node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
11,686 | 5 | Polar_modulation:polar modulation polar modulation analogous quadrature modulation way polar coordinates analogous cartesian coordinates quadrature modulation makes use cartesian coordinates x considering quadrature modulation x axis called in-phase axis axis called q quadrature axis polar modulation makes use polar coordinates r amplitude θ phase quadrature modulator approach digital radio transmission requires linear rf power amplifier creates design conflict improving power efficiency maintaining amplifier linearity compromising linearity causes degraded signal quality usually adjacent channel degradation fundamental factor limiting network performance capacity additional problems linear rf power amplifiers including device parametric restrictions temperature instability power control accuracy wideband noise production yields also common hand compromising power efficiency increases power consumption reduces battery life handheld devices generates heat issue linearity power amplifier theoretically mitigated requiring input signal power amplifier constant envelope i.e contain amplitude variations polar modulation system power amplifier input signal may vary phase amplitude modulation accomplished directly controlling gain power amplifier changing modulating supply voltage thus polar modulation system allows use highly non-linear power amplifier architectures class e class f. order create polar signal phase transfer amplifier must known least 17 db amplitude range phase transitions one another amplitude perturbation calculated transition n number samples q sufficiently large allow accurate tracing signal one hundred samples per symbol would lowest number workable amplitude change signal known phase error introduced amplifier amplitude change used pre-distort signal one simply subtracts phase error amplitude modulating q signals polar modulation originally developed thomas edison 1874 quadruplex telegraph – allowed 4 signals sent along pair lines 2 direction sending signal direction already accomplished earlier edison found combining amplitude phase modulation i.e. polar modulation could double 4 signals – hence quadruplex | [
3040,
1121,
5664,
7490,
3140,
7108,
8160,
2920,
7400,
10381,
1550,
2994,
2968,
5020,
5304
] | Test |
11,687 | 7 | Coresystems:coresystems coresystems ag software developing company headquartered switzerland provider field service management solutions technicians coresystems founded 2006 windisch aargau november 2013 company raised 15.5 million first round funding consortium private investors including german tech investor peter zencke former sap executive board member head research development coresystems recently begun exploring products internet things iot appointing iot expert professor elgar fleisch board fleisch holds double appointment eth zürich university st. gallen hsg advises siemens bosch developing iot products june 5 2018 sap announced acquisition coresystems 2013 manuel grenacher founder coresystems awarded 2013 swiss ict award outstanding personality swiss computer science 2014 company nominated 2014 export award category success according 2016 published market research report field service management market global forecast 2020 published marketsandmarkets coresystems identified key innovator market | [
4194,
467,
5210
] | Test |
11,688 | 9 | Lasso_(programming_language):lasso programming language lasso application server server management interface used develop internet applications general-purpose high-level programming language originally web datasource connection tool filemaker later included apple computer filemaker 4.0 claris homepage cdml since evolved complex language used develop serve large-scale internet applications web pages lasso includes simple template system allowing code control generation html content types lasso object-oriented every value object also supports procedural programming unbound methods language uses traits multiple dispatch extensively lasso dynamic type system objects loaded augmented runtime automatic memory management comprehensive standard library three compiling methodologies dynamic comparable php-python just-in-time compilation comparable java .net framework pre-compiled comparable c lasso also supports query expressions allowing elements within arrays types sequences iterated filtered manipulated using natural language syntax similar sql lasso includes full unicode character support standard string object allowing serve support multi-byte characters japanese swedish supports transparent utf-8 conversion writing string data network file system lasso often used scripting language also used wide range non-scripting contexts lasso code packaged standalone executable programs called lassoapps folder structures compiled single files lasso server application server runs system service receives requests web server fastcgi hands request appropriate lasso instance formulates response multiple individual instances supported allowing one server handle multiple sites separate processes server uses high performance io-based green threading system designed multi-core systems lasso compared server-side scripting languages php python coldfusion ruby etc free development lasso allows partial access source code allowing developers add change major components language example ke carlton ds implementation lasso inline licensing comes sas stand-alone versions lasso began mid-1990s early web developers attempting connect apple filemaker pro database world wide web mac platform two solutions eric bickford web-fm russell owens filemaker cgi rofm built applescript requiring use filemaker pro calculation fields formatting web-fm subsequently rewritten c fall 1995 developer vince bonafonti wrote new cgi based rofm using c/c++ improved performance using notion html-based templates instead relying calculation fields proved popular filemaker community brought attention bill doerrfeld owner blue world communications inc. print website development firm based issaquah washington bought source code time blue world experimented improvements cgi frontier scripting environment inspired name lasso need improvement drove creation c-based cgi later released lasso 1.0 point lasso worked filemaker pro 3.x webstar ran apple mac os 8 lasso popularity grew notably reviews print publications blue world hosting participation many email discussion lists many specifically pertained filemaker pro blue world also made frequent appearances known leading company macworld conferences following release lasso 1.2 lineup january 1997 blue world bonfantis entered private talks claris software division apple computer owner filemaker pro claris eventually licensed post-version-1.2 lasso source code help vince paul bonfanti released filemaker web companion component filemaker pro 4.0 filemaker web companion language cdml claris dynamic markup language differed lasso 1.2 ldml lasso dynamic markup language close enough offer easy transition developers looking serve filemaker pro third-party servers offered compelling features including lasso-like web companion filemaker 4.0 helped grow popularity lasso fast-growing macintosh web development community blue world continued developing lasso kyle jessup becoming lasso lead programmer lasso 2.0 released july 1997 introducing fundamental shifts lasso could used february 26 2002 blue world released lasso 5 radical departure filemaker-centric language date never lasso 4 release version number skipped 3 5 lasso 5 included among many updates completely rewritten architecture os x windows linux embedded mysql database though lasso 5 still spoke filemaker database filemaker server filemaker data source remained relatively slow compared sql engine prohibitively expensive since v2.0 lasso fully multithreaded allowing many connections succumbed filemaker latency lag certain operations way get around reliably make major changes data source lasso 5 also added support apache http server natively os x windows linux joining webstar 5 appleshare ip replaced os x server itools tenon mac os 9 lasso used many years unsupported drove closer ties classic lamp server architecture blue world communications released series plug-ins popular web development packages macromedia adobe lasso studio 1.5 dreamweaver runner macworld magazine editors choice awards internet development 2001 losing adobe dreamweaver 3 lasso studio dreamweaver 1.5 also reviewed favorably macworld magazine earning 4 half mice later version lasso studio supported macromedia dreamweaver adobe golive including lasso studio 7 dreamweaver golive march 26 2004 release filemaker server filemaker server advanced version 7 2004 filemaker signaled major change strategy serving data web sites emphasized xml-xslt odbc jdbc connectivity expensive filemaker server advanced product blue world began distance lasso language filemaker apple 2005 lasso pro received mysql network certification demonstrating importance popular open source database future lasso august 1 2004 bill doerrfeld officially sold lasso product line omnipilot software inc. ft. lauderdale florida lasso 7.0.3 last version lasso released blue world october 25 2004 omnipilot officially announced release lasso 8 version including sandboxing multiple sites server connectivity many new datasources also included first free version lasso limited ip addresses omnipilot followed release number complementary products including lasso studio 8 dreamweaver golive march 28 2005 lasso studio eclipse chartfx integration number free lasso-based solutions 2007 three omnipilot employees kyle jessup original developer lasso 1.0 fletcher sandbeck early employee blue world known regular tips tricks kerry adams employee omnipilot created new company lassosoft llc purchase intellectual property lasso omnipilot continue development recognizing need competitive much popular languages php asp radical changes architecture syntax structure made released lasso 9.0 technical challenges caused changes coupled limited marketing resources led significant community decline company struggled release documentation support new language december 2010 new canadian company formed lassosoft inc. bought invested heavily lasso 9.0 language marketing documentation kyle jessup agreed stay lasso lead developer benevolent dictator life several releases 9.1 9.2 released developments recent years three ways say hello world lasso page square brackets reserved lasso html entities must used show square brackets lasso pages purposes marking lasso tags alternatively printing square brackets lasso disabled including no_square_brackets file top inlines basic lasso tool database actions database commands issued lasso db-independent metalanguage case search code works mysql filemaker pro database backend lasso connect needed sql statement course embedded inline using database server supports sql example dashes commands denote optional parameters specified order generated dynamically last duplicate parameters take precedence inline command supports large range parameters allowing developers interact databases may intimate knowledge custom database connectors created allows leveraging abstracted nature inline command next procedural example prints lyrics song 99 bottles beer next example uses oop approach print lyrics object represented string | [
9345,
11011,
9224,
10506,
6797,
9875,
1556,
4507,
670,
1952,
8609,
9385,
5677,
10413,
7983,
4529,
10675,
5684,
2485,
9780,
823,
8644,
865,
9701,
11625,
8554,
3051,
5612,
7022,
9330,
3573,
2808,
3705,
2045
] | None |
11,689 | 2 | NextBSD:nextbsd nextbsd operating system initially based trunk version freebsd august 2015 fork freebsd implements new features developed branches yet implemented freebsd 2019 website seems defunct later commits github date july 2016 basic features launchd notifyd asld libdispatch work installed cloning nextbsd repository github building generic machtest kernels installing new world existing 10.x current system following instructions readme launchd start initial jobs part repo project refers installer first planned milestone website future plans include convert rc tying notifyd potential consumers nextbsd announced jordan hubbard kip macy august 2015 bay area freebsd users group bafug nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code macos units resource ownership task consists virtual address space port right namespace one threads implemented extension process units cpu execution within task simple extension kthreads conjunction memory managers mach implements notion sparse virtual address space shared memory modifications internal units memory management memory objects include named entries regions representations potentially persistent data may mapped address spaces unsupported secure simplex communication channels accessible via send receive capabilities known port rights message queues remote procedure calls notifications semaphores lock sets mach semaphores lock sets supported clocks timers waiting rudimentary shims current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system selection significant unix versions unix-like operating systems descend bsd includes | [
7552,
7561,
5771,
7307,
5397,
8725,
10016,
3237,
8877,
7983,
1718,
7483,
9153,
8262,
8395,
11221,
9320,
9452,
5363,
5492,
2045,
7806
] | Test |
11,690 | 3 | WEC_Le_Mans:wec le mans wec le mans racing simulation arcade game released 1986 konami first racing video game depict 24 hours le mans lap le mans split three sections time day changes day dusk dusk night night dawn game attempted realistically simulate car driving car jumping turning back forth spinning 180 degrees emphasis acceleration braking gear shifting along need counter-steering avoid spin-outs also featured accurately simulated courses approved automobile club de l'ouest used force feedback simulate road vibration form vibrating steering wheel reacts driver acceleration off-road bumps game known difficult complete tracks width remains constant 3 lanes racing slight contact opposing race car result either spin spectacular flip air going course running wide corner also end spin konami released three different video game arcade cabinet versions video arcade game upright machine 'mini spin driver sat sit-down cockpit 'big spin version deluxe arcade version would actually spin gamer around 360° spinning base turning left right depending corner front 'big spin arcade machine looked like real prototype c race car arcade cabinet expensive time high price £7000 1986 equivalent £ game several ports imagine software imagine studios amstrad cpc commodore 64 msx zx spectrum rumored 16-bit port amiga atari st mentioned never came fruition original arcade game played home systems via mame though arcade cabinet simulated arcade version critically acclaimed upon release following debut preview '87 show september 1986 computer video games gave positive review january 1987 issue clare edgeley declaring favourite game show describing fast realistic racing simulation praising rotating cockpit cabinet concluding game played months gave edge run mainly better movement noted many seem prefer run atei amusement trades exhibition international show january 1987 run wec le mans stole january show according computer video games clare edgeley reviewed february 1987 issue sinclair user stating far way sophisticated certainly thrilling game 've ever played describing like hang-on racing car actually sit inside movement system entirely different anything experienced really get thrown around simulates action even spinning shakes whole car going track skidding marked border lines stated hazards avoid cars bombing past great graphics high speed also commercially successful arcades coinslot dedicated arcade game chart number-three behind street fighter continental circus spectrum version game also earned critical acclaim spectrum version also commercially successful reaching 4th place uk spectrum chart may 1989 konami tanaka fumihaki cited wec le mans chief inspiration konami 1995 game speed king spanish magazine microhobby valued game following scores originality 30 graphics 70 motion 80 sound 50 difficulty 80 addiction 80 | [
7269,
4716,
8300,
9006,
1776,
3348,
6390
] | Test |
11,691 | 4 | Backup_Express:backup express catalogic dpx formerly bex backup express enterprise-level data protection solution backs restores data applications variety operating systems data protection disaster recovery business continuity planning capabilities catalogic dpx protects physical virtual servers including vmware supports many database applications including oracle sql sharepoint exchange dpx supports agent-based agent less backups users map use backed version database something goes wrong primary version dpx managed single console catalog allows centralized control tape-based disk-based data protection jobs across heterogeneous operating systems dpx protect data centers remote sites supports recovery dr. dpx protect data disk tape cloud used various recovery use cases including file application bmr vm dr. dpx spin vms backup images recover physical servers bring applications online snapshot based backups used recover ransomware according dpx interface guide dpx contains interfaces following software database management systems db2 lotus notes microsoft exchange novell groupwise micro focus open enterprise services oes oracle sap sharepoint sql-backtrack sql server sybase oracle dpx provides cloning capabilities microsoft exchange sql server oracle dpx provides read/write access recovery points sql log truncation rollback time point time recovery sql granular recovery exchange sharepoint sql available dpx uses tape tape library jukebox virtual tape library vtl disk local compellent netapp dell emc hp data domain disk-to-disk-to-tape cloud backup target dpx back disk vstor netapp fas storage dpx infrastructure 3 types components following among capabilities dpx october 2013 syncsort sold data protection business investor group led bedford venture partners windcrest partners spun data protection business called catalogic software company produces catalogic dpx june 4 2018 reported catalogic software taken equity stake european data protection company storware | [
3366,
1358,
7983
] | Test |
11,692 | 7 | Oracle_Cloud_Platform:oracle cloud platform oracle cloud platform ocp platform service paas offered oracle corporation part oracle cloud platform used build deploy integrate extend applications cloud platform supports variety programming languages databases tools frameworks including oracle-specific open source third-party software systems oracle cloud platform offerings include data management application development integration content experience business analytics systems management security oracle cloud platform currently 12 regions oracle cloud platform offers public private hybrid cloud deployment models oracle cloud platform provides infrastructure service iaas platform service paas infrastructure offered global network oracle managed data centers oracle deploys cloud regions inside region least three fault-independent availability domains availability domains contains independent data center power thermal network isolation oracle cloud generally available north america emea apac japan announced south america us govt regions coming soon | [
6208,
4194,
10340,
8262,
4236,
4429,
1935,
7248,
7537,
2901
] | None |
11,693 | 5 | Server_Name_Indication:server name indication server name indication sni extension transport layer security tls computer networking protocol client indicates hostname attempting connect start handshaking process allows server present multiple certificates ip address tcp port number hence allows multiple secure https websites service tls served ip address without requiring sites use certificate conceptual equivalent http/1.1 name-based virtual hosting https desired hostname encrypted original sni extension eavesdropper see site requested making tls connection client requests digital certificate web server server sends certificate client examines compares name trying connect name included certificate match occurs connection proceeds normal match found user may warned discrepancy connection may abort mismatch may indicate attempted man-in-the-middle attack however applications allow user bypass warning proceed connection user taking responsibility trusting certificate extension connection however may difficult — even impossible due lack full list names advance — obtain single certificate covers names server responsible server responsible multiple hostnames likely need present different certificate name small group names since 2005 cacert run experiments different methods using tls virtual servers experiments unsatisfactory impractical example possible use subjectaltname contain multiple domains controlled one person single certificate unified communications certificates must reissued every time list domains changes name-based virtual hosting allows multiple dns hostnames hosted single server usually web server ip address achieve server uses hostname presented client part protocol http name presented host header however using https tls handshake happens server sees http headers therefore possible server use information http host header decide certificate present names covered certificate served ip address practice means https server serve one domain small group domains per ip address secured efficient browsing assigning separate ip address site increases cost hosting since requests ip addresses must justified regional internet registry ipv4 addresses exhausted result many websites effectively constrained using secure communications ipv4 ipv6 address space exhausted websites served using ipv6 unaffected issue sni addresses issue client send name virtual domain part tls negotiation enables server select correct virtual domain early present browser certificate containing correct name therefore clients servers implement sni server single ip address serve group domain names impractical get common certificate sni added ietf internet rfcs june 2003 rfc 3546 transport layer security tls extensions latest version standard rfc 6066 desired hostname encrypted eavesdropper see site requested helps security companies provide filtering feature governments implement censorship domain fronting used workaround google aws taken action disallow therefore becoming less alternative mid 2018 upgrade called encrypted sni esni rolled experimental phase address risk domain eavesdropping march 1 2019 daniel stenberg stated mozilla firefox supports esni 2004 patch adding tls/sni openssl created edelkey project 2006 patch ported development branch openssl 2007 back-ported openssl 0.9.8 first released 0.9.8f application program implement sni tls library uses must implement application must pass hostname tls library complicating matters tls library may either included application program component underlying operating system browsers implement sni running operating system others implement running certain operating systems | [
4224,
513,
5892,
517,
1157,
8582,
1288,
4490,
9744,
1683,
1688,
1435,
9117,
3742,
9245,
3744,
5666,
2083,
3237,
8358,
9125,
9647,
10033,
9394,
11569,
5048,
7736,
9144,
1215,
9281,
10622,
8644,
9412,
3657,
1098,
5834,
11469,
10831,
11345,
... | Test |
11,694 | 9 | Printer_Job_Language:printer job language printer job language pjl method developed hewlett-packard switching printer languages job level status readback printer host computer pjl adds job level controls printer language switching job separation environment status readback device attendance file system commands pjl conceived extension printer command language pcl supported postscript printers many printer vendors extended pjl include commands proprietary products pjl commands documented hp implemented hp vendor products pjl resides printer languages parses commands first syntax mainly uses plain english words | [
11074,
5384,
6830,
8628,
8763
] | Test |
11,695 | 4 | Sanitization_(classified_information):sanitization classified information sanitization process removing sensitive information document message sometimes encrypting document may distributed broader audience intent secrecy protection dealing classified information sanitization attempts reduce document classification level possibly yielding unclassified document intent privacy protection often called data anonymization originally term sanitization applied printed documents since extended apply computer media problem data remanence well redaction sanitization sense distinguished editing sense blacking deletion text document result effort intended allow selective disclosure information document keeping parts document secret typically result document suitable publication dissemination others intended audience original document example document subpoenaed court case information specifically relevant case hand often redacted context government documents redaction also called sanitization generally refers specifically process removing sensitive classified information document prior publication declassification traditional technique redacting confidential material paper document public release involves overwriting portions text wide black pen followed photocopying result—the obscured text may recoverable original alternatively opaque cover tape redaction tape opaque removable adhesive tape various widths may applied photocopying simple process minor security risks example black pen tape wide enough careful examination resulting photocopy may still reveal partial information text difference short tall letters exact length removed text also remains recognizable may help guessing plausible wordings shorter redacted sections computer-generated proportional fonts used even information leak redacted section form exact position nearby visible characters uk national archives published document redaction toolkit guidelines editing exempt information documents prior release provide guidance editing exempt material information held public bodies secure redacting far complicated problem computer files word processing formats may save revision history edited text still contains redacted text file formats unused portions memory saved may still contain fragments previous versions text text redacted portable document format pdf word processor formats overlaying graphical elements usually black rectangles text original text remains file uncovered simply deleting overlaying graphics effective redaction electronic documents requires removal relevant text image data document file either requires detailed understanding internal operation document processing software file formats used computer users lack software tools designed sanitizing electronic documents see external links redaction usually requires marking redacted area reason content restricted us government documents released freedom information act marked exemption codes denote reason content withheld us national security agency nsa published guidance document provides instructions redacting pdf files printed documents contain classified sensitive information frequently contain great deal information less sensitive may need release less sensitive portions uncleared personnel printed document consequently sanitized obscure remove sensitive information maps also redacted reason highly sensitive areas covered slip white paper cases sanitizing classified document removes enough information reduce classification higher level lower one example raw intelligence reports may contain highly classified information identities spies removed reports distributed outside intelligence agency initial report may classified top secret sanitized report may classified secret cases like nsa report uss liberty incident right report may sanitized remove sensitive data report may released general public seen uss liberty report paper documents generally sanitized covering classified sensitive portions photocopying document resulting sanitized document suitable distribution computer electronic digital documents difficult sanitize many cases information information system modified erased data remains storage may accident design underlying storage mechanism disk ram etc still allows information read despite nominal erasure general term problem data remanence contexts notably us nsa dod related organizations sanitization typically refers countering data remanence problem redaction used sense article however retention may deliberate feature form undo buffer revision history trash backups like example word processing programs like microsoft word sometimes used edit sensitive information unfortunately products always show user information stored file possible file may still contain sensitive information cases inexperienced users use ineffective methods fail sanitize document metadata removal tools designed effectively sanitize documents removing potentially sensitive information may 2005 us military published report death nicola calipari italian secret agent us military checkpoint iraq published version report pdf format incorrectly redacted using commercial software tools shortly thereafter readers discovered blocked-out portions could retrieved copying pasting word processor similarly may 24 2006 lawyers communications service provider filed legal brief regarding cooperation domestic wiretapping nsa text pages 12 14 pdf document incorrectly redacted covered text could retrieved using cut paste end 2005 nsa released report giving recommendations safely sanitize microsoft word document issues make difficult reliably implement multilevel security systems computer users differing security clearances may share documents challenge multilevel security gives example sanitization failure caused unexpected behavior microsoft word change tracking feature two common mistakes incorrectly redacting document adding image layer sensitive text without removing underlying text setting background color match text color cases redacted material still exists document underneath visible appearance subject searching even simple copy paste extraction proper redaction tools procedures must used permanently remove sensitive information often accomplished multi-user workflow one group people mark sections document proposals redacted another group verifies redaction proposals correct final group operates redaction tool permanently remove proposed items | [
2432,
3972,
1801,
11659,
1169,
9233,
1692,
1317,
3366,
8997,
3629,
1070,
10417,
7090,
10034,
10170,
5186,
1475,
7369,
7887,
10195,
2779,
6494,
2275,
7781,
2534,
615,
7527,
8678,
11368,
6000,
7541
] | Test |
11,696 | 7 | Firetide:firetide firetide american international provider wireless mesh network technology based silicon valley firetide designs sells hardware software wireless networks firetide products used 2000 installations 40 countries firetide provider hardware software wireless infrastructure mesh networks firetide founded 2001 name landmark networks 2003 name changed firetide would better reflect company mission culture one year later considerable investments american investors company moved hawaii los gatos ca firetide inc. currently headquartered campbell ca ca r office bangalore india hotport 7000 series indoor outdoor wireless mesh node equipped dual 802.11n mimo radios radios able operate 2.4 4.9 5.0 ghz allows throughput 400 mbit/s fwb-200 series indoor outdoor wireless point-to-point bridges equipped dual 802.11n mimo radios point-to-point bridges used connect distant wireless networks hotpoint 5000 series indoor outdoor wireless access points equipped dual 802.11n mimo radios access points allow wireless wi-fi network connected mesh software development stopped 2015 hotclient 2000 series indoor outdoor wireless customer premises equipment product extends range wi-fi network thanks powerful radio compared standard consumer laptop radios firetide fwc 2050 wlan controller product control 50 access points ease configuration access points central management controlled web-interface firetide ivs 100 integrated video solution combined ip-camera mesh node hotview pro software centrally manages mesh nodes firetide hardware connected mesh network firetide mobility controller software enables firetide mesh compatible mobile units connecting moving subway train firetide use proprietary automesh routing protocol control data flow mesh 2006 firetide announced going supply technology singapore wireless sg project project goal install nationwide network enable public wi-fi well video voice traffic 2007 firetide installed technology construction site burj khalifa burj dubai construction workers experienced problems communication equipment tower grew taller firetide could provide wireless mesh network voip radios could use allowed coverage walkie-talkies could 2009 firetide got assignment install wireless mesh network seoul metropolitan subway request south korean subway operator live camera coverage came fatal arson 2003 compared competitors firetide one could deliver reliable wireless connection station moving trains systems included cameras train stations trains design aimed avoid fatal accidents distributing real-time video feed train drivers operators command central installation included 1000 mesh nodes well 650 cameras january 2009 firetide installed system california state university long beach may 2010 firetide announced original equipment manufacturer oem agreement netgear license agreement enabled netgear use firetide wlan controller software new portfolio wlan controllers firetide inc. announced acquired unicom systems inc. division unicom global may 19 2014 details acquisition disclosed | [
9098,
10021,
10386
] | Train |
11,697 | 3 | Tera_Computer_Company:tera computer company tera computer company manufacturer high-performance computing software hardware founded 1987 washington d.c. moved 1988 seattle washington james rottsolk burton smith company first supercomputer product named mta featured interleaved multi-threading i.e barrel processor also data cache relying instead switching threads latency tolerance used deeply pipelined memory system handle many simultaneous requests address randomization avoid memory hot spots upon acquiring cray research division silicon graphics 2000 company renamed cray inc | [
8704,
10051,
7432,
10612,
731
] | Test |
11,698 | 2 | ALTQ:altq altq alternate queueing network scheduler berkeley software distribution altq provides queueing disciplines quality service qos related components required realize resource sharing commonly implemented bsd-based routers altq included base distribution freebsd netbsd dragonfly bsd integrated pf packet filter openbsd later replaced new queueing subsystem deprecated openbsd 5.5 release completely removed 5.6 2014 altq packets assigned queues purpose bandwidth control scheduler defines algorithm used decide packets get delayed dropped sent immediately five schedulers currently supported freebsd implementation altq | [
7425,
2180,
1286,
1927,
1801,
10761,
10000,
2193,
274,
7702,
9625,
1946,
4636,
9762,
2212,
6438,
8998,
10535,
684,
4908,
1071,
3248,
7983,
9009,
11573,
1718,
9784,
1465,
5177,
5819,
5181,
3006,
9151,
11459,
9671,
9927,
1993,
8266,
8395,
3... | Test |
11,699 | 5 | Systat_(protocol):systat protocol systat active users simple internet protocol ostensibly useful debugging measurement connection port 11 either tcp udp elicits list users currently logged system though remains official internet protocol use considered security vulnerability | [
6993
] | None |
11,700 | 7 | IMUSE:imuse imuse interactive music streaming engine interactive music system used number lucasarts video games idea behind imuse synchronize music visual action video game audio continuously matches on-screen events transitions one musical theme another done seamlessly imuse developed early 1990s composers michael land peter mcconnell working lucasarts imuse system patented lucasarts added fifth version scumm game engine 1991. imuse developed michael land frustration audio system used lucasarts composing secret monkey island goal create system would enable composer set mood via music according events game project much daring imagined brought old friend peter mcconnell collaborate creating system later patented together imuse also found useful account differences processing speed personal computers time direct means synchronizing sound gameplay rendering account imuse system acts pit orchestra according mcconnell playing back shorter longer sections music waiting key events occur within game drawing engine first game use imuse system used lucasarts adventure games since also used non-adventure lucasarts titles dos version one often cited example imuse system beginning guybrush finds woodtick small town scabb island whenever guybrush walks building variation woodtick theme plays different instrument guybrush walks music closing flourish leads back basic woodtick theme | [
7586,
8454,
2826,
3210,
11306,
2293,
4182,
5914,
5083,
1916
] | Train |
0 | 2 | SYSTAT_(DEC):systat dec systat command dec tops-10 rsts/e computer operating systems one obtained current general status running operating system commands showed logged-on users processes i/o interesting system management information | [
0,
4786,
5571
] | Test |
1 | 4 | Stealth_wallpaper:stealth wallpaper stealth wallpaper material designed prevent indoor wi-fi network extending leaking outside building malicious persons may attempt eavesdrop attack network simple prevent electronic signals passing building covering interior metal stealth wallpaper accomplishes difficult task blocking wi-fi signals still allowing cellphone signals pass first stealth wallpaper originally designed uk defense contractor bae systems 2012 register reported commercial wallpaper developed institut polytechnique grenoble centre technique du papier planned sale 2013 wallpaper blocks three selected wi-fi frequencies nevertheless allow gsm 4g signals pass network therefore allowing cell phone use remain unaffected wallpaper | [] | Train |
2 | 4 | Carrier_IQ:carrier iq carrier iq privately owned mobile software company founded 2005 sunnyvale california provided diagnostic analysis smartphones wireless industry via installation software user phone typically manner removed without rooting phone company says software deployed 150 million devices worldwide iq agent software typically pre-installed mobile devices handset manufacturers network operators designed gather store forward diagnostic measurements behalf data available include metrics device e.g. firmware battery levels application performance web performance performance data voice data connectivity device radio towers mobile device manufacturers network operators determine metrics actually collected according set criteria known profile iq agent software runs background user usually aware presence unless implementation includes on-off switch iq agent periodically uploads data carrier iq mobile service intelligence platform msip system feeds network operator network performance monitoring diagnostic tools whenever mobile device uploads data iq agent also download new profile change selection metrics gathered iq agent first shipped 2006 embedded feature phones since implemented numerous devices operating systems including smartphones android rim iphone usb modems tablets msip mobile service intelligence platform refers backend carrier iq software receives mobile device diagnostic data directly mobile devices containing iq agent software platform aggregates data many devices produces kpis key performance indicators network operators mobile device manufacturers use assess quality services provide troubleshoot mobile device network problems analytics domains msip components enable system calculate specific kpis carrier iq first analytics domains cdma signaling later implementing umts third-generation mobile cellular technology gsm networks lte standard marketed 4g lte device-specific domains device stability battery application performance iq insight suite applications gathers analyzes presents kpis generated msip web-based gui graphical user interface application delivers data geospatial tabular view issues dropped calls no-service conditions allows cross-domain analysis kpis iq care dashboard tool network operator mobile device customer care agents mobile device user calls support troubleshooting iq care provides customer care agent dashboard showing consumer device configurations e.g. mobile device serial number firmware version usage history e.g. number applications installed battery life user experience metrics e.g. device application crash data radio technology analytics company founded konstantin othmer spin-off core mobility company msip software aggregates analyzes delivers data wireless carriers device manufacturers information proves valuable resource businesses understand quality service customers experience january 27 2009 ceo mark quinlivan announced carrier iq received 20 million series c financing intel capital presidio ventures sumitomo corporation company february 9 2009 carrier iq announced partnership huawei technologies develop new range datacards provide improved feedback mobile broadband user experience february 17 2009 nec carrier iq announced global partnership june 17 2009 carrier iq selected tie tie50 award winner one hottest global emerging companies june 16 2010 bridgescale partners announced 12 million series financing company october 18 2010 visionmobile announced carrier iq joined 100 million club software installed 100 million phones march 22 2011 carrier iq announced mobile intelligence 4g technologies including lte hspa+ august 31 2011 operating partner mohr davidow ventures larry lenhart named ceo announcement noted second quarter 2011 carrier iq passed petabyte milestone processed analytics data october 19 2011 carrier iq third party vendor nielsen company announced partnership analyzing data october 27 2011 idc named carrier iq innovative business analytics company 100m november 12 2011 trevor eckhart published report indicating carrier iq software capable recording various metrics including user keystrokes february 27 2012 carrier iq announced extension iq care platform designed allow mobile operators provide consumers direct insight mobile device experience may 8 2012 carrier iq appointed magnolia mobley former verizon lead privacy counsel chief privacy officer general counsel december 31 2015 reported carrier iq intellectual property talent acquired inc. november 12 2011 researcher trevor eckhart stated post androidsecuritytest.com carrier iq logging information location without notifying users allowing opt information tracked included detailed keystroke logs potentially violating us federal law november 16 2011 carrier iq sent eckhart cease desist letter claiming copyright infringement posting carrier iq training documents website also making false allegations eckhart sought received backing user rights advocacy group electronic frontier foundation eff november 23 2011 carrier iq backed apologized statement apology carrier iq denied allegations keystroke logging forms tracking offered work eff november 28 2011 eckhart published youtube video demonstrates carrier iq software act logging plain text variety keystrokes included demonstration clear-text captures passwords otherwise secure websites activities performed cellular network disabled video demonstration showed carrier iq software processing keystrokes browser data text messages contents indication information processed recorded transmitted carrier iq responded statement metrics tools derive designed deliver information intention developing tools datasheet product called experience manager carrier iq public website clearly states carriers capture vast array experience data including screen transitions button presses service interactions anomalies many already seeking suit carrier iq including numerous apps released detect carrier iq detecting carrier iq normally n't require device rooted removal process advanced requires user root device unlock device boot loader applies nexus devices order remove rooting device may void warranty since system files modified december 12 2011 carrier iq released document explain software uses document titled understanding carrier iq technology credits given dan rosenberg trevor eckhart nineteen page document provides technical breakdown software mobile phone works profiles provided carrier give carriers performance data networks devices running document appears updated regular basis questions answered time december 1 2011 carrier iq issued clarification november 23 statements individuals identified great deal information available carrier iq software inside handset software record store transmit contents sms messages email photographs audio video example understand whether sms sent accurately record transmit content sms know applications draining battery capture screen ... condition contracts operators carrier iq operates exclusively within framework laws applicable jurisdiction data gather transmitted encrypted channel secured within customers ’ networks audited customer-approved facilities ... carrier iq acts agent operators implementation different diagnostic information actually gathered determined customers – mobile operators carrier iq gather data devices carrier iq consumer advocate mobile operator explaining works work three main complaints hear mobile device users 1 dropped calls 2 poor customer service 3 constantly recharge device software allows operators figure problems occurring calls dropped extend life battery user calls complain problem software helps operators ’ customer service quickly identify specific issue phone debate whether carrier iq software actually sends collected data real time stored phone gets read later company clearly states web page software able provide real-time data carrier iq ’ mobile service intelligence solution eliminates guesswork automatically providing accurate real-time data direct source – customers handsets. february 2012 telecomtv association carrier iq filmed panel discussion/debate titled 'the data dilemma addressing question operators collect user data benefit customer commercial financial betterment participants videotaped panel discussion mike short vice president telefónica europe dean bubley founder disruptive analysis charlotte patric principal analyst gartner martyn warwick moderator telecomtv may 8 2012 carrier iq appointed chief privacy officer magnolia mobley formerly verizon lead privacy counsel news spurred new round articles discussions privacy mobile communications february 2015 htc one users began reporting carrier iq agent software overriding gps device settings order obtain location information even gps turned generally speaking analytics companies collect synthesize present aggregated user information customers help reduce maintenance costs increase revenue improve performance particular product mobile analytics provide customers telemetry telemetry important contains solutions related mobile web telephone services instance particular application mobile device crashes logs sent showing specific details issue also possible telemetry related mobile handset user webpage views click behavior also included contents sms messages kept private clarification states simple reporting success failure sms transmission provides valuable information customer habits would normally available outside cellular network information transmitted web regular basis internet service provider able see entries named.log file resides name server times user affected phone connected internet wifi method connecting extremely common many users seek keep cellular data charges low possible also utilizing home corporate wireless networks likely privacy violation targeted marketing home company internet service provider examples possible targeted marketing include offering competing phone plans android apps facilitate additional sales television guides even hardware sales like faster integrated wifi routers short way carrier iq works even company acts best intentions software betrays users leaking information outside control either carrier iq affected user phone company december 1 2011 sprint t-mobile confirmed phones sprint said collect enough information understand customer experience devices network address connection problems look contents messages photos videos etc. using tool ... information collected sold n't provide direct feed data anyone outside sprint verizon one four biggest u.s. firms say installed phones apple htc samsung said software installed phones apple said quit supporting application ios 5 said diagnostic data sent apple customers must actively opt-in share information ... never recorded keystrokes messages personal information diagnostic data plans ever said would scrub software phones future release htc whose android phone subject eckhart video said required devices number u.s carriers added important note htc customer partner carrier iq receive data application company carriers partner carrier iq nokia research motion blackberry ltd said carrier iq categorically authorized phones according company website software also installed nec mobile devices company partnership vodafone portugal although phone manufacturers carriers large say software strictly used monitor phone systems used third parties press release october 19 2011 touted partnership nielsen company press release said together deliver critical insights consumer experience mobile phone tablet users worldwide adhere nielsen ’ measurement science privacy standards alliance leverage carrier iq technology platform gather actionable intelligence performance mobile devices networks december 1 2011 senator al franken chairman united states senate judiciary subcommittee privacy technology law sent letter lenhart asking answers 11 questions asking whether company violation electronic communications privacy act including federal wiretap statute 18 u.s.c § 2511 et seq pen register statute 18 usc § 3121 et seq stored communications act 18 u.s.c § 2701 et seq computer fraud abuse act 18 u.s.c § 1030 request fbi freedom information act manuals documents written guidance used access analyze data gathered programs developed deployed carrier iq denied citing pending law enforcement proceeding led speculation fbi using data obtained carrier iq investigations fortinet deemed carrier iq security risk/rootkit using definition riskware/carrieriq android paper shared senate clarifying solution 2011 board directors november 2011 | [
6788,
3933,
6515,
4400,
5822,
2564,
740,
7189,
1108,
5236,
1582,
2240,
4101,
5351,
7956
] | Test |
3 | 2 | ACF2:acf2 acf2 access control facility commercial discretionary access control software security system developed mvs z/os today vse z/vse today vm z/vm today ibm mainframe operating systems skk inc. barry schrager eberhard klemens scott krueger combined develop acf2 london life insurance london ontario 1978 2 added acf2 name cambridge systems north american marketing rights product differentiate prototype developed schrager klemens university illinois—the prototype name acf 2 also helped distinguish product ibm acf/vtam acf2 developed response ibm racf product developed 1976 ibm answer 1974 share security data management project requirement whitepaper acf2 design guided requirements taking resource rule oriented approach unique acf2 concepts protection default resource pattern masking result competitive tension racf acf2 ibm matured saf security access facility interface mvs z/os allowed security product process os third-party software application security calls enabling mainframe secure facets mainframe operations skk acf2 sold uccel corporation 1986 turn purchased computer associates international inc. 1987 ca technologies 2012 markets acf2 ca acf2 | [
2993,
8173,
1460,
6717,
1464,
5571,
5041,
3293,
3794,
4261,
6045,
1593,
3233,
6856,
699,
6957
] | Test |
4 | 4 | Dorkbot_(malware):dorkbot malware dorkbot family malware worms spreads instant messaging usb drives websites social media channels like facebook dorkbot ’ backdoor functionality allows remote attacker exploit infected systems according analysis microsoft remote attacker may able system infected dorkbot may used send spam participate ddos attacks harvest users credentials online services including banking services may december 2015 microsoft malware protection center detected dorkbot average 100,000 infected machines month december 7th 2015 fbi microsoft joint task force took dorkbot botnet 2015 u.s. department homeland security advised following action remediate dorkbot infections | [
3859,
4,
2891,
1122,
2850
] | Test |
5 | 9 | Lout_(software):lout software lout batch document formatter invented jeffrey h. kingston reads high-level description document similar style latex produces postscript file printed printers plain text pdf output also available term lout primarily designates document formatting programming language implementation language jeffrey h. kingston sometimes referred basser lout basser lout free software distributed terms gnu general public license lout copies formatting algorithms tex intended much easier program due use high-level functional programming language instead macro language typical installation latex together tex binaries takes 50 300 mb lout 1 mb mainly due fewer packages tools might also attributed c implementation instead macro language source code lout comes easy-to-read user guide basics learnt couple hours includes packages creating tables charts equations diagrams everything one package box lout useful creating reports books gives precise control typesetting core lout programming language provides low-level operations similar tex packages come basser lout provide complete high-level markup language users may use directly produce documents way similar latex simple lout document may look like different document types available doc report book also slides overhead transparencies illustration stand-alone illustrations customizing document style usually relatively easy even non-programmer lout programming language similar functional languages core programming language consists less 30 primitive operators features make particularly close haskell notably fact lout expressions lazily evaluated lout also provides constructs needed implementation document formatting commonly found programming languages galleys unlike functional programming languages lout provide instance first-class functions | [
2740,
4039,
4573,
4759,
5571,
7710,
3222,
6015,
6016,
578,
241,
1435,
222
] | Test |
6 | 0 | ETAP-3:etap-3 etap-3 proprietary linguistic processing system focusing english russian developed moscow russia institute information transmission problems rule-based system uses meaning-text theory theoretical foundation present several applications etap-3 machine translation tool converter universal networking language interactive learning tool russian language learners syntactically annotated corpus russian language demo versions tools available online etap-3 machine translation tool translate text english russian vice versa rule-based system makes different present-day systems predominantly statistical-based system makes syntactical analysis input sentence visualized syntax tree machine translation tool uses bilingual dictionaries contain 100,000 lexical entries unl converter based etap-3 transform english russian sentences representations unl universal networking language generate english russian sentences unl representations syntactically annotated corpus treebank part russian national corpus contains 40,000 sentences 600,000 words fully syntactically morphologically annotated primary annotation made etap-3 manually verified competent linguists makes syntactically annotated corpus reliable tool linguistic research etap-3 system makes extensive use lexical functions explored meaning-text theory reason interactive tool russian language learners aiming acquisition lexical functions developed learning tools created german spanish bulgarian | [
8057,
7410,
5008
] | Test |
7 | 9 | Total_functional_programming:total functional programming total functional programming also known strong functional programming contrasted ordinary weak functional programming programming paradigm restricts range programs provably terminating termination guaranteed following restrictions restrictions mean total functional programming turing-complete however set algorithms used still huge example algorithm asymptotic upper bound calculated program uses walther recursion trivially transformed provably-terminating function using upper bound extra argument decremented iteration recursion example quicksort trivially shown substructural recursive recurs maximum depth length vector worst-case time complexity n quicksort implementation lists would rejected substructural recursive checker using haskell source lang= haskell import data.list partition qsort qsort qsort let lesser greater partition make substructural recursive using length vector limit could source lang= haskell import data.list partition qsort x qsortsub x x -- minimum case qsortsub -- shows termination -- standard qsort cases qsortsub l ls -- nonrecursive accepted qsortsub l ls -- nonrecursive accepted qsortsub l ls let lesser greater partition classes algorithms theoretical upper bound practical upper bound example heuristic-based algorithms programmed give many recursions also ensuring termination another outcome total functional programming strict evaluation lazy evaluation result behaviour principle however one may still preferable even required performance reasons total functional programming distinction made data codata—the former finitary latter potentially infinite potentially infinite data structures used applications i/o using codata entails usage operations corecursion however possible i/o total functional programming language dependent types also without codata epigram charity could considered total functional programming languages even though n't work way turner specifies paper could programming directly plain system f martin-löf type theory calculus constructions | [
2740,
5273,
4573,
7658,
6223,
703
] | Test |
8 | 4 | Hole_punching_(networking):hole punching networking hole punching sometimes punch-through technique computer networking establishing direct connection two parties one behind firewalls behind routers use network address translation nat punch hole client connects unrestricted third-party server temporarily stores external internal address port information client server relays client information using information client tries establish direct connection result connections using valid port numbers restrictive firewalls routers accept forward incoming packets side hole punching require knowledge network topology function icmp hole punching udp hole punching tcp hole punching respectively use internet control message user datagram transmission control protocols using tcp nefarious hole punching possible send compressed syn packets common ack path networked devices public globally accessible ip addresses create connections one another easily clients private addresses may also easily connect public servers long client behind router firewall initiates connection however hole punching form nat traversal required establish direct connection two clients reside behind different firewalls routers use network address translation nat clients initiate connection unrestricted server notes endpoint session information including public ip port along private ip port firewalls also note endpoints order allow responses server pass back server sends client endpoint session information client peer client tries connect peer specified ip address port peer firewall open server new connection attempt punches hole client firewall endpoint becomes open receive response peer depending network conditions one clients might receive connection request successful exchange authentication nonce clients indicates completion hole punching procedure voip products online gaming applications p2p networking software use hole punching reliable hole punching requires consistent endpoint translation multiple levels nats hairpin translation outbound connection private endpoint passes firewall receives public endpoint public ip address port number firewall translates traffic connection closed client server communicate public endpoint firewall directs traffic appropriately consistent endpoint translation reuses public endpoint given private endpoint instead allocating new public endpoint every new connection hairpin translation creates loopback connection two private endpoints recognizes destination endpoint functionality necessary hole punching used within multiple-layered nat | [
6025,
5847,
2128,
407,
3775,
7637,
4577,
2681,
4014,
5488,
5790,
2664,
4814,
7170
] | Validation |
9 | 7 | Qstack:qstack qstack cloud management platform developed greenqloud cloud computing software company founded reykjavik iceland february 2010 qstack enables users manage multiple clouds hybrid deployments single self-service portal qstack continuous development incorporating developments within infrastructure cloud application management solutions next release qstack slated june 2017 2014 jonsi stefansson joined ceo greenqloud pivoted operational focus development qstack beta launch fall 2015 began offering support technical services certifications software qstack hypervisor agnostic kvm vmware hyper-v manage private clouds multiple locations well aws azure ec2-compatible public clouds user interface qstack combines proprietary software open-source components company claims harden meet strict security standards often required enterprise deployments qstack features vm templates windows linux operating systems also features full ssh/rdp access instances virtual routers firewalls load balancers built interface 2015 review idg columnist j. peter bruzzese praised qstack ’ user interface ease-of-use clean look | [
6731,
4295,
4759,
5064,
5571,
578,
5884
] | Test |
10 | 7 | Riak:riak riak pronounced ree-ack distributed nosql key-value data store offers high availability fault tolerance operational simplicity scalability addition open-source version comes supported enterprise version cloud storage version riak implements principles amazon dynamo paper heavy influence cap theorem written erlang riak fault tolerant data replication automatic data distribution across cluster performance resilience riak licensed using freemium model open source versions riak riak cs available end users pay additional features support riak pluggable backend core storage default storage backend bitcask leveldb also supported riak available free apache 2 license addition basho technologies offered two options commercial software riak enterprise riak enterprise plus riak enterprise plus adds baseline annual system health checks ensure long-term platform stability performance riak official drivers ruby java erlang python also numerous community-supported drivers programming languages riak originally written andy gross others basho technologies power web sales force automation application former engineers executives akamai interest datastore technology applications built company decided build business around riak gaining adoption throughout fortune 100 becoming foundation many world fastest-growing web-based mobile social networking applications well cloud service providers releases graduation include notable users include comcast github best buy uk national health services nhs weather channel riot games | [
7788,
2451,
3613,
6428,
7637,
5571,
578,
3873,
6367,
6368,
7838,
8110,
7924,
7848,
5863,
5965,
5889
] | Test |
11 | 4 | S21Sec:s21sec s21sec cybersecurity company s21sec offers various security-related services e.g protection critical infrastructures personal data protection software e.g information security management systems s21sec focused providing security governs energy critical infrastructures finance institutions telco industries s21sec cert section 24-hour security intelligence center cybercrime one collaborates governs governmental institutions like europool fbi 20 dow jones eurostoxx 50 companies clients s21sec late 2014 portugal-based sonae bought 60 s21sec | [
1805
] | Test |
12 | 9 | Locomotive_BASIC:locomotive basic locomotive basic proprietary dialect basic programming language written locomotive software amstrad cpc built-in rom also gem application amstrad pc1512 1640 main ancestor mallard basic interpreter cp/m supplied amstrad pcw two versions locomotive basic 1.0 came cpc model 464 1.1 shipped versions special update—or rather rom extension—was available amstrad cpc plus series machines added specialised basic commands taking advantage extra capabilities machines development based existing work recently undertaken writing mallard basic acorn computers z80 addon bbc micro reported taken around 12 weeks enhance existing code influenced bbc basic though adding additional functions things would required assembly language bbc rather simple powerful basic implementation standards day featuring dedicated commands handling graphics draw plot ink paper versions plus fill v1.1 even allowing creation multiple screens windows like although color system palette handling awkward table giving numeric codes 27 system colors printed built-in 3 disk drive casing 664 later machines simple stand however among basics time offering timer-based software interrupt mechanism using every commands offered timed repeating once-off call respectively basic line number choice also compared home computers time amstrad via locomotive basic granted relatively high level control cpc sound chip ay-3-8912 3 melodic channels 1 noise channel chip also used late-model zx spectrums well atari st msx computers none complete built-in sound command many things selecting particular channel combination channels setting envelopes volume pitch noise could done single sound command 7 parameters granted especially complex and/or low-level techniques could done basic due requiring precise direct access hardware e.g especially complex music trackers including simulated chords using arpeggios etc playback digitally sampled sounds game robocop example disk tape file management managed basic usually good enough simple file management commands get put erase save merge run cat load etc fact years basic supplied standard every low-cost home computer also acted less simple operating system also available special commands memory allocation handling like memory parametric load command allowing example load file containing raw picture data video memory causing displayed couple basic instructions adding right memory address es parameter commands load save would allow easy loading raw uncompressed 16 kb screen pictures calling another address gave forced system reset call 0 famous press key call bb18 eliminating flicker animation allowing synchronize monitor raster scan via sync frame-flyback call bd19 given dedicated command basic 1.1 frame peek poke call provided interface assembly language programming basic locomotive basic compared commodore 64 basic commodore basic dedicated commands graphics sound allowed pretty much anything within standard capabilities machine unimportant machines era using full graphics sound limited assembler programmers msx spectrum others offered similar less complete command set sound graphics capabilities things going clearly beyond basic capabilities overscan modes used games demos 27-color graphics modes digital sound playback smooth scrolling unlike sinclair basic commodore 64 basic various keyboard command shortcuts specialized keys choosing symbols colors locomotive basic keywords typed full interpreter parsed recognized tokenised however abbreviations like print shortcuts programs could saved onto cassette tape floppy disk retrieved binary ascii files | [
1158,
5367,
1255,
2463,
6891,
8183,
4139,
5651,
2925,
7448,
5926,
5129,
483,
5571,
7906,
5137,
5234,
2941,
3303,
1304,
61,
336,
6394,
4003,
7864,
1789,
5877,
4012,
4745,
1064
] | Test |
13 | 2 | NOS_(software):nos software nos network operating system discontinued operating system time-sharing capabilities written control data corporation 1970s nos ran 60-bit cdc 6000 series mainframe computers successors nos replaced earlier cdc kronos operating system 1970s nos intended sole operating system cdc machines fact cdc promoted heavily nos replaced nos/ve 64-bit cyber-180 systems mid-1980s version 1 nos continued updated 1981 nos version 2 released early 1982 nos version 1 terminal user instant manual cdc 1975-1980 | [
1807,
4297,
4670,
5021,
3271,
3276,
3626,
5041,
7546,
7550,
405,
1855,
4347,
65,
4733,
5783,
6853,
5088,
6500,
785,
2266,
788,
3682,
1522,
7605,
7611,
4759,
7242,
4397,
6892,
5116,
2300,
126,
6907,
4786,
4423,
6197,
4061,
1208,
1574,
69... | Validation |
14 | 3 | Branch_target_predictor:branch target predictor computer architecture branch target predictor part processor predicts target taken conditional branch unconditional branch instruction target branch instruction computed execution unit processor branch target prediction branch prediction attempts guess whether conditional branch taken not-taken i.e. binary parallel processor designs instruction cache latency grows longer fetch width grows wider branch target extraction becomes bottleneck recurrence machines recurrence takes two cycles machine loses one full cycle fetch every predicted taken branch predicted branches happen every 10 instructions force substantial drop fetch bandwidth machines longer instruction cache latencies would even larger loss ameliorate loss machines implement branch target prediction given address branch predict target branch refinement idea predicts start sequential run instructions given address start previous sequential run instructions predictor reduces recurrence predictor ram 5–10 size instruction cache fetch happens much faster instruction cache fetch recurrence much faster fast enough could parallelized predicting target addresses target branches | [
5737,
5483,
4845,
6922,
7541,
7507
] | Test |
15 | 4 | Information_Card_Foundation:information card foundation june 2008 independent non-profit organization information card foundation icf created icf consists steering community board members steering business board members businesses include equifax google microsoft novell oracle corporation paypal foundation created information card digital identification card prove purpose information card supply certified proof online merchants businesses aid identity protection user | [
7708,
1805,
6143
] | Test |
16 | 9 | Inline_caching:inline caching inline caching optimization technique employed language runtimes first developed smalltalk goal inline caching speed runtime method binding remembering results previous method lookup directly call site inline caching especially useful dynamically typed languages method binding happens runtime virtual method tables often used following ecmascript function receives object invokes tostring-method displays results page script embedded since type object specified potential method overloading impossible decide ahead time concrete implementation tostring-method going invoked instead dynamic lookup performed runtime language runtimes employ form caching lookup performed every time method invoked methods may defined several steps inheritance chain dynamic lookup expensive operation achieve better performance many language runtimes employ form non-inline caching results limited number method lookups stored associative data structure greatly increase performance provided programs executed cache friendly i.e limited set methods invoked frequently data structure typically called first-level method lookup cache concept inline caching based empirical observation objects occur particular call site often type cases performance increased greatly storing result method lookup inline i.e directly call site facilitate process call sites assigned different states initially call site considered uninitialized language runtime reaches particular uninitialized call site performs dynamic lookup stores result call site changes state monomorphic language runtime reaches call site retrieves callee invokes directly without performing lookups account possibility objects different types may occur call site language runtime also insert guard conditions code commonly inserted preamble callee rather call site better exploit branch prediction save space due one copy preamble versus multiple copies call site call site monomorphic state encounters type one expects change back uninitialized state perform full dynamic lookup canonical implementation register load constant followed call instruction uninitialized state better called unlinked register loaded message selector typically address object call run-time routine look-up message class current receiver using first-level method lookup cache run-time routine rewrites instructions changing load instruction load register type current receiver call instruction call preamble target method linking call site target method execution continues immediately following preamble subsequent execution call preamble directly preamble derives type current receiver compares register agree receiver type method continues execute preamble calls run-time various strategies possible one relink call-site new receiver type performance gains come one type comparison instead least type comparison selector comparison first-level method lookup cache using direct call benefit instruction prefetch pipe-lining opposed indirect call method-lookup vtable dispatch particular call site frequently sees different types objects performance benefits inline caching easily nullified overhead induced frequent changes state call site following example constitutes worst-case scenario monomorphic inline caching method tostring invoked object whose type known advance importantly though type object changes every iteration surrounding loop naive implementation monomorphic inline caching would therefore constantly cycle uninitialized monomorphic states order prevent happening implementations monomorphic inline caching support third state often referred megamorphic state state entered particular call site seen predetermined number different types call site entered megamorphic state behave uninitialized state exception enter monomorphic state ever implementations monomorphic inline caching change megamorphic call sites back uninitialized certain amount time passed full garbage collection cycle performed better deal call sites frequently see limited number different types language runtimes employ technique called polymorphic inline caching polymorphic inline caching call site monomorphic state sees second type rather reverting uninitialized state switches new state called polymorphic polymorphic call site decides limited set known methods invoke based type currently presented words polymorphic inline caching multiple method lookup results recorded call site every call site program potentially see every type system usually upper bound many lookup results recorded call site upper bound reached call sites become megamorphic inline caching performed canonical implementation jump table consists preamble derives type receiver series constant compares conditional jumps jump code following preamble relevant method receiver type jump table typically allocated particular call-site monomorphic call-site encounters different type jump-table fixed size able grow adding cases new types encountered small maximum number cases 4 6 8 reaches maximum size execution new receiver type fall-off end enter run-time typically perform method lookup starting first-level method cache observation together monomorphic polymorphic inline caches collect per-call-site receiver type information side-effect optimizing program execution led development adaptive optimization self run-time optimizes hot spots program using type information inline caches guide speculative inlining decisions run-time uses monomorphic polymorphic inline caching steady state unlinked sends occurring sends falling-off ends polymorphic inline caches since sends slow profitable optimize sites megamorphic inline cache implemented creating code perform first-level method lookup particular call-site scheme send falls-off end polymorphic inline cache megamorphic cache specific call site selector created shared one already exists send site relinked call code significantly efficient normal first-level method lookup probe since selector constant decreases register pressure code lookup dispatch executed without calling run-time dispatch benefit branch prediction empirical measurements show large smalltalk programs 1/3 send sites active methods remain unlinked remaining 2/3 90 monomorphic 9 polymorphic 1 0.9 megamorphic | [
1616,
6368,
5737,
2420,
6172,
1854
] | Test |
17 | 2 | CCID_(protocol):ccid protocol ccid chip card interface device protocol usb protocol allows smartcard connected computer via card reader using standard usb interface without need manufacturer smartcards provide reader protocol allows smartcard used security token authentication data encryption used bitlocker chip card interface devices come variety forms smallest ccid form standard usb dongle may contain sim card secure digital card inside usb dongle another popular device usb smart card reader keyboard addition standard pc usb keyboard additional slot accepting smartcard according ccid specification usb standards work group ccid exchanges information host computer usb using ccid message consists 10-byte header followed message-specific data standard defines fourteen commands host computer use send data status control information messages every command requires least one response message ccid ccid driver support natively supported windows operating system windows 2000 linux unices ccid ct-api devices usually accessed user-space drivers special kernel adaptation required | [
6179,
7380
] | Test |
18 | 3 | Psychic_World:psychic world psychic world platform game wherein player character lucía runs one stage using esp booster blast monstrous enemies obtaining item power-ups jumping various ledges platforms booster gauge often certain items abilities used health replenished power-ups weapons upgradeable merely picking item particular weapon new weapons obtained mini-bosses end-level bosses player use lucia psionic weapons strategically levels using different elements advantage ice stage rocks doused falling water frozen used stable platform lucía jump blasting rock ice shot sonic wave weapon destroy certain foreground objects blocking path taking place remote laboratory year 19xx three-staff research team consisting dr. knavik assistants twin sisters cecile lucia studying exploration usage esp one day lucia getting ready work explosion burst lab time lucia got dr. knavik right cecile disappeared dr. knavik explains part experiments involved running tests variety monsters eventually subjects rebelled took cecile lucia follows monster track dr. knavik gives esp booster device created enable user wield psychic powers psychic world master system given mixed mostly positive reviews 70 raze 69 video games game gear version received score 83 joystick | [] | Test |
19 | 4 | Cygilant:cygilant cygilant inc originally named eiq networks inc. boston-based security software-as-a-service saas company focused information security compliance objectives eiq networks ’ origins analysis log files across web servers file servers firewalls network devices moved security information event management siem market eiq networks inc. founded 2001 eiq networks ’ global headquarters boston massachusetts additional hyderabad india eiq networks closely held private company company completed first institutional round raising 10 million january 2009 led venrock company received additional 2 million september 2010 also raised 750,000 debt financing june 2012 santa monica-based arrowroot capital invested eiq networks 2014 company since experienced substantially higher growth rates driven ramp-up company inside sales organization eiq networks co-founded vijay basani jay reddy september 2017 company announced raised additional 7 million funding would rebrand cygilant inc prior founding eiq networks basani reddy co-founded webmanage technologies acquired netapp 2000 feb. 8th 2018 company mocked insulted several security researchers twitter also tweeted thanks free marketing kids howyoudomarketing later tweets deleted company apologized | [
8123
] | Validation |
20 | 5 | Geo_URI_scheme:geo uri scheme geo uri scheme uniform resource identifier uri scheme defined internet engineering task force rfc 5870 published 8 june 2010 uniform resource identifier uri geographic locations using 'geo scheme name 'geo uri identifies physical location two- three-dimensional coordinate reference system compact simple human-readable protocol-independent way current revision vcard specification supports geo uris vcard geo property geosms standard uses geo uris geotagging sms messages android based devices support geo uris although implementation based draft revision specification supports different set uri parameters query strings geo uri confused site geourl implements icbm address simple geo uri might look like two numerical values represent latitude longitude respectively separated comma coordinates horizontal grid 2d third comma-separated value present represents altitude coordinates 3d grid coordinates southern western hemispheres well altitudes coordinate reference system depths signed negative leading dash geo uri also allows optional uncertainty value separated semicolon representing uncertainty location meters described using u uri parameter geo uri uncertainty parameter looks follows geo uri may example included web page html geo uri-aware user agent web browser could launch user chosen mapping service could used atom feed xml file values coordinates make sense coordinate reference system crs specified default crs world geodetic system 1984 wgs-84 recommended use justified use crs today perhaps preserve projection large-scale maps local utm non-terrestrial coordinates moon mars syntax semantic crs parameter separated semicolon described section 8.3 rfc 5870 examples order semicolon-separated parameters occur partially significant whilst labeltext parameter future parameters may given order codice_6 codice_7 parameters must come first used codice_6 must precede codice_7 parameters case-insensitive imagining future new parameter codice_10 ignored simpler applications example exactly equivalent doubt remember use lowercase representation parameter names codice_6 codice_7 codice_10 preferred geo uri scheme semantics expressed section 3.4 rfc 5870 explicit mathematical assumptions open interpretation ~10 years publication consensual frequently used assumptions syntax geo ui defines coodinates codice_15 coord-c optional semantic coord-c wgs-84 altitude specifically ground elevation relative current geoid attached wgs84 concept extend coordinates non-default crs rfc explains ... undefined altitude may assume uri refers respective location earth physical surface however ... altitude value 0 must mistaken refer 'ground elevation words altitude defined measurement done relative geoid 5 black line image surface defined earth gravity approximating mean sea level undefined elevation assumed altitude latitude-longitude point height negative depth relative geoid i.e ground elevation point measure altitude=0 however confused undefined value refers altitude 0 meters geoid geo uri exact abstract positions strictly location estimate interpret rfc 5870 rfc 5491 approximate physical position object earth surface rfc 5870 formalize use uncertainty term clues come citations normative reference something uncertainty rfc 5491 section 5 main informative reference iso 6709:2008 use term uncertainty use terms accuracy precision uncertainty facets interpreted accordance iso 5725-1 illustrated putting together adopting clues usual statistical assumptions explicit definitions rfc obtain geo uri uncertainty mathematical properties imagining location ant colony illustrate total uncertainty sum gps error object-definition error latitude longitude gps errors need simplified disk converted meters errors inferred different model need converted gaussian model vendors android os adopted extensions geo uri scheme android adopts unconventional approach parsing points show map pin point given normally map pin show given query words show pin wikimedia foundation office one use codice_16 codice_17 | [
7148,
2281,
7168,
4415,
3383,
2043,
6381,
7214,
7494,
7765,
3827,
8039,
2261
] | Test |
21 | 4 | EICAR_test_file:eicar test file eicar anti-virus test file eicar test file computer file developed european institute computer antivirus research eicar computer antivirus research organization caro test response computer antivirus av programs instead using real malware could cause real damage test file allows people test anti-virus software without use real computer virus anti-virus programmers set eicar string verified virus similar identified signatures compliant virus scanner detecting file respond less manner found harmful virus virus scanners compliant may detect file even correctly configured neither way file detected wording flagged standardized may differ way real malware flagged prevent executing long meets strict specification set european institute computer antivirus research use eicar test string versatile straightforward detection file containing eicar test string compressed archived antivirus software run see whether detect test string compressed file many amtso feature settings checks based eicar test string developers one anti-virus software malwarebytes said add eicar test file database adding fake malware test files like eicar database takes time away malware research proves nothing long run file text file 68 128 bytes legitimate executable file called com file run ms-dos work-alikes successors os/2 windows except 64-bit due 16-bit limitations executed eicar test file print eicar-standard-antivirus-test-file stop test string written noted anti-virus researchers padgett peterson paul ducklin engineered consist ascii human-readable characters easily created using standard computer keyboard makes use self-modifying code work around technical issues constraint imposes execution test string eicar test string reads note third character capital letter digit zero string hash values including trailing newline character follows | [
622,
7807,
3031,
4843,
25,
6380,
4171,
5401,
1828
] | Validation |
22 | 7 | Hybrid_Web_Cluster:hybrid web cluster hybrid web cluster software product developed hybrid logic ltd. bristol united kingdom based company software designed provide commodity web hosting distributed fault-tolerant manner cluster either real physical servers virtual cloud computing infrastructure server instances software splits website database individual units work load generated monitored closely cluster automatically transparently transfers websites databases cluster nodes single node ever overloaded single website go load requiring dedicated web database servers within seconds one server ever live particular website database one time enabling existing applications run un-modified would commodity shared web hosting upper bound scalability system single website ever utilise two servers condition standard lamp applications run unmodified however possible scale beyond limit via use multi-master database replication requires applications store variable state information within database database live many servers web application must remain static served many nodes cluster required possible specify redundancy invariant sets number machines cluster hold copy website database default number set 2 means normal operation data held least two cluster nodes one time cluster node fails system acts automatically recover data resume web hosting within 15 seconds achieved using filesystem snapshotting capabilities zfs hybrid web cluster began beta testing september 2010 hybridcluster 2.0 released 1 may 2013 | [
2988,
7613,
632,
1634,
3091,
6262,
6806,
3627,
5571,
5927,
2212,
5135,
1757,
3028,
842,
2674,
5064,
330,
5447,
2961,
7037,
2700,
1514,
5889,
6505
] | Validation |
23 | 2 | Nokia_N77:nokia n77 nokia n77 3g smartphone nokia introduced 12 february 2007 released june 2007 runs symbian 9.1 s60 3rd edition n77 specs somewhat basic compared nseries devices time included dvb-h television tuner stated nokia press release n77 designed low-cost mobile tv accelerate dvb-h adoption sporting candybar design similar n73 company second dvb-h device n92 though smaller screen n77 thus available limited dvb-h markets hard come | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
2564,
3703,
7261,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
5068,
597,
73... | Validation |
24 | 4 | Crypto_cloud_computing:crypto cloud computing crypto cloud computing new secure cloud computing architecture cloud computing large-scale distributed computing model driven economies scale integrates set abstracted virtualized dynamically-scalable managed resources computing power storage platforms services external users access resources internet using terminals especially mobile terminals cloud architectures developed on-demand fashion resources dynamically assigned user according request relinquished job done cloud computing pool services including hardware operating system infrastructure formation systems management software system platform virtualization components according level resources cloud computing services divided three categories infrastructure service iaas platform service paas software service saas enjoying convenience cloud computing network security risks ignored customer data security relies security service cloud computing providers however current structure cloud computing services provided independent operators first user information security provides commerce management second information leakage caused technology flows providers cloud computing open environment hence weakness cause information security risks whole system cloud computing combination iaas paas saas construct secure cloud computing system security infrastructure service platforms application software levels studied secure cloud computing system information encryption one effective means achieve cloud computing information security traditionally information encryption focuses specified stages operations data encryption cloud computing system level design implemented crypto cloud computing new secure cloud computing architecture provide protection information security system level allows users access shared services conveniently accurately crypto cloud computing protects individual connections outside world protect personal privacy without delay information exchange crypto cloud computing based quantum direct key system quantum direct key qdk set advanced asymmetric offline key mechanism mechanism entities get public private key pair according id entity holds private key public key generator generate public key system entity produce public key entities offline third-party agency ca necessary crypto cloud computing based qdk avoid network traffic congestion drawbacks using current encryption system crypto cloud computing system entity encrypts data using his/her private key elements system cloud computing infrastructure units platform virtualization tools involved entities keys fulfilling functions information exchange processing elements use public key private key perform authentication first events occur cloud computing also assigned unique key way crypto cloud system guarantees security credibility information exchange current cloud computing structure developed data computing sharing security priority system contrary encryption security inherently integrated crypto cloud computing based qdk qdk authorized function units bricks crypto cloud computing besides primary function data en/decryption crypto cloud computing also provides many security related functions example channels sign transmit data using keys receiving terminals avoid hijacking verifying signature exact position security leakage identified determined analyzing digital signatures forged data based capabilities crypto-related functions provided services cloud named ‘ crypto service caas ’ crypto cloud computing advances information technology also innovation logical relationship crypto cloud computing system non-system data allowed store transmit private key offline public key play role identification certification process information exchange way cloud establishes relationship trust customer data identification depends logical relationship mutual trust need logical relationship depends cloud customer crypto cloud computing new framework cyber resource sharing protects data security privacy well cloud environment crypto cloud computing guarantees information security integrity whole procedure security management cloud computing also performed authorizing signatures every element involved user retrieve related resources using qdk key personal privacy current cloud framework pointed mark zuckerberg 'the age privacy '.however development crypto cloud computing resolve conflict services data sharing privacy security opens new prospects development information sharing technology 1 cloud computing grid computing 360-degree compared yong zhao raicu lu.s grid computing environments workshop 2008 gce '08 2 taxonomy survey cloud computing systems eunmi choi lumb i. inc ims idc 2009 ncm '09 fifth international joint conference 3 https //techcrunch.com/2012/09/26/detron-introduces-its-qdk-cryptosystem-to-enable-true-trusted-identity-for-the-cloud-era/ 4 https //web.archive.org/web/20121213091207/http //gawker.com/5597100/mark-zuckerbergs-age-of-privacy-is-over | [
2961,
330
] | Test |
25 | 4 | EICAR:eicar eicar european institute computer antivirus research founded 1991 organization aiming antivirus research improving development antivirus software recently eicar furthered scope include research malicious software malware computer viruses extended work information security topics like content security wireless lan security rfid information security awareness eicar also organizes international security conferences years well number working groups 'task forces eicar originally abbreviation european institute computer antivirus research organisation longer uses full title regards eicar self-standing name expanded broader range security work antivirus research eicar collaboration caro computer antivirus research organization developed eicar test file harmless executable string designed test integrity antivirus software | [
3506,
21,
5401,
3896,
4171
] | Validation |
26 | 8 | POCO_C++_Libraries:poco c++ libraries portable components poco c++ libraries computer software set class libraries developing computer network-centric portable applications programming language c++ libraries cover functions threads thread synchronizing file system access streams shared libraries class loading internet sockets network communications protocols http ftp smtp etc include http server xml parser sax2 dom interfaces sql database access modular efficient design implementation makes libraries well suited embedded system development libraries free open-source software distributed boost software license 1.0 poco set c++ libraries providing users library support similar found development environments like java class library .net framework apple cocoa poco centered network-centric application domains developed modern ansi/iso standard c++ c++ standard library facilities techniques emphasis powerful functionality ease use consistency governed primarily code quality consistent style unit testing poco highly portable already ported variety different platforms poco c++ libraries split five core libraries optional add-on libraries available release design hierarchy poco c++ considered well designed five core component libraries cover following areas found basic edition one design goal many targeted decisions based around poco c++ providing easy use component library works box libraries available two package formats basic complete editions complete edition covers netssl crypto zip data abilities among others basic edition thus eliminates dependence external facilities openssl odbc mysql dependencies open source enables encourages development library functions design development existing upcoming library support driven pragmatic needs user base library additions occur sandbox development environment reviewed integrated main library releases approved core development team input contributors users include | [
3168,
4759,
5369,
1349,
5206,
900,
5820,
5214,
2646,
6270,
1834,
2291,
8182,
6536,
5571,
7544,
7988,
6908,
578,
4701,
224,
1392,
7786,
417,
851,
3135,
2506,
1686,
3408,
3915,
1602,
5786,
6061,
1989,
2530,
7411,
7952,
2807
] | Validation |
27 | 2 | TI-DNOS:ti-dnos distributed network operating system dnos general purpose multitasking operating system designed operate texas instruments 990/10 990/10a 990/12 minicomputers dnos includes sophisticated file management package provides support key indexed files sequential files relative record files dnos multiterminal system capable making several users appear exclusive control system dnos supports output spooling program accessible accounting data job level task level operations enable efficient use system resources addition multiterminal applications dnos provides support advanced program development users communicate dnos entering commands terminal providing file commands system command interpreter sci processes commands directs operating system initiate action specified command text editor allows user enter source programs data system macro assembler provided assembly language programs several high level languages including fortran cobol basic rpg ii pascal supported link editor extended debugging facilities also provided variety utility programs productivity tools support access management information contained data base design specific forms screen video display terminal vdt word processing system supports wide range user environments dnos support one two terminals thus allowing user smaller system perform tasks efficiently yet inexpensively larger configurations wide variety peripherals also supported maximum configuration size varies user environment almost every minicomputer system requirement application need met dnos dnos provides base variety communications products standard protocols ibm 2780/3780 ibm 3270 communications supported local area network software supported network input/output i/o logon addition sophisticated networking software available distributed network communications system dncs distributed network i/o dnio packages dncs includes networking capabilities x.25 ibm systems network architecture sna protocols dnio provides users transparent access ti 990s running dnos used connect local wide-area networks dnos international operating system designed meet commercial requirements united states european countries japan dnos supports complete range international data terminals permit users enter view process data languages system includes error text files edited error messages easily translated languages english dnos supports features incorporate computing power larger computers upwardly compatible texas instruments operating systems dnos features include | [
3209,
5948,
5571,
2803,
336
] | Test |
28 | 7 | While_You_Were_Out_(Cloud_application):cloud application enterprise messaging content management application allows executive receive messages digital tablet device like ipad colloquially referred wywo pronounced why-woo wywo originally developed 1994 zoomer pda released palm inc. casio screen looked felt like piece paper executive accustomed used user-friendly design foreshadowed advent graphically rich applications like developed apple ios originally specified designed coded tested 256 character based paging network matured mobile device platforms wireless technology worldwide adoption internet | [
4575
] | Test |
29 | 7 | Piktochart:piktochart piktochart web-based infographic application allows users without intensive experience graphic designers easily create infographics visuals using themed templates march 2012 first iteration piktochart launched co-founders goh ai ching andrea zaggia penang malaysia end year piktochart grew user base 170,000 users received 140,000 grant malaysian government ’ cradle fund well announcing raised seed funding number investors userbase grew addition new formats reports banners presentations resulted 3 million users mid-2015 piktochart described forbes magazine infographic tool graphically challenged simply time-crunch 2018 piktochart used 11 million people worldwide grown become semi-distributed team 53 team members office based penang whereas companies like lucidchart trendalyzer gliffy others previously focused data-representation tools would useful intra-corporate collaboration aids speeches presentations creation internal communications documents piktochart described focused empowering users create infographics would web-publisher ready able stand alone piece multimedia content piktochart provides 600 templates users edit using advanced functions customize desired current version piktochart released 2017 includes html publisher allows users create visuals viewed online embedded website well allowing user include multiple interactive elements charts videos map visualization animated icons | [] | Validation |
30 | 1 | Heterogeneous_database_system:heterogeneous database system heterogeneous database system automated semi-automated system integration heterogeneous disparate database management systems present user single unified query interface heterogeneous database systems hdbs computational models software implementations provide heterogeneous database integration article contain details distributed database management systems sometimes known federated database systems different file formats access protocols query languages etc often called syntactic heterogeneity point view data different ways representing storing data table decompositions may vary column names data labels may different semantics data encoding schemes may vary i.e. measurement scale explicitly included field implied elsewhere also referred schematic heterogeneity data across constituent databases may related different perhaps database system must able integrate genomic proteomic data related—a gene may several protein products—but data different nucleotide sequences amino acid sequences hydrophilic -phobic amino acid sequence positively negatively charged amino acids may many ways looking semantically similar distinct datasets system may also required present new knowledge user relationships may inferred data according rules specified domain ontologies | [
7540,
2054
] | Test |
31 | 3 | Stop_the_Express:stop express stop express also known bousou tokkyuu sos 暴走特急sos runaway express sos japan video game created hudson soft 1983 made sharp x1 first later ported zx spectrum commodore 64 msx remade nintendo family computer challenger チャレンジャー 1985 stage 1 player runs along top express train jumping carriages avoiding enemy knives obstacles halfway along train player enters train stage 2 begins player must proceed carriages towards front train stopped upon completion level game displays engrish message congraturation sucsess game repeats stage 1 enemies enemies known redmen initially pursue rear roof train front inside throw knives player must dodge ducking jumping addition inside train player jump hang overhead straps way redmen however ghosts flit carriages making extremely dangerous stay long levels completed redmen approach front rear player two weapons disposal roof train catch birds fly overhead release run along carriage knock redmen well high kicking whilst inside high kick option stop express rated 4th best spectrum game sinclair list top 100 spectrum games 2004 remake stop express jetmans dad took second place retro remakes competition remake faithful original respects although aspects gameplay tweaked slightly player pick knives discarded redmen assist task ghosts replaced robot sentries also fire lasers higher levels nes/famicom port planned due first train level three levels added became challenger released japan | [] | Validation |
32 | 7 | Dell_Boomi:dell boomi dell boomi business unit acquired dell 2010 specializes cloud-based integration api management master data management boomi founded berwyn pennsylvania first launched services 2007 boomi founded 2000 beginning configuration-based integration boomi introduced technology allows users build deploy integration processes using visual interface drag drop technique interface remains one key elements current boomi platform 2007 boomi released technology known atomsphere industry first integration cloud atomsphere kept visual point click interface building integrations managed simple browser-based ui november 2 2010 boomi announced acquisition dell university technology sydney selected dell boomi integration-platform-as-a-service solution february 2018 dell boomi research suggested 86 decision makers believe becoming connected business would mean revenue growth organisation course twelve months | [
5940,
4295,
7795,
373,
5599,
4979,
972,
7415
] | Train |
33 | 4 | Self-destruct:self-destruct self-destruct mechanism cause object destroy predefined set circumstances occurred self-destruct mechanisms typically found devices systems malfunction could endanger large numbers people types modern land mines designed self-destruct chemically render inert period weeks months reduce likelihood friendly casualties conflict civilian casualties conflict end amended protocol ii convention certain conventional weapons ccw amended 1996 requires anti-personnel land mines deactivate self-destruct sets standards landmines currently used united states military designed self-destruct 4 hours 15 days depending upon type landmines battery battery dies landmine self-destructs self-destruct system never failed 67,000 tested landmines variety conditions self-destruct mechanisms absolutely reliable landmines laid throughout history equipped self-destruct landmines also designed self-deactivate instance battery running charge deactivation considered different mechanism self-destruction space shuttle solid rocket boosters equipped explosive charges boosters could destroyed event control lost launch populated area danger physically done detonation cords running along booster set cut open booster casing causes solid rocket fuel burn rapidly exposing large reaction surface cut-open casing also allows combustion gases escape sideways instead nozzle therefore booster longer produces significant thrust feature seen videos challenger disaster initial disintegration shuttle two solid rocket boosters continued firing exploded simultaneously 37 seconds later occurred range safety officer decided separated boosters potential endanger ground activated self-destruct system another form self-destruct system seen naval procedure scuttling used destroy ship ships prevent seized and/or reverse engineered form self-destruct system observed deep-sea oil drilling event oil well becoming disconnected oil rig dead man switch may trigger activation blowout preventer blind shear ram cuts drill pipe permanently seals well prevent oil leak self-destruct mechanisms sometimes employed prevent apparatus information used unauthorized persons event loss capture example may found high-security data storage devices e.g ironkey important data destroyed prevent compromise artworks may mechanisms destruct front many eyes watching example painting love bin banksy shredded right £1 million auction sotheby london 5 october 2018 self-destruct mechanisms frequent plot devices science fiction stories fictional universe alien universe applied military installations starships would valuable allow enemy capture artificial intelligence may invoke self-destruct due cognitive dissonance many stories mechanism causes massive destruction large area obliterating object protected device often characters limited amount time escape destruction disable mechanism creating story tension television series man u.n.c.l.e sensitive intelligence equipment shown self-destruct order prevent falling enemy hands usually self-destruct sequence lengthy complex alien requires multiple officers aboard ship individual passcodes initiate process countdown timers allow characters escape passwords 1970s 1980s movies noticeably unfit purposes major impact considering accounts even low level security modern times far complex password requirements writers era anticipate complexity level computer generated brute-force attacks security issues | [
5150,
7093,
7350
] | Validation |
34 | 2 | Angry_Birds_Seasons:angry birds seasons angry birds seasons second puzzle video game angry birds series developed rovio mobile based angry birds angry birds seasons released devices using apple ios october 2010 released platforms starting december 2010 new releases since release ragnahog december 1 2016 original angry birds players use slingshot launch assortment birds nearby structures intent hitting targets located within main targets pigs defeated directly fired strategies e.g bird hits structure falls pig defeating small sized pigs weak easily defeated bigger pigs sustain damage level pack represents different season often based upon different themes holidays different level packs unique theme sometimes much different gameplay season 2010 started october 2010 rovio released halloween edition angry birds halloween exclusive ios time separate game included levels halloween-themed music graphics december 2010 rovio released angry birds seasons ios android symbian 3 devices seasons introduced 25 christmas-themed levels one day leading holiday similar advent calendar versions include previously-exclusive halloween levels offered separate stand-alone paid applications exception free ad-supported android version angry birds halloween users ios received seasons levels free upgrade halloween version given episode title trick treat christmas episode entitled season greedings season 2011 began february 2011 rovio released valentine day update angry birds seasons entitled hogs kisses complete new themed levels graphics well option send angry birds -themed valentine day messages facebook march 2011 rovio released new st. patrick day update entitled go green get lucky followed easter update entitled easter eggs april 2011 summer update summer pignic june 2011 september 2011 mooncake festival released conjunction chinese mid-autumn festival october 2011 ham o'ween released introduced new orange bird known bubbles december 2011 wreck halls released 25 christmas-theme levels also arranged advent calendar setting season 2012 started january 2012 year dragon released chinese new year features replacement mighty eagle mighty dragon loops structures defeats pigs free use japanese cherry blossom season announced february 28 2012 release date march 7 2012 june 2012 angry birds seasons added twelfth season piglantis launched june 14 second summer based episode first episode summer pignic main new feature angry birds piglantis fluid physics birds wood glass buoyant water levels however pigs stone heavy rise surface sink defeated august 2012 back school added introduces pink bird stella october 2012 haunted hogs released 3rd halloween episode series added ghost blocks visible items except birds pigs unless inside december 1 winter wonderham released 3rd christmas episode series like christmas episodes set advent calendar introduced slippery blue ice makes wood ice stone birds pigs slip contact season 2013 began may 2013 abra-ca-bacon based world circus day released magician theme features magic portals teleport materials birds pigs one portal another december 2013 arctic eggspedition released 4th christmas episode set advent calendar one level unlocked per day unlocked in-app purchase season 3 season 2013 shortest episode seasons two episodes season 2014 began july 2014 south hamerica pig days episode weekly unlocked levels update seasons renamed showing release year season 2011 october 9 2014 game updated ham dunk celebration nba championships october 27 2014 visit finland twitter account unveiled image displaying terrance swimming pool along similar looking bird colored blue named tony blue title finn ice 5th christmas episode tweet also referred finnish band apocalyptica play theme music episode update episodes arranged year released previously winter wonderham episode seasons 2013 moved seasons 2012 episode released 2012 season 2015 rang february 2015 2nd part added ham dunk- all-star weekend 2015 expanding world 60 levels trick treat 45 update allowed player use shockwave electrical bomb free ham dunk limited time extreme end april 30th tropical world set unspecified pacific island world added commemoration rovio partnership birdlife international save birds pacific month later june 3rd ham dunk update celebrating finals added- ultimately expanding total levels ham dunk 67 update next 4 months giving rovio rest letting handle angry birds games finally october 2015 50 movie-themed world added selection titled invasion egg snatchers brought new world birdwear costumes unlocked scavenger hunt style player search levels completed certain items 3 items found 16-hour wait obtaining items 8-hour wait get new mission would receive costume allowing birds optionally wear outfits gameplay another new feature update power-up test zone lets player test power-ups infinite uses finally wrap 2015 ski squeal added usual advent calendar style taking place top frigid mountain summit season 2016 final season began february 11 2016 2 months angry birds 6th birthday valentine day episode released entitled fairy hogmother set fairytale storybook featuring magic wands trigger actions hit strangely imprisoned birds give player extra bird cage holding bird destroyed spring rolled around month later new episode released called marie hamtionette marie antoinette queen france 1700s set garden ludpig xvi louis xvi estate complete hedges topiarys across wide landscape june 27 2016 summer 2016 kicked new summer-themed world entitled summer camp hence name summer camp set mountainous forest dawn including many popular activities one would find camp including human swimming archery rock climbing many popular summer activities summer 2016 update also added new mode course gameplay pig challenge set tournament style format players compete friends players randomized set weekly levels trophies power-ups fall 2016 started piggywood studios pigs reenact famous movie scenes indiana jones king kong angry birds movie aliens back future continued halloween episode hammier things based tv series stranger things concluded christmas episode ragnahog set nordic theme 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds seasons along original angry birds angry birds rio playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respective consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals also available wii wii u part angry birds trilogy reception angry birds seasons positive tracy erickson pocket gamer said halloween update difficulty steeper original angry birds likely intentional consideration well-versed first game n't make angry birds halloween unapproachable result undesirable increase trial-and-error gameplay without experience playing original anticipate replay lot stages mentioned course structural issues n't detract remains entertaining game angry birds halloween pleasantly though 're best served playing original tackling holiday treat sarah jacobsson macworld said christmas update unlike original angry birds angry birds halloween season ’ greetings track start laughably easy level—after get one level day rovio wants make work wrote angry birds seasons brings fun christmas spirit popular ios game year included halloween track get total 69 challenging levels—definitely worth 0.99 angry birds seasons hd 1.99 abigail holden lazygamer rated game 8.5/10 saying whether ’ new angry birds 've enjoyed game platforms angry birds seasons pc worth look | [
1120,
4759
] | Test |
35 | 9 | Carl_Sassenrath:carl sassenrath carl sassenrath born 1957 california architect operating systems computer languages brought multitasking personal computers 1985 creation amiga computer operating system kernel designer rebol computer language rebol/ios collaboration environment safeworlds altme private messaging system products carl currently principal engineer roku inc. carl sassenrath born 1957 charles carolyn sassenrath california father chemical engineer involved research development related petroleum refining paper production air pollution control systems late 1960s family relocated san francisco bay area small town eureka california early childhood sassenrath actively involved electronics amateur radio photography filmmaking 13 sassenrath began working keet pbs public broadcasting television station year later became cameraman kviq american broadcasting company affiliate worked way technical director director news commercials local programming 1980 sassenrath graduated university california davis b.s eecs electrical engineering computer science studies became interested operating systems parallel processing programming languages neurophysiology teaching assistant graduate computer language courses research assistant neuroscience behavioral biology uncle dr. julius sassenrath headed educational psychology department uc davis aunt dr. ethel sassenrath one original researchers thc california national primate research center final year university sassenrath joined hewlett packard computer systems division member multi-programming executive mpe file system design group hp3000 computers task implement compiler new type control language called outqueue —a challenge language descriptive procedural year later sassenrath became member mpe-iv os kernel team later part hpe kernel group hp sassenrath became interested minimizing high complexity found operating systems time set formulate concepts microkernel-based os proposed hp found large company complacent smaller os ideas late 1981 early 1982 sassenrath took academic leave atmospheric physics research national science foundation amundsen–scott south pole station upon returning sassenrath reached agreement hp pursue independent research new areas computing including graphical user interfaces remote procedure call methods distributed computing later 1982 impressed new computing ideas published xerox parc mit media lab sassenrath formed hp project develop modern style window-based mouse-driven guis project called probus professional business workstation created prototype sun microsystems workstation borrowed andy bechtolsheim stanford university probus clearly demonstrated power graphical user interfaces system also incorporated hyperlinks early distributed computing concepts hp sassenrath involved influenced range hp language projects including ada pascal smalltalk lisp forth spl variety experimental languages 1983 carl sassenrath joined amiga computer inc. small startup company silicon valley manager operating systems asked design new operating system amiga advanced multimedia personal computer system later became commodore amiga sophisticated computer day amiga used 25 dma channels coprocessor sassenrath decided create preemptive multitasking operating system within microkernel design novel approach 1983 personal computer operating systems single tasking ms-dos 1981 macintosh 1984 amiga multitasking kernel also one first implement microkernel os methodology based real-time message passing inter-process communication core known exec executive dynamically loaded libraries devices optional modules around core design gave amiga os great extensibility flexibility within limited memory capacity computers 1980s sassenrath later noted design came necessity trying integrate rom dozens internal libraries devices including graphics sound graphical user interface floppy disc file systems others dynamic modular method also allowed hundreds additional modules added external developers years release amiga 1985 sassenrath left commodore-amiga pursue new programming language design ideas contemplating since university days 1986 sassenrath recruited apple computer advanced technology group atg invent next generation operating systems part aquarius project quad-core cpu project simulated apple cray xmp-48 intended become 3d-based successor macintosh period c++ language introduced sassenrath along many apple researchers preferred pure oo implementation smalltalk language working atg computing legends like alan kay larry tessler dan ingalls bill atkinson others provided sassenrath wealth resources knowledge helped shape views computing languages systems 1988 sassenrath left silicon valley mountains ukiah valley 2 hours north san francisco founded multimedia technology companies pantaray american multimedia videostream also implemented logo programming language amiga managed software os development cdtv one first cd-rom tv set-top boxes wrote os viscorp ed one first internet tv set-top boxes 1996 watching growth development programming languages like java perl python sassenrath decided publish ideas within world computer languages result rebol relative expression-based object language rebol intended lightweight specifically support efficient distributed computing sassenrath describes rebol balance concepts context symbolism allowing users create new relationships symbols meanings attempts merge concepts code data metadata sassenrath considers rebol experimental provides greater control context programming languages words used form different grammars different contexts called dialecting sassenrath claims rebol ultimate endpoint evolution markup language methodologies xml 1998 sassenrath founded rebol technologies company still runs company released several versions rebol produced additional products rebol/view rebol/command rebol/sdk rebol/ios sassenrath implemented rebol v3.0 released github december 12 2012 https //github.com/rebol/r3 sassenrath principal engineer roku inc. sassenrath lives ukiah california grows grapes makes wine interested amateur radio video production quantum electrodynamics boating volunteers television improvement association community organization brings free over-the-air television broadcasts ukiah area | [
3509,
5983,
3764,
4479,
5021,
1361,
3531,
304,
5571,
1015,
5948,
6380,
594,
7848,
4543,
5965,
961,
6585,
7775,
879,
360
] | Validation |
36 | 9 | Embedded_style_language:embedded style language embedded style language kind computer language whose commands appear intermixed base language languages either syntax translated base language provide api invoke behaviors language embedded domain-specific languages common examples embedded style languages rely upon translation posix threads example embedded style language uses api invoke behaviors embedded style languages invoked via api distinguished software libraries existence runtime system | [
2420
] | Test |
37 | 4 | NetStumbler:netstumbler netstumbler also known network stumbler tool windows facilitates detection wireless lans using 802.11b 802.11a 802.11g wlan standards runs microsoft windows operating systems windows 2000 windows xp trimmed-down version called ministumbler available handheld windows ce operating system program commonly used updated version developed since 2005 | [
224,
4451,
4759,
5571,
5046,
6220,
7808
] | Validation |
38 | 4 | IEC_62351:iec 62351 iec 62351 standard developed wg15 iec tc57 developed handling security tc 57 series protocols including iec 60870-5 series iec 60870-6 series iec 61850 series iec 61970 series iec 61968 series different security objectives include authentication data transfer digital signatures ensuring authenticated access prevention eavesdropping prevention playback spoofing intrusion detection | [
7876,
3078,
6795,
6172,
7626,
5573,
2944,
1484,
6208,
7567,
1118,
1774,
2877,
1421,
7953,
3680
] | Test |
39 | 3 | List_of_OpenCL_applications:list opencl applications following list contains list computer programs built take advantage opencl webcl heterogeneous compute framework collection opencl examples | [
7966
] | Test |
40 | 9 | Minification_(programming):minification programming minification also minimisation minimization process removing unnecessary characters source codes interpreted programming languages markup languages without changing functionality unnecessary characters usually include white space characters new line characters comments sometimes block delimiters used add readability code required execute minification reduces size source code making transmission network e.g internet efficient programmer culture aiming extremely minified source code purpose recreational code golf competitions minification must confused obfuscation former readily reversed using pretty-printer minification distinguished general concept data compression minified source interpreted immediately without need uncompression step interpreter work original well minified source example javascript code equivalent longer 2001 douglas crockford introduced jsmin removed comments whitespace javascript code followed yui compressor 2007 2009 google opened closure toolkit including closure compiler contained source mapping feature together firefox extension called closure inspector 2010 mihai bazon introduced uglifyjs superseded uglifyjs2 2012 rewrite allow source map support source maps allow tools display unminified code minified code optimized mapping original format created joseph schorr part closure inspector minification project updates versions 2 3 reduced size map files visual studio code comes minification support several languages readily browse visual studio marketplace download install additional minifiers javascript optimizers minify generate source maps include uglifyjs google closure compiler addition certain online tools microsoft ajax minifier yahoo yui compressor pretty diff compress css files minification html code following tools htmlcompressor htmlminifier webmarkupmin power-shell script named minifyps able shrink powershell script code well javascript code free online tool minify js uglifyjs ability combine multiple files blimptontech.com components libraries web applications websites developed optimize file requests reduce page load times shrinking size various files javascript cascading style sheet css resources may minified preserving behavior considerably reducing file size libraries available online capable minification optimization varying degrees libraries also merge multiple script files single file client download javascript source maps make code readable debuggable even combined minified | [
562,
2451,
6400,
2258,
3772,
6221
] | Test |
41 | 1 | National_Academic_Depository:national academic depository national academic depository nad digital database academic awards provided government india nad inter-operable system storage retrieval authentication verification academic awards nad allows logging academic awards addition ensuring authenticity integrity confidentiality database nad act deterrent fake forged paper certificates reduce administrative efforts eliminate need institutions preserve physical records academic institutions held responsible authenticity nad data requests access academic awards potential employers require consent recipient academic institutions include following national academic depository bill originally introduced lok sabha 5 september 2011 former human resource development minister shri kapil sibal bill referred standing committee human resource development law lapsed 2014 change government union cabinet prime minister shri narendra modi approved ministry human resource development proposal nad establishment operation 27 october 2016 serviced nsdl database management limited ndml cdsl ventures ltd. cvl – wholly owned subsidiaries depositories registered securities exchange board india sebi act 1992 fulfilment commitment made finance minister budget speech 2016-17 government designated university grants commission ugc authorized body enter tripartite agreement ndml cvl nad bill proposed make mandatory specified academic institutions log every academic award system established network facilitation centers candidates submit dematerialization requests past academic certificates applications educational institutions may become depository agents system would necessary security ensure authorized users access expenditure government side expected would charge-based service provision users represented educational institutions employers stakeholders present academic institutions authorized upload certificates nad 24 may 2019 | [] | Test |
42 | 2 | One_UI:one ui one ui software overlay developed samsung electronics android devices succeeding samsung experience touchwiz designed streamlined specific optimizations ease one-handed use smartphones large screens unveiled samsung developer conference 2018 first introduced part samsung firmware updates android 9 pie one ui designed part goal make samsung hardware software work together perfect harmony provide natural experience large-screen smartphones prominent design pattern included applications intentionally place common features user interface elements along bottom screen rather near top makes easier reach user thumb using device one-handed similar reasons apps utilise large headers push main content towards vertical centre screen navigation bar supports use gestures system-wide night mode also added gives ui elements supported applications darkened color scheme android pie upstream overview screen recent apps uses horizontal layout opposed vertical layout previous versions one ui included new android devices released samsung since beginning 2019 including galaxy s10 series galaxy 2019 series galaxy note 10 series one ui released existing samsung devices throughout 2019 part updates android 9 pie beginning galaxy s9 galaxy note 9 january 2019 galaxy s8 note 8 february 2019 galaxy note fan edition march 2019 galaxy s7 april 2019 unofficialy portage galaxy note fan edition portage various mid-range low-end models particularly galaxy galaxy j series models released since 2017 middle year selected galaxy tab models late-2019 samsung launched public beta one ui updates november 2018 | [
3933,
5372,
6427,
1095,
740,
4340,
3310,
2591,
5771,
5775,
7956,
5473,
474,
6183,
822,
136,
6209,
1582,
6937,
6232,
3751,
4116,
5195,
2003,
195,
6978,
7346,
561,
201,
2017,
5919,
7357,
5571,
2398,
578,
2037,
2756,
5232,
7007,
7749,
2417... | Test |
43 | 9 | Barbara_Liskov:barbara liskov barbara liskov born november 7 1939 barbara jane huberman american computer scientist institute professor massachusetts institute technology ford professor engineering school engineering electrical engineering computer science department one first women granted doctorate computer science united states turing award winner developed liskov substitution principle liskov born november 7 1939 los angeles california eldest jane née dickhoff moses huberman four children earned ba mathematics minor physics university california berkeley 1961 classes one female classmate rest male graduated applied graduate mathematics programs berkeley princeton time princeton accepting female students mathematics accepted berkeley instead studying moved boston began working mitre corporation became interested computers programming worked mitre one year taking programming job harvard worked language translation decided go back school applied berkeley also stanford harvard 1968 became one first women united states awarded ph.d computer science department awarded degree stanford university stanford worked john mccarthy supported work artificial intelligence topic ph.d. thesis computer program play chess endgames graduating stanford liskov returned mitre work research staff liskov led many significant projects including venus operating system small low-cost interactive timesharing system design implementation clu argus first high-level language support implementation distributed programs demonstrate technique promise pipelining thor object-oriented database system jeannette wing developed particular definition subtyping commonly known liskov substitution principle leads programming methodology group mit current research focus byzantine fault tolerance distributed computing liskov member national academy engineering national academy sciences fellow american academy arts sciences association computing machinery acm 2002 recognized one top women faculty members mit among top 50 faculty members sciences u.s 2002 discover magazine recognized liskov one 50 important women science 2004 barbara liskov john von neumann medal fundamental contributions programming languages programming methodology distributed systems 19 november 2005 barbara liskov donald e. knuth awarded eth honorary doctorates liskov knuth also featured eth zurich distinguished colloquium series 2018 awarded doctor honoris causa universidad politécnica de madrid liskov received 2008 turing award acm march 2009 work design programming languages software methodology led development object-oriented programming specifically liskov developed two programming languages clu 1970s argus 1980s acm cited contributions practical theoretical foundations programming language system design especially related data abstraction fault tolerance distributed computing 2012 inducted national inventors hall fame barbara liskov author three books one hundred technical papers 1970 married nathan liskov son moses liskov born 1975 | [
7707,
5571,
1746,
1381,
7005,
7009,
3470,
5239,
2054,
1308,
3225,
5424,
6485,
7863,
1600,
1243,
86,
360
] | Test |
44 | 5 | DHCP_snooping:dhcp snooping computer networking dhcp snooping series techniques applied improve security dhcp infrastructure dhcp servers allocating ip addresses clients lan dhcp snooping configured lan switches prevent malicious malformed dhcp traffic rogue dhcp servers addition information hosts successfully completed dhcp transaction accrued database bindings may used security accounting features features may use dhcp snooping database information ensure ip integrity layer 2 switched domain information enables network | [
5058,
3172,
2119,
6633,
5492,
3797
] | Validation |
45 | 9 | FMSLogo:fmslogo fmslogo free implementation computing environment called logo educational interpreter language gui extensions developed george mills mit core ucblogo brian harvey free software source available written borland c++ wxwidgets fmslogo supports multiple turtles 3d graphics fmslogo allows input com ports lpt ports fmslogo also supports windows interface thus i/o available gui- keyboard mouse events trigger interrupts simple gif animations may also produced gifsave command jim muller wrote great logo adventure complete logo manual using mswlogo demonstration language fmslogo evolved mswlogo educational programming environment free open source implementation logo programming language microsoft windows released gpl mainly developed maintained david costanzo fmslogo following support various functionality | [
4609,
4759,
5571,
897,
6955,
4837,
4588
] | Test |
46 | 5 | IceWarp_Mail_Server:icewarp mail server icewarp mail server business email collaboration server developed icewarp ltd features email custom domain shared calendars documents editing messaging advanced tool team collaboration run cloud local server using either windows linux together another solution hybrid deployment 2006 known merak mail server incorporates groupware capabilities syncml protocol well smtp imap pop protocols integrated modules including groupware antispam antivirus | [
333,
3555,
7154,
8034,
4759,
5571,
6908,
578,
293,
1950,
3135
] | Test |
47 | 8 | Texts_From_Last_Night:texts last night texts last night tfln regularly updated blog re-posts short text messages submitted users site tends post texts shocking scandalous texts sent people wake morning find regrettable messages sent mobile phones receiver sends allegedly discovered text website copies messages show phone numbers area codes since texts often similar late night drunk dials 're often graphic sexual nature thus safe work sociological perspective website living document twentysomething life 2009 tfln many blackout drinking sex vomit stories also extended discussion taking place morality texts show humans interact drugs alcohol see cause effect last night ’ party see real-time weighing actions however concern peoples actions texts affected existence website popularity six months website went two creators tfln signed deal pen book wherein use entertaining texts book published gotham books part penguin group erin malone william morris endeavor also helped blogs translate books including stuff white people like book awesome soul pancake since content already written book described bathroom reading expected published trade paperback beginning 2010 deadline hollywood reported october 2011 new comedy television series based blog development fox ugly betty developer silvio horta helm texts last night also mobile applications android blackberry iphone browse submit text messages | [
1544,
6788,
518
] | Test |
48 | 3 | Metcalfe's_law:metcalfe law metcalfe law states effect telecommunications network proportional square number connected users system n first formulated form george gilder 1993 attributed robert metcalfe regard ethernet metcalfe law originally presented c. 1980 terms users rather compatible communicating devices example fax machines telephones etc. later globalization internet law carry users networks original intent describe ethernet purchases connections metcalfe law characterizes many network effects communication technologies networks internet social networking world wide web former chairman u.s. federal communications commission reed hundt said law gives understanding workings internet metcalfe law related fact number unique possible connections network formula_1 nodes expressed mathematically triangular number formula_2 asymptotically proportional formula_3 law often illustrated using example fax machines single fax machine useless value every fax machine increases total number fax machines network total number people user may send receive documents increases likewise social networks greater number users service valuable service becomes community addition difficulty quantifying value network mathematical justification metcalfe law measures potential number contacts i.e. technological side network however social utility network depends upon number nodes contact language barriers reasons large parts network contact parts effect may smaller metcalfe ’ law assumes value node n equal benefit case example one fax machines serves 50 workers company second fax machine serves half third one third relative value additional connection decreases likewise social networks users join later use network less early adopters benefit additional user may lessen making overall network less efficient costs per users fixed within context social networks many including metcalfe proposed modified models value network grows n log n rather n reed odlyzko sought possible relationships metcalfe law terms describing relationship network one read related tongia wilson also examine related question costs excluded despite many arguments metcalfe law real data based evidence available 30 years july 2013 dutch researchers managed analyze european internet usage patterns long enough time found n proportionality small values n n log n proportionality large values n months later metcalfe provided proof used facebook data past 10 years show good fit metcalfe law model n 2015 zhang liu xu extend metcalfe results utilizing data tencent china largest social network company facebook work showed metcalfe law held despite difference audience two sites facebook serving worldwide audience tencent serving chinese users metcalfe functions two sites given paper formula_4 formula_5 respectively 2018 peterson applied metcalfe law cryptocurrency bitcoin showed metcalfe law determined 70 bitcoin value yet unpublished work peterson provided mathematical derivation linked traditional time-value-of-money concepts metcalfe value used bitcoin facebook numerical examples proof | [
4654,
1592,
4049,
4051,
5832,
6948,
553,
1238,
4899,
84,
107,
403,
744
] | Test |
49 | 8 | HubSpot:hubspot hubspot developer marketer software products inbound marketing sales founded brian halligan dharmesh shah 2006 products services aim provide tools social media marketing content management web analytics search engine optimization hubspot founded brian halligan dharmesh shah massachusetts institute technology mit 2006 company grew 255,000 revenues 2007 15.6 million 2010 later year hubspot acquired oneforty twitter app store founded laura fitton company also introduced new software personalizing websites visitor according forbes hubspot started targeting small companies moved steadily upmarket serve larger businesses 1000 employees hubspot filed initial public offering securities exchange commission august 25 2014 requesting listed new york stock exchange ticker symbol hubs july 2017 hubspot acquired kemvi applies artificial intelligence machine learning help sales teams hubspot provides tools social media marketing content management web analytics landing pages customer support search engine optimization hubspot integration features salesforce.com sugarcrm netsuite microsoft dynamics crm others also third-party services templates extensions additionally hubspot offers consulting services online resource academy learning inbound marketing tactics also hosts user group conferences inbound marketing certification programs hubspot promotes inbound marketing concepts marketing called prolific creator content blogs social media webinars white papers 2010 article harvard business review said hubspot effective inbound marketing feature free online tools one tool marketing grader assessed scored website performance company introduced twitter tracking feature 2011 2018 hubspot integrated taboola dashboard global pay-per-click native ad network company launched hubspot crm free 2014 crm product tracks manages interactions company customers prospects enables companies forecast revenue measure sales team productivity report revenue sources software service product free integrates gmail g suite microsoft office windows software hubspot described unique strives provide customers all-in-one approach 2012 review crm search said hubspot best business solution category taken whole best marketing solution combined many tools one package identified hubspot strengths sophistication call action cta tool online ecosystem ease use weakness described breadth depth review said lack customization design tools could limiting missing advanced features business process management bpm tools manage workflow hubspot hosts annual marketing conference hubspot users partners called inbound conference typically located boston 2018 largest conferences event history record 24,000 attendees july 2015 hubspot cmo mike volpe dismissed violating hubspot ’ code business conduct found tried obtain draft copy book written former employee daniel lyons according article boston globe records obtained freedom information act indicated hubspot executives considered book financial threat hubspot volpe used tactics email hacking extortion attempt prevent book published april 2016 book published lyons wrote new york times hubspot frat house atmosphere also called company digital sweatshop workers little job security later month hubspot founders gave official response book addressed several lyons claims boston business journal named hubspot best place work 2012 2015 company named best large company work massachusetts boston globe 2017 hubspot named 7th cnbc one best places work 2018 | [
6024,
7037,
4759,
4600,
330
] | Test |
50 | 9 | Tom_Knight_(scientist):tom knight scientist tom knight american synthetic biologist computer engineer formerly senior research scientist mit computer science artificial intelligence laboratory part mit school engineering works synthetic biology company ginkgo bioworks cofounded 2008 tom knight arrived mit fourteen even though started undergraduate studies regular age 18 took classes computer programming organic chemistry high school lived close university built early hardware arpanet interfaces host 6 network first bitmapped displays time sharing system lisp machines also instrumental releasing version operating system lisp machine bsd license connection machine parallel symbolic processing computer systems 1967 knight wrote original kernel operating system well combination command processor debugger used top-level user interface dominant operating system first project mac later mit artificial intelligence laboratory mit laboratory computer science ran pdp-6 later pdp-10 computers 1968 knight designed supervised construction first pdp-10 arpanet interfaces bob metcalfe 1972 knight designed one first semiconductor memory-based bitmap displays later commercialized led directly development bedford computer systems newspaper layout system influenced many bitmapped display devices available today year along jeff rubin knight designed implemented network file system provided first transparent remote file access arpanet 1974 knight designed implemented prototype version mit lisp machine processor production version following 1976 lisp machine microprogrammed machine tuned high-performance emulation instruction sets design lisp machine directly implemented symbolics lmi basis computers texas instruments implemented surface mount single-chip versions architecture 1983 1987 respectively knight collaborated jack holloway designing implementing chaosnet re-engineered version xerox 3 mbit/s ethernet 1975 network became first local area network mit campus chaosnet innovation preamble bit string packets eventually incorporated 10 mbit/s ethernet standard 1980 knight participated development connection machine architecture original implementation notable diverse accomplishments 1980s included creation first silicon retina 1981 creation single-chip optical mouse design cross-omega interconnection network architecture design transit multiprocessor interconnection architecture early 1990s knight involved formation permabit exa corporation architecture latter initial version fx/1 lattice gas parallel fluid flow computer advances included using over-relaxation techniques make 10x algorithmic improvements lattice gas computations landmark cfd accuracies correction misconceptions origin fluid turbulence simple two-dimensional flow situations within laboratory computer science led abacus simd project worked vlsi microdisplays made advances field adiabatic reversible computing also period knight interests biological systems began inspired part work harold j. morowitz yale physicist biologist knight studied biochemistry genetics cellular biology set biology lab within mit ai laboratory lab created concept biobrick plasmid dna part began creating library biobricks could used simplify genetic engineering escherichia coli cells today biobricks form basis enormous annual igem international genetically engineered machine competition knight sometimes referred godfather synthetic biology knight co-founded ginkgo bioworks synthetic biology company | [
785,
685
] | Train |
51 | 4 | Kraken_botnet:kraken botnet kraken botnet network hacking spyware program attacks microsoft windows apple macintosh systems email world wide web sites social networking sites world largest botnet researchers say kraken infected machines least 50 fortune 500 companies grew 400,000 bots estimated send 9 billion spam messages per day kraken botnet malware may designed evade anti-virus software employed techniques stymie conventional anti-virus software | [
2173,
2632,
4759,
2376,
1632,
6715,
7441,
3281,
651,
7186,
2577,
5401,
6740,
6370,
5675,
7657,
7294,
2693,
2789,
7307,
3154,
84,
7600,
2535,
4110,
6328
] | Test |
52 | 8 | 8chan:8chan 8chan also called infinitechan infinitychan stylized ∞chan imageboard website composed user-created message boards owner moderates board zero interaction site administration unaffiliated imageboard 4chan site linked harmful activism particular alt-right well multiple mass shootings site also known presence child pornography result filtered google search several site boards played active role gamergate controversy encouraging gamergate affiliates frequent 8chan 4chan banned topic 8chan 3,832nd visited site world received average 35,000 unique visitors per day 400,000 posts per week aftermath back-to-back mass shootings august 3 august 4 2019 el paso texas dayton ohio respectively site taken clearnet august 5 2019 network infrastructure provider cloudflare stopped providing content delivery network service voxility web services company renting servers epik site new cdn provider brand bitmitigate also terminated service shortly el paso shooting four-page message justifying attack posted 8chan police stated reasonably confident posted perpetrator 8chan created october 2013 computer programmer fredrick brennan better known alias hotwheels brennan created website observed perceived rapidly escalating surveillance loss free speech internet brennan considers imageboard 4chan grown authoritarianism describes 8chan free-speech-friendly alternative originally conceptualized site experiencing psychedelic mushrooms trip experience programming knowledge necessary users create boards since early march 2014 faq stated one rule globally enforced post request link content illegal united states america create boards sole purpose posting spreading content brennan claimed finds content posted users reprehensible feels personally obligated uphold site integrity tolerating discussion necessarily support regardless moral stance brennan agreed partner 8chan japanese message board 2channel subsequently relocated philippines october 2014 january 2015 site changed domain 8chan.co 8ch.net multiple people filed reports complaining 8chan registrar message board hosted child pornography despite subsequently regaining domain site remained 8ch.net old domain redirecting numerous bugs infinity software led funding development successor platform dubbed infinity next several-month-long testing period migration new software attempted december 2015 failed january 2016 development halted main developer joshua moon fired brennan brennan officially resigned july 2016 turning site owner jim watkins son ron cited failure infinity next project disillusionment 8chan become reasons following three shootings 2019 christchurch new zealand march poway california april el paso texas august perpetrators used 8chan platform spread manifesto increased pressure providing 8chan internet services terminate support matthew prince ceo cloudflare initially defended firm technological support 8chan august 3 2019 day el paso shooting happened el paso today abhorrent every possible way ugly hate association us … us question worse evil however next day august 4 increasing press attention cloudflare changed position rescinded support 8chan effective midnight august 5 pacific time potentially leaving site open denial service attacks prince stated unfortunately action take today wo n't fix hate online ... almost certainly even remove 8chan internet right thing cloudflare blog wrote 8chan among 19 million internet properties use cloudflare service sent notice terminating 8chan customer effective midnight tonight pacific time rationale simple proven lawless lawlessness caused multiple tragic deaths even 8chan may violated letter law refusing moderate hate-filled community created environment revels violating spirit brennan creator 8chan ceased owner 2015 ceased working website 2018 stated august 4 2019 8chan shut subsequently thanked cloudflare decision pull 8chan support tucows also terminated support 8chan domain name registrar effectively making site difficult access wake cloudflare tucows changes 8chan switched domain register bitmitigate division epik provider previously serviced right-wing sites like gab daily stormer 8chan moved epik company ceo rob monster wrote freedom speech expression fundamental rights free society enter slippery slope start limit speech makes us uncomfortable however voxility company provided bitmitigate epik servers internet connectivity took steps stop leasing servers bitmitigate taking site offline stating intended use servers violated acceptable use policy monster changed decision provide content hosting 8chan soon company removal voxility although ars technica noted company begun providing 8chan dns services reported august 6 2019 united states house committee homeland security called owner watkins american living philippines testify website efforts tackle proliferation extremist content including white supremacist content numerous controversies related content posted 8chan arisen extent participation individuals companies website cause controversy february 25 2019 thq nordic hosted ama ask anything thread video games board website /v/ later apologized september 18 2014 8chan became entangled gamergate controversy 4chan banned discussion gamergate whereupon 8chan became one several hubs gamergate activity 8chan initial gamergate-oriented board also gained attention compromised members internet troll group gay nigger association america forcing gamergate activists migrate /gamergate/ replacement quickly became site second-most accessed board january 2015 site used base swatting exploits portland seattle burnaby british columbia tied victims criticism gamergate 8chan association attacks coordinated board website called /baphomet/ one victims swatting attack said singled followed someone twitter february 9 2015 contents /baphomet/ subboard wiped personal information katherine forrest presiding judge silk road case posted 2019 post threatening mass shooting bethel park high school posted 8chan result 18-year-old individual arrested charged one count terroristic threats one count retaliation witness victim boards created discuss topics child rape sharing illegal content site rules daily dot wrote boards exist share sexualized images minors provocative poses users boards post links explicit child pornography hosted elsewhere asked whether boards inevitable result free speech brennan responded unfortunately yes ’ support content boards mentioned simply cost free speech active site impose 'laws passed washington d.c. august 2015 8chan blacklisted google search google described content constituting suspected child abuse content july 2016 u.s. presidential candidate donald trump tweeted image hillary clinton background money six-pointed star seen resembling star david containing message corrupt candidate ever image posted 8chan /pol/ board early june 22 week trump team tweeted 2018 user referred q gained attention promoted conspiracy theories deep state eventually leading international movement sean hannity retweeted qanon hashtags twitter feed original group q followers reddit banned march 14 2018 promotion theory quickly regrouped new subreddit featured posts q anonymous posters 8chan reader-friendly format subreddit banned second time september 12 2018 flood new users board q asked ron upgrade website servers order accommodate board website traffic september 19 2018 movement linked pizzagate conspiracy theory q movement also linked hashtags thegreatawakening wwg1wga stands go one go also sometimes linked phrase follow white rabbit september 2018 louisiana state police scrutinized using hoax list personal information supposed antifascist antifa activists originally posted 8chan politics board document dubbed full list antifa.docx police officers actually contained names several thousand people signed online petitions president donald trump state police refused disclose list claiming would compromise ongoing criminal investigations expects arrests lawsuit louisiana state police filed behalf record requester harvard lecturer former public defender thomas frampton alleging police refusal release list indicates actually believed credibility hoax list used investigatons litigations perpetrators christchurch mosque shootings poway synagogue shooting el paso shooting 2019 used 8chan spread manifesto result increased pressure providing 8chan internet services terminate support led services companies withdrawal providing cdn domain registry taking website clearnet prior shootings al noor mosque linwood islamic centre christchurch new zealand march 15 2019 australia-born terrorist brenton harrison tarrant posted links 17-minute facebook live video first attack al noor mosque white nationalist neo-fascist manifesto great replacement named french far-right theory name writer renaud camus detailing anti-islamic anti-immigration reasons attack shootings ensued left 51 dead 50 injured shooter shared links live stream video minutes attack 8chan facebook members 8chan re-shared applauded violent murders march 20 2019 australian telecom companies telstra optus vodafone denied millions australians access websites 4chan 8chan zero hedge liveleak reaction christchurch mosque shootings john t. earnest alleged perpetrator poway synagogue shooting chabad poway poway california april 27 2019 escondido mosque fire islamic center escondido escondido california march 25 2019 posted links open letter attempted livestream 8chan earnest also named place radicalization according 8chan twitter shooter post removed nine minutes creation patrick crusius allen texas alleged perpetrator 2019 el paso shooting walmart store el paso texas august 3 2019 posted four-page white nationalist manifesto inconvenient truth 8chan less hour shooting began 8chan moderators quickly removed original post though users continued circulate links manifesto | [
6025,
7232,
7493,
5808,
5746,
3851,
6424,
518
] | Test |
53 | 1 | Microsoft_Analysis_Services:microsoft analysis services microsoft sql server analysis services ssas online analytical processing olap data mining tool microsoft sql server ssas used tool organizations analyze make sense information possibly spread across multiple databases disparate tables files microsoft included number services sql server related business intelligence data warehousing services include integration services reporting services analysis services analysis services includes group olap data mining capabilities comes two flavors multidimensional tabular 1996 microsoft began foray olap server business acquiring olap software technology canada-based panorama software two years later 1998 microsoft released olap services part sql server 7 olap services supported molap rolap holap architectures used ole db olap client access api mdx query language could work client-server mode offline mode local cube files 2000 microsoft released analysis services 2000 renamed olap services due inclusion data mining services analysis services 2000 considered evolutionary release since built architecture olap services therefore backward compatible major improvements included flexibility dimension design support parent child dimensions changing dimensions virtual dimensions another feature greatly enhanced calculation engine support unary operators custom rollups cell calculations features dimension security distinct count connectivity http session cubes grouping levels many others 2005 microsoft released next generation olap data mining technology analysis services 2005 maintained backward compatibility api level although applications written ole db olap mdx continued work architecture product completely different major change came model form udm unified dimensional model key events history microsoft analysis services cover period starting 1996 microsoft analysis services takes neutral position molap vs. rolap arguments among olap products allows flavors molap rolap holap used within model microsoft analysis services supports different sets apis object models different operations different programming environments microsoft analysis services supports following query languages ddl analysis services xml based supports commands create alter delete process data mining models import export also supports pmml | [
1526,
4759,
7619,
7621,
7715,
2283,
4936,
7971,
8183,
8085,
2840,
1371,
7080,
5571,
8094,
4697,
5747,
5234,
3303,
930,
4431,
941,
422,
425,
519,
1684,
5252,
5694,
2341,
2702,
7687,
2530,
4017,
1435,
2085
] | Test |
54 | 8 | AppJet:appjet appjet website let users create web-based applications client web browser client software appjet founded 3 mit graduates 2 engineers google starting appjet launched initial public beta december 12 2007 allowing anyone create web app appjet received funding combinator summer 2007 project closed 1 july 2009 focus attention etherpad product appjet acquired google december 4 2009 undisclosed amount jgate cloud-based service beta free jan 2011 allows appjet applications run august 14 2008 appjet released programming tutorial aimed absolute beginners tutorial used appjet ide provide programming sandbox examples allowing readers experiment sample code one first online tutorials embed ide exposing complete server-side web app framework inline text appjet also refers server-side javascript framework powers appjet applications example recent trend web development run javascript client server allowing developers code entire web apps one language instead using separate language server-side client-side scripting virtual machine powers appjet apps based java virtual machine using rhino javascript implementation scala libraries also used appjet often updated bug-fixes improvements features major update site graphical change implemented july 10 2008 update also added feature comment users apps comments messages apps left url comments.appname.appjet.net another update occurred may 2 2008 update lets apps hosted custom domains | [
183,
2451,
4755,
5983,
1445,
6701,
103,
6172,
3092,
5998,
6428,
7347,
6095,
2740,
3368,
2658,
5575,
486,
6191,
313,
7734,
3543,
3719,
2040,
6368,
6029,
933,
237,
417,
3398,
2870,
6660,
422,
4535,
340,
3663,
5172,
5965,
6400,
7687,
6061,... | Test |
55 | 6 | Synkron:synkron synkron open-source multiplatform utility designed file synchronization two folders supporting synchs across computers written c++ uses qt4 libraries synkron distributed terms gpl v2 apart carrying synchronisations synkron provides features user interface synkron divided several sections synchronise multisync syncview scheduler restore blacklist filters user switch sections using toolbar multisync supports synching multiple folders one folder synkron available portable app installed software repositories major kde linux distributions | [
5571,
4759,
578
] | Validation |
56 | 2 | Demand_paging:demand paging computer operating systems demand paging opposed anticipatory paging method virtual memory management system uses demand paging operating system copies disk page physical memory attempt made access page already memory i.e page fault occurs follows process begins execution none pages physical memory many page faults occur process working set pages located physical memory example lazy loading technique demand paging follows pages brought memory executing process demands often referred lazy evaluation pages demanded process swapped secondary storage main memory contrast pure swapping memory process swapped secondary storage main memory process startup commonly achieve process page table implementation used page table maps logical memory physical memory page table uses bitwise operator mark page valid invalid valid page one currently resides main memory invalid page one currently resides secondary memory process tries access page following steps generally followed demand paging opposed loading pages immediately | [
1616,
705,
3599,
1251,
4573,
3351,
2633,
3515,
8066,
5911,
379,
2736,
1363,
2294,
391,
572,
2118,
6360,
5842,
1855,
1019,
1208,
1575,
4347,
8111,
5765,
3566,
4810,
6472,
858,
4631,
5784,
3751,
4920
] | Validation |
57 | 4 | Session_hijacking:session hijacking computer science session hijacking sometimes also known cookie hijacking exploitation valid computer session—sometimes also called session key —to gain unauthorized access information services computer system particular used refer theft magic cookie used authenticate user remote server particular relevance web developers http cookies used maintain session many web sites easily stolen attacker using intermediary computer access saved cookies victim computer see http cookie theft successfully stealing appropriate session cookies adversary might use pass cookie technique perform session hijacking popular method using source-routed ip packets allows attacker point b network participate conversation c encouraging ip packets pass b machine source-routing turned attacker use blind hijacking whereby guesses responses two machines thus attacker send command never see response however common command would set password allowing access elsewhere net attacker also inline c using sniffing program watch conversation known man-in-the-middle attack http protocol versions 0.8 0.9 lacked cookies features necessary session hijacking version 0.9beta mosaic netscape released october 13 1994 supported cookies early versions http 1.0 security weaknesses relating session hijacking difficult exploit due vagaries early http 1.0 servers browsers http 1.0 designated fallback http 1.1 since early 2000s—and http 1.0 servers essentially http 1.1 servers session hijacking problem evolved nearly permanent security risk introduction supercookies features modernized http 1.1 allowed hijacking problem become ongoing security problem webserver browser state machine standardization contributed ongoing security problem four main methods used perpetrate session hijack successfully acquiring appropriate session cookies adversary might leverage pass cookie technique perform session hijacking october 2010 mozilla firefox extension called firesheep released made easy session hijackers attack users unencrypted public wi-fi websites like facebook twitter user adds preferences allow firesheep user easily access private information cookies threaten public wi-fi user personal property months later facebook twitter responded offering later requiring http secure throughout app named whatsapp sniffer made available google play may 2012 able display messages whatsapp users connected network app user time whatsapp used xmpp infrastructure encryption plain-text communication droidsheep simple android tool web session hijacking sidejacking listens http packets sent via wireless 802.11 network connection extracts session id packets order reuse droidsheep capture sessions using libpcap library supports open unencrypted networks wep encrypted networks wpa/wpa2 encrypted networks psk software uses libpcap arpspoof apk made available google play taken google cookiecadger graphical java app automates sidejacking replay http requests help identify information leakage applications use unencrypted get requests cross-platform open-source utility based wireshark suite monitor wired ethernet insecure wi-fi load packet capture file offline analysis cookie cadger used highlight weaknesses youth team sharing sites shutterfly used ayso soccer league teamsnap methods prevent session hijacking include | [
7148,
4396,
3192,
2566,
3795,
4064,
7194,
588,
5151,
7925,
7300,
4545,
2620,
4208,
3426
] | Train |
58 | 2 | Damn_Vulnerable_Linux:damn vulnerable linux damn vulnerable linux dvl discontinued linux distribution geared toward computer security students functioned tool observing studying vulnerabilities linux kernel popular user space software available live dvd could run virtual machine within host operating system dvl created thorsten schneider founder teutohack laboratory bielefeld university use training system university lectures dvl slax-based distribution uses slackware .tgz package management system uses outdated versions various software deliberately make vulnerable operating system ever dvl distributed live cd allowing booted directly distribution medium without installation pc within virtual machine | [
3932,
5200,
1629,
3444,
788,
7251,
6984,
474,
4496,
7075,
5571,
6725,
1941,
578,
314,
5232,
2758,
1663,
2864,
3559,
6209,
6761,
2063,
343,
4824,
5523,
7587,
5259,
1893,
5530,
5704,
6317,
3751,
7954,
6244,
1805
] | Validation |
59 | 4 | WS-Security_based_products_and_services:ws-security based products services ws-security flexible feature-rich extension soap apply security web services member ws-* family web service specifications published oasis closely related ws-security ws-trust also ws-* specification oasis standard provides extensions ws-security following ws-security based products services | [
2489,
6986,
5874,
3498,
4770,
5692
] | Validation |
60 | 4 | Hardware_backdoor:hardware backdoor hardware backdoors backdoors hardware code inside hardware firmware computer chips backdoors may directly implemented hardware trojans integrated circuit hardware backdoors intended undermine security smartcards cryptoprocessors unless investment made anti-backdoor design methods also considered car hacking hardware backdoors considered highly problematic skorobogatov developed technique capable detecting malicious insertions chips new york university tandon school engineering researchers developed way corroborate chip operation using verifiable computing whereby manufactured sale chips contain embedded verification module proves chip calculations correct associated external module validates embedded verification module another technique developed researchers university college london ucl relies distributing trust multiple identical chips disjoint supply chains assuming least one chips remains honest security device preserved | [
8103,
74,
1052,
3767,
5440,
5509,
7627
] | Test |
61 | 9 | WinWrap_Basic:winwrap basic winwrap basic wwb polar engineering inc. third-party macro language based visual basic used programmes various types vendor touts alternative activex e.g vbscript jscript perlscript rexx-based wsh engines others visual basic applications vsta purpose wwb software package used conjunction microsoft development tools including visual studio visual studio.net activex scripting engines default file extension programmes written language .wwb wwb 10 windows scripting host functionality i.e contains scripting engine similar default third-party language implementations wsh engine able access .net framework component object model current version 10.01 available different combinations os platform time four types wwb wwb.net .net object model used visual studio.net 2005 2008 vista .wwb-com com object model visual studio visual studio.net earlier versions used windows 32 64-bit operating systems windows 95 windows vista two packages windows ce pocketpc windows mobile earlier versions wwb ran windows 3.1 ostensibly os/2 warp 3 well wwb integrated many software packages including categories pc server software e.g earlier versions host explorer uses two proprietary scripting languages hummingbird quickscript hummingbird basic well software used run various types equipment like mass spectrometers lab equipment | [
5367,
1255,
12,
2463,
6891,
8183,
4139,
5651,
2925,
6991,
7448,
5926,
5129,
5137,
5234,
2941,
3303,
1304,
422,
6394,
4003,
7864,
1789,
5877,
4012,
4745,
1064
] | Test |
62 | 4 | Tufin:tufin tufin security policy management company specializing automation security policy changes across hybrid platforms improving security compliance tufin orchestration suite supports next-generation firewalls network layer firewalls routers network switches load balancers web proxies private public cloud platforms microservices tufin founded ruvi kitov reuven harrison formerly check point 2005 sales support offices north america europe asia-pacific company global headquarters tel aviv israel june 2017 company announced opening united states headquarters boston massachusetts company works 400 channel partners throughout world serves 2,000 customers every industry including finance telecom energy utilities healthcare retail education government manufacturing transportation auditing prior 2019 initial public offering tufin privately funded reports continuous growth since establishment tufin develops markets tufin orchestration suite consists keep changing needs customers company releases updates tufin orchestration suite quarter 2018 tufin launched tufin orca security automation containers microservices cloud-based solution enables users extend tufin policy-based approach secure containers microservices tufin recently launched tufin iris security policy management public clouds tufin iris helps cloud operation security teams regain visibility control security policies technology built make network security manageable large organizations company technology analyzes maps network topology security policies automates configuration changes enforces global security policy ensures continuous compliance across virtual physical hybrid networks suite designed large enterprises well managed security service providers mssp security auditors tufin products help security teams implement maintain security policy firewalls routers network switches accelerate service delivery network change automation expedite process compliance audits security standards pci dss nerc sarbanes oxley tufin products also help companies manage automate daily configuration changes network security devices tufin orchestration suite vendor agnostic providing integrations network ticketing security vendors well rest apis suite easily scales demands enterprise tufin innovation includes several technologies automatic policy generator refines security rules based network traffic methods automating security policy management concept managing network security policies application scope tufin core technology protected multiple us patents network security vendors provide operations management auditing change automation tufin products tufin technology partners include check point cisco fortinet juniper networks mcafee palo alto networks stonesoft f5 networks vmware openstack amazon web services aws microsoft azure bmc servicenow puppet labs others | [
496,
2961,
4295,
1788,
5064,
3338,
8100,
3637,
6043
] | Validation |
63 | 3 | California_Games:california games california games 1987 epyx sports video game originally released apple ii commodore 64 ported home computers video game consoles branching popular summer games winter games series game consists collection outdoor sports purportedly popular california game successful epyx spawned sequel events available vary slightly depending platform include following several members development team moved projects chuck sommerville designer half-pipe game california games later developed game chip challenge ken nicholson designer footbag game inventor technology used microsoft directx kevin norman designer bmx game went found educational science software company norman globus makers electrowiz series products sound design original version california games done chris grigg member band negativland originally written apple ii commodore 64 eventually ported amiga apple ii atari 2600 atari st ms-dos genesis amstrad cpc zx spectrum nintendo entertainment system msx master system atari lynx version pack-in game system launched 1989 300,000 copies sold first nine months california games most-successful epyx game outselling four previous two subsequent titles company games series ceo david shannon morse stated first epyx game appeal equally boys girls playtesting computer gaming world recommended game calling fun compute called california games inventive charming game reviewed 1988 dragon 129 hartley patricia kirk lesser role computers column reviewers gave game 4½ 5 stars capsule review start clayton walnum said california games n't bad package especially since comes free lynx found bmx surfing events great fun deemed skateboarding event frustrating said foot-bag event pleasant quickly wears thin game followed 1990 california games ii sequel failed match original success recently game released mobile phones java format current rights holders system 3 ceo mark cale stated game available future retail product on-line product sony playstation 3 nintendo wii nintendo ds commodore 64 version released wii virtual console service europe april 11 2008 north america july 6 2009 | [
6290,
5827,
6380,
3421,
6939,
2934,
6713,
2085
] | Validation |
64 | 2 | Data_General_AOS:data general aos aos name family operating systems data general 16-bit eclipse c minicomputers followed aos/vs aos/rt32 1980 later aos/vs ii 1988 32-bit eclipse mv line aos/vs exploited 8-ring protection architecture eclipse mv hardware ring 7 least privileged ring 0 privileged aos/vs kernel ran ring 0 used ring-1 addresses data structures related virtual address translations ring 2 unused reserved future use kernel agent performed much system call validation aos/vs kernel well i/o buffering many compatibility functions ran ring 3 process ring 4 used various d.g products infos ii dbms rings 5 6 reserved use user programs rarely used except large software mv/ux inner-ring emulator oracle used ring 5 user programs ran ring 7 aos software far advanced competing pdp-11 operating systems 16-bit aos applications ran natively aos/vs aos/vs ii 32-bit eclipse mv line aos/vs advanced operating system/virtual storage commonly used dg software product included command-line interpreter cli allowing complex scripting dump/load custom components 16-bit version cli famous including easter egg taken directly colossal cave adventure game user typing command xyzzy would get back response cli nothing happens 32-bit version cli became available aos/vs ii command instead reported twice much happens modified version system v.2 unix called mv/ux hosted aos/vs also available modified version system v unix called dg/ux made eclipse mv line later 88k x86 aviion machines aos aos/vs kernels written entirely assembly language almost aos aos/vs utilities included operating system releases written variants pl/i programming language initially aos/vs utilities closely tracked aos source development aos/vs matured many dg-supplied utilities rewritten take advantage 32-bit address space reduce dependencies assembly language often resulting substantial increases functionality performance reliability compared aos ancestors | [
1522,
7213,
6206,
5571,
352,
3541,
5932,
336
] | Test |
65 | 2 | Harmony_OS:harmony os harmony os styled harmonyos upcoming open source microkernel-based distributed operating system similar qnx google fuchsia developed huawei unveiled 9 august 2019 platform designed primarily internet things iot devices prior unveiling originally speculated mobile operating system could replace android future huawei devices response financial sanctions imposed huawei united states government may 2019 july 2019 huawei executives describing harmony industrial embedded operating system designed iot hardware discarding previous statements mobile operating system reports surrounding in-house operating system developed huawei date back far 2012 intensified may 2019 huawei subjected export restrictions united states government violations united states sanctions iran huawei executive richard yu described in-house platform plan b case prevented using android future smartphone products media outlets reported os referred hongmeng os could released china either august september 2019 worldwide release second quarter 2020 24 may 2019 huawei registered hongmeng os trademark china day huawei registered trademarks surrounding ark os variants european union intellectual property office july 2019 reported huawei also registered trademarks surrounding word harmony desktop mobile operating system software indicating either different name component os name hongmeng came chinese mythology symbolizes primordial chaos world creation july 2019 huawei chairman liang hua stated os intended industrial use huawei decided yet hongmeng os developed smartphone operating system future preferring continued use android devices building upon statement huawei senior vice president catherine chen stated embedded operating system designed internet things iot hardware 9 august 2019 huawei officially unveiled harmony os inaugural developers conference dongguan huawei described harmony open source microkernel-based distributed operating system various types hardware faster inter-process communication qnx google fuchsia microkernel real-time resource allocation ark compiler used port android apk packages os huawei stated developers would able flexibly deploy harmony os software across various device categories company focused primarily iot devices including smart displays wearable devices in-car entertainment systems explicitly position harmony os mobile os huawei stated harmony os would initially used devices targeting chinese market company subsidiary brand honor unveiled honor vision line smart tvs first consumer electronics devices run harmony os | [
1807,
4297,
4670,
5021,
13,
3271,
3276,
3626,
5041,
7546,
7550,
740,
7189,
405,
1855,
4347,
65,
4733,
5783,
6853,
5088,
6500,
785,
2266,
788,
3682,
1522,
7605,
7611,
4759,
7242,
4397,
6892,
5116,
2300,
5486,
126,
6907,
4786,
4423,
6197,... | Test |
66 | 5 | TCP/IP_Illustrated:tcp/ip illustrated tcp/ip illustrated name series 3 books written w. richard stevens unlike traditional books explain rfc specifications stevens goes great detail using actual network traces describe protocol hence 'illustrated title first book series volume 1 protocols cited hundreds technical papers acm journals brief introduction tcp/ip stevens takes bottom-up approach describing protocol link layer working protocol stack second edition published 11/15/2011 500 illustrations combined 15,000 lines actual code 4.4bsd-lite release serves concrete examples concepts covered volume 1 volume goes detail four topics volume 2 examples 4.4bsd-lite used | [
5941,
2612,
414,
2281,
6976
] | Test |
67 | 3 | Comparison_of_ARMv7-A_cores:comparison armv7-a cores table comparing microarchitectures implement armv7-a means application instruction set architecture mandatory optional extensions last aarch32 | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
446,
451,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
3747,
2711,
1995,
550,
4847,
3786,
568,
2024,
5576,
4879,
7376,
5585,
4166,
4537,
950... | Validation |
68 | 9 | Magma_(computer_algebra_system):magma computer algebra system magma computer algebra system designed solve problems algebra number theory geometry combinatorics named algebraic structure magma runs unix-like operating systems well windows magma produced distributed computational algebra group within school mathematics statistics university sydney late 2006 book discovering mathematics magma published springer volume 19 algorithms computations mathematics series magma system used extensively within pure mathematics computational algebra group maintain list publications cite magma 2010 2600 citations mostly pure mathematics also including papers areas diverse economics geophysics predecessor magma system named cayley 1982–1993 arthur cayley magma officially released august 1993 version 1.0 version 2.0 magma released june 1996 subsequent versions 2.x released approximately per year 2013 computational algebra group finalized agreement simons foundation whereby simons foundation underwrite costs providing magma u.s. non-profit non-governmental scientific research educational institutions students researchers faculty associated participating institution able access magma free institution | [
4067,
3410,
3915,
4759,
5571,
5117
] | Test |
69 | 4 | Troy_Hunt:troy hunt troy hunt australian web security expert known public education outreach security topics created pwned data breach search website allows non-technical users see personal information compromised also authored several popular security-related courses pluralsight regularly presents keynotes workshops security topics also creator asafaweb tool performs automated security analysis asp.net websites starting 2011 hunt named microsoft valuable professional mvp developer security recognized microsoft mvp year 2011 also named microsoft regional director 2016 part work administering pwned hibp website hunt frequently involved publication data breaches often cited journalists data breach expert june 2018 hibp contains 5 billion compromised user accounts governments australia united kingdom spain use service monitor official domains popular services 1password eve online okta kogan integrated hibp account verification process hibp included gizmodo october 2018 list 100 websites shaped internet know august 2015 following ashley madison data breach hunt received many emails ashley madison members asking help criticized company poor job informing userbase february 2016 children toy maker vtech suffered major data breach months earlier updated terms service absolve wrongdoing event future breaches hunt added data vtech breach databases pwned published blog post harshly criticizing vtech new policy calling grossly negligent later removed vtech breach database citing two people besides access data wishing reduce chance spread february 2017 hunt published details vulnerabilities internet-connected children toy cloudpets allowed access 820,000 user records well 2.2 million audio files belonging users november 2017 hunt testified united states house committee energy commerce impact data breaches also november 2017 hunt joined report uri project launched 2015 scott helme allows real time monitoring csp hpkp violations website bringing funding expertise project hunt known efforts security education computer professionals created several dozen courses pluralsight online education training website computer creative professionals one primary course authors pluralsight ethical hacking path collection courses designed certified ethical hacker certification additionally hunt works education speaking technology conferences running workshops primary workshop titled hack first aims teach software developers little security background defend applications looking attacker perspective | [
860,
2789,
5438,
7106,
3897,
1513,
7050
] | Validation |
70 | 2 | Mongoose_OS:mongoose os mongoose os internet things iot firmware development framework available apache license version 2.0 supports low power connected microcontrollers esp32 esp8266 ti cc3200 ti cc3220 stm32 stm32l4 stm32f4 stm32f7 series purpose complete environment prototyping development managing connected devices designed reduce time costs associated iot projects developped cesanta software ltd. company based dublin ireland dual licensed mongoose os open source dual-licensed | [
2451
] | Test |
71 | 3 | Terminus_(1986_video_game):terminus 1986 video game terminus also known terminus prison planet video game mastertronic released 1986 zx spectrum msx amstrad cpc game set inside futuristic prison consisting 512 screens purpose release brain leader teenage gang called wanglers player controls one four characters mobod xann move flying spex moves around bouncing magno uses reverse gravity cling roofs feature used 2010 windows os x game vvvvvv player change characters using one transports hidden around prison must unlock sections prison using teleports game player must also avoid traps include lava pools needle beams creatures compressor rooms activated touching wall sensors well numerous guards energy restored using recharge units located around prison complex | [] | Test |
72 | 7 | Globus_Alliance:globus alliance globus alliance international association founded university chicago argonne national laboratory dedicated developing fundamental technologies needed build grid computing infrastructures globus alliance officially established september 2003 globus project established 1995 grid persistent environment enables software applications integrate instruments displays computational information resources managed diverse organizations widespread locations grids currently use many research institutions used study subjects cosmology high energy physics globus alliance implements standards developed open grid forum ogf open source globus toolkit grid middleware component provides standard platform services build upon grid computing also needs components tools operate support grid environment | [
4159,
1004,
7428,
1923,
1431,
7930,
5666,
110,
5539
] | Test |
73 | 4 | Download.com:download.com download.com internet download directory website launched 1996 part cnet originally domain download.com became download.com.com download.cnet.com domain download.com attracted least 113 million visitors annually 2008 according compete.com study offered content available four major categories software including windows mac mobile music games videos offered download via ftp download.com servers third-party servers videos streams present music free mp3 downloads occasionally rights-managed wmas streams replaced last.fm software section includes 100,000 freeware shareware try-first downloads downloads often rated reviewed editors contain summary file software publisher registered users may also write reviews rate product software publishers permitted distribute titles via cnet upload.com site free fee structure offers enhancements cnet uses spigot inc monetize traffic download.com according sean murphy general manager cnet spigot continues great partner download.com sharing desire balance customer experience revenue august 2011 download.com introduced installation manager called cnet techtracker delivering many software titles catalog installer included trojans bloatware toolbars cnet admitted download faq small number security publishers flagged installer adware potentially unwanted application december 2011 gordon lyon writing pseudonym fyodor wrote strong dislike installation manager bundled software post popular social networks reported dozen media main problem confusion content offered download.com software offered original authors accusations included deception well copyright trademark violation 2014 register us-cert warned via download.com foistware attacker may able download execute arbitrary code 2015 research emsisoft suggested free download providers bundled downloads potentially unwanted software download.com worst offender study done how-to geek 2015 revealed download.com packaging malware inside installers test done virtual machine testers downloaded top 10 apps contained crapware/malware one example kmplayer installer installed rogue antivirus named 'pro pc cleaner attempted execute codice_1 downloads specifically ytd completely blocked avast another study done how-to geek 2015 revealed download.com installing fake ssl certificates inside installers similar lenovo superfish certificate fake certificates completely compromise ssl encryption allow man-in-the-middle attacks however july 2016 how-to geek discovered download.com longer included adware/malware downloads installer program discontinued | [
6795,
716,
3089,
6895,
385,
6992,
3123,
3042,
5601,
4725,
518,
4456,
2891,
3249,
4379
] | Validation |
74 | 4 | Backdoor_(computing):backdoor computing backdoor method often secret bypassing normal authentication encryption computer system product embedded device e.g home router embodiment e.g part cryptosystem algorithm chipset homunculus computer —a tiny computer-within-a-computer found intel amt technology backdoors often used securing remote access computer obtaining access plaintext cryptographic systems backdoor may used gain access passwords delete data hard drives transfer information within cloud backdoor may take form hidden part program separate program e.g back orifice may subvert system rootkit code firmware hardware parts operating system windows trojan horses used create vulnerabilities device trojan horse may appear entirely legitimate program executed triggers activity may install backdoor although secretly installed backdoors deliberate widely known kinds backdoors legitimate uses providing manufacturer way restore user passwords many systems store information within cloud fail create accurate security measures many systems connected within cloud hackers gain access platforms vulnerable system default passwords default credentials function backdoors changed user debugging features also act backdoors removed release version 1993 united states government attempted deploy encryption system clipper chip explicit backdoor law enforcement national security access chip unsuccessful threat backdoors surfaced multiuser networked operating systems became widely adopted petersen turn discussed computer subversion paper published proceedings 1967 afips conference noted class active infiltration attacks use trapdoor entry points system bypass security facilities permit direct access data use word trapdoor clearly coincides recent definitions backdoor however since advent public key cryptography term trapdoor acquired different meaning see trapdoor function thus term backdoor preferred term trapdoor went use generally security breaches discussed length rand corporation task force report published arpa sponsorship j.p. anderson d.j edwards 1970 backdoor login system might take form hard coded user password combination gives access system example sort backdoor used plot device 1983 film wargames architect wopr computer system inserted hardcoded password gave user access system undocumented parts system particular video game-like simulation mode direct interaction artificial intelligence although number backdoors systems using proprietary software software whose source code publicly available widely credited nevertheless frequently exposed programmers even succeeded secretly installing large amounts benign code easter eggs programs although cases may involve official forbearance actual permission countermeasure backdoors open-source software source code examined potential backdoors usually harder ″hide″ backdoor combined reproducible builds one also sure provided binary corresponds publicly available source code number cloak dagger considerations come play apportioning responsibility covert backdoors sometimes masquerade inadvertent defects bugs reasons plausible deniability cases might begin life actual bug inadvertent error discovered deliberately left unfixed undisclosed whether rogue employee personal advantage c-level executive awareness oversight also possible entirely above-board corporation technology base covertly untraceably tainted external agents hackers though level sophistication thought exist mainly level nation state actors example photomask obtained photomask supplier differs gates photomask specification chip manufacturer would hard-pressed detect otherwise functionally silent covert rootkit running photomask etching equipment could enact discrepancy unbeknown photomask manufacturer either means one backdoor potentially leads another hypothetical scenario essentially silicon version undetectable compiler backdoor discussed general terms long dependency-chains modern highly specialized technological economy innumerable human-elements process control-points make difficult conclusively pinpoint responsibility time covert backdoor becomes unveiled even direct admissions responsibility must scrutinized carefully confessing party beholden powerful interests many computer worms sobig mydoom install backdoor affected computer generally pc broadband running microsoft windows microsoft outlook backdoors appear installed spammers send junk e-mail infected machines others sony/bmg rootkit placed secretly millions music cds late 2005 intended drm measures—and case data-gathering agents since surreptitious programs installed routinely contacted central servers sophisticated attempt plant backdoor linux kernel exposed november 2003 added small subtle code change subverting revision control system case two-line change appeared check root access permissions caller sys_wait4 function used assignment codice_1 instead equality checking codice_2 actually granted permissions system difference easily overlooked could even interpreted accidental typographical error rather intentional attack january 2014 backdoor discovered certain samsung android products like galaxy devices samsung proprietary android versions fitted backdoor provides remote access data stored device particular samsung android software charge handling communications modem using samsung ipc protocol implements class requests known remote file server rfs commands allows backdoor operator perform via modem remote i/o operations device hard disk storage modem running samsung proprietary android software likely offers over-the-air remote control could used issue rfs commands thus access file system device harder detect backdoors involve modifying object code rather source code – object code much harder inspect designed machine-readable human-readable backdoors inserted either directly on-disk object code inserted point compilation assembly linking loading – latter case backdoor never appears disk memory object code backdoors difficult detect inspection object code easily detected simply checking changes differences notably length checksum cases detected analyzed disassembling object code object code backdoors removed assuming source code available simply recompiling source thus backdoors avoid detection extant copies binary must subverted validation checksums must also compromised source must unavailable prevent recompilation alternatively tools length checks diff checksumming disassemblers compromised conceal backdoor example detecting subverted binary checksummed returning expected value actual value conceal subversions tools must also conceal changes – example subverted checksummer must also detect checksumming subverted tools return false values leads extensive changes system tools needed conceal single change object code regenerated recompiling reassembling relinking original source code making persistent object code backdoor without modifying source code requires subverting compiler – detects compiling program attack inserts backdoor – alternatively assembler linker loader requires subverting compiler turn fixed recompiling compiler removing backdoor insertion code defense turn subverted putting source meta-backdoor compiler detects compiling inserts meta-backdoor generator together original backdoor generator original program attack done source meta-backdoor removed compiler recompiled original source compromised compiler executable backdoor bootstrapped attack dates popularized thompson 1984 article entitled reflections trusting trust hence colloquially known trusting trust attack see compiler backdoors details analogous attacks target lower levels system operating system inserted system booting process also mentioned exist form boot sector viruses traditional backdoor symmetric backdoor anyone finds backdoor turn use notion asymmetric backdoor introduced adam young moti yung proceedings advances cryptology crypto '96 asymmetric backdoor used attacker plants even full implementation backdoor becomes public e.g. via publishing discovered disclosed reverse engineering etc. also computationally intractable detect presence asymmetric backdoor black-box queries class attacks termed kleptography carried software hardware example smartcards combination two theory asymmetric backdoors part larger field called cryptovirology notably nsa inserted kleptographic backdoor dual_ec_drbg standard exists experimental asymmetric backdoor rsa key generation openssl rsa backdoor designed young yung utilizes twisted pair elliptic curves made available sophisticated form black box backdoor compiler backdoor compiler subverted insert backdoor program login program modified detect compiling inserts backdoor insertion code targeting program code-modifying self-compilation like mechanism retroviruses infect host done modifying source code resulting compromised compiler object code compile original unmodified source code insert exploit boot-strapped attack originally presented united states air force security analysis multics described attack pl/i compiler call compiler trap door also mention variant system initialization code modified insert backdoor booting complex poorly understood call initialization trapdoor known boot sector virus attack actually implemented popularized ken thompson turing award acceptance speech 1983 published 1984 reflections trusting trust points trust relative software one truly trust code every step bootstrapping inspected backdoor mechanism based fact people review source human-written code compiled machine code object code program called compiler used create second first compiler usually trusted honest job thompson paper describes modified version unix c compiler would compiler compiled program users would extremely unlikely notice machine code instructions performed tasks second task compiler source code would appear clean worse thompson proof concept implementation subverted compiler also subverted analysis program disassembler anyone examined binaries usual way would actually see real code running something else instead updated analysis original exploit given historical overview survey literature given thompson version officially never released wild believed however version distributed bbn least one use backdoor recorded scattered anecdotal reports backdoors subsequent years attack recently august 2009 discovered sophos labs w32/induc-a virus infected program compiler delphi windows programming language virus introduced code compilation new delphi programs allowing infect propagate many systems without knowledge software programmer attack propagates building trojan horse especially hard discover believed induc-a virus propagating least year discovered system compromised backdoor trojan horse trusting trust compiler hard rightful user regain control system – typically one rebuild clean system transfer data executables however several practical weaknesses trusting trust scheme suggested example sufficiently motivated user could painstakingly review machine code untrusted compiler using mentioned ways hide trojan horse subverting disassembler ways counter defense writing disassembler scratch generic method counter trusting trust attacks called diverse double-compiling ddc method requires different compiler source code compiler-under-test source compiled compilers results two different stage-1 compilers however behavior thus source compiled stage-1 compilers must result two identical stage-2 compilers formal proof given latter comparison guarantees purported source code executable compiler-under-test correspond assumptions method applied author verify c compiler gcc suite v. 3.0.4 contained trojan using icc v. 11.0 different compiler practice verifications done end users except extreme circumstances intrusion detection analysis due rarity sophisticated attacks programs typically distributed binary form removing backdoors including compiler backdoors typically done simply rebuilding clean system however sophisticated verifications interest operating system vendors ensure distributing compromised system high-security settings attacks realistic concern | [
2173,
3932,
6788,
7151,
6078,
6417,
6419,
1461,
2566,
3287,
1435,
7186,
2577,
5401,
6823,
7189,
753,
5066,
60,
3323,
1500,
1505,
3680,
3681,
449,
4025,
6508,
6515,
4759,
1168,
2996,
2644,
6526,
1544,
3698,
5125,
5485,
2310,
2667,
5848,
... | Train |
75 | 4 | Memory_bound_function:memory bound function memory bound refers situation time complete given computational problem decided primarily amount memory required hold data application memory bound functions could prove valuable preventing spam become problem epidemic proportions internet memory bound functions memory functions related involve extensive memory access distinction exists two memory functions use dynamic programming technique called memoization order relieve inefficiency recursion might occur based simple idea calculating storing solutions subproblems solutions reused later without recalculating subproblems best known example takes advantage memoization algorithm computes fibonacci numbers following pseudocode illustrates algorithm uses memoization runs linear cpu time compare algorithm uses recursion runs exponential cpu time recursive algorithm simpler elegant algorithm uses memoization latter significantly lower time complexity former term memory bound function surfaced recently used principally describe function uses xor consists series computations computation depends previous computation whereas memory functions long important actor improving time complexity memory bound functions seen far fewer applications recently however scientists proposed method using memory bound functions means discourage spammers abusing resources could major breakthrough area 1992 ibm research scientists cynthia dwork moni naor published paper titled pricing via processing combating junk mail suggesting possibility using cpu bound functions deter abusers sending spam scheme based idea computer users much likely abuse resource cost abusing resource negligible underlying reason spam become rampant sending e-mail minuscule cost spammers dwork naor proposed spamming might reduced injecting additional cost form expensive cpu computation cpu bound functions would consume cpu resources sender machine message thus preventing huge amounts spam sent short period basic scheme protects abuses follows let sender recipient e-mail agreed beforehand receive e-mail transmitted usual way otherwise computes function sends checks receives form yes accepts otherwise rejects figure right depicts cases prior agreements function selected verification relatively fast taking millisecond computation somewhat slow involving least several seconds therefore discouraged sending multiple recipients prior agreements cost terms time computing resources computing repeatedly become prohibitive spammer intends send many millions e-mails major problem using scheme fast cpus compute much faster slow cpus higher-end computer systems also sophisticated pipelines advantageous features facilitate computations result spammer state-of-the-art system hardly affected deterrence typical user mediocre system adversely affected computation takes seconds new pc may take minute old pc several minutes pda might nuisance users old pcs probably unacceptable users pdas disparity client cpu speed constitutes one prominent roadblocks widespread adoption scheme based cpu bound function therefore researchers concerned finding functions computer systems evaluate speed high-end systems might evaluate functions somewhat faster low-end systems 2-10 times faster 10-100 faster cpu disparities might imply ratios “ egalitarian enough intended applications functions effective discouraging abuses add prohibitive delay legitimate interactions across wide range systems new egalitarian approach rely memory bound functions stated memory bound function function whose computation time dominated time spent accessing memory memory bound function accesses locations large region memory unpredictable way way using caches effective recent years speed cpu grown drastically comparatively small progress developing faster main memory since ratios memory latencies machines built last five years typically greater two almost always less four memory bound function egalitarian systems foreseeable future | [
1679,
6299,
5104
] | Test |
76 | 2 | Nokia_X2-00:nokia x2-00 nokia x2-00 first low budget phone xseries line nokia single sim phone announced april 2010 released 3 months later july 2010 runs series 40 comes many pre-installed games also supports messaging data connections phone 240 x 320 256k tft display screen 2.20 inches ~28.7 screen body ratio weighs 81.00gm comes rear camera 5mp 2592 x 1944 px also video recording qvga 320 x 240px data connection gprs edge device also supports bluetooth usb connections lacks infrared wi-fi gps ram 64mb rom 128mb supports expandable memory 16gb microsd 860mah bl-4c removable battery supports standby 624 hours talk time 13h 30min sar eu 0.82 w/kg head slim stylish feature phone comes 2 colors red black blue silver phone good multimedia features supports midp1.0 java phone successfully play mp3 wmv nrt nokia ringing tone wma eaac+ audios also mp4 h.263 videos inbuilt antennae gives clarity fm radio also rds stereo left side seek play/pause buttons used control music/video/radio photo editor software phone also adds effects photos 8 games nokia x2-00 bounce tales city bloxx diamond rush sudoku snake iii brain champion block 'd rally 3d device supports networking via gprs edge also maximum download speed 0.236 mbit/s | [
1066,
5979,
2271,
6517,
372,
1724,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
472,
5909,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
7545,
5044,
5493,
1202,
5315,
3029,
5499,
7012,
139,
6465,
5062,
3039,
3653,
1582,
4894,
5068,
597,
739... | Train |
77 | 7 | Bullhorn,_Inc.:bullhorn inc. bullhorn cloud computing company headquartered boston massachusetts company provides customer relationship management crm applicant tracking system ats operations software staffing industry 2018 company reported 8,000 customers 150 countries besides boston headquarters company operations st. louis london brighton vancouver sydney rotterdam bullhorn founded 1999 roger colvin barry hinckley art papas papas continues serve ceo company originally launched platform freelancers find collaborate work 2001 changed focus build crm software vertical markets company historically focused providing software-as-a-service third-party staffing recruiting firms allowing manage business operations single web-based platform became one largest providers technology staffing recruiting market reportedly growing revenue 2 million 2004 20 million 2009 33.6 million 2011 67 million 2013 bullhorn raised first round venture capital funding 1999 4 million investment ge asset management internet.com raised 26 million general catalyst partners highland capital partners 2008 june 2012 vista equity partners acquired bullhorn reported price several hundred million dollars july 2015 industry research firm gartner included bullhorn first time magic quadrant report salesforce automation alongside companies deems leaders providing tools support automation sales account management activities processes january 2016 company reported momentum press release would exceed nine figures annual revenue first time history vista ownership company quadrupled revenue focusing serving staffing recruiting industry acquiring several companies including maxhire solutions sendouts code works easy software solutions makers timesheasy april 2016 bullhorn moved boston headquarters ft. point district downtown crossing june 2017 engage conference bullhorn announced new suite software healthcare staffing firms september 2017 bullhorn international acquired connexys leading provider recruitment solutions mainland europe supercharge expansion mainland europe october 2017 insight venture partners acquired bullhorn vista company also announced cloud-based middle office strategy provide enterprise recruiting companies front-to-back solution november 2017 bullhorn acquired peoplenet leading provider cloud-based workforce management solutions company also announced official closing insight venture partners ’ acquisition bullhorn included investment genstar capital march 2018 bullhorn acquired talent rover jobscience two leading providers recruitment software built salesforce platform | [
2961
] | Test |
78 | 4 | Panorama9:panorama9 panorama9 cloud-based service within enterprise network management company sells hosted dashboard monitoring everything network ensuring servers pc peripherals external internet related services running furthermore panorama9 offers set reports inventory hardware software users founded 2010 serial entrepreneurs allan thorvaldsen diego ’ ambra also founded msp softcom solutions aps 1996 softscan 2003 end 2009 softscan achieved 12.000 customers softscan later year sold symantec panorama9 provides cloud-based remote monitoring management rmm remote_monitoring_and_management tool made possible downloading simple agent pcs servers need monitored throughout network november 2011 interactive network map introduced making possible administrators real-time chart network granular level may 2012 zendesk panorama9 announced partnership strengthening offering zendesk panorama9 integrations extended include autotask desk.com computicate psa warrantymaster glue team viewer nagios microsoft ad azure ad microsoft rdp saml etc wich integrate panorama9 way around 2014 msp control panel developed allowing msp create multiple clients apply templates easily manage multiple clients one dashboard api released contines maintained 2017 mobile app released allowing msp well internal departments monitor manage infrastructure go company founded copenhagen incorporated us headquarter san francisco california sales development team remains copenhagen | [
8123
] | Test |
79 | 5 | TCP_acceleration:tcp acceleration tcp acceleration name series techniques achieving better throughput network connection standard tcp achieves without modifying end applications alternative supplement tcp tuning commonly used approaches include checksum offloading tcp segmentation reassembly offloading dma offloading ack pacing tcp transparent proxies two middleboxes tcp offload engines tcp transparent proxies involve breaking long end-to-end control loops several smaller control loops intercepting relaying tcp connections within network adopting procedure allow tcp flows shorter reaction time packet losses may occur within network thus guarantees higher throughput idea tcp accelerator terminate tcp connections inside network processor relay data second connection toward end system data packets originate sender buffered accelerator node responsible performing local retransmissions event packet loss thus case losses feedback loop sender receiver shortened one acceleration node receiver guarantees faster delivery data receiver since tcp rate-adaptive protocol rate tcp sender injects packets network directly proportional prevailing load condition within network well processing capacity receiver prevalent conditions within network judged sender basis acknowledgments received acceleration node splits feedback loop sender receiver thus guarantees shorter round trip time rtt per packet shorter rtt beneficial ensures quicker response time changes network faster adaptation sender combat changes disadvantages method include fact tcp session directed accelerator means routing changes accelerator longer path connection broken also destroys end-to-end property tcp ack mechanism ack received sender packet stored accelerator delivered receiver tcp proxies require devices deployed parties communication protocol running proxies usually proprietary asymmetric tcp acceleration able boost network performance unilateral deployment i.e. one end peers required deploy device software asymmetric tcp acceleration implies wan-side protocol tcp 5-tuples states implementations typically terminate tcp flows lan side like tcp proxies wan side however mirror tcp state machines establish forward tcp flows peers accelerate usually run compatible version tcp performance improvements wan side improvements fast tcp zeta-tcp etc. focused tcp congestion avoidance algorithm also attempt promote performance aspects protocol instance zeta-tcp provides accurate loss detection heuristic download acceleration addition congestion avoidance algorithm compared symmetric tcp proxies asymmetric tcp acceleration flexible kinds deployment scenarios typical setup deploy asymmetric acceleration device server side accessing clients without install extra software benefit performance-wise without compression factors asymmetric tcp acceleration capable offering level improvement symmetric ones however symmetric deployment proxies able perform data compression caching operations boost performance factor compression ratio drawback compression/caching though added latency burst receiver side | [
7054,
2111,
7637,
3338,
6286
] | Train |
80 | 8 | Web_crawler:web crawler web crawler sometimes called spider spiderbot often shortened crawler internet bot systematically browses world wide web typically purpose web indexing web spidering web search engines sites use web crawling spidering software update web content indices others sites web content web crawlers copy pages processing search engine indexes downloaded pages users search efficiently crawlers consume resources visited systems often visit sites without approval issues schedule load politeness come play large collections pages accessed mechanisms exist public sites wishing crawled make known crawling agent example including robots.txt file request bots index parts website nothing number internet pages extremely large even largest crawlers fall short making complete index reason search engines struggled give relevant search results early years world wide web 2000 today relevant results given almost instantly crawlers validate hyperlinks html code also used web scraping see also data-driven programming web crawler also known spider ant automatic indexer foaf software context web scutter web crawler starts list urls visit called seeds crawler visits urls identifies hyperlinks pages adds list urls visit called crawl frontier urls frontier recursively visited according set policies crawler performing archiving websites copies saves information goes archives usually stored way viewed read navigated live web preserved ‘ snapshots archive known repository designed store manage collection web pages repository stores html pages pages stored distinct files repository similar system stores data like modern day database difference repository need functionality offered database system repository stores recent version web page retrieved crawler large volume implies crawler download limited number web pages within given time needs prioritize downloads high rate change imply pages might already updated even deleted number possible urls crawled generated server-side software also made difficult web crawlers avoid retrieving duplicate content endless combinations http get url-based parameters exist small selection actually return unique content example simple online photo gallery may offer three options users specified http get parameters url exist four ways sort images three choices thumbnail size two file formats option disable user-provided content set content accessed 48 different urls may linked site mathematical combination creates problem crawlers must sort endless combinations relatively minor scripted changes order retrieve unique content edwards et al noted given bandwidth conducting crawls neither infinite free becoming essential crawl web scalable efficient way reasonable measure quality freshness maintained crawler must carefully choose step pages visit next behavior web crawler outcome combination policies given current size web even large search engines cover portion publicly available part 2009 study showed even large-scale search engines index 40-70 indexable web previous study steve lawrence lee giles showed search engine indexed 16 web 1999 crawler always downloads fraction web pages highly desirable downloaded fraction contain relevant pages random sample web requires metric importance prioritizing web pages importance page function intrinsic quality popularity terms links visits even url latter case vertical search engines restricted single top-level domain search engines restricted fixed web site designing good selection policy added difficulty must work partial information complete set web pages known crawling junghoo cho et al made first study policies crawling scheduling data set 180,000-pages crawl stanford.edu domain crawling simulation done different strategies ordering metrics tested breadth-first backlink count partial pagerank calculations one conclusions crawler wants download pages high pagerank early crawling process partial pagerank strategy better followed breadth-first backlink-count however results single domain cho also wrote ph.d. dissertation stanford web crawling najork wiener performed actual crawl 328 million pages using breadth-first ordering found breadth-first crawl captures pages high pagerank early crawl compare strategy strategies explanation given authors result important pages many links numerous hosts links found early regardless host page crawl originates abiteboul designed crawling strategy based algorithm called opic on-line page importance computation opic page given initial sum cash distributed equally among pages points similar pagerank computation faster done one step opic-driven crawler downloads first pages crawling frontier higher amounts cash experiments carried 100,000-pages synthetic graph power-law distribution in-links however comparison strategies experiments real web boldi et al used simulation subsets web 40 million pages .it domain 100 million pages webbase crawl testing breadth-first depth-first random ordering omniscient strategy comparison based well pagerank computed partial crawl approximates true pagerank value surprisingly visits accumulate pagerank quickly notably breadth-first omniscient visit provide poor progressive approximations baeza-yates et al used simulation two subsets web 3 million pages .gr .cl domain testing several crawling strategies showed opic strategy strategy uses length per-site queues better breadth-first crawling also effective use previous crawl available guide current one daneshpajouh et al designed community based algorithm discovering good seeds method crawls web pages high pagerank different communities less iteration comparison crawl starting random seeds one extract good seed previously-crawled-web graph using new method using seeds new crawl effective crawler may want seek html pages avoid mime types order request html resources crawler may make http head request determine web resource mime type requesting entire resource get request avoid making numerous head requests crawler may examine url request resource url ends certain characters .html .htm .asp .aspx .php .jsp .jspx slash strategy may cause numerous html web resources unintentionally skipped crawlers may also avoid requesting resources dynamically produced order avoid spider traps may cause crawler download infinite number urls web site strategy unreliable site uses url rewriting simplify urls crawlers usually perform type url normalization order avoid crawling resource term url normalization also called url canonicalization refers process modifying standardizing url consistent manner several types normalization may performed including conversion urls lowercase removal .. segments adding trailing slashes non-empty path component crawlers intend download/upload many resources possible particular web site path-ascending crawler introduced would ascend every path url intends crawl example given seed url nowiki http //llama.org/hamster/monkey/page.html /nowiki attempt crawl /hamster/monkey/ /hamster/ cothey found path-ascending crawler effective finding isolated resources resources inbound link would found regular crawling importance page crawler also expressed function similarity page given query web crawlers attempt download pages similar called focused crawler topical crawlers concepts topical focused crawling first introduced filippo menczer soumen chakrabarti et al main problem focused crawling context web crawler would like able predict similarity text given page query actually downloading page possible predictor anchor text links approach taken pinkerton first web crawler early days web diligenti et al propose using complete content pages already visited infer similarity driving query pages visited yet performance focused crawling depends mostly richness links specific topic searched focused crawling usually relies general web search engine providing starting points example focused crawlers academic crawlers crawls free-access academic related documents citeseerxbot crawler citeseer search engine academic search engines google scholar microsoft academic search etc academic papers published pdf formats kind crawler particularly interested crawling pdf postscript files microsoft word including zipped formats general open source crawlers heritrix must customized filter mime types middleware used extract documents import focused crawl database repository identifying whether documents academic challenging add significant overhead crawling process performed post crawling process using machine learning regular expression algorithms academic documents usually obtained home pages faculties students publication page research institutes academic documents takes small fraction entire web pages good seed selection important boosting efficiencies web crawlers academic crawlers may download plain text html files contains metadata academic papers titles papers abstracts increases overall number papers significant fraction may provide free pdf downloads another type focused crawlers semantic focused crawler makes use domain ontologies represent topical maps link web pages relevant ontological concepts selection categorization purposes addition ontologies automatically updated crawling process dong et al introduced ontology-learning-based crawler using support vector machine update content ontological concepts crawling web pages web dynamic nature crawling fraction web take weeks months time web crawler finished crawl many events could happened including creations updates deletions search engine point view cost associated detecting event thus outdated copy resource most-used cost functions freshness age freshness binary measure indicates whether local copy accurate freshness page p repository time defined age measure indicates outdated local copy age page p repository time defined coffman et al worked definition objective web crawler equivalent freshness use different wording propose crawler must minimize fraction time pages remain outdated also noted problem web crawling modeled multiple-queue single-server polling system web crawler server web sites queues page modifications arrival customers switch-over times interval page accesses single web site model mean waiting time customer polling system equivalent average age web crawler objective crawler keep average freshness pages collection high possible keep average age pages low possible objectives equivalent first case crawler concerned many pages out-dated second case crawler concerned old local copies pages two simple re-visiting policies studied cho garcia-molina cases repeated crawling order pages done either random fixed order cho garcia-molina proved surprising result terms average freshness uniform policy outperforms proportional policy simulated web real web crawl intuitively reasoning web crawlers limit many pages crawl given time frame 1 allocate many new crawls rapidly changing pages expense less frequently updating pages 2 freshness rapidly changing pages lasts shorter period less frequently changing pages words proportional policy allocates resources crawling frequently updating pages experiences less overall freshness time improve freshness crawler penalize elements change often optimal re-visiting policy neither uniform policy proportional policy optimal method keeping average freshness high includes ignoring pages change often optimal keeping average age low use access frequencies monotonically sub-linearly increase rate change page cases optimal closer uniform policy proportional policy coffman et al note order minimize expected obsolescence time accesses particular page kept evenly spaced possible explicit formulas re-visit policy attainable general obtained numerically depend distribution page changes cho garcia-molina show exponential distribution good fit describing page changes ipeirotis et al show use statistical tools discover parameters affect distribution note re-visiting policies considered regard pages homogeneous terms quality pages web worth something realistic scenario information web page quality included achieve better crawling policy crawlers retrieve data much quicker greater depth human searchers crippling impact performance site needless say single crawler performing multiple requests per second and/or downloading large files server would hard time keeping requests multiple crawlers noted koster use web crawlers useful number tasks comes price general community costs using web crawlers include partial solution problems robots exclusion protocol also known robots.txt protocol standard administrators indicate parts web servers accessed crawlers standard include suggestion interval visits server even though interval effective way avoiding server overload recently commercial search engines like google ask jeeves msn yahoo search able use extra crawl-delay parameter robots.txt file indicate number seconds delay requests first proposed interval successive pageloads 60 seconds however pages downloaded rate website 100,000 pages perfect connection zero latency infinite bandwidth would take 2 months download entire web site also fraction resources web server would used seem acceptable cho uses 10 seconds interval accesses wire crawler uses 15 seconds default mercatorweb crawler follows adaptive politeness policy took seconds download document given server crawler waits 10 seconds downloading next page dill et al use 1 second using web crawlers research purposes detailed cost-benefit analysis needed ethical considerations taken account deciding crawl fast crawl anecdotal evidence access logs shows access intervals known crawlers vary 20 seconds 3–4 minutes worth noticing even polite taking safeguards avoid overloading web servers complaints web server administrators received brin page note ... running crawler connects half million servers ... generates fair amount e-mail phone calls vast number people coming line always know crawler first one seen parallel crawler crawler runs multiple processes parallel goal maximize download rate minimizing overhead parallelization avoid repeated downloads page avoid downloading page crawling system requires policy assigning new urls discovered crawling process url found two different crawling processes crawler must good crawling strategy noted previous sections also highly optimized architecture shkapenyuk suel noted web crawlers central part search engines details algorithms architecture kept business secrets crawler designs published often important lack detail prevents others reproducing work also emerging concerns search engine spamming prevent major search engines publishing ranking algorithms website owners keen pages indexed broadly possible strong presence search engines web crawling also unintended consequences lead compromise data breach search engine indexes resources n't publicly available pages revealing potentially vulnerable versions software apart standard web application security recommendations website owners reduce exposure opportunistic hacking allowing search engines index public parts websites robots.txt explicitly blocking indexing transactional parts login pages private pages etc. web crawlers typically identify web server using user-agent field http request web site administrators typically examine web servers log use user agent field determine crawlers visited web server often user agent field may include url web site administrator may find information crawler examining web server log tedious task therefore administrators use tools identify track verify web crawlers spambots malicious web crawlers unlikely place identifying information user agent field may mask identity browser well-known crawler important web crawlers identify web site administrators contact owner needed cases crawlers may accidentally trapped crawler trap may overloading web server requests owner needs stop crawler identification also useful administrators interested knowing may expect web pages indexed particular search engine vast amount web pages lie deep invisible web pages typically accessible submitting queries database regular crawlers unable find pages links point google sitemaps protocol mod oai intended allow discovery deep-web resources deep web crawling also multiplies number web links crawled crawlers take urls codice_1 form cases googlebot web crawling done text contained inside hypertext content tags text strategic approaches may taken target deep web content technique called screen scraping specialized software may customized automatically repeatedly query given web form intention aggregating resulting data software used span multiple web forms across multiple websites data extracted results one web form submission taken applied input another web form thus establishing continuity across deep web way possible traditional web crawlers pages built ajax among causing problems web crawlers google proposed format ajax calls bot recognize index recent study based large scale analysis robots.txt files showed certain web crawlers preferred others googlebot preferred web crawler number visual web scraper/crawler products available web crawl pages structure data columns rows based users requirements one main difference classic visual crawler level programming ability required set crawler latest generation visual scrapers like diffbot outwithub import.io remove majority programming skill needed able program start crawl scrape web data visual scraping/crawling method relies user teaching piece crawler technology follows patterns semi-structured data sources dominant method teaching visual crawler highlighting data browser training columns rows technology new example basis needlebase bought google part larger acquisition ita labs continued growth investment area investors end-users following list published crawler architectures general-purpose crawlers excluding focused web crawlers brief description includes names given different components outstanding features | [
6081,
7886,
6092,
7537,
4691,
5400,
6114,
7198,
3660,
80,
84,
2261,
5451,
98,
5474,
4424,
3383,
503,
4430,
5151,
7290,
855,
5863,
518,
860,
5534,
5885,
7319,
4844,
4124,
2739,
5570,
6997,
4511,
5231,
7390,
3492,
5965,
5612,
614,
5975,
... | Test |
81 | 0 | Lexical_density:lexical density lexical density concept computational linguistics measures structure complexity human communication language lexical density estimates linguistic complexity written spoken composition functional words grammatical units content words lexical units lexemes one method calculate lexical density compute ratio lexical items total number words another method compute ratio lexical items number higher structural items composition total number clauses sentences lexical density individual evolves age education communication style circumstances unusual injuries medical condition creativity inherent structure human language one first language may impact lexical density individual writing speaking style human communication written form generally lexically dense spoken form early childhood stage lexical density impacts readability composition ease listener reader comprehend communication lexical density may also impact memorability retention sentence message lexical density proportion content words lexical items given discourse measured either ratio lexical items total number words ratio lexical items number higher structural items sentences example clauses lexical item typically real content includes nouns verbs adjectives adverbs grammatical item typically functional glue thread weaves content includes pronouns conjunctions prepositions determiners certain classes finite verbs adverbs lexical density one methods used discourse analysis descriptive parameter varies register genre many proposed methods computing lexical density composition corpus lexical density may determined ure proposed following formula 1971 compute lexical density sentence biber terms ratio type-token ratio 1985 halliday revised denominator ure formula proposed following compute lexical density sentence formulations halliday proposed lexical density computed simple ratio without 100 multiplier lexical density measurements may vary composition depending lexical item defined items classified lexical grammatical item adopted methodology consistently applied across various compositions provides lexical density compositions typically lexical density written composition higher spoken composition according ure written forms human communication english language typically lexical densities 40 spoken forms tend lexical densities 40 survey historical texts michael stubbs typical lexical density fictional literature ranged 40 54 non-fiction ranged 40 65 percent relation intimacy participants particular communication impact lexical density states ure circumstances prior start communication speaker writer higher lexical density written forms communication proposed primarily written forms human communication involve greater preparation reflection revisions human discussions conversations involving anticipating feedback tend sparser lower lexical density contrast state stubbs biber instructions law enforcement orders news read screen prompts within alloted time literature authors expect available reader re-reading tend maximize lexical density surveys lexical density spoken written materials across different european countries age groups johansson strömqvist report lexical density population groups similar depended morphological structure native language within country age groups sampled lexical density highest adults variations estimated lexical diversity states johansson higher teenagers age group 13-year olds 17-year olds | [
1314
] | Test |
82 | 5 | DialIdol:dialidol dialidol name computer program microsoft windows associated website tracks voting trends american idol contestants program allows users automatically vote american idol contestants choice using pc modem program reports back main website keeps track results based percentage calls contestant result busy signal dialidol assumes busy signals means callers attempting vote contestant dialidol created fourth season american idol released public start fifth season users choose vote equally chosen contestants choose keep certain contestants safe voting chosen contestant ranked lowest choose keep certain contestants unsafe voting lowest-ranked contestant list addition american idol software website may also used vote well track voting trends dancing stars think dance x factor 2006 dialidol also supported celebrity duets canadian idol dialidol support think dance season 8 march 2006 dialidol received cease desist order fox alleged copyright infringement according site creator jim hellriegel fox lawyers also told site acting potential spoiler claimed posted results site taken temporarily consulting lawyers determining legal web site redesigned logo cosmetic changes put back online dialidol take text messages account problems measuring busy signals exists margin error contestant score often 50 contestants predicted danger voted dialidol make prediction case final 3 season 6 melinda doolittle eliminated finale season 8 kris allen also dialidol criticized impreciseness ranking contestants however program creator asserted dialidol never designed get results slot slot right stresses dialidol entertainment purposes according american idol producers monitors place identify remove power dialers use technical enhancements phone systems allow multiple votes dialidol power dialer according fox spokeswoman jennifer sprague using modem dialer ‘ power dialing person manually using redial button standard telephone generate many call attempts modem dialer ” | [
768,
3698,
4759,
5571
] | Test |
83 | 7 | Single_system_image:single system image distributed computing single system image ssi cluster cluster machines appears one single system concept often considered synonymous distributed operating system single image may presented limited purposes job scheduling instance may achieved means additional layer software conventional operating system images running node interest ssi clusters based perception may simpler use administer specialized clusters different ssi systems may provide less complete illusion single system different ssi systems may depending intended usage provide subset features many ssi systems provide process migration processes may start one node moved another node possibly resource balancing administrative reasons processes moved one node another associated resources example ipc resources may moved ssi systems allow checkpointing running processes allowing current state saved reloaded later date checkpointing seen related migration migrating process one node another implemented first checkpointing process restarting another node alternatively checkpointing considered migration disk ssi systems provide illusion processes running machine process management tools e.g ps kill unix like systems operate processes cluster ssi systems provide single view file system may achieved simple nfs server shared disk devices even file replication advantage single root view processes may run available node access needed files special precautions cluster implements process migration single root view enables direct accesses files node process currently running ssi systems provide way breaking illusion node-specific files even single root hp trucluster provides context dependent symbolic link cdsl points different files depending node accesses hp vmscluster provides search list logical name node specific files occluding cluster shared files necessary capability may necessary deal heterogeneous clusters nodes configuration complex configurations multiple nodes multiple architectures multiple sites several local disks may combine form logical single root ssi systems allow nodes access i/o devices e.g tapes disks serial lines nodes may restrictions kinds accesses allowed example openssi ca n't mount disk devices one node another node ssi systems allow processes different nodes communicate using inter-process communications mechanisms running machine ssi systems even include shared memory emulated software distributed shared memory cases inter-node ipc slower ipc machine possibly drastically slower shared memory ssi clusters include special hardware reduce slowdown ssi systems provide cluster address single address visible outside cluster used contact cluster one machine used load balancing inbound calls cluster directing lightly loaded nodes redundancy moving cluster address one machine another nodes join leave cluster examples vary commercial platforms scaling capabilities packages/frameworks creating distributed systems well actually implement single system image | [
1251,
5453,
3256,
3764,
6085,
2467,
6268,
2112,
5571,
5396,
578,
5939,
6205,
1586,
2688,
1678,
5337,
2168,
2359,
5890
] | Test |
84 | 8 | World_Wide_Web:world wide web world wide web www commonly known web information system documents web resources identified uniform resource locators urls nowiki https //www.example.com/ /nowiki may interlinked hypertext accessible internet resources www may accessed users software application called web browser english scientist tim berners-lee invented world wide web 1989 wrote first web browser 1990 employed cern near geneva switzerland browser released outside cern 1991 first research institutions starting january 1991 general public august 1991 world wide web central development information age primary tool billions people use interact internet web resources may type downloaded media web pages hypertext media formatted hypertext markup language html formatting allows embedded hyperlinks contain urls permit users navigate web resources addition text web pages may contain images video audio software components rendered user web browser coherent pages multimedia content multiple web resources common theme common domain name make website websites stored computers running program called web server responds requests made internet web browsers running user computer website content largely provided publisher interactively users contribute content content depends upon users actions websites may provided myriad informative entertainment commercial governmental non-governmental reasons tim berners-lee vision global hyperlinked information system became possibility second half 1980s 1985 global internet began proliferate europe domain name system upon uniform resource locator built came 1988 first direct ip connection europe north america made berners-lee began openly discuss possibility web-like system cern working cern berners-lee became frustrated inefficiencies difficulties posed finding information stored different computers march 12 1989 submitted memorandum titled information management proposal management cern system called mesh referenced enquire database software project built 1980 used term web described elaborate information management system based links embedded text imagine references document associated network address thing referred reading document could skip click mouse system explained could referred using one existing meanings word hypertext term says coined 1950s reason proposal continues hypertext links could encompass multimedia documents including graphics speech video berners-lee goes use term hypermedia help colleague fellow hypertext enthusiast robert cailliau published formal proposal 12 november 1990 build hypertext project called worldwideweb one word web hypertext documents viewed browsers using client–server architecture point html http already development two months first web server month completing first successful test proposal estimated read-only web would developed within three months would take six months achieve creation new links new material readers authorship becomes universal well automatic notification reader new material interest him/her become available read-only goal met accessible authorship web content took longer mature wiki concept webdav blogs web 2.0 rss/atom proposal modelled sgml reader dynatext electronic book technology spin-off institute research information scholarship brown university dynatext system licensed cern key player extension sgml iso 8879:1986 hypermedia within hytime considered expensive inappropriate licensing policy use general high energy physics community namely fee document document alteration next computer used berners-lee world first web server also write first web browser worldwideweb 1990 christmas 1990 berners-lee built tools necessary working web first web browser web editor well first web server first web site described project published 20 december 1990 first web page may lost paul jones unc-chapel hill north carolina announced may 2013 berners-lee gave says oldest known web page 1991 visit unc jones stored magneto-optical drive next computer 6 august 1991 berners-lee published short summary world wide web project newsgroup alt.hypertext date sometimes confused public availability first web servers occurred months earlier another example confusion several news media reported first photo web published berners-lee 1992 image cern house band les horribles cernettes taken silvano de gennaro gennaro disclaimed story writing media totally distorting words sake cheap sensationalism first server outside europe installed stanford linear accelerator center slac palo alto california host spires-hep database accounts differ substantially date event world wide web consortium timeline says december 1992 whereas slac claims december 1991 w3c document titled little history world wide web underlying concept hypertext originated previous projects 1960s hypertext editing system hes brown university ted nelson project xanadu douglas engelbart on-line system nls nelson engelbart turn inspired vannevar bush microfilm-based memex described 1945 essay may think berners-lee breakthrough marry hypertext internet book explains repeatedly suggested marriage two technologies possible members technical communities one took invitation finally assumed project process developed three essential technologies world wide web several differences hypertext systems available time web required unidirectional links rather bidirectional ones making possible someone link another resource without action owner resource also significantly reduced difficulty implementing web servers browsers comparison earlier systems turn presented chronic problem link rot unlike predecessors hypercard world wide web non-proprietary making possible develop servers clients independently add extensions without licensing restrictions 30 april 1993 cern announced world wide web would free anyone fees due coming two months announcement server implementation gopher protocol longer free use produced rapid shift away gopher towards web early popular web browser violawww unix x window system scholars generally agree turning point world wide web began introduction mosaic web browser 1993 graphical browser developed team national center supercomputing applications university illinois urbana–champaign ncsa-uiuc led marc andreessen funding mosaic came us high-performance computing communications initiative high performance computing act 1991 one several computing developments initiated us senator al gore prior release mosaic graphics commonly mixed text web pages web popularity less older protocols use internet gopher wide area information servers wais mosaic graphical user interface allowed web become far popular internet protocol world wide web consortium w3c founded tim berners-lee left european organization nuclear research cern october 1994 founded massachusetts institute technology laboratory computer science mit/lcs support defense advanced research projects agency darpa pioneered internet year later second site founded inria french national computer research lab support european commission dg infso 1996 third continental site created japan keio university end 1994 total number websites still relatively small many notable websites already active foreshadowed inspired today popular services connected internet websites created around world motivated international standards development protocols formatting berners-lee continued stay involved guiding development web standards markup languages compose web pages advocated vision semantic web world wide web enabled spread information internet easy-to-use flexible format thus played important role popularising use internet although two terms sometimes conflated popular use world wide web synonymous internet web information space containing hyperlinked documents resources identified uris implemented client server software using internet protocols tcp/ip http berners-lee knighted 2004 queen elizabeth ii services global development internet never patented invention terms internet world wide web often used without much distinction however two terms mean thing internet global system interconnected computer networks contrast world wide web global collection documents resources linked hyperlinks uris web resources accessed using http https application-level internet protocols use internet transport protocols viewing web page world wide web normally begins either typing url page web browser following hyperlink page resource web browser initiates series background communication messages fetch display requested page 1990s using browser view web pages—and move one web page another hyperlinks—came known 'browsing 'web surfing channel surfing 'navigating web early studies new behaviour investigated user patterns using web browsers one study example found five user patterns exploratory surfing window surfing evolved surfing bounded navigation targeted navigation following example demonstrates functioning web browser accessing page url codice_1 browser resolves server name url codice_2 internet protocol address using globally distributed domain name system dns lookup returns ip address 203.0.113.4 2001 db8:2e :7334 browser requests resource sending http request across internet computer address requests service specific tcp port number well known http service receiving host distinguish http request network protocols may servicing http protocol normally uses port number 80 https protocol normally port number 443 content http request simple two lines text computer receiving http request delivers web server software listening requests port 80 web server fulfil request sends http response back browser indicating success followed content requested page hypertext markup language html basic web page might look like web browser parses html interprets markup paragraph surrounds words format text screen many web pages use html reference urls resources images embedded media scripts affect page behaviour cascading style sheets affect page layout browser makes additional http requests web server internet media types receives content web server browser progressively renders page onto screen specified html additional resources hypertext markup language html standard markup language creating web pages web applications cascading style sheets css javascript forms triad cornerstone technologies world wide web web browsers receive html documents web server local storage render documents multimedia web pages html describes structure web page semantically originally included cues appearance document html elements building blocks html pages html constructs images objects interactive forms may embedded rendered page html provides means create structured documents denoting structural semantics text headings paragraphs lists links quotes items html elements delineated tags written using angle brackets tags directly introduce content page tags surround provide information document text may include tags sub-elements browsers display html tags use interpret content page html embed programs written scripting language javascript affects behavior content web pages inclusion css defines look layout content world wide web consortium w3c maintainer html css standards encouraged use css explicit presentational html web pages contain hyperlinks related pages perhaps downloadable files source documents definitions web resources underlying html hyperlink looks like collection useful related resources interconnected via hypertext links dubbed web information publication internet created tim berners-lee first called worldwideweb original camelcase subsequently discarded november 1990 hyperlink structure www described webgraph nodes web graph correspond web pages urls directed edges hyperlinks time many web resources pointed hyperlinks disappear relocate replaced different content makes hyperlinks obsolete phenomenon referred circles link rot hyperlinks affected often called dead links ephemeral nature web prompted many efforts archive web sites internet archive active since 1996 best known efforts many hostnames used world wide web begin www long-standing practice naming internet hosts according services provide hostname web server often www way may ftp ftp server news nntp usenet news server host names appear domain name system dns subdomain names www.example.com use www required technical policy standard many web sites use first web server nxoc01.cern.ch according paolo palazzi worked cern along tim berners-lee popular use www subdomain accidental world wide web project page intended published www.cern.ch info.cern.ch intended cern home page however dns records never switched practice prepending www institution website domain name subsequently copied many established websites still use prefix employ subdomain names www2 secure en special purposes many web servers set main domain name e.g. example.com www subdomain e.g. www.example.com refer site others require one form may map different web sites use subdomain name useful load balancing incoming web traffic creating cname record points cluster web servers since currently subdomain used cname result achieved using bare domain root user submits incomplete domain name web browser address bar input field web browsers automatically try adding prefix www beginning possibly .com .org .net end depending might missing example entering may transformed nowiki http //www.microsoft.com/ /nowiki 'openoffice nowiki http //www.openoffice.org /nowiki feature started appearing early versions firefox still working title 'firebird early 2003 earlier practice browsers lynx reported microsoft granted us patent idea 2008 mobile devices english www usually read double-u double-u double-u users pronounce dub-dub-dub particularly new zealand stephen fry podgrams series podcasts pronounces wuh wuh wuh english writer douglas adams quipped independent sunday 1999 world wide web thing know whose shortened form takes three times longer say short mandarin chinese world wide web commonly translated via phono-semantic matching wàn wéi wǎng satisfies www literally means myriad dimensional net translation reflects design concept proliferation world wide web tim berners-lee web-space states world wide web officially spelled three separate words capitalised intervening hyphens use www prefix declining especially web 2.0 web applications sought brand domain names make easily pronounceable mobile web grew popularity services like gmail.com outlook.com myspace.com facebook.com twitter.com often mentioned without adding www indeed .com domain scheme specifiers codice_3 codice_4 start web uri refer hypertext transfer protocol http secure respectively specify communication protocol use request response http protocol fundamental operation world wide web added encryption layer https essential browsers send retrieve confidential data passwords banking information web browsers usually automatically prepend nowiki http // /nowiki user-entered uris omitted web page also written webpage document suitable world wide web web browsers web browser displays web page monitor mobile device term web page usually refers visible may also refer contents computer file usually text file containing hypertext written html comparable markup language typical web pages provide hypertext browsing web pages via hyperlinks often referred links web browsers frequently access multiple web resource elements reading style sheets scripts images presenting web page network web browser retrieve web page remote web server web server may restrict access private network corporate intranet web browser uses hypertext transfer protocol http make requests web server static web page delivered exactly stored web content web server file system contrast dynamic web page generated web application usually driven server-side software dynamic web pages help browser client enhance web page user input server static web page sometimes called flat page/stationary page web page delivered user exactly stored contrast dynamic web pages generated web application consequently static web page displays information users contexts subject modern capabilities web server negotiate content-type language document versions available server configured server-side dynamic web page web page whose construction controlled application server processing server-side scripts server-side scripting parameters determine assembly every new web page proceeds including setting client-side processing client-side dynamic web page processes web page using html scripting running browser loads javascript scripting languages determine way html received page parsed document object model dom represents loaded web page client-side techniques dynamically update change dom way dynamic web page reloaded user computer program change variable content updating information could come server changes made page dom may may truncate browsing history create saved version go back dynamic web page update using ajax technologies neither create page go back truncate web browsing history forward displayed page using ajax technologies end user gets one dynamic page managed single page web browser actual web content rendered page vary ajax engine sits browser requesting parts dom dom client application server dhtml umbrella term technologies methods used create web pages static web pages though fallen common use since popularization ajax term rarely used client-side-scripting server-side scripting combination make dynamic web experience browser javascript scripting language initially developed 1995 brendan eich netscape use within web pages standardised version ecmascript make web pages interactive web applications also use javascript techniques ajax asynchronous javascript xml client-side script delivered page make additional http requests server either response user actions mouse movements clicks based elapsed time server responses used modify current page rather creating new page response server needs provide limited incremental information multiple ajax requests handled time users interact page data retrieved web pages may also regularly poll server check whether new information available website collection related web resources including web pages multimedia content typically identified common domain name published least one web server notable examples wikipedia.org google.com amazon.com website may accessible via public internet protocol ip network internet private local area network lan referencing uniform resource locator url identifies site websites many functions used various fashions website personal website corporate website company government website organization website etc websites typically dedicated particular topic purpose ranging entertainment social networking providing news education publicly accessible websites collectively constitute world wide web private websites company website employees typically part intranet web pages building blocks websites documents typically composed plain text interspersed formatting instructions hypertext markup language html xhtml may incorporate elements websites suitable markup anchors web pages accessed transported hypertext transfer protocol http may optionally employ encryption http secure https provide security privacy user user application often web browser renders page content according html markup instructions onto display terminal hyperlinking web pages conveys reader site structure guides navigation site often starts home page containing directory site web content websites require user registration subscription access content examples subscription websites include many business sites news websites academic journal websites gaming websites file-sharing websites message boards web-based email social networking websites websites providing real-time stock market data well sites providing various services end users access websites range devices including desktop laptop computers tablet computers smartphones smart tvs web browser commonly referred browser software user agent accessing information world wide web connect website server display pages user needs web browser program program user runs download format display web page user computer addition allowing users find displaying moving web pages web browser usually features like keeping bookmarks recording history managing cookies see home pages may facilities recording passwords logging web sites popular browsers chrome firefox safari internet explorer edge web server server software hardware dedicated running said software satisfy world wide web client requests web server general contain one websites web server processes incoming network requests http several related protocols primary function web server store process deliver web pages clients communication client server takes place using hypertext transfer protocol http pages delivered frequently html documents may include images style sheets scripts addition text content user agent commonly web browser web crawler initiates communication making request specific resource using http server responds content resource error message unable resource typically real file server secondary storage necessarily case depends web server implemented primary function serve content full implementation http also includes ways receiving content clients feature used submitting web forms including uploading files many generic web servers also support server-side scripting using active server pages asp php hypertext preprocessor scripting languages means behaviour web server scripted separate files actual server software remains unchanged usually function used generate html documents dynamically on-the-fly opposed returning static documents former primarily used retrieving modifying information databases latter typically much faster easily cached deliver dynamic content web servers also frequently found embedded devices printers routers webcams serving local network web server may used part system monitoring administering device question usually means additional software installed client computer since web browser required included operating systems http cookie also called web cookie internet cookie browser cookie simply cookie small piece data sent website stored user computer user web browser user browsing cookies designed reliable mechanism websites remember stateful information items added shopping cart online store record user browsing activity including clicking particular buttons logging recording pages visited past also used remember arbitrary pieces information user previously entered form fields names addresses passwords credit card numbers cookies perform essential functions modern web perhaps importantly authentication cookies common method used web servers know whether user logged account logged without mechanism site would know whether send page containing sensitive information require user authenticate logging security authentication cookie generally depends security issuing website user web browser whether cookie data encrypted security vulnerabilities may allow cookie data read hacker used gain access user data used gain access user credentials website cookie belongs see cross-site scripting cross-site request forgery examples tracking cookies especially third-party tracking cookies commonly used ways compile long-term records individuals browsing histories potential privacy concern prompted european u.s. lawmakers take action 2011 european law requires websites targeting european union member states gain informed consent users storing non-essential cookies device google project zero researcher jann horn describes ways cookies read intermediaries like wi-fi hotspot providers recommends use browser incognito mode circumstances web search engine internet search engine software system designed carry web search internet search means search world wide web systematic way particular information specified web search query search results generally presented line results often referred search engine results pages serps information may mix web pages images videos infographics articles research papers types files search engines also mine data available databases open directories unlike web directories maintained human editors search engines also maintain real-time information running algorithm web crawler internet content capable searched web search engine generally described deep web deep web invisible web hidden web parts world wide web whose contents indexed standard web search engines opposite term deep web surface web accessible anyone using internet computer scientist michael k. bergman credited coining term deep web 2001 search indexing term content deep web hidden behind http forms includes many common uses web mail online banking services users must pay protected paywall video demand online magazines newspapers among others content deep web located accessed direct url ip address may require password security access past public website page web cache server computer located either public internet within enterprise stores recently accessed web pages improve response time users content requested within certain time original request web browsers also implement browser cache writing recently obtained data local data storage device http requests browser may ask data changed since last access web pages resources may contain expiration information control caching secure sensitive data online banking facilitate frequently updated sites news media even sites highly dynamic content may permit basic resources refreshed occasionally web site designers find worthwhile collate resources css data javascript site-wide files cached efficiently enterprise firewalls often cache web resources requested one user benefit many users search engines store cached content frequently accessed websites criminals web become venue spread malware engage range cybercrimes including identity theft fraud espionage intelligence gathering web-based vulnerabilities outnumber traditional computer security concerns measured google one ten web pages may contain malicious code web-based attacks take place legitimate websites measured sophos hosted united states china russia common malware threats sql injection attacks websites html uris web vulnerable attacks like cross-site scripting xss came introduction javascript exacerbated degree web 2.0 ajax web design favours use scripts today one estimate 70 websites open xss attacks users phishing another common threat web february 2013 rsa security division emc estimated global losses phishing 1.5 billion 2012 two well-known phishing methods covert redirect open redirect proposed solutions vary large security companies like mcafee already design governance compliance suites meet post-9/11 regulations like finjan recommended active real-time inspection programming code content regardless source argued enterprises see web security business opportunity rather cost centre others call ubiquitous always-on digital rights management enforced infrastructure replace hundreds companies secure data networks jonathan zittrain said users sharing responsibility computing safety far preferable locking internet every time client requests web page server identify request ip address usually logs also unless set web browsers record requested web pages viewable history feature usually cache much content locally unless server-browser communication uses https encryption web requests responses travel plain text across internet viewed recorded cached intermediate systems another way hide personally identifiable information using vpn vpn encrypts online traffic masks original ip address lowering chance user identification web page asks user supplies personally identifiable information—such real name address e-mail address etc.—web-based entities associate current web traffic individual website uses http cookies username password authentication tracking techniques relate web visits identifiable information provided way possible web-based organisation develop build profile individual people use site sites may able build record individual includes information leisure activities shopping interests profession aspects demographic profile profiles obviously potential interest marketeers advertisers others depending website terms conditions local laws apply information profiles may sold shared passed organisations without user informed many ordinary people means little unexpected e-mails in-box uncannily relevant advertising future web page others mean time spent indulging unusual interest result deluge targeted marketing may unwelcome law enforcement counter terrorism espionage agencies also identify target track individuals based interests proclivities web social networking sites try get users use real names interests locations rather pseudonyms executives believe makes social networking experience engaging users hand uploaded photographs unguarded statements identified individual may regret exposure employers schools parents relatives may influenced aspects social networking profiles text posts digital photos posting individual intend audiences on-line bullies may make use personal information harass stalk users modern social networking websites allow fine grained control privacy settings individual posting complex easy find use especially beginners photographs videos posted onto websites caused particular problems add person face on-line profile modern potential facial recognition technology may possible relate face previously anonymous images events scenarios imaged elsewhere due image caching mirroring copying difficult remove image world wide web web standards include many interdependent standards specifications govern aspects internet world wide web even web-focused standards directly indirectly affect development administration web sites web services considerations include interoperability accessibility usability web pages web sites web standards broader sense consist following web standards fixed sets rules constantly evolving set finalized technical specifications web technologies web standards developed standards organizations—groups interested often competing parties chartered task standardization—not technologies developed declared standard single individual company crucial distinguish specifications development ones already reached final development status case w3c specifications highest maturity level methods accessing web alternative mediums formats facilitate use individuals disabilities disabilities may visual auditory physical speech-related cognitive neurological combination accessibility features also help people temporary disabilities like broken arm ageing users abilities change web receives information well providing information interacting society world wide web consortium claims essential web accessible provide equal access equal opportunity people disabilities tim berners-lee noted power web universality access everyone regardless disability essential aspect many countries regulate web accessibility requirement websites international co-operation w3c web accessibility initiative led simple guidelines web content authors well software developers use make web accessible persons may may using assistive technology w3c internationalisation activity assures web technology works languages scripts cultures beginning 2004 2005 unicode gained ground eventually december 2007 surpassed ascii western european web frequently used character encoding originally allowed resources identified uri subset us-ascii allows characters—any character universal character set—and resource identified iri language | [
2902,
1443,
2914,
7169,
4325,
1485,
7198,
48,
51,
4352,
80,
2973,
4374,
4376,
1515,
87,
7233,
5806,
98,
5821,
1554,
5847,
5851,
7290,
3043,
7296,
3057,
4452,
1599,
3060,
1607,
175,
5887,
7319,
5889,
3077,
4472,
5907,
7348,
3102,
7370,
... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.