node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
285
3
Uncharted_Waters:uncharted waters uncharted waters originally released great age sailing japanese video game series produced koei rekoeition brand simulation role-playing video game series dealing sailing trading themed around age discovery games player takes role captain commodore translations manages seagoing fleet participate trades privateering treasure hunting exploration plain piracy even though series largely open-ended still loose plot requires player follow certain paths deviating paths may stall progress story east asia series large cult following received much recognition outside region however compared earlier sid meier pirates gameplay theme japan term daikoukai jidai refers age discovery period 15th century 17th century european explorers sailed seas open new alternative ways asia ottoman empire blocked land routes period characterized rivalry spain portugal advent colonization general exploration later games countries also involved historical events age discovery like treaty tordesillas mentioned game series makes many references historical background although much like pirates treacherous details era idealized create adventurous exciting mood first game series player assumes role leon franco young ambitious son noble family fallen hard times portugal goal game restore family former glory achieve leon dreams three nations represented portugal spain ottoman empire although many neutral ports around world player invest thus make part portugal sphere influence well discovering ports defeating merchants pirates sea battles increases leon fame increased fame leon complete tasks king portugal gain higher titles nobility story set early 16th century released msx nes 1991 sega mega drive/genesis snes 1992 snes version originally titled super daikoukai jidai japan many snes ports koei games english versions also released years respectively game ported pc macintosh well also set 16th century game sequel first title released nec pc-98 snes genesis/mega drive pc 1994 also saw releases 1996 sega saturn playstation japan exclusively snes version released nintendo virtual console japan march 17 2009 north america april 6 2009 wii japan october 30 2013 north america november 14 2013 first time europe november 28 2013 wii u game six protagonists choose representing different path career featured game game less open-ended developing character career necessary advance plot time release snes version game noted contain superior music ports game game took advantage snes nintendo s-smp chip used high quality instrument samples hand console ports game time released consoles used opl2 family chipset music pc could support high quality samples via sound blaster awe32 gravis ultrasound family cards pc port game take advantage advanced solutions instead choosing optimized adlib music cards used opl2 chip music saturn playstation version contained enhanced fmv opening cutscenes reviewing genesis version gamepro deemed game acquired taste due bare bones presentation frequent money-managing concluded interest four masted voyages european discovery could read history book play game excitement levels mobile phone version daikoukai jidai ii series changes include released 1996 pc title first depart formula engine series traditional focus story removed game character customization possible purely decorative two player characters portugal spain although differences mainly mechanical role-playing element greatly reduced theme exploration heavily emphasized land travel possible lot explored discovered overall compared early titles game starts mid fifteenth century allows player make historical discoveries new world route india well conquer civilizations like aztec inca empire also game experiments concept language video game feature uncommon industry necessitating hiring translators teachers player also continue game marrying bar-girls children turn continue seafaring tradition even take part father skills inventory perhaps due dramatic changes daikoukai jidai 3 left players uncomfortable failed achieve much popularity even within japan initial release title caused controversy allowing slave trade game feature disabled later updates unlike games series game never released consoles released pc working windows 2000 released 1997 playstation sega saturn game uses engine ii focuses story two characters instead expounding upon loose plot ties series together two protagonists follows fourth game series released playstation pc windows 2000 xp game returns previous formula although open-endedness decreased engine updated title plot-wise unrelated series ended gaiden porto estado known fine art high-quality illustrations story evolves search seven proof conqueror seven ancient artifacts seven areas around world northern europe mediterranean africa new world indian ocean south asia east asia said proofs proves sailor champion sailors four sailors plus another three expansion unwittingly involved struggle quest search proof conqueror interesting sailors europe two seven characters asia one east asia another southeast asia one caribbean another one middle east many significant changes game example game longer concept years result characters game age player also set regional fleets regional fleets valuable financial resources combat naval battle fought real time country boundaries disappeared character represented guild home country important gameplay ports game also market share rating percentage scale players trade port guild market share port gained signing contract local governor native windows 2000 xp support introduced koei rerelease sourcenext release windows game version adds following rota nova released koei march 23 2006 playstation portable nintendo ds remake porto estado handhelds mobile phone version daikoukai jidai iv series free play web browser game sequel daikoukai jidai iv series version includes sonia de la cruz sr card adds skill female intuition lv.1 rank x merchant vessel black herring herring buss scout ticket gold++ 1 million gold coins start game 5000np scouting points adds 50 free scoutings uncharted waters online offers much gameplay experience seen single player games multiplayer environment players single player series well aware similar concepts missions adjutants investment national pirate npc fleets country boundaries reappeared countries spain portugal venice ottoman empire france england netherlands however concept time non-existent storyline important unlocking new areas game player receives fame activities battling trading discovering sailing fame levels reach required amounts player unlocks new areas world level fame required differ country country game introduces 3d-environment directx 9.0c capabilities mmorpg game features fleet operations party-system companies guilds player versus player combat trade adventure poker large-scale factional warfare along single player storyline player-vs-environment quests soundtracks uncharted waters new horizons composed yoko kanno soundtrack uncharted waters online based part works dave arneson computer gaming world 1992 criticized first uncharted waters inaccurate history geography flawed repetitive game play looking variety surprises weigh anchor sail another game one-dimensional npcs unlike koei games concluded compared could mildly disappointing 1993 survey pre 20th-century strategy games magazine gave game zero stars five stating geography inaccurate user interface could bear improvement game play interesting
[ 4759, 4277, 6237, 8015, 5775, 2085 ]
Test
286
0
Kumiko_Tanaka-Ishii:kumiko tanaka-ishii kumiko tanaka-ishii born 1969 computational linguist associate professor department creative informatics graduate school information science technology university tokyo japan author semiotics programming award-winning book semiotically analyzing computer programs along three axes models signs kinds signs systems signs tanaka-ishii received doctorate university tokyo 1997 1995 completing phd visiting researcher laboratoire d'informatique pour la mécanique et les sciences de l'ingénieur limsi national center scientific research cnrs paris worked semantic proximity matrices japanese language 2010 awarded suntory prize social sciences humanities okawa publications prize book semiotics programming book critically favorably reviewed linguistic philosophical investigations cognitive technology journal semiotica
[ 1314 ]
Test
287
4
Watermark_(data_file):watermark data file watermark stored data file refers method ensuring data integrity combines aspects data hashing digital watermarking useful tamper detection though advantages disadvantages typical data hash process input file produce alphanumeric string unique data file file modified one bit changes occur within original file hash process modified file produce different alphanumeric method trusted source calculate hash original data file subscribers verify integrity data subscriber simply compares hash received data file known hash trusted source lead two situations hash hash different hash results systems involved appropriate degree confidence integrity received data hand hash results different conclude received data file altered process common p2p networks example bittorrent protocol part file downloaded data checked hash key known hash check upon result data kept discarded digital watermarking distinctly different data hashing process altering original data file allowing subsequent recovery embedded auxiliary data referred watermark subscriber knowledge watermark recovered determine certain extent whether significant changes occurred within data file depending specific method used recovery embedded auxiliary data robust post-processing lossy compression data file retrieved image provider embed watermark protection purposes process allows tolerance change still maintaining association original image file researchers also developed techniques embed components image within image help identify portions image may contain unauthorized changes even help recovering lost data disadvantage digital watermarking subscriber significantly alter files without sacrificing quality utility data true various files including image data audio data computer code
[ 1008, 3257, 5785 ]
Validation
288
4
Restriction_of_Hazardous_Substances_Directive:restriction hazardous substances directive restriction hazardous substances directive 2002/95/ec rohs 1 short directive restriction use certain hazardous substances electrical electronic equipment adopted february 2003 european union rohs 1 directive took effect 1 july 2006 required enforced became law member state directive restricts exceptions use six hazardous materials manufacture various types electronic electrical equipment closely linked waste electrical electronic equipment directive weee 2002/96/ec sets collection recycling recovery targets electrical goods part legislative initiative solve problem huge amounts toxic electronic waste speech rohs often spelled pronounced refers eu standard unless otherwise qualified european union member state adopt enforcement implementation policies using directive guide rohs often referred lead-free directive restricts use following ten substances dehp bbp dbp dibp added part directive eu 2015/863 published 31 march 2015 pbb pbde flame retardants used several plastics hexavalent chromium used chrome plating chromate coatings primers chromic acid maximum permitted concentrations non-exempt products 0.1 1000 ppm except cadmium limited 0.01 100 ppm weight restrictions homogeneous material product means limits apply weight finished product even component single substance could theoretically separated mechanically — example sheath cable tinning component lead example radio composed case screws washers circuit board speakers etc screws washers case may made homogenous materials components comprise multiple sub-components many different types material instance circuit board composed bare printed circuit board pcb integrated circuits ic resistors capacitors switches etc switch composed case lever spring contacts pins etc. may made different materials contact might composed copper strip surface coating loudspeaker composed permanent magnet copper wire paper etc everything identified homogeneous material must meet limit turns case made plastic 2,300 ppm 0.23 pbb used flame retardant entire radio would fail requirements directive effort close rohs 1 loopholes may 2006 european commission asked review two currently excluded product categories monitoring control equipment medical devices future inclusion products must fall rohs compliance addition commission entertains requests deadline extensions exclusions substance categories substance location weight new legislation published official journal july 2011 supersedes exemption note batteries included within scope rohs however europe batteries european commission 1991 battery directive 91/157/eec recently increased scope approved form new battery directive version 2003/0282 cod official submitted published eu official journal first battery directive addressed possible trade barrier issues brought disparate european member states implementation new directive explicitly highlights improving protecting environment negative effects waste contained batteries also contains programme ambitious recycling industrial automotive consumer batteries gradually increasing rate manufacturer-provided collection sites 45 2016 also sets limits 5 ppm mercury 20 ppm cadmium batteries except used medical emergency portable power-tool devices though setting quantitative limits quantities lead lead–acid nickel nickel–cadmium batteries cites need restrict substances provide recycling 75 batteries substances also provisions marking batteries symbols regard metal content recycling collection information directive applies equipment defined section weee directive following numeric categories apply apply fixed industrial plant tools compliance responsibility company puts product market defined directive components sub-assemblies responsible product compliance course given fact regulation applied homogeneous material level data substance concentrations needs transferred supply chain final producer ipc standard recently developed published facilitate data exchange ipc-1752 enabled two pdf forms free use rohs applies products eu whether made within eu imported certain exemptions apply updated occasion eu rohs restricted substances used broad array consumer electronics products examples components contained lead include cadmium found many components examples include plastic pigmentation nickel–cadmium nicd batteries cds photocells used night lights mercury used lighting applications automotive switches examples include fluorescent lamps mercury tilt switches rarely used nowadays hexavalent chromium used metal finishes prevent corrosion polybrominated biphenyls diphenyl ethers/oxides used primarily flame retardants rohs efforts reduce hazardous materials electronics motivated part address global issue consumer electronics waste newer technology arrives ever-increasing rate consumers discarding obsolete products sooner ever waste ends landfills countries like china recycled fashion-conscious mobile market 98 million u.s. cell phones took last call 2005 told epa estimates u.s. year 1.5 1.9 million tons computers tvs vcrs monitors cell phones equipment discarded sources electronic waste tallied could total 50 million tons year worldwide according un environment programme american electronics sent offshore countries like ghana west africa guise recycling may harm good adult child workers jobs poisoned heavy metals metals returning u.s. u.s. right shipping large quantities leaded materials china china world major manufacturing center dr. jeffrey weidenhamer says chemistry professor ashland university ohio surprising things coming full circle 're getting contaminated products back addition high-tech waste problem rohs reflects contemporary research past 50 years biological toxicology acknowledges long-term effects low-level chemical exposure populations new testing capable detecting much smaller concentrations environmental toxicants researchers associating exposures neurological developmental reproductive changes rohs environmental laws contrast historical contemporary law seek address acute toxicology direct exposure large amounts toxic substances causing severe injury death united states environmental protection agency epa published life-cycle assessment lca environmental impacts lead-free tin–lead solder used electronic products bar solders lead-free solders considered tin/copper alternative lowest best scores paste solders bismuth/tin/silver lowest impact scores among lead-free alternatives every category except non-renewable resource consumption paste bar solders lead-free solder alternatives lower better lca score toxicity categories tin/lead solder primarily due toxicity lead amount lead leaches printed wiring board assemblies determined leachability study conducted partnership study results providing industry objective analysis life-cycle environmental effects leading candidate alternative lead-free solders allowing industry consider environmental concerns along traditionally evaluated parameters cost performance assessment also allowing industry redirect efforts toward products processes reduce solders environmental footprint including energy consumption releases toxic chemicals potential risks human health environment another life-cycle assessment ikp university stuttgart shows similar results epa study ban concentrations brominated flame retardants bfr 0.1 plastics affected plastics recycling products include recycled plastics become critical know bfr concentration plastics either tracing origins recycled plastics establish bfr concentrations measuring bfr concentrations samples plastics high bfr concentrations costly handle discard whereas plastics levels 0.1 value recyclable materials number analytical techniques rapid measurement bfr concentrations x-ray fluorescence spectroscopy confirm presence bromine br indicate bfr concentration specific molecule ion attachment mass spectrometry iams used measure bfr concentrations plastics bfr ban significantly affected upstream plastic material selection downstream plastic material recycling rohs 2 directive 2011/65/eu evolution original directive became law 21 july 2011 took effect 2 january 2013 addresses substances original directive improving regulatory conditions legal clarity requires periodic re-evaluations facilitate gradual broadening requirements cover additional electronic electrical equipment cables spare parts ce logo indicates compliance rohs 2 declaration conformity detailed see 2012 final report european commission revealed eu member states considered toys scope primary rohs 1 directive 2002/95/ec irrespective whether primary secondary functions using electric currents electromagnetic fields implementation rohs 2 rohs recast directive 2011/65/eu concerned member states comply new regulation key difference recast necessary demonstrate conformity similar way lvd emc directives able show compliance sufficiently detailed files ensuring implemented production criminal offence like ce marking directives mandates production control traceability technical files describes 2 methods achieving presumption conformity directive 2011/65/eu article 16.2 either technical files include test data materials standard accepted official journal directive used currently standard en50581 risk based method reduce amount test data required harmonised standards list rohs2 ojeu c363/6 one consequences requirement demonstrate conformity requirement know exemption use component otherwise possible know compliance product placed market point time product must 'compliant many understand 'compliance varies depending exemptions force quite possible make non-compliant product 'compliant components compliance must calculated day placing market reality means knowing exemption status components using stock old status parts expire date exemptions directive 2011/65/eu article 7.b referring decision 768/2008/ec module internal production control system manage could seen lack diligence criminal prosecution could occur uk instrument 2012 n. 3032 section 39 penalties rohs 2 also dynamic approach exemptions creating automatic expiration exemptions renewed requests industry additionally new substances added controlled list 4 new substances expected controlled 2019 mean greater information control update systems required differences include new responsibilities importers distributors markings improve traceability technical files part nlf directives make supply chain active part policing directive 2011/65/eu articles 7 9 10 recent additional amendment 2017/2102 2011/65 rohs 2 directive 2011/65/eu contains allowance add new materials 4 materials highlighted attention original version amendment 2015/863 adds four additional substances annex ii 2011/65/eu 3/4 new restrictions recommended investigation original directive ref para 10 preamble another reason simple component rohs compliance statements acceptable compliance requirements vary depending date product placed market ref en50581:2012 additional four substances restriction evidence requirements shall applied products placed market 22 july 2019 except exemptions permit stated annex iii. although time writing exemptions exist applied materials four additional substances maximum permitted concentrations non-exempt products 0.1 new substances also listed reach candidate list dehp authorised manufacturing use substance eu annexe xiv reach 80 exemptions quite broad exemptions automatically expire 5 7 years unless renewed according hewlett packard european union gradually narrowing scope expiring many current rohs exemptions addition likely new substance restrictions introduced next several years exemptions medical devices exempt original directive rohs 2 narrowed exemption scope active implantable medical devices category 4h vitro diagnostic devices ivdd medical devices included automotive vehicles exempt category 4f vehicles instead addressed end life vehicles directive directive 2000/53/ec products within scope rohs 2 directive must display ce mark manufacturers name address serial batch number parties needing know detailed compliance information find eu declaration conformity product created manufacturer brand owner responsible design eu representative regulation also requires actors supply chain product importer distributors keep check document well ensuring conformance process followed correct language translation instructions provided manufacturer must keep certain documentation demonstrate conformity known technical file technical records directive requires manufacturer demonstrate conformity use test data materials following harmonised standard en50581:2012 standard time writing regulators may request file likely specific data likely large rohs require specific product labelling many manufacturers adopted compliance marks reduce confusion visual indicators included explicit rohs compliant labels green leaves check marks pb-free markings chinese rohs labels lower case e within circle arrows also imply compliance rohs 2 attempts address issue requiring aforementioned ce mark whose use policed trading standards enforcement agency states permitted indication rohs compliance ce mark closely related weee waste electrical electronic equipment directive became law simultaneously rohs depicts waste-can logo x often accompanies ce mark new substance restrictions considered introduction next years include phthalates brominated flame retardants bfrs chlorinated flame retardants cfrs pvc california passed electronic waste recycling act 2003 ewra law prohibits sale electronic devices 1 january 2007 prohibited sold eu rohs directive across much narrower scope includes lcds crts like covers four heavy metals restricted rohs ewra also restricted material disclosure requirement effective 1 january 2010 california lighting efficiency toxics reduction act applies rohs general purpose lights i.e lamps bulbs tubes electric devices provide functional illumination indoor residential indoor commercial outdoor use us states cities debating whether adopt similar laws several states mercury pbde bans already worldwide standards certification available qc 080000 standard governed national standards authority ireland ensure control hazardous substances industrial applications 2012 sweden chemicals agency kemi electrical safety authority tested 63 consumer electronics products found 12 compliance kemi claims similar testing results prior years eleven products contained prohibited levels lead one polybrominated diphenyl ether flame retardants details seven companies passed swedish prosecutors kemi says levels non-compliance rohs similar previous years remain high rohs environmental standard electronic product developers aware manufacturers find cheaper single bill materials product distributed worldwide instead customising product fit country specific environmental laws therefore develop standards allow strictest allowable substances example ibm forces suppliers complete product content declaration form document compliance environmental standard 'baseline environmental requirements materials parts products ibm logo hardware products thus ibm banned decabde even though formerly rohs exemption material overturned european court 2008 similarly hewlett-packard environmental standard adverse effects product quality reliability plus high cost compliance especially small business cited criticisms directive well early research indicating life cycle benefits lead-free solder versus traditional solder materials mixed criticism earlier came industry resistant change misunderstanding solders soldering processes deliberate misinformation espoused resist perceived non-tariff barrier created european bureaucrats many believe industry stronger experience better understanding science technologies involved one criticism rohs restriction lead cadmium address prolific applications costly electronics industry comply specifically total lead used electronics makes 2 world lead consumption 90 lead used batteries covered battery directive mentioned requires recycling limits use mercury cadmium restrict lead another criticism less 4 lead landfills due electronic components circuit boards approximately 36 due leaded glass cathode ray tube monitors televisions contain 2 kg per screen common lead-free solder systems higher melting point e.g 30 °c typical difference tin-silver-copper alloys wave soldering temperatures approximately ~255 °c however temperature typical lead free solders longer wetting times eutectic pb/sn 37:63 solder additionally wetting force typically lower disadvantageous hole filling advantageous situations closely spaced components care must taken selection rohs solders formulations harder less ductility increasing likelihood cracks instead plastic deformation typical lead-containing solders cracks occur due thermal mechanical forces acting components circuit board former common manufacturing latter field rohs solders exhibit advantages disadvantages respects dependent packaging formulation editor conformity magazine wondered 2005 transition lead-free solder would affect long-term reliability electronic devices systems especially applications mission-critical consumer products citing possible breaches due environmental factors like oxidation 2005 farnell/newark inone rohs legislation technical manual cites lead-free solder issues potential reliability concerns addressed annex item 7 rohs directive granting specific exemptions regulation 2010 issues raised directive first implemented 2003 reliability effects less known another potential problem lead-free high tin-based solders may face growth tin whiskers thin strands tin grow make contact adjacent trace developing short circuit historically tin whiskers associated handful failures including nuclear power plant shutdown pacemaker incident pure tin plating used however failures pre-date rohs also involve consumer electronics therefore may employ rohs-restricted substances desired help mitigate potential problems lead-free manufacturers using variety approaches tin-zinc formulations produce non-conducting whiskers formulations reduce growth although halt growth completely circumstances fortunately experience thus far suggests deployed instances rohs compliant products failing due whisker growth dr. ronald lasky dartmouth college reports rohs force 15 months 400b rohs-compliant products produced products field significant numbers tin whisker-related failures reported whisker growth occurs slowly time unpredictable fully understood time may true test efforts whisker growth even observable lead-based solders albeit much smaller scale countries exempted medical telecommunication infrastructure products legislation however may moot point since electronic component manufacturers convert production lines producing lead-free parts conventional parts eutectic tin-lead solder simply available even military aerospace industrial users extent solder involved least partially mitigated many lead-free components compatibility lead-containing solder processes leadframe-based components quad flat packages qfp small outline integrated circuits soic small outline packages sop gull wing leads generally compatible since finish part leads contributes small amount material finished joint however components ball grid arrays bga come lead-free solder balls leadless parts often compatible lead-containing processes de minimis exemptions e.g. micro-businesses economic effect anticipated least attempts mitigating effect made another form economic effect cost product failures switch rohs compliance example tin whiskers responsible 5 failure rate certain components swiss swatch watches 2006 prior july implementation rohs reportedly triggering us 1 billion recall swatch responded applying exemption rohs compliance denied rohs helps reduce damage people environment third-world countries much today high-tech waste ends use lead-free solders components reduces risks electronics industry workers prototype manufacturing operations contact solder paste longer represents health hazard used contrary predictions widespread component failure reduced reliability rohs first anniversary july 2007 passed little fanfare contemporary consumer electronics rohs compliant 2013 millions compliant products use worldwide many electronics companies keep rohs status pages corporate websites example amd website states although lead containing solder completely eliminated applications today amd engineers developed effective technical solutions reduce lead content microprocessors chipsets ensure rohs compliance minimizing costs maintaining product features change fit functional electrical performance specifications quality reliability standards rohs compliant products expected identical compared current packages rohs printed circuit board finishing technologies surpassing traditional formulations fabrication thermal shock solder paste printability contact resistance aluminium wire bonding performance nearing performance attributes properties lead-free solder high temperature resilience used prevent failures harsh field conditions conditions include operating temperatures test cycles range −40 °c +150 °c severe vibration shock requirements automobile manufacturers turning rohs solutions electronics move engine bay one major differences lead-containing lead-free solder pastes flow solder liquid state lead-containing solder lower surface tension tends move slightly attach exposed metal surfaces touch part liquid solder lead-free solder conversely tends stay place liquid state attaches exposed metal surfaces liquid solder touches lack flow – typically seen disadvantage lead lower quality electrical connections – used place components tightly used placed due properties lead-containing solders example motorola reports new rohs wireless device assembly techniques ... enabling smaller thinner lighter unit motorola q phone would possible without new solder lead-free solder allows tighter pad spacing research new alloys technologies allowing companies release rohs products currently exempt compliance e.g computer servers ibm announced rohs solution high lead solder joints thought remain permanent exemption lead-free packaging technology ... offers economical advantages relation traditional bumping processes solder waste reduction use bulk alloys quicker time-to-market products much lower chemical usage rate test measurement vendors national instruments also started produce rohs-compliant products despite devices category exempt rohs directive
[ 4656, 3764, 8061, 2593, 2029, 418, 1040 ]
Test
289
7
Zonbu:zonbu zonbu technology company markets computing platform combines web-centric service small form factor pc open source based software architecture zonbu founded alain rossmann previously founder ceo openwave gregoire gentil previously co-founder twingo systems first-generation zonbox hardware ebox-4854 sold dmp electronics taiwan called zonbu mini nettop computer measuring 6 ¾ ” × 4 ¾ ” × 2 ¼ ” flash based fanless thus effectively silent official specifications device 2007 1.2 ghz via eden cpu c7 esther core 512 mb ram ethernet twisted pair 10/100 mbit/s ps/2 keyboard mouse ports vga display port 6 usb 2.0 ports 4 gb compactflash local storage graphics 2048 x 1536 16 million colors – hardware graphics mpeg2 acceleration disassembly zonbu owners shown zonbu includes options internal expansion mini pci slot optional wireless card ide connector room case 2.5 hard drive serial parallel ports zonbu subscription plans include online storage using amazon s3 automatic upgrades online support remote file access subscription service promoted reducing hassle typical computer maintenance tasks hardware repair software installation updates upgrades malicious software removal zonbu os customized version linux based gentoo distribution using xfce desktop environment geared towards non-technical users user interface focuses simplicity advanced features filesystem architecture combines transparent overlay filesystem pioneered linux live distributions on-line backup service user data locally cached compact flash card transparently encrypted 128-bit encryption transferred remote storage servers amazon s3 zonbu comes pre-loaded number software applications include firefox web browser openoffice productivity suite skype ip phone service 30 casual games default os user allowed install third-party software default set applications supposed fit needs non-technical users second home pc however zonbu provides instructions unlock operating system install additional software procedure technical intended minority users standard many linux users unlocking grub root install emerge/portage
[ 1066, 2538, 2988, 7613, 632, 1167, 1634, 3091, 6262, 3524, 4317, 4594, 6806, 3627, 2744, 7049, 5927, 2212, 6443, 578, 5135, 1284, 2758, 1202, 1757, 3028, 7838, 5236, 842, 7919, 5064, 330, 4627, 3734, 1680, 1973, 2961, 2338, 7037, 2700, ...
Validation
290
3
Load–store_architecture:load–store architecture computer engineering load–store architecture instruction set architecture divides instructions two categories memory access load store memory registers alu operations occur registers risc instruction set architectures powerpc sparc risc-v arm mips load–store architectures instance load–store approach operands destination add operation must registers differs register–memory architecture example cisc instruction set architecture x86 one operands add operation may memory register earliest example load–store architecture cdc 6600 almost vector processors including many gpus use load–store approach
[ 5012, 5371, 3948, 7529, 5737, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 4120, 4847, 4479, 895, 4864, 216, 4154, 5939, 4524, 5243, 6...
Test
291
2
BlackBerry_Mobile:blackberry mobile blackberry mobile trading name used tcl communication sell blackberry branded devices world markets excluding indonesia india bangladesh sri lanka nepal blackberry limited creator blackberry brand decided 2016 cease competing smartphone market directly focus making security software due tcl communication charge manufacturing distributing designing blackberry-branded devices global market blackberry keyone first device made blackberry mobile brand although partially designed blackberry limited devices made blackberry mobile continue shipped running android along security software provided blackberry limited suite software includes dtek blackberry messenger blackberry hub also software secure boot start-up ensure android system tampered many features comparable blackberry 10 blackberry ltd former flagship operating system early 2000s research motion limited known rim became dominant mobile industry blackberry brand global dominance smartphone industry 2007 rim highest growth blackberry brand afterward slowly lost dominance many consumers moving towards devices like iphone apple samsung galaxy due all-touchscreen form factor later physical qwerty keyboard smartphone became significant feature blackberry brand named rim renamed blackberry limited set new strategy one focusing improving brand blackberry priv launched 2015 first device running android device came full touchscreen qwerty keyboard underneath 2016 blackberry ltd outsourced production tcl manufacture blackberry dtek50 dtek60 later 2016 blackberry announced moving away in-house manufacturing production moving become software security company december 2016 tcl chosen global licensee blackberry brand ces 2017 tcl showed rumored blackberry 'mercury although stating specifications device ahead mobile world congress barcelona spain tcl officially announced device stating official name blackberry keyone device designed blackberry ltd. rather tcl device sold blackberry mobile brand
[ 6788, 4575, 6336, 5473, 1544, 7189, 6550, 2048, 2233, 1582, 6217, 6219, 1977, 2795, 6865, 4380 ]
Validation
292
2
Consistent_Network_Device_Naming:consistent network device naming consistent network device naming convention naming ethernet adapters linux created around 2009 replace old naming scheme caused problems multihomed machines network interface controllers nics would named based order found kernel booted removing existing adding new interfaces could cause previously added ones change names ecr submitted pci sig firmware group system firmware provide device naming operating systems via acpi interface new naming scheme convention implemented dell module called among first major linux distributions adopt module fedora 15 may 2011 red hat enterprise linux version 6.1 also released suse linux enterprise server 11 service pack 2 february 2012 newer dell poweredge dell precision models support new names open-source implementation available based udev mechanism present systemd red hat enterprise linux 7 introduces new network naming scheme part systemd
[ 972, 7787, 578 ]
Validation
293
5
Mercury_Mail_Transport_System:mercury mail transport system mercury mail transport system mercury mts standards-compliant mail server developed david harris also develops pegasus mail client freeware prior january 2007 donationware non-commercial personal use shareware uses two versions mercury similar functionality original version longer development set netware loadable modules nlms runs versions novell netware network operating system nos 3.x 6.x current worked conjunction ms-dos workstations running pegasus mail mercury/32 win32 application running versions microsoft windows windows 98 windows nt4 latest windows vista windows server 2008 windows xp windows server 2003 recommended either version act mail server lan additional support netware lan features mercury fully independent mail server provide email services standards-compliant email clients eudora microsoft outlook versions mercury highly modular allowing support different sets internet protocols installed required mercury also installed tightly integrated pegasus mail combination pegasus/mercury similar mail aspects microsoft outlook/microsoft exchange server mercury originally developed handle mail internal external netware servers either bindery nds mode mercury ran system server integrated pegasus mail running ms-dos windows workstations mercury extremely standards-compliant supporting major internet mail-related protocols including smtp sending receiving mail pop3 imap win32 version also supports dialup connection versions many features especially powerful support managed mailing lists mercury intended largely unobtrusive needs little ongoing maintenance installation process simple task taking less minute point user must indicate domain parameter used user list manually administered limit numbers users declared single directory holds users storage locations backup copy mail directory copy users data also standard anti-virus could used mail received two files created files finally written disk simple antivirus engine could scan clamav antivirus engine supplied used desired software enormous variety configurations using proper care server could secure relay control effective ability filter mails based many rules making efficient could use blacklist/whitelist technology included tools reduce spam effects mercury/32 open source software extended anyone development documentation free publicly available pmail community well known extensions bundled mercury/32 development version netware basically stopped release version 1.48 26 may 2000 replacement windows version recommended security patch bringing mercury nlm version 1.49 released august 2007 19 june 2009 david harris announced pegasus mail site development pegasus mail associated mercury program could continue sufficient users would commit donating us 50 annually 21 july 2009 said good start new versions programs released since developer david harris said april 2017 pegasus mail mercury transport system active major development july 2019 announced mercury v5 near going beta xampp initiative apache friends develop cross-platform web server solution pack main core components apache http server mariadb mysql database php perl interpreters intended cross platform equivalent lamp stack used linux mail systems natively distributed linux operating system case microsoft windows platform apache friends selected mercury mts component specific documents provided apache friends installation configuration xampp components concept providing information via faqs forums however third party descriptions configuration use mercury mts component available
[ 5983, 7154, 4759, 7624, 6102, 5571, 6908, 5401, 1950, 6029, 3555, 46, 333, 3135, 2885, 6056, 8034, 2255 ]
Test
294
4
COPS_(software):cops software computer oracle password system cops first vulnerability scanner unix operating systems achieve widespread use created dan farmer student purdue university gene spafford helped farmer start project 1989 cops software suite comprising least 12 small vulnerability scanners programmed audit one part operating system cops farmer developed another vulnerability scanner called satan security administrator tool analyzing networks cops generally considered obsolete uncommon find systems set insecure manner cops identify
[ 1461, 5125, 3033, 5571, 5857, 7246, 2684, 6129, 5116 ]
Test
295
6
OpenZFS:openzfs openzfs umbrella project aimed bringing together individuals companies use zfs file system work improvements aiming well making zfs widely used developed open-source manner openzfs brings together developers illumos linux freebsd macos platforms wide range companies high-level goals project include raising awareness quality utility availability open-source implementations zfs encouraging open communication ongoing efforts toward improving open-source variants zfs ensuring consistent reliability functionality performance distributions zfs illumos derived opensolaris provides upstream source code zfs implementations various differences illumos zfs codebase open-source implementations zfs openzfs strategically reducing existing platform-related differences order ease sharing source code founding members openzfs include matt ahrens one main architects zfs zfs file system originally developed sun microsystems solaris operating system zfs source code released 2005 common development distribution license cddl part opensolaris operating system later ported operating systems environments fsf claimed cddl gpl legal incompatibility 2005 sun implementation zfs file system n't used basis development linux kernel module n't merged linux kernel mainline linux distributions include precompiled kernel module workaround fuse framework allows file systems run userspace used linux separation layer licensing issues effect although set issues include performance penalty however april 2016 release ubuntu 16.04 lts includes cddl-licensed zfs linux kernel module maintained separate project outside linux kernel mainline claiming license compatibility following list key events development zfs various implementations leading creation openzfs umbrella project originally version numbers pool file system incremented new features introduced order designate on-disk file system format available features worked well single entity controlled development zfs versioning scheme still use zfs oracle solaris distributed development model single version number far ideal implementations openzfs would need agree changes on-disk file system format solution selected openzfs introduce feature flags new versioning system tags on-disk format changes unique names supports completely independent format changes format changes depend pool moved used openzfs implementations long feature flags use pool supported implementations openzfs uses pool version 5000 indicate use feature flags pool version unchanging number expected never conflict version numbers used oracle proprietary zfs versions legacy version numbers still exist pool versions 1–28 implied pool version 5000 initial proposal use 1000 pool version future on-disk format changes enabled disabled independently via feature flags feature flags exposed pool properties following naming scheme rules example valid property name could shortened pool feature either disabled enabled active state disabled features used on-disk format changes made result features backward-compatible enabled features used on-disk format changes made yet software may make changes time features still backward-compatible active features made backward-incompatible on-disk format changes pool pool feature enabled legacy version pool automatically upgraded 5000 prerequisite features also enabled default new pools created supported features enabled general state feature changed active back enabled undoing way performed on-disk format changes making pool compatible older openzfs implementation however features might possible on-disk format changes associated either features write features read former features openzfs implementation must support capable writing pool supporting features mandatory opening pool read-only mode latter features openzfs implementation must support able read pool open opening pool possible without actually reading example feature adds new on-disk data structure keep track freed datasets openzfs implementation need know data structure access pool read-only mode additionally writing pool features active state possible openzfs implementation support features list feature flags operating systems support available open-zfs.org web site
[ 3599, 2547, 7161, 4672, 6431, 3626, 5049, 6117, 759, 6854, 5437, 6860, 4375, 6500, 443, 6505, 4751, 5457, 460, 1534, 7976, 4406, 821, 7258, 2294, 2300, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 4441, 5865, 4444, 4447, 5518, 6231, 8...
Test
296
8
Acid1:acid1 acid1 originally called box acid test test page web browsers developed october 1998 important establishing baseline interoperability early web browsers especially cascading style sheets 1.0 specification acid tests gold produce quick obvious assessment quality piece metal web acid tests designed produce clear indication browser compliance web standards acid1 tests many features one page reference image acid1 developed todd fahrner frustrated lack stringent tests improve browser interoperability looking tests developed braden mcdaniel used reference renderings clarify intended result fahrner developed comprehensive test resulted quirky-looking graphic 1999 test incorporated css1 test suite text used acid1 allusion t. s. eliot poem hollow men acid1 included offline easter egg internet explorer 5 mac os accessible typing 'tasman text replaced names developers early 2008 major browsers passed acid1 test acid1 served inspiration acid2 acid3
[ 2087, 6292, 6452, 7850, 1496, 87, 6221 ]
Validation
297
4
Venafi:venafi venafi inc. privately held cybersecurity company develops software secure protect cryptographic keys digital certificates enterprise key certificate management security products certificate authority ca independent manage security instruments transport layer security tls digital certificates secure shell ssh keys venafi sell encryption certificate authority ca venafi reports customer base public- private-sector entities mostly global 5000 organizations operate variety industries venafi headquartered salt lake city utah offices california united kingdom russell thornton ben hodson university washington graduates cofounded venafi predecessor company 1998 recognizing recent consulting project broader commercial application cofounders incorporated company imcentric washington state october 26 2000 seeking infusion angel capital hodson thornton moved company utah joined jayson seegmiller hodson led engineering thornton seegmiller focused business operations application filed conduct business imcentric inc. orem utah march 18 2003 thornton filed change imcentric state incorporation home state washington delaware april 1 2004 early 2005 saw company leadership name change name imcentric venafi leadership thornton president chief executive officer seegmiller vice president secretary treasurer trell rohovit president chief executive officer william clay epstein vice president darren denning secretary company also moved headquarters sandy utah 2005 jeff hudson current chief executive officer replaced rohovit october 2010 company moved salt lake city ut 2013 venafi made-up word created combining two latin roots—vena vein root fides trust faith venafi secures root trust—the encryption keys certificates venafi participating organization payment card industry security standards council pci ssc issues payment card industry data security standard pci dss venafi submitted cryptographic keys digital certificate security guidelines special interest group sig topic consideration 2015 2016 pci ssc sig topic selected finalist 2015 sig 1 7 finalists selected 2016 sig 1 5 finalists selected venafi also member financial services information sharing analysis group fs-isac july 2012 paul turner venafi vice president product strategy co-authored national institute standards technology nist information technology laboratory itl bulletin “ itl bulletin july 2012 preparing responding certification authority compromise fraudulent certificate issuance ” provides best practices-based information 2015 turned teamed nist document best practices security interactive automated access management using secure shell ssh
[ 2789, 363, 7214, 4071, 7048, 1805 ]
Test
298
4
FIPS_140-2:fips 140-2 federal information processing standard fips publication 140-2 fips pub 140-2 u.s. government computer security standard used approve cryptographic modules title security requirements cryptographic modules initial publication may 25 2001 last updated december 3 2002 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components protection cryptographic module within security system necessary maintain confidentiality integrity information protected module standard specifies security requirements satisfied cryptographic module standard provides increasing qualitative levels security intended cover wide range potential applications environments security requirements cover areas related secure design implementation cryptographic module areas include cryptographic module specification cryptographic module ports interfaces roles services authentication finite state model physical security operational environment cryptographic key management electromagnetic interference/electromagnetic compatibility emi/emc self-tests design assurance mitigation attacks federal agencies departments validate module use covered existing fips 140-1 fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module hsm fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application security level 1 provides lowest level security basic security requirements specified cryptographic module e.g. least one approved algorithm approved security function shall used specific physical security mechanisms required security level 1 cryptographic module beyond basic requirement production-grade components example security level 1 cryptographic module personal computer pc encryption board security level 2 improves upon physical security mechanisms security level 1 cryptographic module requiring features show evidence tampering including tamper-evident coatings seals must broken attain physical access plaintext cryptographic keys critical security parameters csps within module pick-resistant locks covers doors protect unauthorized physical access addition tamper-evident physical security mechanisms required security level 2 security level 3 attempts prevent intruder gaining access csps held within cryptographic module physical security mechanisms required security level 3 intended high probability detecting responding attempts physical access use modification cryptographic module physical security mechanisms may include use strong enclosures tamper-detection/response circuitry zeroes plaintext csps removable covers/doors cryptographic module opened security level 4 provides highest level security security level physical security mechanisms provide complete envelope protection around cryptographic module intent detecting responding unauthorized attempts physical access penetration cryptographic module enclosure direction high probability detected resulting immediate deletion plaintext csps security level 4 cryptographic modules useful operation physically unprotected environments security level 4 also protects cryptographic module security compromise due environmental conditions fluctuations outside module normal operating ranges voltage temperature intentional excursions beyond normal operating ranges may used attacker thwart cryptographic module defenses cryptographic module required either include special environmental protection features designed detect fluctuations delete csps undergo rigorous environmental failure testing provide reasonable assurance module affected fluctuations outside normal operating range manner compromise security module levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment cse government canada security programs overseen nist cse focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes fips 140-2 standard information technology security approval program cryptographic modules produced private sector vendors seek products certified use government departments regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information tamper evident fips 140-2 security labels utilized deter detect tampering modules tests cmvp handled third-party laboratories accredited cryptographic module testing laboratories national voluntary laboratory accreditation program nvlap vendors interested validation testing may select twenty-two accredited labs nvlap accredited cryptographic modules testing laboratories perform validation testing cryptographic modules cryptographic modules tested requirements found fips pub 140-2 security requirements cryptographic modules security requirements cover 11 areas related design implementation cryptographic module within areas cryptographic module receives security level rating 1–4 lowest highest depending requirements met areas provide different levels security cryptographic module receives rating reflects fulfillment requirements area overall rating issued cryptographic module indicates vendor validation certificate individual ratings listed well overall rating nist maintains validation lists cryptographic standards testing programs past present lists updated new modules/implementations receive validation certificates nist cse items fips 140-1 fips 140-2 validation list reference validated algorithm implementations appear algorithm validation lists fips pub 140-2 annexes steven marquess posted criticism fips 140-2 validation lead incentives keep vulnerabilities defects hidden cmvp decertify software vulnerabilities found take year re-certify software defects found companies left without certified product ship example steven marquess mentions vulnerability found publicised fixed fips-certified open-source derivative openssl publication meaning openssl derivative decertified decertification hurt companies relying openssl-derivative fips certification contrast companies renamed certified copy open-source openssl derivative decertified even though basically identical fix vulnerability steven marquess therefore argues fips process inadvertently encourages hiding software origins de-associate defects since found original potentially leaving certified copy vulnerable
[ 7329, 3611, 2193, 7626, 1544, 7440, 906, 6015, 6550, 6208, 6379, 6036, 2598, 4990, 5001, 1805 ]
Test
299
2
MUSIC/SP:music/sp music/sp multi-user system interactive computing/system product originally mcgill university system interactive computing developed mcgill university 1970s early ibm time-sharing system called rax remote access computing system system ran ibm s/360 s/370 4300-series mainframe hardware offered novel features time file access control data compression designed allow academics students create run programs interactively terminals era mainframe computing still done punched cards years development continued system evolved embrace email internet eventually world wide web peak late 1980s 250 universities colleges high school districts used system north south america europe asia file system music/sp file system unique number respects single system-wide file index owner userid file name hashed locate file index file system could located single i/o operation however presented flat file system user lacked directory structure commonly offered dos microsoft windows unix systems 1990 tree-structured directory view file system overlaid bringing system line file systems available default information stored files compressed offered considerable saving disk space file system fairly sophisticated access control scheme allowing owner control could read write append execute file also concept public file visible users private file visible owner version 2.3 even private files listed common library result two users could files name 4.0 limitation removed virtual memory initial versions system provided support virtual memory address translation one active user could reside core memory time swapping disk used time-share different users variable-length timeslice used virtual memory support introduced 1985 allowed multiple users core memory time removed many restrictions size programs could run provided significant performance improvement system performance also improved pre-loading commonly used modules virtual memory startup time could available users simultaneously programming languages system designed support academic computing teaching computer science rich suite programming languages available system nucleus written ibm/370 assembler native applications written fortran system supported waterloo watfiv watbol compilers also provided compilers pascal c pl/i basic apl algol rpg gpss system missing command scripting language rexx ported cms 1984 later 1986 complete user interface written entirely rexx e-mail internet e-mail one major applications music/sp e-mail interface initially provided access local e-mail networks developed expanded provide access bitnet internet based e-mail music/sp direct access internet 1990 university wisconsin wiscnet tcp/ip code ported system allowing system provide access internet services compatibility ibm systems major feature system ability run programs designed run ibm mainstream operating system mvs accomplished using mvs emulator intercepted system calls supervisor call instruction svc level third-party applications ran mode rather write version application music/sp developers would usually start mvs version rebuild run mvs emulation mode since mvs emulation limited subset real thing applications generally ran efficiently music/sp features one major advantage system educational environments use special lines called control cards top file source files supported language could automatically directed appropriate compiler fortran default compiled linked executed compilation linkage execution options also specified control cards simply entering filename command line wide variety terminals supported 1980 including ebcdic-based units using ibm-proprietary protocols asynchronous ascii-based units since terminals connected various types front-end processors per common ibm timesharing practice could therefore function without cpu attention considerable amount time music used variable-length time slices could compute-bound processing reach maximum several seconds per time slice conversely user filled output buffer reached conversational read timeslice would end immediately sim390 emulator runs microsoft windows contains demonstration system music/sp freely available demonstration system also run hercules users run windows
[ 1807, 4297, 5020, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 5396, 7550, 402, 405, 1855, 4347, 65, 6849, 4366, 4733, 5783, 6853, 5088, 84, 785, 1516, 2266, 788, 3682, 6500, 1522, 7605, 7611, 4759, 7242, 6518, 4397, 6892, 5116, 5481, ...
Test
300
4
PhishTank:phishtank phishtank anti-phishing site phishtank launched october 2006 entrepreneur david ulevitch offshoot opendns company offers community-based phish verification system users submit suspected phishes users vote phish phishtank used opera yahoo mail mcafee apwg cmu st benard mozilla kaspersky firetrust officer blue finra message level surbl sanesecurity clamav career builder site truth avira c-sirt phishtank sitechecker phishtank data provided gratis download access via api call including commercial use restrictive license 2018 announced phishtank rebuilding website new features functionality work begin 2019 phishtank currently ran thomas mccourt cisco talos undertaking rebuild project
[ 5984, 5144 ]
Test
301
4
Prevx:prevx prevx discontinued anti-malware utility separate real-time on-demand versions remove low-risk adware free user purchase enter license key serious scanning take anywhere less two minutes five minutes tony zaitoun about.com liked utility except confusion configuring interface key protection disabled default issue referenced since corrected prevx limited formed march 2001 uk registered name “ immunify ” changing name “ trustcorps ” later year finally re-branded “ prevx ” 2003 founder team led nick ray ceo paul stubbs coo originally positioned host intrusion prevention system company initial software product designed protect unix linux servers advanced malware threats without reliance malware signatures thus providing protection unknown “ zero-day ” threats software positioned last line defence threats bypassed overcome firewall network security installed anti-virus host-based protection systems early product monitored behaviour executables real-time would block system calls breached rules thus providing protection offered protection buffer overflow attacks could successfully detect rootkits attempted hide memory disk end 2002 company received investment south east growth fund early 2003 private investors angel network hotbed 2003 company rebranded prevx june 2004 launched first product windows platform “ prevx home beta ” offered freeware download prevx home 1.0 also free followed september 2004 prevx home 2.0 launched october 2004 incorporated functionality report security events detected central database operated prevx would allow prevx monitor new virus outbreaks detect block spyware end 2004 6 months launching 1m copies prevx downloaded subsequent versions included prevx 3.0 prevx edge prevx csi prevx stirred controversy amongst internet communities announced november 27 2009 recent windows update causing black screen death affecting users windows xp vista 7 claimed bug rendered machine unusable later discovered black screen caused malware infection daonol unrelated windows update prevx apologized earlier claims 2005 prevx acquired share offer retento limited investment vehicle owned serial entrepreneur mel morris joined prevx board june 2003 investor prevx introduced hotbed retento subsequently renamed prevx group limited november 2010 prevx acquired us-based internet security company webroot full conditions deal released announcement made webroot fully integrate prevx behaviour-based antivirus technology existing software also make mel morris founder chief executive prevx group vice president webroot prevx division webroot since discontinued prevx product line although technology concepts continue underpin webroot products
[ 4759, 5571, 6777, 7186 ]
Test
302
8
WS-Discovery:ws-discovery web services dynamic discovery ws-discovery technical specification defines multicast discovery protocol locate services local network operates tcp udp port 3702 uses ip multicast address 239.255.255.250 name suggests actual communication nodes done using web services standards notably soap-over-udp udp ports 139 445 1124 3702 tcp ports 139 445 3702 49179 5357,5358 protocol originally developed bea systems canon intel microsoft webmethods july 1 2009 approved standard oasis various components microsoft windows vista operating system use ws-discovery e.g people near ws-discovery integral part windows rally technologies devices profile web services component wsdmon windows 7 later uses ws-discovery automatically discover wsd-enabled network printers show network windows explorer installed double-clicking windows 8 later installation automatic ws-discovery enabled default networked hp printers since circa 2008
[ 979, 3764, 5111, 4770, 7637, 2119, 1760, 5500, 934, 7565, 1409, 3151, 3498, 7136, 7602 ]
Test
303
4
Register_spring:register spring computer security register spring sort trampoline bogus return pointer structured exception handling seh pointer exploit places call stack directing control flow existing code within dynamic-link library dll static program binary target code turn consists call jump call ebx jmp esp appropriate processor register previously prepared exploit point payload code begins
[ 1805 ]
Train
304
9
Ada_(programming_language):ada programming language ada structured statically typed imperative object-oriented high-level computer programming language extended pascal languages built-in language support design-by-contract extremely strong typing explicit concurrency tasks synchronous message passing protected objects non-determinism ada improves code safety maintainability using compiler find errors favor runtime errors ada international standard current version known ada 2012 defined iso/iec 8652:2012 ada originally designed team led french computer scientist jean ichbiah cii honeywell bull contract united states department defense dod 1977 1983 supersede 450 programming languages used dod time ada named ada lovelace 1815–1852 credited first computer programmer ada originally targeted embedded real-time systems ada 95 revision designed s. tucker taft intermetrics 1992 1995 improved support systems numerical financial object-oriented programming oop features ada include strong typing modularity mechanisms packages run-time checking parallel processing tasks synchronous message passing protected objects nondeterministic select statements exception handling generics ada 95 added support object-oriented programming including dynamic dispatch syntax ada minimizes choices ways perform basic operations prefers english keywords else symbols || ada uses basic arithmetical operators avoids using symbols code blocks delimited words declare begin end end cases followed identifier block closes e.g. ... end loop ... end loop case conditional blocks avoids dangling else could pair wrong nested if-expression languages like c java ada designed development large software systems ada packages compiled separately ada package specifications package interface also compiled separately without implementation check consistency makes possible detect problems early design phase implementation starts large number compile-time checks supported help avoid bugs would detectable run-time languages would require explicit checks added source code example syntax requires explicitly named closing blocks prevent errors due mismatched end tokens adherence strong typing allows detection many common software errors wrong parameters range violations invalid references mismatched types etc either compile-time otherwise run-time concurrency part language specification compiler cases detect potential deadlocks compilers also commonly check misspelled identifiers visibility packages redundant declarations etc provide warnings useful suggestions fix error ada also supports run-time checks protect access unallocated memory buffer overflow errors range violations off-by-one errors array access errors detectable bugs checks disabled interest runtime efficiency often compiled efficiently also includes facilities help program verification reasons ada widely used critical systems anomaly might lead serious consequences e.g. accidental death injury severe financial loss examples systems ada used include avionics air traffic control railways banking military space technology ada dynamic memory management high-level type-safe ada generic untyped pointers implicitly declare pointer type instead dynamic memory allocation deallocation must take place explicitly declared access types access type associated storage pool handles low-level details memory management programmer either use default storage pool define new ones particularly relevant non-uniform memory access even possible declare several different access types designate type use different storage pools also language provides accessibility checks compile time run time ensures access value outlive type object points though semantics language allow automatic garbage collection inaccessible objects implementations support default would cause unpredictable behaviour real-time systems ada support limited form region-based memory management also creative use storage pools provide limited form automatic garbage collection since destroying storage pool also destroys objects pool double-dash -- resembling em dash denotes comment text comments stop end line prevent unclosed comments accidentally voiding whole sections source code disabling whole block code requires prefixing line column individually -- clearly denoting disabled code column repeated -- page renders experimental dis/re-enablement large blocks drawn process semicolon statement terminator null no-operation statement codice_1 single codice_2 without statement terminate allowed unlike iso standards ada language definition known ada reference manual arm sometimes language reference manual lrm free content thus common reference ada programmers programmers implementing ada compilers apart reference manual also extensive rationale document explains language design use various language constructs document also widely used programmers language revised new rationale document written one notable free software tool used many ada programmers aid writing ada source code gnat programming studio 1970s us department defense dod concerned number different programming languages used embedded computer system projects many obsolete hardware-dependent none supported safe modular programming 1975 working group high order language working group holwg formed intent reduce number finding creating programming language generally suitable department uk ministry defence requirements many iterations beginning original straw man proposal eventual programming language named ada total number high-level programming languages use projects fell 450 1983 37 1996 holwg working group crafted steelman language requirements series documents stating requirements felt programming language satisfy many existing languages formally reviewed team concluded 1977 existing language met specifications requests proposals new programming language issued four contractors hired develop proposals names red intermetrics led benjamin brosgol green cii honeywell bull led jean ichbiah blue softech led john goodenough yellow sri international led jay spitzen april 1978 public scrutiny red green proposals passed next phase may 1979 green proposal designed jean ichbiah cii honeywell bull chosen given name ada—after augusta ada countess lovelace proposal influenced programming language lis ichbiah group developed 1970s preliminary ada reference manual published acm sigplan notices june 1979 military standard reference manual approved december 10 1980 ada lovelace birthday given number mil-std-1815 honor ada lovelace birth year 1981 c. a. r. hoare took advantage turing award speech criticize ada overly complex hence unreliable subsequently seemed recant foreword wrote ada textbook ada attracted much attention programming community whole early days backers others predicted might become dominant language general purpose programming defense-related work ichbiah publicly stated within ten years two programming languages would remain ada lisp early ada compilers struggled implement large complex language compile-time run-time performance tended slow tools primitive compiler vendors expended efforts passing massive language-conformance-testing government-required acvc validation suite required another novel feature ada language effort jargon file dictionary computer hacker slang originating 1975-1983 notes entry ada precisely one might expect given kind endorsement fiat designed committee ... difficult use overall disastrous multi-billion-dollar boondoggle ... ada lovelace ... would almost certainly blanch use name latterly put kindest thing said probably good small language screaming get inside vast elephantine bulk first validated ada implementation nyu ada/ed translator certified april 11 1983 nyu ada/ed implemented high-level set language setl number commercial companies began offering ada compilers associated development tools including alsys telesoft ddc-i advanced computer techniques tartan laboratories tld systems verdix others 1991 us department defense began require use ada ada mandate software though exceptions rule often granted department defense ada mandate effectively removed 1997 dod began embrace cots technology similar requirements existed nato countries ada required nato systems involving command control functions ada mandated preferred language defense-related applications countries sweden germany canada late 1980s early 1990s ada compilers improved performance still barriers full exploitation ada abilities including tasking model different real-time programmers used ada safety-critical support features used military applications also commercial projects software bug severe consequences e.g. avionics air traffic control commercial rockets ariane 4 5 satellites space systems railway transport banking example airplane information management system fly-by-wire system software boeing 777 written ada developed honeywell air transport systems collaboration consultants ddc-i became arguably best-known ada project civilian military canadian automated air traffic system written 1 million lines ada sloc count featured advanced distributed processing distributed ada database object-oriented design ada also used air traffic systems e.g. uk next-generation interim future area control tools support ifacts air traffic control system designed implemented using spark ada also used french tvm in-cab signalling system tgv high-speed rail system metro suburban trains paris london hong kong new york city language became ansi standard 1983 ansi/mil-std 1815a translation french without changes english became iso standard 1987 iso-8652:1987 version language commonly known ada 83 date adoption ansi sometimes referred also ada 87 date adoption iso ada 95 joint iso/ansi standard iso-8652:1995 published february 1995 making ada 95 first iso standard object-oriented programming language help standard revision future acceptance us air force funded development gnat compiler presently gnat compiler part gnu compiler collection work continued improving updating technical content ada programming language technical corrigendum ada 95 published october 2001 major amendment iso/iec 8652:1995/amd 1:2007 published march 9 2007 ada-europe 2012 conference stockholm ada resource association ara ada-europe announced completion design latest version ada programming language submission reference manual international organization standardization iso approval iso/iec 8652:2012 published december 2012 related standards include iso 8651-3:1988 information processing systems—computer graphics—graphical kernel system gks language bindings—part 3 ada ada algol-like programming language featuring control structures reserved words else however ada also many data structuring facilities abstractions included original algol 60 type definitions records pointers enumerations constructs part inherited inspired pascal common example language syntax hello world program ada.text_io use ada.text_io procedure hello begin end hello program compiled using freely available open source compiler gnat executing gnatmake hello.adb ada type system based set predefined primitive types allows users declare types declaration turn based internal representation type describing goal achieved allows compiler determine suitable memory size type check violations type definition compile time run time i.e. range violations buffer overruns type consistency etc. ada supports numerical types defined range modulo types aggregate types records arrays enumeration types access types define reference instance specified type untyped pointers permitted special types provided language task types protected types example date might represented type day_type range 1 .. 31 type month_type range 1 .. 12 type year_type range 1800 .. 2100 type hours mod 24 type weekday monday tuesday wednesday thursday friday saturday sunday type date types refined declaring subtypes subtype working_hours hours range 0 .. 12 -- 12 hours work day subtype working_day weekday range monday .. friday -- days work work_load constant array working_day working_hours -- implicit type declaration types modifiers limited abstract private etc private types accessed limited types modified copied within scope package defines ada 95 adds additional features object-oriented extension types ada structured programming language meaning flow control structured standard statements standard constructs deep-level early exit supported use also supported go commands seldom needed -- equal b loop /= b loop end loop b else end 1 .. 10 loop end loop loop end loop case end case aweekday weekday'range loop -- loop enumeration end loop among parts ada program packages procedures functions example package specification example.ads package example end example package body example.adb ada.text_io package body example -- package initialization executed package elaborated begin end example program compiled e.g. using freely available open-source compiler gnat executing gnatmake -z example.adb packages procedures functions nest depth also logical outermost block package procedure function declarations constants types variables procedures functions packages declared order ada language support task-based concurrency fundamental concurrent unit ada task built-in limited type tasks specified two parts – task declaration defines task interface similar type declaration task body specifies implementation task depending implementation ada tasks either mapped operating system threads processes scheduled internally ada runtime tasks entries synchronisation form synchronous message passing task entries declared task specification task entry one accept statements within task body control flow task reaches accept statement task blocked corresponding entry called another task similarly calling task blocked called task reaches corresponding accept statement task entries parameters similar procedures allowing tasks synchronously exchange data conjunction select statements possible define guards accept statements similar dijkstra guarded commands ada also offers protected objects mutual exclusion protected objects monitor-like construct use guards instead conditional variables signaling similar conditional critical regions protected objects combine data encapsulation safe mutual exclusion monitors entry guards conditional critical regions main advantage classical monitors conditional variables required signaling avoiding potential deadlocks due incorrect locking semantics like tasks protected object built-in limited type also declaration part body protected object consists encapsulated private data accessed within protected object procedures functions entries guaranteed mutually exclusive exception functions required side effect free therefore run concurrently functions task calling protected object blocked another task currently executing inside protected object released task leaves protected object blocked tasks queued protected object ordered time arrival protected object entries similar procedures additionally guards guard evaluates false calling task blocked added queue entry another task admitted protected object task currently executing inside protected object guards re-evaluated whenever task leaves protected object time evaluation guards changed calls entries requeued entries signature task requeued blocked added queue target entry means protected object released allows admission another task select statement ada used implement non-blocking entry calls accepts non-deterministic selection entries also guards time-outs aborts following example illustrates concepts concurrent programming ada ada.text_io use ada.text_io procedure traffic begin end traffic pragma compiler directive conveys information compiler allow specific manipulation compiled output certain pragmas built language others implementation-specific examples common usage compiler pragmas would disable certain features run-time type checking array subscript boundary checking instruct compiler insert object code instead function call c/c++ inline functions
[ 362, 1445, 4302, 4670, 6428, 3955, 7533, 1090, 1842, 6441, 3968, 5397, 35, 2576, 4705, 6457, 7557, 5056, 1114, 764, 7581, 6497, 2619, 783, 5091, 6507, 5803, 4028, 1158, 6882, 7245, 7246, 7970, 4039, 2641, 108, 109, 5117, 1180, 3368, 265...
Test
305
5
X_Image_Extension:x image extension x image extension xie extension x window system enhance graphics capability intended provide powerful mechanism transfer display virtually image x-capable hardware first released x11r6 1994 longer included x11 reference distribution removed x11r6.7 2004 xie never gained significant usage — according jim gettys failed due excessive complexity lack good implementation intended use general purpose image-processing engine xie provide set image rendition enhancement primitives could combined arbitrarily complex expressions xie also provided import export facilities moving images client server accessing images resources client side programming library xielib documented prentice hall book developing imaging applications xielib syd logan addition server client library performance test tool xieperf included x11r6 client also written syd logan xie developed contract x consortium san diego ca company longer extant called age logic principal team members include larry hare bob shelley dr. dean verheiden dr. ben fahey dr. gary rogers syd logan practical purposes image extension obsolete adequate image performance instead gained use ubiquitous mit-shm extension allows transfer large images client server machine common use-case via shared memory
[ 6414, 6055, 4096, 1138, 5103, 1822, 8022 ]
Test
306
2
Action_Center:action center action center notification center included windows phone 8.1 windows 10 windows 10 mobile first introduced windows phone 8.1 july 2014 introduced desktop launch windows 10 july 29 2015 action center replaces charms windows 10 action center allows four quick settings windows 10 users expand view show quick settings notifications sorted categories app users swipe right clear notifications action center also supports actionable notifications starting windows 10 mobile version user swipe top bottom invoke action center features introduced windows phone 8.1 include ability change simple settings volume controls new notifications area design allows user example change wireless networks turn bluetooth airplane mode access driving mode four customisable boxes top screen beneath four horizontally placed boxes include recent text messages social integration desktop version user invoke action center clicking icon taskbar lower right corner screen swiping right microsoft announced microsoft build 2016 cortana would able mirror notifications actions centers windows 10 mobile windows 10 cortana would also able synchronize notifications android devices windows 10 action center
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 4697, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 5781, 435, 5442, 4377, 5090, 3340, 7602, 6164, 458, 4759, 1534, 6885, 7247, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, ...
Test
307
2
Interchange_File_Format:interchange file format interchange file format iff generic container file format originally introduced electronic arts company 1985 cooperation commodore order facilitate transfer data software produced different companies iff files standard extension many systems generate iff files file extensions important os stores file format metadata separately file name codice_1 extension commonly used ilbm format files use iff container format resource interchange file format format developed microsoft ibm 1991 based iff except byte order changed little-endian match x86 processor architecture apple aiff big-endian audio file format developed iff tiff image file format unrelated iff file built chunks chunk begins specification calls type id macintosh called ostype windows developers might call fourcc followed 32-bit signed integer integers iff file structure big-endian specifying size following data chunk content bytes specification includes explicit lengths chunk possible parser skip chunks either ca n't n't care process structure closely related type-length-value tlv representation predefined group chunks type ids codice_2 codice_3 codice_4 codice_2 chunk like record structure containing type id indicating record type followed nested chunks specifying record fields codice_3 factoring structure containing series codice_7 property chunks plus nested group chunks properties apply codice_4 collection nested chunks special semantics group chunks contain group chunks depending needs application group chunks like simpler counterparts contain length element skipping group thus done simple unix-style relative seek operation chunks must begin even file offsets befits origins iff motorola 68000 processor could n't address quantities larger byte odd addresses thus chunks odd lengths padded even byte boundary adding so-called pad byte regular end top-level structure iff file consists exactly one group chunks codice_2 codice_3 codice_4 codice_2 far common one type chunk typically different internal structure could numerical data text raw data also possible include iff files chunks note structure four letters followed length formats use standard chunks could present iff file codice_13 containing text information author file codice_14 containing text annotation usually name program created file codice_15 containing text name work file codice_16 containing file version codice_17 containing text copyright information also chunks common among number formats codice_18 holds color palette ilbm anim dr2d files pictures animations vector pictures chunks common name hold different data codice_19 could store image ilbm file sound 8svx file finally chunks unique file type programs create iff files add chunks internal data files later read programs without disruption parsers could skip uninteresting chunks great advantage iff similar formats
[ 797, 97, 3688, 1534, 6431, 6009, 5833, 5661, 4244, 7746, 7384, 1214, 594, 3222, 4354, 1127, 4006, 7942, 352, 7775, 87 ]
Validation
308
4
Standard_of_Good_Practice_for_Information_Security:standard good practice information security standard good practice information security published information security forum isf business-focused practical comprehensive guide identifying managing information security risks organizations supply chains recent edition 2018 update 2016 edition upon release 2011 standard significant update standard four years covers information security 'hot topics consumer devices critical infrastructure cybercrime attacks office equipment spreadsheets databases cloud computing 2011 standard aligned requirements information security management system isms set iso/iec 27000-series standards provides wider deeper coverage iso/iec 27002 control topics well cloud computing information leakage consumer devices security governance addition providing tool enable iso 27001 certification 2011 standard provides full coverage cobit v4 topics offers substantial alignment relevant standards legislation pci dss sarbanes oxley act enable compliance standards standard used chief information security officers cisos information security managers business managers managers internal external auditors service providers organizations sizes 2018 standard available free charge members isf non-members able purchase copy standard directly isf standard historically organized six categories aspects computer installations networks address underlying infrastructure critical business applications run end-user environment covers arrangements associated protecting corporate workstation applications endpoint use individuals systems development deals new applications systems created security management addresses high-level direction control standard primarily published simple modular format eliminates redundancy example various sections devoted security audit review consolidated six aspects within standard composed number areas covering specific topic area broken sections contains detailed specifications information security best practice statement unique reference example sm41.2 indicates specification security management aspect area 4 section 1 listed specification 2 within section principles objectives part standard provides high-level version standard bringing together principles provide overview needs performed meet standard objectives outline reason actions necessary section published standard also includes extensive topics matrix index introductory material background information suggestions implementation information see list computing information-security related articles
[ 2513, 3143, 688, 7560, 284, 8091, 173, 4440 ]
Test
309
6
IEEE_P1619:ieee p1619 institute electrical electronics engineers ieee standardization project encryption stored data generically refers security storage working group siswg includes family standards protection stored data corresponding cryptographic key management siswg oversees work following standards base ieee 1619 standard architecture encrypted shared storage media uses xts-advanced encryption standard xex-based tweaked codebook mode tcb ciphertext stealing cts proper name xtc xex tcb cts acronym already used denote drug ecstasy p1619.1 authenticated encryption length expansion storage devices uses following algorithms p1619.2 standard wide-block encryption shared storage media proposed algorithms including p1619.3 standard key management infrastructure cryptographic protection stored data defines system managing encryption data rest security objects includes architecture namespaces operations messaging transport p1619 also standardized key backup xml format encryption algorithm used data storage support independent encryption decryption portions data so-called narrow-block algorithms operate relatively small portions data wide-block algorithms encrypt decrypt whole sector narrow-block algorithms advantage efficient hardware implementation hand smaller block size provides finer granularity data modification attacks standardized acceptable granularity however example possibility data modification granularity one bit bit-flipping attack generally considered unacceptable reasons working group selected narrow-block 128 bits encryption authentication standard p1619 assuming added efficiency warrants additional risk recognizing wide-block encryption might useful cases another project p1619.2 started study usage wide-block encryption project maintained ieee security storage working group siswg disk storage standard p1619 sometimes called p1619.0 tape storage standard p1619.1 standardized december 2007 discussion ongoing standardization wide-block encryption disk drives like cmc eme p1619.2 key management p1619.3 2004 2006 drafts p1619 standards used advanced encryption standard aes lrw mode 30 aug 2006 meeting siswg straw poll showed members would approve p1619 consequently lrw-aes replaced xex-aes tweakable block cipher p1619.0 draft 7 renamed xts-aes draft 11 members group found non-trivial abandon lrw available public peer-review many years unlike newly suggested variants issues lrw
[ 6071, 4926, 4321, 3105, 2566, 2659, 2399, 3799, 2672, 3221, 7209, 3230, 4093, 3150, 5440, 7777, 4836, 2714 ]
Test
310
2
Stack-based_memory_allocation:stack-based memory allocation stacks computing architectures regions memory data added removed last-in-first-out lifo manner modern computer systems thread reserved region memory referred stack function executes may add state data top stack function exits responsible removing data stack minimum thread stack used store location function calls order allow return statements return correct location programmers may choose explicitly use stack region memory lies thread stack memory said allocated stack data added removed last-in-first-out manner stack-based memory allocation simple typically faster heap-based memory allocation also known dynamic memory allocation another feature memory stack automatically efficiently reclaimed function exits convenient programmer data longer required however data needs kept form must copied stack function exits therefore stack based allocation suitable temporary data data longer required creating function exits thread assigned stack size small bytes small cpus allocating memory stack available result crash due stack overflow processor families x86 special instructions manipulating stack currently executing thread processor families including powerpc mips explicit stack support instead rely convention delegate stack management operating system application binary interface abi
[ 1616, 7605, 5986, 5911, 7979, 5296, 3635, 5055, 592, 3220, 3566, 4810, 7391, 352 ]
Test
311
8
Aviary_(image_editor):aviary image editor aviary photo-editing platform ios android windows web web application aviary powers numerous mobile applications including self-titled ios android apps windows app called photo editor contains large collection easy-to-use editing tools custom photo filters frames graphics overlays aviary platform also free sdk provides developers customizable photo editor embedded apps ios android windows os x web company founded 2007 goal providing professional-quality photo-editing tools general public aviary since received millions dollars funding investors spark capital bezos september 22 2014 aviary acquired adobe systems later november 13 2014 aviary integrated suite adobe creative cloud december 2018 adobe announced remove aviary download stores end support product
[ 5302, 5571 ]
Test
312
7
Jem_The_Bee:jem bee jem bee java cloud-aware application implements batch execution environment help manage execution jobs described job control language jcl jem bee performs following functions core applications usually performed batch processing involves executing one batch jobs sequential flow job entry manager jem helps receive jobs schedule processing determine job output processed like ibm jes2 many batch jobs run parallel jcl used control operation job correct use jcl parameters allows parallel asynchronous execution jobs may need access data sets one goal jem process work making best use system resources achieve goal resource management needed key phases jem clustering based hazelcast cluster member called node rights responsibilities others exception oldest member going see details hazelcast implements peer-to-peer clustering master node node starts checks see already cluster network two ways find cluster found node first member cluster multicast enabled starts multicast listener respond incoming join requests otherwise listen join request coming via tcp/ip existing cluster already oldest member cluster receive join request checks request right group oldest member cluster start join process join process oldest member every member cluster member list order first member oldest member oldest member dies second member list becomes first member list new oldest member oldest member considered jem cluster coordinator execute actions must executed single member i.e locks releasing due member crash aside normal nodes another kind nodes cluster called supernodes supernode lite member hazelcast supernodes members storage join cluster lite members data partition data nodes get super fast access cluster like regular member nodes used web application running apache tomcat well application server diagram various nodes statuses execution environment set logical definition related cluster must used address job right member executed jem implements 3 kinds coordinates used tags named node belongs jcl defined run jem manages several queues used maintain life-cycle job queues implemented using hazelcast data sharing explanation job moved output queue submitter receive job ended notification via topic addition memory data sharing one important requirements jem use global file system gfs main goal able store data common file system jobs could manage reading writing nevertheless gfs mandatory desire data spread machines configuring jem separate environment specific domains affinities anyway gfs suggested used put keys keystores encryption licenses used jem following folders configured paths mount shared file system may different shared file systems one path needed nodes cluster refers files way avoid redundancy always date relative libraries versions binary versions etc ... documentation referred jem gfs global file system referring paths
[ 6025, 2961, 4159, 1254, 2566, 8092, 2528, 3201, 7973, 2104 ]
Validation
313
9
List_of_ECMAScript_engines:list ecmascript engines ecmascript engine program executes source code written version ecmascript language standard example javascript new generation ecmascript engines web browsers implementing just-in-time compilation jit variations idea performance benefits just-in-time compilation make much suitable web applications written javascript
[ 183, 5629, 2451, 4755, 5984, 4296, 6172, 3092, 6981, 2285, 5998, 4315, 5915, 1177, 562, 6002, 2291, 2658, 831, 7734, 1016, 3719, 2040, 6368, 3559, 2415, 237, 54, 3398, 2870, 6660, 422, 6221, 340, 3663, 5172, 3057, 6400, 3584, 7687, 7505...
Test
314
3
Ubuntu_Budgie:ubuntu budgie ubuntu budgie formerly budgie-remix official community flavor ubuntu featuring budgie desktop combines stable thoroughly-tested ubuntu core modern lightweight traditional-looking desktop developed solus project ubuntu budgie started unofficial community flavor parallel ubuntu 16.04 lts referred budgie-remix budgie-remix 16.10 later released strictly following time frame issued ubuntu 16.10 eventually recognized official community flavor ubuntu rebranded ubuntu budgie vincenzo bovino hired new brand pr manager ubuntu budgie 17.04 released april 2017 updated version 17.10 october 2017 ubuntu budgie 18.10 32-bit support dropped 32-bit support also dropped ubuntu mate budgie-remix 16.04 released april 25 2016 four days release ubuntu 16.04 system contains budgie desktop 10.2.5 window manager based mutter customizable panel notification center settings arc-gtk+ theme used compared ubuntu 16.04 budgie-remix nautilus version 3.18 time ubuntu version nautilus 3.14 also dock-panel plank version 0.11.1 gedit version 3.18 gnome 3.18 photos gthumb 3.4.3 rhythmbox 3.3 totem 3.18 gnome terminal 3.18 libreoffice 5.1.2 mozilla firefox 45.0 transmission 2.84 gtk+ 3.18.9 mesa 11.2.0 xorg 1.18.3 linux kernel 4.4.0. budgie-remix 16.10 released october 16 2016 three days release ubuntu 16.10 system contains shell budgie desktop 10.2.7 gtk+ 3.22 linux kernel 4.8 many new features implemented version full disk encryption home folder encryption support multiple languages installation theme design arc gtk+ new theme icons pocillo one developers budgie-remix david mohammed says ubuntu budgie 17.04 released april 19 2017. budgie-remix renamed name distribution became official ubuntu community system contains budgie desktop 10.2.9 shell linux 4.10 kernel mesa 17.0.3 xorg 1.19.3 budgie-welcome application updated support application indicator appeared sound applets managed gnome 3.24 applications enabled gnome terminal replaced termix chromium replaced google chrome gtk+ theme support qt enabled use theme design arc gtk+ theme icons moka record release version written follows ubuntu budgie 17.10 released october 19 2017 system contains budgie desktop 10.4 shell linux 4.13 kernel budgie 10.4 desktop environment equipped set native features include new stylish alt-tab support spotify raven support switching window controls left right support smb files encrypted volumes addition applets supports customizing appearance dates times addition support left right side panels budgie desktop 10.4 support converting panels dock transparency dynamic auto-image panels ability replenish bottom panel work without terrible jump effect noteworthy improvements release ubuntu budgie 17.10 include night light caffeine tools tilix default terminal emulator instead termix well support tilix quake mode f12 key updated panel icons new wallpapers december 20 2017 canonical withdrew ubuntu 17.10 distribution october hid link site downloading reason critical bug bios damage lenovo notebook models one acer model january 12 2018 version 17.10.1 released contained correction serious problem version 17.10 ubuntu budgie released april 26 2018 system includes linux 4.15 kernel became possible install openvnc network-manager new applets appeared quick note notes dropby downloading viewing data usb devices hot corners moving windows corner screen windowpreviews viewing open windows clockworks viewing time zones autoswitch tying keyboard layout application window mover order quickly move window another virtual desktop gnome applications updated version 3.28 nautilus version 3.26
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2585, 2228, 1487, 58, 3996, 7587, 4008, 1893, 2260, 7954, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 499, 1960, 6209, 2680, 4435, 5163, ...
Test
315
2
Microsoft_Product_Activation:microsoft product activation microsoft product activation drm technology used microsoft corporation several computer software programs notably windows operating system office productivity suite procedure enforces compliance program end-user license agreement transmitting information product key used install program user computer hardware microsoft inhibiting completely preventing use program validity license confirmed procedure met significant criticism many consumers technical analysts computer experts argue poorly designed highly inconvenient ultimately nothing prevent software piracy process successfully circumvented multiple occasions installing retail copy windows office user asked input unique product key supplied certificate authenticity included program later verified activation immediate activation required following installation program must activated within specific period time order continue function properly throughout grace period user periodically reminded activate program warnings becoming frequent time certain versions windows office available volume license single product key used multiple installations programs purchased license must still activated exception windows xp versions office released prior office 2010 businesses using licensing system option using microsoft activation servers creating managing windows pre-installed computer original equipment manufacturer oem operating system automatically activated without need interaction user case copy windows installed use product key listed certificate authenticity rather master product key issued oems called system locked pre-installation slp key boot windows confirms presence specific information stored bios manufacturer ensuring activation remains valid computer even product key used another machine activation performed within grace period fails illegal invalid product key following restrictions imposed user activation takes place program saves record verification data user computer system booted significant hardware changes application likely require reactivation prevent copy program installed two different systems windows 10 activation process also generate digital entitlement allows operating system hardware license status saved activation servers operating system license automatically restored clean installation without need enter product key activation performed utility supplied windows office called activation wizard performed either internet telephone activating internet activation wizard automatically transmits receives verification data microsoft servers completing process without interaction user activation telephone requires user microsoft agent verbally exchange activation information case installation id generated read agent agent verifies information replies confirmation id typed activation wizard activation wizard generates verification data primarily based information hardware computer windows xp information following eight categories hardware included verification data also based product key entered activation cases product key checked list known illegally distributed keys certain retail copies windows office sold certain countries classified emerging markets geographical activation restrictions allow user activate product within indicated region activation completes successfully user continue use application without issues impediments also key gets blacklisted application continue run normal unless clean install activation performed key blacklisted following tables illustrate usage product activation throughout microsoft software specifying whether programs equipped retail volume licensing activation well geographical activation restrictions microsoft says product activation benefits consumers allowing microsoft produce higher quality software nevertheless received much criticism regarding design implementation effectiveness stopping piracy respect privacy rights instance development windows xp beta testers strongly criticized introduction product activation particularly change computer hardware required re-activation ken fischer ars technica questioned whether activation would ultimately effective stopping piracy stating casual computer users would affected would fool think someone wo n't find way break whole thing dave wilson technology columnist los angeles times describes activation another example rapacious monopolist abusing computer users helpless anything believed system would significant effect professional pirates fred langa informationweek reference transmission hardware information activation stated many users incensed level monitoring intrusion control microsoft finally dr. cyrus peikari seth fogie security consultants considered product activation hostile privacy human dignity others defend microsoft use product activation harrison group market research firm conducted study sponsored microsoft 2011 illustrating computers running activated versions windows software average 50 faster pirated counterparts group concluded stating users genuine microsoft products ultimately receive superior performance counterfeit users susceptible security issues lost productivity fully licensed gmbh developer digital rights management technology criticizing microsoft vague nature information sent given computer activation nevertheless concluded activation particularly intrusive significantly violate privacy microsoft product activation also criticized multiple occasions violating patent law 2006 microsoft required pay 142 million z4 technologies infringing product activation patent 2009 microsoft ordered pay 388 million uniloc patent infringement product activation windows xp office xp windows server 2003 microsoft product activation cracked circumvented numerous occasions since introduced 2001 2001 uk security company called bit arts successfully managed bypass product activation windows xp 2003 volume license keys windows xp leaked public allowing users purchased volume license operating system bypass activation 2009 several security flaws windows 7 used hackers circumvent activation since introduction windows vista attempts circumvention product activation focused using leaked slp product keys bios information used oems preactivate windows 2007 circumvention measure developed windows vista warez-group paradox simulates bios allowing leaked slp information fed operating system bypassing activation 2009 slp product keys certificate information windows 7 leaked public allowing bios reconfigured bypass activation
[ 7793, 4759, 3180, 5653, 2472, 5571, 4880, 6823, 1571, 1861, 324, 3042, 3142, 5252, 2885, 1052, 1237, 6495, 5181 ]
Test
316
3
SPARCstation_ZX:sparcstation zx sparcstation zx computer workstation produced sun microsystems launched august 1993 end-of-lifed march 1994 original price usd 19,995.00 sparcstation zx identical sparcstation lx addition sun zx also known leo accelerated 3d framebuffer card double-width double-decked sbus card providing 24-bit color performance 750,000 3d vectors per second 310,000 triangle mesh/second
[]
Test
317
8
Web_banner:web banner web banner banner ad form advertising world wide web delivered ad server form online advertising entails embedding advertisement web page intended attract traffic website linking website advertiser many cases banners delivered central ad server advertiser scans logfiles detects web user visited advertiser site content site clicking banner ad advertiser sends content provider small amount money usually around five ten us cents payback system often content provider able pay internet access supply content first place usually though advertisers use ad networks serve advertisements resulting revshare system higher quality ad placement web banners function way traditional advertisements intended function notifying consumers product service presenting reasons consumer choose product question fact first documented hotwired 1996 researchers rex briggs nigel hollis web banners differ results advertisement campaigns may monitored real-time may targeted viewer interests behavior often tracked use click tag many web surfers regard advertisements annoying distract web page actual content waste bandwidth cases web banners cover screen content user wishes see newer web browsers often include software adblocker options disable pop-ups block images selected websites another way avoiding banners use proxy server blocks privoxy web browsers may also extensions available block banners example adblock plus mozilla firefox adthwart google chrome ie7pro internet explorer pioneer online advertising prodigy company owned ibm sears time prodigy used online advertising first promote sears products 1980s advertisers including aol one prodigy direct competitors prodigy unable capitalize first mover advantage online advertising first clickable web ad later came known term banner ad sold global network navigator gnn 1993 heller ehrman white mcauliffe defunct law firm silicon valley office gnn first commercially supported web publication one first commercial web sites ever hotwired first web site sell banner ads large quantities wide range major corporate advertisers andrew anker hotwired first ceo rick boyce former media buyer san francisco advertising agency hal riney partners spearheaded sales effort company hotwired coined term banner ad first company provide click rate reports customers first web banner sold hotwired paid corp. put online october 27 1994 another source also credits hotwired october 1994 coors zima campaign first web banner may 1994 ken mccarthy mentored boyce transition traditional online advertising first introduced concept clickable/trackable ad stated believed direct response model—in return investment individual ads measured—would prove sustainable long run online advertising spite prediction banner ads valued sold based number impressions generated first central ad server released july 1995 focalink communications enabled management targeting tracking online ads local ad server quickly followed netgravity january 1996 technology innovation ad server together sale online ads impression basis fueled dramatic rise proliferation web advertising provided economic foundation web industry period 1994 2000 new online advertising model emerged early years 21st century introduced goto.com later overture yahoo mass marketed google adwords program relies heavily tracking ad response rather impressions banner ad played significant role enabling rapid development paid advertising internet standard formats operation clickable link destination pricing system impressions banner ad enabled web site sell advertising provided operating requirements ad server companies netgravity develop systems needed operate track web-based advertising banner ad also unique compared advertising appearing comparable media newspapers magazines unlike advertising periodicals banner ad encouraged media consumers actually leave media service product go separate media environment typically web site operated advertiser contrast readers viewing newspaper magazine advertising encouraged leave periodical rather message advertising intended influence reader ad sizes standardized extent iab prior iab standardization banner ads appeared 250 different sizes however websites advertising networks outside eurosphere north america may use iab base ad sizes iab ad sizes standard web banners included iab universal package ad units guidelines supported major ad serving companies particularly relevant iab members adform appnexus chitika conversant epom hiro mixpo spotxchange zedo many others additionally ad serving providers may offer non-standard banner sizes technologies well support different online advertising formats e.g native ads however standard banner ad sizes constantly evolving due consumer creative fatigue banner blindness ad companies consistently test performance ad units ensure maximum performance clients publishers known unique custom executions include buzzfeed craveonline quartz publication thought catalog elite daily vice media inc. mic media company many others according media research firm emarketer types custom executions publisher direct buys rise native advertising spending hit 4.3 billion end 2015 use web banners restricted online advertising hero images widespread examples non-advertising application web banners banners type constitute part website design typically used aesthetic reasons hero images represented large photos graphics videos placed prominent sections website
[ 3857, 4574, 6092, 4600, 1847, 3338, 84, 3383, 6024 ]
Test
318
2
IPad_(4th_generation):ipad 4th generation fourth-generation ipad marketed ipad retina display colloquially referred ipad 4 tablet computer produced marketed apple inc compared predecessor third-generation ipad fourth-generation ipad maintained retina display featured new upgraded components apple a6x chip lightning connector introduced september 12 2012 shipped ios 6.0 provides platform audio-visual media including electronic books periodicals films music computer games presentations web content like ipad 2 third-generation ipad supported five major ios releases case ios 6 7 8 9 10. ios 11 released 19 september 2017 support fourth-generation ipad ios 11 drops support 32-bit devices announced media conference october 23 2012 fourth generation ipad line first released november 2 2012 35 countries december ten countries including china india brazil third generation discontinued following fourth announcement seven months general availability device available either black white front glass panel various connectivity storage options storage size options include 16 gb 32 gb 64 gb 128 gb available connectivity options wi-fi wi-fi cellular lte capabilities fourth-generation ipad received primarily positive reviews praised hardware improvements well retina display also featured device predecessor furthermore benchmarks reveal fourth-generation ipad able perform cpu-reliant tasks twice fast predecessor first weekend sales aggregated amount 3 million fourth-generation ipads ipad minis sold rumors regarding next-generation ipad emerged shortly release third-generation ipad point speculated next ipad released would smaller size speculations emerged july 2012 digitimes help unspecified sources claimed apple made small revisions upcoming ipad scheduled release late 2012 october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company pre-disclose subject event widely expected regarding ipad mini photographic images device dock connector front camera emerged shortly media event media event apple ceo tim cook introduced new version ibooks new generations macbook pro mac mini imac unveiling fourth-generation ipad lower-end ipad mini unveiling apple stated fourth-generation ipad would available pre-order online selected number countries starting october 26 november 2 apple released wi-fi model device 35 countries across europe east asia north america cellular model released in-store weeks initial release device release fourth-generation ipad led discontinuation predecessor angered many third-generation ipad users response apple extended 14-day return policy 30 days itproportal noted since price models identical consumers purchased third-generation ipad within time frame effectively allowed exchange discontinued device fourth-generation model january 29 2013 apple announced scheduled launch 128 gb variant 4th generation ipad released february 5 2013 following announcement ipad air october 22 2013 sales fourth-generation ipad discontinued fourth-generation ipad reintroduced march 18 2014 following discontinuation ipad 2 order make reintroduction low-end device ipad air price cut 20 original launch price october 16 2014 fourth-generation ipad discontinued favor ipad air 2 ipad air took place entry-level ipad time fourth-generation ipad shipped ios 6.0 later ios 7 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s user speaks ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech fourth-generation ipad optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad 4th generation ipad unlike immediate predecessor 3rd generation ipad supported ios 10 however announced apple wwdc 2017 4th generation ipad along iphone 5/5c support ios 11. ios 10.3.3 latest final version ios include support wifi models devices ios 10.3.4 latest final version ios include support cellular models devices device apple a6x soc comprises 32-bit apple dual-core cpu running 1.4 ghz quad-core powervr sgx554mp4 gpu 1 gb ram also features 5-megapixel rear-facing camera capable 1080p video recording 720p hd front-facing videophone camera designed facetime device features 9.7 diagonal display resolution 2,048 1,536 qxga resulting 3.1 million pixels gives display pixel density 264 ppi total number pixels used display fourth-generation ipad four times ipad 2 – providing even scaling prior model previous generations iphone ipad hardware four buttons one switch fourth-generation ipad device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings generally functioning either switch device silent mode lock/unlock orientation screen externally fourth-generation ipad identical predecessor apart differences dock connectors used change manufacturers produce display addition wi-fi version weighs 652 grams cellular model weighs 662 grams – 2 grams heavier respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi fourth-generation ipad available 16 32 64 128 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos audio playback fourth-generation ipad frequency response 20 hz 20,000 hz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav ipad uses internal rechargeable lithium-ion polymer lipo battery hold charge 11,560 mah batteries made taiwan simplo technology 60 dynapack international technology 40 ipad designed charged relatively high current 2 amps using included 12 w usb power adapter lightning connector charged older usb port computer limited 500 milliamps 0.5 amps result ipad use powered computer may charge slowly high-power usb ports found newer computers accessories provide full charging capabilities apple claims battery provide 10 hours video audio playback web surfing wi-fi 9 hours web surfing cellular connection one month standby like rechargeable battery ipad battery loses capacity time however ipad battery user-replaceable program similar ipod iphone battery-replacement programs apple promised replace ipad hold electrical charge refurbished unit fee battery replacement process user data preserved/transferred repaired refurbished units come new case warranty refurbished unit may vary jurisdictions smart cover introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets smart cover also assume positions folding smart covers microfiber bottom cleans front ipad wakes unit cover removed comes five colors polyurethane expensive leather apple offers several accessories adapters proprietary lightning connector port besides headphone jack dock holds ipad angle dock connector audio line-out port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger compatible ipods iphones 12 watt charger included fourth-generation ipad received primarily favorable reviews critics commentators review gareth beavis techradar praised device high resolution retina display techradar wrote ... one impressive 've seen tablet date however reviewer also wrote screen lacks 'punch seen super amoled screens seen devices like samsung galaxy note 2 review also praised interface ipad simple design easy use layout additionally aspects design ipad updated soc noted praised review critically beavis noted ipad still moderately heat medium usage however extent seen third-generation ipad tim stevens engadget praised retina display labelled best screen available tablets benchmarks tests conducted engadget resulted stevens concluding fourth-generation ipad fastest apple mobile device available surpassing record iphone 5 held brief period benchmark tests conducted slashgear concluded soc fourth-generation ipad able perform cpu-reliant tasks twice fast third-generation ipad series benchmark tests conducted graphics performance fourth-generation ipad anandtech resulted device achieving highest score compared consumer mobile devices including samsung galaxy iii nexus 10 third-generation ipad performance increase fourth-generation ipad varies tests however increase nonetheless evident furthermore battery longevity tests conducted organization suggests battery fourth-generation ipad able last longer predecessor however battery updated ipad 2 able outlast fourth-generation ipad first weekend sales ipad mini fourth-generation ipad apple reported sold aggregated number 3 million units techradar noted first weekend sales figures fourth-generation ipad lower corresponding figures third-generation ipad sold 3 million units first weekend subsequent reports analysis david hsieh technology analyst suggest ipad mini selling better fourth-generation ipad despite noted slump sales apple stock price direct response figures released rose 1.4 584.62 november 5 repairability review conducted ifixit fourth-generation ipad scored 2 10 10 easiest repair due use adhesive attach components however reviewers noted several components screen battery could removed easily replacement
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 5752, 405, 6125, 2954, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3001, 2284, 3008, ...
Test
319
0
DiShIn:dishin described dishin disjunctive shared information method calculate shared information content complementing value informative common ancestor mica disjunctive ancestors exploring multiple inheritance ontology shared information content two terms ontology information science popular technique measure semantic similarity.. dishin re-defines shared information content two concepts average disjunctive ancestors assuming ancestor disjunctive difference number distinct paths concepts different informative ancestor words disjunctive ancestor informative ancestor representing given set parallel interpretations dishin improvement grasm terms computational efficiency management parallel interpretations example palladium platinum silver gold considered precious metals silver gold copper considered coinage metals thus calculating semantic similarity platinum gold dishin starts calculating number paths difference common ancestors metal two paths gold one platinum path difference one precious one path concept path difference zero since path difference distinct common ancestors metal precious considered disjunctive common ancestors calculating semantic similarity platinum palladium dishin starts calculating number paths difference common ancestors metal precious one path concept path difference zero common ancestors thus common ancestor precious informative considered disjunctive common ancestor given node-based semantic similarity measures proportional average information content common disjunctive ancestors metal precious case platinum gold precious case platinum palladium means dishin palladium platinum similar platinum gold calculating semantic similarity silver gold dishin starts calculating number paths difference common ancestors case platinum palladium common ancestors path difference zero since silver gold share relationships therefore parallel interpretations thus informative common ancestor precious coinage considered disjunctive common ancestor means dishin similarity silver gold greater equal similarity pair leaf concepts thus dishin penalize parallel interpretations grasm
[]
Test
320
7
CenturyLink:centurylink centurylink inc. global technology company headquartered monroe louisiana provides communications network services security cloud solutions voice managed services customers worldwide company member p 500 index fortune 500 communications services include local long-distance voice broadband multi-protocol label switching mpls private line including special access ethernet hosting including cloud hosting managed hosting data integration video network public access voice internet protocol voip information technology ancillary services centurylink also serves global enterprise customers across north america latin america emea asia pacific centurylink ’ products services focus 3 key segments enterprise business small business residential centurylink enterprise business provides products services around network cloud security voice managed services enterprise customers centurylink ’ network services include sd wan mpls/ipvpn hybrid wan ethernet internet access wavelength services dark fiber private lines centurylink cloud provides big data service internet things iot multi-cloud management private cloud public cloud bare metal saas applications cloud connect centurylink security monitors billion security events daily services include cloud infrastructure ddos web application email web security company also provides analytics threat management risk compliance support threat research labs centurylink offers voice products ranging traditional landlines unified communications collaboration uc c services recognized 2018 frost sullivan “ growth excellence voip access sip trunking ” centurylink ’ managed services include advanced professional services consulting strategic partnerships centurylink small business provides products services around internet phone tv cloud applications centurylink residential provides internet including gigabit fiber voice tv via partnership directv company also offers bundling verizon wireless centurylink residential services available following states centurylink fiber fiber premises service united states providing broadband internet prism tv small slowly growing number locations service first introduced omaha nebraska next rolled las vegas nevada plans expansion several markets unlike company existing high speed internet deployments utilize fiber-to node/neighborhood increase speed adsl2+ speeds 20/2 mbit/s vectored vdsl2+ speeds 140/10mbit/s markets centurylink installs fiber optic cable way home business speeds 1,000 mbit/s download 1,000 mbit/s upload using calix optical network terminals feb. 2 2014 centurylink announced availability gigabit fiber service multi-tenant businesses salt lake city surrounding communities aug. 5 2014 centurylink announced expansion gigabit fiber service 16 additional markets sep 15 2015 centurylink announced expansion gigabit fiber service residential business customers six additional states increasing company service coverage select areas 17 states gigabit fiber markets may 2 2017 centurylink inc. completed previously announced sale data centers colocation business funds advised bc partners consortium including medina capital advisors longview asset management deal worth approximately 1.86 billion centurylink retaining approximately 10 equity stake consortium newly formed global secure infrastructure company cyxtera technologies centurylink second largest u.s. communications provider global enterprise customers centurylink customers 60 countries october 27 2008 embarq announced would acquired centurytel inc. all-stock transaction valued 6 billion centurytel ceo glen post would remain ceo merged company following acquisition remained ceo 2018 embarq former landline business sprint served cities 18 states including nevada florida north carolina ohio deal made centurytel third-largest landline phone provider pennsylvania behind verizon verizon pennsylvania verizon north comcast april 22 2010 centurylink point still legally known centurytel inc. announced would acquire qwest stock-for-stock transaction agreement centurylink would swap 0.1664 shares share qwest result centurylink shareholders prior merger wound 50.5 share ownership combined company former qwest shareholders gained remaining 49.5 valuation centurylink purchase 12 billion merger completed april 1 2011 addition qwest allowed centurylink become third largest telecommunications company united states largest landline phone provider state colorado new company 17 million access lines 5 million broadband customers 1.4 million video subscribers across 37 states merger also made centurylink owner one so-called baby bells qwest included us west baby bell much western united states july 15 2011 centurylink acquired savvis inc. global provider cloud infrastructure hosted services 2 billion represented outstanding shares savvis common stock 40 per share acquisition allowed centurylink provide expanded managed hosting cloud services december 4 2012 centurylink launched integrated suite cloud services called savvisdirect savvisdirect expansion centurylink ’ portfolio savvis cloud services includes cloud application hosting cloud servers cloud storage private cloud small businesses administrators developers centurylink later shuttered savvisdirect subsidiary consolidating cloud service offerings internally october 16 2012 savvis acquired ito business division ciber thereby adding managed services portfolio june 14 2013 centurylink announced acquisition appfog portland-based platform service used 100,000 developers automate deployment software public clouds amazon web services openstack november 19 2013 centurylink announced acquisition tier 3 seattle-based infrastructure service iaas platform advanced cloud management company based cloud foundry december 8 2014 centurylink announced acquisition datagardens inc. disaster recovery as-a-service draas provider based edmondton alberta canada december 11 2014 centurylink announced acquisition cognilytics predictive analytics big data service provider march 30 2016 centurylink announced acquisition netaura security services company focuses cybersecurity security information event management siem analytics vulnerability management january 9 2017 centurylink announced acquisition edison new jersey-based seal consulting leading sap services provider expanded centurylink ’ existing integrated sap capabilities hosting managed services include integration software implementation october 31 2016 centurylink announced intent acquire level 3 communications deal valued around 25 billion securing necessary regulatory approvals centurylink closed transaction november 1 2017 centurylink technology center excellence monroe la earliest predecessor centurylink oak ridge telephone company oak ridge louisiana owned f. e. hogan sr 1930 hogan sold company 75 paid subscribers william clarke marie williams 500 moved switchboard williams family front parlor 1946 williams son clarke mcrae williams received ownership family telephone company wedding gift 1947 clarke williams learned telephone company marion louisiana sale loan business associate joe sydney carter clarke purchased marion telephone company eventually made base operation grew company acquisitions centurylink still maintains offices former headquarters building company remained family-operated business became incorporated 1968 1967 oak ridge telephone company served three states 10,000 access lines year company incorporated central telephone electronics clarke m. williams served president chairman board 1972 1975 clarke gradually moved headquarters marion monroe louisiana access larger employee base near airport century telephone logo 1971 company renamed century telephone enterprises inc 1972 century telephone acquired la crosse telephone corporation wisconsin october 24 1978 century telephone moved new york stock exchange first time began trade ticker symbol ctl century telephone performed well long bear market 1970s stock rose fourfold company provided telephone service parts 14 states time 1981 century telephone acquired war telephone west virginia 1982 century telephone earnings peaked 14 million declined 1983 following early 1980s recession finally began recover 1984 however 1983 decline led loss half value company stock 1984 1985 earnings stock price recovered new record highs company accumulated 206 million long-term debt century telephone sold operations war telephone two companies colonial telephone 4.66 million 1987 stock price nearly doubled low year old 1982 record high falling back third 1987 stock market crash earnings steadily grown year 1983 low 1987 reached nearly us 20 million 1989 century telephone enterprises acquired universal telephone inc. us 90 million cash late 1980s company began long trend performed extremely well stock split three-for-two twice period earnings steadily grew 1990-1991 recession year-end 1991 reached nearly us 40 million double 1987 1992 century telephone acquired central telephone company ohio centel subsidiary 135 million acquisition served 65,000 access lines added 20 century access line total also year glen f. post iii became chief executive officer named vice chairman board century telephone 1993 century telephone revenues 425 million 350 million 1992 1993 earnings nearly 80 million 70 million 1992 excluding nearly 16 million charge 1992 due cumulative effect accounting change year also 1993 company split stock three-for-two yet however time company accumulated nearly 520 million long-term debt 1995 century telephone enterprises added p midcap 400 index earnings continued steady growth trend 1994 economic soft landing 1995 reached us 115 million long-term debt continued grow well reaching us 623 million year 1997 century telephone acquired delta security alarm co. inc. monroe louisiana largest acquisition time pacific telecom doubling size 660,000 additional telephone access lines 12 states pacific telecom inc. would continue existence renamed centurytel northwest inc 1998 century telephone split stock three-for-two company acquired another monroe louisiana security company century protection systems also acquired 89,000 access lines 19 exchanges 21 northern wisconsin communities ameritech affected customers formerly served wisconsin bell ameritech directory publishing operations serving customers also acquired 1999 company renamed centurytel inc split stock three-for-two added standard poor 500 index year former centurytel logo used company prior becoming centurylink centurytel office ann arbor michigan 2000 centurytel acquired 230,500 gte lines arkansas also bought 127,000 gte lines missouri partnership spectra communications wisconsin acquired 133,000 additional lines 70,500 access lines us 195 million verizon year centurytel also bought 62,650 lines us 170 million partnership telephone usa wisconsin llc 2001 centurytel acquired csw net inc. russellville arkansas fended hostile take-over attempt alltel inc 2002 son company original founder chairman board clarke m. williams died succeeded vice chairman glen f. post iii company sold wireless business alltel become pure-play rural local exchange carrier also year centurytel acquired 300,000 verizon access lines alabama 354,000 verizon access lines missouri bringing total operations 22 states 2.5 million access lines 2003 centurytel acquired half ownership skycomm international inc. houston texas march form satellite teleport global network access point nap system june centurytel also acquired fiber network digital teleport inc. 5,700-mile 9,200 km route running illinois texas adjoining states centurytel renamed network company lightcore closing year december centurytel acquired midwest fiber optic network mfon level 3 communications inc. december stand-alone system core central states lightcore august 2004 partnered echostar communications corporation dish network multi-channel digital tv september centurytel began relationship cingular wireless 2005 centurytel began wireless voice data service bought number fiber networks central united states kmc telecom holdings inc 2006 centurytel sold arizona assets hopi telecommunications inc. bringing total operations 23 states may 2007 centurytel acquired madison river communications based mebane nc parent company four lecs al ga il nc well clec operations il la nc lecs included mebtel communications telephone company serving alamance county north carolina gulftel communications based foley al serving baldwin surrounding counties coastal communications based hinesville ga gallatin river communications serving dixon galesburg pekin areas il late 2007 customer respect group international research consulting firm focuses corporations treat online customers ranked centurytel best among six leading communications providers june 2 2009 press release announced combined centurytel/embarq entity would called centurylink denver-based monigle associates retained formulate new brand strategy acquisition completed july 1 2009 october 19 2009 centurytel embarq brandings retired business officially conducted centurylink banner continuing trade nyse centurytel stock ticker ctl new corporate name centurylink inc. become official may 2010 federal communications commission ordered centurylink pay record 16 million failing alert authorities preventable programming error left nearly 11 million people seven states without access emergency services six hours 2014 december 2018 centurylink faced criticism requiring residential customers utah via dns hijacking view acknowledge notice advertising security parental control software could connect internet provider claimed required recently-enacted state law requires isps inform users provide ability block material harmful minors bill sponsor utah state senate member todd weiler stated law require service disrupted notice acknowledged law requires notice delivered conspicuous manner advertisement within bill invoice require disruption service december 27 2018 “ nationwide outage ” caused 9-1-1 service disrupted across country federal communications commission says investigate areas outage lasted nearly twelve hours third shutdown year following outages april november 2018 atm point sale credit card machines also widely affected
[ 7232, 1443, 2988, 7613, 632, 1634, 3091, 6262, 7813, 6806, 3627, 1183, 5387, 5927, 1375, 2117, 2212, 5135, 740, 320, 1757, 3028, 842, 5064, 330, 2961, 7037, 2700, 1988, 5619, 84, 1514, 5889 ]
Test
321
4
Cross-site_cooking:cross-site cooking cross-site cooking type browser exploit allows site codice_1 set cookie codice_2 cookie domain another site codice_3 cross-site cooking used perform session fixation attacks malicious site fixate session identifier cookie another site attack scenarios may also possible example codice_1 may know security vulnerability codice_3 exploitable using cookie security vulnerability requires e.g administrator password codice_1 know cross-site cooking could used fool innocent users unintentionally perform attack cross site cross-site cooking similar concept cross-site scripting cross-site request forgery cross-site tracing cross-zone scripting etc. involves ability move data code different web sites cases e-mail instant messages sites problems linked fact web browser shared platform different information applications sites logical security boundaries maintained browsers ensures one site corrupt steal data another however browser exploit cross-site cooking used move things across logical security boundaries name cross-site cooking concept presented michał zalewski 2006 name mix cookie cross-site attempting describe nature cookies set across sites michał zalewski article 2006 benjamin franz credited discovery may 1998 reported cookie domain related vulnerability vendors benjamin franz published vulnerability discussed mainly way circumvent privacy protection mechanisms popular browsers michał zalewski concluded bug 8 years later still present unresolved browsers could exploited cross-site cooking various remarks vendors ... certainly hurry fix made zalewski others
[ 7300, 5721, 2075, 4858 ]
Test
322
2
BNU_(software):bnu software bnu high-performance communications device driver designed provide enhanced support serial port communications bnu serial port driver specifically targeted use early late 1980s 1990s dos-based bbs software reason bnu similar enhanced serial port drivers provide better support serial communications software offered machine bios and/or dos used machine serial port support provided bnu similar drivers allowed communications software programmers spend time actual applications instead depths details talk serial ports modems connected sending communications data across modem link lot involved sending data serial printer basically originally capable done existing serial port software support bnu written david nugent experimental driver serial communications following fossil specification david released bnu public 1989 use bbs world spread rapidly bnu one two three available fossil drivers ibm pc compatible hardware ms-dos/pc dos operating system bnu one widely used ms-dos fossil communications drivers bnu mainly used dos-based bulletin board system bbs software written late 1980s mid-1990s used windows-based bbs software bnu used windows ntvdm run dos-based bbs software windows bnu similar drivers limited solely used bbs world enhanced capabilities offered also used easily communicate serially connected devices reasons fossil specification fossil drivers originally created reason noted separate details serial port communications actual application software programmers needed talk serial driver standardized way send receive data name bnu originally rip-off bnu uucp context meant basic networking utilities author bnu david nugent felt acronym particularly apt bnu function bnu also called bloody nugent utility written david nugent one many bbs related utilities known time acronym bnu actually stood bnufaq used posted fidonet bnu support echo author saved text file last official posting faq david nugent bnu author
[ 6634, 6380 ]
Validation
323
1
Circumpolar_Health_Bibliographic_Database:circumpolar health bibliographic database circumpolar health bibliographic database chbd free electronic database abstracts citations geographic subject indexing library codes links full text publications peer-reviewed gray literature established 2007 contains sixty five hundred records describe human health circumpolar region chbd circumpolar chronic disease prevention project canadian institutes health research maintained university calgary calgary alberta canada chbd initially constructed records arctic institute north america database mainly northern canadian records expected take several years add non-canadian records chbd circumpolar health observatory proposed may 2008 norway would disseminate data chbd funding database increased 50 period 2008-2009
[]
Test
324
2
Information_Bridge_Framework:information bridge framework information bridge framework microsoft office programmability framework microsoft targeting microsoft office 2003 later versions used extract data office documents embedding functionality office applications custom applications
[ 5252, 1861, 7793, 6495, 3920, 315 ]
Test
325
4
Fiddler_(software):fiddler software fiddler http debugging proxy server application originally written eric lawrence formerly program manager internet explorer development team microsoft fiddler captures http https traffic logs user review logging performed implementing man-in-the-middle interception using self-signed certificates 6 october 2003 eric lawrence released first official version fiddler 12 september 2012 fiddler acquired telerik lawrence joined company work fiddler full-time basis 23 december 2015 lawrence left telerik google chrome security team telerik continued develop fiddler june 2018 lawrence returned microsoft principal program manager
[ 6574, 3383, 726, 588, 2347, 5571, 2530, 3338, 578, 1513, 1542, 3426 ]
Test
326
2
Image_Packaging_System:image packaging system image packaging system also known ips pkg 5 cross-platform written python package management system created opensolaris community coordination sun microsystems used solaris 11 several illumos-based distributions openindiana omnios xstreamos growing number layered applications including glassfish across variety os platforms features include fact ips delivers single file separate shelf separate checksum package update needs replace files modified elf binaries computes checksums loaded parts elf binary permits e.g avoid update elf binary changed elf comment section due fact ips delivers single file separate shelf slow operation caused input source medium high latency e.g internet higher round trip time cd/dvd media slow seeks
[ 5726, 4675, 6428, 5386, 7555, 2594, 781, 5092, 6505, 4759, 7619, 7251, 3366, 4778, 4059, 3036, 1582, 3042, 3732, 4441, 523, 163, 1598, 8055, 5200, 5545, 6609, 1260, 5912, 578, 2034, 2771, 6663, 1684, 952, 6312, 5965, 7042, 5629, 2451, 5...
Test
327
2
IPhone_3G:iphone 3g iphone 3g smartphone designed marketed apple inc. second generation iphone successor original iphone introduced june 9 2008 wwdc 2008 moscone center san francisco united states iphone 3g internally similar predecessor included several new hardware features gps 3g data tri-band umts/hsdpa device originally loaded concurrently launched iphone os 2.0 addition features including push email turn-by-turn navigation new operating system introduced app storeapple new distribution platform third-party applications july 11 2008 apple released iphone 3g across twenty-two countries two storage options 8gb 16gb 16gb model produced either black white following release successor iphone 3gs model one year later iphone 3g remained sale became apple budget phone offer price cut half 99 iphone 3g required two-year contract available black 8 gb storage came bundled then-new iphone os 3.0 firmware june 7 2010 iphone 3g finally discontinued replaced apple budget phone 8gb iphone 3gs selling price 99 2-year contract iphone 3g came preloaded latest version iphone os continued receive updates software two years major iterations released annual basis however phone access decreasing proportion new features update hardware became superseded later models launched iphone 3g came preloaded iphone os 2.0 introduced app store microsoft exchange activesync support apple ’ mobileme service push email support along new features bug fixes june 2009 iphone 3g users received iphone os 3.0 software update introduced long-awaited mms feature copy paste landscape support applications bluetooth stereo support improvements june 2010 apple released ios 4.0 software update unlike successor models iphone 3g support prominent features ios 4.0 multitasking ability set home screen wallpaper bluetooth keyboard support however provide access unified mailbox feature homescreen folders better organize apps playlist creation enhancements update widely criticized slow performance iphone 3g though september 2010 ios 4.1 release resolved problem however unlike modern ios devices update provide iphone 3g owners access important features case game center application november 22 2010 iphone 3g received ios 4.2 software update ios 4.2.1 introduced features youtube voting security fixes however iphone 3g unable use many features included update airplay safari text search last ios release support iphone model ios 4.3 later compatible iphone model due hardware limitations performance issues iphone 3g back featured redesigned polycarbonate plastic housing replacing aluminum back first generation buttons changed plastic metal edges phone tapered providing better grip iphone 3g introduced first official color options outer casing 16gb version available black white dimensions iphone 3g marginally larger original iphone high wide deep compared predecessor high wide deep iphone 3g sported capacitive touchscreen 480×320 hvga resolution 163 ppi scratch-resistant glass sits top display like original iphone touchscreen designed bare finger multiple fingers multi-touch sensing device featured sensors predecessor proximity sensor deactivates display calls face near repositioned save battery power prevent inadvertent inputs user ’ face ears ambient light sensor included adjust display brightness different lighting conditions helps save battery power 3-axis accelerometer included sense orientation phone change screen accordingly allowing user easily switch portrait landscape mode iphone 3g internal hardware based original iphone still includes samsung 32-bit risc arm11 620 mhz processor underclocked 412 mhz powervr mbx lite 3d gpu 128 mb package package pop dram rear device iphone 3g features fixed-focus 2.0 megapixel camera predecessor camera optical zoom flash autofocus native video recording although various applications became available allow video recording device iphone 3g operating system supports geotagging photographs addition edge iphone 3g supports assisted gps 3g data tri-band umts/hsdpa enhancements allow faster data downloads turn-by-turn navigation maps compared previous devices like predecessor iphone 3g features proprietary 30-pin dock connector charging device also used synchronize device computer connect various accessories iphone 3g features flush-mounted 3.5 mm headphone jack instead recessed headphone jack included original iphone could therefore used headphones provided apple iphone 3g features internal rechargeable battery rated 1150 mah like predecessor user-replaceable apple stated iphone 3g ’ battery capable providing six hours web browsing via wi-fi five hours via 3g 25 hours audio playback alternatively said provide 300 hours standby time walt mossberg wall street journal described device capable version already excellent device however said hidden costs ios 4 still compatible iphone 3g released june 21 2010 article wall street journal digits column july 28 2010 reported iphone 3g phones updating ios 4 responded slowly diminished battery life became excessively hot
[ 6788, 3940, 3612, 7890, 722, 1094, 4320, 2926, 4690, 734, 740, 5752, 405, 6125, 2954, 1123, 4726, 6847, 6142, 2609, 1895, 4376, 5091, 4749, 5450, 7601, 6165, 463, 3001, 2284, 3008, 5477, 120, 1940, 2300, 3025, 2665, 2679, 1582, 2327, 65...
Test
328
9
Lightweight_Imaging_Device_Interface_Language:lightweight imaging device interface language lightweight imaging device interface language abbr lidil printer interface definition language used recent hewlett-packard printers language commonly used hp deskjets support pcl printer language name suggests language supports definition raster documents limited overall host-based protocol advertised ldl cmd command set field device id string models support printing ascii text
[ 3764, 7299, 4780 ]
Test
329
3
Load–store_unit:load–store unit computer engineering load–store unit lsu specialized execution unit responsible executing load store instructions generating virtual addresses load store operations loading data memory storing back memory registers load–store unit usually includes queue acts waiting area memory instructions unit operates independently processor units load–store units may also used vector processing cases term load–store vector may used load-store units also capable executing simple fixed-point and/or integer operations
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 2567, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 441, 2266, 4047, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 534, 7314, 1252, 1254, 4847, 4479, 895, ...
Test
330
7
Software_as_a_service:software service software service saas software licensing delivery model software licensed subscription basis centrally hosted sometimes referred on-demand software formerly referred software plus services microsoft saas typically accessed users using thin client e.g via web browser saas become common delivery model many business applications including office software messaging software payroll processing software dbms software management software cad software development software gamification virtualization accounting collaboration customer relationship management crm management information systems mis enterprise resource planning erp invoicing human resource management hrm talent acquisition learning management systems content management cm geographic information systems gis service desk management saas incorporated strategy nearly leading enterprise software companies according gartner estimate saas sales 2018 expected grow 23 72 billion saas applications also known web-based software on-demand software hosted software term software service saas considered part nomenclature cloud computing along infrastructure service iaas platform service paas desktop service daas managed software service msaas mobile backend service mbaas information technology management service itmaas centralized hosting business applications dates back 1960s starting decade ibm mainframe providers conducted service bureau business often referred time-sharing utility computing services included offering computing power database storage banks large organizations worldwide data centers expansion internet 1990s brought new class centralized computing called application service providers asp asps provided businesses service hosting managing specialized business applications goal reducing costs central administration solution provider specialization particular business application two world pioneers largest asps usi headquartered washington dc area futurelink corporation headquartered irvine california software service essentially extends idea asp model term software service saas however commonly used specific settings acronym first appeared goods services description uspto trademark filed september 23 1985 dbaas database service emerged sub-variety saas type cloud database cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen however market grown saas managed service players forced try redefine role unlike traditional software conventionally sold perpetual license up-front cost optional ongoing support fee saas providers generally price applications using subscription fee commonly monthly fee annual fee consequently initial setup cost saas typically lower equivalent enterprise software saas vendors typically price applications based usage parameters number users using application however saas environment customers data reside saas vendor opportunities also exist charge per transaction event unit value number processors required relatively low cost user provisioning i.e. setting new customer multitenant environment enables saas vendors offer applications using freemium model model free service made available limited functionality scope fees charged enhanced functionality larger scope saas applications completely free users revenue derived alternative sources advertising key driver saas growth saas vendors ability provide price competitive on-premises software consistent traditional rationale outsourcing systems involves applying economies scale application operation i.e. outside service provider may able offer better cheaper reliable applications vast majority saas solutions based multitenant architecture model single version application single configuration hardware network operating system used customers tenants support scalability application installed multiple machines called horizontal scaling cases second version application set offer select group customers access pre-release versions applications e.g. beta version testing purposes contrasted traditional software multiple physical copies software — potentially different version potentially different configuration often customized — installed across various customer sites traditional model version application based unique code although exception rather norm saas solutions use multitenancy use mechanisms—such virtualization—to cost-effectively manage large number customers place multitenancy whether multitenancy necessary component software service topic controversy two main varieties saas although software-as-a-service applications share traits characteristics common among many saas applications saas applications similarly support traditionally known application configuration words like traditional enterprise software single customer alter set configuration options a.k.a parameters affect functionality look-and-feel customer may settings parameter values configuration options application customized degree designed based set predefined configuration options example support customers common need change application look-and-feel application appears customer brand or—if desired—co-branded many saas applications let customers provide self service interface working application provider staff custom logo sometimes set custom colors customer however change page layout unless option designed saas applications often updated frequently traditional software many cases weekly monthly basis enabled several factors accelerated feature delivery enabled agile software development methodologies methodologies evolved mid-1990s provide set software development tools practices support frequent software releases saas applications access company internal systems databases internal services predominantly offer integration protocols application programming interfaces apis operate wide area network typically protocols based http rest soap ubiquity saas applications internet services standardization api technology spawned development mashups lightweight applications combine data presentation functionality multiple services creating compound service mashups differentiate saas applications on-premises software latter easily integrated outside company firewall inspired success online social networks so-called web 2.0 functionality many saas applications offer features let users collaborate share information example many project management applications delivered saas model offer—in addition traditional project planning functionality—collaboration features letting users comment tasks plans share documents within outside organization several saas applications let users vote offer new feature ideas although collaboration-related functionality also integrated on-premises software implicit explicit collaboration users different customers possible centrally hosted software opensaas refers software service saas based open source code similar saas applications open saas web-based application hosted supported maintained service provider roadmap open saas applications defined community users upgrades product enhancements managed central provider term coined 2011 dries buytaert creator drupal content management framework andrew hoppin former chief information officer new york state senate vocal advocate opensaas government calling future government innovation points wordpress unified successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website -- simply pay wordpress.com host drupal gardens free web hosting platform based open source drupal content management system offers another example forbes contributor dan woods calls new open source model saas according woods open source provides escape hatch drupal gardens users able press button get source code version drupal code runs site along data database take code put one hosting companies anything would like several important changes software market technology landscape facilitated acceptance growth saas solutions limitations slow acceptance saas prohibit used cases standard model also limitations engineering simulation software traditionally delivered on-premises solution user desktop ideal candidate saas delivery market saas engineering simulation software infancy interest concept growing similar reasons interest saas growing industries main driver traditional engineering simulation software required large up-front investment order access simulation software large investment kept engineering simulation inaccessible many startups middle market companies reluctant unable risk large software expenditure unproven projects according survey himss analytics 83 us healthcare organizations using cloud services 9.3 planning whereas 67 healthcare organizations currently running saas-based applications software service data escrow process keeping copy critical software-as-a-service application data independent third party similar source code escrow critical software source code stored independent third party saas data escrow applies logic data within saas application allows companies protect insure data resides within saas applications protecting data loss many varied reasons considering saas data escrow including concerns vendor bankruptcy unplanned service outages potential data loss corruption many businesses also keen ensure complying data governance standards want improved reporting business analytics saas data research conducted clearpace software ltd. growth saas showed 85 percent participants wanted take copy saas data third participants wanted copy daily basis one notable criticism saas comes richard stallman free software foundation refers service software substitute saass considers use saass violation principles free software according stallman saas products face problem 2010 forbes contributor dan woods noted drupal gardens web hosting platform based open source drupal content management system new open source model saas added similarly mediawiki wordpress many extensions increasingly used wide variety internal applications well public web services obtaining code relatively simple integration existing extensions plug-ins templates etc actual customizations rare usually quickly replaced standard publicly available extensions additionally guarantee software source code obtained means accurately reflects software system claims reflect andrew hoppin former chief information officer new york state senate refers combination saas open source software opensaas points wordpress another successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website – simply pay wordpress.com host cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen
[ 1439, 7877, 2544, 6418, 370, 2185, 373, 7523, 1080, 7165, 1456, 2556, 3954, 3958, 1461, 384, 6433, 22, 3627, 5385, 24, 388, 6806, 6439, 392, 2212, 2570, 6109, 2573, 3973, 3641, 4714, 3309, 1115, 49, 754, 2952, 5064, 6835, 2239, 1125, ...
Train
331
2
Hoard_memory_allocator:hoard memory allocator hoard memory allocator hoard memory allocator linux solaris microsoft windows operating systems hoard designed efficient used multithreaded applications multiprocessor computers hoard distributed gpl purchased proprietary software 2000 author emery berger benchmarked famous memory allocators stated hoard improves performance multithreaded applications providing fast scalable memory management functions malloc free particular reduces contention heap central data structure used dynamic memory allocation caused multiple threads allocate free memory avoids false sharing introduced memory allocators time hoard strict bounds fragmentation hoard continues maintained improved use number open source commercial projects also inspired changes memory allocators one os x since february 2008 first released mac os x snow leopard
[ 4759, 5571, 578, 5447, 515, 6659 ]
Test
332
5
Internet_chess_server:internet chess server internet chess server ics external server provides facility play discuss view board game chess internet term specifically refers facilities connecting players variety graphical chess clients located user computer 1970s one could play correspondence chess plato system program called 'chess3 several users used chess3 regularly often particular user would make several moves per day sometimes several games simultaneously progress theory one could use chess3 play complete game chess one sitting chess3 usually used way plato connected internet predecessor arpanet way allowed mass use public consequently chess3 still relatively unknown public eighties chess play email still fairly novel latency email less traditional correspondence chess via paper letters often one could complete dozen moves week network technology improved public widespread use centralised server live play became possibility michael moore university utah richard nash recognised potential internet chess server created first incarnation hosted lark.utah.edu accessible telnet official opening date ics january 15 1992 john chanak william kish aaron putnam moved server host machine carnegie mellon university july 1992 took operation although buggy suffered lag problems server popular among small group chess enthusiasts time many features added ics elo ratings support graphical clients server made stable late 1992 daniel sleator professor computer science carnegie mellon university took management ics addressed among issues frequent complaint players would lose blitz games time due network lag 1994 copyrighted code began receiving purchase offers companies wanting commercialise server questions whether sleator right claim ics intellectual property since code original server although made substantial improvements code march 1 1995 sleator announced intentions commercialise ics renaming internet chess club icc charging yearly membership fee us 49 us 59.95 2007 announcement highly controversial among existing members many volunteers contributed various ways flourishing ics upset anyone would attempt profit efforts active players server used service provided without charge pleased addition membership fee handful programmers worked original ics became unhappy saw commoditization project formed free internet chess server fics continued allow everyone access features free 1996 john fanning uncle napster founder shawn fanning started chess.net commercial internet chess server rival ics services remain operational today ics protocol simple text-based variant telnet protocol sparsely documented standardised although reference implementations several clients exist theory ics accessed telnet client however almost users choose play using graphical client called interface currently popular interface xboard windows counterpart winboard recent years however lost ground newer interfaces like pychess eboard xics x graphical interface internet chess server unlike earlier text-based ics clients xics allows players see board play pieces graphically usually 2-d configuration addition standalone clients many servers also offer java interfaces used directly web browser popular new users users public computers years several internet chess servers created popular chess.com chesshub.com lichess.org icc playchess.com fics chesscube chess also among games previously offered non-specialist site yahoo games
[ 7765, 3172, 4759, 518 ]
Validation
333
5
Delivermail:delivermail ancestor sendmail delivermail also eric allman mail transport agent used ftp protocol early arpanet transmit e-mail recipient 1979 delivermail first shipped 4.0bsd 4.1bsd arpanet still using ncp network protocol arpanet switched tcp/ip 1982 road paved mtas longer relied ftp delivery new protocol sending mail smtp dns replaced hosts files delivermail evolved sendmail
[ 1950, 2043, 3555, 7154, 46, 6583, 8034, 6908, 3135, 334, 293 ]
Validation
334
2
Eric_Allman:eric allman eric paul allman born september 2 1955 american computer programmer developed sendmail precursor delivermail late 1970s early 1980s uc berkeley 1998 allman greg olson co-founded company sendmail inc. born el cerrito california allman knew early age wanted work computing breaking high school mainframe later using uc berkeley computing center computing needs 1973 entered uc berkeley unix operating system began become popular academic circles earned b.s m.s degrees uc berkeley 1977 1980 respectively unix source code available berkeley local hackers quickly made many extensions code one extension delivermail 1981 turned sendmail mta designed deliver email still relatively small compared today internet arpanet consisted many smaller networks vastly differing formats e-mail headers sendmail soon became important part berkeley software distribution bsd used widely used mta unix based systems despite somewhat complex configuration syntax frequent abuse internet telemarketing firms 1998 allman greg olson founded sendmail inc. headquartered emeryville california proprietary work improving sendmail logging format used mta known syslog first used solely sendmail eventually became unofficial standard format used unrelated programs logging later format made official rfc 3164 2001 however original format made obsolete recent revision rfc 5424 allman credited popularizing allman indent style also known bsd indent style ported fortran version super star trek c programming language later became bsd trek still included various linux distributions part classic bsdgames package awarded telluride tech festival award technology august 2006 telluride colorado 2009 recognized distinguished engineer association computing machinery april 2014 inducted internet hall fame allman openly gay lives berkeley california marshall kirk mckusick partner 30 years married october 2013 mckusick lead developer bsd two first met graduate school
[ 4382, 770, 1027, 8161, 4435, 5836, 6861, 333, 6908, 3379, 4747, 6367 ]
Validation
335
2
Lee_E._McMahon:lee e. mcmahon lee e. mcmahon 1931–1989 american computer scientist graduate st. louis university obtained ph.d. psychology harvard worked bell labs 1963 1989 best known contributions early versions unix operating system particular sed stream editor mcmahon contributed development comm qsort grep index cref cu datakit devised mcmahon system tournament
[ 6470, 6789 ]
Test
336
9
Assembly_language:assembly language assembly language assembler language often abbreviated asm low-level programming language strong correspondence instructions language architecture machine code instructions assembly language may also called symbolic machine code assembly code converted executable machine code utility program referred assembler conversion process referred assembly assembling source code assembly language usually one statement per machine instruction 1:1 comments statements assembler directives macros symbolic labels program memory locations often also supported assembly language specific particular computer architecture sometimes operating system however assembly languages provide specific syntax operating system calls assembly languages used universally operating system language provides access real capabilities processor upon system call mechanisms ultimately rest contrast assembly languages high-level programming languages generally portable across multiple architectures require interpreting compiling much complicated task assembling assembly language uses mnemonic represent low-level machine instruction opcode typically also architectural register flag etc many operations require one operands order form complete instruction assemblers permit named constants registers labels program memory locations calculate expressions operands thus programmers freed tedious repetitive calculations assembler programs much readable machine code depending architecture elements may also combined specific instructions addressing modes using offsets data well fixed addresses many assemblers offer additional mechanisms facilitate program development control assembly process aid debugging assembler program creates object code translating combinations mnemonics syntax operations addressing modes numerical equivalents representation typically includes operation code opcode well control bits data assembler also calculates constant expressions resolves symbolic names memory locations entities use symbolic references key feature assemblers saving tedious calculations manual address updates program modifications assemblers also include macro facilities performing textual substitution – e.g. generate common short sequences instructions inline instead called subroutines assemblers may also able perform simple types instruction set-specific optimizations one concrete example may ubiquitous x86 assemblers various vendors able perform jump-instruction replacements long jumps replaced short relative jumps number passes request others may even simple rearrangement insertion instructions assemblers risc architectures help optimize sensible instruction scheduling exploit cpu pipeline efficiently possible like early programming languages fortran algol cobol lisp assemblers available since 1950s first generations text based computer interfaces however assemblers came first far simpler write compilers high-level languages mnemonic along addressing modes operands instruction translates rather directly numeric representations particular instruction without much context analysis also several classes translators semi automatic code generators properties similar assembly high level languages speedcode perhaps one better known examples may several assemblers different syntax particular cpu instruction set architecture instance instruction add memory data register x86-family processor might codice_1 original intel syntax whereas would written codice_2 syntax used gnu assembler despite different appearances different syntactic forms generally generate numeric machine code see single assembler may also different modes order support variations syntactic forms well exact semantic interpretations fasm-syntax tasm-syntax ideal mode etc. special case x86 assembly programming two types assemblers based many passes source needed many times assembler reads source produce object file cases assembler must able determine size instruction initial passes order calculate addresses subsequent symbols means size operation referring operand defined later depends type distance operand assembler make pessimistic estimate first encountering operation necessary pad one no-operation instructions later pass errata assembler peephole optimization addresses may recalculated passes allow replacing pessimistic code code tailored exact distance target original reason use one-pass assemblers speed assembly – often second pass would require rewinding rereading program source tape rereading deck cards punched paper tape later computers much larger memories especially disc storage space perform necessary processing without re-reading advantage multi-pass assembler absence errata makes linking process program load assembler directly produces executable code faster example following code snippet one-pass assembler would able determine address backward reference bkwd assembling statement s2 would able determine address forward reference fwd assembling branch statement s1 indeed fwd may undefined two-pass assembler would determine addresses pass 1 would known generating code pass 2 sophisticated high-level assemblers provide language abstractions see language design details program written assembly language consists series mnemonic processor instructions meta-statements known variously directives pseudo-instructions pseudo-ops comments data assembly language instructions usually consist opcode mnemonic followed list data arguments parameters translated assembler machine language instructions loaded memory executed example instruction tells x86/ia-32 processor move immediate 8-bit value register binary code instruction 10110 followed 3-bit identifier register use identifier al register 000 following machine code loads al register data 01100001 binary computer code made human-readable expressing hexadecimal follows codice_3 means 'move copy following value al codice_4 hexadecimal representation value 01100001 97 decimal assembly language 8086 family provides mnemonic mov abbreviation move instructions machine code written follows assembly language complete explanatory comment required semicolon much easier read remember mov al 61h load al 97 decimal 61 hex assembly languages including one mnemonic mov may used family related instructions loading copying moving data whether immediate values values registers memory locations pointed values registers immediate a/k/a direct addresses assemblers may use separate opcode mnemonics l move memory register st move register memory lr move register register mvi move immediate operand memory etc mnemonic used different instructions means mnemonic corresponds several different binary instruction codes excluding data e.g codice_5 example depending operands follow mnemonic example x86/ia-32 cpus intel assembly language syntax codice_6 represents instruction moves contents register ah register al hexadecimal form instruction first byte 88h identifies move byte-sized register either another register memory second byte e0h encoded three bit-fields specify operands registers source ah destination al case like mnemonic represent one binary instruction assembler determines instruction generate examining operands first example operand codice_5 valid hexadecimal numeric constant valid register name codice_3 instruction applicable second example operand codice_9 valid register name valid numeric constant hexadecimal decimal octal binary codice_10 instruction applicable assembly languages always designed sort unambiguousness universally enforced syntax example intel x86 assembly language hexadecimal constant must start numeral digit hexadecimal number equal decimal ten would written codice_11 codice_12 codice_9 specifically appear name register ah rule also prevents ambiguity names registers bh ch dh well user-defined symbol ends letter h otherwise contains characters hexadecimal digits word beach returning original example x86 opcode 10110000 codice_3 copies 8-bit value al register 10110001 codice_15 moves cl 10110010 codice_16 dl assembly language examples follow mov al 1h load al immediate value 1 mov cl 2h load cl immediate value 2 mov dl 3h load dl immediate value 3 syntax mov also complex following examples show mov eax ebx move 4 bytes memory address contained ebx eax mov esi+eax cl move contents cl byte address esi+eax mov ds dx move contents dx segment register ds case mov mnemonic translated directly one opcodes 88-8c 8e a0-a3 b0-bf c6 c7 assembler programmer normally know remember transforming assembly language machine code job assembler reverse least partially achieved disassembler unlike high-level languages one-to-one correspondence many simple assembly statements machine language instructions however cases assembler may provide pseudoinstructions essentially macros expand several machine language instructions provide commonly needed functionality example machine lacks branch greater equal instruction assembler may provide pseudoinstruction expands machine set less branch zero result set instruction full-featured assemblers also provide rich macro language discussed used vendors programmers generate complex code data sequences since information pseudoinstructions macros defined assembler environment present object program disassembler reconstruct macro pseudoinstruction invocations disassemble actual machine instructions assembler generated abstract assembly-language entities likewise since comments assembly language source file ignored assembler effect object code generates disassembler always completely unable recover source comments computer architecture machine language computers differ number type operations support different sizes numbers registers representations data storage general-purpose computers able carry essentially functionality ways differ corresponding assembly languages reflect differences multiple sets mnemonics assembly-language syntax may exist single instruction set typically instantiated different assembler programs cases popular one usually supplied cpu manufacturer used documentation two examples cpus two different sets mnemonics intel 8080 family intel 8086/8088 intel claimed copyright assembly language mnemonics page documentation published 1970s early 1980s least companies independently produced cpus compatible intel instruction sets invented mnemonics zilog z80 cpu enhancement intel 8080a supports 8080a instructions plus many zilog invented entirely new assembly language new instructions also 8080a instructions example intel uses mnemonics mov mvi lda sta lxi ldax stax lhld shld various data transfer instructions z80 assembly language uses mnemonic ld similar case nec v30 v20 cpus enhanced copies intel 8086 8088 respectively like zilog z80 nec invented new mnemonics 8086 8088 instructions avoid accusations infringement intel copyright questionable whether copyrights valid later cpu companies amd cyrix republished intel x86/ia-32 instruction mnemonics exactly neither permission legal penalty doubtful whether practice many people programmed v20 v30 actually wrote nec assembly language rather intel since two assembly languages instruction set architecture isomorphic somewhat like english pig latin requirement use manufacturer published assembly language manufacturer products large degree diversity way authors assemblers categorize statements nomenclature use particular describe anything machine mnemonic extended mnemonic pseudo-operation pseudo-op typical assembly language consists 3 types instruction statements used define program operations instructions statements assembly language generally simple unlike high-level languages generally mnemonic symbolic name single executable machine language instruction opcode least one opcode mnemonic defined machine language instruction instruction typically consists operation opcode plus zero operands instructions refer single value pair values operands immediate value coded instruction registers specified instruction implied addresses data located elsewhere storage determined underlying processor architecture assembler merely reflects architecture works extended mnemonics often used specify combination opcode specific operand e.g. system/360 assemblers use extended mnemonic mask 15 operation – nothing one step mask 0 extended mnemonics often used support specialized uses instructions often purposes obvious instruction name example many cpu explicit nop instruction instructions used purpose 8086 cpus instruction used pseudo-opcode encode instruction disassemblers recognize decode instruction similarly ibm assemblers system/360 system/370 use extended mnemonics zero masks sparc architecture known synthetic instructions assemblers also support simple built-in macro-instructions generate two machine instructions instance z80 assemblers instruction recognized generate followed sometimes known pseudo-opcodes mnemonics arbitrary symbols 1985 ieee published standard 694 uniform set mnemonics used assemblers standard since withdrawn instructions used define data elements hold data variables define type data length alignment data instructions also define whether data available outside programs programs assembled separately program data section defined assemblers classify pseudo-ops assembly directives also called pseudo-opcodes pseudo-operations pseudo-ops commands given assembler directing perform operations assembling instructions. directives affect assembler operates may affect object code symbol table listing file values internal assembler parameters sometimes term pseudo-opcode reserved directives generate object code generate data names pseudo-ops often start dot distinguish machine instructions pseudo-ops make assembly program dependent parameters input programmer one program assembled different ways perhaps different applications pseudo-op used manipulate presentation program make easier read maintain another common use pseudo-ops reserve storage areas run-time data optionally initialize contents known values symbolic assemblers let programmers associate arbitrary names labels symbols memory locations various constants usually every constant variable given name instructions reference locations name thus promoting self-documenting code executable code name subroutine associated entry point calls subroutine use name inside subroutines goto destinations given labels assemblers support local symbols lexically distinct normal symbols e.g. use 10 goto destination assemblers nasm provide flexible symbol management letting programmers manage different namespaces automatically calculate offsets within data structures assign labels refer literal values result simple computations performed assembler labels also used initialize constants variables relocatable addresses assembly languages like computer languages allow comments added program source code ignored assembly judicious commenting essential assembly language programs meaning purpose sequence binary machine instructions difficult determine raw uncommented assembly language generated compilers disassemblers quite difficult read changes must made many assemblers support predefined macros others support programmer-defined repeatedly re-definable macros involving sequences text lines variables constants embedded macro definition commonly mixture assembler statements e.g. directives symbolic machine instructions templates assembler statements sequence text lines may include opcodes directives macro defined name may used place mnemonic assembler processes statement replaces statement text lines associated macro processes existed source code file including assemblers expansion macros existing replacement text macros sense date ibm autocoders 1950s assembly language term macro represents comprehensive concept contexts c programming language define directive typically used create short single line macros assembler macro instructions like macros pl/i languages lengthy programs executed interpretation assembler assembly since macros 'short names expand several indeed many lines code used make assembly language programs appear far shorter requiring fewer lines source code higher level languages also used add higher levels structure assembly programs optionally introduce embedded debugging code via parameters similar features macro assemblers often allow macros take parameters assemblers include quite sophisticated macro languages incorporating high-level language elements optional parameters symbolic variables conditionals string manipulation arithmetic operations usable execution given macro allowing macros save context exchange information thus macro might generate numerous assembly language instructions data definitions based macro arguments could used generate record-style data structures unrolled loops example could generate entire algorithms based complex parameters instance sort macro could accept specification complex sort key generate code crafted specific key needing run-time tests would required general procedure interpreting specification organization using assembly language heavily extended using macro suite considered working higher-level language since programmers working computer lowest-level conceptual elements underlining point macros used implement early virtual machine snobol4 1967 written snobol implementation language sil assembly language virtual machine target machine would translate native code using macro assembler allowed high degree portability time macros used customize large scale software systems specific customers mainframe era also used customer personnel satisfy employers needs making specific versions manufacturer operating systems done example systems programmers working ibm conversational monitor system virtual machine vm/cms ibm real time transaction processing add-ons customer information control system cics acp/tpf airline/financial system began 1970s still runs many large computer reservation systems crs credit card systems today also possible use solely macro processing abilities assembler generate code written completely different languages example generate version program cobol using pure macro assembler program containing lines cobol code inside assembly time operators instructing assembler generate arbitrary code ibm os/360 uses macros perform system generation user specifies options coding series assembler macros assembling macros generates job stream build system including job control language utility control statements realized 1960s concept macro processing independent concept assembly former modern terms word processing text processing generating object code concept macro processing appeared appears c programming language supports preprocessor instructions set variables make conditional tests values note unlike certain previous macro processors inside assemblers c preprocessor turing-complete lacks ability either loop go latter allowing programs loop despite power macro processing fell disuse many high level languages major exceptions c c++ pl/i remaining perennial assemblers macro parameter substitution strictly name macro processing time value parameter textually substituted name famous class bugs resulting use parameter expression simple name macro writer expected name macro intention caller would provide name variable global variable constant b would used multiply foo called parameter codice_17 macro expansion codice_18 occurs avoid possible ambiguity users macro processors parenthesize formal parameters inside macro definitions callers parenthesize input parameters assemblers incorporated structured programming elements encode execution flow earliest example approach concept-14 macro set originally proposed dr. harlan mills march 1970 implemented marvin kessler ibm federal systems division extended s/360 macro assembler if/else/endif similar control flow blocks way reduce eliminate use goto operations assembly code one main factors causing spaghetti code assembly language approach widely accepted early '80s latter days large-scale assembly language use curious design a-natural stream-oriented assembler 8080/z80 processors whitesmiths ltd. developers unix-like idris operating system reported first commercial c compiler language classified assembler worked raw machine elements opcodes registers memory references incorporated expression syntax indicate execution order parentheses special symbols along block-oriented structured programming constructs controlled sequence generated instructions a-natural built object language c compiler rather hand-coding logical syntax fans little apparent demand sophisticated assemblers since decline large-scale assembly language development spite still developed applied cases resource constraints peculiarities target system architecture prevent effective use higher-level languages assemblers strong macro engine allow structured programming via macros switch macro provided masm32 package note code complete program assembly languages available time stored-program computer introduced kathleen booth credited inventing assembly language based theoretical work began 1947 working arc2 birkbeck university london following consultation then-future husband andrew booth john von neumann herman goldstine institute advanced study late 1948 electronic delay storage automatic calculator edsac assembler named initial orders integrated bootstrap program used one-letter mnemonics developed david wheeler credited ieee computer society creator first assembler reports edsac introduced term assembly process combining fields instruction word soap symbolic optimal assembly program assembly language ibm 650 computer written stan poley 1955 assembly languages eliminate much error-prone tedious time-consuming first-generation programming needed earliest computers freeing programmers tedium remembering numeric codes calculating addresses widely used sorts programming however 1980s 1990s microcomputers use largely supplanted higher-level languages search improved programming productivity today assembly language still used direct hardware manipulation access specialized processor instructions address critical performance issues typical uses device drivers low-level embedded systems real-time systems historically numerous programs written entirely assembly language burroughs mcp 1961 first computer operating system developed entirely assembly language written executive systems problem oriented language espol algol dialect many commercial applications written assembly language well including large amount ibm mainframe software written large corporations cobol fortran pl/i eventually displaced much work although number large organizations retained assembly-language application infrastructures well 1990s early microcomputers relied hand-coded assembly language including operating systems large applications systems severe resource constraints imposed idiosyncratic memory display architectures provided limited buggy system services perhaps important lack first-class high-level language compilers suitable microcomputer use psychological factor may also played role first generation microcomputer programmers retained hobbyist wires pliers attitude commercial context biggest reasons using assembly language minimal bloat size minimal overhead greater speed reliability typical examples large assembly language programs time ibm pc dos operating systems turbo pascal compiler early applications spreadsheet program lotus 1-2-3 assembly language used get best performance sega saturn console notoriously challenging develop program games 1993 arcade game nba jam another example assembly language long primary development language many popular home computers 1980s 1990s msx sinclair zx spectrum commodore 64 commodore amiga atari st large part interpreted basic dialects systems offered insufficient execution speed well insufficient facilities take full advantage available hardware systems systems even integrated development environment ide highly advanced debugging macro facilities compilers available radio shack trs-80 successors capability combine inline assembly source high-level program statements upon compilation built-in assembler produced inline machine code always debates usefulness performance assembly language relative high-level languages although assembly language specific niche uses important see tools optimization tiobe index programming language popularity ranks assembly language 11 ahead visual basic example assembler used optimize speed optimize size case speed optimization modern optimizing compilers claimed render high-level languages code run fast hand-written assembly despite counter-examples found complexity modern processors memory sub-systems makes effective optimization increasingly difficult compilers well assembly programmers moreover increasing processor performance meant cpus sit idle time delays caused predictable bottlenecks cache misses i/o operations paging made raw code execution speed non-issue many programmers situations developers might choose use assembly language assembly language still taught computer science electronic engineering programs although programmers today regularly work assembly language tool underlying concepts remain important fundamental topics binary arithmetic memory allocation stack processing character set encoding interrupt processing compiler design would hard study detail without grasp computer operates hardware level since computer behavior fundamentally defined instruction set logical way learn concepts study assembly language modern computers similar instruction sets therefore studying single assembly language sufficient learn basic concepts ii recognize situations use assembly language might appropriate iii see efficient executable code created high-level languages
[ 4291, 4302, 1447, 12, 5731, 7172, 27, 2933, 5765, 64, 7213, 4366, 5803, 7246, 4397, 108, 3005, 1556, 5833, 4421, 4435, 149, 154, 158, 160, 5877, 1616, 4469, 5897, 7331, 190, 4483, 5911, 7353, 214, 216, 5932, 224, 1662, 7385, 5948, 238...
Test
337
2
Your_Phone:phone phone app developed microsoft windows 10 connect android ios devices first shown microsoft build 2018 allows see recent photos taken android phone directly windows 10 pc/tablet also used sending sms messages right pc comes preinstalled windows 10 october 2018 update replaces old phone companion phone app used mirror screen android phone however currently phones supported feature beta.at samsung ’ galaxy note10 launch event microsoft teased new phone app feature might soon allow make receive phone calls may 26 2015 microsoft announced phone companion designed help users connect pc whatever smartphone use — windows phone android ios also confirmed cortana digital assistant app arrive android ios previously available windows devices may 7 2018 microsoft announced phone app build 2018 event allows see recent photos send sms messages
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Test
338
1
IPUMS:ipums integrated public use microdata series ipums world largest individual-level population database ipums consists microdata samples united states ipums-usa international ipums-international census records well data u.s. international surveys records converted consistent format made available researchers web-based data dissemination system ipums housed institute social research data innovation interdisciplinary research center university minnesota direction professor steven ruggles ipums includes persons enumerated united states censuses 1790 2010 1890 census missing destroyed fire american community survey since 2000 current population survey since 1962 ipums provides consistent variable names coding schemes documentation across samples facilitating analysis long-term change ipums-international includes countries africa asia europe latin america 1960 forward database currently includes billion individuals enumerated 365 censuses 94 countries around world ipums-international converts census microdata multiple countries consistent format allowing comparisons across countries time periods special efforts made simplify use data losing meaningful information comprehensive documentation provided coherent form facilitate comparative analyses social economic change additional databases ipums family include journal american history described effort one great archival projects past two decades liens socio french portal social sciences gave ipums “ best site ” designation gone non-french website writing “ ipums est un projet absolument extraordinaire ... époustouflante mind-blowing ” official motto ipums use good never evil ipums data documentation available online free charge
[]
Test
339
3
Gorby_no_Pipeline_Daisakusen:gorby pipeline daisakusen gorby pipeline daisakusen puzzle video game developed compile msx2 famicom fm towns published tokuma shoten 1991 game player assembles water pipe segments pipeline moscow tokyo order strengthen japan–soviet union relations permission soviet embassy game promotional materials feature name likeness mikhail gorbachev president soviet union time game development release two months tokuma shoten released gorby pipeline daisakusen japan sega published game gear handheld game console games released japan several months dissolution soviet union falling-block puzzle game small girl—wearing russian national costume sarafan kokoshnik valenki—pushes tiles representing segments water pipe two-dimensional vertical shaft shaft field play second girl also national costume waves semaphore flags give impression guides placement tiles player must quickly rotate place tiles catch conduct continuously-flowing stream water pipes one side shaft player successfully links inflow pipe one side shaft outflow pipe side row tiles disappears player earns points player routes water dead end game adds layer pipe segments player clear accumulating pipe segments stack top shaft game ends clearing requisite number rows player proceeds next game level background music level rendition russian classical music composition among selections great gate kiev final movement mussorgsky suite pictures exhibition 1874 swan theme tchaikovsky ballet swan lake 1876 flight bumblebee interlude rimsky-korsakov opera tale tsar saltan 1900
[ 4023, 7583 ]
Test
340
9
Asm.js:asm.js asm.js subset javascript designed allow computer software written languages c run web applications maintaining performance characteristics considerably better standard javascript typical language used applications asm.js consists strict subset javascript code written statically-typed languages manual memory management c translated source-to-source compiler emscripten based llvm performance improved limiting language features amenable ahead-of-time optimization performance improvements mozilla firefox first web browser implement asm.js-specific optimizations starting version 22. asm.js enables significant performance improvements web applications aim improve performance hand-written javascript code enable anything enhanced performance intended performance characteristics closer native code standard javascript limiting language features amenable ahead-of-time optimization performance improvements using subset javascript asm.js largely supported major web browsers unlike alternative approaches google native client asm.js typically written directly instead intermediate language generated use compiler takes source code language c++ outputs asm.js example given following c code int f int emscripten would output following js code function f note addition codice_1 lack type specifiers javascript bitwise operators convert operands 32-bit signed integers give integer results means bitwise zero otherwise useless operation converts value integer parameter ensures function called outside code value converted correct type also used return value case ensure result adding 1 integer otherwise could become large mark return type function conversions required asm.js optimising compiler produce highly efficient native code ahead-of-time optimising compiler conversions performed asm.js code calls asm.js code required type specifiers mean guaranteed values already correct type furthermore rather performing floating-point addition converting integer simply native integer operation together leads significant performance benefits another example calculate length string would result following asm.js code generated code variable mem8 actually byte-by-byte view typed buffer serves heap asm.js code since asm.js runs browser performance heavily depends browser hardware preliminary benchmarks c programs compiled asm.js usually within factor 2 slowdown native compilation clang much performance gain normal javascript due 100 type consistency virtually garbage collection memory manually managed large typed array simpler model dynamic behavior memory allocation deallocation narrow set well-defined integer floating point operations enables much greater performance potential optimization mozilla benchmark december 2013 showed significant improvements firefox float32 optimizations run benchmarks around 1.5× slower native better mozilla points performance natively compiled code single measure rather range different native compilers case clang gcc delivering code differing performance fact benchmarks like box2d fasta copy asm.js close closer clang clang gcc one case asm.js even beats clang slight amount box2d emscripten project provides tools used compile c c++ codebases languages converted llvm ir asm.js browsers support newest edition javascript able run asm.js code subset specification however since features added edition enable full asm.js support older browsers lacking features may encounter problems browser implementations especially optimised asm.js almost current applications based asm.js c/c++ applications compiled asm.js using emscripten mandreel mind kind applications going target asm.js near future benefit portability running browser level complexity direct port javascript would infeasible far number programming languages application frameworks programs libraries games game engines software already ported given
[ 4296, 6428, 6802, 4315, 6458, 54, 4352, 422, 3663, 7587, 445, 1152, 4755, 6172, 7975, 3368, 1190, 2658, 831, 3719, 5506, 3398, 6221, 5172, 3057, 7687, 7310, 1989, 5887, 1616, 183, 893, 5549, 3092, 562, 5571, 7734, 2040, 7015, 2049, 237,...
Test
341
4
STRIDE_(security):stride security stride model threats developed praerit garg loren kohnfelder microsoft identifying computer security threats provides mnemonic security threats six categories threats stride initially created part process threat modelling stride model threats used help reason find threats system used conjunction model target system constructed parallel includes full breakdown processes data stores data flows trust boundaries today often used security experts help answer question go wrong system 're working threat violation desirable property system repudiation unusual threat viewed security perspective desirable property privacy systems example goldberg record messaging system useful demonstration tension security design analysis must sometimes grapple elevation privilege often called escalation privilege privilege escalation synonymous
[ 2944, 429, 4945, 1691, 5906, 1805 ]
Test
342
4
Techreturns:techreturns techreturns nederland bv dutch company founded aim reduce electronic waste e-waste buying used electronics especially mobile phones consumers companies repair give second life choose donate mobile phone organisations masterpeace artis zoo company revenues comes selling second hand devices mainly asia africa market affordable quality electronics sales also take place europe especially netherlands sister company beatsnew techreturns connected closing loop foundation collecting e-waste developing countries recycling involved project also organisations fairphone text change recently techreturns appeared multiple times dutch media instance discussion sustainability initiatives dutch government annual summary dutch sustainable businesses 2013 mvo netherlands consumer television programme kassa 14-01-14 segment reuse versus recycling electronic industry techreturns founded 2009 based amsterdam netherlands part social enterprise nederland additionally techreturns department genova italy
[]
Test
343
3
Deepin:deepin deepin stylized deepin formerly known linux deepin hiweed linux open source operating system based debian stable branch features dde deepin desktop environment built qt version 15.10 also uses dde-kwin copy kde plasma window manager distribution praised aesthetics various reviews past also criticized using statistical tracking service app store removed since development deepin led china-based wuhan deepin technology co. ltd. generates revenue sale technical support services related distribution ships many open-source proprietary programs google chrome spotify steam also includes software suite applications developed deepin technology well wps office codeweavers crossover deepin comes installer named “ deepin installer ” created deepin technology installer praised swapnil bhartiya writing linux.com simplest installation procedure also quite pleasant writing forbes jason evangelho complained installer requiring user select location world map though concluded saying aside little time zone selection pet peeve installer beautiful brisk intuitive deepin features desktop environment called deepin de dde written qt distribution also maintains window manager dde-kwin desktop environment described single beautiful desktop market jack wallen writing techrepublic besides deepin linux distributions arch linux started include deepin desktop environment package repositories manjaro linux community-supported version comes deepin desktop environment desktop environment also available software repositories fedora 30 deepin comes number applications built via dtk deepin tool kit based c++ qt following list deepin applications created deepin development team release cycle followed various schedules currently aims four releases per year releases delayed work development testing completed distribution begun 2004 hiweed linux 2011 development team behind deepin established company named wuhan deepin technology support commercial development operating system company received business investments year founded wuhan deepin technology joined linux foundation 2015 general reception distribution generally praised aesthetics users reviewers alike linux.com fossbytes techrepublic deepin accused 2018 containing spyware use statistics software within app store company made official statement clarifying would collect private user information according deepin cnzz website similar google analytics collects user-anonymous usage information screen size browser harmless browser user agent information stating cnzz analyzed deepin store used order improve july 20 2018 deepin removed cnzz statistics collection deepin app store website due backlash deepin reputation past relatively high cpu memory demands based mainly gtk html technologies even system idle switching qt-based de performance improved linux.com noted review deepin 15.7
[ 2179, 2187, 2909, 5724, 6086, 7894, 2935, 6453, 2585, 2228, 1487, 58, 3996, 7587, 4008, 1893, 6865, 7954, 1909, 6884, 7969, 6175, 7251, 4400, 7253, 3696, 474, 1179, 7635, 6902, 2297, 1941, 3023, 6549, 1960, 6209, 2680, 4435, 5163, 8019, ...
Test
344
2
Edinburgh_Multiple_Access_System:edinburgh multiple access system edinburgh multi-access system emas mainframe computer operating system developed university edinburgh 1970s emas powerful efficient general purpose multi-user system coped many computing needs university edinburgh university kent site outside edinburgh adopt operating system originally running icl system 4/75 mainframe based design ibm 360 later reimplemented icl 2900 series mainframes emas 2900 emas-2 ran service mid-1980s near end life refactored version back-ported emas-3 amdahl 470 mainframe clone thence ibm system/370-xa architecture latter help university kent although never actually ran emas-3 national advanced system nas vl80 ibm mainframe clone followed later final emas system edinburgh vl80 decommissioned july 1992 university kent system went live december 1979 ran least powerful machine icl 2900 range icl 2960 2mb memory executing 290k instructions per second despite reliably supported around 30 users number increased 1983 addition additional 2mb memory second order code processor ocp normally known cpu running symmetric multiprocessing system decommissioned august 1986 emas written entirely edinburgh imp programming language small number critical functions using embedded assembler within imp sources several features advanced time including dynamic linking multi-level storage efficient scheduler separate user-space kernel 'director user-level shell 'basic command interpreter comprehensive archiving system memory-mapped file architecture features led emas supporters claim system superior unix first 20 years latter existence edinburgh computer history project attempting salvage lessons learned emas project complete source code emas online public browsing
[ 5571, 5116, 1682 ]
Test
345
8
WS-CAF:ws-caf web services composite application framework ws-caf open framework developed oasis purpose define generic open framework applications contain multiple services used together sometimes referred composite applications ws-caf characteristics include interoperability ease implementation ease use scope ws-caf includes ws-caf accepts following web services specifications input benefits results caf intended standard interoperable ways
[ 4043, 5500, 5631, 6250, 4192, 3498, 2530, 7315 ]
Test
346
4
Partclone:partclone partclone partition clone restore tool provides utilities back restore partitions designed higher compatibility file system library developed nchc free software labs taiwan default backup application clonezilla fog version 1.00 redo backup recovery simply front end partclone supports many file systems good performance skips portions file system marked free space partclone currently supports following filesystems ext2 ext3 ext4 hfs+ reiserfs reiser4 btrfs vmfs v3 v5 xfs jfs ufs ntfs fat 12/16/32 exfat run partclone particular filesystem one uses command 'partclone. fstype similar manner mkfs command partclone partition image tool attempts backup used data blocks written c focuses cloning filesystems opposed cloning disks basic features
[ 2936, 6117, 3915, 578, 5571, 5789, 174, 3501, 2710, 1435, 4941 ]
Validation
347
0
Kevin_Lenzo:kevin lenzo kevin lenzo born 1967 american computer scientist wrote initial infobot founded perl foundation chairman 2007 yet another perl conferences yapc released cmu sphinx open source founded cepstral llc major contributor festival speech synthesis system festvox flite voice basis number synthetic voices including freetts flite cmu_us_kal_diphone festival voice also contributed perl modules cpan
[ 1598, 5983 ]
Test
348
5
Netscape_(web_browser):netscape web browser netscape web browser general name series web browsers formerly produced netscape communications corporation former subsidiary aol original browser dominant browser terms usage share result first browser war lost virtually share internet explorer netscape discontinued support netscape browsers client products terminated march 1 2008 netscape navigator name netscape web browser versions 1.0 4.8 first beta release versions browser released 1994 known mosaic mosaic netscape legal challenge national center supercomputing applications makers ncsa mosaic many netscape founders spent time developing led name change netscape navigator company name also changed mosaic communications corporation netscape communications corporation browser easily advanced available therefore instant success becoming market leader still beta netscape feature-count market share continued grow rapidly version 1.0 released version 2.0 added full mail reader called netscape mail thus transforming netscape mere web browser internet suite period browser suite known netscape navigator around time aol started bundling software microsoft internet explorer version 3.0 netscape first beta codenamed atlas first face serious competition form microsoft internet explorer 3.0 netscape easily held microsoft challenge remained number one browser time version 3.0 also available gold version featured wysiwyg html editor later added netscape communicator standard feature sold retail software profit netscape 3.0 introduced many new features new plug-ins background colors tables archive attribute applet element netscape navigator 3 huge success undisputed web browser giant time 90 share later eroded free internet explorer included windows 95 highest version line 3.04 netscape 4 addressed problem netscape navigator used name suite browser contained within renaming suite netscape communicator releasing five preview releases 1996–1997 netscape corp. released final version netscape communicator june 1997 new version less based netscape navigator 3 code updated added new features support certain css1 elements minimal dynamic font support proprietary object element new suite successful despite increasing competition internet explorer 4.0 problems outdated browser core communicator suite made netscape navigator netscape mail newsgroups netscape address book netscape composer html editor later became mozilla composer eventually split completely separate product nvu october 1998 version 4.5 netscape communicator released new version featured various functionality improvements especially mail/news component update browser core functionality basically identical version 4.08 one month later netscape communications corporation bought aol standalone version netscape navigator still available discontinued version 4.08 windows standalone versions operating systems unix/linux maintained version 4.8 january 1998 netscape communications corporation announced future versions software would free charge developed open source community mozilla netscape communicator 5.0 announced codenamed gromit significant delays release netscape next major version communicator therefore aged badly many years still used result advanced support html 4 css dom ecmascript internet explorer starting version 4 up-to-date internet explorer 5.0 became market leader november 1998 work netscape 5.0 cancelled favor developing completely new program scratch netscape 5.0 codenamed gromit continuation 4.x code two pre-alpha versions written one based original communicator code layout engine stability performance enhancements 4.0 codebase codenamed mariner another using gecko layout engine though netscape originally intended deploy mariner later replace gecko developed scratch netscape 5 mariner scrapped completely however versions continued numbered released netscape formed mozilla foundation developed mozilla application suite using gecko open-source mozilla browser turn used basis netscape 6 1998 informal group called mozilla organization formed largely funded netscape vast majority programmers working code paid netscape coordinate development netscape 5 codenamed gromit would based communicator source code aging communicator code proved difficult work decision made late october drop code branch communicator 4.5 core rendering engine start scratch using standards-compliant gecko rendering engine gecko featured mozilla web browser additions netscape 6 based decision meant netscape next major version severely delayed meantime netscape taken aol acting pressure web standards project forced new division release netscape 6.0 2000 public beta versions released april august october netscape 6.0 released november 2000 suite consisted netscape navigator communicator components addition built-in aol instant messenger client branded netscape instant messenger however clear netscape 6 yet ready release flopped badly based mozilla 0.6 ready used general public yet due many serious bugs would cause crash often render web pages slowly later versions netscape 6 much improved 6.2.x regarded especially good release browser still struggled make impact disappointed community netscape 7.0 codenamed mach five based mozilla 1.0.1 released august 2002 direct continuation netscape 6 similar components picked users still much minority browser one problems mozilla worthy adversary addition aol decided deactivate mozilla popup-blocker functionality netscape 7.0 created outrage community response complaints aol integrated pop-up blocker netscape 7.01 addition netscape introduced new aol-free-version without usual aol addons browser suite netscape 7.1 codenamed buffy based mozilla 1.4 released june 2003 2003 aol closed netscape division laid-off reassigned netscape employees mozilla.org continued independent mozilla foundation taking many netscape ex-employees aol continued develop netscape in-house due staff committed improvements minimal one year later august 2004 last version based mozilla released netscape 7.2 based mozilla 1.7.2 2005 2007 netscape releases became known netscape browser aol chose base netscape browser relatively successful mozilla firefox re-written version mozilla produced mozilla foundation release full internet suite solely web browser controversial decisions include versions made microsoft windows featuring gecko rendering engine previous releases trident engine used internet explorer aol acquisition netscape years earlier made less surprise company laid netscape team outsourced development mercurial communications netscape browser 8.1.3 released april 2 2007 included general bug fixes identified versions 8.0–8.1.2 netscape confirmed 23 january 2007 netscape browser versions 8.0-8.1.2 succeeded new stand-alone browser release netscape navigator 9 features said include newsfeed support become integrated propeller internet portal alongside enhanced methods discussion submission voting web pages also sees browser return multi-platform support across windows linux mac os x like netscape version 8.x new release based upon popular mozilla firefox version 2.0 full support firefox add-ons plugins netscape provided also first time since 2004 browser produced in-house programming staff beta program first released 5 june 2007 final version released october 15 2007 december 28 2007 netscape developers announced aol would discontinue web browser february 1 2008 due low market share january 28 2008 netscape revised date march 1 2008 offered support migration flock mozilla firefox
[ 4655, 6802, 5378, 2205, 7537, 6809, 393, 3291, 2574, 1105, 2577, 6452, 4352, 1496, 4725, 2958, 1136, 6858, 2261, 84, 445, 1152, 1525, 4755, 4759, 6172, 7628, 5821, 5127, 6540, 3383, 8006, 8009, 6217, 3043, 1970, 6221, 520, 3057, 3060, 3...
Test
349
2
Mobilinux:mobilinux mobilinux linux kernel operating system targeted smartphones announced montavista software april 25 2005 mobilinux based open source open standard technology designed scalability maximized battery power usage single-chip mobile phones 35 million phones mobile devices run mobilinux far commercial linux mobilinux powered version 2.6 linux kernel offers less one second boot times event broker also includes alsa sound driver support embedded systems standard linux 2.6.21+ kernels exists montavista devrocket software based eclipse easy development environment platform
[ 2187, 2564, 5391, 740, 5062, 5068, 2240, 424, 7587, 1893, 5794, 6158, 7954, 7956, 1522, 7251, 4400, 474, 2300, 5486, 1941, 6209, 3039, 1582, 5872, 4824, 5523, 5530, 3751, 6244, 5200, 3081, 1629, 3444, 3097, 5579, 5232, 2758, 5236, 1663, ...
Test
350
3
Amaurote:amaurote amaurote british video game 8-bit computer systems released 1987 mastertronic mastertronic added dimension label music game written david whittaker game instructions player controls arachnus 4 armoured fighting-machine moves four legs player must first select sector play via map screen control arachnus wanders isometric top-down commodore 64 version view cityscape attacking marauding insects searching insect queen using scanner arachnus attacks launching bouncing bombs launch one time bomb misses intended target player wait hits scenery bounces fence play area fire queen located player radio-in supa-bomb used destroy queen player also radio-in supplies additional bombs even ask pulled combat zone extra weaponry costs player dosh in-game currency game favourably reviewed crash magazine said graphically impressive well designed fun play given 92 overall rating zzap 64 less impressed commodore 64 version criticised dull gameplay programming bugs rated 39 overall origin city name amaurote derives utopia sir thomas 1478–1535 second book cities namely amaurote following description given cities knoweth one knoweth like one another farforth nature place permitteth describe therefore one skilleth greatly rather amaurote worthiest dignity
[]
Test
351
3
Hyper_Sports:hyper sports hyper sports known japan arcade game published 1984 konami sequel 1983 track field features seven new olympic events like predecessor hyper sports two run buttons one action button per player japanese release game sported official license 1984 summer olympics gameplay much track field player competes event tries score points based performance criteria also beating computer entrants event also player tries exceed qualification time distance score advance next event hyper sports events passed successfully player advances next round events faster harder qualify events changed include new sports commodore 64 version reviewed zzap 64 said first rate conversion praised graphics sound presentation game rated 90 overall zx spectrum version voted number 59 sinclair top 100 games time game went become biggest selling spectrum game month gallup charts spectrum version also voted number 59 sinclair official top 100 games time two events game skeet shooting vault featured bbc television programme first class june 2018 konami unveiled reimagining game hyper sports r nintendo switch
[ 7469 ]
Validation
352
3
X86:x86 x86 family instruction set architectures based intel 8086 microprocessor 8088 variant 8086 introduced 1978 fully 16-bit extension intel 8-bit 8080 microprocessor memory segmentation solution addressing memory covered plain 16-bit address term x86 came names several successors intel 8086 processor end 86 including 80186 80286 80386 80486 processors many additions extensions added x86 instruction set years almost consistently full backward compatibility architecture implemented processors intel cyrix amd via many companies also open implementations zet soc platform nevertheless intel amd via hold x86 architectural licenses producing modern 64-bit designs term synonymous ibm pc compatibility implies multitude computer hardware embedded systems well general-purpose computers used x86 chips pc-compatible market started ibm pc 1981 2018 majority personal computers laptops sold based x86 architecture categories—especially high-volume mobile categories smartphones tablets—are dominated arm high end x86 continues dominate compute-intensive workstation cloud computing segments 1980s early 1990s 8088 80286 still common use term x86 usually represented 8086 compatible cpu today however x86 usually implies binary compatibility also 32-bit instruction set 80386 due fact instruction set become something lowest common denominator many modern operating systems probably also term became common introduction 80386 1985 years introduction 8086 8088 intel added complexity naming scheme terminology iapx ambitious ill-fated intel iapx 432 processor tried successful 8086 family chips applied kind system-level prefix 8086 system including coprocessors 8087 8089 well simpler intel-specific system chips thereby described iapx 86 system also terms irmx operating systems isbc single-board computers isbx multimodule boards based 8086-architecture together heading microsystem 80 however naming scheme quite temporary lasting years early 1980s although 8086 primarily developed embedded systems small multi-user single-user computers largely response successful 8080-compatible zilog z80 x86 line soon grew features processing power today x86 ubiquitous stationary portable personal computers also used midrange computers workstations servers new supercomputer clusters top500 list large amount software including large list using x86-based hardware modern x86 relatively uncommon embedded systems however small low power applications using tiny batteries well low-cost microprocessor markets home appliances toys lack significant x86 presence simple 8-bit 16-bit based architectures common although x86-compatible via c7 via nano amd geode athlon neo intel atom examples 32- 64-bit designs used relatively low power low cost segments several attempts including intel end market dominance inelegant x86 architecture designed directly first simple 8-bit microprocessors examples iapx 432 project originally named intel 8800 intel 960 intel 860 intel/hewlett-packard itanium architecture however continuous refinement x86 microarchitectures circuitry semiconductor manufacturing would make hard replace x86 many segments amd 64-bit extension x86 intel eventually responded compatible design scalability x86 chips eight-core intel xeon 12-core amd opteron underlining x86 example continuous refinement established industry standards resist competition completely new architectures table lists processor models model series implementing variations x86 instruction set chronological order line item characterized significantly improved commercially successful processor microarchitecture designs various times companies ibm nec amd ti stm fujitsu oki siemens cyrix intersil c nexgen umc dm p started design manufacture x86 processors cpus intended personal computers well embedded systems x86 implementations seldom simple copies often employ different internal microarchitectures well different solutions electronic physical levels quite naturally early compatible microprocessors 16-bit 32-bit designs developed much later personal computer market real quantities started appear around 1990 i386 i486 compatible processors often named similarly intel original chips companies designed manufactured x86 x87 processors include itt corporation national semiconductor ulsi system technology weitek following fully pipelined i486 intel introduced pentium brand name unlike numbers could trademarked new set superscalar x86 designs x86 naming scheme legally cleared x86 vendors choose different names x86-compatible products initially chose continue variations numbering scheme ibm partnered cyrix produce 5x86 efficient 6x86 m1 6x86mx mii lines cyrix designs first x86 microprocessors implementing register renaming enable speculative execution amd meanwhile designed manufactured advanced delayed 5k86 k5 internally closely based amd earlier 29k risc design similar nexgen nx586 used strategy dedicated pipeline stages decode x86 instructions uniform easily handled micro-operations method remained basis x86 designs day early versions microprocessors heat dissipation problems 6x86 also affected minor compatibility problems nx586 lacked floating point unit fpu crucial pin-compatibility k5 somewhat disappointing performance eventually introduced customer ignorance alternatives pentium series contributed designs comparatively unsuccessful despite fact k5 good pentium compatibility 6x86 significantly faster pentium integer code amd later managed establish serious contender k6 set processors gave way successful athlon opteron also contenders centaur technology formerly idt rise technology transmeta via technologies energy efficient c3 c7 processors designed centaur company sold many years centaur newest design via nano first processor superscalar speculative execution introduced time intel first in-order processor since p5 pentium intel atom instruction set architecture twice extended larger word size 1985 intel released 32-bit 80386 later known i386 gradually replaced earlier 16-bit chips computers although typically embedded systems following years extended programming model originally referred i386 architecture like first implementation intel later dubbed ia-32 introducing unrelated ia-64 architecture 1999-2003 amd extended 32-bit architecture 64 bits referred x86-64 early documents later amd64 intel soon adopted amd architectural extensions name ia-32e later using name em64t finally using intel 64 microsoft sun microsystems/oracle also use term x64 many linux distributions bsds also use amd64 term microsoft windows example designates 32-bit versions x86 64-bit versions x64 installation files 64-bit windows versions required placed directory called amd64 x86 architecture variable instruction length primarily cisc design emphasis backward compatibility instruction set typical cisc however basically extended version simple eight-bit 8008 8080 architectures byte-addressing enabled words stored memory little-endian byte order memory access unaligned addresses allowed valid word sizes largest native size integer arithmetic memory addresses offsets 16 32 64 bits depending architecture generation newer processors include direct support smaller integers well multiple scalar values handled simultaneously via simd unit present later generations described immediate addressing offsets immediate data may expressed 8-bit quantities frequently occurring cases contexts -128..127 range enough typical instructions therefore 2 3 bytes length although much longer single-byte conserve encoding space registers expressed opcodes using three four bits latter via opcode prefix 64-bit mode one operand instruction memory location however memory operand may also destination combined source destination operand source either register immediate among factors contributes code size rivals eight-bit machines enables efficient use instruction cache memory relatively small number general registers also inherited 8-bit ancestors made register-relative addressing using small immediate offsets important method accessing operands especially stack much work therefore invested making accesses fast register accesses i.e one cycle instruction throughput circumstances accessed data available top-level cache dedicated floating point processor 80-bit internal registers 8087 developed original 8086 microprocessor subsequently developed extended 80387 later processors incorporated backward compatible version functionality microprocessor main processor addition modern x86 designs also contain simd-unit see sse instructions work parallel one two 128-bit words containing two four floating point numbers 64 32 bits wide respectively alternatively 2 4 8 16 integers 64 32 16 8 bits wide respectively presence wide simd registers means existing x86 processors load store 128 bits memory data single instruction also perform bitwise operations although integer arithmetic full 128-bits quantities parallel intel sandy bridge processors added avx advanced vector extensions instructions widening simd registers 256 bits knights corner architecture used intel xeon phi co-processors uses 512-bit wide simd registers execution current x86 processors employ extra decoding steps split instructions smaller pieces called micro-operations handed control unit buffers schedules compliance x86-semantics executed partly parallel one several less specialized execution units modern x86 designs thus pipelined superscalar also capable order speculative execution via branch prediction register renaming memory dependence prediction means may execute multiple partial complete x86 instructions simultaneously necessarily order given instruction stream intel amd starting amd zen cpus also capable simultaneous multithreading two threads per core xeon phi four threads per core case intel transactional memory tsx introduced mid-1990s method sometimes referred risc core risc translation partly marketing reasons also micro-operations share properties certain types risc instructions however traditional microcode used since 1950s also inherently shares many properties new method differs mainly translation micro-operations occurs asynchronously synchronize execution units decode steps opens possibilities analysis buffered code stream therefore permits detection operations performed parallel simultaneously feeding one execution unit latest processors also opposite appropriate combine certain x86 sequences compare followed conditional jump complex micro-op fits execution model better thus executed faster less machine resources involved another way try improve performance cache decoded micro-operations processor directly access decoded micro-operations special cache instead decoding intel followed approach execution trace cache feature netburst microarchitecture pentium 4 processors later decoded stream buffer core-branded processors since sandy bridge transmeta used completely different method x86 compatible cpus used just-in-time translation convert x86 instructions cpu native vliw instruction set transmeta argued approach allows power efficient designs since cpu forgo complicated decode step traditional x86 implementations minicomputers late 1970s running 16-bit 64-kb address limit memory become cheaper minicomputers like pdp-11 used complex bank-switching schemes case digital vax redesigned much expensive processors could directly handle 32-bit addressing data original 8086 developed simple 8080 microprocessor primarily aiming small inexpensive computers specialized devices instead adopted simple segment registers increased memory address width 4 bits multiplying 64-kb address 16 20-bit address could address total one megabyte 1,048,576 bytes quite large amount small computer time concept segment registers new many mainframes used segment registers swap quickly different tasks practice x86 much-criticized implementation greatly complicated many common programming tasks compilers however architecture soon allowed linear 32-bit addressing starting 80386 late 1985 major actors microsoft took several years convert 16-bit based systems 80386 80486 therefore largely used fast still 16-bit based 8086 many years data code could managed within near 16-bit segments within 64 kb portions total 1 mb address space compiler could operate far mode using 32-bit codice_1 pairs reaching 1 mb would also prove quite limiting mid-1980s working emerging pc market made simple translate software older 8008 8080 8085 z80 newer processor 1985 16-bit segment addressing model effectively factored introduction 32-bit offset registers 386 design real mode segmentation achieved shifting segment address left 4 bits adding offset order receive final 20-bit address example ds a000h si 5677h ds si point absolute address ds × 10h si a5677h thus total address space real mode 2 bytes 1 mb quite impressive figure 1978 memory addresses consist segment offset every type access code data stack default segment register associated data register usually ds code cs stack ss data accesses segment register explicitly specified using segment override prefix use four segment registers scheme two different segment/offset pairs point single absolute location thus ds a111h si 4567h ds si point a5677h scheme makes impossible use four segments cs ss vital correct functioning program ds es used point data segments outside program precisely outside currently executing segment program stack protected mode introduced 80286 segment register longer contains physical address beginning segment contain selector points system-level structure called segment descriptor segment descriptor contains physical address beginning segment length segment access permissions segment offset checked length segment offsets referring locations outside segment causing exception offsets referring locations inside segment combined physical address beginning segment get physical address corresponding offset segmented nature make programming compiler design difficult use near far pointers affects performance addressing modes 16-bit x86 processors summarized formula addressing modes 32-bit x86 processors 32-bit code 64-bit x86 processors summarized formula addressing modes 64-bit code 64-bit x86 processors summarized formula instruction relative addressing 64-bit code rip displacement rip instruction pointer register simplifies implementation position-independent code used shared libraries operating systems 8086 eight-bit alternatively i/o space one segment stack memory supported computer hardware words two bytes pushed stack stack grows toward numerically lower addresses pointing recently pushed item 256 interrupts invoked hardware software interrupts cascade using stack store return address original intel 8086 8088 fourteen 16-bit registers four ax bx cx dx general-purpose registers gprs although may additional purpose example cx used counter loop instruction accessed two separate bytes thus bx high byte accessed bh low byte bl two pointer registers special roles sp stack pointer points top stack bp base pointer often used point place stack typically local variables see frame pointer registers si di bx bp address registers may also used array indexing four segment registers cs ds ss es used form memory address flags register contains flags carry flag overflow flag zero flag finally instruction pointer ip points next instruction fetched memory executed register directly accessed read written program intel 80186 80188 essentially upgraded 8086 8088 cpu respectively on-chip peripherals added cpu registers 8086 8088 addition interface registers peripherals 8086 8088 80186 80188 use optional floating-point coprocessor 8087 8087 appears programmer part cpu adds eight 80-bit wide registers st 0 st 7 hold numeric data one seven formats 32- 64- 80-bit floating point 16- 32- 64-bit binary integer 80-bit packed decimal integer intel 80286 support protected mode three special registers hold descriptor table addresses gdtr ldtr idtr fourth task register tr used task switching 80287 floating-point coprocessor 80286 registers 8087 data formats advent 32-bit 80386 processor 16-bit general-purpose registers base registers index registers instruction pointer flags register segment registers expanded 32 bits nomenclature represented prefixing e extended register names x86 assembly language thus ax register corresponds lowest 16 bits new 32-bit eax register si corresponds lowest 16 bits esi general-purpose registers base registers index registers used base addressing modes registers except stack pointer used index addressing modes two new segment registers fs gs added greater number registers instructions operands machine code format expanded provide backward compatibility segments executable code marked containing either 16-bit 32-bit instructions special prefixes allow inclusion 32-bit instructions 16-bit segment vice versa 80386 optional floating-point coprocessor 80387 eight 80-bit wide registers st 0 st 7 like 8087 80287 80386 could also use 80287 coprocessor 80486 subsequent x86 models floating-point processing unit fpu integrated on-chip pentium mmx added eight 64-bit mmx integer registers mmx0 mmx7 share lower bits 80-bit-wide fpu stack pentium iii intel added 32-bit streaming simd extensions sse control/status register mxcsr eight 128-bit sse floating point registers xmm0 xmm7 starting amd opteron processor x86 architecture extended 32-bit registers 64-bit registers way similar 16 32-bit extension took place r-prefix identifies 64-bit registers rax rbx rcx rdx rsi rdi rbp rsp rflags rip eight additional 64-bit general registers r8-r15 also introduced creation x86-64 however extensions usable 64-bit mode one two modes available long mode addressing modes dramatically changed 32-bit mode except addressing extended 64 bits virtual addresses sign extended 64 bits order disallow mode bits virtual addresses selector details dramatically reduced addition addressing mode added allow memory references relative rip instruction pointer ease implementation position-independent code used shared libraries operating systems simd registers xmm0–xmm15 simd registers ymm0–ymm15 simd registers zmm0–zmm31 x86 processors protected mode i.e 80286 later processors also three descriptor registers gdtr ldtr idtr task register tr 32-bit x86 processors starting 80386 also include various special/miscellaneous registers control registers cr0 4 cr8 64-bit debug registers dr0 3 plus 6 7 test registers tr3 7 80486 model-specific registers msrs appearing pentium although main registers exception instruction pointer general-purpose 32-bit 64-bit versions instruction set used anything originally envisioned used following purposes segment registers particular purposes envisioned 8 registers available 64-bit mode instructions compile execute efficiently using registers designed purpose example using al accumulator adding immediate byte value produces efficient add al opcode 04h whilst using bl register produces generic longer add register opcode 80c3h another example double precision division multiplication works specifically ax dx registers modern compilers benefited introduction sib byte scale-index-base byte allows registers treated uniformly minicomputer-like however using sib byte universally non-optimal produces longer encodings using selectively necessary main benefit sib byte orthogonality powerful addressing modes provides make possible save instructions use registers address calculations scaling index special instructions lost priority hardware design became slower equivalent small code sequences notable example lodsw instruction note pl registers available 64-bit mode note il registers available 64-bit mode real address mode commonly called real mode operating mode 8086 later x86-compatible cpus real mode characterized 20-bit segmented memory address space meaning 1 mib memory addressed—actually slightly direct software access peripheral hardware concept memory protection multitasking hardware level x86 cpus 80286 series later start real mode power-on 80186 cpus earlier one operational mode equivalent real mode later chips ibm pc platform direct software access ibm bios routines available real mode since bios written real mode however characteristic x86 cpu ibm bios design order use 64 kb memory segment registers must used created great complications compiler implementors introduced odd pointer modes near far huge leverage implicit nature segmented architecture different degrees pointers containing 16-bit offsets within implied segments pointers containing segment addresses offsets within segments technically possible use 256 kb memory code data 64 kb code setting four segment registers using 16-bit offsets optionally default-segment override prefixes address memory puts substantial restrictions way data addressed memory operands combined violates architectural intent intel designers separate data items e.g arrays structures code units contained separate segments addressed segment addresses new programs ported earlier 8-bit processors 16-bit address spaces addition real mode intel 80286 supports protected mode expanding addressable physical memory 16 mb addressable virtual memory 1 gb providing protected memory prevents programs corrupting one another done using segment registers storing index descriptor table stored memory two tables global descriptor table gdt local descriptor table ldt holding 8192 segment descriptors segment giving access 64 kb memory 80286 segment descriptor provides 24-bit base address base address added 16-bit offset create absolute address base address table fulfills role literal value segment register fulfills real mode segment registers converted direct registers indirect registers segment assigned one four ring levels used hardware-based computer security segment descriptor also contains segment limit field specifies maximum offset may used segment offsets 16 bits segments still limited 64 kb 80286 protected mode time segment register loaded protected mode 80286 must read 6-byte segment descriptor memory set hidden internal registers therefore loading segment registers much slower protected mode real mode changing segments frequently avoided actual memory operations using protected mode segments slowed much 80286 later hardware check offset segment limit parallel instruction execution intel 80386 extended offsets also segment limit field segment descriptor 32 bits enabling segment span entire memory space also introduced support protected mode paging mechanism making possible use paged virtual memory 4 kb page size paging allows cpu map page virtual memory space page physical memory space uses additional mapping tables memory called page tables protected mode 80386 operate paging either enabled disabled segmentation mechanism always active generates virtual addresses mapped paging mechanism enabled segmentation mechanism also effectively disabled setting segments base address 0 size limit equal whole address space also requires minimally-sized segment descriptor table four descriptors since fs gs segments need used paging used extensively modern multitasking operating systems linux 386bsd windows nt developed 386 first intel architecture cpu support paging 32-bit segment offsets 386 architecture became basis development x86 series x86 processors support protected mode boot real mode backward compatibility older 8086 class processors upon power-on a.k.a booting processor initializes real mode begins executing instructions operating system boot code might stored rom may place processor protected mode enable paging features instruction set protected mode similar used real mode however certain constraints apply real mode able use ax cx dx addressing apply protected mode conversely segment arithmetic common practice real mode code allowed protected mode also sub-mode operation 32-bit protected mode a.k.a 80386 protected mode called virtual 8086 mode also known v86 mode basically special hybrid operating mode allows real mode programs operating systems run control protected mode supervisor operating system allows great deal flexibility running protected mode programs real mode programs simultaneously mode exclusively available 32-bit version protected mode exist 16-bit version protected mode long mode mid 1990s obvious 32-bit address space x86 architecture limiting performance applications requiring large data sets 32-bit address space would allow processor directly address 4 gb data size surpassed applications video processing database engines using 64-bit addresses possible directly address 16 eib data although 64-bit architectures support access full 64-bit address space example amd64 supports 48 bits 64-bit address split four paging levels 1999 amd published nearly complete specification 64-bit extension x86 architecture called x86-64 claimed intentions produce design currently used almost x86 processors exceptions intended embedded systems mass-produced x86-64 chips general market available four years later 2003 time spent working prototypes tested refined time initial name x86-64 changed amd64 success amd64 line processors coupled lukewarm reception ia-64 architecture forced intel release implementation amd64 instruction set intel previously implemented support amd64 opted enable hopes amd would bring amd64 market itanium new ia-64 instruction set widely adopted branded implementation amd64 em64t later re-branded intel 64 literature product version names microsoft sun refer amd64/intel 64 collectively x64 windows solaris operating systems linux distributions refer either x86-64 variant x86_64 amd64 bsd systems use amd64 macos uses x86_64 long mode mostly extension 32-bit instruction set unlike 16–to–32-bit transition many instructions dropped 64-bit mode affect actual binary backward compatibility would execute legacy code modes retain support instructions changes way assembler compilers new code work first time major extension x86 architecture initiated originated manufacturer intel also first time intel accepted technology nature outside source early x86 processors could extended floating-point hardware form series floating point numerical co-processors names like 8087 80287 80387 abbreviated x87 also known npx numeric processor extension apt name since coprocessors used mainly floating-point calculations also performed integer operations binary decimal formats exceptions 80486 subsequent x86 processors integrated x87 functionality chip made x87 instructions de facto integral part x86 instruction set x87 register known st 0 st 7 80 bits wide stores numbers ieee floating-point standard double extended precision format registers organized stack st 0 top done order conserve opcode space registers therefore randomly accessible either operand register-to-register instruction st0 must always one two operands either source destination regardless whether operand st x memory operand however random access stack registers obtained instruction exchanges specified st x st 0 operations include arithmetic transcendental functions including trigonometric exponential functions well instructions load common constants 0 1 e base natural logarithm log2 10 log10 2 one stack registers integer capability often overlooked x87 operate larger integers single instruction 8086 80286 80386 x86 cpu without 64-bit extensions repeated integer calculations even small values e.g 16-bit accelerated executing integer instructions x86 cpu x87 parallel x86 cpu keeps running x87 coprocessor calculates x87 sets signal x86 finished interrupts x86 needs attention error mmx simd instruction set designed intel introduced 1997 pentium mmx microprocessor mmx instruction set developed similar concept first used intel i860 supported subsequent ia-32 processors intel vendors mmx typically used video processing multimedia applications instance mmx added 8 new registers architecture known mm0 mm7 henceforth referred mmn reality new registers aliases existing x87 fpu stack registers hence anything done floating point stack would also affect mmx registers unlike fp stack mmn registers fixed relative therefore randomly accessible instruction set adopt stack-like semantics existing operating systems could still correctly save restore register state multitasking without modifications mmn registers 64-bit integers however one main concepts mmx instruction set concept packed data types means instead using whole register single 64-bit integer quadword one may use contain two 32-bit integers doubleword four 16-bit integers word eight 8-bit integers byte given mmx 64-bit mmn registers aliased fpu stack floating point registers 80 bits wide upper 16 bits floating point registers unused mmx bits set ones mmx instruction correspond floating point representation nans infinities 1997 amd introduced 3dnow introduction technology coincided rise 3d entertainment applications designed improve cpu vector processing performance graphic-intensive applications 3d video game developers 3d graphics hardware vendors use 3dnow enhance performance amd k6 athlon series processors 3dnow designed natural evolution mmx integers floating point uses exactly register naming convention mmx mm0 mm7 difference instead packing integers registers two single precision floating point numbers packed register advantage aliasing fpu registers instruction data structures used save state fpu registers also used save 3dnow register states thus special modifications required made operating systems would otherwise know 1999 intel introduced streaming simd extensions sse instruction set following 2000 sse2 first addition allowed offloading basic floating-point operations x87 stack second made mmx almost obsolete allowed instructions realistically targeted conventional compilers introduced 2004 along prescott revision pentium 4 processor sse3 added specific memory thread-handling instructions boost performance intel hyperthreading technology amd licensed sse3 instruction set implemented sse3 instructions revision e later athlon 64 processors athlon 64 support hyperthreading lacks sse3 instructions used hyperthreading sse discarded legacy connections fpu stack also meant instruction set discarded legacy connections previous generations simd instruction sets like mmx freed designers allowing use larger registers limited size fpu registers designers created eight 128-bit registers named xmm0 xmm7 note amd64 number sse xmm registers increased 8 16 however downside operating systems awareness new set instructions order able save register states intel created slightly modified version protected mode called enhanced mode enables usage sse instructions whereas stay disabled regular protected mode os aware sse activate enhanced mode whereas unaware os enter traditional protected mode sse simd instruction set works floating point values like 3dnow however unlike 3dnow severs legacy connection fpu stack larger registers 3dnow sse pack twice number single precision floats registers original sse limited single-precision numbers like 3dnow sse2 introduced capability pack double precision numbers 3dnow possibility since double precision number 64-bit size would full size single 3dnow mmn register 128 bits sse xmmn registers could pack two double precision floats one register thus sse2 much suitable scientific calculations either sse1 3dnow limited single precision sse3 introduce additional registers physical address extension pae first added intel pentium pro later amd athlon processors allow 64 gb ram addressed without pae physical ram 32-bit protected mode usually limited 4 gb pae defines different page table structure wider page table entries third level page table allowing additional bits physical address although initial implementations 32-bit processors theoretically supported 64 gb ram chipset platform limitations often restricted could actually used x64 processors define page table structures theoretically allow 52 bits physical address although chipset platform concerns like number dimm slots available maximum ram possible per dimm prevent large physical address space realized x64 processors pae mode must active switch long mode must remain active long mode active long mode non-pae mode pae mode affect width linear virtual addresses 2000s 32-bit x86 processors limitations memory addressing obstacle utilization high-performance computing clusters powerful desktop workstations aged 32-bit x86 competing much advanced 64-bit risc architectures could address much memory intel whole x86 ecosystem needed 64-bit memory addressing x86 survive 64-bit computing era workstation desktop software applications soon start hitting limitations present 32-bit memory addressing however intel felt right time make bold step use transition 64-bit desktop computers transition away x86 architecture general experiment ultimately failed 2001 intel attempted introduce non-x86 64-bit architecture named ia-64 itanium processor initially aiming high-performance computing market hoping would eventually replace 32-bit x86 ia-64 incompatible x86 itanium processor provide emulation capabilities translating x86 instructions ia-64 affected performance x86 programs badly rarely ever actually useful users programmers rewrite x86 programs ia-64 architecture performance itanium would orders magnitude worse true x86 processor market rejected itanium processor since broke backward compatibility preferred continue using x86 chips programs rewritten ia-64 amd decided take another path toward 64-bit memory addressing making sure backward compatibility would suffer april 2003 amd released first x86 processor 64-bit general-purpose registers opteron capable addressing much 4 gb virtual memory using new x86-64 extension also known amd64 x64 64-bit extensions x86 architecture enabled newly introduced long mode therefore 32-bit 16-bit applications operating systems could simply continue using amd64 processor protected modes without even slightest sacrifice performance full compatibility back original instructions 16-bit intel 8086 market responded positively adopting 64-bit amd processors high-performance applications business home computers seeing market rejecting incompatible itanium processor microsoft supporting amd64 intel respond introduced x86-64 processor prescott pentium 4 july 2004 result itanium processor ia-64 instruction set rarely used x86 x86-64 incarnation still dominant cpu architecture non-embedded computers x86-64 also introduced nx bit offers protection security bugs caused buffer overruns result amd 64-bit contribution x86 lineage subsequent acceptance intel 64-bit risc architectures ceased threat x86 ecosystem almost disappeared workstation market x86-64 began utilized powerful supercomputers amd opteron intel xeon incarnations market previously natural habitat 64-bit risc designs ibm power microprocessors sparc processors great leap toward 64-bit computing maintenance backward compatibility 32-bit 16-bit software enabled x86 architecture become extremely flexible platform today x86 chips utilized small low-power systems example intel quark intel atom fast gaming desktop computers example intel core i7 amd fx/ryzen even dominate large supercomputing clusters effectively leaving arm 32-bit 64-bit risc architecture competitor smartphone tablet market prior 2005 x86 architecture processors unable meet popek goldberg requirements specification virtualization created 1974 gerald j. popek robert p. goldberg however proprietary open-source x86 virtualization hypervisor products developed using software-based virtualization proprietary systems include hyper-v parallels workstation vmware esx vmware workstation vmware workstation player windows virtual pc free open-source systems include qemu kqemu virtualbox xen introduction amd-v intel vt-x instruction sets 2005 allowed x86 processors meet popek goldberg virtualization requirements
[ 2903, 4291, 4293, 4295, 1445, 4300, 1447, 1458, 7172, 5737, 1465, 5745, 2932, 2938, 4336, 1481, 4341, 64, 2961, 1502, 5784, 2977, 5794, 5799, 1522, 2983, 5802, 2989, 2999, 4397, 3002, 3005, 5822, 1556, 126, 3020, 1568, 1570, 5849, 7298, ...
Test
353
4
Kazakhstan_man-in-the-middle_attack:kazakhstan man-in-the-middle attack 2015 government kazakhstan created national security certificate would allowed man-in-the-middle attack https traffic internet users kazakhstan attack would involve requiring internet users install root certificate controlled kazakh government devices allowing intercept decrypt re-encrypt traffic passing systems controlled july 2019 kazakh isps started messaging users certificates would installed users
[ 794, 363, 887, 6795, 1173, 1460, 5824, 8189, 8093, 6540, 5399, 6458, 6553, 2587, 4071, 7567, 7925, 2691, 6049, 4990, 7214, 3588, 1059, 1513, 2620, 359, 3426 ]
Test
354
4
Web_of_trust:web trust cryptography web trust concept used pgp gnupg openpgp-compatible systems establish authenticity binding public key owner decentralized trust model alternative centralized trust model public key infrastructure pki relies exclusively certificate authority hierarchy computer networks many independent webs trust user identity certificate part link multiple webs web trust concept first put forth pgp creator phil zimmermann 1992 manual pgp version 2.0 openpgp-compliant implementations include certificate vetting scheme assist operation termed web trust openpgp identity certificates include one public keys along owner information digitally signed users act endorse association public key person entity listed certificate commonly done key signing parties openpgp-compliant implementations also include vote counting scheme used determine public key – owner association user trust using pgp instance three partially trusted endorsers vouched certificate included public key – owner binding one fully trusted endorser done association owner public key certificate trusted correct parameters user-adjustable e.g. partials perhaps six partials completely bypassed desired scheme flexible unlike public key infrastructure designs leaves trust decisions hands individual users perfect requires caution intelligent supervision users essentially pki designs less flexible require users follow trust endorsement pki generated certificate authority ca -signed certificates two keys pertaining person public key shared openly private key withheld owner owner private key decrypt information encrypted public key web trust user ring group people public keys users encrypt information recipient public key recipient private key decrypt user digitally signs information private key recipient verifies users public key confirm user question ensure information came specific user tampered intended recipient read information know private key contrast typical x.509 pki permits certificate signed single party certificate authority ca ca certificate may signed different ca way 'self-signed root certificate root certificates must available use lower level ca certificate typically distributed widely instance distributed applications browsers email clients way ssl/tls-protected web pages email messages etc authenticated without requiring users manually install root certificates applications commonly include one hundred root certificates dozens pkis thus default bestowing trust throughout hierarchy certificates lead back wot favors decentralization trust anchors avoid single point failure ca hierarchy notable project uses wot pki provide framework authentication areas internet monkeysphere utilities openpgp web trust essentially unaffected things company failures continued function little change however related problem occur users whether individuals organizations lose track private key longer decrypt messages sent produced using matching public key found openpgp certificate early pgp certificates include expiry dates certificates unlimited lives users prepare signed cancellation certificate time matching private key lost compromised one prominent cryptographer still getting messages encrypted using public key long ago lost track private key ca n't much messages except discard notifying sender unreadable requesting resending public key still matching private key later pgp openpgp compliant certificates include expiry dates automatically preclude troubles eventually used sensibly problem also easily avoided use designated revokers introduced early 1990s key owner may designate third party permission revoke key owner key case key owner loses private key thus loses ability revoke public key non-technical social difficulty web trust like one built pgp/openpgp type systems every web trust without central controller e.g. ca depends users trust new certificates i.e. produced process generating new key pair likely readily trusted users systems personally met find enough endorsements new certificate many web trust users certificate vetting set require one fully trusted endorsers otherwise unknown certificate perhaps several partial endorsers using public key certificate prepare messages believe signatures etc despite wide use openpgp compliant systems easy availability on-line multiple key servers possible practice unable readily find someone several people endorse new certificate e.g. comparing physical identification key owner information digitally signing new certificate users remote areas undeveloped ones instance may find users scarce certificate also new endorsements others signature new certificate offer marginal benefit toward becoming trusted still parties systems able securely exchange messages key signing parties relatively popular mechanism resolve problem finding users install one certificate existing webs trust endorsing websites also exist facilitate location openpgp users arrange keysignings gossamer spider web trust also makes key verification easier linking openpgp users via hierarchical style web trust end users benefit coincidental determined trust someone endorsed introducer explicitly trusting gswot top-level key minimally level 2 introducer top-level key endorses level 1 introducers possibility finding chains certificates often justified small world phenomenon given two individuals often possible find short chain people person chain knows preceding following links however chain necessarily useful person encrypting email verifying signature find chain signatures private key correspondent also trust person chain honest competent signing keys judge whether people likely honestly follow guidelines verifying identity people signing keys much stronger constraint another obstacle also various costs timing involve side physically attend key signing party meet someone physically verify id person key email address planning scheduling early-appointment travel lodging food etc software user may need verify hundreds software components hundreds original developers wot based specific-users trust-chain establish trust level software components millions billions software users practically physically travel meet hundreds specific-users wot hundreds original developers authors located different parts world propagation spread rate very-trustworthy physically-verified person id email-address public-key wot slower lesser original developer author file-releaser pgp/gpg key collected public keyserver various ways vulnerabilities mis-guide users deliver incorrect data public keyserver pool keyservers also type third-party 3rd-party middle-man original author developer also publishes shares updated original public-key file-signing pub-key keyserver domain webserver inside premise own-home own-home-office own-office forces hkps encrypted connection usage public-key delivery users get correct trusted unmodified key details see wot assisting solutions section strong set refers largest collection strongly connected pgp keys forms basis global web trust two keys strong set path islands sets keys sign disconnected group exist one member group needs exchange signatures strong set group also become part strong set strong set size 55000 keys beginning year 2015 statistical analysis pgp/gnupg/openpgp web trust mean shortest distance msd one measurement trusted given pgp key within strongly connected set pgp keys make web trust msd become common metric analysis sets pgp keys often see msd calculated given subset keys compared global msd generally refers keys ranking within one larger key analyses global web trust physically meeting original developer author always best way obtain distribute verify trust pgp/gpg keys highest trust level remain best level best trustworthy way publishing gpg/pgp full key full key fingerprint on/with widely known physical/paper-material based book original author/developer 2nd best form sharing trustworthy key users meeting developer author users research developer author book library via internet aware developer author photo work pub-key fingerprint email-address etc however practical millions users want communicate message securely physically meet recipient users also practical millions software users need physically meet hundreds software developers authors whose software file signing pgp/gpg public key want verify trust ultimately use computers therefore one trusted third-party authority ttpa type entity group need available users usable users entity/group need capable providing trusted-verification trust-delegation services millions users around world time practically verify downloaded received content data email file authenticity user need verify downloaded main content main data/email main file pgp/gpg signature code/file asc sig users would need use original developer original author trustworthy verified public-key users would need use trustworthy file-signing public-key trusted-by original owner public-key really trust specific pgp/gpg key users would need physically meet specific original author developer users would need physically meet original-releaser file-signing pub-key users would need find another alternative trustworthy user trusted-chain wot aka another user another developer another author trusted specific original author developer physically meet person verify real id his/her pgp/gpg key also provide id key user side sign/certify trust pgp/gpg key whether software popular software users usually located around world different locations physically possible original author developer file-releaser provide public-key trust id verification services millions users neither practical millions software users physically meet every software every software-library every piece code developer author releaser use need use computers even multiple trusted people/person original-author trusted-chain wot still physically practically possible every developer author meet every users also possible every users meet hundreds developers whose software using working decentralized hierarchy based wot chain model become popular used nearby users physical meeting pub-key certify sign procedure wot easier solutions original author/developer need first set trust-level sign/certify file-signing key updated public-keys updated file-signing public-keys must also published distributed made accessible users via online secure encrypted mediums user location world get correct trusted unmodified public-key make sure users getting correct trusted public-keys signed-code/file original dev/author original-releaser must publish updated public-keys keyserver force hkps encrypted connection usage publish updated full public-keys signed-code/file https encrypted webpage webserver primary domain website not-from sub-domains located external-servers not-from mirror not-from external/shared forum/wiki etc website servers not-from public external/shared cloud hosting service servers must located kept securely inside premises own-home own-home-office own-office way small pieces original keys/code travel intact internet remain unmodified transit encrypted connection reach destination without eavesdropped modified user side treated trustworthy public-keys single multi channel ttpa based verification public-key obtained original developer web-server via one ttpa trusted third party authority based secured verified encrypted connection trustworthy original public-keys/signed-codes shown original dev author webserver keyserver encrypted connection encrypted webpage files data content transferred type non-encrypted connection like http/ftp etc sub-domain server mirror shared cloud/hosting servers non-encrypted connection based downloaded items/data/files authenticated later using original public-keys/signed-codes obtained original author's/developer server secured encrypted trusted aka verified connection/channels using encrypted connection transfer keys signed/signature code/files allow software users delegate trust pki ttpa trusted third party authority like public ca certificate authority help providing trusted connection original developer/author webserver millions worldwide users computers time original author/developer domain-name name-server signed dnssec used ssl/tls public certificate declared/shown tlsa/dane dnssec dns resource-record ssl/tls certs trust chain pinned used via hpkp technique web servers web-server webpage data also verified via another pki ttpa dnssec dns namespace maintainer icann public ca dnssec another form pgp/gpg wot name-servers creates trusted-chain name-servers first instead people/person people/person pgp/gpg keys fingerprints also added server dnssec dns records users want communicate securely software users effectively get/receive data/key/code/webpage etc verified aka authenticated via two aka dual/double trusted pki ttpas/channels time icann dnssec ca ssl/tls certificate pgp/gpg key/signed-code data file trusted solutions techniques used hkps hkps+dnssec+dane https https+hpkp https+hpkp+dnssec+dane vast number user group create new dlv based dnssec registry users use new dlv along icann-dnssec root-key local dnssec-based dns resolver/server domain-owners also use additional signing domain-names new third ttpa case pgp/gpg key/signed-code data webpage web data three/triple-channel verified isc dlv used third ttpa still used widely active availability another new dlv become fourth ttpa
[ 4114, 363, 887, 1342, 3350, 2821, 6795, 1353, 6894, 3794, 2669, 142, 7567, 5773, 2691, 6049, 860, 4550, 1513, 268, 359, 3426 ]
Test
355
9
Russell_Noftsker:russell noftsker russell noftsker american entrepreneur notably founded symbolics first chairman president russell noftsker born february 1942 went education high school carlsbad new mexico steven levy described noftsker compactly built blond pursed features blue eyes noftsker earned degree engineering new mexico state university hired 1965 marvin minsky replace mit administrator project mac ai group later become ai lab dan edwards recently left post would later hire richard stallman programmer intern lab left lab 1973 duress according levy would later return lab richard greenblatt development early lisp machine led noftsker greenblatt working together team lisp machine developers commercialize technology differences business strategy direction split group greenblatt february 1979 year later noftsker rest group formed symbolics inc. robert adams taking role president chairman greenblatt would eventually start lisp machines inc. noftsker ceo brian sear forced symbolics completely board early 1988 internal battle lowering prices noftsker already forced resign president 2 months april 1984 board late 1986 retained chairman ceo first time chairman second 1995 invitation symbolics customer steve gander princeton capital joined group bought assets symbolics bankruptcy
[ 685 ]
Test
356
9
Arthur_Whitney_(computer_scientist):arthur whitney computer scientist arthur whitney born october 24 1957 canadian computer scientist notable developing three programming languages inspired apl a+ k q cofounding u.s. company kx systems whitney studied pure mathematics graduate level university toronto early 1980s worked stanford university worked extensively apl first i. p. sharp associates alongside ken iverson roger hui also wrote initial prototype j terse macro-heavy single page code one afternoon served model j implementor roger hui responsible suggesting rank operators j 1988 whitney began working morgan stanley developing financial applications morgan stanley whitney helped develop a+ facilitate migrating apl applications ibm mainframe computers network sun microsystems workstations a+ smaller set primitive functions designed speed handle large sets time series data 1993 whitney left morgan stanley cofounded kx systems janet lustgarten commercialize k programming language company signed exclusive agreement union bank switzerland whitney developed variety trading applications using k contract expired outset contract whitney developed kdb database built k. 2003 kx systems released q new vector language built upon k kdb+ database developed whitney 2018 first derivatives bought-out whitney lustgarten minority shares kx systems whitney lustgarten founded shakti
[ 811, 6263, 470, 3464, 6285, 752, 5322, 1774, 1308, 7758, 6846, 8137, 3060, 1892, 6064 ]
Test
357
3
Stream_processing:stream processing stream processing computer programming paradigm equivalent dataflow programming event stream processing reactive programming allows applications easily exploit limited form parallel processing applications use multiple computational units floating point unit graphics processing unit field-programmable gate arrays fpgas without explicitly managing allocation synchronization communication among units stream processing paradigm simplifies parallel software hardware restricting parallel computation performed given sequence data stream series operations kernel functions applied element stream kernel functions usually pipelined optimal local on-chip memory reuse attempted order minimize loss bandwidth accredited external memory interaction uniform streaming one kernel function applied elements stream typical since kernel stream abstractions expose data dependencies compiler tools fully automate optimize on-chip management tasks stream processing hardware use scoreboarding example initiate direct memory access dma dependencies become known elimination manual dma management reduces software complexity associated elimination hardware cached i/o reduces data area expanse involved service specialized computational units arithmetic logic units 1980s stream processing explored within dataflow programming example language sisal streams iteration single assignment language stream processing essentially compromise driven data-centric model works well traditional dsp gpu-type applications image video digital signal processing less general purpose processing randomized data access databases sacrificing flexibility model implications allow easier faster efficient execution depending context processor design may tuned maximum efficiency trade-off flexibility stream processing especially suitable applications exhibit three application characteristics examples records within streams include record read input perform operations write output permissible multiple inputs multiple outputs never piece memory readable writable basic computers started sequential execution paradigm traditional cpus sisd based means conceptually perform one operation time computing needs world evolved amount data managed increased quickly obvious sequential programming model could cope increased need processing power various efforts spent finding alternative ways perform massive amounts computations solution exploit level parallel execution result efforts simd programming paradigm allowed applying one instruction multiple instances different data time simd used swar environment using complicated structures one could also mimd parallelism although two paradigms efficient real-world implementations plagued limitations memory alignment problems synchronization issues limited parallelism simd processors survived stand-alone components embedded standard cpus consider simple program adding two arrays containing 100 4-component vectors i.e 400 numbers total sequential paradigm familiar variations exist inner loops structures ultimately boil construct actually oversimplified assumes instruction codice_1 works although happens instruction intrinsics much information actually taken account number vector components data format done clarity see however method reduces number decoded instructions numelements componentsperelement numelements number jump instructions also decreased loop run fewer times gains result parallel execution four mathematical operations happened however packed simd register holds certain amount data possible get parallelism speed somewhat limited assumption made performing four parallel operations please note common altivec sse paradigm whole dataset defined rather component block defined separately describing set data assumed first two rows result inferred sources kernel simplicity 1:1 mapping input output data need applied kernels also much complex implementation paradigm unroll loop internally allows throughput scale chip complexity easily utilizing hundreds alus elimination complex data patterns makes much extra power available stream processing branch simd/mimd processing must confused although simd implementations often work streaming manner performance comparable model envisions different usage pattern allows far greater performance noted applied generic processors standard cpu 1.5x speedup reached contrast ad-hoc stream processors easily reach 10x performance mainly attributed efficient memory access higher levels parallel processing although various degrees flexibility allowed model stream processors usually impose limitations kernel stream size example consumer hardware often lacks ability perform high-precision math lacks complex indirection chains presents lower limits number instructions executed stanford university stream processing projects included stanford real-time programmable shading project started 1999 prototype called imagine developed 2002 project called merrimac ran 2004 also researched stream-enhanced processors graphics processing units rapidly evolved speed functionality since early days dozens stream processing languages developed well specialized hardware immediate challenge realm parallel processing lie much type hardware architecture used easy program system question real-world environment acceptable performance machines like imagine use straightforward single-threaded model automated dependencies memory allocation dma scheduling result research mit stanford finding optimal layering tasks programmer tools hardware programmers beat tools mapping algorithms parallel hardware tools beat programmers figuring smartest memory allocation schemes etc particular concern mimd designs cell programmer needs deal application partitioning across multiple cores deal process synchronization load balancing efficient multi-core programming tools severely lacking today drawback simd programming issue array-of-structures aos structure-of-arrays soa programmers often wanted build data structures 'real meaning example happened structures assembled arrays keep things nicely organized array structures aos structure laid memory compiler produce interleaved data sense structures contiguous constant offset say size attribute structure instance element following instance offset depends structure definition possibly things considered compiler policies also problems example three position variables simd-ized way sure allocated continuous memory space make sure simd operations work shall grouped 'packed memory location least array another problem lies color xyz defined three-component vector quantities simd processors usually support 4-component operations exceptions however kinds problems limitations made simd acceleration standard cpus quite nasty proposed solution structure arrays soa follows readers experienced c '* identifier means pointer case used point first element array allocated later java programmers roughly equivalent drawback various attributes could spread memory make sure cause cache misses 'll update various reds greens blues stream processors usage structures encouraged application point view attributes defined flexibility taking gpus reference set attributes least 16 available attribute application state number components format components primitive data types supported various attributes attached memory block possibly defining stride 'consecutive elements attributes effectively allowing interleaved data gpu begins stream processing gather various attributes single set parameters usually looks like structure magic global variable performs operations scatters results memory area later processing retrieving modern stream processing frameworks provide fifo like interface structure data literal stream abstraction provides means specify data dependencies implicitly enabling runtime/hardware take full advantage knowledge efficient computation one simplest efficient stream processing modalities date c++ raftlib enables linking independent compute kernels together data flow graph using c++ stream operators example apart specifying streaming applications high-level language models computation mocs also widely used dataflow models process-based models historically cpus began implementing various tiers memory access optimizations ever-increasing performance compared relatively slow growing external memory bandwidth gap widened big amounts die area dedicated hiding memory latencies since fetching information opcodes alus expensive little die area dedicated actual mathematical machinery rough estimation consider less 10 similar architecture exists stream processors thanks new programming model amount transistors dedicated management actually little beginning whole system point view stream processors usually exist controlled environment gpus exist add-in board seems also apply imagine cpus dirty job managing system resources running applications stream processor usually equipped fast efficient proprietary memory bus crossbar switches common multi-buses employed past exact amount memory lanes dependent market range written still 64-bit wide interconnections around entry-level mid-range models use fast 128-bit crossbar switch matrix 4 2 segments high-end models deploy huge amounts memory actually 512 mb slightly slower crossbar 256 bits wide contrast standard processors intel pentium athlon 64 single 64-bit wide data bus memory access patterns much predictable arrays exist dimension fixed kernel invocation thing closely matches multiple pointer indirection indirection chain however guaranteed finally read write specific memory area inside stream simd nature stream processor execution units alus clusters read/write operations expected happen bulk memories optimized high bandwidth rather low latency difference rambus ddr sdram example also allows efficient memory bus negotiations 90 stream processor work done on-chip requiring 1 global data stored memory knowing kernel temporaries dependencies pays internally stream processor features clever communication management circuits interesting stream register file srf conceptually large cache stream data stored transferred external memory bulks cache-like software-controlled structure various alus srf shared various alu clusters key concept innovation done stanford imagine chip compiler able automate allocate memory optimal way fully transparent programmer dependencies kernel functions data known programming model enables compiler perform flow analysis optimally pack srfs commonly cache dma management take majority project schedule something stream processor least imagine totally automates tests done stanford showed compiler well better job scheduling memory hand tuned thing much effort proof lot clusters inter-cluster communication assumed rare internally however cluster efficiently exploit much lower amount alus intra-cluster communication common thus needs highly efficient keep alus fetched data alu equipped local register files lrfs basically usable registers three-tiered data access pattern makes easy keep temporary data away slow memories thus making silicon implementation highly efficient power-saving although order magnitude speedup reasonably expected even mainstream gpus computing streaming manner applications benefit communication latencies actually biggest problem although pci express improved full-duplex communications getting gpu possibly generic stream processor work possibly take long amounts time means usually counter-productive use small datasets changing kernel rather expensive operation stream architecture also incurs penalties small streams behaviour referred short stream effect pipelining widespread heavily used practice stream processors gpus featuring pipelines exceeding 200 stages cost switching settings dependent setting modified considered always expensive avoid problems various levels pipeline many techniques deployed über shaders texture atlases techniques game-oriented nature gpus concepts interesting generic stream processing well programming languages stream processors start java c c++ add extensions provide specific instructions allow application developers tag kernels and/or streams also applies shading languages considered stream programming languages certain degree non-commercial examples stream programming languages include commercial implementations either general purpose tied specific hardware vendor examples general purpose languages include vendor-specific languages include event-based processing batch file-based processing emulates actual stream processing much lower performance general continuous operator stream processing stream processing services
[ 5012, 6793, 5371, 3948, 718, 7529, 7169, 5737, 4318, 5042, 1481, 5055, 2226, 1117, 1867, 2961, 2248, 3667, 2969, 6148, 441, 4742, 5447, 2266, 4047, 1546, 6531, 4049, 4408, 5483, 5487, 3020, 6198, 1568, 1570, 3041, 7666, 1586, 515, 8022, ...
Test
358
4
Cryptanalytic_computer:cryptanalytic computer cryptanalytic computer computer designed used cryptanalysis nowadays involves massive statistical analysis multiple trial decryptions since world war ii possible automated equipment polish cryptanalysts designed built automated aids work enigma traffic arguably first modern computer digital electronic somewhat programmable built cryptanalytic work bletchley park colossus war modern computers important world war ii machines like cray-1 reported machine instructions hardwired request nsa computers continue important cryptanalysis well 21st century nsa fact said largest number installed computers planet whether true age google computer farms remains publicly unknown
[ 1353 ]
Test
359
4
Root_certificate:root certificate cryptography computer security root certificate public key certificate identifies root certificate authority ca root certificates self-signed form basis x.509-based public key infrastructure pki either matched authority key identifier subject key identifier cases authority key identifier issuer string match subject string rfc5280 instance pkis supporting https secure web browsing electronic signature schemes depend set root certificates certificate authority issue multiple certificates form tree structure root certificate top-most certificate tree private key used sign certificates certificates signed root certificate ca field set true inherit trustworthiness root certificate—a signature root certificate somewhat analogous notarizing identity physical world certificate called intermediate certificate subordinate ca certificate certificates tree also depend trustworthiness intermediates root certificate usually made trustworthy mechanism certificate secure physical distribution example well-known root certificates distributed operating systems manufacturers microsoft distributes root certificates belonging members microsoft root certificate program windows desktops windows phone 8 apple distributes root certificates belonging members root program
[ 363, 794, 887, 6795, 1168, 7247, 716, 1173, 2644, 1460, 5824, 7727, 2566, 8189, 8093, 6540, 5399, 6458, 6553, 502, 2587, 4071, 7567, 7925, 3899, 1037, 2691, 6049, 354, 4990, 7214, 3588, 353, 1059, 84, 972, 1513, 2620, 3249, 1805, 3426 ]
Validation
360
9
Alan_Kay:alan kay alan curtis kay born may 17 1940 american computer scientist elected fellow american academy arts sciences national academy engineering royal society arts best known pioneering work object-oriented programming windowing graphical user interface design president viewpoints research institute adjunct professor computer science university california los angeles also advisory board tti/vanguard mid-2005 senior fellow hp labs visiting professor kyoto university adjunct professor massachusetts institute technology mit kay also former professional jazz guitarist composer theatrical designer amateur classical pipe organist interview education america davis group ltd. kay said originally springfield massachusetts kay family relocated several times due father career physiology ultimately settling new york metropolitan area nine attended prestigious brooklyn technical high school suspended due insubordination senior year already accumulated enough credits graduate kay attended bethany college bethany west virginia majored biology minored mathematics asked leave administration protesting institution jewish quota thereafter kay taught guitar denver colorado year hastily enlisted united states air force local draft board inquired nonstudent status assigned computer programmer rare billet dominated women due secretarial connotations field era passing aptitude test devised early cross-platform file transfer system following discharge kay enrolled university colorado boulder earning bachelor degree mathematics molecular biology 1966 time worked professional jazz guitarist studies cu wrote music adaptation hobbit campus theatricals autumn 1966 began graduate school university utah college engineering earned m.s electrical engineering 1968 taking ph.d. computer science 1969 doctoral dissertation flex flexible extendable language described invention computer language known flex worked fathers computer graphics david c. evans recently recruited university california berkeley start utah computer science department ivan sutherland best known writing pioneering programs sketchpad mentorship greatly inspired kay evolving views objects programming grew busier darpa research ended musical career 1968 met seymour papert learned logo programming language dialect lisp optimized educational purposes led learn work jean piaget jerome bruner lev vygotsky constructionist learning influencing professional orientation leaving utah associate professor computer science 1969 kay became visiting researcher stanford artificial intelligence laboratory anticipation accepting professorship carnegie mellon university instead 1970 joined xerox parc research staff palo alto california throughout decade developed prototypes networked workstations using programming language smalltalk inventions later commercialized apple lisa macintosh computers kay one fathers idea object-oriented programming named along colleagues parc original object-oriented concepts including use words 'object 'class developed simula 67 norwegian computing center later said 'm sorry long ago coined term objects topic gets many people focus lesser idea big idea messaging parc kay conceived dynabook concept key progenitor laptop tablet computers e-book also architect modern overlapping windowing graphical user interface gui dynabook conceived educational platform kay considered one first researchers mobile learning many features dynabook concept adopted design one laptop per child educational platform kay actively involved field computing awaiting new revolution happen according kay educational communities parents children see set tools invented douglas engelbart medium marshall mcluhan sense wrote simulas leading oop encounter finally hit destiny personal computing really going personal dynamic vehicle engelbart metaphor opposed ibm railroads something much profound personal dynamic medium vehicle one could wait high school give drivers ed medium extend world childhood 1981 1984 kay atari chief scientist became apple fellow 1984 following closure company advanced technology group 1997 recruited friend bran ferren head research development disney join walt disney imagineering disney fellow remained ferren left start applied minds inc imagineer danny hillis leading cessation fellows program 2001 founded viewpoints research institute non-profit organization dedicated children learning advanced software development first ten years kay viewpoints group based applied minds glendale california ferren continued work together various projects kay also senior fellow hewlett-packard hp disbanded advanced software research team july 20 2005 kay taught fall 2011 class powerful ideas useful tools understand world new york university interactive telecommunications program itp along full-time itp faculty member nancy hechinger goal class devise new forms teaching/learning based fundamental powerful concepts rather traditional rote learning december 1995 still apple kay collaborated many others start open source squeak version smalltalk continues work part effort november 1996 team began research became etoys system recently started along david a. smith david p. reed andreas raab rick mcgeer julian lombardi mark mccahill croquet project open source networked 2d 3d environment collaborative work 2001 became clear etoy architecture squeak reached limits morphic interface infrastructure could andreas raab researcher working kay group hewlett-packard proposed defining script process providing default scheduling mechanism avoids several general problems result new user interface proposed replace squeak morphic user interface future tweak added mechanisms islands asynchronous messaging players costumes language extensions projects tile scripting underlying object system class-based users programming acts like prototype-based tweak objects created run tweak project windows november 2005 world summit information society mit research laboratories unveiled new laptop computer educational use around world many names 100 laptop one laptop per child program children machine xo-1 program begun sustained kay friend nicholas negroponte based kay dynabook ideal kay prominent co-developer computer focusing educational software using squeak etoys kay lectured extensively idea computer revolution new good ideas universally implemented lectures oopsla 1997 conference acm turing award talk entitled computer revolution n't happened yet informed experiences sketchpad simula smalltalk bloated code commercial software august 31 2006 kay proposal united states national science foundation nsf granted thus funding viewpoints research institute several years proposal title steps toward reinvention programming compact practical model personal computing self-exploratorium sense kay trying comes quote abstract seminar given intel research labs berkeley conglomeration commercial open source software consumes neighborhood several hundreds millions lines code days wonder small could understandable practical model design covers functionality 1m lines code 200k loc 100k loc 20k loc alan kay received many awards honors among honors include j-d warnier prix d'informatique acm systems software award nec computers communication foundation prize funai foundation prize lewis branscomb technology award acm sigcse award outstanding contributions computer science education
[ 6507, 3166, 1716, 6511, 3764, 6955, 7707, 6971, 3001, 3779, 3531, 1180, 1746, 6814, 4508, 1381, 35, 1803, 3115, 7009, 3470, 4609, 7999, 43, 7382, 7921, 7017, 3895, 761, 4355, 1308, 604, 5424, 7936, 6485, 4543, 7303, 8137, 1599, 1600, 96...
Validation
361
9
AWK:awk awk domain-specific language designed text processing typically used data extraction reporting tool standard feature unix-like operating systems awk language data-driven scripting language consisting set actions taken streams textual data – either run directly files used part pipeline – purposes extracting transforming text producing formatted reports language extensively uses string datatype associative arrays arrays indexed key strings regular expressions awk limited intended application domain especially designed support one-liner programs language turing-complete even early bell labs users awk often wrote well-structured large awk programs awk created bell labs 1970s name derived surnames authors—alfred aho peter weinberger brian kernighan acronym pronounced name bird auk acts emblem language awk programming language book cover – book often referred abbreviation tapl written lowercase letters codice_1 refers unix plan 9 program runs scripts written awk programming language awk initially developed 1977 alfred aho author egrep peter j. weinberger worked tiny relational databases brian kernighan whose initials language takes name according kernighan one goals awk tool would easily manipulate numbers strings awk also inspired marc rochkind programming language used search patterns input data implemented using yacc one early tools appear version 7 unix awk added computational features unix pipeline besides bourne shell scripting language available standard unix environment one mandatory utilities single unix specification required linux standard base specification awk significantly revised expanded 1985–88 resulting gnu awk implementation written paul rubin jay fenlason richard stallman released 1988 gnu awk may widely deployed version included gnu-based linux packages gnu awk maintained solely arnold robbins since 1994 brian kernighan nawk new awk source first released 1993 unpublicized publicly since late 1990s many bsd systems use avoid gpl license awk preceded sed 1974 designed text processing share line-oriented data-driven paradigm particularly suited writing one-liner programs due implicit main loop current line variables power terseness early awk programs – notably powerful regular expression handling conciseness due implicit variables facilitate one-liners – together limitations awk time important inspirations perl language 1987 1990s perl became popular competing awk niche unix text-processing languages awk language processing text files file treated sequence records default line record line broken sequence fields think first word line first field second word second field awk program sequence pattern-action statements awk reads input line time line scanned pattern program pattern matches associated action executed alfred v. aho awk program series pattern action pairs written condition typically expression action series commands input split records default records separated newline characters input split lines program tests record conditions turn executes action expression true either condition action may omitted condition defaults matching every record default action print record pattern-action structure sed addition simple awk expression codice_2 codice_3 condition codice_4 codice_5 causing action executed records read pattern1 pattern2 matches range records starting record matches pattern1 including record matches pattern2 trying match pattern1 future lines addition normal arithmetic logical operators awk expressions include tilde operator codice_6 matches regular expression string handy syntactic sugar /regexp/ without using tilde operator matches current record syntax derives sed turn inherited ed editor codice_7 used searching syntax using slashes delimiters regular expressions subsequently adopted perl ecmascript quite common tilde operator also adopted perl seen wide use awk commands statements substituted action examples awk commands include function calls variable assignments calculations combination thereof awk contains built-in support many functions many provided various flavors awk also flavors support inclusion dynamically linked libraries also provide functions print command used output text output text always terminated predefined string called output record separator ors whose default value newline simplest form command although fields x may bear resemblance variables symbol indicates variables perl actually refer fields current record special case 0 refers entire record fact commands codice_8 codice_12 identical functionality print command also display results calculations and/or function calls output may sent file pipe awk built-in variables include field variables 1 2 3 0 represents entire record hold text values individual text-fields record variables include variable names use characters a-za-z0-9_ exception language keywords operators represent addition subtraction multiplication division respectively string concatenation simply place two variables string constants next optional use space string constants involved two variable names placed adjacent require space double quotes delimit string constants statements need end semicolons finally comments added programs using first character line format similar c function definitions consist keyword codice_21 function name argument names function body example function statement invoked follows functions variables local scope names added end argument list though values omitted calling function convention add whitespace argument list local variables indicate parameters end local variables begin customary hello world program written awk note explicit codice_22 statement needed since pattern codice_4 command-line arguments processed print lines longer 80 characters note default action print current line count words input print number lines words characters like wc pattern first line program every line input matches default increment actions executed every line note codice_24 shorthand codice_25 incremented numeric value nf last word line defined awk field separator default white-space nf number fields current line e.g 4 since 4 value fourth field nf value last field line regardless many fields line whether fewer fields surrounding lines actually unary operator highest operator precedence line fields nf 0 0 whole line case empty apart possible white-space numeric value 0 end input end pattern matches printed however since may lines input case value ever assigned default empty string adding zero variable awk idiom coercing string numeric value concatenating empty string coerce number string e.g note operator concatenate strings 're placed adjacently coercion program prints 0 empty input without empty line printed action statement prints line numbered printf function emulates standard c printf works similarly print command described pattern match however works follows nr number records typically lines input awk far read i.e current line number starting 1 first line input modulo operator nr 4 == 1 true 1st 5th 9th etc. lines input likewise nr 4 == 3 true 3rd 7th 11th etc. lines input range pattern false first part matches line 1 remains true including second part matches line 3 stays false first part matches line 5 thus program prints lines 1,2,3 skips line 4 5,6,7 line prints line number 6 character-wide field line contents example executed input previous program prints special case first part range pattern constantly true e.g 1 range start beginning input similarly second part constantly false e.g 0 range continue end input example prints lines input first line matching regular expression -- cut -- line containing phrase -- cut -- end word frequency using associative arrays begin block sets field separator sequence non-alphabetic characters note separators regular expressions get bare action performs action every input line case every field line add one number times word first converted lowercase appears finally end block print words frequencies line creates loop goes array words setting subscript array different languages loop goes value array loop thus prints word followed frequency count codice_26 addition one true awk see made book published program represented several ways first one uses bourne shell make shell script everything shortest methods codice_27 awk command protected single quotes shell expand variable needs put double quotes properly handle patterns containing spaces pattern usual way checks see whole line codice_28 matches codice_15 contains current filename awk explicit concatenation operator two adjacent strings concatenate codice_28 expands original unchanged input line alternate ways writing shell script accesses environment directly within awk shell script uses codice_31 array introduced newer version one true awk book published subscript codice_31 name environment variable result variable value like getenv function various standard libraries posix shell script makes environment variable codice_33 containing first argument drops argument awk look pattern file codice_6 checks see left operand matches right operand codice_35 inverse note regular expression string stored variables next way uses command-line variable assignment argument awk seen assignment variable use -v var=value command line option e.g awk -v pattern= pattern ... finally written pure awk without help shell without need know much implementation awk script variable assignment command line one bit lengthy codice_4 necessary extract first argument also prevent interpreted filename codice_4 block ends codice_38 number arguments always guaranteed ≥1 codice_39 name command executed script often string codice_40 also note codice_41 empty string codice_42 codice_43 initiates comment expands end line note codice_44 block awk checks see read standard input runs command means works fact filenames checked codice_45 run explicitly set codice_38 1 arguments awk simply quit feels input files therefore need explicitly say read standard input special filename codice_47 unix-like operating systems self-contained awk scripts constructed using shebang syntax example script prints content given file may built creating file named codice_48 following content invoked codice_49 codice_50 tells awk argument follows file read awk program flag used sed since often used one-liners programs default executing program given command-line argument rather separate file awk originally written 1977 distributed version 7 unix 1985 authors started expanding language significantly adding user-defined functions language described book awk programming language published 1988 implementation made available releases unix system v. avoid confusion incompatible older version version sometimes called new awk nawk implementation released free software license 1996 still maintained brian kernighan see external links old versions unix unix/32v included codice_51 converted awk c. kernighan wrote program turn awk c++ state known
[ 362, 2176, 6789, 4662, 366, 1837, 3984, 2589, 5789, 7592, 4020, 6507, 2272, 3685, 1158, 4387, 4759, 1537, 6172, 5480, 3368, 486, 6912, 5138, 5846, 7277, 1572, 1213, 7667, 2689, 6577, 3417, 6242, 5200, 3085, 3106, 5571, 5931, 578, 923, 5...
Validation
362
2
BusyBox:busybox busybox software suite provides several unix utilities single executable file runs variety posix environments linux android freebsd although many tools provides designed work interfaces provided linux kernel specifically created embedded operating systems limited resources authors dubbed swiss army knife embedded linux single executable replaces basic functions 300 common commands released free software terms gnu general public license version 2 originally written bruce perens 1995 declared complete intended usage 1996 busybox originally aimed put complete bootable system single floppy disk would serve rescue disk installer debian distribution since time extended become de facto standard core user space toolset embedded linux devices linux distribution installers since linux executable requires several kilobytes overhead busybox program combine two hundred programs together often saves substantial disk space system memory busybox maintained enrique zanardi focused needs debian boot-floppies installer system early 1998 dave cinege took linux router project lrp cinege made several additions created modularized build environment shifted busybox focus general high-level embedded systems lrp development slowed 1999 erik andersen lineo inc. took project became official maintainer december 1999 march 2006 time linux embedded marketplace exploded growth busybox matured greatly expanding user base functionality rob landley became maintainer 2005 late 2006 denys vlasenko took current maintainer september 2006 heavy discussions controversies project maintainer rob landley bruce perens busybox project decided adopting gnu public license version 3 gplv3 busybox license clarified gpl version 2 gplv2 late 2007 busybox also came prominence actively prosecuting violations terms license gpl u.s. district court southern district new york claimed first us lawsuit gpl violation concerned use busybox embedded device lawsuit case 07-cv-8205 united states district court southern district new york filed september 20 2007 software freedom law center sflc behalf andersen landley monsoon multimedia inc. busybox code discovered firmware upgrade attempts contact company apparently failed case settled release monsoon version source payment undisclosed amount money andersen landley november 21 2007 sflc brought two similar lawsuits behalf andersen landley two companies xterasys case 07-cv-10455 high-gain antennas case 07-cv-10456 xterasys case settled december 17 release source code used undisclosed payment high-gain antennas case march 6 2008 active license compliance undisclosed payment december 7 2007 case brought verizon communications distribution firmware actiontec routers case settled march 17 2008 condition license compliance appointment officer oversee future compliance free software licenses payment undisclosed sum suits brought june 9 2008 bell microproducts case 08-cv-5270 supermicro case 08-cv-5269 super micro case settled july 23 2008 busybox bell microproducts also settled court october 17 december 14 2009 new lawsuit filed naming fourteen defendants including best buy jvc samsung others february 2010 samsung released ln52a650 tv firmware gplv2 used later reference samygo community project august 3 2010 busybox westinghouse default judgement triple damages 90,000 lawyers costs fees 47,865 possession presumably lot high-def tvs infringing equipment lawsuit software freedom conservancy v. best buy et al. gpl infringement case noted paragraph developers including original author bruce perens maintainer dave cinege represented actions party settlements december 15 2009 perens released statement expressing unhappiness aspects legal situation particular alleged current busybox developers appear removed copyright statements busybox developers appear altered license statements busybox customized provide subset two hundred utilities provide utilities specified single unix specification sus plus many others user would expect see linux system busybox uses almquist shell also known shell ash sh complete bootstrap system replace init daemon udev latter-day systemd using called init startup mdev hotplug time busybox web site provides full list utilities implemented typical computer programs separate binary executable file application busybox single binary conglomerate many applications accessed calling single busybox binary various names supported symbolic link hard link different name specific manner appropriate arguments busybox benefits single binary approach reduces overhead introduced executable file format typically elf allows code shared multiple applications without requiring library technique similar provided crunchgen command freebsd difference busybox provides simplified versions utilities example ls command without file sorting ability crunchgen generated sum utilities would offer fully functional versions sharing common code along routines written size-optimization mind make busybox system use much less storage space system built corresponding full versions utilities replaced busybox research compared gnu busybox asmutils perl implementations standard unix commands showed situations busybox may perform faster implementations always official busybox documentation lists overview available commands command-line options programs included busybox run simply adding name argument busybox executable commonly desired command names linked using hard symbolic links busybox executable busybox reads argv 0 find name called runs appropriate command example /bin/ls linked /bin/busybox works first argument passed program name used program call case argument would /bin/ls busybox would see name ls act like ls program busybox used several operating systems running embedded systems essential component distributions openwrt openembedded including yocto project buildroot sharp zaurus utilizes busybox extensively ordinary unix-like tasks performed system shell necessary several root applications android also preinstalled 1 tap root solutions kingo root toybox started early 2006 gnu general public license former busybox maintainer rob landley result controversies around gplv3/gplv2 discussions end 2011 re-licensed bsd license project went dormant january 11 2012 tim bird sony employee suggested creating alternative busybox would gnu general public license suggested based dormant toybox january 2012 proposal creating bsd licensed alternative gpl licensed busybox project drew harsh criticism matthew garrett taking away relevant tool copyright enforcement software freedom conservancy group starter busybox based lawsuits rob landley responded intentional came conclusion lawsuits resulted hoped positive outcomes wanted stop whatever way see fit
[ 4382, 361, 3507, 3933, 2179, 5453, 4387, 5803, 5983, 6789, 3084, 3085, 1537, 108, 6984, 2559, 5566, 4951, 304, 1842, 5571, 6725, 1281, 578, 1284, 5138, 5755, 224, 6646, 2765, 5762, 3219, 8116, 3042, 7667, 6757, 336, 4358, 2535, 1975, 60...
Validation
363
4
Certificate_authority:certificate authority cryptography certificate authority certification authority ca entity issues digital certificates digital certificate certifies ownership public key named subject certificate allows others relying parties rely upon signatures assertions made private key corresponds certified public key ca acts trusted third party—trusted subject owner certificate party relying upon certificate format certificates specified x.509 standard one particularly common use certificate authorities sign certificates used https secure browsing protocol world wide web another common use issuing identity cards national governments use electronically signing documents trusted certificates used create secure connections server via internet certificate essential order circumvent malicious party happens route target server acts target scenario commonly referred man-in-the-middle attack client uses ca certificate authenticate ca signature server certificate part authorizations launching secure connection usually client software—for example browsers—include set trusted ca certificates makes sense many users need trust client software malicious compromised client skip security check still fool users believing otherwise clients ca server supervisors call certificate servers bestow users commercial cas charge issue certificates customers anticipate ca certificate contained within majority web browsers safe connections certified servers work efficiently out-of-the-box quantity internet browsers devices applications trust particular certificate authority referred ubiquity mozilla non-profit business issues several commercial ca certificates products mozilla developed policy ca/browser forum developed similar guidelines ca trust single ca certificate may shared among multiple cas resellers root ca certificate may base issue multiple intermediate ca certificates varying validation requirements addition commercial cas non-profits issue digital certificates public without charge notable examples cacert let encrypt large organizations government bodies may pkis public key infrastructure containing cas site using self-signed certificates acts ca browsers clients sorts characteristically allow users add away ca certificates server certificates regularly last relatively short period ca certificates extended repeatedly visited servers less error-prone importing trusting ca issued rather confirm security exemption time server certificate renewed less often trustworthy certificates used encrypting signing messages cas dispense end-user certificates used s/mime however encryption entails receiver public key since authors receivers encrypted messages apparently know one another usefulness trusted third party remains confined signature verification messages sent public mailing lists worldwide certificate authority business fragmented national regional providers dominating home market many uses digital certificates legally binding digital signatures linked local law regulations accreditation schemes certificate authorities however market globally trusted tls/ssl server certificates largely held small number multinational companies market significant barriers entry due technical requirements legally required new providers may choose undergo annual security audits webtrust certificate authorities north america etsi europe included trusted root web browser operating system 180 root certificates trusted mozilla firefox web browser representing approximately eighty organizations 200 root certificates trusted macos android 4.2 jelly bean android currently contains 100 cas updated release november 18 2014 group companies nonprofit organizations including electronic frontier foundation mozilla cisco akamai announced let encrypt nonprofit certificate authority provides free domain validated x.509 certificates well software enable installation maintenance certificates let encrypt operated newly formed internet security research group california nonprofit recognized tax-exempt section 501 c 3 according netcraft may 2015 industry standard monitoring active tls certificates states although global tls ecosystem competitive dominated handful major cas — three certificate authorities symantec comodo godaddy account three-quarters issued tls certificates public-facing web servers top spot held symantec verisign purchased symantec ever since survey began currently accounting third certificates illustrate effect differing methodologies amongst million busiest sites symantec issued 44 valid trusted certificates use — significantly overall market share w3techs survey may 2015 shows w3techs survey november 2017 shows w3techs survey may 2018 shows identrust cross-signer let encrypt intermediates risen popular ssl certificate authority symantec dropped chart due security services acquired digicert commercial cas issue bulk certificates https servers typically use technique called domain validation authenticate recipient certificate techniques used domain validation vary cas general domain validation techniques meant prove certificate applicant controls given domain name information applicant identity many certificate authorities also offer extended validation ev certificates rigorous alternative domain validated certificates extended validation intended verify control domain name additional identity information included certificate browsers display additional identity information green box url bar one limitation ev solution weaknesses domain validation attackers could still obtain domain validated certificate victim domain deploy attack occurred difference observable victim user would absence green bar company name question whether users would likely recognise absence indicative attack progress test using internet explorer 7 2009 showed absence ie7 ev warnings noticed users however microsoft current browser edge shows significantly greater difference ev domain validated certificates domain validated certificates hollow grey lock domain validation suffers certain structural security limitations particular always vulnerable attacks allow adversary observe domain validation probes cas send include attacks dns tcp bgp protocols lack cryptographic protections tls/ssl compromise routers attacks possible either network near ca near victim domain one common domain validation techniques involves sending email containing authentication token link email address likely administratively responsible domain could technical contact email address listed domain whois entry administrative email like admin administrator webmaster hostmaster postmaster domain certificate authorities may accept confirmation using root info support domain theory behind domain validation legitimate owner domain would able read emails sent administrative addresses domain validation implementations sometimes source security vulnerabilities one instance security researchers showed attackers could obtain certificates webmail sites ca willing use email address like ssladmin domain.com domain.com webmail systems reserved ssladmin username prevent attackers registering prior 2011 standard list email addresses could used domain validation clear email administrators addresses needed reserved first version ca/browser forum baseline requirements adopted november 2011 specified list addresses allowed mail hosts reserve addresses administrative use though precautions still universal january 2015 finnish man registered username hostmaster finnish version microsoft live able obtain domain-validated certificate live.fi despite owner domain name ca issues digital certificates contain public key identity owner matching private key made available publicly kept secret end user generated key pair certificate also confirmation validation ca public key contained certificate belongs person organization server entity noted certificate ca obligation schemes verify applicant credentials users relying parties trust information ca certificates cas use variety standards tests essence certificate authority responsible saying yes person say ca certify user trusts ca verify ca signature also assume certain public key indeed belong whoever identified certificate public-key cryptography used encrypt data communicated two parties typically happen user logs site implements http secure protocol example let us suppose user logs bank homepage www.bank.example online banking user opens www.bank.example homepage receive public key along data web-browser displays public key could used encrypt data client server safe procedure use protocol determines temporary shared symmetric encryption key messages key exchange protocol enciphered bank public key way bank server private key read rest communication proceeds using new disposable symmetric key user enters information bank page submits page sends information back bank data user entered page encrypted web browser therefore even someone access encrypted data communicated user www.bank.example eavesdropper read decipher mechanism safe user sure bank see web browser user types www.bank.example communication hijacked fake website pretends bank website sends page information back user browser fake web-page send fake public key user fake site owns matching private key user fill form personal data submit page fake web-page get access user data certificate authority mechanism intended prevent certificate authority ca organization stores public keys owners every party communication trusts organization knows public key user web browser receives public key www.bank.example also receives digital signature key information so-called x.509 certificate browser already possesses public key ca consequently verify signature trust certificate public key since www.bank.example uses public key certification authority certifies fake www.bank.example use public key since fake www.bank.example know corresponding private key create signature needed verify authenticity difficult assure correctness match data entity data presented ca perhaps electronic network credentials person/company/program asking certificate likewise presented commercial cas often use combination authentication techniques including leveraging government bureaus payment infrastructure third parties databases services custom heuristics enterprise systems local forms authentication kerberos used obtain certificate turn used external relying parties notaries required cases personally know party whose signature notarized higher standard reached many cas according american bar association outline online transaction management primary points us federal state statutes enacted regarding digital signatures prevent conflicting overly burdensome local regulation establish electronic writings satisfy traditional requirements associated paper documents us e-sign statute suggested ueta code help ensure despite security measures undertaken correctly verify identities people companies risk single ca issuing bogus certificate imposter also possible register individuals companies similar names may lead confusion minimize hazard certificate transparency initiative proposes auditing certificates public unforgeable log could help prevention phishing large-scale deployments alice may familiar bob certificate authority perhaps different ca server bob certificate may also include ca public key signed different ca presumably recognizable alice process typically leads hierarchy mesh cas ca certificates authority revocation list arl form certificate revocation list crl containing certificates issued certificate authorities contrary crls contain revoked end-entity certificates ca/browser forum publishes baseline requirements list policies technical requirements cas follow requirement inclusion certificate stores firefox safari ca subverted security entire system lost potentially subverting entities trust compromised ca example suppose attacker eve manages get ca issue certificate claims represent alice certificate would publicly state represents alice might include information alice information alice employer name might true increasing certificate credibility eve however would all-important private key associated certificate eve could use certificate send digitally signed email bob tricking bob believing email alice bob might even respond encrypted email believing could read alice eve actually able decrypt using private key notable case ca subversion like occurred 2001 certificate authority verisign issued two certificates person claiming represent microsoft certificates name microsoft corporation could used spoof someone believing updates microsoft software came microsoft actually fraud detected early 2001 microsoft verisign took steps limit impact problem 2011 fraudulent certificates obtained comodo diginotar allegedly iranian hackers evidence fraudulent diginotar certificates used man-in-the-middle attack iran 2012 became known trustwave issued subordinate root certificate used transparent traffic management man-in-the-middle effectively permitted enterprise sniff ssl internal network traffic using subordinate certificate attacker steals certificate authority private keys able forge certificates ca without needed ongoing access ca systems key theft therefore one main risks certificate authorities defend publicly trusted cas almost always store keys hardware security module hsm allows sign certificates key generally prevent extraction key physical software controls cas typically take precaution keeping key long-term root certificates hsm kept offline except needed sign shorter-lived intermediate certificates intermediate certificates stored online hsm day-to-day work signing end-entity certificates keeping revocation information date cas sometimes use key ceremony generating signing keys order ensure keys tampered copied critical weakness way current x.509 scheme implemented ca trusted particular party issue certificates domain choose certificates accepted valid trusting party whether legitimate authorized serious shortcoming given commonly encountered technology employing x.509 trusted third parties https protocol major web browsers distributed end-users pre-configured list trusted cas numbers dozens means one pre-approved trusted cas issue valid certificate domain whatsoever industry response muted given contents browser pre-configured trusted ca list determined independently party distributing causing installed browser application really nothing cas issue driving impetus behind development dns-based authentication named entities dane protocol adopted conjunction domain name system security extensions dnssec dane greatly reduce completely eliminate role trusted third parties domain pki various software available operate certificate authority generally software required sign certificates maintain revocation information operate ocsp crl services examples
[ 363, 6413, 6795, 716, 2193, 1460, 3963, 4696, 5399, 5052, 6458, 2587, 7567, 7925, 2239, 5773, 7214, 1142, 1513, 2620, 7953, 7604, 4025, 794, 1168, 1173, 6894, 2644, 112, 6179, 1548, 5824, 1939, 4783, 6540, 1559, 3379, 2312, 6553, 4071, ...
Test
364
3
HLT_(x86_instruction):hlt x86 instruction x86 computer architecture codice_1 halt assembly language instruction halts central processing unit cpu next external interrupt fired interrupts signals sent hardware devices cpu alerting event occurred react example hardware timers send interrupts cpu regular intervals codice_1 instruction executed operating system immediate work done system enters idle state windows nt example instruction run system idle process x86 processors opcode codice_1 codice_4 x86 processors 8086 onwards codice_1 instruction used ms-dos prior 6.0 specifically designed reduce power consumption release intel dx4 processor 1994 ms-dos 6.0 provided power.exe could installed config.sys microsoft tests saved 5 first 100 mhz dx chips buggy hlt state prompting developers linux implement no-hlt option use running chips changed later chips almost every modern processor instruction set includes instruction sleep mode halts processor work needs done interrupt-driven processors instruction halts cpu external interrupt received architectures executing instruction allows processor significantly reduce power usage heat output commonly used instead busy waiting sleeping idling since issuing codice_1 instruction requires ring 0 access run privileged system software kernel often best practice application programming use application programming interface api provided purpose operating system work done referred yielding processor allows operating system scheduler decide processes runnable normally issue hlt instruction cut power usage
[ 6256, 7533, 3015, 5571, 578, 4611, 6922, 6380, 2141, 7020, 7666, 421, 336, 1237, 4009, 352, 263, 1335 ]
Validation
365
5
MPX_filter:mpx filter mpx filter function found cassette decks fm stereo broadcasts contain pilot tone 19 khz stereo information available higher frequencies system developed jointly zenith general electric normal monaural audio pilot tone serves phase reference decoding stereophonic information double sideband stereophonic difference information mixed broadcast together process encoding difference signal 23-53khz band via double-sideband carrier-suppressed amplitude modulation instance multiplexing residual high-frequency components signal remaining de-multiplexing problematic recording analog magnetic media higher frequencies unlikely survive filtering recording deck 19 khz tone within 20 20,000 hz frequency range many tape formats including compact cassette typically provides audible beat difference tone conjunction tape head bias signal used recording recording may also saturated pilot tone importantly pilot tone interferes proper functioning noise reduction systems dolby b c s. pilot tone relatively loud comparison overall loudness fm program typically -20db source signal correctly processed noise reduction system leading audible artefacts breathing pumping reason many decks defeatable mpx filters designed way mpx filter enabled also noise reduction system enabled mpx filter tape deck least notch filter block 19 khz pilot tone possibly higher frequencies 23-53khz 63-75khz bands difference heard recording fm stereo source engaging disengaging mpx filter switch three-head deck monitoring heard recording filter engaged recording sources compact disc setting switch effect playback decks mpx filter switch typically non-defeatable mpx filter incorporated design limits overall i.e record playback frequency response 15-16 khz
[ 2117 ]
Validation
366
5
Mosh_(software):mosh software computing mosh mobile shell tool used connect client computer server internet run remote terminal mosh similar ssh additional features meant improve usability mobile users major features main drawbacks mosh additional prerequisites server lacks special features ssh connection forwarding lack native windows client mosh works different layer ssh whereas ssh transmits stream bytes direction server client client server using tcp mosh runs terminal emulator server figure screen server transmits screen client varying frame rate depending speed network allows mosh save network traffic slow intermittent connections mosh available linux distributions macos freebsd netbsd openbsd android solaris cygwin chrome app ios program termius includes independent implementation mosh protocol mosh built state-synchronization protocol ssp supports single-packet roaming client switched new ip address single packet successfully reaches server enough roam connection client need know roamed client may using nat nat roamed instead mosh research paper creators tested ssp link 29 packet loss found ssp reduced average response time factor 50 16.8 seconds 0.33 seconds compared ssh uses tcp different study students stanford university found ssp reduced average response time factor 30 5.9 seconds 0.19 seconds according mosh developers program found able predict immediately display 70 user keystrokes reducing median response time keystroke less 5 milliseconds masking latency network different study students stanford university found mosh able quickly echo 55 user keystrokes compared popular ssh mosh following drawbacks major drawback mosh requires server fulfill additional prerequisites needed ssh due design mosh needs server allow direct connections via udp servers fulfilling prerequisites used mosh examples systems include servers behind firewalls restrict connections ssh-port via tcp also problematic servers indirectly reachable latter usually accommodated ssh via 'proxycommand option supported mosh default server tries allocate first free udp port range 60001–60999 per connection dynamic port allocation considered extra burden risk firewall maintenance significant part firewall-filtering happens connection tracking called stateful filtering based syn/ack flags tcp segments udp packets n't flags.mitigation mosh 1.2.5 support non-roaming ipv6 connections use -6 option necessary exists experimental multipath capable version mosh supports ipv6 dynamically switching ipv4 ipv6 scrollback supported current release mosh using terminal emulator scrollbars disappear planned 1.3 release functionality trade-off garbage cleaning binary output wiped away one way mitigate currently using mosh combination terminal multiplexer like screen tmux ssh-agent forwarding currently supported x11 forwarding yet supported
[ 361, 4469, 6789, 2817, 4759, 1537, 5480, 7637, 3106, 5571, 923, 5138, 667, 1572, 5946, 2589, 3821, 7214, 3417, 6404, 4283, 4020 ]
Test
367
4
Data_validation:data validation computer science data validation process ensuring data undergone data cleansing ensure data quality correct useful uses routines often called validation rules validation constraints check routines check correctness meaningfulness security data input system rules may implemented automated facilities data dictionary inclusion explicit application program validation logic data validation intended provide certain well-defined guarantees fitness accuracy consistency various kinds user input application automated system data validation rules defined designed using various methodologies deployed various contexts data validation rules may defined designed deployed example definition design contexts depts business applications data validation defined declarative data integrity rules procedure-based business rules data conform rules negatively affect business process execution therefore data validation start business process definition set business rules within process rules collected requirements capture exercise evaluating basics data validation generalizations made regarding different types validation according scope complexity purpose various validation operations carried example data type validation customarily carried one simple data fields simplest kind data type validation verifies individual characters provided user input consistent expected characters one known primitive data types defined programming language data storage retrieval mechanism well specification following primitive data types 1 integer 2 float decimal 3 string example many database systems allow specification following lcodice_1 codice_2 plus minus parentheses sophisticated data validation routine would check see user entered valid country code i.e. number digits entered matched convention country area specified validation process involves two distinct steps validation check b post-check action check step uses one computational rules see section determine data valid post-validation action sends feedback help enforce validation simple range constraint validation may examine user input consistency minimum/maximum range consistency test evaluating sequence characters one tests regular expressions example us phone number 10 digits letters special characters code cross-reference validation includes tests data type validation combined one operations verify user-supplied data consistent one external rules requirements validity constraints relevant particular organization context set underlying assumptions additional validity constraints may involve cross-referencing supplied data known look-up table directory information service ldap example experienced user may enter well-formed string matches specification valid e-mail address defined rfc 5322 well-formed string might actually correspond resolvable domain connected active e-mail account structured validation allows combination various basic data type validation steps along complex processing complex processing may include testing conditional constraints entire complex data object set process operations within system validation rule criterion constraint used process data validation carried data encoded onto input medium involves data vet validation program distinct formal verification operation program determined intended meets purpose validation rule check system still used many major software manufacturers designed employee microsoft sometime 1997 1999 method check data follows appropriate parameters defined systems analyst judgement whether data valid made possible validation program ensure complete accuracy achieved use clerical computer controls built system design stage difference data validity accuracy illustrated trivial example company established personnel file record contains field job grade permitted values b c d. entry record may valid accepted system one characters may correct grade individual worker concerned whether grade correct established clerical checks reference files systems design therefore data definitions established place limits constitutes valid data using data definitions range software validation checks carried consistency check ensures entered data logical example delivery date order date example validation check procedure used verify isbn failures omissions data validation lead data corruption soasp/html/ch10.html chapter10 data validation /ref data validation checks data fit purpose valid sensible reasonable secure processed category data security category data quality
[ 1998, 3932, 2451, 5641, 3854, 3776, 1658, 6025, 6029, 8106, 1956, 5252, 4278, 6156 ]
Test
368
9
List_of_constructed_languages:list constructed languages following list notable constructed languages divided auxiliary ritual engineered artistic including fictional languages respective subgenres entries list information separate wikipedia articles international auxiliary languages languages constructed provide communication among human beings significant portion without necessarily replacing native languages controlled natural languages natural languages altered make simpler easier use acceptable certain circumstances use people speak original language well following projects examples controlled english visual languages use symbols movements place spoken word constructed sign languages also fall category languages actual religious use communities congregations engineered languages devised test hypothesis fall three categories philosophical experimental logical engineered language may belong one categories languages mainly intended knowledge representation easier computers understand several well known knowledge query manipulation languages created extensive research projects represent query knowledge computers experimental languages developed observe hypotheses alternative linguistic interactions could led different modern languages following two examples created ill bethisad alternate history project
[ 7981, 87, 8057 ]
Test
369
1
BBC_Genome_Project:bbc genome project bbc genome project digitised searchable database programme listings initially based upon contents radio times first issue 1923 2009 tv listings post 2009 accessed via bbc programmes site bbc genome bbc first online searchable database april 2006 bbc gave public access infax bbc programme database time infax contained around 900,000 entries every programme ever broadcast ceased operation december 2007 front page website still available see via internet archive infax ceased message website said would incorporating information individual programme pages 2012 replaced database fabric internal use within bbc december 2012 bbc completed digitisation exercise scanning listings radio times bbc programmes 1923-2009 entire run 4,500 copies magazine identified around five million programmes involving 8.5 million actors presenters writers technical staff listings published advance include late changes cancellations reflected infax however include huge numbers early radio television broadcasts dj shows bbc radio 1 bbc radio 2 rarely kept officially listed infax also usually include repeats archived programmes prior 1976 bbc archives issues scanned high resolution producing tif images optical character recognition ocr used turn text page searchable text genome database bbc genome released public use 15 october 2014 aim project allow researchers able find information easier help bbc archives build picture exists currently missing archive corrections ocr errors changes advertised schedules crowdsourced 440,910 user generated edits accepted editorial review mid-december 2018 listing entry unique identifier may expressed url example first screening doctor http //genome.ch.bbc.co.uk/8f81c193ba224e84981f353cae480d49 broadcast programme may one identifier broadcast thus listed repeat occasions different regions digitised editions entire magazines including front covers prose articles advertisements non-listings content 1920s added march 2017 1930s december 2017 1940s december 2018
[]
Test
370
7
3tera:3tera 3tera inc. founded 2004 developer system software utility computing cloud computing headquartered aliso viejo california acquired ca technologies 2010 3tera among pioneers cloud computing space launched applogic system february 2006 cloud computing set technologies business practices enable companies sizes build deploy monitor scale applications using resources accessed internet web 2.0 saas enterprise government users adopting cloud computing eliminates capital investment hardware facilities well reduces operations labor june 16 2014 ca technologies announced applogic end life june 30 2015 3tera flagship product applogic used numerous service providers foundation cloud computing offerings applogic turnkey system converts arrays servers virtualized resource pools users subscribe order power applications users define virtual machines also complex application infrastructure like firewalls vpns load balancers storage nothing browser service providers offer variety services based applogic including generally distinguishes 3tera model applogic made available service software license allows customers obtain service number providers move easily providers well operate in-house cloud computing services 3tera principal founder late vladimir miloushev prior acquisition management founders included barry x lynn chairman chief executive peter nickolov president chief technology officer bert armijo senior vice president product development eric tessler vice president engineering essy nickolova vice president marketing communications robbie vann-adibè vice president sales krasimira nikolova chief financial officer
[ 2988, 7613, 632, 1634, 3091, 6262, 6806, 3627, 5927, 2212, 5135, 1757, 3028, 4159, 842, 4800, 5064, 330, 2961, 7037, 2700, 1514, 5889 ]
Validation
371
7
South_African_wireless_community_networks:south african wireless community networks south african wireless community networks wireless networks allow members talk send messages share files play games independent commercial landline mobile telephone networks use wifi technology many wireless mesh networks wireless community network may connect public switched telephone network and/or internet various restrictions connectivity south africa wireless community networks particularly useful areas commercial telecommunications services unavailable unaffordable wireless user groups wugs south african cities build infrastructure applications well training members wireless technology skills therefore wugs provide fertile ground new technology applications may large social benefits informal communities rural areas south africa neighboring countries south africa best developed modern telephone system africa almost 110 combined fixed-line cellular telephones per 100 persons 5.1 million internet users network 99.9 digital fixed-line monopoly telkom sa listed company government largest shareholder expired licensing neotel south africa second national operator starting operations november 2007 neotel licensed provide entire range telecoms services exception full mobility neotel expanding network fast far concentrating urban areas south african mobile communications market growing fast country three cellular network operators vodacom mtn cell c 39-million subscribers nearly 80 population however although one million broadband subscribers mostly using adsl hsdpa bandwidth remains relatively limited expensive major cities cape town durban johannesburg pretoria launched public-private initiatives build broadband networks provide cheaper voice data services example city tshwane includes pretoria testing delivery broadband internet voice services new metro-wide fibre-optic network using wireless hot spots provide adsl access meantime high cost broadband access stimulated development wireless user groups wugs allowed sell internet connectivity since non-commercial community networks although non-profit operating license-exempt spectrums legal status clear october 2007 jawug requested clarification whether required radio frequency spectrum and/or ecns license activities telkom provides relatively poor voice internet service underdeveloped rural areas south africa although investigating ways improve service using wireless technology independent communications authority south africa licensed several small telecoms firms operate regional networks remote under-served areas country bokone telecoms polokwane amathole telecoms eastern cape experimenting wimax technology provide service however due relatively high costs low revenue potential initiatives moving slowly room innovative approaches currently voip voice internet protocol service allowed areas less five percent population access telephone wifi restricted use individuals organisations within confines premises argument low-cost free voip wifi would destroy incentive commercial network providers upgrade rural networks however several commentators consider policy counter-productive discussed later many wireless community networks deliberately ignore restrictions cities south africa one non-profit groups collaborating running wireless user groups descriptions sample given information derived web sites jawug located johannesburg largest city south africa jawug founded 2002 kieran murphy justin jonker ross clarke steven carter first wireless user group south africa starting experimental network four students quickly expanding much larger network interconnecting several separate wireless mesh networks jawug isp network used purely non-commercial educational purposes jawug regularly used experimental deployment new technologies currently four links interconnect jawug network ptawug wireless user group pretoria north johannesburg jawug ptawug work together closely jawug helped get ptawug ground jawug also gives technical assistance new wireless users groups like port elizabeth wireless users group pewug core team members manage routing highsite maintenance regular wugmeets held discuss network issues future plans jawug membership base approximately 300 locations constantly expanding pretoria wug founded 28 july 2007 ptawug constitution guarantees openness free participation equality members wireless user group ptawug exclusively funded donations community volunteers conduct highsite installation maintenance spare time ptawug 5th largest wireless network organization world 600 member connections 7 october 2009 avoid rental costs highsites privately owned properties mostly high areas good line sight surrounding areas network number towers highsites located tall buildings private residences strategic places pretoria wireless project another community based network city connected pretoria wug network 3 february 2008 cape town wireless user group around since 2005 small network friends since grown citywide network ctwug 1500 user sites around cape town spanning way houtbay stellenbosch helderberg ctwug non-profit organisation geared towards community based wireless networking focus promote use understanding wireless equipment order build citywide free wireless network building network forms social interactive community people interest expanding improving network donate time money equipment group ctwug runs many network enhancements including gametime system stops bulk traffic certain hours gaming high-priority network uses ctwug puts lot priority making sure network usable many applications uses possible monthly annual fees kind asked membership contributions completely voluntary ctwug maintains good vendor relationships ensure high quality equipment used supplied network links durban wireless community founded december 2004 group people interested 802.11 a/b/g wireless technology durban third populous city south africa first meeting january 2005 4 attendees group 200 people mailing list 15 live nodes network spanning bluff umbilo morningside town tollgate westville goals non-profit group free join open include educating public wireless technology learning technology durban wireless community close ties jawug potchefstroom community network non-profit grassroots effort members community provide broadband network members using inexpensive off-the-shelf wifi radio networking equipment network operates license-exempt 2.4 ghz frequency spectrum stellenbosch community network joint project stellenbosch university stellenbosch local municipality cape province south africa purpose provide community wireless access university municipality services network pilot phase operated open public network accessible anyone right equipment although city-based community networks typically run hobbyists may primarily interested experimenting technology avoiding high broadband charges playing internet games serve also test beds serious projects training grounds wireless network engineers may benefit projects poor rural informal communities communities wireless mesh networks may great medical educational economic value giving affordable telephone internet access coupled initiatives one laptop per child aim provide low-cost devices assuming regulator continues remove obstacles deploying wifi community networks meraka institute government-backed organization promote ict development wireless africa programme meraka institute researching ways develop sustainable information communications technology developing countries research follows two tracks peebles valley mesh project using wireless mesh networking low cost first mile solution connect people internet project testing rural community take ownership network trial community-run wug near kruger national park mpumalanga province project uses cantennas connect wireless mesh network small self-constructed antennas made locally available material connected low-cost wifi card plugged computer although sponsored meraka institute project members state illegal current laws another project uwc telehealth testing system remote rural part eastern cape south africa lets nurses doctors use wireless ip-based communication system conduct patient referrals request ambulance services order supplies project ran difficulties first voice internet protocol voip illegal south africa even uwc telehealth network regulator removed restriction still legislative obstacles providing internet access project directors challenging orange farm informal settlement 300,000 people south johannesburg people afford mobile phones afford use internet cafes however dabba telecommunications company providing affordable telephone service orange farm wireless mesh technology dabba installed several wireless routers relay signals internet connection local community centre anyone within range one routers make phone calls using wi-fi sip session initiation protocol telephone calls within network free dabba supports low-cost prepaid calls telephones networks however phones average 100 takes significant technical knowledge investment build network like model may work poorer rural communities dabba working shuttleworth foundation non-profit south african charitable organization village telco project develop affordable easy-to-install telephone system rural communities goal design system costing us 5000 get started small-scale local entrepreneur could afford would break even within six months project came concept mesh potato cheap device perhaps 60 per unit connect standard analog telephone wireless network also serves wireless mesh node relaying signals mesh potatoes central wireless internet connection dabba companies similar model provide advice wireless community network owners connectivity outside world technology tested several manufacturers showing interest building devices village telco concept may potential many countries outside south africa
[ 6335, 6601, 7170 ]
Validation
372
2
Nokia_N78:nokia n78 nokia n78 3g smartphone made nokia first introduced mobile world congress 11 february 2008 launched 26 may 2008 €350 taxes subsidies runs symbian 9.3 s60 3rd edition fp2 marketed cheaper nseries device inside compact light body phone compatible n-gage 2.0 mobile gaming service successor n73 design shares similarities n81 n82 n96 despite relatively low price nokia n78 still pack numerous standard nseries features a-gps hsdpa wi-fi touch-sensitive navi wheel like n81 first nokia among first overall along sony ericsson w980 feature fm transmitter keypad hidden idle mode lights key pressed however become popular like n73 later 2008 nokia n79 introduced nokia n78 also first nokia phone new extended guitar-based version nokia tune firmware version 20.149 dated 8 december 2008 became available generic non-branded n78 via over-the-air update facility january 2009 latest firmware version 21.002 released 18 february 2009 lightest update 214 kb downloaded file using fota many improvements made overall performance device upgrade also firmware version 30.011 available nokia software updater update released 8 may 2009 available fota
[ 1066, 5979, 2271, 6517, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 2922, 4407, 118, 23, 2564, 3703, 7261, 6440, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 5068, 59...
Test
373
7
Cloud-based_integration:cloud-based integration cloud-based integration form systems integration business delivered cloud computing service addresses data process service-oriented architecture soa application integration one marketing buzzword ipaas integration platform service suite cloud services enabling customers develop execute govern integration flows disparate applications cloud-based ipaas integration model customers drive development deployment integrations without installing managing hardware middleware ipaas allows businesses achieve integration without big investment skills licensed middleware software ipaas used regarded integration tool cloud-based software applications used mainly small mid-sized business meantime however hybrid type ipaas i.e hybrid-it ipaas connects cloud on-premises becoming increasingly popular additionally large enterprises explore ways integrating ipaas existing estate cloud integration basically created break data silos improve connectivity optimize business process cloud integration increased popularity usage software service solutions growing day day prior emergence cloud computing integration could categorized either internal business business b2b internal integration requirements serviced on-premises middleware platform typically utilized service bus manage exchange data systems b2b integration serviced edi gateways value-added network van advent saas applications created new kind demand met cloud-based integration since emergence many services also developed capability integrate legacy on-premises applications well function edi gateways following essential features proposed one marketing company emergence sector led new cloud-based business process management tools need build integration layers since separate service drivers growth include need integrate mobile app capabilities proliferating api publishing resources growth demand internet things functionalities 'things connect internet integration market variety players application designers systems integrators cloud vendor network service providers development service providers include dell boomi ibm sap oracle microsoft mulesoft greenbird azuqua tibco software
[ 2961, 6433, 2988, 330, 32 ]
Test
374
4
Administrative_domain:administrative domain administrative domain service provider holding security repository permitting easily authenticate authorize clients credentials particularly applies computer network security concept captured 'admindomain class glue information model administrative domain mainly used intranet environments may implemented collection hosts routers interconnecting network managed single administrative authority interoperation different administrative domains different security repositories different security software different security policies notoriously difficult therefore administrative domains wishing ad hoc interoperation full interoperability build federation
[ 2087, 4159, 4800, 5149, 3172, 651, 5930, 3794, 1803, 5539 ]
Test
375
6
Solid_(web_decentralization_project):solid web decentralization project solid social linked data web decentralization project led tim berners-lee inventor world wide web developed collaboratively massachusetts institute technology mit project aims radically change way web applications work today resulting true data ownership well improved privacy developing platform linked-data applications completely decentralized fully users control rather controlled entities ultimate goal solid allow users full control data including access control storage location end tim berners-lee formed company called inrupt help build commercial ecosystem fuel solid two decades berners-lee invented world wide web 1989 outlined design issues later became solid project drafts wrote world wide web consortium berners-lee became increasingly dismayed seeing invention abused russian hackers allegedly interfered 2016 us elections facebook–cambridge analytica data scandal became public facebook 2012 conducted psychological experiments nearly 700,000 users secret google amazon applied patents devices listen emotional changes human voices berners-lee felt internet need repair conceived solid project first step fix way give individual users full control usage data solid project available anyone join contribute although berners-lee advises people without coding skills instead advocate publicly changing internet 2015 mit received gift mastercard support development solid berners-lee research team collaborated qatar computing research institute oxford university solid 2018 berners-lee took sabbatical mit launch commercial venture based solid named inrupt company mission provide commercial energy ecosystem help protect integrity quality new web built solid number technical challenges surmounted accomplish decentralizing web according berners-lee vision rather using centralized spoke–hub distribution paradigm decentralized peer-to-peer networking implemented manner adds control performance features traditional peer-to-peer networks bittorrent goals system easy use fast allow simple creation applications developers solid central focus enable discovery sharing information way preserves privacy user stores personal data pods personal online data stores hosted wherever user desires applications authenticated solid allowed request data user given application permission user may distribute personal information among several pods example different pods might contain personal profile data contact information financial information health travel plans information user could join authenticated social-networking application giving permission access appropriate information specific pod user retains complete ownership control data user pods data pod contains pod stored applications permission use data detail solid consists following components
[ 2430, 2451, 6948, 7290, 84, 87 ]
Test
376
4
CryptoLocker:cryptolocker cryptolocker ransomware attack cyberattack using cryptolocker ransomware occurred 5 september 2013 late may 2014 attack utilized trojan targeted computers running microsoft windows believed first posted internet 5 september 2013 propagated via infected email attachments via existing gameover zeus botnet activated malware encrypted certain types files stored local mounted network drives using rsa public-key cryptography private key stored malware control servers malware displayed message offered decrypt data payment either bitcoin pre-paid cash voucher made stated deadline threatened delete private key deadline passes deadline met malware offered decrypt data via online service provided malware operators significantly higher price bitcoin guarantee payment would release encrypted content although cryptolocker easily removed affected files remained encrypted way researchers considered unfeasible break many said ransom paid offer way recover files others said paying ransom way recover files backed victims claimed paying ransom always lead files decrypted cryptolocker isolated late may 2014 via operation tovar took gameover zeus botnet used distribute malware operation security firm involved process obtained database private keys used cryptolocker turn used build online tool recovering keys files without paying ransom believed operators cryptolocker successfully extorted total around 3 million victims trojan instances encryption-based ransomware followed used cryptolocker name variations otherwise unrelated cryptolocker typically propagated attachment seemingly innocuous e-mail message appears sent legitimate company zip file attached email message contains executable file filename icon disguised pdf file taking advantage windows default behaviour hiding extension file names disguise real .exe extension cryptolocker also propagated using gameover zeus trojan botnet first run payload installs user profile folder adds key registry causes run startup attempts contact one several designated command control servers connected server generates 2048-bit rsa key pair sends public key back infected computer server may local proxy go others frequently relocated different countries make tracing difficult payload encrypts files across local hard drives mapped network drives public key logs file encrypted registry key process encrypts data files certain extensions including microsoft office opendocument documents pictures autocad files payload displays message informing user files encrypted demands payment 400 usd euro anonymous pre-paid cash voucher i.e moneypak ukash equivalent amount bitcoin btc within 72 100 hours starting 2 btc ransom price adjusted 0.3 btc operators reflect fluctuating value bitcoin else private key server would destroyed nobody never able restore files payment ransom allows user download decryption program pre-loaded user private key infected victims claim paid attackers files decrypted november 2013 operators cryptolocker launched online service claimed allow users decrypt files without cryptolocker program purchase decryption key deadline expired process involved uploading encrypted file site sample waiting service find match site claimed match would found within 24 hours found user could pay key online 72-hour deadline passed cost increased 10 bitcoin 2 june 2014 united states department justice officially announced previous weekend operation tovar—a consortium constituting group law enforcement agencies including fbi interpol security software vendors several universities disrupted gameover zeus botnet used distribute cryptolocker malware department justice also publicly issued indictment russian hacker evgeniy bogachev alleged involvement botnet part operation dutch security firm fox-it able procure database private keys used cryptolocker august 2014 fox-it fellow firm fireeye introduced online service allows infected users retrieve private key uploading sample file receive decryption tool security software designed detect threats might detect cryptolocker encryption underway complete particularly new version unknown protective software distributed attack suspected detected early stages takes time encryption take place immediate removal malware relatively simple process completed would limit damage data experts suggested precautionary measures using software security policies block cryptolocker payload launching due nature cryptolocker operation experts reluctantly suggested paying ransom way recover files cryptolocker absence current backups offline backups made infection inaccessible infected computers attacked cryptolocker due length key employed cryptolocker experts considered practically impossible use brute-force attack obtain key needed decrypt files without paying ransom similar 2008 trojan gpcode.ak used 1024-bit key believed large enough computationally infeasible break without concerted distributed effort discovery flaw could used break encryption sophos security analyst paul ducklin speculated cryptolocker online decryption service involved dictionary attack encryption using database keys explaining requirement wait 24 hours receive result december 2013 zdnet traced four bitcoin addresses posted users infected cryptolocker attempt gauge operators takings four addresses showed movement 41,928 btc 15 october 18 december us 27 million time survey researchers university kent 41 claimed victims said decided pay ransom proportion much larger expected symantec estimated 3 victims paid dell secureworks estimated 0.4 victims paid following shutdown botnet used distribute cryptolocker calculated 1.3 infected paid ransom many able recover files backed others believed lost huge amounts data nonetheless operators believed extorted total around 3 million success cryptolocker spawned number unrelated similarly named ransomware trojans working essentially way including refer cryptolocker —but according security researchers unrelated original cryptolocker september 2014 clones cryptowall torrentlocker whose payload identifies cryptolocker named use registry key named bit torrent application began spreading australia ransomware uses infected e-mails purportedly sent government departments e.g australia post indicate failed parcel delivery payload evade detection automatic e-mail scanners follow links variant designed require users visit web page enter captcha code payload actually downloaded symantec determined new variants identified cryptolocker.f tied original
[ 704, 3932, 2912, 3277, 2923, 2566, 7186, 744, 2587, 3323, 5779, 3338, 7600, 4025, 1528, 4759, 2991, 1173, 6526, 5485, 6904, 6541, 6194, 5848, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 2733, 2390, 208, 2021, 5922, ...
Test
377
1
AustLit:_The_Australian_Literature_Resource:austlit australian literature resource austlit australian literature resource internet-based collaboration researchers librarians australian universities designed comprehensively record history australian literary story making cultures austlit encyclopaedia australian writers writing austlit founded 2000 resource research infrastructure literary studies funded participating universities australian research council university queensland leads consortium partner universities include university new south wales university sydney flinders university university wollongong james cook university university western australia significant levels research teaching field undertaken partner universities austlit publishes biographical entries brief essays australian writers critics storytellers organisational histories relating publishers theatre companies arts organisations complete bibliographical histories works fiction criticism also active digitisation program generate full text versions out-of-print literary works critical articles australian literature austlit research communities support detailed explorations particular aspects australia literary culture researchers work within austlit create datasets around specific field projects range across book magazine publishing histories subject specific surveys regionally based publishing thematically based subsets research history australian popular pulp fiction supported alongside research theatre history drama multicultural writers blackwords landmark austlit research project details lives work indigenous australian authors includes australian aboriginal torres strait islander writers storytellers austlit become key information resource study australian literature related fields status comprehensive record nation publishing history austlit become important source data analysing australian literary history
[]
Test
378
2
Windows_SideShow:windows sideshow windows sideshow technology developed microsoft introduced windows vista operating system designed provide information number unread e-mail messages rss feeds secondary display windows-based device displays may integrated part device included part separate component connected personal computer sideshow integrates windows gadgets feature windows vista windows 7 also integrate applications windows media center sideshow discontinued windows 8.1 auxiliary displays listed microsoft among forms information indicators personal computers windows hardware engineering conference 2003 auxiliary display feature later presented microsoft winhec 2004 scheduled included windows vista known codename longhorn intended tablet pcs mobile devices provide users up-to-date information glance increase value windows operating system new mobile scenarios auxiliary display support included among mobile features scheduled operating system including windows mobility center speech recognition windows hotstart listed part microsoft mobile pc strategy prototype auxiliary display device demonstrated intel intel developer forum conference fall 2004 february 2005 microsoft announced first beta version windows vista codenamed longhorn would include support feature preliminary software development kit would also released concurrently operating system winhec 2005 microsoft released details sideshow development platform discussed new scenarios enabled technology prototypes also produced several original equipment manufacturers oems displayed conference microsoft would release details year later winhec 2006 additional hardware also displayed windows vista released manufacturing november 8 2006 includes two sideshow gadgets one windows mail one windows media player microsoft office 2007 released manufacturing day windows vista included outlook 2007 calendar gadget sideshow windows 7 microsoft introduced multiple user support gadgets improved reliability resiliency sideshow apis gadgets multiple devices improved asynchronous processing throughput updated sideshow control panel experience changes prominent link settings introduction tooltip descriptions gadgets windows sideshow displays embedded part device separate component examples include electronic visual display integrated part keyboard digital photo frames receive information wirelessly wireless devices connected personal computer wireless network technologies including bluetooth wi-fi manufacturers may also produce detachable displays sideshow devices display various types information contacts calendar appointments e-mail maps rss feeds serve indicators system information battery life wireless network strength microsoft published documentation suggests additional uses sideshow devices ability transmit information notifications received computer across televisions set-top boxes ability serve second screen pc games content e.g. character statistics maps enable new multitasking scenarios gameplay sideshow features integration windows desktop gadget feature windows vista windows 7 enables single gadget operate simultaneously user desktop supplying data across devices sideshow uses windows portable devices infrastructure communicate devices viewed portable device file explorer users also adjust interact files included part auxiliary displays auxiliary displays appear device manager integrate windows vista function discovery technology gadget developed sideshow written programming windows sideshow platform application programming interface—a native code com-based api introduced windows vista managed api .net framework developers also released microsoft includes development templates visual studio 2005 visual studio 2008 aid development gadgets microsoft released sideshow simulator emulates functionality sideshow-compatible device thereby allowing developers test appearance functionality gadgets without requiring physical hardware devices windows sideshow different hardware traits devices mobile phones pdas former processor need rely solely connection computer processing tasks online offline abilities allow device run larger components connected computer following list contains typical device display types technologies hardware-specific native applications provide rich-media experiences like audio video playback accessed sideshow user interface require sdk specific platform vendor example nvidia provides preface platform includes abilities like mp3 aac mpeg-4 encode-decode digital media formats oems accepted sideshow 2007 asus announced w5fe laptop full-color 2.8-inch sideshow display front cover 2006 featured winhec 7-inch 10-inch momento digital photo frames released developer living picture provided sideshow functionality wifi subsequently marketed i-mate along momento live picture service shut 2009 october 2007 dell released xps 420 included sideshow device top front machine widely promoted found little use quietly dropped xps 430 came year later february 1 2010 ikanos consulting announced threemote suite windows sideshow-compatible products embedded platforms including windows mobile google android kopin golden-i threemote appears unsupported unavailable android market time available windows mobile blog posting april 2010 technical director ikanos consulting said sideshow dead threemote bubbling along february 7 2012 chris james released ms sideshow device implementation windows sideshow device google android microsoft discontinued sideshow gallery duplication sideshow gallery content available windows sidebar gadget gallery introduction windows 8.1 microsoft discontinued technology removed support sideshow devices operating system
[ 7879, 3937, 3263, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 6136, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Test
379
2
Weak_reference:weak reference computer programming weak reference reference protect referenced object collection garbage collector unlike strong reference object referenced weak references – meaning every chain references reaches object includes least one weak reference link – considered weakly reachable treated unreachable may collected time garbage-collected languages feature support various levels weak references c java lisp ocaml perl python weak references number common use cases using reference counting garbage collection weak references break reference cycles using weak reference link cycle one associative array mapping hash map whose keys references objects example hold auxiliary data objects using weak references keys avoids keeping objects alive use key one object objects registered observer pattern particularly event handling strong reference kept objects must explicitly unregistered otherwise memory leak occurs lapsed listener problem weak reference removes need unregister holding cached data recreated necessary weak references allow cache reclaimed effectively producing discardable memory last case cache distinct others preferable objects garbage collected necessary thus need finer distinctions within weak references stronger form weak reference many cases weak references need directly used instead simply using weak array container whose keys values weak references garbage collection used clean unused objects reduce potential memory leaks data corruption two main types garbage collection tracing reference counting reference counting schemes record number references given object collect object reference count becomes zero reference-counting collect cyclic circular references one object may collected time groups mutually referencing objects directly referenced objects unreachable thus become permanently resident application continually generates unreachable groups unreachable objects effect memory leak weak references references counted reference counting may used solve problem circular references reference cycles avoided using weak references references within group common case strong vs. weak reference distinctions tree structures document object model dom parent-to-child references strong child-to-parent references weak example apple cocoa framework recommends approach indeed even object graph tree tree structure often imposed notion object ownership ownership relationships strong form tree non-ownership relationships weak needed form tree – approach common c++ pre-c++11 using raw pointers weak references approach however downside allowing ability detect parent branch removed deleted since c++11 standard solution added using shared_ptr weak_ptr inherited boost framework weak references also used minimize number unnecessary objects memory allowing program indicate objects minor importance weakly referencing languages multiple levels weak reference strength example java order decreasing strength soft weak phantom references defined package java.lang.ref reference type associated notion reachability garbage collector gc uses object type reachability determine free object safe gc free object softly reachable gc may decide believes jvm spare memory e.g jvm lots unused heap space gc free weakly reachable object soon gc notices object unlike reference types phantom reference followed hand phantom references provide mechanism notify program object freed notification implemented using referencequeues c weak references distinguished whether track object resurrection distinction occur strong references objects finalized strong references default c weak reference track resurrection meaning weak reference updated object resurrected called short weak references weak references track resurrection called long weak references non-garbage-collected languages c++ provide weak/strong reference functionality part supporting garbage collection libraries boost c++ library provides strong weak references mistake use regular c++ pointers weak counterparts smart pointers usage removes ability detect strong reference count gone 0 object deleted worse yet n't allow detection whether another strong reference already tracking given plain pointer introduces possibility two smart pointers tracking plain pointer causes corruption soon one smart pointers reference count reaches 0 object gets deleted weak references useful keeping list current variables referenced application list must weak links objects otherwise objects added list referenced persist duration program java 1.2 1998 introduced two kinds weak references one known “ soft reference ” intended used maintaining gc-managed in-memory caches ’ work well practice simply “ weak reference ” also added related experimental mechanism dubbed “ phantom references ” alternative dangerous inefficient finalize mechanism weak reference created elsewhere code codice_1 used get actual object weak reference n't strong enough prevent garbage collection may strong references object codice_1 suddenly starts returning null another use weak references writing cache using example weak hash map one store cache various referred objects via weak reference garbage collector runs — example application memory usage gets sufficiently high — cached objects longer directly referenced objects removed cache objective-c 2.0 garbage collection also automatic reference counting affected weak references variables properties following example weak difference codice_3 codice_4 codice_5 codice_6 object variable pointed deallocated whether value variable going changed codice_3 ones updated codice_8 codice_5 one left unchanged dangling pointer codice_3 references added objective-c since mac os x 10.7 lion ios 5 together xcode 4.1 4.2 ios using arc older versions mac os x ios gnustep support codice_5 references weak ones
[ 1616, 5983, 3351, 2277, 3515, 8066, 8174, 2736, 7530, 1363, 1640, 572, 1191, 399, 401, 7460, 1855, 1019, 1208, 4347, 236, 3566, 4810, 56, 7113, 858, 4543, 5965, 7308, 5786, 4920 ]
Test
380
3
Relative_identifier:relative identifier context microsoft windows nt line computer operating systems relative identifier rid variable length number assigned objects creation becomes part object security identifier sid uniquely identifies account group within domain relative id master allocates security rids dcs assign new ad security principals users groups computer objects also manages objects moving domains relative id master one role flexible single master operation assigning rid
[ 6256, 2631 ]
Test
381
9
Lingo_(programming_language):lingo programming language lingo verbose object-oriented oo scripting language developed john h. thompson use adobe director formerly macromedia director lingo used develop desktop application software interactive kiosks cd-roms adobe shockwave content lingo primary programming language adobe shockwave platform dominated interactive multimedia product market 1990s various graphic adventure games developed lingo 1990s including journeyman project total distortion didi ditto series hundreds free online video games developed using lingo published websites miniclip shockwave.com lingo used build user interfaces manipulate raster graphics vector graphics 3d computer graphics data processing tasks lingo supports specialized syntax image processing 3d object manipulation 3d meshes also created fly using lingo lingo invented john h. thompson macromind 1989 first released director 2.2 jeff tanner developed tested lingo director 2.2 3.0 created custom xobjects various media device producers language extension examples using xfactory including xfactory application programming interface api wrote initial tutorials use lingo dave shields tested documented object-based lingo director 3.13 4.0 ran build scripts create weekly releases testing originated macromedia knowledgebase created examples write lingo xtra plug-ins c++ assembled golden master disks macromedia director shipped duplicator lingo quickly adopted burgeoning multimedia community 1990s already popular director product initially 90 users used 10 lingo features primarily codice_1 multimedia authors tutorials presentations however 10 users game developers took wider interest 90 abilities including function extensions creating xfactories/xobjects journeyman project prominent example lingo embedded adobe director added scripts objects timeline lingo object-oriented programming oop language supports smalltalk-like verbose syntax oo dot syntax inheritance lingo created verbose syntax designed mimic spoken language would easy new users users could write hypertalk-like sentences go statements optional unlike programming languages go statements reference frames director score specific code lines lingo also initially robust providing object generation notion called codice_2 led language extensibility external factories xfactories xobjects director 3.13 later versions extensibility occurred via different type plug-in called xtra based upon microsoft component object model com although still possible use verbose syntax current version language fully supports oo dot syntax code looks like standard programming languages javascript c++ equivalent new scripting style would format uses elements director object model introduced director mx 2004 syntax prior versions would like 4 types lingo scripts director specific purpose type script may added certain types compatible objects behavior parent scripts encourage good object-oriented programming movie scripts oop-oriented however still used make black-box handlers objects input raw data receive answers back without knowing inner workings box using strengths ease-of-use director programming methodology advantages oop makes powerful fast programming environment lingo supports object inheritance slightly idiosyncratic system script codice_3 property references another object usually also script although objects cast members also ancestors properties methods ancestor inherited parent behavior scripts also kind ancestor sprites attached since properties methods behavior accessed reference sprite case kind multiple inheritance one sprite may several behaviors lingo 3.0 also extensible external factories xfactories xobjects later replaced lingo xtras provided programmatic extensions director example controlling external media devices cd-rom video tape players macintosh serialport xobject api openly available developers media device producers added popularity versatility lingo macromind active positioning xobject api standard external media devices collaborate lingo interest standard achieved lot involvement prominent burgeoning media product companies ad hoc group called multimedia association starting director version 4.0 lingo extensible new improved class external plugin called xtras xtras developed c++ using microsoft component object model com standardization com helped attract developers creating market plug-ins imaging lingo introduced director 8.0 allowed developers write high-performance image manipulation commands using simple syntax similarities functions image applications like photoshop make easy create dynamic code-based visual effects image manipulation also added actionscript 3.0 bitmapdata class included sophisticated commands director also updated allow conversion bitmapdata object image objects director 8.5 introduced directx 3d engine could scripted lingo lingo updated substantially support new 3d objects includes full-featured set 3d commands xtra also created enable use havok 3d physics engine later ageia physx engine director 11 languages perhaps well known macromedia language however legal anomaly remains uk trademark word 'lingo held linn smart computing
[ 6392, 3169, 2451, 3898, 2085 ]
Validation
382
7
Live_distributed_object:live distributed object live distributed object also abbreviated live object refers running instance distributed multi-party peer-to-peer protocol viewed object-oriented perspective entity distinct identity may encapsulate internal state threads execution exhibits well-defined externally visible behavior key programming language concepts applied live distributed objects defined follows semantics behavior live distributed objects characterized terms distributed data flows set messages events appear instances live object endpoint forms distributed data flow early ideas underlying concept live distributed object influenced rich body research object-oriented environments programming language embeddings protocol composition frameworks dating back least actor model developed early 1970s comprehensive discussion relevant prior work found krzysztof ostrowski ph.d. dissertation term live distributed object first used informally series presentations given fall 2006 icws conference stc conference msr labs redmond wa formally defined 2007 ieee internet computing article originally term used refer types dynamic interactive web content hosted servers data centers rather stored end-user client computers internally powered instances reliable multicast protocols word live expressed fact displayed information dynamic interactive represents current fresh live content reflects recent updates made users opposed static read-only archival content pre-assembled word distributed expressed fact information hosted stored server data center rather replicated among end-user computers updated peer-to-peer fashion stream multicast messages may produced directly end-users consuming content comprehensive discussion live object concept context web development found krzysztof ostrowski ph.d. dissertation general definition presented first proposed 2008 paper published ecoop conference extension term motivated need model live objects compositions objects sense concept inspired smalltalk pioneered uniform perspective everything object jini pioneered idea services objects applied live distributed objects perspective dictates constituent parts includes instances distributed multi-party protocols used internally replicate state also modeled live distributed objects need uniformity implies definition live distributed object must unify concepts live web content message streams instances distributed multi-party protocols first implementation live distributed object concept defined ecoop paper live distributed objects platform developed krzysztof ostrowski cornell university platform provided set visual drag drop tools composing hierarchical documents resembling web pages containing xml-serialized live object references visual content chat windows shared desktops various sorts mashups could composed dragging dropping components representing user interfaces protocol instances onto design form connecting together since moment creation number extension developed embed live distributed objects microsoft office documents support various types hosted content google maps march 2009 platform actively developed creators
[ 6025, 2109, 1047, 3531, 5631, 6986, 3172, 8124, 3377, 84, 8174, 5731 ]
Test
383
9
Label_(computer_science):label computer science label programming language sequence characters identifies location within source code languages labels take form identifier often followed punctuation character e.g. colon many high level programming languages purpose label act destination codice_1 statement assembly language labels used anywhere address example operand codice_2 codice_3 instruction also pascal derived variations languages fortran basic support numeric labels labels also used identify entry point compiled sequence statements e.g. debugging c label identifies statement code single statement multiple labels labels indicate locations code reaching label effect actual execution function labels consist identifier followed colon label points statement function identifier must unique within function functions may use name label label identifiers occupy namespace – one variables functions name label error label statement goto used jump labeled statement code codice_4 program execution continues statement label two types labels put switch statement case label consists keyword codice_5 followed expression evaluates integer constant default label consists keyword codice_6 case labels used associate integer value statement code switch statement reached program execution continues statement case label value matches value parentheses switch case label default label program execution continues statement default label default label program execution continues switch within single switch statement integer constant associated case label must unique may may default statement restriction order labels within switch requirement case labels values evaluate integer constants gives compiler room optimizations top //label outermost for-loop var 0 4 i++ alert i= j= j //i=2 j=3
[ 1361, 336, 5948, 7333, 6497, 4719, 2803, 2079, 1435 ]
Validation
384
7
Benefitalign:benefitalign benefitalign cloud-based saas company based albuquerque nm united states offices dubai india benefitalign founded girish panicker 2011 develops custom software products healthcare market best known products include stateengage healthplanengage brokerengage benefitalign american software company primarily develops licenses supports sells software related services health care industry benefitalign also provides contact center services crm consulting services company found early success rapid changes healthcare industry result patient protection affordable care act 2010 ppaca encouraging health care industry implement consumer friendly technologies self-service models benefitalign ’ cloud based solution complimented new movement allowing customers quickly set-up customize new sales channels benefitalign platform enterprise system provides crm based infrastructure manage member data provide extensibility across enterprise allowing platform developed needed benefitalign initially launched 2011 girish panicker health care software development consultancy specifically created speridian focus selling quote card shopping enrollment software healthcare market 2013 company connected nearly 1 million consumers health plans multiple states supported several state exchanges october 2013 benefitalign launched three major health plans using integrated oracle siebel benefitalign platform florida virginia arizona avmed health plans launched florida initially served 300,000 people optima health provided coverage 450,000 people virginia university arizona ’ health plans arizona 150,000 members
[ 330 ]
Test