node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
11,386
8
Roxen_(web_server):roxen web server roxen free software web server produced roxen internet software company based linköping sweden named nearby lake roxen released gnu general public license roxen originally appeared spinner mid-1990s written ulpc pike heyday roxen used large companies realnetworks granada media xmission mci roxen many aspects ahead time featuring web-based graphical user interface gui administration interface loadable modules could written several languages including pike later java dynamic content generation comprehensive caching system replication systems multi-headed servers embedded sql server data-heavy server operations well broad support databases roxen built meet needs content creators rxml roxen macro language server-side scripting language integrated roxen language capabilities scripting languages like perl html-like syntax makes familiar content creators many roxen sites developed using mvc pattern notable tags include roxen modules typically provide functionality extending rxml rxml tags contain inline documentation used fill online manual included roxen documentation site every default server installation rxml also provides variable system variables exist within domain scope e.g form fields passed query accessible form.fieldname user defined variables stored var scope unfortunately attempt explain two methods variable instantiation documentation confuses people cases variables referred name also possible instantiate insert value variable anywhere in- out-side tags/markup using xml entity-style markup e.g page.path optionally one specify encoding/escaping instance e.g form.username mysql insert user-submitted value form safely sql database page.path js make variable javascript safe
[ 1920, 4485, 7430, 10506, 9229, 7567, 7695, 1937, 7443, 1556, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 5677, 10413, 11439, 10800, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 7646, 225, 1250, 865, 2404, 4837, 71...
Test
11,387
5
Certificate_Management_Protocol:certificate management protocol certificate management protocol cmp internet protocol used obtaining x.509 digital certificates public key infrastructure pki described one two protocols far use certificate request message format crmf described protocol certificate management cms cmc described obsolete version cmp described respective crmf version cmp messages encoded asn.1 using der method usually transported http certificate authority ca issuing legal certificates acts server pki using cmp one clients obtaining digital certificates means protocol called end entity ee none number registration authorities ra used mediate ees ca end entity utilize cmp obtain certificates ca done initial registration/certification key pair update certificate update message sequence means revocation request also get one certificates revoked using cross-certification request ca get certificate signed another ca case end entity lost private key stored ca might recovered requesting key pair recovery several means transportation foreseen conveying cmp messages content-type used application/pkixcmp older versions draft used application/pkixcmp-poll application/x-pkixcmp application/x-pkixcmp-poll
[ 5470, 7364, 517, 1836, 10924, 10831, 6704, 6993, 7985, 9909, 2904, 5469, 4797, 62 ]
Test
11,388
2
Hyperbola_GNU/Linux-libre:hyperbola gnu/linux-libre hyperbola gnu/linux-libre operating system i686 x86-64 architectures based arch snapshots debian development includes gnu operating system components linux-libre kernel instead generic linux kernel hyperbola gnu/linux-libre listed free software foundation completely free operating system true free system distribution guidelines hyperbola born 17th annual fórum internacional software livre porto alegre brazil 5 august 2017 support systemd dropped favor openrc default init system support init freedom campaign begun devuan 6 december 2018 hyperbola first brazilian distribution recognized completely free project gnu making part fsf list free distributions hyperbola established social contract hyperbola social contract commits project free software community free culture privacy stability follow arch-based system packaging yet principles stability development maintenance debian covenant included gnu free system distribution guidelines hyperbola established packaging guidelines hyperbola packaging guidelines contain collection common issues severity placed development backporting package releases debian patches hyperbola aliases stable releases using galaxy names codenames chosen list nearest known galaxies milky way ascending order distance stable version hyperbola gets released approximately every three years point releases available every months hyperbola release receive two years extra security updates end life eol however point releases made hyperbola release receive five years security support total two ways install hyperbola gnu/linux-libre either scratch using live images migrating existing arch-based system
[ 4611, 3079, 3089, 4113, 8209, 8727, 543, 11297, 3618, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 2125, 1107, 1110, 89, 5721, 4192, 3685, 10860, 5742, 2671, 2180, 2692, 8837, 9353, 9873, 11410, 8857, 10394, ...
Test
11,389
7
Jira_Studio:jira studio jira studio integrated hosted software development suite developed atlassian software systems jira studio included subversion revision control jira issue tracking bug tracking confluence content management jira agile previously known greenhopper agile planning management bamboo continuous integration crucible code review fisheye source code repository browsing jira studio retired february 2013 atlassian cloud offers saas hosted model integrations plugin capability licensed per product jira studio supported atlassian ide connectors eclipse visual studio intellij idea information jira studio could displayed external systems using opensocial gadgets project information could externally accessed using activity streams programmatic access jira studio provided apis based rest java
[ 7983, 5612, 5677, 4919 ]
Train
11,390
2
TENEX_(operating_system):tenex operating system tenex operating system developed 1969 bbn pdp-10 later formed basis digital equipment corporation tops-20 operating system 1960s bbn involved number lisp-based artificial intelligence projects darpa many large era memory requirements one solution problem add paging software lisp language allowing write unused portions memory disk later recall needed one system developed pdp-1 mit daniel murphy joined bbn early dec machines based 18-bit word allowing addresses encode 262-kword memory machines based expensive core memory included nowhere near required amount pager used significant bits address index table blocks magnetic drum acted pager backing store software would fetch pages needed re-write address point proper area ram 1964 dec announced pdp-6 dec still heavily involved mit ai lab many feature requests lisp hackers moved machine 36-bit computing especially useful lisp programming 18-bit address space word storage systems contained two addresses perfect match common lisp car cdr operations bbn became interested buying one ai work became available wanted dec add hardware version murphy pager directly system addition every program system would paging support invisibly making much easier sort programming machine dec initially interested soon 1966 announced fact dropping pdp-6 concentrating solely smaller 18-bit new 16-bit lines pdp-6 expensive complex sold well reasons long became clear dec entering 36-bit business would become pdp-10 bbn started talks dec get paging subsystem new machine known cpu name ka-10 dec terribly interested however one development talks support second virtual memory segment allowing part user address space mapped separate potentially read-only region physical memory additionally dec firm keeping cost machine low possible supporting bare-bones systems minimum 16k words core omitting fast semiconductor register option substituting core cost considerable performance decrease bbn nevertheless went ahead purchase several pdp-10s decided build hardware pager period debate began operating system run new machines strong arguments made continued use tops-10 order keep existing software running minimum effort would require re-write tops support paging system seemed like major problem time tops support number features developers wanted end decided make new system include emulation library would allow run existing tops-10 software minor effort developer team—amongst daniel murphy daniel g. bobrow—chose name tenex ten-extended new system included full virtual memory system—that could programs access full 18 bit address space 262144 words virtual memory every program could time pager system would handle mapping would always copying data backing store needed change needed pager able hold several sets mappings ram store one program using system pager also held access time information order tune performance resulting pager fairly complex filling full-height 19 rackmount chassis one notable feature tenex user-oriented command line interpreter unlike typical systems era tenex deliberately used long command names even included non-significant noise words expand commands clarity instance unix uses codice_1 print list files directory whereas tenex used codice_2 codice_3 command word codice_4 noise added make purpose command clearer relieve users need type long commands tenex used command completion system understood unambiguously abbreviated command words expanded partial command words complete words phrases instance user could type codice_5 escape key point tenex would replace codice_5 full command completion feature also worked file names took effort part interpreter system allowed long file names human-readable descriptions tenex also included command recognition help system typing question mark codice_7 printed list possible matching commands return user command line question mark removed command line completion help live current clis like tcsh tenex became fairly popular small pdp-10 market external pager hardware developed small business early 1970 dec started work upgrade pdp-10 processor ki-10 bbn attempted get dec support complex pager indirect page tables instead dec decided much simpler single-level page mapping system compromise impacted system sales point tenex popular customer-written pdp-10 operating systems would run new faster ki-10s correct problem dec pdp-10 sales manager purchased rights tenex bbn set project port new machine around time murphy moved bbn dec well helping porting project work centered emulating bbn pager hardware combination software ki-10 simpler hardware speed ki-10 compared pdp-6 made possible additionally porting effort required number new device drivers support newer backing store devices used new tenex shipping dec started work kl-10 intended low-cost version ki-10 going stanford university ai programmers many mit alumni working project build pdp-10 ten times faster original ka-10 project evolved foonly line computers dec visited many ideas folded kl-10 project year ibm also announced machine virtual memory making standard requirement computer end kl integrated number major changes system end lower cost start new decsystem-20 would run version tenex default operating system functional upgrades kl-10 processor architecture limited significant new feature called extended addressing modified pager microcode running model b hardware revision enlarge user virtual address space effective address calculations instructions located beyond original 18-bit address space performed 30 significant bits although 23-bit virtual address space supported program code located original 18-bit address space unchanged semantics backward compatibility first in-house code name operating system viros virtual memory operating system customers started asking questions name changed snark dec could truthfully deny project called viros name snark became known name briefly reversed become krans quickly abandoned someone objected krans meant funeral wreath swedish though simply means wreath part story may apocryphal ultimately dec picked tops-20 name operating system tops-20 marketed hacker community mindful origins quickly dubbed twenex portmanteau twenty tenex even though point little original tenex code remained analogously differences v7 unix bsd dec people cringed heard twenex term caught nevertheless written abbreviation 20x also used twenex successful popular fact period early 1980s commanded fervent culture partisans unix its—but dec decision scrap internal rivals vax architecture vms os killed dec-20 put end twenex brief period popularity dec attempted convince tops-20 users convert vms instead late 1980s tops-20 users migrated unix loyal group tops-20 enthusiasts kept working various projects preserve extend tops-20 notably mark crispin panda tops-20 distribution
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 9784, 10809, 7739, 576, 577, 10333, 97, 8298, 7285, 9335, 2168, 1147, 3197, 1150, 2179, 10883, 6797, 9366, 6296, 7325, 9887, 2213, 3248, 6837, 9909, 9911, 8388, 9932, 5840, 7382, 8410, 11488,...
None
11,391
2
Open_Handset_Alliance:open handset alliance open handset alliance oha consortium 84 firms develop open standards mobile devices member firms include htc sony dell intel motorola qualcomm texas instruments google samsung electronics lg electronics t-mobile sprint corporation nvidia wind river systems oha established 5 november 2007 led google 34 members including mobile handset makers application developers mobile carriers chip makers android flagship software alliance first developed google 2007 based open-source license competed mobile platforms apple microsoft nokia symbian hp formerly palm samsung electronics intel tizen bada blackberry part efforts promote unified android platform oha members contractually forbidden producing devices based competing forks android time announcement formation open handset alliance november 5 2007 oha also unveiled android open-source mobile phone platform based linux kernel early look sdk released developers 12 november 2007 first commercially available phone running android htc dream also known t-mobile g1 approved federal communications commission fcc 18 august 2008 became available 22 october year members open handset alliance
[ 9732, 5637, 6, 11271, 3082, 8204, 8719, 3089, 5139, 7700, 9244, 10780, 11294, 10785, 3618, 6180, 1578, 3626, 5677, 8237, 7727, 8242, 9266, 9784, 1083, 10303, 10817, 1602, 6212, 69, 6213, 8262, 8268, 4685, 7246, 3664, 7253, 8280, 3162, 828...
Test
11,392
1
Navicat:navicat navicat series graphical database management development software produced premiumsoft cybertech ltd. mysql mariadb mongodb oracle sqlite postgresql microsoft sql server explorer-like graphical user interface supports multiple database connections local remote databases design made meet needs variety audiences database administrators programmers various businesses/companies serve clients share information partners initial version navicat developed 2001 main target initial version simplify management mysql installations 2008 navicat mysql winner hong kong ict 2008 award year best business grand award best business product gold award navicat cross-platform tool works microsoft windows mac os x linux platforms upon purchase users able select language software eleven available languages english french german spanish japanese polish russian portuguese korean simplified chinese traditional chinese supports linux platform via bundled wine officially released march 2002 windows version navicat mysql became first product offered public premiumsoft subsequently company released two additional versions navicat mysql mac os x linux operating system june october 2003 respectively november 2013 added support mariadb premiumsoft continued expand navicat series releasing navicat postgresql windows october 2005 mac os x june 2006 linux version navicat postgresql would released 3 years later august 2009 august 2008 navicat decided continue product line branch oracle community creating navicat oracle windows mac august following year followed version linux platform oracle version navicat supports latest oracle objects features including directory tablespace synonym materialized view trigger sequence type etc navicat sqlite released windows mac os x simultaneously april 2009 linux version soon followed two months later june year april 2010 navicat premium began including navicat sqlite starting version 9 expand usability navicat premium navicat sql server released november 2010 windows platform mac os x also release sql server version included premium version navicat january 2011 support sql azure added navicat mariadb released november 2013 windows mac os x linux also release mariadb version included navicat premium navicat mysql 2018 navicat started support nosql databases mongodb currently newest addition list server navicat supports new line product called navicat mongodb released july 2018 windows mac os x linux provides native environment mongodb management supports extra features like mapreduce gridfs buckets also release mongodb version included navicat premium 2009 premiumsoft released navicat premium series navicat software combines previous navicat versions single version connect different database types including mysql oracle postgresql simultaneously allowing users data migration cross databases navicat premium version also supports cross-platform administration serving windows mac os x linux april 2010 version 9 navicat premium released added connectivity sqlite database navicat premium allowing navicat premium connect mysql oracle postgresql sqlite single application november 2010 support microsoft sql server added january 2011 sql azure included november 2013 added support mariadb july 2018 added support mongodb navicat essentials officially released november 2011 simple navicat version commercial use essentials editions navicat lack several features found standard/enterprise editions including form view record filtering visual query building data modeling options import export backup data etc navicat data modeler windows version officially released march 2012 mac os x linux version released may 2012 june 2012 standalone product developers create data models mysql sql server oracle postgresql sqlite databases navicat data modeler allows users visually design database structures perform reverse/forward engineer process import table structures odbc data sources generate sql files print models files etc june 2015 added support mariadb databases several features model conversion physical/logical/conceptual model types navicat cloud august 2014 premiumsoft released new product navicat ios database administration tool developed ios features included object viewer designer query builder editor navicat cloud server monitor etc mysql supported first release navicat postgresql ios version released january 2015 september 2017 navicat mariadb ios version released navicat cloud cloud service users synchronize connection settings queries models virtual groups multiple platforms devices user share project others collaborating connection settings queries models navicat monitor officially released april 2018 safe simple agentless remote server monitoring tool supports monitor mysql mariadb cloud databases users access navicat monitor anywhere via web browser main features navicat monitor including real-time instance performance monitoring alert notification query analyzer replications monitoring navicat features include differences features available across operating systems navicat also compatible forks mysql drizzle ourdelta percona navicat supports cloud databases like amazon rds amazon aurora amazon redshift sql azure oracle cloud google cloud alibaba cloud navicat community provides flexible environment navicat users post questions share experiences solutions includes forum discussions blog articles tutorial videos wiki faq
[ 8195, 4236, 6797, 10258, 11030, 4504, 7453, 1950, 9503, 5546, 7339, 10413, 5295, 7983, 9010, 823, 10681, 6721, 5960, 5198, 7506, 853, 9687, 9177, 8539, 10459, 10340, 6245, 8295, 8683, 5612, 2413, 7022, 3188, 8181, 10873, 2810 ]
Test
11,393
7
GigaSpaces:gigaspaces gigaspaces technologies inc. privately held israeli software company established 2000 headquarters located new york city additional offices europe asia gigaspaces founded 2000 nati shalom company cto also co-founder member israeli grid consortium israeli non-profit organization focused grid computing virtualization cloud computing technology gigaspaces initially focused products provide distributed computing extreme transaction processing february 2012 additional open source platform service called cloudify cloud computing technology made generally available established gigaspaces focused application platforms java .net environments based software architecture pattern space-based architecture borrowing concepts jini javaspaces specifications providing linear scalability stateful high-performance applications using tuple space paradigm gigaspaces extreme application platform xap distributed in-memory data-grid suited high performance low-latency transaction processing well real-time analytics use cases xap performance achieved maximizing utilization ram ssd main data store commonly used speed existing database performance scalability include built-in synchronization rdbs mysql well new databases mongodb cassandra etc xap designed serve system record data maintains therefore supports features databases complex queries transaction support etc among main features support wide range data models starting simple key value api advance aggregation object graph sql support flash provides high speed data store device xap uses combination ram flash handle speed cost requirements flash support known xap memoryxtend provides 50x capacity pure ram number machines memcache used side cache read mostly scenarios provides limited query support high availability transaction support etc xap used speed read write operations serves system record xap provides functionality expected database including transactional support new nosql solutions used alternative database traditional rdbms nosql databases use combination eventual consistency scale-out model handle scalability performance xap hand designed address existing database scalability performance fronting database in-memory data-store in-memory data-store provides high speed data access portion data needs includes built-in synchronization nosql rdbms type databases load data upon recovery keep database sync data gets updated architecture perspective lot similarities xap nosql databases use scale-out model handle scalability unlike nosql xap uses highly consistent transactional data access therefore serve high-speed transactional front-end nosql backend databases days xap used complex event processing real-time business intelligence big data xap replicate data relational database non-relational nosql database enabling data replication across remote sites wan disaster recovery also cloud-ready cloudify open source cloud computing platform service started february 2012 gigaspaces technologies inc. cloudify takes advantage underlying infrastructure iaas recipe-based model enable deployment application onto cloud without change application code architecture recipe provides execution plans installing starting orchestrating monitoring application stack gigaspaces also active participant open source projects compass project cloudify adjusts server usage according demand using load balancing middleware cloudify applies devops principle describing aspect production environment code configuration cloudify designed large degree lessons earlier generation paas solution earlier generation solution took cautious decision bind specifically amazon chose java primary language choice lot maturity cloud market time availability tools frameworks since rapid advancement almost every front changed entire landscape starting cloudify 2.2 cloudify supports chef technology deploy configure application services chef provides multi-platform framework configuring operating systems services complements cloudify recipes handling scope intra-machine configurations using chef lifecycle services simplified chef takes care keeping service configurations up-to-date current specifications defined roles cookbooks cloudify partnered ibm infosphere biginsights cloudify enables biginsights run consistently additional big data services nosql databases simplifying systems deployments consistent management well improving cost efficiency cloud enablement portability support cloudify consistent management refers specifically consistent deployment configuration management across stack applies deployment phase also post-deployment including failover scaling upgrades accomplished cloudify built-in recipe mechanism gigaspaces technologies recognized industry technology contributions several times including third place deloitte fast 50 award 2008 finalists venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 red herring top 100 europe 2012 well 2012 sd times 100 software development superfecta cloud leader
[ 8122, 4194, 5956, 9286, 5772, 5677, 7628, 50, 6514, 3573, 7802, 9782, 5658 ]
Test
11,394
2
The_GNOME_Project:gnome project gnome project community behind gnome desktop environment software platform upon based consists software developers artists writers translators contributors active users gnome part gnu project august 2000 gnome foundation set deal administrative tasks press interest act contact point companies interested developing gnome software directly involved technical decisions foundation coordinate releases decide projects part gnome membership open anyone made non-trivial contribution project members foundation elect board directors every november candidates positions must members gnome project holds several community programs events usually tailored local users developers main gathering gnome contributors gnome users developers european conference guadec annual conference used discuss development progress gnome idea guadec events attributed gnome developers users paris meeting 1998 annual asian conference called gnome.asia also exists gnome also participated desktop summit joint conference organized gnome kde communities held europe 2009 2011 among project community programs outreachy established goals increasing women participation improving resources available newcomers getting involved gnome gnome project actively collaborates free software projects previous collaboration efforts ordinarily organized project-to-project basis make collaboration broader freedesktop.org project founded project focuses
[ 2955, 6413, 10255, 8848, 9872, 3859, 7450, 1822, 6691, 6694, 8621, 9908, 823, 3649, 708, 3015, 4177, 5095, 4459, 3189 ]
Test
11,395
3
Mitsubishi_740:mitsubishi 740 mitsubishi 740 also known melps 740 series 8-bit cmos microcontrollers microprocessors enhanced mos technology 6502 compatible core based expanded wdc 65c02 ics manufactured mitsubishi electric 1980s 1990s 740 family primarily intended single-chip implementations included optional ram rom eprom on-die additions included variety optional timers input/output lines many features estimated around 600 variations could ordered 2002 mitsubishi hitachi merged chip divisions form renesas technology 2010 nec electronics produce renesas electronics 740 family properly known renesas 740 1984 first 740-series part m50740 appeared 1984 mitsubishi single-chip microcontroller databook manufactured mitsubishi electric research needed determine exact date m50740 announced 1998 reported edn magazine melps 740 family 600 different variations 2002 mitsubishi electric hitachi agreed merge chip operations new 7 billion semiconductor company called renesas technology companies said would move respective semiconductor operations renesas including microcomputer logic analog discrete devices memory flash memory sram etc exception drams renesas technology established april 1 2003 joint venture hitachi 55 mitsubishi electric 45 2009 renesas technology nec electronics reached basic agreement merge april 1 2010 two merged renesas electronics though legacy mitsubishi parts longer manufactured 740 instruction set still alive newer renesas microcontroller series 38000/740 series 7200 series mitsubishi 740 family processor core executes superset 6502 instruction set including many extensions added 65c02 core set new instructions common across 740 family members plus instructions exist specific parts major change 740 family compared 65c02 addition new processor status flag formerly unused bit 6 set 1 x register acted zero page address second operand instructions using zero page addressing allowed program select location zero page act sort second accumulator setting x register point removing address instruction format instance 6502 codice_1 adds contents zero-page memory location addr value accumulator using reduced single byte codice_2 improves code density avoids memory cycle needed read address value flag set cleared using new codice_3 codice_4 instructions members 740 family addresses 0008 0039 zero page set aside special function registers sfr used control various add-ons like built-in i/o ports timers members family also include stack page selection bit spsb within sfr spsb clear set 0 stack relocated zero page instead normal location page one members 740 family zero page implemented on-die instead external ram using spsb allows programs working system entirely single chip appropriate roms many members 740 family include on-dye rom eprom well allowing complete single-chip implementations small programs like device drivers since stack grows downward top page 00ff case requires upper portion page left otherwise unused provide space stack following list new instructions existing instructions new modes 740 family parts w65c02 others apply 740 family w65c02 opposed original 65c02 added several new instructions originally designed rockwell semiconductor included instructions set clear referred reset clear single bits memory well instructions branch bits set clear retained 740 family however w65c02 also included test-and-set/reset instructions tested bit set clear setting z flag appropriately either setting clearing bit useful waiting certain flags appear resetting handling flag instructions included 740 additionally original 65c02 codice_5 single-instruction store zero retained functionality partially replaced ldm w65c02 also added several new instructions low-power operation may may available members 740 series following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts following instructions available m50752 m50757 m50758 parts following instructions available m37450 parts following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts parts n't internal eeprom rom thus require external eeprom rom hold firmware parts pins top package allow eprom plugged parts expensive primarily used development purposes parts internal eprom memory available either otp one-time programmable eprom eraseable window eprom commercial temperature extended temperature m50734 rom/ram-less device includes peripherals uart serial i/o a/d watchdog timer vcu 32 parallel i/o ports choice 8 16-bit timers manage real time tasks instruction set superset 6502 microprocessor incorporated particular ic following m50734sp/fp m50734sp/fp-10 unique cmos lsi microprocessor uart clocked serial i/o a-d converter vcu watchdog timer 32-bit parallel i/o arranged around m5040 cpu core since m50734 multiple internal timers real-time control ideal controlling office automation equipment printers typewriters plotters copy machines fax handy word processors use cmos process enables low power consumption making m50734sp also suitable applications battery-powered operation required difference m50734sp m50734fp m50734sp-10 m50734fp-10 lies package difference m50734sp/fp m50734sp/fp-10 lies maximum clock frequency 1990s clone m50959 manufactured russia designation kf1869ve1
[ 7170, 6925, 10767, 1170, 7445, 664, 7323, 10784, 4385, 4773, 7589, 9638, 682, 3630, 11054, 2224, 11314, 10945, 3010, 7235, 8900, 1478, 9928, 6607, 3157, 6485, 9685, 4569, 10969, 5862, 9964, 11374, 6639, 1776, 5617, 7281, 7282, 7284, 10351, ...
Test
11,396
3
Banana_Pi:banana pi banana pi line low-cost credit card-sized single-board computers produced chinese company shenzhen sinovoip co. ltd hardware design banana pi computers influenced raspberry pi banana pi compatible raspberry pi boards banana pi also run netbsd android ubuntu debian arch linux raspbian operating systems though cpu complies requirements debian codice_1 port uses allwinner soc system chip mostly covered linux-sunxi port banana pi open-source hardware software platform designed assist banana-pi.org banana pi bpi-m1 business card-sized low-power single-board computer featuring high performance allwinner dual-core soc 1 ghz 1gb ddr3 sdram gigabit ethernet sata usb hdmi connections run variety operating systems including android lubuntu ubuntu debian raspbian key features bpi official wiki banana pi bpi-m1 wiki page br neither banana pi shenzhen sinovoip co. ltd. direct relationship raspberry pi foundation though similarities clear linux user developer consider direct clone considerable evolution whilst linux.com similarly sees clone improved performance board layout similar raspberry pi board though 10 larger relative spacing connectors varies raspberry pi accessories fit result banana bpi-m1+ credit-card-sized low-power single-board computer note banana pi bpi-m2+ released april 2016 allwinner h3 soc quad-core cpu on-board wifi module runs android debian ubuntu raspbian images raspberry pi banana pi pbi-m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram 8gb emmc flash board sdio wifi module board note banana pi bpi-m2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512m ddr3 sdram usb wifi bluetooth mini hdmi bpi-m2 zero size raspberry pi zero w use raspberry pi zero w case key features banana pi gpio headers raspberry pi 1 model b seen banana pi bpi-p2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512 mb ddr3 sdram usb wifi bluetooth mini hdmi key features 3 differences bpi-m2 zero rest hardware design bpi-m2 zero software banana pi bpi-m2 ultra bpi-m2u open source hardware platform uses allwinner r40 system-on-chip supports wifi+bt board supports sata interface board banana pi pbi-m2 ultra hardware quad core arm cortex a7 armv7 cpu 2gb ddr3 sdram 8g emmc flash board gigabit ethernet port built-in 3.7v li-ion battery charging circuit run android smoothly supports 1080p video 40 pin gpio header pin-compatible raspberry pi note banana pi bpi-m2 berry bpi-m2b open source hardware platform uses allwinner v40 system-on-chip supports wi-fi bluetooth board banana pi m2 berry hardware 32 bit quad core arm cortex a7 1.2 ghz cpu 1gb ddr3 sdram emmc gigabit ethernet port banana pi m2 berry series run android debian ubuntu raspbian os run android smoothly resolution hd gpu needed since r40 v40 chips pin-to-pin compatible swapped bpi-m2 ultra bpi-m2 berry versions resulting two hybrid products note banana pi bpi-m2 magic bpi-m2m single-board computer designed internet-of-things applications uses allwinner r16 system chip also use allwinner a33 chip board used home entertainment home automation high wireless performance etc br note banana pi m3 open source hardware platform octa-core version banana pi supports onboard wi-fi sata port banana pi m3 able run android 5.1.1 debian ubuntu raspberry pi os banana pi m3 hardware 2ghz arm7 octa-core processor 2gb lpddr3 sdram gigabit ethernet port gpio compatible raspberry pi b+ note banana pi bpi-m4 uses realtek rtd1395 system chip features 1 gb ram 8 gb emmc also onboard wifi b/g/n/ac bt 4.2 ports side bpi-m4 4 usb 2.0 ports 1 usb type c port 1 hdmi port 1 audio jack supports m.2 key e pcie 2.0 interface rtd1395 equipped high-performance quad-core cpu arm cortex-a53 512k l2 cache embedded rtd1395 also integrates arm mali-470 graphic processing unit gpu accelerate 2d 3d graphics processing acceleration osd 2k user interface built-in streaming engine rtd1395 provides commonly used drawing functions cpu dedicated applications functions rtd1395 dedicated manipulating decoding video streams vaious formats.e.g decoding 4kx2k h.265 full hd mpeg1/2/4/h.264/h.264 mvc avc/vc-1 vp8 vp9 avs avs plus hd jpeg etc video dsp also handle encoding full hd h.264 format video decoding encoding run simultaneously note note banana pi bpi-f2 uses freescale i.mx6 system chip i.mx6 arm cortex-a9 mpcore 4×cpu processor trustzone ths first banana pi board design freescale soc note banana pi bpi-s64 core uses actions s700 system chip s700 soc arm cortex-a53 quad-core cpu mali450 mp4 gpu bpi-s64 core 2gb lpddr3 8g emmc flash board bpi-s64 core modules small enough fit kinds hardware addition s64 core also provides i/o boards gpio ports well usb microusb csi dsi hdmi microsd many interfaces note banana pi r1 300mbit/s wireless 802.11n router wired wireless network connections designed specifically smart home networking use 2t2r mimo technology two detachable antennas r1 dual core system runs smoothly android 4.2.2 gigabit ethernet port sata socket supports games 1080p high definition video output note banana pi bpi-r2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-r2 integrates quad-code arm cortex-a7 mpcore operating 1.3 ghz router also includes variety peripherals including hdmi tx mipi dsi pcie2.0 usb2.0 otg usb3.0 port sata port,5 gbit/s port gigabit ethernet port 802.11a/b/g/n wifi bt4.1 board also supports 802.11ac/n wlan connection mini pci-e port bpi-r2can run android 5.1 smoothly time entry board work properly known linux distribution size banana pibpi-r2 bpi-r1 easily run games supports 1080p high definition video output note banana pi bpi-r64 highly integrated multimedia network router used high wireless performance home entertainment home automation etc banana pi r64 router based development board run variety open source operating systems including openwrt linux 4 gigabit lan ports 1 gigabit wan ac wifi ap function key features note banana pi bpi-w2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-w2 integrates quad-core arm cortex-a53 mpcore operating 1.5 ghz router also includes variety peripherals including hdmi rx/tx mini dp pcie2.0 pcie1.1 sdio m.2 interface usb2.0 usb3.0 port sata port,2 gbit/s gigabit ethernet port also supports 802.11ac/n wlan connection thru pci-e port bpi-w2 run android 6.0 smoothly also run openwrt debian raspbian oses size banana pi bpi-w2 bpi-r2 easily run 1080p high-definition video output gpio compatible raspberry pi 3 note bpi-d1 one smallest open-source development boards currently market built-in hd mini camera 36mm w x36mm l weighing 10g claimed much smaller boards comparable features board specially suited mini-cam applications providing high-resolution image quality video still capture 1280x720p video capture rate 30 fps banana pi-d1 designed provide set multimedia tools one small package run external battery source features d1 include hd mini-cam audio sensor microphone cpu gpio wi-fi note banana pi-g1 integrated ieee 802.11 b/g/n wi-fi wireless network ieee 802.15.4 zigbee ieee 802.11-2007 standard bluetooth low energy 4.0 development board three wireless protocols used together exchange different transport protocols wireless protocol supported single-chip soc facilitate internet things iot projects wi-fi uses ti cc3200 high-performance arm cortex-m4 wireless soc internally integrated tcp/ip protocol stack allows simple connection internet using bsd socket zigbee uses ti cc2530 integrates wireless capabilities enhanced 8051 core soc years improvement quite mature stable ti z-stack achieved zigbee 2007/pro use 16 short address use 64-bit long address communication face large local interconnect systems providing advanced security encryption mesh network structure support bluetooth 4.0 ble uses ti cc2540/1 integrated ble stack enhanced 8051 core low-power wireless soc present mobile phones support bluetooth 4.0 wearable device mobile interactive accessories cc2540 easily completed meanwhile bpi g1 also incorporates high-performance stm32 arm cortex-m3 microcontroller help dealing time-consuming data transit three wireless soc coordinated therefore banana pi g1 supports wide range internet things diy wireless projects note powered axp209 power management unit banana pi able output 1.6a means users drive external hdd without extra power supply banana pi board similar cubieboard2 banana pi m2 bpi-m2 credit card-sized low-power single-board computer quad core version banana pi supports board wi-fi banana pi m2 series runs android debian ubuntu raspberry pi images images banana pi m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram gigabit ethernet port banana pi m2 size banana pi m1 supports 1080p video output gpio compatible raspberry pi b+ note banana pi pro credit card-sized low-power single-board computer developed china lemaker team goal promoting stem science technology engineering mathematics education schools like smaller sibling banana pi pro concept heavily influenced raspberry pi however banana pro provides various enhancements prior designs banana pro allwinner a20 system chip soc includes arm cortex-a7 dual-core armv7-a 1 ghz mali-400 mp2 gpu 1gb ddr3 sdram banana pro uses microsd card booting os also includes sata 2.0 interface allow connection hard disk additional storage however boot hard disk differences banana pi include on-board wi-fi 802.11 b/g/n ap6181 integrated composite video audio output 3.5 mm trrs jack makes space 40-pin extension header
[ 3585, 11267, 644, 7300, 392, 9610, 6925, 1682, 11282, 2838, 666, 4124, 798, 1442, 7595, 8237, 7983, 3511, 823, 1849, 8250, 9913, 10433, 6978, 7234, 10945, 6981, 11080, 2635, 11221, 2524, 1377, 2788, 7913, 5356, 9581, 9964, 1776, 499 ]
None
11,397
4
William_Lutwiniak:william lutwiniak william lutwiniak november 24 1919 – january 24 1992 american crossword constructor also known work cryptologist national security agency composed total 8,413 puzzles first five thousand composed 1965 1985 hobby lutwiniak born jersey city new jersey lutwiniak began solving crosswords 12 sold first puzzle new york herald-tribune 15 later considered puzzle bit prophetic contained word cryptographical 16 subscription journal american cryptogram association also joined national puzzlers league nom live devil five years followed regular participant aca activities brought attention william friedman friedman invited pursue advanced training cryptography join signal intelligence service lutwiniak february 1 1941 lutwiniak worked arlington hall solomon kullback aftermath attack pearl harbor point became concerned would drafted went munitions building asked colonel harold hayes advice hayes told go particular recruiting station enlist lutwiniak immediately assigned work harold hayes munitions building returned hayes promoted sergeant could skip basic training following october promoted staff sergeant technical sergeant war lutwiniak stopped creating solving crosswords things serious mid-1960s however found margaret farrar crossword copy new york times discovered able solve easily expected subsequently began selling crosswords one early puzzles used cryptic crossword-style cluing center gravity avi fourth july controversial creating lutwiniak words 'big uproar newspaper subsequently print explanation clues meant 1961 headed nsa a5 unit specialized soviet codes later became publisher cryptolog one nsa internal magazines also contributed articles puzzles 1985 joined washington post crossword co-editor sunday magazine became involved crossword culture 1987 attended stanley newman-run crossword tournament baltimore created 15-by-15 puzzle stage 15 minutes based suggestions audience upon retiring national security agency 1981 lutwiniak awarded national intelligence medal achievement 1991 crossw rd magazine named crossword puzzle person year
[ 7887, 5310, 4007 ]
Test
11,398
3
GunCon:guncon often styled guncon portmanteau gun controller known g-con europe family gun peripherals designed namco playstation consoles original controllers used traditional light gun technology newer controllers use led tracking technology first guncon npc-103 g-con 45 europe sony id sleh-00007 bundled playstation conversion time crisis make gun affordable consumers force feedback feature time crisis arcade gun omitted additional fire button included lieu releasing pedal controller game ducking mechanic second version guncon known guncon 2 npc-106 g-con 2 europe bundled playstation 2 conversion time crisis ii time crisis 3 time crisis 4 came playstation 3 bundled guncon 3 nc-109 g-con 3 europe japan three guncon models also available sale separate accessory outside game bundle prior guncon konami justifier first light gun peripheral playstation games support exception north american localization elemental gearbolt maximum force games support justifier compatible guncon vice versa guncon controller known g-con 45 europe uses cathode ray timing method determine barrel aimed screen trigger pulled features button barrel either side gun buttons b performing function auxiliary in-game control take cover reload time crisis controller released black japan gray eventually orange europe north america controller compatible playstation 2 guncon titles compatible playstation 3 due lack controller ports many games support allow b buttons swapped making comfortable right left-handed players guncon 2 g-con 2 europe features smaller body well rounded shape compared original guncon side buttons b moved rearward position directly trigger two new smaller buttons select start added left side shaft prominent additions second guncon model d-pad back gun barrel c button added bottom gun handle new buttons served open new gameplay opportunities character movement dino stalker ability use two guns time crisis ii gun uses usb connection opposed playstation controller port guncon 1 also hooks video signal console either composite video signal component video controller released black japan blue europe orange north america compatible original playstation titles playstation 3 titles guncon 2 compatible games work older models playstation 3 featuring form hardware-based playstation 2 backwards compatibility guncon 3 utilizes two infrared leds markers placed left right sides screen image sensor muzzle tracks markers reference points determining gun pointing screen opposed guncon guncon 2 compatible crt-based displays guncon 3 supports wide variety display types including lcd plasma guncon 3 features sub-grip mounted underneath barrel extending left side use left hand sub-grip analog stick two shoulder buttons like modern gamepad back end gun barrel another analog stick two buttons b1 b2 underneath another two buttons c1 c2 placed along left side barrel analog sticks allow player play first-person shooting games manual aiming/firing light gun regards appearance japanese guncon 3 controllers feature black coloring though due us toy gun laws us/pal release guncon 3 controllers molded bright orange plastic controller criticized uncomfortable left-handed gamers guncon 2 ps2 games compatible original guncon unless game utilizes extra buttons guncon 2 iguncon ios released july 21 2011 allows players use iphone ipod touch similar fashion guncon time crisis 2nd strike ios exclusive entry time crisis series iguncon along time crisis 2nd strike pulled app store march 2015
[ 643, 9091, 3077, 9732, 10761, 6799, 9508, 9512, 684, 306, 1587, 1346, 1091, 6732, 10316, 6873, 4060, 607, 359, 8937, 3824, 5746, 7801, 8316, 6781 ]
Validation
11,399
7
Briar_(software):briar software briar open-source software communication technology intended provide secure resilient peer-to-peer communications centralized servers minimal reliance external infrastructure connections made bluetooth wifi internet via tor private communication end-to-end encrypted relevant content stored encrypted form participating devices long term plans project include blogging crisis mapping collaborative document editing initial target audience briar includes activists journalists civil society plans make system simple enough help anyone keep data safe ability function absence internet infrastructure may also make project valuable disaster response aid organisations developers working open humanitarian initiative taarifa ultimately developers aim create system simple use whatsapp secure pgp keeps working somebody breaks internet briar source code published free software distributed terms gplv3 license audited cure53 spoken highly report delivered recommended given second audit development completes
[ 610, 10021, 5382, 11211, 7983, 8758, 5978 ]
None
11,400
4
Software-defined_protection:software-defined protection software-defined protection sdp computer network security architecture methodology combines network security devices defensive protections leverage internal external intelligence sources sdp infrastructure designed modular scalable secure sdp architecture partitions security infrastructure three interconnected layers enforcement layer inspects traffic enforces protection within well-defined network segments control layer generates security policies deploys protections enforcement points management layer orchestrates infrastructure integrates security business processes sdp architecture supports traditional network security access control policy requirements well threat prevention required enterprises implementing technologies mobile computing software-defined networking sdn enforcement layer sdp enables organizations design segmented networks implement physical virtual security enforcement points based upon segmentation execute protection logic prescribed network segments sdp incorporates principal segmentation enforcement layer segmentation divides network compartments different security characteristics based upon segment requirements security controls established threat containment recovery enforcement points platforms executing protections must implemented boundaries segments enforce defined protection logic enforcement points may implemented network security gateways host-based software mobile device applications virtual machines cloud control layer core sdp architecture role generate protections deploy execution appropriate enforcement points within enforcement layer develop appropriate protections control layer relies upon repositories data include knowledge organization information systems access control knowledge data assets classifications data protection knowledge threats threat prevention security solutions commonly implemented within control layer include firewall anti-virus application control threat emulation anti-bot anti-spam email security data loss prevention dlp intrusion prevention systems ips systematic mapping protective controls associated risk segment assets within enforcement layer organizations deliver multi-layer protection attacks management layer serves interface network administrators two layers sdp infrastructure layer supports enterprise segmentation enables definition access data control policies activation threat prevention separately management layer also provides ability delegate management specific administrators work simultaneously management layer provides visibility happening network supports proactive incident response provides intelligence required tailor security controls organization
[ 4194, 2213, 8998, 10245, 3944, 11365, 939, 6124, 5245 ]
Test
11,401
4
Targeted_threat:targeted threat targeted threats class malware destined one specific organization industry type crimeware threats particular concern designed capture sensitive information targeted attacks may include threats delivered via smtp e-mail port attacks zero day attack vulnerability exploits phishing messages government organisations targeted sector financial industries second targeted sector likely cybercriminals desire profit confidential sensitive information financial industry infrastructure houses similarly online brokerage accounts also targeted attacks impact targeted attacks far-reaching addition regulatory sanctions imposed hipaa sarbanes-oxley gramm-leach-bliley act laws lead loss revenue focus corporate momentum expose sensitive customer data damage corporate reputations incur potential lawsuits contrast widespread spam attack widely noticed targeted attacks sent limited number organizations crimeware threats tend reported thus elude malware scanners
[ 8387, 612, 5636, 8971, 7515 ]
Train
11,402
2
Apple_Help_Viewer:apple help viewer help viewer webkit based html viewer macos aimed displaying help files documentation found /system/library/coreservices/help viewer.app default file extension .help help index files generated help indexer macos applications typically use help viewer display help content rather custom system help viewer implementation mac os x 10.5 leopard found way rob griffiths list leopard criticisms apple changed software standalone application standard window interface one floating window always appears front application windows obscuring interface one seeking help see image although one close minimize help viewer window difficult consult help viewer simultaneously working application short changing size windows fit screen help viewer window also work exposé window management feature mission control os x 10.7 later workaround using defaults command accessible terminal
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790, 9430, 3289,...
None
11,403
9
Zenith_Parsing_Engine:zenith parsing engine zpe programming environment simply zpe formally zenith parsing engine general purpose compiler parser interpreter yass scripting language designed educational use well simple syntax originally created jamie balfour 2015 replacement another programming language developing time known blackrabbit script zpe yass designed help automation scripts clearing inconsistent syntaxes scripting languages zenithparser powers underlying parsers including csv json xml parsers language interpreted zpe runtime known yass yet another simple syntax several languages influenced yass syntax including c php java javascript vb.net c .net sml python remained largely since version 1.5 zpe programming environment written java making cross-platform side effect certain plugins built-in objects completely written java whilst zpe closed source standard library open-source written yass
[ 1952, 9345, 8644, 3462, 8554, 5612, 5677, 7983, 9780, 5397, 2045 ]
None
11,404
7
RPR_FOM:rpr fom real-time platform reference federation object model rpr fom enables linking computer simulations discrete physical entities complex virtual worlds high-level architecture hla federation object model developed distributed simulation applications defense security rpr fom listed nato modelling simulation standards profile amsp-01 rpr fom provides backwards compatibility simulations using distributed interactive simulation dis standard standardized simulation interoperability standards organization siso siso-std-001-2015 standard consists two parts high-level architecture introduced us department defense 1996 rpr fom effort initiated facilitate migration dis hla rpr fom version 1.0 released 1998 supports capabilities dis version ieee 1278.1-1995 dis 5 standard provides fom supporting hla version 1.3 rpr fom version 2.0 released 2015 siso-std-001 rpr fom 2.0 supports capabilities dis version ieee 1278.1a-1998 dis 6 development rpr fom 2.0 started 2000 came halt 2007 resulting widely used draft version 17 work restarted 2012 finalized published standard 2015 standard provides foms supporting following hla versions 1.3 ieee 1516-2000 ieee 1516-2010 “ hla evolved ” modular monolithic formats rpr fom version 3.0 development started 2016 siso dis rpr fom product support group 2018 development handed dedicated product development group goal rpr fom version 3.0 support capabilities dis version ieee 1278.1-2012 dis 7 rpr fom defines information exchanged runtime number fom modules additional supporting modules include foundation module basic data types enumerations module enumerations like types platforms equipment base module commonly used data types generic object classes switches module runtime switches rti rpr fom related number standards
[ 2728, 7045 ]
Test
11,405
3
STMicroelectronics:stmicroelectronics stmicroelectronics french-italian multinational electronics semiconductor manufacturer headquartered geneva switzerland commonly called st europe largest semiconductor chip maker based revenue stmicroelectronics corporate headquarters headquarters emea region based geneva holding company stmicroelectronics n.v. registered amsterdam netherlands company us headquarters coppell texas headquarters asia-pacific region singapore whilst japan korea operations headquartered tokyo company headquarters greater china region shanghai st formed 1987 merger two government-owned semiconductor companies sgs microelettronica società generale semiconduttori italy thomson semiconducteurs semiconductor arm france thomson sgs microelettronica originated 1972 previous merger two companies thomson semiconducteurs created 1982 french government widespread nationalisation industries included time merger company named sgs-thomson took current name may 1998 following thomson ’ sale shares creation st ranked 14th among top 20 semiconductor suppliers sales around us 850 million company participated consolidation semiconductor industry since formation acquisitions including december 8 1994 company completed initial public offering paris new york stock exchanges owner thomson sa sold stake company 1998 company also listed borsa italiana milan 2002 motorola tsmc joined st philips new technology partnership crolles2 alliance created new 12 wafer manufacturing facility located crolles france 2005 st ranked fifth behind intel samsung texas instruments toshiba ahead infineon renesas nec nxp freescale company largest european semiconductors supplier ahead infineon nxp early 2007 nxp formerly philips semiconductors freescale formerly motorola semiconductors decided stop participation crolles2 alliance terms agreement alliance came end december 31 2007 may 22 2007 st intel created joint venture memory application called numonyx new company merged st intel flash memory activities semiconductor market consolidation continued st nxp announcing april 10 2008 creation new joint venture mobile activities st owning 80 new company nxp 20 joint venture began august 20 2008 february 10 2009 st ericsson joint venture bringing together st-nxp wireless ericsson mobile platforms established 2011 st announced creation joint lab sant'anna school advanced studies lab focus research innovation bio-robotics smart systems microelectronics past collaborations sant'anna school advanced studies included dustbot platform integrated self-navigating service robots waste collection st ericsson multinational manufacturer wireless products semiconductors supplying mobile device manufacturers st-ericsson 50/50 joint venture ericsson stmicroelectronics established february 3 2009 dissolved august 2 2013 headquartered geneva switzerland fabless company outsourcing semiconductor manufacturing foundry companies december 31 2014 shareholders following earlier failure stmicroelectronics stayed volatile markets dram pc microprocessors 1994 attempted launch compatible intel 80486 microprocessors partnership american company cyrix model one completed 1995 cyrix m1 microprocessor intended compete intel pentium family achieve success however pc-compatible x86 embedded systems market stpc soc line culminating 486-class stpc atlas reached end-of-life 2008 unlike so-called fabless semiconductor companies stmicroelectronics owns operates semiconductor wafer fabs company owned five 8 inch 200 mm wafer fabs one 12 inch 300 mm wafer fab 2006 production scaled 0.18 µm 0.13 µm 90 nm 65 nm measurements transistor gate length stmicroelectronics also owns back-end plants silicon dies assembled bonded plastic ceramic packages major sites include grenoble one company important r centres employing around 4,000 staff polygone site employs 2200 staff one historical bases company ex sgs historical wafer fab lines closed site hosts headquarters many divisions marketing design industrialization important r center focused silicon software design fab process development crolles site hosts fab originally built common r center submicrometre technologies part 1990 grenoble 92 partnership sgs-thomson cnet r center french telecom company france telecom fab known crolles 1 company first built part 1991 partnership sgs-thomson philips develop new manufacturing technologies crolles 1 opened september 9 1993 gérard longuet french minister industry fab inaugurated french president jacques chirac february 27 2003 includes r center focuses developing new nanometric technology processes 90 nm 32 nm scale using wafers developed crolles 2 alliance alliance stmicroelectronics tsmc nxp semiconductors formerly philips semiconductor freescale formerly motorola semiconductor partnered 2002 develop facility work together process development technologies developed facility also used global semiconductor foundry tsmc taiwan allowing tsmc build products developed crolles behalf alliance partners required foundry capacity new fab construction since 2015 employing around 3,000 staff rousset hosts several division headquarters including smartcards microcontrollers eeprom well several r centers rousset also hosts 8-inch 200 mm fab opened may 15 2000 french prime minister lionel jospin site opened 1979 fab operated eurotechnique joint venture saint-gobain france national semiconductor us rousset sold thomson-csf 1982 part french government 1981-82 nationalization several industries part nationalisation former thomson plant center aix-en-provence operating since 1960s closed staff transferred new rousset site original fab upgraded later fab 1996 shut 1988 small group employees thomson rousset plant including director marc lassus founded start-up company gemalto formerly known gemplus became leader smartcard industry employing 1,500 staff site hosts fab r centers employing 6,000 staff milan facilities match grenoble importance agrate brianza employs around 4000 staff historical base company ex sgs site several fab lines including fab r center castelletto employs 300 400 staff hosts divisions r centers update-2012 numonyx jv intel acquired micron r2 fab agrate previous r 200mm fab currently micron entity catania plant sicily employs 5,000 staff hosts several r centers divisions focusing flash memory technologies well two fabs plant launched 1961 ates supply licensing rca us initially using germanium site two major wafer fabs fab opened april 1997 romano prodi president italian council fab never completed transferred current state numonyx 2008 facility caserta italy manufacture esim sim cards.centre excellence stmicro purposes 2010 st employed 1,500 people kirkop making largest private sector employer country leading exporter 1970 sgs created first assembly back-end plant singapore area toa payoh 1981 sgs decided build wafer fab singapore singapore technical engineers trained italy fab ang mo kio started produce first wafers 1984 converted fab important wafer fab group ang mo kio also hosts design centers site currently employs 6000 staff update-2012 numonyx jv intel acquired micron 2010 amk8 fab 200mm hvm fab currently micron entity amk5 amk6 remains stm entities update-2019 amk8 reacquired stm micron application design support 110 employees divisions mcd phoenix arizona 8 inch 200 mm fab carrollton texas 6 inch 150 mm fab sebaa morocco fab beginning rampdown plans destined close 2010 casablanca morocco site consists two assembly parts bouskoura aïn sebaâ totals around 4000 employees opened 1960s thomson bristol united kingdom site employing well 300 peak 2001/2 ramped approx 150 employees close early 2014 ottawa ontario canada plant approx 450 employees close 2013 end stmicroelectronics involved project produce plastic solar cells employ matrix carbon nanotubes convert photons electrical power
[ 7170, 6276, 9863, 6539, 7820, 9745, 1298, 2838, 666, 8355, 5028, 4773, 3883, 3117, 8237, 9137, 7604, 5686, 7354, 6715, 7745, 7235, 1221, 2506, 9163, 7246, 11094, 4569, 2524, 7008, 1377, 9057, 7269, 3050, 9964, 10606, 3185, 499, 9851, 8700...
None
11,406
9
Theano_(software):theano software theano python library optimizing compiler manipulating evaluating mathematical expressions especially matrix-valued ones theano computations expressed using numpy-esque syntax compiled run efficiently either cpu gpu architectures theano open source project primarily developed montreal institute learning algorithms mila université de montréal 28 september 2017 pascal lamblin posted message yoshua bengio head mila major development would cease 1.0 release due competing offerings strong industrial players theano 1.0.0 released 15 november 2017 following code original theano example defines computational graph 2 scalars b type double operation addition creates python function f actual computation import theano theano import tensor tensor.dscalar b tensor.dscalar c b f theano.function b c assert 4.0 == f 1.5 2.5
[ 1952, 4417, 8514, 7684, 5830, 4840, 9320, 8554, 2804, 823, 9944, 63 ]
Test
11,407
4
Daniel_B._Cid:daniel b. cid daniel b. cid tech entrepreneur open source developer book author cid founded ossec open source intrusion detection system 2004 led project acquired trend micro third brigade june 16 2008 founded sucuri 2010 web site security company served chief technology officer acquired godaddy mar 22 2017 cid wrote host-based intrusion detection guide book cid also founder cleanbrowsing dns filter advisor alienvault
[ 4772, 2887, 186, 7035, 127 ]
None
11,408
5
Google_Wave_Federation_Protocol:google wave federation protocol wave federation protocol formerly google wave federation protocol open protocol extension extensible messaging presence protocol xmpp used apache wave designed near real-time communication computer supported cooperative work wave servers still currently development wave federation protocol open protocol intended parallel openness email protocol waves may succeed email dominant form internet communication since protocol open anyone become wave provider share waves others like email communication possible regardless provider instance organizations operate wave providers members individual run private wave server single user family members internet service provider run wave service another internet service users supplement email im ftp etc model google wave one many wave providers java source code google wave federation prototype server released mercurial repository july 2009 apache license 2.0 features extensible messaging presence protocol inherited wave federation protocol discovery ip addresses port numbers using domain name system dns srv records tls authentication encryption connections xmpp transport encrypts operations transport level provides cryptographic security servers connected directly additional layer cryptography provides end-to-end authentication wave providers using cryptographic signatures certificates allowing wavelet providers verify properties operation therefore downstream wave provider verify wave provider spoofing wavelet operations able falsely claim wavelet operation originated user another wave provider originated different context addresses situation two users different trustworthy wave providers participants wavelet hosted malicious provider protocol requires participant sign user operations certificate signatures operations forwarded host evaluated participants stop malicious hosts altering spoofing contents messages user services signatures verifications done wave providers client software end users waves wavelets child waves identified globally unique wave id domain name id string domain name identifies wave provider wave originated waves wavelets hosted wave provider creator wavelets wave hosted different wave providers however user data federated i.e. shared wave providers private reply wavelets also possible participants knowledge access private wavelet sent users wave provider federated regardless parent wave hosted wave provider operates wave service one networked servers central pieces wave service wave store stores wavelet operations wave server resolves wavelet operations operational transformation writes reads wavelet operations wave store typically wave service serves waves users wave provider connect wave service frontend purpose federation wave service shares waves participants providers communicating wave provider servers copies wavelets distributed wave providers participants given wavelet copies wavelet particular provider either local remote use term refer two types wavelet copies cases referring wavelet copy wavelet wave view contain local remote wavelet copies simultaneously originating wave server responsible hosting processing wavelet operations submitted local participants remote participants wave providers wave server performs concurrency control ordering submitted wavelet operations relative using operational transformation also validates operations applying local wavelet remote wavelets hosted providers cached updated wavelet operations local provider gets remote host local participant submits wavelet operation remote wavelet wave server forwards operation wave server hosting provider transformed applied operation echoed back applied cached copy wave services use federation gateways federation proxy components communicate share waves wave providers federation gateways communicate local wavelet operations push new local wavelet operations remote wave providers participants fulfill requests old wavelet operations process wavelet operations submission requests federation proxy communicates remote wavelet operations component wave provider communicates federation gateway remote providers receives new wavelet operations pushed providers requests old wavelet operations submits wavelet operations providers
[ 10242, 4995, 3460, 5251, 5382, 5892, 7816, 4746, 1036, 5262, 8719, 5524, 7700, 10645, 3610, 1435, 3228, 8858, 10525, 10271, 3105, 2978, 4901, 1959, 9511, 1962, 3499, 10284, 5677, 9519, 1203, 8758, 5431, 1467, 7364, 10748, 574, 7359, 6208, ...
Test
11,409
4
Control_system_security:control system security control system security prevention intentional unintentional interference proper operation industrial automation control systems control systems manage essential services including electricity petroleum production water transportation manufacturing communications rely computers networks operating systems applications programmable controllers could contain security vulnerabilities 2010 discovery stuxnet worm demonstrated vulnerability systems cyber incidents united states governments passed cyber-security regulations requiring enhanced protection control systems operating critical infrastructure control system security known several names scada security pcn security industrial network security control system cyber security insecurity vulnerabilities inherent industrial automation control systems iacs lead severe consequences categories safety loss life personal injury environmental impact lost production equipment damage information theft company image guidance assess evaluate mitigate potential risks provided application many governmental regulatory industry documents global standards addressed industrial automation control systems become far vulnerable security incidents due following trends occurred last 10 15 years cyber threats attack strategies automation systems changing rapidly fortunately regulation control system security rare regulation slow moving process united states example nuclear power chemical industries u.s. government computer emergency readiness team us-cert originally instituted control systems security program cssp national cybersecurity communications integration center nccic industrial control systems made available large set free national institute standards technology nist standards documents regarding control system security isa/iec-62443 series standards technical reports related information define procedures implementing electronically secure industrial automation control systems iacs guidance applies end-users i.e asset owner system integrators security practitioners control systems manufacturers responsible manufacturing designing implementing managing industrial automation control systems documents originally referred ansi/isa-99 isa99 standards created international society automation isa 99 committee accredited publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa work products numbered using convention “ isa-62443-x-y ” previous isa99 nomenclature maintained continuity purposes isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec consideration standards specifications iec 62443 series following iec standards development process iec-62443 cybersecurity standards result iec standards creation process ansi/isa-62443 proposals submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized standards used practitioners several industries design evaluate automation systems cybersecurity resilience several standards used personnel engineering process product system cybersecurity certification programs also called conformity assessment programs certifications awarded accredited certification bodies cb operate following iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs typically members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs isci created first conformity assessment scheme commonly known certification scheme isa s99 iacs cybersecurity standards program certifies commercial off-the-shelf cots iacs products systems addressing securing iacs supply chain exida united states first organization accredited isci scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks ab organizations members iaf two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products 62443-4-1 62443-4-2 iacs cybersecurity standards isasecure-ssa system security assurance certifying iacs systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies iacs development organizations 62443-4-1 cybersecurity standard providing assurances supplier organization institutionalized cybersecurity product development practices isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized isasecure scheme includes process recognizing test tools ensure tools meet functional requirements necessary sufficient execute required product tests test results consistent among recognized tools isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve iec 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure scheme ’ certification requirements working groups include subject matter experts chemical oil gas industries reflective cybersecurity needs isci published 2017 study confirmed applicability iec 62443 standards isasecure certification building management systems resulting study executive summary ppt available free download www.isasecure.org website isci added leading bms suppliers membership established bms working group support ongoing expansion isasecure certifications bms iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures programs offered globally several recognized cbs including exida tüv rheinland tüv sud tüv nord sgs-tüv saar
[ 3843, 5636, 5002, 939, 11662, 6360 ]
Test
11,410
3
TurnKey_Linux_Virtual_Appliance_Library:turnkey linux virtual appliance library turnkey linux virtual appliance library free open source project developed range debian-based pre-packaged server software appliances a.k.a virtual appliances turnkey appliances deployed virtual machine range hypervisors supported cloud computing infrastructures including aws others installed physical computers project currently maintains around 100 virtual appliances freely licensed ready-to-use solution optimized ease use daily automatic security updates full backup capabilities built appliance designed work little configuration required packaged several formats optimized several different virtualization platforms addition two separate builds installing onto physical media non-virtualized hard disk usb hybrid iso onto amazon ec2 cloud pre-integrated server applications include lamp wordpress joomla drupal redmine mysql mediawiki domain controller file server ruby rails phpbb many others founded engineers israeli startup project conceived mid-2008 community-oriented open source project would focus helping users piece together turnkey solutions open source components largest linux distributions according one turnkey linux co-founders project part inspired desire provide open source alternatives proprietary virtual appliance vendors would aligned user interests could engage community project launched september 2008 three prototype appliances drupal joomla lamp based ubuntu 8.04.1 build following months usability improved dozen additional appliances released including ruby rails mediawiki django october 2009 project released 40 appliances based ubuntu 8.04.3 including 25 new additions virtual appliance library release included support amazon elastic compute cloud new virtual machine image format ovf support turnkey linux listed winner 2009 bossies infoworld one top 40 open source products year september 2010 official unveiling tklbam turnkey linux backup migration took place blog post describing goal ideal backup system according liraz siri many features described author along videos demonstrate functionality backup system november 2010 additions tklbam announced including integration webmin discussed future feature original unveiling tklbam turnkey linux nominated sourceforge february 2012 project month august 2012 version 12.0 released library increased include 100 appliances release also marked move away ubuntu underlying operating system debian 6.0 a.k.a squeeze move cited various reasons particularly security early june 2013 saw significant change tack version 12.1 update release built new tkldev open build infrastructure release also included first x86-64 builds later month turnkey linux custom application code moved github also included tracker appliances bug reports promised mid july turnkey linux released image building appliance tkldev well additional separate github account house appliance specific code used tkldev build appliances november 2013 saw release v13.0 based debian 7.2 a.k.a wheezy september 2015 saw long overdue release v14.0 based debian 8.2 a.k.a jessie followed april 2016 maintenance release v. 14.1 based debian 8.4 turnkey virtual appliances start life stripped debian bootstrap versions previous v12.0 based ubuntu added turnkey core includes common features project virtual appliances including turnkey core footprint approximately 110 mb available separate download application software installed top core typically increases size virtual appliance approximately 160 mb downloading installing appliance package hard drive intended developers administrators would gain easy method setting dedicated server new software appliances customised appliances developed forking appropriate appliance build code github built using tkldev additionally appliances also customized extended using tklpatch simple appliance modification mechanism turnkey linux run virtual machine virtualbox vmware although former described provided documentation
[ 5380, 8837, 6153, 7435, 10127, 2321, 5397, 4887, 10394, 8476, 8554, 673, 3745, 10530, 9253, 10149, 295, 11305, 7854, 2738, 4790, 439, 56, 59, 7483, 10860, 318, 3903, 9324, 4673, 10687, 11201, 2375, 4039, 1353, 5962, 5067, 8907, 9806, 7248...
Test
11,411
2
UCSD_Pascal:ucsd pascal ucsd pascal pascal programming language system runs ucsd p-system portable highly machine-independent operating system ucsd pascal first released 1977 developed university california san diego ucsd 1977 university california san diego ucsd institute information systems developed ucsd pascal provide students common environment could run available microcomputers well campus dec pdp-11 minicomputers operating system became known ucsd p-system ucsd p-system one three operating systems along pc dos cp/m-86 ibm offered original ibm pc vendor softech microsystems emphasized p-system application portability virtual machines 20 cpus ibm pc release predicted users would able use applications purchased future computers running p-system advertisements called universal operating system pc magazine denounced ucsd p-system ibm pc stating review context mba written language simply produce good code p-system sell well ibm pc lack applications expensive choices previously ibm offered ucsd p-system option displaywriter 8086-based dedicated word processing machine confused ibm displaywrite word processing software displaywriter native operating system developed completely internally opened end-user programming notable extensions standard pascal include separately compilable units string type extensions influenced design ada language intrinsics provided accelerate string processing e.g scanning array particular search pattern language extensions provided allow ucsd p-system self-compiling self-hosted ucsd pascal based p-code machine architecture contribution early virtual machines extend p-code away roots compiler intermediate language full execution environment ucsd pascal p-machine optimized new small microcomputers addressing restricted 16-bit 64 kb memory james gosling cites ucsd pascal key influence along smalltalk virtual machine design java virtual machine ucsd p-system achieved machine independence defining virtual machine called p-machine pseudo-machine many users began call pascal-machine like os—although ucsd documentation always used pseudo-machine instruction set called p-code pseudo-code urs ammann student niklaus wirth originally presented p-code phd thesis ucsd implementation derived zurich pascal-p implementation ucsd implementation changed zurich implementation byte oriented ucsd p-code optimized execution pascal programming language hardware platform needed p-code interpreter program written port entire p-system tools run later versions also included additional languages compiled p-code base example apple computer offered fortran compiler written silicon valley software sunnyvale california producing p-code ran apple version p-system later telesoft also located san diego offered early ada development environment used p-code therefore able run number hardware platforms including motorola 68000 system/370 pascal microengine ucsd p-system shares concepts current java platform use virtual machine hide operating system hardware differences use programs written virtual machine provide cross-platform support likewise systems allow virtual machine used either complete operating system target computer run box another operating system ucsd pascal compiler distributed part portable operating system p-system ucsd p-system began around 1974 idea ucsd kenneth bowles believed number new computing platforms coming time would make difficult new programming languages gain acceptance based ucsd pascal pascal-p2 release portable compiler zurich particularly interested pascal language teach programming ucsd introduced two features important improvements original pascal variable length strings units independently compiled code idea included then-evolving ada programming language niklaus wirth credits p-system ucsd pascal particular popularizing pascal release turbo pascal ucsd version started slip first place among pascal users pascal dialect ucsd pascal came subset pascal implemented pascal-p2 designed full implementation language rather minimum subset would self-compile fit function bootstrap kit pascal compilers ucsd added strings basic several implementation dependent features although ucsd pascal later obtained many features full pascal language pascal-p2 subset persisted dialects notably borland pascal copied much ucsd dialect four versions ucsd p-code engine several revisions p-system ucsd pascal revision p-code engine i.e. p-machine meant change p-code language therefore compiled code portable different p-machine versions revision represented leading roman numeral operating system revisions enumerated dot number following p-code roman numeral example ii.3 represented third revision p-system running second revision p-machine original version never officially distributed outside university california san diego however pascal sources versions i.3 i.5 freely exchanged interested users specifically patch revision i.5a known one stable widely distributed available many early microcomputers numerous versions included apple ii dec pdp-11 zilog z80 mos 6502 based machines motorola 68000 ibm pc version ii pc restricted one 64k code segment one 64k stack/heap data segment version iv removed code segment limit cost lot br project members era include dr kenneth l bowles mark allen richard gleaves richard kaufmann pete lawrence joel mccormack mark overgaard keith shillington roger sumner john van zandt custom version written western digital run pascal microengine microcomputer included support parallel processes first time commercial version developed sold softech based version ii include changes version iii sell well due combination pricing structure performance problems due p-code interpreter competition native operating systems top often ran softech dropped product picked pecan systems relatively small company formed p-system users fans sales revived somewhat due mostly pecan reasonable pricing structure p-system ucsd pascal gradually lost market native operating systems compilers available ti-99/4a equipped p-code card commodore pet corvus systems computer used ucsd pascal user software innovative concept constellation os run pascal interpretively compiled include common software manual users could modify needed using open source default era
[ 512, 5634, 2179, 5260, 6414, 8082, 6675, 6558, 5663, 1952, 8868, 428, 5677, 6829, 7983, 9008, 7479, 8510, 8767, 2627, 8262, 8524, 10703, 217, 7775, 7269, 5612, 6129, 7281, 5363, 9714, 4341, 3960, 1145, 3323 ]
Test
11,412
9
Chipmunk_Basic:chipmunk basic chipmunk basic freeware version basic programming language maintained developer ron nicholson chipmunk basic originally developed apple macintosh ported linux windows windowed macintosh version includes wide variety graphics drawing commands also object-oriented capabilities current version chipmunk basic spinoff products palm os cbaspad hotpaw basic based public domain pascal implementation david gillespie author pascal translation tool p2c january 2015 cocoa version released may lack features older carbon-based os x port
[ 3718, 7691, 1805, 6797, 9997, 786, 22, 3736, 3481, 9881, 797, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 11315, 823, 315, 7355, 7486, 7870, 4160, 4674, 8262, 10750, 712, 8524, 847, 1879, 92, 11229, 2915, 9188, 5733, 11243, 2...
None
11,413
5
User_Datagram_Protocol:user datagram protocol computer networking user datagram protocol udp one core members internet protocol suite protocol designed david p. reed 1980 formally defined udp computer applications send messages case referred datagrams hosts internet protocol ip network prior communications required order set communication channels data paths udp uses simple connectionless communication model minimum protocol mechanisms udp provides checksums data integrity port numbers addressing different functions source destination datagram handshaking dialogues thus exposes user program unreliability underlying network guarantee delivery ordering duplicate protection error-correction facilities needed network interface level application may use transmission control protocol tcp stream control transmission protocol sctp designed purpose udp suitable purposes error checking correction either necessary performed application udp avoids overhead processing protocol stack time-sensitive applications often use udp dropping packets preferable waiting packets delayed due retransmission may option real-time system udp simple message-oriented transport layer protocol documented although udp provides integrity verification via checksum header payload provides guarantees upper layer protocol message delivery udp layer retains state udp messages sent reason udp sometimes referred unreliable datagram protocol transmission reliability desired must implemented user application number udp attributes make especially suited certain applications applications use datagram sockets establish host-to-host communications application binds socket endpoint data transmission combination ip address port way udp provides application multiplexing port software structure identified port number 16 bit integer value allowing port numbers 0 65535 port 0 reserved permissible source port value sending process expect messages response internet assigned numbers authority iana divided port numbers three ranges port numbers 0 1023 used common well-known services unix-like operating systems using one ports requires superuser operating permission port numbers 1024 49151 registered ports used iana-registered services ports 49152 65535 dynamic ports officially designated specific service may used purpose may also used ephemeral ports software running host may use dynamically create communications endpoints needed udp header consists 4 fields 2 bytes 16 bits use checksum source port fields optional ipv4 pink background table ipv6 source port field optional method used compute checksum defined words 16-bit words summed using one complement arithmetic add 16-bit values addition carry-out 17th bit produced swing 17th carry bit around add least significant bit running total finally sum one complemented yield value udp checksum field checksum calculation results value zero 16 bits 0 sent one complement 1s zero-value checksum indicates checksum calculated difference ipv4 ipv6 pseudo header used compute checksum checksum optional ipv6 udp runs ipv4 checksum computed using pseudo header contains information real ipv4 header pseudo header real ipv4 header used send ip packet used checksum calculation source destination addresses ipv4 header protocol udp see list ip protocol numbers 17 0x11 udp length field length udp header data field data stands transmitted data udp checksum computation optional ipv4 checksum used set value zero udp runs ipv6 checksum mandatory method used compute changed documented computing checksum pseudo header used mimics real ipv6 header source address one ipv6 header destination address final destination ipv6 packet contain routing header destination address ipv6 header otherwise originating node address last element routing header receiving node destination address ipv6 header value next header field protocol value udp 17 udp length field length udp header data lacking reliability udp applications must generally willing accept loss errors duplication applications tftp may add rudimentary reliability mechanisms application layer needed often udp applications employ reliability mechanisms may even hindered streaming media real-time multiplayer games voice ip voip examples applications often use udp particular applications loss packets usually fatal problem application requires high degree reliability protocol transmission control protocol may used instead voip example latency jitter primary concerns use tcp would cause jitter packets lost tcp provide subsequent data application requesting re-sending missing data using udp end user applications must provide necessary handshaking real time confirmation message received numerous key internet applications use udp including domain name system dns queries must fast consist single request followed single reply packet simple network management protocol snmp routing information protocol rip dynamic host configuration protocol dhcp voice video traffic generally transmitted using udp real-time video audio streaming protocols designed handle occasional lost packets slight degradation quality occurs rather large delays lost packets retransmitted tcp udp run network many businesses finding recent increase udp traffic real-time applications hindering performance applications using tcp point sale accounting database systems tcp detects packet loss throttle back data rate usage since real-time business applications important businesses developing quality service solutions seen crucial vpn systems openvpn may use udp implementing reliable connections error checking application level transmission control protocol connection-oriented protocol means requires handshaking set end-to-end communications connection set user data may sent bi-directionally connection user datagram protocol simpler message-based connectionless protocol connectionless protocols set dedicated end-to-end connection communication achieved transmitting information one direction source destination without verifying readiness state receiver
[ 514, 9218, 10242, 1541, 1030, 7175, 3592, 521, 9734, 11269, 14, 8211, 5652, 5653, 3094, 6681, 6682, 11292, 10269, 10270, 10271, 6689, 10274, 9251, 2085, 10279, 7208, 6697, 10283, 5166, 7214, 8238, 562, 1586, 4660, 9269, 9779, 11321, 11104, ...
None
11,414
1
SQL_Server_Notification_Services:sql server notification services sql server notification services platform developed microsoft development deployment notification applications based sql server technology microsoft .net framework notification services offers scalable server engine run notification applications multi-server capability-providing flexibility scalability deploying applications notification services designed ease pain developing deploying notification applications generate personalized timely information subscribers design code test components make robust notification services application-such notification scheduling failure detection retry logic time zone management notification grouping queue management adding notification services software applications daunting task years term notification applications superseded term complex event processing cep idea user defines set rules queries advance push data rules data fit criteria rules action fired example rule may state car speed sensor 100 km/h take photo record otherwise data discarded approach much faster traditional oltp design insert row database constantly polling data see something relevant happened especially suited situations high speed inputs fixed set fairly simple queries may need keep data e.g industries measure voltage current attributes hundreds electric motors conveyor belts 100 times second compare measurement average plant operators alerted sudden change occur sql server notification services one many components comprised microsoft sql server first released microsoft sql server 2000 service pack 2 2003 enhanced release shipped sql server 2005 discontinued removed sql server 2008 although sql server 2005 sp3 allows notification services components run sql server 2008 database engine replaced streaminsight first shipped component sql 2008 r2 streaminsight separate install visible part regular sql server setup programming framework based transact-sql xml provides declarative programming model lends quick prototyping deployment robust notification applications api creating subscription management applications provided plus standard components collecting event data files sql server databases formatting notifications using xslt sending notifications via simple mail transfer protocol smtp writing notifications file standard components meet needs application notification services extendable building custom components using .net family programming languages microsoft visual c .net microsoft visual basic .net finally notification services communicate wide variety microsoft third-party custom-built event providers delivery protocols enabling notification services communicate existing systems heterogeneous environments
[ 5647, 10900, 10902, 11030, 3224, 5401, 7064, 4384, 8227, 11683, 11559, 4010, 10157, 9263, 11570, 6709, 8246, 9909, 315, 7486, 4674, 1347, 1348, 5320, 4174, 847, 83, 1366, 9434, 603, 479, 608, 2401, 8161, 7523, 3303, 11498, 3821, 10991, 35...
Validation
11,415
7
Soluto:soluto soluto device protection service offered identically named company integrates mobile app web portal proactive communications remote device management one service part premium service soluto enabled users contact premier support technicians soluto offered access via web part soluto pc management platform soluto founded 2008 received 1.6m seed funding proxima ventures followed-up 6.2 million second round financing led bessemer venture partners joined giza venture capital march 2009 2013 soluto acquired asurion llc soluto ceased operation soluto pc management platform april 1 2016 soluto funded index ventures bessemer venture partners giza venture capital proxima ventures crunchfund innovation endeavors initial capital angel investors including chris dixon yuval neeman saar gillai nadav zohar soluto purchased asurion november 12 2013 reported 130 million soluto techcrunch disrupt 2010 soluto named one 2010 alwayson global top private companies lifehacker named soluto one popular free windows downloads 2010 original soluto features listed soluto dashboard 6 sections divided categories technical information user see remote actions user initiate soluto uses downloaded agent transmit data receive data soluto back-end servers data transmitted soluto includes apps running boot enabled browser toolbars add-ons hardware specs specialized form crash reports servers send back agent information solutions recent crashes remote actions initiated user need occur
[ 2811, 2213 ]
Train
11,416
2
Job_stream:job stream non-interactive computer system particularly ibm mainframes job stream jobstream simply job sequence job control language statements jcl data called instream data comprise single unit work operating system term job traditionally means one-off piece work contrasted batch executing steps many inputs non-interactive computation come called batch processing thus unit batch processing often called job oxymoronic term batch job see job details performing job consists executing one programs program execution called job step jobstep step usually related way others job steps job executed sequentially possibly depending results previous steps particularly batch processing term job stream particularly associated mainframes ibm z/os operating system job initiated codice_1 terminated next codice_1 codice_3 statement job step consists one codice_4 statement indicating program executed usually multiple codice_5 statements defining files devices used simple example job stream system print payroll checks might consist following steps performed batch inputs step depends successful completion previous step example incorrect data input first step job might terminate without executing subsequent steps allow payroll department correct data rerun edit errors job run completion manual intervention
[ 2432, 5936, 437, 2168, 3323, 477 ]
Test
11,417
3
LGA_1156:lga 1156 lga 1156 also known socket h h1 intel desktop cpu socket lga stands land grid array incompatible successor lga 1155 last processors supporting ceased production 2011 lga 1156 along lga 1366 designed replace lga 775 whereas lga 775 processors connect northbridge using front side bus lga 1156 processors integrate features traditionally located northbridge within processor lga 1156 socket allows following connections made processor rest system lga 1156 lga 1366 sockets processors discontinued sometime 2012 superseded lga 1155 lga 2011 respectively lga 1156 4 holes fastening heatsink motherboard placed square lateral length 75 mm configuration retained later lga 1155 lga 1150 lga 1151 sockets meaning cooling solutions generally interchangeable lga 1156 processors motherboards made date interoperable making possible switch celeron pentium core i3 core i5 integrated graphics core i5 core i7 without graphics however using chip integrated graphics p55 motherboard addition likely requiring bios update allow use on-board graphics processor likewise using chip without integrated graphics h55 h57 q57 motherboard allow use motherboard graphics ports desktop chipsets support lga 1156 intel h55 h57 p55 q57 server chipsets supporting socket intel 3400 3420 3450
[ 3588, 3973, 5901, 5523, 2455, 3992, 8855, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 8625, 9649, 4537, 7105, 6339, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 10715, 11484, 9057, 9570, 8035, 10468, 613, 8552, 1...
Test
11,418
5
Mozilla_Thunderbird:mozilla thunderbird mozilla thunderbird free open-source cross-platform email client news client rss chat client developed mozilla foundation project strategy modeled mozilla firefox web browser installed default ubuntu desktop systems december 7 2004 version 1.0 released received 500,000 downloads first three days release 1,000,000 10 days july 6 2012 mozilla announced company dropping priority thunderbird development continuous effort extend thunderbird feature set mostly fruitless new development model shifted mozilla offering extended support releases deliver security maintenance updates allowing community take development new features december 1 2015 mozilla executive chair mitchell baker announced company-wide memo thunderbird development needs uncoupled firefox referred thunderbird developers spending large efforts responding changes mozilla technologies firefox paying tax support thunderbird development also said believe thunderbird potential industry-wide impact firefox time announced mozilla foundation provide least temporary legal financial home thunderbird project since memo 2015 mozilla brought thunderbird back in-house announcement may 9 2017 continues support development thunderbird development team also expanded adding several new members undergone overhaul security user-interface thunderbird email newsgroup news feed chat xmpp irc twitter client vanilla version originally personal information manager pim although mozilla lightning extension installed default adds pim functionality additional features needed often available via extensions thunderbird manage multiple email newsgroup news feed accounts supports multiple identities within accounts features quick search saved search folders virtual folders advanced message filtering message grouping labels help manage find messages linux-based systems system mail movemail accounts supported thunderbird provides basic support system-specific new email notifications extended advanced notification support using add-on thunderbird incorporates bayesian spam filter whitelist based included address book also understand classifications server-based filters spamassassin extensions allow addition features installation xpinstall modules known xpi zippy installation via add-ons website also features update functionality update extensions thunderbird supports variety themes changing overall look feel packages css image files downloaded via add-ons website mozilla add-ons thunderbird follows industry standards email web feeds e.g news aggregators atom rss thunderbird follows internet protocols evolve example ircv3.1 n't support ircv3.2 usenet news groups offer latest nntps see thunderbird provides mailbox format support using plugins feature yet enabled due related work progress mailbox formats supported thunderbird also uses mork since version 3 mozstorage based sqlite internal database mork due replaced mozstorage thunderbird 3.0 8.0 release still uses mork file format current version seamonkey version 2.14.1 also still uses mork indexes pop imap mail folders least since version 38 thunderbird integrated support automatic linking large files instead attaching directly mail message insert menu provides ability include html code thus one insert subscripts degree symbol ° etc. message composed software may limitations number sizes files objects represented example pop3 folders subject filesystem design limitations maximum file sizes filesystems large file support well possible limitations long filenames issues thunderbird runs variety platforms releases available primary distribution site support following operating systems unofficial ports available old ports may available os/2 ecomstation source code freely available compiled run variety architectures operating systems contributors world client translated 50 different languages although email addresses currently limited ascii local parts thunderbird yet support smtputf8 rfc 6531 email address internationalization thunderbird provides enterprise government-grade security features tls/ssl connections imap smtp servers also offers native support s/mime secure email digital signing message encryption using certificates security features take advantage smartcards installation additional extensions security features may added extensions instance enigmail offers pgp signing encryption decryption optional security protections also include disabling loading remote images within messages enabling specific media types sanitizer disabling javascript french military uses thunderbird contributes security features claimed match requirements nato closed messaging system originally launched minotaur shortly phoenix original name mozilla firefox project failed gain momentum success latter however demand increased mail client go work minotaur revived new name thunderbird migrated new toolkit developed firefox team significant work thunderbird restarted announcement version 1.5 onward main mozilla suite would designed around separate applications using new toolkit contrasts previous all-in-one approach allowing users mix match mozilla applications alternatives original mozilla suite continues developed seamonkey december 23 2004 project lightning announced tightly integrated calendar functionality scheduling tasks etc thunderbird lightning support full range calendar mechanisms protocols supported mozilla calendar infrastructure modern post-0.2 sunbird october 11 2006 qualcomm mozilla foundation announced future versions eudora based upon technology platform open source mozilla thunderbird email program project code-named penelope late 2006 debian rebranded thunderbird icedove due trademark copyright reasons second product rebranded july 26 2007 mozilla foundation announced thunderbird would developed independent organization mozilla corporation subsidiary foundation focusing mozilla firefox development september 17 2007 mozilla foundation announced funding new internet communications initiative dr. david ascher activestate purpose initiative develop internet communications software based thunderbird product code brand february 19 2008 mozilla messaging started operations subsidiary mozilla foundation responsible development email similar communications initial focus upcoming version thunderbird 3 alpha preview releases thunderbird 3 codenamed shredder april 4 2011 mozilla messaging merged mozilla labs group mozilla foundation july 6 2012 confidential memo jb piacentino thunderbird managing director mozilla leaked published techcrunch memo indicated mozilla would moving team project development new features would left community memo slated release july 9 2012 subsequent article executive chair mozilla mitchell baker stated mozilla decision make transition thunderbird new release governance model november 25 2014 kent james volunteer-led thunderbird council announced thunderbird blog active contributors thunderbird gathered mozilla office toronto discussed future application decided staff required working full-time thunderbird thunderbird team release stable reliable product make progress features frequently requested community december 1 2015 mitchell baker suggested company-wide memo thunderbird uncoupled firefox infrastructure referred thunderbird tax firefox said believe thunderbird potential industry-wide impact firefox mozilla remains interested role thunderbird seeking assistance help development may 9 2017 philipp kewisch announced mozilla foundation continue serve legal fiscal home thunderbird project thunderbird migrate mozilla corporation infrastructure separating operational aspects project interim/beta versions thunderbird 57 58 released late 2017 began make changes influenced firefox quantum including new photon user interface despite removal firefox quantum support xul-based legacy add-ons favor webextensions stable/esr release thunderbird 60 mid-2018 continued support although require updates support webextensions except themes 2018 according mozilla work underway planned support thunderbird 63 webextensions continue somewhat support legacy addons thunderbird development releases occur three stages called beta earlybird daily correspond firefox beta aurora nightly stages release dates gecko versions exactly firefox example firefox 7 thunderbird 7 released september 27 2011 based gecko 7.0
[ 2050, 10242, 3590, 9736, 2064, 9744, 9747, 2076, 9757, 1054, 546, 9762, 8747, 3629, 559, 1075, 2101, 2108, 9281, 1101, 3578, 5205, 6231, 7255, 2139, 8283, 6237, 10851, 9320, 6762, 10860, 10861, 4722, 5749, 4728, 637, 1664, 2695, 6791, 986...
Test
11,419
6
Rational_MultiVersion_File_System:rational multiversion file system computing multiversion file system mvfs virtual file system displays specific versions data stored clearcase particular supports dynamic views show arbitrary combination local remote files
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1212, 83...
Test
11,420
2
NeXT_MegaPixel_Display:next megapixel display next megapixel display range crt-based computer monitors manufactured sold next nextcube nextstation workstations designed hartmut esslinger/frog design inc original megapixel display monochrome 17 monitor displaying 4 brightness levels black dark gray light gray white fixed resolution 1120 x 832 92 dpi shy true megapixel 931,840 total pixels 68 hz integrated mono microphone mono speaker stereo rca sockets 3.5mm headphone socket socket keyboard turn provided socket mouse unique feature monitor connected computer single 6 foot cable provided power video signals aforementioned signals severe problem setup monitor could switched completely computer powered screen could switched black cathode heater always remained led extreme screen dimming years use especially computer turned overnight server setup busy software lab problem later rectified ultra rare 4000a model rated 10,000 hours ~14 months display stand allows tilted stand also features two rollers used move monitor back forth despite heavy weight stand also provides place keyboard use freeing real desktop front nextstation color nextdimension board released next sold rebranded color monitors megapixel color display either 17 21 connections provided separate box next soundbox next user reference
[ 10406, 2282, 7307, 7806, 6554, 7640, 6234, 350 ]
None
11,421
3
International_Karate:international karate international karate fighting game developed published system 3 various home computers 1985 epyx licensed released game united states world karate championship 1986 international karate successor expanded gameplay released 1987 followed unauthorized release international karate gold 2001 core game two-dimensional one-on-one versus fighting game players take roles martial artists competing kumite tournament rather wearing opponent health goal instead score single solid hits hit combat stops combatants returned starting positions depending well players hit opponent score either half-point full point matches quite brief two full points required win point quickly scored seconds round begins single player mode successive opponents increase difficulty novice white belts master black belts play continues long player continues win matches fights bonus mini-games focusing rhythm timing appear including one player must break number stacked boards using fighter head newer games genre starting specifically street fighter fights take place variety backdrops eight total representing different locations world mount fuji tokyo japan sydney harbour sydney australia statue liberty new york usa forbidden city beijing china christ redeemer rio de janeiro brazil palace westminster london england parthenon athens greece great pyramid giza cairo egypt title utilises standard one-button joystick allowing players execute variety karate techniques unlike modern 2d fighting games players turn around opponent behind must instead execute one three turn-around manoeuvres change direction spectrum version used starting point amstrad cpc port another port exists msx platform version atari st home computer created andromeda software released 1986 version featured advanced graphics versions 16 bit hardware supported colors larger sprites port pc published year used 4-color cga graphics release world karate championship us late april 1986 epyx sued competing video game publisher data east infringement copyright trademark trade dress dispute similarities 1984 arcade game karate champ home computer adaptations published 1985 international karate used coloured fighters points system initial trial district court northern district california began 28 october 1986 decision 28 january 1987 court dismissed allegations trademark trade dress infringement found epyx guilty infringing upon data east usa copyright karate champ data east obtained permanent injunction epyx inc. impoundment restrained epyx sale distribution world karate championship epyx required recall customers distributors copies infringing work decision appealed united states court appeals ninth circuit november 1988 reversed decision stating game similar identical one game company monopolise one entire sport result melbourne house sue system 3 epyx game way exploding fist also similar games though game also borrowed heavily data east karate champ computer gaming world called game original karate champ clone best one available ... great scenery adds ambience 2000 game boy color version created without input archer maclean released international karate 2000 sported enhancements basis international karate advanced released 2001 game boy advance c64 version saw re-releases 2004 title c64 direct-to-tv 2008 wii virtual console
[ 6129, 10931, 9166, 9006 ]
Test
11,422
1
Superbase_(database):superbase database superbase end-user desktop database program started commodore 64 ported various operating systems course 20 years also generally included programming language automate database-oriented tasks later versions included wysiwyg form report designers well sophisticated programming capabilities originally created 1983 precision software commodore 64 128 later amiga atari st 1989 first database management system run windows computer precision software uk-based company original creator product superbase superbase still used large number people various platforms often used end-user database large number applications built throughout industry government academia often significant complexity applications continue use current day mostly small businesses initial versions text mode release amiga version superbase became first product use common vcr control panel browsing records also supported number different media formats including images sounds video superbase often referred multimedia database early years features uncommon amiga version also featured internal language capability generate front end masks queries reports years microsoft access version huge success resulted version created number platforms using approach eventually microsoft windows version released couple years later company sold founders software publishing corporation spc sold non-windows versions product releasing version 2 late alpha stages version 3 sold product company called computer concepts corporation relatively unknown company created subsidiary called superbase inc. finishing late stage alpha version 3 launching superbase 95 eventually appeared lost interest product point bought small group former customers brought back uk company suderbase developers plc continued extend support product superbase classic.the amiga version sold mr. hardware computers joe rothman developed renamed program sbase pro 4 mr hardware computers sbase pro 4 sold russ norrby put version 1.36n newest version new next-generation rewrite product initially called superbase next generation sbng included new object oriented programming language called simpol begun 1999-2000 primarily alpha product although billed beta release 2005 promises true release would around corner 2006 simpol sold realbasics ltd later renamed simpol ltd www.simpol.com april 2009 company launched simpol professional next generation product cross-platform language database tool set february 2009 announced superbase developers plc liquidation march 2010 papatuo holdings ltd. purchased superbase family products official receivers superbase developers plc 2015 papatuo holdings company purchased superbase intellectual property superbase developers plc liquidated also purchased simpol intellectual property upon liquidation simpol limited following versions 1.83 2.06 version 2.10 released july 2017 superbase used basic end-user tasks real strength lies ability relatively untrained programmers create complex applications typically built time need arises types applications run gamut accounting systems erp/mrp packages business information systems production control systems similar complex products basic membership list contact management systems contains high-speed versatile isam database engine powerful dialect basic well sophisticated forms report engines also includes powerful support acting front-end one sql databases biggest drawback fact written 16-bit windows api easily portable 32-bit version rewritten version intended cure make package even easier use powerful casual programmer perspective fact database based sql significant advantage since level complexity far less easier user grasp concepts manage traverse database numerous powerful features product ahoy 1984 stated superbase numerous advanced features seldom seen database manager c-64 including database programming language concluded anyone planning harnessing c-64 office business environment ca n't go wrong superbase
[ 7523, 8262, 7849, 8393, 5612, 6797, 10413, 7983, 2901, 10389 ]
Test
11,423
2
Nokia_DX_200:nokia dx 200 dx 200 digital switching platform currently developed nokia networks dx 200 versatile fault-tolerant modular highly scalable telephone exchange general purpose server platform designed high performance high availability applications hardware built loosely coupled redundant computer units backed distributed software architecture architecture dx 200 allows live migration well software update live operation unlike many switching platforms dx 200 performs live software update without code patching therefore running code polluted unnecessary jump instructions furthermore opposed integration guessing various software patches dx 200 architecture makes proper integration testing software components possible live software update requires two computer units one executing old code working new software loaded otherwise idle spare process called warming memory areas e.g dynamically allocated memory exception stack procedures moved old new computer unit implies handling data structures must compatible old new software versions copying data require programming effort long allocation data done using tnsdl language developing software dx 200 platform rather straightforward well educated software developer tnsdl language plays vital role producing asynchronously communicating fault-tolerant software modules easy learn software architecture dx 200 fine combination highly efficient traditional solutions well modern actor model based highly concurrent design dx 200 products famous availability exceeding 99.999 five nines well unrivaled performance dx 200 generic architecture suitable versatile computing applications applications include traditional mobile switching centers msc lte mobile packet switching gateways well voip application servers generic operating system ported dx 200 relatively easily linux chorusos dmx frequent operating systems used dx 200 dmx 'native os dx 200 dmx microkernel architecture advanced functions like tcp/ip stack live migration components implemented separate libraries dx 200 several hardware flavors nokia networks shifted focus hardware products software services highly valuable business logic kept products used running dx 200 hardware variants available cloud solutions working generic multi-purpose hardware various vendors development system started televa finnish state owned telecom equipment producer early 1970s leadership keijo olkkola first order received 1973 100 subscriber local exchange small remote island community houtskär delivered 1979 first installation 1982 dx 200 captured 50 share finnish fixed line exchange market exchange modular design development microprocessors technology enabled gradual increase system capacity 1987 installation base grown 400,000 subscriber lines early export markets included china nepal united arab emirates sri lanka sweden turkey soviet union 1984 development version exchange nordic mobile telephone network started 1991 world first gsm call made using nokia devices core network components based dx 200 platform 2005 dx 200 based voip server provided finnish operator saunalahti providing state art fixed-mobile convergence solution prime example well dx 200 suitable internet server development overall flexibility whole dx 200 platform 2009 world ’ first voice calls lte networks using commercial 3gpp-standardized user network equipment 2013 nsn showed truly operational telco cloud solution actually marks end traditional dx200 hardware product line
[ 4194, 6153, 6281, 435, 7187, 823, 7802, 8439 ]
Train
11,424
2
OProfile:oprofile computing oprofile system-wide statistical profiling tool linux john levon wrote 2001 linux kernel version 2.4 m.sc project consists kernel module user-space daemon several user-space tools oprofile profile entire system parts interrupt routines drivers user-space processes low overhead widely supported kernel mode oprofile uses system timer see gathering profiling events however mode unable measure kernel functions interrupts disabled newer cpu models support hardware performance counter mode uses hardware logic record events without active code needed linux 2.2/2.4 32-bit x86 ia64 supported linux 2.6 wider support x86 32 64 bit dec alpha mips arm sparc64 ppc64 avr32 call graphs supported x86 arm 2012 two ibm engineers recognized oprofile one two commonly used performance counter monitor profiling tools linux alongside perf tool example
[ 10016, 7234, 9637, 3142, 4423, 5612, 823, 9964, 7983, 1459, 499, 2517, 1399, 3547, 477 ]
Test
11,425
0
Attempto_Controlled_English:attempto controlled english attempto controlled english ace controlled natural language i.e subset standard english restricted syntax restricted semantics described small set construction interpretation rules development university zurich since 1995 2013 ace version 6.7 announced ace serve knowledge representation specification query language intended professionals want use formal notations formal methods may familiar though ace appears perfectly natural – read understood speaker english – fact formal language ace related tools used fields software specifications theorem proving text summaries ontologies rules querying medical documentation planning simple examples ace construction rules require noun introduced determiner every least 5 ... ace interpretation rules decide 1 interpreted universally quantified 2 interpreted existentially quantified sentences like women human follow ace syntax consequently valid interpretation rules resolve anaphoric references 3 tie second sentence refer new tie first sentence man second sentence refer man first sentence thus ace text coherent entity anaphorically linked sentences attempto parsing engine ape translates ace texts unambiguously discourse representation structures drs use variant language first-order logic drs translated formal languages instance acerules various semantics owl swrl translating ace text fragment first-order logic allows users reason text instance verify validate query overview current version 6.6 ace section vocabulary ace comprises grammar ace defines constrains form meaning ace sentences texts ace grammar expressed set construction rules meaning sentences described small set interpretation rules troubleshooting guide describes use ace avoid pitfalls ace text sequence declarative sentences anaphorically interrelated furthermore ace supports questions commands simple sentence asserts something case — fact event state simple ace sentences following general structure every sentence subject verb complements direct indirect objects necessary transitive verbs insert something ditransitive verbs give something somebody whereas adjuncts adverbs prepositional phrases optional elements simple sentence elaborated upon describe situation detail specify nouns customer card could add adjectives possessive nouns -prepositional phrases variables appositions modifications nouns possible relative sentences described since make sentence composite also detail insertion event e.g adding adverb equivalently adding prepositional phrases combine elaborations arrive composite sentences recursively built simpler sentences coordination subordination quantification negation note ace composite sentences overlap linguists call compound sentences complex sentences coordination possible sentences phrases syntactic type note coordination noun phrases card code represents plural object coordination possible sentences verb phrases relative clauses coordination governed standard binding order logic i.e binds stronger commas used override standard binding order thus sentence means customer inserts visacard code alternatively mastercard code four constructs subordination relative sentences if-then sentences modality sentence subordination relative sentences starting allow add detail nouns help if-then sentences specify conditional hypothetical situations note anaphoric reference via pronoun -part noun phrase card -part modality allows us express possibility necessity sentence subordination comes various forms quantification allows us speak objects certain class universal quantification denote explicitly existence least one object class existential quantification textual occurrence universal existential quantifier opens scope extends end sentence coordinations end respective coordinated sentence express involved customers insert cards write sentence means customer inserts card may may one inserted another customer specify customers insert card — however unrealistic situation seems — write equivalently state every card inserted customer write somewhat indirectly negation allows us express something case negate something objects certain class one uses negate complete statement one uses sentence negation forms negation logical negations i.e state something provably case negation failure states state affairs proved i.e information whether state affairs case ace supports two forms queries yes/no -queries wh -queries yes/no -queries ask existence non-existence specified situation specified ask get positive answer note interrogative sentences always end question mark help wh -queries i.e queries query words interrogate text details specified situation specified ask element sentence exception verb queries also constructed sequence declarative sentences followed one interrogative sentence example ace also supports commands examples command always consists noun phrase addressee followed comma followed uncoordinated verb phrase furthermore command end exclamation mark constrain ambiguity full natural language ace employs three simple means natural language relative sentences combined coordinations introduce ambiguity ace sentence unequivocal meaning customer opens account reflected paraphrase express alternative — though realistic — meaning card opens account relative pronoun must repeated thus yielding coordination relative sentences sentence unambiguously equivalent meaning paraphrase ambiguities safely removed ace without rendering artificial deterministically interpret otherwise syntactically correct ace sentences use small set interpretation rules example write code attaches verb inserts card however probably meant say express code associated card employ interpretation rule relative sentence always modifies immediately preceding noun phrase rephrase input yielding paraphrase — specify customer inserts card code — usually ace texts consist one sentence express occurrences card code mean card code ace provides anaphoric references via definite article processing ace text anaphoric references replaced recent specific accessible noun phrase agrees gender number example recent specific suppose ace parser given sentence refers second card refers first card noun phrases within if-then sentences universally quantified sentences negations modality subordinated sentences referred anaphorically subsequent sentences i.e noun phrases accessible following text thus sentences refer card anaphoric references also possible via personal pronouns via variables anaphoric references via definite articles variables combined note proper names like simplemat always refer object
[ 8627, 523, 5197, 987 ]
Train
11,426
3
SPARCstation_10:sparcstation 10 sparcstation 10 codenamed campus-2 workstation computer made sun microsystems announced may 1992 sun first desktop multiprocessor housed pizza box form factor case later replaced sparcstation 20 40 mhz sparcstation 10 without external cache reference spec cpu95 benchmark sparcstation 10 ss10 contains two mbus slots running either 36 mhz 33 mhz earliest models 40 mhz set via motherboard jumper mbus slot contain single dual sparc cpu modules permitting expansion four cpus supersparc hypersparc cpu modules available single supersparc modules without external cache sold sun ran clock speed mbus uniprocessor models 20 30 40 dual processor model 402 single dual supersparc modules 1 mb external cache also sold independently clocked ran higher rate mbus commonly 40.3 mhz 50 mhz uniprocessor models 41 51 multiprocessor models 412 512 514 sun dual 50 mhz supersparc modules dual mbus modules supported sun system double-width physically occupying one sbus slot per module addition mbus slot supersparc modules without external cache could mixed supersparc modules external cache could mixed even different clock speeds sun-supported configuration ross hypersparc modules also available third party vendors ss10 reasonable cooling capacity given cramped pizzabox case designed higher-speed hypersparc modules heat issues common modules used particularly four cpu configurations ss10 hold maximum 512 mb ram eight slots ss10 enclosure hold two 50-pin scsi hard drives floppy disk drive scsi devices attached via external scsi port ata disk support one onboard ethernet interface accessed built-in 10base-t jack via special 26-pin port provides aui audio connections one network ports active time special cable adapter needed convert latter port standard da-15 connector also two basic rate interface bri isdn connectors system shipped plastic blocking plugs inserted connectors additional sbus network cards also added sparcstation 10 systems lack integrated graphics referred sparcstation 10sx include sx cg14 framebuffer used sparcstation 20 requiring 4mb 8mb vsimm operate sparcstation 10s seem vsimm slots cutout case solder pads sx 13w3 connector options include cg6 gx gx+ turbo gx tgx+ 8-bit sbus framebuffers capable 1280×1024 resolution 8-bit color zx leo zx 24-bit card hardware-accelerated 3d operations offering high speeds resolutions however poorly supported takes two sbus slots runs extremely hot faster cousin turbo zx requires fan card taking four sbus slots full support available solaris 2.4 2.6 though 2.6 drivers made work solaris 7 8 9 linux includes accelerated driver supports 2d acceleration features 3d netbsd openbsd support without acceleration nextstep openstep support whatsoever ss10 holds system information mac address serial number nvram battery chip dies system able boot
[ 9665, 9955, 10436, 7307, 4172, 823, 7411, 1399, 11129 ]
Validation
11,427
2
Softvol:softvol softvol advanced linux sound architecture alsa plugin adds software based volume control alsa audio mixer alsamixer helpful sound card hardware volume control softvol plugin built alsa require separate installation another use case softvol hardware volume control unable amplify sound beyond certain threshold thus renders audio file quiet case software amplifiers created order boost volume level price sacrificing quality many modern software pieces able play audio files alsa sound system -independent softvol controls
[ 6293 ]
Test
11,428
3
Linux-HA:linux-ha linux-ha high-availability linux project provides high-availability clustering solution linux freebsd openbsd solaris mac os x promotes reliability availability serviceability ras project main software product heartbeat gpl-licensed portable cluster management program high-availability clustering important features project originated mailing list started november 1997 eventually harald milz wrote odd sort linux-ha howto unlike howtos configure use existing software collection ha techniques one could use one write ha software linux alan robertson inspired description thought could perhaps write software project act sort initial seed crystal help jump start project got initial software running 18 march 1998 created first web site project 19 october 1998 first version software released 15 november 1998 first production customer software rudy pawul iso-ne iso-ne web site went production second half 1999 point project limited two nodes simple takeover semantics resource monitoring cured version 2 software added n-node clusters resource monitoring dependencies policies version 2.0.0 came 29 july 2005 release represented another important milestone first version large contributions terms code size made linux-ha community large series releases brought project level feature parity-or-superiority respect commercial ha software version 2.1.4 cluster resource manager component responsible starting stopping resources monitoring resource node failure split separate project called pacemaker resource agents glue infrastructure moved separate packages thus version 3 series name heartbeat used cluster messaging layer
[ 865, 7812, 10917, 8554, 823, 7983, 6993, 4852, 4149, 9621, 3927, 8539, 2045 ]
None
11,429
4
Splunk:splunk splunk inc. american public multinational corporation based san francisco california produces software searching monitoring analyzing machine-generated big data via web-style interface splunk product captures indexes correlates real-time data searchable repository generate graphs reports alerts dashboards visualizations splunk mission make machine data accessible across organization identifying data patterns providing metrics diagnosing problems providing intelligence business operations splunk horizontal technology used application management security compliance well business web analytics early 2016 splunk 10,000 customers worldwide splunk based san francisco regional operations across europe middle east africa asia australia michael baum rob das erik swan co-founded splunk inc 2003 venture firms august capital seven rosen ignition partners jk b capital backed company 2007 splunk raised became profitable 2009 2012 splunk initial public offering trading nasdaq symbol splk september 2013 company acquired bugsense mobile-device data-analytics company bugsense provides mobile analytics platform used developers improve app performance improve quality supplied software developer kit give developers access data analytics mobile devices managed scalable cloud platform acquisition amount undisclosed july 2015 splunk acquired caspida cybersecurity startup october 2015 splunk sealed cybersecurity alliance u.s. government security contractor booz allen hamilton inc. offer combined cyberthreat detection intelligence-analysis technology 2016 splunk pledged donate 100 million software support nonprofits schools 10-year period according glassdoor fourth highest-paying company employees united states april 2017 october 2017 splunk acquired certain technology intellectual property assets smaller rival rocana april 9 2018 splunk acquired phantom cyber corporation approximately us 350 million june 11 2018 splunk announced acquisition victorops devops incident management startup us 120 million splunk core offering collects analyzes high volumes machine-generated data uses standard api connect directly applications devices developed response demand comprehensible actionable data reporting executives outside company department splunk enterprise security es security information event management siem solution provides insight machine data generated security technologies network endpoint access malware vulnerability identity information premium application licensed independently splunk core 2011 splunk released splunk storm cloud-based version core splunk product splunk storm offered turnkey managed hosted service machine data 2013 splunk announced splunk storm would become completely free service expanded cloud offering splunk cloud 2015 splunk shut splunk storm 2013 splunk announced product called hunk splunk analytics hadoop supports accessing searching reporting external data sets located hadoop splunk interface 2015 splunk announced light version core splunk product aimed smaller it-environments mid-sized enterprises splunk debuted splunk service intelligence itsi september 2015 itsi leverages splunk data provide visibility performance software analytics detect unusual behavior determine causes areas affects 2016 google announced cloud platform integrate splunk expand areas like ops security compliance company also announced additional machine learning capabilities several major product offerings installed top platform 2017 splunk introduced splunk insights ransomware analytics tool assessing investigating potential threats ingesting event logs multiple sources software targeted toward smaller organizations like universities company also launched splunk insights aws cloud monitoring service facilitate enterprises migration amazon web services cloud 2018 splunk introduced splunk industrial asset intelligence extracts information iiot industrial internet things data various resources presents users critical alerts splunkbase community hosted splunk users go find apps add-ons splunk improve functionality usefulness splunk well provide quick easy interface specific use-cases and/or vendor products integrations splunkbase include splunk app new relic forescout extended module splunk splunk app aws splunk architectures
[ 4033, 11201, 6372, 4234, 2765, 2733, 7725, 6576, 6993, 1970, 7248, 10196, 1111, 1943, 11542, 2842, 5373 ]
Test
11,430
2
IOS_6:ios 6 ios 6 sixth major release ios mobile operating system developed apple inc successor ios 5 announced company worldwide developers conference june 11 2012 released september 19 2012 succeeded ios 7 september 18 2013. ios 6 added new apple maps app replacing google maps default mapping service operating system dedicated podcasts app central location podcasts passbook app managing different types tickets boarding passes coupons loyalty cards app store received visual overhaul bringing card-based app layout well tweaks search algorithms facebook integrated operating system incorporating status messages like buttons contact event synchronization several apple apps new privacy controls allow users fine-grained app permissions well option prevent targeted advertising siri added devices updated functionality including ability make restaurant reservations launch apps retrieve movie reviews sports statistics read items notification center reception ios 6 positive critics noted operating system offer significant speed improvements major redesigned elements instead focused refinements general consensus apple n't overhauling things sake ios 6 n't completely change way use device tweaks ... make many daily smartphone actions easier across board critics noted refinement something already works extremely well something companies would well emulate release apple maps however attracted significant criticism due inaccurate incomplete data issues prompted open letter apology apple ceo tim cook played contributing role dismissal scott forstall company supervised ios development since inception ios 6 seen updates since march 2014 two subversions ios 6 still 'signed apple software update 6.1.3 certain models ipad 2 iphone 4s 6.1.6 iphone 3gs ipod touch 4th generation meaning verified installed mentioned devices provided user necessary ipsw file ios 6 introduced apple worldwide developers conference june 11 2012. ios 6 officially released september 19 2012. ios 6.0.1 released november 1 2012 first update ios 6 included bug fixes ios 6.0.2 released exclusively iphone 5 ipad mini december 18 2012 fix wi-fi issues ios 6.1 released january 28 2013 update included lte compatibility carriers around world siri fandango integration allow users purchase movie tickets voice u.s. reset advertising identifier setting settings allowing users greater control apps track usage ios 6.1.1 released february 11 2013 specifically iphone 4s fixes issues could impact cellular performance stability ios 6.1.2 released february 19 2013 fix exchange calendar bug could impact network activity battery life ios 6.1.3 released march 19 2013 bug fixes including patching potential lock screen bypass method various improvements ios 6.1.4 released may 2 2013 specifically iphone 5 updated audio profile speakerphone ios 6.1.5 released november 14 2013 specifically 4th generation ipod touch fix facetime calls failing ios 6.1.6 released february 21 2014 specifically 4th generation ipod touch iphone 3gs fixes ssl connection verification also last version ios supported devices apple siri intelligent personal assistant introduced ios 5 release iphone 4s updated include ability make restaurant reservations launch apps read items notification center dictate facebook twitter updates retrieve movie reviews detailed sports statistics siri received language support italian korean cantonese device support iphone 5 fifth-generation ipod touch third-generation ipad ios 6.1 siri integrated fandango allowing users buy film tickets voice feature available united states launch facebook came integrated several apple native apps ios 6 facebook features could directly accessed within native apps calendar could synchronize facebook events contacts could show facebook friend information app store game center featured facebook like button well widget notification center allowed users post status updates social network settings app received multiple changes ios 6 icon revised match system preferences icon used then-named os x computer operating system developed apple disturb mode added allows users disable phone sounds additional options disturb mode include able allow phone calls specific group contacts allowing sound second call someone calls repeatedly crescent moon icon appear status bar disturb mode enabled new privacy settings became available users addition location services following menus added ios 6 contacts calendars reminders photos updated privacy menus allow users fine-grained privacy permission controls app new notifications apps want access information categories ios 6 also came limit ad tracking user control setting allow users option prevent targeted advertising apple advertising identifier described apple nonpermanent nonpersonal device identifier advertising networks use give control advertisers ability use tracking methods choose limit ad tracking advertising networks using advertising identifier may longer gather information serve targeted ads ios 6.1 reset advertising identifier setting added allow users reset identifier used advertising companies ios 6 added twitter widget notification center users could tweet without going app saved resources share sheet interface updated display grid icons opposed list different apps users could share content new apple maps app replaced google maps default mapping app operating system apple maps used apple vector-based engine making smoother zooming new maps turn-by-turn navigation spoken directions 3d views certain countries flyover views major cities real-time traffic launch turn-by-turn navigation available iphone 4s later ipad 2 cellular capability required later flyover view available iphone 4s later fifth-generation ipod touch ipad 2 later new passbook app added retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook replace physical card scanned process mobile payment participating locations app context-aware features notifications relevant coupons immediate vicinity given store automatic visibility boarding passes user airport notifications gate changes camera app updated include new panorama mode allowed users take 240-degree panoramic photos photos app received updates photo stream functionality letting users remove images well share custom photo streams people public app store ios 6 brand new user interface removed categories tab replaced genius apple search recommendation engine also made use cards rather lists present apps also tweaks app store search algorithm resulting trend favor newer companies sparked developer concerns praise app store also updated apps without requiring itunes password installing updating app users longer automatically returned home screen upon receiving calls ios 6 enabled users swipe lock screen reveal reply message remind later reply message feature shows several pre-determined messages option custom message remind later feature offers several options hour later user gets home user leaves current location enable reminder podcast functionality separated itunes app received podcasts app ios 6 order centralize promote podcast listening downloading users safari web browser updated full-screen landscape view iphone ipod touch users reading list feature introduced ios 5 received offline support text images layout saved articles get stored user device facetime video calling updated work cellular connection addition wi-fi clock app iphone ipod touch since original release became available ipad clock design looked similar swiss railway clock apple formed agreement swiss federal railways license design use youtube app default app ios developed apple removed apple told verge reason removal due expired license youtube users could still view videos safari web browser company also confirmed google owns youtube developing app then-upcoming release app store apple-developed youtube app remained ios 5 previous ios versions june 2017 former youtube employee hunter walk tweeted apple contacted youtube make default app original iphone ensure mass market mobile launch video-sharing service required handling development efforts 2012 youtube made gutsy move discontinue license effort take back control app developing reception ios 6 positive dan seifert verge wrote ios 6 looks nearly identical ios 5 subtle tweaks ... every small change look ios details ten things remain praising iphone 4s snappy performer noted comes speed ios 6 n't feel terribly different ios 5 craig grannell techradar wrote ios 6 rather like iphone 5 os x mountain lion refinement something already works extremely well apple n't overhauling things sake main making ios experience gradually better something companies would well emulate jason parker cnet wrote ios 6 welcome upgrade ios user going completely change way use device instead tweaks make many daily smartphone actions easier across board offer relief waiting certain features sending images e-mail call controls example ios 6 apple replaced google maps apple maps default mapping service operating system immediately faced criticism inaccurate incomplete data including museum river missing towns satellite images obscured clouds missing local places apple ceo tim cook issued letter apple website apologizing frustration caused maps application recommended downloading alternative map apps app store scott forstall then-vp ios software engineering involuntarily dismissed role apple october 2012 refused sign name letter apologizing shortcomings apple new mapping service september 2012 sarah downey privacy expert software company abine expressed concern spite new advertising identifier apple n't disclose details identifier actually based stated need tell identifying 've seen lot non-identifying pieces data identify quite easily 're using opt-out apple may longer gather information serve targeted ads says may still collect information things serve targeted ads like build databases send marketing sell third parties many users reported higher-than-normal data usage upgrading ios 6 causing heavily billed data largely exceeding data plan steve rosenbaum huffington post wrote bug result ios 6 problem connects phone cellular data network whenever phone connected wifi signal also stated apple released patch april 2014 users still running ios 6 could connect facetime due expiration certificate apple released support document explaining problem adding devices capable upgrading ios 7 must fix issue devices stuck ios 6 would receive ios 6.1.6 update release apple dropped support older devices specifically third-generation ipod touch first-generation ipad
[ 10755, 9732, 1549, 4111, 5647, 7697, 6675, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8767, 576, 5696, 8774, 8783, 4180, 10838, 1623, 3672, 9308, 3167, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 10888, 5784, ...
None
11,431
2
CE_Linux_Forum:ce linux forum ce linux forum otherwise known consumer electronics linux forum celf non-profit organization works advance linux open source platform consumer electronics ce devices primarily technical focus working specifications implementations conferences testing help linux developers improve linux use ce products celf several key initiatives including forum outgrowth joint project sony corporation matsushita electric industrial co. ltd. also known panasonic celf founded june 2003 several large consumer electronics companies including matsushita electric industrial co. ltd. sony corporation hitachi ltd. nec corporation royal philips electronics samsung electronics co. ltd. sharp corporation toshiba corporation 2009 celf 30 members consisting consumer electronics manufacturers semiconductor vendors linux software companies arm ltd. axe inc. broadcom canon inc. etri fujitsu limited fuji-xerox hewlett-packard hitachi ltd. ibm intel corporation justsystems corporation lg electronics lineo solutions inc panasonic corporation mips technologies nec corporation nxp semiconductors renesas royal philips electronics samsung electronics selenic consulting sharp corporation snapgear sony corporation toshiba corporation yamaha corporation 2007 celf following technical working groups working groups collect improvements linux linux-related software celf members help members coordinate projects enhance linux respective technical areas forum encourages members submit technical output directly back relevant open source project example sending enhancements linux kernel directly linux kernel mailing list appropriate technology- architecture-specific mailing list collected information forum output primarily located forum wiki embedded developers ce linux forum also sponsorships bring embedded projects fruition thanks grants celf amongst others linuxtiny patches logfs squashfs flash file systems pushed mainline linux celf hosts elinux.org wiki wiki dedicated embedded linux forum driving force behind embedded linux conference since 2005 originally started conference us spring also yearly elc europe autumn time frame conferences developer-focused usually attract 150-200 linux engineers elc english-language conference several parallel tracks lasts 2 3 days european conference always co-hosted 2007 hosted real-time linux workshop linz austria 2008 nluug ede netherlands 2009 embedded systems week grenoble 2009 2010 spring conferences americas co-organized linux foundation celf sponsored linux symposium 2004 2008 hosting bofs sessions specific embedded use linux development linux capabilities embedded use japan korea celf organizes technical jamborees every two months jamborees smaller single track held local language
[ 4708, 4871, 2730, 4011, 823, 3323 ]
Test
11,432
4
FIPS_140:fips 140 140 series federal information processing standards fips u.s. government computer security standards specify requirements cryptography modules current version standard fips 140-2 issued 25 may 2001 successor fips 140-3 approved march 22 2019 become effective september 22 2019 fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time national institute standards technology nist issues 140 publication series coordinate requirements standards cryptographic modules include hardware software components use departments agencies united states federal government fips 140 purport provide sufficient conditions guarantee module conforming requirements secure still less system built using modules secure requirements cover cryptographic modules also documentation highest security level aspects comments contained source code user agencies desiring implement cryptographic modules confirm module using covered existing validation certificate fips 140-1 fips 140-2 validation certificates specify exact module name hardware software firmware and/or applet version numbers levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations cryptographic module validation program cmvp operated jointly united states government national institute standards technology nist computer security division communications security establishment cse government canada use validated cryptographic modules required united states government unclassified uses cryptography government canada also recommends use fips 140 validated cryptographic modules unclassified applications departments fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application addition specified levels section 4.1.1 specification describes additional attacks may require mitigation differential power analysis product contains countermeasures attacks must documented tested protections required achieve given level thus criticism fips 140-2 standard gives false sense security levels 2 standard implies modules tamper-evident and/or tamper-resistant yet modules permitted side channel vulnerabilities allow simple extraction keys fips 140 imposes requirements eleven different areas fips 140-1 issued 11 january 1994 developed government industry working group composed vendors users cryptographic equipment group identified four security levels eleven requirement areas listed specified requirements area level fips 140-2 issued 25 may 2001 takes account changes available technology official standards since 1994 comments received vendor tester user communities main input document international standard iso/iec 19790:2006 security requirements cryptographic modules issued 1 march 2006 nist issued special publication 800-29 outlining significant changes fips 140-1 fips 140-2 fips 140-3 new version standard currently development first draft version fips 140-3 standard nist introduced new software security section one additional level assurance level 5 new simple power analysis spa differential power analysis dpa requirements draft issued 11 sep 2009 however reverted four security levels limits security levels software levels 1 2 due way validation process set software vendor required re-validate fips-140-validated module every change matter small software re-validation required even obvious bug security fixes since validation expensive process gives software vendors incentive postpone changes software result software receive security updates next validation result may validated software less safe non-validated equivalent
[ 9281, 420, 229, 7527, 8904, 10121, 2733, 2477, 7983, 5136, 9165, 10801, 3097, 2558 ]
None
11,433
4
Andromeda_(trojan):andromeda trojan andromeda modular trojan first spotted 2011 behavior malware capability checking whether executed debugged virtual environment using anti-virtual machine techniques downloads malware control servers often order steal information infected computers affected countries india 24 vietnam 12 iran 7
[ 7515, 10756 ]
None
11,434
4
PacketFence:packetfence packetfence open-source network access control nac system provides following features registration detection abnormal network activities proactive vulnerability scans isolation problematic devices remediation captive portal 802.1x wireless integration user-agent dhcp fingerprinting
[ 9146, 9442, 3462, 8582, 7983, 5490, 823, 6586 ]
Test
11,435
4
Michael_Schearer:michael schearer michael schearer born november 28 1975 american lawyer writer computer security researcher known research presentations technology improvised explosive devices wireless security cryptography privacy related legal issues contributing author multiple books computer security currently lawyer dla piper computer hacker community known theprez98 originally reading pennsylvania schearer used live glen burnie maryland lives spring grove pennsylvania schearer law degree university maryland francis king carey school law master degree national security studies georgetown university bachelor arts degree political science bloomsburg university previously worked booz allen hamilton united states navy june 1999 february 2008 schearer served naval flight officer electronic countermeasures officer ecmo ea-6b prowler aircraft 2003 2004 schearer flew combat missions vaq-139 uss abraham lincoln afghanistan operation enduring freedom iraq operation southern watch iraq initial phase operation iraqi freedom may 2005 february 2008 schearer assistant professor naval science nrotc unit located pennsylvania state university time deployed iraq nine months electronic warfare officer tasked train military forces use counter-ied equipment returning iraq schearer gave several public presentations concerning technology improvised explosive devices schearer written several articles published naval safety center publications sea shore approach also maintains weblog mikeblog focuses interests sports politics computer technology projects reading also previously wrote popular plain english series summaries supreme court opinions appellate cases easy-to-read format schearer founding member reformed church wifi wireless security research group church hosts member-contributed projects related wireless security issues presented research def con h.o.p.e. penn state security day shmoocon schearer also founding member former keyholder central maryland hackerspace unallocated space schearer presented research number conferences including def con shmoocon penn state security day
[ 6040, 9640, 2558 ]
None
11,436
2
RUNT_Linux:runt linux runt linux acronym resnet usb network tester one many linux distros designed run usb flash drive runt based slackware bare kernel originally designed network tool students north carolina state university consists boot floppy image zip file similar zipslack intended fairly complete linux installation use testing tool capable booting x86 computer usb port bootable floppy
[ 11436, 10149, 823 ]
Test
11,437
4
Protected_computer:protected computer protected computers term used title 18 section 1030 united states code computer fraud abuse act prohibits number different kinds conduct generally involving unauthorized access damage data stored protected computers statute amended national information infrastructure protection act 1996 defines protected computers formerly known federal interest computers computer— exclusively use financial institution united states government case computer exclusively use used financial institution united states government conduct constituting offense affects use financial institution government b used interstate foreign commerce communication including computer located outside united states used manner affects interstate foreign commerce communication united states law prohibits unauthorized obtaining information protected computer conduct involved interstate foreign communication makes felony intentionally transmit malware protected computer 5000 damage integrity data result u. s. justice department explains 1994 amendments national information infrastructure act reach subsection e. subsection 1030 5 broadened replacing term federal interest computer term computer used interstate commerce communications latter term broader old definition federal interest computer 18 u.s.c § 1030 e 2 b covered computer one two computers used committing offense located state meant hacker attacked computers state subject federal jurisdiction even actions may severely affected interstate foreign commerce example individuals attack telephone switches may disrupt interstate foreign calls 1994 change remedied defect however definition federal interest computer actually covered simply interstate activity specifically 18 u.s.c § 1030 e 2 covered generically computers belonging united states government financial institutions used entities non-exclusive basis conduct constituting offense affected government operation financial institution operation computer changing § 1030 5 federal interest computer computer used interstate commerce communications congress may inadvertently eliminated federal protection government financial institution computers used interstate communications example integrity availability classified information contained intrastate local area network may protected 1994 version 18 u.s.c § 1030 5 although confidentiality continued protected 18 u.s.c § 1030 1 remedy situation 1996 act 18 u.s.c § 1030 5 redrafted cover protected computer new term defined § 1030 e 2 used throughout new statute -- § 1030 5 well §§ 1030 2 4 new 7 definition protected computer includes government computers financial institution computers computer used interstate foreign commerce communications broad definition addresses original concerns regarding intrastate phone phreakers i.e. hackers penetrate telecommunications computers also specifically includes computers used foreign communications continually expanding global information infrastructure numerous instances international hacking growing possibility increased global industrial espionage important united states jurisdiction international computer crime cases arguably old definition federal interest computer contained 18 u.s.c § 1030 e 2 conferred jurisdiction requirement computers used committing offense located state might satisfied one computer located overseas general rule however congress laws presumed domestic scope absent specific grant extraterritorial jurisdiction e.e.o.c v. arabian american oil co. 499 u.s. 244 1991 ensure clarity statute amended reference international communications explicitly
[ 4945, 11659, 7564, 4133 ]
None
11,438
3
IBM_ThinkPad_Butterfly_keyboard:ibm thinkpad butterfly keyboard trackwrite also known butterfly keyboard foldout laptop computer keyboard designed john karidis ibm part thinkpad 701 series released 1995 allowed 701 series compact closed comfortable use open despite 24.6 cm 9.7 wide 26.4 cm 10.4 vga lcd 701 top selling laptop 1995 however later laptop models featured progressively larger screens need folding keyboard eliminated consequently model 701 used butterfly keyboard butterfly keyboard split two roughly triangular pieces slide laptop lid opened closed lid opened pieces slide sides followed one piece sliding downward two halves mesh form keyboard 29.2 cm 11.5 wide overhangs sides laptop body conversely lid closed one piece slides back slide inward keyboard covered lid movement keyboard driven cam lid hinge motions keyboard parts always synchronized movement lid unusual design displayed design collection museum modern art manhattan new york die neue sammlung
[ 3304, 3323 ]
None
11,439
8
Puma_(web_server):puma web server puma http web server derived mongrel written evan phoenix stresses speed efficient use memory puma web server shipped mastodon recommended heroku hosting provider replacement unicorn deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing situations cpu load limiting factor
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 7443, 9245, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 7983, 8495, 10800, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 225, 1250, 865, 2404, 4837, 9320, 6379, 5612, 9580,...
Test
11,440
3
SPARCstation_5:sparcstation 5 sparcstation 5 ss5 code-named aurora workstation introduced sun microsystems march 1994 based sun4m architecture enclosed pizza-box chassis simplified cheaper version ss5 released 1996 sparcstation 4 sun also marketed machines netra brand without framebuffers keyboards preconfigured requisite software used web servers sparcstation 5 may incorporate one following processors 70 85 110 mhz sun microsystems microsparc-ii 170 mhz fujitsu microelectronics inc. fmi turbosparc fujitsu also provided 160 mhz turbosparc cpu upgrade kit upgrading 70 85 110 mhz microsparc-ii models sparcstation 5 mbus thus limited use single-processor machine sparcstation 5 eight dsimm slots memory expansion slots filled individually either 8mb 32mb modules giving maximum 256mb memory memory used identical sparcstation 4 sparcstation 5 hold two internal 80-pin sca single ended fast-narrow scsi drives scsi cd-rom drive floppy also supports external scsi devices ide/atapi support sparcstation 5 comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver 10/100mbit/s hme happy meal nic added faster connections openboot rom able boot network using rarp tftp like sparcstation systems ss5 holds system information mac address serial number nvram battery chip dies system able boot sparcstation 5 three sbus expansion slots typical sun computer equipment era third shared expansion backplate physical space special afx connector unique sparcstation 5 one card released slot known s24 tcx framebuffer allowed use 24-bit colour graphics instead eight bit colour sbus cg6 card also known lego low end graphics option tcx also used on-board framebuffer sparcstation 4 version less advanced supported eight bit colour sparcstation 4 introduced 1995 provide lower price point sparcstation 5 although offered 110 mhz microsparc-ii processor sparcstation 5 one sbus expansion slot instead three single 1.05 gb hard drive maximum memory capacity 160 mb instead 256 mb instead built-in audio sparcstation 5 sparcstation 4 requires optional module installed dedicated slot system includes built-in 8-bit pixel-accelerated graphics adapter new lower-cost 17 monitor introduced option afx graphics port sparcstation 4 standard aui ethernet connector unlike sparcstation 5 requires special cable mate non-standard connector sun used enclosure sparcstation 4 sparc xterminal 1 name implies marketed x terminal local storage unlike earlier sparcclassic x use motherboard workstation derived instead using lower-powered 50 mhz microsparc processor expansion base memory 8 mb 128 mb rather 160 mb rather running solaris sparc xterminal 1 sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included swap sparcstation 4 motherboard hard drive additional memory following operating systems run sparcstation 5
[ 225, 9665, 9955, 36, 10436, 10595, 10982, 7307, 878, 2895, 7983, 823, 26, 1788 ]
None
11,441
1
Lex_de_Haan:lex de haan lex de haan 11 august 1954 – 1 february 2006 independent author lecturer researcher consultant specializing relational database technology lex teacher mathematics/informatics secondary school level years 1976 1985 1985 1989 lex employed one year research department dutch independent system vendor minihouse/multihouse moved education department developed delivered courses following areas relational databases sql oracle system development database administration oracle versions 4/5/6 unix system users unix system administration vax/vms system users vax/vms system administration teaching skills workshops lex de haan also responsible hiring mentoring new instructors 1988 1990 lex developed courseware independent contractor de haan consultancy advised organizations education needs delivered classes important customers dutch ministry health culture dutch government education institute roi also worked regular basis frans remmen dutch rdbms sql guru time senior consultant courseware developer instructor pao courses well-known dutch post-academic education organization 1999 lex de haan joined dutch national body iso standardization committee sql language work sql:1999 sql:2003 standards 2002 lex involved oaktable network oracle experts beginning see http //www.oaktable.net march 2004 lex independent 14 years employment oracle lex taught seminars courses natural join b.v. data server internals oracle database 10g new features sql belgium france denmark slovakia sweden turkey united kingdom ireland saudi arabia bahrain another year lot teaching traveling like 2004 lex de haan also delivered well-received presentations hotsos symposium dallas texas ukoug conference birmingham lex de haan also started writing new book together toon koppelaars exciting tentative title applied mathematics database professionals appear mid-2006 last least started organizing seminar events february 2005 lex de haan invited tom kyte us come netherlands teach three-day seminar utrecht first event became great success october 2005 invited steve adams sydney australia second seminar successful seminar series born several events oracle gurus world scheduled 2006 lex de haan author following books oracleekspert magazine published article april 2004 lex de haan entitled 'lex sql server land oracle magazine published article july/august 2005 issue lex de haan jonathan gennick entitled 'nulls nothing worry november 2003 lex de haan held presentation 'the oracle database past present future conference university aalborg denmark
[]
Test
11,442
2
Unix_shell:unix shell unix shell command-line interpreter shell provides command line user interface unix-like operating systems shell interactive command language scripting language used operating system control execution system using shell scripts users typically interact unix shell using terminal emulator however direct operation via serial hardware connections secure shell common server systems unix shells provide filename wildcarding piping documents command substitution variables control structures condition-testing iteration generic sense term shell means program users employ type commands shell hides details underlying operating system manages technical details operating system kernel interface lowest-level inner-most component operating systems unix-like operating systems users typically many choices command-line interpreters interactive sessions user logs system interactively shell program automatically executed duration session type shell may customized user typically stored user profile example local passwd file distributed configuration system nis ldap however user may execute available shell interactively hosts windowing system like macos users may never use shell directly unix systems shell historically implementation language system startup scripts including program starts windowing system configures networking many essential functions however system vendors replaced traditional shell-based startup system init different approaches systemd first unix shell thompson shell sh written ken thompson bell labs distributed versions 1 6 unix 1971 1975 though rudimentary modern standards introduced many basic features common later unix shells including piping simple control structures using codice_1 codice_2 filename wildcarding though current use still available part ancient unix systems modeled multics shell developed 1965 american software engineer glenda schroeder schroeder multics shell modeled runcom program louis pouzin showed multics team rc suffix unix configuration files example .vimrc remnant runcom ancestry unix shells pwb shell mashey shell sh upward-compatible version thompson shell augmented john mashey others distributed programmer workbench unix circa 1975-1977 focused making shell programming practical especially large shared computing centers added shell variables precursors environment variables including search path mechanism evolved path user-executable shell scripts interrupt-handling control structures extended if/goto if/then/else/endif switch/breaksw/endsw while/end/break/continue shell programming became widespread external commands incorporated shell performance widely distributed influential early unix shells bourne shell c shell shells used coding base model many derivative work-alike shells extended feature sets bourne shell sh new unix shell stephen bourne bell labs distributed shell unix version 7 1979 introduced rest basic features considered common unix shells including documents command substitution generic variables extensive builtin control structures language including use reversed keyword mark end block influenced algol 68 traditionally bourne shell program name sh path unix file system hierarchy /bin/sh number compatible work-alikes also available various improvements additional features many systems sh may symbolic link hard link one alternatives posix standard specifies standard shell strict subset korn shell enhanced version bourne shell user perspective bourne shell immediately recognized active characteristic default command line prompt character dollar sign c shell csh modeled c programming language including control structures expression grammar written bill joy graduate student university california berkeley widely distributed bsd unix c shell also introduced many features interactive work including history editing mechanisms aliases directory stacks tilde notation cdpath job control path hashing many systems csh may symbolic link hard link tenex c shell tcsh improved version joy original version although interactive features csh copied shells language structure widely copied work-alike hamilton c shell written nicole hamilton first distributed os/2 1988 windows since 1992 shells read configuration files various circumstances files usually contain commands shell executed loaded usually used set important variables used find executables like path others control behavior appearance shell table section shows configuration files popular shells explanation variations unix shell concept n't derive bourne shell c shell include following
[ 9733, 2062, 9747, 7188, 9762, 5156, 2603, 9780, 10304, 8771, 8262, 1611, 2132, 10841, 10341, 5743, 8303, 8304, 5236, 6772, 9848, 5754, 5759, 1666, 2181, 4750, 10387, 3221, 3222, 155, 7325, 3744, 7847, 10407, 4267, 6333, 6335, 9930, 8399, ...
None
11,443
3
Xanadu_(video_game):xanadu video game also known xanadu dragon slayer ii action role-playing game developed nihon falcom released 1985 pc-8801 x1 pc-8001 pc-9801 fm-7 msx computers enhanced remakes later released sega saturn pc-9801 windows platforms second dragon slayer series preceded dragon slayer followed games dragon slayer series little relation xanadu set sales record computer games japan 400,000 copies sold 1985 one foundations role-playing genre particularly action role-playing subgenre featuring real-time action combat combined full-fledged character statistics innovative gameplay systems karma meter individual experience equipped items platform game elements combined dungeon crawl gameplay predecessor also towns explore introduced equipment change player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance following year saw release xanadu scenario ii early example expansion pack game begins player directly control protagonist little introduction progress one must speak king gives player bare essentials small amount cash train selecting attributes raise player must find way city vast underground complex finding exit first many puzzles player encounter though game puzzle game role-playing video game puzzle game adventure game elements protagonist move left right climb ladders jump cast equipped spells enter doors use equipped items similar falcom later ys series damage done walking directly enemy unlike ys xanadu n't matter part target body player character runs main view xanadu side-scrolling platformer view though line sorcerian typical platformer super mario bros. engaging battle entering building view changed top-down perspective layer stratum complex network buildings caves tunnels acquire level player must visit temples minister grant level protagonist provided enough experience points otherwise minister let player know much needed go level two types levels fighting magic fighting experience raised combat magic though spell use two systems go hand hand used time enemy killed either good bad even though enemies attack player character player kills many good enemies karma statistic rise point temples refuse level player remedied drinking black poison bottle however carried bought must found within dungeons remove half protagonist hit points equipable items swords armor experience levels raised simply using item example swords attacking armor hit magic casting spell sense highly developed dagger effective brand new longsword however highly developed sword far useful maxed dagger vital upgrade equipment xanadu limited number enemies area deter powerleveling requires player think ahead handles enemies get experience keep karma getting high factor must juggled weapon experience player defeats enemies using dagger upgrades sword proceeds fight area boss player disadvantage either kept highly developed dagger bought sword early level finite number encounters area every area generally least one boss though always required fight enemies drop various items commonly drop money food money used upgrading equipment buying items protagonist slowly eats supply food time passes game slowly heals hit points well food runs hit points begin dropping rapid pace food found bought protagonist dies addition purchasing items found chests dungeon areas entering secret code name character creation area outset game autosaves right boss fight leaving building player manually save costs 100 gold sega saturn remake away adding save command status menu xanadu large set followups despite technically sequel dragon slayer xanadu ova released 1987 conjunction msx version game manga titled xanadu legend dragon slayer plot expanded altered main character name fieg フィーグ several new cast members new plot elements included several science fiction themes example fieg 21st-century soldier near future dropped xanadu bloody ambush soundtrack movie released record cassette compact disc shortly thereafter manga follows plot movie drawn tsuzuki kazuhiko 都築和彦 also work falcom ys sorcerian titles republished 17 part serial webcomic falcom release revival xanadu falcom website accompanying music english translation original pc-8801 release xanadu features music composed toshiya takahashi promote release game japanese heavy metal band anthem released lp two image songs titled xanadu msx versions game released 1987 different score xanadu scenario ii expansion pack features much larger set songs soundtrack composed takahito abe yuzo koshiro would compose music many falcom later titles koshiro compositions opening theme several dungeons taken demo tape first sent falcom age 18 revival xanadu revival xanadu ii two loose remakes made falcom 1990s feature unique soundtracks well also composed koshiro abe aside xanadu next legend xanadu xanadu titles received full independent original soundtrack compact disc however soundtrack released xanadu xanadu scenario ii 12 vinyl record album titled xanadu anthem selections xanadu music heard various falcom albums 1987 xanadu released featuring arranged versions xanadu scenario ii soundtrack played rock band combined live orchestra synthesizers main theme xanadu franchise la valse pour xanadu featured pc-88 pc-98 versions xanadu remixed several audio tracks xanadu next french magazine joypad reviewed pc-e version gave 97 xanadu pioneer game industry received critical praise japanese gaming magazines large fan base 2005 according falcom 1985 sales record 400,000 copies sold japan yet broken role-playing personal computer game released country however tokihiro naito e soft said first hydlide action-rpg like xanadu sold one-million copies across computer formats combining sales matching famicom sales also one-million copies japan influence xanadu felt many games developed falcom even development houses copied look feel ys featured similar quicker complex bump system combat used ys ys ii ys iv later dragon slayer games dragon slayer iv sorcerian similar side-scrolling viewpoints however bump system start xanadu predecessor original dragon slayer several smaller companies copied bump system mostly obscure pc-8801 titles dragon slayer laid foundations action role-playing game genre influencing future series like ys legend zelda xanadu early real-time action rpg full-fledged character statistics introduced several innovative gameplay mechanics karma morality system individual experience equipped items heavy emphasis puzzle-solving equipment changes player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance training facilities improve various statistics also introduced platformer-style side-scrolling view including ability jump side-scrolling view used exploration switches overhead view predecessor battle certain rooms also use overhead view game influence also extended beyond action rpgs way game reworked entire game system considered influence final fantasy would installments developer square previously publisher msx version original dragon slayer xanadu also considered proto-metroidvania game due rpg turned side allowed players run jump collect explore laying foundations open-ended metroidvania games faxanadu legacy wizard xanadu scenario ii released 1986 early example expansion pack also non-linear allowing levels explored order xanadu title falcom given complete commemorative re-release original 1980s packaging though various degrees success older titles xanadu falcom breakthrough brought spotlight origin systems founder ultima series creator richard garriott flew tokyo meeting nihon falcom origin release xanadu us well falcom help releasing port japan however xanadu contained artwork directly lifted manuals role-playing game presentation game several digitized pictures manual ultima iii appeared various shops game upon seeing garriott origin ended meeting decided sue falcom lawsuit settled court artwork game changed appears
[ 770, 2249, 3113, 10217, 2156, 6797, 9006, 4527, 10931, 11443, 4536, 9658, 1596, 6077 ]
None
11,444
2
Out_of_memory:memory memory oom often undesired state computer operation additional memory allocated use programs operating system system unable load additional programs since many programs may load additional data memory execution cease function correctly usually occurs available memory including disk swap space allocated historically memory condition common since early computers operating systems limited small amounts physical random-access memory ram due inability early processors address large amounts memory well cost considerations since advent virtual memory opened door usage swap space condition less frequent almost modern programs expect able allocate deallocate memory freely run-time tend fail uncontrolled ways crash expectation met older ones often allocated memory checked whether got enough work expected forthcoming therefore would either fail immediately memory error message work expected early operating systems ms-dos lacked support multitasking programs allocated physical memory could use needed physical memory often scarce resource exhausted applications terminate stay resident functionality applications could started running applications closed modern operating systems provide virtual memory processes given range memory memory directly correspond actual physical ram virtual memory backed physical ram disk file via mmap swap space operating system move virtual memory pages around needs virtual memory need backed physical memory exhaustion rare usually limits imposed operating system resource consumption predicted moore law amount physical memory computers grown almost exponentially although offset degree programs files becoming larger cases computer virtual memory support majority loaded data resides hard disk may run physical memory virtual memory thus causing excessive paging condition known thrashing usually renders computer unusable programs closed machine rebooted due reasons memory message rarely encountered applications modern computers however still possible encounter oom condition modern computer typical oom case modern computers happens operating system unable create virtual memory potential backing devices filled end-user disabled kernels operating systems linux attempt recover type oom condition terminating one processes mechanism known oom killer linux 4.6 released may 2016 introduced changes oom situations improving detection reliability. cgroup awareness oom killer implemented linux kernel 4.19 released october 2018 adds ability kill cgroup single unit apart system-wide physical memory limits systems limit amount memory process use usually matter policy limitation also happen os larger address space available process level high-end 32-bit systems physical address extension enabled come 8 gigabytes system memory even though single process access 4gb 32-bit flat memory model process exceeds per-process limit attempts allocate memory encounter error condition example c standard function allocating memory codice_1 return null well-behaved application handle situation
[ 6536, 2571, 3725, 5520, 3474, 11539, 8852, 1694, 2345, 6319, 7983, 9016, 9919, 321, 1736, 9166, 2383, 5840, 855, 10333, 2273, 7907, 5744, 7795, 8316 ]
None
11,445
7
Application_Networks:application networks application networks inc. appnet palo alto-based company provider jrisk packaged financial risk management software use on-premises part cloud computing environments customers included global banks banks used jrisk risk management portfolio securities otc contracts financial derivative transactions application networks inc. acquired reuters june 2006
[ 4194 ]
None
11,446
4
Parasoft_C/C++test:parasoft c/c++test parasoft c/c++test integrated set tools testing c c++ source code software developers use analyze test find defects measure quality security applications supports software development practices part development testing including static code analysis dynamic code analysis unit test case generation execution code coverage analysis regression testing runtime error detection requirements traceability code review commercial tool supports operation linux windows solaris platforms well support on-target embedded testing cross compilers parasoft c/c++test combined set tools helps developers test software delivered standalone application runs command line plug-in eclipse microsoft visual studio various modules set assist software developers performing static dynamic analysis creating executing maintaining unit tests measuring code coverage software metrics executing regression tests errors c/c++test discovers include uninitialized invalid memory null pointer dereferencing array buffer overflow division zero memory resource leaks duplicate code various types dead unreachable code c/c++test customers include samsung electronics wipro nec selex sistemi integrati also used lockheed martin f-35 joint strike fighter program jsf inomed uses achieve iec 62304 certification medical device software testing software code coverage measure parts code executed test many different methods measuring coverage different criteria calculated depending needs choose best fit application c/c++test includes options line coverage meaning line executed block coverage statement coverage path coverage decision coverage branch coverage simple condition coverage also supports modified condition/decision coverage mcdc projects require safe reliable software aircraft cars tend required form coverage believed better measure whether code thoroughly exercised regression testing verifies software continues operate correctly even changes made new versions released c/c++test automatically generates tests capture current state applications behavior recording happens application running later test runs compared stored results earlier runs help determine problems changes code may introduced robust regression test suite especially critical areas short release cycles high degrees test automation agile software development extreme programming help insure changes n't introducing bugs software c/c++test includes lightweight form runtime error detection suitable use embedded systems including running target board host helps find serious runtime defects memory leaks null pointers uninitialized memory buffer overflows software metrics used help assess improve software quality metrics used help determine bug-prone code might others help understand maintainability proper construction c/c++test provides variety software metrics including traditional counting metrics lines files comments methods etc well industry standards like fan cyclomatic complexity cohesion various halstead metrics users configure metrics want run applicable set thresholds acceptable value particular metric allows users flag code outside expected range error reviewed fixed graphic reports provided show values trends metrics static code analysis process analyzing source code without executing software helps developers find bugs early well code according best practices helps create code less susceptible bugs avoiding potentially dangerous code styles constructs industries software performance critical often requirements run static analysis tools even particular static analysis rules static analysis c/c++test includes different types analysis including pattern-based abstract interpretation flow analysis metrics helps detect code responsible memory leaks erratic behavior crashes deadlocks security vulnerabilities c/c++test comes pre-configured templates assist enforcing static analysis rules variety industry standards working industries strict coding requirements regulatory standards necessary able prove application developed according required steps traceability information necessary prove software audit 've done proper process commonly means able prove code belongs particular requirement well reviewed outcome review also encompasses tests analysis performed code done tests failed c/c++test keeps track testing links back requirement system source control system bug tracking systems provides full traceability step software development process purpose unit testing make sure individual pieces software application work properly integration programming languages like c c++ usually consists single file small number files perform related function unit testing encompasses creation tests execution tests see results maintenance tests long term use unit testing often associated code coverage shows exactly lines code executed test functionalities included c/c++test c++test helps create unit tests compatible xunit testing frameworks also provides tracing functionality lets monitor system test generate test cases based actual paths data used execution also provides functionality handle isolating code necessary allow function without rest application also called stubbing well object repository store share reuse software objects initialized necessary test data stubs allow remove dependent parts full application database api still run application component still c/c++test allows create necessary stubs run code isolation capability alter extend test data provided variety means data source interface allows read test inputs files spreadsheets databases tests also run simultaneous runtime error detection turned find serious programming flaw wo n't necessarily cause assertion failures testing likely cause software instability deployed execution embedded systems support whether host target simulator including cross-compilation loading tests target loading results remote execution back gui parasoft c/c++test originally introduced 1995 static analysis tool based guidelines found book effective c++ scott meyers later unit test creation execution added product renamed c++test eventually product name modified include c c++ reflect languages actually covered parasoft c/c++test software test performances ’ 2008 testers choice award best embedded/mobile test/performance category selected vdc software embeddy best show award winner 2012 parasoft received tuv certification automotive functional safety tool 2011 according iec 61508 iso 26262 standards
[ 5636, 9482, 6797, 1687, 1689, 5404, 2465, 6817, 8355, 9509, 7983, 823, 1474, 11208, 2761, 4171, 8531, 4820, 9432, 2658, 5612, 2045, 3583 ]
None
11,447
3
Motorola_68000_series:motorola 68000 series motorola 68000 series also termed 680x0 m68000 m68k 68k family 32-bit cisc microprocessors 1980s early 1990s popular personal computers workstations primary competitors intel x86 microprocessors well known processors powering early apple macintosh commodore amiga sinclair ql atari st sega genesis mega drive several others although modern desktop computers based processors 68000 series derivative processors still widely used embedded systems motorola ceased development 68000 series architecture 1994 replacing powerpc architecture developed conjunction ibm apple computer part aim alliance 68010 68020 68030 68040 68060 68000 line processors used variety systems modern high-end texas instruments calculators ti-89 ti-92 voyage 200 lines members palm pilot series run palm os 1.x 4.x os 5.x arm-based even radiation-hardened versions critical control systems space shuttle however became well known processors powering desktop computers apple macintosh commodore amiga sinclair ql atari st several others 68000 also processor choice 1980s unix workstations servers firms sun microsystems next silicon graphics sgi 68000 version cp/m called cp/m-68k initially proposed atari st operating system atari chose atari tos instead also perhaps significantly first several versions adobe postscript interpreters 68000-based 68000 apple laserwriter laserwriter plus clocked faster version used macintosh computers fast 68030 later postscript interpreters including standard resolution laserwriter iintx iif iig also 300 dpi higher resolution laserwriter pro 600 series usually 600 dpi limited 300 dpi minimum ram installed high resolution linotronic imagesetters 200ps 1500+ dpi 300ps 2500+ dpi thereafter adobe generally preferred risc processor competitors postscript clones already gone riscs often amd 29000-series early 68000-based adobe postscript interpreters hardware named cold war-era u.s. rockets missiles atlas redstone etc today systems either end-of-line case atari using different processors case macintosh amiga sun sgi since platforms peak market share 1980s original manufacturers either longer support operating system hardware business however gnu/linux netbsd openbsd operating systems still include support 68000 processors 68000 processors also used sega genesis mega drive snk neo geo consoles main cpu consoles sega saturn used 68000 audio processing i/o tasks atari jaguar included 68000 intended basic system control input processing due jaguar unusual assortment heterogeneous processors also frequently used running game logic many arcade boards also used 68000 processors including boards capcom snk sega microcontrollers derived 68000 family used huge variety applications example cpu32 coldfire microcontrollers manufactured millions automotive engine controllers many proprietary video editing systems used 68000 processors category name macrosystem casablanca black box easy use graphic interface 1997 intended amateur hobby videographer market also worth noting earlier bigger professional counterpart called draco 1995 groundbreaking quantel paintbox series early based 24-bit paint effects system originally released 1981 lifetime used nearly entire range 68000 family processors sole exception 68060 never implemented design another contender video arena abekas 8150 dve system used 680ec30 trinity play later renamed globecaster uses several 68030s bosch fgs-4000/4500 video graphics system manufactured robert bosch corporation later bts 1983 used 68000 main processor drove several others perform 3d animation computer could easily apply gouraud phong shading run modified motorola versados operating system people familiar pdp-11 vax usually feel comfortable 68000 exception split general-purpose registers specialized data address registers 68000 architecture many ways 32-bit pdp-11 orthogonal instruction set many processors came e.g. 8080 e.g. x86 typically possible combine operations freely operands rather restricted using certain addressing modes certain instructions property made programming relatively easy humans also made easier write code generators compilers 68000 instruction set divided following broad categories 68050 though one point project within motorola odd-numbered releases always reactions issues raised within prior even numbered part hence generally expected 68050 would reduced 68040 power consumption thus heat dissipation improved exception handling fpu used smaller feature size optimized microcode line program use instructions many optimizations included 68060 part design goals number reasons likely 68060 development intel 80486 progressing quickly motorola assumed would 68060 demanding project 68050 cancelled early development also revision 68060 motorola process shifting away 68000 88k processor lines new powerpc business 68070 never developed would revised 68060 likely superior fpu pipelining widely speculated upon usenet motorola mainly used even numbers major revisions cpu core 68000 68020 68040 68060 68010 revised version 68000 minor modifications core likewise 68030 revised 68020 powerful features none significant enough classify major upgrade core cpu 68070 designation licensed somewhat slower version 16/32-bit 68000 basic dma controller i²c host on-chip serial port 68070 used main cpu philips cd-i cpu however produced philips officially part motorola 680x0 lineup 4th-generation 68060 shared features intel p5 microarchitecture personal computers xt/370 at/370 pc-based ibm-compatible mainframes included two modified motorola 68000 processors custom microcode emulate s/370 mainframe instructions mainline 68000 processors demise 68000 family used extent microcontroller embedded microprocessor versions chips include ones listed i.e cpu32 aka 68330 coldfire quicc dragonball advent fpga technology international team hardware developers re-created 68000 many enhancements fpga core core known 68080 used vampire-branded amiga accelerators 1980s early 1990s 68000 widely used desktop computers mainly competed intel x86 architecture used ibm pc compatibles generation 1 68000 cpus primarily competed 16-bit 8086 8088 80286 generation 2 competed 80386 first 32-bit x86 processor generation 3 80486 fourth generation competed p5 pentium line nearly widely used predecessors since much old 68000 marketplace either defunct nearly case atari next converting newer architectures powerpc macintosh amiga sparc sun mips silicon graphics sgi dozens processor architectures currently successful embedded systems microcontrollers much simpler smaller cheaper 68000 others relatively sophisticated capable running complex software embedded versions 68000 often compete processors derived powerpc arm mips superh architectures among others
[ 7170, 7173, 2058, 1548, 2073, 5663, 10786, 8231, 10796, 3630, 11314, 8761, 6715, 6207, 7234, 7235, 1606, 8268, 2638, 6243, 7269, 11374, 3185, 5235, 7286, 1149, 7806, 2179, 7299, 1158, 7302, 7305, 7307, 7311, 1170, 8851, 9363, 5272, 6815, ...
Test
11,448
3
Herzog_(video_game):herzog video game herzog german duke strategy video game released technosoft japan msx nec pc-88 computers 1988 real-time tactics tactical shooter game real-time strategy elements game served prototype sequel herzog zwei released 1989 sega mega drive often considered first true real-time strategy game game centered around fictional war countries mercies blue side game ruth red side game single player mode game player takes control mercies army whose goal reach capture headquarters ruth army gameplay takes place among nine battlegrounds beginning capital mercies vaxan victory player brings player army next battleground closer remerje capital ruth game ends either player defeated vaxan computer controlled army defeated remerje game also end player loses last land-armor stock see units player loses battleground vaxan player move backwards complete previous stage ten years prior game events president hughes head republic mercies assassinated ruth liberian army terrorist organisation lead roger tense takes responsibility act previously friendly relations mercies ruth deteriorate war breaks major powers intervene conflict sides war spreads engulf world decade later ruth army gates vaxan capital mercies war begins draw close player successful captures remerje capital ruth war ends two countries sign peace treaty five years later battleground linear path player base located one side enemy base located side side land-armor fly air travel ground pick drop friendly units attack units including friendly ones side must use funding automatically replenished rate ten money units every half-second approximately build various units travel length battlefield battle opposing units unit successfully manages reach opposing end battlefield unit cause certain amount damage enemy base battle side manages damage opposing base enough destroy visual aspect gameplay represented vertically aligned graphical area units controlled real-time small horizontal radar top screen units represented colored dots scroll across screen according position bottom screen side gauges show percentage damage taken respective land-armors bases either reaches 100 percent damage destroyed gameplay two-player mode essentially single player game graphical area split two sides player player one blue player two red major difference first battle takes place location middle two capitals progress forward backward depending wins one capital defeated combat deployable units available follows land-armor land-armor important unit game one land-armor time active battleground directly controlled player units move independently land-armor travel ground hover air attack enemy ground air units land-armor also pick units drop different locations land-armor health displayed screen replaced another land-armor destroyed computer controlled army infinite number land-armors player must buy extras needed destruction player last land-armor results automatic game soldier soldiers fairly slow moving ground units fire single shots ground enemies soldiers weak take one hit destroyed cheap create land-armor picks one repair land-armor rate 1 percentage point per second way repair land-armor land-armor carry five soldiers time tank tanks main attack unit army fairly expensive make slow moving take lot hits destroyed lot damage bases tank rate fire soldier land-armor carry one tank time aam anti aircraft missile -carrier aam-carriers medium speed moving units equipped attack ground units instead armed finite number homing missiles seek attack enemy land-armor ground air unit attack land-armor air besides another land-armor land-armor carry one aam-carrier time upon pressing fire button land-armor unleash entire payload homing missiles aam-carrier holding side car side cars lightweight inexpensive motorcycle units fast reach enemy base quickly also higher rate fire units damage little faster downside low tolerance damage land-armor carry one side car time antitank-gun antitank-guns ground turrets must first placed land-armor attack enemies position although expensive unable move without assistance durable high rate fire making ideal take tanks name suggests defend bases land-armor carry one antitank-gun time grand-slam expensive unit next land-armor grand-slam missile powerful travels across battleground slowly successfully reaches opposing base automatically destroys 100 percent damage grand-slam ca n't seen interacted graphical area seen blip radar game flash warning grand-slam launched way destroy grand-slam send another grand-slam collide opposite end path final note player maximum 50 units battleground time herzog served prototype well known 1989 sega mega drive sequel herzog zwei considered first real time strategy game first feature set falls contemporary definition genre predating genre-popularizing dune ii 1992
[ 3307, 8300, 9006, 5011, 11231 ]
Validation
11,449
5
TenFourFox:tenfourfox tenfourfox web browser power macintosh computers based mozilla gecko layout engine port mozilla firefox powerpc-based macintosh computers running mac os x retain compatibility older architecture older versions operating system add powerpc-specific optimizations improved performance project started mozilla announced would release firefox 4 powerpc versions os x like firefox includes compatibility wide range addons acid2 acid3 compliance html 5 css 3 features however also includes javascript just-in-time compilation custom builds specific powerpc processor families altivec acceleration key media codecs primary maintainer cameron kaiser project shares administration classilla fork mozilla application suite mac os 9 mac os 8.6 2010 mozilla mike beltzner announced forthcoming firefox 4 would released power macintosh computers compatibility mac os x tiger already removed making firefox 3.6 last supported release firefox older architecture platform mozilla stopped making powerpc-compatible universal builds firefox 4 beta 7 response developer cameron kaiser created test build firefox 4 could run power mac g5 time support withdrawn beta 7 released users separate builds altivec macs g3 macs november 8 2010 aligning precedent modified builds firefox source could use firefox trademarks without permission project forked named tenfourfox full complement builds g3 7400 7450 g4 families g5 released beta 8 december 15 2010 javascript acceleration using completed powerpc version tracemonkey released beta 9 january 12 2011 enabled fully beta 11 february 2 2011 finalized first release version 4.0s incorporated security update fix javascript performance released march 24 2011 version 5.0 switched current mozilla rapid release framework based firefox 5 including additional altivec scaling color features released june 16 2011 mozilla announced extended support release esr firefox cameron kaiser stated starting version 10 tenfourfox stable releases tenfourfox based firefox esr reduce maintenance burden major esr versions developers tracked changes firefox 6-week rapid release cycle test builds determine whether would still able build software next esr version released minor esr updates advertised suitable general consumption december 2015 kaiser declared tenfourfox would move away directly firefox source code 45 esr citing inability port later versions due operating system rust compiler limitations first feature parity releases fprs major later firefox features backported tenfourfox modified firefox esr 45 base released official end firefox esr 45 support june 13 2017 tenfourfox fpr series releases include additional later features well backported security patches current supported firefox esr tenfourfox shares main feature set firefox along optimizations powerpc platform similar optimized build projects pale moon swiftfox tenfourfox includes specific compiler optimizations improve overall performance issues specific builds tuned specific processor families however also includes custom new features particular javascript just-in-time compilation backend altivec acceleration adds glue code enable interface features firefox 4 later still work mac os x tiger led favorable reviews speed performance older macintosh computers due compatibility older operating system browser lacks entire feature set modern firefox versions particular fully support core text understand apple advanced typography features certain international fonts support graphics acceleration compositing support webgl powerpc tiger support opengl 2 furthermore security maintainability reasons npapi plugins support deprecated subsequently removed
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 9281, 5707, 10834, 6231, 8281, 2139, 6747, 3167, 2149, 1642, 9834, 9841, 115, 9843, 4728, 637, 1664, 2182, 6791, 11418, 10910, 8351, 7340, 1713,...
None
11,450
9
IBM_Cross_System_Product:ibm cross system product ibm cross system product csp application generator intended create online systems ibm mainframe platforms introduced 1981 csp consisted set source code generators allowed developers interactively define test generate execute application programs csp composed two products csp version 3 released 1986 extended functions 1987 saa announcement cast doubt ibm commitment csp – n't silent csp dismembered it. last version csp version 4.1 went support end 2001 1994 ibm released successor product called visualgen incorporated ability develop client/server applications particularly addition graphical user interfaces guis applications ability access data non-ibm vendors ’ data stores ability execute application operating environments beyond mainframe 1996 product renamed visualage generator visualage generator withdrawn service 2009 succeeded rational business developer
[ 10280, 4042, 7053, 11673, 5562, 3323 ]
Test
11,451
7
Fallacies_of_distributed_computing:fallacies distributed computing fallacies distributed computing set assertions made l peter deutsch others sun microsystems describing false assumptions programmers new distributed applications invariably make fallacies list fallacies generally came sun microsystems l. peter deutsch one original sun fellows credited penning first seven fallacies 1994 however bill joy tom lyon already identified first four fallacies networked computing article claims dave lyon mistake around 1997 james gosling another sun fellow inventor java added eighth fallacy
[ 9665, 1316, 5677, 9391, 2558 ]
Validation
11,452
3
Champion_Boxing:champion boxing yu suzuki described champion boxing minor project little staff said allowed learn process games development little pressure game understaffed designers suzuki actually contributed drawings various punching animations according suzuki game developed sg-1000 first arcade version created simply installing sg-1000 arcade cabinet pengo makes cameo ko
[ 4716, 8300, 9006, 1776, 5011, 629, 5629 ]
Test
11,453
1
New_South_Wales_Heritage_Database:new south wales heritage database new south wales heritage database state heritage inventory online database information historic sites new south wales australia statutory heritage listings holds information sites listed new south wales state heritage register 1,650 entries addition sites heritage lists managed new south wales local government authories statutory heritage registers important note online database holding information historic sites heritage register historic site multiple entries database listed multiple heritage registers example young railway station three heritage registers therefore three entries database database licensed cc-by except material identified copyright third parties
[]
Test
11,454
3
Personal_Editor:personal editor personal editor pe personal editor ii pe2 text editor developed ibm ibm pc dos ms-dos 1980s became popular easy fast programmable custom keyboard shortcuts user interface pe influenced successor text editors personal editor 32 modern 32-bit editor user interface based pe2/pe3 qe text editor linux systems asia-pacific region ibm japan released dbcs version personal editor ibm 5550 ps/55 available ibm lineup years although e editor came pc dos since version 6.1
[ 6148, 9166, 7983, 6129, 823, 3323 ]
Test
11,455
4
Winn_Schwartau:winn schwartau winn schwartau born july 1 1952 new york city expert security privacy infowar cyber-terrorism related topics known appearances defcon host popular game hacker jeopardy provocative original ideas written dozen works security topics 2002 honored “ power thinker ” one 50 powerful people networking network world 2008 voted one 25 influential people security industry security magazine first non-fiction book information warfare chaos electronic superhighway 1994 1996 1997 introduces concepts cyberterrorism public another books cybershock 2000 2001 non-technical look def con conference hackers general phreaking importance computer security wrote time based security outlining use time security metric pearl harbor dot com novel terrorist cyberattack united states 2001 winn labeled one network world major power thinkers network world 2007 sc magazine labeled one top 5 security thinkers called civilian architect information warfare identified one 25 influential people security industry schwartau author internet computer ethics kids parents teachers without clue 2001/2002 dr. fred cohen all.net described book “ best security book ever written ” latest work analogue network security released august 8th 2018 bsides las vegas schwartau chairman board mobile active defense specializing security compliance smartphones tablets president founder security awareness company formerly known interpact inc. develops security awareness programs private public organisations also founded infowarcon 1994 trusted learning 2003 co-founded scipp international 2007
[ 3941, 5575 ]
Validation
11,456
5
Directory_Assistance_Service:directory assistance service directory assistance service das obsolete protocol service accessing x.500 directory services das intended provide lightweight means clients access x.500 directory services via split-directory user agent model directory user agent dua directory client split directory assistance da client directory assistant directory user would interact da-client da-client would communicate directory assistant using da protocol directory assistant would communicate directory service using x.500 directory access protocol dap directory assistant directory assistance protocol dap gateway design allows da-client access directory without requiring support cumbersome open systems interconnection protocol stack directory assistance service created 1990 marshall rose performance systems international inc. formally specified rfc 1202 published 1991 evolution dish client/server interface quipu developed colin robbins university college london related efforts dixie lead development lightweight directory access protocol ldap replaced directory assistance service
[ 10238, 6651, 6054, 2359 ]
Validation
11,457
1
Entity–relationship_model:entity–relationship model entity–relationship model er model describes interrelated things interest specific domain knowledge basic er model composed entity types classify things interest specifies relationships exist entities instances entity types software engineering er model commonly formed represent things business needs remember order perform business processes consequently er model becomes abstract data model defines data information structure implemented database typically relational database entity–relationship modeling developed database design peter chen published 1976 paper however variants idea existed previously er models show super subtype entities connected generalization-specialization relationships er model used also specification domain-specific ontologies entity–relationship model usually result systematic analysis define describe important processes area business define business processes presents business data schema graphical form usually drawn graphical form boxes entities connected lines relationships express associations dependencies entities er model also expressed verbal form example one building may divided zero apartments one apartment located one building entities may characterized relationships also additional properties attributes include identifiers called primary keys diagrams created represent attributes well entities relationships may called entity-attribute-relationship diagrams rather entity–relationship models er model typically implemented database simple relational database implementation row table represents one instance entity type field table represents attribute type relational database relationship entities implemented storing primary key one entity pointer foreign key table another entity tradition er/data models built two three levels abstraction note conceptual-logical-physical hierarchy used kinds specification different three schema approach software engineering first stage information system design uses models requirements analysis describe information needs type information stored database data modeling technique used describe ontology i.e overview classifications used terms relationships certain area interest case design information system based database conceptual data model later stage usually called logical design mapped logical data model relational model turn mapped physical model physical design note sometimes phases referred physical design entity may defined thing capable independent existence uniquely identified entity abstraction complexities domain speak entity normally speak aspect real world distinguished aspects real world entity thing exists either physically logically entity may physical object house car exist physically event house sale car service concept customer transaction order exist logically—as concept although term entity one commonly used following chen really distinguish entity entity-type entity-type category entity strictly speaking instance given entity-type usually many instances entity-type term entity-type somewhat cumbersome people tend use term entity synonym term entities thought nouns examples computer employee song mathematical theorem etc relationship captures entities related one another relationships thought verbs linking two nouns examples owns relationship company computer supervises relationship employee department performs relationship artist song proves relationship mathematician conjecture etc model linguistic aspect described utilized declarative database query language errol mimics natural language constructs errol semantics implementation based reshaped relational algebra rra relational algebra adapted entity–relationship model captures linguistic aspect entities relationships attributes examples employee entity might social security number ssn attribute proved relationship may date attribute every entity unless weak entity must minimal set uniquely identifying attributes called entity primary key entity–relationship diagrams n't show single entities single instances relations rather show entity sets entities entity type relationship sets relationships relationship type examples particular song entity collection songs database entity set eaten relationship child lunch single relationship set child-lunch relationships database relationship set words relationship set corresponds relation mathematics relationship corresponds member relation certain cardinality constraints relationship sets may indicated well chen proposed following rules thumb mapping natural language descriptions er diagrams english chinese er diagrams peter chen physical view show data actually stored chen original paper gives example relationship roles describes relationship marriage two roles husband wife person plays role husband marriage relationship another person plays role wife marriage words nouns surprise naming things requires noun chen terminology also applied earlier ideas lines arrows crow's-feet diagrams owes earlier bachman diagrams chen relationship diagrams another common extension chen model name relationships roles verbs phrases also become prevalent name roles phrases owner owned correct nouns case owner possession thus person plays role owner car plays role possession rather person plays role owner etc use nouns direct benefit generating physical implementations semantic models person two relationships car possible generate names owner_person driver_person immediately meaningful modifications original specification beneficial chen described look-across cardinalities aside barker–ellis notation used oracle designer uses same-side minimum cardinality analogous optionality role look-across maximum cardinality crows foot merise elmasri navathe others preference same-side roles minimum maximum cardinalities recent researchers feinerer dullea et al shown coherent applied n-ary relationships order greater 2 dullea et al one reads 'look across notation used uml effectively represent semantics participation constraints imposed relationships degree higher binary feinerer says problems arise operate look-across semantics used uml associations hartmann investigates situation shows different transformations fail although reduction mentioned spurious two diagrams 3.4 3.5 fact also see next pages look-across interpretation introduces several difficulties prevent extension simple mechanisms binary n-ary associations attributes drawn ovals connected line exactly one entity relationship set cardinality constraints expressed follows attributes often omitted clutter diagram diagram techniques often list entity attributes within rectangles drawn entity sets related diagramming convention techniques crow foot notation beginning dates back article gordon everest 1976 used barker notation structured systems analysis design method ssadm information technology engineering crow foot diagrams represent entities boxes relationships lines boxes different shapes ends lines represent relative cardinality relationship crow foot notation used consultancy practice caci many consultants caci including richard barker subsequently moved oracle uk developed early versions oracle case tools introducing notation wider audience notation relationships attributes necessary relationships promoted entities right example necessary capture artist performed song new entity performance introduced attributes reflecting time place relationship artist song becomes indirect relationship via performance artist-performs-performance performance-features-song three symbols used represent cardinality symbols used pairs represent four types cardinality entity may relationship inner component notation represents minimum outer component represents maximum using modeled database users encounter two well known issues returned results mean something results assumed query author first 'fan trap occurs master table links multiple tables one-to-many relationship issue derives name way model looks drawn entity–relationship diagram linked tables 'fan master table type model looks similar star schema type model used data warehouses trying calculate sums aggregates using standard sql master table unexpected incorrect results solution either adjust model sql issue occurs mostly databases decision support systems software queries systems sometimes includes specific methods handling issue second issue 'chasm trap chasm trap occurs model suggests existence relationship entity types pathway exist certain entity occurrences example building one-or-more rooms hold zero-or-more computers one would expect able query model see computers building however computers currently assigned room repair somewhere else shown list another relation building computers needed capture computers building last modelling issue result failure capture relationships exist real world model see entity-relationship modelling 2 details semantic model model concepts sometimes called platform independent model intensional model latest since carnap well known extensional model one maps elements particular methodology technology thus platform specific model uml specification explicitly states associations class models extensional fact self-evident considering extensive array additional adornments provided specification provided prior candidate semantic modelling languages uml data modeling notation part 2 peter chen father er modeling said seminal paper original 1976 article chen explicitly contrasts entity–relationship diagrams record modelling techniques several authors also support chen program chen accord philosophic theoretical traditions time ancient greek philosophers socrates plato aristotle 428 bc modern epistemology semiotics logic peirce frege russell plato associates knowledge apprehension unchanging forms forms according socrates roughly speaking archetypes abstract representations many types things properties relationships one another
[ 5632, 8201, 4107, 10258, 2585, 5151, 8742, 1076, 4155, 11324, 9286, 72, 11339, 7767, 7775, 11362, 8291, 9828, 8808, 4713, 2681, 1146, 3196, 2688, 9345, 9351, 1697, 5808, 10418, 9397, 3768, 7868, 5827, 11472, 9942, 7392, 10471, 2283, 6383, ...
Validation
11,458
2
Network_redirector:network redirector dos windows network redirector redirector operating system driver sends data receives data remote device network redirector provides mechanisms locate open read write delete files submit print jobs provides application services named pipes mailslots application needs send receive data remote device sends call redirector redirector provides functionality presentation layer osi model networks hosts communicate use client software shells redirectors requesters microsoft networking network redirectors implemented installable file system ifs drivers
[ 3235, 8301, 7983 ]
Validation
11,459
2
Dru_Lavigne:dru lavigne dru lavigne network systems administrator instructor technical writer director freebsd foundation using freebsd since 1996 authored several bsd books spent 10 years developing training materials providing training administration freebsd systems prolific author written o'reilly techrepublic dnsstuff openlogic contributed linux hacks hacking linux exposed author bsd hacks best freebsd basics third latest book definitive guide pc-bsd released march 2010 decade experience administering teaching netware microsoft cisco checkpoint sco solaris linux bsd systems writes widely read technical blog year life bsd guru toolbox.com founder current chair bsd certification group inc. non-profit organization mission create standard certifying bsd system administrators also community manager pc-bsd freenas projects making responsible dealing issues relating community relations administration various forums also principal author executive editor documentation projects since 22 january 2013 committer category doc freebsd project
[ 7425, 2180, 1927, 1801, 10761, 274, 9625, 1946, 4636, 2212, 6438, 10535, 684, 4908, 1071, 3248, 9009, 11698, 11573, 1718, 9784, 1465, 5177, 5819, 3006, 9927, 8266, 8395, 8909, 5710, 6864, 7249, 850, 10455, 6361, 8410, 6491, 9306, 10202, 6...
Validation
11,460
3
Valis:_The_Fantasm_Soldier:valis fantasm soldier also known either valis fantasm soldier video game developed wolf team published telenet japan 1986 originally pc-88 msx home computers ported remade re-released several systems years first video game valis series stars japanese teenager named yuko uses mystical sword called valis defend earth worlds critical reception varied depending version including critical acclaim 1992 pc engine remake original pc-88 msx version valis fantasm soldier side-scrolling platform game wielding game titular sword main character fights level enemies jumping across ledges confronts boss end level certain points game gameplay pauses cinematic cutscenes regarding game storyline play also gameplay-tweaked content-cut version fm-7 family computer famicom side-scrolling action role-playing game version valis differs considerably versions game basic plot remains gameplay moved linear stage design larger maze-style levels multiple paths often questionable design resulting high difficulty level especially since neither password save system mega drive/genesis remake features gameplay system similar later games series particular valis iii like side-scrolling games era four d-pad buttons move character three fire buttons perform three actions main character sliding jumping swinging sword upgraded three stages alternative firing modes player also use magic spells gaining defeating bosses pc engine remake features improvements gameplay system single high jumps instead two-phase jumps sliding move damaging enemies voiced cutscenes mobile remake added new stages alternate costumes voiced sumi shimamoto schoolgirl late 1980s japan fated protect three different realms – earth land spirits vecanti dream world – wielding mystical sword known valis demon lord voiced hideyuki tanaka extinguishes light vecanti functions source power live desperate plea salvation queen voiced yoshiko sakakibara reaches brave soul help time despair yuko earth one answers call summoned magical forces vecanti liberate evil rogles brainwashes yūko classmate girlfriend voiced yūko mita helping try put end valis warrior increasingly difficult odds yuko prevails although reiko killed process memory returns dies yuko arms original pc-88 msx developed wolf team published telenet japan tokuma shoten would later develop release almost completely redone version famicom 1987 japan 1991 telenet renovation united states released versions mega drive/genesis developed riot enhanced remake mega drive version also developed riot released telenet pc engine super cd-rom² add-on 1992 2005-2006 bandai namco released another remake game time mobile phone platforms japan project egg released various emulated versions game windows along compilation complete plus came soundtrack cd figure pc engine version released konami playstation store 2010 2014 given free japanese subscribers playstation network service short promotional anime sunrise directed hideaki anno katsuhiko nishijima featuring music kohei tanaka released 1987 vhd attached issue anime vision magazine artist pixel responsible game character design also published three doujinshi books orchestral arrangement game soundtrack released 2011 also one video games adapted kouta hirano manga titled published gamest comics collection april 1999 sam derboo hardcore gaming 101 wrote original versions might horrible unplayable mess call fame begin n't gameplay pioneering cinematic cutscenes two years even ninja gaiden ... left quite excellent chiptune music really part original valis worth remembered derboo described family computer version typical famicom action rpg competently executed super obfuscate endlessly frustrating nevertheless msx club highly recommended msx version excellent action game even arcades gave score 9/20 mega drive genesis remake received rather mediocre mostly positive review scores west including 65 sega visions 76 consoles+ 65 joystick 5/10 asm hardcore gaming 101 derboo opined valis genesis n't bad game definitely leagues original still particularly enjoyable slow boring sega force bashed dull repetitive gameplay declared high graphical content low playability level valis nutshell hand pc engine turbografx version valis acclaimed critics review scores included 81 consoles 78 génération 4 77 joypad 83 joystick according hardcore gaming 101 mechanics level design doubt well-executed game entire series still bit derivative pedestrian counted among genre greats like castlevania ninja gaiden least high second tier retro gamer highlighted arguable best entry great series lucas m. thomas ign included valis among top ten unreleased turbografx games 're kind gamer likes know exact color panties worn platforming hero girls valis want invest time game followed three sequels valis ii valis iii valis iv eroge spin-off valis x two manga series
[ 5548, 6797, 9006 ]
Test
11,461
4
Black_hole_(networking):black hole networking networking black holes refer places network incoming outgoing traffic silently discarded dropped without informing source data reach intended recipient examining topology network black holes invisible detected monitoring lost traffic hence name common form black hole simply ip address specifies host machine running address host assigned even though tcp/ip provides means communicating delivery failure back sender via icmp traffic destined addresses often dropped note dead address undetectable protocols connectionless unreliable e.g. udp connection-oriented reliable protocols tcp rudp either fail connect dead address fail receive expected acknowledgements firewalls routers household use configured silently discard packets addressed forbidden hosts ports resulting small large black holes network personal firewalls respond icmp echo requests ping designated vendors stealth mode despite networks ip addresses hosts firewalls configured way easily distinguished invalid otherwise unreachable ip addresses encountering latter router generally respond icmp network rsp host unreachable error nat used home office routers generally effective way obscuring layout internal network null route black hole route network route routing table entry goes nowhere matching packets dropped ignored rather forwarded acting kind limited firewall act using null routes often called blackhole filtering rest article deals null routing internet protocol ip black hole filtering refers specifically dropping packets routing level usually using routing protocol implement filtering several routers often dynamically respond quickly distributed denial-of-service attacks remote triggered black hole filtering rtbh technique provides ability drop undesirable traffic enters protected network internet exchange ix provider usually acquires technology help members participants filter attack null routes typically configured special route flag also implemented forwarding packets illegal ip address 0.0.0.0 loopback address null routing advantage classic firewalls since available every potential network router including modern operating systems adds virtually performance impact due nature high-bandwidth routers null routing often sustain higher throughput conventional firewalls reason null routes often used high-performance core routers mitigate large-scale denial-of-service attacks packets reach bottleneck thus avoiding collateral damage ddos attacks — although target attack inaccessible anyone blackhole filtering also abused malicious attackers compromised routers filter traffic destined certain address routing typically works internet protocol layer limited packet classification bound stateless due nature ip routers typically classification limited destination ip address prefix source ip address incoming network interface dns-based blackhole list dnsbl real-time blackhole list rbl list ip addresses published internet domain name system dns either zone file used dns server software live dns zone queried real-time dnsbls often used publish addresses computers networks linked spamming mail server software configured reject flag messages sent site listed one lists term blackhole list sometimes interchanged term blacklist blocklist dnsbl software mechanism rather specific list policy dozens dnsbls existence use wide array criteria listing delisting addresses may include listing addresses zombie computers machines used send spam listing addresses isps willingly host spammers listing addresses sent spam honeypot system since creation first dnsbl 1997 operation policies lists frequently controversial internet advocacy occasionally lawsuits many email systems operators users consider dnsbls valuable tool share information sources spam others including prominent internet activists objected form censorship addition small number dnsbl operators target lawsuits filed spammers seeking lists shut altogether firewalls incorrectly discard icmp packets including ones needed path mtu discovery work correctly causes tcp connections from/to/through hosts lower mtu hang black hole e-mail address e-mail address valid messages sent generate errors messages sent automatically deleted never stored seen humans addresses often used return addresses automated e-mails
[ 5472, 5536, 8224, 9251, 2884, 8998, 2887, 1512, 2409, 7817, 8073, 9256, 8753, 11413, 3032, 5402, 5531, 9117 ]
None
11,462
3
Yamaha_V9938:yamaha v9938 yamaha v9938 video display processor vdp used msx2 home computer well geneve 9640 enhanced ti-99/4a clone yamaha v9938 also known msx-video vdp video display processor successor texas instruments tms9918 used msx1 various systems v9938 turn succeeded yamaha v9958 msx screen modes often referred assigned number msx-basic mapping follows v9938 programmer guide http //rs.gr8bit.ru/documentation/v9938-programmers-guide.pdf
[ 4257, 10658, 1958, 7591, 8198, 11564, 9006, 7536, 10676, 1403, 11261, 5502, 11487 ]
Test
11,463
7
ComputerSupport.com:computersupport.com stratuspointit formerly known computersupport.com technology knowledge customer service based company located natick massachusetts since 2006 stratuspointit managed services systems management support firm provides platform cloud computing network monitoring outsourcing services across various locations united states stratuspointit serves industries legal financial manufacturing sectors computersupport.com founded 2006 immigrants united states kirill bensonoff alexandric ho founders professional consultants focused network planning design microsoft technologies prior founding stratuspointit founders met working insight enterprises company originally organized spirinet technology services llc renamed computersupport.com later stratuspointit 2013 conjunction citrix systems computersupport released next generation itanywhere cloud service october 2014 computersupport.com acquired vp solutions inc framingham massachusetts.the company noted market position cloud computingand desktop servicespaces 2015 computersupport.com influenced launch unigma application aimed helping csps cloud service providers companies monitor iaas clouds unigma acquired kaseya 2017 2016 computersupport.com launched noc solution — dubbed itanywhere noc — middle market enterprises noc offers around-the-clock network server cloud monitoring escalation remediation services computersupport.com organized following business units
[ 4194, 5371 ]
Validation
11,464
4
Superscan:superscan superscan free connect-based port scanning software designed detect open tcp udp ports target computer determine services running ports run queries whois ping icmp traceroute hostname lookups superscan 4 completely rewritten update superscan version 3 released 2000 features windows enumeration list variety important information dealing microsoft windows superscan tool used system administrators crackers script kiddies evaluate computer security system administrators use test possible unauthorized open ports computer networks whereas crackers use scan potentially insecure port order gain illegal access system
[ 8204, 6797, 10924, 7983, 11249, 8692, 11413, 7031, 5402, 2558 ]
None
11,465
4
Enterprise_Archive_Solution:enterprise archive solution enterprise archive solution eas enterprise file social media email archiving software program originally developed educom 2000 eas subsequently acquired zantaz autonomy hp currently owned capax discovery enterprise archive solution ability archive content various sources microsoft exchange microsoft sharepoint various file systems ntfs social media twitter facebook instant messaging microsoft skype enterprise archive solution eas previously called exchange archive solution originally developed educom ts inc. ottawa-based software development firm first release eas occurred march 15 2000 eas sold commercial software local installation eas designed archive content microsoft exchange help organizations comply legal requirements e-mail retention reduce storage load microsoft exchange improve backup .pst file management 2000 2004 educom released multiple new versions gained market share eventually acquired zantaz inc. 2004 next year zantaz added additional functionality released version 4.0 officially renamed product enterprise archive solution 2005 eas used 2 million users globally leading solution archiving market characterized analyst idc 2007 zantaz customers included 9 10 top global law firms 11 fortune 25 14 top 20 financial securities firms july 24 2007 eas acquired autonomy inc. cambridge uk shortly acquisition autonomy announced eas integrated autonomy ’ idol search technology analyst gartner repeatedly rated zantaz autonomy archiving solution one top three market october 3 2011 eas acquired hp inc. palo alto ca july 29 2014 eas acquired capax discovery inc. headquartered morristown nj website archiving solution windows file servers
[ 2193, 5571, 1638 ]
Test
11,466
1
Indexed_Database_API:indexed database api indexed database api commonly referred indexeddb javascript application programming interface api provided web browsers managing nosql database json objects standard maintained world wide web consortium w3c alternative web storage standard indexeddb provide storage capacity web storage fixed limits per website indexeddb limits usually quite large exist use cases indexeddb include caching web application data offline availability browser modules devtools extensions may also use storage support indexeddb added firefox version 4 google chrome version 11 internet explorer version 10 safari eventually added support version 8 web sql database prior api developed apple firefox refused add support argued becoming standard would codify quirks sqlite thus deprecated favor indexeddb
[ 513, 6657, 9736, 9229, 2579, 1556, 6171, 9757, 7713, 10791, 9770, 7212, 10284, 559, 4658, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 6747, 7784, 1642, 9834, 9841, 115, 9843, 4728, 124, 637, 1664, 2182, 10910, 8351, 7340, ...
Validation
11,467
0
Open_information_extraction:open information extraction natural language processing open information extraction oie task generating structured machine-readable representation information text usually form triples n-ary propositions proposition understood truth-bearer textual expression potential fact e.g. dante wrote divine comedy represented amenable structure computers e.g. dante wrote divine comedy oie extraction normally consists relation set arguments instance dante passed away ravenna proposition formed relation passed away arguments dante ravenna first argument usually referred subject second considered object extraction said textual representation potential fact elements linked knowledge base furthermore factual nature proposition yet established example transforming extraction full fledged fact would first require linking possible relation arguments knowledge base second truth extraction would need determined computer science transforming oie extractions ontological facts known relation extraction fact oie seen first step wide range deeper text understanding tasks relation extraction knowledge-base construction question answering semantic role labeling extracted propositions also directly used end-user applications structured search e.g. retrieve propositions dante subject oie first introduced textrunner developed university washington turing center headed oren etzioni methods introduced later reverb ollie clausie csd helped shape oie task characterizing aspects high level approaches make use set patterns generate extractions depending particular approach patterns either hand-crafted learned reverb suggested necessity produce meaningful relations accurately capture information input text instance given sentence faust made pact devil would erroneous produce extraction faust made pact since would adequately informative precise extraction would faust made pact devil reverb also argued generation overspecific relations ollie stressed two important aspects oie first pointed lack factuality propositions instance sentence like john studies hard pass exam would inaccurate consider john pass exam fact additionally authors indicated oie system able extract non-verb mediated relations account significant portion information expressed natural language text instance sentence obama former us president born hawaii oie system able recognize proposition obama former us president clausie introduced connection grammatical clauses propositions oie extractions authors stated grammatical clause expresses proposition verb mediated proposition identified solely recognizing set clauses expressed sentence implies correctly recognize set propositions input sentence necessary understand grammatical structure authors studied case english language admits seven clause types meaning identification proposition requires defining seven grammatical patterns finding also established separation recognition propositions materialization first step proposition identified without consideration final form domain-independent unsupervised way mostly based linguistic principles second step information represented according requirements underlying application without conditioning identification phase consider sentence albert einstein born ulm died princeton first step recognize two propositions albert einstein born ulm albert einstein died princeton information correctly identified propositions take particular form required underlying application e.g. albert einstein born ulm albert einstein died princeton csd introduced idea minimality oie considers computers make better use extractions expressed compact way especially important sentences subordinate clauses cases csd suggests generation nested extractions example consider sentence embassy said 6,700 americans pakistan csd generates two extractions 6,700 americans pakistan ii embassy said usually known reification
[ 3617, 11538 ]
Validation
11,468
5
VTun:vtun vtun networking application set virtual tunnels tcp/ip networks supports internet protocol ip point-to-point protocol ppp serial line internet protocol slip protocols exists reference implementation tun/tap user-space tunnel driver included linux kernel version 2.4 also originally developed maxim krasnyansky bishop clark current maintainer like applications nature vtun creates single connection two machines multiplexes traffic vtun connections initiated via tcp connection client server server initiates udp connection client udp protocol requested software allows creation tunnels routing traffic manner similar ppp well bridge-friendly ethertap connection vtun uses private shared key negotiate handshake via challenge response continual source concern target one strongly worded security assessment vtun server client binary applications completely built without encryption support binaries used encryption endpoints simple xor cipher completely trivial decode type build supported developers
[ 1030, 10889, 9722, 8211, 11162, 3742, 9764, 4268, 3629, 7983, 10417, 7859, 2228, 823, 3777, 2884, 5959, 8265, 7376, 6993, 11606, 2136, 9048, 6490, 6364, 5084, 5472, 10210, 9318, 8039, 8432, 11248, 5749, 3322 ]
Test
11,469
5
Opera_Mobile:opera mobile opera mobile mobile web browser smartphones tablets pdas developed opera software first devices run mobile edition opera psion series 5 psion series 5mx psion series 7 psion netbook ran opera mobile 3.6 released 2000 opera mobile ported windows mobile operating system 2003 opera mobile used presto layout engine version 15 replaced webkit|webkit blink layout engine |blink supports many web standards well ajax programming |ajax version 9.7 use opera turbo compresses web pages via opera software turbo servers thus reducing download size web pages compressed page loading times improved bandwidth consumption reduced 80 browser dynamically reformat web page small screen using opera small screen rendering ssr technology word wrap|text-wrapping opera mobile 10 includes features opera web browser speed dial|speed dial feature allows user add links shown thumbnail images page displayed new tab opened set feature allows user easily navigate selected web pages tab gui |visual tabs allow browsing multiple web sites one time also includes password manager pop-up ad|pop-up handler supports copy paste autocomplete|address auto-complete page zooming|zooming history bookmark web |bookmarks removed opera mobile 15 browser used either using finger-touch stylus touchscreen keypad displayed portrait landscape mode category opera software|mobile category mobile web browsers category pocket pc software category symbian software category android web browsers category windows internet software de opera opera mobile opera browser opera mobile ro opera navigator web opera mobile pentru dispozitive mobile
[ 1664, 2945, 6528, 3971, 6657, 3462, 7943, 8584, 1802, 2579, 7572, 6685, 7965, 8351, 10910, 5026, 1834, 9770, 7340, 11693, 559, 2611, 9908, 4661, 3639, 11449, 9275, 4797, 64, 9408, 10057, 11466, 5707, 7885, 7246, 4048, 10834, 4310, 5078, 6...
Train
11,470
4
Cross-domain_solution:cross-domain solution cross-domain solution cds means information assurance provides ability manually automatically access transfer information two differing security domains integrated systems hardware software enable transfer information among incompatible security domains levels classification modern military intelligence law enforcement operations critically depend timely sharing information cds distinct rigorous approaches supports transfer would otherwise precluded established models computer network data security e.g. bell–lapadula model clark–wilson model cds development assessment deployment based risk management goal cds allow isolated critical network exchange information others without introducing security threat normally comes network connectivity three primary elements demanded cross domain solutions acceptance criteria information transfer across domains cross-domain interoperability may simple e.g antivirus scanning transfer low high security domains complex e.g multiple human reviewers must examine approve document release high security domain one-way data transfer systems one-way traffic systems data diodes often used move information low security domains secret enclaves assuring information escape cross-domain solutions often include high assurance guard get good foundation cross domain solution deployment visit disa mission partners website watch following instructional videos • cds 101 cbt 11 minutes • cds cap cbt 12 minutes • dsawg 101 cbt 17 minutes though cross-domain solutions 2019 historically typical military intelligence law enforcement environments also use case cross domain solutions industry many industrial settings control systems analytic systems different security domains one example flight control infotainment systems airliner given wide variety use cases industry different levels third party accreditation certification aspects cross-domain solution appropriate different applications found among different providers previous decades multilevel security mls technologies developed implemented enabled objective deterministic security left little wiggle room subjective discretionary interpretation enforced mandatory access control mac near certainty rigidity prevented simpler solutions would seem acceptable surface automated information systems enabled extensive information sharing sometimes contrary need avoid sharing secrets adversaries need information sharing led need depart rigidity mac favor balancing need protect need share ‘ balance ’ decided discretion users access control called discretionary access control dac tolerant actions manage risk mac requires risk avoidance allowing users systems manage risk sharing information way contrary original motivation mac unintended consequences sharing complex analyze necessarily left discretion users may narrow focus critical need documents provide standards guidance risk management unified cross domain management office ucdmo cross domain overlay 1 december 2011 ver 1.0 provides extensive security control guidance implement cds platform address security controls hardware software enforced advanced inspections
[ 10170, 6337, 2213, 1350, 3880, 1225, 11496, 939, 7979, 10580, 6110, 10772, 10968, 2426, 10204, 2558 ]
Test
11,471
3
Record_of_Lodoss_War:record lodoss war record lodoss war created 1986 group sne dungeons dragons replay serialized japanese magazine comptiq 1986 1988 though also used setting systems tunnels trolls runequest replays novels transcripts rpg sessions meant hold interest readers convey events took place proven popular even play role-playing games fans fiction including fantasy fiction similar light novels many characters parties replays become popular characters anime example character female elf deedlit record lodoss war played science fiction novelist hiroshi yamamoto rpg sessions popularity record lodoss war replays dungeon master ryo mizuno started adapt story earliest japanese-language domestic high fantasy novels 1988 replay series went become trilogy group sne abandon dungeons dragons rules create game dubbed record lodoss war companion released 1989 three parts replay series eventually published paperbacks kadokawa shoten 1989 1991 mizuno novelizations published kadokawa shoten 1988 1993 followed two collections short stories 1995 illustrations done yutaka izubuchi first volume forms basis first eight episodes record lodoss war ova series well record lodoss war grey witch manga series second also adapted manga form four-cd radio drama final five episodes ova series loosely based story told across third fourth novels caught ongoing novelization point feature original ending record lodoss war chronicles heroic knight tv series faithful adaptation volumes three seven first collection short stories adapted record lodoss war deedlit tale manga series mizuno later went pen two series novels prequel titled 1994 2002 5 volumes sequels 1993 1996 4 volumes 1998 2006 6 volumes prequel forms basis record lodoss war lady pharis manga series legend crystania adapted manga anime film ova series record lodoss war recounts adventures youth name parn son dishonored knight part motivation adventuring find happened father restore family honor despite inexperience parn considered leader accompanied childhood best friend etoh friend sometimes advisor slayn later slayn lover leylia newfound mentor ghim accompanied parn romantic interest high elf deedlit comes forest return seeking answer people isolationism end sees slow march extinction thief named woodchuck throughout series parn comes contact friends foes alike allies include king kashue king fahn shiris orson enemies include emperor beld ashram evil necromancer wagnard manga adaption anime derivative chronicles heroic knight continues adventures parn first eight episodes focuses spark adventures complete quest tasked onto protect neese daughter slayn leylia accompanied cast friends form leaf garrack greevus aldo ryna television series shares similarities plot ova wagnard seeking kidnap neese order use reagent resurrection naneel priestess avatar kardis slain leylia mother high priestess neese short time battle demonic god leylia reincarnation naneel lost virginity longer capable doorway reagent needed unseal naneel third series legend crystania places former villain ashram seat would-be hero placed spell god beast crystania series focuses pirotess dark elven lover tries find way free clutches spell restore back living self original ova series tv series released north america central park media vhs dvd ova tv series slated blu-ray release media blasters dropped plans re-release series april 14 2017 funimation announced license ova series chronicles heroic knight tv series released ova blu-ray dvd tv series dvd one set july 18 2017 japanese online game company gameon announced acquired global license make online game computers mobile phones based record lodoss war fantasy franchise kadokawa production slowcurve ryo mizuno novelist co-creator franchise serve supervisor development online game gameon plans release game outside japan gameon also said new game browser-based game record lodoss war online released february 2016 first three original stories novel series sold 10 million copies japan
[ 8081, 2156, 9006 ]
Test
11,472
1
Erwin_Data_Modeler:erwin data modeler erwin data modeler stylized erwin formerly erwin computer software data modeling originally developed logic works erwin since acquired series companies spun-off private equity firm parallax capital partners acquired incorporated separate entity erwin inc. managed ceo adam famularo software ’ engine based idef1x method although also supports diagrams displayed variant information technology engineering notation well dimensional modeling notation erwin created logic works based princeton new jersey may 1993 logic works released erwin/erx version tool designed work conjunction powerbuilder database models created using erwin could translated software built powerbuilder integrated development environment ide may 1995 logic works erwin expanded include several ides adding sqlwindows gupta technologies visual basic microsoft 1996 erwin among several data modeling software solutions used facilitate wide move client–server model database management 1998 logic works acquired platinum technology later acquired may 1999 computer associates ca erwin initially made part ca ’ jasmine suite later added new allfusion suite name allfusion erwin data modeler tool later renamed ca erwin data modeler 2014 embarcadero technologies sought acquire product ca inc acquisition blocked department justice anti-competitive concerns april 2016 parallax capital partners private equity firm acquired software ca technologies appointed adam famularo ceo company operates new name stylized erwin inc september 2016 erwin announced acquired corso british enterprise architecture service provider december year erwin acquired business process modeling software casewise plan integrate two 2017 erwin released data modeler nosql enterprise-class data modeling solution mongodb april 2018 nosql data modeling support couchbase added also year erwin launched data governance solution impact analysis integrations business process enterprise architecture data modeling suites january 2018 company acquired data harvesting technology data governance consulting services company p consulting also developed erwin edge software platform edge acronym “ enterprise data governance experience ” intending use data governance data-driven insights help accomplish organizational objectives february 2018 erwin released first state data governance report ubm august 2018 erwin acquired metadata management data governance company analytix ds core erwin computer-aided software engineering tool case tool users utilize erwin data modeler way take conceptual data model create logical data model dependent specific database technology schematic model used create physical data model users forward engineer data definition language required instantiate schema range database-management systems software includes features graphically modify model including dialog boxes specifying number entity–relationships database constraints indexes data uniqueness erwin supports three data modeling languages idef1x variant information technology engineering developed james martin form dimensional modeling notation software also allows users generate data models reverse-engineering pre-existing databases based several different formats another included feature erwin ’ ability create reusable design standards “ including naming standards data type standards model templates more. ” software includes several features modifying data model displayed including options several colors fonts diagrams subject areas layouts erwin ’ complete compare feature allows user compare two versions model displays differences allows merging updates either direction march 2016 software bundle also includes report designer erwin dm 2018 update included netezza mysql 8.x postgresql 10.4 hive model counts reports pii support 2019 update included db2 z/os v12 sql server 2017 teradata v16.20 postgresql 11.2 addition reporting enhancements like user-defined properties filters beginning 1992 united nations development programme undp one larger organizations utilize erwin integrate many independent databases located 120 field offices undp used erwin develop “ corporate data model ” goal “ reducing redundant data entry ” create single database framework based “ future systems designed ” erwin used reverse-engineer existing data field offices also move data computer associates ’ idms sybase ’ unixrdbms 2001 insurance company aetna used erwin data modeler automate maintenance database table definitions aetna ’ database consisted 15,000 table definitions became difficult maintain manually 2002 erwin among products used new york power authority software also use utah state office education 2006
[ 1856, 11457, 9286, 3816, 8808, 6797, 2222, 847, 3951, 7983, 10737, 2456, 4412 ]
None
11,473
4
Salvatore_J._Stolfo:salvatore j. stolfo salvatore j. stolfo tenured professor computer science columbia university new york leading expert computer security known research machine learning applied computer security intrusion detection systems anomaly detection algorithms systems fraud detection parallel computing born brooklyn new york stolfo received bachelor science degree computer science mathematics brooklyn college 1974 received ph.d. nyu courant institute 1979 faculty columbia ever since ’ taught courses artificial intelligence intrusion anomaly detection systems introduction programming fundamental algorithms data structures knowledge-based expert systems columbia stolfo received close 50m funding research broadly focused security intrusion detection anomaly detection machine learning includes early work parallel computing artificial intelligence published co-authored 250 papers 21,000 citations h-index 67 pioneered research number areas within computer security widely use today 1996 proposed project darpa applies machine learning behavioral patterns detect fraud intrusion networks approach security recently emerged within industry user behavior analytics earlier research machine learning algorithms applied credit card fraud adopted throughout financial industry stolfo students dan miranker mike van biema alexander pasik steve taylor designed architecture software systems dado parallel computer example fifth generation computer sponsored darpa high performance parallel computing initiative mid-1980s dado research group designed built lab columbia university fully functional 1023-processor version machine first parallel machine providing large-scale commercial speech recognition services dado occupied 2 cubic feet cabinet space dado tested sea navy research vessel test capabilities related acoustic analyses detection capabilities parallel broadcast resolve/report function introduced dado machine apparently influenced part design ibm blue gene parallel computer dado technology first invention claimed columbia university ownership faculty member intellectual property 1980 bayh-dole act company called fifth generation computer formed columbia outside investors commercialize dado machine company subsequently developed commercially deployed speech recognition system operated qwest dispute small company large telecommunications provider columbia university caused six-year detour us court system ultimately stolfo prevailed dado introduced parallel computing primitive “ broadcast resolve report ” hardwire implemented mechanism today called mapreduce among earliest work stolfo along colleague greg vesonder bell labs developed large-scale expert data analysis system called ace automated cable expertise nation phone system bell labs distributed ace number telephone wire centers improve management scheduling repairs local loop ace likely first system combine rule-based inference ai expert system relational database management system cras system serves model deductive data base systems subject matter research many years database community ace first expert system kind commercialized widely distributed work related merge/purge problem sometimes referred “ record linkage ” “ data deduplication ” algorithm developed student mauricio hernandez used large-scale commercial systems data cleansing identifying purging duplicates large data sets important part large-scale data analysis systems especially commercial data analytics algorithms invented provided means scaling large data sets balancing requirement produce accurate results presence arbitrary noise error data base patented technology licensed informix company later acquired ibm darpa ids evaluation datasets constructed lincoln labs 1998 1999 darpa cyber panel program network trace data sets used evaluate performance different intrusion detection systems network trace data ground truth available open research community data however difficult use directly wider community data mining researchers stolfo associates ids lab including wenke lee created kdd cup dataset derived darpa ids datasets darpa network trace data converted connection records making data suitable data mining researchers test various machine learning algorithms data created community service extensively used ids research even today stolfo consulted cto citibank several years conducted research machine learning algorithms applied credit card fraud problem much work students phil chan andreas prodromidis published meta-learning based strategies demonstrated improve accuracy fraud detectors substantially reduce loss due fraud stolfo early proponent collaborative security distributed ids technology systems stolfo students ke wang janek parehk developed fully functional ids alert exchange system introduced new means sharing sensitive data privacy-preserving manner technique involved communicating network packet content found anomalous verified attack converting raw packet content statistical representation allowing accurate correlation common attacks across sites method invented stolfo students share correlate content across administrative domains without disclosing sensitive information introduced use bloom filters storing n-gram content network packet datagrams method extensively studied continues used several ongoing experiments method also formed basis recent project colleagues steve bellovin tal malkin secure querying encrypted document databases without requiring insecure decryption document searching relevant content stolfo coined term fog computing confused fog computing technology used “ launch disinformation attacks malicious insiders preventing distinguishing real sensitive customer data fake worthless data. ” stolfo ’ proposed approach confuse confound traitor leveraging uncertainty reduce knowledge ordinarily systems data gain access without authorization fog computing systems integrate bait information systems generate alerts decoy misused 2005 stolfo received funding army research office conduct workshop bring together group researchers help identify research program focus insider threats since ids group columbia working researchers i3p developed several demonstration systems evidence insider malfeasance work includes user profiling techniques especially masquerader detection ruu spoken acronym studied stolfo student malek ben salem number decoy generation facilities studied jointly co-pi angelos keromytis student brian bowen emt system sponsored darpa contracts among first machine learning system incorporate social network analyses important security problems including spam detection virus propagation extensive set analyses emt developed stolfo student shlomo herskhop others allowed analysts forensics experts students researchers opportunity explore large corpora bail messages discover wide range important derivative knowledge communication dynamics user organization among applications emt models user behavior identify uncharacteristic bail flows indicative spam bots viral propagations toolkit downloaded well 100 users elements analyses introduced emt serve model analytical systems entire body analyses demonstrated general description ids network communication analysis systems conveniently described acronym cv5 student ang cui working stolfo ids lab invented concept embed arbitrary code legacy embedded devices symbiotic embedded machine technology demonstrated provide direct means inject security features operational cisco ios routers situ without significant performance degradation without negative impact routers primary function symbiote technology explored use number different platforms devices arm mips x86 several interesting applications especially large set existing insecure embedded devices found internet line work supported darpa crash program brought together large number computer science researchers focused clean slate design new generation safe secure computer systems preliminary work performed cui stolfo ids lab performed wide area scan internet counting number vulnerable devices date 1.1 million found founded 2011 red balloon security rbs cyber security company founded dr sal stolfo dr ang cui spinout ids lab rbs developed symbiote technology called frak host defense embedded systems sponsorship darpa cyber fast track program frak system provides core capability automatically unpack modify repack embedded system firmware install symbiote defenses currently developing products services based upon software symbiote technology created based ids lab research darpa active authentication anomaly detection multiple scales program dr sal stolfo dr. angelos keromytis founded allure security technologies using active behavioral authentication decoy technology stolfo pioneered patented 1996 allure brought technologies together novo active user behavior analytics security solution protects devices data loss intrusion allure ’ research supported columbia university national science foundation darpa dhs others founded 2009 allure security technology created based work done darpa sponsorship columbia ’ ids lab based darpa prompts research detect hackers inside organization perimeter continuously authenticate user without password electronic digital documents stolfo ’ company electronic digital documents produced “ datablade ” technology informix marketed strategy acquisition development mid 80 ’ stolfo ’ patented merge/purge technology called edd datacleanser datablade licensed informix since acquisition ibm 2005 ibm informix one world ’ widely used database servers users ranging world ’ largest corporations startups system detection one companies founded prof. stolfo commercialize anomaly detection technology developed ids lab company ultimately reorganized rebranded trusted computer solutions company recently acquired raytheon 2013 washington post interviewed dr. stolfo technology uses decoy data mislead hackers product soon vended allure security technology 2013 new york times reported dr. stolfo advisee ang cui intercepted operating system cisco ’ voip phones order spy remotely enabling transcribe conversations using google ’ voice-to-text translation 2012 scientific american covered pair ’ new “ symbiote ” program would detect invasions firmware code without slowing computer ’ speed 2011 adviser ang cui staged intrusion university printers nbc news interviewed stolfo topic cyber security
[ 6850, 7234, 4964, 7464, 3433, 9964, 11343, 499, 1783, 2558 ]
Validation
11,474
1
Multimedia_database:multimedia database multimedia database mmdb collection related multimedia data multimedia data include one primary media data types text images graphic objects including drawings sketches illustrations animation sequences audio video multimedia database management system mmdbms framework manages different types data potentially represented wide diversity formats wide array media sources provides support multimedia data types facilitate creation storage access query control multimedia database multimedia database mmdb hosts one multimedia data types i.e text images graphic objects audio video animation sequences data types broadly categorized three classes additionally multimedia database mmdb needs manage additional information pertaining actual multimedia data information following last three types called metadata describe several different aspects media data media keyword data media feature data used indices searching purpose media format data used present retrieved information like traditional databases multimedia databases address following requirements multimedia databases ability uniformly query data media data textual data represented different formats ability simultaneously query different media sources conduct classical database operations across query support ability retrieve media objects local storage device good manner storage support ability take response generated query develop presentation response terms audio-visual media ability deliver presentation presentation delivery support examples multimedia database application areas
[ 9345, 6406, 10909, 7599, 7983, 8122, 9926, 1480, 3529, 9932, 2901, 6102, 731, 1890, 9710, 3698, 6131, 9714, 2294, 5880, 5373, 2558 ]
Train
11,475
9
Stratego/XT:stratego/xt stratego/xt language toolset constructing stand-alone program transformation systems combines stratego transformation language xt toolset transformation components providing framework constructing stand-alone program transformation systems stratego language based programming paradigm called strategic term rewriting provides rewrite rules expressing basic transformation steps application rules controlled using strategies form subroutines xt toolset provides reusable transformation components declarative languages deriving new components parsing grammars using modular syntax definition formalism sdf implementing pretty-printing program transformations often operate modifying abstract syntax tree ast stratego also possible specify transformations using concrete syntax allows programmers express transformation using familiar often concise syntax object programming language internally still operates ast rule desugar do-while statement java rule using concrete syntax theoretical framework stratego called system first described paper eelco visser zine-el-abidine benaissa
[ 10435, 932, 4293, 2374, 4519, 2537, 10474, 6797, 7983, 4980, 5492, 823, 5399, 605 ]
None
11,476
4
International_Multilateral_Partnership_Against_Cyber_Threats:international multilateral partnership cyber threats international multilateral partnership cyber threats impact first united nations-backed cybersecurity alliance since 2011 impact serves key partner united nations un specialised agency icts international telecommunication union itu first comprehensive public-private partnership cyber threats impact serves politically neutral global platform brings together governments world industry academia enhance global community capabilities dealing cyber threats total 152 countries formally part itu-impact coalition strong support industry giants partners academia international organizations impact largest cybersecurity alliance kind headquartered cyberjaya malaysia impact operational home itu global cybersecurity agenda gca impact offers itu member states access expertise facilities resources effectively address cyber threats well assisting united nations agencies protecting ict infrastructures impact initiative first announced fifth prime minister malaysia closing ceremony 15th world congress information technology wcit 2006 held austin texas united states initially impact known 'international multilateral partnership cyber-terrorism 2008 following feedback member governments also impact international advisory board iab impact official launch world cyber security summit 2008 wcss words 'cyber terrorism impact name changed 'cyber threats reflect wider cybersecurity role impact global headquarters inaugurated 20 may 2009 built 28,400 square metre site seven-acre site built-up area 5,400 square metres 58,000 square feet modelled centers disease control prevention cdc atlanta united states impact operates global response centre grc nerve centre impact grc fully equipped crisis room communications facilities fully functional security operations centre soc well-equipped data centre on-site broadcasting centre vip viewing gallery grc involved securing objectives itu global cybersecurity agenda gca placing technical measures combat newly evolved cyber threats inauguration impact global headquarters prime minister malaysia secretary-general international telecommunication union impact global headquarters officially declared open 20 may 2009 5th prime minister malaysia tun abdullah bin ahmad badawi witnessed prime minister malaysia dato sri mohd najib bin tun abdul razak secretary-general itu hamadoun touré impact chairman datuk mohd noor amin grc impact provides global community network early warnings system news expert locator team management remediation automated threat analysis system trend libraries visualisation global threats country-specific threats incident case management trend monitoring analysis knowledge base reporting resolution finder among others impact formally became key partner itu united nations ’ un specialised agency following cooperation agreement signed world summit information society 2011 wsis forum geneva may 2011 cooperation agreement impact tasked itu responsibility providing cybersecurity assistance support itu 193 member states also organisations within un system memorandum agreement officially signed hamadoun touré secretary-general itu datuk mohd noor amin chairman impact itu head office geneva founded 1865 itu oldest organisation within un system functions un specialised agency information communication technologies impact involvement itu began 2008 named physical home itu global cybersecurity agenda gca gca international cybersecurity framework formulated following deliberations 100 leading experts worldwide gca contains many recommendations adopted implemented intended provide improved global cybersecurity memorandum understanding inked bangkok back 2008 impact named physical operational home gca addition 2011 wsis forum memorandum understanding mou signed itu united nations office drugs crime unodc see impact supporting organisations collaboration assist un member states mitigate risks posed cybercrime partner countries itu-impact also given access host specialised services including monitoring analysis alerts cyber threats impact global response centre grc acts global cyber threat resource centre provides emergency responses facilitate identification cyber threats sharing resources assist itu-unodc member states impact global response centre grc collaborates industry academia hosts comprehensive database cyber threats impact electronically secure collaborative application platform experts escape designed connect responsible cybersecurity 140 countries also provides response mechanism itu-impact partner countries three divisions within impact centre policy international cooperation centre training skills development centre security assurance research divisions provide consulting training services scholarships reports expertise governments industry academia partner countries international advisory board iab members included past members include vinton g. cerf vice president chief internet evangelist google howard schmidt former white house cyber security coordinator obama bush administrations united states america mikko hyppönen chief research officer f-secure john w. thompson former chairman board symantec corporation ayman hariri chairman oger systems advisory board management team consists mohd noor amin chairman management board mohamed shihab advisor technical mohamed zaini bin mazlan advisor administration anuj singh chief operating officer coo phillip victor director policy international cooperation mohamad sazly musa director security assurance
[ 9375, 7809, 7522, 9537, 9569, 10437, 11213, 2451, 9246, 127 ]
Test
11,477
2
Memory_management_controller:memory management controller multi-memory controllers memory management controllers mmc different kinds special chips designed various video game developers use nintendo entertainment system nes cartridges chips extend capabilities original console make possible create nes games features original console offer alone basic nes hardware supports 40k rom total 32k prg 8k chr thus single tile sprite table possible limit rapidly reached within famicom first two years market game developers began requesting way expand console capabilities chips also known mappers cnrom earliest banking hardware introduced famicom appearing early 1986 consists single 7400 series discrete logic chip cnrom supports single fixed prg bank eight chr banks 96k total rom third party variations supported additional capabilities many cnrom games store game level data chr rom blank screen reading early nes mappers composed 7400 series discrete logic chips unrom appeared late 1986 supports single fixed 16k prg bank rest prg switchable instead dedicated rom chip hold graphics data called chr nintendo games using unrom store graphics data program rom copy ram cartridge run time mmc1 nintendo first custom mmc integrated circuit incorporate support saved games multi-directional scrolling configurations chip comes least five different versions mmc1a mmc1b1 mmc1b2 mmc1b3 mmc1c differences different versions slight mostly owing savegame memory protection behavior mmc1 chip allows switching different memory banks program rom selected 16kb 32kb chunks character rom selected 4kb 8kb chunks unusual feature memory controller input serial rather parallel 5 sequential writes bit shifting needed send command circuit mmc2 used mike tyson punch-out later rerelease replaced mike tyson single 8kb bank program rom selected remaining 24kb locked character rom selected two pairs 4kb banks would automatically switched video hardware attempts load particular graphic tiles memory thus allowing larger amount graphics used screen without need game manually switch mmc3 introduced 1988 adds irq timer allow split screen scrolling without sacrifice sprite 0 along two selectable 8kb program rom banks two 2kb+four 1kb selectable character rom banks allows easy instant swapping sprite tile data 8k save game ram supported chip used three games released famicom japan developed intelligent systems functionally nearly identical mmc2 difference mmc4 switches program rom 16kb banks instead 8kb banks support battery-backed sram save game data mmc5 nintendo advanced mmc originally also expensive koei used chip regularly similar konami vrc6 interrupt handling works differently chip 1kb extra ram two extra square wave sound channels one extra pcm sound channel support vertical split screen scrolling improved graphics capabilities making 16,384 different tiles available per screen rather 256 allowing individual 8x8-pixel background tile color assignment instead restricted one color set per 2x2 tile group highly configurable program rom character rom bank switching scanline-based irq counter mmc5 supports 2mb total rom however commercially released game exceeded 1mb mmc6 similar mmc3 additional 1 kb ram saved battery backup famicom disk system asic extended audio chip supports one channel single-cycle 6-bit × 64 step wavetable-lookup synthesis built phase modulator pm sound generation similar frequency modulation synthesis a*rom mmc named amrom anrom aorom cartridge boards use developed chris stamper rare manufactured nintendo found games developed rare nintendo tradewest gametek acclaim milton bradley allows prg rom switched single 32k piece uses chr ram 256k total rom unlike chips uses one screen mirroring nintendo maintained tight control internationally-released cartridge hardware allow third parties use pcbs mappers remained case late nes commercial lifespan restrictions eased thus third party mappers found famicom unlicensed cartridges vrc2 chip konami allows program rom switched 8kb banks character rom switched 1kb banks mmc two known revisions vrc2a vrc2b exclusively used japanese version salamander vrc6 virtual rom controller advanced mmc chip konami supporting bank switching program code graphics well cpu cycle–based irq counter also act scanline counter chip also contains support three extra sound channels two square waves eight duty cycles one sawtooth wave used akumajō densetsu japanese version western version uses mmc5 nintendo since nintendo entertainment system allow cartridges add additional sound channels famicom version soundtrack reworked follow specifications thus soundtrack western version implemented five sound channels built stock nes vrc7 advanced mmc chip konami supporting bank switching irq counting equivalent vrc6 also containing ym2413 derivative providing 6 channels fm synthesis audio advanced audio used famicom game lagrange point japanese version tiny toon adventures 2 also used vrc7 make use extended audio 163 used games exclusive japan capabilities little better nintendo mmc3 variant contained extra sound hardware plays 4-bit wave samples supports 1 8 extra sound channels audible aliasing appears sufficiently large number channels enabled fme-7 memory mapping circuit developed sunsoft use nes famicom cartridges switches program rom 8kb banks switches character rom 1kb banks also contains hardware generate irq signals specified number cpu clock cycles thus achieving split-screen effects minimal use processing power special version mmc labeled sunsoft 5b rather fme-7 contains version widely used yamaha ym2149 sound generation hardware used one famicom title gimmick individual homebrew unlicensed developers made custom mmcs nes simply expand available memory 228 simple bank switching mmc developed use games action 52 cheetahmen ii nametable control bit action 52 multicart also contains small 16-bit register area contains old menu selection exiting game
[ 10855, 3272, 9417, 204, 8492, 11564, 1679, 400, 10833, 4690, 11380, 3256, 4698, 3325, 1566, 9247 ]
Test
11,478
3
Konami's_Ping_Pong:konami ping pong konami ping pong sports arcade game created 1985 konami game notable first video game accurately reflect gameplay table tennis opposed earlier simplifications like pong konami titles time ported several 8-bit computer systems video game consoles konami ping pong played singleplayer multiplayer using 11 point scoring rules first player attain score 11 higher leading two points wins game maximum 14-14 point next point wins player must win best two three games order beat match playfield shown isometric perspective players shown disembodied hands players placed far-side table find hitting ball much difficult however player always positioned near side single player mode essential moves represented forehand backhand lob smash game features penguin protagonist konami earlier title antarctic adventure title screen member audience game penguin would later known penta introductory animation pingpong ball bounces along table finally hits penta head appears faint 1985 game released konami msx computers 1986 game ported amstrad cpc commodore 64 zx spectrum imagine software bernie duggs name ping pong apart scaled-down graphics sound due limited system capabilities ports perfectly replicate arcade gameplay 1987 game ported famicom disk system smash ping pong published nintendo nintendo character donkey kong jr. replaces konami penta crowd diskun famicom disk system mascot also replaces pentarou title screen later re-released wii virtual console japan pal region latter got import game title smash table tennis smash ping pong slated release nintendo 3ds may feature camera support 3d support analog support release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 konami ping pong made available microsoft game room service xbox 360 console windows-based pcs june 2010
[ 10931, 6797, 9006, 8887 ]
Train
11,479
0
Argument_mining:argument mining argument mining argumentation mining research area within natural-language processing field goal argument mining automatic extraction identification argumentative structures natural language text aid computer programs argumentative structures include premise conclusions argument scheme relationship main subsidiary argument main counter-argument within discourse argument mining workshop series main research forum argument mining related research argument mining applied many different genres including qualitative assessment social media content e.g twitter facebook provides powerful tool policy-makers researchers social political sciences domains include legal documents product reviews scientific articles online debates newspaper articles dialogical domains given wide variety text genres different research perspectives approaches difficult reach common objective evaluation scheme many annotated data sets proposed gaining popularity consensual data set yet found annotating argumentative structures highly demanding task successful attempts delegate annotation tasks crowd process still requires lot effort carries significant cost initial attempts bypass hurdle made using weak supervision approach
[ 1890, 7780 ]
Test
11,480
4
Adaptive_Redaction:adaptive redaction adaptive redaction intelligent version redaction whereby sensitive parts document automatically removed based policy primarily used next generation data loss prevention dlp solutions policy set rules based content context context include content 'visible information see screen also 'invisible information document properties revision history also 'active content embedded electronic document macro adaptive redaction designed alleviate false positive events created data loss prevention software dlp security solutions false positives occur dlp policy triggers prevents legitimate outgoing communication majority cases caused oversight sender sending unprotected credit card information outside organization breaches payment card industry data security standard pci dss regulations many organizations accept credit card information email however reply email containing information would send prohibited information would cause breach policy adaptive redaction used remove credit card number allow email sent 'invisible information found documents created embarrassment several governments
[ 10245 ]
Validation
11,481
2
Grml:grml grml operating system based debian designed run mainly live cd made run usb flash drive grml aims well-suited system administrators sysadmin users text tools includes x window system server minimalist window managers wmii fluxbox openbox use graphical programs like mozilla firefox included distribution addition sysadmin tools security network related software data recovery forensic tools editors shells many text tools included grml distribution focuses accessibility providing kernel support speakup software like brltty emacspeak flite another feature grml use z shell zsh default login shell customized zsh configuration used grml retrieved project repository since early 2009 grml isos come miros bsd4grml minimal miros bsd flavour release grml “ lackdose-allergie ” 2009.05 daily isos later releases grml “ hello-wien ” 2009.10 use manifold-boot technology provide isos written directly usb stick cf/sd card hard disc etc immediately bootable since grml 2010.12 isolinux loader used cases default providing consistent menu
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 439, 56, 59, 7483, 6333, 3903, 4673, 2375, 4039, 8907, 1110, 5078, 9693, 2786, 2914, 6371, 485, 3685, 9064, 4841, 6890, 7913, 7020, ...
Test
11,482
7
Dropmyemail:dropmyemail dropmyemail cloud-based email backup software offered dropmysite offers cloud storage online backup software brief dropmyemail allows users automatically backup emails cloud option view migrate restore whenever required via web browser dropmyemail shown 1 march 2012 demo asia dropmysite dropmyemail concept conceived founder john fearon site launched 1 march 2012 demo asia launchpad emerging technology singapore dropmyemail 525,000 users growing rate faster twitter dropbox pininterest time launch dropmyemail moved away freemium business model free trial-based business model dropmyemail changed business model provide 15-day free trial followed paid account 10 per year 5gb account 20 10gb account 70 50gb account november 21 2012 dropmyemail launched business offering soho smb per email mailbox price plans provide 15-day free trial 100 seats followed paid account 5 seats 99.99 per year 20 seats 299.99 per year 100 seats 999.90 per year company launched affiliate program december 13 2012 meet demands various websites resell dropmyemail service dropmyemail web-based solution dropmyemail backend written ruby rails hosted amazon web services cloud infrastructure email platforms gmail hotmail yahoo etc supported dropmyemail users also backup email via imap pop settings dropmyemail uses amazon s3 storage system store files
[ 11201, 6565, 3870, 7248, 4623, 8446 ]
Test
11,483
7
Red_Hook_Wi-Fi:red hook wi-fi red hook wi-fi free-to-use wi-fi mesh network provides free internet access red hook neighborhood brooklyn new york operated red hook initiative due location red hook brooklyn red hook channel buttermilk channel many residents face various challenges accessing broadband service.. survey found many people area accessed internet primarily mobile phones 30 population broadband access home beginning fall 2011 red hook initiative rhi brooklyn non-profit approached open technology institute collaborating community wireless network rhi wanted way communicate residents immediately around community center network initially launched support 150 simultaneous users ran open-software platform called commotion 2012 hurricane sandy struck area many internet communication systems throughout much city red hook remained connected mesh network headquarters red hook initiative became hub volunteer coordination donation collections food distribution residents came red hook initiative office charge devices connect internet shortly afterwards federal emergency management agency fema connected red hook wi-fi satellite system linking residents red cross communication matrix could used find emergency relief food banks well shelter locations relief efforts finished team led red hook initiative continued make improvements mesh network installing nano stations powered solar panels rooftops around red hook neighborhood though red hook wi-fi project already works hurricane sandy struck gained additional media attention storm 2015 red hook wi-fi selected part city resiliency initiative — group 27 finalists competing resiliency innovations stronger economy
[ 3016, 9098, 10021 ]
None
11,484
3
PAC418:pac418 socket pac418 418 pin microprocessor socket designed interface intel itanium processor rest computer usually via motherboard provides electrical interface well physical support socket designed support microprocessor module socket pac418 introduced intel first generation itanium 2001 supported bus speeds 133 mhz double-pumped socket pac418 processors reach speeds 800 mhz
[ 3588, 5901, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 7134, 9570, 10468, 613, 8552, 1260, 4717, 10225, 371, 9592, 84...
Test
11,485
5
X-Video_Bitstream_Acceleration:x-video bitstream acceleration x-video bitstream acceleration xvba designed amd graphics radeon gpu fusion apu arbitrary extension x video extension xv x window system linux operating-systems xvba api allows video programs offload portions video decoding process gpu video-hardware currently portions designed offloaded xvba onto gpu currently motion compensation mc inverse discrete cosine transform idct variable-length decoding vld mpeg-2 mpeg-4 asp mpeg-4 part 2 including xvid older divx nero digital mpeg-4 avc h.264 wmv3 vc-1 encoded video xvba direct competitor nvidia video decode presentation api unix vdpau intel video acceleration api va api november 2009 xvba backend video acceleration api va api released means software supports va api also support xvba 24 february 2011 official xvba sdk software development kit publicly released alongside suite open source tools amd hardware video gpu capable xvba video acceleration requires x11 software device driver enable features currently amd ati radeon graphics cards hardware support unified video decoder version 2.0 later primarily radeon hd 4000 series later supported proprietary ati catalyst device driver
[ 3586, 3204, 9223, 6797, 7309, 2850, 8995, 10658, 429, 6705, 3764, 823, 1480, 11080, 1377, 1510, 1770, 5867, 876, 1644, 8682, 8438, 2935, 11130, 508 ]
Test