node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
11,286 | 5 | DMS-100:dms-100 dms-100 switch digital multiplex system dms line telephone exchange switches manufactured northern telecom designed 1970s released 1979 control 100,000 telephone lines purpose dms-100 switch provide local service connections pstn public telephone network designed deliver services subscribers telephone lines trunks provides plain old telephone service pots mobility management cellular phone systems sophisticated business services automatic call distribution acd integrated services digital network isdn meridian digital centrex mdc formerly called integrated business network ibn also provides intelligent network functions cs1-r etsi inap used countries throughout world also dms-200 dms-250 variants tandem switches much hardware used dms-100 possible exception line cards used members dms family including dms-200 toll switch power distribution -48 vdc nominal dc dc converters every shelf provide necessary voltages central control complex comprises central processing unit cpu program store ps data store ds central message controller cmc cpu contains two identical 16-bit processors running hot standby mode original cpu core referred nt40 cpu implemented approximately 250 discrete logic devices across several circuit boards running 36 mhz nt40 core consisted mainly nt1x44 stack card provides register stack functions processor nt1x45 contained arithmetic logic functions nt1x46 provides registers load-route read-only memory rom nt1x47 timing control card provides micro-cycle source microstore decoding functions processor nt1x47 card also contained 2-digit hexadecimal display indicate test result codes condition core nt1x48 processor maintenance card contained thumbwheel faceplate enable various diagnostic tests cpu later modification five circuit boards faster pin-compatible discrete logic devices enabled cpu operate 40 mhz allowing central offices improve call throughput capacity 10 percent cpu configured dual hot standby mode mate exchange bus meb two cpus enables state one cpu continuously compared cpu cycle cycle basis discrepancy two cpus results maintenance circuitry determining cpu fault activity change cpu program store dedicated cpu memory program instructions required cpu processing calls maintenance administrative tasks ps associated cpu contains identical program instructions data store dedicated cpu contains dynamic information per-call basis well customer data office-specific settings cpu also associated ds containing duplicate data central message controller controls flow messages units ccc prioritizes network message controller nmc various network modules nm input/output controller ioc cpus access either cmc share message load line modules peripherals original nt40 based ccc replaced compatible dms supernode 1987 dms supernode computing module first based motorola 68020 central processing unit cpu upgraded motorola 68030 early 1990s upgraded use motorola 88100 88110 reduced instruction set computing risc cpus risc version supernode computing module known brisc bnr reduced instruction set computing cpu brisc cpu dms supernode processing capacity 1,500,000 call attempts per hour dms supernode featured increased processing capacity across distributed architecture allowing development new features services elements dms supernode uses common supernode cpu hardware design differing software used control supernode consists two main elements dms core dms bus dms core provides main computing facility made compute module system load module message controller compute module contains redundant supernode cpus handle call processing maintenance functions like nt40 core operate synchronized mode mate system load module contains necessary software every element dms switch also provides file system data storage functions magnetic tape hard disk message controller provides communications links dms core dms bus dms bus used interconnect dms core switching network input/output controller ioc manage message flows units consists redundant message switches message switches dms bus operate load-sharing mode one provides main clock source dms-100 system others synchronized messages supernode units carried optical ds512 links operating system used generations dms-100 switch called support operating system sos written high level language called protel stood procedure oriented type enforcing language developed bell northern research bnr hardware maintenance administered locally cathode-ray terminals multilevel menu system called mapci various methods used access dms remotely well including modem telnet backups hard drive work administered diskut command line program analog lines terminated individual line cards codec pull-out line drawers frames original design frames called line module lm 32 lines per drawer lms able send caller-id information class services became rare late century supplemented replaced newer line concentrating module lcm duplicated ringing generators serve lm pair lcm dc testing line card relay connect test bus lcm smaller line cards serving 64 lines per physical drawer 2 logical drawers size lm lcm require half space lm number lines majority line cards nt6x17 three relays loop start lines others include nt6x18 four relays slide switch ground start lines newer version nt6x18 eliminated ground switch nt6x18 also ability provide current reversal required coin phones business systems nt6x17ba nt6x18ba known world line card software configurable 15 million functional settings meet almost signalling transmission requirement market nt6x19 line card allows use older style neon message-waiting lamps feature also requires addition card per drawer supplies voltage type nt6x21 cards serve p-sets meridian business sets special analogue telephone proprietary nortel data link operating 8 khz provide advanced call handling services example telephone number may appear multiple p-sets even though telephone one pair wires thus providing simpler replacement key telephone systems lcme isdn service uses ntbx27 cards serve basic rate isdn lines provided ring generators lcme also support linecard types lcms served line group controller lgc communicate ds-30 connections nt6x48aa interface cards lgc number lcms per lgc depends traffic 3-4 lcm per lgc two traffic heavy remote offices anywhere kilometre 100 km host served remote line control module rlcm remote switching center rsc later vintage known rcc2 use t1 links host lgc rccs/rcc2s work like lgcs controlling lcms large remotes may 2+ rcc/rccs equipped links rccs interlinks calls within remote tie host links rccs/rcc2s usually equipped provide calling within remote office host links fail feature called esa emergency stand alone another type remote office known remote carrier urban rcu units typically reside side road large box approx 3 meters across almost 2 meters high almost meter 1980s many telcos installed early version instead pulling cable remote area much cheaper could provide approx 500 lines back needed two 'boxes work- host box called central terminal ct dial tone lines wired remote box called remote terminal rt dial tone 'came used 2-6 t1 links copper i.e ld-1 fiber telcos modernized remote boxes re-configured work directly smu peripheral host dms typically smu handle 3-6 rcus transmitters receivers service circuits trunk module tm miscellaneous trunk module mtm shelves trunks dtc digital trunk controller dtci digital trunk controller isdn pdtc pcm30 digital trunk controller shelves usually two t-1 lines per card ten cards per dtc total 480 ds0 voice channels turn century many original nt6x50aa cards still service perform t-carrier extended superframe signaling performed plug-in replacement nt6x50ab card used services pbx isdn t1s trunks also provisioned spm synchronus peripheral module capable handling 2016 ds0s nearly 4.2x dtc internal connections time switch network 2.56 mbit/s ds-30 speech links carrying thirty channels plus synchronization data channels four wires plus ground wire connections network handled nt6x40aa ds-30 interface card lgc ltc link may also ds-512 optical interfaces using nt6x44aa time switch card lgcs ltcs internally map channels nt6x48aa ds-30 nt6x50aa/ab ds1 interface links available channels nt6x40aa ds-30 nt6x40fa ds-512 interfaces network european pdtcs complemented dtcoi2 dtco2 dtcoi2 designed run pri dpnss services per existing pdtcoi msb7 peripherals dtco2 designed carry cas ss7 per existing pdtco peripheral time division switching performed e-net similar communication module 5ess switch switching network ewsd group switch axe telephone exchange also dms-200 dms-250 variants tandem switches 2006 nortel introduced communication server 1500 cs 1500 softswitch based voip modernize dms based telephone switches cs 1500 softswitch system replace dms component modules except lcms reducing footprint dms-100 one 19 rack allowing operators reduce cooling power requirements significantly successor dms-100 communication server 2000 cs2k shares many components software dms significant difference addition voip technology cs2k 2010 genband purchased nortel networks carrier voip application solutions cvas business 182.5 million nortel defunct | [
8192,
9410,
7299,
1284,
7811,
3149,
2894,
9391,
8048,
9937,
7286,
1303,
3580
] | Test |
11,287 | 9 | Yabasic:yabasic yabasic yet another basic free open-source basic interpreter windows unix platforms yabasic originally developed marc-oliver ihm released last stable version 2.77.3 2016 version 2.77.1 project adopted mit licence well source code moved github encourage others participate development port yabasic fltk toolkit called flyab development would source-compatible programs written yab variant yabasic enables graphical programs written using beos api ports windows mac os x linux planned flyab added ability yabasic create native graphical user interfaces supported platforms november 2008 project appears halted sony also packaged version yabasic playstation 2 demo disc shipped ps2 consoles pal territories could considered home computer games machine thus bypassing european import taxes continuation project prior new changes original author version 3 developed team centered pedro sá thomas larsen development halted project appears abandoned | [
10316,
6797,
7983,
9714,
5492,
2804,
11221,
823,
6845
] | Test |
11,288 | 5 | Mobile_Slotted_Aloha:mobile slotted aloha mobile slotted aloha ms-aloha wireless network protocol proposed applications vehicle networks considering typical taxonomy mac protocols ms-aloha represents hybrid solution based connection-oriented paradigm hence may fall class channel-based/tdma protocols however also reactive topology changes include reservations separate data exchanges classified among packet-based collision-free mac methods general slotted protocol either connectionless connection-oriented however latter case represents true alternative ieee 802.11p introducing determinism carrier sense multiple access collision avoidance csma/ca lacks vehicle networks connection set-up phases telephone call reservation request confirmation data exchange tear-down applied hold broadcast communications hampered hidden stations manageable heavy losses mobility varying channel conditions reasons ms-aloha connection oriented continuously refreshes reservation simply transmitting period ms-aloha adopts different approach subtends following hypotheses rules basically define main mechanisms | [
10112,
2306,
388,
8708,
3847,
2458,
5020,
1192,
11560,
7723,
11181,
7490,
9284,
5321,
7498,
2911,
2785,
5092,
5863,
2802
] | None |
11,289 | 3 | Apple_A10X:apple a10x apple a10x fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared 10.5 ipad pro second-generation 12.9 ipad pro announced june 5 2017 a10x variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x a10x features apple-designed 64-bit 2.38 ghz armv8-a six-core cpu three high-performance hurricane cores three energy-efficient zephyr cores a10x also integrates twelve-core graphics processing unit gpu appears apple customized imagination powervr cores used a10 embedded a10x m10 motion coprocessor built tsmc 10 nm finfet process die size 96.4mm a10x 34 smaller a9x smallest ipad soc a10x first tsmc 10nm chip used consumer device a10x paired 4 gb lpddr4 memory second-generation 12.9 ipad pro 10.5 ipad pro 3 gb 4k apple tv | [
10755,
9732,
1549,
5647,
7697,
4114,
9235,
11282,
6165,
7706,
8222,
1057,
2551,
38,
6183,
1576,
6186,
4139,
6700,
7211,
8237,
9774,
2097,
1074,
8754,
9784,
8250,
8253,
576,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
1623,
3672,
10840,
931... | Test |
11,290 | 3 | Ken_Batcher:ken batcher ken batcher full name kenneth edward batcher emeritus professor computer science kent state university also worked computer architect goodyear aerospace akron ohio 28 years born december 1935 queens new york city father ralph r. batcher chief engineer a. h. grebe radio company bankruptcy 1932 batcher graduated iowa state university b.e degree 1957 1964 batcher received ph.d. electrical engineering university illinois graduated brooklyn technical high school among designs worked goodyear published several technical papers owns 14 patents discovered two parallel sorting algorithms odd-even mergesort bitonic mergesort also discoverer scrambling data method random access memory allows accesses along multiple dimensions memories used staran mpp parallel processors 1980 received arnstein award presented goodyear aerospace corporation technical achievement 1990 batcher awarded acm/ieee eckert-mauchly award pioneering work parallel computers holds 14 patents 2007 batcher awarded ieee seymour cray computer engineering award fundamental theoretical practical contributions massively parallel computation including parallel sorting algorithms interconnection networks pioneering designs staran mpp computers credited discovering two important parallel sorting algorithms odd-even mergesort bitonic mergesort batcher known half-serious half-humorous definition supercomputer device turning compute-bound problems i/o-bound problems author co-author journal articles br patent number followed title year issued | [
1480,
9932
] | Test |
11,291 | 7 | Adobe_Document_Cloud:adobe document cloud adobe document cloud free service adobe store share pdf files cloud access go services also allows integration adobe tools fill sign forms electronically service offers 2gb free storage seemless integration mobile desktop apps creates ecosystem users use phone apps adobe scan take pictures documents convert pdfs upload store cloud files accessed webportal adobe document cloud well adobe applications adobe acrobat dc adobe acrobat reader free service upgraded using paid subscriptions allow user create pdfs electronic documents microsoft office documents edit pdfs protect documents using passwords create fillable forms collect feedback signatures | [
11237,
9097,
11372,
3469,
10097,
8627,
8628,
5048
] | Test |
11,292 | 5 | Portmap:portmap port mapper rpc.portmap portmap rpcbind open network computing remote procedure call onc rpc service runs network nodes provide onc rpc services version 2 port mapper protocol maps onc rpc program number/version number pairs network port number version program onc rpc server started tell port mapper particular program number/version number pair implements particular transport protocol tcp udp port number using particular program number/version number pair transport protocol clients wishing make onc rpc call particular version particular onc rpc service must first contact port mapper server machine determine actual tcp udp port use versions 3 4 protocol called rpcbind protocol map program number/version number pair indicator specifies transport protocol transport-layer endpoint address program number/version number pair transport protocol port mapper service always uses tcp udp port 111 fixed port required client would able get port number port mapper service port mapper port mapper must started rpc servers started port mapper service first appeared sunos 2.0 shows different programs versions ports use example shows nfs running version 2 3 reached tcp port 2049 udp port 2049 depending transport protocol client wants use mount protocol version 1 2 running reached udp port 644 tcp port 645 depending transport protocol client wants use port mapper service discovered used distributed denial service ddos attacks distributed reflective denial service drdos attacks 2015 using spoofed port mapper request attacker amplify effects target portmap query return many times data original request | [
10436,
11147,
10924,
11413,
823,
11293,
5471
] | Test |
11,293 | 6 | File_Alteration_Monitor:file alteration monitor computing file alteration monitor also known fam sgi_fam provides subsystem developed silicon graphics unix-like operating systems fam subsystem allows applications watch certain files notified modified greatly aids applications fam existed applications would read disk repeatedly detect changes resulted high disk cpu usage example file manager application detect file changed update displayed icon and/or filename fam system consists two parts although fam may seem unnecessary many newer kernels include built-in notification support inotify linux example using fam provides two benefits main problem fam creation large number files example first login desktop environment slows entire system using many cpu cycles | [
2432,
10051,
2021,
11292,
7983,
1776,
8721,
9872,
5397,
823,
2044,
4349
] | None |
11,294 | 2 | Samsung_Experience:samsung experience samsung experience stylized samsung experience software overlay android launcher designed samsung galaxy devices introduced late 2016 beta build based android nougat galaxy s7 succeeding touchwiz succeeded one ui based android pie touchwiz former name samsung used ui icons originally released june 4 2010 galaxy smartphone reviewers criticized samsung including many features bloat especially galaxy s4 included many users called samsung feature creep following years though samsung incrementally removed bloatware extra features touchwiz longer recognized touchwiz leading rename samsung experience makes several changes android default homescreen apps icon bottom right screen instead bottom middle google search bar middle screen instead top weather widget provided weather channel accuweather select countries devices top right corner screen addition user edit apps grid layout edge curved glass edge screen originally introduced galaxy note edge popularized galaxy s6 edge tasks edge gives users shortcut commonly utilized tasks making phone call certain contact setting timer creating event planner assortment icons e.g contact pictures phone messaging mail icons app icon plus symbol bottom right corner photo library masked shape circle gallery icon bottom right corner right screen people edge allows user add 5 different contacts display screen quick access functions calling texting emailing displays contact name photo apps edge displays ten user frequently used apps five two columns user also add complete folder screen yahoo sports finance news panels included phone user download extra panels ease use rss reader twitter trends news cnn quick tools edge transforms ruler compass flashlight user swipes edge screen screen edge display turns displays missed calls current time weather news first released samsung galaxy note 7 android marshmallow grace ux named device codename eventually made way older devices including galaxy note 5 update korea eventually countries galaxy s7 s7 edge official android nougat update grace ux features cleaner flatter look iconography extensive use white space touchwiz grace ux devices also benefit secure folder functionality enables users keep certain data even apps behind secure password addition countries languages absent previous versions android marshmallow earlier available release starting galaxy tab s3 single pixels illuminated always-on display active screen display current time calendar selected image different styles option clock 7 styles calendar 2 styles image 3 styles always-on display available galaxy series 2017 2018 galaxy s7/s7 edge galaxy s8/s8+ galaxy s9/s9+ galaxy s10/s10+|galaxy s10 5g galaxy j7 2017 /j7 pro/j7+ c7 2017 galaxy c5/c7/c9 pro galaxy note 7/fe/8/9 devices samsung includes file manager galaxy phones unlike stock android game user downloads combined single folder folder one optimize frame rate resolution includes game tools button appears user playing game tapped mute notifications turn capacitive keys minimize game screenshot record gameplay bixby assistant launched samsung galaxy s8 replaces voice samsung phones three parts including bixby voice bixby vision bixby home bixby voice triggered saying hey bixby pressing holding button located volume rocker dubbed bixby button bixby vision built camera app see one see essentially augmented reality camera identify objects real time search various services offer user purchase available bixby also able translate text read qr codes recognize landmarks bixby home found swiping right home screen vertically scrolling list information bixby interact example weather fitness activity buttons controlling smart home gadgets bixby tasks related single keyword example simple good night request device turn silent mode turn night mode display note list exhaustive | [
5637,
8719,
3600,
7700,
9244,
1578,
5677,
1083,
6212,
69,
8262,
4685,
3664,
8280,
8285,
2658,
11391,
1670,
5262,
10393,
7835,
673,
8870,
1191,
196,
8907,
2259,
8413,
9949,
1255,
8940,
5363,
6391,
5892,
7428,
2828,
5397,
280,
10009,
10525,... | None |
11,295 | 9 | Executive_Systems_Problem_Oriented_Language:executive systems problem oriented language espol short executive systems problem oriented language superset algol 60 provided capabilities would later known mohols machine oriented high order languages interrupting processor multiprocessor system burroughs large systems multiprocessor processor systems espol used write mcp master control program burroughs computer systems b5000 b6700 single-pass compiler espol could compile 250 lines per second espol superseded newp | [
512,
1952,
11265,
3716,
1702,
4998,
8136,
8262,
1610,
7983,
5714,
11059,
477
] | None |
11,296 | 9 | Application_Isolation_API:application isolation api application isolation api jsr 121 provides specification isolating controlling java application life cycles within single java virtual machine jvm multiple jvms isolated computation described isolate communicate exchange resource handles e.g open files isolates messaging facility | [
4960,
5677
] | None |
11,297 | 2 | Yggdrasil_Linux/GNU/X:yggdrasil linux/gnu/x yggdrasil linux/gnu/x lgx pronounced igg-drah-sill discontinued early linux distribution developed yggdrasil computing incorporated company founded adam j. richter berkeley california yggdrasil first company create live cd linux distribution yggdrasil linux described plug-and-play linux distribution automatically configuring hardware last release yggdrasil 1995 yggdrasil world tree norse mythology name chosen yggdrasil took disparate pieces software assembled complete product yggdrasil company motto free software rest us yggdrasil compliant unix filesystem hierarchy standard yggdrasil announced ‘ bootable linux/gnu/x-based unix r clone pc compatibles ’ 24 november 1992 made first release 8 december 1992 alpha release contained 0.98.1 version linux kernel v11r5 version x window system supporting 1024x768 256 colours various gnu utilities c/c++ compiler gnu debugger bison flex make tex groff ghostscript elvis emacs editors various software yggdrasil alpha release required 386 computer 8 mb ram 100 mb hard disk alpha release missing source code packages elvis beta release made 18 february 1993 beta cost us 60 lgx beta release 1993 contained 0.99.5 version linux kernel along software gnu x 22 august 1993 yggdrasil company sold 3100 copies lgx beta distribution production release version carried pricetag us 99 however yggdrasil offered free developer whose software included cd distribution according email company founder marginal cost subscription 35.70 early yggdrasil releases also available stores selling cd-rom software adam j. richter started yggdrasil company together bill selmeier richter spoke michael tiemann setting business interested joining forces cygnus richter member league programming freedom richter using 200 mb hard disk building alpha release lgx prevented practically able include source code packages contained cdrom yggdrasil incorporated published early linux compilation books linux bible gnu testament contributed significantly file system x window system functionality linux early days operation company moved san jose california 1996 1996 yggdrasil incorporated released winter 1996 edition linux internet archives six cds linux software tsx-11 sunsite gnu archive prep.ai.mit.edu x11r6 archives including free contributed x11r6 software ftp.x.org internet rfc standards total nine non-yggdrasil linux distributions company remained active least year 2000 released linux open source dvd website taken offline afterwards company released anything since company last corporate filing january 2004 california secretary state lists suspended company made offer donate 60 yggdrasil cdrom sales revenues computer systems research group founder adam j. richter later indicated company would lose much money changed offer accordingly still maintaining donations csrg company also volume discount plans | [
8837,
7435,
10127,
912,
2321,
2195,
6675,
5397,
4887,
10394,
673,
3618,
3745,
10530,
9253,
10149,
11297,
11305,
7854,
1839,
2738,
4790,
439,
56,
4279,
59,
7483,
3903,
4673,
2375,
4039,
8907,
1110,
9693,
2914,
485,
3685,
9064,
4841,
6890,
... | Test |
11,298 | 3 | Reed's_law:reed law reed law assertion david p. reed utility large networks particularly social networks scale exponentially size network reason number possible sub-groups network participants 2 − n − 1 n number participants grows much rapidly either even utility groups available joined small per-group basis eventually network effect potential group membership dominate overall economics system given set n people 2 possible subsets difficult see since form possible subset simply choosing element one two possibilities whether include element however includes one empty set n singletons properly subgroups 2 − n − 1 subsets remain exponential like 2 david p. reed law pack harvard business review february 2001 pp 23–4 reed law often mentioned explaining competitive dynamics internet platforms law states network becomes valuable people easily form subgroups collaborate value increases exponentially number connections business platform reaches sufficient number members generate network effects dominate overall economics system analysts network value functions including andrew odlyzko argued reed law metcalfe law overstate network value fail account restrictive impact human cognitive limits network formation according argument research around dunbar number implies limit number inbound outbound connections human group-forming network manage actual maximum-value structure much sparser set-of-subsets measured reed law complete graph measured metcalfe law | [
78
] | None |
11,299 | 4 | Quarantine_(computing):quarantine computing quarantine function antivirus software automatically isolates infected files computer hard disk files put quarantine longer capable infecting hosting system december 1988 shortly morris worm work started quarantine anti-malware file reliability product released april 1989 quarantine first product use file signature instead viral signature methods original quarantine used hunt b-tree database files crc16 crc-ccitt signatures doubling signatures rendered useless least immoderately difficult attacks based crc invariant modifications release 2 april 1990 used crc-32 signature one based crc-32 bits word shuffled subsequent ms-av microsoft designed check point apparently relied eight bit checksum—at least thousand files hundreds identical signatures quarantine 1990 version also allowed quarantine allowed system managers track modifications selected files file structures hence quarantine users also got early warnings failing disks disk interface cards 1990 quarantine received lan magazine best year security award year quarantine reportedly responsible finding first stealth virus university toronto pattern matching virus detectors failed efforts expenses convert quarantine platforms went unrewarded tripwire 1991 copy quarantine *nix better funded publicized ondisk could afford match later efforts include modularized reliability intrusion approaches include either sha-1 md5 signatures like quarantine stopped shipping 1994 | [
2213,
4403,
7515,
8668,
6430
] | None |
11,300 | 2 | Graphics_device_interface:graphics device interface graphics device interface subsystem operating systems use representing graphical objects transmitting output devices monitors printers cases graphics device interface able draw 2d graphics simple 3d graphics order make use advanced graphics keep performance api directx opengl needs installed microsoft windows gdi functionality resides gdi.exe 16-bit windows gdi32.dll 32-bit windows | [
6114,
4836,
6797,
2943
] | None |
11,301 | 3 | Windows_Fundamentals_for_Legacy_PCs:windows fundamentals legacy pcs windows fundamentals legacy pcs winflp thin client operating system microsoft based windows xp embedded optimized older less powerful hardware released july 8 2006 marketed full-fledged general purpose operating system although functionally able perform tasks generally associated one includes certain functionality local workloads security management document viewing related tasks .net framework designed work client–server solution rdp clients third party clients citrix ica windows fundamentals legacy pcs originally announced code name eiger 12 may 2005 mönch announced potential follow-up project time name windows fundamentals legacy pcs appeared press release september 2005 introduced formerly code-named “ eiger ” described exclusive benefit sa nowiki /nowiki microsoft software assurance nowiki /nowiki customers gartner evaluation april 2006 stated rtm version windows fundamentals legacy pcs released july 8 2006 release announced press july 12 2006 may 2011 microsoft announced windows thin pc successor product microsoft positions windows fundamentals legacy pcs operating system provides basic computing services older hardware still providing core management features recent windows releases windows firewall group policy automatic updates management services however considered general-purpose operating system microsoft windows fundamentals legacy pcs windows xp embedded derivative optimized legacy pcs requires significantly fewer system resources fully featured windows xp also features basic networking extended peripheral support directx ability launch remote desktop clients compact discs addition local applications offers support hosted remote server using remote desktop installed local hard drive configured run diskless workstation despite optimized older pcs hardware requirements windows fundamentals legacy pcs similar windows xp although faster running slower clock speeds windows xp windows fundamentals legacy pcs smaller feature set windows xp example winflp include paint outlook express windows games solitaire another limitation absence compatibility tab properties ... dialog box executable files internet explorer 8 7 installed hotfix required auto-complete work newer versions browser windows fundamentals legacy pcs exclusively available microsoft software assurance customers designed inexpensive upgrade option corporations number windows 9x computers lack hardware necessary support latest windows available retail oem channels october 7 2008 service pack 3 windows embedded point service windows fundamentals legacy pcs made available april 18 2013 service pack 3 windows fundamentals legacy pcs made available download previously removed microsoft site microsoft marketing pages windows fundamentals redirect windows thin pc suggesting windows fundamentals longer available customers windows fundamentals legacy pcs lifecycle policy windows xp support lifespan ended 8 april 2014 | [
8576,
641,
2179,
5380,
3463,
651,
6797,
639,
8080,
3857,
7057,
8976,
2196,
9874,
10896,
11283,
4505,
4515,
3496,
6441,
6697,
1581,
10926,
7983,
3250,
3890,
9910,
10747,
6462,
7615,
321,
7106,
582,
1098,
10957,
3283,
9173,
11605,
2391,
328... | None |
11,302 | 4 | Richard_Ledgett:richard ledgett richard h. ledgett jr. former deputy director national security agency ledgett undergraduate degree psychology graduate degree strategic intelligence 1988 began working national security agency served variety positions cybersecurity division previous positions nsa included deputy director analysis production 2009–2010 deputy director data acquisition 2006–2009 assistant deputy director data acquisition 2005–2006 chief nsa/css pacific 2002–2005 2012 2013 director nsa/css threat operations center responsible round-the-clock cryptologic activities discover counter adversary cyber efforts june 2013 appointment deputy director january 2014 ledgett headed investigation leaks regarding nsa surveillance programs made edward snowden february 3 2017 ledgett announced would retiring spring successor george c. barnes august 15 2017 ledgett elected bank corporation board directors ledgett pledged increased transparency regarding nsa operations however defended operations nsa argued rare interview reuters nsa operations completely legal ledgett also accused media sensationalizing reports various nsa mass surveillance programs march 2014 ledgett stated ted talk nsa operates legally argued president james madison would proud way constitutional checks balances governed nsa mass surveillance | [
266,
6668,
9357,
2712,
289,
4898,
3495,
1714,
10305,
327,
6344,
7887,
10832,
2897,
4566,
6749,
7137,
365,
4719
] | Test |
11,303 | 5 | Etch_(protocol):etch protocol etch open-source cross-platform framework building network services first announced may 2008 cisco systems etch encompasses service description language compiler number language bindings intended supplement soap corba methods communicating networked pieces software especially emphasis portability transport independence small size high performance etch designed incorporated existing applications systems enabling transition service-oriented architecture derived work cisco unified application environment product acquired cisco part metreos acquisition mid-2008 release planned supported java c second wave support supposed include ruby python javascript c. july 2008 etch released apache 2.0 license part open source process etch submitted apache incubator accepted new podling august 25 2008 formal vote proposed eventually passed september 2008 etch entered start-up phase within apache incubator cisco announced unified application environment end life february 8 2012 january 2013 etch become apache top-level project etch marked retired project december 2016 replacement project announced specified | [
3462,
10377,
4107,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
9245,
3877,
10661,
11355,
5677,
1327,
6834,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
8408,
... | Test |
11,304 | 2 | .asec:.asec .asec file extension android secure encrypted asec file file extension specifically associated google android operating system first introduced android 2.2 code name froyo may 2010 like file extensions group characters end period represents actual format organization file purpose asec format prevent existing applications modified corrupted programs applications moved sd card use asec extension files found .android_secure folder sd card application must moved memory back device ’ local storage file decrypted asec file format basic apk android package file format | [
5522
] | Train |
11,305 | 2 | AntiX:antix antix linux distribution built directly debian stable comparatively lightweight suitable older computers also providing cutting edge kernel applications well updates additions via apt-get package system debian-compatible repositories besides standard live release versions antix available base core allowing installations even lower amounts ram hard drive space overall hardware limitations antix available ia-32 x86-64 architectures comes 3 versions three versions joined antix mx 2014 developed cooperation mepis community uses xfce default desktop environment based directly debian stable highly stable gives solid performance medium-sized footprint november 2016 mx linux listed separate distro distrowatch antix linux distribution originally based mepis based debian stable distribution initially replaced mepis kde desktop environment fluxbox icewm window managers making suitable older less powerful x86-based systems unlike debian antix systemd-free | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
8857,
10394,
6301,
10397,... | None |
11,306 | 7 | Euphoria_(software):euphoria software euphoria game animation engine created naturalmotion based dynamic motion synthesis naturalmotion proprietary technology animating 3d characters on-the-fly based full simulation 3d character including body muscles motor nervous system instead using predefined animations characters actions reactions synthesized real-time different every time even replaying scene common current video games use limp ragdolls animations generated fly euphoria employs complex method animate entirety physically bound objects within game environment engine used indiana jones game since cancelled according web site euphoria runs microsoft windows os x linux playstation 3 playstation 4 xbox 360 xbox one ios android platforms compatible commercial physics engines press release enclosed second trailer eventually confirmed grand theft auto iv first rockstar games feature euphoria red dead redemption second game use engine star wars titles force unleashed ii use euphoria games based rockstar advanced game engine rage including grand theft auto v euphoria integrated source code rage | [
8454,
8937,
2826,
3210,
6797,
7983,
6900,
2293,
4182,
823,
9691,
8185,
5914,
5083,
1916,
11700
] | Test |
11,307 | 8 | Template_Attribute_Language:template attribute language template attribute language tal templating language used generate dynamic html xml pages main goal simplify collaboration programmers designers achieved embedding tal statements inside valid html xml tags worked using common design tools tal created zope used python-based projects well following attributes used normally prefixed codice_1 tag one tal attributes evaluated fairly logical order cases tag present lends take attributes special tal tags used making codice_1 prefix optional e.g would cause code inside codice_5 tags used whenever context whatever application server defines context e.g object contains variable codice_6 true value e.g list containing least one element identifier following colon arbitrary simply needs opening closing tag macro expansion template attribute language metal complements tal providing macros allow reuse code across template files created zope used python projects well metal complements tal ability reuse code allows developer define use macros turn may slots using macro variational content specified slot generating xml documents xml namespace must specified codice_7 following attributes recognised normally requiring „ codice_8 “ prefix normally one used time cases tag present lends take attributes special cases one metal attribute needed special metal tags used making „ metal “ prefix optional e. g. sketched roundup mind tal/tales/metal used following projects besides original zope implementation exhaustive | [
8582,
1258,
8554,
5677,
2062,
595,
502,
11610,
2556,
479
] | Test |
11,308 | 0 | Walter_Daelemans:walter daelemans walter daelemans born june 3 1960 professor computational linguistics university antwerp also research director computational linguistics psycholinguistics research center clips daelemans pioneered use machine learning techniques especially memory-based learning natural language processing europe early 1990s together antal van den bosch wrote book memory-based language processing developed software package timbl time professor tilburg university founded research group induction linguistic knowledge ilk 2003 elected fellow eccai european coordinating committee artificial intelligence “ pioneering work field artificial intelligence outstanding service european artificial intelligence community ” 2014 named fellow association computational linguistics | [
7780,
1890,
7724
] | Validation |
11,309 | 4 | MyDLP:mydlp mydlp data loss prevention solution originally available released free open source software supported data inspection channels include web mail instant messaging file transfer removable storage devices printers mydlp development project originally made source code available terms gnu general public license mydlp one first free software projects data loss prevention acquired comodo group may 2014 comodo since begun marketing enterprise version comodo security solutions subsidiary free version removed website open source code updated since early 2014 october 2010 mydlp included following subprojects mydlp network mostly written erlang performance concurrent network operations python also used exceptional cases subsystem could run platform supported erlang python mydlp endpoint developed windows platforms written c++ c mydlp web ui written php adobe flex used mysql order store user configurations october 2010 mydlp included widespread data loss prevention features text extraction binary formats incident management queue source code detection data identification methods bank account credit card several national identification numbers besides features like data classification statistical analysis trained sentences native language processor integrated naive bayes classifier claimed included | [
8644,
8615,
8554,
5677,
7022
] | Test |
11,310 | 9 | Docstring:docstring programming docstring string literal specified source code used like comment document specific segment code unlike conventional source code comments even specifically formatted comments like javadoc documentation docstrings stripped source tree parsed retained throughout runtime program allows programmer inspect comments run time instance interactive help system metadata appears first introduced original teco implementation emacs languages support docstrings include python lisp elixir clojure gherkin julia documentation supported language level form docstrings markdown elixir de facto markup language choice use docstrings lisp docstrings known documentation strings common lisp standard states particular implementation may choose discard docstrings whenever want whatever reason kept docstrings may viewed changed using documentation function instance common practice documenting code object head definition captured addition docstring syntax python language docstring python code object module class function first statement code object immediately following definition 'def 'class statement statement must bare string literal kind expression docstring code object available code object codice_1 attribute codice_2 function following python file shows declaration docstrings within python source file assuming code saved mymodule.py following interactive session showing docstrings may accessed | [
963,
6502,
5031,
8554,
2062,
6718
] | Validation |
11,311 | 3 | Lazy_Jones:lazy jones lazy jones computer game commodore 64 zx spectrum msx tatung einstein written david whittaker released terminal software 1984 spectrum version ported simon cobb lazy jones essentially collection fifteen smaller sub-games game takes place inside hotel three floors connected elevator character lazy hotel employee much care work prefers sneak rooms play video games instead main screen lazy jones hotel interior character use elevator travel freely three floors must watch enemies current hotel manager top floor ghost previous manager bottom floor haunted cleaning cart middle floor enemies walk around pursue character contact fatal floor six rooms three side elevator room entered inside rooms video game character immediately begins playing well video games hotel bar bed cleaning closet toilet bar works like video game bed cleaning closet toilet useless decorations intentionally added whittaker run ideas new games rooms visited game starts increasingly faster time one tracks lazy jones soundtrack wall sampled german electro project zombie nation 1999 hit single kernkraft 400 plot game simple- hotel care taker named jones bored decides go rooms play games various sub-games generally simplified versions famous 1970s 1980s video games space invaders frogger snake h.e.r.o breakout chuckie egg plots gameplay simple player simply must avoid incoming enemies long enough score many points player must shoot enemies score points whittaker developed sub-game individually basic first make sure worked converted one almost line line assembly code sub-game time limit sub-games possible die thus ending sub-game prematurely others end time limit expires fourteen video games follows hotel bar character stands front rather wide bar barman patron hopelessly drunk moving back forth across bar different speeds pressing fire button standing front drink barman time earns points drunk patron bars movement jumped sub-games possible die prematurely eggie chuck jay walk res q wall sub-games end time limit runs 99 red balloons laser jones outland scoot star dust hills alive reflex turk wild wafers wipeout hotel bar game chiptune music characteristic sound distinct many c64 games 21 subtunes using two voices sid chip turn use sawtooth sound one voice plays simple octave bassline part one adding melody tunes share tempo well change seamlessly playing another sub game subtune 21 named star dust used german producer team zombie nation song kernkraft 400 without permission florian senfter splank later paid undisclosed sum david whittaker use melody tune title 99 red balloons comes english name song 99 luftballons german songstress nena version reached 1 uk singles chart visage fade grey also heard | [
3075,
4109,
9006,
7536,
10576,
10931,
9716
] | Test |
11,312 | 1 | Bahamas_Maritime_Authority:bahamas maritime authority bahamas maritime authority bma authority registers vessels bahamas enforces safety standards bahamian-registered craft authority office shirlaw house nassau also offices bahamas house new york city hutchinson house hong kong london agency established july 1995 prior establishment authority bahamas ministry transport maintained register ships bahamian-flagged bma formed due growth made prior arrangement difficult | [] | None |
11,313 | 4 | CWShredder:cwshredder cwshredder program runs microsoft windows removing coolwebsearch family spyware originally created merijn bellekom bought intermute october 19 2004 june 2005 intermute acquired trend micro program distributed trend micro currently offered two forms program updated since ownership transferred trend micro currently available version v2.19 released november 2005 still functional unclear trend micro plans update program controversy quarters whether trend micro either declare cwshredder open source compelled give ownership another party program maintained updated | [
9600,
6797,
5935,
10392,
7515,
3739,
127
] | Validation |
11,314 | 3 | MPC5xx:mpc5xx mpc5xx family processors mpc555 mpc565 32-bit powerpc embedded microprocessors operate 40 66 mhz frequently used automotive applications including engine transmission controllers delphi corporation use either mpc561 mpc565 engine controllers supply general motors nearly 2009 model gm north america vehicles using mpc5xx engine controller bosch also used mpc5xx throughout edc-16 series diesel engine controllers cummins b series diesel engine ecu generally considered microcontrollers integrated peripheral set unusual architecture mmu large on-chip sram large much 1 mb low latency access on-chip flash memories means architecture tailored control applications instead block-address translation hardware-driven fixed-page address translation prescribed first powerpc specification 5xx cores provided software-driven translation mechanism supported variable page sizes model basis embedded mmu model current power isa specification mpc5xx – powerpc 5xx family processors share common naming scheme development powerpc 5xx family discontinued favour flexible powerful powerpc 55xx family peripherals model vary frequently include analog-to-digital converters adc time processor units tpu gpio uarts/serial qsmcm mpc5xx family descends mpc8xx powerquicc family core means uses harvard architecture single issue core unlike 8xx family 5xx variants floating point unit earlier chips like mpc509 instruction cache recent chips capability contain large amounts flash memory on-board capable bursting instructions processor low-cost chips omit flash memory adds lot die area driving price chip many controller applications run long control loops large dataset low latency deterministic access data instruction routines important data stored on-chip sram available datapath processor single cycle performance quite good data must accessed off-chip frequently performance reduced chip burst data accesses external ram slow bus access protocol simple memory interface programmed setting default memory location writing base registers chips quite popular hobbyists well automotive industrial developers | [
7170,
7299,
3844,
4868,
1158,
7302,
10501,
7305,
11395,
3467,
1548,
6925,
6415,
10767,
1170,
7445,
2073,
7065,
9371,
4773,
8102,
9638,
682,
11054,
2224,
5297,
1461,
11447,
8761,
6715,
2623,
1983,
10945,
7234,
7235,
9928,
3017,
9163,
6607,
... | Test |
11,315 | 9 | BASIC_A+:basic a+ basic a+ developed optimized systems software cupertino california united states provide atari 8-bit family extended basic compatible faster simpler rom-based atari basic atari basic came 8 kb rom cartridge basic a+ delivered floppy disk took 15 kb computer ram leaving 23 kb available user programs 48 kb atari 800 basic a+ offered price us 80.00 1983 including products os/a+ easmd editor/assembler extension atari basic came supplement latter reference manual documentation addition faster rom-bound counterpart basic a+ provided number extra commands dos operations player/missile graphics debugging | [
3718,
7691,
1805,
9997,
786,
11412,
22,
3736,
3481,
9881,
797,
3233,
5925,
8101,
4136,
10666,
8494,
303,
7343,
7983,
315,
7355,
7486,
7870,
4160,
4674,
712,
847,
1879,
11229,
2915,
9188,
5733,
11243,
2541,
8429,
5747,
759,
6778,
6910,
1... | Test |
11,316 | 2 | DirectX_plugin:directx plugin computer music professional audio creation directx plugin software processing component loaded plugin host applications allow real-time processing audio effects mixing audio act virtual synthesizers directx plugins allow replacement traditional recording studio hardware rack units used professional studios software-based counterparts connected together modular way allows host manufacturers focus conviviality efficiency products specialized manufacturers focus digital signal processing aspect example plugins effects boxes reverbs delays effects pedals like guitar distortion flange chorus mixing mastering processors compressors limiters exciters sub bass enhancers stereo imagers many similar virtual studio technology later audio units apple mac os x directx plugins open standard architecture connecting audio synthesizers effect plugins audio editors hard-disk recording systems directx plug-ins based microsoft component object model com allows plugins recognised used applications via common interfaces plugins connect applications plugins pins via pass processes buffered streams audio video data architecturally directx plugins directshow filters directx plugins also two types directx effect plugins dx directx instrument plugins dxi effect plugins used generate process receive otherwise manipulate streams audio instrument plugins midi controllable directx plugins generally used synthesize sound playback sampled audio using virtual synthesizers samplers drum machines directx effect plugins developed microsoft part directshow directx instruments developed cakewalk co-operation microsoft available windows several wrapper plugins available directx plugins used applications support vst vice versa others chainer plugins also available allow chaining multiple plugins together directx plugins developed c++ using microsoft directx sdk sony audio plug-in development kit cakewalk directx wizard also delphi sdk available directx plugins superseded dmo-based signal processing filters recently media foundation transforms | [
5761,
10243,
9348,
5765,
10886,
2183,
9609,
5259,
653,
6927,
9234,
1043,
3224,
5401,
5913,
5119,
11546,
10654,
1055,
4384,
8607,
2083,
4771,
8227,
2854,
7846,
10024,
1577,
10026,
10282,
10029,
10414,
4143,
9263,
11570,
8246,
6584,
2493,
595... | Test |
11,317 | 9 | David_F._Bacon:david f. bacon david bacon american computer programmer bacon began working programmer age 16 worked startup senior year high school columbia college columbia university worked first david e. shaw non-von supercomputer network algorithms simulation yechiam yemini creating nest network simulator served basis number network simulators including cornell real thence lbl ns simulator bacon spent career ibm thomas j. watson research center starting programmer 1985 working hermes distributed programming language eventually becoming principal research staff member took sabbatical 2009 visiting professor computer science harvard 2015 joined google working spanner distributed database system much work focused garbage collection 2009 inducted acm fellow contributions real-time systems object-oriented language design implementation work metronome hard real-time tracing garbage collector became basis ibm websphere real time java virtual machine used software navy ddg 1000 destroyer original research subsequently selected 2013 influential paper award symposium principles programming languages work garbage collecting cyclic structures reference counted systems used number scripting languages including php 2013 published first garbage collector implemented completely hardware selected acm research highlight addition garbage collection work focused implementation concurrent object-oriented languages thesis work rapid type analysis rta used many compilers analysis frameworks construct call graphs object-oriented languages including soot go 2004 work high-performance locking java appeared list 50 influential pldi papers time | [
2304,
7841,
8644,
5677,
9490,
1459,
726,
1435
] | Train |
11,318 | 0 | Michael_Collins_(computational_linguist):michael collins computational linguist michael j. collins born 4 march 1970 researcher field computational linguistics research interests natural language processing well machine learning made important contributions statistical parsing statistical machine learning studies collins covers wide range topics parse re-ranking tree kernels semi-supervised learning machine translation exponentiated gradient algorithms general focus discriminative models structured prediction one notable contribution state-of-the-art parser penn wall street journal corpus november 11 2015 works cited 16,020 times h-index 47 collins worked researcher labs january 1999 november 2002 later held positions assistant associate professor m.i.t since january 2011 professor columbia university 2011 named fellow association computational linguistics | [
1890,
7780,
7724,
7164,
4350
] | Test |
11,319 | 4 | Device_fingerprint:device fingerprint device fingerprint machine fingerprint browser fingerprint information collected remote computing device purpose identification fingerprints used fully partially identify individual users devices even persistent cookies also zombie cookies ca n't read stored browser client ip address hidden even one switches another browser device may allow remote application detect prevent online identity theft credit card fraud also compile long-term records individuals browsing histories even 're attempting avoid tracking raising major concern internet privacy advocates computer security experts consider ease bulk parameter extraction offered web browsers security hole basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 electronic frontier foundation launched website visitors test browser fingerprint collecting sample 470161 fingerprints measured least 18.1 bits entropy possible browser fingerprinting advancements canvas fingerprinting claims add another 5.7 bits firefox provides feature protect browser fingerprinting since 2015 version 41 july 2018 still experimental disabled default wwdc 2018 apple announced safari macos mojave presents simplified system information users browse web preventing tracked based system configuration motivation device fingerprint concept stems forensic value human fingerprints ideal case web client machines would different fingerprint value diversity value would never change stability assumptions would possible uniquely distinguish machines network without explicit consent users practice neither diversity stability fully attainable improving one tendency adversely impact fingerprinting methods range passive active passive fingerprinting refers techniques involve obvious querying client machine methods rely upon precise classification factors client tcp/ip configuration os fingerprint ieee 802.11 wireless settings hardware clock skew active fingerprinting assumes client tolerate degree invasive querying active method installation executable code directly client machine code may access attributes typically available means mac address unique serial numbers assigned machine hardware data useful fingerprinting programs employ digital rights management passive collection device attributes web-browser layer may occur several osi model layers normal operation various network protocols transmit broadcast packets headers one may infer client configuration parameters sorted layer examples protocols collection device fingerprints web clients browser software relies availability javascript similar client-side scripting language harvesting suitably large number parameters two classes users limited clientside scripting mobile devices running privacy software browser extensions block ads trackers separate issue single device may multiple web clients installed even multiple virtual operating systems distinct client operating system distinct internal parameters one may change device fingerprint simply running different browser machine unless new crossbrowser fingerprinting technique used furthermore sandboxed devices like iphone exhibit little uniqueness fingerprinting techniques involving technical information device browser font list sufficient create unique fingerprint | [
9732,
3462,
8329,
5402,
7965,
5536,
10924,
9901,
7983,
6576,
9395,
8630,
9146,
3643,
3133,
7364,
4435,
5078,
5469,
5470,
3555,
3688,
11112,
3434,
7411,
2558
] | Test |
11,320 | 4 | BeyondTrust:beyondtrust beyondtrust formerly symark american company develops markets supports family privileged identity management pam privileged remote access vulnerability management products unix linux windows mac os operating systems beyondtrust founded 2006 provided least privilege management software microsoft windows os unix vendor symark acquired beyondtrust 2009 2018 company acquired bomgar developer remote support pam software cases beyondtrust adopted new company name symark founded 1985 vax/vms utility software company los angeles san fernando valley name derived initials founders bob sommers doug yarrow symark also client-server computing vendor later acquiring license unix security product upm owned quest software rebranding version powerbroker symark relocated westlake village california agoura hills company focused identity access password management privileged users unix systems 2003—2008 company expanded spain portugal japan latin america time period also grew almost 300 percent one fastest growing private companies l.a. area 2003 autoprof introduced autoprof policy maker first commercial product build upon microsoft built-in group policy objects make common tasks like mapping network drives sharing printer connections easier 2005 autoprof grew 90 revenue previous year changed company name desktopstandard four million desktops management desktopstandard software across 3,500 customers 2003—2005 desktopstandard added six products portfolio rbac password management identity access management windows 2006 microsoft acquired desktopstandard products desktopstandard ceo formed new company beyondtrust around remaining policy maker application security product 2009 symark acquired windows-based business beyondtrust 2009 approximately 20 million adopted beyondtrust new company name 2011 beyondtrust acquired software likewise software acquisition expanded portfolio inside perimeter security capabilities windows unix-based systems include authentication auditing management cross-platform cloud environments may 2012 beyondtrust acquired vulnerability management pioneer eeye digital security december 2012 beyondtrust acquired blackbird group september 2014 veritas capital acquires beyondtrust 310 million october 2018 bomgar acquires beyondtrust veritas | [
704,
929,
9862,
4873,
823
] | Validation |
11,321 | 5 | Link_Layer_Discovery_Protocol:link layer discovery protocol link layer discovery protocol lldp vendor-neutral link layer protocol used network devices advertising identity capabilities neighbors local area network based ieee 802 technology principally wired ethernet protocol formally referred ieee station media access control connectivity discovery specified ieee 802.1ab ieee 802.3 section 6 clause 79 lldp performs functions similar several proprietary protocols cisco discovery protocol foundry discovery protocol nortel discovery protocol link layer topology discovery information gathered lldp stored device management information database mib queried simple network management protocol snmp specified rfc 2922 topology lldp-enabled network discovered crawling hosts querying database information may retrieved include link layer discovery protocol may used component network management network monitoring applications one example use data center bridging requirements dcbx discovery capability exchange protocol used conveying capabilities configuration features neighbors ensure consistent configuration across network lldp used advertise power ethernet capabilities requirements negotiate power delivery lldp information sent devices interfaces fixed interval form ethernet frame frame contains one lldp data unit lldpdu lldpdu sequence type-length-value tlv structures ethernet frame used lldp typically destination mac address set special multicast address 802.1d-compliant bridges forward multicast unicast destination addresses permitted ethertype field set 0x88cc lldp frame starts following mandatory tlvs chassis id port id time-to-live mandatory tlvs followed number optional tlvs frame ends special tlv named end lldpdu type length fields 0 accordingly ethernet frame containing lldpdu following structure tlv components following basic structure custom tlvs supported via tlv type 127 value custom tlv starts 24-bit organizationally unique identifier 1 byte organizationally specific subtype followed data basic format organizationally specific tlv shown according ieee std 802.1ab §9.6.1.3 organizationally unique identifier shall contain organization oui defined ieee std 802-2001 organization responsible managing subtypes media endpoint discovery enhancement lldp known lldp-med provides following facilities lldp-med protocol extension formally approved published standard ansi/tia-1057 telecommunications industry association tia april 2006 | [
10242,
8708,
7045,
3847,
649,
7049,
9868,
6670,
3218,
9365,
5270,
10005,
11413,
5402,
5531,
8989,
3742,
10271,
8097,
9380,
2085,
9381,
3751,
3752,
5671,
6187,
172,
4396,
10924,
816,
434,
562,
2996,
3762,
5045,
9909,
7865,
5434,
10171,
313... | None |
11,322 | 2 | Nouveau_(software):nouveau software nouveau free open-source graphics device driver nvidia video cards tegra family socs written independent software engineers minor help nvidia employees project goal create open source driver reverse engineering nvidia proprietary linux drivers managed x.org foundation hosted freedesktop.org distributed part mesa 3d project initially based 2d-only free open-source nv driver red hat developer matthew garrett others claim obfuscated nouveau licensed mit license name project comes french word nouveau meaning new suggested original author irc client french autoreplace feature suggested word nouveau typed nv nouveau gallium3d-style device driver works top direct rendering infrastructure dri composed two kernel-components drm kms driver user-space components libdrm mesa 3d nouveau intends support nvidia microarchitectures tesla fermi kepler maxwell version 1.0.13 support pascal version 1.0.15 support volta latest version 1.0.16 supports new turing technical reasons nvidia gpus boot low frequency called clock device driver set higher frequency booting due lack documentation gpu nouveau lacked capability beginning result was/is major loss performance proven benchmarks compared performance nvidia proprietary device driver nouveau june 2014 breakthrough finally achieved initial re-clocking support added nouveau version 1.0.14 pascal support level maxwell 2 version 1.0.15 patch gtx 970 4gb accelerations pascal maxwell 2 level unlike amd nvidia provides documentation gpus developers nouveau forced use clean-room reverse engineering obtain necessary data enable write nouveau project uses several custom-made programs reverse engineering mmiotrace memory mapped i/o trace renouveau valgrind mmt renouveau reverse engineering nouveau program licensed gnu gpl using sdl collects data nouveau reverse engineering work users proprietary nvidia drivers help development nouveau providing information hardware nvidia cards renouveau renouveau works copying current graphics card mmio register space drawing graphics taking another copy mmio outputting difference text file runs six dozen different tests user computer makes tar.bz2 archive submits e-mail automatically transferred project ftp servers developers analyze kernel direct access hardware includes graphics card end-user software accesses various interfaces specific task nouveau written gallium3d-type device driver means shares large amounts code gallium3d drivers shared core mainlined mesa 3d distributed various linux distributions mesa 3d drivers includes supports multiple rendering interfaces designed give user-space programs e.g video games cad software access correspondent sip blocks free open-source implementation direct3d version 9 mainlined mesa 3d used nouveau however since software using direct3d programmed windows software used together wine linux rendering interface opengl developed khronos group implementations api part nvidia amd proprietary catalyst another implementation written free software enthusiasts brian paul intel coordinated mesa 3d gallium3d-type driver nouveau needs minor adaptations work implementation mesa 3d supports multiple interfaces designed give user-space programs e.g gstreamer handbrake access correspondent sip blocks also possible use ic designed rendering calculations purpose though approach consumes much electrical power compared utilizing purevideo sip block nouveau supports purevideo provides access vdpau partly xvmc nouveau support nvidia nvenc mesa galliumcompute also main project nvidia amd part near beta opencl 1.0 1.1 1.2 nouveau support cuda project coriander conversion cuda code opencl 1.2 possible cuda support therefore possible full opencl 1.2 support galliumcompute around year 2006 nvidia introduced falcon fast logic controller gpus 4th risc-v workshop july 2016 nvidia employees introduced plans replace falcon new proprietary custom design based risc-v instruction set nouveau started 2005 stéphane marchesin series patches upon nv driver officially announced february 2006 fosdem event first live demo nouveau linux.conf.au 2007 2010 nouveau accepted 2.6.33 version linux kernel experimental driver 26 march 2012 nouveau driver marked stable promoted staging area linux 3.4 nouveau gained major internal architecture overhaul linux 3.7 nouveau originally used direct rendering infrastructure dri mesa 3d rendering 3d computer graphics allows accelerate 3d drawing using graphics processing unit gpu directly 3d application february 2008 work dri support ceased moved new gallium3d nvidia publicly announced would release documentation gpus intent address areas impact out-of-the-box usability nvidia gpus nouveau nvidia alexandre courbot committed extensive patch set add initial support gk20a tegra k1 nouveau red hat employee ben skeggs committed patch adds support pascal-based gp104 chip found geforce gtx 1070 geforce gtx 1080-branded graphics cards linux kernel status 2016 future work introduced xdc2016 status new efforts opencl shown fosdem nouveau driver 3d counterpart mesa used default open-source driver nvidia cards many linux distributions including fedora 11 opensuse 11.3 ubuntu 10.04 debian compiz recommends nouveau nvidia proprietary driver june 2014 codethink reported run wayland-based weston compositor linux kernel 3.15 making use egl 100 open-source graphics driver stack tegra k1 october 2016 netbsd added experimental nouveau support netbsd 7 comparison benchmarks nouveau generally provides inferior performance nvidia proprietary graphics device drivers systems one unable boot linux properly due certain bugs nouveau thus nouveau disabled specifying kernel option nomodeset prior booting often done pressing codice_1 grub menu appending codice_2 linux line made permanent adding similar option codice_3 | [
3203,
9604,
2955,
7309,
4367,
9489,
10658,
4902,
6694,
8621,
7086,
815,
2224,
7983,
1842,
6069,
823,
10173,
7111,
2635,
3033,
10971,
1632,
2277,
1644,
237,
5356,
8685,
9455,
9964,
10480,
499,
2804,
5363,
8438,
11630,
11634,
2937,
8700,
20... | Test |
11,323 | 6 | MapR_FS:mapr fs mapr file system mapr fs clustered file system supports large-scale high-performance uses mapr fs supports variety interfaces including conventional read/write file access via nfs fuse interface well via hdfs interface used many systems apache hadoop apache spark addition file-oriented access mapr fs supports access tables message streams using apache hbase apache kafka apis well via document database interface first released 2010 mapr fs typically described mapr converged data platform due addition tabular messaging interfaces core technology however used implement forms persistent data storage interfaces ultimately supported server processes distinguish different capabilities overall data platform term mapr fs used specifically refer file-oriented interfaces mapr db mapr json db used refer tabular interfaces mapr streams used describe message streaming capabilities mapr fs cluster filesystem provides uniform access from/to files objects tables using universal namespace accessible client system access control also provided files tables streams using access control expressions extension common limited access control list allow permissions composed lists allowed users groups instead allow boolean combinations user id groups mapr fs developed starting 2009 mapr technologies extend capabilities apache hadoop providing performant stable platform design mapr fs influenced various systems andrew file system afs concept volumes afs strong similarity point view users although implementation mapr fs completely different one major difference afs mapr fs latter uses strong consistency model afs provides weak consistency meet original goals supporting hadoop programs mapr fs supports hdfs api translating hdfs function calls internal api based custom remote procedure call rpc mechanism normal write-once model hdfs replaced mapr fs fully mutable file system even using hdfs api ability support file mutation allows implementation nfs server translates nfs operations internal mapr rpc calls similar mechanisms used allow filesystem userspace fuse interface approximate emulation apache hbase api files mapr fs internally implemented splitting file contents chunks typically 256 mb size although size specific file chunk written containers element replication cluster containers replicated replication done either linear fashion replica forwards write operations next replica line star fashion master replica forwards write operations replicas time writes acknowledged master replica writes replicas complete internally containers implement b-trees used multiple levels map file offset chunk within file map file offset correct 8kb block within chunk b-trees also used implement directories long hash file directory name directory used find child file directory table volume special data structure similar directory many ways except allows additional access control management operations notable capability volumes nodes volume may reside within cluster restricted control performance particularly heavily contended multi-tenant systems running wide variety workloads proprietary technology used mapr fs implement transactions containers achieve consistent crash recovery features filesystem include | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
8772,
1109,
4708,
8810,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
12... | None |
11,324 | 1 | Correlation_database:correlation database correlation database database management system dbms data-model-independent designed efficiently handle unplanned ad hoc queries analytical system environment unlike row-oriented relational database management systems use records-based storage approach column-oriented databases use column-based storage method correlation database uses value-based storage vbs architecture unique data value stored auto-generated indexing system maintains context values correlation dbms stores unique data value physical database size significantly smaller relational column-oriented databases without use data compression techniques approximately 30gb correlation dbms may become smaller raw data set vbs model used cdbms consists three primary physical sets objects stored managed vbs model unique value raw data stored therefore data always normalized level unique values eliminates need normalize data sets logical schema data values stored together ordered sets based data types integers one set characters another etc optimizes data handling processes access values addition typical data values data value store contains special type data storing relationships tables functions similarly foreign keys rdbms structures cdbms relationship known dictionary stored data value making navigation tables completely automatic data dictionary contains typical metadata plus additional statistical data tables columns occurrences values logical schema also maintains information relationships logical tables index linking storage includes data used locate contents record ordered values data store ram-based storage system cdbms designed use much ram operating system provide large databases additional ram improves performance generally 4gb ram provide optimized access times 100 million records 8gb ram adequate databases 10 times size incremental ram consumed decreases database grows 16gb ram generally support databases containing approximately 20 billion records sample records shown illustrate physical differences storage structures used relational column-oriented correlation databases record-based structure used rdbms stores elements row adjacent variations like clustered indexing may change sequence rows rows columns values stored table table might stored column-based structure elements column stored adjacent consecutive duplicates within single column may automatically removed compressed efficiently vbs structure used cdbms unique value stored given abstract numeric identifier regardless number occurrences locations original data set original dataset constructed referencing logical identifiers correlation index may resemble storage note value mn occurs multiple times data included amount repeat data grows benefit multiplies records example table expressed correlation process form database normalization one achieve benefits column-oriented storage within rdbms one achieve benefits correlation database database normalization however traditional rdbms normalization process requires work form table configuration stored procedures sql statements say database correlation database naturally expresses fully normalized schema without extra configuration result correlation database may focused optimizations fully normalized structure correlation process similar occurs text-search oriented inverted index analytical data warehouse applications cdbms several advantages alternative database structures first database engine indexes data auto-generates schema fly loading implemented quickly easy update need physical pre-design need ever restructure database second cdbms enables creation execution complex queries associative queries show everything related x difficult impossible model sql primary advantage cdbms optimized executing ad hoc queries queries anticipated data warehouse design phase cdbms two drawbacks comparison database alternatives unlike relational databases used wide variety applications correlation database designed specifically analytical applications provide transaction management features used transactional processing second indexes data load process physical load speed cdbms slower relational column-oriented structures however eliminates need logical physical pre-design overall time use cdbms generally similar somewhat faster alternative structures | [
2688,
5632,
10632,
8201,
8979,
2068,
10389,
7446,
2456,
1049,
5658,
5403,
9631,
1697,
9634,
4263,
2344,
7080,
10413,
10286,
7983,
9397,
4155,
3004,
7868,
9147,
10048,
2369,
5953,
11457,
6085,
9286,
2383,
2512,
2901,
10326,
7767,
11098,
987,... | None |
11,325 | 2 | Oryx/Pecos:oryx/pecos oryx/pecos proprietary operating system developed scratch bell labs beginning 1978 express purpose running large-scale pbx switching equipment operating system first used flagship system 75 recently used variations including definity g3 generic 3 switches manufactured t/lucent technologies spinoff avaya last system based oryx/pecos avaya g3 csi running release 13.1 definity software formal end sale february 5 2007 although widely believed unix-like variant developed directly bell labs case based version unix oryx/pecos consists kernel oryx associated processes running top pecos system named pecos street bounds westminster co campus colorado bell labs location oryx last word alphabetically os office dictionary oryx purportedly origin unicorn myth system loosely based thoth developed university waterloo demos developed los alamos scientific labs features normally found commercial operating systems found oryx/pecos features include one historical link oryx/pecos unix authors article proposed future development implementation unix execution environment top oryx/pecos fact project undertaken denver however project never became official product lucent even though completed successfully introduced internally eli version oryx/pecos 5th release e release persons working large office environments using lucent technologies avaya-branded telephones likely using oxyx-pecos indirectly due narrow focus proprietary nature operating system remains obscure 2005 avaya discontinued use oryx/pecos operating system instead porting become application ran linux new incarnation known communication manager also early 2000s definity one later ip 600 s8100 earlier attempt phase away os definity one ran windows nt 4.0 linux emulator also emulated oryx/pecos system allegedly according administrators used specific system failure attempt windows run top oryx/pecos linux problem however due robust nature carrier-grade equipment widespread use t/lucent/avaya pbx systems oryx/pecos probably continue supported indefinitely | [
7983,
3250,
5363,
5397,
9366,
823
] | Test |
11,326 | 9 | Plua:plua plua port programming language lua 5.0.3 along small ide palm computing platform lua programming language designed tecgraf computer graphics technology group puc-rio brazil plua includes extensions lua better support palm platform development ceased plua latest stable version plua 2.0 downloaded discussion board prior version plua 1.1 port lua 4.0 extensions differ somewhat versions new version thus sometimes called plua 2 avoid confusion plua special functions extensions support palm platform including compiler interpreter approximately 150 kb compiled helloworldapp.prc shown approximately 2 kb classic hello world program old version written follows text saved normal memo palm executed tapping run button ide alternatively program compiled prc palm os program file executable palm platform provided runtime program present ide breakdown program equivalent program new extensions written follows breakdown program first line comment rest little different | [
1952,
10565,
8262,
8776,
4777,
9714
] | Train |
11,327 | 1 | Object-relational_impedance_mismatch:object-relational impedance mismatch object-relational impedance mismatch set conceptual technical difficulties often encountered relational database management system rdbms served application program multiple application programs written object-oriented programming language style particularly objects class definitions must mapped database tables defined relational schema term object-relational impedance mismatch derived electrical engineering term impedance matching objects instances reference one another therefore form graph mathematical sense network including loops cycles relational schemas contrast tabular based relational algebra defines linked heterogeneous tuples groupings data fields row different types field object-oriented programs well designed techniques result encapsulated objects whose internal representation hidden object-oriented framework underlying properties given object expected exposed interface outside one implemented alongside object however object-relational mapping necessarily exposes underlying content object interact interface object implementation specify hence object-relational mapping violates encapsulation object since many object-relational mappers automatically generate public fields corresponding database columns relational thinking private versus public access relative need object-oriented oo model absolute characteristic data state relational oo models often conflicts relativity versus absolutism classifications characteristics object-oriented paradigm objects interfaces together provide access internals object relational model hand utilizes derived relation variables views provide varying perspectives constraints ensure integrity similarly essential oop concepts classes objects inheritance polymorphism supported relational database systems proper mapping relational concepts object-oriented concepts made relational database tables linked associations found object-oriented analysis major mismatch existing relational oo languages type system differences relational model strictly prohibits by-reference attributes pointers whereas oo languages embrace expect by-reference behavior scalar types operator semantics vastly different models causing problems mapping example sql systems support string types varying collations constrained maximum lengths open-ended text types tend hinder performance oo languages consider collation argument sort routines strings intrinsically sized available memory subtle related example sql systems often ignore trailing white space string purposes comparison whereas oo string libraries typically possible construct new data types matter constraining possible values primitive types oo language another mismatch differences structural integrity aspects contrasted models oo languages objects composed objects—often high degree—or specialize general definition may make mapping relational schemas less straightforward relational data tends represented named set global unnested relation variables relations sets tuples conforming header see tuple relational calculus ideal counterpart oo languages constraints oo languages generally declared manifested exception raising protection logic surrounding code operates encapsulated internal data relational model hand calls declarative constraints scalar types attributes relation variables database whole semantic differences especially apparent manipulative aspects contrasted models however relational model intrinsic relatively small well-defined set primitive operators usage query manipulation data whereas oo languages generally handle query manipulation custom-built lower-level case- physical-access-path-specific imperative operations oo languages support declarative query sublanguages oo languages typically deal lists perhaps hash tables manipulative primitives necessarily distinct set-based operations relational model concurrency transaction aspects significantly different also particular transactions smallest unit work performed databases much larger relational databases operations performed classes oo languages transactions relational databases dynamically bounded sets arbitrary data manipulations whereas granularity transactions oo language typically level individual assignments primitive-typed fields general oo languages analogue isolation durability atomicity consistency ensured writing fields primitive types working around impedance mismatch problem object-oriented programs starts recognition differences specific logic systems employed mismatch either minimized compensated object-relational impedance mismatch problem universal problem oo databases name suggests impedance problem occurs relational databases common solution problem use alternative database nosql xml database attempts building object-oriented database management systems oodbms would avoid impedance mismatch problem less successful practice relational databases however partly due limitations oo principles basis data model research performed extending database-like capabilities oo languages notions transactional memory one common solution impedance mismatch problem layer domain framework logic scheme oo language used model certain relational aspects runtime rather attempt static mapping frameworks employ method typically analogue tuple usually row dataset component generic entity instance class well analogue relation advantages approach may include disadvantages may include mixing levels discourse within oo application code presents problems common mechanisms used compensate biggest challenge provide framework support automation data manipulation presentation patterns within level discourse domain data modelled address reflection and/or code generation utilized reflection allows code classes addressed data thus provide automation transport presentation integrity etc data generation addresses problem addressing entity structures data inputs code generation tools meta-programming languages produce classes supporting infrastructure en masse schemes may still subject certain anomalies levels discourse merge instance generated entity classes typically properties map domain e. g. name address well properties provide state management framework infrastructure e. g. ismodified argued christopher j date others truly relational dbms would pose problem domains classes essentially one thing native mapping classes relational schemata fundamental design mistake individual tuples within database table relation ought viewed establishing relationships entities representations complex entities however view tends diminish influence role object-oriented programming using little field type management system impedance mismatch programming domain objects user interface sophisticated user interfaces allow operators managers non-programmers access manipulate records database often require intimate knowledge nature various database attributes beyond name type particular considered good practice end-user productivity point view design user interfaces ui prevents illegal transactions cause database constraint violated entered requires much logic present relational schemata duplicated code certain code-development frameworks leverage certain forms logic represented database schema referential integrity constraints issues handled generic standard fashion library routines rather ad hoc code written case-by-case basis argued sql due limited set domain types alleged flaws makes proper object domain-modelling difficult sql constitutes lossy inefficient interface dbms application program whether written object-oriented style however sql currently widely accepted common database language marketplace use vendor-specific query languages seen bad practice avoidable database languages business system 12 tutorial proposed none widely adopted dbms vendors current versions mainstream object-relational dbmss like oracle microsoft sql server point may non-issue engines functionality given database arbitrarily extended stored code functions procedures written modern oo language java oracle microsoft .net language sql server functions invoked in-turn sql statements transparent fashion user neither knows cares functions/procedures originally part database engine modern software-development paradigms fully supported thus one create set library routines re-used across multiple database schemas vendors decided support oo-language integration dbms back-end realized despite attempts iso sql-99 committee add procedural constructs sql sql never rich set libraries data structures today application programmers take granted reasonable leverage directly possible rather attempting extend core sql language consequently difference application programming database administration blurred robust implementation features constraints triggers may often require individual dual dba/oo-programming skills partnership individuals combine skills fact also bears division responsibility issue however would point contention moot due fact 1 rdbmses never intended facilitate object modelling 2 sql generally seen lossy inefficient interface language one trying achieve solution rdbmses designed sql efficient designed namely query sort filter store large sets data would additionally point inclusion oo language functionality back-end simply facilitates bad architectural practice admits high-level application logic data tier antithetical rdbms canonical copy state located database model generally assumes database management system authoritative repository state concerning enterprise copies state held application program — temporary copies may date underlying database record subsequently modified transaction many object-oriented programmers prefer view in-memory representations objects canonical data view database backing store persistence mechanism another point contention proper division responsibility application programmers database administrators dba often case needed changes application code order implement requested new feature functionality require corresponding changes database definition organizations database definition responsibility dba due need maintain production database system 24 hours day many dbas reluctant make changes database schemata deem gratuitous superfluous cases outright refuse use developmental databases apart production systems help somewhat newly developed application goes live dba need approve changes programmers view intransigence however dba frequently held responsible changes database definition cause loss service production system—as result many dbas prefer contain design changes application code design defects far less likely catastrophic consequences organizations non-dysfunctional relationship dbas developers though issue present decision change database schema would driven business needs new requirement persist additional data performance boost critical application would trigger schema modification example key philosophical differences oo relational models summarized follows result object-relational impedance mismatch often argued partisans sides debate technology ought abandoned reduced scope database advocates view traditional procedural languages compatible rdbms many oo languages suggest less oo style ought used particular argued long-lived domain objects application code ought exist objects exist created query made disposed transaction task complete conversely oo advocates argue oo-friendly persistence mechanisms oodbms ought developed used relational technology ought phased many programmers dbas hold neither viewpoints view object-relational impedance mismatch mere fact life information technology deal also argued o/r mapping paying situations probably oversold advantages besides drawbacks skeptics point worth think carefully using add little value cases | [
3712,
261,
8201,
9112,
6822,
10413,
11574,
3004,
8262,
9286,
6860,
2901,
6235,
4065,
4066,
9828,
1382,
10471,
1146,
9467,
2556
] | Test |
11,328 | 9 | John_G._Kemeny:john g. kemeny john george kemeny born kemény jános györgy may 31 1926 – december 26 1992 hungarian-born american mathematician computer scientist educator best known co-developing basic programming language 1964 thomas e. kurtz kemeny served 13th president dartmouth college 1970 1981 pioneered use computers college education kemeny chaired presidential commission investigated three mile island accident 1979 according györgy marx one martians born budapest hungary jewish family kemeny attended rácz private primary school budapest classmate nandor balazs 1938 father left united states alone 1940 took whole kemeny family united states adoption second anti-jewish law hungary became imminent grandfather however refused leave perished holocaust along aunt uncle kemeny family settled new york city attended george washington high school graduated best results class three years later 1943 kemeny entered princeton university studied mathematics philosophy took year studies work manhattan project los alamos national laboratory boss richard feynman also worked john von neumann returning princeton kemeny graduated ba 1947 worked doctorate alonzo church also princeton worked albert einstein mathematical assistant graduate school 23 years old kemeny awarded doctorate 1949 dissertation entitled type-theory vs set-theory kemeny appointed dartmouth mathematics department full professor 1953 age 27 two years later became chairman department held post 1967 kemeny ventured curriculum development introduced finite mathematics courses teamed gerald l. thompson j. laurie snell write introduction finite mathematics 1957 students biology social sciences dartmouth mathematics department professors also wrote finite mathematical structures 1959 finite mathematics business applications 1962 colleges universities followed lead several textbooks finite mathematics composed elsewhere topic markov chains particularly popular kemeny teamed j. laurie snell publish finite markov chains 1960 provide introductory college textbook considering advances using potential theory obtained g. hunt wrote denumerable markov chains 1966 textbook suitable advanced seminars followed second edition 1976 additional chapter random fields david griffeath included kemeny kurtz pioneered use computers ordinary people early experiments lgp-30 invented basic programming language 1964 well one world first time-sharing systems dartmouth time-sharing system dtss 1974 american federation information processing societies gave award kemeny kurtz national computer conference work basic time-sharing kemeny president dartmouth 1970 1981 continued teach undergraduate courses research publish papers time president presided coeducation dartmouth 1972 also instituted dartmouth plan year-round operations thereby allowing students without buildings administration dartmouth became proactive recruiting retaining minority students revived founding commitment provide education american indians kemeny made dartmouth pioneer student use computers equating computer literacy reading literacy 1982 returned teaching full-time 1983 kemeny kurtz co-founded company called true basic inc. market true basic updated version language john kemeny died age 66 result heart failure lebanon new hampshire december 26 1992 lived etna near dartmouth campus | [
11075,
5317,
9644,
1783,
8057,
11229
] | None |
11,329 | 4 | Extensible_Configuration_Checklist_Description_Format:extensible configuration checklist description format extensible configuration checklist description format xccdf xml format specifying security checklists benchmarks configuration documentation xccdf development pursued nist nsa mitre corporation us department homeland security xccdf intended serve replacement security hardening analysis documentation written prose xccdf used security content automation protocol | [
635,
479
] | None |
11,330 | 4 | Anomaly_detection:anomaly detection data mining anomaly detection also outlier detection identification rare items events observations raise suspicions differing significantly majority data typically anomalous items translate kind problem bank fraud structural defect medical problems errors text anomalies also referred outliers novelties noise deviations exceptions particular context abuse network intrusion detection interesting objects often rare objects unexpected bursts activity pattern adhere common statistical definition outlier rare object many outlier detection methods particular unsupervised methods fail data unless aggregated appropriately instead cluster analysis algorithm may able detect micro clusters formed patterns three broad categories anomaly detection techniques exist unsupervised anomaly detection techniques detect anomalies unlabeled test data set assumption majority instances data set normal looking instances seem fit least remainder data set supervised anomaly detection techniques require data set labeled normal abnormal involves training classifier key difference many statistical classification problems inherent unbalanced nature outlier detection semi-supervised anomaly detection techniques construct model representing normal behavior given normal training data set test likelihood test instance generated learnt model anomaly detection applicable variety domains intrusion detection fraud detection fault detection system health monitoring event detection sensor networks detecting ecosystem disturbances often used preprocessing remove anomalous data dataset supervised learning removing anomalous data dataset often results statistically significant increase accuracy several anomaly detection techniques proposed literature popular techniques performance different methods depends lot data set parameters methods little systematic advantages another compared across many data sets parameters anomaly detection proposed intrusion detection systems ids dorothy denning 1986 anomaly detection ids normally accomplished thresholds statistics also done soft computing inductive learning types statistics proposed 1999 included profiles users workstations networks remote hosts groups users programs based frequencies means variances covariances standard deviations counterpart anomaly detection intrusion detection misuse detection | [
6274,
3555,
9319,
1640,
8747,
4468,
7348,
7577,
7322,
5245
] | None |
11,331 | 3 | Socket_F:socket f socket f cpu socket designed amd opteron line cpus released august 15 2006 2010 socket f replaced socket c32 entry-level servers socket g34 high-end servers socket 1207 pins 1.1mm pitch employs land grid array contact mechanism socket f primarily use amd server line considered socket generation socket am2 used athlon 64 athlon 64 x2 well socket s1 used turion 64 turion 64 x2 microprocessors socket f base amd quad fx platform referred 4x4 quadfather prior release unveiled amd november 30 2006 modified version socket f named socket 1207 fx amd socket l1 nvidia allows dual-socket dual-core four effective cores eight effective cores future processors desktop pcs home enthusiasts revisions except socket fr3 require usage registered ddr2 sdram revisions except socket fr1 require dual-plane power-supply circuit cpu | [
3586,
8322,
3588,
8452,
9475,
3464,
4872,
7058,
10260,
4767,
2463,
7712,
9122,
1322,
11183,
1329,
3892,
8629,
9400,
6978,
9157,
3783,
7247,
9551,
7122,
9427,
7132,
2525,
4451,
5859,
1260,
7788,
7151,
1776,
1137,
1651
] | None |
11,332 | 5 | External_Data_Representation:external data representation external data representation xdr standard data serialization format uses computer network protocols allows data transferred different kinds computer systems converting local representation xdr called encoding converting xdr local representation called decoding xdr implemented software library functions portable different operating systems also independent transport layer xdr uses base unit 4 bytes serialized big-endian order smaller data types still occupy four bytes encoding variable-length types string opaque padded total divisible four bytes floating-point numbers represented ieee 754 format xdr developed mid 1980s sun microsystems first widely published 1987 xdr became ietf standard 1995 xdr data format use many systems including xdr standard exists three different versions following rfcs | [
6403,
9860,
9987,
1030,
3847,
9992,
6544,
1297,
3218,
8211,
11413,
5270,
6681,
5402,
5531,
6555,
5021,
3742,
2206,
5405,
9343,
10271,
1955,
10274,
9381,
10924,
9389,
7983,
562,
2995,
1076,
2996,
7478,
9909,
7865,
3133,
3006,
4543,
4797,
5... | Test |
11,333 | 3 | Synopsys:synopsys synopsys american eda company majority products include tools used design application-specific integrated circuit products include logic synthesis behavioral synthesis place route static timing analysis formal verification hardware description language systemc systemverilog/verilog vhdl simulators well transistor-level circuit simulation simulators include development debugging environments assist design logic chips computer systems recent years synopsys also expanded application security market founded 1986 aart j. de geus engineers general electric microelectronics center research triangle park north carolina synopsys first established optimal solutions charter develop market synthesis technology developed team general electric section lists various acquisitions synopsys made 1994-present synopsys three primary areas business including silicon design verification silicon intellectual property software integrity order preserve full history acquisitions included history across three business units coware part synopsys supplier platform-driven electronic system-level esl design software services coware headquartered san jose california offices around world major r offices belgium germany india coware development initiated interuniversity microelectronics centre imec belgium internal project 1992 1996 coware spun independent company coware one founding member systemc language 2005 coware acquired signal processing department cadence february 8 2010 synopsys announced acquisition coware products included platform architect model designer model library processor designer signal processing designer virtual platform designer novas software often referred novas company founded 1996 dr. paul huang address ongoing problem debugging chip designs novas purchased taiwan-based eda company springsoft may 2008 prior purchase novas partly owned springsoft developed underlying debug technology 2008 novas grew employ 50 people office locations across world headquartered san jose california springsoft novas acquired synopsys 2012 novas offered debugging visibility enhancement products cut verification time novas main product offerings included debussy debug system verdi automated debug system siloti family visibility enhancement products 2006 study found novas software sixth most-used eda vendor along novas software topped user satisfaction ratings 100 respondents europe 83 north america 69 asia saying either somewhat satisfied distinction also awarded novas software four years prior 2006 numerical technologies inc. san jose california united states based eda public nasdaq nmtc company company primarily known ip portfolio software tools services covering alternating phase shift mask alt-psm technology providing sub-wavelength design manufacturing solutions january 10 2000 numerical technologies acquired transcription enterprises inc. primarily known cats software mask data preparation october 27 2000 numerical technologies acquired cadabra design automation inc. cadabra provider automated ic layout cell creation technology used create building blocks standard cell semi-custom custom integrated circuits purchase price 99 million march 3 2003 acquired synopsys springsoft software company developed vlsi design debugging software company founded grant taiwanese national science council february 1996 1997 springsoft established novas software silicon valley market springsoft vlsi debugging software springsoft created custom layout tool called laker us-based company called silicon canvas may 2008 springsoft purchased novas software silicon canvas combined form wholly owned subsidiary springsoft usa springsoft employed 400 people office locations across world synopsys announced acquisition springsoft 2012 synplicity inc. supplier software solutions design programmable logic devices fpgas plds cplds used communications military/aerospace consumer semiconductor computer electronic systems synplicity tools provided logic synthesis physical synthesis verification functions fpga fpga-based asic prototyping dsp designers synplicity listed nasdaq acquired synopsys 227 million transaction finalized may 15 2008 synplicity founded ken mcelvain chief technical officer alisa yaffa former ceo arc international plc designer arc argonaut risc core embedded processors widely used soc devices iot storage digital home mobile automotive applications arc processors licensed 200 companies shipped 1.5 billion products per year arc international acquired synopsys 2010 roots arc international date back early 1990s company founded jez san build upon 3d accelerator technology previously developed super nintendo entertainment system division argonaut software forerunner arc originally called mario mathematical argonaut rotation i/o chip later dubbed super fx went sell millions time outselling arm risc core following success super fx designers split main company subsidiary called argonaut technology ltd atl design renamed arc marketed general-purpose configurable microprocessor later atl spun separate company arc international 1995 bob terwilliger took arc first ceo created company licensing strategy commercialized product including acquisition metaware vautomation precise software raised 50 million pre-ipo took company public september 2000 raising additional 250 million list notable events following synopsys announced acquisition virage logic june 10 2010 research development clarified networks tools began 2002 continued four years oulu university secure programming group ouspg clarified networks spun research group 2006 company entered venture cup competition year one finalists 2007 founders clarified networks also awarded vmware applicance called hownetworks 2011 company acquired codenomicon 2015 synopsys announced acquisition codenomicon coverity provider software development tools coverity tools operated via static dynamic software analysis capable finding defects related security stability testing february 2014 coverity announced agreement acquired synopsys 350 million net cash hand november 2016 synopsys acquired cigital software security firm specializes source-code static analysis penetration testing november 2017 synopsys acquired black duck software software firm based burlington focuses software composition analysis black duck hub solution scans source binary code open source libraries components providing visibility license security risks may impact organizations major way across three core business areas synopsys products services ranging silicon software coverity static application security testing sast finds fixes security quality issues code–fast black duck software composition analysis secures manages open source development deployment accurate automated security testing web applications defensics comprehensive versatile automated black box fuzzer enables organizations efficiently effectively discover remediate security weaknesses software reduce risk breach identifying exploiting business-critical vulnerabilities on-demand security testing expertise managed services include dynamic application security testing penetration testing static application security testing mobile application security testing managed network security testing accelerate application security program help experts professional services include strategy planning bsimm architecture design red teaming insider threat detection embedded software testing secure coding guidelines thick client testing application security testing services on-demand expertise help quickly identify open source legal security quality risks software audit services include open source audits application security audits code quality audits merger acquisition audits product formerly known black duck ondemand black duck audit services | [
4742,
4743,
9863,
7820,
9356,
528,
9371,
5404,
8865,
4773,
939,
3117,
3886,
3887,
2224,
3762,
6834,
2490,
6716,
8508,
9665,
3911,
7367,
3323,
2262,
3159,
10070,
8921,
8668,
7645,
6495,
11487,
9569,
10083,
5861,
5355,
9964,
11125,
1400,
58... | None |
11,334 | 4 | Anti-Subversion_Software:anti-subversion software software subversion process making software perform unintended actions either tampering program code altering behavior another fashion example code tampering could used change program code load malicious rules heuristics sql injection form subversion purpose data corruption theft buffer overflows form subversion purpose unauthorised access attacks examples computer hacking anti-subversion software detects subversion attempts stop effects hack software applications vulnerable effects subversion throughout lifecycle development deployment particularly operation maintenance anti-subversion protection accomplished static dynamic manner software applications running desktops corporate servers mobile devices embedded devices risk subversion | [
1474,
899
] | None |
11,335 | 4 | William_O._Studeman:william o. studeman william oliver bill studeman born january 16 1940 retired admiral united states navy former deputy director central intelligence agency two extended periods acting director central intelligence deputy director central intelligence served administrations george h. w. bush bill clinton three directors central intelligence robert gates r. james woolsey jr. john m. deutch studeman retired navy 1995 almost 35 years service 1988 1992 director national security agency director naval intelligence september 1985 july 1988 6 february 2004 studeman appointed iraq intelligence commission independent panel tasked investigating u.s. intelligence surrounding united states 2003 invasion iraq iraq weapons mass destruction wmd studeman retired 2005 northrop grumman corporation vice president deputy general manager mission systems position focused strategies programs business development marketing related intelligence information warfare well corporate cross-sector integration managing technology partnerships concepts related netcentricity isr io/iw advanced command environments served position approximately 9 years studeman served corporate boards government university corporate advisory boards recently commissioner presidential commission wmd currently serving national advisory board bio-security public interest declassification board also member defense science board well national geospatial-intelligence agency advisory board defense intelligence agency joint military intelligence college national reconnaissance office national labs advisory boards chairman board naval intelligence foundations member board national cryptologic museum foundation 1962 received bachelor degree history university south sewanee tennessee studeman holds master degree public international affairs george washington university elliott school international affairs navy also distinguished graduate naval war college national war college well recipient honorary doctorate strategic intelligence defense intelligence college receive second honorary doctorate degree fall university south studeman recipient numerous service commendations citations including navy distinguished service medal legion merit two gold stars 2007 studeman awarded william oliver baker award intelligence national security alliance also received service medals governments france brazil south korea | [
6017,
8726,
1189,
9517,
1838,
5308,
1986,
327,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
7145,
2419,
6005,
6136,
766
] | Test |
11,336 | 4 | HYPR_Corp:hypr corp hypr corp venture-backed new york based company founded 2014 provides enterprises decentralized authentication technology accessing mobile web internet things iot applications hypr corp founded 2014 new york city team security researchers 800,000 private seed capital concluding 3 million growth funding round october 2016 ventures 10 million series funding round september 2017. company ’ decentralized authentication product unveiled international consumer electronics show ces january 2015 las vegas listed one top 10 best technologies ces 2015 zdnet company board member fast identity online fido alliance consortium global enterprises working towards open standards strong authentication 2017 gartner named firm cool vendor transforming multichannel unified retail commerce 2018 ceo co-founder george avetisov named forbes 30 30 list enterprise technology category hypr provides decentralized biometric tokenization scheme claims gives enterprises option replace use centralized password-based systems firm says forcing malicious attackers divert attention centralized validation server many client-side devices biometric tokenization decreases viability attack client-server authentication channel rendering common large-scale server-side data breach unscalable attack vector | [
1945,
5918
] | Test |
11,337 | 2 | Palm_Pre_2:palm pre 2 palm pre 2 styled palm prē 2 slider smartphone designed marketed palm inc. hewlett-packard multi-touch screen physical sliding keyboard smartphone third use palm linux-based mobile operating system webos releasing version 2.0 pre 2 functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in palm pre 2 announced october 19 2010 initial launch date october 22 2010 french carrier sfr also announced pre 2 would coming united states carrier verizon wireless rogers wireless canada also unlocked umts developer phone additions include flat gorilla glass screen instead curved plastic predecessors surrounded plastic trim faster processor upgraded camera plastic door covered microusb port previous iterations considered flimsy removed otherwise pre 2 size design predecessors pre 2 last mobile phone branded palm name pre 3 veer touchpad branded hp devices august 11 2010 webos developer geoff gauchet discovered unknown device code name roadrunner accessing foursquare app using new version webos version 2.0 october 12 2010 several specifications pre 2 including processor speed memory leaked france sfr website prior official launch october 22 november 18 2010 pre 2 became available u.s. unlocked developer device december 20 2010 pre 2 launched canada rogers wireless february 17 2011 pre 2 launched u.s. verizon wireless pre 2 first phone use version 2.0 hp palm webos last version available pre 2 version 2.2.4 subject carrier approval certain models however | [
1537,
3585,
2308,
10500,
6790,
5384,
3340,
1682,
2962,
405,
3606,
8982,
10393,
5019,
6178,
5164,
9266,
9013,
694,
823,
1849,
1083,
1728,
7492,
10820,
5318,
9163,
9037,
2258,
2259,
1621,
6618,
5339,
2784,
1377,
4449,
4832,
3300,
2285,
9581... | Test |
11,338 | 1 | Storm_(software):storm software storm python programming library object-relational mapping one sql databases python objects allows python developers formulate complex queries spanning multiple database tables support dynamic storage retrieval object information mysql postgresql sqlite database support built storm api allows support others storm also supports django zope web frameworks natively twisted support planned .20 release storm developed canonical ltd. python use launchpad landscape applications subsequently released 2007 free software project free software released gnu lesser general public license contributors required assign copyrights canonical version control done bazaar issue tracking launchpad | [
9729,
3080,
5546,
8554,
5612,
10250,
7022,
7983,
9467,
10413,
8539,
595,
2804,
3763,
5755
] | Validation |
11,339 | 8 | Event-driven_SOA:event-driven soa event-driven soa form service-oriented architecture soa combining intelligence proactiveness event-driven architecture organizational capabilities found service offerings event-driven soa typical soa platform orchestrated services centrally pre-defined business processes assuming already triggered defined business process older approach sometimes called soa 1.0 account events occur across outside specific business processes thus complex events pattern activities—both non-scheduled scheduled—should trigger set services accounted traditional soa 1.0 architecture soa 2.0 architecture event-driven soa lets business users monitor analyze enrich events make connections among disparate events first appear intuitively obvious makes enriched events visible others especially business analysts marketing directors also allows soa 2.0 system possibly automate actions take address unique pattern soa 2.0 ability create high-level business events numerous low-level system events events created filtering real-time data middleware applications databases web services example infusing defining detail dependencies causal relationships discovered correlating events clear enriched events produced soa 2.0 environment customer shopping cart abandonment rate escalated last days notification marketing department could initiate research competitors done cause customers buy products elsewhere common product shopping carts prices offered competition practice relationship streamed events processed causal vector engine performs lookup based recently viewed events assigns causal vector event relationship discovered causes b causal vector engine checks b ’ causal vector rule index contains reference engine may handle events different transactions simultaneously perhaps different order occurred unlike sequential procedural systems clients must poll change requests event-driven soa allows systems components respond dynamically real time events occur soa 2.0 complements extends soa 1.0 introducing long-running processing capabilities long running processing capability enables architecture collect various asynchronous events long period time correlate events causal relationships soa 2.0 event patterns designed implemented look event relationships span days weeks months certain criteria met trigger business process address event pattern soa 2.0 event-driven programming structured around concept decoupled relationships event producers event consumers event consumer n't care event occurs rather concerned invoked event occurred systems applications separate event producers event consumers typically rely event dispatcher channel channel contains event queue acts intermediary event producers event handlers prototypical soa 2.0 paradigm contains four essential elements soa 2.0 web services composed two ways orchestration choreography orchestration central process takes control involved web services coordinates execution different operations web services involved operation involved soa 2.0 services know need know part composition higher business process central coordinator orchestration knows orchestration centralized explicit definitions operations order invocation soa 2.0 services choreography hand rely central coordinator rather soa 2.0 service involved choreography knows exactly execute operations based defined trigger criteria interact choreography collaborative effort focused exchange messages participants choreography need aware business process operations execute messages exchange timing message exchanges bpel follows orchestration paradigm choreography covered standards wsci web services choreography interface ws-cdl web services choreography description language causal relationships inherent world around us intrinsic decision making human intelligence processes gathers relationships faster current artificial computational capability one fundamental obstacles artificial intelligence absence automated ability relate events together human uses human intuition using causal vector engine perception causality enhanced appropriate spatiotemporal conditions based structural temporal rules written engine perception complex causal semantics additive mediated bidirectional causalities need coded engine distinguish events related appear related fact engine uses preponderant causal vector rate-of-change propagation code relationship among events establishes partial order validates causality perceived multiple occurrences engine plays replays event sequence different temporal order infer could related topological connections compares replays rules preprogrammed analyst multiple low-level system events processed causal vector engine compared rules trigger higher-level business events causality vector engine cve console application displays events real-time business analysts streams events observed occur much like stock ticker cve console app several windows list events different contexts business analysts see cve relationships sequential window shows events date-timestamp order one windows various orders cve works list rules creates implied relationships events various buttons controls exist console application enable business analysts create relationships events on-the-fly define rules respond relationships business analysts infuse additional defining detail sql query statement attached rule event context cve app works much like modern-day stock trading application mutual funds managers use manage risk example cve application engine seen silk enterprise service bus esb implementations contain facility called mediation example mediation flows part websphere enterprise service bus intercept mule also supports mediation flows mediation flows modify messages passed existing services clients use services mediation flow mediates intervenes provide functions message logging data transformation routing typically functions implemented using interception design pattern messages pass esb esb enriches messages destined channel monitoring high-level business event message esb may query database obtain additional information data entity within message example based customer id esb mediation flow could get zip code customer resides based ip address originating request end-user esb mediation flow could lookup country state county ip address examples represent data enrichment concept adding additional value existing data based intent high-level business event eventually triggered esb mediation flow one component types service component architecture sca like sca component program accesses mediation flow exports provides mediation flow forwards messages external services via imports special kinds imports exports jms called jms bindings enable developers specify binding configuration write data handling code mediation flow consists series mediation primitives manipulate messages flow bus developers coded custom binding export import start focus mediation flow component websphere integration developer assembly editor done jms custom binding mediation component operation flow component interface represented request response service data objects sdo framework provides unified framework data application development sdo developers need familiar specific api order access utilize data sdo developers simply work data multiple data sources relational databases entity ejb components xml pages web services service component architecture javaserver pages pages mediation flows entirely independent bindings used imports exports fact purpose conversion sdo dataobject instance outside flow implementation mediation flows built without knowledge protocol format messages sent mediation module business-level trigger condition enables soa 2.0 architecture establish real-time customer intelligence marketing automation customer loyalty solutions among features business objects model real-world entities architecture customers accounts loans travel itineraries state one objects changes monitoring agent notices change significant compared list criteria monitor event created passed monitoring agents example detection actual business problem opportunity could lead increased revenue customer cancels order extra manufacturing capacity could reduce profitability production run soa 2.0 event could notify marketing department create special sales campaign would resell excess capacity thereby recapturing original profitable cost-per-unit automatic monitoring events operational business process activities processes execute see immediate action needs taken either inside outside enterprise monitoring agents continually test specific business conditions changes business operations necessary agents alert people make recommendations send messages applications invoke whole business processes conditions changes occur triggered business process directly support revenue growth cost containment responsiveness business conditions ability pursue new market opportunities resulting business processes could also measure operational progress toward achieving goals control operational costs communicating needed needs know report performance status key processes key decision makers example could construct crm event abandoned shopping cart message parsing transaction customer id time using filters extract value goods cart tapping correlation capabilities system add causal indicators whether commerce site suffering performance problems crm event might also include customer value rank customer database another example based types independent service calls received soa 2.0 platform could identify product defect detecting underlying pattern separate complaints triggering alert engineering production possible defect example 3 potential use event-driven soa could virtual electricity market home clothes dryers bid price electricity use real-time market pricing system real-time market price control system could turn home electricity customers active participants managing power grid monthly utility bills customers set limits much would pay electricity run clothes dryer example electricity providers willing transmit power price would alerted grid could sell electricity dryer one side consumer devices bid power based much owner device willing pay set ahead time consumer side suppliers enter bids automatically electricity generators based much would cost start run generators electricity suppliers could perform real-time market analysis determine return-on-investment optimizing profitability reducing end-user cost goods event-driven soa software could allow homeowners customize many different types electricity devices found within home desired level comfort economy event-driven software could also automatically respond changing electricity prices little five-minute intervals example reduce home owner electricity usage peak periods electricity expensive software could automatically lower target temperature thermostat central heating system winter raise target temperature thermostat central cooling system summer event-driven soa software could shut heating element water heaters pre-set response limits established individual homeowners example market price electricity given hour exceeded home owner limit home owner could plan go without recharging water hot temperature hour prices high opt delay hot water temperature recharge next hour electricity market prices might lower criteria would managed home owner personal computer internet connection programming various devices around home consume electricity management software approves consumption savings represented technique enabled event-driven soa like improving gas mileage vehicle makes home energy use efficient enabling consumption electricity real-time prices lower inhibiting consumption electricity real-time prices higher one mechanism used soa 1.0 enterprise service bus implementations publish/subscribe facility implementing esb functionality pub/sub messages advanced knowledge system events needed create soa 2.0 message patterns enterprise implemented many publish functions soa middleware analysts set task strategizing available publish messages could assembled unique pattern detect soa 2.0-enriched trigger causal vector engine cve mechanics implemented simply expandable view sql constructs written stored procedures causes b causality must occur within n number transactions sql order timestamp clause creates result set increments counter transactions occurred within timeframe n number matching b occurrence transactions creation additional stored procedures accomplished cve console application using standard database developer toolkit domain algorithms fever/flu/infection domain logic cited reference used derive sql code applies selected business rules use case using cves soa environments improve business agility application soa 2.0 principles identify business opportunities would otherwise missed identified much later functional magnetic resonance imaging fmri using granger causality analysis gca detects causal effects among brain regions results one sample test demonstrated positive causal effect rfic dorsal anterior cingulate cortex dacc oracle cve analytical engine uses set theoretical models evaluates data business analyst configures causal factors he/she specifies criteria indicating models consider causal factor | [
9345,
4483,
9225,
4107,
5403,
8096,
10413,
8751,
11457,
2501,
3529,
10061,
6483,
5460,
8149,
7775,
10849,
3558,
2283,
10617,
511
] | Test |
11,340 | 8 | Acadine_Technologies:acadine technologies acadine technologies holdings limited systems software company specializing mobile operating systems mobile wearable internet things iot devices core product h5os web-centric operating system primarily based open web standard html5 derived firefox os whose development company founder li gong overseen president mozilla corporation acadine technologies founded march 25 2015 based hong kong operations beijing taipei palo alto london initially started name gone fishing startup recruited various staff mozilla apart gong including james ho former mozilla cto andreas gal employees mozilla taiwan mozilla announced december 2015 would cease efforts partner mobile carriers use firefox os smartphones reported acadine would take mission h5os released first version h5os 17th feb 2016 announced july 15 2015 acadine technologies received 100m first-round funding tsinghua unigroup international hong kong entity controlled tsinghua university chinese government year li gong stated company already seeking second round funding international investors main rationale dispel early incorrect perception somehow china-backed company really pure silicon valley-style startup april 27 2016 reported funds tsinghua unigroup transferred acadine started reorganization h5os discontinued may 2016 never publicly released | [
2428
] | Test |
11,341 | 4 | Warflying:warflying warflying warstorming activity consisting using airplane wi-fi-equipped computer laptop pda detect wi-fi wireless networks warstorming shares similarities wardriving warwalking aspects except method transport originated western australia wafreenet wafn group taking grumman tiger four-seater near perth city 2002 documented weblog jason jordan due nature flying much difficult attempt access open networks warflying | [
6712,
7222
] | None |
11,342 | 2 | Omega_Drivers:omega drivers omega drivers unofficial third-party device drivers ati nvidia graphics cards created angel trinidad differed official drivers offer customization extra features compatible ati graphics cards nvidia cards use detonator drivers drivers tweaked versions officially released ati nvidia mainly using registry tweaks offering alternative installer custom drivers compiled source code website omega ati driver based ati catalyst drivers driver particularly notable resolving 3d compatibility problems affecting past versions ati drivers versions 7.8-7.12 agp cards driver includes various third party utilities including 'multires entech taiwan ati tray tools tweaking utility drivers recognized ati best alternative drivers internet according terry makedon nvidia previously attempted legal action versions omega drivers company since allowed omega drivers nvidia cards made recently amd began offering upgraded driver known catalyst omega driver amd claims change brand due significant feature additions mentioned existence omega drivers omega drivers noted affiliated amd-distributed catalyst omega driver | [] | Test |
11,343 | 7 | MapReduce:mapreduce mapreduce programming model associated implementation processing generating big data sets parallel distributed algorithm cluster mapreduce program composed map procedure method performs filtering sorting sorting students first name queues one queue name reduce method performs summary operation counting number students queue yielding name frequencies mapreduce system also called infrastructure framework orchestrates processing marshalling distributed servers running various tasks parallel managing communications data transfers various parts system providing redundancy fault tolerance model specialization split-apply-combine strategy data analysis inspired map reduce functions commonly used functional programming although purpose mapreduce framework original forms key contributions mapreduce framework actual map reduce functions example resemble 1995 message passing interface standard reduce scatter operations scalability fault-tolerance achieved variety applications optimizing execution engine single-threaded implementation mapreduce usually faster traditional non-mapreduce implementation gains usually seen multi-threaded implementations multi-processor hardware use model beneficial optimized distributed shuffle operation reduces network communication cost fault tolerance features mapreduce framework come play optimizing communication cost essential good mapreduce algorithm mapreduce libraries written many programming languages different levels optimization popular open-source implementation support distributed shuffles part apache hadoop name mapreduce originally referred proprietary google technology since genericized 2014 google longer using mapreduce primary big data processing model development apache mahout moved capable less disk-oriented mechanisms incorporated full map reduce capabilities mapreduce framework processing parallelizable problems across large datasets using large number computers nodes collectively referred cluster nodes local network use similar hardware grid nodes shared across geographically administratively distributed systems use heterogeneous hardware processing occur data stored either filesystem unstructured database structured mapreduce take advantage locality data processing near place stored order minimize communication overhead mapreduce framework system usually composed three operations steps mapreduce allows distributed processing map reduction operations maps performed parallel provided mapping operation independent others practice limited number independent data sources and/or number cpus near source similarly set 'reducers perform reduction phase provided outputs map operation share key presented reducer time reduction function associative process often appears inefficient compared algorithms sequential multiple instances reduction process must run mapreduce applied significantly larger datasets single commodity server handle – large server farm use mapreduce sort petabyte data hours parallelism also offers possibility recovering partial failure servers storage operation one mapper reducer fails work rescheduled – assuming input data still available another way look mapreduce 5-step parallel distributed computation five steps logically thought running sequence – step starts previous step completed – although practice interleaved long final result affected many situations input data might already distributed sharded among many different servers case step 1 could sometimes greatly simplified assigning map servers would process locally present input data similarly step 3 could sometimes sped assigning reduce processors close possible map-generated data need process map reduce functions mapreduce defined respect data structured key value pairs map takes one pair data type one data domain returns list pairs different domain codice_3 → codice_4 map function applied parallel every pair keyed codice_5 input dataset produces list pairs keyed codice_6 call mapreduce framework collects pairs key codice_6 lists groups together creating one group key reduce function applied parallel group turn produces collection values domain codice_8 → codice_9 reduce call typically produces either one value v3 empty return though one call allowed return one value returns calls collected desired result list thus mapreduce framework transforms list key value pairs list values behavior different typical functional programming map reduce combination accepts list arbitrary values returns one single value combines values returned map necessary sufficient implementations map reduce abstractions order implement mapreduce distributed implementations mapreduce require means connecting processes performing map reduce phases may distributed file system options possible direct streaming mappers reducers mapping processors serve results reducers query canonical mapreduce example counts appearance word set documents document split words word counted map function using word result key framework puts together pairs key feeds call reduce thus function needs sum input values find total appearances word another example imagine database 1.1 billion people one would like compute average number social contacts person according age sql query could expressed using mapreduce k1 key values could integers 1 1100 representing batch 1 million records k2 key value could person age years computation could achieved using following functions mapreduce system would line 1100 map processors would provide corresponding 1 million input records map step would produce 1.1 billion n,1 records values ranging say 8 103 mapreduce system would line 96 reduce processors performing shuffling operation key/value pairs due fact need average per age provide millions corresponding input records reduce step would result much reduced set 96 output records would put final result file sorted count info record important processing reduced one time add count records computed average would wrong example reduce files 1 2 new file average 9 contacts 10-year-old person 9+9+9+9+9 /5 reduce file 3 lose count many records 've already seen end average 9.5 contacts 10-year-old person 9+10 /2 wrong correct answer 9.166 55 6 9*3+9*2+10*1 3+2+1 software framework architecture adheres open-closed principle code effectively divided unmodifiable frozen spots extensible hot spots frozen spot mapreduce framework large distributed sort hot spots application defines input reader divides input appropriate size 'splits practice typically 64 mb 128 mb framework assigns one split map function input reader reads data stable storage typically distributed file system generates key/value pairs common example read directory full text files return line record map function takes series key/value pairs processes generates zero output key/value pairs input output types map often different application word count map function would break line words output key/value pair word output pair would contain word key number instances word line value map function output allocated particular reducer application partition function sharding purposes partition function given key number reducers returns index desired reducer typical default hash key use hash value modulo number reducers important pick partition function gives approximately uniform distribution data per shard load-balancing purposes otherwise mapreduce operation held waiting slow reducers finish i.e reducers assigned larger shares non-uniformly partitioned data map reduce stages data shuffled parallel-sorted exchanged nodes order move data map node produced shard reduced shuffle sometimes take longer computation time depending network bandwidth cpu speeds data produced time taken map reduce computations input reduce pulled machine map ran sorted using application comparison function framework calls application reduce function unique key sorted order reduce iterate values associated key produce zero outputs word count example reduce function takes input values sums generates single output word final sum output writer writes output reduce stable storage mapreduce programs guaranteed fast main benefit programming model exploit optimized shuffle operation platform write map reduce parts program practice author mapreduce program however take shuffle step consideration particular partition function amount data written map function large impact performance scalability additional modules combiner function help reduce amount data written disk transmitted network mapreduce applications achieve sub-linear speedups specific circumstances designing mapreduce algorithm author needs choose good tradeoff computation communication costs communication cost often dominates computation cost many mapreduce implementations designed write communication distributed storage crash recovery tuning performance mapreduce complexity mapping shuffle sorting grouping key reducing taken account amount data produced mappers key parameter shifts bulk computation cost mapping reducing reducing includes sorting grouping keys nonlinear complexity hence small partition sizes reduce sorting time trade-off large number reducers may impractical influence split unit size marginal unless chosen particularly badly say 1mb gains mappers reading load local disks average minor processes complete quickly data fits main memory single machine small cluster using mapreduce framework usually effective since frameworks designed recover loss whole nodes computation write interim results distributed storage crash recovery expensive pays computation involves many computers long runtime computation task completes seconds restarted case error likelihood least one machine failing grows quickly cluster size problems implementations keeping data memory simply restarting computation node failures —when data small enough— non-distributed solutions often faster mapreduce system mapreduce achieves reliability parceling number operations set data node network node expected report back periodically completed work status updates node falls silent longer interval master node similar master server google file system records node dead sends node assigned work nodes individual operations use atomic operations naming file outputs check ensure parallel conflicting threads running files renamed possible also copy another name addition name task allowing side-effects reduce operations operate much way inferior properties regard parallel operations master node attempts schedule reduce operations node rack node holding data operated property desirable conserves bandwidth across backbone network datacenter implementations necessarily highly reliable example older versions hadoop namenode single point failure distributed filesystem later versions hadoop high availability active/passive failover namenode mapreduce useful wide range applications including distributed pattern-based searching distributed sorting web link-graph reversal singular value decomposition web access log stats inverted index construction document clustering machine learning statistical machine translation moreover mapreduce model adapted several computing environments like multi-core many-core systems desktop grids multi-cluster volunteer computing environments dynamic cloud environments mobile environments high-performance computing environments google mapreduce used completely regenerate google index world wide web replaced old ad hoc programs updated index ran various analyses development google since moved technologies percolator flumejava millwheel offer streaming operation updates instead batch processing allow integrating live search results without rebuilding complete index mapreduce stable inputs outputs usually stored distributed file system transient data usually stored local disk fetched remotely reducers david dewitt michael stonebraker computer scientists specializing parallel databases shared-nothing architectures critical breadth problems mapreduce used called interface low-level questioned whether really represents paradigm shift proponents claimed challenged mapreduce proponents claims novelty citing teradata example prior art existed two decades also compared mapreduce programmers codasyl programmers noting writing low-level language performing low-level record manipulation mapreduce use input files lack schema support prevents performance improvements enabled common database system features b-trees hash partitioning though projects pig piglatin sawzall apache hive ysmart hbase bigtable addressing problems greg jorgensen wrote article rejecting views jorgensen asserts dewitt stonebraker entire analysis groundless mapreduce never designed intended used database dewitt stonebraker subsequently published detailed benchmark study 2009 comparing performance hadoop mapreduce rdbms approaches several specific problems concluded relational databases offer real advantages many kinds data use especially complex processing data used across enterprise mapreduce may easier users adopt simple one-time processing tasks mapreduce programming paradigm also described danny hillis 1985 thesis widely-used time program connection machine special hardware support accelerate map reduce google granted patent mapreduce however claims patent granted mapreduce similar existing products example map reduce functionality easily implemented oracle pl/sql database oriented language supported developers transparently distributed database architectures clusterpoint xml database mongodb nosql database mapreduce tasks must written acyclic dataflow programs i.e stateless mapper followed stateless reducer executed batch job scheduler paradigm makes repeated querying datasets difficult imposes limitations felt fields machine learning iterative algorithms revisit single working set multiple times norm | [
4096,
7175,
9225,
8719,
3600,
19,
7700,
8217,
9244,
10284,
3633,
1078,
9782,
9285,
4683,
590,
3664,
9300,
8285,
8799,
2658,
8810,
619,
2163,
9331,
8821,
1142,
119,
5238,
7816,
10377,
5262,
6800,
11408,
10393,
8858,
7326,
7841,
10413,
1203... | Validation |
11,344 | 8 | Web-Based_Enterprise_Management:web-based enterprise management computing web-based enterprise management wbem comprises set systems-management technologies developed unify management distributed computing environments wbem initiative initially sponsored 1996 bmc software cisco systems compaq computer intel microsoft widely adopted wbem based internet standards distributed management task force dmtf open standards although name labels wbem web-based necessarily dependent particular user interface see systems-management approaches include remote shells proprietary solutions ietf standardized network-management architectures like snmp netconf wbem allows management element standard inter-operable manner wbem provides technology underlying different management initiatives information technology understand wbem architecture consider components lie operator trying manage device configure turn collect alarms etc actual hardware software device pieces device manufacturer service provider write | [
514,
4771,
8554,
6797,
3278,
6511,
9455,
1079,
1304,
6168,
3323,
2168,
3133,
479
] | None |
11,345 | 4 | HTTP_Strict_Transport_Security:http strict transport security http strict transport security hsts web security policy mechanism helps protect websites protocol downgrade attacks cookie hijacking allows web servers declare web browsers complying user agents interact using secure https connections never via insecure http protocol hsts ietf standards track protocol specified rfc 6797 hsts policy communicated server user agent via https response header field named nowiki strict-transport-security /nowiki hsts policy specifies period time user agent access server secure fashion website using hsts must never accept clear text http either connect http systematically redirect users https consequence user-agent capable tls able connect site anymore hsts specification published rfc 6797 19 november 2012 approved 2 october 2012 iesg publication proposed standard rfc authors originally submitted internet-draft 17 june 2010 conversion internet-draft specification name altered strict transport security sts http strict transport security specification applies http http response header field defined hsts specification however remains named strict-transport-security last so-called community version then-named sts specification published 18 december 2009 revisions based community feedback original draft specification jeff hodges paypal collin jackson adam barth published 18 september 2009 hsts specification based original work jackson barth described paper forcehttps protecting high-security web sites network attacks additionally hsts realization one facet overall vision improving web security put forward jeff hodges andy steingruebl 2010 paper need coherent web security policy framework server implements hsts policy supplying header https connection hsts headers http ignored example server could send header future requests domain next year max-age specified seconds 31,536,000 equal one non-leap year use https codice_1 web application issues hsts policy user agents conformant user agents behave follows nowiki rfc 6797 /nowiki hsts policy helps protect web application users passive eavesdropping active network attacks man-in-the-middle attacker greatly reduced ability intercept requests responses user web application server user browser hsts policy effect web application important security vulnerability hsts fix ssl-stripping man-in-the-middle attacks first publicly introduced moxie marlinspike 2009 blackhat federal talk new tricks defeating ssl practice ssl tls stripping attack works transparently converting secure https connection plain http connection user see connection insecure crucially way knowing whether connection secure many websites use tls/ssl therefore way knowing without prior knowledge whether use plain http due attack simply website n't implemented tls/ssl additionally warnings presented user downgrade process making attack fairly subtle vigilant marlinspike sslstrip tool fully automates attack hsts addresses problem informing browser connections site always use tls/ssl hsts header stripped attacker user first visit google chrome mozilla firefox internet explorer microsoft edge attempt limit problem including pre-loaded list hsts sites unfortunately solution scale include websites internet see limitations hsts also help prevent one cookie-based website login credentials stolen widely available tools firesheep hsts time limited sensitive attacks involving shifting victim computer time e.g using false ntp packets initial request remains unprotected active attacks uses insecure protocol plain http uri initial request obtained insecure channel applies first request activity period specified advertised hsts policy nowiki max-age /nowiki sites set period several days months depending user activity behavior google chrome mozilla firefox internet explorer/microsoft edge address limitation implementing hsts preloaded list list contains known sites supporting hsts list distributed browser uses https initial request listed sites well previously mentioned pre-loaded lists scale cover entire web potential solution might achieved using dns records declare hsts policy accessing securely via dnssec optionally certificate fingerprints ensure validity requires running validating resolver avoid last mile issues junade ali noted hsts ineffective use phony domains using dns-based attacks possible man-in-the-middle interceptor serve traffic artificial domain hsts preload list made possible dns spoofing attacks simply domain name misleadingly resembles real domain name www.example.org instead www.example.com even hsts preloaded list hsts ca n't prevent advanced attacks tls beast crime attacks introduced juliano rizzo thai duong attacks tls orthogonal hsts policy enforcement see discussion overall hsts security considerations hsts used near-indelibly tag visiting browsers recoverable identifying data supercookies persist browser incognito privacy modes creating web page makes multiple http requests selected domains example twenty browser requests twenty different domains used theoretically one million visitors distinguished 2 due resulting requests arriving via http vs. https latter previously recorded binary bits established earlier via hsts headers depending actual deployment certain threats e.g cookie injection attacks avoided following best practices | [
513,
517,
1157,
1288,
8584,
9744,
1683,
1688,
7708,
7965,
3742,
2083,
11044,
8358,
11693,
11569,
9394,
9909,
7736,
9281,
9412,
3657,
5834,
10831,
11345,
2003,
5078,
87,
5590,
2777,
474,
9690,
3805,
4063,
7264,
225,
8674,
7139,
3941,
4326,... | Test |
11,346 | 3 | Balance_of_Power_(video_game):balance power video game balance power computer strategy game geopolitics cold war created chris crawford published 1985 macintosh mindscape followed ports variety platforms next two years game player takes role president united states general secretary soviet union goal improve player country standing world relative superpower yearly turn random events occur may effects player international prestige player choose respond events various ways may prompt response superpower creates brinkmanship situations two nations potentially escalating nuclear war ends game crawford already well-known especially eastern front 1941 1984 announcement moving macintosh platform work new concept generated considerable interest widely reviewed release including extremely positive review new york times magazine praised inventive non-action gameplay nevertheless exciting distinct named computer gaming world one innovative computer games time balance power successful mac combined ports ultimately sold quarter million units player may choose either president united states general secretary communist party soviet union must lead chosen superpower eight years seeking maximize prestige avoiding nuclear war turn one year long beginning year player presented set incidents crises various countries around globe must choose response one responses may range action diplomatic notes superpower military maneuvers response met counter-response may vary backing escalation player gets chance initiate actions deal opponent responses core mechanic similar bruce ketchledge 1983 game geopolitique 1990 published ssi one difference earlier game negotiations resolved games backing negotiation results loss prestige reverberate politically likewise games brinkmanship may result global war geopolitique wars actually fought in-game game continued balance power war ends game instantly following message ignited n accidental nuclear war animated display mushroom cloud parts bodies flying air reward failure crawford made name years atari late 1970s early 1980s smash hit eastern front 1941 made one game authors known name helped ensure later releases also successful degree early 1984 atari rapidly going bankrupt due effects north american video game crash 1983 march laid majority staff including crawford ample severance enough allow write new game freelancer considering sequel eastern front political game inca empire eventually decided write cold war game peace crawford cited bob dylan blowin wind emotional inspiration game considering atari platform lost cause crawford began looking new 16-bit platforms coming market dismissed ibm pc crude amiga likely fail business reasons thus chose macintosh platform develop time non-trivial decision development tools mac programmers buy apple lisa write code platform april 1984 interview origins game fair crawford stated working game macintosh entitled arms race based philosophy h-bombs n't kill people geopolitics kills people may initial concept fleshed game would take place top world map could show various details events would presented newspaper stories following algorithmic concept developed considering headlines national enquirer events outcomes would expressed terms prestige points crawford difficulty finding publisher balance power due small part lingering effects 1983 crash random house eventually agreed publish considerable ill crawford editor assigned prior experience video games random house ultimately cancelled contract demanded crawford return 10,000 advance payment almost causing lose home wife demanded get real job work saved friend infoworld heard troubles published two-part column game article seen producer newly formed mindscape agreed publish betas ready february 1985 polished spring summer game released september immediate sensation given world height cold war fame small part helped review new york times magazine written david l. aaron jimmy carter deputy assistant president national security affairs called close one might get cut-and-thrust international politics without going confirmation senate game immediate hit initial macintosh apple ii platforms release microsoft windows 1.0 1986 made multiplatform best seller followed versions atari st 1987 amiga among others total game sold 10 million heyday time total sales gaming hardware software combined 500 million 1986 crawford published book also called balance power details internals game great depth explains background politics formulas used calculate prestige related parameters account lengthy gestation around 2013 fulfilling 2011 promise crawford released source code several games public domain among balance power computer gaming world stated balance power stands prestigious circle innovative computer games time academy awards computer games bop would get votes best picture best director 1985 1992 survey magazine wargames modern settings gave game four stars five 1994 survey gave three stars 1996 magazine listed game game scene 11 list 15 best ways die computer gaming dragon recommended game called superb game global strategy goes beyond games wherein thoughtful calculated geopolitics could prevent worldwide nuclear war well truly entertaining thought-provoking simulation world geopolitics involves player quest prevent worldwide nuclear holocaust promoting either u.s.a. russia world prominence marvelous program everyone experience least byte praised game 1986 describing mac version best game ever seen computer ... means get program info gave amiga version four-plus stars five approving complex gameplay good user interface complaining lack sound obvious macintosh influence magazine concluded excellent game bob ewald reviewed balance power space gamer/fantasy gamer 81 ewald commented conclusion type game appeals problems worth suffering however 're hardcore wargamer n't interested diplomacy suggest pass one compute presented opposing views game may 1988 magazine included balance power list favorite games calling impressive recreation world geopolitical landscape ... call one many bluffs 'll see chilling message ignited nuclear war orson scott card however wrote review game crawford— best designer simulation games 've seen —was leaning shoulder bullying playing game way sweet delusion long united states nice n't anything offend russians go home n't play way 'll stop game nasty remark world destroyed nuclear war added since nuclear war fought crawford could know would cause one lot experts claim soviets seem behave lot nicer stand disarm crawford sure right balance power n't game propaganda 1989 compute stated 1990 edition multipolar features welcome additions game year card stated magazine 1988 list caused reevaluate game playing 1990 edition stating detailed carefully extrapolated future world 've worked still criticizing geopolitical absurdities forcing united states passively accept soviet troops syria contrary happened yom kippur war advisors mexico start nuclear war card concluded outcomes probably reflected computer limitations rather crawford political views advised players pretend balance power set alien planet astonishingly similar earth play solely based game assumptions world chuck moss disagreed card revised view describing balance power computer gaming world 1992 reflect ing extreme bias part designers called pacific treatise ... nuclear war erupted u.s. much sent five million dollars panama crawford stated 1987 proud work game feel made world better place ... think made small number people much realistic appraisal world affairs 1996 computer gaming world ranked 78th best game time calling wonderful game political intrigue felt like cold war n't require detail shadow president cyberjudas year ranked 75th top game time next generation commented although game premises hopelessly outdated u.s.s.r. disagree politics ai balance power combined unique play style make classic 2006 guardian listed first list 10 political games everyone play balance power crawford began work entirely new game released 1987 selling thousand copies mindscape disappointed pressured crawford follow-up balance power company pressed hard crawford felt owed one publishing siboot sequel released 1989 balance power 1990 edition apple iigs windows macintosh amiga atari st. crawford n't consider proper sequel saying simply tidying adding bells whistles balance power 1990 edition adds countries advisors help player new multi-polar level allows countries generate events declaring war countries 2-player hotseat mode 1992 crawford left game industry make something interactive artistic many false starts emerged erasmatron later re-released name storytron systems used make complex interactive storylines demo crawford used storytron build balance power 21st century version begins 12 september 2001 mostly involves us interactions asia emerging powers success crawford describes crap balance power basis number play mail versions manually run based moves posted internet forum systems one long-running example hosted eregime | [
4114,
9166,
6797,
9006
] | Test |
11,347 | 4 | List_of_data_breaches:list data breaches list data breaches using data compiled various sources including press reports government news releases mainstream news articles list includes involving theft compromise 30,000 records although many smaller breaches occur continually breaches large organizations number records still unknown also listed various methods used breaches also listed hacking common breaches occur north america estimated average cost data breach 150 million 2020 global annual cost forecast 2.1 trillion estimated first half 2018 alone 4.5 billion records exposed result data breaches 2019 collection 2.7 billion identity records consisting 774 million unique email addresses 21 million unique passwords posted web sale | [
1251,
10660,
10182,
488,
5726,
5002,
4623,
5007,
6737,
7151,
3323,
4956,
2558
] | Validation |
11,348 | 0 | Adam_Kilgarriff:adam kilgarriff adam kilgarriff 12 february 1960 – 16 may 2015 corpus linguist lexicographer co-author sketch engine parents booksellers spent one year volunteer kenya 1978–1979 began studying cambridge university graduating first class ba degree philosophy engineering 1982 first job housing officer london quadrant housing trust time studied south west london college 1987 left job started msc intelligent knowledge-based systems university sussex graduated following year continuing dphil computational linguistics thesis polysemy 1992 2008 made return trip kenya old friend raphael also participant hastings half marathon many years november 2014 diagnosed stage 4 bowel cancer succumbed may 2015 diagnosis started blog reflected experience disease thoughts language corpus linguistics life world general graduated university sussex phd 1992 became lecturer university brighton 1995 later visiting research fellow department informatics university sussex school modern languages cultures university leeds partnership b.t.s atkins sue atkins michael rundell brought setting first company lexicography masterclass ltd 2002 company provided consultancy training lexicography dictionary production shortly retirement sue atkins company dissolved 2012 2003 started company lexical computing limited delivering tools services corpus processing working lexicographer short period 1992–1995 longman dictionaries early research career closely associated word sense disambiguation phd thesis kilgarriff argued discrete classification word senses saw word senses rather continuous space meanings largely defined contexts word appears paper n't believe word senses 1997 became soon state-of-the-art argumentation topic work polysemy brought kilgarriff text corpora corpus linguistics devoted rest career one founding members former chair 2006–2008 special interest group web corpus sigwac association computational linguistics acl also one founding organizers senseval years 2000–2004 president special interest group lexicon siglex acl kilgarriff active member european association lexicography member board 2002–2006 consultant major publishing houses reviewer journals conferences around field working methods automatic acquisition large web corpora quantitative qualitative corpus analysis text genres corpus similarity homogeneity heterogeneity work corpora closely connected application computer lexicography kilgarriff invented notion word sketches one-page summaries word collocation behaviour particular grammatical relations represent core part sketch engine corpus management system | [
1890,
7724,
7599,
10160,
5781,
5214
] | None |
11,349 | 4 | Electromagnetic_attack:electromagnetic attack cryptography electromagnetic attacks side-channel attacks performed measuring electromagnetic radiation emitted device performing signal analysis attacks specific type sometimes referred van eck phreaking intention capture encryption keys electromagnetic attacks typically non-invasive passive meaning attacks able performed observing normal functioning target device without causing physical damage however attacker may get better signal less noise depackaging chip collecting signal closer source attacks successful cryptographic implementations perform different operations based data currently processed square-and-multiply implementation rsa different operations emit different amounts radiation electromagnetic trace encryption may show exact operations performed allowing attacker retrieve full partial private keys like many side-channel attacks electromagnetic attacks dependent specific implementation cryptographic protocol algorithm electromagnetic attacks often done conjunction side-channel attacks like power analysis attacks electronic devices emit electromagnetic radiation every wire carries current creates magnetic field electronic devices create small magnetic fields use magnetic fields unintentionally reveal information operation device properly designed electronic devices affected phenomenon term ‘ device ’ refer anything desktop computer mobile phone smart card electromagnetic waves type wave originate charged particles characterized varying wavelength categorized along electromagnetic spectrum device uses electricity emit electromagnetic radiation due magnetic field created charged particles moving along medium example radio waves emitted electricity moving along radio transmitter even satellite case electromagnetic side-channel attacks attackers often looking electromagnetic radiation emitted computing devices made circuits electronic circuits consist semiconducting materials upon billions transistors placed computer performs computations encryption electricity running transistors create magnetic field electromagnetic waves emitted electromagnetic waves captured using induction coil analog digital converter sample waves given clock rate convert trace digital signal processed computer electronic device performing computations synced clock running frequencies order mega-hertz mhz giga-hertz ghz however due hardware pipelining complexity instructions operations take multiple clock cycles complete therefore always necessary sample signal high clock rate often possible get information operations sampling order kilo-hertz khz different devices leak information different frequencies example intel atom processor leak keys rsa aes encryption frequencies 50 mhz 85 mhz android version 4.4 bouncy castle library implementation ecdsa vulnerable key extraction side channel attacks around 50 khz range every operation performed computer emits electromagnetic radiation different operations emit radiation different frequencies electromagnetic side-channel attacks attacker interested frequencies encryption occurring signal processing responsible isolating frequencies vast multitude extraneous radiation noise isolate certain frequencies bandpass filter blocks frequencies outside given range must applied electromagnetic trace sometimes attacker know frequencies encryption performed case trace represented spectrogram help determine frequencies prevalent different points execution depending device attacked level noise several filters may need applied electromagnetic attacks broadly separated simple electromagnetic analysis sema attacks differential electromagnetic analysis dema attacks simple electromagnetic analysis sema attacks attacker deduces key directly observing trace effective asymmetric cryptography implementations typically traces needed though attacker needs strong understanding cryptographic device implementation cryptographic algorithm implementation vulnerable sema attacks perform different operation depending whether bit key 0 1 use different amounts power and/or different chip components method prevalent many different types side-channel attacks particular power analysis attacks thus attacker observe entire computation encryption deduce key example common attack asymmetric rsa relies fact encryption steps rely value key bits every bit processed square operation multiplication operation bit equal 1 attacker clear trace deduce key simply observing multiplication operations performed cases simple electromagnetic analysis possible provide enough information differential electromagnetic analysis dema attacks complex effective symmetric cryptography implementation sema attacks additionally unlike sema dema attacks require much knowledge device attacked fact circuits emit high-frequency signals may leak secret information known since 1982 nsa classified 2000 right around time first electromagnetic attack encryption shown researchers since many complex attacks introduced smart cards often colloquially referred “ chip cards ” designed provide secure financial transaction traditional credit card contain simple embedded integrated circuits designed performed cryptographic functions connect directly card reader provides power necessary perform encrypted financial transaction many side-channel attacks shown effective smart cards obtain power supply clock directly card reader tampering card reader simple collect traces perform side-channel attacks works however also shown smart cards vulnerable electromagnetic attacks well field-programmable gate arrays fpga commonly used implement cryptographic primitives hardware increase speed hardware implementations vulnerable software based primitives 2005 implementation elliptic curve encryption shown vulnerable sema dema attacks aria block cipher common primitive implemented fpgas shown leak keys contrast smart cards simple devices performing single function personal computers many things thus much difficult perform electromagnetic side-channel attacks due high levels noise fast clock rates despite issues researchers 2015 2016 showed attacks laptop using near-field magnetic probe resulting signal observed seconds filtered amplified digitized offline key extraction attacks require expensive lab-grade equipment require attacker extremely close victim computer however researchers able show attacks using cheaper hardware distances half meter attacks however required collection traces expensive attacks smartphones particular interest electromagnetic side-channel attacks since advent mobile phone payment systems apple pay e-commerce systems become increasingly commonplace likewise amount research dedicated mobile phone security side channel attacks also increased currently attacks proofs concept use expensive lab-grade signal processing equipment one attacks demonstrated commercial radio receiver could detect mobile phone leakage three meters away however attacks using low-end consumer grade equipment also shown successful using external usb sound card induction coil salvaged wireless charging pad researchers able extract user signing key android openssl apple commoncrypto implementations ecdsa widely used theoretical encryption schemes mathematically secure yet type security consider physical implementations thus necessarily protect side-channel attacks therefore vulnerability lies code specific implementation shown insecure luckily many vulnerabilities shown since patched vulnerable implementations include definitely limited following attacks described thus far mainly focused use induction detect unintended radiation however use far-field communication technologies like radios also used side-channel attacks although key extraction methods far-field signal analysis demonstrated therefore rough characterization potential adversaries using attack range highly educated individuals low medium funded cartels following demonstrates possible scenarios point sale systems accept payment mobile phones smart cards vulnerable induction coils hidden systems record financial transactions smart cards mobile phone payments keys extracted malicious attacker could forge card make fraudulent charges private key belgarric et al propose scenario mobile payments performed bitcoin transactions since android implementation bitcoin client uses ecdsa signing key extracted point sale types attacks slightly complex magnetic card stripe skimmers currently used traditional magnetic strip cards many public venues starbucks locations already offering free public wireless charging pads previously shown coils used wireless charging used detection unintended radiation therefore charging pads pose potential hazard malicious charging pads might attempt extract keys addition charging user ’ phone coupled packet sniffing capabilities public wi-fi networks keys extracted could used perform man-in-the-middle attacks users far-field attacks discovered attacker needs point antenna victim perform attacks victim need actively charging phone one public pads several countermeasures electromagnetic attacks proposed though one perfect solution many following countermeasures make electromagnetic attacks harder impossible one effective ways prevent electromagnetic attacks make difficult attacker collect electromagnetic signal physical level broadly hardware designer could design encryption hardware reduce signal strength protect chip circuit wire shielding faraday cage effective reducing signal well filtering signal introducing extraneous noise mask signal additionally electromagnetic attacks require attacking equipment close target distance effective countermeasure circuit designers also use certain glues design components order make difficult impossible depackage chip without destroying many electromagnetic attacks especially sema attacks rely asymmetric implementations cryptographic algorithms effective countermeasure ensure given operation performed given step algorithm gives information value bit randomization order bit encryption process interrupts clock cycle randomization effective ways make attacks difficult classified national security agency program tempest focuses spying systems observing electromagnetic radiation securing equipment protect attacks federal communications commission outlines rules regulating unintended emissions electronic devices part 15 code federal regulations title 47 fcc provide certification devices produce excess emissions instead relies self-verification procedure | [
2050,
7556,
2567,
3084,
2957,
7056,
9745,
658,
660,
1173,
4389,
10662,
169,
3629,
11185,
2357,
10806,
9528,
1083,
1087,
9541,
10315,
6863,
7887,
8273,
10963,
212,
9556,
2265,
7643,
9697,
229,
7527,
618,
1898,
881,
1654,
7161,
7034,
892,
... | Test |
11,350 | 1 | Consultant_Plus:consultant plus consultant plus assistance system work legislation russia consultant centralized database updated daily distributed via network partners major competitors garant codex techexpert proprietary full federal law database includes 3 million documents regional acts distributed separate database 4 million documents information contained system structured several notions including every class mentioned consists several information banks simplify search throughout database manually excluding classes banks inappropriate current search database includes | [
4347,
6797,
7983
] | None |
11,351 | 4 | Fork_bomb:fork bomb computing fork bomb also called rabbit virus wabbit denial-of-service attack wherein process continually replicates deplete available system resources slowing crashing system due resource starvation around 1978 early variant fork bomb called wabbit reported run system/360 may descended similar attack called rabbits reported 1969 burroughs 5500 university washington fork bombs operate consuming cpu time process forking saturating operating system process table basic implementation fork bomb infinite loop repeatedly launches new copies unix-like operating systems fork bombs generally written use fork system call forked processes also copies first program resume execution next address frame pointer continue forking endlessly within copy infinite loop effect causing exponential growth processes modern unix systems generally use copy-on-write forking new processes fork bomb generally saturate system memory microsoft windows operating systems equivalent functionality unix fork system call fork bomb operating system must therefore create new process instead forking existing one inline shell example using perl interpreter import os true int main public class forkbomb -- requires luaposix module local unistd require posix.unistd true end section .text _start example shell script told run two instances 0 ― 0 shell variable returning name script ― pipe output one results exponentially replicating processes 0|./ 0 simpler way run 0 twice 0 0 bash fork bomb performed declaring calling multiple-recursive function bomb bomb additionally one famous commonly cited examples fork bomb dense one-line bash command command obfuscated version trick used function name possible colon reserved character bash languages otherwise identical unicode support similarly rendered shorter done command line using escape specials condensed version designed run directly run ... prompt true fork bomb mode operation entirely encapsulated creating new processes one way preventing fork bomb severely affecting entire system limit maximum number processes single user may linux achieved using ulimit utility example command codice_1 would limit affected user maximum thirty owned processes pam-enabled systems limit also set codice_2 freebsd system administrator put limits codice_3 | [
5120,
6272,
5380,
8582,
4488,
10508,
6797,
3867,
1702,
7847,
7983,
7091,
3525,
4423,
6347,
2253,
855,
2143,
8930,
10852,
2409,
8171,
5492,
3581,
9727
] | None |
11,352 | 8 | Telemetry_(company):telemetry company telemetry independent online advertising security optimization firm offices london new york city january 2017 telemetry shut amid declining revenues telemetry founded 2009 anthony rushton russell irwin beau chesluk three began collaborating 2001 created branded online video games name jaildog launched online tv station wedigtv 2007 winning 2008 international interactive emmy award best international interactive tv network order get telemetry ground rushton irwin chesluk invested £10,000 money within two years launch company valued £175 million telemetry system initially developed exclusively video embedding code online video record click-through mouse activity real-time 2012 company expanded display forms online advertising january 2017 telemetry shut amid declining revenues telemetry private company working independently online digital video advertisers agencies provide impartial detailed analytics auditing real time company tracks efficiency exposure gained online digital advertising campaigns order ensure accountability determine true value campaign exposing inflated reach impressions investigates whether ads delivered suitable website desired market alongside intended type content previously advertisers rely biased analytics vender essentially reporting traditional ad server statistics designed track online digital video advertising campaigns telemetry advised programmatic buying ads bought sold per-impression basis ways impressions counted set price misleading ads purchased pre-roll sometimes placed instead banner video ads typically muted viewer still counted pre-roll impressions telemetry encourages advertisers diligent demanding details placement quality ensure ads running proper space proper time impressions trading genuine impressions telemetry occasionally facing criticism bypassing media agencies selling digital ad space working advertisers directly according 2014 estimates interactive advertising bureau approximately 36 reported web traffic considered fake corresponding amount fake ad views due hijacked computers programmed visit sites cheating advertisers pay based number times ad loaded response visit telemetry exposed large frauds perpetrated online advertising landscape 2014 investigation verizon wireless online video advertising purchases finding excess 1 million spent fake web views telemetry advice verizon eighth-largest advertiser us demanded make-goods later 2014 telemetry investigated mercedes-benz online advertising campaign detecting suspicious traffic activity finding 57 campaign viewed often automated computer programs human beings mercedes refunded false impressions telemetry also brought public attention scheme ads forcefully injected onto popular sites including walmart.com youtube others third-party sellers without site owners knowledge profits going third party june 2014 telemetry uncovered ad fraud scheme going several months websites running lucrative video ads placed banner ads cheaper websites behind operation skimming around 10 million video ad revenue per month scheme affected 75 advertisers including mcdonald coca-cola ford rushton called significant instance ad fraud telemetry seen telemetry publicly called companies name unethically monetizing digital ads without site owner permission manipulating impressions often generating negative user experience telemetry clients include reckitt benckiser anheuser-busch unilever verizon wireless l'oreal mercedes-benz | [] | Validation |
11,353 | 7 | Globus_Toolkit:globus toolkit globus toolkit open-source toolkit grid computing developed provided globus alliance 25 may 2017 announced open source support project would discontinued january 2018 due lack financial support work globus service continues available research community freemium approach designed sustain software features freely available restricted subscribers globus toolkit contains set libraries programs provides developers specific tools apps solutions common problems encountered creating distributed system services applications globus software components capabilities includes globus toolkit adheres provides implementations following standards globus toolkit implementations ogf-defined protocols provide following globus toolkit components supported ogf-defined saga c++/python api number tools function globus toolkit including xml-based web services offer way access diverse services applications distributed environment 2004 univa corporation began providing commercial support globus toolkit using business model similar red hat gram grid resource allocation manager component globus toolkit officially supports following job schedulers batch-queuing systems unofficial job schedulers used globus toolkit globus alliance announced release globus toolkit version 5 gt5 late 2009 major change abandoning gram4 although continuing support least december 2010 favor enhanced gram2 called gram5 solve scalability issues add features reliable file transfer rft service replaced new globus.org service globus.org online hosted service i.e. software-as-a-service provides higher-level end-to-end grid capabilities initially concentrating reliable high-performance fire-and-forget data transfer retain web-service functionality without technology standards considered obsolete new project called globus crux started expects release alpha version end 2009 monitoring discovery tasks currently performed mds taken new crux-based integrated information services iis releases iis planned sometime 2010 release gt 5.0.2 announced 19 july 2010 gt 5.0.3 reported due release february 2011 | [
10625,
9602,
8070,
5767,
11658,
1806,
8339,
404,
9876,
2710,
5654,
1304,
11027,
158,
546,
5283,
5414,
7983,
823,
9665,
5956,
198,
1607,
1862,
8912,
2135,
2008,
2394,
2651,
8030,
479,
4195,
105,
7018,
9455,
3449,
8187,
8702,
7935
] | Test |
11,354 | 8 | Apache_FreeMarker:apache freemarker freemarker free java-based template engine originally focusing dynamic web page generation mvc software architecture however general purpose template engine dependency servlets http html thus often used generating source code configuration files e-mails freemarker somewhat hectic history 2004 caused paradigm shifts significant changes multiple occasions freemarker 1 known freemarker classic separate project originally written benjamin geer mike bayer 2002 new project lead jonathan revusky released freemarker 2 started sequence several substantial changes main goal changes make template language strict i.e. detect many typos typical mistakes possible also automatic object wrapping introduced along gradual advancement type system template language language gained many power-user features powerful macro programming capabilities namespaces language reached quite settled state version 2.3 released 2004 q3 2016 product remained backward compatible significant backward incompatible changes expected freemarker 2 series future late 2015 freemarker granted apache software foundation entered apache incubator 2018-03-21 become fully accepted apache project following template processed freemarker produce something like variables like name messages coming outside template thus template author deal presentation issues template remains regardless variables coming database cookie calculated whatever ways also exact java api hence class values hidden freemarker using technique called object wrapping example messages seems list array javabeans body properties might well something different template affected long proper object wrapper used | [
1258,
5612,
5677,
7983,
9590,
8860
] | Validation |
11,355 | 5 | SDXF:sdxf sdxf structured data exchange format data serialization format defined rfc 3072 allows arbitrary structured data different types assembled one file exchanging arbitrary computers ability arbitrarily serialize data self-describing format reminiscent xml sdxf text format xml — sdxf compatible text editors maximal length datum composite well elementary encoded using sdxf 16777215 bytes one less 16 mib sdxf data express arbitrary levels structural depth data elements self-documenting meaning metadata numeric character string structure encoded data elements design format simple transparent computer programs access sdxf data help well-defined functions exempting programmers learning precise data layout word exchange name reflects another kind transparency sdxf functions provide computer architecture independent conversion data serializations exchanged among computers via direct network file transfer cd without measures sdxf functions receiving side handle architectural adaptation structured data data patterns predictable complex strings text commercial example two companies want exchange digital invoices invoices following hierarchical nested structure basic element chunk sdxf serialization chunk chunk consist set smaller chunks chunks composed header prefix six bytes followed data header contains chunk identifier 2-byte binary number chunk_id chunk length type may contain additional information compression encryption chunk type indicates whether data consists text string characters binary number integer floating point chunk composite chunks structured chunks enable programmer pack hierarchical constructions invoice sdxf structure follow every named term invoice invoice_no date address_sender etc given unique number range 1 65535 2 byte unsigned binary integer without sign top/outermost chunk constructed id invoice means associated numerical chunk_id structured chunk level 1 invoice chunk filled chunks level 2 beyond invoice_no date address_sender address_recipient invoice_sum single_items conditions level 2 chunks structured turn two addresses single_items precise description see page 2 rfc alternatively sdxf allows programmer work sdxf structures compact function set following pseudocode creates invoices pseudocode extract invoice structure could look like sdxf designed readability modified text editors related editable structure sdef | [
11332,
11303,
11674,
6555,
6875,
479
] | Validation |
11,356 | 2 | CDC_Kronos:cdc kronos kronos operating system time-sharing capabilities written control data corporation 1970s kronos ran 60-bit cdc 6000 series mainframe computers successors cdc replaced kronos nos operating system late 1970s succeeded nos/ve operating system mid-1980s mace operating system apex forerunners kronos written control data systems programmer greg mansfield dave cahlander bob tate three others | [
6529,
2179,
11075,
9991,
8136,
1902,
7983,
25,
10458
] | None |
11,357 | 9 | List_of_PHP_editors:list php editors article contains list text editors features specific php scripting language | [
1668,
3462,
1034,
6154,
6797,
9614,
6176,
2465,
4777,
2348,
4919,
823,
190,
9151,
6338,
2372,
7364,
8644,
9924,
1353,
4171,
10587,
1632,
3553,
10341,
10471,
7785,
8554,
7147,
11371,
4853,
11259,
7293
] | Validation |
11,358 | 4 | Cybersecurity_and_Infrastructure_Security_Agency:cybersecurity infrastructure security agency cybersecurity infrastructure security agency cisa established 16 november 2018 president donald trump signed law cybersecurity infrastructure security agency act 2018 cisa standalone united states federal agency operational component department homeland security dhs oversight activities continuation national protection programs directorate nppd former nppd secretary christopher krebs cisa first director former deputy secretary matthew travis first deputy director expected role cisa improve cybersecurity across levels government coordinate cybersecurity programs states improve government cybersecurity protections private nation-state hackers formed 2007 national protection programs directorate nppd component united states department homeland security nppd goal advance department national security mission reducing eliminating threats u.s. critical physical cyber infrastructure nppd led secretary homeland security national protection programs appointed president united states confirmation united states senate november 16 2018 president trump signed law cybersecurity infrastructure security agency act 2018 elevated mission former nppd within dhs establishing cybersecurity infrastructure security agency cisa nppd lead component united states department homeland security protection nation physical cyber critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents nppd collaborated shared information federal state local tribal international private-sector partners january 22 2019 cisa issued first-ever emergency directive mitigate dns infrastructure tampering 19-01 warning active attacker targeting government organizations using dns spoofing techniques perform man-in-the-middle attacks research group fireeye stated initial research suggests actor actors responsible nexus iran cisa subcomponents include federal protective service federal law enforcement agency provides integrated security law enforcement services federally owned leased buildings courthouses facilities properties assets well personnel associated agency leads department comprehensive security law enforcement services mitigating risk 9,000 federal facilities 1.1 million occupants nationwide operational activities include law enforcement response risk assessments federal facilities determine recommend install appropriate risk mitigation measures oversight 12,000 15,000 armed contract protective security officers depending customer requirements personnel conduct criminal investigations provide regular security awareness training stakeholders provide support major events office cybersecurity communications mission assuring security resiliency reliability nation cyber communications infrastructure includes national cyber security division collaborated public private international partners ensure security continuity nation cyber communications infrastructures event terrorist attacks natural disasters catastrophic incidents additionally cyber security communications protected strengthened reliability survivability interoperability nation communications capabilities including utilized emergencies federal state local tribal levels responsible overseeing national cyber security division national cybersecurity communications integration center coordinates responses cyberattacks headquartered arlington virginia office infrastructure protection led coordinated national effort reduce risk united states critical infrastructures key resources cikr posed acts terrorism department increases nation level preparedness ability respond quickly recover event attack natural disaster emergency formerly infrastructure analysis strategy division iasd within office infrastructure protection ocia established 2014 ocia important role dhs efforts implement presidential policy directive 21 calls integrated analysis critical infrastructure executive order 13636 identifying critical infrastructure cyber incidents could catastrophic impacts public health safety economy national security led coordinated efforts reducing risk nation physical critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents integrating disseminating critical infrastructure key resources threat consequence vulnerability information developing risk mitigation strategies overseeing developing implementation national infrastructure protection plan nipp efforts helped ensure essential government missions public services economic functions maintained ip also ensured critical infrastructure key resources elements exploited use weapons mass destruction people institutions regulatory initiatives ammonium nitrate chemical facility anti-terrorism standards cfats programs office biometric identity management obim formerly united states visitor immigrant status indicator technology us-visit uses innovative biometrics-based technological solutions—digital fingerprints photographs—to provide decision-makers accurate information need according president proposed fiscal year 2013 budget us-visit program may transferred customs border protection immigration customs enforcement however proposed 2013 continuing resolutions house representatives senate rejected president proposal full transfer program instead senate establishes office biometric identity management nppd us-visit mission operations moving immigration customs enforcement likewise house proposed keeping us-visit program as-is nppd supports department homeland security responsibility protect nation providing biometric identification services help federal state local government decision makers accurately identify people encounter determine whether people pose risk united states us-visit supplies technology collecting storing biometric data provides analysis updates watchlist ensures integrity data | [
2823,
138,
4240,
8667,
4830,
4863
] | None |
11,359 | 7 | Vine_Toolkit:vine toolkit vine toolkit open source software framework used create grid-aware web applications according vine toolkit web site vine modular extensible java library offers developers easy-to-use high-level application programmer interface api grid-enabling applications vine deployed use desktop java web start java servlet java portlet environments ease according vine toolkit project page vine case used basic form without additional plugins could perceived mvc framework one key concepts vine plug-in based structure vine toolkit consists core project defines base api programming model upon sub projects built sub project addresses particular problem area like grid vine build upon core vine define general concepts extensible elements others like globus toolkit 4 vine concerned adding support particular third party libraries services project conforms particular file structure defines source code built well third party libraries configuration files packaged deployed since vine java flex based framework works major platforms including windows unix mac os top vine offers several deployment scenarios | [
5956,
10020,
5612,
5677,
7983,
5492,
8122
] | Validation |
11,360 | 1 | Journal_of_Database_Management:journal database management journal database management quarterly peer-reviewed academic journal covering database management established 1990 published igi global editor-in-chief keng siau missouri university science technology journal abstracted indexed according journal citation reports journal 2015 impact factor 0.120 | [
2369,
8627,
2901
] | Test |
11,361 | 9 | Late_binding:late binding late binding dynamic binding dynamic linkage computer programming mechanism method called upon object function called arguments looked name runtime early binding static binding object-oriented language compilation phase fixes types variables expressions usually stored compiled program offset virtual method table v-table efficient late binding compiler read enough information verify method exists bind slot v-table instead method looked name runtime primary advantage using late binding component object model com programming require compiler reference libraries contain object compile time makes compilation process resistant version conflicts class v-table may accidentally modified concern jit-compiled platforms .net java v-table created runtime virtual machine libraries loaded running application term late binding dates back least 1960s found communications acm term widely used describe calling conventions languages like lisp though usually negative connotations performance 1980s smalltalk popularized object-oriented programming oop late binding alan kay said oop means messaging local retention protection hiding state-process extreme late-binding things done smalltalk lisp possibly systems possible 'm aware early mid-1990s microsoft heavily promoted com standard binary interface different oop programming languages com programming equally promoted early late binding many languages supporting syntax level 2000 alex martelli coined term duck typing refer similar concept different emphasis late binding generally focuses implementation details duck typing focuses ability ignore types concentrate methods object currently dynamically-typed languages list methods object altered runtime requires late binding lisp late bound global function calls efficiently looked runtime via symbol function cell function bindings mutable example using interactive clozure common lisp session c++ late binding also called dynamic binding refers normally happens codice_1 keyword used method declaration c++ creates so-called virtual table look-up table functions always consulted called usually late binding term used favor dynamic dispatch com programming late-bound method call performed using idispatch interface com-based languages visual basic 6 syntactical support calling interface done defining variable type object others c++ require explicitly call getidsofnames look method invoke call .net late binding refers overriding codice_1 method like c++ implementing interface compiler builds virtual tables every virtual interface method call used run-time determine implementation execute also like com java common language runtime provides reflection apis make late binding calls use calls varies language c 4 language also added dynamic pseudo-type would used place object type indicate late binding desired specific late binding mechanism needed determined runtime using dynamic language runtime starting point visual basic uses whenever variable type object compiler directive option strict force default setting new vb project prior version 9 .net com objects could late bound vb 10 extended dlr-based objects three definitions late binding java early documents java discussed classes linked together compile time types statically checked compile time different implementations classes could swapped prior runtime simply overwriting class file long new class definition class method names code would still work sense similar traditional definition late binding currently popular use term late binding java programming synonym dynamic dispatch specifically refers java single dispatch mechanism used virtual methods finally java use late binding using reflection apis type introspection much way done com .net programming generally speaking program java call late binding likewise use duck typing techniques frowned upon java programming abstract interfaces used instead oracle current owner java known use term late binding duck typing sense discussing java languages documentation using early binding ada database-stored procedure timestamp checked verify stored procedure changed since code compiled allows faster executions prevents application running wrong version stored procedure using late binding timestamp check performed stored procedure executed via anonymous pl/sql block slower removes need recompile client applications stored procedure changes distinction appears unique pl/sql ada languages call pl/sql procedures well database engines use late binding late binding poorer performance early bound method call implementations correct method address must looked name call requiring relatively expensive dictionary search possibly overload resolution logic yet generally negligible modern computers compilers late binding may prevent use static type checking making late bound call compiler assume method exists means simple spelling error cause run-time error thrown exact exception varies language usually named something like method found method missing modern compilers avoid ensuring every possible call must implementation compilation late binding may prevent forms static analysis needed integrated development environment ide example ide go definition feature may function late-bound call ide way know class call may refer modern ide easily solves especially object-oriented languages since late-bound method always specifies interface base class go definition leads find references used find implementations overrides similar problem possible lack typing information may prevent creation dependency graphs however programming methods abstract interfaces result problems modern ide create dependency graphs easily handles find references | [
2323,
9875,
9497,
10011,
10013,
8609,
1448,
5803,
11574,
10176,
9665,
10712,
6500,
6502,
8041,
7018,
8554,
10729,
2804,
8822,
7292,
11262,
511
] | Test |
11,362 | 1 | Negative_database:negative database database security negative database database saves attributes associated certain entry negative database kind database contains huge amount data consisting simulating data anyone tries get access databases actual negative data sets retrieved even steal entire database example instead storing personal details store personal details members n't negative databases avoid inappropriate queries inferences also support allowable operations scenario desirable database support allowable queries protecting privacy individual records say inspection insider collection negative data referred negative sousveillance | [
2688,
9481,
10505,
10258,
10518,
4376,
9112,
7968,
290,
1314,
7461,
8742,
5550,
5808,
10418,
9527,
3768,
3004,
9661,
9663,
4416,
2369,
5441,
11457,
8518,
72,
853,
2901,
9942,
9177,
987,
860,
9183,
10471,
8808,
6383,
9079,
2681,
9467
] | Test |
11,363 | 2 | OpenSolaris:opensolaris opensolaris discontinued open source computer operating system based solaris created sun microsystems also name project initiated sun build developer user community around software acquisition sun microsystems 2010 oracle decided discontinue open development core software replaced opensolaris distribution model proprietary solaris express prior oracle moving core development behind closed doors group former opensolaris developers decided fork core software name openindiana openindiana project part illumos foundation aims continue development distribution opensolaris codebase since many illumos distributions available use continuing development open offering support opensolaris descendant unix system v release 4 svr4 code base developed sun late 1980s version system v variant unix available open source opensolaris developed combination several software consolidations open sourced subsequent solaris 10 includes variety free software including popular desktop server software friday august 13 2010 details started emerge relating discontinuation opensolaris project pending release new closed-source proprietary version solaris solaris 11 opensolaris based solaris originally released sun 1991 solaris version unix system v release 4 svr4 jointly developed sun merge features several existing unix systems licensed sun novell replace sunos planning opensolaris started early 2004 pilot program formed september 2004 18 non-sun community members ran 9 months growing 145 external participants sun submitted cddl common development distribution license osi approved january 14 2005 first part solaris code base open sourced solaris dynamic tracing facility commonly known dtrace tool aids analysis debugging tuning applications systems dtrace released cddl january 25 2005 newly launched opensolaris.org website bulk solaris system code released june 14 2005 remains system code open sourced available pre-compiled binary files direct newly fledged project community advisory board announced april 4 2005 two elected pilot community two employees appointed sun one appointed broader free software community sun members roy fielding al hopper rich teer casper dik simon phipps february 10 2006 sun approved opensolaris charter reestablished body independent opensolaris governing board task creating governance document constitution organization given ogb three invited members stephen hahn keith wesolowski developers sun solaris organization ben rockwood prominent opensolaris community member former next-generation solaris os version development sun eventually succeed solaris 10 codenamed 'nevada derived opensolaris codebase new code pulled new opensolaris 'nevada snapshot builds sun microsystems control bi-weekly snapshots solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled new opensolaris preview snapshots available genunix.org stable releases opensolaris based nevada builds initially sun solaris express program provided distribution based opensolaris code combination software found solaris releases first independent distribution released june 17 2005 many others emerged since march 19 2007 sun announced hired ian murdock founder debian head project indiana effort produce complete opensolaris distribution gnome userland tools gnu plus network-based package management system new distribution planned refresh user experience would become successor solaris express basis future releases solaris may 5 2008 opensolaris 2008.05 released format could booted live cd installed directly uses gnome desktop environment primary user interface later opensolaris 2008.11 release included gui zfs snapshotting capabilities known time slider provides functionality similar macos time machine december 2008 sun microsystems toshiba america information systems announced plans distribute toshiba laptops pre-installed opensolaris april 1 2009 tecra m10 portégé r600 came preinstalled opensolaris 2008.11 release several supplemental software packages june 1 2009 opensolaris 2009.06 released support sparc platform january 6 2010 announced solaris express program would closed opensolaris binary release scheduled released march 26 2010 opensolaris 2010.03 release never appeared august 13 2010 oracle rumored discontinued opensolaris binary distribution focus solaris express binary distribution program source code would continue accepted community oracle source code would continue released open source oracle code releases would occur binary releases internal email released opensolaris kernel developer unconfirmed oracle post confirming leak posted opensolaris forums august 13 2010 upstream contributions continue new oracle web site downstream source code publishing continue binary distribution continue old solaris express model release source code occur binary cuts binary cuts become less frequent september 14 2010 openindiana formally launched jisc centre london openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based around os/net consolidation like opensolaris openindiana became distribution based illumos first release still based around os/net project uses ips package management system opensolaris november 12 2010 final build opensolaris 134b published oracle /release repository serve upgrade path solaris 11 express oracle solaris 11 express 2010.11 preview solaris 11 first release post-opensolaris distribution oracle released november 15 2010 opensolaris offered development unstable production stable releases opensolaris installed cd-rom usb drives network automated installer cd usb network install images made available types releases opensolaris uses network-aware package management system called image packaging system also known pkg 5 add remove manage installed software update newer releases packages development releases opensolaris published oracle typically every two weeks /dev repository production releases use /release repository receive updates next production release sun customers paid support contracts access updates production releases paid support production releases allows access security updates bug fixes offered sun /support repository pkg.sun.com hardware compatibility list hcl opensolaris consulted choosing hardware opensolaris deployment extensive opensolaris administration usage development documentation available online including community-contributed information sun released solaris source code common development distribution license cddl based mozilla public license mpl version 1.1 cddl approved open source license open source initiative osi january 2005 files licensed cddl combined files licensed licenses whether open source proprietary sun announcement java release gnu general public license gpl jonathan schwartz rich green hinted possibility releasing solaris gpl green saying certainly averse relicensing gpl schwartz pressed jokingly green said sun would take close look january 2007 eweek reported anonymous sources sun told opensolaris would dual-licensed cddl gplv3 green responded blog next day article incorrect saying although sun giving serious consideration dual-licensing arrangement would subject agreement rest opensolaris community first annual opensolaris developer conference abbreviated osdevcon organized german unix user group guug took place february 27 march 2 2007 freie universität berlin germany 2008 osdevcon joint effort guug czech opensolaris user group czosug look place june 25–27 2008 prague czech republic 2009 osdevcon look place october 27–30 2009 dresden germany 2007 sun microsystems organized first opensolaris developer summit held weekend october 13 2007 university california santa cruz united states 2008 opensolaris developer summit returned ucsc may 2–3 2008 took place immediately prior launch sun new opensolaris distribution may 5 2008 communityone conference san francisco california first opensolaris storage summit organized sun held september 21 2008 preceding snia storage developer conference sdc santa clara california second opensolaris storage summit preceded usenix conference file storage technologies fast february 23 2009 san francisco united states november 3 2009 solaris/opensolaris security summit held sun inner harbor area baltimore maryland preceding large installation system administration conference lisa notable derivatives include | [
9731,
5129,
1038,
6675,
7187,
10776,
25,
4637,
9762,
10789,
5158,
5677,
7217,
9784,
10809,
576,
1600,
7234,
8262,
593,
597,
10327,
10333,
2656,
97,
10851,
8298,
5231,
5233,
7285,
9333,
631,
2168,
633,
5240,
1147,
9335,
3197,
1150,
9343,
... | None |
11,364 | 4 | Squatting_attack:squatting attack squatting attack computer science kind dos attack program interferes another program use shared synchronization objects unwanted unexpected way attack known microsoft windows operating system offers named objects interprocess synchronization mechanism named objects process may open synchronization object shared resource specifying name subsequent processes may use name open resource way synchronize first process squatting attack possible legitimate program enforce tight security rules resources processes arbitrary security contexts may gain access ultimately take control system consider example antivirus software installed microsoft windows machine solution two pieces service monitors scans every file opened manual scanner scans file system user requests normal conditions service scan system occasionally however user requests manual scan service must stop temporarily let manual scanner work otherwise every file would scanned twice manual scanner service solve problem vendor chooses implement event based synchronization mechanism service keeps named event opened checks whenever file opened event unset file scanned otherwise ignored manual scanner operate opens named event sets scanning disabling service scans file system resets event back finished design prone squatting attack malicious program set named event disable service completely | [
9762,
2213,
2409,
10828,
6797
] | None |
11,365 | 4 | XARA:xara xara acronym unauthorized cross-app resource access describes category zero-day vulnerabilities computer software systems academic research paper entitled unauthorized cross-app resource access mac os x ios published 26 may 2015 team researchers indiana university tsinghua university peking university chinese academy sciences georgia institute technology paper widely released public 16 june 2015 paper identifies number separate categories zero day threats applications stored passwords potentially exploited malware ios devices os x paper also discloses existence similar vulnerabilities android devices xara attack vector violates principles computer security sandbox | [
9762,
9063,
3944,
11400,
4972,
3473,
7515,
2428
] | Test |
11,366 | 4 | Backup_and_disaster_recovery_appliance:backup disaster recovery appliance backup disaster recovery appliance also bdr appliance bdr specialized backup appliance includes backup software backup storage hypervisor support local disaster recovery appliance | [
9025,
3366
] | Validation |
11,367 | 3 | Model_Driven_Interoperability:model driven interoperability model driven interoperability mdi methodological framework provides conceptual technical support make interoperable enterprises using ontologies semantic annotations following model driven development mdd principles initial idea works mdi application model-driven methods techniques solving interoperability problems business level data level three main ideas model driven interoperability mdi approach mdi initiated 2004 beginning two important research projects projects supported european commission two projects worked definition methodological framework application mdi concrete cases mdi framework within interop defined reference model proposed mdi approach shows different kinds models possible perform different levels abstraction successive model transformations needed carry different levels abstraction needed order make possible model transformations reducing gap existing enterprise models code level definition several levels based model driven architecture mda defines three levels abstraction cim pim psm moreover introduced partition cim level two sub-levels order reduce gap cim pim levels interoperability model also defined different levels abstraction proposed one example reference model mdi see next figure picture shows proposed levels different kind models performed grai top cim level uml levels final objective making interoperable two esa franchisor erp franchisee crm model driven interoperability method mdi method model-driven method used two enterprises need interoperate code level also enterprise modelling level ontological support final aim improving performances mdi method proposed solve interoperability problems like name indicates based mda approach also following principles applied definition method next picture show main features mdi method green areas give estimated effort related phase workflow mdi framework athena provides guidance mdd applied address interoperability framework structured three main integration areas reference model conceptual integration developed mdd point view focusing enterprise applications software system according mda computation independent model cim corresponds view defined computation independent viewpoint describes business context business requirements software system platform independent model pim corresponds view defined platform independent viewpoint describes software specifications independent execution platforms platform specific model psm corresponds view defined platform specific viewpoint describes realisation software systems technical integration reference model promotes use service-oriented solutions software system generally system provide set services required businesses users enterprise reference model applicative integration developed order emphasise dependencies different models views achieve interoperability model transformation one key approaches used support mdi method approach used horizontal vertical dimension reference model mdi model transformations performed based generic transformation architecture following services verification consistency models support automatic mapping discovery among heterogeneous models definition semantic preserving transformation support mdi tackle vertical horizontal issues vertical issues semantic support aiming horizontal issues semantic support aiming | [
2948,
5005,
9926,
4591
] | Test |
11,368 | 4 | Data_erasure:data erasure data erasure sometimes referred data clearing data wiping data destruction software-based method overwriting data aims completely destroy electronic data residing hard disk drive digital media using zeros ones overwrite data onto sectors device overwriting data storage device data rendered unrecoverable achieves data sanitization ideally software designed data erasure permanent data erasure goes beyond basic file deletion commands remove direct pointers data disk sectors make data recovery possible common software tools unlike degaussing physical destruction render storage media unusable data erasure removes information leaving disk operable new flash memory-based media implementations solid-state drives usb flash drives cause data erasure techniques fail allowing remnant data recoverable software-based overwriting uses software application write stream zeros ones meaningless pseudorandom data onto sectors hard disk drive key differentiators data erasure overwriting methods leave data intact raise risk data breach identity theft failure achieve regulatory compliance many data eradication programs also provide multiple overwrites support recognized government industry standards though single-pass overwrite widely considered sufficient modern hard disk drives good software provide verification data removal necessary meeting certain standards protect data lost stolen media data erasure applications remotely destroy data password incorrectly entered data erasure tools also target specific data disk routine erasure providing hacking protection method less time-consuming software encryption hardware/firmware encryption built drive integrated controllers popular solution degradation performance encryption place data erasure acts complement crypto-shredding practice 'deleting data deleting overwriting encryption keys presently dedicated hardware/firmware encryption solutions perform 256-bit full aes encryption faster drive electronics write data drives capability known self-encrypting drives seds present modern enterprise-level laptops increasingly used enterprise protect data changing encryption key renders inaccessible data stored sed easy fast method achieving 100 data erasure theft sed results physical asset loss stored data inaccessible without decryption key stored sed assuming effective attacks aes implementation drive hardware information technology assets commonly hold large volumes confidential data social security numbers credit card numbers bank details medical history classified information often stored computer hard drives servers inadvertently intentionally make way onto media printers usb flash zip jaz rev drives increased storage sensitive data combined rapid technological change shorter lifespan assets driven need permanent data erasure electronic devices retired refurbished also compromised networks laptop theft loss well portable media increasingly common sources data breaches data erasure occur disk retired lost organization user faces possibility data stolen compromised leading identity theft loss corporate reputation threats regulatory compliance financial impacts companies spend large amounts money make sure data erased discard disks high-profile incidents data theft include strict industry standards government regulations place force organizations mitigate risk unauthorized exposure confidential corporate government data regulations united states include hipaa health insurance portability accountability act facta fair accurate credit transactions act 2003 glb gramm-leach bliley sarbanes-oxley act sox payment card industry data security standards pci dss data protection act united kingdom failure comply result fines damage company reputation well civil criminal liability data erasure offers alternative physical destruction degaussing secure removal disk data physical destruction degaussing destroy digital media requiring disposal contributing electronic waste negatively impacting carbon footprint individuals companies hard drives nearly 100 recyclable collected charge variety hard drive recyclers sanitized data erasure may work completely flash based media solid state drives usb flash drives devices store remnant data inaccessible erasure technique data retrieved individual flash memory chips inside device data erasure overwriting works hard drives functioning writing sectors bad sectors usually overwritten may contain recoverable information bad sectors however may invisible host system thus erasing software disk encryption use prevents problem software-driven data erasure could also compromised malicious code software-based data erasure uses disk accessible application write combination ones zeroes alpha numeric character also known mask onto hard disk drive sector level security using software data destruction tools increased dramatically pre-testing hard drives sector abnormalities ensuring drive 100 working order number wipes become obsolete recent inclusion verify pass scans sectors disk checks character i.e 1 pass aa fill every writable sector hard disk makes 1 pass unnecessary certainly damaging act especially drives passed 1tb mark many overwriting programs capable complete data erasure offer full security destroying data areas hard drive disk overwriting programs access entire hard drive including hidden/locked areas like host protected area hpa device configuration overlay dco remapped sectors perform incomplete erasure leaving data intact accessing entire hard drive data erasure eliminates risk data remanence data erasure also bypass operating system os overwriting programs operate os always perform complete erasure modify contents hard drive actively use os many data erasure programs like dban provided bootable format run live cd necessary software erase disk data erasure deployed network target multiple pcs rather erase one sequentially contrast dos-based overwriting programs may detect network hardware linux-based data erasure software supports high-end server storage area network san environments hardware support serial ata serial attached scsi sas fibre channel disks remapped sectors operates directly sector sizes 520 524 528 removing need first reformat back 512 sector size winpe overtaken linux environment choice since drivers added little effort also helps data destruction tablets handheld devices require pure uefi environments without hardware nic installed and/or lacking uefi network stack support many government industry standards exist software-based overwriting removes data key factor meeting standards number times data overwritten also standards require method verify data removed entire hard drive view overwrite pattern complete data erasure account hidden areas typically dco hpa remapped sectors 1995 edition national industrial security program operating manual dod 5220.22-m permitted use overwriting techniques sanitize types media writing addressable locations character complement random character provision removed 2001 change manual never permitted top secret media still listed technique many providers data erasure software data erasure software provide user validation certificate indicating overwriting procedure completed properly data erasure software also comply requirements erase hidden areas provide defects log list list bad sectors could overwritten data sometimes recovered broken hard drive however platters hard drive damaged drilling hole drive platters inside data theoretically recovered bit-by-bit analysis platter advanced forensic technology data floppy disks sometimes recovered forensic analysis even disks overwritten zeros random zeros ones case modern hard drives e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie | [
3841,
3972,
5125,
8074,
5133,
5391,
9086,
8471,
3225,
7579,
9499,
1440,
1315,
8997,
3880,
3114,
3629,
7983,
11695,
7090,
4659,
9910,
823,
4408,
831,
3009,
1475,
7369,
7887,
1873,
10195,
8283,
4956,
6494,
1251,
2534,
232,
10600,
3315,
3572... | None |
11,369 | 1 | ENI_number:eni number eni number european number identification european vessel identification number registration ships capable navigating inland european waters unique eight-digit identifier attached hull entire lifetime independent vessel current name flag eni introduced inland transport committee united nations economic commission europe meeting 11–13 october 2006 geneva based rhine vessel certification system previously used ships navigating rhine comparable imo ship identification number eni number consists eight arabic numerals first three digits identify competent authority number assigned see list prefixes last five digits serial number ships vessel number accordance rhine inspection rules receive eni beginning 0 followed seven digit rhine number vessel issued imo number may receive eni number appropriate certifications inland water travel eni begin 9 followed seven digit imo number eni number transmitted inland-automatic identification system transponders european vessels required carry eni number april 2007 vessel must eni operates inland waterways meets following criteria length greater volume tug push boat operates qualifying vessel passenger ship floating installation/equipment vessel issued eni number must displayed sides stern vessel | [
676,
4413
] | Validation |
11,370 | 9 | Installer_(programming_language):installer programming language installer scripting language developed commodore international amigaos first released version 2.1 1992 grammar based lisp programming language compatible re-implementation named installerlg actively developed october 2018 example developer guide n't want write scripts line line may use installergen tool | [
139,
5264,
2193,
9236,
3233,
9249,
8618,
6062,
432,
8369,
8115,
6075,
11076,
10570,
5709,
1742,
850,
4564,
4309,
6233,
5729,
6502,
5736,
5743,
11123,
9848
] | Test |
11,371 | 8 | CodeCharge_Studio:codecharge studio codecharge studio rapid application development rad integrated development environment ide creating database-driven web applications code generator templating engine separates presentation layer coding layer aim allowing designers programmers work cohesively web application model-view-controller design pattern codecharge first product released yes software inc. two years development codecharge utilizes point-and-click wizards creating record search forms grids editable grids without need programming databases supports include mysql ms sql server ms access postgresql oracle well database supports web connectivity codecharge export code major programing languages asp.net asp java coldfusion php perl codecharge employs interactive user interface ui designed creation web applications generating code codecharge automatically structures code using naming conventions comments describe code purpose moreover codecharge keeps application separate code generates projects may converted language time without additional programming codecharge-generated project routed web site everything routed example index.asp rather every page accessible reference name url listed technologies used application ready running application uses microsoft .net 2 framework also install .net 3.5 framework detected host computer 2003 regarding original version codecharge studio arbi arzoumani php architect wrote kevin yank sitepoint tech times impressed many ways experienced developers could draw added power software instead limited case rad tools web development review codecharge studio 2.0 troy dreier wrote intranet journal codecharge studio allows web application developers shave literally months development times codecharge studio 3.0 received rating 3.5 5 peter b. macintyre php|architect | [
8644,
8582,
5677,
6797,
7983,
9808,
5048,
11357
] | Validation |
11,372 | 7 | Dropbox_Paper:dropbox paper dropbox paper simply paper collaborative document-editing service developed dropbox originating company acquisition document collaboration company hackpad april 2014 dropbox paper officially announced october 2015 launched january 2017 offers web application well mobile apps android ios dropbox paper described official announcement post flexible workspace brings people ideas together paper teams create review revise manage organize—all shared documents reception dropbox paper mixed critics praised collaboration functionality including content available immediately ability mention specific collaborators assign tasks write comments well editing attribution revision history received particular praise support rich media variety sources one reviewer noting paper support rich media exceeds capabilities competitors however criticized lack formatting options editing features user interface liked minimal reviewers cited lack fixed formatting bar missing features present competitors products making dropbox paper seem like light tool dropbox acquired document collaboration company hackpad april 2014 year later dropbox launched dropbox notes note-taking product beta testing phase dropbox paper officially announced october 15 2015 followed open beta release mobile android ios apps august 2016 dropbox paper officially released january 30 2017 comparison dropbox paper evernote pc world michael ansaldo wrote emphasis document creation might expect formatting front center dropbox paper case ansaldo noted lack fixed formatting toolbar 'd find evernote word processor like google docs microsoft word instead text editor appears floating ribbon highlight selected text formatting options available emphasis bolding strikethrough bulleted numbered lists h1 h2 tags users also add links convert text checklists add comments ansaldo wrote evernote dropbox paper make easy add images document also noted dropbox paper n't support image editing paper supports rich media users add rich content document pasting link file addition dropbox paper supports media variety popular services including youtube spotify vimeo soundcloud facebook google productivity suite file appears delete link cleaner display start working people paper allows invite people via email within document sharing options view link anyone link invited person action permissions edit comment regarding collaboration ansaldo wrote creative collaboration paper ’ marquee feature provides variety ways work effectively others real time users make content immediately visible accessible specific collaborator mentions also use mentions create assign task lists within document paper also boasts essential collaboration tools including comments editing attribution revision history writing techradar john brandon wrote dropbox paper might 'light tool without extensive templates microsoft office integration apps zoho suite work well dropbox storage service popular office workers days kyle wiggers digital trends wrote paper minimizing distractions interface quite literally big blank canvas tap agenda organize notes title create to-do lists even basic formatting tools obscured view noting paper floating box words phrases highlighted cursor wiggers stated paper to-do organizer well suited purpose thanks bevy labor-saving conveniences highlighting paper supports media to-do note-taking counterparts praised collaboration tools writing extensive 'd hope citing invitation system permission controls lists changes revision history comment chat support perhaps best ability assign tasks mention business insider alex heath praised paper interface super clean friendly write n't feel overwhelmed formatting options criticized available features writing google docs much full-featured formatting department paper catching wants par competition writing verge casey newton praised paper handling rich media complimenting great added imagine creative types work teams appreciate rich media embedded documents 're working rather series infinite tabs | [
803,
9347,
3462,
488,
3690,
3691,
4623,
1817,
11291,
2046
] | None |
11,373 | 3 | Mr._Do!:mr. object mr score many points possible digging tunnels ground collecting cherries title character mr. circus clown—except original japanese version game snowman constantly chased red monsters called creeps player loses life mr. caught one game last life lost cherries distributed throughout level groups eight 500 bonus points awarded mr. collects eight cherries row without stopping level complete either cherries removed creeps destroyed extra spelled diamond found mr. defeat creeps hitting bouncing power ball dropping large apples power ball bouncing toward creep mr. defenseless ball bounces area creeps hit behind fallen apple mr. use retrieved power ball hits creep reforms mr. hands delay increases use mr. creeps push apple edge vertical tunnel crush one creeps apple falls height breaks disappears mr. also crushed falling apple causing loss life occasionally creeps transform briefly powerful multicolored monsters tunnel ground one digs cherry leaves fewer cherries fewer points mr. collect digs apple often crushes creeps and/or mr. time score passes certain threshold play 5000 points letter word extra appears playfield alphamonster player defeat defeated monster way creep defeating alphamonster awards letter player collecting five letters word completes level goes cut scene playing theme astro boy awards player extra life alphamonsters attempt eat apples encounter makes difficult impossible crush creeps spawn center screen appeared generator turn food item picking scores bonus points freezes creeps calls alphamonster three large blue monsters latter eat apples well creeps stay frozen still deadly player either defeats three blue monsters defeats alphamonster case remaining blue monsters turned apples loses life completes stage rarely dropping apple reveal diamond collected within 15 seconds completes level awards bonus credit player well 8000 points allowing play free game feature relatively uncommon among arcade video games though standard feature many pinball machines mr ported atari 2600 atari 8-bit computers colecovision apple ii msx tomy tutor commodore 64 handheld lcd version released tomy 1983 colecovision adaptation alphamonster sidekicks unable eat apples making easier crush blue monsters eat shrubbery cherries also alphamonster letter already acquired dinosaur monsters freeze seconds release famicom tsūshin awarded super famicom version game 25 40 four reviewers electronic gaming monthly gave 4.875 10 dan hsu felt mr fun gameplay criticized lack enhancements decade old game recommended players get released significantly less normal retail price snes cartridge later feature 16-bit games reported contrary hopes game priced 50 mr followed three sequels mr. castle 1983 also known mr. vs. unicorns mr. wild ride run run 1984 expanded 99-level version mr developed arcades electrocoin 1989 mr adapted nintendo game boy super famicom/snes providing new gameplay features rebranded adaptation game released game boy color 1999 titled quest fantasy challenge holy magic century europe developed imagineer published sunsoft north america virgin interactive europe branded quest series game instead mr arcade version debuted wii virtual console japan april 27 2010.virtual console releases april 2010 | [
1984,
9006,
1776,
9110,
8151
] | Test |
11,374 | 3 | Actel_SmartFusion:actel smartfusion smartfusion family microcontrollers integrated fpga actel device includes arm cortex-m3 hard processor core 512kb flash 64kb ram analog peripherals multi-channel adc dacs addition flash-based fpga fabric actel also sells two development boards include smartfusion chip one smartfusion evaluation kit low cost board smartfusion a2f200 sold 99 another smartfusion development kit fully featured board smartfusion a2f500 sold 999 amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer actel documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set actel additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official stm32 arm documents | [
7170,
11395,
3467,
10767,
8720,
1170,
7445,
666,
5786,
4508,
9371,
4773,
38,
9638,
682,
4139,
2862,
3886,
2224,
11054,
11314,
11447,
9913,
8253,
8383,
10945,
7234,
7235,
9155,
9928,
2635,
5963,
9163,
6607,
7631,
2517,
4821,
9685,
4569,
25... | None |
11,375 | 7 | Agiloft:agiloft agiloft inc. technology company specializing business process management software redwood city california originally founded october 1990 integral solutions corporation colin earl agiloft started integral solutions corporation founded colin earl 1990 company worked development projects corporations developing software 1996 called supportwizard supportwizard designed help desk application 1999 officially supported mysql integral solutions continued build application adding call center crm functionality time company known name supportwizard software 2003 announced new revision software operating j2ee framework called enterprise wizard 2007 company offered platform version software called saaswizard users could automate business actions customization development continued enterprisewizard application operating top platform allowing users customize program web interface colin earl changed business software name agiloft 2012 2017 earl spoke proposed h1-b reforms stated one workers likelihood getting visa renewed return china agiloft low-code development platform prebuilt modules focus contract management service management platform configured via web-browser dropdown menus drag drop tools configure functions build new applications contract management portion software allows automation creation workflow renewal contracts used healthcare field software pc magazine editor choice award several years | [
3560,
4194,
7022
] | None |
11,376 | 8 | Unicorn_(web_server):unicorn web server unicorn rack http server serve ruby web applications unix environment optimised used nginx based mongrel 1.1.5 unicorn uses master/worker architecture master process forks worker processes control application runs single thread unicorn considered “ one popular servers rails ” twitter starts test unicorn 2010 server shipped discourse system administration expert sam saffron noted unicorn reliable reaps unresponsive workers gitlab also uses unicorn unicorn inspired projects like gunicorn fork run python applications 2018 projects tend favour puma heroku hosting provider recommends since 2015 migrate unicorn puma.. deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing pure cpu situations | [
1920,
4485,
7430,
9229,
7567,
7695,
1937,
7443,
9245,
8350,
7457,
3746,
8994,
2596,
3237,
9125,
11682,
7338,
9387,
44,
7983,
8495,
10800,
11439,
6714,
10622,
11134,
595,
1363,
4439,
3545,
225,
1250,
865,
2404,
4837,
6379,
5612,
9580,
2287... | None |
11,377 | 1 | Global_serializability:global serializability concurrency control databases transaction processing transaction management transactional distributed applications global serializability modular serializability property global schedule transactions global schedule unified schedule individual database transactional object schedules multidatabase environment e.g. federated database complying global serializability means global schedule serializable serializability property component database module serializable schedule well words collection serializable components provides overall system serializability usually incorrect need correctness across databases multidatabase systems makes global serializability major goal global concurrency control modular concurrency control proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones well increase systems management sophistication need atomic distributed transactions thus effective global serializability techniques ensure correctness among distributed transactional applications seems increase federated database system loosely defined multidatabase system typically distributed communication network transactions span multiple possibly distributed databases enforcing global serializability system different databases may use different types concurrency control problematic even every local schedule single database serializable global schedule whole system necessarily serializable massive communication exchanges conflict information needed databases reach conflict serializability globally would lead unacceptable performance primarily due computer communication latency achieving global serializability effectively different types concurrency control open several years commitment ordering commit ordering co serializability technique publicly introduced 1991 yoav raz digital equipment corporation dec provides effective general solution global conflict serializability across collection database systems transactional objects possibly different concurrency control mechanisms co need distribution conflict information rather utilizes already needed unmodified atomic commitment protocol messages without communication databases also allows optimistic non-blocking implementations co generalizes strong strict two phase locking ss2pl conjunction two-phase commit 2pc protocol de facto standard achieving global serializability across ss2pl based database systems result co compliant database systems different concurrency control types transparently join existing ss2pl based solutions global serializability applies also multiple transactional object systems use atomic transactions need global serializability correctness see examples nowadays need smaller database systems origin atomic transactions significant aspects co make uniquely effective general solution global serializability following aspects except first two also possessed popular ss2pl constrained blocking special case co inherits many co qualities difficulties described translate following problem lack appropriate solution global serializability problem driven researchers look alternatives serializability correctness criterion multidatabase environment e.g. see relaxing global serializability problem characterized difficult open following two quotations demonstrate mindset end year 1991 similar quotations numerous articles commitment ordering publicly introduced may 1991 see provides efficient elegant general solution practical theoretical points view global serializability problem across database systems possibly different concurrency control mechanisms provides conflict serializability negative effect availability worse performance de facto standard global serializability co special case strong strict two-phase locking ss2pl requires knowledge neither local global transactions commitment ordering solution comprises effective integration autonomous database management systems possibly different concurrency control mechanisms local global transactions execute parallel without restricting read write operation either local global transactions without compromising systems autonomy even later years public introduction commitment ordering general solution 1991 problem still considered many unsolvable quotation 1997 article proposing relaxed global serializability solution see relaxing global serializability referencing commitment ordering co articles co solution supports effectively full acid properties full local autonomy well meeting requirements posed problem statement section apparently misunderstood similar thinking see also following quotation 1998 article also quoted article proposes relaxed global serializability solution referencing co work co solution global serializability bridges different concurrency control protocols substantial concurrency reduction typically minor maintains autonomy local dbmss evidently also co misunderstood misunderstanding continues 2010 textbook authors relaxed global serializability technique two level serializability emphasized described detail co mentioned hand following quotation co appears 2009 book characteristics properties co solution discussed several solutions partial proposed global serializability problem among problem global serializability quite intensively researched subject late 1980s early 1990s commitment ordering co provided effective general solution problem insight understanding possible generalizations strong strict two phase locking ss2pl practically almost exclusively utilized conjunction two-phase commit protocol 2pc since 1980s achieve global serializability across databases important side-benefit co automatic global deadlock resolution provides applicable also distributed ss2pl though global deadlocks important research subject ss2pl automatic resolution overlooked except co articles today 2009 time quite many commercial database system types existed many non-relational databases relatively small multi database systems considered key database scalability database systems interoperability global serializability urgently needed since tremendous progress computing power storage communication networks resulted orders magnitude increases centralized databases sizes transaction rates remote access database capabilities well blurring boundaries centralized computing distributed one fast low-latency local networks e.g. infiniband together progress database vendors distributed solutions primarily popular ss2pl 2pc based de facto standard allows interoperability among different vendors ss2pl-based databases ss2pl 2pc technologies gained substantial expertise efficiency workflow management systems database replication technology cases provided satisfactory sometimes better information technology solutions without multi database atomic distributed transactions databases different concurrency control bypassing problem result sense urgency existed problem period general high-performance distributed atomic transactions databases different concurrency control types reduced however need concurrent distributed atomic transactions fundamental element reliability exists distributed systems also beyond database systems need global serializability fundamental correctness criterion transactional systems see also distributed serializability serializability proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones sophisticated systems management need effective global serializability techniques ensure correctness among distributed transactional applications seems increase thus also need commitment ordering including popular databases special case ss2pl ss2pl though meet requirements many transactional objects commitment ordering commit ordering co high-performance fault tolerant conflict serializability providing solution proposed fully distributed central computing component data-structure needed general mechanism combined seamlessly local database concurrency control mechanism see technical summary since co property schedule necessary condition global serializability autonomous databases context concurrency control provides general solution autonomous databases i.e. autonomous databases comply co global serializability may violated seemingly sheer luck co solution possesses many attractive properties overhead incurred co solution locally detecting conflicts already done known serializability mechanism pessimistic optimistic locally ordering database system local commits local transactions voting atomic commitment global transactions overhead low net effect co may delays commit events never delay ss2pl average less makes co instrumental global concurrency control multidatabase systems e.g. federated database systems underlying theory commitment ordering part serializability theory sound elegant even mathematically beautiful referring structure dynamics conflicts graph cycles deadlocks interesting implications transactional distributed applications qualities co list except first three also possessed ss2pl special case co blocking constraining partially explains popularity ss2pl solution practically solution many years achieving global serializability however property 9 automatic resolution global deadlocks noticed ss2pl database research literature today 2009 except co publications since phenomenon voting-deadlocks environments automatic resolution atomic commitment protocol overlooked existing database systems including major commercial database systems strong strict two phase locking ss2pl based already co compliant thus participate co based solution global serializability multidatabase environments without modification except popular multiversioning additional co aspects considered achieving global serializability across ss2pl based databases using atomic commitment primarily using two phase commit 2pc employed many years i.e. using co solution specific special case however reference known prior co notices special case automatic global deadlock resolution atomic commitment protocol augmented-conflict-graph global cycle elimination process virtually existing distributed transaction processing environments supporting products rely ss2pl provide 2pc matter fact ss2pl together 2pc become de facto standard solution homogeneous concurrency control one suboptimal serializability strictness needed see strict commitment ordering sco still quite effective cases sometimes cost increased computing power needed relatively optimum however better performance relaxed serializability used whenever applications allow allows inter-operation among ss2pl-compliant different database system types i.e. allows heterogeneity aspects concurrency control ss2pl constraining schedule property takes combined property example combined optimistic property result optimistic anymore rather characteristically ss2pl hand co change data-access scheduling patterns combined property characteristics remain unchanged since also co uses atomic commitment e.g. 2pc achieving global serializability ss2pl co compliant database system transactional object transparently join existing ss2pl based environments use 2pc maintain global serializability without environment change makes co straightforward natural generalization ss2pl conflict serializability based database system practical purposes commitment ordering quite widely known inside transaction processing databases communities digital equipment corporation dec since 1990 company confidentiality due patenting approach transaction management converging grid computing cloud computing see history commitment ordering techniques developed relaxed global serializability i.e. guarantee global serializability see also relaxing serializability among several publications local database system relaxed serializability methods compromise serializability performance gain utilized application tolerate possible resulting inaccuracies integrity unharmed unclear various proposed relaxed global serializability methods compromise global serializability provide performance gain commitment ordering guarantees global serializability typically declared intention methods performance gain effective global serializability methods apparently unknown inventors rather correctness criteria alternatives due lack known effective global serializability method oddly introduced years co introduced even quote co without realizing provides effective global serializability solution thus without providing performance comparison co justify alternatives global serializability applications e.g. two-level serializability two-level serializability even presented major global concurrency control method 2010 edition text-book databases authored two original authors two-level serializability one avi silberschatz also author original strong recoverability articles book neither mentions co references strangely apparently consider co valid global serializability solution another common reason nowadays global serializability relaxation requirement availability internet products services requirement typically answered large scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo alike global serializability relaxed compromised eventual consistency case relaxation done applications expected harmed classes schedules defined relaxed global serializability properties either contain global serializability class incomparable differentiates techniques relaxed global conflict serializability rgcsr properties relaxed conflict serializability rcsr properties rgcsr typically different way global cycles span two databases global conflict graph handled distinction global local cycles exists rcsr properties rgcsr rcsr contains rgcsr typically rgcsr techniques eliminate local cycles i.e. provide local serializability achieved effectively regular known concurrency control methods however obviously eliminate global cycles would achieve global serializability | [
10048,
5441,
4194,
5956,
11620,
3398,
9069,
11377,
8979,
2901,
7446,
7802,
1049,
5658,
1083,
7581
] | None |
11,378 | 7 | Visual_Risk:visual risk visual risk treasury management software provider consulting company headquartered sydney australia visual risk part gtreasury software services gtreasury name company provides treasury risk management software specializes market risk management visual risk one australia original fintech companies company treasury software provider visual risk founded richard hughes paul nailand headquartered sydney richard hughes paul nailand currently serve managing directors visual risk december 2015 visual risk best risk management solution treasury management international 2015 awards awards considered benchmark industry april 2018 gtreasury acquired visual risk integrated visual risk risk management software offering bolster existing treasury cash management tool visual risk modular treasury risk management system consists five modules risk analytics asset-liability management treasury management hedge accounting cash liquidity modular system used separately fully integrated system addition visual risk provides reporting dashboard software deployed either locally via cloud 2014 visual risk partnered kpmg australia visual risk analyze kpmg hedging transactions client exposures | [
4194
] | Test |
11,379 | 4 | Intrusion_tolerance:intrusion tolerance intrusion tolerance fault-tolerant design approach defending information systems malicious attack abandoning conventional aim preventing intrusions intrusion tolerance instead calls triggering mechanisms prevent intrusions leading system security failure | [
7085
] | Train |
11,380 | 3 | Contra_(video_game):contra video game according japanese promotional materials contra set distant future year 2633 a.d. evil red falcon organization set base fictional galuga archipelago near new zealand plot wipe humanity two commandos bill rizer lance bean earth marine corp contra unit elite group soldiers specializing guerrilla warfare sent island destroy enemy forces uncover true nature alien entity controlling promotional materials us arcade version downplays futuristic setting game manual later nes home computer versions changing game setting future present day location galuga amazon jungle contra employs variety playing perspectives include standard side view pseudo-3d view player proceeds shooting moving towards background addition left right fixed screen format player gun aimed upwards default two people play simultaneously one player bill blond-haired commando white tank top blue bandanna player lance shirtless dark-haired commando red bandanna controls consists eight-way joystick two action buttons shooting left jumping right one protagonists jumps curls somersault instead conventional jump like games joystick controls player movement walking jumping also aiming side view stages player shoot leftward rightward upward standing well horizontally diagonally running player also shoot eight directions including downwards jumping pressing joystick downwards standing cause character lie stomach allowing avoid enemy fire shoot low targets jump button pressed crouching higher platform player drop lower level player default weapon rifle unlimited ammunition upgraded one four guns obtained destroying pill box sensors flying item capsules containing defeating red-clad guards enemy bases consist machine gun fires rapidly fire button held laser gun shoots powerful beam fireball gun shoots rounds corkscrew pattern spread gun shoots five individual bullets individual directions also two auxiliary power-ups appear certain areas player armed default gun rapid bullets upgrade increases firing speed player shots barrier makes invulnerable limited period exception machine gun laser gun item comes form falcon-shaped symbol marked letter representing function f r b arcade version contra consists seven stages number stages level structures varies later versions first stage side-scrolling level player dropped jungle must fend enemy initial line defense reaching entrance first base must destroy large sensor enter base game switches 3d view second stage player character must fight way series passageways inside base time runs display top screen shows map base time remaining player must destroy generator side passageway order deactivate electric current preventing access third stage set core base fixed screen player must destroy enemy defense system order expose final target giant eyeball shoots fireballs stages 4 6 proceed similarly first three stages stage 4 vertical-scrolling level player must jump way top waterfall reaching entrance second base player must destroy large diamond-shaped sensor guarded defense system order clear stage stage 5 another 3d stage set inside another base stage 6 another boss battle time pair heads split two images heads damaged split images aligned together seventh final stage returns side-scrolling format first stage player fights way enemy final line defense includes hovercraft armored trucks giant helmeted soldiers proceeding areas snowfield energy plant hangar reaching alien lair regular enemy soldiers replaced otherworldly creatures player must fight giant alien head spawns larvae mouth reaching final target heart-like creature must destroyed order complete mission player loses life character bill lance gets touched enemy enemy bullet fails complete base stage time limit falls bottom screen visible platform happens revert default weapon next life losing lives player continue inserting coins necessary pressing start three times second player join-in anytime one player loses lives must wait player loses lives well continue together arcade game released three versions japanese american versions virtually identical aside japanese version using kanji characters spell game title however european version titled gryzor allows two players play game alternating rather simultaneously license konami ocean software produced ports contra title gryzor zx spectrum commodore 64 amstrad cpc released europe 1988 commodore 64 version released north america contra title ocean ports patterned original arcade version game ibm pc version developed banana development inc released north america version released europe gryzor name cover illustration ocean gryzor ports bob wakelin inspired different poses actor arnold schwarzenegger film predator illustration later used packaging nes version well msx2 version contra released nintendo entertainment system north america february 1988 version produced in-house konami features several differences arcade release order better suit nes hardware example sprites effects like explosions shown 30fps instead 60fps work around sprite limitations system another game use technique recca famicom version contains cutscenes additional music track environment effects removed nes version game played one two players due graphical limitations nes bill lance lost individualized character designs instead depicted shirtless commandos distinguished colors pants blue pants first player red pants second one player loses lives given option use player stock keep fighting power-up icons machine gun laser gun also changed represented letter-based falcon symbols l used weapons rapid bullets barrier power-ups also common version since unlike arcade game flying item capsules appear regardless weapon player character currently posseses nes version introduces seventh item clears screen on-screen enemies obtained nes version recomposes 7 stages arcade version 8 stages stages 2 3 combined one stage resulting renumbering waterfall level stage 4 stage 3 stages 5 6 combined new stage 4 final four stages nes version snowfield energy zone hangar alien lair based different areas featured arcade version final stage level designs drastically different arcade version two base stages example stage 2 4 longer maze-like structures time limit involved boss waterfall stage also changed diamond-shaped sensor alien statue contra one early nes games feature konami code inputting code title screen starts player thirty lives instead usual three cheat effect well player runs lives uses continue retry stage contra released famicom japan february 9 1988 gameplay remains identical nes version released around month famicom version custom-made multi-memory controller konami produced called vrc2 contrast unrom board used nes counterpart allowed inclusion cut-scenes graphical effects possible nes version game begins prologue sequence explaining game backstory followed map galuga archipelago shown start every stage indicate player progress cut-scenes also shown stages depicting bill lance giving status report current situation headquarters later stages shooting gun towards screen ending sequence also slightly different player holds select start buttons credits sequence secret message displayed konami logo differences include addition sound test mode added background animations certain stages windblown palm leaves stage 1 snowstorm stage 5 different stage clear jingle player clears final stage level select cheat code probotector modified version nes contra released pal region december 28 1990 version redesigns human protagonists enemy characters give robotic appearance done circumvent bpjm censorship laws germany prohibits sales violent video games minors subsequent contra games home consoles followed suit released pal region probotector title featuring similar modifications beginning konami abandoned probotector title localized games minimal changes msx2 version contra released konami exclusively japan may 26 1989 msx2 version greatly differs arcade nes versions due hardware limitations msx2 game scroll instead uses flip-screens like msx2 games metal gear vampire killer game uses scc sound chip rather one-hit kills energy gauge allows bill rizer take one shot hit losing life two main power-ups msx2 version falcon-shaped power-up increases player walking shooting speed well gun-shaped power-up allows player change current weapon picking weapon power-up player choose default normal gun four weapons spread gun featured version replaced rear gun similar tailgun gradius ii fires two directions time msx2 version contra composed 19 stages stages 1 6 drawn directly arcade version whereas stages 7 9 based different areas featured final stage arcade version matter similar final four stages nes version stages 10 19 new version take place primarily underground facility underneath galuga archipelago unlike arcade nes versions msx2 version single-player lance bean appear form continuation feature player loses lives game immediately however game master ii utility cartridge used save progress via s-ram backup feature much game popularity came two-player simultaneous gameplay uncommon feature video games time contra release successful arcades game became remained widely popular remembered ported nintendo entertainment system 1988 allgame editor skyler miller praised contra touting game became standard future platform shooters would judged japanese gaming magazine famitsu gave famicom nes version game score 27 40 computer gaming world called contra nes truly outstanding action epic set scrolling beautifully drawn playfield ms-dos version game reviewed 1989 dragon hartley patricia kirk lesser role computers column contra voted gaming website ign toughest game beat nintendo power ranked seventh best nes game calling one best multiplayer nes games gamesradar ranked 10th best nes game ever made considering possibly superior arcade version game informer also included list best games ever number 13 staff noted revolutionary fun 2017 contra ranked 82nd scientifically proven best video games time statistical meta-analysis compiled warp zoned 44 top games lists published 1995 2016 contra followed super contra year later contra sequel arcades developed in-house konami following success nes adaptations original sequel retitled super c american release subsequent sequels would produced specifically home console market super nes genesis becoming one konami landmark series series 11 installments music arcade version contra one soundtracks included video game album konami game music vol.4 jax released alfa records may 10 1988 cd catalog 28xa-201 cassette alc-22922 vinyl alr-22922 april 2017 beijing starlit movie tv culture announced producing live-action film version contra china wei nan listed screenwriter project scheduled release june 6 2018 meet release date | [
5538,
3561,
10316,
6797,
9006,
9166,
1776,
8819,
10931,
4405,
11477
] | Test |
11,381 | 2 | Input/Output_Supervisor_Block:input/output supervisor block input/output supervisor block iosb data structure employed exclusively start input/output interface mvs/370 successor ibm mainframe operating systems iosb describes i/o request passes parameters receives responses input/output supervisor ios iosb always paired service request block srb srb schedules processor activity required available processor connection i/o request although i/o operation may initiated another processor distinction allowed example effective use so-called attached processors processors connected i/o devices common early days mvs/370 installations requirements data processing power e.g. processor accesses also called cpu-bound applications perhaps i/o processing power e.g. disk tape accesses also called i/o-bound applications | [
11656,
11131,
7195,
7983
] | Test |
11,382 | 6 | Nasan:nasan nasan clustered file system shared disk file system created company dataplow nasan software enables high-speed access shared files located shared storage area network san -attached storage devices utilizing high-performance scalable data transfers inherent storage area networks manageability network attached storage nas nasan derives name combination network attached storage nas storage area network san nasan clustered file sharing extension traditional lan file sharing yet utilizes storage area networks data transfers deploying nasan cluster entails configuring lan file sharing installing nasan file system software connecting computers storage devices san supports linux solaris operating systems supports san-based block-level storage protocols including fibre channel iscsi | [
2314,
823,
7983,
7863,
2395
] | Test |
11,383 | 2 | Nano-RK:nano-rk nano-rk wireless sensor networking real-time operating system rtos real-time operating system rtos carnegie mellon university designed run micro-controllers use sensor networks nano-rk supports fixed-priority fully preemptive scheduler fine-grained timing primitives support real-time task sets nano implies rtos small consuming 2 kb ram using 18 kb flash rk short resource kernel resource kernel provides reservations often system resources consumed example task might allowed execute 10 ms every 150 ms cpu reservation node might allowed transmit 10 network packets per minute network reservation reservations form virtual energy budget ensure node meets designed battery lifetime well protecting failed node generating excessive network traffic nano-rk open source written c runs atmel-based firefly sensor networking platform micaz motes well msp430 processor following article discusses tradeoffs associated using rtos sensor networks nanork takes advantage priority-based preemptive scheduling help honor real-time factor deterministic thus ensuring task timeliness synchronization due characteristic limited battery power wireless node nano-rk provides cpu network sensor efficiency use virtual energy reservations labeling system resource kernel energy reservations enforce energy communication budgets minimize negative impact node ’ operational lifetime unintentional errors malicious behavior nodes within network supports packet forwarding routing network scheduling protocols help light-weight wireless networking stack compared current sensor operating systems nano-rk provides rich functionality timeliness scheduling small-footprint embedded resource kernel rk static configuration nano-rk uses static design-time approach energy usage control dynamic task creation disallowed nano-rk requiring application developers set task reservation quotas/priorities static testbed design design allows developers create energy budget task order maintain application requirements well energy efficiency throughout system ’ lifetime using static configuration approach runtime configurations well power requirements predefined verified designer system deployed executed real world approach also helps guarantee stability small-footprint characteristics compared traditional rtoss watchdog timer support watchdog software timer triggers system reset action system hangs crucial faults extended period time watchdog mechanism bring system back nonresponsive state normal operation waiting timer goes subsequently rebooting device nano-rk watchdog timer tied directly processor ’ reset signal reboot error default enabled system boots reset time scheduler executes system fails respond within predefined time period system reboot run initialization instruction sequence hopefully regain control deep sleep mode another feature nano-rk deep sleep mode energy efficiency reasons eligible tasks run system powered given option enter deep sleep mode system deep sleep mode deep sleep timer wake system predefined latency period waking deep sleep mode next context swap time set guarantee cpu wakes time sensor node wish perform deep sleep also presented choice go low energy consumption state still managing peripherals nano-rk implemented double-linked list ready queue nodes within fixed-size array termed ready queue orders ready tasks decreasing order whichever task ’ priorities higher number tasks running within nano-rk implementation statically-configured testbed deployment ready queue size also fixed number tasks ready run fixed-length array named nrk readyq found within nrk defs.h file along two pointers reference two important cells within array free node pointer free node head node pointer head node point next cell array allocated current highest priority task ready run respectively core nano-rk static preemptive real-time scheduler priority-based energy efficient priority-based preemptive scheduling scheduler always selects highest priority task ready queue save energy tasks poll resource rather tasks blocked certain events unlocked events occur task ready queue system powered save energy system working one one task current task signified nrk cur task tcb running predefined period important job scheduler decide task run next long next task run scheduler triggered run | [
10883,
6276,
11267,
9366,
7319,
2201,
9628,
7341,
10030,
7983,
2045,
6207,
321,
10561,
1221,
2117,
8262,
9927,
6985,
9162,
341,
10590,
6624,
5603,
5220,
1253,
1126,
10482,
3197
] | Test |
11,384 | 3 | Colossus_Chess:colossus chess colossus chess series chess-playing computer programs developed martin bryant commercially available various home computers 1980s bryant started colossus chess 1983 using white knight mk 11 program winner 1983 european microcomputer chess championship basis developed apple ii first commercially released commodore 64 colossus chess 2.0 cds micro systems 1984 number releases 8-bit microcomputers followed version 3.0 released 1984 atari 8-bit family computers published english software followed 4.0 1985 released formats day published cds per games time acorn electron implementation required part screen memory used working space colossus chess featured time-controlled play game clocks opening book 3,000 positions problem-solving mode could solve normal mates selfmates helpmates pondering opponent time three-dimensional chessboard introduced colossus chess 4.0 releases written assembly language appropriate cpu zx spectrum version could examine average 170 positions per second uncommon microcomputer chess programs era colossus full implementation rules chess including underpromotion fifty-move rule draw repetition draw insufficient material colossus also able execute basic checkmates including difficult bishop knight checkmate program subsequently ported atari st 1988 amiga 1989 ibm pc 1990 title colossus chess x new releases featured four chess sets enhanced graphics developed assistance gary thomlinson carl cropley opening book extended 11,000 positions program ability learn past playing experiences work done colossus chess 1991 2005 martin bryant created completely new freely available windows version conforming universal chess interface written c converted c speed finally publicly released 2006. latest version 2008b info gave colossus chess iv commodore 64 three stars five stating less attractive darn sight playable chessmaster 2000 keyboard joystick controls magazine warned difficulty remembering shifted keyboard control sequences ... badly need quick-reference card | [
1248,
477,
3722,
8429,
9006,
10862,
11384,
11033,
2045
] | None |
11,385 | 9 | GNU_Data_Language:gnu data language gnu data language gdl free alternative idl interactive data language together library routines gdl developed serve tool data analysis visualization disciplines astronomy geosciences medical imaging gdl licensed gpl open-source numerical data analysis tools similar gdl include gnu octave ncar command language ncl perl data language pdl r scilab scipy yorick gdl language dynamically-typed vectorized object-oriented programming capabilities gdl library routines handle numerical calculations e.g fft data visualisation signal/image processing interaction host os data input/output gdl supports several data formats netcdf hdf v4 v5 grib png tiff dicom graphical output handled x11 postscript svg z-buffer terminals last one allowing output graphics plots saved raster graphics formats gdl features integrated debugging facilities breakpoints gdl python bridge python code called gdl gdl compiled python module gdl uses eigen c++ library numerical library similar intel mkl excellent computing performance multi-cores processors better benchmark idl large matrix operations packaged versions gdl available several linux bsd flavours well mac os x source code compiles microsoft windows since gdl 0.9.3 unix systems including solaris gdl official gnu package | [
8611,
5703,
5833,
8554,
6797,
462,
8079,
9714,
8628,
11126,
823,
7580
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.