node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
185
9
Structured_Audio_Orchestra_Language:structured audio orchestra language structured audio orchestra language saol imperative music-n programming language designed describing virtual instruments processing digital audio applying sound effects published subpart 5 mpeg-4 part 3 iso/iec 14496-3:1999 1999 part mpeg-4 international standard saol one key components mpeg-4 structured audio toolset along
[ 6507, 6408, 5266 ]
Test
186
9
Michael_Witbrock:michael witbrock michael john witbrock computer scientist field artificial intelligence witbrock native new zealand former vice president research cycorp carrying cyc project effort produce genuine artificial intelligence dr. witbrock born christchurch new zealand ph.d. computer science carnegie mellon university joining cycorp principal scientist terra lycos working integrating statistical knowledge-based approaches understanding web user behavior also associated systems pittsburgh research center informedia digital library carnegie mellon dr. witbrock dissertation work speaker modeling going cycorp published broad range areas including work cycorp focused improving knowledge formation efforts particularly dialogue processing improving accessibility cyc project together john mount witbrock credited original idea computer-generated art
[ 3914, 1445, 1243 ]
Test
187
1
Adaptive_Server_Enterprise:adaptive server enterprise sap ase adaptive server enterprise originally known sybase sql server also commonly known sybase db sybase ase relational model database server developed sybase corporation later became part sap ag ase predominantly used unix platform also available microsoft windows 1988 sybase microsoft ashton-tate began development version sql server os/2 ashton-tate later left group microsoft went port system windows nt agreement expired 1993 microsoft purchased license source code began sell product microsoft sql server ms sql server sybase sql server share many features syntax peculiarities day originally unix platforms 1987 sybase corporation primary relational database management system product initially marketed name sybase sql server 1988 sql server os/2 co-developed pc sybase microsoft ashton-tate ashton-tate divested interest microsoft became lead partner porting sql server windows nt microsoft sybase sold supported product version 4.2.1 sybase released sql server 4.2 1992 release included internationalization localization support symmetric multiprocessing systems 1993 co-development licensing agreement microsoft sybase ended companies parted ways continuing develop respective versions sql server sybase released sybase sql server 10.0 part system 10 product family also included back-up server open client/server apis sql monitor sa companion omnisql gateway microsoft continued microsoft sql server sybase provides native low-level programming interfaces database server uses protocol called tabular data stream prior version 10 dblib database library used version 10 onwards uses ctlib client library 1995 sybase released sql server 11.0 starting version 11.5 released 1996 sybase moved differentiate product microsoft sql server renaming adaptive server enterprise sybase 11.5 added asynchronous prefetch case expression sql optimizer use descending index avoid need worktable sort logical process manager added allow prioritization assigning execution attributes engine affinity 1998 ase 11.9.2 rolled support data pages locking data rows row-level locking distributed joins improved smp performance indexes could created descending order column readpast concurrency option repeatable read transaction isolation added lock timeout option task-to-engine affinity added query optimization delayed cursor opened values variables known 1999 ase 12.0 released providing support java high availability distributed transaction management merge joins added previous joins nested loop joins additional cache partitions added improve performance 2001 ase 12.5 released providing features dynamic memory allocation ejb container support xml ssl ldap also added compressed backups unichar utf-16 support multiple logical page sizes 2k 4k 8k 16k 2005 sybase released ase 15.0 included support partitioning table rows database across individual disk devices virtual columns computed required ase 15.0 many parameters static required server reboot changes take place made dynamic changes take effect immediately improved performance reduced downtime example one parameter made dynamic tape retention days number days backup kept tape media without overwriting existing contents production environment january 27 2010 sybase released ase 15.5 included support in-memory relaxed-durability databases distributed transaction management shared-disk cluster faster compression backups well backup server support ibm® tivoli® storage manager deferred name resolution user-defined stored procedures fips 140-2 login password encryption incremental data transfer bigdatetime bigtime datatypes tempdb groups also added july 2010 sybase became wholly owned subsidiary sap america september 13 2011 sybase released ase 15.7 techwave included support new security features application functionality configuration groups new threaded kernel compression large object lob regular data end-to-end cis kerberos authentication dual control encryption keys unattended startup extension securing logins roles password management login profiles alter ... modify owner external passwords hidden text abstract plans cached statements shrink log space in-row off-row lob using large object text unitext image datatypes stored procedures using lob locators transact-sql statements select update exclusively lock rows subsequent updates within transaction update-able cursors non-materialized non-null columns default value fully recoverable ddl select alter table commands require data movement reorg rebuild merge command expanded variable-length rows allowing unicode noncharacters april 2014 sap released ase 16 included support partition locking cis support hana relaxed query limits query plan optimization star joins dynamic thread assignment sort hash join operator improvements full-text auditing auditing authorization checks inside stored procedures create replace functionality query plan execution statistics html index compression full database encryption locking run-time locking metadata latch enhancements multiple trigger support residual data removal configuration history tracking crc checks dump database ability calculate transaction log growth rate specified time period single standalone installation ase typically comprises one dataserver one corresponding backup server multi server installation many dataservers share one backup server dataserver consists system databases user databases minimum system databases mandatory normal working dataserver 'master 'tempdb 'model 'sybsystemdb 'sybsystemprocs 'master database holds critical system related information includes logins passwords dataserver configuration parameters 'tempdb used storage data required intermediate processing queries temporary data 'model used template creating new databases 'sybsystemprocs consists system supplied stored procedures queries system tables manipulates data ase single process multithreaded dataserver application sap also developer edition used free develop production use allows 1 engine 25 connections express edition limited 1 server engine 2 gb memory 5 gb disk space per server edition free production purposes
[ 7788, 187, 4759, 6256, 6420, 7334, 7248, 7341, 7715, 3776, 2924, 1371, 6543, 3975, 6462, 2674, 1775, 955, 1435 ]
Test
188
3
IBM_ThinkPad_ThinkLight:ibm thinkpad thinklight thinklight keyboard light present thinkpad families notebook computers series originally designed ibm developed produced lenovo since 2005 white yellow led depending model located top edge display illuminating keyboard allow use low-light conditions activated key combination fn-pgup bottom left top right keys keyboard newer thinkpads use combination fn-space instead sometimes shortcut also used conjunction control backlit keyboard laptop on-screen display thinkpad computers display light light indicator thinklight activated monitor pc thinkpads like z r series though r61 r32 models still white light feature amber yellow led due lower cost models like series use white led generally preferred g series sl series omit thinklight hp elitebook series notebooks contain similar keyboard light called hp night light unlike thinklight activated physical button next night light rather keyboard shortcut dell latitude atg series laptops also contained pair red leds controlled similar way ibm thinklight also serve illuminate keyboard computer manufacturers opted backlit keyboards instead illuminating keyboard notebooks feature include dell studio latitude series hp elitebooks hp envy models apple macbook pro macbook air recent thinkpads included thinklight illuminated keyboard recent models longer include thinklight
[ 3009, 2342, 3826, 972 ]
Validation
189
7
Virtustream:virtustream virtustream provider cloud computing management software infrastructure service iaas managed services enterprises governments service providers subsidiary dell technologies virtustream headquartered mclean va offices atlanta bangalore dallas frankfurt kaunas london mclean san francisco santa fe sydney tokyo washington d.c. virtustream global infrastructure includes data centers located frankfurt japan london paris san francisco seoul sydney las vegas washington d.c. chicago virginia virtustream founded 2009 company raised approximately 40 million series funding columbia capital blue lagoon capital intel capital noro-moseley partners tdf ventures september 2009 may 2010 15 million series b funding july 2011 intel capital columbia capital noro-moseley partners questmark capital tdf ventures may 26 2015 emc announced agreement acquire virtustream completed acquisition virtustream july 9 2015 following virtustream ’ acquisition emc october 12 2015 dell inc. announced would acquire emc cash-and-stock deal valued 67 billion—the largest-ever acquisition technology industry merger closed september 7 2016 emc renamed dell emc result eventually renamed dell technologies dell technologies became world ’ largest privately controlled tech company time october 12 2015 fortune reported “ overall deal values emc around 27 higher trading news dell ’ interest first broke last week would second-largest tech merger ever behind 106 billion tie-up aol time warner 2000 largest-ever take-private transaction tech company. ” may 7 2018 announced virtustream founders rodney j. rogers kevin reid decided leave company rory read became president virtustream retaining position chief operating executive dell technologies deepak patil formerly microsoft azure became senior vice president product technology
[ 2988, 7613, 632, 1634, 3091, 6262, 6806, 3627, 5927, 2212, 5135, 1757, 3028, 842, 5064, 330, 2961, 7037, 2700, 7415, 1514, 5889 ]
Validation
190
2
TOPS-20:tops-20 tops-20 operating system digital equipment corporation dec proprietary os used dec 36-bit mainframe computers hardware reference manual described decsystem-10/decsystem-20 processor meaning dec pdp-10 decsystem-20 tops-20 began 1969 tenex operating system bolt beranek newman bbn shipped product dec starting 1976 tops-20 almost entirely unrelated similarly named tops-10 shipped pa1050 tops-10 monitor calls emulation facility allowed tops-10 executables run unchanged matter policy dec update pa1050 support later tops-10 additions except required dec software tops-20 competed tops-10 waits—all available pdp-10 notable time-sharing systems timeframe tops-20 based upon tenex operating system created bbn technologies digital pdp-10 computer digital started development ki-10 version pdp-10 issue arose point tenex popular customer-written pdp-10 operating systems would run new faster ki-10s correct problem dec pdp-10 sales manager purchased rights tenex bbn set project port new machine end little original tenex code remained digital ultimately named resulting operating system tops-20 came tops-20 merely emulation tops-10 operating system calls known uuo standing unimplemented user operation needed compilers 20-specific run well user-programs written languages package mapped user address space named pa1050 pa pat compatibility 10 dec pdp 10 50 pdp 10 model 50 10/50 1050 sometimes pa1050 referred pat name good fit fact pa1050 simply unprivileged user-mode code performed requested action using jsys calls necessary major ways get tops-20 capabilities made tops-20 important exec accomplished work primarily using rather advanced day tops-20-specific features one could type find operands permitted/required following list commands supported tops-20 command processor jsys stands jump system operands times memory addresses tops-20 allows use 18-bit 30-bit addresses monitor calls require one kind calls accept either kind monitor calls use 18 bits hold address calls interpret 18-bit addresses locations current section internally files first identified using gtjfn get job file number jsys jfn number used open openf manipulate file contents paul allen maintained several publicly accessible historic computer systems death including xkl toad-2 running tops-20 request account try running tops-20 hardware emulated pdp-10
[ 1807, 4297, 4670, 5021, 13, 6088, 3271, 6804, 3276, 3626, 391, 5041, 7546, 7550, 405, 1855, 2582, 4347, 65, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 2280, 4397, 6892, 5116, 2300, 126, 6907, 4786,...
Test
191
2
Busdma:busdma computing busdma bus_dma bus_space set application programming interfaces designed help make device drivers less dependent platform-specific code thereby allowing host operating system easily ported new computer hardware accomplished abstractions direct memory access dma mapping across popular machine-independent computer buses like pci used distinct architectures ia-32 netbsd/i386 dec alpha netbsd/alpha additionally devices may come multiple flavours supporting one bus e.g. isa eisa vesa local bus pci still sharing core logic irrespective bus device drivers would also benefit abstraction thus rationale busdma facilitate maximum code reuse across wide range platforms circa 2006 bus dma abstractions made possible netbsd support 50 hardware platforms 14 cpu architectures single source tree compared forking model used linux ports originally implemented bus_dma apis developers netbsd operating system busdma adopted openbsd freebsd derivatives freebsd incorporating busdma umbrella without underscore netbsd openbsd additional bus_space apis amalgamated version busdma incorporated freebsd dragonfly bsd developers also slowly converting drivers use busdma
[ 6414, 7514, 5373, 732, 3636, 2226, 5760, 3986, 5065, 6477, 424, 1133, 6149, 6860, 6505, 1523, 1534, 1547, 481, 2300, 1193, 4059, 8001, 1572, 6918, 6211, 4806, 4441, 5865, 5518, 8037, 3755, 875, 1245, 6242, 885, 1254, 2001, 6972, 4498, 7...
Test
192
2
Sintran:sintran sintran range operating systems norsk data line minicomputers original version sintran released 1968 developed department engineering cybernetics norwegian institute technology cooperation affiliated research institute sintef os name portmanteau sin tef tran fortran implementation language norsk data took part development sintran ii multi-user system constituted software platform nord-1 range terminal servers far common version os sintran iii developed solely norsk data launched 1974 real-time multitasking system used norsk data server machines nord-10 -100 remainder company lifetime i.e 1992
[ 5571, 2803, 1682 ]
Validation
193
7
Cloud_load_balancing:cloud load balancing cloud load balancing type load balancing performed cloud computing cloud load balancing process distributing workloads across multiple computing resources cloud load balancing reduces costs associated document management systems maximizes availability resources type load balancing confused domain name system dns load balancing dns load balancing uses software hardware perform function cloud load balancing uses services offered various computer network companies cloud load balancing advantage dns load balancing transfer loads servers globally opposed distributing across local servers event local server outage cloud load balancing delivers users closest regional server without interruption user cloud load balancing addresses issues relating ttl reliancy present dns load balancing dns directives enforced every ttl cycle take several hours switching servers lag server failure incoming server traffic continue route original server ttl expires create uneven performance different internet service providers may reach new server internet service providers another advantage cloud load balancing improves response time routing remote sessions best performing data centers cloud computing brings advantages cost flexibility availability service users advantages drive demand cloud services demand raises technical issues service oriented architectures internet services ios -style applications high availability scalability major concern issues load balancing allows cloud computing scale increasing demands efficiently allocating dynamic local workload evenly across nodes opportunistic load balancing olb algorithm assigns workloads nodes free order simple consider expected execution time node workload client aware policy wcap implemented dis-centralized manner low overhead specifies unique special property usp requests computing nodes information usp schedule decide suitable node complete request wcap makes computing nodes reducing idle time also reduces performance time searches based content information biased random sampling bases job allocation network represented directed graph execution node graph in-degree means available resources out-degree means allocated jobs in-degree decrease job execution out-degree increase job allocation active clustering self-aggregation algorithm rewire network experiment result active clustering random sampling walk predictably perform better number processing nodes increased honeyhive algorithm show increasing pattern load balancer forwards packets web servers according different workloads servers however hard implement scalable load balancer cloud commodity business model limited infrastructure control allowed cloud providers client-side load balancer clb solve problem using scalable cloud storage service.clb allows clients choose back-end web servers dynamic content although delivers static content
[ 2961, 5096 ]
Test
194
3
BMX_Simulator:bmx simulator bmx simulator racing video game released codemasters 1986 commodore 64 ported home computers followed two sequels bmx simulator 2 professional bmx simulator part series games included atv simulator grand prix simulator professional ski simulator bmx simulator overhead race game similar super sprint player must race another player computer around series seven different bicycle motocross bmx tracks also time limit beaten two cyclists compete race race viewed slow-motion action replay afterwards sinclair user called classy conversion commodore original full price game budget clothing zx computing said fun start finish rated monster hit
[]
Test
195
2
Android_lawn_statues:android lawn statues android lawn statues series large foam statues near googleplex google headquarters mountain view california currently located 1981 landings drive based code names versions google android mobile operating system named desserts sweet treats statues originally located front building 44 android development team offices moved present location blocks away next google visitor center beta area open google employees guests visitors encouraged take photos sculptures mostly made company named themendous google android fastest selling mobile operating system late 2010 developed partnership open handset alliance version 1.0 released september 23 2008 first publicly codenamed version android cupcake released april 27 2009 versions 1.0 1.1 codenames following scheme initially plan use famous robot names alphabetical order early interim revisions tagged astro boy bender eventually plan discontinued version 1.0 codename version 1.1 got internal codename petit four launched custom naming android releases desserts codenames became public version 1.5 started follow alphabetical order beginning c apparently since two previous public releases 'skipped scheme since releases android named desserts sweet treats names chosen alphabetical order although sometimes name applied multiple versions days named operating system unveiled google unveils lawn statue representing version codename statues lawn front building 44 android development team worked august 2014 august 2018 sixteen statues comprise collection created themendous exception oreo two statues one made located union city new jersey statues order installation green android joined early alex dog similar colour design actually toy chair puppy eero aarnio statue stolen 2009 similar incident happened 2012 due summer heat head jelly bean statue popped one jelly beans inside stolen prompted android engineer dan morrill post google+ jelly bean ridiculously hot jb statue overheated head partially melted popped think somebody stole one jelly beans people please n't steal jelly beans statue since repaired 2017 android oreo statue google ordered two different statues one featuring single oreo boxy design made themendous multiple oreos roundish shape
[ 3507, 4116, 3933, 5195, 6697, 2003, 3848, 5372, 7431, 6978, 5473, 6427, 7346, 561, 201, 474, 2107, 2017, 5919, 822, 649, 1095, 3863, 4234, 5302, 6183, 7357, 2398, 740, 2037, 2756, 7007, 136, 42, 4340, 7749, 6209, 3310, 2591, 1399, 2417,...
Test
196
3
Puzznic:puzznic puzznic bears strong graphical gameplay similarities taito flipull/plotting game ranked 34th best game time amiga power many clones share basic gameplay puzznic added extra features years puzztrix web pc addled germinal iphone puzzled mobile phones clone pc brix released epic megagames 1992 android devices clone called puzzmagic appeared 2015 iphone clone also available title gem panic blockbusterz hard puzzle game iphone ipad appeared 2019
[ 6380 ]
Test
197
2
Tux_Droid:tux droid tux droid linux wireless tux mascot 210mm × 180mm × 140mm lowered wings programmable interface allowing announce events gestures alsa driven sound events detected specific gadgets handled tux gadget manager tux droid supports linux kernel 2.4 later needs 800 mhz cpu 128 mb ram communication tux droid computer via signalling operating 802.11 wlan band compatible wi-fi receiver resembles plastic fish connects host computer usb port infrared remote control supplied signals received tux droid sent host software wireless link media detection needs internet connection mascot driven atmel avr risc microcontrollers new version supports also windows-based pcs tux droid used windows xp windows vista 32 bit kysoh society filed bankruptcy august 2010 official sites unavailable two communities available get help information tux droid mascot comes microphone infrared receiver perform 2.4 ghz wireless full-duplex digital link usb dongle tux droid also light sensor push button top head gestures cover e.g eye- wing-movements switch sensors wings triggered pushing wings sound output volume control wheel control speaker 3.5mm stereo audio socket audio software comes mascot far combines primary gadgets development skype ai alice chat robot tux droid compatible linux windows available 11 languages
[ 5965, 1237, 578 ]
Validation
198
6
Veritas_Cluster_File_System:veritas cluster file system veritas cluster file system vxcfs cache coherent posix compliant shared file system built based upon veritas file system distributed built-in cluster volume manager vxcvm components veritas storage foundation products particularly veritas cluster server veritas file system veritas volume manager uses underlying mechanisms veritas cluster server manage membership changes cluster state shared file system available following operating systems ibm aix solaris linux hp-ux current version product version 7.3.1 need maintain cluster awareness prevent data corruption discrepancies cache clusters tightly coupled communicate ethernet
[ 1624, 1666, 2032, 578, 900 ]
Validation
199
4
SIGINT_(conference):sigint conference sigint conference three-day conference held yearly social technical aspects digital society 2009 2013 organized chaos computer club held cologne germany conference featured lectures workshops various different topics specifically wanted focus social political aspect technology hacker culture conference officially discontinued january 2014
[]
Test
200
6
Tux3:tux3 tux3 open-source versioning filesystem created daniel phillips introduced filesystem public replacement tux2 filesystem encountered licensing issues due filing several patents phillips previously created htree directory indexing system eventually became official feature ext3 technical details tux3 first publicized email 23 july 2008 broad outline tux3 follows conventional unix-style inode/file/directory design tux3 inode table b-tree versioned attributes leaves file inode attribute b-tree versioned extents leaves directory indexes mapped directory file blocks htree free space mapped b-tree extents leaves attempts avoid traditional journaling introducing recovery logic allows recover upon remounting tux3 inode variable sized object consisting list attributes labeled version attribute added changed removed b-tree index inodes referenced versioned b-tree index large file also versioned except leaves index contain lists extents labeled version referenced file data added changed style versioning essentially inverse tree versioning methods used write anywhere file layout wafl zfs btrfs multiple tree roots entire filesystem created order express differences versions filesystem claimed advantage tux3 style versioned entities bytes need added represent single changes inode attributes index new versions file data blocks compared number index blocks needing allocated written tree-versioned filesystems august 2008 tux3 capable performing basic file i/o files end 2008 tux3 capable running within kernel able sustain repeated runs file system exerciser fsx-linux big accomplishment 17 february 2009 linux booted tux3 root filesystem first time 18 january 2013 initial fsck support added far checks physical referential integrity developers confident make fully functional e2fsck-quality fsck soon 17 may 2014 daniel phillips made plea kernel maintainer review code implement kernel goal stabilize code kernel finally get stable 9 october 2017 daniel phillips sent tux3 update shardmap mailing list
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 5783, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 1624, 59...
Test
201
2
Android_Cupcake:android cupcake android cupcake version 1.5 third version android developed google major platform release deployable android-powered handsets starting april 2009 longer supported release includes new features users developers well changes android framework api developers android 1.5 platform available downloadable component android sdk android 1.5 included new features on-screen keyboard bluetooth support well improvements existing features ui changes application management several google apps
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3309, 3310, 7924, 2591, 5771, 6132, 5775, 6153, 7956, 5455, 6176, 5473, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1582, 2683, 855, 6937, 168, 6232, 6950, 2712, 4116, 5195, 2003, 195, 6978, ...
Test
202
4
Robert_L._Prestel:robert l. prestel robert leo prestel born february 11 1936 american intelligence official mathematician deputy director national security agency 1990 1994 time highest ranking civilian agency prestel joined nsa 1962 held many positions prior appointed deputy director including director education training deputy director research engineering among positions prestel served include trustee institute defense analyses board directors wj communications currently serves trustee emeritus institute defense analyses awards prestel received service intelligence community include president distinguished executive award 1988 department defense distinguished civilian service award 1988 national intelligence distinguished service medal 1991
[ 4988, 7191, 7895, 228, 4666, 258, 3335, 7568, 4727 ]
Train
203
2
BlackDog:blackdog blackdog pocket-sized self-contained computer built-in biometric fingerprint reader developed 2005 realm systems plugged powered usb port host computer using peripheral devices input output mobile personal server allows user use linux ones applications data computer usb port host machine ’ monitor keyboard mouse internet connection used blackdog duration session system self-contained isolated host requiring additional installation possible make use untrusted computers yet using secure system various hardware iterations exist original developer realm systems closed 2007 picked successor inaura inc identified blackdog project blackdog original blackdog first hardware version touted unlike mobile computing device blackdog contains processor memory storage completely powered usb port host computer external power adapter required created conjunction realm system project blackdog skills contest announced oct 27 2005 supposed raise interest create developer community surrounding product blackdog publicly available purchase project blackdog website september 2005 wished enter contest experiment platform production ended mid january 2006 contest closed 7 february 2006 winners contest announced categories security michael chenetz entertainment michael king productivity terry bayne dogpile paul chandler feb 15 2006 open source business conference san franscisco terry bayne announced grand prize winner contest received usd50,000 creation kibble tool building integration solutions host pc blackdog device using soap-based rpc mechanism send arbitrary lua code executed host pc blackdog conference second iteration blackdog k9 publicly announced identified k9 ultra-mobile server k9 version announced open source business conference february 2006 expected availability third quarter 2006 however company turbulences see company history prevented k9 sold early 2009 inaura inc promotional literature shows form factor intermediate id3 prototype thin chrome model resembling ipod nano black rubberized exterior realm systems shut working prototypes k9 hardware design seemed finished software functional terms hardware differed original blackdog aspects id3 variant k9 using hardware specifications intended corporate use matching management router/server identified id1200 announced part identity product series instance showcased embedded systems conference san jose ca april 3–7 2006 final realm systems id3 form factor resembled small nokia cellphone software originally based debian 2008 project switched using olmec linux plugged usb port windows xp machine blackdog initially presented host virtual cd-rom drive via autorun application blackdog automatically launched x window system windows xming software nat router applications running virtual usb cd-rom drive disconnected usb presented virtual ethernet adapter enabling network access without requiring installations user interactions user could access contained applications data windows computer configuration steps possible also run blackdog linux mac computers short engadget review stated runs firefox fine great taking browser e-mail chat clients use wherever are\ though probably little 400mhz guy handle first software version based debian sid running 2.6.10 kernel contained sample default applications xterm xblast xgalaga allowed installation firefox webbrowser email client additional software available official community apt repositories hosted project attempted stimulate creation applications use cases blackdog building community project discussion infrastructure termed dogpound used installation project hosting software sourceforge sdk qemu emulator environment windows xp linux mac os x released facilitate creation porting applications blackdog system although blackdog software free software device contained proprietary technology intellectual property developed realm systems inc. later transferred echo identity systems finally ended belonging inaura corporation official repository project disappeared mid-february 2007 due realm systems inc. closing reactivated successor inaura inc. late-june 2007 seem repository nov. 2011 sometime 2009 michael king winner entertainment category contest maintained independent backup official repositories discussion groups well repositories developers now-defunct saint louis mo based archlug website official website project www.projectblackdog.org still appears december 2013 defaced several quick cash money lenders compromised site via wordpress content management system uses appear original content remaining homepage advertisements money lending sites starting late 2007 olmec linux ported blackdog k9 devices. debian-derived linux distribution geared small embedded platforms gumstix sold part inaura inc. product offering blackdog/k9 using olmec-based version realm systems inc. founded 2002 based salt lake city utah raising 8.5 million led gmg capital round ceo rick white describing provid\ ing\ next generation mobile enterprise platform simplifies delivery applications services end-users across distributed enterprise 2006 realm systems focuses id3 line products k9 product launch put indefinitely january 2007 two then-unidentified groups containing former realm systems employees investors attempted independently license move k9 hardware software separate company continue development production due dissolution realm systems continued developer community interest concept well rumored successful pilot programs one realm systems backers posted public foreclosure notice court-supervised foreclosure hearing number investors bid company assets closed bid result realm assets including id3 k9-series hardware operating systems enterprise management router code bought new firm echo identity systems registered salt lake city company february 1 2007 company claimed continuing enterprise product line re-used nearly old realm systems website layout graphics mention k9 product line made anywhere echo identity systems website former realm systems website redirected id3 blackdog customers transitional support website informing asset change realm systems closing product support would done echo identity systems though explanation extent support provided appears assets soon bought back echo identity systems group investors backed former realm systems employees investors based unconfirmed community reports september 2007 appears new developer prototypes k9 seeded project blackdog contest winners november 2007 new owners emerged inaura inc ceo president peter bookman one original co-founders realm systems cfo new company rodney rasmussen registered echo identity systems inaura utah company set sparse web site lacking specific product descriptions inaura inc. describes formerly known real systems inc. echo identity systems expired company june 2008 2008 aurora inc. website updated provide details company product k9 device branded k9 ultra mobile authentication key umak marketed solving problem trust within computing environments refers two iterations umaks k9 blackdog k9 product seems publicly sold since early 2009 february 2010 company name expired failing file renewal re-registered september 2011. expiring january 2013
[ 6204, 2765, 3368, 5571, 1237, 1167, 578, 4627 ]
Test
204
2
FreeDOS:freedos freedos formerly free-dos pd-dos free operating system ibm pc compatible computers intends provide complete dos-compatible environment running legacy software supporting embedded systems freedos booted floppy disk usb flash drive designed run well virtualization x86 emulation unlike versions ms-dos freedos composed free open-source software licensed terms gnu general public license therefore base distribution require license fees royalties creation custom distributions permitted however packages form part freedos project include non-gpl software considered worth preserving 4dos distributed modified mit license freedos project began 29 june 1994 microsoft announced would longer sell support ms-dos jim hall time student posted manifesto proposing development pd-dos public domain version dos within weeks programmers including pat villani tim norman joined project kernel villani command.com command line interpreter villani norman core utilities hall created pooling code written found available project maintained morgan hannibal toal many official pre-release distributions freedos final freedos 1.0 distribution gnu/dos unofficial distribution freedos discontinued version 1.0 released freedos 1.1 released 2 january 2012 available download cd-rom image limited install disc contains kernel basic applications full disc contains many applications games networking development etc available newer fuller 1.2 legacy version 1.0 2006 consisted two cds one 8mb install cd targeted regular users larger 49mb live cd also held source code project freedos used several companies freedos also used multiple independent projects freedos requires pc/xt machine least 640 kb memory programs bundled freedos often require additional system resources freedos mostly compatible ms-dos supports com executables standard dos executables borland 16-bit dpmi executables also possible run 32-bit dpmi executables using dos extenders operating system several improvements relative ms-dos mostly involving support newer standards technologies exist microsoft ended support ms-dos internationalization advanced power management tsrs furthermore use hx dos extender many windows console applications function properly freedos rare gui programs like qemm bochs freedos able run microsoft windows 1.0 2.0 releases windows 3.x releases support i386 processors fully run 386 enhanced mode except partially experimental freedos kernel 2037 problems running windows result microsoft efforts prevent products running non-microsoft dos implementations windows 95 windows 98 windows use stripped-down version ms-dos freedos used replacement undocumented interfaces ms-dos 7.0-8.0 windows 4.xx emulated freedos however installed used beside systems using boot manager program bootmgr metakern included freedos windows nt-based operating systems including windows 2000 xp vista 7 desktops windows server 2003 2008 2008 r2 servers make use ms-dos core component system systems make use fat file systems used ms-dos earlier versions windows however typically use ntfs new technology file system default security reasons freedos co-exist systems separate partition partition fat systems freedos kernel booted adding windows 2000 xp nt boot loader configuration file boot.ini freeldr.ini equivalent reactos fat32 fully supported preferred format boot drive depending bios used four logical block addressing lba hard disks 128 gb 2 tb size supported little testing large disks bioses support lba produce errors disks larger 32 gb driver ontrack ez-drive resolves problem freedos also used driver called lfndos enable support windows 95-style long file names old programs windows 95 support lfns even driver loaded unless recompiled planned support ntfs ext2 exfat several external third-party drivers available purpose access ext2 file systems ltools counterpart mtools sometimes used copy data ext2 file system drives blinky fish mascot freedos designed bas snabilie
[ 4670, 5021, 13, 3271, 3626, 5041, 5743, 7550, 405, 753, 1866, 65, 7581, 6489, 5783, 5784, 7223, 5088, 6500, 785, 2266, 788, 1522, 7605, 4387, 4759, 1534, 7246, 4397, 6175, 5116, 2300, 126, 4786, 6922, 6211, 5161, 5865, 7669, 6940, 861, ...
Validation
205
0
Message_Understanding_Conference:message understanding conference message understanding conferences muc initiated financed darpa defense advanced research projects agency encourage development new better methods information extraction character competition—many concurrent research teams competing one another—required development standards evaluation e.g adoption metrics like precision recall first conference muc-1 could participant choose output format extracted information second conference output format participants' systems would evaluated prescribed topic fields given filled information text typical fields example cause agent time place event consequences etc number fields increased conference conference sixth conference muc-6 task recognition named entities coreference added named entity phrases text supposed marked person location organization time quantity topics text sources processed show continuous move military civil themes mirrored change business interest information extraction taking place time
[ 1444, 4037, 1477 ]
Test
206
2
David_Korn_(computer_scientist):david korn computer scientist david g. korn b. brooklyn august 28 1943 american unix programmer author korn shell ksh command line interface/programming language david korn received undergraduate degree mathematics rensselaer polytechnic institute 1965 ph.d. applied mathematics nyu courant institute mathematical sciences 1969 working computer simulations transsonic airfoils developing korn airfoil switched fields computer science became member technical staff bell laboratories 1976 developed korn shell response problems colleagues commonly used shells time bourne shell c shell korn shell pioneered practice consultative user interface design input unix shell users mathematical cognitive psychologists user interface included choice editing styles choices included styles based vi two variants emacs incorporated copied subsequent unix shells korn shell backward-compatible bourne shell takes lot ideas c shell history viewing vi-like command line editing microsoft included version korn shell produced mortice kern systems mks unix integration package windows nt version compatible ksh88 korn shell specification korn mentioned question answer period microsoft presentation usenix nt conference seattle 1998 greg sullivan microsoft product manager participating presentation knowing commenter insisted microsoft indeed chosen real korn shell polite debate ensued sullivan continuing insist man giving criticisms mistaken compatibility issues sullivan backed audience member stood mentioned man making comments none eponymous david korn along korn shell also known creator uwin x/open library win32 systems similar later cygwin korn kiem-phong vo also co-developed sfio library managing i/o streams korn became bell labs fellow 1984 currently lives new york city 2013 worked labs research florham park new jersey working google david korn son adam works goldman sachs
[ 6256, 1243, 6046 ]
Train
207
4
PRTG_Network_Monitor:prtg network monitor prtg network monitor paessler router traffic grapher version 7 agentless network monitoring software paessler ag monitor classify system conditions like bandwidth usage uptime collect statistics miscellaneous hosts switches routers servers devices applications first version prtg released 29 may 2003 german company paessler gmbh paessler ag founded dirk paessler 2001 prtg network monitor auto-discovery mode scans predefined areas enterprise network creates device list data next step information detected devices retrieved using various communication protocols typical protocols ping snmp wmi netflow jflow sflow also communication via dicom restful api possible tool available windows systems addition paessler ag offers cloud-based monitoring solution prtg hosted paessler software based sensors configured specific purpose example http smtp/pop3 e-mail application sensors hardware-specific sensors switches routers servers prtg network monitor 200 different predefined sensors retrieve statistics monitored instances e.g response times processor memory database information temperature system status software operated completely via ajax-based web interface web interface suitable real-time troubleshooting data exchange non-technical staff via maps dashboards user-defined reports additional administration interface form desktop application windows macos available addition usual communication channels email sms notification also provided via push notification smartphones using app ios android prtg also offers customizable reports prtg network monitor licensing based sensors devices require 5-10 sensors fully monitored version 100 integrated sensors available free charge
[ 4387, 4759, 5571, 6062, 7778, 2219 ]
Test
208
4
Vault_7:vault 7 vault 7 series documents wikileaks began publish 7 march 2017 detail activities capabilities united states central intelligence agency perform electronic surveillance cyber warfare files dated 2013–2016 include details agency software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux february 2017 wikileaks began teasing release vault 7 series cryptic messages twitter according media reports later february wikileaks released classified documents describing cia monitored 2012 french presidential election press release leak stated published context forthcoming cia vault 7 series march 2017 us intelligence law enforcement officials said international wire agency reuters aware cia security breach led vault 7 since late-2016 two officials said focusing contractors possible source leaks 2017 federal law enforcement identified cia software engineer joshua adam schulte suspected source vault 7 first batch documents named year zero published wikileaks 7 march 2017 consisting 7,818 web pages 943 attachments purportedly center cyber intelligence already contains pages former nsa contractor leaker edward snowden nsa release wikileaks name source said files circulated among former u.s. government hackers contractors unauthorized manner one provided wikileaks portions archive according wikileaks source wishes initiate public debate security creation use proliferation democratic control cyberweapons since tools raise questions urgently need debated public including whether c.i.a hacking capabilities exceed mandated powers problem public oversight agency wikileaks redacted names identifying information documents release attempting allow connections people drawn via unique identifiers generated wikileaks also said would postpone releasing source code cyber weapons reportedly several hundred million lines long consensus emerges technical political nature c.i.a program 'weapons analyzed disarmed published wikileaks founder julian assange claimed part larger series cia released statement saying american public deeply troubled wikileaks disclosure designed damage intelligence community ability protect america terrorists adversaries disclosures jeopardize us personnel operations also equip adversaries tools information us harm assange held press conference 9 march offer share unpublished data vault 7 technology companies enable fix vulnerabilities detailed therein stated 1 total leak released much remainder leak included unpatched vulnerabilities working microsoft apple google get vulnerabilities patched would release information would put public risk fixes released manufacturers would release details vulnerabilities none vulnerabilities currently released zero-day exploits press release assange also read official statement microsoft stated microsoft desire next geneva convention would protect people government cyber weapons way previous geneva conventions protected noncombatants warfare statement issued 19 march 2017 assange said technology companies contacted agreed disagreed questioned termed wikileaks standard industry disclosure plan standard disclosure time vulnerability 90 days company responsible patching software given full details flaw according wikileaks mozilla provided information vulnerabilities google companies confirmed receiving initial notification wikileaks stated lagging companies conflicts interest due classified work us government agencies practice associations limit industry staff us security clearances fixing holes based leaked information cia companies choose secure users cia nsa attacks users may prefer organizations mozilla european companies prioritize users government contracts 23 march 2017 wikileaks published vault 7 part 2 dark matter publication includes documentation several cia efforts hack apple iphones macs 31 march 2017 wikileaks published vault 7 part 3 marble contained 676 source code files cia marble framework used obfuscate scramble malware code attempt make anti-virus firms investigators understand code attribute source according wikileaks code also included de-obfuscator reverse obfuscation effects 7 april 2017 wikileaks published vault 7 part 4 dubbed grasshopper publication contains 27 documents cia grasshopper framework used cia build customized persistent malware payloads microsoft windows operating systems grasshopper focused personal security product psp avoidance psps antivirus software ms security essentials symantec endpoint kaspersky 14 april 2017 wikileaks published vault 7 part 5 titled hive based cia top-secret virus program created embedded development branch edb six documents published wikileaks related hive multi-platform cia malware suite cia back-end infrastructure public-facing https interface used cia transfer information target desktop computers smartphones cia open devices receive commands cia operators execute specific tasks also called listening post lp command control c2 hiding presence behind unsuspicious-looking public domains masking interface known switchblade 21 april 2017 wikileaks published vault 7 part 6 code-named weeping angel hacking tool co-developed cia mi5 used exploit series smart tvs purpose covert intelligence gathering installed suitable televisions usb stick hacking tool enables televisions built-in microphones possibly video cameras record surroundings televisions falsely appear turned recorded data either stored locally television memory sent internet cia allegedly cia mi5 agencies collaborated develop malware coordinated work joint development workshops part 6 publication weeping angel second major cia hacking tool notably references british television show dr. alongside sonic screwdriver dark matter 28 april 2017 wikileaks published vault 7 part 7 scribbles leak includes documentation source code tool intended track documents leaked whistleblowers journalists embedding web beacon tags classified documents trace leaked tool affects microsoft office documents specifically microsoft office 2013 windows 8.1 x64 documents office versions 97-2016 office 95 documents work ocuments locked encrypted password-protected cia watermarked document opened invisible image within document hosted agency server loaded generating http request request logged server giving intelligence agency information opening opened however watermarked document opened alternative word processor image may visible viewer documentation also states document viewed offline protected view watermarked image able contact home server overridden user enables editing 5 may 2017 wikileaks published vault 7 part 8 archimedes according u.s. sans institute instructor jake williams analyzed published documents archimedes virus previously codenamed fulcrum according cyber security expert enisa member pierluigi paganini cia operators use archimedes redirect local area network lan web browser sessions targeted computer computer controlled cia sessions routed users type attack known man-in-the-middle mitm publication wikileaks included number hashes claim used potentially identify archimedes virus guard future paganini stated potential targeted computers search hashes systems check systems attacked cia 12 may 2017 wikileaks published vault 7 part 9 aftermidnight assassin aftermidnight malware installed target personal computer disguises dll file executed user computer reboots triggers connection cia command control c2 computer downloads various modules run assassin similar aftermidnight counterpart deceptively runs inside windows service process cia operators reportedly use assassin c2 execute series tasks collect periodically send user data cia listening post lp similar backdoor trojan behavior aftermidnight assassin run windows operating system persistent periodically beacon configured lp either request tasks send private information cia well automatically uninstall set date time 19 may 2017 wikileaks published vault 7 part 10 athena published user guide demo related documents created september 2015 february 2016 malware allegedly developed cia august 2015 roughly one month microsoft released windows 10 firm statements difficult compromise primary athena malware secondary malware named hera similar theory grasshopper aftermidnight malware significant differences one differences athena hera developed cia new hampshire private corporation called siege technologies bloomberg 2014 interview founder siege technologies confirmed justified development malware athena malware completely hijacks windows remote access services hera hijacks windows dnscache service also athena hera affect current versions windows including limited windows server 2012 windows 10 another difference types encryption used infected computers cia listening posts lp similarities exploit persistent dll files create backdoor communicate cia lp steal private data send cia servers delete private data target computer well command control c2 cia operatives send additional malicious software run specific tasks attacked computer designed deceive computer security software beside published detailed documents wikileaks provided evidence suggesting cia used athena 1 june 2017 wikileaks published vault 7 part 11 pandemic tool serves persistent implant affecting windows machines shared folders functions file system filter driver infected computer listens server message block traffic detecting download attempts computers local network pandemic answer download request behalf infected computer however replace legitimate file malware order obfuscate activities pandemic modifies replaces legitimate file transit leaving original server unchanged implant allows 20 files modified time maximum individual file size 800mb stated leaked documentation possible newly infected computers could become pandemic file servers allowing implant reach new targets local network 15 june 2017 wikileaks published vault 7 part 12 cherry blossom 22 june 2017 wikileaks published vault 7 part 13 brutal kangaroo 28 june 2017 wikileaks published vault 7 part 14 elsa 29 june 2017 wikileaks published vault 7 part 15 outlawcountry 6 july 2017 wikileaks published vault 7 part 16 bothanspy 13 july 2017 wikileaks published vault 7 part 17 highrise ucl raytheon 19 july 2017 imperial 27 july 2017 dumbo 3 august 2017 couchpotato 10 august 2017 wikileaks publishes secret documents expresslane project cia documents show one cyber operations cia conducts liaison services -- includes among many others national security agency nsa department homeland security dhs federal bureau investigation fbi ots office technical services branch within cia biometric collection system provided liaison services around world -- expectation sharing biometric takes collected systems 'voluntary sharing obviously work considered insufficient cia expresslane covert information collection tool used cia secretly exfiltrate data collections systems provided liaison services expresslane installed run cover upgrading biometric software ots agents visit liaison sites liaison officers overseeing procedure remain unsuspicious data exfiltration disguises behind windows installation splash screen core components ots system based products cross match us company specializing biometric software law enforcement intelligence community company hit headlines 2011 reported us military used cross match product identify osama bin laden assassination operation pakistan.- 24 august 2017 angelfire 31 august 2017 protego 7 september 2017 asked authenticity former director central intelligence agency michael hayden replied organization comment authenticity content purported intelligence documents however speaking condition anonymity current former intelligence officials said documents appear genuine edward snowden tweeted shortly documents release looked authentic robert m. chesney law professor university texas director technology public policy program center strategic international studies csis likened vault 7 nsa hacking tools disclosed 2016 group calling shadow brokers 15 march 2017 president donald trump stated interview cia hacked lot things taken following day statement democratic congressman adam schiff ranking member house intelligence committee wrote news release effort blame obama president appeared discussed something true accurate would otherwise considered classified information schiff also said president power declassify whatever wants wikileaks said documents came isolated high-security network situated inside cia center cyber intelligence cci langley virginia documents allowed wikileaks partially determine structure organization cci cci reportedly entire unit devoted compromising apple products cybersecurity firm symantec analyzed vault 7 documents found described software closely matched cyberattacks longhorn monitored since 2014 symantec previously suspected longhorn government-sponsored tracked usage 40 targets 16 countries first portion documents made public 7 march 2017 vault 7 year zero revealed top secret cia unit used german city frankfurt starting point hacking attacks europe china middle east according documents u.s. government uses consulate general office frankfurt hacker base cyber operations wikileaks documents reveal frankfurt hackers part center cyber intelligence europe ccie given cover identities diplomatic passports obfuscate customs officers gain entry germany chief public prosecutor general federal court justice karlsruhe peter frank announced 8 march 2017 government conducting preliminary investigation see launch major probe activities conducted consulate also broadly whether people germany attacked cia germany foreign minister sigmar gabriel social democratic party responded documents vault 7 year zero cia used frankfurt base digital espionage operations saying germany information cyber attacks documents reportedly revealed agency amassed large collection cyberattack techniques malware produced hackers library reportedly maintained cia remote devices branch umbrage group examples using techniques source code contained umbrage component library git repository according wikileaks recycling techniques third-parties umbrage cia increase total number attacks also mislead forensic investigators disguising attacks work groups nations among techniques borrowed umbrage file wiping implementation used shamoon according pc world techniques code snippets used cia internal projects whose end result inferred leaks pc world noted practice planting false flags deter attribution new development cyberattacks russian north korean israeli hacker groups among suspected using false flags according study kim zetter intercept umbrage probably much focused speeding development repurposing existing tools rather planting false flags robert graham ceo errata security told intercept source code referenced umbrage documents extremely public likely used multitude groups state actors graham added conclusively say evidence documents 're creating snippets code use projects 're reusing methods code find internet ... elsewhere talk obscuring attacks ca n't see coming concrete plan false flag operation 're trying say 'we 're going make look like russia day vault 7 documents first released wikileaks described umbrage substantial library attack techniques 'stolen malware produced states including russian federation tweeted cia steals groups virus malware facilitating false flag attacks conspiracy theory soon emerged alleging cia framed russian government interfering 2016 u.s. elections conservative commentators sean hannity ann coulter speculated possibility twitter rush limbaugh discussed radio show russian foreign minister sergey lavrov said vault 7 showed cia could get access 'fingerprints use cybersecurity writers ben buchanan kevin poulsen skeptical theories poulsen wrote leaked catalog n't organized country origin specific malware used russian dnc hackers nowhere list documents describe marble framework string obfuscator used hide text fragments malware visual inspection part program foreign languages used cover source cia hacks according wikileaks reached 1.0 2015 used cia throughout 2016 release wikileaks described primary purpose marble insert foreign language text malware mask viruses trojans hacking attacks making difficult tracked cia cause forensic investigators falsely attribute code wrong nation source code revealed marble examples chinese russian korean arabic persian languages us main cyber-adversaries – china russia north korea iran analysts called wikileaks description marble main purpose inaccurate telling hill main purpose probably avoid detection antivirus programs marble also contained deobfuscator tool cia could reverse text obfuscation security researcher nicholas weaver international computer science institute berkeley told washington post appears one technically damaging leaks ever done wikileaks seems designed directly disrupt ongoing cia operations hammerdrill cd/dvd collection tool collects directory walks files configured directory filename pattern well logging cd/dvd insertion removal events v2.0 adds gap jumping capability trojans 32-bit executables burned disc nero additionally v2.0 adds status termination on-demand collection feature controlled hammerdrillstatus.dll hammerdrillkiller.dll hammerdrillcollector.dll logging also fingerprints discs hashing first two blocks iso image enables unique identification multi-sessions discs even data added removed log also logs anytime hammerdrill trojaned binary seen disc wikileaks released first installment vault 7 year zero apple stated many issues leaked today already patched latest ios company continue work rapidly address identified vulnerabilities 23 march 2017 wikileaks released dark matter second batch documents vault 7 series detailing hacking techniques tools focusing apple products developed embedded development branch edb cia leak also revealed cia targeting iphone since 2008 year device released edb projects attacked apple firmware meaning attack code would persist even device rebooted dark matter archive included documents 2009 2013 apple issued second statement assuring based initial analysis alleged iphone vulnerability affected iphone 3g fixed 2009 iphone 3gs released additionally preliminary assessment showed alleged mac vulnerabilities previously fixed macs launched 2013 wikileaks said 19 march 2017 twitter cia secretly exploiting vulnerability huge range cisco router models discovered thanks vault 7 documents cia learned year ago exploit flaws cisco widely used internet switches direct electronic traffic enable eavesdropping cisco quickly reassigned staff projects turn focus solely analyzing attack figure cia hacking worked could help customers patch systems prevent criminal hackers spies using similar methods 20 march cisco researchers confirmed study vault 7 documents showed cia developed malware could exploit flaw found 318 cisco switch models alter take control network cisco issued warning security risks patches available cisco provided mitigation advice electronic tools reportedly compromise apple ios google android operating systems adding malware android operating system tools could gain access secure communications made device according wikileaks android smartphone penetrated agency collect audio message traffic encryption applied agency software reportedly able gain access messages sent instant messaging services method accessing messages differs obtaining access decrypting already encrypted message encryption messengers offer end-to-end encryption telegram whatsapp signal n't reported cracked encryption bypassed capturing input encryption applied methods keylogging recording touch input user commentators among snowden cryptographer security pundit bruce schneier observed wikileaks incorrectly implied messaging apps underlying encryption compromised implication turn reported period new york times mainstream outlets one document reportedly showed cia researching ways infect vehicle control systems wikileaks stated purpose control specified would permit cia engage nearly undetectable assassinations statement brought renewed attention conspiracy theories surrounding death michael hastings documents refer windows fax dll injection exploit windows xp windows vista windows 7 operating systems would allow user malicious intents hide malware dll another application however computer must already compromised another method injection take place 7 march 2017 edward snowden commented importance release stating reveals united states government developing vulnerabilities us products intentionally keeping holes open considers highly reckless 7 march 2017 nathan white senior legislative manager internet advocacy group access writes 8 march 2017 lee mathews contributor forbes wrote hacking techniques described vault 7 already known many cybersecurity experts 8 march 2017 note revealed techniques tools likely used targeted surveillance revealed edward snowden press conference assange stated leaks content least means engage targeted attacks expensive might trail also stated exposed cia automated implant branch develops uses viruses also automates done may approach level bulk intersection 8 april 2017 ashley gorski american civil liberties union staff attorney called critical understand vulnerabilities exploited government foreign governments cyber criminals around world justin cappos professor computer science engineering department new york university asks government knows problem phone bad guys could use hack phone ability spy weakness use counterterrorism spying capabilities problem fix everyone 8 april 2017 cindy cohn executive director international non-profit digital rights group based san francisco electronic frontier foundation said c.i.a walking past front door saw lock broken least tell maybe even help get fixed worse lost track information kept criminals hostile foreign governments know broken lock furthermore stated cia failed accurately assess risk disclosing vulnerabilities even spy agencies like cia responsibility protect security privacy americans freedom private conversation – free worry hostile government rogue government agent competitor criminal listening – central free society strict privacy laws europe fourth amendment us constitution guarantee right free unreasonable searches seizures 12 may 2017 microsoft president chief legal officer brad smith wrote emerging pattern 2017 seen vulnerabilities stored cia show wikileaks words smith expressed concern fact cia stockpiled computer vulnerabilities turn stolen failed inform microsoft timely fashion security breach result privacy security customers around world potentially negatively affected extended period caused widespread damage
[ 704, 2190, 376, 3277, 2923, 5393, 740, 2587, 3323, 1501, 5779, 7600, 5452, 4025, 1528, 4759, 2991, 1173, 6526, 6904, 6541, 6194, 2678, 3393, 3038, 5509, 3047, 6569, 2693, 860, 862, 3057, 2343, 7307, 6589, 3426, 1996, 7328, 4492, 907, 41...
Test
209
4
Coppersmith's_attack:coppersmith attack coppersmith attack describes class cryptographic attacks public-key cryptosystem rsa based coppersmith method particular applications coppersmith method attacking rsa include cases public exponent e small partial knowledge secret key available public key rsa system tuple integers formula_1 n product two primes p q secret key given integer satisfying formula_2 equivalently secret key may given formula_3 formula_4 chinese remainder theorem used improve speed decryption see crt-rsa encryption message produces ciphertext formula_5 decrypted using formula_6 computing formula_7 order reduce encryption signature-verification time useful use small public exponent formula_8 practice common choices formula_8 3 17 65537 formula_10 values e fermat primes sometimes referred formula_11 formula_12 respectively formula_13 chosen make modular exponentiation operation faster also chosen formula_8 simpler test whether formula_15 formula_16 generating testing primes step 1 key generation values formula_17 formula_18 fail test rejected even better e prime greater 2 test formula_19 replace expensive test formula_20 public exponent small plaintext formula_21 short rsa function may easy invert makes certain attacks possible padding schemes ensure messages full lengths additionally choosing public exponent formula_22 recommended value used signature-verification requires 17 multiplications opposed 25 random formula_8 similar size used unlike low private exponent see wiener attack attacks apply small formula_8 used far total break would recover secret key powerful attacks low public exponent rsa based following theorem due coppersmith theorem states existence algorithm efficiently find roots formula_34 modulo formula_35 smaller formula_36 formula_37 gets smaller algorithm runtime decrease theorem strength ability find small roots polynomials modulo composite formula_35 simplest form håstad attack presented ease understanding general case uses coppersmith method suppose one sender sends message formula_39 encrypted form number people formula_40 using small public exponent formula_8 say formula_42 different moduli formula_43 simple argument shows soon formula_44 ciphertexts known message formula_45 longer secure suppose eve intercepts formula_46 formula_47 formula_48 may assume formula_49 formula_50 otherwise possible compute factor one formula_51 ’ computing formula_52 chinese remainder theorem may compute formula_53 formula_54 formula_55 however since formula_56 formula_57 formula_58 thus formula_59 holds integers eve compute cube root formula_60 obtain formula_45 larger values formula_8 ciphertexts needed particularly formula_8 ciphertexts sufficient håstad also showed applying linear-padding formula_39 prior encryption protect attack assume attacker learns formula_65 formula_66 linear function formula_67 i.e. bob applies pad message formula_45 prior encrypting recipients receive slightly different messages instance formula_45 formula_21 bits long bob might encrypt formula_71 send formula_57-th recipient large enough group people involved attacker recover plaintext formula_73 ciphertext similar methods generality håstad proved system univariate equations modulo relatively prime composites applying fixed polynomial formula_74 could solved sufficiently many equations provided attack suggests randomized padding used rsa encryption since formula_51 relatively prime chinese remainder theorem might used compute coefficients formula_88 satisfying formula_89 formula_90 formula_91 setting formula_92 know formula_93 since formula_94 nonzero formula_95 also nonzero degree formula_95 formula_18 coppersmith ’ theorem may compute integer roots formula_98 satisfying formula_99 formula_100 however know formula_101 formula_39 among roots found coppersmith theorem theorem applied problem broadcast rsa following manner suppose formula_57-th plaintext padded polynomial formula_104 formula_105 formula_106 true coppersmith ’ method used attack succeeds formula_107 formula_78 number messages original result used håstad ’ variant instead full coppersmith method result required formula_109 messages formula_110 franklin-reiter identified new attack rsa public exponent formula_42 two messages differ known fixed difference two messages rsa encrypted rsa modulus formula_35 possible recover let formula_113 alice public key suppose formula_114 two distinct messages satisfying formula_115 publicly known polynomial formula_116 send formula_117 formula_118 alice bob may naively encrypt messages transmit resulting ciphertexts formula_119 eve easily recover formula_120 given formula_119 using following theorem arbitrary formula_8 rather restricting formula_42 time required quadratic formula_8 formula_130 since formula_135 know formula_118 root polynomial formula_137 similarly formula_118 root formula_139 linear factor formula_140 divides polynomials therefore eve calculates greatest common divisor gcd formula_141 formula_142 gcd turns linear formula_118 found gcd computed quadratic time formula_8 formula_130 using euclidean algorithm like håstad ’ franklin-reiter ’ attack attack exploits weakness rsa public exponent formula_42 coppersmith showed randomized padding suggested håstad used improperly rsa encryption secure suppose bob sends message formula_45 alice using small random padding encrypting attacker eve intercepts ciphertext prevents reaching destination bob decides resend formula_45 alice alice respond message randomly pads formula_45 transmits resulting ciphertext eve two ciphertexts corresponding two encryptions message using two different random pads even though eve know random pad used still recover message formula_45 using following theorem random padding short define formula_168 formula_169 know formula_170 polynomials formula_171 common root words formula_172 root resultant formula_173 furthermore formula_174 hence formula_175 small root formula_176 modulo formula_35 eve efficiently find using coppersmith method formula_175 known franklin-reiter attack used recover formula_118 consequently formula_45
[ 6049, 3277, 6672, 2566, 1353 ]
Test
210
4
Underhanded_C_Contest:underhanded c contest underhanded c contest programming contest turn code malicious passes rigorous inspection looks like honest mistake even discovered contest rules define task malicious component entries must perform task malicious manner defined contest hide malice contestants allowed use c-like compiled languages make programs contest organized dr. scott craver department electrical engineering binghamton university new york state contest initially inspired daniel horn ’ obfuscated v contest fall 2004 2005 2008 contests prize 100 gift certificate thinkgeek 2009 contest prize increased 200 due late announcement winners prize 2013 contest also 200 gift certificate 2005 contest task basic image processing resampling smoothing covertly inserting unique useful fingerprinting data image winning entries 2005 used uninitialized data structures reuse pointers embedding machine code constants 2006 contest required entries count word occurrences vastly different runtimes different platforms accomplish task entries used fork implementation errors optimization problems endian differences various api implementation differences winner called strlen loop leading quadratic complexity optimized linux compiler windows 2007 contest required entries encrypt decrypt files strong readily available encryption algorithm low percentage 1 0.01 encrypted files may cracked reasonably short time contest commenced april 16 ended july 4 entries used misimplementations rc4 misused api calls incorrect function prototypes 2008 contest required entries redact rectangular portion ppm image way portion may reconstructed method blocking rectangle allowed long original pixels removed pixel reconstruction n't perfect although reconstruction fidelity original file would factor judging contest began june 12 ended september 30 entries tended either xor region retrievable pseudo-random mask append masked data end file format two placing programs used improperly defined macros winner choosing work uncommon text based format zeroed pixel values keeping number digits intact 2009 contest required participants write program sifts routing directives redirects piece luggage based innocuous-looking comment space-delimited input data file contest began december 29 2009 due end march 1 2010 however activity occurred three years winners announced april 1 2013 one overall winner six runners-up 2013 contest announced april 1 2013 due july 4 2013 results announced september 29 2014 fictional social website called obsessbook challenge write function compute derpcon degrees edge-reachable personal connection two users accidentally computes low distance special user 2014 contest announced november 2 2014 due january 1 2015 results announced june 1 2015 object write surveillance code twitter-like social networking service comply secret government surveillance request non-obvious reasons code must subtly leak act surveillance user general approach obfuscate writes user data writing surveillance data winning entry implementing buggy time-checking function overwrites input 2015 contest announced august 15 2015 due november 15 2015 results announced january 15 2016 scenario nuclear disarmament process peoples glorious democratic republic alice glorious democratic peoples republic bob alice bob mission write test function comparing potentially fissile material reference sample certain circumstances would label warhead containing fissile material n't around third submissions used nan poisioning erronous floating-point operations generates nan later computation always evaluates false comparison
[ 2173, 7151, 6515, 6419, 3426, 3680, 2733, 3698, 651, 1376, 2577, 5401, 6823, 1766, 5190, 3071, 2789, 74, 2354, 1435, 880 ]
Validation
211
1
Australian_Heritage_Database:australian heritage database australian heritage database listing heritage sites australia maintained department environment water heritage arts australia consultation australian heritage council twenty thousand entries database includes natural historic indigenous places lists covered database
[]
Test
212
6
Steganographic_file_system:steganographic file system steganographic file systems kind file system first proposed ross anderson roger needham adi shamir paper proposed two main methods hiding data series fixed size files originally consisting random bits top 'vectors could superimposed way allow levels security decrypt lower levels even know existence higher levels entire partition filled random bits files hidden steganographic file system using second scheme files merely stored stored encrypted entire partition randomized encrypted files strongly resemble randomized sections partition files stored partition easy way discern meaningless gibberish actual encrypted files furthermore locations files derived key files locations hidden available programs passphrase leads problem quickly files overwrite birthday paradox compensated writing files multiple places lessen chance data loss may seem point file system guaranteed either grossly inefficient storage space-wise cause data loss corruption either data collisions loss key addition complex system poor read/write performance performance goal stegfs rather stegfs intended thwart rubberhose attacks usually work encrypted files distinguishable regular files authorities coerce user user gives keys files distinguishable regular files however since steganographic file system number files unknown every byte looks like encrypted byte authorities know many files hence keys stored user plausible deniability — say innocuous files none anybody without keys gainsay user poul-henning kamp criticized threat model steganographic file systems paper gbde observing certain coercive situations especially searched-for information fact stored steganographic file systems possible subject get hook proving keys surrendered methods exist method laid one implemented stegfs possible steganographically hide data within image e.g pngdrive audio files- scramdisk linux loop device generally steganographic file system implemented steganographic layer supplies storage mechanism example steganographic file system layer existing mp3 files file contains chunk data part file system final product file system hardly detected depending steganographic layer store kind file regular file system hierarchy truecrypt allows hidden volumes two passwords open different volumes file one volumes contains secret data
[ 3599, 2547, 7161, 4672, 6431, 3626, 2566, 5049, 1480, 6117, 759, 6477, 6854, 5437, 4375, 6500, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 27...
Train
213
2
Ebuild:ebuild ebuild specialized bash script automates compilation installation procedures software packages format created gentoo linux project use portage software management system version application package portage repository specific ebuild script written script used emerge tool also created gentoo linux project calculate dependencies desired software installation download required files patch necessary configure package based use flag settings compile perform sandboxed installation /var/tmp/portage/ ebuild name /image/ default upon successful completion steps installed files merged live system outside sandbox although ebuilds found gentoo portage repository used compile programs source code also ebuilds install binary packages ebuilds install documentation data fonts basic ebuilds called metabuilds whose sole purpose trigger installation ebuilds gnome kde metabuilds
[ 1361, 1807, 7555, 6988, 3366, 3889, 4832, 3042 ]
Test
214
9
Programming_language_generations:programming language generations programming languages classified several programming language generations historically classification used indicate increasing power programming styles later writers somewhat redefined meanings distinctions previously seen important became less significant current practice terms first generation second generation programming language used prior coining term third-generation none three terms mentioned early compendiums programming languages introduction third generation computer technology coincided creation new generation programming languages marketing generational shift machines correlated several important changes called high level programming languages discussed giving technical content second/third-generation distinction among high level programming languages well reflexively renaming machine code languages first generation assembly languages second generation initially programming languages higher level assembly termed third-generation later term fourth-generation introduced try differentiate new declarative languages prolog domain-specific languages claimed operate even higher level domain even closer user e.g natural language level original imperative high level languages pascal c algol fortran basic etc generational classification high level languages 3rd generation later never fully precise later perhaps abandoned precise classifications gaining common usage object-oriented declarative functional c gave rise c++ later java c lisp clos ada ada 2012 even cobol cobol2002 new languages emerged generation well
[ 6507, 4220, 6888, 6712, 304, 1435, 1662, 2866, 5948, 4078, 684, 336, 4543, 6497, 2803, 5190 ]
Test
215
8
Dynata:dynata dynata formerly research global online sampling digital data collection company providing market research insights clients initially founded 1999 dallas texas hal brierley mort meyerson company called e-rewards inc. e-rewards grown fast 100,000 clients months named 2007 inc. magazine one america fastest growing companies december 2009 e-rewards inc. acquired research plc co-founded chris havemann andrew cooper headquartered london england time research publicly listed london stock exchange ’ aim market integration process company re-branded globally one name research company went acquire smaller businesses including peanut labs inc. 2010 2015 january 2015 private equity firm court square acquired research group inc. similar time private equity firm hggc acquired majority stake rival market research firm survey sampling international ssi 2017 two pe firms announced would merging two market research firms january 2019 combined research ssi renamed dynata dynata used track online consumer website history look collect data purchasing behavior company also composes proposes surveys users get accurate clarified responses broad-based consumers gathered data company conducts up-to-date market research determine trends occurring around world aside gathering information purchasing behaviors company guarantees protect consumer unauthorized personal data since handheld technology developed become core part society company started look mobile research tools company gives surveys mobile users get idea mobile panel tastes
[]
Test
216
3
Operand_forwarding:operand forwarding operand forwarding data forwarding optimization pipelined cpus limit performance deficits occur due pipeline stalls data hazard lead pipeline stall current operation wait results earlier operation yet finished forwarding method exploiting instruction-level parallelism ilp add b c a=b+c two assembly pseudocode instructions run pipeline fetching decoding second instruction pipeline stalls waiting result addition written read cpu control unit must implement logic detect dependencies operand forwarding makes sense multiplexer used select proper register flip-flop read operand
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, 895, ...
Validation
217
4
Robert_Morris_(cryptographer):robert morris cryptographer robert h. morris sr. july 25 1932 – june 26 2011 american cryptographer computer scientist morris born boston massachusetts parents walter w. morris salesman helen kelly morris received bachelor degree mathematics harvard university 1957 master degree applied mathematics harvard 1958 married anne farlow three children together robert tappan morris author 1988 morris worm meredith morris benjamin morris 1960 1986 morris researcher bell labs worked multics later unix morris contributions early versions unix include math library bc programming language program codice_1 password encryption scheme used user authentication encryption scheme invented roger needham based using trapdoor function called key derivation function compute hashes user passwords stored file codice_2 analogous techniques relying different functions still use today 1986 morris began work national security agency nsa served chief scientist nsa national computer security center involved production rainbow series computer security standards retired nsa 1994 told reporter nsa helped fbi decode encrypted evidence description morris clifford stoll book cuckoo egg many readers stoll book remember morris giving stoll challenging mathematical puzzle originally due john h. conway course discussions computer security next number sequence 1 11 21 1211 111221 known look-and-say sequence stoll chose include answer puzzle cuckoo egg frustration many readers robert morris died lebanon new hampshire
[ 4447, 5946, 5503, 3037, 7710, 6470, 5932, 218, 6018, 4626, 6020, 1805, 6046 ]
Validation
218
9
Robert_Tappan_Morris:robert tappan morris robert tappan morris born november 8 1965 american computer scientist entrepreneur best known creating morris worm 1988 considered first computer worm internet morris prosecuted releasing worm became first person convicted then-new computer fraud abuse act went co-found online store viaweb one first web-based applications later funding firm combinator—both paul graham later joined faculty department electrical engineering computer science massachusetts institute technology received tenure 2006 elected national academy engineering 2019 morris born 1965 parents robert morris anne farlow morris senior morris computer scientist bell labs helped design multics unix later became chief scientist national computer security center division national security agency nsa morris grew millington section long hill township new jersey graduated delbarton school 1983 morris attended harvard university later went graduate school cornell first year designed computer worm disrupted many computers fledgling internet led indicted year later serving conviction term returned harvard complete ph.d. supervision h.t kung completed ph.d. 1999 morris worm developed 1988 graduate student cornell university released worm mit rather cornell worm exploited several vulnerabilities gain entry targeted systems including worm programmed check computer found determine infection already present however morris believed administrators might try defeat worm instructing computer report false positive compensate possibility morris directed worm copy anyway 14 time matter response infection-status interrogation level persistence design flaw created system loads brought attention system administrators also disrupted target computers ensuing trial estimated cost potential loss productivity caused worm efforts remove different systems ranged 200 53,000 1989 morris indicted violating united states code title 18 computer fraud abuse act first person indicted act december 1990 sentenced three years probation 400 hours community service fine 10,050 plus costs supervision appealed motion rejected following march morris stated motive trial demonstrate inadequacies current security measures computer networks exploiting security defects discovered completed sentence 1994 morris principal research interest computer network architectures includes work distributed hash tables chord wireless mesh networks roofnet longtime friend collaborator paul graham addition founding two companies together graham dedicated book ansi common lisp morris named programming language generates online stores web pages rtml honor graham lists morris one personal heroes saying never wrong
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1478, 2218, 4704, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 1889, 795, 6876, 6888, 1557, 5494, 5501, 6210, 144, 4074, 4085, 7298, 5515, 8025, 3749, 6949, 5883, 1243, 6955, 4837, 1616, ...
Test
219
9
RAMIS_(software):ramis software ramis random access management information system fourth-generation programming language 4gl capable creating maintaining databases consisting named files containing numeric alphabetic fields subsequently producing detailed simple complex reports using simple english like language easily mastered non-programmers typical program either create maintain database create quite complex reports would normally consist handful lines code could written understood non-professional programmers end users became known end users could trained use ramis matter days large companies would often several hundred users scattered throughout company ramis initially developed mid 1960s company mathematica consulting contract marketing study team headed gerald cohen subsequently developed marketed general purpose data management analysis tool late 1960s cohen fell management mathematica left form company shortly thereafter new company released new product called focus similar ramis bugs misspelled error messages national css ncss time-sharing vendor licensed rights make ramis available vp/css system point mathematica changed licensing price interested parties programming team remained mathematica almost sales force time ramis double digits client companies us european division headquartered london mathematica decided create new division called mathematica products group rename product ramis ii time company decided recall frank fish originally mathematica consultant assigned lead european consulting team subsequently formed european ramis group head ramis ii design team international sales sales ramis ii focus continued grow 1980s throughout western world ramis ii generally outselling focus mainframes though detailed figures available ramis ii eventually installed 40 countries worldwide mathematica eventually grew 500 staff roughly 200 involved ramis ii company largely owned group professors mathematics economics princeton university group aged opted cash selling martin marietta corporation subsequently lockheed martin 1983 ramis ii continued grow another 4 years top people ramis ii design sales quit reaction policy changes imposed lockheed martin roughly 2 years later lockheed martin sold ramis ii group another software firm whose background culture different mathematica unable make success product turn sold product another company maintenance revenue 1987 ramis sold on-line software international acquired current owners computer associates time company purchased computer associates ca technologies results ramis syntax described initial timesharing/mainframe product positively accepted initial pc version n't get reception
[ 2866, 7546 ]
Train
220
2
Team_OS/2:team os/2 team os/2 advocacy group formed promote ibm os/2 operating system originally internal ibm formal ibm support team os/2 successfully converted grassroots movement formally supported directed ibm consisting well ten thousand os/2 enthusiasts within without ibm one earliest examples online viral phenomenon cause attracting supporters primarily online communications decline team os/2 largely coincided ibm abandonment os/2 coinciding attacks orchestrated microsoft os/2 team os/2 ibm early attempts online evangelism team os/2 significant factor spread acceptance os/2 formed february 1992 team os/2 began ibm employee dave whittle recently appointed ibm evangelize os/2 online formed internal ibm discussion group titled teamos2 forum ibm worldwide network time served individuals academic internet forum header stated purpose forum went viral increasing numbers ibmers worldwide began contribute wide variety ideas ibm could effectively compete microsoft establish os/2 industry standard desktop operating system within short time thousands ibm employees added words teamos2 internet phone directory listing enabled anyone within ibm find like-minded os/2 enthusiasts within company work together overcome challenges posed ibm size insularity top-down marketing style teamos2 forum quickly caught attention ibm executives including lee reiswig lucy baney initial scepticism offered moral financial support whittle grass roots online marketing efforts ibm official program generating word-of-mouth enthusiasm called os/2 ambassador program os/2 enthusiasts company-wide could win gold silver bronze ambassador pins corporate recognition various levels structured achievement os/2 ambassador program team os/2 effective evangelizing os/2 within ibm team os/2 effective generating support promotion os/2 outside ibm whittle began extend team os/2 effort outside ibm various posts compuserve prodigy bulletin boards newsgroups venues also made proposal ibm executives eventually implemented ibm personal software products moved austin texas form grass roots marketing department team os/2 went external spring first team os/2 party held chicago ibm marketing office chicago created huge banner visible streets microsoft reacted steve ballmer roamed floor application diskette specially programmed crash os/2 os/2 enthusiasts gathered evening excitement first team os/2 party tickets limited requested one online discussion groups attendees asked nominate favorite teamer team os/2 hall fame whose names drawn came forward tell story nominee sacrifice made promote os/2 deserving recognition prizes included limousine rides evening end attendees received first team os/2 t-shirt includes first team os/2 logo front distinctive ibm blue-stripe logo back except lower-case letters ibm/2 represent new ibm even lead singer band chicago provided music event asked could t-shirt member band one ibm executive attendance said first ibm event given goosebumps word team os/2 phenomenon spread even quickly within ibm without os/2 enthusiasts spread word computer user groups across united states eventually worldwide independently ibm marketing efforts whittle established multiple localized forums within ibm teamny teamdc teamfl teamtx teamca attracted new supporters enabled enthusiastic followers share ideas success stories plan events creatively apply learning one another teamer invasion comdex fall 1993 perhaps high water mark team os/2 comdex time important computer electronics trade show held las vegas wearing salmon-colored shirts become associated team os/2 group members led doug azzarito keith wood mike kogan ibm user group manager gene barlow others wandered convention floors promoting os/2 providing demo discs vendors offering install distributed version os/2 display computers many team os/2 volunteers traveled convention including overseas independence grass-roots enthusiasm attracted significant attention media amongst exhibitors little funding ibm provided went provide shirts trinkets trash onsite headquarters teamers coordinate efforts collect items give vendors ibm established grass roots marketing department proposed earlier even tapped vicci conway janet gobeille provide support guidance team os/2 whittle voluntarily stepping aside previous day-to-day focus supporting monitoring team os/2 activities janet nicknamed team godmother everyone ibm especially whittle wary trying direct volunteers make team os/2 structured formal order avoid breaking something works according team os/2 frequently asked questions document team os/2 one point presence sponsoring members willing publish e-mail addresses points contact argentina australia austria belgium canada denmark germany ireland japan latvia netherlands portugal singapore south africa spain sweden switzerland united kingdom well online america online compuserve delphi fidonet genie internet/usenet/mail servers prodigy wwivnet article analyzing team os/2 meaning context robert l. scheier listed several factors led success group included creation strong group identity powerful name corporate support without corporate direction ability volunteer members things companies could n't keeping loose relatively unstructured providing lots smaller material rewards without compensation listening team members eyes ears public however team os/2 lack structure left vulnerable various journalists documented dirty tricks campaign microsoft online numerous individuals nicknamed microsoft munchkins john c. dvorak used pseudonyms attack os/2 manipulate online discussions whittle target widespread online character assassination campaign journalists less enthusiastic os/2 received death threats nasty emails numerous sources identified taglines team os/2 without name whether attack pattern part microsoft efforts team os/2 identity never proven ultimately least microsoft efforts exposed zachmann canopus forum compuserve owner one particular account ostensibly belonging steve barkto attacking os/2 david barnes whittle os/2 fans discovered funded credit card rick segal high-level microsoft employee evangelist also active forums james fallows nationally renowned journalist weighed state stylistic fingerprint found barkto posts almost certainly match stylistic fingerprints microsoft evangelist postings zachmann sent open letter steve ballmer futilely demanding public investigation business practices publicly traded microsoft height marketing effort team os/2 consisted ten thousand known members countless undocumented members ibm acknowledged publicly without team os/2 might fourth generation warp 4 operating system however ibm marketing director grass roots marketing department made decision meet headcount cut targets eliminating entire department one week 1995 fall comdex microsoft executives said positively gleeful team os/2 members worldwide said incredulous within months whittle barlow left ibm conway gobeille reassigned within ibm teamers crushed ibm announcement marketing individual desktop versions would come close team members eventually migrated away os/2 linux offered power stability come expect os/2 much learned team os/2 inspired least linux open source movements microsoft attempted fabricate team nt comdex fall 1995 widely ridiculed blatant attempt impersonation team nt members microsoft employees called team nice try industry pundits spencer f. katt pen name various contributors paul connolly pcweek magazine microsoft readying first version windows nt designated version 3.1 1993 texas computer user group hal-pc invited ibm microsoft public shootout two operating systems videotape two demonstrations later distributed ibm team os/2 members compared dynamic presentation given david barnes put os/2 paces microsoft presenter nt showed poorly microsoft demanded portions nt presentation cut videotapes ibm distributing event resulted issuance edited version tape hundreds original complete copies already released uncut version os/2 nt shootout tape dubbed os/2 nt shootdown shootdown flight 31 tape used train professional software hardware presenters might face user groups
[ 5644, 3060 ]
Test
221
4
Mile2:mile2 mile2 information technology security company develops provides proprietary accredited cybersecurity certifications company technology security programs utilized private public sectors including boeing canada department national defense national security agency united states air force committee national security systems cnss u.s. federal bureau investigation others mile2 developed provides 15 internationally recognized proprietary cybersecurity certifications accredited cnss 4011-4016 approved national initiative cybersecurity security careers studies niccs training schedule department homeland security january 13 2013 mile2 entered collaborative partnership merit network provide cybersecurity courseware certifications michigan cyber range company also involved training u.s. veterans private sector opportunities cybersecurity holding training sessions veterans around nation
[ 7192, 6694, 5255, 3517, 1034, 1805 ]
Validation
222
2
Microsoft_Assistance_Markup_Language:microsoft assistance markup language microsoft assistance markup language microsoft aml generally referred maml xml-based markup language developed microsoft user assistance platform team provide user assistance online help microsoft windows vista operating system maml also used provide help information powershell cmdlets modules advanced functions maml departure previous types user assistance windows operating systems features available .net framework 2 options shipped release .net framework 3 previously user assistance windows operating systems used files created command line compiler hhc.exe compiler used compile .hhp project file .hhc table contents file .hhk index file collection html topic files related resources css javascript image files one .chm file significant aspect maml shifts production user assistance concept structured authoring somewhat similar dita docbook documents constituent elements defined context maml emphasis content tasks user performs computer features software presentation managed part rendering engine user requests topic maml authoring structure divided segments related type content conceptual faq glossary procedure reference reusable content task troubleshooting tutorial present microsoft released automated tools assist creation maml need create xml files hand three levels transformation occur topic displayed structure presentation rendering unfortunately decent tool available pros author maml use notepad pretty tedious james o'neil former msft employee shows use infopath author information far perfect article suggests
[ 6618, 5, 7710, 3222, 241 ]
Test
223
3
Nightshade_(1985_video_game):nightshade 1985 video game nightshade action video game developed published ultimate play game first released zx spectrum 1985 ported amstrad cpc bbc micro later year also ported msx exclusively japan 1986 game player assumes role knight sets destroy four demons plague-infested village game features flip-screen isometric gameplay similar vein predecessors knight lore alien 8 addition nightshade features enhanced version ultimate play game filmation game engine branded filmation ii game received positive reviews upon release critics praised gameplay traits graphics colours however one critic divided perceived similarities predecessors game presented isometric format player assumes role knight enters plague-infested village nightshade vanquish four demons reside within additionally residents village transformed vampires supernatural creatures contact monsters infects knight repeated contact turning character white yellow green lead character death knight may hit three times enemy however fourth hit result life deducted objective game locate destroy four specific demons demon vulnerable particular object must collected player hammer bible crucifix hourglass four items collected player must track specific demon cast correct item order destroy four demons destroyed game end order defend enemies vampires monsters player arm antibodies thrown enemies antibodies found houses around village slowly deplete used player collectible items include extra lives boots latter enables player character run faster speed ultimate play game founded brothers tim chris stamper along tim wife carol headquarters ashby-de-la-zouch 1982 began producing multiple video games zx spectrum throughout early 1980s company known reluctance reveal details operations upcoming projects little known development process except used work separate teams one team would work graphics whilst would concentrate aspects sound programming journalist reviewing nightshade crash asked tim chris stamper object game responded oh ca n't tell game developed isometric projection game engine known filmation ii upgraded version filmation engine filmation engine created stamper brothers portray 3d imagery filmation ii used image masking technique drew filled holes background allowing game create composite structures pixelated drawings without visual overlay despite limitations platforms zx spectrum offered nightshade first released united kingdom zx spectrum 1985 ported amstrad cpc bbc micro later year also ported msx exclusively japan 1986 game received positive reviews upon release chris bourne sinclair user praised game new graphics system opining wonderfully detailed juiced contrast predecessors knight lore alien 8 reviewer writing computer video games praised graphics great stated sound effects standard considering dumb zx spectrum philippa irving crash thought visuals use colours stunning ultimate play game usual standards however notice instances attribute clash reviewer writing computer gamer asserted graphics good ever however admitted game seemed lacking comparison ultimate play game recent releases chris jenkins popular computing weekly opined game interior visuals looked like featureless squares however admitted game background drops detailed gameplay also praised reviewers bourne opined game well-paced similar vein arcade-style games however noted sense déjà vu game concept stating developer games starting wear thin reviewer computer video games appreciated nightshade nice touches summarising instant classic ultimate play game irving criticised lack instructions hints came game stated nightshade set new standards programming unlike knight lore alien 8 however irving admitted game still another technically brilliant game reviewer computer gamer enjoyed wide range gameplay elements stating enough hold attention hours reviewer home computing weekly stated gameplay addictive knight lore alien 8 due game lack obstacles jenkins praised game use new engine filmation ii stating ahead everything else zx spectrum
[ 2904, 6397, 1980, 6434, 3022, 4060, 1517 ]
Test
224
3
Windows_Embedded_Compact:windows embedded compact windows embedded compact formerly windows embedded ce windows ce operating system subfamily developed microsoft part windows embedded family products unlike windows embedded standard based windows nt windows embedded compact uses different hybrid kernel microsoft licenses windows ce original equipment manufacturers oems modify create user interfaces experiences windows ce providing technical foundation current version windows embedded compact supports x86 arm processors board support package bsp directly mips shx architectures support prior version 7.0 7.0 still works mipsii architecture windows ce optimized devices minimal memory windows ce kernel may run one megabyte memory devices often configured without disk storage may configured closed system allow end-user extension instance burned rom windows ce conforms definition real-time operating system deterministic interrupt latency version 3 onward system supports 256 priority levels uses priority inheritance dealing priority inversion fundamental unit execution thread helps simplify interface improve execution time first version known development code name pegasus featured windows-like gui number microsoft popular apps trimmed smaller storage memory speed palmtops day since windows ce evolved component-based embedded real-time operating system longer targeted solely hand-held computers many platforms based core windows ce operating system including microsoft autopc pocket pc 2000 pocket pc 2002 windows mobile 2003 windows mobile 2003 se windows mobile 5 windows mobile 6 smartphone 2002 smartphone 2003 portable media center zune windows phone many industrial devices embedded systems windows ce even powered select games dreamcast operating system gizmondo handheld partially run modified xbox game consoles distinctive feature windows ce compared microsoft operating systems large parts offered source code form first source code offered several vendors could adjust hardware products like platform builder integrated environment windows ce os image creation integration customized operating system designs based ce offered several components source code form general public however number core components need adaptation specific hardware environments cpu family still distributed binary form windows embedded compact formerly known windows ce according microsoft ce explicit acronym anything although implies number notions windows developers mind compact connectable compatible companion efficient name changed 2006 release windows embedded ce 6.0 2011 release windows embedded compact 7 windows ce originally announced microsoft comdex expo 1996 demonstrated stage bill gates john mcgill microsoft testing pegasus early 1995 released strict reference platform several hardware partners devices following minimum hardware specifications devices time mainly 480×240 pixel displays exception hewlett-packard 'palmtop pc 640×240 display window took full display navigation done tapping double tapping item contextual menu also available user pressing alt key tapping screen windows ce 1.0 include cascading start menu unlike windows 95 windows nt 4.0 microsoft released windows ce 1.0 power toys included cascading menu icon appeared system tray also bundled several utilities notable sound applet system tray enabling user quickly mute unmute device adjust volume 'pocket version paint release windows ce 2.0 well received microsoft learned lessons consumer feedback windows ce 1.0 made many improvements operating system start menu cascading menu identical found windows 95 windows nt 4.0 color screens also supported manufacturers raced release first color h/pc first market however hewlett packard hp 620lx windows ce 2.0 also supported broader range cpu architectures programs could also installed directly os double clicking cab files due nature roms contained operating system users able flash devices newer operating system instead manufacturers released upgrade roms users physically install devices removing previous version would usually wipe data device present user setup wizard upon first boot microsoft visual studio 2012 2013 2015 support apps platform builder development windows embedded compact 2013 microsoft visual studio 2008 earlier support projects older releases windows ce/windows mobile producing executable programs platform images either emulator attached cable actual mobile device mobile device necessary develop ce program .net compact framework supports subset .net framework projects c visual basic .net managed c++ managed apps employing .net compact framework also require devices significantly larger memories 8 mb unmanaged apps still run successfully smaller devices visual studio 2010 windows phone developer tools used extension allowing windows phone 7 apps designed tested within visual studio free pascal introduced windows ce port version 2.2.0 targeting arm x86 architectures later windows ce header files translated use lazarus rapid application development rad software package based free pascal windows ce apps designed coded lazarus integrated development environment ide compiled appropriate cross compiler programming tool used building platform bsp kernel device drivers shared source custom made also apps one stop environment get system running one also use platform builder export sdk software development kit target microprocessor superh x86 mips arm etc used another associated tool set named embedded visual c++ evc tool development embedded apps windows ce used standalone using sdk exported platform builder using platform builder platform manager connectivity setup codegear delphi prism runs visual studio also supports .net compact framework thus used develop mobile apps employs oxygene compiler created remobjects software targets .net .net compact framework mono command-line compiler available free charge basic4ppc programming language similar visual basic targets .net compact framework supports windows ce windows mobile devices glbasic easy learn use basic dialect compiles many platforms including windows ce windows mobile extended writing inline c/c++ code labview graphical programming language supporting many platforms including windows ce autohotkey port open source macro-creation automation software utility available windows ce allows construction macros simple gui apps developed systems analyst jonathan maxian timkang often windows ce windows mobile pocket pc used interchangeably part due common origin practice entirely accurate windows ce modular/componentized operating system serves foundation several classes devices modules provide subsets components features e.g varying levels windowing support dcom vs com others separate bitmap truetype font support others add additional features another component one buy kit platform builder contains components tools develop custom platform apps excel mobile formerly pocket excel part kit older handheld pc version pocket word several older apps included samples however windows mobile best described subset platforms based windows ce underpinning currently pocket pc called windows mobile classic smartphone windows mobile standard pocket pc phone edition windows mobile professional three main platforms windows mobile umbrella platform uses different components windows ce plus supplemental features apps suited respective devices pocket pc windows mobile microsoft-defined custom platforms general pda use consisting microsoft-defined set minimum profiles professional edition premium edition software hardware supported rules manufacturing pocket pc device stricter producing custom windows ce-based platform defining characteristics pocket pc touchscreen primary human interface device extremely portable size ce v3.0 basis pocket pc 2002 successor ce v3.0 ce.net pocketpc separate layer code top core windows ce os ... pocket pc based windows ce different offering licensees pocket pc forbidden modify wince part smartphone platform feature-rich os interface cellular phone handsets smartphone offers productivity features business users email multimedia abilities consumers smartphone interface relies heavily joystick navigation phonepad input devices running smartphone include touchscreen interface smartphone devices generally resemble cellular handset form factors whereas phone edition devices use pda form factor larger display
[ 362, 4670, 6428, 3955, 7172, 4687, 26, 1097, 1842, 740, 37, 4336, 5055, 1864, 422, 6136, 1128, 3664, 771, 5781, 5442, 6499, 7950, 4377, 4017, 5794, 786, 444, 6865, 447, 448, 1522, 4751, 5803, 7605, 458, 4759, 7616, 1536, 5110, 108, 26...
Test
225
9
Greg_Nelson_(computer_scientist):greg nelson computer scientist charles gregory greg nelson 27 march 1953 – 2 february 2015 american computer scientist nelson grew honolulu boy excelled gymnastics tennis attended university laboratory school received b.a degree mathematics harvard university 1976 received ph.d. computer science stanford university 1980 supervision robert tarjan lived juneau year settling permanently san francisco bay area thesis work influenced program verification automated theorem proving especially area known satisfiability modulo theories contributed techniques combining decision procedures well efficient decision procedures quantifier-free constraints first-order logic term algebra received herbrand award 2013 instrumental development simplify theorem prover used esc/java also made significant contributions several areas contributed area programming language design member modula-3 committee distributed systems contributed network objects made pioneering contributions constraint-based graphics editors juno juno-2 window systems trestle optimal code generation denali multi-threaded programming eraser
[ 3069 ]
Test
226
3
Bugaboo_(The_Flea):bugaboo flea bugaboo flea later published spain la pulga computer game created 1983 spanish team programmers paco paco zx spectrum later versions commodore 64 amstrad msx produced bugaboo besides first video game made spain one first computer games include cut scenes publication marked official beginning golden era spanish software ported amstrad cpc name roland caves exploit cpc recurring roland character sequel released spain opera soft title poogaboo made paco suarez one authors original game paco portalo member paco paco left project publication original game zx spectrum player takes control flea fallen cavern must escape game begins animation depicting bugaboo small yellow creature two extremely long legs jumping around colourful planet accidentally falling crack planet surface falling bottom cavern player must control bugaboo guide back top cavern safety planet surface two control keys left right key held gauge bottom screen begins fill key released bugaboo jump direction strength jump determined long key held cavern made various rocky ledges bugaboo may land however stand flat area jump mistimed bugaboo may end angled area rock miss ledge altogether cause fall straight landing whatever bugaboo may fall distance without dying way player lose life bugaboo make contact large yellow dragon wanders around cave bugaboo escape dragon carefully leaping away taking refuge inside one smaller caverns located around play area reviews overwhelmingly positive crash giving game 92 computer video games awarding 8/10 game month personal computer games giving 7/10 computer number one january 1984 crash said bugaboo high quality arcade standard game highly addictive game definitely top seller personal computer games said ... like challenge patient though easy get back top computer video games praised game breath-taking graphics perfect animation decided ... fresh original approach game design combined produce yet another top rate game tony hetherington computer gamer magazine included game spectrum collection 15 classic games spectrum owners game popularity spawned creation book 2009 entitled bugaboo un hito en la historia del software español francisco portalo calero i.e. paco portalo one original authors game published universidad de extremadura available online
[]
Validation
227
3
Match_Day_II:match day ii match day ii football sports game part match day series released amstrad cpc amstrad pcw zx spectrum msx commodore 64 platforms created 1987 jon ritman graphics bernie drummond music sound guy stevens except commodore version line-by-line conversion john darnell controls consist four directions allowing eight directions including diagonals shot button team seven players including goalkeeper league cup options available game considered highly addictive due difficulty level complete control ball direction power elevation using diamond deflection system importance tactics player positioning field barging necessary makes challenging break strong defences first game use kickometer versions game play song saints go marching players walking initial positions field beginning half zx spectrum version game went number 2 uk sales charts behind run voted 10th best game time special issue sinclair magazine 2004 matchday ancestor videogame also another version game zx spectrum 128kb international match day including national teams game similar previous unpublished game jon ritman soccerama later 1995 jon ritman tried release match day iii due copyright problems change name game super match soccer
[ 3869 ]
Validation
228
4
Gerald_R._Young:gerald r. young gerald r. young american intelligence official deputy director national security agency 1988 1990 director william o. studeman time highest ranking civilian agency time nsa also held position deputy director plans policy
[ 202, 4988, 7191, 7895, 7917, 4666, 258, 3335, 7568, 4727 ]
Validation
229
5
UDP_Helper_Address:udp helper address udp helper address special router configuration used forward broadcast network traffic client machine one subnet server another subnet internet protocol requires every network interface assigned least one unique ip address groups machines similar addresses considered part logical subnet one method assigning ip addresses dhcp addresses typically issued dhcp server running one hosts one machines subnet clients dhcp server respond broadcast dhcp requests issue address dhcp servers may hosted different subnet default routers pass broadcast messages nodes outside subnet resolve udp helper address established router configuration forward broadcast network traffic outside local subnet dhcp client outside dhcp server subnet broadcasts address request helper forwards message dhcp server server chooses address sends client unicast message using helper send message back client subnet address reserved limited time dhcp server waits response client responds another broadcast message dhcp server distributes address helper addresses also used forward udp traffic example bootp cisco first implementation protocol introduced version 10 router software implemented use router configuration commands codice_1 codice_2 enable forwarding user datagram protocol udp broadcasts including bootp received interface use ip helper-address command interface configuration mode disable forwarding broadcast packets specific addresses use form command ip helper-address vrf name global address redundancy vrg-name use udp helper addresses cause issues windows based network configurations see microsoft knowledge base details according microsoft issues stem fact ports 137,138 forwarded default cisco routers since ports used netbios help determine network configuration added broadcasts confuse system
[ 3821, 2335, 3172, 2119, 4014 ]
Test
230
4
Web_application_firewall:web application firewall web application firewall waf filters monitors blocks http traffic web application waf differentiated regular firewall waf able filter content specific web applications regular firewalls serve safety gate servers inspecting http traffic prevent attacks stemming web application security flaws sql injection cross-site scripting xss file inclusion security misconfigurations application firewalls control input output access applications services first developed early 1990s gene spafford bill cheswick marcus ranum product largely network-based firewall could handle applications like ftp rsh released market dec within next years products developed researchers provide stable firewall software others build raised bar industry dedicated web application firewalls entered market later decade web server hacker attacks becoming much noticeable first company offer dedicated web application firewall perfecto technologies appshield product focused e-commerce market protected illegal web page character entries perfecto renamed sanctum named top ten web application hacking techniques laid foundations waf market 2002 open source project modsecurity formed order make waf technology accessible solve obstacles within industry like business cases cost barriers proprietary rule-sets modsecurity finalized core rule set protecting web applications based oasis web application security technical committee ’ tc vulnerability work 2003 work expanded standardized open web application security project ’ owasp top 10 list annual ranking web security vulnerabilities list would become industry benchmark many compliance themes since market continued grow evolve involving larger commerce industry rise credit card fraud development payment card industry data security standard pci dss standard organizations increase controls cardholder data security regulated sparked wide-scale interest industry according ciso magazine waf market size expected grow 5.48 billion 2022 web application firewall special type application firewall applies specifically web applications deployed front web applications analyzes bi-directional web-based http traffic detecting blocking anything malicious owasp provides broad technical definition waf “ security solution web application level technical point view depend application itself. ” according pci dss information supplement requirement 6.6 waf defined “ security policy enforcement point positioned web application client endpoint functionality implemented software hardware running appliance device typical server running common operating system may stand-alone device integrated network components. ” words waf virtual physical appliance prevents vulnerabilities web applications exploited outside threats vulnerabilities may application legacy type insufficiently coded design waf addresses code shortcomings special configurations rule-sets also known policies previously unknown vulnerabilities discovered penetration testing via vulnerability scanner web application vulnerability scanner also known web application security scanner defined samate nist 500-269 “ automated program examines web applications potential security vulnerabilities addition searching web application-specific vulnerabilities tools also look software coding errors. ” resolving vulnerabilities commonly referred remediation corrections code made application typically prompt response necessary situations application custom policy unique web application vulnerability provide temporary immediate fix known virtual patch may necessary wafs ultimate security solution rather meant used conjunction network perimeter security solutions network firewalls intrusion prevention systems provide holistic defense strategy wafs typically follow positive security model negative security combination mentioned sans institute wafs use combination rule-based logic parsing signatures detect prevent attacks cross-site scripting sql injection owasp produces list top ten web application security flaws commercial waf offerings cover ten flaws minimum non-commercial options well mentioned earlier well-known open source waf engine called modsecurity one options waf engine alone insufficient provide adequate protection therefore owasp along trustwave spiderlabs help organize maintain core-rule set via github use modsecurity waf engine although names operating mode may differ wafs basically deployed inline three different ways according nss labs deployment options transparent bridge transparent reverse proxy reverse proxy 'transparent refers fact http traffic sent straight web application therefore waf transparent client server contrast reverse proxy waf acts proxy client ’ traffic sent directly waf waf separately sends filtered traffic web applications provide additional benefits ip masking may introduce disadvantages performance latency many commercial wafs similar features major differences often refer user interfaces deployment options requirements within specific environments notable vendors include notable open-source applications include
[ 7232, 623, 3932, 5365, 1919, 2291, 651, 7262, 3706, 7319, 3637, 1566, 1019, 5064, 330, 758, 7848, 6305, 74, 1328, 4741, 6592, 3756, 1805, 6868 ]
Test
231
9
Factory_method_pattern:factory method pattern class-based programming factory method pattern creational pattern uses factory methods deal problem creating objects without specify exact class object created done creating objects calling factory method—either specified interface implemented child classes implemented base class optionally overridden derived classes—rather calling constructor factory method design pattern one gang four design patterns describe solve recurring design problems design flexible reusable object-oriented software objects easier implement change test reuse factory method design pattern solves problems like creating object directly within class requires uses object inflexible commits class particular object makes impossible change instantiation independently without change class factory method design pattern describes solve problems enables writing subclasses change way object created redefine class instantiate br see also uml class diagram define interface creating object let subclasses decide class instantiate factory method lets class defer instantiation uses subclasses gang four creating object often requires complex processes appropriate include within composing object object creation may lead significant duplication code may require information accessible composing object may provide sufficient level abstraction may otherwise part composing object concerns factory method design pattern handles problems defining separate method creating objects subclasses override specify derived type product created factory method pattern relies inheritance object creation delegated subclasses implement factory method create objects uml class diagram codice_1 class requires codice_2 object n't instantiate codice_3 class directly instead codice_1 refers separate codice_5 create product object makes codice_1 independent concrete class instantiated subclasses codice_1 redefine class instantiate example codice_8 subclass implements abstract codice_5 instantiating codice_3 class maze game may played two modes one regular rooms connected adjacent rooms one magic rooms allow players transported random codice_11 base class final product codice_12 codice_13 codice_14 declares abstract factory method produce base product codice_12 codice_13 subclasses base product implementing final product codice_17 codice_18 subclasses codice_14 implementing factory method producing final products thus factory methods decouple callers codice_14 implementation concrete classes makes new operator redundant allows adherence open/closed principle makes final product flexible event change code c code see creation one interface called iperson two implementations called villager cityperson based type passed factory object returning original concrete object interface iperson factory method addition factory class creates object class interfaces hand also lets subclass decide class instantiated see used makeproduct concretefactory result easily call makeproduct get iproduct might also write custom logic getting object concrete factory method getobject made abstract factory interface java example similar one book design patterns mazegame uses rooms puts responsibility creating rooms subclasses create concrete classes regular game mode could use template method snippet codice_14 constructor template method makes common logic refers codice_22 factory method encapsulates creation rooms rooms used subclass implement game mode magic rooms suffices override codice_22 method another example php follows time using interface implementations opposed subclassing however achieved subclassing important note factory method also defined public called directly client code contrast java example java example factory pattern deals instantiation objects without exposing instantiation logic words factory actually creator objects common interface 'empty vocabulary actual object public interface iperson end interface public class villager end class public class cityperson end class public enum persontype end enum public class factory end class
[ 5014, 3686, 6415, 4031, 2638, 2827, 1730, 5650, 3368, 1554, 6025, 6029, 7924, 235, 3396, 7391, 5510, 1407, 517, 6224, 2961, 5965, 1803 ]
Test
232
5
Message_Oriented_Text_Interchange_Systems:message oriented text interchange systems message-oriented text interchange system motis iso messaging standard based itu-t x.400 standards plays similar role simple mail transfer protocol smtp tcp/ip protocol suite
[ 6908, 743 ]
Test
233
9
Semipredicate_problem:semipredicate problem computer programming semipredicate problem occurs subroutine intended return useful value fail signalling failure uses otherwise valid return value problem caller subroutine tell result means case division operation yields real number fails divisor zero write function performs division might choose return 0 invalid input however dividend 0 result 0 means number return uniquely signal attempted division zero since real numbers range division early programmers dealt potentially exceptional cases case division using convention required calling routine check validity inputs calling division function two problems first greatly encumbers code performs division common operation second violates n't repeat encapsulation principles former eliminating duplicated code latter suggests data associated code contained one place case verification input done separately imagine complicated computation division could hard caller know considered invalid input cases figuring whether input valid may costly performing entire computation also possibility target function modified expecting different preconditions ones caller checked change would require changes places function called semipredicate problem universal among functions fail function range cover entire data type defined function value known impossible normal computation used example consider function codice_1 takes string substring returns integer index substring main string search fails function may programmed return -32,768 negative value since never signify successful result solution problems though overloads natural meaning function arbitrary convention first programmer must remember specific failure values many functions course identical functions different domains second different implementation function may choose use different failure value resulting possible bugs programmers move environment environment third failing function wishes communicate useful information failed one failure value insufficient fourth signed integer halves possible index range able store sign bit many languages allow one mechanism another function return multiple values available function redesigned return boolean value signalling success failure addition primary return value multiple error modes possible function may instead return enumerated return code error code addition primary return value various techniques returning multiple values include similar argument global variable store error occurred simply whether error occurred instance error occurs signalled generally illegal value like −1 unix errno variable set indicate value occurred using global usual drawbacks thread safety becomes concern modern operating systems use thread-safe version errno one error global used type must wide enough contain interesting information possible errors system exceptions one widely used scheme solving problem error condition considered return value function normal control flow disrupted explicit handling error takes place automatically example out-of-band signalling c common approach possible use data type deliberately wider strictly needed function example standard function codice_3 defined return type codice_4 returns unsigned char success value codice_5 implementation-defined outside range 0 255 end input read error languages pointers references one solution return pointer value rather value return pointer set null indicate error typically suited functions return pointer anyway performance advantage oop style exception handling drawback negligent programmers may check return value resulting crash invalid pointer used common pattern unix environment setting separate variable indicate cause error example c standard library fopen function scripting languages php lisp usual approach return false none null function call fails works returning different type normal return type thus expanding type dynamically-typed equivalent returning null pointer example numeric function normally returns number int float zero might valid response false similarly function normally returns string might sometimes return empty string valid response return false failure process type-juggling necessitates care testing return value e.g php use === i.e equal type rather == i.e equal automatic type-conversion works original function meant return boolean value still requires information error conveyed via means haskell functional programming languages common use data type big needs express possible result example could write division function returned type codice_6 codice_7 function returning codice_8 first option type one failure value codice_9 second case tagged union result either string descriptive error message successfully read character haskell type inference system helps ensure callers deal possible errors since error conditions become explicit function type looking signature immediately tells programmer treat errors addition tagged unions option types form monads endowed appropriate functions may used keep code tidy automatically propagating unhandled error conditions
[ 790, 7005, 7071, 7277, 6029, 4543, 5965, 1445, 3238, 7370, 5311, 993, 1435 ]
Test
234
3
PowerPC_e700:powerpc e700 powerpc e700 ng-64 next generation 64-bit codenames freescale first 64-bit embedded risc-processor cores 2004 freescale announced new high performance core much known would multi core multithreaded design using corenet technology shared e500mc core would three issue core double precision fpu roadmaps showed target frequency 3+ ghz manufactured 32 nm process chips would named mpc87xx scheme freescale released core similar specifications june 2010 called e5500
[ 5097, 7327, 2719, 3348, 3936, 1075, 1346, 5100, 4479, 2458, 1454, 1083, 4408, 5652, 912, 7361, 2845, 3708, 7905, 7990, 5665, 6111, 4702, 1199, 1386, 7654, 7099, 2133, 2501, 239, 6474, 2781, 8125, 4815, 2785, 1131, 5079, 5614, 2257, 7133, ...
Train
235
9
Iterator_pattern:iterator pattern object-oriented programming iterator pattern design pattern iterator used traverse container access container elements iterator pattern decouples algorithms containers cases algorithms necessarily container-specific thus decoupled example hypothetical algorithm searchforelement implemented generally using specified type iterator rather implementing container-specific algorithm allows searchforelement used container supports required type iterator iterator design pattern one twenty-three well-known gof design patterns describe solve recurring design problems design flexible reusable object-oriented software objects easier implement change test reuse problems iterator design pattern solve defining access traversal operations aggregate interface inflexible commits aggregate particular access traversal operations makes impossible add new operations later without change aggregate interface solution iterator design pattern describe different iterators used access traverse aggregate different ways br new access traversal operations defined independently defining new iterators see also uml class sequence diagram essence iterator pattern provide way access elements aggregate object sequentially without exposing underlying representation. uml class diagram codice_1 class refers 1 codice_2 interface creating codice_3 object codice_4 2 codice_3 interface traversing codice_2 object codice_7 codice_8 class implements codice_3 interface accessing codice_10 class uml sequence diagram shows run-time interactions codice_1 object calls codice_4 codice_10 object creates codice_8 object returns codice_1 codice_1 uses codice_8 traverse elements codice_10 object languages standardize syntax c++ python notable examples .net framework special interfaces support simple iteration codice_19 non-generic collection codice_20 generic collection c statement codice_21 designed easily iterate collection implements codice_19 and/or codice_20 interface since c v2 codice_21 also able iterate types implement codice_25 codice_20 example using codice_21 statement c++ implements iterators semantics pointers language c++ class overload pointer operations iterator implemented acts less like pointer complete dereference increment decrement advantage c++ algorithms codice_28 immediately applied plain old memory buffers new syntax learn however requires end iterator test equality rather allowing iterator know reached end c++ language say iterator models iterator concept java interface simple example showing return integers start end using codice_3 import java.util.iterator import java.util.nosuchelementexception public class rangeiteratorexample java 5 objects implementing interface returns codice_3 method traversed using java foreach loop syntax interface java collections framework extends codice_31 example class codice_32 implementing codice_31 interface import java.util.iterator import java.util.set class family e implements iterable e class codice_34 demonstrates use class codice_32 public class iterableexample output ron weasley molly weasley percy weasley fred weasley charlie weasley george weasley arthur weasley ginny weasley bill weasley javascript part ecmascript 6 supports iterator pattern object provides codice_36 method returns object two specific properties codice_37 codice_38 example shows reverse array iterator time though want provide iterator semantics objects iterated automatically via codice_39 loops javascript built-in types codice_40 codice_41 codice_42 already define iteration behavior achieve effect defining object meta codice_43 method also referred codice_44 creates iterable object example range function generates list values starting codice_45 codice_46 exclusive using regular codice_47 loop generate numbers iteration mechanism built-in types like strings also manipulated php supports iterator pattern via iterator interface part standard distribution objects implement interface iterated codice_21 language construct example patterns using php string 15 design patterns python prescribes syntax iterators part language language keywords codice_47 work python calls sequences sequence codice_50 method returns iterator object iterator protocol requires codice_36 return next element raise codice_52 exception upon reaching end sequence iterators also provide codice_50 method returning also iterated e.g. using codice_47 loop generators available since 2.2 python 3 codice_36 renamed codice_56
[ 2176, 2451, 5014, 3686, 6415, 4031, 2638, 2827, 6172, 1730, 109, 5650, 1554, 6025, 6029, 231, 7924, 3396, 7391, 1407, 517, 6224, 2961, 5965, 2530 ]
Train
236
9
Squirrel_(programming_language):squirrel programming language squirrel high level imperative object-oriented programming language designed lightweight scripting language fits size memory bandwidth real-time requirements applications like video games hardware electric imp mirthkit simple toolkit making distributing open source cross-platform 2d games uses squirrel platform used extensively scripting also used also used left 4 dead 2 portal 2 thimbleweed park scripted events squirrel uses c-like syntax language made public 2003 zlib/libpng license november 2010 license changed mit license enable project hosted google code developed maintained alberto demichelis
[ 1616, 6507, 2451, 6172, 6428, 379, 1361, 3368, 5571, 5043, 5965, 3915, 1803 ]
Test
237
9
JavaScript_engine:javascript engine javascript engine computer program executes javascript code first javascript engines mere interpreters relevant modern engines utilize just-in-time compilation improved performance javascript engines typically developed web browser vendors every major browser one browser javascript engine runs concert rendering engine via document object model use javascript engines limited browsers example chrome v8 engine core component popular node.js runtime system since ecmascript standardized specification javascript ecmascript engine another name engines first javascript engine created brendan eich 1995 netscape navigator web browser rudimentary interpreter nascent language eich invented evolved spidermonkey engine still used firefox browser first modern javascript engine v8 created google chrome browser v8 debuted part chrome 2008 performance much better prior engine key innovation just-in-time compilation significantly improve execution times browser vendors needed overhaul interpreters compete apple developed nitro engine safari browser 30 better performance predecessor mozilla leveraged portions nitro improve spidermonkey engine opera replaced interpreter carakan engine twice fast cases since 2017 browsers added support webassembly enables use pre-compiled executables performance-critical portions page scripts javascript engines execute webassembly code sandbox regular javascript code
[ 183, 5629, 2451, 4755, 5984, 4296, 893, 6172, 3092, 5998, 4315, 6002, 1177, 562, 2658, 831, 7734, 313, 1016, 3719, 2040, 6368, 3559, 3985, 54, 2420, 3398, 2870, 6660, 422, 155, 6221, 340, 3663, 5172, 3057, 3495, 3584, 6400, 7687, 6778, ...
Validation
238
2
DSOS:dsos dsos deep six operating system real-time operating system sometimes referred operating system kernel developed texas instruments geophysical services division gsi mid-1970s geophysical services division texas instruments main business search oil would collect data likely spots around world process data using high performance computers produce analyses guided oil companies toward promising sites drilling much oil sought found beneath ocean hence gsi maintained fleet ships collect seismic data remote regions world order properly essential ships navigated precisely find evidence oil ca n't mark x tree oil thousands feet ocean typically hundreds miles land decade gps existed thus processing load keep accurate picture considerable geonav systems used dsos frailey 1975 operating system performed required navigation addition collected processed stored seismic data received real-time name deep six operating system brainchild phil ward subsequently world-renowned gps expert time manager project slightly skeptical computer science professor dennis frailey insisted operating system solution problem hand sense system lived name according legend supposedly one ships hit old world war ii sea mine coast egypt sank navigated geonav dsos 1970s real-time applications use operating systems latter perceived adding much overhead typical computers time barely enough computing power handle tasks hand moreover software type written assembly language consequence real-time systems classic examples spaghetti code complex masses assembly language software using sorts machine-dependent tricks achieve maximum performance dsos ran texas instruments 980 minicomputer used marine navigation gsi fleet dsos created bring order chaos typical real-time system design time 980 time relatively powerful small computer offered memory protection multiple-priority interrupt capabilities dsos designed exploit features dsos frailey 1975 one pioneering efforts real-time operating systems incorporating many principles introduced time mainframe systems semaphores memory management task management software interrupts used clever scheme assure appropriate real-time performance providing many services previously uncommon real-time domain orderly way communicate external devices computer operators multitasking maintenance records disciplined form inter-task communication reliable real-time clock memory protection debugging support remained use least three decades demonstrated well designed operating system actually make real-time system faster vastly maintainable typical today almost real-time applications use operating systems type
[ 7605, 5110, 6994, 5571, 4336, 224, 6918, 1023, 4890, 336, 7396, 4631, 3664, 861, 771, 5962, 7312, 7950 ]
Validation
239
3
Xenon_(processor):xenon processor microsoft xcpu codenamed xenon cpu used xbox 360 game console used ati xenos graphics chip processor developed microsoft ibm ibm chip program codenamed waternoose named henry j. waternoose iii monsters inc. development program originally announced 2003-11-03 processor based ibm powerpc instruction set architecture consists three independent processor cores single die cores slightly modified versions ppe cell processor used playstation 3 core two symmetric hardware threads smt total six hardware threads available games individual core also includes 32 kib l1 instruction cache 32 kib l1 data cache xcpu processors manufactured ibm east fishkill new york fabrication plant chartered semiconductor manufacturing part globalfoundries singapore chartered reduced fabrication process 2007 65 nm 90 nm thus reducing manufacturing costs microsoft xbox 360 introduced xcgpu integrated xenon cpu xenos gpu onto die edram package xcgpu follows trend started integrated ee+gs playstation 2 slimline combining cpu gpu memory controllers io single cost-reduced chip also contains front side bus replacement block connects cpu gpu internally exactly manner front side bus would done cpu gpu separate chips xcgpu n't change hardware characteristics xbox 360 xcgpu contains 372 million transistors manufactured globalfoundries 45 nm process compared original chipset xbox 360 combined power requirements reduced 60 physical chip area 50 illustrations different generations processors xbox 360 xbox 360
[ 4661, 3936, 1075, 1083, 5042, 4702, 4718, 6839, 6474, 1131, 2248, 2257, 3674, 786, 450, 3348, 4759, 4408, 3708, 1199, 4815, 6226, 522, 3747, 1237, 1244, 4839, 6597, 7327, 2719, 4847, 3440, 912, 7361, 6294, 234, 602, 8125, 608, 4200, 562...
Test
240
3
Single_instruction,_multiple_threads:single instruction multiple threads single instruction multiple thread simt execution model used parallel computing single instruction multiple data simd combined multithreading processors say number seem execute many tasks achieved processor multiple threads work-items sequence simd lane operations execute lock-step analogous simd lanes simt execution model implemented several gpus relevant general-purpose computing graphics processing units gpgpu e.g supercomputers combine cpus gpus simt introduced nvidia ati technologies amd released competing product slightly later may 14 2007 terascale 1-based r600 gpu chip access time widespread ram types e.g ddr sdram gddr sdram xdr dram etc still relatively high engineers came idea hide latency inevitably comes memory access strictly latency-hiding feature zero-overhead scheduling implemented modern gpus might might considered property 'simt simt intended limit instruction fetching overhead i.e latency comes memory access used modern gpus nvidia amd combination 'latency hiding enable high-performance execution despite considerable latency memory-access operations processor oversubscribed computation tasks able quickly switch tasks would otherwise wait memory strategy comparable multithreading cpus confused multi-core downside simt execution fact thread-specific control-flow performed using masking leading poor utilization processor threads follow different control-flow paths instance handle else block various threads processor execute different paths threads must actually process paths threads processor always execute lock-step masking used disable enable various threads appropriate masking avoided control flow coherent threads processor i.e follow path execution masking strategy distinguishes simt ordinary simd benefit inexpensive synchronization threads processor
[ 5012, 6793, 5371, 3948, 7529, 1833, 5737, 4694, 5042, 1481, 5055, 2226, 1117, 1867, 2961, 2248, 3667, 2969, 6148, 441, 4742, 5447, 4047, 1546, 4049, 5483, 5487, 6198, 1568, 1570, 3041, 7666, 1586, 515, 8024, 5521, 3747, 1237, 6236, 534, ...
Test
241
9
ConTeXt:context context general-purpose document processor especially suited structured documents automated document production fine typography multi-lingual typesetting based part tex typesetting system uses document markup language manuscript preparation typographical automated capabilities context extensive including interfaces handling microtypography multiple footnotes footnote classes manipulating opentype fonts features moreover offers extensive support colors backgrounds hyperlinks presentations figure-text integration conditional compilation gives user extensive control formatting making easy create new layouts styles without learning low-level tex macro language context may compared contrasted latex primary thrust two rather distinct context ground typography typesetting system meant provide users easy consistent access advanced typographical control—important general-purpose typesetting tasks original vision latex insulate user typographical decisions—a useful approach submitting e.g articles scientific journal latex evolved original vision time context unified design avoids package clashes happen latex context provides multi-lingual user interface support markup english dutch german french italian support output many languages including western european eastern european arabic-script chinese japanese korean also allows user use different tex engines like pdftex xetex luatex without changing user interface native drawing engine context integrates superset metapost called metafun allows users use drawing abilities metapost page backgrounds ornaments metafun also used stand alone metapost context also supports use external drawing engines like pgf/tikz pstricks context also provides macro package typesetting chemical structure diagrams tex called ppchtex well many modules package also used plain tex latex originally entitled pragmatex context given name around 1996. hans hagen pragma advanced document engineering pragma ade netherlands-based company context free software program code i.e anything codice_1 subtree distributed gnu gpl documentation provided creative commons attribution noncommercial sharealike license context official manual 2001 context official mini tutorial 1999 documents copyrighted pragma repository future new manual released gnu free documentation license april 2009 up-to-date version fonts typography chapters mark iv abbreviated mkiv current version context development version new features added constantly although fully usable also frozen version called mark ii abbreviated mkii still maintained main difference mkii mkiv mkiv based luatex engine mkii based pdftex xetex although one could select tex engine used context documents describing necessity change process carried benefits minor differences mkii mkiv apart new features mkiv changes code mkii mkiv visible user interface syntax document level mkiv mkii released time oldest version context mark low-level code written dutch unmaintained context created hans hagen ton otten pragma ade netherlands around 1991 due need educational typesetting material around 1996 hans hagen coined name context meaning text tex con-tex-t con latin preposition meaning together 1996 context used within pragma ade 1996 began adopted wider audience first users outside pragma taco hoekwater berend de boer gilbert van den dobbelsteen first user outside netherlands tobias burnus july 2004 contextgarden.net wiki page created context low-level code originally written dutch around 2005 context developers began translating english resulting version known mkii stable frozen august 2007 hans hagen presented mkiv version first public beta released later year context user meeting 2008 mojca miklavec presented context minimals distribution context containing latest binaries intended small memory footprint thus demanding less bandwidth updates august 2008 distribution registered project launchpad web site june 2008 patrick gundlach wrote first post context blog july 2009 context started git repository november 2010 context group created april 2019 lmtx context luametatex announced making context documents simple one makes plain text file typically .tex extension compiles codice_2 script result process pdf file context also generate dvi file example shown
[ 5, 5571, 7710, 3222, 6015, 222 ]
Test
242
6
List_of_log-structured_file_systems:list log-structured file systems list log-structured file system implementations kinds storage media flash memory cd-rw slowly degrade written limited number erase/write cycles one location log-structured file systems sometimes used media make fewer in-place writes thus prolong life device wear leveling common file systems include
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 4375, 6500, 443, 6505, 5457, 460, 1534, 7976, 4406, 821, 7258, 5130, 1561, 836, 5843, 2313, 2315, 6558, 2683, 5859, 5865, 4444, 5518, 6231, 869, 2704, 1605, 174, 2710, 162...
Test
243
1
Weak_entity:weak entity relational database weak entity entity uniquely identified attributes alone therefore must use foreign key conjunction attributes create primary key foreign key typically primary key entity related entity relationship diagrams er diagrams weak entity set indicated bold double-lined rectangle entity connected bold double-lined type arrow bold double-lined diamond relationship type relationship called identifying relationship idef1x notation represented oval entity rather square entity base tables identifying relationship one primary key populated child weak entity primary key entity general though necessarily weak entity items primary key inherited primary key sequence number two types weak entities associative entities subtype entities latter represents crucial type normalization super-type entity inherits attributes subtype entities based value discriminator idef1x government standard capturing requirements possible sub-type relationships classic example weak entity without sub-type relationship would header/detail records many real world situations claims orders invoices header captures information common across forms detail captures information specific individual items standard example complete subtype relationship party entity given discriminator party type could individual partnership c corporation sub chapter association association governmental unit quasi-governmental agency two subtype entities person contains individual-specific information first last name date birth organization would contain attributes legal name organizational hierarchies cost centers sub-type relationships rendered database super-type becomes referred base table sub-types considered derived tables correspond weak entities referential integrity enforced via cascading updates deletes consider database records customer orders order one items enterprise sells database would contain table identifying customers customer number primary key another identifying products sold product number primary key would contain pair tables describing orders one tables could called orders would order number primary key identify order uniquely would contain customer number foreign key identify products sold plus information date time order placed paid shipped table could called orderitem would identified compound key consisting order number foreign key item line number non-primary key attributes product number foreign key ordered quantity price discount special options may zero one many orderitem entries corresponding order entry orderitem entry exist unless corresponding order entry exists zero orderitem case normally applies transiently order first entered first ordered item recorded orderitem table stores weak entities precisely orderitem meaning independent order might argue orderitem meaning records time identified record somebody identified record ordered certain quantity certain product information might use limited use example soon want find seasonal geographical trends sales item need information related order record order would exist without product person create order could argued order would described weak entity products ordered would multivalue attribute order
[ 7999, 6462, 4950, 3103, 2124, 6686 ]
Test
244
9
Qore_(programming_language):qore programming language qore interpreted high-level general-purpose garbage collected dynamic programming language featuring support code embedding sandboxing optional strong typing focus fundamental support multithreading smp scalability qore unique interpreted scripting language fundamental support multithreading meaning one part code run time additionally features automatic memory management meaning programmers allocate free memory explicitly also supporting raii idiom destructors scope-based resource management exception-safe programming due qore unique prompt collection implementation garbage collection qore scripts typically following extensions executable qore scripts unix-like operating systems typically start hashbang specify filename interpreter follows codice_4 qore syntax similar inspired following programming languages basic types include codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 codice_29 codice_30 associative arrays codice_31 well code codice_32 code used data type complex types also supported codice_33 codice_34 codice_35 well type-safe hashes despite interpreted language qore designed support multithreading fundamental design principle elements qore thread-safe language general designed smp scalability mind elements language designed support multithreading qore programs scripts limit subset qore functionality also global interpreter lock qore threading functionality qore provided operating system posix threads library qore features unique garbage collection approach called prompt collection allows destructors run immediately objects go scope even recursive references back allows qore support raii idiom also perform garbage collected automatic memory management qore designed support embedding sandboxing logic applications also applies applications written qore well applications using qore library public c++ api using codice_36 class represents logic container sandboxing controls discrete objects created destroyed runtime containing embedded code extend modify behavior application user-defined ways qore standard runtime library supports data mapping apis communicating databases including high-level apis sql operations schema management dba actions client apis server infrastructure implementations many protocols including http rest rest schema validation/code generation including swagger support client/server soap support including code message generation websocket rpc protocols generic connector apis generic data mapping apis many file format file- data-exchange protocols qore supports testing qunit module facilitates automated testing continuous integration processes code written qore qore git software repository hosted github binary packages available rpm macports freebsd ports well operating systems including microsoft windows see general source download info qore wiki information
[ 1616, 6507, 5983, 4759, 6609, 2740, 5571, 1102, 4059, 3383, 3915, 8142, 6497, 6778, 7315, 4564 ]
Test
245
5
Comparison_of_MQTT_implementations:comparison mqtt implementations mqtt mq telemetry transport message queuing telemetry transport iso standard iso/iec prf 20922 publish-subscribe-based messaging protocol works top tcp/ip protocol designed connections remote locations small code footprint required network bandwidth limited publish-subscribe messaging pattern requires message broker comparison categories use stable version implementation listed overview section comparison limited features relate mqtt protocol following table lists mqtt libraries implementations along general information complete list mqtt implementations found github several versions mqtt protocol currently standardized list containing recent versions mqtt protocol organization standardized following table lists versions mqtt implementation supports also lists support ssl/tls tcp security provided ssl/tls may desirable depending type traffic sent devices mqtt transmits messages clear mqtt page qos quality service described quality service refers traffic prioritization resource reservation control mechanisms rather achieved service quality quality service ability provide different priority different applications users data flows guarantee certain level performance data flow.a description qos level found following table lists implementation support qos levels portability concerns section refers technical details may deciding factors selecting implementation use general table used knowledge device using following table shows various requirements may useful deciding implementation use device
[ 2451, 6415, 4759, 6521, 993, 6428, 2198, 7637, 3106, 578, 1284, 5965, 3498, 2530, 5884, 1435 ]
Test
246
2
NeXTdimension:nextdimension nextdimension nd accelerated 32-bit colour board manufactured sold next 1991 gave nextcube colour capabilities postscript planned nextbus nubus like implementation card full size card nextcube filling one four slots another one filled main board nextdimension featured s-video input output rgb output intel i860 64-bit risc processor 33 mhz postscript acceleration 256mb ram main memory 4mb vram resolution 1120*832 24-bit colour plus 8-bit alpha channel onboard c-cube cl550 chip mjpeg video compression announced never shipped handful engineering prototypes mjpeg daughterboard exist none actually function stripped mach kernel used operating system card due supporting processor 32-bit colour nextdimension faster 2-bit greyscale display postscript nextcube display postscript never actually ran board intel i860 never much move blocks colour data around motorola 68040 crunching board fast time never lived hype since main board always included greyscale video logic nextdimension allowed simultaneous use additional monitor list price nextdimension sold add-on nextcube us 3,995
[ 7259, 5100, 1599, 2521, 5101, 5275, 6016, 5331, 4355, 5450 ]
Test
247
8
Avinash_Kaushik:avinash kaushik avinash kaushik indian entrepreneur author public speaker writing speaking kaushik championed principle aggregation marginal gains encouraged pursuit simplifying perceived complexity field data analytics kaushik advisory board university toronto rotman school management program crm excellence well advisory board university california irvine program web intelligence also associate instructor university british columbia web analytics program kaushik delivered keynotes conferences art marketing emetrics marketing optimization summit cma next jmp innovators summit kaushik received 2009 harry v roberts statistical advocate year award american statistical association 2011 influential industry contributor award web analytics association 2008 kaushik co-founded market motive inc. provides online education certification six internet disciplines search engine optimization paid search advertising social media web analytics conversion public relations
[ 4600 ]
Test
248
2
NxtOSEK:nxtosek nxtosek real-time operating system rtos lego mindstorms programmable nxt controller nxtosek consists i/o driver part lejos nxj toppers osek rtos glue code nxtosek enables lego mindstorms nxt robots programmed ansi-c/c++
[ 6928, 7664, 6851 ]
Test
249
7
Alibaba_Cloud_ECS:alibaba cloud ecs alibaba cloud elastic compute service ecs one core components alibaba cloud – cloud computing ecosystem alibaba group ecs type cloud computing solution features elastic processing capabilities ecs simpler efficient management mode physical servers creation instances change os add release number ecs instances time fit business needs ecs instance virtual computing environment includes cpu memory basic computing components instance core component ecs actual operating entity offered alibaba cloud resources disks images snapshots used conjunction ecs instance alibaba cloud regions physical locations data centers spread world reduce network latency region changed resource created following table lists alibaba cloud regions corresponding cities region ids
[ 7756, 2961, 5571, 3706 ]
Test
250
5
Carrier_recovery:carrier recovery carrier recovery system circuit used estimate compensate frequency phase differences received signal carrier wave receiver local oscillator purpose coherent demodulation transmitter communications carrier system carrier wave modulated baseband signal receiver baseband information extracted incoming modulated waveform ideal communications system carrier signal oscillators transmitter receiver would perfectly matched frequency phase thereby permitting perfect coherent demodulation modulated baseband signal however transmitters receivers rarely share carrier oscillator communications receiver systems usually independent transmitting systems contain oscillators frequency phase offsets instabilities doppler shift may also contribute frequency differences mobile radio frequency communications systems frequency phase variations must estimated using information received signal reproduce recover carrier signal receiver permit coherent demodulation quiet carrier signal containing dominant carrier spectral line carrier recovery accomplished simple band-pass filter carrier frequency phase-locked loop however many modulation schemes make simple approach impractical signal power devoted modulation—where information present—and carrier frequency reducing carrier power results greater transmitter efficiency different methods must employed recover carrier conditions non-data-aided/ blind carrier recovery methods rely knowledge modulation symbols typically used simple carrier recovery schemes initial method coarse carrier frequency recovery closed-loop non-data-aided systems frequently maximum likelihood frequency error detectors method non-data-aided carrier recovery non-linear operation frequency multiplier applied modulated signal create harmonics carrier frequency modulation removed carrier harmonic band-pass filtered frequency divided recover carrier frequency may followed pll multiply-filter-divide example open-loop carrier recovery favored burst transactions burst mode clock data recovery since acquisition time typically shorter close-loop synchronizers phase-offset/delay multiply-filter-divide system known compensated recover correct phase practice applying phase compensation difficult general order modulation matches order nonlinear operator required produce clean carrier harmonic example consider bpsk signal recover rf carrier frequency formula_1 squaring produces signal twice rf carrier frequency phase modulation modulo formula_3 phase effectively 0 modulation qpsk signal take fourth power two terms plus dc component produced appropriate filter around formula_5 recovers frequency carrier frequency phase recovery well demodulation accomplished using costas loop appropriate order costas loop cousin pll uses coherent quadrature signals measure phase error phase error used discipline loop oscillator quadrature signals properly aligned/recovered also successfully demodulate signal costas loop carrier recovery may used m-ary psk modulation scheme one costas loop inherent shortcomings 360/m degree phase ambiguity present demodulated output start carrier recovery process possible achieve symbol synchronization prior full carrier recovery symbol timing determined without knowledge carrier phase carrier minor frequency variation/offset decision directed carrier recovery output symbol decoder fed comparison circuit phase difference/error decoded symbol received signal used discipline local oscillator decision directed methods suited synchronizing frequency differences less symbol rate comparisons performed symbols near symbol rate frequency recovery methods may necessary achieve initial frequency acquisition common form decision directed carrier recovery begins quadrature phase correlators producing in-phase quadrature signals representing symbol coordinate complex plane point correspond location modulation constellation diagram phase error received value nearest/decoded symbol calculated using arc tangent approximation however arc tangent compute phase correction 0 formula_6 qam constellations also formula_6 phase symmetry shortcomings came overcome use differential coding low snr conditions symbol decoder make errors frequently exclusively using corner symbols rectangular constellations giving weight versus lower snr symbols reduces impact low snr decision errors
[ 1976 ]
Validation
251
9
NWScript:nwscript nwscript scripting language developed bioware role-playing video game neverwinter nights based c programming language implemented aurora toolset neverscript open source 3rd party editor created mac os x linux versions nwn aurora toolset ported platforms nwscript also used video games witcher use odyssey engine neverwinter nights 2 sequel original nwn features modified version scripting language based c nwscript many functions c family excluding logical binary ternary operators mathematical functions function source code accessible end-user correct syntax defined script file called nwscript.nss users create functions included scripts include directive works slightly differently c++ nwscript way directly target screen output instead instance in-game characters player character made speak typical hello world example message script puts hello world message player message log work placed oncliententer event module properties first line void main function function nwscript start third line text hello world sent player in-game message log nwscript allows structs objects following common data types available nwscript nwscript also introduced data types purposes neverwinter nights game saving script aurora toolset saves plain text script file .nss filename extension compiling script .ncs containing bytecode run nwscript virtual machine file created turned debug information file .ndb extension also created game uses .ncs file .ndb file called saving created module files packed single module file .mod extension along information layout module
[ 1361, 7071, 578, 4759, 5571, 6882, 2552, 1435 ]
Train
252
4
Lars_Eilebrecht:lars eilebrecht lars eilebrecht born march 1972 german software engineer solutions architect security expert open source evangelist one original developers apache http server co-founder former vice president apache software foundation lars independent consultant based london united kingdom lars active open software projects notably apache http server project member apache group co-founder member apache software foundation since beginning apache software foundation member conferences committee helping foundation organise apachecon events served vice president conference planning 2007 2009 additionally member asf security team asf public relations committee lars open source evangelist received o'reilly appaloosa award raising awareness apache since 2008 lars works independent consultant worked companies bbc channel 4 heise media el tiempo lars owner managing director primevation ltd partner plixos gmbh previous employers lars eilebrecht include ciphire labs quam parc technologies cybersolutions cable wireless lars interest security cryptography director security solutions chief security architect ciphire labs speaker conferences financial cryptography data security 21st chaos communication congress 21c3 lars member international financial cryptography association 2005 2006 1998 lars received master science degree computer engineering university siegen germany lars author apache webserver first german-language book apache http server published 5 editions book 1997 2003
[]
Test
253
3
PlayStation_2_Headset:playstation 2 headset playstation 2 headset usb headset used playstation 2 original headset produced logitech distributed headsets support usb-audio class may compatible playstation 2 headset also used pcs standard usb headset drivers required windows mac os x linux headset commonly used online multiplayer games however also used karaoke style games voice control enhance immersive experience single player games
[ 450, 6330, 2177, 7962, 7514, 4759, 4761, 6621, 4408, 481, 578, 746, 7014, 4718, 602, 2873, 424, 4011, 4911, 5446, 4748 ]
Validation
254
4
Wiener's_attack:wiener attack wiener attack named cryptologist michael j. wiener type cryptographic attack rsa attack uses continued fraction method expose private key small fictional characters alice bob people want communicate securely specifically alice wants send message bob bob read first bob chooses two primes p q calculates rsa modulus n pq rsa modulus made public together encryption exponent e n e form public key pair e n making information public anyone encrypt messages bob decryption exponent satisfies formula_1 formula_2 euler ’ phi function note order multiplicative group formula_3 encryption exponent e formula_4 also must relatively prime modular inverse factorization n private key kept secret bob decrypt message denote private key pair n encryption message given formula_5 decryption cipher text formula_6 given formula_7 using fermat little theorem using euclidean algorithm one efficiently recover secret key one knows factorization n. secret key one efficiently factor modulus n rsa cryptosystem bob might tend use small value rather large random number improve rsa decryption performance however wiener ’ attack shows choosing small value result insecure system attacker recover secret information i.e. break rsa system break based wiener ’ theorem holds small values wiener proved attacker may efficiently find formula_8 wiener paper also presented countermeasures attack allow fast decryption two techniques described follows choosing large public key replace formula_9 formula_10 formula_11 large formula_12 formula_10 large enough i.e formula_14 wiener ’ attack applied regardless small formula_15 using chinese remainder theorem suppose one chooses formula_16 formula_17 small formula_18 fast decryption formula_19 done follows 1 first compute formula_20 formula_21 2 use chinese remainder theorem compute unique value formula_22 satisfies formula_23 formula_24 result formula_25 satisfies formula_26 needed point wiener ’ attack apply value formula_27 large since exists integer k define formula_30 substituted equation gives defining formula_32 formula_33 substituting gives divided formula_35 formula_38 slightly smaller formula_39 former composed entirely public information however method checking guess still required assuming formula_40 reasonable assumption unless formula_41 large last equation may written using simple algebraic manipulations identities guess checked accuracy let formula_43 formula_44 let formula_45 given formula_46 formula_47 attacker efficiently recover formula_18 suppose public keys formula_49 attack shall determine formula_15 using wiener theorem continued fractions approximate formula_18 first try find continued fractions expansion formula_52 note algorithm finds fractions lowest terms know according continued fractions expansion formula_52 convergents formula_55 verify first convergent produce factorization formula_57 however convergent formula_58 yields solve equation find roots formula_63 therefore found factorization notice modulus formula_65 wiener theorem work proof based approximations using continued fractions since formula_67 exists formula_68 formula_69 therefore hence formula_71 approximation formula_72 although attacker know formula_73 may use formula_74 approximate indeed since formula_75 formula_76 using formula_57 place formula_73 obtain formula_85 formula_86 since formula_87 formula_88 obtain since formula_91 formula_92 hence obtain since formula_94 formula_95 obtain 1 2 conclude theorem condition satisfied formula_55 appears among convergents formula_100 therefore algorithm indeed eventually find formula_55
[ 2566 ]
Test
255
5
DOCSIS:docsis data cable service interface specification docsis international telecommunications standard permits addition high-bandwidth data transfer existing cable television catv system used many cable television operators provide internet access see cable internet existing hybrid fiber-coaxial hfc infrastructure version numbers sometimes prefixed simply instead docsis e.g d3 docsis 3 docsis developed cablelabs contributing companies including 3com arris bigband networks broadcom cisco comcast conexant correlant cox harmonic hitron technologies intel motorola netgear technicolor terayon time warner cable texas instruments cross-version compatibility maintained across versions docsis devices falling back highest supported version common endpoints cable modem cm cable modem termination system cmts example one cable modem supports docsis 1.0 system running 2.0 connection established docsis 1.0 data rates 2010 u.s. federal communications commission fcc urged u.s. providers make 100 mbit/s standard bandwidth available 100 million households 2020 1994 802.14 chartered develop media access control hfc 1995 multimedia cable network system mcns formed original partners tci time warner comcast cox later continental rogers joined group june 1996 scte formed data standards subcommittee begin work establishing national standards high-speed data cable plant july 1997 scte dss voted affirmative document dss 97-2 standard based well-known docsis specification standard also submitted international telecommunications union telecommunications standardization sector itu-t adopted itu-t j.112 annex b frequency allocation bandwidth plans differ united states european catv systems docsis standards earlier 3.1 modified use europe modifications published name eurodocsis differences bandwidths exist european cable tv conforms pal/dvb-c standards 8 mhz rf channel bandwidth north american cable tv conforms ntsc/atsc standards specify 6 mhz per channel wider channel bandwidth eurodocsis architectures permits bandwidth allocated downstream data path toward user eurodocsis certification testing executed belgian company excentis formerly known tcomlabs docsis certification testing executed cablelabs typically customer premises equipment receives certification cmts equipment receives qualification itu telecommunication standardization sector itu-t approved various versions docsis international standards docsis 1.0 ratified itu-t recommendation j.112 annex b 1998 superseded docsis 1.1 ratified itu-t recommendation j.112 annex b 2001 subsequently docsis 2.0 ratified itu-t recommendation j.122 recently docsis 3.0 ratified itu-t recommendation j.222 j.222.0 j.222.1 j.222.2 j.222.3 note itu-t recommendation j.112 annex b corresponds docsis/eurodocsis 1.1 annex describes earlier european cable modem system dvb euromodem based atm transmission standards annex c describes variant docsis 1.1 designed operate japanese cable systems itu-t recommendation j.122 main body corresponds docsis 2.0 j.122 annex f corresponds eurodocsis 2.0 j.122 annex j describes japanese variant docsis 2.0 analogous annex c j.112 docsis provides great variety options available open systems interconnection osi layers 1 2 physical data link layers first three versions docsis standard support downstream throughput 256-qam 42.88 mbit/s per 6 mhz channel approximately 38 mbit/s overhead 55.62 mbit/s per 8 mhz channel eurodocsis approximately 50 mbit/s overhead upstream throughput possible 30.72 mbit/s per 6.4 mhz channel approximately 27 mbit/s overhead 10.24 mbit/s per 3.2 mhz channel approximately 9 mbit/s overhead docsis 3.1 supports downstream throughput 4096-qam 25 khz subcarrier spacing 1.89 gbit/s per 192 mhz ofdm channel upstream throughput possible 0.94 gbit/s per 96 mhz ofdma channel maximum raw throughput including overhead maximum payload throughput overhead tables assume 256-qam modulation downstream 64-qam upstream docsis 3.0 4096-qam modulation ofdm/ofdma first downstream/upstream methods docsis 3.1 although real-world data rates may lower due variable modulation depending snr higher data rates possible require higher order qam schemes require higher downstream modulation error ratio mer docsis 3.1 designed support 8192-qam/16,384-qam support 4096-qam mandatory meet minimum docsis 3.1 standards docsis 3.0 theoretical maximum throughput number bonded channels listed table note number channels cable system support dependent cable system set example amount available bandwidth direction width channels selected upstream direction hardware constraints limit maximum amount channels direction also note since many cases docsis capacity shared among multiple users cable companies sell maximum technical capacity available commercial product reduce congestion case heavy usage note maximum downstream bandwidth versions docsis depends version docsis used number upstream channels used docsis 3.0 used upstream channel widths independent whether docsis eurodocsis used docsis architecture includes two primary components cable modem located customer premises cable modem termination system cmts located catv headend cable systems supporting on-demand programming use hybrid fiber-coaxial system fiber optic lines bring digital signals nodes system converted rf channels modem signals coaxial trunk lines typical cmts device hosts downstream upstream ports functionality similar digital subscriber line access multiplexer dslam used digital subscriber line dsl system downstream upstream communications travel shared coax line customer premises connect single f connector cable modem typical cmts separate f connectors downstream upstream communication allows flexibility cable operator noise return upstream path upstream port usually connected single neighborhood fiber node whereas downstream port usually shared across small number neighborhoods thus generally upstream ports downstream ports cmts typical cmts four six upstream ports per downstream port cable company deploy docsis 1.1 must upgrade hybrid fiber-coaxial hfc network support return path upstream traffic without return path old docsis 1.0 standard still allows use data cable system implementing return path plain old telephone service pots hfc already two-way interactive chances high docsis 1.1 higher implemented customer pc associated peripherals termed customer-premises equipment cpe cpe connected cable modem turn connected hfc network cable modem termination system cmts cmts routes traffic hfc internet using cmts cable operator multiple service operators — mso exercises full control cable modem configuration cm configuration changed adjust varying line conditions customer service requirements docsis 2.0 also used microwave frequencies 10 ghz ireland digiweb using dedicated wireless links rather hfc network subscriber premises ordinary cm connected antenna box converts to/from microwave frequencies transmits/receives 10 ghz customer dedicated link transmitter mast must line sight sites hilltop docsis architecture also used fixed wireless equipment using 2.5–2.7 ghz multichannel multipoint distribution service mmds microwave band u.s. docsis includes media access control mac layer security services baseline privacy interface specifications docsis 1.0 used initial baseline privacy interface bpi specification bpi later improved release baseline privacy interface plus bpi+ specification used docsis 1.1 2.0 recently number enhancements baseline privacy interface added part docsis 3.0 specification renamed security sec intent bpi/sec specifications describe mac layer security services docsis cmts cable modem communications bpi/sec security goals twofold bpi/sec intended prevent cable users listening encrypting data flows cmts cable modem bpi bpi+ use 56-bit data encryption standard des encryption sec adds support 128-bit advanced encryption standard aes versions provide periodic key refreshes period configured network operator order increase level protection bpi/sec intended allow cable service operators refuse service uncertified cable modems unauthorized users bpi+ strengthened service protection adding digital certificate based authentication key exchange protocol using public key infrastructure pki based digital certificate authorities cas certification testers currently excentis formerly known tcomlabs eurodocsis cablelabs docsis typically cable service operator manually adds cable modem mac address customer account cable service operator network allows access cable modem attest mac address using valid certificate issued via pki earlier bpi specification ansi/scte 22-2 limited service protection underlying key management protocol authenticate user cable modem security docsis network vastly improved business critical communications permitted end user communication network infrastructure denied successful attacks often occur cmts configured backwards compatibility early pre-standard docsis 1.1 modems modems software upgradeable field include valid docsis eurodocsis root certificates
[ 7148, 363, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2566, 7824, 5485, 2119, 6908, 3794, 7091, 2219, 3383, 3640, 3797, 2043, 3312, 7567, 2057, 3819, 3820, 3821, 768, 5693, 7214, 7217, 7765, 259, 5880, ...
Test
256
9
ILNumerics:ilnumerics ilnumerics mathematical class library common language infrastructure cli developers domain specific language dsl implementation numerical algorithms .net platform algebra systems graphical user interfaces focus prototyping algorithms implementation algorithms distribution-ready applications done using development environments general purpose programming languages gpl ilnumerics extension visual studio aims supporting creation technical applications based .net ilnumerics started 2006 open source project originating technical university berlin 2007 ilnumerics basta innovation awards 2007 innovative .net project germany switzerland austria 6 years open source development project added closed source proprietary license 2011 aiming business academic developers time project quickly gained popularity download numbers engagement stackoverflow.com download counts website available .net framework selected managed foundation since earlier attempts java platform abandoned due technical limitations similarly .net framework designed focus requirements technical application development ilnumerics added interfaces popular codes lapack fftw complex numbers generic mult-dimensional array classes 2010 graphical capabilities added efforts increase performance technology introduced 2011 time company founded continue development technological goal establish .net framework feasible alternative unmanaged languages numeric computing ilnumerics implements base functionality frequently needed application development technical areas n-dimensional arrays complex numbers linear algebra fft plotting controls 2d 3d array classes fully compatible array features matlab numpy including internal storage order subarray creation expansion advanced indexing higher level functionality provided toolboxes interpolation optimization statistics hdf5 machine learning ilnumerics dsl embedded .net computational algorithms formulated using cli language however c visual basic officially supported due strong type system .net framework algorithms created ilnumerics strongly typed deviates syntax alternatives often weakly typed therefore easier adopt scene graph used ilnumerics realize graphical output interactive 2d 3d plots used windows forms applications hardware accelerated drawing available via opengl software renderer provided legacy hardware based gdi+ svg ilnumerics distributed extension visual studio adds tool window ide graphical inspection mathematical objects stepping user code since ilnumerics comes cli assembly targets common language infrastructure cli applications like java frameworks often criticized suitable numerical computations reasons memory management garbage collector intermediate language execution deficient optimizations compilers involved ilnumerics approaches limitations performing loop unrolling removal bound checks array accesses cache optimizations speed-up gained auto-management memory large array objects numerical operations parallelized multicore systems linear algebra routines rely processor specific optimized versions lapack blas ilnumerics arrays utilize unmanaged heap storing data way size ilnumerics arrays limited clr interoperability 3rd party libraries improved
[ 1616, 5098, 5363, 3606, 2820, 1626, 4759, 5548, 8066, 1731, 3619, 5117, 5571, 6356, 4872, 4705, 1569, 4067, 3981, 3388, 4070, 3807, 1398, 3225, 1879, 7579, 7860, 3410, 3915, 4999, 1989, 2530 ]
Test
257
2
WinJS:winjs windows library javascript abbreviated winjs open-source javascript library developed microsoft designed primary goal easing development windows store apps windows 8 windows 10 well windows phone apps windows phone 8.1 windows 10 mobile xbox one applications using html5 javascript alternative using xaml c vb.net c++ cx winjs started technology specific windows store apps evolved aim working web browser april 2014 microsoft build developer conference winjs released apache license free open source software intent port microsoft platforms site dedicated demonstrate library also published future development focused maintaining currently exists project plans new features feature requests meaning plans new feature release winjs provides helpers facilitate development windows store apps using html5 javascript library consists modules functions expose windows runtime way consistent javascript coding conventions winjs makes possible add windows ui controls html accompanied support data binding template engine javascript frameworks jquery work side-by-side winjs library comes additional declaration files rich developer experience using typescript strict superset javascript annotations typescript enables code completion refactoring maintaining compatibility javascript first version winjs released windows 8 winjs released open-source software apache license github popular demand project aimed cross-platform browser compatibility following distributions derived winjs 2.0 winjs 3.0 released september 2014 special focus preview winjs 4.0 announced march 27 2015 full release announced june 8
[ 562, 6645, 2451, 5781, 5321, 7687, 1989, 7247, 7848, 2198 ]
Test
258
4
Charles_R._Lord:charles r. lord charles richard lord april 4 1931 – february 8 1993 american intelligence official deputy director national security agency 1986 1988 time highest ranking civilian agency alumnus university michigan denison university national war college army language school joined nsa 1958 cryptologist nsa also served capacities chief europe chief staff deputy director operations recipient presidential distinguished executive award department defense national intelligence distinguished service awards 1987 assumed vice presidency e-systems major contractor nsa served position death cerebral hemorrhage 1993
[ 202, 4988, 7191, 7895, 228, 4666, 3335, 7568, 4727 ]
Test
259
5
Internet_layer:internet layer internet layer group internetworking methods protocols specifications internet protocol suite used transport network packets originating host across network boundaries necessary destination host specified ip address internet layer derives name function facilitating internetworking concept connecting multiple networks gateways internet layer include protocols fulfill purpose maintaining link states local nodes usually use protocols based framing packets specific link types protocols belong link layer internet-layer protocols use ip-based packets common design aspect internet layer robustness principle liberal accept conservative send misbehaving host deny internet service many users internet layer three basic functions version 4 internet protocol ipv4 transmit receive operations ip capable automatic intentional fragmentation defragmentation packets based example maximum transmission unit mtu link elements however feature dropped ipv6 communications end points hosts perform path mtu discovery assure end-to-end transmissions n't exceed maximum discovered operation internet layer responsible reliable transmission provides unreliable service best effort delivery means network makes guarantees proper arrival packets accordance end-to-end principle change previous protocols used early arpanet since packet delivery across diverse networks inherently unreliable failure-prone operation burden providing reliability placed end points communication path i.e. hosts rather network one reasons resiliency internet individual link failures proven scalability function providing reliability service duty higher level protocols transmission control protocol tcp transport layer ipv4 checksum used protect header datagram checksum ensures information received header accurate however ipv4 attempt detect errors may occurred data packet ipv6 include header checksum instead relying link layer assure data integrity entire packet including checksum primary protocols internet layer internet protocol ip implemented two versions ipv4 ipv6 internet control message protocol icmp primarily used error diagnostic functions different implementations exist ipv4 ipv6 internet group management protocol igmp used ipv4 hosts adjacent ip multicast routers establish multicast group memberships internet protocol security ipsec suite protocols securing ip communications authenticating encrypting ip packet data stream ipsec also includes protocols key exchange ipsec originally designed base specification ipv6 1995 later adapted ipv4 found widespread use securing virtual private networks internet layer tcp/ip model easily compared directly network layer layer 3 open systems interconnection osi protocol stack internet layer often improperly called network layer although overlap two models use different classification methods
[ 7148, 709, 4676, 4677, 7170, 4683, 6432, 1462, 5039, 6446, 2219, 3640, 4709, 3312, 7214, 7217, 2612, 3337, 4014, 1900, 5447, 456, 6879, 2281, 6521, 106, 2644, 6531, 2650, 121, 7637, 4414, 6908, 3379, 5492, 3383, 494, 500, 7297, 5169, 23...
Validation
260
9
POPLmark_challenge:poplmark challenge programming language theory poplmark challenge principles programming languages benchmark formerly mechanized metatheory masses aydemir 2005 set benchmarks designed evaluate state automated reasoning mechanization metatheory programming languages stimulate discussion collaboration among diverse cross section formal methods community loosely speaking challenge measurement well programs may proven match specification intended behave many complex issues involves challenge initially proposed members pl club university pennsylvania association collaborators around world workshop mechanized metatheory main meeting researchers participating challenge design poplmark benchmark guided features common reasoning programming languages challenge problems require formalisation large programming languages require sophistication reasoning poplmark challenge composed three parts part 1 concerns solely types system f system f subtyping problems part 2 concerns syntax semantics system f. concerns proofs part 3 concerns usability formalisation system f. particular challenge asks several solutions proposed parts poplmark challenge using following tools isabelle/hol twelf coq αprolog ats abella matita
[ 3254, 7791, 4322, 1348, 3895, 3753, 6980, 3225 ]
Validation
261
2
Magnussoft_ZETA:magnussoft zeta magnussoft zeta earlier yellowtab zeta operating system formerly developed yellowtab germany based operating system developed inc. yellowtab insolvency zeta later developed independent team little known distributed magnussoft february 28 2007 current version zeta 1.5 march 28 2007 magnussoft announced discontinued funding development zeta march 16 sales figures fallen far short company expectations project longer economically viable days later company also stopped distribution zeta reaction allegations zeta constituted illegal unlicensed derivative beos source code binaries zeta effort bring beos date adding support newer hardware features introduced operating systems years since incorporated ceased development 2001 among new features usb 2.0 support sata support samba support new media player enhanced localization system components unlike haiku open source efforts recreate beos functionality scratch zeta based actual beos code base closed source zeta contributed increase activity beos commercial software market number new products zeta earlier beos released however critics point list goals first release appear met including java 1.4.2 odbc support reviewers point bugs still exist beos question whether yellowtab complete access source code would need make significant updates changes made could break compilation code cases notably mozilla break actual application code optimizations applied resulting much slower builds yellowtab promoted zeta mainly german market used sold infomercials rtl shop japan still beta version prior magnussoft stopping distribution zeta mainly distributed directly magnussoft zeta yellowtab surrounded controversy critics yellowtab questioned long time legality zeta whether yellowtab legal access sources beos known yellowtab could developed zeta extent without access source code doubts remain whether yellowtab actually legal access code furthermore critics see zeta real advancement beos rather unfinished buggy operating system loaded third party applications either obsolete unsupported non-functional particularly true initial releases zeta clear conflict attention detail beos used stand disappointing beos community one point high expectations zeta yellowtab clean selection bundled applications following versions zeta remains somewhat unstable compared modern desktop operating systems perhaps criticized practice yellowtab tendency make claims turned either half truths vague enough could confirmed yellowtab announce certain developments never materialized java odbc among others would also support certain capabilities beyond zeta actually capable e.g. compatibility ms office according sources close yellowtab believed led high return rate customers bought zeta german rtl tv shopping channel reason rtl eventually stopped selling product criticism within greater beos community regarding lack personal edition zeta somewhat controversial standpoint given history beos inc throughout life intel version beos inc regularly created distributed beos demo discs cd discs somewhat crippled would mount bfs partition would install physical hard drive served test hardware support taster operating system zeta offered similar way – demo discs similar limitations made available unfortunately many beos community especially came beos post demise inc tended issue crippled demo discs controversy follows final commercial release beos revision 5 included freely distributable virtual beos installation installer created virtual beos image file host os computer could boot beos using boot disk via installation bootman native beos boot manager inc intended release taster draw users buying professional edition fully installable physical hard drive partition unfortunately many users discovered trivial task install personal version real partition inc ultimately lost much sales potential product yellowtab magnussoft learnt therefore offer version zeta could installed without purchasing license german language – zeta initial builds much packaging geared towards german-speaking audience reduced later versions first beta releases release candidates many oddities zeta would fall back german matter locale set version 1.0 zeta included badly thought activation component requires code entered authenticated via remote server nag screen stop full functionality restored nag fairly easily circumvented replacing executable called stub executable activation incredibly poorly executed often failed activation removed 1.21 release cease distribution letter posted magnussoft 5 april 2007
[ 4494, 1522, 499, 2787, 2568, 5571, 7827, 3751, 5021, 788, 7029 ]
Train
262
3
LGA_1248:lga 1248 lga 1248 intel cpu socket itanium processors 9300-series 9700-series replaces pac611 also known ppga661 used itanium 9100-series processors adds intel quickpath interconnect functionalities
[ 2541, 4123, 3849, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 8021, 4985, 7302, 5963, 866, 3333, 7134, 6683, 5886 ]
Train
263
3
Opcode:opcode computing opcode abbreviated operation code also known instruction syllable instruction parcel opstring portion machine language instruction specifies operation performed beside opcode instructions also specify data process form operands addition opcodes used instruction set architectures various cpus hardware devices also used abstract computing machines part byte code specifications specifications format opcodes laid instruction set architecture isa processor question may general cpu specialized processing unit opcodes given instruction set described use opcode table detailing possible opcode bytes apart opcode instruction normally also one specifiers operands i.e data operation act although operations may implicit operands none instruction sets nearly uniform fields opcode operand specifiers well others x86 architecture instance complicated variable-length structure instruction sets extended use opcode prefixes add subset new instructions made existing opcodes following reserved byte sequences depending architecture operands may register values values stack memory values i/o ports etc. specified accessed using less complex addressing modes types operations include arithmetics data copying logical operations program control well special instructions cpuid others assembly language assembly low-level programming language uses mnemonics instructions operands represent machine code enhances readability still giving precise control machine instructions programming currently done using high-level programming languages typically easier read write languages need compiled translated assembly language run compiled programs opcodes also found so-called byte codes representations intended software interpreter rather hardware device software-based instruction sets often employ slightly higher-level data types operations hardware counterparts nevertheless constructed along similar lines examples include byte code found java class files interpreted java virtual machine jvm byte code used gnu emacs compiled lisp code .net common intermediate language cil many others
[ 364, 4293, 6078, 6079, 1447, 3948, 7533, 7541, 410, 3308, 755, 4719, 2237, 1877, 421, 4009, 6497, 5087, 6498, 6159, 1556, 2662, 514, 7669, 8024, 8033, 3747, 1237, 1992, 5190, 5893, 4845, 6969, 5208, 4137, 3782, 7357, 6287, 584, 6291, 24...
Test
264
1
VOCEDplus:vocedplus vocedplus free international research database tertiary education maintained developed staff national centre vocational education research ncver adelaide south australia focus database content relation post-compulsory education training workforce needs skills development social inclusion content vocedplus database encompasses vocational education training vet higher education lifelong learning informal learning vet schools adult community education apprenticeships/traineeships international education providers education training workforce development international scope contains 77,000 english language records many links full text documents vocedplus contains extensive australian materials includes wide range international information covering outcomes tertiary education shape published research practice policy statistics entries included following types publications reports annual reports papers discussion papers occasional papers working papers books book chapters conference papers conference proceedings journals journal articles policy documents published statistics theses podcasts teaching training materials database entry contains standard bibliographic information abstract many entries include full text access via publisher website digitised copy early years vocedplus known voced original database produced network clearinghouses across australia aim sharing activities technical education tafe sector voced produced hardcopy electronic version distributed diskette 1997 first web version voced made available national centre vocational education research ncver organisational website 1998 major project upgrade database expand international coverage commenced 2001 creation voced first website 2001 voced endorsed unesco international database technical vocational education training tvet research information many changes database website occurred period focus continuous improvement meet needs users utilise emerging technologies 2006 materials produced two adult literacy learning programs funded australian department education employment workplace relations deewr workplace english language learning well programme adult literacy national project alnp included voced 2007 australian clearinghouse network transferred hardcopy collections ncver form centralised repository resources 2009 materials produced reframing future rtf vocational education training workforce development initiative australian state territory governments included voced major rebuild database website undertaken period take advantage potential new technologies provide improved services incorporate web 2.0 technologies rss feeds share bookmark tools 2009 scope expanded fully encompass higher education sector 2011 launch vocedplus 2012 major retrospective digitisation project commenced end 2012-2013 financial year total 9,328 publications 593,534 pages/microfiche frames digitised ensuring publications available electronically free 2015 release refreshed look adopt new ncver branding plus number search enhancements guided search expert search glossary search added 2015 first series 'focus ... pages released 2016 launch 'pod network convenient efficient platform allows instant access research multitude resources range subjects 2017 completion 'pod network consisting 20 pods broad subjects including apprenticeships traineeships foundation skills teaching learning career development students 74 podlets narrow topics including online learning social media vet schools stem skills adult literacy 2018 launch 'timeline australian vet policy initiatives 1998-2017 'vet knowledge bank contains suite products capturing australia diverse complex ever-changing vet system
[]
Test
265
2
IBM_System/34,_36_System_Support_Program:ibm system/34 36 system support program system support program ssp operating system ibm system/34 system/36 minicomputers ssp command-based operating system released 1977 ssp originally contained 60 commands implemented system/34 1977 1983 different versions called releases release 1 issued original s/34 1977 release 9 issued 1981 1983 ibm repackaged ssp new computer called ibm system/36 object-code compatible s/34 1994 ibm repackaged ssp updated model s/36 called advanced/36 a/36 ibm as/400 ssp implemented virtual machine major releases ssp include limitations s/36 a/36 m/36 operating system maximum amount disk space system could utilize 4 gb per occurrence operating system machine running two m36 partitions could 4 gb another limitation program size could exceed 64kb 64mb 64kb program larger become creative later years call/parm came place would move code called program base program 63kb example could easily call 20kb called program also could around 8,000+ files machine also restrictions number files could bring program could get around putting files called programs passing result back maximum number records could initially load 8 million maximum file could hold 16 million none limitations exist s36ee maximum number files program much larger native ssp using ssp operator create delete manage s/34-36 objects libraries data files menus procedures source members security files ssp contains modules dfu seu sda wsu permit operators build libraries files enter information files produce simple reports maintain menu structure simplifies access information advanced/36 support wsu password resource security also implemented ssp remote communications today similar dial-up networking ssp disk-based operating system computer programs run fixed disk diskette tape complement system/34 5340 system/36 5360/5362 fixed disk array one four fixed disks least one computer terminal 8 diskette drive optionally fitted two magazine units contain 10 diskettes three diskette slots.. s/36 5363/5364 5-1/4 diskette drive s/36 computers configured 8809 reel-to-reel tape drive 800/1600 bpi 6157 1/4 cartridge qic tape drive a/36 computers high-density qic drive 5.25 8 diskette drive single optional 9348-001 9 track reel reel 1600/6250 bpi tape drive basic ssp procedures include basic ssp commands include functions created system/36 csall created vasp ** functions discontinued system/36 *** system/34 created single job queue system/36 created five job queues therefore job queue written action refer single job queue **** function added advanced/36 ssp procedures utilize utility programs cases useful computer programmer ssp procedures maint library utility used aloclibr bldlibr fromlibr librlibr remove condense listlibr tolibr copy file utility used save restore copydata listdata many utilities including fbld label duprd init delet hist cnfig gsort pack prof flexible program level associated ssp procedures high-level language programs require ocl activated ocl used load programs system memory start process called execution assign resources disk files printers message members memory disk space programs abilities displaying text screen pause messages forth make ocl powerful system/3 1969 ran disk-based batch operating system called scp 5702-sc1 ibm introduced s/3 online program called ccp communications control program started batch program ibm system/32 1975 ran disk-based operating system called scp system control program ibm system/38 1978 ran operating system called cpf control program facility much advanced ssp particularly similar
[ 7605, 4291, 6705, 8173, 7172, 5571, 4421, 402, 839, 4428, 8111, 2786, 607, 2431, 3664, 6849, 1516, 1994 ]
Test
266
6
Kernfs_(BSD):kernfs bsd berkeley software distribution bsd descendants kernfs pseudo file system provides access information currently running kernel file system content dynamically generated operating system booted kernfs often mounted directory result nature kernfs consist actual files storage device allowing instead processes retrieve system information accessing virtual files kernfs first appeared 4.4bsd netbsd 6.0 continues use kernfs default mounting canonical mount point
[ 3599, 2547, 7161, 4670, 5021, 4672, 13, 3271, 6431, 3626, 5041, 5049, 7550, 405, 6117, 5760, 759, 65, 5783, 6854, 5437, 5088, 4375, 6500, 785, 2266, 788, 6505, 1522, 7605, 5457, 4759, 460, 1534, 4397, 7976, 5116, 4406, 821, 7258, 2300, ...
Validation
267
9
TI_Explorer:ti explorer texas instruments explorer family lisp machine computers computers sold texas instruments 1980s explorer based design lisp machines incorporated based mit lisp machine explorer used development deployment artificial-intelligence software notable also early use nubus system bus explorer computer family explorer used development deployment artificial-intelligence software later models based special 32-bit microprocessor developed texas instruments supported execution lisp software hardware operating system explorer written lisp machine lisp also supported common lisp notable application spike scheduling system hubble space telescope spike developed texas instruments explorer workstations
[ 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 1478, 5494, 4704, 3880, 4609, 6116, 4066, 3212, 5501, 6210, 1116, 144, 6471, 6754, 7481, 2144, 2600, 685, 7298, 5515, 8025, 5077, 7032, 4543, 1889, 2156, ...
Test
268
4
WOT_Services:wot services mywot/wot web trust browser add-on web site wot online reputation internet safety service providing crowdsourced reviews data whether websites respect user privacy secure indicators trust november 2016 german state media investigation found wot secretly collected personal user details sold licensed information unidentified third-party businesses entities data monetization purposes activity breached privacy rules guidelines set several browsers result browser add-on involuntarily removed mozilla firefox add-on store voluntarily removed browsers add-on/extension stores wot eventually reinstated wot services founded 2006 sami tolvanen timo ala-kleemola wrote wot software post-graduates tampere university technology finland launched service officially 2007 esa suurio ceo suurio replaced november 2009 founders left company 2014 2009 mysql founder michael widenius invested wot became member board directors wot services longer portfolio company widenius venture capital firm openocean.vc february 2016 wot services changed name tow software wot services partnerships mail.ru facebook hphosts legitscript panda security phishtank globalsign truste november 2013 wot 100 million downloads wot made money collecting browsing history data users selling usage data said anonymized data selling november 1 2016 german public broadcasting station ndr reported results investigation in-house journalists showing wot collected recorded analyzed sold user-related data third parties data obtained traceable wot could assigned specific individuals despite wot claim user data anonymized ndr investigative journalism report based freely available sample data revealed sensitive private information 50 users could retrieved information included websites visited account names email addresses potentially revealing user illnesses sexual preferences drug consumption journalists also reconstructed media company confidential revenue data details ongoing police investigation german media contacted wot results investigation prior publication report wot declined comment findings days news story aired mozilla removed browser add-on firefox add-on store wot subsequently removed browsing tool browsers including chrome opera wot mobile security protection mobile app removed google play approximately one week extension removed google chrome extension store blog post published december 19 2016 wot services stated upgraded browser extension released google chrome extension gallery upgraded version included several major code updates order protect users privacy opt-out option user settings users wish share data us still want easy access wot february 2017 mozilla reinstated wot browsing tool firefox add-on store wot offers add-on web browsers including firefox google chrome opera internet explorer baidu extension rates websites based trustworthiness provides user red yellow green indicator red meaning site poor reputation wot discovered selling personally identifiable user data november 2016 breach user privacy initially discovered reported investigative journalists germany widely reported press resulting removal web trust plugin major browsers years prior discovery privacy breach press reviews positive new york times washington post wrote wot -- nyt 2010 post 2008 2011 pc world preston gralla rick broida recommended wot 2009 2010 respectively pc magazine neil rubenking concluded web trust protection free n't impact browsing speed well worth trying however minus side found several clearly adult sites unrated wished wot would also rate sponsored search results like major competitors 2013 softpedia reviewer ionut ilascu wrote reliability service grown past years despite voices accusing exactly opposite proof collaboration facebook opera mail.ru group concluding service wot web trust may viewed biased latest developments balancing user opinion order provide relevant information point contrary february 2011 lawsuit florida united states filed wot forum members demanding wot remove certain website ratings associated comments cautioning phishing scams court ordered case dismissed prejudice equivalent verdict guilty us law germany preliminary injunctions issued courts delete feedback
[ 5984, 142, 354 ]
Test
269
2
GNUstepWeb:gnustepweb gnustepweb development environment application server web applications characterized strict separation data storage processing user interface development gnustepweb based gnustep goals compatible webobjects version 4.5.x extensions apple webobjects ported java version 5 gnustepweb continues using objective-c
[ 3915, 5571, 5787, 578 ]
Test
270
9
Const_(computer_programming):const computer programming c c++ javascript programming languages const type qualifier keyword applied data type indicates data read used declare constants codice_1 c family languages differs similar constructs languages part type thus complicated behavior combined pointers references composite data types type-checking applied object declaration indicates object constant value may changed unlike variable basic use – declare constants – parallels many languages however unlike languages c family languages codice_1 part type part object example c codice_3 declares object codice_4 codice_5 type – codice_1 part type parsed “ const int x ” – ada codice_7 declares constant kind object codice_8 codice_9 type codice_10 part object part type two subtle results firstly codice_1 applied parts complex type – example codice_12 declares constant pointer constant integer codice_13 declares variable pointer constant integer codice_14 declares constant pointer variable integer secondly codice_1 part type must match part type-checking example following code invalid void f int x const int f argument codice_16 must variable integer codice_17 constant integer matching form program correctness known const-correctness allows form programming contract functions specify part type signature whether modify arguments whether return value modifiable type-checking primarily interest pointers references – basic value types like integers – also composite data types templated types containers concealed fact codice_1 often omitted due type coercion implicit type conversion c call-by-value c++ either call-by-value call-by-reference idea const-ness imply variable stored computer memory unwritable rather codice_1-ness compile-time construct indicates programmer necessarily note however case predefined data codice_20 string literals c codice_1 often unwritable constant change value program running object declared codice_1 may indeed change value program running common example read registers within embedded systems like current state digital input data registers digital inputs often declared codice_1 codice_24 content registers may change without program anything codice_24 shall write either codice_1 addition non-static member-function declared codice_1 case codice_28 pointer inside function type codice_29 rather merely type codice_30 means non-const functions object called inside function member variables modified c++ member variable declared codice_31 indicating restriction apply cases useful example caching reference counting data synchronization cases logical meaning state object unchanged object physically constant since bitwise representation may change c c++ data types including defined user declared codice_1 const-correctness dictates variables objects declared unless need modified proactive use codice_1 makes values easier understand track reason thus increases readability comprehensibility code makes working teams maintaining code simpler communicates information value intended use help compiler well developer reasoning code also enable optimizing compiler generate efficient code simple non-pointer data types applying codice_1 qualifier straightforward go either side type historical reasons codice_35 equivalent codice_36 implementations using codice_1 sides type instance codice_38 generates warning error pointer reference types meaning codice_1 complicated – either pointer value pointed codice_1 syntax confusing pointer declared codice_1 pointer writable value writable pointer codice_1 value codice_1 pointer codice_1 value codice_1 pointer reassigned point different object one initially assigned used modify value points called pointee reference variables thus alternate syntax codice_1 pointers pointer codice_1 object hand reassigned point another memory location object type convertible type used modify memory pointing codice_1 pointer codice_1 object also declared neither used modify pointee reassigned point another object following code illustrates subtleties void foo int ptr following usual c convention declarations declaration follows use codice_50 pointer written pointer indicating dereferencing example declaration codice_51 dereferenced form codice_52 codice_53 reference form codice_54 pointer codice_53 thus codice_1 modifies name right c++ convention instead associate codice_50 type codice_58 read codice_1 modifying type left codice_60 thus read codice_61 codice_62 value constant codice_63 codice_64 pointer pointer constant integer thus int *ptr // *ptr int value int const *ptrtoconst // *ptrtoconst constant int integer value int const constptr // constptr constant int integer pointer int const const constptrtoconst // constptrtoconst constant pointer following c++ convention analyzing type value rule thumb read declaration right left thus everything left star identified pointee type everything right star pointer properties instance example codice_64 read writable pointer refers non-writable integer codice_66 read non-writable pointer refers writable integer generic rule helps understand complex declarations definitions works like example reading left important read elements right left codice_64 becomes pointer const int const pointer int cases c/c++ allows codice_1 keyword placed left type examples const int *ptrtoconst //identical int const *ptrtoconst const int *const constptrtoconst //identical int const *const constptrtoconst although c/c++ allows definitions closely match english language reading definitions left right compiler still reads definitions according abovementioned procedure right left putting codice_1 must constant quickly introduces mismatches intend write compiler decides wrote consider pointers pointers int **ptr // pointer pointer ints int const **ptr // pointer pointer constant int value int *const *ptr // pointer const pointer int values int **const ptr // constant pointer pointers ints int const **const ptr // constant pointer pointers constant int values final note regarding pointer definitions always write pointer symbol much possible right attaching pointer symbol type tricky strongly suggests pointer type n't case examples int* /* write */ int *a // pointer int int* b // confusing int* *b // ugly b pointers ints bjarne stroustrup faq recommends declaring one variable per line using c++ convention avoid issue considerations apply defining references c++ rvalue references int var 22 int const reftoconst var // ok int const ref2 var ref3 var // confusing int const constref var // error references ca n't change anyway // c++ int rref int 5 value 10 // confusing complicated declarations encountered using multidimensional arrays references pointers pointers although sometimes argued declarations confusing error-prone therefore avoided replaced higher-level structures noted procedure described top section always used without introducing ambiguities confusion codice_1 declared function parameters variables static automatic including global local interpretation varies uses codice_1 static variable global variable static local variable constant may used data like mathematical constants codice_72 – realistically longer overall compile-time parameters codice_1 automatic variable non-static local variable means single assignment happening though different value may used time codice_74 codice_1 parameter pass-by-reference means referenced value modified – part contract – codice_1 parameter pass-by-value pointer pass-by-reference add anything interface value copied indicates internally function modify parameter single assignment reason favor using codice_1 parameters pass-by-reference changes contract pass-by-value exposes implementation order take advantage design contract approach user-defined types structs classes methods well member data programmer may tag instance methods codice_1 n't modify object data members applying codice_1 qualifier instance methods thus essential feature const-correctness available many object-oriented languages java c microsoft c++/cli managed extensions c++ codice_1 methods called codice_1 non-codice_1 objects alike non-codice_1 methods invoked non-codice_1 objects const modifier instance method applies object pointed codice_28 pointer implicit argument passed instance methods thus const methods way apply const-correctness implicit codice_28 pointer argument like arguments example illustrates class c public void foo c nonconstc const c constc code implicit codice_28 pointer codice_88 type codice_89 whereas codice_28 pointer codice_91 type codice_92 indicating method modify object codice_28 pointer often programmer supply codice_1 non-codice_1 method name possibly quite different uses class accommodate types callers consider class myarray public void foo myarray array myarray const constarray codice_1-ness calling object determines version codice_97 invoked thus whether caller given reference manipulate observe private data object two methods technically different signatures codice_28 pointers different types allowing compiler choose right one returning codice_1 reference codice_53 instead merely returning codice_53 value may overkill second method technique used arbitrary types standard template library several loopholes pure const-correctness c c++ exist primarily compatibility existing code first applies c++ use codice_102 allows programmer strip codice_1 qualifier making object modifiable necessity stripping qualifier arises using existing code libraries modified const-correct instance consider code // prototype function change // know modify pointee passed void libraryfunc int* ptr int size void calllibraryfunc const int* ptr int size however attempt modify object declared codice_1 means codice_105 results undefined behavior according iso c++ standard example codice_54 references global local member variable declared codice_1 object allocated heap via codice_108 code correct codice_109 really modify value pointed codice_54 c language need loophole certain situation exists variables static storage duration allowed defined initial value however initializer use constants like string constants literals allowed use non-constant elements like variable names whether initializer elements declared codice_1 whether static duration variable declared codice_1 non-portable way initialize codice_1 variable static storage duration carefully constructing typecast left hand side later assignment codice_1 variable written effectively stripping away codice_1 attribute 'initializing non-constant elements like codice_1 variables writing codice_1 variable way may work intended causes undefined behavior seriously contradicts const-correctness const size_t buffersize 8*1024 const size_t usertextbuffersize //initial value depends const buffersize ca n't initialized int setupusertextbox textbox_t *defaulttextboxtype rect_t *defaulttextboxlocation another loophole applies c c++ specifically languages dictate member pointers references shallow respect codice_1-ness owners — containing object codice_1 codice_1 members except member pointees referees still mutable illustrate consider c++ code struct void foo const although object codice_121 passed codice_122 constant makes members constant pointee accessible codice_123 still modifiable though may desirable standpoint codice_1-correctness codice_121 might solely pointee reason meyers argues default member pointers references deep codice_1-ness could overridden codice_31 qualifier pointee owned container strategy would create compatibility issues existing code thus historical reasons loophole remains open c c++ latter loophole closed using class hide pointer behind codice_1-correct interface classes either support usual copy semantics codice_1 object implying containing class copied usual semantics either allow loopholes permitting stripping codice_1-ness inadvertent intentional copying finally several functions c standard library violate const-correctness accept codice_1 pointer character string return non-codice_1 pointer part string codice_133 codice_134 among functions implementations c++ standard library microsoft try close loophole providing two overloaded versions functions codice_1 version non-codice_1 version use type system express constancy leads various complexities problems accordingly criticized adopted outside narrow c family c c++ d. java c heavily influenced c c++ explicitly rejected codice_1-style type qualifiers instead expressing constancy keywords apply identifier codice_138 java codice_1 codice_140 c even within c c++ use codice_1 varies significantly projects organizations using consistently others avoiding codice_1 type qualifier causes difficulties logic function agnostic whether input constant returns value qualified type input words functions input constant const-qualified return value well input variable const-qualified return value well type signature functions differs requires two functions potentially case multiple inputs logic – form generic programming problem arises even simple functions c standard library notably codice_134 observation credited ritchie tom plum mid 1980s codice_134 function locates character string formally returns pointer first occurrence character codice_146 string codice_121 classic c k r c prototype char *strchr char *s int c codice_134 function modify input string return value often used caller modify string p strchr q '/ thus one hand input string const since modified function input string const return value well – simply might return exactly input pointer first character match – hand return value const original string const since caller may wish use pointer modify original string c++ done via function overloading typically implemented via template resulting two functions return value const-qualified type input char* strchr char* int c const char* strchr const char* int c turn defined template template handled via codice_149 keyword acts wildcard const immutable unqualified variable yielding inout char strchr inout char int c however c neither possible since c function overloading instead handled single function input constant output writable char *strchr const char *s int c allows idiomatic c code strip const qualifier input actually const-qualified violating type safety solution proposed ritchie subsequently adopted difference one failures compatibility c c++ version 2 programming language two keywords relating const exist codice_150 keyword denotes data modified reference codice_1 keyword denotes non-mutable view mutable data unlike c++ codice_1 codice_1 codice_150 deep transitive anything reachable codice_1 codice_150 object codice_1 codice_150 respectively example const vs. immutable int foo new int 5 // foo mutable const int bar foo // bar const view mutable data immutable int baz foo // error views immutable data must immutable immutable int nums new immutable int 5 // mutable reference nums may created const int constnums nums // works immutable implicitly convertible const int mutablenums nums // error create mutable view immutable data example transitive deep const class foo immutable foo foo new immutable foo foo.next.num 5 // wo n't compile foo.next type immutable foo codice_1 introduced bjarne stroustrup c classes predecessor c++ 1981 originally called codice_140 motivation stroustrup writes first use scoped typed alternative macros analogously fulfilled function-like macros via codice_161 keyword constant pointers codice_162 notation suggested dennis ritchie adopted codice_1 adopted c part standardization appears c89 subsequent versions along type qualifier codice_24 qualifier codice_165 suggested december 1987 meeting x3j11 committee rejected goal ultimately fulfilled codice_166 keyword c99 ritchie supportive additions arguing carry weight ultimately argue removal standard subsequently inherited codice_1 c++ known type constructor type qualifier added two type constructors codice_150 codice_149 handle related use cases languages follow c/c++ constancy part type though often superficially similar constructs may use codice_1 keyword typically used constants constant objects c codice_1 keyword radically different simpler semantics means compile-time constant part type nim codice_1 keyword similar c also declares compile-time constant rather forming part type however nim constant declared expression evaluated compile time c c built-in types declared codice_1 user-defined types including classes structs arrays codice_1 java codice_1 – instead codice_138 applied local variable declarations applies identifier type different object-oriented use object members origin name java language specification regards codice_1 reserved keyword – i.e. one used variable identifier – assigns semantics reserved word used identifiers keyword special meaning thought reservation keyword occurred allow extension java language include c++-style codice_1 methods pointer codice_1 type enhancement request ticket implementing codice_1 correctness exists java community process closed 2005 basis impossible implement backwards-compatible fashion contemporary ada 83 independently notion constant object codice_10 keyword input parameters loop parameters implicitly constant codice_10 property object type javascript codice_1 declaration defines block-scoped variable reassigned redeclared defines read-only reference variable redefinded situations value variable may potentially change variable refers object property altered
[ 2451, 4302, 1361, 7071, 1640, 304, 2662, 7005, 1854, 7370, 7460, 6561, 851, 5510, 1435 ]
Train
271
4
IT_baseline_protection:baseline protection baseline protection german it-grundschutz approach german federal office information security fsi methodology identify implement computer security measures organization aim achievement adequate appropriate level security systems reach goal fsi recommends well-proven technical organizational personnel infrastructural safeguards organizations federal agencies show systematic approach secure systems e.g information security management system obtaining iso/iec 27001 certificate basis it-grundschutz term baseline security signifies standard security measures typical systems used various contexts somewhat different meanings example foundation baseline protection concept initially detailed risk analysis proceeds overall hazards consequently sophisticated classification according damage extent probability occurrence ignored three protection needs categories established help protection needs object investigation determined based appropriate personnel technical organizational infrastructural security measures selected baseline protection catalogs federal office security information technology baseline protection catalogs offer cookbook recipe normal level protection besides probability occurrence potential damage extents implementation costs also considered using baseline protection catalogs costly security analyses requiring expert knowledge dispensed since overall hazards worked beginning possible relative layman identify measures taken implement cooperation professionals fsi grants baseline protection certificate confirmation successful implementation baseline protection stages 1 2 based self declaration stage 3 independent fsi-licensed auditor completes audit certification process internationalization possible since 2006 iso/iec 27001 certification occur simultaneously baseline protection certification iso/iec 27001 standard successor bs 7799-2 process based new fsi security standards process carries development price prevailed time corporations certified bs 7799-2 standard obliged carry risk assessment make comfortable deviate protection needs analysis pursuant baseline protection catalogs advantage conformity strict fsi also attainment bs 7799-2 certification beyond fsi offers help aids like policy template gstool one data protection component available produced cooperation german federal commissioner data protection freedom information state data protection authorities integrated baseline protection catalog component considered however certification process following steps taken pursuant baseline protection process structure analysis protection needs analysis creation occurs following steps network includes totality infrastructural organizational personnel technical components serving fulfillment task particular information processing application area network thereby encompass entire character institution individual division partitioned organizational structures example departmental network shared applications example personnel information system necessary analyze document information technological structure question generate security concept especially apply baseline protection catalogs due today usually heavily networked systems network topology plan offers starting point analysis following aspects must taken consideration purpose protection needs determination investigate protection sufficient appropriate information information technology use connection damage application processed information could result breach confidentiality integrity availability considered important context realistic assessment possible follow-on damages division three protection needs categories low medium high high proved value public internal secret often used confidentiality heavily networked systems typically characterize information technology government business days rule therefore advantageous consider entire system individual systems within scope security analysis concept able manage task makes sense logically partition entire system parts separately consider part even network detailed documentation structure prerequisite use baseline protection catalogs network achieved example via structure analysis described baseline protection catalog’s components must ultimately mapped onto components network question modelling step baseline security check organisational instrument offering quick overview prevailing security level help interviews status quo existing network modelled baseline protection relative number security measures implemented baseline protection catalogs investigated result catalog implementation status dispensable yes partly entered relevant measure identifying yet partially implemented measures improvement options security information technology question highlighted baseline security check gives information measures still missing nominal vs. actual comparison follows remains done achieve baseline protection security measures suggested baseline check need implemented peculiarities taken account could several less unimportant applications running server lesser protection needs totality however applications provided higher level protection called cumulation effect applications running server determine need protection connection noted several applications run system occurs application greatest need protection determines system’s protection category conversely conceivable application great protection needs automatically transfer system may happen system configured redundantly inconsequential part running called distribution effect case example clusters baseline security check maps baseline protection measures level suffices low medium protection needs comprises 80 systems according fsi estimates systems high high protection needs risk analysis-based information security concepts like example iso/iec 27000-series standards usually used 2005 restructuring expansion baseline protection catalogs fsi separated methodology baseline protection catalog bsi 100-1 bsi 100-2 bsi 100-3 standards contain information construction information security management system isms methodology basic protection approach creation security analysis elevated elevated protection needs building completed baseline protection investigation bsi 100-4 emergency management standard currently preparation contains elements bs 25999 itil service continuity management combined relevant baseline protection catalog components essential aspects appropriate business continuity management bcm implementing standards renders certification possible pursuant bs 25999-2 fsi submitted fsi 100-4 standards design online commentary fsi brings standards line international norms like iso/iec 27001 way
[ 6391, 7402, 3745, 3962, 2254, 271 ]
Test
272
0
Gale–Church_alignment_algorithm:gale–church alignment algorithm computational linguistics gale–church algorithm method aligning corresponding sentences parallel corpus works principle equivalent sentences roughly correspond length—that longer sentences one language correspond longer sentences language algorithm described 1993 paper william a. gale kenneth w. church bell laboratories
[ 1314 ]
Test
273
1
Database_right:database right database right sui generis property right comparable distinct copyright exists recognise investment made compiling database even involve creative aspect reflected copyright rights often referred plural database rights trips agreement requires copyright protection extends databases compilations constitute intellectual creation virtue selection arrangement contents even contents constitute materials protected copyright many countries act accordance requirement databases protected copyright condition met separate intellectual property right protecting databases aspects meet condition copyright protection database right extends protection databases depend condition required copyright protection recognised small number jurisdictions notably european union european union law database rights specifically coded i.e sui generis laws copying dissemination information computer databases rights first introduced 1996 11 march 1996 council european union passed directive 96/9/ec 11 march 1996 legal protection databases giving specific separate legal rights limitations certain computer records law calls database rights rights afforded manual records eu database rights laws similar format identical afforded artistic works database rights last 15 years time database substantially modified however new set rights created database owner right object copying substantial parts database even data extracted reconstructed piecemeal database rights eu created automatically vested employers creators action creation part employment registered effect database rights independent copyright arrangement selection presentation data may protected copyright database whole protected database right 1 january 1998 copyright rights databases regulations 1997 came force act makes number amendments copyright designs patents act 1988 extending copyright databases defined 1997 act addition contains new legislation creates database right regulations 13 14 regulations database rights automatically subsist substantial investment obtaining verifying presenting contents database rights remain force regulation 17 2 end 15th calendar year date database first made available public period database right infringed person without consent extracts re-uses substantial part contents database whether repeated extractions insubstantial parts hand lawful user database right regulation 19 1 extract re-use insubstantial parts data purpose right restricted database owner regulation 19 2 term substantial defined mean substantial terms quantity quality combination article 1260 civil code russia database collection independent materials presented objective form articles accounts legal texts judicial decisions similar materials systematically arranged way materials found processed computer database need registered enjoy legal protection civil code russia provides registration rights useful claims disputed court specific law exists australia protecting databases databases may protected fall general copyright law australian copyright law regarding compilations currently examined case law initial case telstra v desktop marketing systems successfully litigated telstra establishing database right however overturned later ruling icetv v nine network sufficient creativity established defining characteristic copyright although federal law 9610 1998 law authorial rights confers database owners exclusive rights specifically copying distribution translation databases also states right contingent upon database result intellectual creation therefore offering database rights uncreative collections facts outside congressional authority copyright clause article § 8 cl 8 united states constitution therefore database right exists united states originality sine qua non copyright united states see feist publications v. rural telephone service stopped database owners lobbying introduction right far bills introduce us prevented successful lobbying research libraries consumer groups firms benefit free use factual information
[ 2748, 3035, 2054 ]
Test
274
9
Variable_shadowing:variable shadowing computer programming variable shadowing occurs variable declared within certain scope decision block method inner class name variable declared outer scope level identifiers names rather variables known name masking outer variable said shadowed inner variable inner identifier said mask outer identifier lead confusion may unclear variable subsequent uses shadowed variable name refer depends name resolution rules language one first languages introduce variable shadowing algol first introduced blocks establish scopes also permitted many derivative programming languages including c c++ java c language breaks tradition allowing variable shadowing inner outer class method containing class if-block containing method case statements switch block languages allow variable shadowing cases others example kotlin allow inner variable function shadow passed argument variable inner block shadow another outer block java allow languages allow passed argument function/method shadow class field languages disallow variable shadowing completely coffeescript following lua code provides example variable shadowing multiple blocks following python code provides another example variable shadowing variable declaration variable assignment python keyword codice_1 introduced python 3 shall used avoid variable shadowing assign non-local variables keyword codice_2 shall used avoid variable shadowing assign global variables ecmascript 6 introduction let const block scoping allow variable shadowing
[ 790, 3368, 5965, 7333, 5731, 7391, 8097, 6980, 1435 ]
Validation
275
3
Future_Knight:future knight future knight video game released gremlin graphics 1986 several home computer systems space cruiser s.s. rustbucket crashed planet 2749 zragg system passengers taken hostage spegbott terrible minions among princess amelia beloved future knight randolph teleported wreck rustbucket defeat spegbott rescue future knight 2d flip screen platform game player must guide randolph twenty levels hostile robots aliens defeating spegbott rescuing amelia undocumented level editor included spectrum version accessed main menu pressing key combination edit-f-k game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 1 5 stars stating ’ inside spaceship trying find princess distress really dumb game
[]
Test
276
3
INT_10H:int 10h int 10h int 10h int 16 shorthand bios interrupt call 10 17th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides video services services include setting video mode character string output graphics primitives reading writing pixels graphics mode use call load ah number desired subfunction load required parameters registers make call int 10h fairly slow many programs bypass bios routine access display hardware directly setting video mode done infrequently accomplished using bios drawing graphics screen game needs done quickly direct access video ram appropriate making bios call every pixel furthermore modern x86 system bios calls performed real mode virtual 8086 mode v8086 option long mode means modern operating system operates protected mode 32 bit long mode 64 bit would need switch real mode back call bios hugely expensive operation although modern systems typically use device drivers directly set video mode feasible hobbyist systems device driver every video card problem also plagues older unsupported systems windows 98 systems instead drop real mode switch video mode draw framebuffer directly
[ 4271, 1052, 5784, 4061, 352, 3137, 858 ]
Test
277
2
UserLinux:userlinux userlinux project create operating system based debian targeted business customers goal provide businesses freely available high quality operating system accompanied certifications service support options project initiated bruce perens late 2003 subsequent 2005 major success ubuntu commercial linux distribution based debian canonical ltd. much aims userlinux project lost steam software shipped project ultimately abandoned
[ 5200, 1629, 3444, 7251, 2916, 474, 7075, 5571, 1941, 314, 2758, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 7954, 6244 ]
Test
278
3
ARM_Cortex-A53:arm cortex-a53 arm cortex-a53 one first two microarchitectures implementing armv8-a 64-bit instruction set designed arm holdings cambridge design centre cortex-a53 2-wide decode superscalar processor capable dual-issuing instructions announced october 30th 2012 marketed arm either stand-alone energy-efficient alternative powerful cortex-a57 microarchitecture used alongside powerful microarchitecture big.little configuration available ip core licensees like arm intellectual property processor designs arm cortex-a53 processor used lemaker hikey since 2015 raspberry pi 3 since february 2016 cortex-a53 also used number qualcomm snapdragon socs semi-custom derivatives cortex-a53 used kryo 250 kryo 260 cpus processor used odroid-c2 roku streaming media players high-end models 2016 2017 models another notable cortex-a53 application pine a64/a64+ single-board computer cores used 24-core soc socionext synquacer sc2a11 processor used amazon fire tablets including fire hd 8 fire hd 10 latter also includes cortex-a72 cores
[ 6421, 7890, 722, 5737, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 446, 451, 6874, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 3397, 1977, 2339, 2711, 1995, 550, 3786, 568, 2024, 5576, 1284, 4879, 7376, 5585, 4166,...
Test
279
9
Compile_time_function_execution:compile time function execution compile-time function execution compile time function evaluation general constant expressions ability compiler would normally compile function machine code execute run time execute function compile time possible arguments function known compile time function make reference attempt modify global state pure function value arguments known compiler may still able perform level compile-time function execution partial evaluation possibly producing optimized code arguments known lisp macro system early example use compile-time evaluation user-defined functions language metacode extension c++ vandevoorde 2003 early experimental system allow compile-time function evaluation ctfe code injection improved syntax c++ template metaprogramming earlier versions c++ template metaprogramming often used compute values compile time using compile-time function evaluation code used compute factorial would similar one would write run-time evaluation e.g using c++11 constexpr c++11 technique known generalized constant expressions codice_1 c++14 relaxes constraints constexpr – allowing local declarations use conditionals loops general restriction data required execution available compile-time remains example compile time function evaluation c++14 example compile time function evaluation programming language example specifies valid function called factorial would typically evaluated run time use codice_2 tells compiler initializer variables must computed compile time note arguments function must able resolved compile time well ctfe used populate data structures compile-time simple way version 2
[ 1361, 4543, 7416, 1854, 6982 ]
Test
280
2
OSv:osv osv stylized os cloud computing focused computer operating system released september 16 2013 special-purpose operating system built run guest top virtual machine thus include drivers bare-metal hardware unikernel designed run single linux executable application written one supported runtime environments java reason support notion users multiuser system processes everything runs kernel address space using single address space removes time-consuming operations associated context switching uses large amounts code freebsd operating system particular network stack zfs file system osv managed using rest management api optional command line interface written lua
[ 1807, 4295, 4297, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 753, 4347, 65, 2961, 7581, 4733, 6489, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 6505, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 3368, 2300, 126,...
Validation
281
4
Multibook:multibook multibook taclane multibook single laptop combines two three different classified networks single device solution currently secure computing standards require federal government military personnel maintain multiple pcs different networks effort allow users simultaneous access unclassified classified information multibook simply complex configuration allows separate enclaves virtual machines one display multibook hard drive uses cryptographic ignition key create virtual hard drive space type 1 comsec element found inside multibook ’ integrated suite b security module security module known haipe protects information stored computer well data sent networks classified secret due lack stored collateral data multibooks burdensome comsec handling requirements data rest dar equipment turned multibooks nsa certified protect information classified secret approved suite b information/processing data transit dit encryption protecting information sent classified networks multibook security benefit user device chvp device considered cci like devices used collateral processing
[ 1671 ]
Test
282
0
BabelNet:babelnet babelnet multilingual lexicalized semantic network ontology developed sapienza university rome department computer science linguistic computing laboratory babelnet automatically created linking wikipedia popular computational lexicon english language wordnet integration done using automatic mapping filling lexical gaps resource-poor languages using statistical machine translation result encyclopedic dictionary provides concepts named entities lexicalized many languages connected large amounts semantic relations additional lexicalizations definitions added linking free-license wordnets omegawiki english wiktionary wikidata framenet verbnet others similarly wordnet babelnet groups words different languages sets synonyms called babel synsets babel synset babelnet provides short definitions called glosses many languages harvested wordnet wikipedia babelnet version 4.0 covers 284 languages including european languages asian languages latin babelnet 4.0 contains almost 16 million synsets 833 million word senses regardless language babel synset contains 2 synonyms per language i.e. word senses average semantic network includes lexico-semantic relations wordnet hypernymy hyponymy meronymy holonymy antonymy synonymy etc. totaling around 364,000 relation edges well underspecified relatedness relation wikipedia totaling around 1,3 bilion edges version 4.0 also associates 53 million images babel synsets provides lemon rdf encoding resource available via sparql endpoint 2.67 million synsets assigned domain labels babelnet shown enable multilingual natural language processing applications lexicalized knowledge available babelnet shown obtain state-of-the-art results babelnet received meta prize 2015 groundbreaking work overcoming language barriers multilingual lexicalised semantic network ontology making use heterogeneous data sources babelnet featured prominently time magazine article new age innovative up-to-date lexical knowledge resources available web
[ 4635, 6166, 5303, 5571, 4037, 7485 ]
Test
283
9
Harry_Mairson:harry mairson harry george mairson theoretical computer scientist professor computer science volen national center complex systems brandeis university waltham massachusetts research fields logic computer science lambda calculus functional programming type theory constructive mathematics computational complexity theory algorithmics mairson received b.a mathematics yale university 1978 ph.d. computer science stanford university 1984 supervision jeffrey ullman ph.d. thesis program complexity searching table machtey award 1983 ieee symposium foundations computer science focs mairson postdoctoral researcher inria rocqencourt 1984 1985 stanford university 1985 university oxford 1986 held visiting professor position 1999 2001 boston university 2005 2007 mairson served chair faculty senate brandeis currently associate editor journal logical methods computer science information computation sits editorial board higher-order symbolic computation mairson contributions theory programming languages include proving type inference ml programming language so-called hindley–milner type inference complete exponential time parallel beta reduction non-elementary
[ 5164, 1243 ]
Test
284
4
Information_Security_Forum:information security forum information security forum isf independent information security body isf delivers range content activities tools isf paid membership organisation products services included membership fee time time isf makes research documents papers available non-members isf released updated standard good practice information security 2018 standard available isf members non-members purchase copies report 2018 standard represents update 2016 release standard builds upon previous release include up-to-date controls approaches thought leadership information security standard business-focused practical comprehensive guide available identifying managing information security risks organizations 2016 standard covers current information security 'hot topics threat intelligence cyber attack protection industrial control systems well significant enhancement existing topics including information risk assessment security architecture enterprise mobility management used build comprehensive effective information security management system addition covering information security-related standards cobit 5 information security cis critical security controls effective cyber defense 2016 standard covers iso/iec 27002 well pci dss 3.1 nist cybersecurity framework based member input isf selects number topics research given year research includes interviewing member non-member organizations thought leaders academic researchers key individuals well examining range approaches issue resulting reports typically go depth describing issue generally outlining key information security issues considered proposing process address issue based best practices broad fundamental areas information risk assessment return-on-investment calculations isf develops comprehensive methodologies formalize approaches issues supporting methodology isf supplies web spreadsheet-based tools automate functions isf benchmark formerly called 'information security status survey well-established pedigree – harnessing collective input hundreds world leading organizations 25 years organizations participate benchmark service time use web-based tool assess security performance across range different environments compare security strengths weaknesses organizations measure performance isf 2016 standard good practice iso/iec 27002:2013 cobit version 5 information security benchmark provides variety data export functionality used analyzing presenting data management reporting creation security improvement programs updated biennial basis align latest thinking information security provide isf members improved user experiences added value regional chapter meetings activities provide face-to-face networking among individuals isf member organisations isf encourages direct member-to-member contact address individual questions strengthen relationships chapter meetings activities conducted around world address local issues language/cultural dimensions isf annual global conference 'world congress takes place different city year 2017 conference take place october cannes france event offers opportunity attendees discuss find solutions current security challenges gain practical advice peers leading industry experts around world 1,000 global senior executives attend event includes series keynote presentations workshops networking sessions best practice thought leadership confidential peer-group environment isf extranet portal isf live enables members directly access isf materials including member presentations messaging forums contact information webcasts online tools data member use members isf regional chapters elect council develop work program generally represent member interests council elects 'executive group responsible financial strategic objectives see list computing information-security related articles
[ 904, 2513, 7486, 7560, 3474, 8091, 308, 4440, 6301 ]
Test