones served single core sdk native applications written c++ using symbian/uiq sdk uiq-based phones 2.x 3.x also support java applications uiq phones employ touch screens resolution 208×320 pixels uiq 1.x 2.x 240×320 uiq 3.x depending phone color depth 12-bit 4096 colors 16-bit 65536 colors 18-bit 262144 colors 24-bit 16,777,216 colors newer phones developers significant items sony ericsson motorola benq nokia arima following list smartphones announced/confirmed running newer uiq 3.x platform pda-style design similar handheld computer hybrid pda/phone design candy-bar phone touchscreen display slider design
[ 6276, 4364, 3089, 1687, 7063, 10393, 11545, 6301, 5406, 4383, 673, 4132, 1833, 3626, 5290, 5677, 7727, 3248, 7857, 9137, 10674, 10802, 823, 7991, 9784, 1083, 1216, 5824, 6338, 7617, 7492, 10053, 199, 11079, 7246, 2001, 4305, 2259, 7253, 3...
None
11,272
4
Microphone_blocker:microphone blocker microphone blocker device prohibits audio hacking form hardware accessory smartphone laptop pda similar device blocker intended disable internal microphone also android software name disables microphone microphone blocker also known mic blocker mic lock physically microphone blocker dummy plug inserted external microphone socket mobile device blocker disables signal internal microphone tricking device thinking external microphone already plugged successful operation microphone blocker depends internal scheme mobile device may fully block microphone without possibility recovering data disregard signal internal microphone possibility recording needed microphone blocker cheap simple accessory provides protection eavesdropping cellphone surveillance types audio hacking variety spyware programs turn mobile device microphone remotely vast majority devices internal hardware protection prevent eavesdropping anti-spying software guarantee microphone fully blocked disabled spyware malware constantly changing improving leaked documents published wikileaks codenamed vault 7 dated 2013 2016 described capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones turning permanent listening devices millions smartphones could also vulnerable hacking via accelerometers new data access technique discovered research team israel ben-gurion university cybersecurity research center allows data extracted using computer speakers headphones forbes published report stating researches found way see information displayed using microphone 96.5 accuracy
[ 297, 1083, 9356, 1070, 10392, 7515 ]
None
11,273
2
Android_Go:android go android go tailored android distribution low-end devices first unveiled android oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play services also modularized reduce memory footprint google play store highlight lightweight apps suited devices operating system interface differs mainline android quick-settings panel giving greater prominence information regarding battery mobile-data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data-tracking top-ups within android settings menu android go made available oems android 8.1 later android pie
[ 5100, 1516, 7983, 5397, 7835, 7548 ]
None
11,274
8
RSS_tracking:rss tracking rss tracking methodology tracking rss feeds rss feeds around since 1999 form internet marketing however unlike forms publishing information internet difficult track usage rss feeds feed tracking methods growing popularity currently many methods tracking rss feeds problems terms accuracy transparent 1×1 pixel images images embedded within content rss feed linking image held web server number requests made measured using web server log files give rough estimate many times rss feed viewed problem method rss feed aggregators display images parse html third-party services services available internet syndicate rss feed track requests made syndication rss feed services come free paid forms problem method analytical data feeds controlled service provider easily accessible transferable unique url per feed method requires heavy web server programming auto generate different rss feed url visitor website visitor rss feed activity tracked accurately using standard web analytics applications problem method feed syndicated search engine instance defeat purpose unique urls many people could potentially view rss feed via single url estimating number subscribers log files aggregators example bloglines google reader include number unique users whose behalf feed downloaded http request readers -- web browsers -- counted noting number unique ip addresses retrieve file given period provides estimate actual readership although probably higher real number people may sign accounts multiple aggregators never delete subscriptions may read feeds different computers computer may different ip address different times
[ 7488, 3428, 9325, 10126, 6576, 7921, 3350, 119, 11674, 2076, 10270 ]
Test
11,275
1
North_Atlantic_Population_Project:north atlantic population project north atlantic population project napp collaboration historical demographers britain canada denmark germany iceland norway sweden produce massive census microdata collection north atlantic region late-nineteenth century database includes complete individual-level census enumerations country provides information 110 million people large scale allows detailed analysis small geographic areas population subgroups napp database designed compatible integrated public use microdata series ipums disseminated ipums data-access system minnesota population center university minnesota major collaborators project include lisa dillon university montreal chad gaffield university ottawa ólöf garðarsdóttir statistics iceland marianne jarnes erikstad university tromsø jan oldervall university bergen evan roberts university minnesota steven ruggles university minnesota kevin schürer uk data archive gunnar thorvaldsen university tromsø matthew woollard uk data archive project also coordinated minnesota population center university minnesota
[ 480 ]
None
11,276
9
Enchanting_(programming_language):enchanting programming language enchanting free open-source cross-platform educational programming language designed program lego mindstorms nxt robots primarily developed southern alberta robotics enthusiasts group province alberta canada runs mac os x windows experimentally linux devices since 2013 enchanting version 0.2 available predecessor 1998 robotics invention system developed scratch developer team led mitch resnick mit media lab based byob developed university california berkeley current version enchanting runs windows xp windows vista windows 7 windows 8 windows 8 rt mac os x runs version 10.4 newer linux runs ubuntu version 10.10 used secondary-to-tertiary computer science program monash university australia interactive pdf book use computer ipad titled robotics enchanting lego® nxt available free download recent sabre games organized 2013 southern alberta robotics enthusiasts group consisted three disciplines tug war two robots tied together string tries pull opponent center line sumo two robots placed sumo ring tries find push opponent without going ring parade robots follow line trying crash robot front
[ 10964, 6797, 823 ]
None
11,277
2
SIS_(file_format):sis file format sis acronym stands software installation script standard software installation package format symbian os sis files archive containing installation instructions application file usually .app .exe file dependencies convention .sisx denotes signed file different ways sis file created basic approach create package definition file .pkg contains information package like vendor package name files include package use makesis signsis utilities processes .pkg file creates actual sis file alternatives use carbide.c++ ide automatically builds sis file part build process graphically define create installation package using packageforge windows utility siscontents able convert various file formats
[ 1216, 4129, 9356, 7246, 11184, 3921, 947, 7253, 1687, 6748 ]
Test
11,278
4
3wPlayer:3wplayer 3wplayer malware disguises media player infect computers running microsoft windows designed exploit users download video files instructing download install program order view video 3wplayer employs form social engineering infect computers seemingly desirable video files recent movies released via bittorrent distribution channels files resemble conventional avi files engineered display message played media player programs instructing user visit 3wplayer website download software view video 3wplayer infected trojan.win32.obfuscated.en according symantec 3wplayer may download piece adware refer adware.lop adds toolbar search button internet explorer perl script posted online reportedly decrypt 3wplayer files back avi claim tested mixed results intended avi file rarely desired video file developers made application automatically identify 3wplayer encrypted files multiple 3wplayer clones divocodec divo codec x3codec also identified trojan similar 3wplayer users instructed download codec order view play avi/mp4/mp3/wma file often downloaded via p2p programs instead actual codecs divocodec installs malware users computer divocodec polymorphic change structure also known write another process virtual memory process hijacking domplayer similar divocodec 3wplayer users also instructed download player order view avi file divocodec false .avi easily spotted duration file usually lying 10–12 seconds one conclude chance file may film/tv series despite size file always case however many distributors recently begun falsifying file meta data display normal durations file sizes x3 player similar domplayer instructs users download player view avi file also circulated 5-second asf video disguised mp3 file instructing users install player
[ 8582, 7851, 6797, 11539, 7515 ]
Test
11,279
9
Datapoint's_Advanced_Systems_Language:datapoint advanced systems language dasl datapoint advanced systems language programming language compiler proprietary datapoint primarily influenced pascal c touches created early 1980s gene hughes compiler output assembly language typically processed peep-hole optimizer assembler linker reflecting name dasl used systems programming mainly vendor
[ 1952, 477, 8262, 6664, 8524, 2045 ]
Test
11,280
1
Resources,_events,_agents_(accounting_model):resources events agents accounting model resources events agents rea model accounting system re-engineered computer age rea originally proposed 1982 william e. mccarthy generalized accounting model contained concepts resources events agents mccarthy 1982 rea popular model teaching accounting information systems ais rare business practice companies easily dismantle legacy data warehouse systems unwilling workday inc. ibm scalable architecture financial reporting reatechnology iso 15944-4 exceptions fallon polovina 2013 however shown rea also add value modelling current erp business processes providing tool increases understanding implementation underlying data model rea model gets rid many accounting objects necessary computer age visible debits credits—double-entry bookkeeping disappears rea system many general ledger accounts also disappear least persistent objects e.g. accounts receivable accounts payable computer generate accounts real time using source document records rea treats accounting system virtual representation actual business words creates computer objects directly represent real-world-business objects computer science terms rea ontology real objects included rea model objects contrast conventional accounting terms asset liability less directly tied real-world objects example conventional accounting asset goodwill rea resource separate rea model business process company business process roughly corresponds functional department function michael porter value chain examples business processes would sales purchases conversion manufacturing human resources financing heart rea model usually pair events linked exchange relationship typically referred duality relation one events usually represents resource given away lost represents resource received gained example sales process one event would sales —where goods given up—and would cash receipt cash received two events linked cash receipt occurs exchange sale vice versa duality relationship complex e.g. manufacturing process would often involve two events see dunn et al 2004 examples rea systems usually modeled relational databases entity-relationship diagrams though compulsory philosophy rea draws idea reusable design patterns though rea patterns used describe databases rather object oriented programs quite different 23 canonical patterns original designs pattern book gamma et al research rea emphasizes patterns e.g. hruby et al 2006 example basic rea pattern shown e-r diagram pattern extended encompass commitments promises engage transactions e.g. sales order policies constructs dunn et al 2004 provide good overview undergraduate level accounting majors hruby et al 2006 advanced reference computer scientists diagram extended rea pattern hruby et al 2006 rea continuing influence electronic commerce standard ebxml w. mccarthy actively involved standards committee competing xbrl gl standard however odds rea concept closely mimics double-entry book-keeping rea recognised open group og within togaf® standard industry standard enterprise framework one modelling tools useful modelling business processes sensorica world first open value network ovn specialized open innovation peer production hardware uses rea model basis network resource planning contribution/value accounting system nrp-vas nrp-vas created bob haugen collaboration sensorica ovn
[ 11646 ]
Validation
11,281
4
Secure_state:secure state secure state information systems security term describe entities computer system divided subjects objects formally proven state transition preserves security moving one secure state another secure state thereby inductively proven system secure defined bell–lapadula model secure state built concept state machine set allowable states system transition one state another state defined transition functions system state defined secure permitted access modes subjects objects accordance security policy
[ 10968, 4067, 2558 ]
Train
11,282
3
HiSilicon:hisilicon hisilicon chinese fabless semiconductor company based shenzhen guangdong fully owned huawei hisilicon purchases licenses cpu designs arm holdings including arm cortex-a9 mpcore arm cortex-m3 arm cortex-a7 mpcore arm cortex-a15 mpcore arm cortex-a53 arm cortex-a57 also mali graphics cores hisilicon also purchased licenses vivante corporation gc4000 graphics core hisilicon reputed largest domestic designer integrated circuits china hisilicon develops socs based arm architecture though exclusive socs see preliminary use handheld tablet devices parent company huawei first well known product hisilicon k3v2 used huawei ascend quad xl u9510 smartphones huawei mediapad 10 fhd7 tablets chipset based arm cortex-a9 mpcore fabbed 40 nm uses 16 core vivante gc4000 gpu soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption revised version k3v2 soc improved support intel baseband soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption • supports usb 2.0 13 mp 1080p video encode • kirin 920 soc also contains image processor supports 32 megapixel • supports sd 3.0 uhs-i emmc 4.51 dual-band a/b/g/n wi-fi bluetooth 4.0 low energy usb 2.0 32 mp isp 1080p video encode • supports sd 4.1 uhs-ii ufs 2.0 emmc 5.1 mu-mimo 802.11ac wi-fi bluetooth 4.2 smart usb 3.0 nfs dual isp 42 mp native 10-bit 4k video encode i5 coprocessor tensilica hifi 4 dsp hisilicon first soc based 7 nm finfet technology hisilicon develops smartphone modems although exclusively socs see preliminary use handheld tablet devices parent company huawei balong 700 supports lte tdd/fdd specs mwc 2012 hisilicon released balong 710 multi-mode chipset supporting 3gpp release 9 lte category 4 gti global td-lte initiative balong 710 designed used k3v2 soc specs balong 720 supports lte cat6 300 mbit/s peak download rate specs balong 750 supports lte cat 12/13 first support 4cc ca 3.5ghz specs balong 765 supports 8×8 mimo technology lte cat.19 downlink data-rate 1.6 gbit/s fdd network 1.16 gbit/s td-lte network specs balong 5g01 supports 3gpp standard 5g downlink speeds 2.3 gbit/s supports 5g across frequency bands including sub-6ghz millimeter wave mmwave specs balong 5000 supports supports 2g 3g 4g 5g specs hisilicon develops server processor socs based arm architecture hi1610 hisilicon first generation server processor announced 2015 features hi1612 hisilicon second generation server processor launched 2016 features kunpeng 916 formally known hi1616 hisilicon third generation server processor launched 2017 kunpeng 916 utilized huawei taishan 2280 balanced server taishan 5280 storage server taishan xr320 high-density server node taishan x6000 high-density server features kunpeng 920 formally known hi1620 hisilicon fourth generation server processor announced 2018 launched 2019 huawei claim kunpeng 920 cpu scores estimated 930 specint®_rate_base2006 kunpeng 920 utilized huawei taishan 2280 v2 balanced server taishan 5280 v2 storage server taishan xa320 v2 high-density server node features kunpeng 930 formally known hi1630 hisilicon fifth-generation server processor announced 2019 scheduled launch 2021 features kunpeng 950 hisilicon sixth-generation server processor announced 2019 scheduled launch 2023 hisilicon also develops ai acceleration chips ai chip manufactured chinese communication electronics manufacturer huawei ascend 310 capable 16 tops int8 8 tops fp16 power consumption 8 w. fabbed tsmc 12nm ffc process ascend 310 chipsets based architecture called da vinci computing engine called 3d cube includes new ai framework called mindspore platform-as-a-service product called modelarts lower-level library called compute architecture neural networks cann ascend 910 7 nm chip delivers 256 tflops fp16 512 tops int8 power consumption 350w ascend cluster 1024 ascend 910 chips reach 256 petaflops fp16 ascend 910 ascend cluster available q2 2019 kirin processors compete products several companies including
[ 3585, 11282, 9235, 11289, 4124, 1057, 38, 4139, 3117, 8237, 9774, 2097, 7218, 8250, 8253, 10303, 7745, 7747, 2635, 97, 99, 8812, 10361, 9851, 6268, 638, 644, 11396, 9863, 8842, 146, 659, 1682, 7833, 666, 5786, 4258, 4773, 9913, 8383, 10...
None
11,283
2
Windows_XP_Media_Center_Edition:windows xp media center edition windows xp media center edition mce version windows xp operating system first version windows include windows media center designed serve home-entertainment hub last version windows xp media center edition 2005 released october 12 2004 windows media center included certain editions later windows versions optional paid addition windows 8 discontinued windows 10 windows xp media center edition following releases based windows xp professional features enabled except domain-joining ability disabled windows xp media center edition 2005 terminal services original release determine underlying edition windows xp particular revision mce based system properties control panel applet used determine revision mce used select media center option general settings area inside mce windows xp media center edition distinguished exclusive component media center media player supports watching recording tv programs well playing dvd-video photo slideshows music media center sports user interface optimized use distance large fonts icons unlike competing commercial dvr products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft opted supply media center independent retail version microsoft distributed msdn subscribers original equipment manufacturers certain countries consumers purchase media center preinstalled new computer set-top box embedded device media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface must hardware mpeg-2 encoders changed companies ati wrote drivers support mce 2005 all-in-wonder cards hdtv wonder cards closed caption support number features media center remote controls standardized terms button labels functionality degree general layout
[ 8576, 641, 10624, 3463, 651, 6797, 639, 8080, 3857, 7057, 1043, 2196, 8976, 5526, 10896, 4505, 929, 10658, 4515, 11301, 3496, 6441, 6697, 1581, 2221, 7983, 3250, 3890, 9910, 8124, 6462, 7615, 321, 7106, 9539, 582, 200, 1098, 10957, 3283, ...
None
11,284
8
PHP-Crawler:php-crawler php-crawler open-source crawling script based php mysql created implement simple possible local website search became popular small websites shared hosting script set distributed terms bsd license
[ 3744, 8769, 3875, 8644, 10341, 2566, 3462, 4473, 714, 2318, 7022, 944, 113, 1240, 1913, 2459 ]
Test
11,285
7
Artist_Growth:artist growth artist growth cloud-based touring music business management application numerous artist managers tour managers musicians use artist growth boost team collaboration simplify event logistics track finances automate ticket requests quickly find files consolidate data customers artist growth include artists jason aldean tiësto luke combs artist management companies red light vector major record labels artist growth founded matt urmy jonathan sexton 2011 prototype platform launched 2012 desktop version arriving 2013 may 2018 pinnacle financial partners announced taking stake artist growth effort expand music entertainment sports business artist growth software platform tour management live event support application software connects artist artist tour production team artist manager talent agent business manager record label third party tour service providers key product feature sets include artist growth platform includes electronic integrations related software applications artist growth api brings interoperability entertainment industry allowing artists management teams receive data directly partners talent agencies promoters songkick bandsintown users also submit set lists bmi via artist growth app order collect compensation performance royalties 2018 artist growth integrated music tour booking agency rising star travel streamline tour scheduling software today available ios android web 2018 artist growth introduced service labelled ag finance whereby artists apply receive capital fund touring business ag finance delivered partnership music sports entertainment division pinnacle financial partners first ag finance offering announced august 2018 artists may apply receive tour advance loans underwritten booked tour guarantees offering primarily aimed artist management companies emerging artists need growth funding artist growth title best music app mtv music awards named gizmodo app day 2012
[ 5784, 8740, 2101 ]
Test