node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
11,586
1
Iraqi_Legal_Database:iraqi legal database iraqi legal database ild first comprehensive electronic legal database created arab region project create ild launched 2004 united nations development programme undp programme governance arab region pogar implemented coordination higher judicial council objective behind project make entire corpus iraqi law available judges lawyers academics lawmakers individuals institutions rely legal knowledge single freely accessible source keeping objective ild published online september 2008 makes available users 27,433 legal texts altogether including 7,136 laws 4,265 ministerial instructions 3,268 regulations 5,029 declarations etc. say every single iraqi legal text passed since 1917 ild entirely free-of-charge require users subscribe way iraq country office united nations development programme source funding ild ild available arabic iraqi law translated language systematic manner therefore legal researchers jurists interested iraqi law must carry research arabic non-arabic speaking researchers interested learning ild ’ features may download following powerpoint presentation illustrates translates english ild ’ various functions project originally designed implemented three phases
[ 2901 ]
None
11,587
2
MAX_(operating_system):max operating system max linux distribution sponsored office education autonomous community madrid spain max stands madrid linux used based ubuntu last release max 10 based ubuntu 16.04 lts xenial xerus since 2003 max installed computers schools community madrid max educational linux large set instructive programs addition usual desktop programs max supports common desktop environments max 10 mate installed default main features simplicity stability huge collection software max comes live dvd installable system usb version changelog http //ftp.rediris.es/mirror/max-linux/maxdesktop/max7.5/cambios.txt educamadrid web site
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920, 8177, ...
Test
11,588
4
Open_Mobile_Terminal_Platform:open mobile terminal platform open mobile terminal platform omtp forum created mobile network operators discuss standards manufacturers mobile phones mobile devices lifetime omtp included manufacturers huawei lg electronics motorola nokia samsung sony ericsson omtp originally set leading mobile operators time transitioned wholesale applications community end june 2010 nine full members deutsche telekom ag kt orange smart communications telecom italia telefónica telenor vodafone omtp also support two sponsors ericsson nokia omtp recommendations hugely helped standardise mobile operator terminal requirements work gone towards helping defragment deoptionalise operators recommendations omtp ’ focus gathering driving mobile terminal requirements publishing findings recommendations omtp technology neutral recommendations intended deployment across range technology platforms operating systems os middleware layers omtp perhaps best known work field mobile security work encompassed full range mobile device capabilities omtp published recommendations 2007 early 2008 areas positioning enablers advanced device management ims mobile voip later advanced trusted environment omtp tr1 supporting document 'security threats embedded consumer devices released endorsement uk home secretary jacqui smith omtp also published requirements document addressing support advanced sim cards document defines also advanced profiles smart card web server high speed protocol mobile tv contactless omtp also made significant progress getting support use micro-usb standard connector data power full list recommendations found http //www.gsma.com/newsroom/technical-documents/omtp-documents/ 2008 omtp launched new initiative called bondi named australian beach initiative defined new interfaces javascript apis security framework based xacml policy description enable access mobile phone functionalities application invocation application settings camera communications log gallery location messaging persistent data personal information phone status user interaction browser widget engine secure way bondi initiative also open source reference implementation https //web.archive.org/web/20130509121758/https //web.archive.org/web/20130509121758/http //bondi.omtp.org// approved release 1.0 bondi issued june 2009 open source project comprehensive bondi sdk started http //bondisdk.org february 2009 omtp expanded local connectivity specification based micro-usb describe requirements common charger common connector enable sharing battery charger different phones omtp common charging local data connectivity adopted gsm association universal charging system ucs initiative endorsed ctia itu june 2009 european commission reached agreement several major mobile phone providers requirements common external power supply eps compatible new data-enabled phones sold european union eps shares key attributes ucs charger june 2010 omtp transitioned new wholesale applications community omtp activities ceased time either taken within wac organisation standards industry associations turn july 2012 wac closed omtp standards transferred gsma assets personnel transferring apigee
[ 7936, 3462, 424, 1740, 9356, 10303, 5404, 2013, 9311 ]
None
11,589
9
Mutator_method:mutator method computer science mutator method method used control changes variable also widely known setter methods often setter accompanied getter also known accessor returns value private member variable mutator method often used object-oriented programming keeping principle encapsulation according principle member variables class made private hide protect code modified public member function mutator method takes desired new value parameter optionally validates modifies private member variable mutator methods compared assignment operator overloading typically appear different levels object hierarchy mutator methods may also used non-object-oriented environments case reference variable modified passed mutator along new value scenario compiler restrict code bypassing mutator method changing variable directly onus falls developers ensure variable modified mutator method modified directly programming languages support properties offer convenient alternative without giving utility encapsulation examples fully implemented mutator method also validate input data take action triggering event alternative defining mutator accessor methods property blocks give instance variable visibility private access directly outside objects much finer control access rights defined using mutators accessors example parameter may made read-only simply defining accessor mutator visibility two methods may different often useful accessor public mutator remains protected package-private internal block mutator defined provides opportunity validation preprocessing incoming data external access guaranteed come mutator steps bypassed example date represented separate private codice_1 codice_2 codice_3 variables incoming dates split codice_4 mutator consistency private instance variables accessed codice_5 codice_6 cases month values outside 1 12 rejected code accessors conversely allow synthesis useful data representations internal variables keeping structure encapsulated hidden outside modules monetary codice_7 accessor may build string numeric variable number decimal places defined hidden codice_8 parameter modern programming languages often offer ability generate boilerplate mutators accessors single line—as example c codice_9 ruby codice_10 cases code blocks created validation preprocessing synthesis simplified accessors still retain advantage encapsulation simple public instance variables common system designs progress software maintained requirements change demands data become sophisticated many automatic mutators accessors eventually get replaced separate blocks code benefit automatically creating early days implementation public interface class remains identical whether greater sophistication added requiring extensive refactoring manipulation parameters mutators accessors inside class defined often requires additional thought early days implementation little additional code blocks makes difference private instance variable accessed directly validation cross-validation data integrity checks preprocessing sophistication added subtle bugs may appear internal access makes use newer code places bypassed accessor functions less efficient directly fetching storing data fields due extra steps involved however functions often inlined eliminates overhead function call file student.h file student.c file main.c file makefile file student.h file student.cpp example illustrates c idea properties special type class member unlike java explicit methods defined public 'property contains logic handle actions note use built-in undeclared variable codice_11 later c versions .net framework 3.5 example may abbreviated follows without declaring private variable codice_12 using abbreviated syntax means underlying variable longer available inside class result codice_13 portion property must present assignment access restricted codice_13-specific access modifier common lisp object system slot specifications within class definitions may specify codice_15 codice_16 codice_17 options even multiple times define reader methods setter methods accessor methods reader method respective codice_18 method slots always directly accessible names use codice_19 codice_20 slot accessor options define specialized methods use codice_20 clos notion properties although metaobject protocol extension specifies means access slot reader writer function names including ones generated codice_17 option following example shows definition student class using slot options direct slot access defmethod student-age self student defmethod setf student-age new-age self student defmethod set-student-number new-number self student supports getter setter function syntax version 2 language getter setter class/struct methods codice_23 attribute codice_24 instance used like simple class delphi language illustrates concept public property access private field example simple class representing student name stored one see variable name private i.e visible student class setter getter public namely codice_25 codice_26 methods example constructor-function codice_24 used create objects representing student name stored non-standard use prototypes inheritance ecma-6 without using prototypes ecma-6 using defineproperty using traditional objective-c 1.0 syntax manual reference counting one working gnustep ubuntu 12.04 using newer objective-c 2.0 syntax used mac os x 10.6 ios 4 xcode 3.2 generating code described starting os x 10.8 ios 6 using xcode 4.4 syntax even simplified using class :accessor using moose object system example simple class representing student name stored one see variable name private i.e visible student class setter getter public namely codice_25 codice_29 methods example uses python class one variable getter setter racket object system way organize code comes addition modules units rest language object system first-class values lexical scope used control access objects methods struct definitions alternative way define new types values mutators present explicitly required ruby individual accessor mutator methods may defined metaprogramming constructs codice_30 codice_31 may used declare private variable class provide either read-only read-write public access respectively defining individual accessor mutator methods creates space pre-processing validation data read-only simple public access implied codice_32 variable read-write simple public access implied codice_32 variable example illustrates vb.net idea properties used classes similar c explicit use codice_34 codice_35 methods vb.net 2010 auto implemented properties utilized create property without use get set syntax note hidden variable created compiler called codice_36 correspond property codice_12 using another variable within class named codice_36 would result error privileged access underlying variable available within class
[ 2048, 3076, 10980, 11430, 7273, 522, 2666, 3948, 5165, 10478, 6160, 2737, 7292, 8304, 1973, 9877, 2556, 9245 ]
Validation
11,590
7
Google_Drawings:google drawings google drawings free web-based diagramming software developed google allows users collaborate work together real time create flowcharts organisational charts website wireframes mind maps concept maps types diagrams google drawings also available chrome app works offline available chrome web store google drawings hosted within google drive files created application default saved google drive originally introduced april 12 2010 google docs drawings tool making drawings google docs google drawings allows multiple users open edit drawings simultaneously real time contains subset features google slides different templates users insert images local hard drive web well shapes arrows scribbles text google drawings set flow-chart symbols shapes dragged dropped place users move resize rotate objects use polylines line connectors also allows editing images including cropping applying masks adding borders features include laying drawings precisely alignment guides snapping grid auto-distribution drawings inserted google documents spreadsheets presentations also published online images downloaded standard formats jpeg svg png pdf
[ 4096, 1409, 4995, 5892, 8455, 7816, 9610, 5262, 8719, 3600, 6800, 5522, 1427, 5524, 7700, 10645, 11408, 10009, 8858, 1435, 9244, 10393, 798, 10525, 288, 7841, 2978, 4901, 1959, 3499, 7595, 10284, 3633, 1203, 5431, 2875, 10045, 7359, 196, ...
Test
11,591
5
Statistical_time-division_multiplexing:statistical time-division multiplexing statistical multiplexing type communication link sharing similar dynamic bandwidth allocation dba statistical multiplexing communication channel divided arbitrary number variable bitrate digital channels data streams link sharing adapted instantaneous traffic demands data streams transferred channel alternative creating fixed sharing link general time division multiplexing tdm frequency division multiplexing fdm performed correctly statistical multiplexing provide link utilization improvement called statistical multiplexing gain statistical multiplexing facilitated packet mode packet-oriented communication among others utilized packet switched computer networks stream divided packets normally delivered asynchronously first-come first-served fashion alternative fashion packets may delivered according scheduling discipline fair queuing differentiated and/or guaranteed quality service statistical multiplexing analog channel example wireless channel also facilitated following schemes statistical multiplexing normally implies on-demand service rather one preallocates resources data stream statistical multiplexing schemes control user data transmissions time domain statistical multiplexing packet mode communication similar time-division multiplexing tdm except rather assigning data stream recurrent time slot every tdm data stream assigned time slots fixed length data frames variable lengths often appear scheduled randomized order experience varying delay delay fixed tdm statistical multiplexing allows bandwidth divided arbitrarily among variable number channels number channels channel data rate fixed tdm statistical multiplexing ensures slots wasted whereas tdm waste slots transmission capacity link shared users packets static tdm circuit switching carried physical layer osi model tcp/ip model statistical multiplexing carried data link layer statistical multiplexing packet frame contains channel/data stream identification number case datagram communication complete destination address information examples statistical multiplexing digital audio video broadcasting example statistical multiplexer content aggregating device allows broadcasters provide greatest number audio video services given bandwidth sharing pool fixed bandwidth among multiple services streams varying bitrates multiplexer allocates service bandwidth required real-time needs services complex scenes receive bandwidth services less complex ones bandwidth sharing technique produces best video quality lowest possible aggregate bandwidth examples statistical multiplexers include rgb networks bnpxr product line harmonic inc. prostream electra vos product families motorola terayon dm6400 tmir
[ 3847, 9863, 2057, 2701, 1550, 11413, 2458, 5020, 5664, 7723, 10924, 11181, 1969, 2994, 7865, 7490, 8386, 3140, 5321, 7498, 2911, 3168, 7400, 2793, 2802, 2294 ]
Validation
11,592
7
Google_for_Education:google education google education service google provides independently customizable versions several google products using domain name provided customer features several web applications similar functionality traditional office suites including gmail hangouts google calendar drive docs sheets slides groups news play sites vault products also tie use chromebooks added g suite domain educational establishment google apps education google apps non-profits accredited 501 c 3 non-profit entities free offer amount storage google apps work accounts addition shared apps calendar docs etc google provides google apps marketplace app store google apps users contains various apps free paid installed customize google education experience user
[ 4995, 5892, 7816, 5262, 8719, 5524, 7700, 10645, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 1203, 5431, 7359, 196, 3269, 3782, 11590, 4683, 11343, 3664, 3795, 1240, 8413, 6367, 2658, 6632, 5483, 236, 9712, 9970, 8821, 3836 ]
None
11,593
2
IBM_RSCT:ibm rsct ibm reliable scalable cluster technology rsct set software components together provide comprehensive clustering environment aix linux solaris windows operating systems rsct infrastructure used variety ibm products provide clusters improved system availability scalability ease use follows list main rsct components management domains peer domains set nodes configured manageability monitoring called management domain cluster set nodes configured high availability called rsct peer domain cluster peer domain set nodes consistent knowledge existence resources shared among node within peer domain rmc depends core set cluster services include topology services group services cluster security services management domain set nodes resources managed monitored one nodes designated management control point mcp nodes considered managed nodes topology services group services used management domain order understand various rsct components used cluster aware nodes cluster configured manageability high availability
[ 3323, 5492 ]
None
11,594
4
Asset_(computer_security):asset computer security information security computer security network security asset data device component environment supports information-related activities assets generally include hardware e.g servers switches software e.g mission critical applications support systems confidential information assets protected illicit access use disclosure alteration destruction and/or theft resulting loss organization goal information security ensure confidentiality integrity availability assets various threats example hacker might attack system order steal credit card numbers exploiting vulnerability information security experts must assess likely impact attack employ appropriate countermeasures case might put firewall encrypt credit card numbers performing risk analysis important weigh much spend protecting asset cost losing asset also important take account chance loss occurring intangible costs must also factored hacker makes copy company credit card numbers cost anything directly loss fines reputation enormous
[ 1088, 3552, 612, 5636, 8998, 1479, 939, 7979, 5327, 11567, 3473, 4689, 2324, 3125, 1369, 5373, 2558 ]
Train
11,595
1
Bitcask:bitcask bitcask erlang application provides api storing retrieving key/value data log-structured hash table design owes lot principles found log-structured file systems draws inspiration number designs involve log file merging bitcask number advantages owing write-once append-only on-disk data-format use in-memory hash-table keys lookups bitcask keeps keys memory times system must enough memory contain entire keyspace addition operational components operating system file-system buffers
[ 6851, 5380, 5356, 7983, 19, 823, 9151 ]
Validation
11,596
3
IBM_System/38:ibm system/38 system/38 minicomputer midrange computer server platform manufactured sold ibm corporation system offered number innovative features brainchild frank soltis glenn henry ibm announced system/38 1978 developed code-name pacific made commercially available august 1979 system/38 oriented toward multi-user system environment typical system handled dozen several dozen terminals midrange predecessors system/38 included system/3 system/32 system/34 system/38 offered capacity previous system/34 system/38 chronologically preceded system/36 successor system/34 system/38 nearly called system/380 as/400 nearly called system/40 system/38 superseded as/400 also supported system/36 data programs fairly large extent exceptions as/400 primarily re-marketing system/38 updates operating system including luxurious non-trivial expansion source object names 8 new 10 characters maximum s/38 programs 'observability intact source code embedded within compiled binary executive expense larger compiled object sizes still run as/400 successor systems restore option incorporates recompile back-version source however proprietary vendor application libraries objects compiled without 'observability required original vendor replacement consequent expense upgrading as/400 pricing time tiered exact software priced based upon model speed capacity system installed upon as/400 evolved iseries turn evolved system although 'evolution include significant enhancements hardware operating system capabilities name change usually considered evolution marketing system/38 legacy lives enterprise-class ibm power systems series superseded system 2008 run ibm well aix linux contrast competing proprietary computing architectures early 1980s wang vs hewlett packard hp 3000 long discontinued without compatible upgrade path ibm 5381 system unit contained processor main memory disk storage diskette magazine drive system console keyboard display 5381 available model 100 model 200 ibm 5382 system unit physically identical 5381 powerful processors memory disk storage 5382 available models 300 400 500 600 700 hindsight system/38 architecture probably demanding hardware era first launched struggled overhead software operating system consumed almost 60 mb disk vast sum time leading wags suggest pre-announce code name series pacific actually acronym meaning performance ai n't critical function complete system included central processing unit 512k 768k 1024k 1280k 1536k bytes main storage included memory management unit supporting demand paging used system software implement single-level store architecture system/38 console included keyboard display screen 16 lines 64 characters inconsistent locally attached 5250 terminals either 12x40 24x80 depending model keyboard used system operator entering control language commands diskette magazine drive standard models operating system system/38 called cpf control program facility cpf related ssp operating system ibm system/34 system/36 cpf objects files programs message queues user profiles libraries system/38 also distinction first commercially available ibm midrange computer database management system dbms integrated operating system operational control language system/38 called cl control language cl programs similar concept shell scripts could compiled executed natively system/38 48-bit addressing unique time novel integrated database system system/38 also security built part architecture object library could access controlled user-by-user basis continued expanded throughout as/400 iseries computer lines system/38 descendants commercial computers ever use machine interface architecture isolate application software operating system hardware dependencies including details address size register size compilers system/38 successors generate code high-level instruction set originally called mi machine interface renamed timi technology independent machine interface as/400 mi/timi virtual instruction set instruction set underlying cpu unlike virtual-machine architectures virtual instructions interpreted runtime see p-code machine mi/timi instructions never interpreted constitute intermediate compile time step translated processor instruction set final compilation step mi/timi instructions stored within final program object addition executable machine instructions program moved processor one native instruction set processor another native instruction set mi/timi instructions re-translated native instruction set new machine program executed first time new machine result possible program originally developed system/38 run current ibm hardware without ever recompiled capability allowed as/400 migrate cisc complex instruction set computer risc reduced instruction set computer 1990s mi/timi instructions existed compiled program relatively simple re-translation created new program native new hardware 1986 system/38 announced support distributed data management architecture ddm middleware context distributed system software layer lies operating system applications distributed data management architecture defines environment sharing data enabled system/38 programs create manage access record-oriented files remote system/36 system/38 ibm mainframe systems running cics also allowed programs remote system/36 system/38 computers create manage access files system/38 languages supported system/38 included rpg iii cobol basic pl/i decades later software originally dismissed critics momentary aberration runs better ever many thousands modern iseries ibm/i systems within commercial government enterprises types sizes ibm sold estimated 20,000 system/38s within first five years availability according articles published industry magazines news 34/38 midrange computing although billed minicomputer s/38 much expensive ibm established best-selling system/34 replacement system/36 equal importance difficulty upgrading say system/34 s/38 although machines similarities twinax peripherals rpg programming languages reality different ibm tacitly acknowledged bringing system/36 – upgraded system/34 – launch s/38 marketplace ibm thus found three overlapping incompatible ranges system/34/36 system/38 mainframe /360 architecture system/38 originally designed replace digital equipment corporation time one ibm main competitors able exploit offering wide range products based single architecture ibm counter 9370 'baby mainframe commercial failure
[ 256, 2179, 7941, 2951, 2314, 10387, 7188, 11539, 6813, 3999, 1952, 290, 10146, 8868, 10413, 8751, 8502, 823, 7480, 1593, 1469, 10813, 4034, 4546, 964, 8262, 4424, 8136, 7884, 2638, 10835, 2901, 86, 728, 2399, 8551, 5483, 1776, 6128, 2804,...
Validation
11,597
7
Nebula_(company):nebula company nebula inc. hardware software company offices mountain view california seattle washington usa nebula developed nebula one cloud computing hardware appliance turned racks standard servers private cloud nebula one private cloud system built openstack open source cloud framework well many open source software projects nebula founded “ fourth paradigm development march 2011 former nasa ames research center chief technology officer chris c. kemp long-time colleague devin carlen entrepreneur steve o'hara software engineer tres henry formerly amazon web services author aws console named head user experience may 2011 nebula closed round series investment led kleiner perkins caufield byers highland capital partners participation google first three investors—andy bechtolsheim ram shriram david cheriton well investors summer 2012 eight members original anso labs acquired rackspace nasa team originally wrote components openstack project joined nebula fall 2012 nebula closed 25 million series b investment led comcast ventures highland capital google executive eric schmidt ’ venture fund innovation endeavors became investor february 2013 silicon india named kemp one ten pioneers cloud computing march 2013 nebula named one cio.com 10 hot cloud companies watch nebula one made generally available april 2 2013 april 1 2015 company announced website confirmed twitter ceasing operations
[ 7248, 4194, 3819 ]
Validation
11,598
4
FastBack:fastback fastback software application developed late 1980s early 1990s backing ibm pc macintosh computers originally written fifth generation systems inc company located baton rouge louisiana company wanted expand apple market purchased rebranded product touchstone software corporation original fastback unique industry able read computer hard drive write floppy drive simultaneously using full capability dual-channel dma chip found personal computers time combined compression techniques proprietary disk format got data floppy disk made fastback one fastest pc backup programs time 1984 fastback version 5.13 already market 1987 fastback plus 1.0 dos released version subsequent dos versions released unconditional guarantee harm resulting use software terms conditions guarantee contrasted industry norms 1991 fastback plus 3.02 dos released february 1992 company released fastback plus 1.0 windows written pcs running windows 3.0 fastback plus 2.0 included novell dos 7 1994 fastback ii bundled drive 2.4 provide read/write compatibility macintosh 3.5 floppy disk formats new york times wrote standard dos msbackup utility automatically awaken 3 a.m. make full backup onto quarter-inch cassette drive byte 1989 listed fastback plus among distinction winners byte awards stating hard drive recommend package
[ 576, 3841, 3366, 7847, 7983, 178 ]
Train
11,599
9
Tombstone_diagram:tombstone diagram computing tombstone diagrams t-diagrams consist set “ puzzle pieces ” representing compilers related language processing programs used illustrate reason transformations source language left target language right realised implementation language bottom commonly found describing complicated processes bootstrapping porting self-compiling compilers interpreters macro-processors t-diagrams first introduced describing bootstrapping cross-compiling compilers mckeeman et al 1971 melvin conway described broader concept uncol 1958 bratman added 1961 later others including p.d terry gave explanation usage t-diagrams textbooks topic compiler construction t-diagrams also used describe client-server interconnectivity world wide web teaching tool tdiag implemented leipzig university germany
[ 6242, 428, 8973, 2045, 7421 ]
None
11,600
8
Common_Base_Event:common base event common base event cbe ibm implementation web services distributed management wsdm event format standard ibm also implemented common event infrastructure unified set apis infrastructure creation transmission persistence distribution wide range business system network common base event formatted events
[ 3323 ]
Test
11,601
2
Hobbyist_operating_system_development:hobbyist operating system development hobbyist operating system development one involved technical options computer hobbyist definition hobby operating system sometimes vague developer view developers fun learning also seen users view users using toy defined operating system n't big user base development begin existing resources like kernel operating system bootloader also made completely scratch development platform could bare hardware machine nature operating system developed tested virtual machine since hobbyist must claim ownership adapting complex system ever-changing needs technical terrain much enthusiasm common amongst many different groups attracted operating system development elements operating system development include c programming language frequently used hobby operating system programming well assembly language though languages used well use assembly language common small systems especially based eight bit microprocessors mos technology 6502 family zilog z-80 systems lack available resources small output size low-level efficiency hobby operating systems use command-line interface simple text user interface due ease development advanced hobby operating systems may graphical user interface example atheos hobby operating system graphical interface written entirely one programmer section predominantly x86 oriented term bios basic input/output system refers firmware initialises computer hardware provisions load operating system bios also sets standard interface several low-level device drivers boot time bios resources often used hobbyist operating systems especially written 16-bit x86 machines many hobby operating systems developers lack time write complex low level drivers simply want get writing software system soon possible commonly used bios functions videobios disk services used video cards disk drives vary significantly different machines specialised drivers often difficult write use bios uncommon operating systems operate protected mode long mode system must switch back real mode bios drivers run
[ 2560, 6155, 7187, 10776, 25, 4637, 9762, 4643, 6180, 7217, 10803, 10809, 576, 2625, 6221, 3160, 10333, 97, 11363, 6760, 10856, 9835, 7282, 7285, 4727, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10891, 6797, 10382, 6296, 2201, ...
Test
11,602
2
Ryan_C._Gordon:ryan c. gordon ryan c. gordon also known icculus computer programmer former loki software employee responsible icculus.org hosts many loki software projects well several new projects created others gordon site hosts projects duke nukem 3d shadow warrior quake iii arena many free open source projects multiple platforms gordon also created ports proprietary software products linux mac os x platforms include hired port unreal tournament series serious sam series official postal series tripwire interactive coffee stain studios titles prey 2006 also involved porting several non-gaming products second life google earth candy cruncher postal 2 published linux game publishing also described alongside edward rudd instrumental ensuring multi-platform nature humble indie bundle initiatives gordon grew outside philadelphia going college charlotte north carolina currently resides january 3 2010 became engaged girlfriend carrie married later year january 31 2012 wife gave birth first child olive finch gordon also founding member barebones theatre group charlotte summer 1999 loki software ran contest called loki hack atlanta linux showcase goal improving linux port gordon decided give try driving four-hour trip home atlanta loki impressed work decided offer job gordon quickly rose prominence loki working developer game ports quake iii arena eric ultimate solitaire well lead developer descent 3 2000 also wrote several articles online linux news information website linux.com around time founded icculus.org made provide hosting various free open source projects would later used support continue loki free software projects tools loki software gordon picked nickname icculus reference fictional character gamehendge song icculus phish upcoming closure loki forced seek outside employment friend offered job cybercafe forced move parents desperate escape working cash register living found e-mail address artist working developer croteam recently released highly successful serious sam series gordon asked would interested building linux port agreed port first beta released december 5 2002 gained contracts hired port devastation linux america army linux mac os x also contracted epic games port unreal tournament 2003 title linux mac os x port included packaged windows version business relationship continued release unreal tournament 2004 followed original unreal tournament ported linux internally epic published loki upon learning release postal 2 2003 gordon decided contact developer behind wondering would interested making port game linux mac os x. loki previously ported original postal linux interested keeping franchise compatible running scissors agreed finished port shipped february 14 2005 linux game publishing initially handling publishing linux version soon contracted make linux port wolfire games title business relationship would later prove fruitful gordon around time also contracted build linux client online virtual world second life google also utilized services contracted make native linux port google earth application linux functionality finally becoming available starting release version 4 beta june 12 2006 2007 contracted epic games port new unreal tournament 3 title linux mac os x linux game server released december 18 2007 work eventually abandoned linux mac os x clients reasons remain undisclosed october 2008 made surprise announcement working linux client first-person shooter game prey previously porting game linux server 2006 although speculation potential linux release denied developer title past finished port released december 7 2008 october 23 2009 announced plans make universal binary system similar one used mac os x linux systems called project generated considerable controversy several linux kernel developers decrying effort gordon announced project hold early november 2009 later stating would willing work receives help interested party around time also started port game aquaria linux bit blot may 11 2010 wolfire games released source code code branch lugaru gnu general public license also involved source code release aquaria sold part first humble indie bundle also hosted wolfire contracted port mac os x stating could potentially port linux steam ever released linux client gordon also generated controversy summer talk 2010 southeast linuxfest titled anatomy failure criticized aspects kernel development process ported braid linux mac os x allow part humble indie bundle 2 well porting games cogs hammerfight later bundles part ported haaf game engine linux mac os x released port free software license also ported frozen synapse linux included primary part frozen synapse bundle well super meat boy shank humble indie bundle 4 rest 2012 gordon would work several ports humble bundles including space pirates zombies psychonauts would also involved updating old releases well porting several new titles linux included part valve corporation steam linux launch including creating linux ports games red orchestra ostfront 41-45 killing floor tripwire interactive part humble indie bundle 7 promotion gordon ported title dungeon defenders linux making first linux native title utilize unreal engine 3 engine debuted release unreal tournament 3 back 2007 gordon unsuccessfully tried port platform 2013 ported dear esther linux included part humble indie bundle 8 gordon one speakers first ever steam dev days outlined port game linux steamos 2014 ported games goat simulator sanctum 2 linux mac os x coffee stain studios june 19 2014 released new linux port limbo game previously released linux using crossover wrapper part humble indie bundle v something proved controversial time due fully native release order accomplish gordon also port wwise audio middleware previously prevented native port possible icculus.org gordon personal website project incubator similar sourceforge.net ourproject.org gnu savannah gordon often involved projects hosted site universally site hosts port enhancement projects games aliens versus predator jump n bump donkey.bas duke nukem 3d shadow warrior freespace 2 descent 2 black shades ken labyrinth rise triad wolfenstein 3d heretic cooperative rune quake ii build engine unreal unreal tournament mod chzo mythos site also hosts free software projects neverball ioquake3 related projects attempted visual basic re-implementation openal mac os x yahoo messenger client also host freeware project hosted code developers blazing games piga software wolfire games bit blot following list software gordon involved porting except game server ports addition also contracted provide technical assistance gaslamp games developers dungeons dredmor clockwork empires helped develop solely responsible linux os x ports double fine productions costume quest
[ 1026, 5644, 6797, 4367, 8848, 657, 10642, 1939, 2581, 3478, 6808, 2841, 7450, 10525, 6302, 7584, 162, 802, 5410, 6691, 6947, 8354, 5931, 8364, 1717, 823, 2109, 11069, 10687, 2368, 10822, 8263, 843, 589, 847, 6352, 4177, 8787, 4437, 6489, ...
None
11,603
3
Embeddable_Linux_Kernel_Subset:embeddable linux kernel subset embeddable linux kernel subset elks formerly known linux-8086 unix-like operating system kernel subset linux kernel intended 16-bit computers limited processor memory resources machines powered intel 8086 compatible microprocessors supported 32-bit linux elks free software available gnu general public license gpl work early 16-bit x86 8086 80186 80286 computers like ibm pc compatible systems virtual 8086 mode feature 32-bit intel 80386 later cpus found newer machines another useful area single board microcomputers intended educational tools homebrew projects hardware hacking well embedded controller systems e.g automation elks also runs psion 3a 3ar sibo sixteen bit organiser pdas nec v30 cpus providing another possible field operation gadget hardware ported platform effort called elksibo native elks programs may run emulated elksemu allowing 8086 code used linux-i386 effort provide elks eiffel compliant library also exists development linux-8086 started 1995 linux kernel developers alan cox chad page fork standard linux early 1996 project renamed elks embeddable linux kernel subset 1997 first website www.elks.ecs.soton.ac.uk/ offline created elks version 0.0.63 followed august 8 year june 22 1999 elks release 0.0.77 available first version able run graphical user interface nano-x window system july 21 elks booted psion pda sibo architecture elks 0.0.82 came january 10 2000 including sibo port became first official version running computer hardware original 8086 base march 3 year project registered sourceforge new website elks.sourceforge.net january 6 2001 cox declared elks basically dead nonetheless release 0.0.84 came along june 17 2001 charilaos harry kalogirou added tcp/ip networking support seven days later year elks reached 0.0.90 november 17 april 20 2002 kalogirou added virtual memory support disk swapping capability followed nine days later elks release 0.1.0 considered first beta version end year december 18 ede elks distribution edition distribution based elks kernel version 0.0.5 released january 6 2003 brought elks 0.1.2 update 0.1.3 followed may 3 2006 first official release long hiatus development development flightlinux real-time operating system spacecrafts planned project intended uosat-12 eventually settled qcf operating system quadron corporation instead since january 2012 elks development cvs repository migrated git february 2012 numerous patches linux-8086 mailing list committed new repository version 0.1.4 came february 19 2012 released jody bruchon memory riley williams former co-developer included updated floppy disk images fixing compilation bugs previous version removing unused codes may 10 2012 busyelks added repository jody bruchon attempt replace stand-alone binaries take advantage shared code elks support shared libraries busybox-like binaries attempt save space symbolic links eliminating redundant chunks code combining separate programs one bigger binary november 14 2013 project development moved github ethernet fat support added 2017 30 developers contributed project since fork 1995 march 2015 development elks project active reaching milestone 1,000 source code commits march 8 2015 june 2018 many bug fixes improvements performed 583 commits leading 0.2.1 release march 2019 project completed transition obsolete bcc compiler recent gcc-ia16
[ 10851, 516, 3911, 4871, 6730, 8268, 2925, 6129, 5363, 2804, 5397, 11221, 823, 7483 ]
Validation
11,604
3
VAX:vax vax discontinued instruction set architecture isa developed digital equipment corporation dec mid-1970s vax-11/780 introduced october 25 1977 first range popular influential computers implementing architecture 32-bit system complex instruction set computer cisc architecture based dec earlier pdp-11 vax virtual address extension designed extend replace dec various programmed data processor pdp isas vax architecture primary features virtual addressing example demand paged virtual memory orthogonal instruction set vax perceived quintessential cisc isa large number assembly-language-programmer-friendly addressing modes machine instructions highly orthogonal architecture instructions complex operations queue insertion deletion polynomial evaluation historically one studied commented-on isa computer history vax succeeded dec alpha instruction set architecture name vax originated acronym virtual address extension vax seen 32-bit extension older 16-bit pdp-11 prime computer early adopter virtual memory manage larger address space early versions vax processor implement compatibility mode emulates many pdp-11 instructions giving 11 vax-11 highlight compatibility later versions offloaded compatibility mode less used cisc instructions emulation operating system software vax instruction set designed powerful orthogonal introduced many programs written assembly language programmer-friendly instruction set important time programs written higher-level language instruction set became less visible ones much concerned compiler writers one unusual aspect vax instruction set presence register masks start subprogram arbitrary bit patterns specify control passed subprogram registers preserved since register masks form data embedded within executable code make linear parsing machine code difficult complicate optimization techniques applied machine code native vax operating system digital vax/vms renamed openvms 1991 early 1992 ported alpha modified comply posix standards branded compliant xpg4 x/open consortium vax architecture openvms operating system engineered concurrently take maximum advantage initial implementation vaxcluster facility vax operating systems included various releases bsd unix 4.3bsd ultrix-32 vaxeln xinu recently netbsd openbsd supported various vax models work done porting linux vax architecture openbsd discontinued support architecture september 2016 first vax model sold vax-11/780 introduced october 25 1977 digital equipment corporation annual meeting shareholders bill strecker c. gordon bell doctoral student carnegie mellon university responsible architecture many different models different prices performance levels capacities subsequently created vax superminicomputers popular early 1980s vax-11/780 used standard cpu benchmarks initially described one-mips machine performance equivalent ibm system/360 ran one mips system/360 implementations previously de facto performance standards actual number instructions executed 1 second 500,000 led complaints marketing exaggeration result definition vax mips speed vax-11/780 computer performing 27 vax mips would run program roughly 27 times faster vax-11/780 within digital community term vup vax unit performance common term mips compare well across different architectures related term cluster vups informally used describe aggregate performance vaxcluster performance vax-11/780 still serves baseline metric brl-cad benchmark performance analysis suite included brl-cad solid modeling software distribution vax-11/780 included subordinate stand-alone lsi-11 computer performed microcode load booting diagnostic functions parent computer dropped subsequent vax models enterprising vax-11/780 users could therefore run three different digital equipment corporation operating systems vms vax processor hard drives either rsx-11s rt-11 lsi-11 single density single drive floppy disk vax went many different implementations original vax 11/780 implemented ttl filled four-by-five-foot cabinet single cpu cpu implementations consisted multiple ecl gate array macrocell array chips included vax 8600 8800 superminis finally vax 9000 mainframe class machines cpu implementations consisted multiple mosfet custom chips included 8100 8200 class machines vax 11-730 725 low-end machines built using bit-slice components microvax represented major transition within vax family time design yet possible implement full vax architecture single vlsi chip even vlsi chips later done v-11 cpu vax 8200/8300 instead microvax first vax implementation move complex vax instructions packed decimal related opcodes emulation software partitioning substantially reduced amount microcode required referred microvax architecture microvax alu registers implemented single gate-array chip rest machine control conventional logic full vlsi microprocessor implementation microvax architecture arrived microvax ii 78032 dc333 cpu 78132 dc335 fpu 78032 first microprocessor on-board memory management unit microvax ii based single quad-sized processor board carried processor chips ran microvms ultrix-32 operating systems machine featured 1 mb on-board memory q22-bus interface dma transfers microvax ii succeeded many microvax models much improved performance memory vlsi vax processors followed form v-11 cvax cvax soc system chip single-chip cvax rigel mariah nvax implementations vax microprocessors extended architecture inexpensive workstations later also supplanted high-end vax models wide range platforms mainframe workstation using one architecture unique computer industry time sundry graphics etched onto cvax microprocessor die phrase cvax ... care enough steal best etched broken russian play hallmark cards slogan intended message soviet engineers known purloining dec computers military applications reverse engineering chip design dec product offerings vax architecture eventually superseded risc technology 1989 dec introduced range workstations servers ran ultrix decstation decsystem respectively based processors implemented mips architecture 1992 dec introduced risc instruction set architecture alpha axp later renamed alpha alpha-based microprocessor decchip 21064 high performance 64-bit design capable running openvms august 2000 compaq announced remaining vax models would discontinued end year 2005 manufacturing vax computers ceased old systems remain widespread use stromasys charon-vax simh software-based vax emulators remain available vax virtual memory divided four sections one gigabyte context addressing 2 bytes size vms p0 used user process space p1 process stack s0 operating system s1 reserved vax four hardware implemented privilege modes vax supports many addressing modes literal register postincrement predecrement register deferred postincrement deferred predecrement deferred displacement byte word long displacement byte word long deferred also indexed may combined many immediate mode synonymous program counter pc postincrement many addressing modes could use program counter also r15 instead registers provided easy generation position-independent code pc-relative addressing vax also load effective address instructions access memory compute address used first vax-based system vax-11/780 member vax-11 family high-end vax 8600 replaced vax-11/780 october 1984 joined entry-level microvax minicomputers vaxstation workstations mid-1980s microvax superseded vax 4000 vax 8000 superseded vax 6000 late 1980s mainframe-class vax 9000 introduced early 1990s fault-tolerant vaxft introduced alpha compatible vax 7000/10000 variant various vax-based systems sold vaxserver cancelled systems include bvax high-end ecl-based vax two ecl-based vax models argonaut raven raven cancelled 1990 vax known gemini also cancelled fall-back case lsi-based scorpio failed never shipped number vax clones authorized unauthorized produced examples include
[ 7173, 9739, 2062, 9231, 9742, 2066, 6675, 7699, 8725, 5655, 10779, 8732, 10781, 9759, 10786, 6181, 8231, 10796, 3630, 5678, 4144, 6705, 7218, 2617, 2623, 577, 2113, 7234, 1606, 3142, 1611, 2638, 3160, 10851, 7269, 5734, 3175, 8293, 2155, ...
Test
11,605
2
Criticism_of_Windows_Vista:criticism windows vista windows vista operating system released microsoft consumers january 30 2007 widely criticized reviewers users due issues new security features performance driver support product activation windows vista subject number negative assessments various groups security reasons 64-bit versions windows vista windows 7 well allow signed drivers installed kernel mode code executing kernel mode enjoys wide privileges system signing requirement aims ensure code known origin execute level order driver signed developer/software vendor obtain authenticode certificate sign driver authenticode certificates obtained certificate authorities trusted microsoft microsoft trusts certificate authority verify applicant identity issuing certificate driver signed using valid certificate driver signed using certificate revoked microsoft certificate authority windows refuse load driver following criticisms/claims made regarding requirement microsoft allows developers temporarily locally disable signing requirement systems control hitting f8 boot signing drivers self-issued certificates running kernel debugger one time third-party tool called atsiv existed would allow driver unsigned signed loaded atsiv worked installing signed surrogate driver could directed load driver thus circumventing driver signing requirement since violation driver signing requirement microsoft closed workaround hotfix kb932596 revoking certificate surrogate driver signed security researchers alexander sotirov mark dowd developed technique bypasses many new memory-protection safeguards windows vista address space layout randomization aslr result already existing buffer overflow bugs vista previously exploitable due features may exploitable vulnerability sotirov notes presented weaknesses protection mechanism still requires system attack vulnerability without presence vulnerability techniques ’ really accomplish anything vulnerability sotirov dowd used paper example 2007 animated cursor bug cve-2007-0038 one security researcher dino dai zovi claimed means completely game vista security though sotirov refuted saying articles describe vista security 'broken 'done 'unfixable vulnerabilities completely inaccurate one suggestions saw many discussions people use windows xp fact xp lot protections ’ bypassing aslr ’ even exist another common criticism concerns integration new form digital rights management drm operating system specifically protected video path pvp involves technologies high-bandwidth digital content protection hdcp image constraint token ict features added vista due licensing restrictions hd-dvd consortium blu-ray association concern resolution playback protected content hd dvd blu-ray discs enabled 2012 lack protected channel stop playback audio plays back normal high-definition video downsamples blu-ray hd dvd slightly-better-than-dvd quality video protected video path mandates encryption must used whenever content marked protected travel link might intercepted called user-accessible bus uab additionally devices come contact premium content graphics cards certified microsoft playback starts devices involved checked using hardware functionality scan hfs verify genuine tampered devices required lower resolution 1920×1080 960×540 video signals outputs protected hdcp additionally microsoft maintains global revocation list devices compromised list distributed pcs internet using normal update mechanisms effect revoked driver functionality high-level protected content play functionality including low-definition playback retained peter gutmann computer security expert university auckland new zealand released whitepaper raises following concerns mechanisms free software foundation conducted campaign called badvista vista grounds ed bott author windows vista inside published three-part blog rebuts many gutmann claims bott criticisms summarized follows technology writer george ou states gutmann paper relies unreliable sources gutmann never used windows vista test theories gutmann responded bott ou article states central thesis gutmann article refuted response bott disinformation microsoft published blog entry twenty questions answers windows vista content protection refutes gutmann arguments microsoft mvp paul smith written response gutmann paper counters arguments specifically says microsoft also noted content protection mechanisms existed windows far back windows around time release microsoft stated nearly pcs market today run windows vista pcs sold 2005 capable running vista hardware worked windows xp work works poorly vista vista-compatible drivers available due companies going business lack interest supporting old hardware tom hardware published benchmarks january 2007 showed windows vista executed typical applications slowly windows xp hardware configuration subset benchmarks used provided standard performance evaluation corporation spec later stated results compared generated running windows xp even testing done hardware configuration spec acknowledges apple-to-apples comparison made cases one done tom hardware calling studies invalid comparisons however tom hardware report conceded specviewperf tests suffered heavily lack support opengl graphics library windows vista reason report recommended replacing windows xp vista manufacturers made drivers available report also concluded tests involving real world applications vista performed considerably slower noting disappointed cpu-intensive applications video transcoding xvid dvd xvid mpeg4 mainconcept h.264 encoder performed 18 nearly 24 slower standard benchmark scenarios commonly used applications including photoshop winrar also performed worse vista many low-to-mid-end machines come windows vista pre-installed suffer exceptionally slow performance default vista settings come pre-loaded laptop manufacturers offered downgrade laptops windows xp—for price however price unnecessary microsoft allows users windows vista windows 7 freely downgrade software installing xp phoning microsoft representative new product key first released november 2006 vista performed file operations copying deletion slowly operating systems large copies required migrating one computer another seemed difficult impossible without workarounds using command line inability efficiently perform basic file operations attracted strong criticism six months microsoft confirmed existence problems releasing special performance reliability update later disseminated windows update included service pack 1 nonetheless one benchmark reported show improving performance compared vista original release service pack 1 increase level performance windows xp however benchmark questioned others within zdnet ed bott questions colleagues methods provides benchmarks refute results early vista lifecycle many games showed drop frame rate compared windows xp results largely consequence vista immature drivers graphics cards higher system requirements vista time service pack 1 released mid-2008 gaming benchmarks showed vista par windows xp however games devil may cry 4 crysis left 4 dead stated memory requirements vista 1.5x 2x higher xp concerns expressed windows vista may contain software bloat speaking 2007 university illinois microsoft distinguished engineer eric traut said lot people think windows large bloated operating system maybe fair characterization admit went say core kernel components make core operating system actually pretty streamlined former pc world editor ed bott expressed skepticism claims bloat noting almost every single operating system microsoft ever sold criticized bloated first came even regarded exact opposite ms-dos two consumers sued microsoft united states federal court alleging windows vista capable marketing campaign bait-and-switch tactic computers windows xp pre-installed could run vista basic sometimes even running user-acceptable speed february 2008 seattle judge granted suit class action status permitting purchasers class participate case released documents case well dell presentation march 2007 discussed late changes windows vista permitted hardware certified would require upgrading order use vista lack compatible drivers forced hardware vendors limp issues vista launched one several vista launch appraisals included 158 pages unsealed documents new features vista criticism surfaced concerning use battery power laptops running vista drain battery much rapidly windows xp reducing battery life windows aero visual effects turned battery life equal better windows xp systems release new operating system new features higher requirements higher power consumption normal richard shim analyst idc noted windows xp came true windows 2000 came true according gartner vista dogged fears cases proven many existing applications re-written operate new system cisco reported saying vista solve lot problems every action reaction unforeseen side-effects mutations networks become brittle according pc world software compatibility issues bug worries keep businesses moving microsoft new os citing concerns cost compatibility united states department transportation prohibited workers upgrading vista university pittsburgh medical center said rollout vista significantly behind schedule several key programs still n't compatible including patient scheduling software july 2007 2,000 tested applications compatible vista microsoft published list legacy applications meet works windows vista software standards well list applications meet stringent certified windows vista standards microsoft released application compatibility toolkit 5.0 application migrating vista-incompatible applications virtualization solutions like virtualbox virtual pc 2007 vmware also used last resort continue running vista-incompatible applications legacy versions windows microsoft also provides upgrade advisor tool .net framework must installed internet connection required used existing xp systems flag driver application compatibility issues upgrading vista microsoft also criticized removing heavily discussed features next-generation secure computing base may 2004 winfs august 2004 windows powershell august 2005 though released separately vista prior vista release included vista successor windows 7 securid support may 2006 pc-to-pc synchronization june 2006 initial three pillars vista radically altered reach release date microsoft international pricing vista criticized many expensive differences pricing one country another vary significantly especially considering copies vista ordered shipped worldwide united states could save 42 €26 314 €200 many cases difference price significantly greater case windows xp malaysia pricing vista around rm799 244/€155 current exchange rate united kingdom consumers could paying almost double united states counterparts software since release windows vista january 2007 microsoft reduced retail upgrade price point vista originally vista ultimate full retail priced 399 upgrade 259 prices since reduced 319 219 respectively vista includes enhanced set anti-copying technologies based windows xp windows genuine advantage called software protection platform spp initial release windows vista without service pack 1 spp included reduced-functionality mode system enters detects user failed product activation copy vista identified counterfeit non-genuine microsoft white paper described technology follows analysts questioned behavior especially given imperfect false-positive record behalf spp predecessor given least one temporary validation server outage reportedly flagged many legitimate copies vista xp non-genuine windows update would check fail validation challenge microsoft altered spp significantly windows vista service pack 1 instead reduced-functionality mode installations vista left unactivated 30 days present users nag screen prompts activate operating system log change desktop solid black colour every hour periodically use notification balloons warn users software counterfeiting addition updates classified optional available unactivated copies vista microsoft maintains technical bulletin providing details product activation vista windows vista ultimate users download exclusive windows ultimate extras extras released much slowly expected four available august 2009 almost three years vista released angered users paid extra mainly promised add-ons barry goffe director windows vista ultimate microsoft states unexpectedly delayed releasing several extras microsoft plans ship collection additional windows ultimate extras confident delight passionate windows vista ultimate customers term coined disparaging substitute proper name vista operating system use term popularized use secret diary steve jobs technology pop culture comedic blog author daniel lyons writes persona apple ceo steve jobs use reference failure vista meet sales customer satisfaction expectations lyons published article forbes using term soon picked international media outlets jornal de notícias rádio e televisão de portugal la nación chosun ilbo 163.com
[ 6150, 6153, 11283, 3605, 5666, 11301, 1577, 6697, 1581, 7215, 1077, 8757, 5176, 582, 1098, 9812, 8798, 4704, 10338, 8296, 617, 5225, 8299, 622, 7796, 6265, 8315, 636, 639, 641, 651, 6797, 10896, 2196, 2709, 10900, 3224, 7838, 8865, 6827, ...
Validation
11,606
2
TUN/TAP:tun/tap computer networking tun tap virtual network kernel interfaces network devices supported entirely software differ ordinary network devices backed hardware network adapters universal tun/tap driver originated 2000 merger corresponding drivers solaris linux bsd driver continues maintained part linux freebsd kernels though similar tunneling purposes one time used tun tap apply different layers network stack tun namely network tunnel simulates network layer device operates carrying ip packets tap namely network tap simulates link layer device operates carrying ethernet frames tun used routing tap used creating network bridge packets sent operating system via tun/tap device delivered user-space program attaches device user-space program may also pass packets tun/tap device case tun/tap device delivers injects packets operating-system network stack thus emulating reception external source platforms tun/tap drivers include
[ 10631, 9868, 6797, 9722, 8211, 10005, 11413, 11162, 3742, 10016, 9764, 3879, 7722, 4268, 10924, 7983, 10417, 7859, 2228, 8499, 823, 3777, 2884, 8265, 11468, 7376, 11221, 2136, 6364, 5084, 5470, 5472, 10210, 10851, 9318, 8039, 1513, 11248, 5...
None
11,607
4
Footprinting:footprinting footprinting also known reconnaissance technique used gathering information computer systems entities belong get information hacker might use various tools technologies information useful hacker trying crack whole system used computer security lexicon footprinting generally refers one pre-attack phases tasks performed actual attack tools used footprinting sam spade nslookup traceroute nmap neotrace allows hacker gain information target system information used carry attacks system reason may named pre-attack since information reviewed order get complete successful resolution attack crawling process surfing internet get required information target sites surfed include target ’ website blogs social networks information obtained method helpful methods.crawling whois web application used get information target website administrator e-mail address details registration whois large database contains information approximately websites searched domain name search engines google also used gather information target system depends well one knows use search engines collect information used properly attacker gather lots information company career policies etc information also gathered using command tracert traceroute used trace path user target system networks way becomes clear request forwarded devices linux systems tracepath traceroute commands also available traceroute operations negative web search reveal websites performed target website negative websites act resources insight flaws target website attack performed company following information gathered basics footprinting
[ 5665, 2887, 8204, 7983, 11249, 2739, 119, 8692, 11092, 823 ]
Test
11,608
2
DYNIX:dynix dynix dynamic unix unix-like operating system developed sequent computer systems based 4.2bsd modified run intel-based symmetric multiprocessor hardware third major dynix 3.0 version released may 1987 1992 dynix succeeded dynix/ptx based unix system v. ibm obtained rights dynix/ptx 1999 acquired sequent 810 million ibm subsequent project monterey attempt circa 1999 unify aix sequent dynix/ptx operating system unixware 2001 however explosion popularity linux ... prompted ibm quietly ditch version named dynix 4.1.4
[ 6787, 6412, 5397, 1304, 3487, 3241, 7983, 3248, 2995, 9141, 823, 9784, 7992, 9151, 10436, 6369, 5492, 2424, 633 ]
Validation
11,609
4
American_Innovation_and_Competitiveness_Act:american innovation competitiveness act american innovation competitiveness act aica united states federal law enacted 2017 act updated instructions national science foundation national institute standards technology nist conduct support research cybersecurity cryptography created director security nist revised program requirements networking information technology research development program coordinates advanced computer research across u.s. government agencies assigned office management budget responsibility create interagency working group reduce administrative burdens federally-funded researchers act authorizes creation interagency advisory panel working groups consider education science technology engineering mathematics stem fields act supports coordination citizen science crowdsourcing federal agencies accomplish missions
[ 3552, 612, 5636, 7979, 5373, 2558 ]
Test
11,610
9
Perl_6:perl 6 perl 6 also known raku member perl family programming languages historically several interpreter compiler implementations written today rakudo perl 6 implementation active development introducing elements many modern historical languages compatibility perl 5 goal though compatibility mode part specification design process perl 6 began 2000 february 2015 post perl foundation blog stated perl6 team attempt get development release version 1.0 available larry birthday september version 1.0 release christmas 25 december 2015 first stable version specification announced development pugs first high-traction implementation began 2005 multiple perl 6 implementation projects rakudo perl 6 based nqp quite perl use moarvm java virtual machine runtime environment releases new version every month including precompiled gnu/linux packages july 2010 project released first rakudo star distribution collection perl 6 implementation related materials larry wall maintains reference grammar known std.pm6 written perl 6 bootstrapped perl 5 perl 6 design process first announced 19 july 2000 fourth day year perl conference larry wall state onion 2000 talk time primary goals remove historical warts language easy things stay easy hard things get easier impossible things get hard general cleanup internal design apis process began series requests comments rfcs process open contributors left aspect language closed change rfc process complete wall reviewed classified request 361 received began process writing several apocalypses term means revealing original goal write one apocalypse chapter programming perl became obvious apocalypse written previous apocalypses invalidated later changes reason set synopses published one relating contents apocalypse subsequent changes reflected updates today perl 6 specification continues almost entirely within synopses also series exegeses written damian conway explain content apocalypse terms practical usage exegesis consists code examples along discussion usage implications examples three primary methods communication used development perl 6 today first irc channel freenode second set mailing lists perl foundation servers perl.org third git source code repository hosted https //github.com/perl6 break compatibility mandated start project immediately allowed changes larry wall suggested initial speech historical warts confusion surrounding sigil usage containers ambiguity codice_1 functions syntactic impact bareword filehandles many problems perl programmers discussed fixing years first issues addressed years perl 6 undergone several alterations direction introduction concepts python ruby early influences pugs interpreter written haskell programming language many functional programming influences absorbed perl 6 design team language mascot camelia perl 6 bug name nod camel mascot associated perl form pun-loving tradition perl community play software bug spiral designs embedded butterfly-like wings resemble characters p6 favored nickname perl 6 off-center eye placement intentional pun wall-eyed one goals behind lively colorful design logo discourage misogyny community opportunity masculine persuasion show sensitive side rakudo perl 6 implementation active development implementation designated official perl 6 implementation rather perl 6 anything passes official test suite rakudo perl 6 targets number virtual machines moarvm java virtual machine javascript moarvm virtual machine built especially rakudo perl 6 nqp compiler toolchain layer perl 6 virtual machines called quite perl 6 nqp implements perl 6 rules parsing perl 6 well abstract syntax tree backend-specific code generation large portions rakudo written perl 6 subset nqp rakudo completely self-hosting implementation concrete plans point make rakudo bootstrapping compiler pugs initial implementation perl 6 written haskell pugs used advanced implementation perl 6 since mid 2007 mostly dormant updates made track current version ghc november 2014 pugs actively maintained 2007 v6-miniperl6 mp6 reimplementation v6-kindaperl6 kp6 written means bootstrap perl-6.0.0 std using perl 5 std full grammar perl 6 written perl 6 theory anything capable parsing std generating executable code suitable bootstrapping system perl 6. kp6 currently compiled mp6 work multiple backends mp6 kp6 full perl 6 implementations designed implement minimum featureset required bootstrap full perl 6 compiler yapsi perl 6 compiler runtime written perl 6 result requires existing perl 6 interpreter one rakudo star releases order run niecza another major perl 6 implementation effort focused optimization efficient implementation research targets common language infrastructure perl 6 specification requests modules identified name version authority possible load specific version module even two modules name differ version authority convenience aliasing short name provided cpan perl 5 module distribution system yet handle perl 6 modules instead prototype module system use perl 5 perl 6 differ fundamentally though general intent keep perl 6 perl perl 6 clearly perl programming language changes intended normalize language make easier novice expert programmers alike understand make easy things easier hard things possible major non-technical difference perl 5 perl 6 perl 6 began specification means perl 6 re-implemented needed also means programmers n't read source code ultimate authority given feature perl 5 documentation regarded excellent even outside perl community even mixed reviews typically note maturity breadth however documentation considered authoritative describes behavior actual perl 5 interpreter informally discrepancies found documentation implementation may lead either changed reflect dynamic drives continuing development refinement perl 5 releases perl 6 dynamic type system perl 5 augmented addition static types example however static typing remains optional programmers things without explicit typing perl 6 offers gradual typing system whereby programmer may choose use static typing use dynamic typing mix two perl 5 defines subroutines without formal parameter lists though simple parameter counting loose type checking done using perl 5 prototypes subroutine arguments passed aliased elements array elements modified changes reflected original data perl 6 introduces true formal parameters language perl 6 subroutine declaration looks like perl 5 formal parameters i.e. variables parameter list aliases actual parameters values passed default aliases constant modified may declared explicitly read-write aliases original value copies using codice_2 codice_3 directives programmer require modified locally perl 6 provides three basic modes parameter passing positional parameters typical ordered list parameters programming languages use parameters may also passed using name unordered way named-only parameter passed specifying name never captures positional argument indicated leading codice_4 character slurpy parameters indicated codice_5 parameter name perl 6 tool creating variadic functions slurpy hash capture remaining passed-by-name parameters whereas slurpy array capture remaining passed-by-position parameters example use three parameter-passing modes positional parameters used always required unless followed codice_6 indicate optional named parameters optional default may marked required adding codice_7 variable name slurpy parameters always optional parameters also passed arbitrary blocks act closures example codice_8 codice_9 loop iterators named following example list traversed 3 elements time passed loop block variables codice_10 generally referred pointy sub pointy block arrow behaves almost exactly like codice_11 keyword introducing anonymous closure anonymous subroutine perl 5 terminology perl 5 sigils – punctuation characters precede variable name – change depending variable used perl 6 sigils invariant means change based whether array array element needed variance perl 5 inspired number agreement english many natural languages however conceptual mapping breaks references come play since may refer data structures even though scalars thus dealing nested data structures may require expression singular plural form single term complexity equivalent either common use natural language programming languages causes high cognitive load writing code manipulate complex data structures compare perl 6 perl 5 supports object-oriented programming via mechanism known blessing reference blessed object particular class blessed object methods invoked using arrow syntax cause perl locate dispatch appropriate subroutine name call blessed variable first argument extremely powerful makes common case object orientation struct-like object associated code unnecessarily difficult addition perl make assumptions object model use method invocation optimized well spirit making easy things easy hard things possible perl 6 retains blessing model supplies robust object model common cases example class encapsulate cartesian point could defined used way dot replaces arrow nod many languages e.g java python etc coalesced around dot syntax method invocation terminology perl 6 codice_12 called attribute languages call fields members method used access attribute called accessor auto-accessors methods created automatically method codice_13 example accessor functions return value attribute class individual attribute declared codice_2 modifier short read/write auto-accessor passed new value set attribute directly assigned lvalue example auto-accessors replaced user-defined methods programmer desire richer interface attribute attributes accessed directly within class definition access must go accessor methods perl 6 object system inspired moose framework introduces many perl 6 oop features perl 5 roles perl 6 take function interfaces java mixins ruby traits smalltalk variant squeak much like classes provide safer composition mechanism used perform composition used classes rather adding inheritance chain roles define nominal types provide semantic names collections behavior state fundamental difference role class classes instantiable roles essentially role bundle possibly abstract methods attributes added class without using inheritance role even added individual object case perl 6 create anonymous subclass add role subclass change object class anonymous subclass example dog mammal dogs inherit certain characteristics mammals mammary glands mammal parent vertebrate backbone dogs may one several distinct types behavior example dog may pet stray guide blind however simply sets additional behaviors added dog cat equally pet stray example hence dog mammal classes pet stray guide roles roles added class object codice_15 keyword opposed inheritance codice_16 keywords reflect differing meanings two features role composition gives class behavior role n't indicate truly thing role although roles distinct classes types role appear variable declaration one would normally put class example blind role human could include attribute type guide attribute could contain guide dog guide horse guide human even guide machine perl regular expression string-processing support always one defining features since perl pattern-matching constructs exceeded capabilities regular language expressions time perl 6 documentation exclusively refer regexen distancing term formal definition perl 6 provides superset perl 5 features respect regexes folding larger framework called rules provide capabilities context-sensitive parsing formalisms syntactic predicates parsing expression grammars antlr well acting closure respect lexical scope rules introduced codice_17 keyword usage quite similar subroutine definition anonymous rules also introduced codice_18 codice_19 keyword simply used inline regexps perl 5 via codice_20 matching codice_21 substitute operators apocalypse 5 larry wall enumerated 20 problems current regex culture among perl regexes compact 'cute much reliance metacharacters little support named captures little support grammars poor integration 'real language perl 5 constructs changed perl 6 optimized different syntactic cues common cases example parentheses round brackets required control flow constructs perl 5 optional also codice_22 comma operator list constructor enclosing parentheses longer required around lists code makes codice_23 array exactly elements 1 2 3 4 perl 6 allows comparisons chain sequence comparisons following allowed treated left-to-right comparison performed result logically combined via codice_24 operation perl 6 uses technique lazy evaluation lists feature functional programming languages haskell code crash attempting assign list infinite size array codice_25 hang indefinitely attempting expand list limited number slots searched simplifies many common tasks perl 6 including input/output operations list transformations parameter passing related lazy evaluation construction lazy lists using codice_26 codice_27 behaving somewhat like generators languages like icon python codice_28 infinite list square numbers lazy evaluation codice_26 ensures elements computed accessed perl 6 introduces concept junctions values composites values simplest form junctions created combining set values junctive operators codice_30 indicates value equal either left right-hand arguments codice_31 indicates value equal left right-hand arguments values used code would use normal value operations performed junction act members junction equally combine according junctive operator codice_32 would yield codice_33 comparisons junctions return single true false result comparison codice_34 junctions return true comparison true one elements junction codice_35 junctions return true comparison true elements junction junctions also used richly augment type system introducing style generic programming constrained junctions types low-level languages concept macros become synonymous textual substitution source-code due widespread use c preprocessor however high-level languages lisp pre-dated c use macros far powerful lisp-like macro concept perl 6 take advantage power sort macro stems fact operates program high-level data structure rather simple text full capabilities programming language disposal perl 6 macro definition look like subroutine method definition operate unparsed strings ast representing pre-parsed code combination two macro definition would look like particular example macro complex c-style textual substitution parsing macro parameter occurs macro operates calling code diagnostic messages would far informative however body macro executed compile time time used many techniques optimization employed even possible entirely eliminate complex computations resulting programs performing work compile-time perl 5 identifier names use ascii alphanumerics underscores also available languages perl 6 alphanumerics include unicode characters addition hyphens apostrophes used certain restrictions followed digit using hyphens instead underscores separate words name leads style coding called kebab-casing highly regarded two-finger typists hello world program common program used introduce language perl 6 hello world — though one way factorial function perl 6 defined different ways quicksort well-known sorting algorithm working implementation using functional programming paradigm succinctly written perl 6 tower hanoi often used introduce recursive programming computer science implementation uses perl 6 multi-dispatch mechanism parametric constraints history perl 6 two waves book writing first wave followed initial announcement perl 6 2000 books reflect state design language time contain mostly outdated material today second wave followed announcement version 1.0 2015 includes several books already published others process writing also book dedicated one first perl 6 virtual machine parrot published 2009 reports different authors new books going published soon based current version 1.0 known version 6.c perl 6
[ 5249, 9345, 5251, 5253, 3462, 8582, 6536, 1673, 9224, 1931, 8973, 10510, 5521, 9875, 3988, 3733, 5399, 2585, 11674, 155, 9245, 10013, 1952, 8611, 3876, 4777, 6313, 11307, 5677, 4398, 7983, 9014, 3767, 9914, 6335, 3137, 963, 10819, 4294, 8...
Train
11,611
4
Security_information_and_event_management:security information event management field computer security security information event management siem software products services combine security information management sim security event management sem provide real-time analysis security alerts generated applications network hardware vendors sell siem software appliances managed services products also used log security data generate reports compliance purposes term initialism siem coined mark nicolett amrit williams gartner 2005 acronyms sem sim siem sometimes used interchangeably generally refer different primary focus products practice many products area mix functions often overlap – many commercial vendors also promote terminology often times commercial vendors provide different combinations functionalities tend improve siem overall log management alone ’ provide real-time insights network security sem wo n't provide complete data deep threat analysis sem log management combined information available siem monitor key focus monitor help manage user service privileges directory services system-configuration changes well providing log auditing review incident response many meanings definitions capabilities evolving requirements continually shape derivatives siem product-categories need voice-centric visibility vsiem voice security information event management provides recent example evolution computer security researcher chris kubecka identified following siem use cases presented hacking conference 28c3 chaos communication congress examples customized rules alert event conditions involve user authentication rules attacks detected infections detected
[ 11542, 8343, 6559, 6560, 34, 2090, 10539, 1453, 2733, 184, 5433, 7352, 7739, 1980, 10940, 2889, 10574, 4689, 10196, 8533, 1111, 9688, 10331, 3552, 612, 3944, 2539, 111, 4471, 5245, 2558, 7295 ]
Test
11,612
3
Consensus_(computer_science):consensus computer science fundamental problem distributed computing multi-agent systems achieve overall system reliability presence number faulty processes often requires processes agree data value needed computation examples applications consensus include whether commit transaction database agreeing identity leader state machine replication atomic broadcasts real world applications include clock synchronization pagerank opinion formation smart power grids state estimation control uavs multiple robots/agents general load balancing blockchain others consensus problem requires agreement among number processes agents single data value processes agents may fail unreliable ways consensus protocols must fault tolerant resilient processes must somehow put forth candidate values communicate one another agree single consensus value consensus problem fundamental problem control multi-agent systems one approach generating consensus processes agents agree majority value context majority requires least one half available votes process given vote however one faulty processes may skew resultant outcome consensus may reached reached incorrectly protocols solve consensus problems designed deal limited numbers faulty processes protocols must satisfy number requirements useful instance trivial protocol could processes output binary value 1 useful thus requirement modified output must somehow depend input output value consensus protocol must input value process another requirement process may decide upon output value decision irrevocable process called correct execution experience failure consensus protocol tolerating halting failures must satisfy following properties variations definition integrity may appropriate according application example weaker type integrity would decision value equal value correct process proposed – necessarily integrity condition also known validity literature protocol correctly guarantee consensus amongst n processes fail said t-resilient evaluating performance consensus protocols two factors interest running time message complexity running time given big notation number rounds message exchange function input parameters typically number processes and/or size input domain message complexity refers amount message traffic generated protocol factors may include memory usage size messages varying models computation may define consensus problem models may deal fully connected graphs others may deal rings trees models message authentication allowed whereas others processes completely anonymous shared memory models processes communicate accessing objects shared memory also important area research models communication protocol participants communicate authenticated channels means messages anonymous receivers know source every message receive models assume stronger form authentication message signed sender receiver knows immediate source every message participant initially created message stronger type authentication achieved digital signatures stronger form authentication present protocols tolerate larger number faults two different authentication models often called oral communication written communication models oral communication model immediate source information known whereas stronger written communication models every step along receiver learns immediate source message communication history message special case consensus problem called binary consensus restricts input hence output domain single binary digit 0,1 two types failures process may undergo crash failure byzantine failure crash failure occurs process abruptly stops resume byzantine failure failures absolutely conditions imposed example may occur result malicious actions adversary process experiences byzantine failure may send contradictory conflicting data processes may sleep resume activity lengthy delay two types failures byzantine failures far disruptive thus consensus protocol tolerating byzantine failures must resilient every possible error occur stronger version consensus tolerating byzantine failures given strengthening integrity constraint consensus problem may considered case asynchronous synchronous systems real world communications often inherently asynchronous practical often easier model synchronous systems given asynchronous systems naturally involve issues synchronous ones synchronous systems assumed communications proceed rounds one round process may send messages requires receiving messages processes manner message one round may influence messages sent within round fully asynchronous message-passing distributed system one process may crash failure proved consensus impossible however impossibility result derives worst-case scenario process schedule highly unlikely reality process scheduling degree randomness asynchronous model forms failures handled synchronous consensus protocol instance loss communication link may modelled process suffered byzantine failure three agreement problems interest follows collection formula_5 processes numbered formula_6 formula_7 communicate sending messages one another process formula_6 must transmit value formula_1 processes also known general problem formal requirements consensus protocol may include n processes partially synchronous system system alternates good bad periods synchrony process chooses private value processes communicate rounds determine public value generate consensus vector following requirements shown variations problems equivalent solution problem one type model may solution another problem another type model example solution weak byzantine general problem synchronous authenticated message passing model leads solution weak interactive consistency interactive consistency algorithm solve consensus problem process choose majority value consensus vector consensus value t-resilient anonymous synchronous protocol solves byzantine generals problem formula_14 weak byzantine generals case number failures n number processes systems formula_5 processors formula_16 byzantine shown exists algorithm solves consensus problem formula_17 oral-messages model proof constructed first showing impossibility three-node case formula_18 using result argue partitions processors written-messages model protocols tolerate formula_19 fully asynchronous system consensus solution tolerate one crash failures even requiring non triviality property result sometimes called flp impossibility proof named authors michael j. fischer nancy lynch mike paterson awarded dijkstra prize significant work flp result state consensus never reached merely model assumptions algorithm always reach consensus bounded time practice highly unlikely occur example polynomial time binary consensus protocol tolerates byzantine failures phase king algorithm garay berman algorithm solves consensus synchronous message passing model n processes f failures provided n 4 f phase king algorithm f 1 phases 2 rounds per phase process keeps track preferred output initially equal process input value first round phase process broadcasts preferred value processes receives values processes determines value majority value count second round phase process whose id matches current phase number designated king phase king broadcasts majority value observed first round serves tie breaker process updates preferred value follows count majority value process observed first round greater n /2 f process changes preference majority value otherwise uses phase king value end f 1 phases processes output preferred values google implemented distributed lock service library called chubby chubby maintains lock information small files stored replicated database achieve high availability face failures database implemented top fault-tolerant log layer based paxos consensus algorithm scheme chubby clients communicate paxos master order access/update replicated log i.e. read/write files bitcoin uses proof work maintain consensus peer-to-peer network nodes bitcoin network attempt solve cryptographic proof-of-work problem probability finding solution proportional computational effort hashes per second expended node solves problem version block transactions added peer-to-peer distributed timestamp server accepted nodes node network attempt solve proof-of-work problem sybil attack becomes unfeasible unless attacker 50 computational resources network many peer-to-peer online real-time strategy games use modified lockstep protocol consensus protocol order manage game state players game game action results game state delta broadcast players game along hash total game state player validates change applying delta game state comparing game state hashes hashes agree vote cast players whose game state minority disconnected removed game known desync another well-known approach called msr-type algorithms used widely computer science control theory solve consensus problem shared-memory system concurrent objects must introduced concurrent object shared object data structure helps concurrent processes communicate reach agreement two main methods design concurrent object traditionally designers use critical section solve problem means one process allowed visit concurrent object time others must wait process exits critical section method straightforward easy implement however systems critical sections face risk crashing process dies inside critical section sleeps intolerably long time another implementation concurrent object called wait-free implementation guarantee consensus finite number steps given kind object powerful enough solve consensus problems maurice herlihy gave impossibility universality hierarchy consensus number hierarchy means maximum number processes system reach consensus given object objects higher consensus number implemented objects lower consensus number according hierarchy read/write registers solve consensus even 2-process-system data structure like stack queue solve consensus two processes ca n't objects solve consensus among processes efficient way prove take advantage bivalence assume output binary state bivalent two outputs possible output reachable state 0/1 state called 0-valent/1-valent basic idea make contradiction executing operations get state 0-valent 1-valent however concurrent objects universal means solve consensus among number processes simulate objects way simulate objects universal objects build operations sequence concurrent object
[ 3713, 8706, 9859, 1669, 6406, 7315, 1049, 9753, 4380, 9248, 545, 7085, 4280, 1087, 8640, 4423, 7499, 8916, 8025, 4827, 1908, 121, 764, 3326 ]
Validation
11,613
3
POWER9:power9 power9 family superscalar multithreading symmetric multiprocessors based power isa announced august 2016 hot chips conference power9-based processors manufactured using 14 nm finfet process 12- 24-core versions scale scale applications possibly variations since power9 architecture open licensing modification openpower foundation members current fastest supercomputer world summit based power9 also using nvidia volta gpus accelerators power9 core comes two variants four-way multithreaded one called smt4 eight-way one called smt8 smt4- smt8-cores similar consist number so-called slices fed common schedulers slice rudimentary 64-bit single-threaded processing core load store unit lsu integer unit alu vector scalar unit vsu simd floating point super-slice combination two slices smt4-core consists 32 kb l1 cache 32 kb l1 data cache instruction fetch unit ifu instruction sequencing unit isu feeds two super-slices smt8-core two sets l1 caches ifus isus feed four super-slices result 12-core 24-core versions power9 consist number slices 96 amount l1 cache power9 core whether smt4 smt8 12-stage pipeline five stages shorter predecessor power8 aims retain clock frequency around 4 ghz first incorporate elements power isa v.3.0 released december 2015 including vsx-3 instructions power9 design made modular used processor variants used licensing different fabrication process ibm chip co-processors compression cryptography well large low-latency edram l3 cache power9 variants ship versions cores disabled due yield reasons raptor computing systems first sold 4-core chips even ibm initially sold ac922 systems 22-core chips even though types chips 24 cores dies lot facilities on-chip helping massive off-chip i/o performance power9 chips made two types cores scale scale configuration power9 cores either smt4 smt8 smt8 cores intended powervm systems smt4 cores intended powernv systems use powervm predominantly run linux power9 chips made scale support directly-attached memory scale chips intended use machines two cpu sockets use buffered memory ibm portal openpower lists three available modules nimbus chip although scale-out smt8 variant powervm also uses lagrange module/socket sforza modules use land grid array 2601-pin socket talos ii – two-socket workstation/server platform using power9 smt4 sforza processors available 2u server 4u server tower eatx mainboard marketed secure owner-controllable free open-source software firmware initially shipping 4-core 8-core 18-core 22-core chip options chips cores available talos ii lite – single-socket version talos ii mainboard made using pcb blackbird – single-socket microatx platform using smt4 sforza processors 4–8 cores 2 ram slots supporting 256gib total barreleye g2 zaius – two-socket server platform using lagrange processors barreleye g2 zaius chassis use zaius power9 motherboard power systems ac922 – 2u 2× power9 smt4 monza 6× nvidia volta gpus 2× capi 2.0 attached accelerators 1 tb ddr4 ram ac abbreviation accelerated computing system also known witherspoon newell power systems l922 – 2u 1–2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running linux power systems s914 – 4u 1× power9 smt8 4–8 cores 1 tb ddr4 ram powervm running aix/ibm i/linux power systems s922 – 2u 1–2× power9 smt8 4–10 cores per processor 4 tb ddr4 ram powervm running aix/ibm i/linux power systems s924 – 4u 2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running aix/ibm i/linux power systems h922 – 2u 1–2× power9 smt8 4–10 cores per processor 4 tb ddr4 ram powervm running sap hana linux aix/ibm 25 system power systems h924 – 4u 2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running sap hana linux aix/ibm 25 system power systems e950 – 4u 2–4× power9 smt8 8–12 cores per processor 16 tb buffered ddr4 ram power systems e980 – 1–4× 4u 4–16× power9 smt8 8–12 cores per processor 64 tb buffered ddr4 ram magna pe2112gtx – 2u two-socket server high performance computing using lagrange processors manufactured wistron summit sierra united states department energy together oak ridge national laboratory lawrence livermore national laboratory contracted ibm nvidia build two supercomputers summit sierra based power9 processors coupled nvidia volta gpus systems slated go online 2017 sierra based ibm power systems ac922 compute node first racks summit delivered oak ridge national laboratory 31 july 2017 marenostrum 4 – one three clusters emerging technologies block fourth marenostrum supercomputer power9 cluster nvidia volta gpus cluster expected provide 1.5 petaflops computing capacity installed emerging technologies block marenostrum 4 exists test new developments might suitable future versions marenostrum predecessor power9 supported freebsd ibm aix ibm linux running without powervm implementation power9 support linux kernel began version 4.6 march 2016 rhel suse debian gnu/linux centos supported
[ 6914, 3203, 4868, 10501, 3846, 4743, 6663, 5642, 1548, 1933, 3472, 4881, 5393, 7065, 1563, 1309, 1823, 6815, 3493, 6949, 6311, 8102, 1321, 9391, 10543, 4017, 5297, 7218, 10675, 823, 8120, 6715, 9020, 1725, 1983, 1985, 10180, 336, 8530, 35...
Test
11,614
6
Zipeg:zipeg zipeg open source free software extracts files compressed archives like zip rar 7z others rarely used types zipeg works mac os x windows best known file preview ability incapable compressing files although able extract compressed ones zipeg built top 7-zip backend ui implemented java open source zipeg automatically detects filenames national alphabets code pages correctly translates unicode zipeg reads exif thumbnails jpeg digital photographs uses tool tip style preview item icons
[ 6022, 1801, 10121, 1420, 6797, 1940, 3222, 9880, 3114, 10027, 5677, 7983, 950, 6713, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 1631, 3296, 9953, 5858, 6759, 7529, 4459, 237, 1646, 7667, 6389, 4089, 894, 10623 ]
Test
11,615
9
SimPy:simpy simpy process-based discrete-event simulation framework based standard python event dispatcher based python ’ generators also used asynchronous networking implement multi-agent systems simulated real communication processes simpy simple python generator functions used model active components like customers vehicles agents simpy also provides various types shared resources model limited capacity congestion points like servers checkout counters tunnels version 3.1 also provide monitoring capabilities aid gathering statistics resources processes simulations performed “ fast possible ” real time wall clock time manually stepping events though theoretically possible continuous simulations simpy features carry however simpy overkill simulations fixed step size processes ’ interact shared resources — use simple codice_1 loop case simpy distribution contains tutorials in-depth documentation large number examples simpy released open source software mit license first version released december 2002 one simpy main goals easy use example simple simpy simulation clock process prints current simulation time step
[ 8554, 5612, 7983 ]
Validation
11,616
2
Microsoft_Sync_Framework:microsoft sync framework microsoft sync framework data synchronization platform microsoft used synchronize data across multiple data stores sync framework includes transport-agnostic architecture data store-specific synchronization providers modelled ado.net data provider api plugged sync framework used offline access data working cached set data submitting changes master database batch well synchronize changes data source across consumers publish/subscribe sync peer-to-peer synchronization multiple data sources sync framework features built-in capabilities conflict detection – whether data changed already updated – flag manual inspection use defined policies try resolve conflict sync services includes embedded sql server compact database store metadata synchronization relationships well sync attempt sync framework api surfaced managed code use .net framework applications well unmanaged code use com applications scheduled ship visual studio 2008 late november 2007 sync framework runtime provides synchronization functionality without tied data store data transport protocols providing data source specific synchronization providers data source supported example using proper synchronization providers files synchronized across computers project updates synchronized across project participants media synchronized across devices sync framework ships three providers microsoft sync services ado.net sync services file systems sync services sse sync services used synchronize devices supplying providers device similarly pim software microsoft office outlook media libraries windows media player also supported providing suitable providers providers used enumerate items data store identified item id addition also maintain synchronization metadata state data store changes enumerated quickly metadata maintained every instance data store replica provider attached metadata maintained includes replica id tick count representing progression time conflict log tombstone log set changes data store seen knowledge replica id tick count pair makes codice_1 encodes state data store time sync framework defines set operation codice_2 object replica codice_3 determines store contains specified change codice_4 merge two knowledge sets codice_5 project knowledge subset items codice_6 create new knowledge set without changes subset items metadata managed metadata storage service uses in-process sql server compact database store metadata per-provider basis sync services api operates creating synchronization session represented codice_7 object synchronization session synchronizes data across two synchronization providers one source data store destination instances providers passed codice_7 object synchronization session destination provider sends knowledge set store source provider compares knowledge destination change set source enumerate changes transfer destination destination provider makes sure changes conflicting merges changes updates knowledge microsoft sync services ado.net synchronization provider synchronizing across databases using ado.net ado.net datasets synchronized source destination persisted database server also support data sources relational database like xml database web service long proxy provided abstract data source data provider available proxy sync services ado.net provider intended use offline applications data central database cached locally application works cached data changes uploaded batch addition provider also used collaborative applications application work local dataset synchronized periodically peer-to-peer manner participants locally datasets stored either using sql server compact database database server supporting ado.net sync services ado.net allows incremental change tracking allows changes replicated rather replicating entire copy sync services file systems provider used synchronize two file system locations either local folders network shares addition mirroring new files changes existing files also synchronized changes files detected using timestamps optionally hashing file contents conflicting changes file detected set automatically resolved conflicting updates file newer edit kept file deleted one replica updated another update take precedence delete two files different content created name across two replicas sync operation one created later persisted rename operation caused files get name retained renaming one deletes configured move file recycle bin recovered necessary sync services file systems provider also provides preview mode enumerates actions taken sync operation without actually performing operations view letting users review changes made synchronization performed peer-to-peer manner neither sync framework sync services file systems provider perform authentication accessing files authentication job application using sync framework api files transferred without encryption use encryption transit custom providers uses encrypted tcp connection needs used sync services file systems provider also supports static filters exclude files based wildcards attributes first release however sync services file systems provider sync either ntfs security descriptors alternate data streams sync services feedsync provider used help synchronize replicas creating feedsync enabled feed either rss atom formats subscribed interested parties provider also used extract items feedsync feed merge changes back data store sync services feedsync uses another provider connect data store sync services feedsync provides services used help synchronize data replica rss atom feeds replica particular repository information synchronized using feedsync producer service synchronization application work synchronization provider create list items replica put rss atom xml stream items published interested subscribers similarly feedsync consumer service helps synchronization application take input rss atom xml stream extract items use synchronization provider apply appropriate changes replica sync framework underlies exchange feed items two feeds cross-subscribed easily synchronized one another peers synchronization community synchronization community set replicas keep data synchronized microsoft sync framework free windows windows mobile devices support platforms available commercial licensing porting kits
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 6709, 8246, 9286, 4174, 4178, 9813, 603, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 3224, 4771, 7846, 10414, 8391, 214, 9943, 9434, 2783, 73...
Test
11,617
3
List_of_CIL_instructions:list cil instructions list instructions instruction set common intermediate language bytecode
[ 5952, 11559, 10953, 6411, 11212, 372, 3573, 3736, 3705, 10684 ]
Test
11,618
7
Message_passing_in_computer_clusters:message passing computer clusters message passing inherent element computer clusters computer clusters ranging homemade beowulfs fastest supercomputers world rely message passing coordinate activities many nodes encompass message passing computer clusters built commodity servers switches used virtually every internet service recently use computer clusters one thousand nodes spreading number nodes cluster increases rapid growth complexity communication subsystem makes message passing delays interconnect serious performance issue execution parallel programs specific tools may used simulate visualize understand performance message passing computer clusters large computer cluster assembled trace-based simulator use small number nodes help predict performance message passing larger configurations following test runs small number nodes simulator reads execution message transfer log files simulates performance messaging subsystem many messages exchanged much larger number nodes historically two typical approaches communication cluster nodes pvm parallel virtual machine mpi message passing interface however mpi emerged de facto standard message passing computer clusters pvm predates mpi developed oak ridge national laboratory around 1989 provides set software libraries allow computing node act parallel virtual machine provides run-time environment message-passing task resource management fault notification must directly installed every cluster node pvm used user programs written c c++ fortran etc unlike pvm concrete implementation mpi specification rather specific set libraries specification emerged early 1990 discussions 40 organizations initial effort supported arpa national science foundation design mpi drew various features available commercial systems time mpi specifications gave rise specific implementations mpi implementations typically use tcp/ip socket connections mpi widely available communications model enables parallel programs written languages c fortran python etc mpi specification implemented systems mpich open mpi computer clusters use number strategies dealing distribution processing multiple nodes resulting communication overhead computer clusters tianhe-i use different processors message passing used performing computations tiahnhe-i uses two thousand feiteng-1000 processors enhance operation proprietary message passing system computations performed xeon nvidia tesla processors one approach reducing communication overhead use local neighborhoods also called locales specific tasks computational tasks assigned specific neighborhoods cluster increase efficiency using processors closer however given many cases actual topology computer cluster nodes interconnections may known application developers attempting fine tune performance application program level quite difficult given mpi emerged de facto standard computer clusters increase number cluster nodes resulted continued research improve efficiency scalability mpi libraries efforts included research reduce memory footprint mpi libraries earliest days mpi provided facilities performance profiling via pmpi profiling system use pmipi- prefix allows observation entry exit points messages however given high level nature profile type information provides glimpse real behavior communication system need information resulted development mpi-peruse system peruse provides detailed profile enabling applications gain access state-changes within mpi-library achieved registering callbacks peruse invoking triggers message events take place peruse work paraver visualization system paraver two components trace component visual component analyze traces statistics related specific events etc large scale often supercomputer level parallel system developed essential able experiment multiple configurations simulate performance number approaches modeling message passing efficiency scenario ranging analytical models trace-based simulation approaches rely use test environments based artificial communications perform synthetic tests message passing performance systems bigsim provide facilities allowing simulation performance various node topologies message passing scheduling strategies analytical level necessary model communication time term set subcomponents startup latency asymptotic bandwidth number processors well known model hockney model simply relies point point communication using l r message size l startup latency r asymptotic bandwidth mb/s xu hwang generalized hockney model include number processors latency asymptotic bandwidth functions number processors gunawan cai generalized introducing cache size separated messages based sizes obtaining two separate models one messages cache size one specific tools may used simulate understand performance message passing computer clusters instance clustersim uses java-based visual environment discrete-event simulation approach computed nodes network topology visually modeled jobs duration complexity represented specific probability distributions allowing various parallel job scheduling algorithms proposed experimented communication overhead mpi message passing thus simulated better understood context large-scale parallel job execution simulation tools include mpi-sim bigsim mpi-sim execution-driven simulator requires c c++ programs operate clustersim hand uses hybrid higher-level modeling system independent programming language used program execution unlike mpi-sim bigsim trace-driven system simulates based logs executions saved files separate emulator program bigsim includes emulator simulator emulator executes applications small number nodes stores results simulator use simulate activities much larger number nodes emulator stores information sequential execution blocks sebs multiple processors log files seb recording messages sent sources destinations dependencies timings etc simulator reads log files simulates may star additional messages also stored sebs simulator thus provide view performance large applications based execution traces provided emulator much smaller number nodes entire machine available configured
[ 785, 7699, 7963, 1823, 6815, 2339, 5029, 5798, 9126, 6184, 2345, 11049, 4909, 2045, 7218, 8501, 5948, 4286, 2113, 8514, 5956, 4423, 1480, 330, 1866, 8523, 4308, 3927, 344, 2264, 731, 2140, 3677, 11487, 4194, 5090, 7142, 8554, 10483, 3960,...
Validation
11,619
4
Strong_customer_authentication:strong customer authentication strong customer authentication sca requirement eu revised directive payment services psd2 payment service providers within european economic area sca requirement comes force 14 september 2019 requirement ensures electronic payments performed multi-factor authentication increase security electronic payments physical card transactions already commonly could termed strong customer authentication eu chip contactless pin generally true internet transactions across eu prior implementation requirement article 97 1 directive requires payment service providers use strong customer authentication payer accesses payment account online br b initiates electronic payment transaction br c carries action remote channel may imply risk payment fraud abuses directive defines strong customer authentication essentially two-factor authentication article 4 30 authentication based use two elements categorised knowledge something user knows possession something user possesses inherence something user independent breach one compromise reliability others designed way protect confidentiality authentication data multiple ways card provider implement sca including 31 january 2013 european central bank ecb issued recommendations internet payment security requiring strong customer authentication ecb requirements technologically neutral order foster innovation competition public submission process ecb identified three solutions strong customer authentication two based reliance authentication new variant 3-d secure incorporates one-time passwords subsequently european commission drafted proposals updated payment services directive including requirement became psd2 psd2 strong customer authentication legal requirement electronic payments credit cards starting september 14 2019 2016 visa criticised proposal making strong customer authentication mandatory grounds could make online payments difficult thus hurt sales online retailers reserve bank india mandates strong authentication online transactions proposal make 3d secure mandatory australia blocked australian competition consumer commission accc numerous objections flaw-related submissions received
[ 6220, 4965, 11244 ]
Test
11,620
1
Precedence_graph:precedence graph precedence graph also named conflict graph serializability graph used context concurrency control databases precedence graph schedule contains precedence graph schedule 3 transactions cycle length 2 two edges committed transactions t1 t2 schedule history conflict serializable notice commit transaction 2 meaning regarding creation precedence graph algorithm test conflict serializability schedule along example schedule formula_10 formula_11 formula_4 formula_5 formula_6 formula_7 formula_8 formula_9
[ 3398, 11377, 5330, 2901, 7446, 7581 ]
Validation
11,621
4
Alina_(malware):alina malware alina point sale malware pos ram scraper used cybercriminals scrape credit card debit card information point sale system first started scrape information late 2012 resembles jackpos malware executed gets installed user computer checks updates update found removes existing alina code installs latest version new installations adds file path autostart runkey maintain persistence finally adds java.exe appdata directory executes using parameter codice_1 new installations codice_2 upgrades alina inspects user processes help windows api calls alina maintains blacklist processes process information blacklist uses openprocess read process contents memory dump data scraped alina sends c c servers using http post command hardcoded binary
[ 3072, 6786, 7044, 10245, 10756, 9356, 9233, 8978, 4863, 4883, 278, 10392, 1690, 3867, 10141, 5281, 2213, 8998, 9256, 939, 1970, 3643, 6588, 7739, 9791, 1088, 3395, 4165, 10309, 6091, 2508, 6360, 7515, 4344, 3941, 107, 877, 3571, 3320, 204...
Test
11,622
4
K7_Total_Security:k7 total security k7 total security developed k7 computing pvt ltd. malware prevention antivirus software provides malware prevention removal subscription period uses signatures heuristics identify viruses features include software firewall e-mail spam filtering phishing protection k7 computing distributes product download box copy oem software k7 computing pvt ltd. software hardware security company founded 1991 jayaraman kesavardhanan chennai india company 90+ employees chennai hq employees around world software research virus detection handled virus lab chennai k7 computing member avar association anti virus asia researchers jayaraman kesavardhanan founder cto k7 computing granted best member award recognition significant contributions avar year 2008 chennai tn 16 december 2008 k7 computing cloud computing division built windows platform k7 cloud solutions formed result k7 computing acquisition binarykarma chennai india based start-up working products area virtualization management j. kesavardhanan serves founder chief technology officer k7 computing developing antivirus software 20 years recognized antivirus software k7 computing k7 total security av-comparatives performance test 2010 version 11 released february 2011 together k7 ultimate security 11 antivirus plus antivirus premium 15 june 2011 k7 released business edition antivirus security k7 enterprise security business orientated antivirus product offering remote management installation home users smartphone users small offices enterprise edition products cloud products see k7 cloud solutions k7 total security released 2002 k7 computing first security suite windows pcs service time offered basic protection internet users anti-virus anti-spyware tools anti-spam basic firewall k7 total security 10 best performing antivirus 2010 av-comparatives well 2011 k7 antivirus plus november 2011 vb-100 award received december 2011 august 2012
[ 2049, 7809, 131, 5891, 1417, 3981, 6797, 10637, 4374, 1052, 156, 6431, 2721, 5924, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 6699, 8615, 7983, 6834, 4403, 9523, 10166, 7103, 704, 9537, 7362, 10308, 4421, 202, 1355, 5069, 10574, 10708...
Validation
11,623
3
Computer_fan_control:computer fan control fan control management rotational speed electric fan computers various types computer fans used provide adequate cooling different fan control mechanisms balance cooling capacities noise generate commonly accomplished motherboards hardware monitoring circuitry configured end-user bios software perform fan control modern pcs grow powerful requirements electrical power computers convert part electrical power heat generated major components heat production varies system load periods compute-intensive activity generate much heat idle time processors early x86-based computers early 486s need active ventilation power supplies needed forced cooling power supply fans also circulated cooling air rest pc atx standard byproduct increased heat generation fan need move increasing amounts air thus need powerful since must move air area space fans become noisy fans installed pc case produce noise levels 70 db since fan noise increases fifth power fan rotation speed reducing rotations per minute rpm small amount potentially means large reduction fan noise must done cautiously excessive reduction speed may cause components overheat damaged done properly fan noise drastically reduced common cooling fans used computers use standardized connectors two four pins first two pins always used deliver power fan motor rest optional depending fan design type color wires connected pins varies depending number connectors role pin standardized guaranteed system cooling fans equipped either two- three-pin connectors usually designed accept wide range input voltages directly affects rotation speed blades style fan control fan either temperature inside chassis checked outside-of-range temperature detected fans set maximum speed temperature drops threshold fans turned back control method reduces noise issues power requirements periods low usage system operating capacity fan noise become problem standard cooling fan essentially bladed dc motor varying voltage input across acceptable range fan speed fan increase added voltage decrease reduced voltage faster fan means air moved thus higher heat exchange rate ways perform regulation described resistors series fan power pin simplest method reducing fan noise add heat generated inside computer case since voltage drop proportional current fan may start need appropriate power rating variable fan control potentiometers could used along transistor mosfet whose output voltage controlled potentiometer possible use rheostat instead diode series fan reduce voltage output fan silicon diode provides relatively constant voltage drop 0.7 v per diode data sheets specific diode specify voltage drop example 1n4001 silicon diode voltage drop varies approximately 0.7 0.9 v current varies 0.01 1 power rating noted diodes may require cooling operate rated current also noted voltage drop across diode fall temperature causing fan speed like series regulators diode dissipate power equal voltage drop times current passing voltage computer cooling fan receives defined difference voltage wire +12 v ground wire +0 v connecting one wires different voltage voltage fan receives different default 12 v fan designed increasing voltage default 12 v achieved e.g connecting −12 v −5 v power line instead ground wire fan connector connecting 5 v power line +12 v input fan connector procedure 10 17 24 v voltages achieved voltages exceeding 12 v potentially damaging computer fans rated 12 v. however combination modern power supplies longer required provide −5 v power line limited power delivery capability −12 v line usually less 1 power reduces total capacity volt modded fans modern systems safest method volt modding connecting +5 v power line +12 v input fan reduces voltage fan receives +5 v. fans work low voltage fans may run +5 v started rotating reasonable speed another method reducing fan speed moving 5 v wire classical molex power connector place ground wire going fan thereby delivering +7 v 12 v − 5 v 7 v fan however potentially risky method +5 v psu line intended source current sink psu likely get damaged case load 5 v psu line load generated 7 v fans e.g pc enters idle/sleep state also components inside computer using +5 v power might exposed 5 v case short circuit fan common voltage regulator ics like popular lm78xx series sometimes used provide variable constant voltage fans thermally bonded computer chassis one ics provide 1 current voltage 6 8 9 10 v lm7806 lm7808 lm7809 lm7810 respectively adjustable versions like popular lm317 also exist combined potentiometer adjustable regulators allow user vary fan speed several fans currents far excess standard potentiometer could handle higher currents discrete linear regulators relatively simple construct using power transistor mosfet small signal transistor zener diode voltage reference discrete regulators require additional components minimum two transistors three resistors small capacitor allow arbitrarily high currents allowing regulation additional fans accessories linear regulators waste heat produced roughly pulse-width modulation pwm common method controlling computer fans pwm-capable fan usually connected 4-pin connector pinout ground +12 v sense control sense pin used relay rotation speed fan control pin open-drain open-collector output requires pull-up 5 v 3.3 v fan unlike linear voltage regulation fan voltage proportional speed fan driven constant supply voltage speed control performed fan based control signal control signal square wave operating 25 khz duty cycle determining fan speed 25khz used raise sound signal range human hearing use lower frequency could produce audible hum whine typically fan driven 30 100 rated fan speed using signal 100 duty cycle exact speed behavior linear threshold value minimum speed threshold low control levels manufacturer dependent many motherboards feature firmware software regulates fans based processor computer case temperatures another method popular gamers manual fan speed controller mounted expansion slot 5.25 3.5 drive bay come built computer case using switches knobs attached fans speeds adjusted one methods modern motherboards feature hardware monitoring chips capable performing fan control usually pwm method described chips configured bios using specialised software operating system booted processors produce varying levels heat depending system load thus makes sense reduce speed fans idle decrease noise produced fans running full speed load goes point fan speed must adjusted promptly avoid overheating modern hardware monitor chips configured capable independently running monitoring loop without need functioning bios operating system automatic control offered chips may called thermal cruise mode maintaining thermal envelope well fan speed cruise mode maintaining specific fan speed automatically however software capable accessing advanced configuration parameters provided chips common generic software implements basic interfacing chips namely explicit setting duty cycle fan control setting subsequently performing duty cycle adjustments software thus requiring operating system well third-party software continue running main cpu perform monitoring loop may problem system utility crashes point system may overheat due failure fans maintain adequate cooling whilst running reduced voltage speed method software physically controls fan usually pwm see many companies provide software control fan speeds motherboards microsoft windows mac os x/macos also third-party programs work variety motherboards allow wide customization fan behavior depending temperature readings motherboard cpu gpu sensors well allowing manual control two programs speedfan argus monitor
[ 10337, 1637, 3304, 1515, 6797, 4270, 2415, 7151, 10102, 823 ]
Validation
11,624
2
Shadow_memory:shadow memory shadow memory technique used track store information computer memory used program execution shadow memory consists shadow bytes map individual bits one bytes main memory shadow bytes typically invisible original program used record information original piece data technique utilized memory-error checkers store information parts memory allocated program checked shadow memory used detecting reporting incorrect accesses memory even though program may crashing due segmentation fault similar error checker may also store additional information memory bits defined ones memcheck part valgrind suite uses detect undefined behavior resulting acting printing undefined memory values use shadow memory however limited memory-error checkers information stored shadow bytes fixed instance used threadsanitizer data race detector shadow memory implemented used lot different ways different performance characteristics memcheck instance tracks values bit precision addresssanitizer part clang compiler comparatively fast memcheck like valgrind tools uses binary translation instrumentation run code manipulating shadow memory corresponding program memory use addresssanitizer hand created compile-time inserts error-checking code inline program compilation shadow-memory implementation uses huge reservation virtual memory shadow memory giving different performance characteristics
[ 7941, 2383, 815, 4695, 11644, 10333 ]
Validation
11,625
9
Programming_language_implementation:programming language implementation programming language implementation system executing computer programs two general approaches programming language implementation notice compiler directly execute program ultimately order execute program via compilation must translated form serve input interpreter directly hardware piece computer hardware interpret programming language directly language called machine code so-called native code compiler one compiles program machine code actual compilation often separated multiple passes like code generation often assembler language translator generating native code linking loading execution compiler given high level language produces another high level language called translator source source translation often useful add extensions existing languages exploit good portable implementation language example c simplifying development many combinations interpretation compilation possible many modern programming language implementations include elements example smalltalk programming language conventionally implemented compilation bytecode either interpreted compiled virtual machine popular ways use jit aot compiler compilation implementation strategy copied many languages since smalltalk pioneered every programming language requires abstract machines bridge gap high level language low level real machine
[ 10752, 515, 7684, 11269, 6664, 9224, 9229, 2062, 7695, 9231, 10771, 9749, 8728, 4633, 4121, 3613, 9245, 8226, 2599, 5165, 5677, 5679, 564, 2105, 2617, 3132, 6717, 8771, 7237, 7749, 8262, 10824, 1099, 1611, 1613, 9299, 6228, 1112, 603, 367...
Test
11,626
3
Sun_Blade:sun blade sun blade line blade server computer systems sold sun microsystems 2006 onwards june 2006 sun announced amd opteron-based sun blade 8000 modular blade server system sun blade 8000 chassis hold 10 sun blade x8420 x8440 modules following year sun blade 6000 system launched allowed mixed ultrasparc x64 x86-64 architecture blades sun blade t6300 t6320 modules run solaris use ultrasparc t1 ultrasparc t2 processors respectively sun blade x6220 x6250 modules use amd opteron intel xeon 5000-series processors respectively x-series blades support solaris oracle linux rhel sles windows server vmware
[ 3328, 9090, 9731, 1801, 6153, 4235, 1809, 4241, 2710, 1818, 8863, 7072, 9343, 8994, 1316, 10789, 1707, 2731, 5677, 3247, 6322, 2871, 4664, 4285, 6464, 7104, 6338, 9665, 10436, 3911, 1480, 8007, 2895, 3919, 597, 3285, 10327, 10200, 6107, 2...
Test
11,627
3
VESA_Local_Bus:vesa local bus vesa local bus usually abbreviated vl-bus vlb short-lived expansion bus introduced i486 generation x86 ibm compatible personal computers created vesa video electronics standards association vesa local bus worked alongside dominant isa bus provide standardized high-speed conduit intended primarily accelerate video graphics operations vlb provided standardized fast path add-in video card makers could tap greatly accelerated memory-mapped i/o dma still using familiar isa bus handle basic device duties interrupts port-mapped i/o early 1990s i/o bandwidth prevailing isa bus become critical bottleneck pc video graphics performance need faster graphics driven increased adoption graphical user interfaces pc operating systems ibm produce viable successor isa micro channel architecture failed market due ibm requirement license payment licensing fees hardware manufacturers use extension royalty free isa bus form eisa open standard developed counter mca unable offer enough improvement isa meet dramatic increase bandwidth desired graphics thus short time market opening occurred video card manufacturers motherboard chipset makers created proprietary implementations local buses provide graphics cards direct access processor system memory avoided limitations isa bus less costly licensed ibm mca machine important note time migration mca architecture machine isa one insubstantial mca machines generally offer isa slots thus migration mca architecture meant prior investment isa cards made unusable additionally makers mca compatible cards subject ibm licensing fees combined mca greater technical requirements expense implement bad mca required peripheral cards passive members made cards active participants increasing system performance effect making mca version peripheral card significantly expensive isa counterpart ad-hoc manufacturer-specific solutions effective standardized provisions providing interoperability drew attention vesa consortium resulted proposal voluntary royalty free local bus standard 1992 additional benefit standardization beyond primary goal greater graphics card performance devices could also designed utilize performance offered vlb notably mass storage controllers offered vlb providing increased hard disk performance vlb slot simply additional edge connector placed in-line traditional isa eisa connector extended portion often colored distinctive brown result normal isa eisa slot additionally capable accepting vlb-compatible cards traditional isa cards remained compatible would pins past normal isa eisa portion slot reverse also true vlb cards necessity quite long order reach vlb connector reminiscent older full-length expansion cards earlier ibm xt era vlb portion slot looked similar ibm mca slot indeed physical 116-pin connector used mca cards rotated 180 degrees ibm mca standard popular ibm expected ample surplus connector making inexpensive readily available vesa local bus designed stopgap solution problem isa bus limited bandwidth one requirement vlb gain industry adoption minimal burden manufactures implement terms board re-design component costs otherwise manufacturers would convinced change proprietary solutions vlb fundamentally tied card directly 486 processor bus minimal intermediary logic reducing logic design component costs timing arbitration duties strongly dependent cards cpu simplicity vlb unfortunately created several factors served limit useful life substantially despite problems vesa local bus became commonplace later 486 motherboards majority later post-1992 486-based systems featuring vesa local bus video card vlb importantly offered less costly high speed interface consumer systems 1994 pci commonly available outside server market via pentium intel chipsets pci finally displaced vesa local bus also eisa last years 486 market last generation 80486 motherboards featuring pci slots lieu vlb capable isa slots however manufacturers develop offer vip v esa/ sa/ p ci motherboards three slot types
[ 4228, 274, 7442, 8851, 408, 799, 2723, 6187, 8625, 10833, 9686, 8301, 7151, 11631, 3445, 6006, 5368, 2941, 11007 ]
Test
11,628
9
Basic-256:basic-256 basic-256 project learn basics computer programming project started 2007 inspired article “ johnny ca n't code ” david brin main focus provide simple comprehensive environment middle/high school students learn basics computer programming basic-256 simple version basic code editor text output window graphics editor window visible screen however successive versions adding new features namely complete documentation available english russian dutch spanish portuguese
[ 219, 5612, 8262, 7983 ]
Test
11,629
3
Apple_A6X:apple a6x apple a6x 32-bit system-on-a-chip soc designed apple inc. introduced launch fourth generation ipad october 23 2012 high-performance variant apple a6 last 32-bit chip released switched 64-bit apple claims a6x twice cpu performance twice graphics performance predecessor apple a5x software updates ipad 4th generation ended 2017 thus ceasing support chip a6x features 1.4 ghz custom apple-designed armv7-a architecture based dual-core cpu called swift introduced apple a6 includes integrated quad-core powervr sgx554mp4 graphics processing unit gpu running 300 mhz quad-channel memory subsystem memory subsystem supports lpddr2-1066 dram increasing theoretical memory bandwidth 17 gb/s unlike a6 similar a5x a6x covered metal heat spreader includes ram package-on-package pop assembly a6x manufactured samsung high-κ metal gate hkmg 32 nm process die area 123 mm 30 larger a6
[ 9732, 1549, 7697, 4114, 9235, 11282, 6165, 11289, 7706, 8222, 1057, 2551, 38, 6183, 1576, 4139, 6700, 7211, 8237, 9774, 2097, 9784, 8250, 8253, 576, 7745, 1090, 7747, 2635, 8783, 4180, 10838, 10840, 9312, 9826, 99, 8806, 3691, 8812, 6258,...
None
11,630
3
Tesla_(microarchitecture):tesla microarchitecture named pioneering electrical engineer nikola tesla tesla codename gpu microarchitecture developed nvidia released 2006 successor prior microarchitectures nvidia first microarchitecture implement unified shaders used geforce 8 series geforce 9 series geforce 100 series geforce 200 series geforce 300 series gpus collectively manufactured 90 nm 80 nm 65 nm 55 nm 40 nm also geforce 405 quadro fx quadro x000 quadro nvs series nvidia tesla computing modules tesla replaced old fixed-pipeline microarchitectures represented time introduction geforce 7 series competed directly amd first unified shader microarchitecture named terascale development ati work xbox 360 used similar design tesla followed fermi tesla nvidia first microarchitecture implementing unified shader model driver supports direct3d 10 shader model 4.0 opengl 2.1 later drivers opengl 3.3 support architecture design major shift nvidia gpu functionality capability obvious change move separate functional units pixel shaders vertex shaders within previous gpus homogeneous collection universal floating point processors called stream processors perform universal set tasks geforce 8 unified shader architecture consists number stream processors sps unlike vector processing approach taken older shader units sp scalar thus operate one component time makes less complex build still quite flexible universal scalar shader units also advantage efficient number cases compared previous generation vector shader units rely ideal instruction mixture ordering reach peak throughput lower maximum throughput scalar processors compensated efficiency running high clock speed made possible simplicity geforce 8 runs various parts core differing clock speeds clock domains similar operation previous geforce 7 series gpus example stream processors geforce 8800 gtx operate 1.35 ghz clock rate rest chip operating 575 mhz geforce 8 performs significantly better texture filtering predecessors used various optimizations visual tricks speed rendering without impairing filtering quality geforce 8 line correctly renders angle-independent anisotropic filtering algorithm along full trilinear texture filtering g80 though smaller brethren equipped much texture filtering arithmetic ability geforce 7 series allows high-quality filtering much smaller performance hit previously nvidia also introduced new polygon edge anti-aliasing methods including ability gpu rops perform multisample anti-aliasing msaa hdr lighting time correcting various limitations previous generations geforce 8 perform msaa fp16 fp32 texture formats geforce 8 supports 128-bit hdr rendering increase prior cards 64-bit support chip new anti-aliasing technology called coverage sampling aa csaa uses z color coverage information determine final pixel color technique color optimization allows 16x csaa look crisp sharp claimed theoretical single-precision processing power tesla-based cards given flops may hard reach real-world workloads g80/g90/gt200 streaming multiprocessor sm contains 8 shader processors sp unified shader cuda core 2 special function units sfu sp fulfill two single-precision operations per clock 1 multiply 1 add using single mad instruction sfu fulfill four operations per clock four mul multiply instructions one sm whole execute 8 mads 16 operations 8 muls 8 operations per clock 24 operations per clock relatively speaking 3 times number sps therefore calculate theoretical dual-issue mad+mul performance floating point operations per second flops gflops graphics card sp count n shader frequency f ghz formula flops 3 × n × f however leveraging dual-issue performance like mad+mul problematic reasons order estimate performance real-world workloads may helpful ignore sfu assume 1 mad 2 operations per sp per cycle case formula calculate theoretical performance floating point operations per second becomes flops 2 × n × f theoretical double-precision processing power tesla gpu 1/8 single precision performance gt200 double precision support g8x g9x nvenc introduced later chips • 8800 gtx • 8800 ultra
[ 3585, 3203, 398, 9489, 2850, 9126, 7086, 9774, 9911, 11322, 8514, 7111, 2635, 8523, 344, 10971, 2525, 2277, 7911, 8937, 1776, 6900, 2937, 508 ]
Train
11,631
3
Video_Electronics_Standards_Association:video electronics standards association vesa /ˈviːsə/ formally known video electronics standards association technical standards organization computer display standards organization incorporated california july 1989 office san jose california claims membership 225 companies november 1988 nec home electronics announced creation association develop promote super vga computer display standard successor ibm proprietary video graphics array vga display standard super vga enabled graphics display resolutions 800×600 pixels compared vga maximum resolution 640×480 pixels—a 36 increase organization since issued several additional standards related computer video display following major companies members vesa vesa criticized policy charging non-members published standards people believe practice charging specifications undermined purpose vesa organization according kendall bennett developer vbe/af standard vesa software standards committee closed due lack interest resulting charging high prices specifications time vesa standards available free although vesa hosts free standards documents free collection include newly developed standards even obsolete standards free collection incomplete 2010 current standards documents vesa cost hundreds thousands dollars older standards available free purchase 2017 free downloads require mandatory registration standards bodies provide specifications freely available download many including itu jedec ddwg hdmi hdmi 1.3a time displayport announced vesa criticized developing specification secret track record developing unsuccessful digital interface standards including plug display digital flat panel
[ 134, 6150, 5384, 8977, 2706, 799, 2594, 8355, 10658, 424, 6570, 6575, 8112, 8625, 9137, 1717, 10303, 8266, 10954, 2941, 4567, 10971, 3548, 7647, 4191, 9056, 9057, 9321, 11627, 8301, 11634, 8439, 1400, 3323, 3453 ]
None
11,632
2
Shebang_(Unix):shebang unix computing shebang character sequence consisting characters number sign exclamation mark beginning script also called sha-bang hashbang pound-bang hash-pling unix-like operating systems text file shebang used executable program loader mechanism parses rest file initial line interpreter directive loader executes specified interpreter program passing argument path initially used attempting run script program may use file input data example script named path path/to/script starts following line codice_1 program loader instructed run program /bin/sh passing path/to/script first argument linux behavior result kernel user-space code shebang line usually ignored interpreter character comment marker many scripting languages language interpreters use hash mark begin comments still may ignore shebang line recognition purpose form shebang interpreter directive follows interpreter absolute path executable program optional argument string representing single argument white space optional linux file specified interpreter executed execute right contains code kernel execute directly wrapper defined via sysctl executing microsoft .exe binaries using wine contains shebang linux minix interpreter also script chain shebangs wrappers yields directly executable file gets encountered scripts parameters reverse order example file /bin/a executable file elf format file /bin/b contains shebang /bin/a optparam file /bin/c contains shebang /bin/b executing file /bin/c resolves /bin/b /bin/c finally resolves /bin/a optparam /bin/b /bin/c darwin-based operating systems macos solaris file specified interpreter must executable binary script typical shebang lines shebang lines may include specific options passed interpreter however implementations vary parsing behavior options portability one option specified without embedded whitespace portability guidelines found interpreter directives allow scripts data files used commands hiding details implementation users programs removing need prefix scripts interpreter command line bourne shell script identified path some/path/to/foo initial line executed parameters bar baz provides similar result actually executed following command line instead /bin/sh specifies bourne shell end result shell commands file some/path/to/foo executed positional variables 1 2 values bar baz respectively also initial number sign character used introduce comments bourne shell language languages understood many interpreters whole shebang line ignored interpreter however interpreter ignore shebang line thus script consisting following two lines simply echos lines standard output run compared use global association lists file extensions interpreting applications interpreter directive method allows users use interpreters known global system level without administrator rights also allows specific selection interpreter without overloading filename extension namespace one file extension refers one file type allows implementation language script changed without changing invocation syntax programs invokers script need know implementation language script responsible specifying interpreter use shebangs must specify absolute paths paths relative current working directory system executables cause problems systems non-standard file system layout even systems fairly standard paths quite possible variants operating system different locations desired interpreter python example might /usr/bin/python /usr/local/bin/python even something like /home/username/bin/python installed ordinary user sometimes required edit shebang line copying script one computer another path coded script may apply new machine depending consistency past convention placement interpreter reason posix standardize path names posix standardize feature often program /usr/bin/env used circumvent limitation introducing level indirection. followed /usr/bin/env followed desired command without full path example mostly works path /usr/bin/env commonly used env utility invokes first sh found user path typically /bin/sh system setuid script support reintroduce race eliminated /dev/fd workaround described still portability issues openserver 5.0.6 unicos 9.0.2 /bin/env /usr/bin/env another portability problem interpretation command arguments systems including linux split arguments example running script first line like passed one argument /usr/bin/env rather two arguments cygwin also behaves way complex interpreter invocations possible use additional wrapper another problem scripts containing carriage return character immediately shebang perhaps result edited system uses dos line breaks microsoft windows systems interpret carriage return character part interpreter command resulting error message posix requires sh shell capable syntax similar bourne shell although require located /bin/sh example systems solaris posix-compatible shell /usr/xpg4/bin/sh many linux systems recent releases mac os x /bin/sh hard symbolic link /bin/bash bourne shell using syntax specific bash maintaining shebang pointing bourne shell portable shebang actually human-readable instance magic number executable file magic byte string two-character encoding ascii magic number detected exec family functions determine whether file script executable binary presence shebang result execution specified executable usually interpreter script language claimed old versions unix expect normal shebang followed space slash appears untrue rather blanks shebang traditionally allowed sometimes documented space see 1980 email history section shebang characters represented two bytes extended ascii encodings including utf-8 commonly used scripts text files current unix-like systems however utf-8 files may begin optional byte order mark bom exec function specifically detects bytes 0x23 0x21 presence bom shebang prevent script interpreter executed authorities recommend using byte order mark posix unix-like scripts reason wider interoperability philosophical concerns additionally byte order mark necessary utf-8 encoding endianness issues serves identify encoding utf-8 executable file starting interpreter directive simply called script often prefaced name general classification intended interpreter name shebang distinctive two characters may come inexact contraction sharp bang hash bang referring two typical unix names another theory sh shebang default shell sh usually invoked shebang usage current december 1989 probably earlier shebang introduced dennis ritchie edition 7 8 bell laboratories also added bsd releases berkeley computer science research present 2.8bsd activated default 4.2bsd bell laboratories edition 8 unix later editions released public first widely known appearance feature bsd lack interpreter directive support shell scripts apparent documentation version 7 unix 1979 describes instead facility bourne shell files execute permission would handled specially shell would sometimes depending initial characters script spawn subshell would interpret run commands contained file model scripts would behave commands called within bourne shell attempt directly execute file via operating system exec system trap would fail preventing scripts behaving uniformly normal system commands later versions unix-like systems inconsistency removed dennis ritchie introduced kernel support interpreter directives january 1980 version 8 unix following description kernel support interpreter directives spread versions unix one modern implementation seen linux kernel source fs/binfmt_script.c mechanism allows scripts used virtually context normal compiled programs including full system programs even interpreters scripts caveat though early versions kernel support limited length interpreter directive roughly 32 characters 16 first implementation would fail split interpreter name parameters directive quirks additionally modern systems allow entire mechanism constrained disabled security purposes example set-user-id support disabled scripts many systems note even systems full kernel support magic number scripts lacking interpreter directives although usually still requiring execute permission still runnable virtue legacy script handling bourne shell still present many modern descendants scripts interpreted user default shell
[ 515, 9733, 8966, 9735, 6797, 10387, 7444, 4501, 5397, 10148, 6313, 9780, 823, 9407, 8000, 10304, 5969, 348, 1632, 9444, 8554, 9714 ]
Test
11,633
4
Super_Flexible:super flexible super flexible file synchronizer backup file synchronization software allows backing synchronizing files different drives different media cd dvd flash zip remote server
[ 9025, 11201, 7364, 10341, 3366, 1801, 3629, 1358, 6797, 7983, 11543, 4574 ]
Validation
11,634
3
VESA_BIOS_Extensions:vesa bios extensions vesa bios extensions vbe vesa standard currently version 3 defines interface used software access compliant video boards high resolutions bit depths opposed traditional int 10h bios calls limited resolutions 640×480 pixels 16 color 4-bit depth less vbe made available video card bios installs boot interrupt vectors point newer cards implement capable vbe 3.0 standard older versions vbe provide real mode interface used without significant performance penalty within protected mode operating systems consequently vbe standard almost never used writing video card drivers vendor thus invent proprietary protocol communicating video card despite common driver thunk real mode interrupt order initialize screen modes gain direct access card linear frame buffer tasks would otherwise require handling many hundreds proprietary variations exist card card standard provides primary functionality vesa bios extensions allows applications determine capabilities graphics card provides ability set display modes found vbe 2.0 adds new features prior vbe 1.2 standard including linear framebuffer access protected mode banking vbe core 2.0 features include superset vbe 2.0 standard standard adds refresh rate control facilities stereo glasses improved multi-buffering functions vbe 2.0 standard vbe/af provides low-level standard interface common acceleration functions available hardware functions defined standard access hardware cursors bit block transfers bit blt screen sprites hardware panning drawing functions supplemental specifications provides device independent interface application software super vga hardware function numbers assigned vesa software standards committee ssc dpms hardware standard allows graphics cards communicate dpms-compliant monitors via special signaling system used existing graphics controllers monitor cables signaling system allows graphics card tell monitor go number different power management power saving states effectively allow monitor turn use allows access special features flat panel controllers provides standard audio services currently version 1.00 vbe/ai specification defines three device classes wave midi volume device types covered provides standard entry vendor specific extensions display data channel ddc digital connection computer display graphics adapter allows display communicate specifications adapter standard created vesa provides hardware independent means operating system application read write data i²c serial control interface although mode number 16-bit value optional vbe mode numbers 14 bits wide bit 15 used vga bios flag clear preserve display memory vbe defined mode numbers follows starting vbe/core 2.0 vesa longer defines new vesa mode numbers longer requires device implement old numbers properly detect information screen mode use function 01h return vbe mode information mode 81ffh special video mode designed preserve current memory contents give access entire video memory beginning vbe 2.0 standard new modes defined vesa old modes longer mandatory use defined modes considered deprecated modern video cards may may use mode numbers even though backward compatibility modern software use correct way software discover available display modes obtain list modes using function 00h return vbe controller information check mode using function 01h return vbe mode information finds mode/s requires modes 264–268 text modes 264 0108h 80 columns × 60 rows 80×60 265 0109h 132×25 266 010ah 132×43 267 010bh 132×50 268 010ch 132×60 table combines modes defined vesa values denoted black along modes commonly used may work graphics cards defined standard linux kernel allows user select vesa mode boot time passing code memory kernel lilo boot loader passes code based vga parameter configuration file takes form 'vga=xxx xxx decimal value 'vga=0xhhh hhh hexadecimal value however 'vga= boot loader parameter directly accept vesa video mode numbers rather linux video mode number vesa number plus 512 case decimal representation plus 0x200 case hexadecimal representation example defined vesa value 257 0x101 representing 640x480 256 colours equivalent linux video mode value 769 0x301 see kernel documentation documentation/svga.txt documentation/fb/vesafb.txt indicated earlier vesa standard defines limited set modes particular none 1,280×1,024 covered instead implementation completely optional graphics adapter manufacturers vendors free utilize whatever additional values please means table modes expressed decimal form may apply graphics adapter vga= also appears select 1,280×800 8-bit various laptops displays br vga= 1,400×1,050 hwinfo hardware detection tool used suse linux gnu/linux distributions use hwinfo get actual mode number need pass parameter kernel command run root pick number corresponding desired resolution modes reported hwinfo hexadecimal use '0x prefix convert decimal vesa bios emulation parallels virtual machine different set non-standard vesa modes build 3214 vbetest reveals modes
[ 389, 134, 2706, 7071, 2594, 9892, 6570, 823, 11322, 5312, 5702, 5457, 4567, 5080, 1247, 4071, 1515, 8301, 11631, 6129, 11634, 2811 ]
None
11,635
2
PTDOS:ptdos ptdos processor technology disk operating system operating system created late 1970s computers using intel 8080 microprocessor processor technology helios ii disk memory system following list commands supported ptdos 1.4
[ 2179, 10499, 10883, 4614, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 8503, 4409, 9784, 6075, 7483, 10...
Test
11,636
3
UltraSPARC:ultrasparc ultrasparc microprocessor developed sun microsystems fabricated texas instruments introduced mid-1995 first microprocessor sun implement 64-bit sparc v9 instruction set architecture isa marc tremblay co-microarchitect ultrasparc four-issue superscalar microprocessor executes instructions in-order nine-stage integer pipeline execution units simplified relative supersparc achieve higher clock frequencies example simplification alus cascaded unlike supersparc avoid restricting clock frequency integer register file 32 64-bit entries sparc isa uses register windows ultrasparc eight actual number registers 144 register file seven read three write ports integer register file provides registers two arithmetic logic units load/store unit two alus execute arithmetic logic shift instructions one execute multiply divide instructions floating-point unit consists five functional units one executes floating point adds subtracts one multiplies one divides square-roots two units executing simd instructions defined visual instruction set vis floating-point register file contains thirty-two 64-bit registers five read ports three write ports ultrasparc two levels cache primary secondary two primary caches one instructions one data capacity 16 kb ultrasparc required mandatory external secondary cache cache unified capacity 512 kb 4 mb direct-mapped return data single cycle external cache implemented synchronous srams clocked frequency microprocessor ratios supported accessed via data bus contained 3.8 million transistors fabricated texas instruments epic-3 process 0.5 µm complementary metal–oxide–semiconductor cmos process four levels metal ultrasparc fabricated bicmos process texas instruments claimed scale well 0.5 µm processes offered little performance improvement process perfected ti mvp digital signal processor dsp features missing three levels metal instead four 0.55 feature size used fabricate ultrasparc avoid repeat fabrication problems encountered supersparc ultrasparc packaged 521-contact plastic ball grid array pbga
[ 9090, 9731, 1801, 1675, 4235, 6926, 1809, 4241, 1818, 2334, 6815, 8863, 9637, 1707, 2731, 10926, 3247, 9391, 6322, 2871, 4664, 4285, 6464, 7104, 9665, 8266, 2895, 3919, 597, 7039, 10327, 7770, 2269, 9955, 7270, 3175, 11626, 5358, 1776, 44...
Test
11,637
3
Rekursiv:rekursiv rekursiv computer processor designed david m. harland mid-1980s linn smart computing glasgow scotland one computer architectures intended implement object-oriented concepts directly hardware form high-level language computer architecture rekursiv operated directly objects rather bits nibbles bytes words virtual memory used persistent object store unusually processor instruction set supported recursion hence name project originated initiative within hi-fi manufacturer linn products improve manufacturing automation systems time ran dec vax minicomputer resulted design lingo object-oriented programming language derived smalltalk algol due poor performance lingo vax subsidiary company linn smart computing ltd. formed develop new processor efficiently run lingo rekursiv processor consisted four gate-array chips named numerik 32-bit alu logik instruction sequencer objekt object-oriented memory management unit klock processor clock support logic small number prototype vmebus boards called hades comprising four chips plus 80 mb ram produced intended installation host system sun-3 workstation although rekursiv never fully developed commercial success several hades boards used academic research projects uk last known copy rekursiv computer ended bottom forth clyde canal glasgow
[ 512, 544, 7104, 2243, 6187, 9932, 5358, 11539, 3350, 5503 ]
None
11,638
6
Fossil_(file_system):fossil file system fossil default file system plan 9 bell labs serves network protocol 9p runs user space daemon like plan 9 file servers fossil different file systems due snapshot/archival feature take snapshots entire file system command automatically user-set interval snapshots kept fossil partition long disk space allows partition fills old snapshots removed free disk space snapshot also saved permanently venti fossil venti typically installed together important features include access snapshot one would connect running fossil instance “ mount ” change directory desired snapshot e.g /snapshot/yyyy/mmdd/hhmm yyyy mm dd hh mm meaning year month day hour minute access archive permanent snapshot directory form /archive/yyyy/mmdds yyyy mm dd meaning year month day sequence number would used plan 9 allows modifying namespace advanced ways like redirecting one path another path e.g /bin/ls /archive/2005/1012/bin/ls significantly eases working old versions files fossil available several platforms via plan 9 user space fossil designed implemented sean quinlan jim mckie russ cox bell labs added plan 9 distribution end 2002 became default file system 2003 replacing kfs previous plan 9 archival file system dubbed plan 9 file server fs fs also archival file system originally designed store data worm optical disc system permanent storage fossil provided venti typically stores data hard drives much lower access times optical discs
[ 5120, 2051, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 10851, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1212, 8380, 10951, 9420, ...
Validation
11,639
4
Length_extension_attack:length extension attack cryptography computer security length extension attack type attack attacker use hash message length message calculate hash message ‖ message attacker-controlled message without needing know content message algorithms like md5 sha-1 sha-2 based merkle–damgård construction susceptible kind attack sha-3 algorithm susceptible merkle–damgård based hash misused message authentication code construction h secret ‖ message message length secret known length extension attack allows anyone include extra information end message produce valid hash without knowing secret note since hmac n't use construction hmac hashes prone length extension attacks vulnerable hashing functions work taking input message using transform internal state input processed hash digest generated outputting internal state function possible reconstruct internal state hash digest used process new data way one may extend message compute hash valid signature new message server delivering waffles specified type specific user location could implemented handle requests given format server would perform request given deliver ten waffles type eggo given location user 1 signature valid user signature used mac signed key known attacker example also vulnerable replay attack sending request signature second time possible attacker modify request example switching requested waffle eggo liege done taking advantage flexibility message format duplicate content query string gives preference latter value flexibility indicate exploit message format message format never designed cryptographically secure first place without signature algorithm help order sign new message typically attacker would need know key message signed generate new signature generating new mac however length extension attack possible feed hash signature given state hashing function continue original request left long know length original request request original key length 14 bytes could determined trying forged requests various assumed lengths checking length results request server accepts valid message fed hashing function often padded many algorithms work input messages whose lengths multiple given size content padding always specified hash function used attacker must include padding bits forged message internal states message original line thus attacker constructs slightly different message using padding rules message includes padding appended original message inside hash function payload case 0x80 followed number 0x00s message length 0x228 552 14+55 *8 length key plus original message appended end attacker knows state behind hashed key/message pair original message identical new message final attacker also knows hash digest point means know internal state hashing function point trivial initialize hashing algorithm point input last characters generate new digest sign new message without original key combining new signature new data new request server see forged request valid request due signature would generated password known
[ 8674, 7556, 4389, 6954, 3984, 9170, 3477, 2357, 1941, 8694, 6905, 2558 ]
Test
11,640
7
BigMachines:bigmachines bigmachines software company founded 2000 godard abel christopher shutts headquartered deerfield illinois united states development offices san mateo california hyderabad india bigmachines also european operations offices frankfurt main germany london served bigmachines ag well offices singapore tokyo sydney serving asia-pacific company software designed integrate enterprise resource planning erp customer relationship management crm business systems vista equity partners private equity firm based san francisco acquired majority ownership bigmachines several transactions starting january 2001 vista equity acquired majority ownership company december 2010.shortly vista acquired majority ownership abel left company three years later oracle corporation announced acquiring bigmachines october 24 2013 transaction later completed oracle kept product called cpq cloud company partnered salesforce.com oracle crm on-demand vendavo pros provide software applications crm systems
[ 10090 ]
None
11,641
9
Epigram_(programming_language):epigram programming language epigram functional programming language dependent types epigram also refers ide usually packaged language epigram type system strong enough express program specifications goal support smooth transition ordinary programming integrated programs proofs whose correctness checked certified compiler epigram exploits propositions types principle based intuitionistic type theory epigram prototype implemented conor mcbride based joint work james mckinna development continued epigram group nottingham durham st andrews royal holloway uk current experimental implementation epigram system freely available together user manual tutorial background material system used linux windows mac os x currently unmaintained version 2 intended implement observational type theory never officially released however exists github mirror last updated 2012 design epigram epigram 2 inspired development systems agda idris coq epigram uses two-dimensional natural deduction style syntax latex version ascii version examples epigram tutorial following declaration defines natural numbers declaration says codice_1 type kind codice_2 i.e. simple type two constructors codice_3 codice_4 constructor codice_4 takes single codice_1 argument returns codice_1 equivalent haskell declaration codice_8 latex code displayed formula_1 horizontal-line notation read assuming top true infer bottom true example assuming codice_9 type codice_1 codice_11 type codice_1 nothing top bottom statement always true codice_3 type codice_1 cases formula_2 formula_3 formula_4 ... ascii ... ascii epigram essentially typed lambda calculus generalized algebraic data type extensions except two extensions first types first-class entities type formula_5 types arbitrary expressions type formula_5 type equivalence defined terms types normal forms second dependent function type instead formula_7 formula_8 formula_9 bound formula_10 value function argument type formula_11 eventually takes full dependent types implemented epigram powerful abstraction unlike dependent ml value depended upon may valid type sample new formal specification capabilities dependent types bring may found epigram tutorial
[ 1952, 9345, 3876, 5796, 10953, 12, 5612, 6797, 7983, 11221, 3926, 823, 1019, 8924, 5885, 6239 ]
None
11,642
4
Erik_Laykin:erik laykin erik laykin born 1964 los angeles california computer forensics expert cyber-crime investigator erik laykin past president pacific rim director l.a. fbi infragard program well chairman advisory board ec-council electronic commerce council laykin served expert witness court technology investigations co-founder online security inc. charlie balot mid-1990s established initial computer forensic capabilities behalf american investigative agencies kroll inc. investigative group international pinkerton investigations established first commercial computer forensic labs los angeles chicago hong kong catering legal corporate community director navigant consulting inc. nyse nci 2004 2008 established information technology investigations practice worked noted industry leaders jennifer baker james gordon managing director duff phelps llc 2008 co-practice chair global electronic discovery investigations practice led data forensics ediscovery investigative team 2009–2010 behalf court-appointed lehman brothers bankruptcy examiner anton valukis chairman jenner block whose extensive report brought light lehman brothers usage repo 105 laykin appointed california insurance commissioner gubernatorial candidate steve poizner california department insurance anti-fraud task force chaired technology committee laykin featured 2010 history channel e network series partners crime episode control-alt-delete highlighted number high tech investigations asia program syndicated crime investigation network south east asia throughout asia laykin featured 2013 smithsonian channel series forensic firsts catching criminals chronicles variety investigations utilize forensic sciences legal selected laykin one 50 top global digital forensic experts 2014,2015 2016 calling authority e-discovery digital forensics laykin contributing author life death dotcom china published asia law practice 2000 laykin book investigative computer forensics published john wiley sons 2013
[ 7968, 4834, 5475, 5284, 2437, 7525, 9319, 6475, 11182, 830, 4049, 4789, 8635, 2494 ]
Validation
11,643
2
Michael_Tiemann:michael tiemann michael tiemann vice president open source affairs red hat inc. former president open source initiative chief technical officer red hat served number boards including embedded linux consortium gnome foundation advisory board board directors activestate tool corp also co-owner amy tiemann manifold recording studios co-founded cygnus solutions 1989 programming contributions free software include authorship gnu c++ compiler work gnu c compiler gnu debugger tiemann featured 2001 documentary revolution os opensource.com profiled 2014 calling one open source great explainers earned bachelor degree moore school electrical engineering 1986 university pennsylvania
[ 1026, 9353, 5644, 4367, 8848, 657, 1553, 1939, 10642, 2581, 3478, 6808, 7450, 2974, 6302, 7584, 11297, 802, 5410, 6691, 6947, 8354, 5931, 8364, 1717, 823, 10172, 2109, 11069, 10687, 10822, 8263, 843, 589, 6352, 4177, 10961, 8147, 8787, 44...
Test
11,644
2
DynamoRIO:dynamorio dynamorio bsd licensed dynamic binary instrumentation framework development dynamic program analysis tools dynamorio targets user space applications android linux windows operating systems running aarch32 ia-32 x86-64 instruction set architectures dynamorio originally created dynamic binary optimization system since used security debugging analysis tools dynamorio originated collaboration hewlett-packard dynamo optimization system runtime introspection optimization rio research group mit hence combined name dynamorio first released publicly proprietary binary toolkit june 2002 later open-sourced bsd license january 2009 dynamorio process virtual machine redirects program execution original binary code copy code instrumentation carries actions desired tool added copy changes made original program need specially prepared way dynamorio operates completely run time handles legacy code dynamically loaded libraries dynamically generated code self-modifying code dynamorio monitors control flow capture entire execution target program monitoring adds overhead even tool present dynamorio average overhead 11 percent dynamorio api abstracts away details virtualization process focuses monitoring modifying dynamic code stream program tool insert trampolines program invoke tool actions specific program points tool also insert instrumentation assembly language level provides fine-grained control tool actions tool performance dynamorio supports adaptive optimization adaptive instrumentation allowing tool remove modify instrumentation point throughout execution target program dynamorio invokes tool-registered callbacks number common program event points thread creation library loading system calls signals exceptions api also allows inspecting program libraries address space addition code dynamorio api event callbacks designed cross-platform enabling tool code operate windows linux ia-32 x86-64 dynamorio ensures tool transparency isolating tool resources stack memory file accesses program upon tool operating dynamorio contains libraries extend api provide symbol table access function wrapping replacing memory address tracing utilities first tools built dynamorio focused dynamic optimization number research tools built variety purposes including taint checking profiling applying dynamorio security field resulted technique called program shepherding program shepherding instrumentation monitors origin program instruction control flow instructions order prevent security exploit taking control program 2003 program shepherding commercialized brand-named memory firewall host intrusion prevention software startup company called determina determina acquired vmware august 2007 dr. memory open-source memory debugger built dynamorio released lgpl license dr. memory monitors memory allocations memory accesses using shadow memory detects memory-related programming errors accesses uninitialized memory accesses freed memory heap overflow underflow memory leaks feature set similar valgrind-based memcheck tool though operates windows well linux twice fast memcheck
[ 10016, 5380, 3048, 5384, 6153, 9320, 5356, 6477, 814, 815, 4112, 5040, 7983, 8401, 11624, 823, 477, 5598 ]
Test
11,645
2
Access_register:access register ibm terminology access registers hardware registers processor work conjunction general purpose registers giving address space access data spaces address spaces order retrieve data ars introduced mvs/esa
[ 1801, 2226, 3323, 5598 ]
Validation
11,646
7
Workday,_Inc.:workday inc. workday inc. on‑demand cloud-based financial management human capital management software vendor founded david duffield founder former ceo erp company peoplesoft former peoplesoft chief strategist aneel bhusri following oracle hostile takeover peoplesoft 2005 october 2012 launched successful initial public offering valued company 9.5 billion workday founded march 2005 launched november 2006 initially funded duffield venture capital firm greylock partners december 2008 workday moved headquarters walnut creek california pleasanton california peoplesoft founder duffield prior company located february 6 2008 workday announced reached definitive agreement purchase cape clear software may 2008 workday signed large contract flextronics provide human capital management software services large multinational companies publicly disclosed contracts deployments workday include aviva chiquita brands cae inc. fairchild semiconductor rentokil initial thomson reuters time warner april 29 2009 workday announced secured 75 million funding led new enterprise associates existing investors greylock partners workday ceo co‑founder dave duffield also participated round october 24 2011 workday announced 85 million new funding bringing total capital raised 250 million investors latest round included t. rowe price morgan stanley investment management janus bezos expeditions personal investment entity amazon ceo founder jeff bezos spring 2012 workday 310 customers ranging mid-sized businesses fortune 500 companies october 2012 workday launched initial public offering ipo new york stock exchange ticker symbol wday shares priced 28 ended trading friday october 12 48.69 propelled start-up market capitalization nearly 9.5 billion including unexercised stock options sold 22.75 million class shares raising 637 million ipo raised cash launch u.s. technology sector since facebook 16 billion ipo may 2012 shares surged 74 ipo underscoring investor interest cloud computing ceo workday aneel bhusri partner greylock partners handled senior leadership positions earlier career peoplesoft dave duffield serves chairman board workday makes money selling subscriptions services rather selling software outright expenses booked front signs new customer associated revenue recognized life multiyear agreements first quarter 2016 workday announced annual revenue excess 1 billion first time ever fiscal year 2016 duffield holds voting rights workday shares worth 3.4 billion bhusri held rights shares valued 1.3 billion collectively hold 67 company voting shares voting structure makes event hostile takeover much less likely workday released 32 updates product line march 2019 releases major update every 6 months every september march workday adopted ibm cloud primary development testing platform order accelerate worldwide expansion february 2014 workday acquired startup identified artificial intelligence syman create insight apps line products first products running syman announced workday rising 2014 july 2017 workday ceo aneel bhusri announced company decided open platform developers partners third party software result workday enter platform service paas market bhusri said move allow customers build custom extensions applications work workday january 2018 workday announced acquired skipflag makers ai knowledge base builds company internal communications 2013 workday participated round funding big data analytics platform datameer 2014 workday also participated anaplan 100m funding 2017 workday participated duo security 70m funding
[ 1539, 526, 4623, 11280, 10265, 5662, 5666, 9766, 39, 5159, 3121, 5681, 10820, 11333, 4683, 590, 1102, 7248, 5202, 4194, 5732, 2170, 9863, 4236, 7820, 10893, 8865, 6307, 2217, 6834, 9906, 7352, 4289, 3269, 1224, 8921, 6367, 2795, 3819, 537...
None
11,647
5
Bonjour_Sleep_Proxy:bonjour sleep proxy apple bonjour sleep proxy service open source component zero configuration networking designed assist reducing power consumption networked electronic devices device acting sleep proxy server respond multicast dns queries another compatible device gone low power mode low-power-mode device remains asleep sleep proxy server responds multicast dns queries sleep proxy server sees query requires low-power-mode device wake sleep proxy server sends special wake-up-packet magic packet low-power-mode device finally communication parameters updated via multicast dns normal communications proceed apple inc. describes service bonjour sleep proxy support documents service supports wake demand feature first offered mac os x snow leopard sleep proxy service responds address resolution protocol requests behalf low-power-mode device sleep proxy sees ipv4 arp ipv6 nd request one sleeping device addresses answers behalf sleeping device without waking giving mac address current temporary owner address may appear confusing network administrators expecting behaviour changing mac addresses case low-power-mode device communicating via wi-fi wake-up-packet sent via wireless multimedia extensions wmm possible previous implementations wake lan wol wireless hardware must updated enough include wmm support apple provides instructions checking compatibility feature macintosh computers sleep proxy service able advertise bonjour-supported services host computer sleeps examples supported services stuart cheshire page describing steps troubleshooting sleep proxy service implementations local area network seen bonjour browser
[ 10242, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 2509, 4687, 5843, 2904, 5469, 5470, 5471, 5472, 7519, ...
Train
11,648
2
DemoLinux:demolinux demolinux one first live cd linux distributions created roberto di cosmo vincent balat jean-vincent loddo 1998 demolinux cd created make possible use linux without install hard disk first linux live cd making possible use system graphic mode without stage configuration many live cd linux distributions today one consider demolinux ancestor knoppix demolinux offered users hundreds applications among kde staroffice thanks compressed file system cd could used without modification hard disk user possibility use transparent way space disc store personal data even install new applications using standard tools base distribution version 1 based mandrake linux mandriva linux versions 2 3 used mechanism independent distribution distributed mainly debian basis last versions made possible moreover install linux hard disk thus offering simple installation procedure debian principle used today linux distributions demolinux distributed many computer magazines several countries still downloadable official website evolved since 2002
[ 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 3369, 11305, 7854, 2738, 4790, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 6371, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920, 8177,...
None
11,649
3
Macintosh_Portable:macintosh portable macintosh portable portable computer designed manufactured sold apple computer inc. september 1989 october 1991 first battery-powered macintosh garnered significant excitement critics sales customers quite low featured fast sharp expensive black white active matrix lcd screen hinged design covered keyboard machine use portable one early consumer laptops employ active matrix panel expensive initial powerbook line powerbook 170 used one due high cost cursor pointing function handled built-in trackball could removed located either side keyboard used expensive sram effort maximize battery life provide instant low power sleep mode machine designed deliver high performance cost price weight unlike later portable computers apple manufacturers battery wired series ac power supply possible alternative direct connection ac supply flat battery meant computer could operated original power supply low output several popular unauthorized workarounds devised including use power supply powerbook 100 series provides higher output automotive batteries sealed lead acid cells used portable failed fully discharged batteries longer manufactured rare find original battery hold charge allow computer start possible repack battery new cells use alternative 6 v batteries three lead-acid cells inside battery manufactured gates energy products enersys also used quantum 1 battery packs photographic flash use despite dramatic improvement terms ergonomics offered responsiveness sharpness uniformity active matrix panel one drawbacks portable poor readability low light situations consequently february 1991 apple introduced backlit macintosh portable model m5126 along new screen apple changed sram memory less expensive power-hungry pseudo-sram reduced total ram expansion 8 mb lowered price backlight feature welcomed improvement unfortunately reduced battery life half upgrade kit also offered earlier model well plugged rom expansion slot portable discontinued october 1991 addition 16 pounds 7.2 kilograms 4 inches 10 centimetres thick portable heavy bulky portable computer main contributor weight bulk portable lead-acid batteries three drive configurations available macintosh portable one floppy drive two floppy drives hard drive floppy drive floppy drive macintosh portable 1.44 mb macintosh portable units came hard drive custom-engineered conner cp-3045 known apple hard disk 40sc holds 40 mb data consumes less power compared hard drives time proprietary scsi connector adapters allow standard scsi drives used portable exist expensive macintosh portable powerbook 100 run macintosh system 6.0.4 system 7.5.5 may 2006 pc world rated macintosh portable seventeenth worst tech product time contrast macuser magazine noted machine tended remain relevant therefore tended long usage lifespan bought reducing total cost ownership
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 1592, 8253, 576, 1090, 4180, 10838, 10840, 9312, 7269, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, ...
Test
11,650
8
Extensible_User_Interface_Protocol:extensible user interface protocol extensible user interface protocol xup proposed web standard xup soap-based protocol communicating events user interface user interface described xml document specification limit format xml document event model used communicating xup examples given specification possible user interface languages include xhtml wireless markup language xul xup specification submitted world wide web consortium w3c consortium member martsoft corporation march 2002. w3c note meaning w3c committed developing standard potential recommendation hosted informational purposes
[ 4768, 7455, 6629, 8070, 6775, 7943, 10791, 5907, 10611, 4213, 502, 119, 2296, 10486, 8923, 124, 10910, 479 ]
Test
11,651
1
SpatiaLite:spatialite spatialite spatial extension sqlite providing vector geodatabase functionality similar postgis oracle spatial sql server spatial extensions although sqlite/spatialite n't based client-server architecture adopt simpler personal architecture i.e whole sql engine directly embedded within application complete database simply ordinary file freely copied even deleted transferred one computer/os different one without special precaution spatialite extends sqlite existing spatial support cover ogc sfs specification n't necessary use spatialite manage spatial data sqlite implementation r-tree indexes geometry types spatialite needed advanced spatial queries support multiple map projections spatialite provided natively linux windows software library well several utilities incorporate spatialite library utilities include command line tools extend sqlite spatial macros graphical gui manipulating spatialite databases data simple desktop gis tool browsing data single binary file spatialite also used gis vector format exchange geospatial data spatialite supports several open standards ogc listed reference implementation proposed geopackage standard
[ 580, 5546, 8554, 6797, 7983, 11030, 823, 4058, 3454 ]
Test
11,652
2
GNO/ME:gno/me gno multitasking environment also known gno/me gno short unix-like operating system apple iigs computer developed procyon enterprises sold commercially 1991 august 1996 released freeware development continued devin reade released current version 2.0.6 15 february 1999 source code since released via github. ref name= gno/me source /ref
[ 2179, 7364, 7983, 5492, 5397, 11221 ]
Train
11,653
4
Entrust:entrust entrust inc. 130 million privately owned software company 350 employees originally spin-off nortel secure networks division provides identity management security software services areas public key infrastructure pki multifactor authentication secure socket layer ssl certificates fraud detection digital certificates mobile authentication prior acquired datacard entrust headquartered dallas-fort worth metroplex also offices ottawa london tokyo washington d.c. cities internationally entrust reports customers public private organizations 60 countries 125 patents either granted pending areas authentication physical/logical access certificates e-content delivery citizen identities previously publicly traded company july 2009 entrust acquired thoma bravo u.s.-based private equity firm 124 million december 2013 datacard group announced acquisition entrust inc. subsequently rebranded entrust datacard datacard group finalized acquisition entrust december 2013 private equity firm thoma bravo chertoff capital wholly owned subsidiary chertoff group centerview partners acted financial advisors entrust september 2008 entrust participated epassports eac conformity interoperability tests prague czech republic facilitated consortium european commission brussels interoperability group big european commission joint research centre prague tests allowed european countries verify conformance second-generation epassports containing fingerprint biometric data protected extended access control functions commonly referred eac additional testing included verification crossover interoperability eac inspection systems epassports different countries prior becoming private-equity company entrust included russell 3000 index july 2008 july 2007 entrust contributed pki technology open-source community sun microsystems inc. mozilla foundation specifically entrust supplied certificate revocation list distribution points crl-dp patent 5,699,431 sun royalty-free license incorporation capability mozilla open-source libraries july 2006 entrust acquired business signatures corporation supplier non-invasive fraud detection solutions 50 million usd gaap accounting perspective total purchase price approximately 55.0 million including assumed stock options transaction expenses net asset value business signatures founded 2001 redwood city california former executives oracle hp cisco originally funded texas pacific group walden international ram shriram google dave roux silver lake partners company 40 employees acquisition entrust acquired orion security solutions supplier public key infrastructure services june 2006 mid-2004 entrust acquired amikanow corporation content scanning analysis compliance technology technology designed automatically analyze categorize email message document content based contextual meaning rather pre-defined word lists policies customized suit corporate environment automatically enforced boundary aimed compliance privacy securities laws including hipaa gramm-leach-bliley act personal information protection electronic documents act various u.s. securities exchange commission sec regulations april 2002 entrust pki technology served foundation prototype united states federal bridge certification authority fbca federal bridge certificate authority fundamental element trust infrastructure provides basis intergovernmental cross-governmental secure communications entrust pki interoperable major fbca vendors may 2000 entrust acquired encommerce provider authentication authorization technologies 1994 entrust built sold first commercially available pki
[ 3521, 513, 9665, 517, 9221, 8615, 2154, 5834, 10831, 2354, 9394 ]
Test
11,654
2
Matt_Lee_(artist):matt lee artist matt lee born july 21 1981 british artist comedian director software freedom activist hacker writer free software developer previously gitlab formerly technical lead creative commons 2014-2016 speaker webmaster gnu project also founded gnu social gnu fm projects 2008 2012 lee main contact behind free software foundation defective design play ogg campaigns also served chief-webmaster gnu project 2007 lee wrote produced happy birthday gnu starring stephen fry short film commemorate 25th anniversary gnu project final product released creative commons license 2015 co-wrote directed first feature orang-u ape goes college lee currently delivers speeches following topics english
[ 2050, 7938, 1028, 2180, 4230, 7812, 4360, 8326, 9865, 4493, 1939, 2195, 1813, 11155, 2332, 10012, 1694, 10780, 3744, 802, 3618, 4265, 4011, 11180, 9646, 6962, 5555, 823, 2233, 9148, 9660, 10687, 10817, 8258, 10822, 5703, 5833, 5067, 4561, ...
Test
11,655
2
Nokia_N95:nokia n95 nokia n95 smartphone produced nokia part nseries line portable devices announced september 2006 released market march 2007 n95 ran s60 3rd edition symbian os v9.2 two-way sliding mechanism used access either media playback buttons numeric keypad first released silver later black limited edition quantities gold purple launch price n95 around n95 high-end model marketed multimedia computer much like nseries devices featured then-high 5 megapixel resolution digital camera carl zeiss optics flash well then-large display measuring 2.6 inches also nokia first device built-in global positioning system gps receiver used maps turn-by-turn navigation first accelerometer also one earliest devices market supporting hsdpa 3.5g signals introduction original model technically named n95-1 several updated versions released notably n95 8gb 8 gigabytes internal storage larger display improved battery 'classic n95 upgraded variant n95 8gb widely considered breakthrough technologies time well noted camera gps mapping capabilities innovative dual-slider hailed one best mobile devices released phone unveiled 26 september 2006 nokia open studio 2006 event new york city considered turning point mobile industry due various capabilities however device took long finally released almost 6 months 8 march 2007 nokia shipping n95 key european asian middle eastern markets sale many countries week 11 march n95 still available limited quantities early stage therefore price briefly raised 800 euros 7 april 2007 n95 went sale united states nokia flagship stores new york chicago nokia nseries.com website us carriers expected offer phone u.s. version started retailing without carrier branding discounts nokia flagship stores new york chicago 26 september 2007 29 august 2007 two updated versions n95 announced press event london first n95-2 n95 8 gb updated version european/asian markets 8 gigabytes internal storage larger screen secondly n95-3 n95 nam replacing original 2100 mhz w-cdma air interface support 850 mhz 1900 mhz frequencies used 3g networks gsm-compatible mobile carriers americas including mobility finally later 7 january 2008 nokia introduced n95-4 us 8 gb version n95-3 phone got fcc approval 30 january launched 18 march first carrier utilise approval rogers wireless may 2009 also ces 2008 red-coloured limited edition nokia n95 announced released year n95 main competitors lifetime lg prada apple iphone sony ericsson w950i k850 n95 managed outsell rivals despite apple much-hyped iphone multi-touch technology thin design advanced web capabilities n95 several key features iphone camera flash video camera bluetooth file sharing 3g 3.5g connectivity gps third-party applications several features even release later nseries phones n95 retail price still around early 2010 despite three-year old age n95 contained integrated gps receiver located 0 key keypad phone ships nokia maps navigation software box n95 supported audio mp3 wma realaudio sp-midi aac+ eaac+ midi amr m4a formats two-way slide opened towards keypad allowed access media playback buttons standard 3.5 mm jack located left side phone allowed user connect standard headphones unit ad-43 headset adapter n95 introduced support multiple remote control buttons headset users also use bluetooth audio output using a2dp use built-in stereo speakers n95 also capable playing video 3gp mpeg4 realvideo newer firmware flash video formats phone video output could also played tv-out feature tv-out feature offered phones omap processor allowed users connect smartphone using supplied cable tv composite video input main purpose allow users show photos videos large screen n95 built upnp capabilities also allowed user share phones media wlan network provides easy access photos music videos stored phone upnp capable devices network enabling watched downloaded air n95 built-in wi-fi could access internet 802.11b/g wireless network n95 could also connect internet carrier packet data network umts hsdpa edge webkit-based browser displayed full web pages opposed simplified pages phones web pages may viewed portrait landscape mode automatic zooming supported n95 also built-in bluetooth works wireless earpieces use bluetooth 2.0 technology file transfer original n95 support us based versions umts/hsdpa umts features versions phone disabled default furthermore later n95 us versions support 850/1900 mhz umts/hsdpa bands neither 1700 mhz t-mobile usa 2100 mhz bands supported internationally phone could also act wan access point allowing tethered pc access carrier packet data network voip software functionality also included phone though carriers opted remove feature n95 included built-in accelerometer originally used video stabilization photo orientation keep landscape portrait shots oriented taken nokia research center allowed application interface directly accelerometer allowing software use data nokia released step counter application demonstrate another nokia-created application taking advantage accelerometer nokia sports tracker third-party programs created including software automatically change screen orientation phone tilted program simulates sounds star wars lightsaber phone waved air program allowing user mute phone turning face-down etc n95 compatible n-gage mobile gaming service n95 much talked announcement initially viewed niche feature-packed device however became huge sales success nokia released regions 7 million nokia n95 units sold end 2007 q1 2008 report nokia claimed 3 million n95 including 8gb variant units shipped quarter bringing total least 10 million managed outsell rivals lg viewty iphone camera capabilities put competition phones sony ericsson k850i december 2007 mobile gazette called best phone 2007 6 november 2007 allaboutsymbian declared n95 8gb best smartphone ever years later 24 january 2013 pc magazine described nokia n95 one best smartphones history platform slightly improved model candybar form called nokia n82 released late 2007 next year saw introduction nokia n96 revision n95 called n95 8 gb n95-2 internally known rm-320 announced 21 august 2007 put market october 2007 released black color instead silver like n95-1 new model original n95 often referred n95 classic changes compared original n95 nokia n95-3 revision n95 internally designated rm-160 designed specifically north american market also available australian south american market following changed original version main differences n95-2 n95-3 n95-4 also additional changes removal sliding lens cover camera improved battery life doubling ram 64 128 mb featuring internal name rm-245 n95-5 targeted chinese market main difference regular n95 lack 3g connectivity support yet adopted china time release absence wlan connectivity due chinese regulations n95-6 internally coded rm-321 chinese market-targeted version n95-2 lacking 3g wlan support like n95-5 table lists specifications differ versions n95 models
[ 1537, 4609, 8577, 9732, 3205, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 5677, 9262, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, ...
None
11,656
2
Input/Output_Supervisor:input/output supervisor input/output supervisor ios ios 11 portion control program ibm mainframe os/360 successors operating systems issues privileged i/o instructions supervises resulting i/o interruptions program requests i/o device operations normal abnormal conclusion operations ios two purposes facilitate handling i/o requests interruptions ios divided two primary program sections csects primary sections resident main storage provide control program support normal execution channel programs secondary program sections also csects termed error recovery procedures erps one exception located external storage brought main storage recovery abnormal execution channel programs early instances os sections brought input/output supervisor transient area unlike os/360 control program supervisor call transient areas post-mvt instances os sections located pageable linkpack area plpa demand-paged sole exception course erp direct access storage devices must always remain resident order recover possible i/o errors ipl volume volumes contain datasets may concatenated certain system datasets ios designed around multi-programming concept whereby operations different i/o channels control units devices may managed concurrently apparently simultaneously concurrency apparent simultaneity present even basic version os pcp otherwise supports one user task underlying hardware architecture one set i/o instructions one i/o interruption accessing devices accessing resulting device status respectively available support attached i/o devices hence i/o device operations must synchronously multiplexed half-dozen privileged i/o instructions asynchronously de-multiplexed single i/o interruption ios yet entire process start finish made appear synchronous application essentially ios hypervising operating system built top os entirely within separable function specialized hypervisor sure hypervisation restricted several i/o instructions one i/o interruption mvs/370 later instances os ios also designed around multi-processing concept whereby available processors many two mvs/370 many sixteen later instances os twelve supported ibm sixteen supported amdahl effectively efficiently utilized best utilize multi-processing capability ios multi-programming implementation partitioned smaller executable units particular may executed control srb ios invoked directly programmer rather ios invoked branch entries start i/o requests interrupt handlers complete i/o requests
[ 11131, 868, 8966, 9639, 7272, 8393, 4586, 7053, 10094, 7983, 10958, 8754, 3669, 11381, 2616, 7195, 7836 ]
Test
11,657
3
Toshiba_T1000:toshiba t1000 toshiba t1000 laptop computer manufactured toshiba corporation 1987 similar specification ibm pc convertible 4.77 mhz 80c88 processor 512 kb ram monochrome cga-compatible lcd unlike convertible includes standard serial port parallel port connectors external monitor real-time clock unusually ibm compatible pc t1000 contained 256 kb rom copy ms-dos 2.11 acted small read-only hard drive alternative operating systems could still loaded floppy drive present ramdisk along earlier t1100 t1200 systems toshiba t1000 one early computers feature laptop form factor battery-powered operation pc magazine 1988 named toshiba t1000 editor choice among 12 tested portable computers one reviewer called first real dos laptop plausible replacement tandy 200 another praised durability 60,000 miles traveling incredible bargain 800 street price byte 1989 listed t1000 among excellence winners byte awards stating takes portability limit ... self-contained get still real computer handle real-world workloads noting available little 850 magazine reported many us love one issue jerry pournelle praised little gem acknowledging cost trs-80 model 100 nec pc-8201 believed get quite lot added weight price reported many writers swear t1000 david drake loves compatible software written ibm pc/xt using color graphics adapter cga display laptop battery pack must charged working laptop power
[ 6311, 780, 9166, 7983, 1776, 4244, 6004, 4666, 859, 10749 ]
None
11,658
7
NorduGrid:nordugrid nordugrid collaboration aiming development maintenance support free grid middleware known advanced resource connector arc name nordugrid first became known 2001 short project called nordic testbed wide area computing data handling funded nordic council ministers via nordunet2 programme project main goal set prototype distributed computing infrastructure testbed aiming primarily needs high energy physics researchers atlas experiment following evaluation existing grid technology solutions nordugrid developers came alternative software architecture implemented demonstrated may 2002 soon became known nordugrid middleware 2004 middleware solution given proper name advanced resource connector arc may 2003 nordugrid headquarters niels bohr institute 5th nordugrid workshop decided move oslo university present-day formal collaboration established 2005 five nordic academic institutes niels bohr institute copenhagen denmark helsinki institute physics finland oslo university norway lund uppsala universities sweden goal develop support maintain popularize arc deployment support nordic grid infrastructure became responsibility ndgf project launched june 2006 marked clear separation grid middleware providers infrastructure services providers support arc development nordugrid several interested partners secured dedicated funding eu fp6 project knowarc nordugrid collaboration based upon non-binding memorandum understanding open new members nordugrid collaboration consortium behind arc middleware key goal ensure arc developed maintained supported widely deployed remaining free open-source software suitable wide variety high-throughput grid computational tasks ultimate goal provide reliable scalable portable full-featured solution grid infrastructures conformant open standards primarily developed framework open grid forum arc software development may often take place outside nordugrid collaboration coordinates contributions code maintains code software repositories well build system issue tracking system necessary software development services nordugrid defines strategical directions development arc ensures financial support term arc community used refer various groups people willing share computational resources via arc tit-for-tat user group formalized virtual organisation vo allowing mutual use community resources contrary popular belief nordugrid members required provide computing storage resources neither offering resources grants automatic membership still arc community whole owns substantial amount computing storage resources voluntarily basis purpose open-source development process community members may donate cpu cycles storage space developers testers resources constitute testbed arc middleware donated community resources nordugrid provide allocate computational resources coordinate worldwide deployment arc actual deployment usage arc-based distributed computing infrastructures coordinated respective infrastructure projects e.g ndgf swegrid sweden material sciences national grid infrastructure m-grid finland norgrid norway etc.. apart contributing computational resources many groups develop higher-level software tools top arc e.g. kind development coordinated nordugrid assistance provided collaboration upon request nordugrid certification authority ca currently major infrastructure service provided nordugrid authority issues electronic certificates users services work grid environments present day grid implementations require x.509 certificates validate identity grid participants nordugrid ca provides certificates individuals machines associated research and/or academic institutions denmark finland norway sweden nordugrid certification authority member european policy management authority grid authentication eugridpma
[ 10721, 5956, 5414, 198, 3849, 5654, 11353, 8122, 7935 ]
Test
11,659
4
Aaron_Swartz:aaron swartz aaron hillel swartz november 8 1986january 11 2013 american computer programmer entrepreneur writer political organizer internet hacktivist involved development web feed format rss markdown publishing format organization creative commons website framework web.py co-founder social news site reddit given title co-founder combinator owner paul graham formation bug inc. merger swartz project infogami company run alexis ohanian steve huffman swartz work also focused civic awareness activism helped launch progressive change campaign committee 2009 learn effective online activism 2010 became research fellow harvard university safra research lab institutional corruption directed lawrence lessig founded online group demand progress known campaign stop online piracy act 2011 swartz arrested massachusetts institute technology mit police state breaking-and-entering charges connecting computer mit network unmarked unlocked closet setting download academic journal articles systematically jstor using guest user account issued mit federal prosecutors later charged two counts wire fraud eleven violations computer fraud abuse act carrying cumulative maximum penalty 1 million fines 35 years prison asset forfeiture restitution supervised release swartz declined plea bargain would served six months federal prison two days prosecution rejected counter-offer swartz found dead brooklyn apartment hanged 2013 swartz inducted posthumously internet hall fame swartz born highland park illinois suburb chicago eldest son jewish parents susan robert swartz brother noah benjamin father founded software firm mark williams company swartz immersed study computers programming internet internet culture attended north shore country day school small private school near chicago 9th grade swartz left high school 10th grade enrolled courses chicago area college 1999 13 years old created website theinfo.org collaborative online library theinfo.org made swartz winner arsdigita prize given young people create useful educational collaborative noncommercial websites age 14 became member working group authored rss 1.0 web syndication specification swartz attended stanford university dropped first year swartz first year stanford applied combinator first summer founders program proposing work startup called infogami designed flexible content management system allow creation rich visually interesting websites form wiki structured data working infogami co-founder simon carstensen summer 2005 aaron opted return stanford choosing instead continue develop seek funding infogami part work infogami swartz created web.py web application framework unhappy available systems python programming language early fall 2005 swartz worked fellow co-founders another nascent y-combinator firm reddit rewrite reddit lisp codebase using python web.py although infogami platform abandoned bug acquired infogami software used support internet archive open library project web.py web framework used basis many projects swartz many others infogami failed find funding y-combinator organizers suggested infogami merge reddit november 2005 resulting formation new firm bug devoted promoting products result merger swartz given title co-founder reddit although projects initially struggled gain traction reddit began make large gains popularity 2005 2006 october 2006 based largely success reddit bug acquired condé nast publications owner wired magazine swartz moved company san francisco work wired swartz found office life uncongenial ultimately left company september 2007 swartz joined infogami co-founder simon carstensen launch new firm jottit another attempt create another markdown driven content management system python 2008 swartz founded watchdog.net good government site teeth aggregate visualize data politicians year wrote widely circulated guerilla open access manifesto december 27 2010 swartz filed freedom information act foia request learn treatment chelsea manning alleged source wikileaks 2008 swartz downloaded 2.7 million federal court documents stored pacer public access court electronic records database managed administrative office united states courts huffington post characterized actions way swartz downloaded public court documents pacer system effort make available outside expensive service move drew attention fbi ultimately decided press charges documents fact public pacer charging 8 cents per page information carl malamud founded nonprofit group public.resource.org contended free federal documents covered copyright fees plowed back courts finance technology system ran budget surplus 150 million according court reports reported new york times pacer used technology designed bygone days screechy telephone modems ... putting nation legal system behind wall cash kludge malamud appealed fellow activists urging visit one 17 libraries conducting free trial pacer system download court documents send public distribution reading malamud call action swartz used perl computer script running amazon cloud servers download documents using credentials belonging sacramento library september 4 20 2008 accessed documents uploaded cloud computing service released documents malamud organization september 29 2008 gpo suspended free trial pending evaluation program swartz actions subsequently investigated fbi case closed two months charges filed swartz learned details investigation result filing foia request fbi described response usual mess confusions shows fbi lack sense humor pacer still charges per page customers using firefox option saving documents free public access plug-in called recap 2013 memorial swartz malamud recalled work pacer brought millions u.s. district court records behind pacer pay wall said found full privacy violations including medical records names minor children confidential informants malamud penned detailed account collaboration swartz pacer project essay appears website writing ars technica timothy lee later made use documents obtained swartz co-creator recap offered insight discrepancies reporting much data swartz downloaded back-of-the-envelope calculation days offsite crawl shut swartz guessed got around 25 percent documents pacer new york times similarly reported swartz downloaded estimated 20 percent entire database based facts swartz downloaded 2.7 million documents pacer time contained 500 million lee concluded swartz downloaded less one percent database 2009 wanting learn effective activism swartz helped launch progressive change campaign committee wrote blog spend days experimenting new ways get progressive policies enacted progressive politicians elected swartz led first activism event career progressive change campaign committee delivering thousands honor kennedy petition signatures massachusetts legislators asking fulfill former senator ted kennedy last wish appointing senator vote health care reform 2010 swartz co-founded demand progress political advocacy group organizes people online take action contacting congress leaders funding pressure tactics spreading word civil liberties government reform issues academic year 2010–11 swartz conducted research studies political corruption lab fellow harvard university edmond j. safra research lab institutional corruption author cory doctorow novel homeland drew advice swartz setting protagonist could use information available voters create grass-roots anti-establishment political campaign afterword novel swartz wrote political hacktivist tools used anyone motivated talented enough ... change system ... let know help swartz involved campaign prevent passage stop online piracy act sopa sought combat internet copyright violations criticized basis would made easier u.s. government shut web sites accused violating copyright would placed intolerable burdens internet providers following defeat bill swartz keynote speaker f2c freedom connect 2012 event washington d.c. may 21 2012 speech titled stopped sopa informed audience added fight everyone made hero story everyone took job save crucial freedom referring series protests bill numerous websites described electronic frontier foundation biggest internet history 115,000 sites altering webpages swartz also presented topic event organized thoughtworks swartz participated wikipedia august 2003 2006 ran unsuccessfully wikimedia foundation board trustees 2006 swartz wrote analysis wikipedia articles written concluded bulk actual content comes tens thousands occasional contributors outsiders made contributions site core group 500 1,000 regular editors tend correct spelling formatting errors according swartz formatters aid contributors way around conclusions based analysis edit histories several randomly selected articles contradicted opinion wikipedia co-founder jimmy wales believed core group regular editors providing content thousands others contributed formatting issues swartz came conclusions counting total number characters added editor particular article wales counted total number edits aaron swartz noted knowledge produced public universities financed us government graduate students released free public instead copyrighted benefits given authors privatized locked for-profit corporations invest public works instead earned billions us dollars year private publishers since publications repackaged academic databases university libraries pay thousands dollars subscribe students access content swartz used full text scholarly online databases jstor accessed mit network order download books journals etc produced thanks public funds paid money collected taxpayers according state federal authorities swartz used jstor digital repository download large number academic journal articles mit computer network course weeks late 2010 early 2011 time swartz research fellow harvard university provided jstor account visitors mit open campus authorized access jstor network authorities said swartz downloaded documents laptop connected networking switch controlled-access wiring closet mit door closet kept unlocked according press reports discovered video camera placed room film swartz swartz computer left untouched video captured swartz download stopped swartz identified rather pursue civil lawsuit june 2011 reached settlement wherein surrendered downloaded data september 25 2010 ip address 18.55.6.215 part mit network began sending hundreds pdf download requests per minute affecting performance entire jstor site prompted block ip address morning another ip address also within mit network began sending jstor pdf download requests resulting temporary full block firewall level mit servers entire 18.0.0.0/8 range email sent mit describing situation email sent september 29 2010 one jstor employee wrote mit july 30 2013 jstor released 300 partially redacted documents provided incriminating evidence aaron swartz documents originally sent united states attorney office response subpoenas case united states v. aaron swartz following images excerpts 3,461-page pdf document night january 6 2011 swartz arrested near harvard campus mit police united states secret service agent arraigned cambridge district court two state charges breaking entering intent commit felony july 11 2011 swartz indicted federal grand jury charges wire fraud computer fraud unlawfully obtaining information protected computer recklessly damaging protected computer november 17 2011 swartz indicted middlesex county superior court grand jury state charges breaking entering intent grand larceny unauthorized access computer network december 16 2011 state prosecutors filed notice dropping two original charges charges listed november 17 2011 indictment dropped march 8 2012 according spokesperson middlesex county prosecutor state charges dropped permit federal prosecution headed stephen p. heymann supported evidence provided secret service agent michael s. pickett proceed unimpeded september 12 2012 federal prosecutors filed superseding indictment adding nine felony counts increased swartz maximum criminal exposure 50 years imprisonment 1 million fines plea negotiations swartz attorneys prosecutors offered recommend sentence six months low-security prison swartz would plead guilty 13 federal crimes swartz lead attorney rejected deal opting instead trial prosecutors would forced justify pursuit swartz federal prosecution involved characterized numerous critics former nixon white house counsel john dean overcharging 13-count indictment overzealous prosecution alleged computer crimes brought former u.s. attorney massachusetts carmen ortiz swartz died suicide january 11 2013 death federal prosecutors dropped charges december 4 2013 due freedom information act suit investigations editor wired magazine several documents related case released secret service including video swartz entering mit network closet evening january 11 2013 swartz found dead brooklyn apartment partner taren stinebrickner-kauffman spokeswoman new york medical examiner reported hanged suicide note found swartz family partner created memorial website issued statement saying used prodigious skills programmer technologist enrich make internet world fairer better place days swartz funeral lawrence lessig eulogized friend sometime-client essay prosecutor bully decried disproportionality swartz prosecution said question government needs answer necessary aaron swartz labeled 'felon 18 months negotiations willing accept cory doctorow wrote aaron unbeatable combination political insight technical skill intelligence people issues think could revolutionized american worldwide politics legacy may still yet swartz funeral services held january 15 2013 central avenue synagogue highland park illinois tim berners-lee creator world wide web delivered eulogy day wall street journal published story based part interview stinebrickner-kauffman told journal swartz lacked money pay trial hard ... make part life go public asking help also distressed said two friends subpoenaed longer believed mit would try stop prosecution several memorials followed soon afterward january 19 hundreds attended memorial cooper union speakers included stinebrickner-kauffman open source advocate doc searls creative commons glenn otis brown journalist quinn norton roy singham thoughtworks david segal demand progress january 24 memorial internet archive speakers including stinebrickner-kauffman alex stamos brewster kahle carl malamud february 4 memorial held cannon house office building capitol hill speakers memorial included senator ron wyden representatives darrell issa alan grayson jared polis lawmakers attendance included senator elizabeth warren representatives zoe lofgren jan schakowsky memorial also took place march 12 mit media lab swartz family recommended givewell donations memory organization swartz admired collaborated sole beneficiary january 12 2013 swartz family partner issued statement criticizing prosecutors mit speaking son funeral january 15 robert swartz said aaron killed government mit betrayed basic principles tom dolan husband u.s. attorney massachusetts carmen ortiz whose office prosecuted swartz case replied criticism swartz family truly incredible son obit blame others death make mention 6-month offer comment triggered criticism esquire writer charlie pierce replied glibness husband defenders toss 'mere six months federal prison low-security indication something seriously whack way prosecutors think days mit maintains open-campus policy along open network two days swartz death mit president l. rafael reif commissioned professor hal abelson lead analysis mit options decisions relating swartz legal struggles help guide fact-finding stage review mit created website community members could suggest questions issues review address swartz attorneys requested pretrial discovery documents made public move mit opposed swartz allies criticized mit opposition releasing evidence without redactions july 26 2013 abelson panel submitted 182-page report mit president l. rafael reif authorized public release july 30 panel reported mit supported charges swartz cleared institution wrongdoing however report also noted despite mit advocacy open access culture institutional level beyond university never extended support swartz report revealed example mit considered possibility issuing public statement position case statement never materialized huffington post reported ortiz faced significant backlash pursuing case swartz including petition white house fired news outlets reported similarly reuters news agency called swartz online icon help ed make virtual mountain information freely available public including estimated 19 million pages federal court documents associated press ap reported swartz case highlights society uncertain evolving view treat people break computer systems share data enrich make available others jstor lawyer former u.s. attorney southern district new york mary jo white asked lead prosecutor drop charges discussed editor hrag vartanian hyperallergic brooklyn new york muralist bamn means necessary created mural swartz swartz amazing human fought tirelessly right free open internet artist explained much 'reddit guy speaking april 17 2013 yuval noah harari described swartz first martyr freedom information movement aaron swartz legacy reported strengthening open access scholarship movement illinois home state swartz influence led state university faculties adopt policies favor open access january 13 2013 members anonymous hacked two websites mit domain replacing tributes swartz called members internet community use death rallying point open access movement banner included list demands improvements u.s. copyright system along swartz guerilla open access manifesto night january 18 2013 mit e-mail system taken offline ten hours january 22 e-mail sent mit redirected hackers aush0k tibitximer korea advanced institute science technology traffic mit redirected computer harvard university publishing statement headed r.i.p aaron swartz text 2009 posting swartz accompanied chiptunes version star-spangled banner mit regained full control seven hours early hours january 26 2013 u.s sentencing commission website ussc.gov hacked anonymous home page replaced embedded youtube video anonymous operation last resort video statement said swartz faced impossible choice hacker downloaded hundreds thousands scientific-journal articles swiss publisher website republished open web swartz honor week first anniversary death swartz death 50,000 people signed online petition white house calling removal ortiz overreach case aaron swartz similar petition submitted calling prosecutor stephen heymann firing january 2015 two years swartz death white house declined petitions august 3 2013 swartz posthumously inducted internet hall fame hackathon held swartz memory around date birthday 2013 weekend november 8–10 2013 inspired swartz work life second annual hackathon held least 16 cities around world preliminary topics worked 2013 aaron swartz hackathon privacy software tools transparency activism access legal fixes low-cost book scanner january 2014 lawrence lessig led walk across new hampshire honor swartz rallying campaign finance reform 2017 turkish-dutch artist ahmet öğüt commemorated swartz work entitled information power people depicting bust long-time supporter open access swartz wrote guerilla open access manifesto supporters swartz responded news death effort called pdftribute promote open access january 12 eva vivalt development economist world bank began posting academic articles online using hashtag pdftribute tribute swartz scholars posted links works story aaron swartz exposed topic open access scientific publications wider audiences wake aaron swartz many institutions personalities campaigned open access scientific knowledge swartz death prompted calls open access scholarly data e.g. open science data think computer foundation center information technology policy citp princeton university announced scholarships awarded memory aaron swartz 2013 swartz posthumously awarded american library association james madison award outspoken advocate public participation government unrestricted access peer-reviewed scholarly articles march editor editorial board journal library administration resigned en masse citing dispute journal publisher routledge one board member wrote crisis conscience publishing journal open access death aaron swartz 2002 swartz stated died wanted contents hard drives made publicly available coalition consortium launched european research council continues fight aaron swartz make available 2020 scientific publications financed member states coalition several members u.s. house representatives – republican darrell issa democrats jared polis zoe lofgren – house judiciary committee raised questions regarding government handling case calling charges ridiculous trumped polis said swartz martyr whose death illustrated need congress limit discretion federal prosecutors speaking memorial swartz capitol hill issa said massachusetts democratic senator elizabeth warren issued statement saying aaron advocacy internet freedom social justice wall street reform demonstrated ... power ideas ... letter attorney general eric holder texas republican senator john cornyn asked basis u.s. attorney district massachusetts conclude office conduct 'appropriate prosecution mr. swartz way retaliation exercise rights citizen freedom information act issa chairs house committee oversight government reform announced would investigate justice department actions prosecuting swartz statement huffington post praised swartz work toward open government free access people issa investigation garnered bipartisan support january 28 2013 issa ranking committee member elijah cummings published letter u.s. attorney general holder questioning federal prosecutors filed superseding indictment february 20 wbur reported ortiz expected testify upcoming oversight committee hearing office handling swartz case february 22 associate deputy attorney general steven reich conducted briefing congressional staffers involved investigation told swartz guerilla open access manifesto played role prosecutorial decision-making congressional staffers left briefing believing prosecutors thought swartz convicted felony carrying least short prison sentence order justify filed case first place excoriating department justice department vengeance stinebrickner-kauffman told guardian doj erred relying swartz guerilla open access manifesto accurate indication beliefs 2010 longer single issue activist said lots things healthcare climate change money politics march 6 holder testified senate judiciary committee case good use prosecutorial discretion stinebrickner-kauffman issued statement reply repeating amplifying claims prosecutorial misconduct public documents wrote reveal prosecutor stephen heymann instructed secret service seize hold evidence without warrant ... lied judge fact written briefs ... withheld exculpatory evidence ... year violating legal ethical obligations turn evidence defense march 22 senator al franken wrote holder letter expressing concerns writing charging young man like mr. swartz federal offenses punishable 35 years federal imprisonment seems remarkably aggressive – particularly appears one principal aggrieved parties ... support criminal prosecution 2013 rep. zoe lofgren d-calif. introduced bill aaron law exclude terms service violations 1986 computer fraud abuse act wire fraud statute lawrence lessig wrote bill critically important change ... cfaa hook government bullying ... law would remove hook single line longer would felony breach contract professor orin kerr specialist nexus computer law criminal law wrote arguing precisely sort reform act years aclu called reform cfaa remove dangerously broad criminalization online activity eff mounted campaign reforms lessig inaugural chair lecture furman professor law leadership entitled aaron laws law justice digital age dedicated lecture swartz aaron law bill stalled committee brian knappenberger alleges due oracle corporation financial interest maintaining status quo fair access science technology research act fastr bill would mandate earlier public release taxpayer-funded research fastr described aaron law senator ron wyden d-ore. senator john cornyn r-tex introduced senate version 2013 2015 bill introduced house reps. zoe lofgren d-calif. mike doyle d-pa. kevin yoder r-kans. senator wyden wrote bill fastr act provides access taxpayer funded research never hidden behind paywall legislation passed helped prompt motion toward open access part us administration shortly bill original introduction office science technology policy directed federal agency 100 million annual conduct research development expenditures develop plan support increased public access results research funded federal government swartz featured received dedications numerous art work 2013 kenneth goldsmith dedicated printing internet exhibition swartz fate aaron swartz also featured conservative filmmaker dinesh d'souza 2014 documentary wherein d'souza compares swartz prosecution conviction violating campaign finance laws alleges cases exemplify selective overzealous prosecution also dedicated biographical films aaron january 11 2014 marking first anniversary death preview released internet boy story aaron swartz documentary swartz nsa sopa film officially released january 2014 sundance film festival democracy covered release documentary well swartz life legal case sprawling interview director brian knappenberger swartz father brother attorney documentary released creative commons license debuted theaters on-demand june 2014 mashable called documentary powerful homage aaron swartz debut sundance received standing ovation mashable printed help experts internet boy makes clear argument swartz unjustly became victim rights freedoms stood hollywood reporter described heartbreaking story tech wunderkind persecuted us government must-see anyone knows enough care way laws govern information transfer digital age october 2014 killswitch film featuring aaron swartz well lawrence lessig tim wu edward snowden received world premiere woodstock film festival award best editing film focuses swartz role advocating internet freedoms february 2015 killswitch invited screen capitol visitor center washington d.c. congressman alan grayson event held eve federal communications commission historic decision net neutrality congressman grayson lawrence lessig free press ceo craig aaron spoke swartz fight behalf free open internet event congressman grayson states killswitch one honest accounts battle control internet – access information richard von busack metro silicon valley writes killswitch lapidary use found footage side atomic café fred swegles orange county register remarks anyone values unfettered access online information apt captivated killswitch gripping fast-paced documentary kathy gill geekwire asserts killswitch much dry recitation technical history director ali akbarzadeh producer jeff horn writer chris dollar created human-centered story large part connection comes lessig relationship swartz patriot web independent biographical film aaron swartz written directed darius burke set released august 2019 amazon film limited video demand release december 2017 reelhouse january 2018 pivotshare another biographical film swartz think aaron developed hbo films swartz identified cofounder reddit title source controversy merger infogami reddit swartz became co-owner director parent company bug inc. along reddit cofounders steve huffman alexis ohanian swartz referred cofounder press investor paul graham recommended merger ohanian describes co-owner
[ 3336, 268, 4752, 3223, 8735, 8998, 3495, 11437, 11695, 2864, 5426, 8627, 9780, 8373, 441, 959, 6352, 10452, 11221, 5078, 472, 8921, 4194, 6502, 743, 3817, 8554, 9845, 119, 7547, 124 ]
Test
11,660
4
CyberTrust:cybertrust cybertrust security services company formed virginia november 2004 merger trusecure betrusted cybertrust acquired large stake ubizen european security services firm based belgium become one largest information security firms world acquired verizon business 2007 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services cybertrust founded subsidiary gte corporation government systems information security directorate focused security services electronic commerce included authentication privacy integrity non-repudiation using public key encryption technology 2000 gte sold cybertrust ireland-based security company baltimore technologies 150 million 2003 baltimore technologies divested operating companies including digital certificate operations betrusted holdings inc. year later september 2004 betrusted announced intention merge former competitor trusecure corporation november resulting company incorporated virginia cybertrust verizon business acquired cybertrust 2007 reuniting former parent verizon created merger gte bell atlantic financial terms disclosed 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services financial terms disclosed cybertrust used majority shareholding dilute remaining ubizen shares forcing acquire remaining shares delist ubizen 2005 betrusted originally created pwc sold one equity partners division bank 1 one equity partners also purchased 90 east securenet bought pki component baltimore gateway operations isecure acquisition cybertrust root certificates makes digicert second-largest certificate authority ca high-assurance ssl certificates part deal digicert assume management cybertrust/verizon trusted roots intermediate certificates verizon continue offer ssl certificates reseller digicert pursuant digicert ’ acquiring verizon enterprise ssl business digicert announce partnership cybertrust japan expand market presence asia new partnership digicert cybertrust japan also announce cyber secure asia wholly owned subsidiary cybertrust japan market digicert ’ certificate technology southeast asia regional headquarters singapore
[ 7075, 9744, 9394, 5433, 5373 ]
Test
11,661
9
Babel_Middleware:babel middleware babel open source middleware system serving scientific computing community language interoperability tool babel enables arbitrary mixing software libraries written c/c++ fortran python java distributed computing platform babel provides language-neutral remote method invocation rmi scheme similar java rmi allows third-party plug-ins specify custom data encodings network protocols babel requires developers use interface description language specify platform language neutral interface code babel uses custom dialect called sidl scientific interface definition language adaptations specific computational science engineering applications babel tool parses sidl specification generate source code provides glue programming languages babel works known posix unix variants including linux mac os x aix irix solaris tru64 cray xt4 ibm blue gene many commodity clusters babel require special compiler linker technology works gnu intel ibm pathscale pgi many compilers babel distributed lgpl license babel r 100 award 2006 used diverse computational applications accelerator beam dynamics cell biology chemistry climate electron effects fusion geomagnetics materials nuclear power plants radio astronomy subsurface transport well infrastructure frameworks meshing solvers sparse linear algebra sourcecode refactoring babel also redistributed customer applications cca framework debian linux babel started internal research project software components lawrence livermore national laboratory 1999 first public alpha release babel 2001 also 2001 secured funding scidac scientific discovery advanced computing along collaborators cca forum common component architecture forum babel development maintenance currently funded united states department energy relies heavily open source community contributors hail sandia national laboratories argonne national laboratory oak ridge national laboratory tech-x corp mit university utah babel development team maintain open software repositories mailing lists issue trackers
[ 10465, 8554, 5612, 1933, 823, 5677, 7983, 2481, 10641, 2804, 2135, 3960, 8122, 3323, 2045, 1823 ]
Test
11,662
4
Industroyer:industroyer industroyer also referred crashoverride malware framework considered used cyberattack ukraine ’ power grid december 17 2016 attack cut fifth kiev capital power one hour considered large-scale test time fourth malware publicly revealed target industrial control systems stuxnet havex blackenergy malware discovered slovak internet security company eset eset cybersecurity companies detect name “ industroyer ” cybersecurity firm dragos named malware “ crashoverride ” detailed analysis industroyer revealed malware designed disrupt working processes industrial control systems specifically used electrical substations industroyer modular malware main components following
[ 5665, 3843, 131, 107, 11409, 9688, 5337, 7515 ]
Test
11,663
6
Dsw_(command):dsw command codice_1 unix command enabled deletion files non-typeable characters replaced functionality implemented codice_2 namely codice_3
[ 515, 9733, 9735, 3976, 4750, 2198, 6812, 7847, 4398, 7983, 1336, 7356, 965, 8522, 3659, 9946, 6120, 4850, 5492, 9204, 6138, 5759 ]
Test
11,664
4
McAfee_Change_Control:mcafee change control mcafee change control commercial file integrity monitoring solution windows- linux-based systems developed mcafee
[ 704, 6372, 6797, 7983, 823 ]
None
11,665
9
CaPSL:capsl capsl printer command language/page description language used early canon printers including lbp-8iii series supported least lbp-8iv printers language discontinued later canon printers implementing pcl also called lips lips4 windows spool file could contain raw capsl data
[ 8262, 6830 ]
Train
11,666
3
Zork_I:zork zork great underground empire part later known zork interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1980 first game zork trilogy released wide range computer systems followed zork ii zork iii infocom first game sold 378,000 copies 1986 game takes place zork calendar year 948 gue although passage time notable gameplay player steps deliberately vague role adventurer game begins near white house small self-contained area although player given little instruction house provides obvious point interest player enters house yields number intriguing objects including brass battery-powered lantern empty trophy case elvish sword great antiquity beneath rug trap door leads dark cellar revealed one several entrances vast subterranean land known great underground empire player soon encounters colorful host dangerous enemies including deadly grues prey victims dark axe-wielding troll giant cyclops flees terror mention odysseus vampire bat drop player anywhere mine encountered evil spirits guarding entrance hades nimble-fingered thief armed stiletto makes mapping maze difficult removing scattering items player might drop leave trail ultimate goal zork collect twenty treasures zork install trophy case finding treasures requires solving variety puzzles navigation two complex mazes intricate manipulations flood control dam 3 placing treasures trophy case scores player 350 points grants rank master adventurer ancient map instructions magically appears trophy case instructions provide access stone barrow entrance barrow end zork beginning zork ii 28 ways player die possible score 350 points 223 moves win game completely 228 moves exploiting bug infocom begin tradition including feelies extra items related game 1982 release deadline later re-releases game however packaged although back zork grey box depicted zorkmid coin included feelies production difficulties led coins omission packages zorkmid coins included feelies release zork trilogy boxed set original version zork published personal software simply called zork distributed clear plastic bags containing game disk 36-page booklet infocom first self-published version zork so-called folio format included single piece paper describing run game feelies noted introduced zork re-released grey box format opening text zork among notable descriptions video games quite simplistic compared infocom later games many started screens full introductory text several game situations descriptions become iconic within field interactive fiction brass lantern elvish sword great antiquity zork also introduced notable grue sinister lurking presence kills adventurers go exploring dark grues appeared least mentioned many subsequent infocom adventures right 1997 graphic adventure zork grand inquisitor published activision zork sales surprised infocom rising falling time many dealers sold game essential accessory purchasing new computers including dec rainbow ti professional others people see game machines best-selling game 1982 32,000 copies sold first half year almost 100,000 copies 1983 — inc. reported game best seller four years—more 150,000 copies 1984 comprising 20 infocom sales year total 378,987 copies 1986 infoworld reported april 1984 zork returned top sales charts two years release based sales market-share data video listed fifth magazine list best selling video games february march 1985 ii computing listed zork fourth magazine overall list top apple ii software october–november 1985 first games list byte declared 1981 single advance science adventure bold exciting zork magazine praised sophisticated parser quality writing stating program entertaining eloquent witty precisely written almost beside point ... zork felt touched— experienced will—through care attention detail authors rendered concluded somebody please let know sequel done jerry pournelle wrote magazine 1983 played game sons stating liked adventure wanted solved colossal cave guarantee 'll love zork jon mishcon reviewed zork space gamer 40 mishcon commented absence graphics game weak points find although price expensive believe first rate game well worth every penny 80 micro called zork complicated sophisticated ... joy play praised documentation take rank amateur instructions clear easy follow wondered game could solved program lets pretty much want even consequences much less desirable leaves open marvelous opportunities magazine concluded hoping expect second part sometime soon addison-wesley book atari software 1984 gave game overall a+ rating calling definitive adventure game 1992 computer gaming world added zork hall fame waiving normal criteria favor honoring venerable classic 1996 magazine listed zork 13 among top 150 best games all-time editors wrote seminal infocom text adventure combined challenging puzzles wonderful descriptive prose touch humor create rich universe existed svga graphics within head march 12 2007 new york times reported named list ten important video games time so-called game canon library congress took video game preservation proposal began games list including zork zork one five infocom games re-released solid gold format in-game hints infocom allowed distribution early fortran version therefore source code available various public domain software ports available various repositories also abridged version called mini-zork dated november 24 1987 mini-zork released free charge promotion german language version developed never released unfinished version story file dated january 13 1988 made way public circulation german evidently non-native containing many spelling grammar errors known jeff o'neill worked version remastered version first released japanese software development company systemsoft nec pc-9801 march 1991 differences enhanced remake game recognizes verb commands typed kana japanese syllable system latin alphabet convenience common verb commands look take etc accessed pressing corresponding button player still type name object remake also helps player interact environment displaying list objects player typed command also unlike original remake contains enhanced graphics especially list objects text super-imposed another remastered version released activision shoeisha japan sega saturn playstation 1996 version also includes graphics interfaces lucasfilm legend early entries particular sound effects auto-mapping music yuzo koshiro neither version ever released outside japan game playable code zork mason main character needs get chair playstation 3 xbox 360 users need pull l2 r2 lt rt xbox 360 rapidly windows players need press space bar rapidly wii players must shake controls wiimote nunchuck control scheme mason gets chair must walk left use old computer behind chair play zork type zork command prompt achievement/trophy also awarded putting code
[ 6976, 577, 8937, 7116, 9006, 1265, 625, 627, 10931, 3960, 4409, 8474 ]
None
11,667
6
Defragmentation:defragmentation maintenance file systems defragmentation process reduces degree fragmentation physically organizing contents mass storage device used store files smallest number contiguous regions fragments also attempts create larger regions free space using compaction impede return fragmentation defragmentation utilities try keep smaller files within single directory together often accessed sequence defragmentation advantageous relevant file systems electromechanical disk drives hard disk drives floppy disk drives optical disk media movement hard drive read/write heads different areas disk accessing fragmented files slower compared accessing entire contents non-fragmented file sequentially without moving read/write heads seek fragments fragmentation occurs file system allocate enough contiguous space store complete file unit instead puts parts gaps existing files usually gaps exist formerly held file file system subsequently deleted file system allocated excess space file first place files often appended log files well frequent adding deleting files emails web browser cache larger files videos greater numbers files contribute fragmentation consequent performance loss defragmentation attempts alleviate problems consider following scenario shown image right otherwise blank disk five files e using 10 blocks space section block allocation unit filesystem block size set disk formatted size supported filesystem blank disk files would allocated one see example 1 image file b deleted would two options mark space file b empty used later move files b empty space end since moving files could time consuming many files needed moved usually empty space simply left marked table available new files see example 2 image new file f allocated requiring 6 blocks space could placed first 6 blocks space formerly held file b 4 blocks following remain available see example 3 image another new file g added needs 4 blocks could occupy space f c example 4 image however file f needs expanded three options since space immediately following longer available additionally concept “ fragmentation ” limited individual files multiple extents disk instance group files normally read particular sequence like files accessed program loading include certain dlls various resource files audio/visual media files game considered fragmented sequential load-order disk even individual files fragmented read/write heads seek non-fragmented files randomly access sequence groups files may originally installed correct sequence drift apart time certain files within group deleted updates common cause order update file updaters usually delete old file first write new updated one place however filesystems write new file physical place disk allows unrelated files fill empty spaces left behind defragment disk defragmentation software also known defragmenter move files around within free space available intensive operation performed filesystem little free space defragmentation system performance degraded best leave computer alone process defragmenter get confused unexpected changes filesystem depending algorithm used may may advantageous perform multiple passes reorganization involved defragmentation change logical location files defined location within directory structure besides defragmenting program files defragmenting tool also reduce time takes load programs open files example windows 9x defragmenter included intel application launch accelerator optimized programs disk placing defragmented program files dependencies next order program loads load programs faster windows good defragmenter read prefetch files identify many file groups possible place files within access sequence beginning hard drive outer tracks higher data transfer rate inner tracks placing frequently accessed files onto outer tracks increases performance third party defragmenters mydefrag move frequently accessed files onto outer tracks defragment files improvements modern hard drives ram cache faster platter rotation speed command queuing scsi/ata tcq sata ncq greater data density reduce negative impact fragmentation system performance degree though increases commonly used data quantities offset benefits however modern systems profit enormously huge disk capacities currently available since partially filled disks fragment much less full disks high-capacity hdd partition occupies smaller range cylinders resulting faster seeks however average access time never lower half rotation platters platter rotation measured rpm speed characteristic hdds experienced slowest growth decades compared data transfer rate seek time minimizing number seeks remains beneficial storage-heavy applications defragmentation ensuring one seek per file counting seeks non-adjacent tracks common strategy optimize defragmentation reduce impact fragmentation partition hard disk way separates partitions file system experience many reads writes volatile zones files created deleted frequently directories contain users profiles modified constantly especially temp directory web browser cache creating thousands files deleted days files user profiles held dedicated partition commonly done unix recommended files systems typically stored /var partition defragmenter runs better since need deal static files directories partitions relatively little write activity defragmentation time greatly improves first defragmentation since defragmenter need defragment small number new files future presence immovable system files especially swap file impede defragmentation files safely moved operating system use example ntfsresize moves files resize ntfs partition tool pagedefrag could defragment windows system files swap file files store windows registry running boot time gui loaded since windows vista feature fully supported updated ntfs files added disk master file table mft must grow store information new files every time mft extended due file way mft gain fragment early versions windows could safely defragmented partition mounted microsoft wrote hardblock defragmenting api however since windows xp increasing number defragmenters able defragment mft windows defragmentation api improved supports move operation even improvements first four clusters mft remain unmovable windows defragmentation api resulting fact defragmenters store mft two fragments first four clusters wherever placed disk formatted rest mft beginning disk wherever defragmenter strategy deems best place reading data conventional electromechanical hard disk drive disk controller must first position head relatively slowly track given fragment resides wait disk platter rotates fragment reaches head solid-state drive ssd based flash memory moving parts random access file fragment flash memory suffer delay making defragmentation optimize access speed unnecessary furthermore since flash memory written limited number times fails defragmentation actually detrimental except mitigation catastrophic failure however windows still defragments ssd automatically albeit less vigorously prevent file system reaching maximum fragmentation tolerance maximum fragmentation limit reached subsequent attempts write disk fail 2010 discovered operation mydefrag utility old backup copies created system restore known checkpoints deleted mydefrag developer jeroen kessels blamed windows api shadow copy shadow copy service system restore uses tracks changes disks remembers according kessels shadow copy sees defragmentation operation data changes opposed blocks moved tries record resulting increased size shadow copy images result windows faces low disk space issue tries resolve deleting old checkpoints microsoft later provided details issue shadow copy provider operates 16-kb block level hence file system allocation units smaller 16 kb shadow copy properly discern defragmentation ordinary i/o operation needs recorded volumes 16 kb larger allocation units unaffected
[ 2560, 6155, 7187, 10776, 25, 4637, 5661, 9762, 4643, 6180, 7217, 10803, 10809, 576, 2625, 8772, 6221, 3160, 10333, 4704, 97, 11363, 6760, 10856, 8298, 9835, 7285, 4727, 9335, 5754, 634, 1147, 3197, 1150, 5247, 2687, 639, 7810, 2179, 10883...
Validation
11,668
8
Mod_ssl:mod ssl mod_ssl optional module apache http server provides strong cryptography apache v1.3 v2 webserver via secure sockets layer ssl v2/v3 transport layer security tls v1 cryptographic protocols help open source ssl/tls toolkit openssl original version created apache v1.3 initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 version bsd-style license version v2.0 later contrast maintained apache software foundation licensed apache license 2.0 possible provide http https single server machine http https use different server ports direct conflict either maintainer would run two separate apache server instances one binds port 80 port 443 use apache virtual hosting facility maintainer create two virtual servers apache dispatches one responding port 80 speaking http one responding port 443 speaking https original mod_ssl apache 1.3 available www.modssl.org third-party add-on package requiring additional steps compilation configuration process also maintainer server needs resolve additional system apache dependencies apache 2 contrast built-in module maintained apache software foundation mod_ssl easily activated compilation configuration options mod_ssl v1 package initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 conflicts ben laurie development cycle re-assembled scratch apache 1.3.0 merging old mod_ssl 1.x newer apache-ssl 1.18 point mod_ssl lived life mod_ssl v2 first publicly released version mod_ssl 2.0.0 august 10 1998 us export restrictions cryptographic software loosened mod_ssl became part apache http server release apache httpd 2 october 10 2009 latest version released mod_ssl apache 1.3 mod_ssl v2.8.31-1.3.41 february 8 2008
[ 865, 234, 1468, 1583 ]
Test
11,669
2
Molinux:molinux molinux operating system based ubuntu sponsored autonomous community castilla-la mancha fundación ínsula barataria name molinux derives spanish word molino meaning mill windmill version molinux named character classic spanish novel quixote miguel de cervantes molinux initiative begun 2005 government castilla-la mancha introduce castile-la mancha community forefront information society molinux project intended attack digital divide reducing cost software offering easy-to-use operating system sponsoring regional government commitment open source philosophy committed impose use molinux advantage software free compete anyone user choose using software molinux 6.2 codename merlín launched 2010-12-24 based ubuntu 10.10
[ 8837, 7435, 10127, 2321, 5397, 3478, 4887, 10394, 8476, 673, 3745, 5410, 10530, 6393, 9253, 10149, 11305, 7854, 7983, 8112, 2738, 4790, 439, 56, 59, 3903, 10687, 4673, 3654, 2375, 4039, 5962, 8907, 1107, 1110, 4951, 9693, 3550, 5343, 4192...
Test
11,670
9
Da_Vinci_Machine:da vinci machine da vinci machine also called multi language virtual machine sun microsystems project aiming prototype extension java virtual machine jvm add support dynamic languages already possible run dynamic languages top jvm goal ease new dynamic language implementations increase performance project reference implementation jsr 292 supporting dynamically typed languages java platform prior java 7 java virtual machine built-in support dynamically typed languages jsr 292 supporting dynamically typed languages java platform proposes following success jruby java implementation da vinci project started end january 2008 capabilities experimented da vinci planned added java 7 aims prototype jsr also lower-priority extensions first working prototype developed patch openjdk announced made available end august 2008 since jruby team successfully wired dynamic invocation codebase dynamic invocation shipped 1.1.5 release disabled jvms without codice_1 capabilities since project integrated jdk 7 codebase integrated java 7 release dynamic invocation built fact even java strongly static language language level type information much less prevalent bytecode level however dynamic languages implementations need able use just-in-time compilation rather reflection achieve good performance compile scripts bytecode runtime allowed run java virtual machine bytecodes must verified prior execution verifier check types static throughout code leads implementations create many different bytecodes different contexts method call time signature arguments change uses lot memory also fills memory area called metaspace permanent generation prior java 8 part heap used jvm store information classes memory used area almost never garbage collected stores immutable data context java programs dynamic languages implementations compile small part scripts jsr 292 proposes
[ 2304, 4960, 8609, 9665, 4231, 5612, 2556, 5872, 3761, 7983, 2804, 1591, 220, 5567 ]
Train
11,671
4
VoIP_vulnerabilities:voip vulnerabilities voip vulnerable similar types attacks web connection emails prone voip attractiveness low fixed cost numerous features come risks well known developers constantly addressed risks usually mentioned business common target voip also allows use fraud shady practices people aware practices restricted providers possibility someone using gain still exists unencrypted connections lead communication security breaches hackers/trackers eavesdrops important private conversations extract valuable data overheard conversations might sold used competing businesses gathered intelligence also used blackmail personal gain attacks user network internet provider disrupt even cut connection since voip highly dependent internet connection direct attacks internet connection provider highly effective way attack kind attacks targeting office telephony since mobile internet harder interrupt also mobile applications relying internet connection make voip calls immune attacks hardphones a.k.a voip phone smart devices computer phone need well configured chinese manufacturers cases using default passwords manufactured devices leading vulnerabilities voip even voip relatively secure 2017 still needs source internet cases wifi network home/office wifi relatively secure using public shared networks compromise connection voip spam called spit spam internet telephony using unlimited extensions provided voip pbx capabilities spammer constantly harass target different numbers process hard automate fill targets voice mail notifications caller make calls often enough block target getting important incoming calls practices cost lot caller rarely used marketing needs voip users change caller id a.k.a caller id spoofing allowing caller represent relative colleague part family order extract information money benefits form target
[ 11170, 10996, 8950 ]
Test
11,672
2
Window_class:window class computer programming window class structure fundamental microsoft windows win16 win32 win64 operating systems application programming interface api structure provides template windows may created specifying window icons menu background color features also holds pointer procedure controls window behaves response user interaction finally tells operating system much additional storage space needed class window created two versions window classes non-technical addition brought second one small additional icon window first version present windows 3.x series second version appeared windows 95 windows nt 3.1
[ 4300, 6797, 7983 ]
Validation
11,673
2
VSE_(operating_system):vse operating system z/vse virtual storage extended operating system ibm mainframe computers latest one dos/360 lineage originated 1965 announced feb. 1 2005 ibm successor vsa/esa 2.7 then-new z/vsewas named reflect new system z branding ibm mainframe product line dos/vse introduced 1979 successor dos/vs turn dos/vse succeeded vse/sp version 1 1983 vse/sp version 2 1985 less common prominent z/os mostly used smaller machines late 1980s widespread perception among vse customers ibm planning discontinue vse migrate customers mvs instead although ibm relented agreed continue produce new versions vse dos/360 originally supported 24-bit addressing underlying hardware evolved vse/esa acquired support 31-bit addressing ibm released z/vse version 4 requires 64-bit z/architecture hardware supports 64-bit real mode addressing 2007 z/vse 5.1 available since 2011 z/vse introduced 64 bit virtual addressing memory objects chunks virtual storage allocated 2 gb latest shipping release z/vse 6.2.0 available since december 2017 includes new cics transaction server z/vse 2.2 job control language jcl continues positional-parameter orientation earlier dos systems z/vse batch processing primary user interface also another special interface system console operators z/vse like z/os systems traditionally supported 3270 terminal user interfaces however z/vse installations least begun add web browser access z/vse applications z/vse tcp/ip separately priced option historic reasons available two different versions two vendors vendors provide full function tcp/ip stack applications telnet ftp one tcp/ip stack provides ipv4 communication ipv4 ipv6 communication addition commercially available tcp/ip stacks z/vse ibm also provides linux fastpath method uses iucv socket hipersockets connections communicate linux guest also running mainframe using method z/vse system able fully exploit native linux tcp/ip stack ibm recommends z/vse customers run linux z systems alongside physical system provide another 64-bit application environment access extend z/vse applications data via hipersockets using wide variety middleware cics one popular enterprise transaction processing systems extremely popular among z/vse users supports recent innovations web services db2 also available popular z/vse supports eckd well scsi devices fibre channel access scsi storage devices initially supported z/vse 3.1 limited basis including ibm enterprise storage server ess ibm system storage ds8000 ds6000 series limitations disappeared 4.2 thus including ibm storwize v7000 v5000 v3700 v9000 last vse/esa release vse/esa 2.7 longer supported since february 28 2007. z/vse 3.1 last release compatible 31-bit mainframes opposed z/vse version 4 5 6. z/vse 3.1 supported 2009. z/vse version 4 longer supported since october 2014 end service z/vse 4.3 vse/esa dos/vse vse/sp see history ibm mainframe operating systems dos/vs
[ 2179, 4996, 6148, 10883, 7, 2314, 3978, 10508, 7053, 8077, 9361, 9619, 9468, 789, 5397, 11673, 9370, 5531, 6557, 3359, 4255, 10273, 8482, 421, 7848, 6442, 1323, 7983, 8751, 7217, 8879, 9139, 10803, 6325, 6454, 7477, 7607, 7733, 5562, 8502...
Validation
11,674
9
Reference_(computer_science):reference computer science computer science reference value enables program indirectly access particular datum variable value record computer memory storage device reference said refer datum accessing datum called dereferencing reference reference distinct datum typically references data stored memory given system reference implemented physical address data stored memory storage device reason reference often erroneously confused pointer address said point data however reference may also implemented ways offset difference datum address fixed base address index array abstractly handle broadly networking references may network addresses urls concept reference must confused values keys identifiers uniquely identify data item give access non-trivial lookup operation table data structure references widely used programming especially efficiently pass large mutable data arguments procedures share data among various uses particular reference may point variable record contains references data idea basis indirect addressing many linked data structures linked lists references cause significant complexity program partially due possibility dangling wild references partially topology data references directed graph whose analysis quite complicated references increase flexibility objects stored allocated passed areas code long one access reference data one access data data need moved also make sharing data different code areas easier keeps reference mechanism references varying implementation fundamental programming language feature common nearly modern programming languages even languages support direct use references internal implicit use example call reference calling convention implemented either explicit implicit use references pointers primitive due intimate relationship underlying hardware one powerful efficient types references however also due relationship pointers require strong understanding programmer details memory architecture pointers store memory location address instead value directly inappropriate use pointers lead undefined behavior program particularly due dangling pointers wild pointers smart pointers opaque data structures act like pointers accessed particular methods handle abstract reference may represented various ways common example file handles file data structure c standard i/o library used abstract file content usually represents file requesting lock file specific position within file content reading file distributed computing reference may contain address identifier may also include embedded specification network protocols used locate access referenced object way information encoded serialized thus example wsdl description remote web service viewed form reference includes complete specification locate bind particular web service reference live distributed object another example complete specification construct small software component called proxy subsequently engage peer-to-peer interaction local machine may gain access data replicated exists weakly consistent message stream cases reference includes full set instructions recipe access data sense serves purpose identifier address memory generally reference considered piece data allows unique retrieval another piece data includes primary keys databases keys associative array set keys k set data objects well-defined single-valued function k ∪ null defines type reference null image key referring anything meaningful alternative representation function directed graph called reachability graph datum represented vertex edge u v datum u refers datum v maximum out-degree one graphs valuable garbage collection used separate accessible inaccessible objects many data structures large complex objects composed smaller objects objects typically stored one two ways internal storage usually efficient space cost references dynamic allocation metadata time cost associated dereferencing reference allocating memory smaller objects internal storage also enhances locality reference keeping different parts large object close together memory however variety situations external storage preferred languages java smalltalk python scheme support internal storage languages objects uniformly accessed references assembly languages first languages used typical express references using either raw memory addresses indexes tables work somewhat tricky use address tells nothing value points even large interpret information encoded program logic result misinterpretations occur incorrect programs causing bewildering errors one earliest opaque references lisp language cons cell simply record containing two references lisp objects including possibly cons cells simple structure commonly used build singly linked lists also used build simple binary trees so-called dotted lists terminate null reference value another early language fortran explicit representation references use implicitly call-by-reference calling semantics pointer still one popular types references today similar assembly representation raw address except carries static datatype used compile-time ensure data refers misinterpreted however c weak type system violated using casts explicit conversions various pointer types pointer types integers misinterpretation still possible difficult successor c++ tried increase type safety pointers new cast operators smart pointers standard library still retained ability circumvent safety mechanisms compatibility number popular mainstream languages today eiffel java c visual basic adopted much opaque type reference usually referred simply reference references types like c pointers indicating interpret data reference typesafe interpreted raw address unsafe conversions permitted fortran reference best thought alias another object scalar variable row column array syntax dereference reference manipulate contents referent directly fortran references null languages references facilitate processing dynamic structures linked lists queues trees settings concept mutable variables data modified often makes implicit use references standard ml ocaml many functional languages values persistent modified assignment assignable reference cells serve unavoidable purposes mutable references imperative languages make capability modified explicit reference cells hold value given polymorphic type codice_1 codice_2 replaced type value pointed mutable references pointed different objects lifetime example permits building circular data structures reference cell functionally equivalent array length 1 preserve safety efficient implementations references type-cast ml pointer arithmetic performed important note functional paradigm many structures would represented using pointers language like c represented using facilities powerful algebraic datatype mechanism programmer able enjoy certain properties guarantee immutability programming even though compiler often uses machine pointers hood languages like perl support symbolic references string values contain names variables value regular reference dereferenced perl considers symbolic reference gives variable name given value php similar feature form codice_3 syntax many object oriented languages make extensive use references may use references access assign objects references also used function/method calls message passing reference counts frequently used perform garbage collection unused objects
[ 4101, 11274, 6160, 2076, 541, 10270, 9248, 545, 5677, 53, 8251, 8773, 7756, 11355, 6239, 5223, 2666, 9325, 3702, 119, 7292, 136, 3212, 655, 5783, 5796, 6330, 10938, 4797, 3790, 10452, 9941, 4847, 5872, 7921, 7412, 9466, 5885, 2304, 10510,...
Test
11,675
6
Synthetic_file_system:synthetic file system computer science synthetic file system pseudo file system hierarchical interface non-file objects appear regular files tree disk-based long-term-storage file system non-file objects may accessed system calls utility programs regular files directories common term regular files non-file objects node benefit synthetic file systems well known file system semantics reused universal easily implementable approach interprocess communication clients use file system perform simple file operations nodes implement complex message encoding passing methods aspects protocol engineering operations common file utilities used even scripting quite easy commonly known everything file generally regarded originated unix unix-world commonly special filesystem mounted /proc filesystem implemented within kernel publishes information processes process directory named process id containing detailed information process status open files memory maps mounts etc /proc first appeared unix 8th edition functionality greatly expanded plan 9 bell labs /sys filesystem linux complements /proc providing lot non-process related detailed information in-kernel status userspace traditional unix systems locate information sysctl calls obexfs fuse-based filesystem provides access obex objects via filesystem applications work remote objects via obex protocol simply local files plan 9 bell labs operating system family concept 9p synthetic filesystem used generic ipc method contrary operating systems plan 9 design heavily distributed os worlds many often large libraries frameworks common things plan 9 encapsulates fileservers important benefit applications much simpler services run network platform agnostic reside virtually host platform network virtually kind network long fileserver mounted application plan 9 drives concept expansively operating system services e.g hardware access networking stack presented fileservers way trivial use resources remotely e.g one host directly accessing another host block devices network interfaces without need additional protocols implementations 9p file system protocol also exists many systems environments debugging embedded systems even system-on-chip soc devices widely known difficult several protocols implemented provide direct access in-chip devices tend proprietary complex hard handle based 9p plan 9 network filesystem studies suggest using synthetic filesystems universal access scheme information major benefit 9p simple quite easy implement hardware easily used virtually kind network serial link internet major argument using synthetic filesystems might flexibility easy access service-oriented architectures noticeable number applications use scheme overall overhead code resource consumption maintenance work reduced significantly many general arguments soas also apply arguments synthetic filesystems include fact filesytem semantics may fit application scenarios example complex remote procedure calls many parameters tend hard map filesystem schemes may require application redesign
[ 5120, 2564, 4107, 6669, 3598, 10257, 6675, 7187, 6677, 5142, 8214, 9236, 25, 10776, 3611, 4637, 9249, 9762, 5158, 7728, 7217, 9780, 9784, 7225, 10809, 11323, 576, 8772, 1109, 10333, 97, 4708, 8298, 9836, 7789, 7285, 9333, 6263, 2168, 9335...
Test
11,676
6
AXFS:axfs axfs advanced xip filesystem compressed read-only file system linux initially developed intel maintained numonyx designed use execute place xip alongside compression aiming reduce boot program load times retaining small memory footprint embedded devices achieved mixing compressed uncompressed pages executable file axfs free software licensed gpl cramfs another read-only compressed file system supports xip patches however uses strategy decompressing entire files whereas axfs supports xip page granularity
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1212, 8380, 10951, 9420, 3795, 4819, ...
Test
11,677
2
Purble_Place:purble place purble place suite three computer games children teenagers developed oberon games microsoft introduced windows vista also included windows 7 publicly introduced windows vista build 5219 along chess titans mahjong titans collection single home screen offers three packs games purble pairs comfy cakes purble shop purble pairs pattern recognition memory game similar pelmanism object clear tableau fewest turns skill level progresses game becomes timed grid size increases similar pictures used beginner level one 5x5 grid intermediate two 6x6 grids advanced four 8x8 grids solve per game addition joker automatically finds another match exposed card numerous special pairs present higher levels card batter machine comfy cakes shuffles board paired clock adds time timer master chef automatically finds matches pairs cards containing cakes sneak peek coin bonus allows player expose remaining cards couple seconds every card exposed way counted turn comfy cakes hand-eye coordination game object fill orders bakery assembling cake match given specification controlling conveyor belt brings cake various stations elements cake include shapes square circular heart-shaped flavor batter strawberry chocolate vanilla optional icing flavors used batter decorations e.g sugar may sprinkled top cake rarer cases flames applied iced cakes create smooth glaze cake match specification player penalized cake gets thrown trash player sends three incorrect orders game certain number correct orders shipped player wins game score tabulated final score depends upon number cakes baked number incorrect orders sent efficiency player baking higher levels specifications become complex multiple cakes must manufactured parallel single conveyor belt player makes 5 6 cakes one difficulty levels purble shop code-breaker game computer decides color five features hat eyes nose mouth clothes concealed player color may used feature color used several times used player attempts deduce guess correct feature colors limited number moves three difficulty levels beginner three features three possible colors 3 27 different possible solutions intermediate 4 256 solutions advanced 5 3125 solutions beginner intermediate levels guessing games move computer tells player items correct little scope deduction advanced level computer n't tell player specific items correct reporting count picks correct color position count picks correct color wrong position level similar colored peg game mastermind success requires logical reasoning although small chance succeeding lucky guesses
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 1...
Validation
11,678
2
Crypto_API_(Linux):crypto api linux crypto api cryptography framework linux kernel various parts kernel deal cryptography ipsec dm-crypt introduced kernel version 2.5.45 since expanded include essentially popular block ciphers hash functions many platforms provide hardware acceleration aes encryption expose programs extension instruction set architecture isa various chipsets e.g aes instruction set x86 sort implementation program kernel-mode user-space may utilize features directly platforms arm kirkwood sheevaplug amd geode processors however implemented isa extensions accessible kernel-mode drivers order user-mode applications utilize encryption openssl gnutls take advantage acceleration must interface kernel
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 7252, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 3742, 2723, 8364, 10933, 5815, 5822, 5824, 1736, ...
Test
11,679
9
Peter_Wegner:peter wegner peter a. wegner august 20 1932 – july 27 2017 computer scientist made significant contributions theory object-oriented programming 1980s relevance church–turing thesis empirical aspects computer science 1990s present 2016 wegner wrote brief autobiography conduit annual brown university computer science department magazine wegner educated university cambridge received post-graduate diploma numerical analysis automatic computing 1954 time phd programs computer science awarded phd university london 1968 book programming languages information structures machine organization maurice wilkes listed supervisor seminal work previous occupation understanding types co-authored luca cardelli latter undertaking co-authored several papers co-edited book interactive computation new paradigm published 2006 wegner inducted fellow association computing machinery acm 1995 received acm distinguished service award 2000 1999 awarded austrian cross honor science art 1st class österreichisches ehrenkreuz für wissenschaft u. kunst i. klasse hit bus sustained serious brain injuries trip london receive award recovered lengthy coma editor-in-chief acm computing surveys brown faculty bulletin professor brown university
[ 10145, 8262, 7634, 8884, 11574, 1783, 9535 ]
Test
11,680
2
UserLAnd_Technologies:userland technologies userland technologies free open-source ad-free compatibility layer mobile app allows linux distributions computer programs computer games numerical computing programs run mobile devices without requiring root account userland also provides program library popular free open-source linux-based programs additional programs different versions programs added unlike linux compatibility layer mobile apps userland require root account userland ability function without root directories also known rooting avoids bricking non-functionality mobile device linux program use addition making mobile device non-functional may void device warranty furthermore requirement programs userland root mobile device proven formidable challenge inexperienced linux users prior application gnuroot debian attempted similarly run linux programs mobile devices ceased maintained therefore longer operational userland allows mobile device run linux programs many n't available mobile apps even linux applications e.g firefox mobile versions available people often find user experience mobile versions pales comparison desktop userland allows users recreate desktop experience mobile device userland currently operates android mobile devices userland available download google play f-droid use userland one must first download-typically google play store-the application install installed user selects app open program selected user prompted enter login information select connection type following user gains access selected program userland pre-loaded distributions alpine arch debian kali ubuntu web browser firefox desktop environments lxde xfce deployment environments git idle text-based games colossal cave adventure zork numerical computing programs gnuplot gnu octave r office suite libreoffice graphics editors gimp inkscape program library linux programs different versions programs may added review slant.co listed userland pro support vnc x sessions rooting required easy setup free open-source con lack support lollipop difficulty use non-technical users contrary os journal found lack need root mobile device made using userland considerably easier linux compatibility layer applications position shared slashgear review userland os journal went state userland one could almost anything ’ limited insanity respect application linux journal stated userland offers quick easy way run entire linux distribution even linux application game pocket slashgear stated userland absolutely super simple use requires little technical knowledge get ground running
[ 577, 5703, 5833, 7722, 7595, 5677, 7983, 7920, 2804, 4309, 5078, 823, 9972, 5435, 8413 ]
Validation
11,681
4
Brendan_Hannigan:brendan hannigan brendan hannigan former head international business machines ibm security systems division helped develop industry first intelligent cloud computing security portfolio also entrepreneur investor focuses security cloud software service saas startups hannigan born ireland finished bsc computer science university college dublin 1987 school became interested fortran programming vax computer architecture immigrated united states early 1990s first lived boston massachusetts secured employment motorola hannigan started working dublin worked digital equipment job irish company involved writing terminal server routing codes relocated u.s. joined motorola wellfleet communications also worked forrester research 1996 2000 director network research implemented successful practices areas enterprise networks security technology product management hannigan however known founding startup q1 labs acquired ibm 2011 company co-founded sandy bird provided security software analyze monitor events interview said ideas based simple realization perimeter protection paradigm companies relied n't work world bad actors sophisticated built upon foundation intelligence must bring security closer data person transaction. ” q1 labs security features seen compatible ibm analytic capability hence acquisition ibm acquired q1 labs company created new division focused helping clients address security challenges q1 labs formed basis security division hannigan tapped lead according gartner division established third largest security software company idc lists hannigan ’ group world leader security services ibm would later acquire startups reinforced division range security services hannigan retired ibm 2016 four years working company november 2016 hannigan joined polaris partners venture partner involved identifying tech startups funding founding experience ibm also focuses cloud infrastructure cybersecurity hannigan maintains business world shifting traditional data center towards multiple cloud services 2019 co-founded sonrai security startup offers organizations better data security across multicloud deployments software-as-a-service product offering aside investor also serves ceo startup able raise 18.5 million going public
[ 4194, 11604, 3960, 3323, 2558 ]
Test
11,682
8
NaviServer:naviserver naviserver high performance web server written c tcl easily extended either language create web sites services 35 modules available project active development hosted sourceforge licensed terms mozilla public license mpl recent new features include naviserver based aolserver version 4.10 aol open-source web server naviserver project started fork aolserver project different supporting multiple protocols providing higher scalability asynchronous i/o aims less conservative new feature development historically naviserver original name server closed-source product company called navisoft early 1990s bought aol 1995 released open-source 1999 aolserver released mozilla friendly-fork takes code back original name
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 7443, 1556, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 7338, 9387, 44, 7983, 10800, 11439, 692, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 5470, 225, 865, 1250, 2404, 4837, 9834, 6379, 5612, ...
Validation
11,683
9
VBScript:vbscript vbscript microsoft visual basic scripting edition active scripting language developed microsoft modeled visual basic allows microsoft windows system administrators generate powerful tools managing computers error handling subroutines advanced programming constructs give user complete control many aspects computing environment vbscript uses component object model access elements environment within running example filesystemobject fso used create read update delete files vbscript installed default every desktop release microsoft windows since windows 98 windows server since windows nt 4.0 option pack optionally windows ce depending device installed vbscript script must executed within host environment several provided microsoft windows including windows script host wsh internet explorer ie internet information services iis additionally vbscript hosting environment embeddable programs technologies microsoft script control vbscript began part microsoft windows script technologies launched 1996 technology also included jscript initially targeted web developers period two years vbscript advanced version 1.0 2.0 time gained support windows system administrators seeking automation tool powerful batch language first developed early 1980s march 6 1988 alan cooper showed bill gates shell prototype allowed widgets added dynamically march 20 1991 microsoft adopted quick basic allowed users create windows apps quickly easily gui finally august 1 1996 internet explorer made features included vbscript version 5.0 functionality vbscript increased new features including regular expressions classes statement eval execute executeglobal functions evaluate execute script commands built execution another script function-pointer system via getref distributed com dcom support version 5.5 submatches added regular expression class vbscript finally allow script authors capture text within expression groups capability already available jscript advent .net framework scripting team took decision implement future support vbscript within asp.net web development therefore new versions vbscript engine would developed would henceforth supported microsoft sustaining engineering team responsible bug fixes security enhancements windows system administrators microsoft suggests migrating windows powershell however scripting engine continue shipped future releases microsoft windows iis employed client-side web development microsoft internet explorer vbscript similar function javascript used write executable functions embedded included html pages interact document object model dom page perform tasks possible html alone however web browsers firefox opera built-in support vbscript means client-side scripting cross-browser compatibility required developers usually choose javascript vbscript vbscript also used server-side processing web pages notably microsoft active server pages asp asp engine type library invokes run vbscript scripts vbscript embedded asp page contained within context switches following example asp page vbscript displays current time 24-hour format also used default script error messages windows operating systems vbscript also used create applications run directly workstation running microsoft windows simplest example script makes use windows script host wsh environment script usually stand-alone file file extension codice_1 script invoked two ways used display output receive input gui dialog input boxes used command line environment vbscript included two types scripting files windows script files html applications windows script file wsf styled xml wsf file include multiple vbs files result wsf files provide means code reuse library classes functions stored one codice_1 files included codice_3 files functionality reused modular way files extension codice_3 executed using codice_1 file html application hta styled html html file used generate user interface scripting language vbscript used program logic files extension codice_6 executed using vbscript jscript also used windows script component activex-enabled script class invoked com-enabled applications files extension vbscript simple create coded using easy use text editor like notepad simple vbscript saved codice_1 extension run windows system double clicking language vbscript modeled visual basic therefore reviewed using similar categories procedures control structures constants variables user interaction array handling date/time functions error handling mathematical functions objects regular expressions string manipulation following key points introduction vbscript language microsoft procedure main construct vbscript separating code smaller modules vbscript distinguishes function return result assignment statement subroutine parameters positional passed value reference control structures include usual iterative conditional loops if-then-else statements case statements complex variants elseif nested control structures memory aid coding certainly readability large number constants true false logical values vbokcancel vbyesno msgbox codes vbblack vbyellow color values vbcr carriage return character many others variables variant type default possible sometimes necessary force particular type integer date etc using conversion functions cint cdate etc user interaction provided functions codice_8 codice_9 provide simple dialogue box format messages input functions display prompting messages former returning standard response latter returning one user-supplied text numeric value elaborate gui interaction controls vbscript used combination html example html application event-driven forms supported visual basic visual basic applications names case-sensitive however considered best practice vbscript style consistent capitalize judiciously hosted windows script host vbscript provides numerous features common scripting languages available visual basic 6.0 features include direct easy access cscript command line runner provides options file system management file modification streaming text operations implemented scripting runtime library codice_10 provides objects filesystemobject file textstream expose windows file system programmer binary file memory i/o provided adodb.stream class also used string builders avoid excessive string concatenation costly interconvert byte arrays strings database access made possible activex data objects ado iis metabase manipulated using getobject function sufficient permissions useful creating destroying sites virtual directories xml files schemas manipulated microsoft xml library application programming interfaces also used retrieve content world wide web via xmlhttp serverxmlhttp objects class strings msxml2.xmlhttp.6.0 msxml2.serverxmlhttp.6.0 respectively functionality also added activex technologies security concerns led many activex controls blacklisted internet explorer process microsoft deploys killbit via monthly windows security updates disable vulnerable microsoft third party code programmers utilize extensibility via com activex modules specifically equip script host vbscript required desired functions vtool component instance adds number dialog windows binary file access functionality microsoft routinely make available ide integrated development environment vbscript although microsoft script editor bundled certain versions microsoft office debugging purposes microsoft script debugger still used current windows versions even though tool updated years allows user set break points vbscript code user interface clumsy vbscript debuggers available third-party sources many text editors offer syntax highlighting language execution error occurs script host issues message stating type error number offending line although vbscript general-purpose scripting language several particular areas use noteworthy first widely used among system administrators microsoft environment situation may change promotion increased use windows powershell second vbscript scripting language quick test professional test automation tool third area note adoption vbscript internal scripting language embedded applications industrial operator interfaces human machine interfaces hierarchical dbms intersystems caché roots language mumps also supports implementation vbscript cache basic programming stored code vbscript omits several useful features full visual basic strong typing extended error trapping ability pass variable number parameters subroutine however use relatively widespread easy learn implement code language need pay royalties microsoft long vbscript trade mark acknowledged organization licenses visual basic applications vba microsoft companies autodesk statsoft great plains accounting visio subsequently acquired microsoft done allowed redistribute full vba code-writing debugging environment product vbscript used place vba macro language outlook 97 vbscript effectively used automating day day office tasks well monitoring windows-based environment first choice tool server administrators ms office users tech contributors also used collaboration adodb activex data objects adodb effective database connectivity
[ 9216, 10243, 11270, 5643, 7691, 4624, 9234, 1043, 22, 537, 6171, 540, 3102, 1055, 7713, 9762, 2083, 8227, 8740, 4136, 1577, 10281, 10282, 4143, 9263, 9780, 2101, 6709, 1591, 8246, 10808, 10812, 3648, 4160, 4674, 8262, 10310, 1098, 4170, 7...
Test
11,684
4
Trusted_timestamping:trusted timestamping trusted timestamping process securely keeping track creation modification time document security means one—not even owner document—should able change recorded provided timestamper integrity never compromised administrative aspect involves setting publicly available trusted timestamp management infrastructure collect process renew timestamps idea timestamping information centuries old example robert hooke discovered hooke law 1660 want publish yet wanted able claim priority published anagram ceiiinosssttuv later published translation ut tensio sic vis latin extension force similarly galileo first published discovery phases venus anagram form sir isaac newton responding questions leibniz letter 1677 concealed details fluxional technique anagram many timestamping schemes different security goals coverage standards systematic classification evaluation timestamping schemes see works masashi une according nowiki rfc 3161 /nowiki standard trusted timestamp timestamp issued trusted third party ttp acting time stamping authority tsa used prove existence certain data certain point e.g contracts research data medical records ... without possibility owner backdate timestamps multiple tsas used increase reliability reduce vulnerability newer ansi asc x9.95 standard trusted timestamps augments nowiki rfc 3161 /nowiki standard data-level security requirements ensure data integrity reliable time source provable third party standard applied authenticating digitally signed data regulatory compliance financial transactions legal evidence technique based digital signatures hash functions first hash calculated data hash sort digital fingerprint original data string bits practically impossible duplicate set data original data changed result completely different hash hash sent tsa tsa concatenates timestamp hash calculates hash concatenation hash turn digitally signed private key tsa signed hash timestamp sent back requester timestamp stores original data see diagram since original data calculated hash hash function one way function tsa never gets see original data allows use method confidential data anyone trusting timestamper verify document created date timestamper vouches also longer repudiated requester timestamp possession original data time given timestamp prove see diagram hash original data calculated timestamp given tsa appended hash result concatenation calculated call hash digital signature tsa needs validated done checking signed hash provided tsa indeed signed private key digital signature verification hash compared hash b inside signed tsa message confirm equal proving timestamp message unaltered issued tsa either timestamp altered timestamp issued tsa advent cryptocurrencies like bitcoin become possible securely timestamp information decentralized tamper-proof manner digital data hashed hash incorporated transaction stored blockchain serves secure proof exact time data existed proof due tremendous amount computational effort performed hash submitted blockchain tampering timestamp would require computational resources rest network combined done unnoticed decentralized timestamping approach using blockchain also found applications areas dashboard cameras secure integrity video files time recording prove priority creative content ideas shared social media platforms
[ 9248, 8674, 5566, 744, 3982, 10831, 3377, 2558, 1087 ]
None
11,685
4
Anti-spam_appliances:anti-spam appliances anti-spam appliances software hardware devices integrated on-board software implement spam filtering and/or anti-spam instant messaging also called spim deployed gateway front mail server normally driven operating system optimized spam filtering generally used larger networks companies corporations isps universities etc reasons hardware anti-spam appliances might selected instead software could include
[ 7066, 7983 ]
None