node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
11,486
4
Hping:hping hping free packet generator analyzer tcp/ip protocol distributed salvatore sanfilippo also known antirez one type tester network security one de facto tools security auditing testing firewalls networks used exploit idle scan scanning technique also invented hping author implemented nmap security scanner new version hping hping3 scriptable using tcl language implements engine string based human readable description tcp/ip packets programmer write scripts related low level tcp/ip packet manipulation analysis short time like tools used computer security hping useful system administrators hackers
[ 3169, 8998, 2569, 5612, 11006, 7983, 1200, 2739, 692, 5045, 7031, 5657, 4956, 2558 ]
Test
11,487
3
Hardware_acceleration:hardware acceleration computing hardware acceleration use computer hardware specially made perform functions efficiently possible software running general-purpose transformation data routine computed calculated purely software running generic cpu purely custom-made hardware mix operation computed faster application-specific hardware designed programmed compute operation specified software performed general-purpose computer processor approach advantages disadvantages implementation computing tasks hardware decrease latency increase throughput known hardware acceleration typical advantages software include rapid development leading faster times market lower non-recurring engineering costs heightened portability ease updating features patching bugs cost overhead compute general operations advantages hardware include speedup reduced power consumption lower latency increased parallelism bandwidth better utilization area functional components available integrated circuit cost lower ability update designs etched onto silicon higher costs functional verification times market hierarchy digital computing systems ranging general-purpose processors fully customized hardware tradeoff flexibility efficiency efficiency increasing orders magnitude given application implemented higher hierarchy hierarchy includes general-purpose processors cpus specialized processors gpus fixed-function implemented field-programmable gate arrays fpgas fixed-function implemented application-specific integrated circuit asics hardware acceleration advantageous performance practical functions fixed updates needed software solutions advent reprogrammable logic devices fpgas restriction hardware acceleration fully fixed algorithms eased since 2010 allowing hardware acceleration applied problem domains requiring modification algorithms processing control flow integrated circuits created perform arbitrary operations analog digital signals often computing signals digital interpreted binary number data computer hardware software operate information binary representation perform computing accomplished calculating boolean functions bits input outputting result output device downstream storage processing either software hardware compute computable function custom hardware offers higher performance per watt functions specified software hardware description languages hdls verilog vhdl model semantics software synthesize design netlist programmed fpga composed logic gates application-specific integrated circuit vast majority software-based computing occurs machines implementing von neumann architecture collectively known stored-program computers computer programs stored data executed processors typically one cpu cores processors must fetch decode instructions well data operands memory part instruction cycle execute instructions constituting software program relying common cache code data leads von neumann bottleneck fundamental limitation throughput software processors implementing von neumann architecture even modified harvard architecture instructions data separate caches memory hierarchy overhead decoding instruction opcodes multiplexing available execution units microprocessor microcontroller leading low circuit utilization intel hyper-threading technology provides simultaneous multithreading exploiting under-utilization available processor functional units instruction level parallelism different hardware threads hardware execution units general rely von neumann modified harvard architectures need perform instruction fetch decode steps instruction cycle incur stages overhead needed calculations specified register transfer level rtl hardware design time circuit area costs would incurred instruction fetch decoding stages reclaimed put uses reclamation saves time power circuit area computation reclaimed resources used increased parallel computation functions communication memory well increased input/output capabilities comes opportunity cost less general-purpose utility greater rtl customization hardware designs allows emerging architectures in-memory computing transport triggered architectures tta networks-on-chip noc benefit increased locality data execution context thereby reducing computing communication latency modules functional units custom hardware limited parallel processing capability area logic blocks available integrated circuit die therefore hardware much free offer massive parallelism software general-purpose processors offering possibility implementing parallel random-access machine pram model common build multicore manycore processing units microprocessor ip core schematics single fpga asic similarly specialized functional units composed parallel digital signal processing without embedded processor ip core therefore hardware acceleration often employed repetitive fixed tasks involving little conditional branching especially large amounts data nvidia cuda line gpus implemented device mobility increased relative performance specific acceleration protocols required new metricizations considering characteristics physical hardware dimensions power consumption operations throughput summarized three categories task efficiency implementation efficiency flexibility appropriate metrics consider area hardware along corresponding operations throughput energy consumed suppose wish compute sum formula_1 integers assuming large integers available codice_1 large enough hold sum done software specifying c++ constexpr int n 20 constexpr int two_to_the_n 1 « n bignum array_sum const std :array int two_to_the_n ints algorithm runs linear time formula_2 big notation hardware sufficient area chip calculation parallelized take 20 time steps using prefix sum algorithm algorithm requires logarithmic time formula_3 formula_4 space in-place algorithm parameter int n 20 parameter int two_to_the_n 1 « n function int array_sum endfunction example takes advantage greater parallel resources available application-specific hardware software general-purpose computing paradigms architectures hardware acceleration applied stream processing examples hardware acceleration include bit blit acceleration functionality graphics processing units gpus use memristors accelerating neural networks regular expression hardware acceleration spam control server industry intended prevent regular expression denial service redos attacks hardware performs acceleration may part general-purpose cpu separate unit second case referred hardware accelerator often specifically 3d accelerator cryptographic accelerator etc traditionally processors sequential instructions executed one one designed run general purpose algorithms controlled instruction fetch example moving temporary results register file hardware accelerators improve execution specific algorithm allowing greater concurrency specific datapaths temporary variables reducing overhead instruction control fetch-decode-execute cycle modern processors multi-core often feature parallel single-instruction multiple data simd units even hardware acceleration still yields benefits hardware acceleration suitable computation-intensive algorithm executed frequently task program depending upon granularity hardware acceleration vary small functional unit large functional block like motion estimation mpeg-2
[ 7173, 9736, 9739, 9741, 2066, 7699, 5655, 6171, 10781, 2594, 8231, 10284, 3629, 7218, 6716, 2623, 2113, 7234, 11333, 3142, 1614, 2638, 7252, 3159, 8795, 2140, 1122, 4194, 10853, 3175, 5223, 5225, 6762, 5739, 8810, 4205, 8301, 8815, 3698, ...
Validation
11,488
9
List_of_Lisp-family_programming_languages:list lisp-family programming languages functional programming language lisp second-oldest high-level programming language direct descendants closely related dialects still widespread use today language fortran older one year lisp like fortran changed lot since early days many dialects existed history today widely known general-purpose lisp dialects common lisp scheme
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 9780, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 9330, 5751, 7805, 11390, 1159, 9865, 6797, 9875, 9877, 5803, 2225, ...
Test
11,489
2
TSX-Plus:tsx-plus tsx-plus multi-user operating system pdp-11/lsi-11 series computers developed h computer systems inc. based dec rt-11 single-user real-time operating system tsx-plus installs top rt-11 system highly configurable tunable due constraints memory management system pdp-11/lsi-11 entire operating system core must occupy 40 kibibytes memory maximum possible 4 mebibytes physical memory actually installed machines mandated 22-bit address space despite limitations tsx-plus actually able service 30 simultaneous users still maintaining decent response times although usually never used 8 simultaneous users software included wp package named lex-11 spreadsheet saturn software machine slowed considerably 8 students wanted use word-processing package time also decision-table language called ncc manchester worked well tsx plus system popular 1980s although major number clones latest version tsx-plus tcp/ip support system still use supported
[ 2179, 10499, 10883, 394, 3978, 1804, 1147, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 5531, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7...
Validation
11,490
9
Programming_language_specification:programming language specification computing programming language specification standard definition documentation artifact defines programming language users implementors agree programs language mean specifications typically detailed formal primarily used implementors users referring case ambiguity c++ specification frequently cited users instance due complexity related documentation includes programming language reference intended expressly users programming language rationale explains specification written typically informal specification major programming languages specifications languages exist popular decades without specification language may one implementations whose behavior acts de facto standard without behavior documented specification perl perl 5 notable example language without specification php specified 2014 use 20 years language may implemented specified specified implemented may develop together usual practice today implementations specifications provide checks writing specification requires precisely stating behavior implementation implementation checks specification possible practical consistent writing specification implementation largely avoided since algol 68 1968 due unexpected difficulties implementation implementation deferred however languages still occasionally implemented gain popularity without formal specification implementation essential use specification desirable essential informally code talks programming language specification take several forms including following syntax programming language usually described using combination following two components formulating rigorous semantics large complex practical programming language daunting task even experienced specialists resulting specification difficult anyone experts understand following ways programming language semantics described languages use least one description methods languages combine one widely used languages specified using natural language descriptions semantics description usually takes form reference manual language manuals run hundreds pages e.g. print version java language specification 3rd ed 596 pages long imprecision natural language vehicle describing programming language semantics lead problems interpreting specification example semantics java threads specified english later discovered specification provide adequate guidance implementors formal semantics grounded mathematics result precise less ambiguous semantics given natural language however supplemental natural language descriptions semantics often included aid understanding formal definitions example iso standard modula-2 contains formal natural language definition opposing pages programming languages whose semantics described formally reap many benefits example automatic tool support help realize benefits example automated theorem prover theorem checker increase programmer language designer confidence correctness proofs programs language power scalability tools varies widely full formal verification computationally intensive rarely scales beyond programs containing hundred lines may require considerable manual assistance programmer lightweight tools model checkers require fewer resources used programs containing tens thousands lines many compilers apply static type checks program compile reference implementation single implementation programming language designated authoritative behavior implementation held define proper behavior program written language approach several attractive properties first precise requires human interpretation disputes meaning program settled simply executing program reference implementation provided implementation behaves deterministically program hand defining language semantics reference implementation also several potential drawbacks chief among conflates limitations reference implementation properties language example reference implementation bug bug must considered authoritative behavior another drawback programs written language may rely quirks reference implementation hindering portability across different implementations nevertheless several languages successfully used reference implementation approach example perl interpreter considered define authoritative behavior perl programs case perl open-source model software distribution contributed fact nobody ever produced another implementation language issues involved using reference implementation define language semantics moot defining semantics programming language terms test suite involves writing number example programs language describing programs ought behave — perhaps writing correct outputs programs plus outputs called test suite language correct language implementation must produce exactly correct outputs test suite programs chief advantage approach semantic description easy determine whether language implementation passes test suite user simply execute programs test suite compare outputs desired outputs however used test suite approach major drawbacks well example users want run programs part test suite indeed language implementation could run programs test suite would largely useless test suite describe language implementation behave program test suite determining behavior requires extrapolation implementor part different implementors may disagree addition difficult use test suite test behavior intended allowed nondeterministic therefore common practice test suites used combination one language specification techniques natural language description reference implementation examples official draft language specifications
[ 2304, 8582, 2316, 9871, 6558, 1952, 428, 5420, 5677, 10049, 8773, 8262, 1611, 3022, 10584, 7394, 10083, 8421, 11625, 3960, 2045 ]
Validation
11,491
0
United_Nations_Multilingual_Terminology_Database:united nations multilingual terminology database united nations multilingual terminology database unterm linguistic tool translates terminology nomenclature used within united nations un six official languages un arabic chinese english french russian spanish database contains 85,000 words updated daily database maintained terminology reference section documentation division department general assembly conference management headquarters new york city database put internet order facilitate understanding work un public access intranet un secretariat
[]
Test
11,492
4
BackupPC:backuppc backuppc free disk-to-disk backup software suite web-based frontend cross-platform server run linux solaris unix-based server client necessary server client several protocols handled services native client os 2007 backuppc mentioned one three well known open-source backup software even though one tools amazing unfortunately one ever talks many folks never hear data deduplication reduces disk space needed store backups disk pool possible use d2d2t solution archive function backuppc used back disk pool tape backuppc block-level backup system like ghost4linux performs file-based backup restore thus suitable backup disk images raw disk partitions backuppc incorporates server message block smb client used back network shares computers running windows paradoxically setup backuppc server located behind nat 'd firewall windows machine operates public ip address may advisable smb traffic useful web servers running secure shell ssh gnu tar rsync available allows backuppc server stored subnet separate web server dmz published gnu general public license backuppc supports nfs ssh smb rsync back unix-like systems native ssh tar rsync support linux bsd os x well microsoft windows shares minimal configuration windows third party implementations tar rsync ssh cygwin required utilize protocols choice tar rsync dictated hardware bandwidth available client clients backed rsync use considerably cpu time client machines using tar smb clients using smb tar use considerably bandwidth clients using rsync trade-offs inherent differences protocols using tar smb transfers file entirety using little cpu maximum bandwidth rsync method calculates checksums file client server machines way enables transfer differences two files uses cpu resources minimizes bandwidth version 3.x backuppc uses combination hard links compression reduce total disk space used files first full backup files transferred backend optionally compressed compared files identical hard linked uses one additional directory entry upshot astute system administrator could potentially back ten windows xp laptops 10 gb data 8 gb repeated machine office windows binary files would look like 100 gb needed 28 gb 10 × 2 gb 8 gb would used compression data back-end reduce requirement browsing backups incremental backups automatically filled back previous full backup every backup appears full complete set data version 4.x still use v3.x repositories new backups use new format seamless upgrade overall performance higher v3.x version
[ 5249, 5253, 7685, 8582, 6280, 3988, 10530, 10276, 3366, 6313, 1837, 4398, 7983, 9014, 823, 9025, 7364, 8772, 4294, 1358, 7764, 11221, 11610, 7518, 10341, 2281, 5482, 5612, 8941, 9836, 3826, 3837 ]
Validation
11,493
9
Harmony_Compiler:harmony compiler harmony compiler written peter samson massachusetts institute technology mit compiler designed encode music pdp-1 built earlier program samson wrote tx-0 computer jack dennis noticed mentioned samson sound state tx-0 speaker could enough play music succeeded building wysiwyg program one voice 1960 pdp-1 arrived mit september 1961 samson designed harmony compiler synthesizes four voices input text-based notation although created music many genres optimized baroque music pdp-1 music merged four channels played back stereo notes pitch undertone music stop errors mistakes greeted message typewriter red ribbon err human forgive divine samson joined pdp-1 restoration project computer history museum 2004 recreate music player
[]
None
11,494
2
IDEDOS:idedos idedos rom-based disk operating system written 6502/65816 assembly language commodore 64 128 supercpu main purpose control ata pi devices connected ide64 cartridge present like normal commodore drives additionally supports networked drives pclink built-in machine code monitor file manager c64 kernal uses vector table page 3 allow redirection common kernal file handling basic functions feature used idedos hook c64 kernal operating system divided four pages 16 kib mapped required mapping temporarily switched interrupts running increased compatibility however causes ≈40 μs latency additional ram buffers internal data also mapped either ide64 cartridge 28 kib additional ram supercpu used standard kernal memory locations page zero page two handled kernal-compatible way temporarily used memory restored routines finished beyond kernal table idedos two new calls bulk data handling read/write allows much faster data transfer rates character-based i/o native file system non-cbm style low level allow partitions greater 16 mib high-level features like 16-character filenames filetypes retained due complexity memory requirements filesystem creation consistency check part operating system unlike cbm dos cmd dos additional filesystems like iso 9660 fat abstracted internally mostly use routines handling thereby little difference noticeable user programs except features fully implemented device handling done additional device numbers assigned new devices device numbers idedos devices configurable normally range 10–14 years many programs assumed device 8 allow selecting anything else worked around temporary changing used idedos device number 8 standard devices original kernal routines used idedos devices use custom routines closely imitate results behavior kernal calls floppy devices kernal calls going vector table notably iec bus-specific calls present incompatibility programs using special features like cd-rom audio handling implemented new channel 15 commands features found floppy drives follow cmd style commands allow programs easily support wider range devices unlike intelligent external devices separate processor like 1541 cbmdos idedos runs host computer thereby disk routines block finished rules use irq loaders commonly used speed operation serial bus peripherals interrupts generally allowed idedos running disabled rare time-critical operations however system written non-reentrant like original kernal 1996 idedos born need system run ide64 1.1 card created josef souček main code tomáš přibyl file manager final cartridge monitor adaptation additional code came jan vorlíček basic extension jan hlaváček duart pclink 2000 kajtár zsolt added cdrom support new setup code lot fixes due limitations design development completely rewritten version 0.90 started kajtár zsolt ready general use 2005 meanwhile old version reached 0.898b june 2004 2009 64 kib limit system started get tight idedos 0.91 beta started refactor code gain space internal flexibility last version old idedos series built fast loader supported devices fast load switched setup case incompatibility non-1541 device 8 minimum interleave 7 fast saver supported manager uses interleave 8 pal/ntsc compatible timing custom protocol sequential access supported devices includes clock calendar ability set drive numbers screen colours auto boot floppy fast loader basic clock ti power management write retry read-ahead write cache drive settings cdrom slow option basic extension includes disk handling commands limited idedos devices adds new error messages commands used navigate around directories start programs copy/rename/delete files create directories execute plugins operate files recursive file copy added 0.898b rare cases work monitor almost exactly final cartridge monitor idedos 0.89 standard 6502 opcodes available commands current stable latest version 20100509 patch 45 notable differences 0.89 supported devices device support automatically detected disabled manually needed pal/ntsc compatible timing fast saver file manager custom protocol sequential access supported devices mostly well known standard dos wedge commands basic extension adds disk handling commands used device use cmd style commands file managers inspiration comes 0.89 though rewritten scratch goal file manager supports idedos devices also works well cmd drives monitor rewritten scratch main inspiration ccs64 emulator monitor command ideas came fc3/ar7/vice monitors goal freezer style registers including i/o editable fast machine code monitor supports illegal 6502 supercpu emulation mode opcodes commands still development notable differences 0.90
[ 5413, 8262, 10533, 6120, 2665, 9549, 7281, 7356, 4563, 9946, 4764, 477 ]
Test
11,495
9
Daniel_Weinreb:daniel weinreb daniel l. weinreb january 6 1959 – september 7 2012 american computer scientist programmer significant work lisp environment weinreb born january 6 1959 brooklyn new york raised parents herbert phyllis weinreb two brothers bill david attended saint ann school weinreb graduated st. ann school brooklyn ny 1975 attended mit 1975–1979 starting age 16 graduating b.s computer science electrical engineering wrote eine text editor mit lisp machine eine made use window system lisp machine thus first emacs written graphical user interface second implementation emacs ever written first implementation emacs lisp notable subsequent emacs implementations used lisp including james gosling gosmacs bernard greenberg multics emacs richard stallman gnu emacs 1979–1980 weinreb worked lawrence livermore national laboratory amber operating system s-1 particularly file system multiprocess scheduler 1980 co-founded symbolics developing software symbolics lisp machine also participated significantly design common lisp programming language one five co-authors original common lisp specification common lisp language first edition worked statice object-oriented database published symbolics 1988 1988 co-founded object design one architects implementors objectstore leading commercial object-oriented database management system object database still commercially maintained available progress software bought object design excelon inc. 2002 joined bea systems operations administration management architect weblogic 2006 joined ita software working airline reservation system 2009 daniel weinreb gave google tech talk use common lisp one implementation languages airline reservation system 2009 chair international lisp conference 2009 cambridge/ma weinreb married cheryl moreau 1986 son adam 1991 dan weinreb died september 7 2012 year-long battle cancer
[ 4992, 4097, 10752, 11269, 3334, 5751, 2056, 6919, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8993, 8226, 4516, 5031, 9128, 5803, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, ...
None
11,496
4
System_high_mode:system high mode system high mode simply system high security mode using automated information system ais pertains environment contains restricted data classified hierarchical scheme top secret secret unclassified system high pertains ia features information processed specifically strength trustworthiness system system high mode distinguished modes multilevel security lack need system contribute protection separation unequal security classifications particular precludes use features objects e.g content format produced exposed ais operating system high mode criteria securely downgrade objects result information system high ais treated classified highest security level data ais example unclassified information exist secret system high computer must treated secret therefore never shared unclassified destinations unless downgraded reliable human review risky lack omniscient humans known technology securely declassify system high information automated means reliable features data trusted potentially corrupted system high host unreliable means used including cross-domain solutions bypass guards serious risk system exploitation via bypass introduced nevertheless done resulting risk overlooked accepted
[ 3480, 10170, 4067, 11470 ]
Test
11,497
9
SETL:setl setl set language high-level programming language based mathematical theory sets originally developed jack jacob t. schwartz new york university nyu courant institute mathematical sciences late 1960s setl provides two basic aggregate data types unordered sets sequences latter also called tuples elements sets tuples arbitrary type including sets tuples maps provided sets pairs i.e. tuples length 2 arbitrary domain range types primitive operations setl include set membership union intersection power set construction among others setl provides quantified boolean expressions constructed using universal existential quantifiers first-order predicate logic setl provides several iterators produce variety loops aggregate data structures print prime numbers 2 n notation similar list comprehension factorial procedure definition conventional setl expression factorial n 0 1970s setl ported besm-6 es evm russian computer systems setl used early implementation programming language ada named nyu ada/ed translator later became first validated ada implementation certified april 11 1983 according guido van rossum python predecessor abc inspired setl -- lambert meertens spent year setl group nyu coming final abc design set language 2 setl2 backward incompatible descendant setl created kirk snyder courant institute mathematical sciences new york university late 1980s like predecessor based theory notation finite sets also influenced syntax style ada language interactive set language isetl variant setl used discrete mathematics
[ 9345, 4770, 3076, 1610, 1931, 428, 8554, 10670, 6967 ]
Validation
11,498
2
Kernel-Mode_Driver_Framework:kernel-mode driver framework kernel-mode driver framework kmdf driver framework developed microsoft tool aid driver developers create maintain kernel mode device drivers windows 2000 later releases one frameworks included windows driver frameworks current version 1.27 general kmdf supports drivers written windows driver model runs wdm wdm driver model used since advent windows 98 whereas kmdf driver framework microsoft advocates uses windows 2000 beyond general since features like power management plug play handled framework kmdf driver less complicated less code equivalent driver kmdf object-based built top wdm provides object-based perspective wdm following architectural mandate superset wdf functionality contained different types objects kmdf implementation consists
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 6709, 8246, 4174, 4178, 83, 9813, 603, 608, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 10900, 10902, 11414, 3224, 3235, 4771, 7846, 2221, 10...
None
11,499
3
Intel_BCD_opcode:intel bcd opcode intel bcd opcodes set x86 instructions operates bcd numbers radix used representation numbers x86 processors 2 called binary numeral system however x86 processors limited support decimal numeral system bcd instructions longer supported long mode bcd numbers represented two ways packed decimal unpacked decimal decimal numbers 0 99 added directly first numbers added usual using add adc need carry flag processor set adjust flag sum lower nibbles 16 higher carry flag sum bytes 256 higher result adjusted depending number representation decimal numbers 0 99 subtracted directly first numbers subtracted usual using sub sbb need carry flag processor set adjust flag borrow occurred least significant nibble carry flag borrow occurred significant nibble unpacked representation supported two single digit numbers multiplied first digits multiplied usual using mul result adjusted using aam ascii adjust multiplication processor divides result ten storing quotient integral part significant byte result remainder least significant byte result unpacked representation supported operands must fall range 0 99 first operands converted normal binary representation using aad ascii adjust division processor converts numbers multiplying significant byte 10 adding least significant byte quotient remainder division obtained usual using div present normal binary representation binary-coded decimal bcd numbers past used storing decimal numbers especially financial software opcodes mentioned give x86 rudimentary bcd support adding bcd numbers using opcodes complex task requires many instructions add even modest numbers also require large amount memory integer calculations integer calculations exact radix number representation important accuracy x86 processor calculations binary numbers usually lot faster calculations bcd numbers
[ 9158, 7783, 1776, 499, 372, 1175, 1915, 255 ]
Test
11,500
5
UW_IMAP:uw imap uw imap server reference server implementation imap protocol developed university washington mark crispin others uw-imap development began c.1988 2003 uw imap among three popular free software imap server packages two cyrus imap courier imap 2005 point codebase undergone extensive rewriting among top two cyrus imap may 2008 university washington terminated development uw imap 4 august 2008 staff university washington involved developing uw imap pine alpine announced would shift effort direct development consultation coordination role help integrate contributions community wake layoffs university washington technology division c. january august 2009 maintainers debian gnu/linux major downstream distributor uw imap began retire uw imap packages september 2009 mark crispin principal author uw imap announced fork called panda imap crispin passed away late 2012 least one uw imap enthusiast maintains public source code repository containing uw imap panda imap commit history start project crispin final release much 2000s uw imap considered good choice due ready availability inclusion major linux distributions support pop imap ease installation also received praise ease administration compatibility longstanding mailbox formats small size simplicity unlike later imap servers uw imap coupled imap user accounts user accounts server underlying operating system feature together uw imap default use monolithic mailbox files intended ensure compatibility legacy operating systems email management practices drew criticism commentators particular sam varshavchik developer competing courier imap server suggested crispin decision add support maildir popular non-monolithic mailbox format uw imap may stemmed lingering resentment earlier disagreement crispin maildir designer daniel j. bernstein crispin insistence upon retaining uw imap support flat files mail stores criticised maintainers competing citadel imap server causing otherwise unnecessary complexity imap protocol additionally varshavchik noted despite crispin insistence imap servers comply imap specifications uw imap server imap client counterpart pine used private imap extension documented specification uw imap also criticised susceptibility buffer overflows lack privilege separation relative competitors cyrus courier 2007 computer programs existed capable exploiting security vulnerabilities un-patched improperly-configured uw imap installations unreliable ssl support uw imap designed compatible existing legacy mail stores systems plug-and-play installable without requiring site-specific configuration uw imap uses c-client mail engine also used alpine pine e-mail clients c-client supports multiple mail store formats including usenet news spools mix mbox mbx mx mh tenex mtx mmdf phile c-client also includes support imap pop3 nntp smtp internet protocols also bundled uw imap pop2 pop3 servers mailutil utility program dmail tmail mail delivery agents 2005 uw imap codebase consisted 135,000 lines code imap server comprised 4,000 lines c-client comprised rest uw imap officially support maildir format however uw imap patched support formats maildir gluelogic offers patch support maildirs pine patched pine instance used compile uw imap nominal maildir support however yields buggy server correctly distinguish unseen recent messages patch available alpine used similarly fewer drawbacks
[ 1474, 2748, 5063, 10248, 8298, 76, 5230, 10096, 3218, 1075, 9909, 3350, 471, 8344, 3578, 412, 4439, 8671 ]
Test
11,501
2
Sprite_(operating_system):sprite operating system sprite experimental unix-like distributed operating system developed university california berkeley john ousterhout research group 1984 1992 notable features include support single system image computer clusters introduction log-structured filesystem tcl scripting language also originated project early work sprite based idea making operating system network aware thereby time make invisible user primary area work building new network file system made heavy use local client-side caching order improve performance opening file initial reads network used on-demand user actions occur cache similar utilities allow remote devices mapped local computer space allowing network printing similar duties many key unix files based network including things like password file machines network share root directory well common unix utilities codice_1 re-written make network aware well listing people logged across network makes sprite network appear single large time-sharing system single-system image another key addition sprite process migration allows programs moved machines time system maintains list machines state automatically moves processes idle machines improve local performance processes also evicted machines improve performance causing original starter move another machine network take control locally long tasks like compiling sprite system appear fast work early sprite outlined ended around 1987 improved next year starting 1990 sprite used basis development first log-structured file system lfs development continued 1992 lfs dramatically increases performance file writes expense read performance sprite tradeoff particularly useful read access cached anyway—that sprite systems typically perform fewer reads normal unix system lfs-like systems also allow much easier crash recovery became major focus project period additional experimentation striped file systems striped across different machines well clusters drives continued 1994 sprite microkernel system suffers sort problems unixes terms development complexity becoming increasingly difficult develop functionality added 1990s suffering small team supporting project simply able keep rapid changes unix taking place time project slowly shut 1994
[ 6787, 6412, 5498, 7187, 5397, 1304, 3487, 1952, 3241, 7983, 3248, 2995, 692, 9141, 823, 9784, 7483, 9151, 3267, 10436, 11075, 8262, 5452, 5206, 6369, 5873, 5363, 5492, 118, 2424, 633, 3066, 2045 ]
None
11,502
4
Bastion_host:bastion host bastion host special-purpose computer network specifically designed configured withstand attacks computer generally hosts single application example proxy server services removed limited reduce threat computer hardened manner primarily due location purpose either outside firewall demilitarized zone dmz usually involves access untrusted networks computers term generally attributed 1990 article discussing firewalls marcus j. ranum ranum defined bastion host krutz vines described bastion host computer fully exposed attack public side dmz unprotected firewall filtering router firewalls routers anything provides perimeter access control security considered bastion hosts types bastion hosts include web mail dns ftp servers ... due exposure great deal effort must put designing configuring bastion hosts minimize chances penetration amazon web services aws context bastion host defined server whose purpose provide access private network external network internet exposure potential attack bastion host must minimize chances penetration. aws related definition bastion hosts instances sit within public subnet typically accessed using ssh rdp remote connectivity established bastion host acts ‘ jump ’ server allowing use ssh rdp log instances within private subnets deeper within vpc properly configured use security groups network acls nacls bastion essentially acts bridge private instances via internet two common network configurations include bastion hosts placement first requires two firewalls bastion hosts sitting first outside world firewall inside firewall dmz often smaller networks multiple firewalls one firewall exists network bastion hosts commonly placed outside firewall bastion hosts related multi-homed hosts screened hosts dual-homed host often contains firewall also used host services well screened host dual-homed host dedicated running firewall bastion server also set using proxycommand openssh several examples bastion host systems/services
[ 225, 836, 7364, 7812, 2887, 5608, 8998, 9256, 939, 7248, 4895, 4725, 6262, 6773, 1208, 11188, 3930, 4287 ]
None
11,503
5
PageSpinner:pagespinner pagespinner semi-wysiwyg html editor os x developed optima systems released shareware pagespinner worldscript compliant uses waste text engine carbon library originally released classic mac os ported os x shortly operating system release used jeffrey zeldman 13 years switched textmate version 4.0 released 2002 introduced multiple undo double-byte input support scroll wheel support mac os x version 4.6.3 deemed quirky erratic 2006 reviewer particular macintosh version 5 released 2010 reviewed macworld uk faulted appearance dated found price high features provided reviewer impressed multiple site support integration apache os x standard web server june 2019 optima systems website offline current status pagespinner unknown
[ 576, 6338, 7785, 6154, 4171, 5612, 6797, 7983, 7346, 6231, 119, 2045, 10910 ]
Test
11,504
4
Nimsoft:nimsoft nimsoft independent company software vendor offered information technology monitoring service desk products services acquired ca inc. 2010 since october 2012 products integrated business nimsoft brand still used ca nimsoft products monitor manage business services specific systems within infrastructure including network components servers databases applications virtualized environments nimsoft products customers monitor systems hosted internal data centers well externally hosted environments including software service saas cloud computing environments nimbus software founded oslo norway 1998 confused nimbus data converse software exclusive us distributor nimbus software founded silicon valley 2002 nimbus software converse software merged 2004 form nimsoft gary read founder us distributor appointed ceo new company headquarters established silicon valley 2007 10.3 million series round funding jmi equity northzone ventures closed nimsoft acquired indicative software april 2008 offer business service management established new research development base fort collins colorado nimsoft received san francisco business times 2008 best place work award nimsoft closed 12 million funding round led goldman sachs october 2008 may 2009 nimsoft acquired intellectual property assets cittio product capabilities included network discovery topology mapping root cause analysis rca utilizing graph theory october nimsoft announced unified monitoring architecture monitor externally hosted systems services including saas cloud computing based infrastructures march 2010 ca inc. announced would acquire nimsoft 350 million nimsoft one hottest silicon valley companies lead411 september 2010 nimsoft extended software support vblock products vce company april 2011 nimsoft announced unified manager software combining monitoring service management enhanced management support netapp storage announced june ca acquired netherlands-based watchmouse july software integrated nimsoft nimsoft ceased exist independent operating unit within ca 2012 although products still offered brand name
[ 11233, 4194, 467, 6067 ]
Test
11,505
1
Fortify_Software:fortify software fortify software later known fortify inc. california-based software security vendor founded 2003 acquired hewlett-packard 2010 become part hp enterprise security products fortify offerings included static application security testing dynamic application security testing products well products services support software security assurance february 2011 fortify sells fortify ondemand static dynamic application testing service september 7 2016 hpe ceo meg whitman announced software assets hewlett packard enterprise including fortify would merged micro focus create independent company hp enterprise shareholders would retain majority ownership micro focus ceo kevin loosemore called transaction entirely consistent established acquisition strategy focus efficient management mature infrastructure products indicated micro focus intended bring core earnings margin mature assets deal 80 percent total 21 percent today micro focus existing 46 percent level within three years merge concluded september 1 2017 fortify technical advisory board composed avi rubin bill joy david a. wagner fred schneider gary mcgraw greg morrisett li gong marcus ranum matt bishop william pugh john viega fortify created security research group maintained java open review project vulncat taxonomy security vulnerabilities addition security rules fortify analysis software members group wrote book secure coding static analysis published research including javascript hijacking attacking build cross build injection watch write preventing cross-site scripting observing program output dynamic taint propagation finding vulnerabilities without attacking
[ 1312, 7808, 1316, 8229, 1638, 9031, 5384, 11100, 6765, 3214, 2258, 6773, 1304, 1114, 11067, 5756 ]
None
11,506
2
DTrace:dtrace dtrace comprehensive dynamic tracing framework created sun microsystems troubleshooting kernel application problems production systems real time originally developed solaris since released free common development distribution license cddl opensolaris descendant illumos ported several unix-like systems dtrace used get global overview running system amount memory cpu time filesystem network resources used active processes also provide much fine-grained information log arguments specific function called list processes accessing specific file 2010 oracle corporation acquired sun microsystems announced discontinuing opensolaris community effort core solaris engineers create truly open source solaris illumos operating system announced via webinar thursday 3 august 2010. fork opensolaris os/net consolidation including dtrace technology october 2011 oracle announced porting dtrace linux several years unofficial dtrace port linux available changes licensing terms august 2017 oracle released dtrace kernel code gplv2+ license user space code gplv2 upl licensing september 2018 microsoft announced ported dtrace freebsd windows september 2016 opendtrace effort began github code comprehensive documentation system internals opendtrace effort maintains original cddl licensing code opensolaris additional code contributions coming bsd 2 clause license goal opendtrace provide os agnostic portable implementation dtrace acceptable consumers including macos freebsd openbsd netbsd linux well embedded systems sun microsystems designed dtrace give operational insights allow users tune troubleshoot applications os testers write tracing programs also referred scripts using programming language confused programming languages named language inspired c includes added functions variables specific tracing programs resemble awk programs structure consist list one probes instrumentation points probe associated action probes comparable pointcut aspect-oriented programming whenever condition probe met associated action executed probe fires typical probe might fire certain file opened process started certain line code executed probe fires may analyze run-time situation accessing call stack context variables evaluating expressions print log information record database modify context variables reading writing context variables allows probes pass information allowing cooperatively analyze correlation different events special consideration taken make dtrace safe use production environment example minimal probe effect tracing underway performance impact associated disabled probe important since tens thousands dtrace probes enabled new probes also created dynamically dtrace scripts invoked directly command line providing one probes actions arguments examples dtrace -n 'proc exec-success trace curpsinfo- pr_psargs dtrace -n 'syscall :open* entry printf execname copyinstr arg0 dtrace -n 'syscall entry num execname count dtrace -n 'syscall entry num probefunc count dtrace -n 'syscall entry num pid execname count dtrace -n 'io start printf pid execname args 0 b_bcount dtrace -n 'vminfo pgpgin pg execname sum arg0 scripts also written reach hundreds lines length although typically tens lines needed advanced troubleshooting analysis 200 examples open source dtrace scripts found dtracetoolkit created brendan gregg author dtrace book also provides documentation demonstrations dtrace first became available use november 2003 formally released part sun solaris 10 january 2005 dtrace first component opensolaris project source code released common development distribution license cddl dtrace integral part illumos illumos distributions opensolaris continuation dtrace standard part freebsd netbsd apple added dtrace support mac os x 10.5 leopard including gui called instruments 40 dtrace scripts dtracetoolkit included /usr/bin including tools examine disk i/o iosnoop process execution execsnoop unlike platforms dtrace supported mac os x flag p_lnoattach program may set disallows tracing process debugging utilities dtrace gdb original mac os x dtrace implementation could affect tracing system information unrelated probes fire program flag set running would fail os x 10.5.3 update addressed issue months later however since el capitan system integrity protection prevents user dtracing protected binary default linux port dtrace available since 2008 work continues actively enhance fix issues also active implementation github standard core providers available fbt syscall profile plus special instr provider solaris providers yet available linux dtrace implementation loadable kernel module means kernel requires modification thus allows dtrace avoid cddl vs. gpl licensing conflicts source form least however dtrace loaded kernel instance marked tainted 2007 developer qnx software systems announced blog colleague working incorporating dtrace qnx operating system oracle corporation added beta dtrace support oracle linux 2011 technology preview unbreakable enterprise kernel release 2 gplv2 dtrace linux kernel module originally released cddl general availability announced december 2012 march 11th 2019 microsoft released build dtrace windows 10 insider builds supported language provider dtrace retrieve context code including function source file line number location dynamic memory allocation garbage collection made available supported language supported language providers include assembly language c c++ java erlang javascript perl php python ruby shell script tcl application providers allow dtrace follow operation applications system calls kernel applications offer dtrace application providers include mysql postgresql oracle database oracle grid engine firefox dtrace designed implemented bryan cantrill mike shapiro adam leventhal authors received recognition 2005 innovations dtrace infoworld technology review dtrace top prize wall street journal 2006 technology innovation awards competition authors recognized usenix software tools user group stug award 2008
[ 4636, 9245, 5677, 5177, 8266, 2123, 7249, 9306, 11363, 10340, 5222, 9320, 8816, 9844, 5240, 9343, 6803, 10387, 2710, 5280, 2212, 692, 1718, 5819, 11459, 8395, 5335, 7383, 6361, 10455, 10478, 1273, 4858, 1286, 10000, 274, 5397, 10016, 10535,...
Test
11,507
4
Separation_of_duties:separation duties separation duties sod also known segregation duties concept one person required complete task business separation sharing one individual one single task internal control intended prevent fraud error concept alternatively called segregation duties political realm separation powers democracies separation legislation administration serves similar purpose concept addressed technical systems information technology equivalently generally addressed redundancy separation duties key concept internal controls increased protection fraud errors must balanced increased cost/effort required essence sod implements appropriate level checks balances upon activities individuals r. a. botha j. h. p. eloff ibm systems journal describe sod follows separation duty security principle primary objective prevention fraud errors objective achieved disseminating tasks associated privileges specific business process among multiple users principle demonstrated traditional example separation duty found requirement two signatures cheque actual job titles organizational structure may vary greatly one organization another depending size nature business accordingly rank hierarchy less important skillset capabilities individuals involved concept sod business critical duties categorized four types functions authorization custody record keeping reconciliation perfect system one person handle one type function principally several approaches optionally viable partially entirely different paradigms person multiple functional roles opportunity abuse powers pattern minimize risk general categories functions separated primarily individual separation addressed selection term sod already well known financial accounting systems companies sizes understand combine roles receiving cheques payment account approving write-offs depositing cash reconciling bank statements approving time cards custody pay cheques etc sod fairly new information technology departments high percentage sarbanes-oxley internal audit issues come information systems segregation duties helps reduce potential damage actions one person end-user department organized way achieve adequate separation duties according isaca segregation duties control matrix duties combined one position matrix industry standard general guideline suggesting positions separated require compensating controls combined depending company size functions designations may vary duties separated compensating controls place compensating controls internal controls intended reduce risk existing potential control weakness single person carry conceal errors and/or irregularities course performing day-to-day activities assigned sod incompatible duties several control mechanisms help enforce segregation duties accounting profession invested significantly separation duties understood risks accumulated hundreds years accounting practice contrast many corporations united states found unexpectedly high proportion sarbanes-oxley internal control issues came separation duties commonly used large organizations single person position introduce fraudulent malicious code data without detection role-based access control frequently used systems sod required strict control software data changes require person organizations performs one following roles exhaustive presentation software development life cycle list critical development functions applicable separation duties successfully implement separation duties information systems number concerns need addressed
[ 10529, 10340, 9966, 210, 10196, 5433, 3323, 10398 ]
Test
11,508
1
PISCES:pisces pisces personal identification secure comparison evaluation system border control database system largely based biometrics developed booz allen hamilton inc.. pisces-project initiated department state terrorist interdiction program tip 1997 initially system countries improving watchlisting capabilities providing mainframe computer system facilitate immigration processing half dozen countries foreign authorities used technology watchlist exchange information united states department state suspected terrorists appearing borders information used track apprehend individual terrorists wide-ranging analysis terrorist travel methods according us-government reports matches passengers inbound united states facial images fingerprints biographical information airports high-risk countries high-speed data network permits u.s. authorities informed problems inbound passengers pisces workstations installed throughout country linked wide area network participating nation ’ immigration police intelligence headquarters headquarters provided automated capability monitor activities immigration points evaluate traveler information conduct real time data analysis currently pisces-project falls terrorist interdiction program tip ongoing programme united states department state tip provides necessary software hardware mostly commercial off-the-shelf cameras passport scanners full installation operator training system sustainment additionally tip assists immigration business process improvement ports entry chosen pisces installation fy 2007 funds used support enhancements existing watch listing system software order provide fraudulent document detection capability biometrics search capability improved name-searching effectiveness starting fy 2010 onward fy 2011 pisces funding increased united states department state considers high risk countries afghanistan iraq pakistan project verify us visas via limited access us government database go trial select outposts although pisces operational months prior september 11 2001 apparently failed detect terrorists involved attack according us department state 2003 currently deployed five countries scheduled deployment 12 countries calendar year arrests detentions occurred five countries system deployed 2005 since 2001 twenty nations provided capability expected 2011 31 27 march 2018 country us government signed memorandum intention donation system personal identification secure comparison evaluation pisces cooperation bosnia council ministers us government aims install maintain hardware software required pisces system operate starting international airport sarajevo later expanding airports border crossings country
[ 10207 ]
None
11,509
5
DICT:dict dict dictionary network protocol created dict development group described rfc 2229 published 1997 goal surpass webster protocol allow clients access dictionaries use dict servers clients use tcp port 2628 standard dictd server made dict development group uses special dict file format although dictd servers gnu dico may optionally use file formats dictionaries standard dict file format made two files .index file .dict file .dict.dz compressed files usually written manually compiled program called dictfmt example unix command compile unicode-compatible dict file called mydict heading dictionary mydict.txt jargon file format i.e dictionary file produced installing server normally matter typing something like dictd server used telnet example connect dict server localhost unix system one normally type enter command help see available commands standard dictd package also provides dict command command-line use sophisticated dict clients include also programs read dict file format directly example s60dict dictionary program symbian series 60 uses dict dictionaries additionally dict clients fantasdic also capable reading dict format directly order efficiently store dictionary data dictzip extension gzip compression format also name utility used compress .dict file dictzip compresses file chunks stores chunk index gzip file header thus allowing random access data
[ 10242, 5251, 3218, 10269, 416, 35, 5677, 6319, 10033, 6330, 4797, 7364, 4933, 4561, 5078, 10727, 11112, 5482, 9834, 5492, 6651 ]
Test
11,510
7
Korea_Internet_Neutral_Exchange:korea internet neutral exchange korea internet neutral exchange kinx inc. carrier-neutral internet exchange ix south korea b2b company specializes internet infrastructure kinx provides internet data center idc content delivery network cdn cloud computing services customers headquarters seoul south korea june 2019 kinx 116 employees kinx operates layer 2-based internet exchange south korea data center carrier-neutral means domestic international internet service providers isp well content providers cps independent network providers could freely select peering partners kinx expanding international coverage establishing point presence pop hong kong tokyo japan kinx currently operating four idcs – carrier-neutral – near seoul area ix participants include daum-kakao whose popular messenger service kakaotalk boasts 140 million users kinx cdn solution based peering domestic international isps delivers contents fast stable manner provides streaming cache downloading services main customers kinx ’ solution gaming companies com2us neowiz games need deliver contents end-users media outlets korea economic daily financial news provide real-time news updates audience 2012 kinx introduced 'ixcloud becoming first korean company provide public cloud service utilizes openstack also provides support public private companies efforts establish private cloud service since 2011 kinx partnership appcenter provided cloud service mobile web developers free-of-charge 2014 kinx signed mou neoply program managed neowiz games support startups provide infrastructure cloud service early days internet south korea domestic internet traffic go via overseas internet exchange points demand internet rose dramatically government find way address network ’ low quality rising costs furthermore particularly concerned rapid rise volume internet traffic issues mind nca national computerization agency established korea internet exchange kix first ix south korea due various circumstances however nca privatized kix december 1996 korea telecom kt corporation began operating korea telecom internet exchange ktix dacom lg uplus founded dacom internet exchange dix rather solving problems ktix dix brought challenges rising service charges ix customers pay 1998 address issues 16 isps excluding kt dacom hosted 'korea internet interconnection conference led establishment korea internet neutral exchange kinx june 2000
[ 10368, 10017, 4194, 8170, 7248, 5470 ]
Test
11,511
4
Wicked_Rose:wicked rose wicked rose pseudonym chinese hacker responsible developing ginwui rootkit used internet attacks summer 2006 suggested works chinese army tan dailin graduate student sichuan university noticed attacking japanese site people ’ liberation army pla summer 2005 invited participate pla-sponsored hacking contest subsequently participated one-month 16-hour-per-day training program students simulated various cyber invasion methods built dozens hacking exploits developed various hacking tactics strategies chosen sichuan regional team compete teams yunnan guizhou tibet chongqing military district team ranked number one cash prize 20,000 rmb pseudonym wicked rose formed network crack program hacker group ncph group recruited talented hackers school found funding source unknown benefactor started attacking us sites initial round successful attacks funding tripled 2006 ncph built sophisticated rootkits launched barrage attacks multiple us government agencies end july 2006 ncph created 35 different attack variants one ms office vulnerability testing phase ncph used word document vulnerabilities switched excel later powerpoint vulnerabilities result activity ncph group siphoned thousands millions unclassified us government documents back china
[ 3455 ]
Test
11,512
1
Archives_Hub:archives hub archives hub jisc service freely available provides cross-search descriptions archives held across uk 320 institutions including universities colleges specialist repositories charities businesses institutions includes 1,000,000 descriptions archive materials manner subjects represents 30,000 archive collections also describes content available topic based websites often created result digitisation projects hub hold archives rather maintains finding aids help researchers locate archives enabling search across descriptions description provides direct email link contact details repository holds archive enables researchers search filter various criteria including keyword title creator person organisation subject date order bring together archives held country relate topic includes images links digital content enables filtering digital non-digital content descriptions navigated via table contents 'search within function contributors provide new updated descriptions regularly service constantly updated descriptions archives newly catalogued made available research archives hub supporting information researchers including introductory guide publishes monthly features created contributors manner subjects people organisations showcase variety archival content described archives hub ethos based open access ‘ making data work harder ’ hub recently developed 'micro sites repository interfaces available higher education institutions wanting search application descriptions stored hub also provides data archives portal europe descriptions hub standards-based using isad g international archival standard standards data languages dates index terms standards takes provides ead encoded archival description xml archives site provides information archivists cataloguers online discovery data creation use standards metadata protocols interoperability facilitate cross-searching
[ 2948 ]
Validation
11,513
2
Star_Trek_project:star trek project star trek code name given secret prototype project running port mac os 7 applications intel-compatible x86 personal computers project starting february 1992 conceived collaboration apple computer provided majority engineers novell time one leaders cross-platform file-servers plan novell would market resulting os challenge microsoft windows project discontinued 1993 never released although components reused projects project named star trek science fiction franchise slogan boldly go mac gone impetus creation star trek project began novell desire increase competition monopoly microsoft dos-based windows products microsoft eventually convicted many years later illegal monopoly status novell called microsoft presence predatory us department justice called exclusionary unlawful novell first idea extend desktop presence graphical computing environment adapt digital research gem desktop environment novell legal department rejected due apprehension possible legal response apple company went directly apple shared concerns anti-competitive marketplace intel ceo andy grove supported two companies launching joint project star trek february 14 1992 valentine day apple set deadline october 31 1992 halloween day promising engineering team members performance bonus large cash award vacation cancun mexico project team member fred monroe later reflected worked like dogs fun ’ working achieving deadline goal receiving bonuses developers eventually reached point could boot intel 486 pc specific hardware system 7.1 on-screen appearance indistinguishable mac however every program would need ported new x86 architecture run supposed programs could ported little effort apple developed equivalent headers x86 tagline project boldly go mac gone computerworld mocked comment os boldly goes everyone else however project canceled mid-1993 political infighting personnel issues questionable marketability project apple side project seen exit supportive ceo john sculley favor new ceo michael spindler spindler interested project instead reallocating software engineering resources toward company total migration competing powerpc architecture macintosh operating system launched natively intel hardware official transition mac os x 2006 star trek designed hybrid apple macintosh operating system made run operating system gui shell application upon novell next in-development version dr dos operating system designed user could think standalone application platform general computing environment concept similar microsoft competing windows 3.1x running top dos radical tedious departure technologically culturally time mac os ever officially run apple computers based motorola 68000 architecture system built successor digital research dr dos 6.0 bdos level 6.7 7.1 netware palmdos 1.0 code named merlin bdos level 7.0 novell dr dos panther fully pc dos compatible 16-bit disk operating system genuinely dos compatible internal data structures bootstrapping media access device drivers file system support system would utilize dr dos new vladivar extended dos component flat memory support development since 1991 vladivar codice_1 aka codice_2 codice_3 dynamically loadable 32-bit protected mode system core advanced memory management hardware virtualization scheduling domain management pre-emptive multithreading within applications well multitasking independent applications running different virtual dos machines comparable windows 386 enhanced mode without gui thereby previously loaded dos environment including device drivers became part system domain multitasker unless specific protected mode virtual device drivers loaded hardware access got tunneled 16-bit sub-system default maximum speed minimum resource footprint dr dos bios bdos kernel device drivers memory managers multitasker written pure x86 assembly language apple port system 7.1 would run top high-performance yet light-weight hybrid 32-bit/16-bit protected mode multitasking environment graphical system shell user space macintosh resource forks long filenames mapped onto fat12 fat16 file systems though joint effort canceled novell published long-awaited dr dos 7.0 novell dos 7 bdos 7.2 1994 besides many additions areas advanced memory disk management networking novell dos 7 provided novell underlying stdos components dr dos panther vladivar projects except graphical star trek component jointly developed apple novell instead taskmgr provided text mode interface underlying multitasker emm386 system also provided api allow third-party guis take control microsoft windows viewmax 2 3 pc/geos newdeal known utilize interface run novell dos 7 successors opendos 7.01 dr-dos 7.02 higher star trek would yet another one fact additional hooks implemented specifically star trek gui frame buffer access hooks never stripped emm386 left undocumented apple reused platform abstraction technology developed star trek incorporating concurrently developed—and consider competing—migration powerpc architecture abstraction technology included capability loading mac os rom data file instead rom chip former star trek team members fred monroe fred huxham formed company fredlabs inc january 1997 company released virtualmac mac os application compatibility virtual machine beos apple first quickly aborted concept porting flagship operating system intel systems 1985 following exit steve jobs apple reattempt effort star trek n't launch product 2006 apple actually shipped products based upon concept hybridizing mac os 7 shell application platform accomplished form codice_4 process hybridized applications launched atop unix-based a/ux system also accomplished form macintosh application environment mae functional equivalent star trek plus embedded 68k emulator case system 7 power macintosh running application solaris hp/ux apple also delivered dos compatible models macs hybridized mac concurrently functional intel coprocessor card inside mac os 7 later always dos filesystem compatibility although direct x86 port classic mac os never released public determined users could make apple retail os run upon non-mac computers emulation development emulation environments said inspired initiative shown star trek project two popular 68k macintosh emulators vmac basilisk ii powerpc macintosh emulator sheepshaver written third parties ten years project star trek became possible natively run darwin unix-based core mac os x x86 platform virtue nextstep foundation port widely available darwin open source apple public source license however mac os x graphical user interface named aqua proprietary included darwin depended window managers running x11 graphical interfaces thus commercial mac os applications run natively darwin alone apple ran similar project star trek mac os x called marklar later referred steve jobs secret double life publicly power pc-only mac os project retain openstep x86 port keeping mac os x supporting applications including ilife xcode running x86 architecture well powerpc marklar publicly revealed apple ceo steve jobs june 2005 announced macintosh transition intel processors starting 2006 comparing contrasting apple efforts ibm long since attempted different strategy provide essential goal innovating new software platform upon commodity hardware nondestructively preserving existing legacy installations ms-dos heritage however strategy based upon os/2 operating system long since achieved seamless backward compatibility ms-dos applications 1992 roughly coinciding timeframe star trek project ibm devised new fundamentally integral subsystem backward compatibility windows 3.0 windows 3.1 applications new subsystem os/2 called win-os/2 integrated beginning os/2 2.0 although conceived different legacy business requirements cultures win-os/2 designed similar software engineering objectives virtualization techniques star trek coincidentally ibm also code-named os/2 releases star trek themes would eventually make references integral os/2 public brand beginning os/2 warp apple ibm attempted several proprietary cross-platform collaborations including unreleased port quicktime os/2 significant traction opendoc software framework aim alliance kaleida labs taligent companies utilized actual personnel star trek television movie franchise promotional purposes corporation formerly known ardi developed product called executor run compatible selection 68k macintosh applications hosted upon either dos linux operating systems intel cpu executor cleanroom reimplementation macintosh toolbox versions 6 7 operating system integrated 68k cpu emulator called syn68k liken andataco sun hp workstations emulates macintosh hardware environment including 68k cpu upon user must install system 6.0.7 quorum software systems made two apps targeting unix workstations equal provides binary compatibility emulating mac apis 68k cpu put precertified mac app x window sun sgi workstations latitude provides source code porting layer display postscript driver
[ 10755, 9732, 2058, 1042, 4114, 9762, 7204, 6186, 8754, 10804, 9784, 8767, 576, 8774, 1623, 9308, 3167, 3681, 5220, 7269, 8303, 2672, 9329, 4727, 9337, 6778, 9340, 3197, 2179, 7307, 6797, 3216, 2201, 11430, 2729, 3241, 7849, 3248, 178, 379...
Test
11,514
4
Security_Protocols_Open_Repository:security protocols open repository spore security protocols open repository online library security protocols comments links papers protocol downloadable variety formats including rules use automatic protocol verification tools protocols described using ban logic style used clark jacob goals database includes details formal proofs known attacks references comments analysis papers large number protocols listed including many shown insecure continuation seminal work john clark jeremy jacob seek contributions new protocols links comments
[ 8674, 2580 ]
Test
11,515
7
Flow_(software):flow software computing flow middleware software allows data-integration specialists connect disparate systems whether on-premises hosted cloud transforming restructuring data required environments flow functionality utilised data integration projects edi data-conversion activities developed flow software ltd new zealand flow available variety partner companies directly flow software new zealand australia integration software allows organisations continue using existing applications overcoming need customize upgrade requirements change using integration software many businesses benefit reduced dependence manual keying data avoidance costs delays caused keying errors flow enables data management flow accesses generates data structured formats files databases flow access read write databases using either sql89 sql92 specification informix provides support extended sql use flow access read write various file types visual mapping engine used configure data transformation data sets data restructured transformed thus allowing dissimilar data structures source destination flow data access operates independently mapping layer applied mapping logic uses events containing object pascal code flow transports generated data files using following formats flow user interface allows users create processes activate processes view activity logs email notifications flow process activity also configured flow uses predefined processing events executed either schedule event driven actions results logged available via user interface actions include flow includes report writer based software report builder report writer create custom notification reports providing users details related transactions reports created xml pdf jpeg xls reports embedded email messages required
[ 6850, 4194, 7364, 7523, 10340, 7022, 9263, 9909, 10486, 11030, 3096, 8122, 10236, 4797, 479 ]
Test
11,516
9
Unparser:unparser computing unparser system constructs set characters image components given parse tree unparser effect reverse traditional parser takes set string characters produces parse tree unparsing generally involves application specific set rules parse tree tree walk takes place given tree may involve textual graphic elements unparser may two separate modules handles relevant components cases master unparser looks master unparse table determine given nested structure handled one module
[ 2440, 5399 ]
Test
11,517
2
Cray_Time_Sharing_System:cray time sharing system cray time sharing system also known cray user community ctss developed operating system cray-1 cray x-mp line supercomputers ctss developed los alamos scientific laboratory lasl lanl conjunction lawrence livermore laboratory lll llnl ctss popular cray sites united states department energy doe used several cray sites san diego supercomputing center predecessor ctss livermore time sharing system ltss ran control data cdc 7600 line supercomputers first compiler known lrltran lawrence radiation laboratory fortran fortran-66 language dynamic memory features cray version including automatic vectorization known cvc pronounced civic like honda car period cray vector compiler controversy existed lasl first attempt develop operating system cray-1 named deimos message-passing unix-like operating system forrest basket deimos initial teething problems common performance early operating systems left bad taste unix-like systems national laboratories manufacturer cray research inc. hardware went develop batch oriented operating system cos cray operating system vectorizing fortran compiler named cft cray fortran written cray assembly language cal ctss misfortune certain constants structures lacking certain networking facilities tcp/ip optimized cray-1 architecture-dependent without extensive rework larger memory supercomputers like cray-2 cray y-mp came use ctss final breaths running cray instruction-set-compatible hardware developed scientific computer systems scs-40 scs-30 supertek s-1 save software ctss embodied certain unique ideas market-driven priorities working/running processes attempt succeed ctss started llnl named nltss new livermore time sharing system embody advanced concepts operating systems better integrate communication using new network protocol named lincs also keeping best features ctss nltss followed development fate many operating systems briefly ran period cray hardware late 1980s user-level ctss overview 1982 provides chapter 2 brief list ctss features references likely found proceedings cray user group cug acm sosp symp operating systems proceedings however owing fact lanl llnl nuclear weapons facilities aspects security likely doom finding greater detail many pieces software
[ 11205, 1031, 1480, 7432, 7497, 7983, 6675, 5397, 2135, 2303 ]
Test
11,518
3
Finders_Keepers_(1985_video_game):finders keepers 1985 video game finders keepers computer game written david jones first game magic knight series published mastertronic label zx spectrum amstrad cpc msx commodore 64 commodore 16 1985 published united kingdom budget price £1.99 zx spectrum sold 117,000 copies across 8-bit formats 330,000 copies making mastertronic second best-selling original game bmx racers magic knight sent castle spriteland king ibsisima order find special present princess germintrude magic knight successful quest may proved worthy joining famous polygon table reference mythical round table legends king arthur gameplay finders keepers markedly different magic knight games essentially graphic adventures platform elements finders keepers basically platform game maze sections hero starts king throne room transported via teleporter castle castle made two types playing area flick-screen rooms manner platform game two large scrolling mazes zx spectrum amstrad cpc msx cold upper maze slimey lower maze commodore 64 consist castle gardens castle dungeons additional part gameplay ability collect objects found rooms mazes scattered around castle sell money objects combine react create object higher value example 'bar lead 'philosophers stone react create 'bar gold amount money magic knight carrying market value inventory displayed on-screen buying selling objects done various traders live castle castle spriteland full dangerous creatures inhabit many rooms well mazes collision saps magic knight strength loses strength loses one four lives zzap 64 impressed game described little masterpiece another quality product mastertronic given 90 overall rating finders keepers followed-up three magic knight games spellbound published 1985 knight tyme published 1986 stormbringer published 1987
[ 10931, 5828, 9006, 8823 ]
Test
11,519
2
Task_View:task view task view task switcher virtual desktop system introduced windows 10 among first features new windows 10 task view allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops clicking task view button taskbar swiping left side screen displays open windows allows users switch switch multiple workspaces first previewed september 30 2014 windows 10 press event downtown san francisco similar effects used operating systems windows 3.0 first introduced window switcher 1990 using users could see flattened view open windows every version windows since also provided window switching functionality windows vista windows 7 provide additional feature called windows flip 3d broadly similar purpose flip 3d allows user flip open windows 3d perspective downside method front window covers significant portion windows unlike mission control macos hand allows user see contents front window difficult mission control especially user large number windows open vista desktop window manager exposes public api allows application access thumbnail representations flip3d uses number third party add-ons able provide mission control-like functionality vista third party applications emcee desktop organizer provide mission control like organization similar windows visual stacks support windows 8 immersive apps microsoft intellipoint software microsoft mice feature similar mission control also works live images windows rather static representations additionally several freeware windows applications exist emulate functionality mission control compiz kwin compositing window managers systems using x window system include plugins similar mission control scale plugin compiz present windows effect kwin skippy also performs similar functions mission control starting version 3.0 gnome desktop environment gained new mode called overview used launch applications manage workspaces mode windows scaled arranged mission control-like fashion quick switching chrome os window overview mode shows thumbnail open windows available pressing 'window switcher key swiping 3 fingers trackpad windows overview mode closed clicking associated close button selected clicking window thumbnail also closes overview mode brings selected window foreground classic legacy macintosh systems free finder workspaces offers functionality similar spaces mission control macos allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops activated f3 key f9 older keyboards apple magic mouse multi-touch trackpads activated pulling trackpad three four fingers mission control redesigned feature extensively show running desktops
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 8296, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9...
Test
11,520
4
OpenCA:openca openca officially openca pki research labs formerly openca project pki collaborative effort develop robust full-featured open-source out-of-the-box certification authority implementing used protocols full-strength cryptography openca based many open-source projects among openldap openssl apache projects project development divided 2 main tasks studying refining security scheme guarantees best model used certificate authority developing software easily set manage ca software development side project divided following sub-projects problem public key infrastructures pkis applications secured certificates keys difficult sometimes expensive set pkis flexible trustcenter software expensive openca started 1999 first idea consisted three major parts perl web interface openssl backend cryptographic operation database simple concept still developers motto today nearly operations performed via web interface six preconfigured interfaces many created depending need cryptographic backend openssl way disadvantage openca aimed build organizational infrastructure pki openca databases store needed information users cryptographic objects like certificate signing requests csrs certificates certificate revocation requests crrs certificate revocation lists crls today openca supports following elements incomplete list give impression complex subject matter openca designed distributed infrastructure handle offline ca online ra using build whole hierarchy three levels openca small solution small medium research facilities goal support maximum flexibility big organizations like universities grids global companies
[ 517, 10831, 7983 ]
Test
11,521
2
Remote_Install_Mac_OS_X:remote install mac os x remote install mac os x remote installer use macbook air laptops network works run macintosh windows-based pc optical drive connecting network client macbook air lacking optical drive perform system software installs remote install mac os x released part mac os x 10.5.2 february 12 2008 starting march 2009 version mac mini also supports remote install allowing dvd drive replaced second hard drive launch mac os x lion apple omitted remote install workaround enable target disk mode
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 6797, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790...
Validation
11,522
3
Galaga:galaga development led shigeru yokoyama small team initial planning took two months finish originally developed namco galaxian arcade board instead shifted new system suggested namco research development division inspiration duel fighter mechanic taken film yokoyama seen prior development ship captured using large circular beam project became immensely popular around company namco president masaya nakamura even taking interest although early location tests proved unsuccessful galaga received critical acclaim widely regarded classic golden age arcade video games one greatest video games time critics applauded gameplay innovation addictive nature improvements made predecessor several home ports released multitude platforms including msx atari 7800 nintendo entertainment system alongside releases digital distribution platforms xbox live arcade galaga also included many namco compilations followed sequel 1984 gaplus galaga fixed shooter video game player mans lone starfighter bottom screen must prevent galaga forces destroying mankind objective stage defeat galaga aliens fly formation top sides screen similar galaxian aliens dive towards player shooting projectiles colliding either result life lost atop enemy formation four large aliens known “ boss galaga ” take two shots destroy aliens ability release tractor beam capture player ship returning top formation costing player life additional lives remain player opportunity shoot boss galaga holding captured ship shooting dives towards player result captured ship rescued join player ship transforming duel fighter additional firepower larger hitbox however destroying boss galaga captured ship formation instead fighter turn player diving towards ship shooting projectiles third stage every fourth thereafter “ challenging stage ” aliens fly pre-set formation without firing player shooting alien stages award player 10,000 point bonus enemies ability morph new enemy types different attack patterns one even taking form galaxian flagship stages indicated emblems located bottom-right screen enemies become aggressive game progresses increasing number projectiles diving faster rate galaga created japanese developer shigeru yokoyama long-time veteran namco worked many company earlier games namco first big hit arcades galaxian 1979 credited one first video games utilize rgb color graphics success lead namco produce large amount namco galaxian arcade boards order keep demand however early 1980s game becoming harder sell help clear inventory yokoyama tasked creating two new games could run namco galaxian board first king balloon 1980 fixed shooter cited first video game incorporate speech second game instead made newer hardware suggested namco research development division new arcade board named namco galaga used several future games including bosconian 1981 dig dug 1982 although yokoyama given explicit instructions make shooting game management expressed desire make game similar galaxian initial planning project took two months idea dual fighter stemmed yokoyama wanting create enemies different attack styles tractor beam emitted boss galaga inspired film yokoyama seen prior development character ship captured circling laser taking interest idea yokoyama decided incorporate game enemy could capture player ship beam ship would need rescued originally rescuing captured ship would award player extra life soon changed fight alongside player idea proved problem first due hardware limitations game could display limited number sprites resulting duel fighter unable shoot missiles workaround yokoyama made 16x16 sprite ship 16x16 sprite bullets reducing total sprite count two inspired intermissions pac-man 1980 bonus stages rally-x 1980 yokoyama decided add special bonus level game planning lead programmer tetsu ogawa informed software bug found game enemies would simply fly screen instead moving formation ogawa expressed interest incorporating idea game leading inclusion challenging stages.enemies originally flew one type pattern added increase replay value graphic designer hiroshi ono designed many game sprites including player ship boss galaga alien prior location testing team focused designing instruction card sheet paper showed game played text done planners actual design handled graphic artist card originally showed control layout basics game stripped early boring yokoyama suggested card instead show dual fighter mechanic means draw players team kept bringing designs namco president masaya nakamura continued reject ordered team simply make front team allowed set deadlines due namco then-laidback corporate structure feedback project given nakamura employees including pac-man creator toru iwatani despite game immense popularity around company early location tests failed meet expectations due players able get far game one coin thus generating low income although yokoyama stated game popularity could still generate income namco executives instructed team strengthen difficulty level galaga released japan september 1981 released north america midway games october year sega-galaga first home conversion galaga published sega sg-1000 1983 msx version followed year later 1984 conversion family computer released 1985 japan later released internationally bandai nintendo entertainment system subtitled demons death atari inc. published atari 7800 version one console thirteen launch games namco published game boy version japan 1995 bundled galaxian titled galaxian galaga nintendo published game outside japan arcade classic brand two mobile phone versions released confined japan first i-mode 2001 second ezweb 2006 original arcade version released xbox live arcade service 2006 featuring online leaderboards achievements nes release ported wii virtual console 2007 followed arcade version 2009 roku port published 2011 2013 nes version released 3ds wii u virtual console galaga one four games released arcade game series brand published xbox one playstation 4 pc 2016 galaga included namco compilations including namco museum vol 1 1995 namco museum 64 1996 namco museum 50th anniversary 2005 namco museum virtual arcade 2008 namco museum essentials 2009 namco museum megamix 2010 2010 wii game pac-man party 2011 nintendo 3ds version include galaga extra alongside arcade versions dig dug pac-man celebration game 30th anniversary 2011 high-definition remake released ios devices part galaga 30th collection also included remakes galaxian gaplus galaga '88 alongside xbox 360 playstation 3 sequel galaga legions ported nintendo 3ds 2011 part pac-man galaga dimensions original version also added ios namco arcade compilation 2012 nes release one 30 games included nes classic edition galaga met widespread critical acclaim upon release many applauding game addictive nature gameplay structure innovation improvements predecessor popular game golden age arcade video games arcade express selected honorable mention 1983 arcade awards allgame praised game strategy making stand amongst games type labeling gameplay perfectly balanced shooting action reviewing nes home version gamespy called galaga must play arcade freaks praising port accurate representation arcade version terms graphics sound effects gameplay ign also praised nes port element strategy within duel fighter mechanic addictive gameplay gamespot review xbox 360 digital release stated gameplay tricky ever praising inclusion online leaderboards faithful arcade conversion eurogamer agreed citing leaderboards add game addictiveness ports galaga received praise faithfulness arcade original nintendo life praised 3ds virtual console port nes version remaining accurate original stating aged surprisingly well worth revisiting games magazine praised improvements games space invaders galaxian commenting galaga still holds years later joystick magazine praised nes version accurate portrayal arcade original notably graphics gameplay structure famicom tsūshin commended game boy version faithful conversion alongside support super game boy peripheral electric playground stated near top game boy next purchase list publications expressed disappointment towards home releases lacking extra features gamespot disliked lack online multiplayer xbox 360 release well lack updated graphics setting saying port awfully bare bones compared xbla releases eurogamer expressed distaste towards xbox 360 port high price point well achievements insultingly easy obtain eurogamer also agreed gamespot lack online multiplayer galaga listed numerous publications among greatest video games time flux magazine ranked 57 top 100 video games 1995 game informer listed 23 top 200 games time 2010 next generation ranked 96 top 100 games time innovation shoot 'em games whole game informer labeled 19th greatest video game ever made 2001 calling best game fixed-shooter genre electronic gaming monthly listed 20 100 best games time 1997 top 100 games time 2001 28 greatest 200 videogames time 2006 gamefaqs users voted 15th greatest game ever made 2004 10th 2009 gamespy staff voted eighth best arcade game time 2011 ranked 93 ign top 100 games time addictive gameplay long-standing appeal killer list videogames listed 27 top 100 video games list well 4th collected arcade game 2nd popular website electronic gaming monthly listed ms. pac-man/galaga class 1981 second best arcade game time inclusion games shortly game release namco produced miniature galaga cabinets buses airplanes housed small 17-inch crt monitors 2000 namco released arcade cabinet celebrate game 20th anniversary bundled ms. pac-man titled ms. pac-man galaga class 1981 similar cabinet released 2005 also included original pac-man made celebrate latter 25th anniversary galaga also included pac-man ’ arcade party 2010 pac-man ’ pixel bash 2019 galaga made cameo appearances several films including wargames 1983 karate kid 1984 planes trains automobiles 1987 avengers 2012 pixels 2015 submarine named game appears throughout abc television series lost hallmark cards released galaga arcade cabinet ornament 2009 played sound effects game 2019 researchers north carolina state university named extinct species shark galagadon nordquistae due shark teeth baring resemblance aliens found game galaga also subject several high score-based tournaments — 2019 world record held armando gonzales score 9,525,700 points galaga used loading screen minigame playstation version tekken tie-in anime series space dandy ios remake space galaga released 2015 featuring characters starships space dandy intermixed galaga gameplay similar crossover game galaga tekken edition released year replacing enemies characters tekken franchise galaga -themed costume also available downloadable-content littlebigplanet 3 boss galaga appears item super smash bros. nintendo 3ds wii u followup super smash bros ultimate capture opponent carry screen ultimate also features remix galaga soundtrack animated television adaptation galaga chronicles confirmed development
[ 226, 3075, 1060, 4361, 2540, 9516, 9006, 10287, 1776, 10544, 10931, 8663, 4540, 3039 ]
Validation
11,523
8
Groovle:groovle groovle web search site offered customers ability customise home page underlying service provided google company owned operated entirely independently december 2009 google lost court case claimed groovle domain similar control passed zak muscovitch attorney groovle stated case people use google people appreciate google people love google ... think people appreciate little guy takes giant wins
[]
Test
11,524
2
Surface_Hub:surface hub surface hub brand interactive whiteboard developed marketed microsoft part microsoft surface family surface hub wall-mounted roller-stand-mounted device either 55-inch 140 cm 1080p 84-inch 210 cm 4k 120 hz touchscreen multi-touch multi-pen capabilities running windows 10 operating system devices targeted businesses use collaborating videoconferencing may 15 2018 microsoft announced second-generation surface hub 2 would released 2019 2012 microsoft acquired jeff han perceptive pixel previously developed large-screen multi-touch displays cnn magic wall microsoft indicated 2014 intended mass-produce devices part effort bring cost microsoft first announced surface hub windows 10 devices event january 21 2015 device use throughout majority keynote microsoft began taking surface hub pre-orders july 1 2015 55-inch model 84-inch model stating would begin shipping september 2015 however july 13 2015 announced microsoft surface blog pre-order demands greatly exceeded predictions shipments would delayed details regarding delays coming mid-august confirmed microsoft delayed shipment january 1 2016 december 2015 microsoft announced another delay would raising prices 2,000 though would honor price agreements pre-orders placed surface hub began shipping business customers march 25 2016 surface hub models use 4th-generation intel core haswell processors core i5 55-inch core i7 84-inch run 64-bit version windows 10 main differences two variants screen size resolution graphics adapters 55-inch model supports 1920 × 1080 full hd contains intel hd graphics 4600 controller integrated cpu more-expensive 84-inch model 3840 × 2160 4k resolution powered nvidia quadro k2200 discrete graphics adapter screen models high-definition display 120 hz refresh rate though intended use film tv screening screen capable achieving high levels brightness 424.38 cd/m reach minimum 1.58 cd/m screen touch sensor allows detect whether stylus used surface hub models wide-angle hd camera either side device cameras produce video 1080p 30 fps enabled four-element microphone array cameras sensors ambient light infrared presence allowing hub react light levels heat room e.g activating presentation program someone enters room used videoconferencing cameras intended automatically track person moving one side display according microsoft four-element microphone array detect whisper away pc magazine tests hub realistic estimation surface hub runs windows 10 team customized version windows 10 enterprise software product jt2go developed siemens allows users surface hub interact 3d model models displayed angle enlarged reduced real time application used windows 10 devices particularly useful surface hub skype business video conferencing included surface hub microsoft office applications also used including word powerpoint excel microsoft onenote allows users draw screen hub welcome screen three buttons – call whiteboard connect – corresponding promoted themes talking drawing sharing functions used individually simultaneously surface hub originally manufactured plant wilsonville oregon july 2017 however microsoft announced would moving production china closing plant following months resulting loss jobs 124 workers microsoft surface hub keyboard insufficient protection replay attacks attacker could control surface hub remotely certain scenarios
[ 259, 4356, 11524, 6150, 6797, 782, 1935, 9741, 10900, 3605, 11030, 3224, 11549, 7838, 7456, 929, 5666, 3875, 7970, 10658, 11559, 1832, 6441, 6827, 7215, 7983, 3890, 11060, 8757, 2237, 7359, 4289, 194, 582, 3527, 9033, 6476, 10957, 4816, 4...
Validation
11,525
2
Swaret:swaret swaret program slackware linux distribution resolves dependencies swaret stands slackware tool program created luc cottyn originally called autopkg however conflict another project name renamed swaret active maintainer swaret currently runs stux http //swaret.org
[ 2310, 10760, 2955, 7435, 7181, 7947, 9487, 2448, 10387, 788, 1813, 8213, 10900, 6680, 8476, 10149, 5670, 4775, 7847, 6828, 6446, 7983, 1842, 823, 2872, 6583, 3131, 5819, 10172, 190, 3649, 10817, 9671, 5067, 3918, 463, 3667, 6227, 4951, 63...
Test
11,526
4
Internet_Security_Awareness_Training:internet security awareness training internet security awareness training isat consists training members organization regarding protection various information assets organization organizations need comply government regulations i.e glba pci hipaa sarbox normally require formal isat employees usually twice year many small medium enterprises sme require isat regulatory compliance train employees prevent cyberheist internet security awareness training point time usually provided via online courses isat subset general security awareness training topics covered isat include internet security aware means understand people actively trying steal data stored within organization computers often focuses user names passwords criminal elements ultimately get access bank accounts high-value assets important protect assets organization stop happening according microsoft focus isat achieve immediate lasting change attitude employees towards internet security making clear security policies acceptable use policies vital survival organization rules restrict employee efficient work security awareness training employees one effective means reducing potential costly errors handling sensitive information protecting company information systems training conducted number means certain approaches effective others security awareness training ensure personnel solid understanding employer ’ security practices policies contrast uninformed employee susceptible malware phishing attacks forms social engineering substantial harm organization ’ systems place data risk key aspects awareness training program include following
[ 4448, 2737, 8881, 3125, 10232, 7515 ]
None
11,527
3
Exile_(1988_video_game_series):exile 1988 video game series exile series centers sadler syrian assassin main character game original computer versions notorious featuring various references religious historical figures modern political leaders iconography drugs time-traveling assassins although aspects considerably toned omitted later console games english versions rewriting historical religious organizations fictional groups first game series originally released nec pc-8801 july 1988 subsequently released msx2 nec pc-9801 august x1 turbo september gameplay included action-platform elements switching overhead perspective side-scrolling sections plot original xzr compared later assassin creed video game series soundtrack pc-8801 version composed yujiroh shinobu ogawa tenpei sato game centers sadler syrian assassin shia islamic sect journey kill caliph intro sequence briefly covers history middle east 622 ce first year islamic calendar including brief description hijra 1104 ce year sadler birth game starts baghdad sadler rescues rumi follows sadler persia babylon must defend euphrates river pollution oil magnate encounter assyrian queen semiramis babylonian goddess ishtar visit tower babel search unicorns heading alexandria becoming baptised jewish village searching ouroboros eventually sadler makes way back baghdad murders caliph revealed caliph father separated sadler kidnapped baby assassins game switches focus enters subplot mongol invasion sadler warped 20th century must assassinate russia general secretary america president ending game likely controversial ending telenet choose port original xzr decided bring series home consoles three years later opting remake sequel instead released december 17 1988 nec pc-8801 nec pc-9801 msx2 soundtrack pc-8801 version composed shinobu ogawa tenpei sato xzr ii depicts adventures sadler events previous game living time christian crusades sadler makes attempt unite world one god achieve world peace along way performs masonic ritual attempt revive mani slaughters many hindu buddhist deities sadler meets head knights templar hugues de payens helps search holimax holy artefact sadler travels several different countries including france rumi kidnapped india cambodia japan cambodian temple sadler resurrects manichaean prophet mani japan sadler rescues ninkan real life head japanese sex cult tachikawa-ryu afterwards sadler travels back time eden meets bacchus sadler also murders hiram abiff masonic figure defeating jubelum three ruffians sadler receives holimax first console installment series first released pc engine cd-rom² system march 29 1991 mega drive version released year december 6 versions game released north america following year genesis version published renovation products turbografx-cd version published working designs exile remake xzr ii rewrites story cutting one portion final act sadler time travels present day referenced ending original xzr removes character sufrawaldhi sadler fourth traveling companion genesis version removed scenes deemed inappropriate burning village instances naked women later areas working designs asked nec change names turbografx-cd version concerned religious drug-related elements hence christian crusaders became klispin crusaders given rules nec pretty sensitive subject direct references changed explained vic ireland worked closely game localization town crucified heretics burned alive left turbografx cd release removed genesis version final game series released japan super cd-rom² add-on september 22 1992 released north america july 31 1993 published working designs previous games featured heavy religious elements sadler striving defeat chaos solve mystery ancient tower game cover art featured photograph rarity north america game final boss handcrafted vic ireland commented saying exile 2 cover polarizing people love hate basically aping style diorama really popular advertise games japan ncs/masaya quite bit wanted bring us well chose exile 2 game try practical effects guy little models set ad done fx work movies like tremors since done work weta australia smoke time exposure give thickness glow ran ad egm gamepro ca n't remember sent us survey months later readers ad listed 'most remembered ad whole magazine think justified experiment tried vasteel results n't great used part one space scenes back cover jewel case protagonist series sadler voiced kaneto shiozawa japanese cd-rom version blake dorsey english young warrior village assassi excels swordsmanship martial arts companions include rumi voiced yūko minaguchi japanese rhonda gibson english female fellow warrior assassi skilled acrobatics espionage fakhyle voiced kōji yada japanese keith lack english elderly magician lends powers sadler kindhy voiced hirohiko kakegawa japanese unknown actor english silent giant unmatched superhuman strength xzr exile series action role-playing games consisting three types play modes hideout screens rpg screens action screens hideout screen consists menu player plan sadler next course actions viewing current companions belongings stats choosing next location visit game switches rpg mode player visits town consists overhead map player must explore order gather clues proceed story usually consists talking supporting characters fulfill tasks give order gain access new locations player also visit various types shops buy new equipment items player enters dungeon game switches side-scrolling action stage sadler must fight way enemies finding treasure chests along way achieving objective finding exit sadler fights primarily sword also use magic spells acquires ability like action rpgs sadler gains certain amount cash experience points every enemy kills addition hp hit points mp magic points two statistics represented screen ap attack power player offensive capabilities ac armor class player defensive capabilities determined sadler current level equipment one notable aspect original computer versions presence illicit drugs addition conventional items potions medical herbs sadler also uses narcotics hashish coca opiates lsd marijuana peyote heal increase attributes player ap ac statistics represented heart-rate graph computer versions green bars console version affected drugs sadlers uses overusing certain drugs would result side-effects including death exile console version xrz ii replaced illicit drugs fictionalized equivalents e.g opiates became heartpoisons lack negative side-effects original counterparts exile wicked phenomenon revamps several aspects previous games ditching hideout screens adding option switch sadler companions rumi kindi fakhyle action segments using unique abilities wicked phenomenon also brings back illicit narcotics missing original exile english version game using altered spellings names e.g cannabis became cananavis ap ac gauges longer present hud instead shows player health experience points cash player still use drugs temporarily enhance offensive defensive stats exile named one renovation top 10 games ign levi buchanan ign stated translation genesis edition pretty bad little effect breadth adventure game also featured positive light book 8-bit book – 1981 199x jerry ellis exile wicked phenomenon given decent review john huxley defunctgames.com wrote exile solid game successfully marries action role-playing said deep adventure ys ii also mentioned voiceovers terrific complaining graphics cutscenes little thin
[ 8355 ]
Validation
11,528
1
Qizx:qizx qizx proprietary xml database provides native storage xml data qizx initially developed xavier franc axyana purchased qualcomm 2013 qizx re-released qualcomm late 2014 amazon web services qizx database configured run embedded application hosted client-server environment software service hosted amazon web services client-server version supports database clustering load balancing data redundancy qizx bundled multi-platform gui client also accessed restful api includes embedded online documentation qizx includes bindings java python c c well native xpath xquery support qizx also provides number extensions xquery language updating documents accessing document metadata various tasks
[ 9828, 9863, 8554, 5612, 5677, 7983, 7248, 6775, 2045, 479 ]
None
11,529
0
Universal_Networking_Language:universal networking language universal networking language unl declarative formal language specifically designed represent semantic data extracted natural language texts used pivot language interlingual machine translation systems knowledge representation language information retrieval applications unl designed establish simple foundation representing central aspects information meaning machine- human-language-independent form language-independent formalism unl aims code store disseminate retrieve information independently original language expressed sense unl seeks provide tools overcoming language barrier systematic way first glance unl seems kind interlingua source texts converted translated target languages fact used purpose efficiently however real strength knowledge representation primary objective provide infrastructure handling knowledge already exists exist given language nevertheless important note present would foolish claim represent “ full ” meaning word sentence text language subtleties intention interpretation make “ full meaning ” however might conceive variable subjective systematic treatment thus unl avoids pitfalls trying represent “ full meaning ” sentences texts targeting instead “ core ” “ consensual ” meaning often attributed sense much subtlety poetry metaphor figurative language innuendo complex indirect communicative behaviors beyond current scope goals unl instead unl targets direct communicative behavior literal meaning tangible concrete basis human communication practical day-to-day settings unl approach information conveyed natural language represented sentence sentence hypergraph composed set directed binary labeled links referred relations nodes hypernodes universal words simply uws stand concepts uws also annotated attributes representing context information example english sentence ‘ sky blue ’ represented unl follows example sky icl natural world blue icl color represent individual concepts uws aoj attribute object directed binary semantic relation linking two uws def interrogative past exclamation entry attributes modifying uws uws intended represent universal concepts expressed english words natural language order humanly readable consist headword uw root constraint list uw suffix parentheses constraints used disambiguate general concept conveyed headword set uws organized unl ontology high-level concepts related lower-level ones relations icl kind iof instance equ equal relations intended represent semantic links words every existing language ontological icl iof referred logical thematic agt agent ins instrument tim time plc place etc. currently 46 relations unl specs jointly define unl syntax attributes represent information conveyed uws relations normally represent information concerning time past future etc reference def indef etc modality must etc focus topic focus etc within unl program process representing natural language sentences unl graphs called unlization process generating natural language sentences unl graphs called nlization unlization involves natural language analysis understanding intended carried semi-automatically i.e. humans computer aids nlization intended carried fully automatically unl programme started 1996 initiative institute advanced studies united nations university tokyo japan january 2001 united nations university set autonomous organization undl foundation responsible development management unl programme foundation non-profit international organisation independent identity united nations university although special links un inherited unu/ias mandate implementing unl programme fulfil mission programme already crossed important milestones overall architecture unl system developed set basic software tools necessary functioning tested improved vast amount linguistic resources various native languages already development well unl expression accumulated last years moreover technical infrastructure expanding resources already place thus facilitating participation many languages unl system growing number scientific papers academic dissertations unl published every year visible accomplishment far recognition patent co-operation treaty pct innovative character industrial applicability unl obtained may 2002 world intellectual property organisation wipo acquiring patents us patents 6,704,700 7,107,206 unl completely novel achievement within united nations
[ 416, 1890, 10, 523, 3085, 8688, 11056, 7164 ]
Test
11,530
1
SQream_DB:sqream db sqream db relational database management system rdbms uses graphics processing units gpus nvidia sqream db designed big data analytics using structured query language sql sqream db first product sqream technologies ltd founded 2010 ami gal kostya varakin tel aviv israel sqream db first released 2014 partnership orange s.a. silicon valley company claimed orange s.a. saved 6 million using sqream 2014 sqream db aimed budget multi-terabyte analytics market due modest hardware requirements use compression sqream db also basis product named genomestack querying many dna sequences simultaneously us 7.4m investment venture capital announced june 2015 example general-purpose computing graphics processing units competitors omnisci kinetica company applied patents encompassing parallel execution queries multi-core processors speeding parallel execution vector processors february 2018 sqream technologies partnered alibaba group alibaba cloud deliver gpu database solution alibaba cloud column-oriented database sqream db designed manage large fast-growing volumes data compute-intensive queries product claims improve query performance large datasets traditional relational database systems sqream db designed run premise cloud
[ 8514, 3, 3876, 10658, 823, 10286, 5295, 7983, 10413, 10675, 10389, 7767 ]
Validation
11,531
0
Generative_lexicon:generative lexicon generative lexicon gl theory linguistic semantics focuses distributed nature compositionality natural language first major work outlining framework james pustejovsky generative lexicon 1991 subsequent important developments presented pustejovsky boguraev 1993 bouillon 1997 busa 1996 first unified treatment gl given pustejovsky 1995 unlike purely verb-based approaches compositionality generative lexicon attempts spread semantic load across constituents utterance central philosophical perspective gl two major lines inquiry 1 able deploy finite number words language unbounded number contexts 2 lexical information representations used composing meanings separable commonsense knowledge gl initially developed theoretical framework encoding selectional knowledge natural language turn required making changes formal rules representation composition perhaps controversial aspect gl manner lexically encoded knowledge exploited construction interpretations linguistic utterances computational resources available lexical item within theory consist following four levels qualia structure inspired moravcsik 1975 interpretation aitia aristotle defined pustejovsky modes explanation associated word phrase language defined follows
[ 8099 ]
Validation
11,532
5
Network_Voice_Protocol:network voice protocol network voice protocol nvp pioneering computer network protocol transporting human speech packetized communications networks early example voice internet protocol technology nvp first implemented december 1973 computer networking researcher danny cohen information sciences institute isi university southern california funding arpa network secure communications nsc program project stated goals develop demonstrate feasibility secure high-quality low-bandwidth real-time full-duplex two-way digital voice communications packet-switched computer communications networks ... supply digitized speech secured existing encryption devices major goal research demonstrate digital high-quality low-bandwidth secure voice handling capability part general military requirement worldwide secure voice communication nvp used send speech distributed sites arpanet using several different voice-encoding techniques including linear predictive coding lpc continuously variable slope delta modulation cvsd cooperating researchers included steve casner randy cole paul raveling isi jim forgie lincoln laboratory mike mccammon culler-harrison john markel speech communications research laboratory john makhoul bolt beranek newman protocol consisted two distinct parts control protocols data transport protocol control protocols included relatively rudimentary telephony features indicating wants talk ring tones negotiation voice encoding call termination data messages contained encoded speech encoding scheme vocoder frame defined packet containing negotiated transmission interval number digitized voice samples nvp used experimental voice funnel equipment circa february 1981 based bbn butterfly computers part ongoing arpa research packetized audio arpa staff contractors used voice funnel related video facilities three-way four-way video conferencing among handful us east west coast sites nvp transported internet stream protocol st later version called stream protocol version 2 st-ii connection-oriented versions internet protocol ip carried ip protocol version 5 protocols may viewed early experiments quality service connection-oriented network protocols asynchronous transfer mode atm
[ 5472 ]
Test
11,533
4
Fault_(technology):fault technology document iso 10303-226 fault defined abnormal condition defect component equipment sub-system level may lead failure telecommunications according federal standard 1037c united states term fault following meanings random fault fault occurs result wear deterioration whereas time particular occurrence fault determined rate faults occur within equipment population average predicted accuracy manufacturers often accept random faults risk chances virtually negligible fault happen virtually object appliance common electronics machinery example xbox 360 console deteriorate time due dust buildup fans cause xbox overheat cause error shut console systematic faults often result error specification equipment therefore affect examples type faults remain undetected years conditions conduce create failure given circumstances every example equipment would fail identically time failures hardware caused random faults systematic faults failures software always systematic
[ 8233, 5452, 6482, 6392, 1694 ]
None
11,534
4
Waste_Electrical_and_Electronic_Equipment_Directive:waste electrical electronic equipment directive waste electrical electronic equipment directive weee directive european community directive 2012/19/eu waste electrical electronic equipment weee together rohs directive 2011/65/eu became european law february 2003 weee directive set collection recycling recovery targets types electrical goods minimum rate 4 kilograms per head population per annum recovered recycling 2009 rohs directive set restrictions upon european manufacturers material content new electronic equipment placed market symbol adopted european council represent waste electrical electronic equipment comprises crossed-out wheelie bin without single black line underneath symbol black line indicates goods placed market 2005 directive came force goods without black line manufactured 2002 2005 instances treated historic weee fall outside reimbursement via producer compliance schemes directive undergone number minor revisions since inception 2002 directive 2002/96/ec european parliament council 27 january 2003 include updates 2006 2009 nine years directive seen failing achieve goals hence legislation amended 20 december 2011 european parliament european council agreed amendments directive subject second-reading vote taken 19 january 2012 changes affect method calculating collection rates previously four kg per inhabitant per year provide transitional period seven years introduce revised method calculation present method retained first four years time amended directive comes force next three years commencing fifth year amendment calculation collection rates revised 45 weight e e products entering market seven years transitional period eu member states individually select actual collection options wish use overall aim eu recycle least 85 electrical electronics waste equipment 2016 directive imposes responsibility disposal waste electrical electronic equipment manufacturers distributors equipment requires companies establish infrastructure collecting weee way users electrical electronic equipment private households possibility returning weee least free charge directive saw formation national producer compliance schemes manufacturers distributors paid annual fee collection recycling associated waste electronics household waste recycling centres weee directive obliged twenty-five eu member states transpose provisions national law 13 august 2004 cyprus met deadline 13 august 2005 one year deadline member states except uk transposed least framework regulations weee directive transposed uk law 2006 active following year directive places weee numerous categories first tier historic non-historic historic weee implies equipment placed market prior 2005 weee directive places onus upon owner equipment make provisions recycling equipment placed market 2005 known non-historic weee denoted bar underneath crossed-out wheeled bin symbol responsibility producer/distributor make provisions collection recycling weee directive sets total 10 categories weee reporting purposes prior implementation weee directive uk waste electronic electrical equipment disposed household municipal waste stream post introduction hazardous waste regulations exclusions apply electrical electronic equipment deemed hazardous hazardous wastes derived issued universal eu descriptor european waste catalogue known uk list wastes denotes wastes six digit number three sets two hazardous wastes denoted asterisk end number hazardous electronic wastes comprise weee delivered household waste recycling centres hwrc also known designated collection facilities dcfs collected delivered approved authorised treatment facilities aatfs waste electrical electronic equipment weighed categorised accordance directive post re-processing recycling total volumes category reported producer compliance scheme reprocessor reimbursed accordingly totals obligated weee aatfs collated environment agency quarterly basis reported eu historically problems implementation producer compliance schemes due double counting reporting reprocessed weee producer compliance schemes arose obligated weee partially treated first aatf receive waste prior passed onto second aatf treatment first second aatf would claim waste electronics resulting net debt wastes treated additional legislation applies management weee applied via waste hierarchy particular emphasis upon reduction waste arising re-use equipment recycling recovery materials reduce reuse recycle january 2012 proposals debated european parliament recast weee directive proposals included increasing recycling rates adopted member states re-drafted directive requires higher recovery rates 20 kg per capita per annum opposed previous figures 4 kg per capita april 2005 royal society arts uk conjunction canon unveiled 7 metre tall sculpture titled weee man london south bank made 3.3 tonnes electrical goods—the average amount electrical waste one uk individual creates lifetime designed paul bonomini fabricated stage one creative services giant figure subsequently moved eden project cornwall part uk tour
[ 6658, 1477, 3181, 9499, 3666, 2867, 403, 7579, 1500 ]
Train
11,535
6
Sector/Sphere:sector/sphere sector/sphere open source software suite high-performance distributed data storage processing broadly compared google gfs mapreduce technology sector distributed file system targeting data storage large number commodity computers sphere programming architecture framework supports in-storage parallel data processing data stored sector sector/sphere operates wide area network wan setting system created yunhong gu author udp-based data transfer protocol 2006 maintained group developers sector/sphere consists four components security server maintains system security policies user accounts ip access control list one master servers control operations overall system addition responding various user requests slave nodes store data files process upon request clients users computers system access data processing requests issued also sector/sphere written c++ claimed achieve architecture two four times better performance competitor hadoop written java statement supported aster data systems benchmark winning bandwidth challenge supercomputing conference 2006 2008 2009 sector user space file system relies local/native file system node storing uploaded files sector provides file system-level fault tolerance replication thus require hardware fault tolerance raid usually expensive sector split user files blocks instead user file stored intact local file system one slave nodes means sector file size limitation application specific advantages however sector file system simple leads better performance sphere parallel data processing due reduced data transfer nodes also allows uploaded data accessible outside sector system sector provides many unique features compared traditional file systems sector topology aware users define rules files located replicated system according network topology example data certain user located specific cluster replicated racks another example files replicas others rules applied per-file level topology awareness use udt data transfer protocol allows sector support high performance data io across geographically distributed locations file systems deployed within local area network reason sector often deployed content distribution network large datasets sector integrates data storage processing one system every storage node also used process data thus support massive in-storage parallel data processing see sphere sector application aware meaning provide data location information applications also allow applications specify data location whenever necessary simple example benefits sphere sector return results commands grep md5sum without reading data file system moreover compute results multiple files parallel sector client provides api application development allows user applications interact directly sector software also comes prepackaged set command-line tools accessing file system finally sector supports fuse interface presenting mountable file system accessible via standard command-line tools sphere parallel data processing engine integrated sector used process data stored sector parallel broadly compared mapreduce uses generic user defined functions udfs instead map reduce functions udf either map function reduce function even others sphere manipulate locality input data output data thus effectively support multiple input datasets combinative iterative operations even legacy application executable sector split user files sphere simply wrap many existing applications accepts files directories input without rewriting thus provide greater compatibility legacy applications
[ 609, 4194, 7816, 1801, 10377, 7983, 11343, 5047, 3795, 7155, 823 ]
Test
11,536
5
Aurora_(protocol):aurora protocol aurora protocol link layer communications protocol use point-to-point serial links developed xilinx intended use high-speed gigabits/second connections internally computer embedded system uses either 8b/10b encoding 64b/66b encoding
[ 10833, 7865 ]
Validation
11,537
4
Heap_spraying:heap spraying computer security heap spraying technique used exploits facilitate arbitrary code execution part source code exploit implements technique called heap spray general code sprays heap attempts put certain sequence bytes predetermined location memory target process allocate large blocks process heap fill bytes blocks right values heap spray actually exploit security issues used make vulnerability easier exploit heap spray used break security boundaries separate security issue needed exploiting security issues often hard various factors influence process chance alignments memory timing introduce lot randomness attacker point view heap spray used introduce large amount order compensate increase chances successful exploitation heap sprays take advantage fact architectures operating systems start location large heap allocations predictable consecutive allocations roughly sequential means sprayed heap roughly location every time heap spray run exploits often use specific bytes spray heap data stored heap serves multiple roles exploitation security issue application code often made read address arbitrary location memory address used code address function execute exploit force application read address sprayed heap control flow execution code uses address function pointer redirects sprayed heap exploit succeeds redirecting control flow sprayed heap bytes executed allowing exploit perform whatever actions attacker wants therefore bytes heap restricted represent valid addresses within heap spray holding valid instructions target architecture application crash therefore common spray single byte translates valid address nop nop-like instruction target architecture allows heap spray function large nop sled example 0x0c0c0c0c often used non-canonical nop heap sprays used occasionally exploits since least 2001 technique started see widespread use exploits web browsers summer 2005 release several exploits used technique wide range bugs internet explorer heap sprays used exploits similar showed versatility technique ease use without need major modifications exploits proved simple enough understand use allow novice hackers quickly write reliable exploits many types vulnerabilities web browsers web browser plug-ins many web browser exploits use heap spraying consist heap spray copy-pasted previous exploit combined small piece script html triggers vulnerability heap sprays web browsers commonly implemented javascript spray heap creating large strings common technique used start string one character concatenate way length string grow exponentially maximum length allowed scripting engine depending browser implements strings either ascii unicode characters used string heap spraying code makes copies long string shellcode stores array point enough memory sprayed ensure exploit works occasionally vbscript used internet explorer create strings using string function july 2009 exploits found using actionscript spray heap adobe flash though proven heap-spraying done means instance loading image files process seen widespread use august 2008 september 2012 new technique presented eusecwest 2012 two core researchers federico muttis anibal sacco showed heap sprayed high allocation granularity use technologies introduced html5 specifically used low-level bitmap interface offered canvas api web workers quickly
[ 5636, 3462, 3473, 8609, 3234, 10786, 11683, 7717, 2470, 2732, 7601, 5682, 5176, 3270, 4423, 4956, 8167, 10097, 2558 ]
Train
11,538
0
Question_answering:question answering question answering qa computer science discipline within fields information retrieval natural language processing nlp concerned building systems automatically answer questions posed humans natural language question answering implementation usually computer program may construct answers querying structured database knowledge information usually knowledge base commonly question answering systems pull answers unstructured collection natural language documents examples natural language document collections used question answering systems include question answering research attempts deal wide range question types including fact list definition hypothetical semantically constrained cross-lingual questions two early question answering systems baseball lunar baseball answered questions us baseball league period one year lunar turn answered questions geological analysis rocks returned apollo moon missions question answering systems effective chosen domains fact lunar demonstrated lunar science convention 1971 able answer 90 questions domain posed people untrained system restricted-domain question answering systems developed following years common feature systems core database knowledge system hand-written experts chosen domain language abilities baseball lunar used techniques similar eliza doctor first chatterbot programs shrdlu highly successful question-answering program developed terry winograd late 1960s early 1970s simulated operation robot toy world blocks world offered possibility asking robot questions state world strength system choice specific domain simple world rules physics easy encode computer program 1970s knowledge bases developed targeted narrower domains knowledge question answering systems developed interface expert systems produced repeatable valid responses questions within area knowledge expert systems closely resembled modern question answering systems except internal architecture expert systems rely heavily expert-constructed organized knowledge bases whereas many modern question answering systems rely statistical processing large unstructured natural language text corpus 1970s 1980s saw development comprehensive theories computational linguistics led development ambitious projects text comprehension question answering one example system unix consultant uc developed robert wilensky u.c berkeley late 1980s system answered questions pertaining unix operating system comprehensive hand-crafted knowledge base domain aimed phrasing answer accommodate various types users another project lilog text-understanding system operated domain tourism information german city systems developed uc lilog projects never went past stage simple demonstrations helped development theories computational linguistics reasoning recently specialized natural language question answering systems developed eagli health life scientists wolfram alpha online computational knowledge engine answers factual queries directly computing answer externally sourced curated data 2001 question answering systems typically included question classifier module determines type question type answer multiagent question-answering architecture proposed domain represented agent tries answer questions taking account specific knowledge meta–agent controls cooperation question answering agents chooses relevant answer question answering dependent good search corpus without documents containing answer little question answering system thus makes sense larger collection sizes generally lend well better question answering performance unless question domain orthogonal collection notion data redundancy massive collections web means nuggets information likely phrased many different ways differing contexts documents leading two benefits question answering systems rely heavily automated reasoning number question answering systems designed prolog logic programming language associated artificial intelligence information retrieval open domain question answering system aims returning answer response user question returned answer form short texts rather list relevant documents system uses combination techniques computational linguistics information retrieval knowledge representation finding answers system takes natural language question input rather set keywords example national day china sentence transformed query logical form input form natural language question makes system user-friendly harder implement various question types system identify correct one order give sensible answer assigning question type question crucial task entire answer extraction process relies finding correct question type hence correct answer type keyword extraction first step identifying input question type cases clear words indicate question type directly i.e many words tell system answers type person location number respectively example word indicates answer type date pos part-of-speech tagging syntactic parsing techniques also used determine answer type case subject chinese national day predicate adverbial modifier therefore answer type date unfortunately interrogative words like give clear answer types words represent one type situations like words question need considered first thing find words indicate meaning question lexical dictionary wordnet used understanding context question type identified information retrieval system used find set documents containing correct key words tagger np/verb group chunker used verify whether correct entities relations mentioned found documents questions named-entity recogniser used find relevant person location names retrieved documents relevant paragraphs selected ranking vector space model used strategy classifying candidate answers check answer correct type determined question type analysis stage inference technique also used validate candidate answers score given candidates according number question words contains close words candidate closer better answer translated compact meaningful representation parsing previous example expected output answer 1st oct. recently open source math-aware question answering system based ask platypus wikidata published system takes english hindi natural language question input returns mathematical formula retrieved wikidata succinct answer resulting formula translated computable form allowing user insert values variables names values variables common constants retrieved wikidata available claimed system outperforms commercial computational mathematical knowledge engine test set question answering systems extended recent years encompass additional domains knowledge example systems developed automatically answer temporal geospatial questions questions definition terminology biographical questions multilingual questions questions content audio images video current question answering research topics include ibm question answering system watson defeated two greatest jeopardy champions brad rutter ken jennings significant margin facebook research made drqa system available open source license system used open domain question answering using wikipedia knowledge source
[ 5122, 5639, 2440, 2059, 6798, 4624, 10231, 1044, 5399, 538, 7069, 416, 1443, 3748, 10541, 7599, 1072, 4531, 4662, 3127, 2488, 10557, 3902, 6208, 9796, 5830, 5319, 11467, 3533, 5197, 6223, 10452, 2901, 8538, 5857, 1890, 7780, 8421, 6374, 7...
Test
11,539
2
Virtual_memory:virtual memory computing virtual memory also virtual storage memory management technique provides idealized abstraction storage resources actually available given machine creates illusion users large main memory computer operating system using combination hardware software maps memory addresses used program called virtual addresses physical addresses computer memory main storage seen process task appears contiguous address space collection contiguous segments operating system manages virtual address spaces assignment real memory virtual memory address translation hardware cpu often referred memory management unit mmu automatically translates virtual addresses physical addresses software within operating system may extend capabilities provide virtual address space exceed capacity real memory thus reference memory physically present computer primary benefits virtual memory include freeing applications manage shared memory space increased security due memory isolation able conceptually use memory might physically available using technique paging virtual memory makes application programming easier hiding fragmentation physical memory delegating kernel burden managing memory hierarchy eliminating need program handle overlays explicitly process run dedicated address space obviating need relocate program code access memory relative addressing memory virtualization considered generalization concept virtual memory virtual memory integral part modern computer architecture implementations usually require hardware support typically form memory management unit built cpu necessary emulators virtual machines employ hardware support increase performance virtual memory implementations consequently older operating systems mainframes 1960s personal computers early mid-1980s e.g. dos generally virtual memory functionality though notable exceptions mainframes 1960s include operating system apple lisa example personal computer operating system 1980s features virtual memory 1960s early 70s computer memory expensive introduction virtual memory provided ability software systems large memory demands run computers less real memory savings provided strong incentive switch virtual memory systems additional capability providing virtual address spaces added another level security reliability thus making virtual memory even attractive market place modern operating systems support virtual memory also run process dedicated address space program thus appears sole access virtual memory however older operating systems os/vs1 os/vs2 svs even modern ones ibm single address space operating systems run processes single address space composed virtualized memory embedded systems special-purpose computer systems require fast and/or consistent response times may opt use virtual memory due decreased determinism virtual memory systems trigger unpredictable traps may produce unwanted unpredictable delays response input especially trap requires data read main memory secondary memory hardware translate virtual addresses physical addresses typically requires significant chip area implement chips used embedded systems include hardware another reason systems n't use virtual memory 1940s 1950s larger programs contain logic managing primary secondary storage overlaying virtual memory therefore introduced extend primary memory make extension easy possible programmers use allow multiprogramming multitasking many early systems divided memory multiple programs without virtual memory early models pdp-10 via registers concept virtual memory first developed german physicist fritz-rudolf güntsch technische universität berlin 1956 doctoral thesis logical design digital computer multiple asynchronous rotating drums automatic high speed memory operation described machine 6 100-word blocks primary core memory address space 1,000 100-word blocks hardware automatically moving blocks primary memory secondary drum memory paging first implemented university manchester way extend atlas computer working memory combining 16,384 words primary core memory additional 98,304 words secondary drum memory first atlas commissioned 1962 working prototypes paging developed 1959 1961 burroughs corporation independently released first commercial computer virtual memory b5000 segmentation rather paging virtual memory could implemented mainstream operating systems many problems addressed dynamic address translation required expensive difficult-to-build specialized hardware initial implementations slowed access memory slightly worries new system-wide algorithms utilizing secondary storage would less effective previously used application-specific algorithms 1969 debate virtual memory commercial computers ibm research team led david sayre showed virtual memory overlay system consistently worked better best manually controlled systems throughout 1970s ibm 370 series running virtual-storage based operating systems provided means business users migrate multiple older systems fewer powerful mainframes improved price/performance first minicomputer introduce virtual memory norwegian nord-1 1970s minicomputers implemented virtual memory notably vax models running vms virtual memory introduced x86 architecture protected mode intel 80286 processor segment swapping technique scaled poorly larger segment sizes intel 80386 introduced paging support underneath existing segmentation layer enabling page fault exception chain exceptions without double fault however loading segment descriptors expensive operation causing operating system designers rely strictly paging rather combination paging segmentation nearly current implementations virtual memory divide virtual address space pages blocks contiguous virtual memory addresses pages contemporary systems usually least 4 kilobytes size systems large virtual address ranges amounts real memory generally use larger page sizes page tables used translate virtual addresses seen application physical addresses used hardware process instructions hardware handles specific translation often known memory management unit entry page table holds flag indicating whether corresponding page real memory real memory page table entry contain real memory address page stored reference made page hardware page table entry page indicates currently real memory hardware raises page fault exception invoking paging supervisor component operating system systems one page table whole system separate page tables application segment tree page tables large segments combination one page table different applications running time use different parts single range virtual addresses multiple page segment tables multiple virtual address spaces concurrent applications separate page tables redirect different real addresses earlier systems smaller real memory sizes sds 940 used page registers instead page tables memory address translation part operating system creates manages page tables hardware raises page fault exception paging supervisor accesses secondary storage returns page virtual address resulted page fault updates page tables reflect physical location virtual address tells translation mechanism restart request physical memory already use paging supervisor must free page primary storage hold swapped-in page supervisor uses one variety page replacement algorithms least recently used determine page free operating systems memory areas pinned never swapped secondary storage terms used locked fixed wired pages example interrupt mechanisms rely array pointers handlers i/o completion page fault pages containing pointers code invoke pageable interrupt-handling would become far complex time-consuming particularly case page fault interruptions hence part page table structures pageable pages may pinned short periods time others may pinned long periods time still others may need permanently pinned example ibm operating systems system/370 successor systems term fixed pages may long-term fixed may short-term fixed may unfixed i.e. pageable system control structures often long-term fixed measured wall-clock time i.e. time measured seconds rather time measured fractions one second whereas i/o buffers usually short-term fixed usually measured significantly less wall-clock time possibly tens milliseconds indeed os special facility fast fixing short-term fixed data buffers fixing performed without resorting time-consuming supervisor call instruction multics used term wired openvms windows refer pages temporarily made nonpageable i/o buffers locked simply nonpageable never pageable os/vs1 similar oses parts systems memory managed virtual-real mode called v=r mode every virtual address corresponds real address mode used interrupt mechanisms paging supervisor page tables older systems application programs using non-standard i/o management example ibm z/os 3 modes virtual-virtual virtual-real virtual-fixed paging page stealing used problem called thrashing occur computer spends unsuitably large amount time transferring pages backing store hence slowing useful work task working set minimum set pages memory order make useful progress thrashing occurs insufficient memory available store working sets active programs adding real memory simplest response improving application design scheduling memory usage help another solution reduce number active tasks system reduces demand real memory swapping entire working set one processes systems burroughs b5500 use segmentation instead paging dividing virtual address spaces variable-length segments virtual address consists segment number offset within segment intel 80286 supports similar segmentation scheme option rarely used segmentation paging used together dividing segment pages systems memory structure multics ibm system/38 usually paging-predominant segmentation providing memory protection intel 80386 later ia-32 processors segments reside 32-bit linear paged address space segments moved space pages page main memory providing two levels virtual memory operating systems instead using paging early non-hardware-assisted x86 virtualization solutions combined paging segmentation x86 paging offers two protection domains whereas vmm guest os guest applications stack needs three difference paging segmentation systems memory division segmentation visible user processes part memory model semantics hence instead memory looks like single large space structured multiple spaces difference important consequences segment page variable length simple way lengthen address space segmentation provide single-level memory model differentiation process memory file system consists list segments files mapped process potential address space mechanisms provided calls mmap win32 mapviewoffile inter-file pointers work mapping files semi-arbitrary places multics file segment multi-segment file mapped segment address space files always mapped segment boundary file linkage section contain pointers attempt load pointer register make indirect reference causes trap unresolved pointer contains indication name segment pointer refers offset within segment handler trap maps segment address space puts segment number pointer changes tag field pointer longer causes trap returns code trap occurred re-executing instruction caused trap eliminates need linker completely works different processes map file different places private address spaces operating systems provide swapping entire address spaces addition whatever facilities paging segmentation occurs os writes pages segments currently real memory swap files swap-in os reads back data swap files automatically read back pages paged time swap operation ibm mvs os/vs2 release 2 z/os provides marking address space unswappable pin pages address space done duration job entering name eligible main program program properties table unswappable flag addition privileged code temporarily make address space unswappable using sysevent supervisor call instruction svc certain changes address space properties require os swap swap back using sysevent transwap
[ 6155, 2066, 4114, 25, 6180, 8231, 52, 2107, 2113, 4161, 6221, 8273, 4178, 86, 10333, 97, 6247, 2152, 6248, 6252, 8301, 2168, 8315, 2179, 8325, 8333, 10382, 6296, 2201, 8352, 8364, 2224, 178, 6329, 8379, 4286, 2241, 2243, 8388, 10436, 63...
Test
11,540
8
Sarvega:sarvega sarvega intel-owned company provided xml appliances intel purchase announced aug. 17th 2005 company brought intel software services group ssg global 1000 organizations using sarvega xpe switches include fujitsu health care supplier mt sinai hospital systems reactivity westbridge technology sarvega also trying establish security appliances product developing maintaining safety policy settings xml appliance
[]
Test
11,541
7
Prova:prova prova open source programming language combines prolog java prova rule-based scripting system used middleware language combines imperative declarative programming using prolog syntax allows calls java functions way strong java code base combined prolog features backtracking prova derived mandarax java-based inference system developed jens dietrich prova extends mandarax providing proper language syntax native syntax integration java agent messaging reaction rules development language supported grant provided within eu projects genestream biogrid project language used rule-based backbone distributed web applications biomedical data integration particular gopubmed system design goals prova prova aims provide support data integration tasks following important prova used key service integration engine xcalia product used computing efficient global execution plans across multiple data sources web services tp monitors transactions like cics ims messages mom like mq-series packaged applications jca connector legacy data sources mainframes jca connector remote ejb java objects considered data providers even local java objects prova allows deliver innovative software platform service-oriented architecture implementations
[ 9988, 8421, 8262, 8582, 4107, 5677, 11024, 9780, 8122, 479 ]
Test
11,542
4
Sumo_Logic:sumo logic sumo logic cloud-based machine data analytics company focusing security operations bi usecases provides log management analytics services leverage machine-generated big data deliver real-time insights headquartered redwood city california sumo logic founded april 2010 arcsight veterans kumar saurabh christian beedgen received funding accel partners dfj growth greylock partners institutional venture partners sequoia capital sapphire ventures sutter hill ventures angel investor shlomo kramer battery ventures tiger global management franklin templeton may 2019 company collected vc funding totaling 345 million sumo logic architecture features elastic petabyte scale platform collects manages analyzes enterprise log data reducing millions log lines operational security insights real time cloud-based approach overcomes inherent problems premises-based solutions including limits scalability inefficient haphazard analysis uncontrolled costs sumo logic built around globally distributed data retention architecture keeps log data available instant analysis eliminating need enterprise manage cost complexity data archiving backups restoration service entirely cloud-based maintenance free instead inelastic security information event management systems sumo logic employs elastic processing collect manage analyze log data regardless type volume location sumo logic modeled approach google according christian beedgen company cto one co-founders using advanced machine-learning algorithms whittle mountains log file data common groupings sumo logic platform mirrors google news categorization news stories distributed across web sumo logic able ease process administrators synthesize analyze data june 2012 sumo logic announced sumo logic free freemium full functionality edition analytical solution deployed amazon web services august 2012 company announced sumo logic vmware allows enterprises search visualize analyze vmware logs real time monitor detect events within vmware virtual environments 2016 sumo logic launched data analytics platform unifies logs metrics analyze structured metrics data unstructured log data real-time graphical interactive dashboards aws 2017 conference sumo logic presented machine data analytics service combines analytics docker kubernetes service streamlines data ingestion sumo logic machine data analytics service hosted amazon web services 2018 sumo logic announced expansion integrations google cloud platform releasing integrations gcp applications integration tensorflow september 2018 sumo logic announced addition cloud siem solution machine data analytics platform sumo logic works pokémon company provide analytics pokémon go including threats security vulnerabilities log aggregation security analytics april 2019 sumo logic launched bidirectional integration atlassian ’ opsgenie incident alert service integration gives users ability create analyze alerts incident data sumo logic remained stealth mode two years unveiled cloud-based log management platform series b funding 15 million january 2012 round series e funding announced june 2015 brings company total venture capital backing 160.5 million june 27 company closed series f round 75 million path ipo may 2019 sumo logic announced 110 million series g investment indicated valuation north billion dollars sumo logic founded 2010 technical leadership team expertise log management scalable systems big data security including ramin sayar formerly vmware sumo logic ceo since december 2014 previously vance loiselle formerly bladelogic ceo may 2012 december 2014 april 2012 sumo logic formed new advisory board bringing three silicon valley veterans dj patil greylock partners gerhard eschelbeck sophos nir zuk palo alto networks sumo logic service powered patent-pending elastic log processing logreduce push analytics technologies january 2012 rsa named sumo logic one top 10 finalists innovative company rsa april 2012 radar conference sumo logic received judge choice audience choice awards performance monitoring may 2012 sumo logic named red herring americas 2012 top 100 winner may 7 2014 sumo logic named cool vendor gartner application performance monitoring apm operations analytics itoa categories
[ 4194, 11429, 2558, 6153, 4234, 3661, 2765, 7248, 11611, 3125, 9055, 11577, 7802, 7899, 2910, 8446 ]
Test
11,543
4
Allway_Sync:allway sync allway sync backup file synchronization software allows backing synchronizing files different drives different media cd dvd flash zip remote server various versions users freeware version requested buy pro version use software commercial purpose synchronize 40,000 files 30-day period pro version exactly functionality free version
[ 9025, 7364, 5413, 3366, 1801, 10476, 1358, 6062, 7983, 2193, 11633, 4574 ]
Validation
11,544
4
Jack_Dunlap:jack dunlap jack edward dunlap november 14 1927 – july 23 1963 united states army sergeant stationed national security agency later became spy soviet union early 1960s army sergeant assigned nsa subject polygraph examination retired army soviet handlers told apply civilian position given polygraph examination nsa friday passed examination examiner told fbi something made uneasy told dunlap come back monday dunlap committed suicide weekend carbon monoxide poisoning director security nsa told fbi agents assistant paid visit dunlap widow offer condolences said probably want papers showing classified material nsa realized dunlap spy dunlap personable individual roamed around within nsa one secretary told fbi stopped desk chat would see papers box tell headed direction take papers would stop xerox machine way make copy soviets
[ 9856, 7887, 5183 ]
Validation
11,545
2
Nokia_E7-00:nokia e7-00 nokia e7-00 also known nokia e7 business-oriented qwerty smartphone nokia nokia eseries announced nokia world september 2010 together nokia c6-01 nokia c7 started shipping february 2011 second phone nokia n8 running symbian^3 operating system compared nokia n8 fixed mass storage 16gb without memory card slot fm transmitter less advanced camera extended depth field instead autofocus n8 e90 like nokia n8 comes hdmi-out connector non-user-replaceable battery smaller e90 keyboard spring mechanism nokia n97 mini like n8 anodized aluminium casing different bulkier heavier e90 compared nokia n97 mini e90 e7-00 multitouch capacitive touchscreen unlike n8 n97 mini e90 e7-00 active-matrix oled amoled clearblack technology slightly lower resolution e90 vlasta berka general manager nokia singapore malaysia brunei talked trend users using smartphones business parliament finland bought 200 e7s spring 2011 late april 2012 50 phones serviced warranty fixed os update e7 battery user-removable although unofficial online tutorials replace battery exist
[ 1537, 4609, 8577, 6276, 3205, 11271, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 4003, 4132, 6310, 167, 40, 1833, 3626, 5290, 10410, 9137, 10802, 7220, 821, 5175, 7866, 1083, 1216, 1728, 7617,...
Validation
11,546
2
Windows_Mixed_Reality:windows mixed reality windows mixed reality mixed reality platform introduced part windows 10 operating system provides holographic mixed reality experiences compatible head-mounted displays flagship device microsoft hololens announced windows 10 next chapter press event january 21 2015 provides mixed reality experience live presentation physical real-world elements incorporated virtual elements referred holograms microsoft perceived exist together shared environment variant windows augmented reality computers augment real-world physical environment virtual elements windows mixed reality features augmented-reality operating environment universal windows platform app run platform also used virtual reality headsets designed use windows 10 fall creators update built specifications implemented part windows mixed reality lack support holographic experiences premier device windows mixed reality microsoft hololens smart-glasses headset cordless self-contained windows 10 computer running windows 10 holographic uses various sensors high-definition stereoscopic 3d optical head-mounted display spatial sound allow augmented reality applications natural user interface user interacts gaze voice hand gestures codenamed project baraboo hololens development five years announcement 2015 conceived earlier original pitch made late 2007 would become kinect technology platform microsoft targeted hololens release windows 10 timeframe microsoft hololens development edition begin shipping march 30 2016 available application developers united states canada list price us 3000 although development edition considered consumer-ready hardware february 2016 microsoft set time frame consumer availability hololens hololens chief inventor alex kipman stating hololens consumer release market ready companies samsung electronics asus expressed interest working microsoft produce mixed-reality products based hololens intel made direct competitor called project alloy system called merged reality however cancelled september 22 2017 october 2016 hardware event microsoft announced multiple oems would release virtual reality headsets windows holographic platform based microsoft reference designs enabling room-scale virtual reality without external sensors components january 2017 prototypes presented consumer electronics show release later year microsoft later announced planned release development kits headsets game developers conference devices would supported windows 10 creators update game developers conference 2017 microsoft stated intended support windows mixed reality headsets xbox one 2018 specifically noting capabilities then-upcoming xbox one x hardware revision company later stated initially focusing pc platforms first wanted focus wireless vr solutions consoles october 2017 microsoft officially launched windows mixed reality lineup third-party headsets use windows 10 fall creators update including launch lineup headsets acer dell hp lenovo future products asus samsung officially referred windows mixed reality immersive headsets unlike hololens devices compatible virtual reality software underlying ecosystem referred windows mixed reality regardless experience immersive headsets feature integrated motion tracking eschewing standalone sensors contain cameras used track handheld motion controller accessories may bundled headset distributed optional accessories immersive headsets currently compatible mixed reality software obtained microsoft store universal apps software using steam virtual reality platform used htc vive ability run desktop software added windows 10 may 2019 update microsoft classifies minimum recommended system requirements windows mixed reality windows mixed reality pcs 60 fps windows mixed reality ultra pcs 90 fps minimum requirements specify intel core i5-7200u better laptops 8 gb ram intel hd graphics 620 better directx 12 support usb 3.0 hdmi displayport connections bluetooth 4.0 support controllers verge noted users wo n't need high-end gaming pc meet recommendations mixed reality portal universal windows platform app serves front-end windows mixed reality features 3d environment users explore customize application shortcuts virtual desktops feature originally launched one environment cliff house second skyloft added april 2018 update
[ 10243, 11270, 5643, 4624, 10769, 1043, 537, 540, 3102, 1055, 9762, 2083, 8227, 8740, 1577, 10281, 4143, 9263, 11316, 1077, 2101, 8246, 10812, 3648, 582, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 9812, 9813, 10839, 603, 9819, 2145, ...
Test
11,547
2
360_Web_Browser:360 web browser 360 web browser web browser created digital poke ios operating system launched october 2010 360 offers tabbed browsing downloading firefox sync themes file manager unrar/unzip capabilities major competitors 360 web browser safari google chrome atomic mercury
[ 4849, 5078, 7983 ]
Test
11,548
1
NIOSH_Power_Tools_Database:niosh power tools database niosh power tools database contains sound power levels sound pressure levels vibrations data variety common power tools tested researchers data collected unloaded loaded use power tools database created national institute occupational safety health niosh database created order provide information general public sound vibrations generated power tools use many tools produce sound levels high enough damage hearing precautions taken since information readily available cases niosh created power tools database ran tests power tools provide information according niosh power tools database particularly helpful determining 'real-world noise level power tools used job database part much larger hearing loss prevention research program conducted niosh hearing loss prevention research program designed reduce occupational hearing loss research application research real-world situations database advances goal informing buyers users power tools dangerous levels noise vibrations exposed using tools making people aware loud power tools actually niosh attempting encourage design production quieter power tools proper use hearing protectors using tools database also part larger niosh prevention initiative called buy quiet recent years buy quiet programs initiatives arisen effort combat occupational noise exposures programs promote purchase quieter tools equipment noise-induced hearing loss nihl increasingly common disorder often caused work-related activities construction manufacturing mining susceptible occupations nihl since many workers fields exposed high levels noise daily basis substantial part noise results use power tools produce dangerous levels noise although loudness power tools may quite apparent using actual level noise produced mostly unreported available easily online reference database provides detailed information noise levels appropriate action may taken protect workers information database originates testing done power tools niosh researchers testing conducted accordance iso 3744 ansi s12.15 calibration testing equipment performed tests begin tests conducted semi-anechoic chamber test setup includes ten-microphone array accelerometer case testing power tools unloaded condition tool suspended cables set operate full speed loaded condition tool used researcher perform task designed another researcher runs data acquisition programs data collected verified analyzed entered niosh power tools database currently niosh power tools database contains sound vibrations data 166 power tools including 11 different types tools 18 manufacturers testing additional power tools progress database updated reflect new data acquired database part niosh buy quiet efforts aimed helping companies buy less noisy equipment result less hearing loss online resources include practical guide noise meter showing length time exposure various everyday noises becomes hazardous employee training videos
[]
Test
11,549
2
Microsoft_HoloLens:microsoft hololens microsoft hololens known development project baraboo pair mixed reality smartglasses developed manufactured microsoft hololens first head-mounted display running windows mixed reality platform windows 10 computer operating system tracking technology used hololens trace lineage kinect add-on microsoft xbox gaming console introduced 2010 pre-production version hololens development edition shipped march 30 2016 targeted developers united states canada list price 3000 samsung asus extended offer microsoft help produce mixed-reality products collaboration microsoft based around concept hardware hololens october 12 2016 microsoft announced global expansion hololens publicized hololens would available preorder australia ireland france germany new zealand united kingdom also commercial suite similar pro edition windows enterprise features bitlocker security may 2017 suite sells 5,000 microsoft decided rent hololens without clients making full investment microsoft partner company called abcomrents give service hololens rental hololens 2 announced mobile world congress barcelona spain february 24 2019 available preorder 3500 hololens head-mounted display unit connected adjustable cushioned inner headband tilt hololens well forward backward wear unit user fits hololens head using adjustment wheel back headband secure around crown supporting distributing weight unit equally comfort tilting visor towards front eyes front unit houses many sensors related hardware including processors cameras projection lenses visor tinted enclosed visor piece pair transparent combiner lenses projected images displayed lower half hololens must calibrated interpupillary distance ipd accustomed vision user along bottom edges side located near user ears pair small red 3d audio speakers speakers competing typical sound systems obstruct external sounds allowing user hear virtual sounds along environment using head-related transfer functions hololens generates binaural audio simulate spatial effects meaning user virtually perceive locate sound though coming virtual pinpoint location top edge two pairs buttons display brightness buttons left ear volume buttons right ear adjacent buttons shaped differently—one concave one convex—so user distinguish touch end left arm power button row five small individual led nodes used indicate system status well power management indicating battery level setting power/standby mode usb 2.0 micro-b receptacle located along bottom edge 3.5 mm audio jack located along bottom edge right arm hololens features inertial measurement unit imu includes accelerometer gyroscope magnetometer four environment understanding sensors two side energy-efficient depth camera 120°×120° angle view 2.4-megapixel photographic video camera four-microphone array ambient light sensor addition intel cherry trail soc containing cpu gpu hololens features custom-made microsoft holographic processing unit hpu coprocessor manufactured specifically hololens microsoft soc hpu 1gb lpddr3 share 8mb sram soc also controlling 64gb emmc running windows 10 operating system hpu uses 28 custom dsps tensilica process integrate data sensors well handling tasks spatial mapping gesture recognition voice speech recognition according alex kipman hpu processes terabytes information one attendee estimated display field view demonstration units 30°×17.5° interview 2015 electronic entertainment expo june microsoft vice-president next-gen experiences kudo tsunoda indicated field view unlikely significantly different release current version hololens contains internal rechargeable battery average life rated 2–3 hours active use 2 weeks standby time hololens operated charging hololens features ieee 802.11ac wi-fi bluetooth 4.1 low energy le wireless connectivity headset uses bluetooth le pair included clicker thumb-sized finger-operating input device used interface scrolling selecting clicker features clickable surface selecting orientation sensor provides scrolling functions via tilting panning unit clicker features elastic finger loop holding device usb 2.0 micro-b receptacle charging internal battery 2016 number augmented-reality applications announced showcased microsoft hololens collection applications provided free developers purchasing microsoft hololens developer edition applications available launch include applications announced showcased hololens include developed collaboration jpl onsight integrates data curiosity rover 3d simulation martian environment scientists around world visualize interact collaborate together using hololens devices onsight used mission planning users able program rover activities looking target within simulation using gestures pull select menu commands jpl plans deploy onsight curiosity mission operations using control rover activities july 2015 hololens use hpu uses sensual natural interface commands—gaze gesture voice—sometimes referred ggv inputs gaze commands head-tracking allows user bring application focus whatever user perceiving elements —or virtual application button—are selected using air tap method similar clicking imaginary computer mouse tap held drag simulation move element well voice commands certain commands actions hololens shell carries adapts many elements windows desktop environment bloom gesture accessing shell performing similar function pressing windows key windows keyboard tablet xbox button xbox one controller performed opening one hand fingers spread palm facing windows dragged particular position well resized virtual elements windows menus pinned locations physical structures objects within environment carried fixed relation user following user move around title bars application windows title left buttons window management functions right april 2016 microsoft created microsoft hololens app windows 10 pc windows 10 mobile devices allows developers run apps use phone pc keyboard type text view live stream hololens user point view remotely capture mixed reality photos videos microsoft visual studio ide used develop applications 2d 3d hololens applications tested using hololens emulator included visual studio 2015 ide hololens development edition hololens run almost universal windows platform apps apps appear 2d projections windows 10 apis currently supported hololens cases app able run across windows 10 devices including hololens tools used develop applications windows pc windows phone used develop hololens app 3d applications holographic applications use windows holographic apis microsoft recommends unity engine vuforia create 3d apps hololens also possible developer build engine using directx windows apis
[ 259, 4356, 5380, 6150, 11524, 6797, 782, 1935, 5262, 6415, 10388, 3605, 10900, 11030, 3224, 9368, 11546, 7325, 7838, 7456, 929, 5666, 3875, 7970, 10658, 11559, 1832, 3881, 6441, 6827, 7215, 7983, 3890, 11060, 8757, 10557, 7359, 4289, 194, ...
Test
11,550
3
LOADALL:loadall loadall common name two different undocumented machine instructions intel 80286 intel 80386 processors allow access areas internal processor state normally outside ia-32 api scope like descriptor cache registers loadall 286 processors encoded 0fh 05h loadall 386 processors 0fh 07h variants – name implies – load cpu internal registers one operation loadall unique ability set visible part segment registers selector independently corresponding cached part allowing programmer bring cpu states otherwise allowed official programming model example usefulness techniques loadall set cpu allow access memory real mode without switch unreal mode requires switching protected mode accessing memory finally switching back real mode programs pre-xms versions ramdrive.sys 1985 smartdrv.sys 1986 well himem.sys 2.03 1988-08-04 2.04 1988-08-17 drivers ms-dos uniform software systems extender 1985 connector 1985 lotus 1-2-3 disk 1986 limulator software formerly tele-ware west aka los angeles securities group converted hard disk space extended memory expanded memory os/2 1.0 1.1 used 286 loadall instruction dos 3.3 4.0 reserved 102-byte buffer 0070:0100h normally occupied dos bios data need save restore loadall examination virtual-machine monitor code windows/386 2.10 shows uses 286 even less known 386 variant microsoft himem.sys version 2.06 also used loadall quickly copy extended memory 286 systems another interesting usage loadall laid book design os/2 would allow running former real-mode programs 16-bit protected mode utilized digital research concurrent dos 286 since 1985 well flexos 286 ibm 4680 os since 1986 marking descriptor caches gdt ldts present would allow operating system trap segment-register reloads well attempts performing real-mode–specific segment arithmetic emulate desired behavior updating segment descriptors loadall virtual 8086 mode 80286 however slow practical idea mostly discarded furthermore due errata early intel 80286 processors e-2 stepping result os/2 1.x – windows standard mode well – run dos programs real mode nevertheless idea lost led intel introduce virtual mode 80386 allowing implementation dos boxes last relatively efficient documented way loadall perform checks validity data loaded processor registers possible load processor state could normally entered using real mode pe=0 together paging pg=1 386-class cpus two loadall instructions never documented exist later processors opcodes reused amd64 architecture opcode 286 loadall instruction 0f05 became amd64 instruction syscall 386 loadall instruction 0f07 became sysret instruction definitions cemented even intel cpus introduction intel 64 implementation amd64 in-circuit emulator ice tool used low-level debugging intel 80386 asserting undocumented pin location b6 causes microprocessor halt execution enter ice mode microprocessor saves entire state area memory isolated normal system memory layout area suitable loadall instruction instruction used ice code return normal execution later processors evolved system management mode smm mode rsm instruction used load full cpu state memory area layout memory area similar one used loadall instruction 386-style loadall instruction executed 486 smm mode later processors rsm instruction different encoding took role opcode 0f05 instruction reads data addresses 00800–00866 whatever content segment registers 80286 loadall instruction used switch protected back real mode ca n't clear pe bit msw however use loadall instruction avoid need switch protected mode altogether opcode 0f07 instruction loads data address es edi actually uses es es descriptor
[ 5220, 5380, 6730, 8301, 9166, 3323, 7377, 8115, 9525, 5080, 2201, 1915, 6463 ]
Test
11,551
1
DUAL_table:dual table dual table special one-row one-column table present default oracle database installations oracle table single varchar2 1 column called dummy value x suitable use selecting pseudo column sysdate user oracle sql syntax requires clause queries n't require tables dual readily used cases charles weiss explains created dual created dual table underlying object oracle data dictionary never meant seen instead used inside view expected queried idea could join dual table create two rows result every one row table using group resulting join could summarized show amount storage data extent index extent name dual seemed apt process creating pair rows one beginning 10g release 1 oracle longer performs physical logical i/o dual table though table still exists dual readily available users database several databases including microsoft sql server mysql postgresql sqlite teradata enable one omit clause entirely table needed avoids need dummy table oracle equivalent “ dual ” table sqlserver
[ 6850, 7523, 9286, 5546, 9389, 7022, 10413, 10737, 11030, 8539, 4604, 1726 ]
Test
11,552
1
CUBRID:cubrid cubrid cube-rid open-source sql-based relational database management system rdbms object extensions developed naver corporation web applications name cubrid combination two words cube bridge cube standing sealed box provides security contents bridge standing data bridge cubrid separate license server engine interfaces server engine adopts gpl v2.0 later license allows distribution modification acquisition source code cubrid apis gui tools berkeley software distribution license obligation opening derivative works reason adopting two separate license systems provide complete freedom independent software vendors isv develop distribute cubrid-based applications feature distinguishes cubrid database relational database systems 3-tier client-server architecture consists database server connection broker application layer database server component cubrid database management system responsible storage operations statement execution cubrid database server instance mount use single database making inter-database queries impossible however one instance run machine unlike solutions database server compile queries executes queries precompiled custom access specification language cubrid connection broker main roles also local object pool enables parts execution deferred database server e.g tuple insertion deletion ddl statements thus lowering database server load since connection broker bound machine database server cubrid take advantage hardware resources several machines processing queries single database applications use one available apis connect cubrid connection broker cubrid high availability provides load-balanced fault-tolerant continuous service availability shared-nothing clustering fail-over fail-back automated mechanisms cubrid 3-tier architecture allows native support high-availability two-level auto failover broker failover server failover connecting broker via client api users specify connection url list alternative hosts brokers listening incoming requests case hardware network operating system software failure one hosts underlying client api automatically fails next host user provided high availability environment built 1 n master-slave server nodes slave node communicates master via cubrid heartbeat protocol master node unresponsive first slave nodes get promoted master role replication nodes achieved one three modes synchronous semi-synchronous asynchronous administrators specify list server hosts broker connect event failure master node another used cubrid provides built-in support database sharding sharding interface implemented special broker called cubrid shard communicating cubrid shard identical communicating normal broker client apis used features normal broker failover load balancing also apply cubrid shard storage implemented separate independent physical databases located separate cubrid server hosts shard fully configured high availability environment data distribution logic among shards lies cubrid shard determines shard use storage retrieval data based hash user defined algorithm cubrid supports online offline incremental backup connection broker configured four different modes read-write read-only slave-only preferred host read list alternative hosts user provided via connection url used method balance load load balancing used client api randomly choose host among specified connection url except one used connect last time chosen host available selection continue hosts determined unavailable case driver report error query execution plan cache implemented broker order skip compilation steps often used queries queries parametrized parsing two queries differ values literal constants share cache entry cubrid support b+-tree indexes single-column multi-column following types indexes created query optimizer use indexes produce faster execution plans using methods cubrid supports horizontal partitioning range hash value lists maximum 1024 partitions per table partitions accessed independently support operations valid normal table version 9.0 cubrid implements execution-time partition pruning cubrid implements large subset ansi standard extended features later sql standards custom features cubrid provides support window functions defined standard implemented functions row_number count min max sum avg stddev_pop stddev_samp var_pop var_samp rank dense_rank lead lag ntile hierarchical queries using non-standard start ... connect oracle syntax supported cubrid number specialized pseudocolumns operators provided controlling behavior query execution cubrid optimizes common scenario web applications database fields need incremented certain events e.g page views contrast usual approach using select/update statement combination cubrid increment fields within select statement execution bypassing expensive compiling execution locking overhead associated update statement stored procedure language supported cubrid java requiring java virtual machine installed system virtual machine started managed server used code execution stored procedure code requires database access must use jdbc driver either using parent transaction issuing new one addition like operator cubrid provides regexp operator regular expression pattern matching default operator case insensitive matching input string modifier binary used case sensitive scenarios optional alias regexp rlike currently cubrid support regexp unicode strings variety data types supported cubrid cubrid available microsoft windows linux distributions 32- 64-bit architectures partial support os x implemented cubrid comes built-in command-line interface named csql used execute sql statements cubrid server tool used one two modes cubrid csql also implements internal commands related schema information plan generation debugging transaction control query timing cubrid provides number language-specific application programming interfaces c driver also called cci cubrid native driver jdbc php/pdo driver odbc oledb ado.net ruby driver python driver node.js driver tcl perl driver several graphical user interface tools developed cubrid applications websites added cubrid support powered cubrid
[ 3712, 11136, 8582, 6797, 10389, 2456, 10137, 5403, 9245, 10145, 2339, 2344, 5677, 10286, 7983, 9263, 692, 823, 8644, 11221, 9320, 8554, 6124, 5872, 7412, 1142, 1146, 2045 ]
Test
11,553
3
SPARCstation_IPX:sparcstation ipx sparcstation ipx sun 4/50 workstation sold sun microsystems based sun4c architecture enclosed lunchbox chassis sparcstation ipx incorporates fujitsu mb86903 weitek w8701 40 mhz processor weitek sold 80 mhz aftermarket sparc powerup 2000a-080 gcd processor ipx requires rom update v2.9 sparcstation ipx four 72-pin simm slots memory expansion memory uses parity fast page memory fpm simm speeds 50-80ns slots filled individually giving maximum 64mb memory paired memory modules decrease access times via bank interleaving resulting faster memory overall system performance additional 32 64mb sbus board ram expanders fit work ipx using 8-pin j101 header contains additional power clock signals next dma/cache controller sparcstation ipx hold one internal 50 pin idc scsi drive floppy also supports external scsi devices ide/atapi support modern 80 pin single connector attachment sca drives work adapter fit inside case due size adapter sparcstation ipx comes on-board amd lance am7990 ethernet chipset provides aui connection external aui transceivers required connection 10base5 10base2 10baset ethernet physical layer media openboot rom able boot network using rarp tftp like sparcstation systems ipx holds system information mac address serial number nvram battery chip dies system able boot unaided boot parameters entered manually lost power sparcstation ipx includes integrated sun turbo gx cgsix color framebuffer internal sbus frees one sbus slot framebuffer duty makes sparcstation ipx expandable larger form factor sparcstation 2 otherwise shares many architectural similarities sparcstation ipx uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sun4c machines older battery life chip substantial number systems refuse boot additionally sun4c design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation ipx sparcstation ipc sun 4/40 earlier lunchbox form factor system sparcstation 2 sun 4/75 architecturally similar use cpu sbus ram upgrades
[ 9665, 9955, 10436, 10982, 823, 5498 ]
Test
11,554
6
TOPS_(file_server):tops file server tops transcendental operating system peer-to-peer lan-based file sharing system best known macintosh implementation also available dos able interoperate unix nfs originally written centram systems west company purchased sun microsystems part sun development nfs ecosystem centram company renamed tops acquisition sun sales tops dried introduction system 7 featured similar file sharing system built-in sun spun nfs developments sitka tops implemented 1980s era computer system featured networking protocol generally unable talk time apple midst macintosh office effort working two external companies develop apple filing protocol afp built top appletalk macintosh office effort ultimately failed one two companies centram decided implement similar system became first version tops tops originally released peer-to-peer file sharing solution mac according pc magazine connecting mac apple laserwriter printer initial intended function appletalk apple file sharing solution appleshare released later unlike tops required dedicated server machine run least mac plus smaller offices tops attractive low-cost solution saw relatively widespread use even introduction appleshare tops managed hold estimated 600,000 client installs tops initially protocol using custom set remote procedure calls able talk tops clients pcs generally lacked networking sort centram addressed problem introducing line localtalk cards pc along tops client files could exchanged two computers filename conversion required centram later introduced flashtalk networking system used external clocking improve localtalk performance zilog scc powering serial ports mac used internal 3.6864 mhz clock could divided provide different standard bit rates fastest rate available internally 230.4 kbit/s used localtalk however system also allowed clock read pin serial port giving rise possibility faster speeds right external equipment flashtalk combined conventional localtalk-like dongle clocking source external power supply using connectors associated software tops could run 770 kbit/s fairly dramatic improvement localtalk also relatively speedy overall era 1 mbit/s networks still common sun purchase tops given problem making client could also access sun file shares using nfs centram solved problem porting file sharing protocol tcp/ip trivial neither mac os windows supported tcp/ip box tops division sun write complete ip stack mac windows centram already written stack tops terminal freeware open source telnet terminal mac additionally majority macintosh systems used localtalk phonenet connectivity could directly connected ethernet-based unix lans worked around problem supporting emerging localtalk-to-ethernet bridging standard known kip short kinetics internet protocol kip encapsulated tcp/ip packets inside appletalk packets allowing sent existing localtalk connections dedicated kip-supporting network bridges available stripped appletalk packaging re-formed ip packets inside sent ethernet one limitation tcp stack support dns requiring users type ip addresses peers wanted communicate network mostly macs windows pcs issue dns widely used systems time kip also reduced need dns allowed mac existing address resolution protocol aarp code within appletalk look appletalk address remote peer communicate tops stack machine find corresponding ip address tops also added new inbox personal connection e-mail system first developed symantec tops attractiveness seriously eroded introduction system 7 1991 tops initially competed dedicated-server appleshare system 7 included file sharing server built-in one proved much faster then-current versions tops tops sales dwindled sun spun division sitka closing entirely 1993
[ 8640, 9441, 9569, 9665, 11011, 1734, 2887, 11112, 6377, 4910, 8404, 7706 ]
Validation
11,555
9
Wolfram_Language:wolfram language wolfram language general multi-paradigm computational language developed wolfram research programming language mathematical symbolic computation program mathematica wolfram programming cloud emphasizes symbolic computation functional programming rule-based programming employ arbitrary structures data includes built-in functions generating running turing machines creating graphics audio analyzing 3d models matrix manipulations solving differential equations extensively documented wolfram language core principles differentiate programming languages includes built-in knowledgebase automation form meta-algorithms superfunctions coherently elegant design structure built-in natural language understanding representation everything symbolic expression wolfram language released raspberry pi 2013 goal making free raspberry pi users included recommended software bundle raspberry pi foundation provides beginners caused controversy due wolfram language proprietary nature plans port wolfram language intel edison announced board introduction ces 2014 2019 link added make wolfram libraries compatible unity game engine giving game developers access language high level functions language officially named june 2013 although programming language mathematica use various forms 30 years since mathematica initial release 2013 internally referred several names wolfram language possible names wolfram research considered include lingua express stephen wolfram son christopher wolfram involved helping create alien language film arrival used wolfram language given portions written language used wolfram language analyze images attempt interpret served model characters approached problem film beginning 2017 wolfram began live stream internal wolfram language development meetings meetings viewers encouraged submit questions comments related development programming language viewers known suggest new functions would like see developed name new functions help solve complex issues faced stephen wolfram research development team live streamed meetings viewed twitch.tv youtube live facebook live following release version 12 wolfram research developers began live streaming presentations highlight new functionalities directly responsible creating unlike development meetings streamed stephen wolfram presentations streamed exclusively twitch.tv
[ 9345, 6408, 5521, 9875, 7069, 1443, 7983, 5684, 1591, 1849, 6718, 963, 10819, 5830, 5319, 8262, 10568, 4042, 8524, 11219, 5588, 2519, 4057, 10586, 219, 4069, 6502, 8421, 11625, 5612, 8430, 3567, 1016, 8057, 2939, 2045 ]
Validation
11,556
8
Amazon_Product_Advertising_API:amazon product advertising api amazon product advertising api formerly amazon associates web service a2s known amazon e-commerce service ecs web service application programming interface api gives application programmers access amazon product catalog data accessible via either soap rest protocols enables products listed and/or sold third-party websites applications product amazon services confused amazon web services amazon.com developed product advertising api toward three classifications users api allows clients search browse amazon.com product catalog retrieve detailed product information reviews images interface customer shopping carts purchases amazon third-party website application allows operators site earn 8.5 referral fees motivation behind free product advertising api give partners opportunity earn money promoting amazon products access given developers applications primarily bring least seem potential bring gains amazon
[ 8962, 8451, 6027, 5660, 11038, 10020, 2217, 10681, 11201, 5960, 10185, 590, 7248, 7512, 8921, 735, 1001, 8181, 10486 ]
Test
11,557
3
Kung-Fu_Master_(video_game):kung-fu master video game kung-fu master side-scrolling beat 'em game produced irem arcade game 1984 distributed data east north america game initially released japan title tie-in based jackie chan film wheels meals also distributed name spartan x japan however game bearing plot film outside names main protagonist girlfriend allowing irem export game without license simply changing title players control thomas titular kung-fu master fights way five levels devil temple order rescue girlfriend sylvia mysterious crime boss mr. x kung-fu master regarded first beat 'em video game nes port titled kung fu sold 3.5 million cartridges arcade game also inspired 1988 french film name player controls thomas four-way joystick two attack buttons punch kick unlike conventional side-scrolling games joystick used crouch also jump punches kicks performed standing crouching jumping position punches award points kicks damage range shorter underlings encountered player include grippers grab thomas drain energy shaken knife throwers throw two different heights must hit twice tom toms short fighters either grab thomas somersault strike head crouching even-numbered floors player must also deal falling balls pots snakes poisonous moths fire-breathing dragons exploding confetti balls devil temple five floors ending different boss described sons devil start game order complete floor thomas must connect enough strikes completely drain boss energy meter climb stairs next floor thomas fixed time limit complete floor time runs meter completely drained player loses one life must replay entire floor upon completing floor player receives bonus points remaining time energy boss fifth floor mr. x leader gang kidnapped sylvia defeated thomas rescues sylvia game restarts higher difficulty level game produced irem takashi nishiyama also created irem 1982 arcade-hit moon patrol later designed original 1987 street fighter capcom leaving run snk videogame development division creating neo geo arcade system board games like art fighting king fighters '94 samurai shodown well several successors game originally based bruce lee 1972 movie game death five-level devil temple reflecting movie setting five-level pagoda martial arts master level however title changed development make tie-in jackie chan spartan x kung-fu master ported atari 2600 atari 7800 amstrad cpc apple ii commodore 64 nes/famicom msx irem/ascii version seiken achō playchoice-10 arcade nearly nes version zx spectrum nes version converted published nintendo kung fu north america pal region also made 8-bit gameking console name nagual arcade version later included along arcade versions 10-yard fight zippy race iac/irem arcade classics playstation sega saturn released japan 1996 irem i'max arcade version released cell phones amstrad cpc zx spectrum versions game included 1986 compilation sold million 3 along fighter pilot ghostbusters rambo arcade sequel called super kung-fu master reportedly planned never released irem 1988 vigilante intended followup gameplay nearly completely different plot added takes place urban areas new york city nameless titular character must save girlfriend madonna maria sega master system version captured skinheads rogues sega master system version one unique feature ability pick use battering weapon nunchaku either player gets hurt finishes stage begin battling final boss 1990 arcade game received completely different game boy sequel titled kung-fu master spartan x japan similar gameplay arcade game completely different plot setting protagonist along new set enemies different stages new bosses including chainsaw man another strongman napalm bomber ninja shinobi mysterious wealthy kung fu master named zapp morgan leader thomas new abilities back-flip kicks small bombs dropped enemies flat levels modified stages different platforms objects urban city style similar vigilante english version modified japanese version changing look thomas renaming bruce leap add small enemies final stage fighting final boss 1991 japan-exclusive sequel game released famicom titled spartan x 2 like vigilante game boy version kung-fu master spartan x 2 plot also quite different takes place urban area mention sylvia rather johnny spartan member unnamed crime-fighting unit wears red short-sleeved jacket charges foiling 6 drug smugglers including punk named flamey joe magician named chin gen sai boatswain strongman named billy bailey circus trainer named mr. benjamin femme fatale named madda lin crime syndicate leader kung fu master named caeson hawk one unique feature ability crouch second either sending uppercut grab throw enemies behind spartan x 2 receive north american release 2016 included built-in title retro-bit generations retro video game console name kung-fu master 2
[ 5762, 10178, 3623, 9006, 10639, 1776, 6387, 10931, 9303 ]
None
11,558
8
Blackle:blackle blackle website powered google custom search created tony heap heap media aims save energy displaying black background using grayish-white font color search results blackle claims saved 7 mwh electrical energy february 2019 claim public dispute comparison average american household consumes 11 mwh electrical energy per year concept behind blackle computer monitors made use less energy displaying much darker colors blackle based study tested variety crt lcd monitors dispute whether really energy saving effects especially users lcd screens constant backlight concept first brought attention heap media blog post estimated google could save 750 megawatt hours year utilizing crt screens homepage blackle provides count number watt hours claimed saved enabling concept
[ 488, 7656, 4472, 735 ]
Test
11,559
2
Microsoft_Silverlight:microsoft silverlight microsoft silverlight simply silverlight deprecated application framework writing running rich internet applications similar adobe flash plugin silverlight still available browsers early versions silverlight focused streaming media later versions supported multimedia graphics animation game developers support cli languages development tools silverlight also one two application development platforms windows phone web pages use silverlight run windows phone windows mobile versions internet explorer silverlight plugin internet explorer platforms initial launch 2007 reviewers compared product adobe flash according statowl.com microsoft silverlight penetration 64.2 may 2011 usage july 2010 53.6 whereas market leader adobe flash installed 95.3 browsers java supported 76.5 browsers support plugins mutually exclusive one system support three web sites require browser plugin silverlight used provide video streaming nbc coverage 2008 summer olympics beijing 2010 winter olympics vancouver 2008 conventions major united states political parties silverlight also used amazon video netflix instant video streaming services netflix said tech blog 2013 since microsoft announced silverlight end-of-life would moving html5 video industry observers announcing death silverlight early 2011 internally even proponents technology thought extensible application markup language concept bad idea start 2012 microsoft deprecated silverlight html5 windows 8 late beginning 2015 clear microsoft official position future silverlight technology july 2015 microsoft blog post finally clarified matters ... encourage companies using silverlight media begin transition dash/mse/cenc/eme based designs microsoft set overall support end date silverlight 5 october 2021 support ie7-8 removed 2014 2016 depending os support ie9-11 last late 2021 depending os though sic support lifecycle underlying browsers whichever shorter silverlight plugin available microsoft edge supported google chrome since september 2015 firefox since march 2017. fewer 0.1 sites used silverlight 5.3 used adobe flash 2.4 used java silverlight provides retained mode graphics system similar windows presentation foundation wpf integrates multimedia graphics animations interactivity single run-time environment silverlight applications user interfaces declared extensible application markup language xaml programmed using subset .net framework xaml used marking vector graphics animations silverlight also used create windows sidebar gadgets windows vista silverlight supports h.264 video advanced audio coding windows media video wmv windows media audio wma mpeg layer iii mp3 media content across supported browsers without requiring windows media player windows media player activex control windows media browser plug-ins windows media video 9 implementation society motion picture television engineers smpte vc-1 standard silverlight also supports vc-1 video according end user license agreement vc-1 h.264 licensed personal non-commercial use consumer silverlight makes possible dynamically load extensible markup language xml content manipulated document object model dom interface technique consistent conventional ajax techniques silverlight exposes downloader object used download content like scripts media assets data may required application version 2 programming logic written .net language including derivatives common dynamic programming languages like ironruby ironpython free software implementation abandoned named moonlight developed novell cooperation microsoft released bring silverlight versions 1 2 functionality linux freebsd open source platforms although linux distributions include citing redistribution patent concerns however may 2012 moonlight abandoned lack popularity course five years microsoft released five versions varying platform support first version released 2007 fifth final major version may 8 2012 compatible later versions internet explorer web browser microsoft windows except windows rt operating systems safari apple macos mobile devices using windows mobile symbian series 60 platforms cross platform mozilla firefox support silverlight removed firefox 52 released march 2017 mozilla removed support npapi plugins bringing in-line removal npapi plugin support google chrome silverlight requires x86 processor streaming simd extensions sse support supported processors include intel pentium iii amd athlon xp newer amd durons following table presents availability compatibility matrix silverlight versions various operating systems web browsers support opera promised since may 3 2007 david storey chief web opener opera revealed microsoft poster mix conference shown opera integration part silverlight 1.1 however opera never officially supported silverlight linux freebsd functionality available via moonlight pipelight though projects discontinued moonlight available major linux distributions support firefox konqueror opera browsers provided obtained novell miguel de icaza expressed interest working developers operating systems bsd solaris browsers konqueror webkit opera ensure moonlight works fine systems availability moonlight version 1.0 freebsd announced march 2009 since reported actually work current version moonlight 4 preview 1 officially work new versions firefox newer 3.x gnu/linux-based operating systems however installed unofficial way example using add-on compatibility reporter add-on firefox 11 works correctly installed noted moonlight project abandoned may 2012 browser plugin named pipelight used provide silverlight access pipelight requires browser support npapi plugins newer versions firefox chrome opera dropped 2018 pipelight project discontinued silverlight available android ios prevalent operating systems mobile market silverlight primary development environment windows phone based silverlight 4 previous versions windows mobile first community technology preview ctp windows mobile 6 expected second quarter 2008 still officially announced microsoft stopped focusing bringing silverlight windows mobile 6.x nokia announced plans make silverlight mobile available s60 symbian os well series 40 devices nokia internet tablets later sold business microsoft sells android tablets sell alcatel-lucent branded smartphones silverlight mobile supports silverlight 2 content .net languages silverlight windows phone 7.5 based silverlight 4 silverlight applications could written .net programming language development tools used .net languages work silverlight provided target silverlight coreclr hosting application instead .net framework clr microsoft positioned microsoft expression blend companion tool visual studio design silverlight user interface applications visual studio used develop debug silverlight applications create silverlight projects let compiler target coreclr visual studio requires silverlight tools visual studio silverlight control zip format file extension .xap containing list one .net managed assemblies .dll files along appmanifest.xaml file containing list along entry point class assembly hosted html file using object tag example silverlight project contains silverlight.js createsilverlight.js files initializes silverlight plug-in use html pages xaml file ui code-behind files application code silverlight applications debugged manner similar asp.net applications visual studio clr remote cross platform debugging feature used debug silverlight applications running different platform well conjunction release silverlight 2 eclipse added development tool option april 2007 pc world report suggested microsoft intended release certain parts silverlight source code open source software week later sam ramji director platform technology strategy microsoft contradicted rumors confirming company plans open silverlight controls ship silverlight available microsoft public license part separate project known silverlight toolkit silverlight proprietary nature concern competition since may harm open nature world wide web advocates free software also concerned silverlight could another example microsoft embrace extend extinguish strategy microsoft silverlight adobe flash proprietary flash file formats publicly documented standards silverlight silverlight like web technologies uses patent-encumbered audio video codecs mono team abandoned development moonlight free open-source implementation silverlight 1 2 runtimes development discontinued 2012 due poor acceptance silverlight restrictions imposed microsoft project officially supported microsoft agreement novell made not-publicly-available additional specifications access silverlight base class library apis binary codecs test cases available mono team covenant novell granted exclusive access also specified conditions incompatible licensing covers free open source software examples specifically required software must obtained directly novell intermediate recipient must licensed gplv3 similar license free software proponents criticized covenant silverlight criticised living cross-platform operating system compatibility promises especially linux systems compared extensive support apple microsoft desktops internet explorer firefox chrome although microsoft officially collaborating moonlight project bruce chizen ceo adobe systems sells competing proprietary flash platform questioned commitment microsoft keep silverlight platform compatible os besides windows concerns based examples history said microsoft launched products promises ongoing cross-platform compatibility longer apply example internet explorer unix windows media player mac 2007 california several u.s. states asked district judge extend microsoft antitrust case settlement another five years citing number concerns including fear microsoft could use next version windows 'tilt playing field toward silverlight new adobe flash competitor says seattle post-intelligencer article final judgment motion extended settlement two years november 2009 reasons unrelated silverlight
[ 10243, 4624, 9234, 1043, 7701, 6171, 2589, 3102, 1055, 10270, 7713, 2083, 8227, 1577, 3626, 2603, 4143, 9263, 1077, 6709, 1591, 8246, 8757, 4674, 8771, 4174, 7246, 4178, 83, 9813, 8281, 10841, 603, 608, 1632, 2145, 10338, 617, 5743, 1136,...
Test
11,560
5
Distributed_coordination_function:distributed coordination function distributed coordination function dcf fundamental medium access control mac technique ieee 802.11-based wlan standard including wi-fi dcf employs carrier-sense multiple access collision avoidance csma/ca binary exponential backoff algorithm dcf requires station wishing transmit listen channel status difs interval channel found busy difs interval station defers transmission network number stations contend wireless medium multiple stations sense channel busy defer access also virtually simultaneously find channel released try seize channel result collisions may occur order avoid collisions dcf also specifies random backoff forces station defer access channel extra period length backoff period determined following equation formula_1 dcf also optional virtual carrier sense mechanism exchanges short request-to-send rts clear-to-send cts frames source destination stations intervals data frame transmissions dcf includes positive acknowledge scheme means frame successfully received destination addressed destination needs send ack frame notify source successful reception dcf solve hidden terminal and/or exposed terminal problem completely alleviates problem use rts cts recommends use larger carrier sensing range dcf defined subclause 9.3 ieee 802.11 standard de facto default setting wi-fi hardware 802.11 dcf consumes significant amount airtime 802.11 control messages usually convey little information example ack message take 60 μs transmit completely includes amount airtime sufficient transmit 3240 bits 54 mbit/s conveys single bit relevant information ieee 802.11 standard also defines optional access method using point coordination function pcf pcf allows access point acting network coordinator manage channel access ieee 802.11e amendment standard enhances dcf pcf new coordination function called hybrid coordination function hcf
[ 10112, 2785, 2306, 388, 5092, 8708, 3847, 1192, 5863, 7498, 7723, 9284, 11181, 656, 2802, 11288, 2458, 2911 ]
None
11,561
4
Comprehensive_National_Cybersecurity_Initiative:comprehensive national cybersecurity initiative comprehensive national cybersecurity initiative cnci established president george w. bush national security presidential directive 54/homeland security presidential directive 23 nspd-54/hspd-23 january 2008 initiative outlines u.s. cybersecurity goals spans multiple agencies including department homeland security office management budget national security agency initial signing initiative hearings initiative 2008 kept classified however march 2010 obama administration declassified limited material regarding project current goals initiative include establishing front line defense network intrusion defending u.s. full spectrum threats counterintelligence strengthening future cybersecurity environment education coordination research main actions cnci january 6 2011 national security agency nsa began building first series data centers pursuant program 1.5 billion community comprehensive national cybersecurity initiative data center also known utah data center located camp williams utah
[ 10859, 10348, 7887, 6645, 7899, 5245 ]
Test
11,562
2
ViewMAX:viewmax viewmax cua-compliant file manager supplied dr dos versions 5.0 6.0 based cut-down version digital research gem/3 graphical user interface modified run single application viewmax desktop support unneeded functions removed whilst new functions added time nevertheless systems remained close enough viewmax recognize gem desktop accessories .acc executables automatically allow native gem applications .app executables run inside viewmax environment without install launch gem first many display drivers gem 3.xx used viewmax well enabling viewmax used non-standard display adapters higher resolutions possible using default set viewmax drivers also digital research sid86 symbolic instruction debugger shipped dr dos 3.xx provided dedicated functions debug gem applications see gem-specific help sid86 gemsid used viewmax well originally named navigator beta versions viewmax 1.00 distributed dr dos 5.0 1990 provide equivalent dosshell ms-dos/pc dos 4.0 similar appearance digital research previous gem desktops – two fixed-size windows window would either contain icons representing drives directories files representation directory hierarchy supported underlying operating system dr dos file directory passwords access permissions supported network drives including cd-rom drives distinguished icon different local drives 1991 viewmax 2 distributed dr dos 6.0 various graphical improvements made release including controls 3d appearance user-selectable colour schemes directory tree enabled shown beside list icons rather instead various settings could stored configuration files named drdoscfg \viewmax.ini flexible character set support viewmax 2 loaded display fonts standard dos .cpi file depending current code page rather using gem specific character set feature also incorporated freegem since 2005 dos/v-compatible japanese version viewmax distributed dr dos 6.0/v 1992 supported dbcs characters loaded font.sys screenhz.fnt support added dr dos task switcher taskmax present applications would launched separate tasks viewmax could switch taskmgr later operating systems novell dos 7 opendos 7.01 dr-dos 7.02 higher continued emulate task switcher api well viewmax 2 could used switch control multiple concurrently running full-screen dos tasks dr-dos preemptively multitasking kernel emm386 /multi taskmgr well viewmax 3 intended graphical file manager novell next version dr dos viewmax 3 included support colour icons movable resizable windows program groups background images underlying dr-dos optional multi-user security module loaded viewmax would also provide support extended world/group/owner access permission system although viewmax 3 part dr dos panther beta 1 distribution october 1992 never completed apparently abandoned favour apple novell star trek team project 1992/1993 remained unreleased well novell dos 7 dr dos 7.0 called 1994 came without graphical file manager caldera bought remaining digital research assets novell 23 july 1996 initial plans revive gem viewmax technologies low-footprint user interface opendos mobile applications caldera view plans abandoned caldera uk favour dr-webspyder grow closing dr-dos development center caldera uk early 1999 remaining source code viewmax 3 beta version published april 1999 us parent company caldera thin clients gpl following continued community request release sources shortly company changed name lineo switched linux-based technologies three months later various viewmax features previously found gem incorporated freegem since
[ 10113, 6148, 6921, 3216, 2840, 2201, 10273, 7847, 2729, 7849, 7983, 8241, 178, 7986, 10289, 823, 4409, 5694, 7999, 4548, 589, 9166, 10067, 10083, 5220, 8301, 1007, 2672, 3056, 4337, 9329, 4727, 11513, 6778 ]
Test
11,563
2
Wizard_of_OS:wizard os openbsd 3.7 released may 19 2005 theme song made titled wizard os song chronicled openbsd developers struggle obtain open documentation wireless cards manufacturers taiwan like ralink realtek cooperative companies contacted based work pink floyd notably style 1973 album dark side moon showing similarities great gig sky breathe eclipse parody wizard oz effort theo de raadt project benevolent dictator life received fsf 2004 award advancement free software song co-arranged ty semaka jonathan lewis also recorded mixed mastered song
[ 7702, 7983 ]
None
11,564
3
Raster_interrupt:raster interrupt raster interrupt also called horizontal blank interrupt interrupt signal computer system used display timing usually though always generated system graphics chip scan lines frame readied send monitor display interrupt provides mechanism graphics registers changed mid-frame different values interrupt point allows single-color object multiple horizontal color bands example sprite repositioned give illusion sprites system supports limitation changes affect portion display interrupt n't allow colors sprites single scan line several popular home computers video game consoles included graphics chips supporting raster interrupts features could combined work like raster interrupts antic chip used atari 8-bit family includes display list interrupts dlis triggered display drawn antic chip considerably powerful inherently capable many features systems require raster interrupts duplicate antic mix multiple graphics modes screen display horizontal vertical overscan graphics fine scroll selected horizontal regions dlis atari typically used add additional color display reuse player/missile graphics elements c64 vic-ii flexible raster interrupt system raster interrupts cpu intervention necessary reuse sprites screen mix graphics modes selectively scroll screen regions nintendo entertainment system ppu graphics chip support true raster interrupts interrupt set trigger vertical blank interval arbitrary scan line instead required polling hit flag indicated first sprite drawn although early games like super mario bros. castlevania legend zelda managed produce effective split-screen scrolling method cpu-intensive later cartridges incorporated mmc circuitry prominently nintendo mmc3 chip kept track ppu address data lines generated raster interrupts msx2 computers feature dedicated yamaha v9938 video display processor vdp like nes supports 'vertical blank interrupts requires polling 'horizontal blank interrupts commonly used create split screens mix multiple video modes together one screen increase number unique colours screen beyond official spec prominent usage examples aleste series konami space manbow amiga computers include custom coprocessor called copper dedicated servicing raster interrupts copper runs program simple instructions directing wait specific vertical scan line horizontal beam position update contents custom chip hardware register typically used modifying display parameters mixing display modes reusing sprites changing color registers also used trigger cpu interrupt game boy ppu support four raster interrupts set trigger beginning specified scanline end scanlines horizontal blanking beginning scanlines beginning vertical blanking biggest drawback interrupt handler used first three requiring use dispatching code one condition used
[ 6400, 10658, 11462, 6415, 5457, 11477, 5851, 5823 ]
Test
11,565
2
MirOS_Licence:miros licence miros licence free content licence software free cultural works graphical literal musical … originated miros project publications isc license used openbsd perceived problems wording america centric strong roots ucb bsd licence historical permission notice disclaimer focus modern explicit legible language usability european except uk specifically german authors hindering adoption authors legislations permissive “ bsd/mit-style ” licence another novelty licence specified kind copyrightable work start meets open source definition debian free software guidelines also open knowledge definition fact approved okfn long osi licence seen formal legal review listed ifross ’ licence centre webpages free software foundation formally added licence either free software licence free documentation license pages software directory category license accepted free content license according free cultural works definition
[ 6333 ]
Validation
11,566
5
Multipurpose_Transaction_Protocol:multipurpose transaction protocol multipurpose transaction protocol mtp software proprietary transport protocol developed marketed data expedition inc. dei dei claims mtp offers superior performance reliability compared transmission control protocol tcp transport protocol mtp implemented using user datagram protocol udp packet format uses proprietary flow-control error-correction algorithms achieve reliable delivery data avoid network flooding mtp/ip uses proprietary algorithms compatible software must installed ends communication path use udp packet format permits compatibility standard internet protocol ip network hardware software mtp/ip applications may use available udp port number mtp applications use implemented several operating systems including versions microsoft windows macos linux freebsd solaris hardware platforms include variations x86 power isa arm mtp/ip marketed data expedition inc. trial versions applications use mtp/ip available company website
[ 5472, 8386, 3813, 10985, 5612, 6797, 9964, 7983, 10924, 499, 11413, 823, 5531, 2045, 3006, 4095 ]
Test
11,567
4
IT_risk_management:risk management risk management application risk management methods information technology order manage risk i.e onlyinclude risk management considered component wider enterprise risk management system establishment maintenance continuous update information security management system isms provide strong indication company using systematic approach identification assessment management information security risks different methodologies proposed manage risks divided processes steps /onlyinclude according risk framework encompasses negative impact operations service delivery bring destruction reduction value organization also benefit enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact risk strictly tied uncertainty decision theory applied manage risk science i.e rationally making choices uncertainty generally speaking risk product likelihood times impact risk likelihood impact measure risk determined product threat vulnerability asset values current risk management framework risk would tik framework process risk management ongoing iterative process must repeated indefinitely business environment constantly changing new threats vulnerabilities emerge every day choice countermeasures controls used manage risks must strike balance productivity cost effectiveness countermeasure value informational asset protected onlyinclude certified information systems auditor review manual 2006 produced isaca international professional association focused governance provides following definition risk management risk management process identifying vulnerabilities threats information resources used organization achieving business objectives deciding countermeasures take reducing risk acceptable level based value information resource organization /onlyinclude risk management process allows managers balance operational economic costs protective measures achieve gains mission capability protecting systems data support organizations ’ missions process unique environment indeed pervades decision-making areas daily lives head organizational unit must ensure organization capabilities needed accomplish mission mission owners must determine security capabilities systems must provide desired level mission support face real world threats organizations tight budgets security therefore security spending must reviewed thoroughly management decisions well-structured risk management methodology used effectively help management identify appropriate controls providing mission-essential security capabilities risk management world quite complex multi faced activity lot relations complex activities picture right shows relationships different related terms american national information assurance training education center defines risk management field organizations many others comprehensive enterprise risk management erm place four objective categories addressed according committee sponsoring organizations treadway commission coso according risk framework isaca risk transversal four categories risk managed framework enterprise risk management risk appetite risk sensitivity whole enterprise guide risk management process erm provide context business objectives risk management whilst methodology describe specific methods nevertheless specify several processes constitute generic framework need followed processes may broken sub-processes may combined sequence may change risk management exercise must carry processes one form another following table compares processes foreseen three leading standards isaca risk framework recent risk practitioner-guide compares risk iso 27005 term methodology means organized set principles rules drive action particular field knowledge overall comparison illustrated following table due probabilistic nature need cost benefit analysis risks managed following process according nist sp 800-30 divided following steps effective risk management must totally integrated systems development life cycle information risk analysis conducted applications computer installations networks systems development undertaken using structured methodologies step first step iso iso/iec 27005 framework elementary activities foreseen first sub process risk assessment according nist sp 800-30 step implies acquisition relevant information organization determination basic criteria purpose scope boundaries risk management activities organization charge risk management activities purpose usually compliance legal requirements provide evidence due diligence supporting isms certified scope incident reporting plan business continuity plan another area application certification product criteria include risk evaluation risk acceptance impact evaluation criteria conditioned establishing scope boundaries organization studied mission values structure strategy locations cultural environment constraints budgetary cultural political technical organization collected documented guide next steps set organization charge risk management foreseen partially fulfilling requirement provide resources needed establish implement operate monitor review maintain improve isms main roles inside organization risk management recurrent activity deals analysis planning implementation control monitoring implemented measurements enforced security policy contrary risk assessment executed discrete time points e.g year demand etc – performance next assessment provides temporary view assessed risks parameterizing entire risk management process view relationship risk management risk assessment depicted figure adopted octave risk assessment often conducted one iteration first high-level assessment identify high risks iterations detailed analysis major risks risks according national information assurance training education center risk assessment field risk assessment receives input output previous step context establishment output list assessed risks prioritized according risk evaluation criteria process divided following steps following table compares iso 27005 processes risk framework processes iso/iec 27002:2005 code practice information security management recommends following examined risk assessment risk identification states could cause potential loss following identified output sub process made two methods risk assessment information security field quantitative qualitative purely quantitative risk assessment mathematical calculation based security metrics asset system application risk scenario taking consideration different risk factors single loss expectancy sle determined considering probability occurrence given period basis example annual rate occurrence aro annualized loss expectancy determined product aro x sle important point values assets considered involved assets value directly affected resource example consider risk scenario laptop theft threat consider value data related asset contained computer reputation liability company assets deriving lost availability confidentiality data could involved easy understand intangible assets data reputation liability worth much physical resources risk laptop hardware example intangible asset value huge easy evaluate consideration pure quantitative approach qualitative risk assessment three five steps evaluation high low performed organization requires risk assessment performed relatively short time meet small budget significant quantity relevant data available persons performing assessment n't sophisticated mathematical financial risk assessment expertise required qualitative risk assessment performed shorter period time less data qualitative risk assessments typically performed interviews sample personnel relevant groups within organization charged security asset assessed qualitative risk assessments descriptive versus measurable usually qualitative classification done followed quantitative evaluation highest risks compared costs security measures risk estimation input output risk analysis split following steps output list risks value levels assigned documented risk register risks arising security threats adversary attacks may particularly difficult estimate difficulty made worse least system connected internet adversary intent capability may attack physical closeness access necessary initial models proposed problem risk estimation generally three values given asset one loss one cia properties confidentiality integrity availability risk evaluation process receives input output risk analysis process compares risk level risk acceptance criteria prioritise risk list risk treatment indications determine likelihood future adverse event threats system must conjunction potential vulnerabilities controls place system impact refers magnitude harm could caused threat ’ exercise vulnerability level impact governed potential mission impacts produces relative value assets resources affected e.g. criticality sensitivity system components data risk assessment methodology encompasses nine primary steps risk mitigation second process according sp 800-30 third according iso 27005 risk management involves prioritizing evaluating implementing appropriate risk-reducing controls recommended risk assessment process elimination risk usually impractical close impossible responsibility senior management functional business managers use least-cost approach implement appropriate controls decrease mission risk acceptable level minimal adverse impact organization ’ resources mission risk treatment process aim selecting security measures risk produce risk treatment plan output process residual risks subject acceptance management list select appropriate security measures single organization choose appropriate one according business strategy constraints environment circumstances choice rational documented importance accepting risk costly reduce high led fact risk acceptance considered separate process risk transfer apply risk high impact easy reduce significantly likelihood means security controls insurance premium compared mitigation costs eventually evaluating mixed strategy partially treat risk another option outsource risk somebody efficient manage risk risk avoidance describe action ways conducting business changed avoid risk occurrence example choice storing sensitive information customers avoidance risk customer data stolen residual risks i.e risk remaining risk treatment decision taken estimated ensure sufficient protection achieved residual risk unacceptable risk treatment process iterated risk mitigation systematic methodology used senior management reduce mission risk risk mitigation achieved following risk mitigation options address greatest risks strive sufficient risk mitigation lowest cost minimal impact mission capabilities suggestion contained risk communication horizontal process interacts bidirectionally processes risk management purpose establish common understanding aspect risk among organization stakeholder establishing common understanding important since influences decisions taken risk reduction overview method specifically designed process presents comprehensible overview coherence risks measures residual risks achieve common understanding risk management ongoing never ending process within process implemented security measures regularly monitored reviewed ensure work planned changes environment rendered ineffective business requirements vulnerabilities threats change time regular audits scheduled conducted independent party i.e somebody control responsible implementations daily management isms security controls validated technical controls possible complex systems tested verified hardest part validate people knowledge procedural controls effectiveness real application daily business security procedures vulnerability assessment internal external penetration test instruments verifying status security controls information technology security audit organizational procedural control aim evaluating security systems organization evolving quite rapidly risk management cope changes change authorization risk evaluation affected systems processes periodically review risks mitigation actions monitoring system events according security monitoring strategy incident response plan security validation metrics fundamental activities assure optimal level security obtained important monitor new vulnerabilities apply procedural technical security controls like regularly updating software evaluate kinds controls deal zero-day attacks attitude involved people benchmark best practice follow seminars professional associations sector factors assure state art organization risk management practice effective risk management must totally integrated sdlc system ’ sdlc five phases initiation development acquisition implementation operation maintenance disposal risk management methodology regardless sdlc phase assessment conducted risk management iterative process performed major phase sdlc nist sp 800-64 devoted topic early integration security sdlc enables agencies maximize return investment security programs guide focuses information security components sdlc first descriptions key security roles responsibilities needed information system developments provided second sufficient information sdlc provided allow person unfamiliar sdlc process understand relationship information security sdlc document integrates security steps linear sequential a.k.a waterfall sdlc five-step sdlc cited document example one method development intended mandate methodology lastly sp 800-64 provides insight projects initiatives clearly defined sdlc-based developments service-oriented architectures cross-organization projects facility developments security incorporated information systems acquisition development maintenance implementing effective security practices following areas information systems security begins incorporating security requirements process new application system enhancement security designed system beginning security requirements presented vendor requirements phase product purchase formal testing done determine whether product meets required security specifications prior purchasing product correct processing applications essential order prevent errors mitigate loss unauthorized modification misuse information effective coding techniques include validating input output data protecting message integrity using encryption checking processing errors creating activity logs applied properly cryptographic controls provide effective mechanisms protecting confidentiality authenticity integrity information institution develop policies use encryption including proper key management disk encryption one way protect data rest data transit protected alteration unauthorized viewing using ssl certificates issued certificate authority implemented public key infrastructure system files used applications must protected order ensure integrity stability application using source code repositories version control extensive testing production back-off plans appropriate access program code effective measures used protect application files security development support processes essential part comprehensive quality assurance production control process would usually involve training continuous oversight experienced staff applications need monitored patched technical vulnerabilities procedures applying patches include evaluating patches determine appropriateness whether successfully removed case negative impact risk management scientific methodology criticized shallow major risk management programmes large organizations mandated us federal information security management act criticized avoiding complexity accompanies formal probabilistic model risks uncertainty risk management looks like process attempts guess rather formally predict future basis statistical evidence highly subjective assessing value assets likelihood threats occurrence significance impact however better way deal subject emerged quite hard list methods least partially support risk management process efforts direction done enisa report classified different methods regarding completeness free availability tool support result factor analysis information risk fair main document introduction factor analysis information risk fair risk management insight llc november 2006 outline methods lack rigorous definition risk factors fair another methodology deal risk management complements existing methodologies fair good acceptance mainly open group isaca isaca developed methodology called risk address various kind related risks chiefly security related risks integrated cobit general framework manage risk broader concept risk methodologies encompasses negative impact operations service delivery bring destruction reduction value organization also benefit\value enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact build security initiative homeland security department united states cites fair initiative build security collaborative effort provides practices tools guidelines rules principles resources software developers architects security practitioners use build security software every phase development chiefly address secure coding 2016 threat sketch launched abbreviated cyber security risk assessment specifically small organizations methodology uses real options forecast prioritize fixed list high-level threats number standards risk risk management description see main article
[ 3969, 5636, 2190, 399, 5774, 3473, 8975, 4755, 2709, 4117, 8471, 1709, 433, 2737, 8881, 10034, 3125, 7228, 8637, 1479, 11594, 9293, 3796, 1369, 10717, 4062, 3552, 612, 6373, 7526, 999, 5353, 2926, 4206, 3447, 5373, 2558 ]
Train
11,568
6
Mount_(computing):mount computing mounting process operating system makes files directories storage device available users access via computer file system general process mounting comprises operating system acquiring access storage medium recognizing reading processing file system structure metadata registering virtual file system vfs component location vfs newly-mounted medium registered called mount point mounting process completed user access files directories medium opposite process mounting called unmounting operating system cuts user access files directories mount point writes remaining queue user data storage device refreshes file system metadata relinquishes access device making storage device safe removal normally computer shutting every mounted storage undergo unmounting process ensure queued data got written preserve integrity file system structure media mount point location partition used root filesystem many different types storage exist including magnetic magneto-optical optical semiconductor solid-state drives magnetic media still common available hard disk drives less frequently floppy disks used storage means information read written must organized knowledge must available operating system organization called filesystem different filesystem provides host operating system metadata knows read write data medium media filesystem volume filesystem raid arrays mounted metadata read operating system use storage unix-like operating systems often include software tools assist mounting process provide new functionality strategies coined auto-mounting reflection purpose many situations file systems root need available soon operating system booted unix-like systems therefore provide facility mounting file systems boot time system administrators define file systems configuration file fstab vfstab solaris also indicates options mount points situations need mount certain file systems boot time although use may desired thereafter utilities unix-like systems allow mounting predefined file systems upon demand removable media become common microcomputer platforms allow programs data transferred machines without physical connection common examples include usb flash drives memory cards cd-roms dvds utilities therefore developed detect presence availability medium mount medium without user intervention unix-like systems also introduced concept called supermounting implemented linux supermount-ng project example floppy disk supermounted physically removed system normal circumstances disk synchronized unmounted removal provided synchronization occurred different disk inserted drive system automatically notices disk changed updates mount point contents reflect new medium similar functionality found windows machines automounter automatically mount file system reference made directory atop mounted usually used file systems network servers rather relying events insertion media would appropriate removable media
[ 2432, 3975, 4615, 1801, 2314, 8328, 1804, 273, 6935, 6297, 11675, 2974, 9343, 9762, 6436, 10405, 295, 7975, 9004, 8110, 7983, 1456, 4401, 437, 10933, 4801, 3522, 451, 8772, 2762, 7244, 1741, 590, 6866, 7379, 5206, 9689, 8410, 5086, 739, ...
Test
11,569
4
Logjam_(computer_security):logjam computer security logjam security vulnerability diffie–hellman key exchange ranging 512-bit us export-grade 1024-bit keys discovered group computer scientists publicly reported may 20 2015 diffie–hellman key exchange depends security presumed difficulty solving discrete logarithm problem authors took advantage fact number field sieve algorithm generally effective method finding discrete logarithms consists four large computational steps first three depend order group g specific number whose finite log desired results first three steps precomputed saved used solve discrete log problem prime group relatively short time vulnerability known early 1992 turns much internet traffic uses one handful groups order 1024 bits less one approach enabled vulnerability authors demonstrated using man-in-the-middle network attacker downgrade transport layer security tls connection use 512-bit dh export-grade cryptography allowing read exchanged data inject data connection affects https smtps imaps protocols among others authors needed several thousand cpu cores week precompute data single 512-bit prime done however individual logarithms could solved minute using two 18-core intel xeon cpus cve id cve-2015-4000 authors also estimated feasibility attack 1024-bit diffie–hellman primes design many diffie–hellman implementations use pregenerated prime field considered secure since discrete log problem still considered hard big-enough primes even group known reused researchers calculated cost creating logjam precomputation one 1024-bit prime hundreds millions usd noted well within range fy2012 10.5 billion u.s. consolidated cryptologic program includes nsa reuse primes generating precomputation one prime would break two-thirds vpns quarter ssh servers globally researchers noted attack fits claims leaked nsa papers nsa able break much current cryptography recommend using primes 2048 bits defense switching elliptic-curve diffie–hellman ecdh claims pratical implications attack however disputed security researchers eyal ronen adi shamir paper critical review imperfect forward secrecy
[ 513, 5636, 517, 1157, 6023, 1288, 9744, 1683, 1688, 10908, 3742, 2083, 8358, 9383, 11693, 9394, 7736, 9281, 9412, 3657, 5834, 10831, 11345, 3286, 5078, 5590, 474, 3805, 7264, 8674, 7139, 10341, 5107, 501, 1526, 2169, 3707, 510, 4863 ]
Test
11,570
2
Windows_Driver_Frameworks:windows driver frameworks windows driver frameworks wdf formerly windows driver foundation set microsoft tools libraries aid creation device drivers windows 2000 later versions windows complements windows driver model abstracting away much boilerplate complexity writing windows drivers wdf consists kernel-mode driver framework kmdf user-mode driver framework umdf individual frameworks provide new object-oriented programming model windows driver development primary goals wdf conceptual scalability reduced duplication enabling developers apply concepts across different driver types reducing code overhead required drivers differs markedly windows driver model wdm requires driver developers fully familiar many complex technical details write basic driver part key achieving conceptual scalability kmdf umdf use opt-in model model allows developer extend override default behavior canonical good driver contrast windows driver model depends driver writer implement aspects driver behavior three types wdf drivers wdf also includes set static verification tools use driver writers tools examine driver code common errors and/or simulate code driver order identify problems difficult detect difficult test bold yes means introduced version windows
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 6709, 8246, 4674, 4174, 4178, 83, 9813, 603, 608, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 10900, 10902, 11414, 3224, 4771, 7846, 2221, 10...
Test
11,571
1
Data_Transformation_Services:data transformation services data transformation services dts set objects utilities allow automation extract transform load operations database objects dts packages components utilities called dts tools dts included earlier versions microsoft sql server almost always used sql server databases although could used independently databases dts allows data transformed loaded heterogeneous sources using ole db odbc text-only files supported database dts also allow automation data import transformation scheduled basis perform additional functions ftping files executing external programs addition dts provides alternative method version control backup packages used conjunction version control system microsoft visual sourcesafe sql server versions 6.5 earlier database administrators dbas used sql server transfer manager bulk copy program included sql server transfer data tools significant shortcomings many dbas used third-party tools pervasive data integrator transfer data flexibly easily release sql server 7 1998 data transformation services packaged replace tools sql server 2000 expanded dts functionality several ways introduced new types tasks including ability ftp files move databases database components add messages microsoft message queue dts packages saved visual basic file sql server 2000 expanded save com-compliant language microsoft also integrated packages windows 2000 security made dts tools user-friendly tasks accept input output parameters dts comes editions sql server 7 2000 superseded sql server integration services microsoft sql server 2005 release 2005 dts package fundamental logical component dts every dts object child component package packages used whenever one modifies data using dts metadata data transformation contained within package packages saved directly sql server saved microsoft repository com files sql server 2000 also allows programmer save packages visual basic language file stored vb file package actually scripted—that vb script executed dynamically create package objects component objects package contain number connection objects contain allow package read data ole db-compliant data source expanded handle sorts data functionality package organized tasks steps dts task discrete set functionalities executed single step dts package task defines work item performed part data movement data transformation process job executed data transformation services supplies number tasks part dts object model accessed graphically dts designer accessed programmatically tasks configured individually cover wide variety data copying data transformation notification situations example following types tasks represent actions perform using dts executing single sql statement sending email transferring file ftp step within dts package describes order tasks run precedence constraints describe case damage failure steps executed sequentially parallel packages also contain global variables used throughout package sql server 2000 allows input output parameters tasks greatly expanding usefulness global variables dts packages edited password protected scheduled execution retrieved version dts tools packaged sql server include dts wizards dts designer dts programming interfaces dts wizards used perform simple common dts tasks include import/export wizard copy database wizard provide simplest method copying data ole db data sources great deal functionality available merely using wizard however package created wizard saved later altered one dts tools create publishing wizard also available schedule packages run certain times works sql server agent running otherwise package scheduled executed dts designer graphical tool used build complex dts packages workflows event-driven logic dts designer also used edit customize dts packages created dts wizard connection task dts designer shown specific icon icons joined precedence constraints specify order requirements tasks run one task may run instance another task succeeds fails tasks may run concurrently dts designer criticized unusual quirks limitations inability visually copy paste multiple tasks one time many shortcomings overcome sql server integration services dts successor graphical tool used build queries dts dts packages run command line using dtsrun utility utility invoked using following syntax passing parameters mapped global variables required include typeid rather difficult find microsoft site typeids used passing values
[ 1152, 8835, 7364, 2183, 5320, 969, 8878, 847, 2641, 2901, 11030, 4183, 9112 ]
None
11,572
6
File_Replication_Service:file replication service file replication service frs microsoft windows server service distributing shared files group policy objects replaced windows nt lan manager replication service partially replaced distributed file system replication also known ntfrs name executable file runs service one main uses frs sysvol directory share sysvol directory share particularly important microsoft network used distribute files supporting group policy scripts client computers network since group policies scripts run time user logs system important reliability multiple copies sysvol directory increases resilience spreads workload essential service sysvol directory accessed using network share server copy sysvol directory normally domain controller shown accessing using domain name servers work together provide service called replication partners control file replication windows server 2003 r2 windows server 2008 dfs replication available well file replication service dfs replication state-based replication engine file replication among dfs shares supports replication scheduling bandwidth throttling uses remote differential compression detect replicate change files rather replicating entire files changed windows vista also includes dfs replication service limited peer-to-peer dfs replication service groups frs still used sysvol replication optionally dfs replication may used instead frs replication sysvol shares frs stopped up-level windows server 2008 domain controllers sysvol replication performed using dfs replication default although ntfrs replication also supported windows server 2008/r2 up-level domain controllers sysvol replication performed using dfs replication ntfrs replication disabled altogether
[ 11270, 5643, 4624, 537, 540, 3102, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 10900, ...
Test
11,573
2
FreeBSD_Documentation_License:freebsd documentation license freebsd documentation license license covers documentation freebsd operating system license similar 2-clause simplified bsd license used rest freebsd however makes meanings source code compile less ambiguous context documentation also includes mandatory disclaimer ieee open group text manual pages free software foundation classes free documentation license stating permissive non-copyleft free documentation license compatible gnu fdl based freebsd documentation license bsd documentation license created contain terms generic projects well reintroducing 3rd clause restricts use documentation endorsement purposes shown new bsd license
[ 7425, 2180, 1927, 1801, 10761, 274, 9625, 1946, 4636, 2212, 6438, 10535, 684, 4908, 1071, 3248, 7983, 9009, 11698, 1718, 9784, 1465, 5177, 5819, 3006, 11459, 9927, 8266, 8395, 8909, 5710, 6864, 7249, 850, 10455, 6361, 8410, 6491, 9306, 60...
Test
11,574
9
Polymorphism_(computer_science):polymorphism computer science programming languages type theory polymorphism provision single interface entities different types use single symbol represent multiple different types commonly recognised major classes polymorphism interest polymorphic type systems developed significantly 1960s practical implementations beginning appear end decade ad hoc polymorphism parametric polymorphism originally described christopher strachey fundamental concepts programming languages listed two main classes polymorphism ad hoc polymorphism feature algol 68 parametric polymorphism core feature ml type system 1985 paper peter wegner luca cardelli introduced term inclusion polymorphism model subtypes inheritance citing simula first programming language implement christopher strachey chose term ad hoc polymorphism refer polymorphic functions applied arguments different types behave differently depending type argument applied also known function overloading operator overloading term ad hoc context intended pejorative refers simply fact type polymorphism fundamental feature type system pascal delphi example codice_1 functions seem work generically various types looking invocations considered two entirely distinct functions compiler intents purposes dynamically typed languages situation complex correct function needs invoked might determinable run time implicit type conversion also defined form polymorphism referred coercion polymorphism parametric polymorphism allows function data type written generically handle values uniformly without depending type parametric polymorphism way make language expressive still maintaining full static type-safety concept parametric polymorphism applies data types functions function evaluate applied values different types known polymorphic function data type appear generalized type e.g list elements arbitrary type designated polymorphic data type like generalized type specializations made parametric polymorphism ubiquitous functional programming often simply referred polymorphism following example haskell shows parameterized list data type two parametrically polymorphic functions parametric polymorphism also available several object-oriented languages instance templates c++ name generics c java john c. reynolds later jean-yves girard formally developed notion polymorphism extension lambda calculus called polymorphic lambda calculus system f parametrically polymorphic function necessarily restricted working shape data instead value leading concept parametricity languages employ idea subtyping also called subtype polymorphism inclusion polymorphism restrict range types used particular case polymorphism languages subtyping allows function written take object certain type also work correctly passed object belongs type subtype according liskov substitution principle type relation sometimes written conversely said supertype —written subtype polymorphism usually resolved dynamically see following example make cats dogs subtypes animals procedure codice_2 accepts animal also work correctly subtype passed another example number rational integer types number rational number integer function written take number work equally well passed integer rational passed number actual type object hidden clients black box accessed via object identity fact number type abstract may even possible get hands object whose most-derived type number see abstract data type abstract class particular kind type hierarchy known—especially context scheme programming language—as numerical tower usually contains many types object-oriented programming languages offer subtype polymorphism using subclassing also known inheritance typical implementations class contains called virtual table —a table functions implement polymorphic part class interface—and object contains pointer vtable class consulted whenever polymorphic method called mechanism example goes popular object systems however common lisp object system provide multiple dispatch method calls polymorphic arguments interaction parametric polymorphism subtyping leads concepts variance bounded quantification row polymorphism similar distinct concept subtyping deals structural types allows usage values whose types certain properties without losing remaining type information related concept polytypism data type genericity polytypic function general polymorphic function though one provide fixed ad hoc cases specific data types ad hoc combinator absent polymorphism distinguished implementation selected statically compile time dynamically run time typically via virtual function known respectively static dispatch dynamic dispatch corresponding forms polymorphism accordingly called static polymorphism dynamic polymorphism static polymorphism executes faster dynamic dispatch overhead requires additional compiler support static polymorphism allows greater static analysis compilers notably optimization source code analysis tools human readers programmers dynamic polymorphism flexible slower—for example dynamic polymorphism allows duck typing dynamically linked library may operate objects without knowing full type static polymorphism typically occurs ad hoc polymorphism parametric polymorphism whereas dynamic polymorphism usual subtype polymorphism however possible achieve static polymorphism subtyping sophisticated use template metaprogramming namely curiously recurring template pattern
[ 9345, 386, 8324, 10246, 655, 9875, 3733, 9877, 5783, 11674, 9755, 10011, 5917, 11679, 10145, 3876, 5796, 5885, 9002, 7851, 1591, 4155, 1724, 8251, 6718, 3263, 9535, 11327, 2115, 8262, 6087, 10568, 2505, 8524, 5456, 7889, 5074, 7386, 4572, ...
Train
11,575
3
Super_Hydlide:super hydlide super hydlide action role-playing game sega genesis/mega drive originally released 1987 japan title msx msx2 nec pc-88 ports also released nintendo famicom sharp x68000 game developed hydlide series veterans e soft released worldwide sega genesis mega drive october 6 1989 japan early 1990 united states 1991 europe remake evidences substantial graphical upgrades original hydlide 3 though gameplay remains largely identical release called hollo fighter sega advertising material one first third party published titles released u.s air diver many years events hydlide ii explosion flames appeared near city woods enemies everywhere young man chosen find source evil game incorporates 'good/evil character morality/alignment system like predecessor 1985 player morality meter aligned either justice normal evil game good evil monsters evil monsters attack player character sight good monsters attack player character attacks first killing monster good evil results reward experience points money occasionally piece equipment however player kills good monster points lost statistic called mf moral fiber player mf stat drops zero frequent traps appear across world player manages keep 100 rewards appear form random items found around fairyland unlike hydlide ii however morality meter longer affects way townsfolk react player game also features in-game clock setting day-night cycles character must eat two times day sleep regularly characters stay late fail eat regularly hp attack power gradually drop every item game including money weight total weight items player character carries exceeds load capacity lc move slowly game uses cut scenes opening ending sequences combat system similar ys choice four distinct character classes wide variety equipment spells citing varied experiences offered different playable characters morality system inclusion four save slots gamepro concluded altogether super hydlide lively cart draws epic adventure computer video games scored 81 stating like phantasy star ii huge role-playing game tough game requiring much brain-work criticized graphics sound said job gameplay fairly engrossing concluded arcade fans find lack action rather dull like games steady pace tons puzzles love 2007 alex lucard diehard gamefan listed super hydlide number 27 list top 30 rpgs cited realism instilled gameplay mechanics encumbrance system banks 24-hour clock need eat sleep described game morrowind morrowind production scalebound platinumgames director hideki kamiya said inspired hydlide 3 pc-8801 well sorcerian said hydlide 3 one first games played pc inspirational really hardcore game design one consoles time
[ 9658, 10931, 6077, 9006 ]
Test
11,576
4
StankDawg:stankdawg david blake born 1971 also known stankdawg founder hacking group digital dawgpound ddp long-time member hacking community known regular presenter multiple hacking conferences best known creator binary revolution initiative including founding host producer binary revolution radio long-running weekly internet radio show ran 200 episodes 2003 2007 blake born newport news virginia september 13 1971 received aas associates applied sciences degree university kentucky 1992 bs computer science florida atlantic university well ceh certificate presently lives works computer programmer/analyst orlando florida blake member international high iq society stankdawg staff writer well-known hacker periodical well now-defunct blacklisted 411 magazine also contributing writer several independent zines outbreak frequency radical future frequent co-host default radio regular radio freek america appeared gameradio infonomicon mindwar phreak phactor hpr hacker public radio presented technology conferences def con h.o.p.e. interz0ne outspoken many topics many gotten negative feedback different sources controversial article entitled hacking google adwords defcon13 drew criticism people jason calacanis among others presentation fifth h.o.p.e conference drew surprise as/400 community stankdawg appeared subject television show extreme animal planet demonstrated vulnerabilities wireless internet connections blake chose handle stankdawg college started local hacking group became known digital dawgpound digital dawgpound commonly referred ddp group hackers best known series articles hacker magazines make long-running webcast binary revolution radio active set forums posts high-profile hackers strom carlson decoder phiber optik many stated mission ddp propagate positive image hackers negative mass media stereotype group welcomes new members want learn hacking attempts teach positive aspects steer away negative aspects reinforcing hacker ethic goal show hackers regularly make positive contributions technology society whole ddp founded named stankdawg stated reasons made many friends hacking scene thought would useful everyone begin working together organized fashion motivated fact well-known hacker groups 1980s accomplished great things hacking world lod mod 1988 junior high school stankdawg came name way sweet 16 computer programming competition jokingly referred teammates digital dawgpound stankdawg lurked shadows hacking world many years throughout college many different pseudonyms 1997 popped head public began becoming active irc many smaller hacking forums saw people thought insanely brilliant individuals seemed mindset positive attitude towards hacking decided approach couple see anyone would interested forming group working together always huge emphasis technical competence variety also strength character integrity team mix hackers programmers phone phreakers security professionals artists experience multiple programming languages operating systems ddp members good programmers hackers importantly good people 1999 ddp first official members partnership creativity flowed ddp communicated worked together stankdawg personal site open anyone wanted join fun stankdawg never comfortable fact name domain many people coming site coming articles presentations really appreciating great contributions community members around 2002 watching web site grow quickly decided new community needed created like-minded hackers gathering start biggest ddp project called binary revolution attempt starting true community hackers site grew ddp roster years ddp membership included several staff writers blacklisted 411 magazine including stankdawg bland_inquisitor frequently publish articles provide content appear many media sources across global interweb ddp members also regular speakers hacking conferences def con h.o.p.e. interzone notacon many smaller regional cons ddp members hold memberships mensa international high iq society stankdawg proud diversity team spoken many times binary revolution radio members coasts united states europe even members jamaica brazil many countries ddp maintains blog refer blawg obviously play intentionally misspelled word dawg posts ddp members featured technology-related sites make magazine hackaday hacked gadgets others 2003 stankdawg moved forums personal site new site part project called binary revolution considered movement towards positive hacking community binary revolution best known ddp projects commonly referred simply binrev project created attempt bring hacking community back together working towards common positive goal reclaiming name hackers binary revolution emphasizes positive aspects hacking projects help society variety outlets including monthly meetings weekly radio show binary revolution radio brr video-based series shows called hacktv active message board forums binrev radio show forums although certainly well-known projects actually composed many parts binary revolution radio often shortened brr one part binrev community started hosted blake 2003 featured different co-hosts week covered different aspects hacker culture computer security broadcast via internet stream usually prerecorded florida weekend edited released following tuesday ddp hack radio stream 9:30pm est topics included phreaking identity theft cryptography operating systems programming languages free open source software wi-fi bluetooth social engineering cyberculture information various hacker conventions phreaknic shmoocon h.o.p.e. def con july 2005 blake announced going take break third season show produced black ratchet strom carlson frequent co-hosts blake run time hosted program format rotated standard prerecorded format live format included phone calls listeners blake returned show may 2006 maintained prerecorded format brought community input show bringing members binary revolution community first episode fourth season brr first ever broadcast front live audience hope 6 convention new york city june 2006 final episode 200 took place october 30 2007 marathon episode clocked 7 hours 12 minutes forums grew many posts people looking others area hacker meetings exist approachable reason places meetings sparse information binary revolution meetings started answer problems place forum members get together binrev meetings offer free web hosting meetings help organize meetings keep communications alive help projects grow meetings large cities like chicago orlando others small towns anyone start binrev meeting asking binrev forums brnet official irc network binary revolution active hours day contains general binrev channel also contains many channels specific productive discussion middle 2003 released internet video show entitled hacktv first internet television show hacking grown series several different shows released irregularly since episodes filmed stankdawg south florida lived time wanted show appear professional terms quality made cooperating internet difficult sharing large video files difficult encoded video caused editing problems quality concerns original show released full-length 30 minute episodes also problem since difficult get enough material full-length episodes also content related hacking fringe level stankdawg feel appropriate include show led ideas light difficulties putting together full hacktv original show attempt make show accessible community contributions stankdawg launched new series less focused format video quality focused content ease participation series titled hacktv underground htv u short series allowed anyone contribute content format length video quality allowed people film things basic cameraphone quality video way get content one episode hacktv u used g4techtv show called torrent series hacktv prank style show similar popular punk 'd show mtv time even logo obvious parody punk 'd logo series contains pranks mostly took place conferences also open social engineering light-hearted content docdroppers project community project create centralized place store hacking articles information still maintaining formatting readability old ascii text files existed scattered across internet come go quickly difficult find usually formatted basics sometimes difficult read docdroppers allows users submit articles centralized place searchable easily maintained easy read reference recently project grown include encyclopedia style entries many hacking topics many deleted sites wikipedia caused docdroppers include section hacker history culture among content projects stankdawg directly involved creating/maintaining addition ones mentioned links mentioned referred entry
[ 357, 8262, 7983, 2261, 10270, 4956, 5373, 2558, 8575 ]
Validation
11,577
4
Palo_Alto_Networks:palo alto networks palo alto networks inc. nyse panw american multinational cybersecurity company headquarters santa clara california core products platform includes advanced firewalls cloud-based offerings extend firewalls cover aspects security company serves 60,000 organizations 150 countries including 85 fortune 100 home unit 42 threat research team hosts ignite cybersecurity conference company mission statement protect way life digital age preventing successful cyberattacks palo alto networks listed 8th forbes digital 100 june 2018 former google softbank executive nikesh arora joined company chairman ceo palo alto networks founded 2005 israeli-american nir zuk former engineer check point netscreen technologies principal developer first stateful inspection firewall first intrusion prevention system asked started palo alto networks zuk cited objective solving problem enterprises facing existing network security solutions inability safely enable employees use modern applications entailed developing firewall could identify provide fine-grained control applications 2007 company produced shipped first product advanced enterprise firewall branded world first next-generation firewall 2009 gartner released publication defining next-generation firewall contrast traditional firewalls time relied simple rules port numbers protocol block traffic authors stated next-generation firewalls operate inspect layers network stack intelligent enough block threats independently port numbers protocols used particular publication defined next-generation firewall containing addition full capabilities traditional firewalls intrusion prevention systems support in-line deployment without disrupting network operations application awareness full stack visibility allowing fine-grained detection control applications extra-firewall intelligence upgrade paths starting 2011 gartner began listing palo alto networks leader enterprise firewall magic quadrant company debuted nyse july 20 2012 raising 260 million initial public offering 4th-largest tech ipo 2012 2014 palo alto networks founded cyber threat alliance fortinet mcafee symantec not-for-profit organization goal improving cybersecurity greater good encouraging collaboration cybersecurity organizations sharing cyber threat intelligence amongst members 2018 organization 20 members including cisco check point juniper networks sophos company expanded significantly years offering wide selection enterprise cybersecurity services beyond original next-generation firewall offering traps endpoint protection wildfire malware prevention 2017 palo alto networks announced logging service cloud-based service allowing customers amass data machine learning data analytics 2018 company began opening dedicated cybersecurity training facilities around world part global cyber range initiative may 2018 company announced application framework open cloud-delivered ecosystem developers publish security services saas applications instantly delivered company network customers 2018 several leaders high-profile tech companies moved palo alto networks june 2018 former google chief business officer softbank president nikesh arora joined company chairman ceo predecessor mark mclaughlin became vice chairman board directors arora received pay package worth 128 million making one highest paid executives united states september 2018 liane hornsey formerly chief people officer uber joined palo alto networks chief people officer october 2018 amit singh formerly president google cloud succeeded mark anderson president palo alto networks 2019 company announced k2-series 5g-ready next-generation firewall developed service providers 5g iot requirements mind february 2019 company announced cortex ai-based continuous security platform ceo nikesh arora described cortex application framework 2.0 references application framework replaced cortex palo alto networks website palo alto networks offers enterprise cybersecurity platform provides network security cloud security endpoint protection various cloud-delivered security services components security platform listed palo alto networks website include unit 42 palo alto networks threat intelligence team group cybersecurity researchers industry experts use data collected company security platform discover new cyber threats new forms malware malicious actors operating across world group runs popular blog post technical reports analyzing active threats adversaries multiple unit 42 researchers named msrc top 100 microsoft annual ranking top 100 security researchers according fbi palo alto networks unit 42 helped solve multiple cybercrime cases mirai botnet clickfraud botnet cases luminositylink rat case assisted “ operation wire-wire 2018 unit 42 discovered gorgon hacking group believed operating pakistan targeting government organizations united kingdom spain russia united states group detected sending spear-phishing emails attached infected microsoft word documents using exploit commonly used cybercriminals cyber-espionage campaigns september 2018 unit 42 discovered xbash ransomware also performs cryptomining believed tied chinese threat actor iron xbash able propagate like worm deletes databases stored victim hosts october unit 42 warned new cryptomining malware xmrig comes bundled infected adobe flash updates malware uses victim computer resources mine monero cryptocurrency november 2018 palo alto networks announced discovery cannon trojan used target united states european government entities hackers behind malware believed fancy bear russian hacking group believed responsible hacking democratic national committee 2016 malware communicates command control server email uses encryption evade detection
[ 1792, 2049, 4480, 2563, 10756, 1935, 1299, 1172, 3732, 11542, 9496, 3482, 2041, 4511, 6431, 10531, 164, 550, 8998, 10790, 2425, 939, 1708, 3243, 3629, 3885, 10745, 8753, 1970, 10291, 569, 9279, 5057, 1858, 10433, 708, 11073, 2118, 4814, 9...
Test
11,578
8
Click_analytics:click analytics click analytics special type web analytics gives special attention clicks point-and-click constitute first stage conversion funnel commonly click analytics focuses on-site analytics editor web site uses click analytics determine performance particular site regards users site clicking also click analytics may happen real-time unreal -time depending type information sought typically frontpage editors high-traffic news media sites want monitor pages real-time optimize content editors designers types stakeholders may analyze clicks wider time frame aid assess performance writers design elements advertisements etc data clicks may gathered least two ways ideally click logged occurs method requires functionality picks relevant information event occurs alternatively one may institute assumption page view result click therefore log simulated click lead page view
[ 6576, 8914, 4167, 1943 ]
Test
11,579
5
Ad_Hoc_Configuration_Protocol:ad hoc configuration protocol ad hoc configuration protocol ahcp autoconfiguration protocol ipv6 dual-stack ipv6/ipv4 networks designed used place router discovery dhcp networks difficult impossible configure server within every link-layer broadcast domain example mobile ad-hoc networks ahcp automatically configure ipv4 ipv6 addresses name servers ntp servers configure default routes since designed run together routing protocol babel olsr external links
[ 2887, 10344, 686, 5469, 5470 ]
None
11,580
3
MCST-R2000:mcst-r2000 mcst r2000 64-bit microprocessor developed moscow center sparc technologies mcst fabricated tsmc
[ 4386, 6659, 7234, 2503, 7687, 6957, 5358, 1776, 1425, 499, 10675, 1399, 2490, 2523, 9309, 6815 ]
Test
11,581
4
Retrospect_(software):retrospect software retrospect family software applications back computers running macos microsoft windows linux 2019 classic mac os operating systems uses client–server backup model means must backup server application running one computer small-footprint client applications running computers backed either single platform mixed platform network destination may tape drive hard disk drive cloud drive company backup server application requires macos windows versions client application run linux or—until 2019—classic mac os product used gui-scripted backup mixed-platform networks primarily small medium-sized businesses software first developed dantz development corporation 1989 initially macintosh platform later windows sales split evenly two variants macintosh variant claiming 90 market dantz development corporation acquired emc corporation 2004 2006 version 7.5 refined first release windows variant emc added performance features needed smes 2009 emc indicated intention add updated user interface separate administration console similar newly released macintosh variant version 8.0 mandatory windows security settings starting windows vista/server 2008 subsequently forbade ui interaction application auto-launched task meanwhile macintosh variant languished emc—with temporary end-of-lifing development revived 2008 emc hired back former engineers —including ex-dantz ones resulted premature release version 8.0 retrospect macintosh temporarily missing key operational features even though added performance features retrospect windows 7.5 may 2010 software sold roxio/sonic solutions 2011 following purchase sonic solutions rovi development software turned privately held company since 2012 retrospect inc. continued sell two variants backup server software nearly identical non-gui code operate differently retrospect windows substitutes view-only dashboard upgraded 2019 web-based management console—with optional deployment shared scripts retrospect macintosh separate administration console basically keeps pre-2009 terminology gui june 2019 holding company storcentric—which also owns drobo—announced acquired retrospect inc. operate independent subsidiary integrating version software drobo hardware retrospect also supports several enterprise client-server backup features include retrospect sold varying backup server capability levels called editions non-expiring license–code prices cover one major version edition dictated number server os computers backed turn specifies maximum number client computers desktop edition used desktop mobile computers linux servers backed non-multithreaded older major versions non-tape devices one non-autoloader tape drive solo edition protects single non-server computer external hard drives add-ons activate additional backup server features via edition-linked license codes may also purchased
[ 2051, 4490, 2571, 6797, 4623, 2193, 11030, 9762, 3366, 11178, 9901, 2095, 7983, 823, 11581, 576, 11201, 1358, 6993, 8404, 10711, 7905, 3692, 8446 ]
None
11,582
9
JSR_250:jsr 250 jsr 250 java specification request objective develop annotations information software program part program common semantic concepts java se java ee platforms apply across variety individual technologies envisioned various jsrs would use annotations enable declarative style programming would especially valuable consistency within java ee component jsrs also valuable allow consistency java ee java se jsr 250 java specification request objective define set annotations address common semantic concepts therefore used many java ee java se components avoid redundant annotations across components jsr 250 released 11 may 2006 declarative annotation-driven configuration used java frameworks applications e.g spring makes components framework configurable via annotations importance jsr 250 likely increase future jsr 250 depends jsr 175 therefore also java se 5.0 non-java ee jsr 250 annotations added java se version 6 generated postconstruct predestroy resource resources located package
[ 9988, 3341, 10526, 10020, 6067, 2106, 3517, 6334, 3518, 3008, 1095, 3278, 3920, 4959, 4960, 993, 3558, 1128, 3560, 9834, 3954 ]
None
11,583
4
Virut:virut virut cybercrime malware botnet operating least since 2006 one major botnets malware distributors internet january 2013 operations disrupted polish organization naukowa akademicka sieć komputerowa virut malware botnet known used cybercrime activities ddos attacks spam collaboration waledac botnet fraud data theft pay-per-install activities spreads executable file infection infected usb sticks media recently compromised html files thus infecting vulnerable browsers visiting compromised websites infected computers associated least 890,000 ip addresses poland 2012 symantec estimated botnet control 300,000 computers worldwide primarily egypt pakistan southeast asia including india kaspersky report listed virut fifth-most widespread threat third quarter 2012 responsible 5.5 computer infections virut botnet active since least 2006 17 january 2013 polish research development organization data networks operator operator polish .pl top-level domain registry naukowa akademicka sieć komputerowa nask took twenty three domains used virut attempt shut nask spokesperson stated first time nask engaged operation taking domains owing major threat virut botnet posed internet likely virut shut completely control servers located russian .ru top-level domain name registrars outside reach polish nask botnet able look alternate backup hosts enabling criminals operating reestablish control network
[ 3072, 7809, 10756, 2953, 3724, 3347, 4883, 2325, 278, 3867, 9630, 10657, 4648, 939, 7851, 46, 1337, 10297, 3643, 1979, 7739, 7996, 9664, 9154, 8133, 10952, 2508, 81, 4945, 8789, 8664, 10457, 7515, 988, 3807, 8032, 9569, 3941, 10477, 4462,...
None
11,584
4
Code_signing:code signing code signing process digitally signing executables scripts confirm software author guarantee code altered corrupted since signed process employs use cryptographic hash validate authenticity integrity code signing provide several valuable features common use code signing provide security deploying programming languages also used help prevent namespace conflicts almost every code signing implementation provide sort digital signature mechanism verify identity author build system checksum verify object modified also used provide versioning information object store meta data object efficacy code signing authentication mechanism software depends security underpinning signing keys public key infrastructure pki technologies integrity system relies publishers securing private keys unauthorized access keys stored software general-purpose computers susceptible compromise therefore secure best practice store keys secure tamper-proof cryptographic hardware devices known hardware security modules hsms many code signing implementations provide way sign code using system involving pair keys one public one private similar process employed tls ssh example case .net developer uses private key sign libraries executables time build key unique developer group sometimes per application object developer either generate key obtain one trusted certificate authority ca code signing particularly valuable distributed environments source given piece code may immediately evident example java applets activex controls active web browser scripting code another important usage safely provide updates patches existing software windows mac os x linux distributions provide updates using code signing ensure possible others maliciously distribute code via patch system allows receiving operating system verify update legitimate even update delivered third parties physical media disks code signing used windows mac os x authenticate software first run ensuring software maliciously tampered third-party distributor download site form code signing used linux platform decentralized nature package manager predominant mode distribution forms software updates patches well open-source model allowing direct inspection source code desired debian-based linux distributions among others validate downloaded packages using public key cryptography public key used authenticate code signature traceable back trusted root authority ca preferably using secure public key infrastructure pki ensure code trusted comes stated source explicitly particular private key ca provides root trust level able assign trust others proxy user trusts ca user presumably trust legitimacy code signed key generated ca one proxies many operating systems frameworks contain built-in trust one existing cas entrust datacard verisign/symantec digicert comodo godaddy globalsign also commonplace large organizations implement private ca internal organization provides features public cas trusted within organization model developers choose provide self-generated key scenario user would normally obtain public key fashion directly developer verify object first time many code signing systems store public key inside signature software frameworks oss check code signature executing allow choose trust developer point first run application developer provide similar system including public keys installer key used ensure subsequent objects need run upgrades plugins another application verified coming developer time-stamping designed circumvent trust warning appear case expired certificate effect time-stamping extends code trust beyond validity period certificate event certificate revoked due compromise specific date time compromising event become part revocation record case time-stamping helps establish whether code signed certificate compromised developers need sign ios tvos apps running real device uploading app store needed prove developer owns valid apple developer id application needs valid profile certificate run devices like security measure code signing defeated users tricked running unsigned code even running code refuses validate system remains secure long private key remains private also important note code signing protect end user malicious activity unintentional software bugs software author — merely ensures software modified anyone author sometimes sandbox systems accept certificates false time-stamp excess usage ram ibm lotus notes pki signing code release 1 client server software execution control lists control levels access data environment file system permitted given users individual design elements including active items scripts actions agents always signed using editor id file includes editor domain public keys core templates mail template signed dedicated id held lotus template development team microsoft implements form code signing based authenticode provided microsoft tested drivers since drivers run kernel destabilize system open system security holes reason microsoft tests drivers submitted whql program driver passed microsoft signs version driver safe 32-bit systems installing drivers validated microsoft possible accepting allow installation prompt warning user code unsigned .net managed code additional mechanism called strong name signing uses public/private keys sha-1 hash opposed certificates however microsoft discourages reliance strong name signing replacement authenticode context consumer devices games consoles unsigned code often used refer application signed cryptographic key normally required software accepted executed console games signed secret key designed console maker game load console several methods get unsigned code execute include software exploits use modchip technique known swap trick running softmod may initially seem obvious simply copying signed application onto another dvd allow boot xbox reason xbox executable file xbe contains media-type flag specifies type media xbe bootable nearly xbox software set executable boot factory produced discs simply copying executable burnable media enough stop execution software however since executable signed simply changing value flag possible alters signature executable causing fail validation checked proliferation connected devices required ability identify authenticate devices ability applies area internet things iot iot requires devices trusted iot code signing software release process ensures integrity iot device software firmware updates defends risks associated tampering device code embedded device credentialing enables control manufacturing process high technology products protects unauthorized production counterfeits together code signing technology ensures physical authenticity authenticity integrity code possess time manufacture use digital birth certificate subsequent upgrades code validation time product lifecycle creating new dimension code signing elevating security awareness need maintain private signing keys secured within dedicated protected environment establish root trust entire system given prevalence malware advanced persistent threats apts many software vendors providers online services enterprise organizations manufacturers high-technology iot devices pressure increase security high technology manufacturing code signing process
[ 3843, 5764, 517, 9221, 9732, 6411, 9356, 6797, 9744, 3473, 5138, 8865, 8615, 6954, 10026, 9780, 10036, 1337, 9791, 576, 3779, 10566, 5067, 1103, 2383, 10831, 11605, 6488, 5465, 91, 4957, 9437, 9569, 10341, 9063, 10221, 10478, 3958, 5117 ]
Test
11,585
3
Brooks's_law:brooks law brooks law observation software project management according adding human resources late software project makes later coined fred brooks 1975 book mythical man-month according brooks incremental person added project makes take less time similar general law diminishing returns economics according brooks law outrageous oversimplification captures general rule brooks points main factors explain works way key points brooks law allow exceptions open door possible solutions first point note brooks law applies projects already late projects brought back kept control people added earlier process also important determine project really late schedule originally overly optimistic scheduling mistakes account large number late projects correcting schedule best way meaningful reliable time frame project completion quantity quality role people added project also must taken consideration one simple way circumvent law overrun project add people needed way extra capacity compensates training communication overhead good programmers specialists added less overhead training people added tasks related project example quality assurance documentation given task clear ramp time minimized modern practices continuous integration test-driven development iterative development significantly reduce inter-developer communication overhead thus allow better scalability new tools software development documentation also help minimize ramp time making simpler new programmers get involved work design patterns simplify distribution work entire team part within framework provided pattern design pattern defines rules programmers follow simplifies communication use standard language provides consistency scalability finally good segmentation helps minimizing communication overhead team members smaller sub-problems solved smaller team top-level team responsible systems integration method work segmentation problem must done correctly first place done incorrectly make problem worse better impeding communication programmers working parts problem actually closely coupled even project plan decreed way finish project invert brooks law bermuda plan 90 developers removed send bermuda remaining 10 complete software
[]
Validation