node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
385 | 4 | Comodo_Internet_Security:comodo internet security comodo internet security cis developed distributed comodo group freemium internet security suite includes antivirus program personal firewall sandbox host-based intrusion prevention system hips cis 5.0 cloud antivirus protection spyware scanning capabilities added could clean malware found effectively comodo cleaning essentials developed supplement cis host-based intrusion prevention system comodo host-based intrusion prevention system hips named defense+ designed provide protection unknown malware designed restrict actions unknown applications restrict access important files folders settings windows registry defense+ default refuses unknown program install execute except specifically allowed user file appears comodo whitelist cis 4.0 sandbox added defense+ isolate run unknown applications cis v6 released february 2013 provided major revision user interface significant new features fully sandboxed desktop environment 6 march 2014 comodo announced completion beta testing cis v7 release 7 became official april 2014 release includes new virus monitoring tool called virusscope web filtering features provide control user access web content release 8 became official 3 november 2014 includes enhanced auto-sandboxing features release 10 became official 22 december 2016 includes secure shopping prevention malware intercepting online transactions release 11 became official 26 june 2018 includes many stability performance changes comodo endpoint security manager cesm server product centrally managing security settings security components network endpoint computers cesm manages distribution updates antivirus firewall software antivirus firewall software managed cesm versions software used consumer versions comodo internet security pc magazine lead security analyst neil j. rubenking reviewed comodo firewall pro 3.0 comodo internet security 3.5 3 november 2008 giving 4.5 5 first 2.5 second praised suite firewall capabilities criticized antimalware capabilities 28 may 2009 roboert vamosi pc world reviewed comodo internet security 3.8 gave score 1 5 criticizing disappointing malware detection based av-test result limited feature set three years three version later comodo antivirus results became significantly better 30 january 2012 rubenking reviewed comodo internet security 2012 pro v5.0 giving 4 stars 5 praised support service antimalware features panned effectively default firewall defense+ popups lack parental control antispam antiphishing privacy protection features finally low ratings independent labs 9 january 2013 review techworld awarded comodo internet security pro 2013 4 5 stars concluded cloud-based scanning behaviour analysis joins suite top-notch security tools designed keep pc secure recommended also date mike williams betanews.com reviewed comodo internet security pro 2013 concluded program remains complex total pc beginners suspect average user appreciate largely automatic operation though experts enjoy powerful tools extreme configurability 7 february 2013 comodo internet security complete v6 earned pc magazine editor choice award reviewing software neil j. reubenking gave score 4.5 5 stars commended support service vpn solution comodo secure dns service value price criticized behavior blocker poor anti-phishing capabilities reubenking concluded biggest win comodo internet security complete 2013 n't features support geekbuddy service fixes problem security otherwise using remote assistance virus-free guarantee reimburses damage malware gets past comodo also get reimbursed expenses related identity theft add geekbuddy-powered tuneup tool unusually powerful backup utility 've got winner av-test anti-virus test lab based germany tested comodo products surpass industry standard measured mean score participating products awarded certificate comodo internet security participated tests since 2010 first time february 2013 comodo internet security premium version 6.0 obtained av-test certificate field home products 18 january 2013 matousec independent tester security software analyzed 38 security products proactive defense capabilities ranked comodo internet security 2013 premium v6 number one comodo internet security 2013 tested windows 7 sp1 internet explorer 9 passed 101 110 tests 92 also ranked number 1 2012 | [
1809,
7536,
1838,
4689,
6107,
3637,
6456,
7193,
73,
6149,
7597,
3680,
88,
5452,
91,
4759,
806,
1931,
2296,
4783,
496,
7275,
5144,
142,
3394,
6560,
7289,
4091,
7683,
4456,
6235,
6951,
875,
6962,
1249,
4115,
3089,
4492,
7351,
4138,
910,
... | Test |
386 | 2 | UberStudent:uberstudent uberstudent free open-source computer operating system collection programs aimed toward especially higher education secondary students teachers schools dubbing linux learners uberstudent describes cohesive academic success curriculum integrated installable easy-to-use full-featured learning platform aimed increasing overall student learning academic computer literacy lifelong computer fluency additional aim increase adoption free open-source computing platforms like within higher education secondary schools designed around core academic skills approach student success describes research writing reading studying self-management skills essential students regardless academic major uberstudent described reviewers highly tune student needs loaded student-friendly tools customizations perfect higher education environment succeeding aims aplomb elegance power smart pick getting actual schoolwork done fantastic delicious received positive review chronicle higher education cited uberstudent completeness core academic work user-friendliness free open-source nature sixty days uberstudent official 15 july 2010 release uberstudent 1.0 cicero full edition first non-beta distrowatch ranked popular linux distribution education worldwide 32nd popular overall 316 varied distributions tracked organization weeks 4.1 release ranked fifth-most popular linux distribution world uberstudent current release 4.3 dubbed heraclitus distribution uses dedicated software repository run live cd usb flash drive installed computer harddrive either one mediums support last published version uberstudent 4.3 based ubuntu 14.04 ended may 2019 may 26 2019 website unreachable uberstudent founder lead developer stephen ewen u.s.-based educator specializes postsecondary literacy academic success strategies educational technology began uberstudent said way place set smart dedicated computing tools right amount support hands students whether currently within higher education preparing secondary school stated goal uberstudent students learn really excel core skills habits need become everything academically professional life ewen stated uberstudent part inspired experiences achieving top academic performance assistance educational technology ewen described uberstudent overarching design philosophy one provides unified system learning teaching academic success within said uberstudent takes calls core academic skills approach delineated skills research writing studying self-management required students across academic majors stated uberstudent easily extended specific majors via additional software ewen additionally asserted part due uberstudent open source cross-platform nature well unix-like base geared produce computer fluency among users less natural outcome ewen argued academic institutions increase student learning outcomes economic efficiency broadly adopting open source application system software everyday student academic computing needs additionally argued academic institutions increase involvement developing open source tools uberstudent citing successes bibliographic manager zotero george mason university included among uberstudent set core academic programs nearly uberstudent software free open-source core programs cross-platform adopters avoid vendor lock-in whether windows mac os x linux tech review site dedoimedo reviewed uberstudent containing superb collection smartly selected programs probably best comes serious work stitched fabric operating system tech columnist jack wallen said uberstudent contains many education-specific tools spending first days marveling developers packed one single operating system uberstudent core programs academic work clustered within applications menu entry education organized sub-categories including reading research writing self-management study aids subjects utilities sub-categories addition academic-specific application set reviewers noted uberstudent inclusion templates academic work tons on-board how-to guides welcome additions often missing operating systems uberstudent also contains full range student-oriented programs multimedia games graphics internet several categories within separate menu contains select cloud computing applications described containing additions n't often see elsewhere within stated intent couple user-friendliness security stability uberstudent production releases based xubuntu long term stable releases stems debian linux uberstudent also includes numerous self-developed programs well update manager deb file format manage update platform uberstudent main editions distributed dvd image pre-made disc full edition features xfce desktop environment lightweight edition lxde desktop environment lxde lightweight edition greatly scaled intended solely re-invigorate low-specification older computers fits single cd amid decision feature xfce uberstudent full editions ewen stated uberstudent must prefer stability dependability traditional usability novel comes major thing basic desktop environments uses uberstudent 2.0 release cycle ewen criticized designs ubuntu unity gnome 3 shell linux desktop environments hindrances student academic computing productivity 2011 april fools day satire announced uberstudent dumbed edition featuring gnome 3 shell pointing called enforced helplessness leading learned helplessness says gnome 3 developers designed new desktop environment stated intent behind spoof uberstudent edition obscure obvious easy continually avoided students thus never learned may 2011 interview ewen expanded criticisms unity gnome 3 citing specific usability issues stated uberstudent plans adopt either unity gnome 3 shell amid uberstudent 3.0 release cycle ewen criticized cinnamon desktop environment developed linux mint pointing called major shortcomings cinnamon stipulated failure honor certain fundamental freedesktop.org standards ewen stated desktop environment holds promise cinnamon full may 2013 version 1.8 release actually beta-quality software characterized cinnamon yet suited serious stable workstation according ewen uberstudent dubs major releases famous historical thinker practice describes fitting light uberstudent educational mission far thinkers greek roman uberstudent version 0.9 first beta released 15 january 2010 named thales version 1.0 released 15 july 2010 named cicero 1.0 also brief pre-release edition inadvertently reviewed release edition uberstudent 1.0 cicero lightweight edition released 4 september 2010 inherited name cicero full edition uberstudent 2.0 dubbed plato uberstudent 3.0 dubbed aristotle 4.0 release socrates current release 4.3 dubbed heraclitus 5.0 delayed son diagnosed acute lymphoblastic leukemia link post http //uberstudent.com/phpbb/viewtopic.php f=3 t=1315 | [
2961,
3915,
5704,
3751,
578,
788,
5232,
1805
] | Validation |
387 | 2 | Virtual_Machine_Communication_Facility:virtual machine communication facility ibm virtual machine communication facility vmcf feature vm/370 operating system introduced release 3 1976 provides method communication data transfer virtual machines operating vm/370 system vmcf uses paravirtualization diagnose instruction vmcf codice_1 function send data blocks 2048 bytes one virtual machine another receiving virtual machine accesses data thru diagnose codice_2 function | [
5041,
5571
] | Test |
388 | 7 | Stickers_as_a_Service:stickers service stickers service saas category cloud computing services provides digital stickers messaging apps photo editing software model stickers sold stores integrated messaging apps chat photo editing software used method generate revenue besides in-app advertising non-intrusive saas offerings may include handling micro payments sticker shop integration content management systems developing apps similar software service saas platform service paas stickers service enables developers build full sticker stores apps lines code digital stickers tend depict either original well-known characters used chat sessions users act large sized emoji express emotions decoration photographs stickers vary original characters popular manga anime gaming characters movie tie-ins purchased downloaded free apps sticker stores installed limited edition stickers may also gained via special occasions achievements used alternative emoji emoticons expressive form communication variety designs art styles | [
1544,
2961,
330
] | Validation |
389 | 2 | Richard_Fontana:richard fontana richard fontana lawyer united states particularly known work area open source free software fontana works red hat red hat counsel software freedom law center sflc 2012 fontana began drafting copyleft-next modification gnu general public license version 3 gplv3 sflc fontana one three principal authors along richard stallman eben moglen gplv3 gnu lesser general public license version 3 lgplv3 gnu affero general public license currently member-elected director open source initiative fontana attended hunter college high school new york city received bachelor degree history wesleyan university master degree computer science yale university law degree university michigan law school | [
966,
6586
] | Test |
390 | 3 | ARM_System-on-Chip_Architecture:arm system-on-chip architecture arm system-on-chip architecture book detailing system-on-chip arm architecture specific implementation reduced instruction set computing written steve furber co-designed arm processor sophie wilson book content covers architecture assembly language programming support mechanisms high-level programming languages instruction set building operating systems thumb instruction set also covered detail cited numerous academic papers recommended working development embedded systems | [
5571,
6497,
336
] | Test |
391 | 2 | Berkeley_Timesharing_System:berkeley timesharing system berkeley timesharing system pioneering time-sharing operating system implemented 1964 1967 university california berkeley designed part project genie marketed scientific data systems sds 940 computer system first commercial time-sharing allowed general-purpose user programming including machine language mid-1960s computers used batch processing one user time interactivity pioneering systems atlas supervisor university manchester compatible time-sharing system mit dartmouth time sharing system dartmouth college required large expensive machines implementation started 1964 arrival sds 930 modified slightly operating system written scratch students worked berkeley timesharing system included undergraduates chuck thacker l. peter deutsch doctoral student butler lampson heart system monitor roughly usually called kernel executive roughly usually called command-line interface system working max palevsky founder scientific data systems first interested selling product thought timesharing commercial demand however customers expressed interest put sds pricelist expensive variant 930 november 1967 sold commercially sds 940 august 1968 version 2.0 announced called sds 940 time-sharing system timesharing systems generally one-of-a-kind systems limited single application teaching dartmouth basic 940 first allow general-purpose programming sold 60 units large today standards significant part sds revenues one customer bolt beranek newman tenex operating system pdp-10 mainframe computer used many features sds 940 time-sharing system system extended memory management include demand paging concepts operating system also influenced design unix whose designer ken thompson worked sds 940 berkeley qed text editor first implemented butler lampson l. peter deutsch berkeley timesharing system 1967 another major customer tymshare used system become usa best known commercial timesharing service late 1960s 1972 tymshare alone 23 systems operation | [
4566,
1522,
1574,
5571,
190,
4670,
56,
5911
] | Test |
392 | 8 | Personal_web_server:personal web server personal web server pws system hardware software designed create manage web server desktop computer used learn set administer website also serve site testing dynamic web pages one main functions pws provide environment web programmers test programs web pages therefore pws supports common server-side programming approaches used production web servers personal web server personal server short allows users store selectively share publish information web home network unlike types web servers personal web server owned controlled individual operated individual needs instead company implemented different ways personal web server conceptually opposite web server website operated third parties software service saas cloud model | [
2961,
330,
84,
4627
] | Test |
393 | 5 | Sleipnir_(web_browser):sleipnir web browser sleipnir tabbed web browser developed fenrir inc browser main features customization tab functions supports html5 different layout engines names sleipnir fenrir animals norse mythology sleipnir originally created japanese released english chinese translations translations performed volunteer translators available ios macos microsoft windows android windows phone sleipnir originally developed yasuyuki kashiwagi november 2004 computer containing sleipnir source code stolen 2005 kashiwagi established fenrir co. start development new version sleipnir starting version 2 new versions compatible original 2006 sleipnir 6 market share japan sleipnir one twelve browsers originally offered browser ballot screen eu edition windows 7 xp vista update users could choose internet explorer browsers installation process stable version 5.0 released december 24 2013 latest blink engine latest stable version 6.0 windows version browser layout engine changed internet explorer trident mozilla gecko supported version 3.5.0.4000 support webkit rendering engine implemented gecko rendering engine support terminated features include tab grouping mouse gestures page zooming search bar greasemonkey-like user script support plugin support bookmarks sleipnir synced different platform using function called fenrir pass sleipnir version 5 onward introduce proprietary text rendering visually resembling mac os text rendering feature mentioned mac feature set sleipnir 2 windows sleipnir 2 features customizable functions add-ons created users sleipnir 2 one browsers still support windows 98 sleipnir 3 windows includes tab options tab groups touchpaging flick tabs using mouse mouse gestures sleipnir 3 mac switch tabs swiping tabs left right-click operate tabs using gestures tiledtab pinch-in trackpad view list tabs hold go hold link open background ad block tab groups managing tabs sync bookmarks devices using fenrir pass standard full-screen mac os x lion sleipnir 4 windows sleipnir 4 windows introduced minor interface improvements smart tabs adding positioning deletion tabs determined based relationship previous next tabs 150 mouse gesture functions added google chrome extensions support sleipnir 4 mac thumbnail tab navigation open tabs shrunk anymore instead presented scrollable list tab titles appearing mouse hover portal field bar double functionality navigation bar search tiledtab view mode gives overview opened tabs allows sorting tabs six groups improved gesture controls sleipnir 5 windows sleipnir 5 windows integrated features introduced sleipnir 4 mac smooth osx-like font rendering engine introduced site updates feature shows personalized recommendations articles often visited sites added touch screen support sleipnir 6 windows sleipnir 6 windows adds favtab quick navigation favorite sites smartsearch searching via highlighting resizable portal field sleipnir mobile following mobile versions sleipnir smartphones released android ios windows phone early gecko-based versions sleipnir windows scored positive reviews cnet design functionality noticeably inclusion gestures “ action smooth natural lot like scrolling pages phone thumb. ” osx version review makeuseof followed generally line additionally bringing attention convenient tab management macworld reviewing sleipnir 4 mac praised url bar changed “ opera pioneered idea sleipnir ’ tabs remain constantly visible strike nice balance large enough identify small enough intrude main browser window. ” despite version 4 criticized poor performance compared browsers using webkit later versions sleipnir received positive reviews softpedia due browsers customizability features availability mobile versions “ sleipnir proves stable fast web browser comes innovative functions various customization possibilities extra security features together smartphone web apps linking features make viable alternative popular competitors. ” 2012 multiple performance tests tom hardware android version sleipnir placed third spot best browser android outrun dolphin maxthon | [
4655,
6802,
5378,
7537,
6809,
3291,
2574,
2577,
6452,
3655,
4352,
4725,
4357,
1136,
6858,
445,
1152,
1525,
4759,
7975,
7628,
5821,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
6582,
7692,
5887,
6966,
5542,
1276,
5571,
7015,
... | Test |
394 | 1 | The_Plant_List:plant list plant list list botanical names species plants created royal botanic gardens kew missouri botanical garden launched 2010 intended comprehensive record known names plant species time produced response target 1 2002-2010 global strategy plant conservation gsp c updated since 2013 superseded world flora online october 2012 follow-up project world flora online launched aim publish online flora known plants 2020 developed collaborative group institutions around world response 2011-2020 gspc ’ updated target 1 aims achieve online flora known plants 2020 complementary project called international plant names index kew also involved ipni aims provide details publication aim determine accepted species names newly published names automatically added ipni world checklist selected plant families database underlies plant list plant list 1,064,035 scientific plant names species rank 350,699 accepted species names belonging 642 plant families 17,020 plant genera plant list accepts approximately 350,699 unique species 470,624 synonyms species suggests many species referred one name plant list determined another 243,000 names unresolved meaning botanists far unable determine whether separate species duplication 350,699 unique species plant list launched 2010 international year biodiversity attracted media attention comprehensive approach fox news highlighted number synonyms encountered suggesting reflected surprising lack biodiversity earth plant list also attracted attention building work english naturalist charles darwin 1880s started plant list called index kewensis ik kew added average 6,000 species every year since ik first published 400,000 names species however ik 1913 avoided making taxonomic judgement citations currently run part ipni rather plant list | [
845,
4598,
7336,
4602,
518
] | Test |
395 | 3 | RedSleeve:redsleeve redsleeve free operating system distribution based upon linux kernel derived red hat enterprise linux rhel distribution ported arm architecture redsleeve derived free open source software made available red hat inc. produced maintained supported red hat specifically product built source code red hat enterprise linux versions terms conditions red hat enterprise linux eula gnu general public license name redsleeve chosen makes intuitively obvious upstream distribution derived time implying arm platform sleeves covering arms redsleeve different red hat enterprise linux derivatives centos scientific linux also port new platform arm supported upstream distribution first official alpha release made available february 12 2012 redsleeve aims maintain equal versioning upstream distribution terms distribution release numbering individual package release numbering exception packages modified upstream release done order either remove upstream branding required upstream distributions terms conditions order apply additional patches required make package build work arm architecture time writing upstream distribution support cases .0 appended package version distribution tag redsleeve linux 6 covered register may 29 2012 | [
1663,
4233,
2091,
3559,
4455,
4008,
5571,
6586,
5232,
3751,
578,
1284
] | Test |
396 | 3 | Olivetti_M24:olivetti m24 olivetti m24 computer sold olivetti 1983 using intel 8086 cpu system sold united states original name docutel/olivetti dallas xerox bought rights rebadge system pc 6300 xerox 6060 series respectively owned 25 olivetti around time 6300 launched june 1984 first attempt compete pc compatible market contrary pc clones era m24 highly compatible ibm pc one characteristics use powerful 8.0 mhz intel 8086 cpu rather 4.77 mhz intel 8088 used ibm pc xt configured maximum mode allowed direct installation 8087 math co-processor also 8 mhz motherboard cpu clock along others machine serial baud rate generator ibm-standard 14.3 mhz crystal used expansion board divided 24.0 mhz master crystal cpu timing particular using intel 8284 clock generator per ibm pc produce 33 duty cycle squarewave required 8086 system designed split-level motherboard screwed onto underside computer case connected isa bus backplane top section case via video card rather occupying isa slot two female edge connectors plugs onto ends motherboard backplane doubling bridge m24 seven 8-bit isa slots standard time number slots exact figure seeming vary one least four across extant machines proprietary second connectors accept olivetti-specific 16-bit cards machine bad luck launching months ibm pc-at introduced entirely different 16-bit connector signalling standard extension pc bus known simply isa ended featuring slots incompatible three fronts physical configuration complement arrangement signals data transfer rate significantly restricting number compatible 16-bit cards produced initial release 6300 either one two 360k 5.25 floppy drives hard disk offered 1986 began offering 3.5 720k floppies 20mb hard disks xerox 6060 came standard single 360k 5.25 drive 20mb hard drive iomega bernoulli 10/10 removable cartridge drive also offered factory option well small expansion sidecar hosting hard drive users found internal space left floppies expansion cards 6300s made 1986-1987 bios version 1.43 added proper support 3.5 floppies fixed number bugs contemporary systems bios upgrade required physical chip replacement provided 35 m24/6300 unusual enhanced 32 kib cga-compatible video card addition standard 200-line cga graphics modes automatically line doubled transparent software text modes also using 400 scanlines higher quality 8x16 pixel fonts even 16x16 40-column mode expansion rom also supported additional 640x400 pixel graphics mode well poorly documented 512x256 mode compatibility earlier m20 model conjunction z8000-based emulator card included necessary additional clock source modes non-interlaced albeit running then-common 50 hz vsync rate required dedicated oem 26.3 khz 12 monitor either colour multi-level monochrome comparatively high line frequency m20 mode using 24 mhz system master crystal drive pixel clock either directly 320x200 8x16 40-character divided two comparison contemporary ibm displays ran 15.8 21.9 khz 14.3 16.3 mhz dot clocks colour depth remained standard fixed 4-colour cga palettes 320x200 monochrome higher modes selectable rgb foreground colour/one 15 shades fixed black background could expanded 4 8 colours/greyscales resolutions 16 512x256 addition graphics memory expansion board holding 32 96 kib ram resolution colour relationship unintuitive due crtc bandwidth addressing limitations 16 colours 640-pixel modes effectively combined standard expansion memory spaces single 64-bit wide bank expansion card also monitor port built allowing native dual-monitor support cga compatibility necessarily limited rgb modes well behaved software used bios-preset modes n't attempt much clever direct reprogramming crtc registers including setting pseudo-text hack modes like 160x100 16 colours composite video output available although basic register settings remained others necessarily different line doubling trickery type crtc hack altered scan rates olivetti protective scrambler chip attempted convert custom settings nearest safe equivalents could go far turn machine headline 640x400 graphics mode received moderate level support software developers mostly serious applications lotus 1-2-3 symphony earl weaver baseball however example game use time supported emulated well extended e.g 752x410 various super ega mode monitor cards ati ega wonder well replacement video card could used 6300 long designed work either specifically machine high speed 16-bit cards ibm pc compatible mode necessarily 8-bit 4.77 mhz however original graphics card remain place even longer use formed essential part bridge connecting expansion board motherboard although featured dip switch jumpers select mda/hercules 40 80 column cga expanded video options including per ibm motherboard settings disable switch instead socketed motorola hd6845 crtc main controller chip removed replaced simple remarkably expensive bridging circuit user installed set jumper wires correct half-dozen socket terminals bypass necessary bus signals card untouched plasma-screen early lcd based portables compaq manufacturers also copied m24/6300 graphics hardware make better use early square-pixel 640x400 panels popular japanese non-ibm portables still well suited basic cga/ega resolutions much ega-high mda/ega text unable show mcga/vga-high hercules graphics without cropping losing details ibm compatible hardware ecosystem otherwise avoided mode however remained whole poorly supported oddity much like ibm pgc super egas outside limited library applications direct driver support pc graphics whole exceed 640x350 16 colours 720x348 monochrome arrival vga standard windows 3.0 provided simple one-driver-for-all-programs framework future expansion cards build keyboard used proprietary 9-pin d-sub connector built system board unusual option plugging mouse keyboard via another 9-pin d-sub connector mouse could configured simulate usage keyboard arrow keys dos applications without mouse support aided choice parallel quadrature encoding design per microsoft bus mouse amiga atari st mice modified work 6300 instead latterly common 9-pin serial transmission europe olivetti also launched 10.0 mhz version olivetti m24 sp announced november 1985 contender title highest clocked 8086 computer processor fastest grade 8086-2 rated maximum speed exactly 10.0 mhz support motherboard featured switchable 24/30 mhz master crystal still divided 3 produce 33 duty cpu clock additional 4 mhz crystal maintain clock signal peripherals required video board receiving 24 mhz crystal maintain image size scan frequencies processor speeds january 1985 review infoworld declared fair performer better 8088-equipped ibm pc pc xt equal 8086-based compaq deskpro taking pricing account concluded good deal means perfect reviewer wondered 5 mhz 8086 compaq ran fast processor 8 mhz machine however appears misunderstanding given compaq switchable guaranteed ibm pc-compatible 4.77 mhz enhanced-performance 7.16 mhz clock rate respectively one-third one-half ntsc colourburst crystal used ibm olivetti/at defaulted latter boot detailed publications time endlessly misreported including 8 mhz frequently miscalculated 7.14 mhz ever since reason behind m24/6300 failure perform better equal 1/9th-slower deskpro may traceable hinted infoworld review poorly optimised graphics routines bios would particularly noticeable effect high resolution 640x400 extended colour modes november 1985 review pc magazine hard drive-equipped version found par 6 mhz 80286 equipped ibm pc far processor performance concerned considerably slower i/o initial model 6300 hard disk 360k floppy slow sales 1984 28,500 sold compared 1.5 million ibm pcs sales much better first three months 1985 8,500 sold time period fact worldwide sales olivetti m24 42,000 first year well planned production capacity 200,000 result introduced faster models hard drive math co-processor march still one year market claimed 1 pc market par televideo columbia data products well compaq kaypro december 1986 however pc line including 6300 plus described put fourth place terms market share us olivetti m24 much better europe became market leader 1986 company produced almost half million m24 machines year 200,000 went united states claimed crown pc machines sold europe year olivetti also became third largest pc manufacturer worldwide olivetti would however unable repeat feat subsequent years 1986 represents company apogee terms pc market share 6300 also supported unix-based operating systems particularly venix/86 encore released september 1984 version xenix adapted machine santa cruz operation announced june 1985 october 1985 launched 6300 plus used 6 mhz 286 microprocessor case 6300 hardware level machine criticized infoworld reviewer incompatible cards hand sold package 6300 plus bundled simultask ran ms-dos unix system v simultaneously cost—with software licenses included—on par ibm pc ms-dos alone review pc magazine declared 6300 plus flat better machine compared ibm pc version simultask included machine based locus computing corporation merge software according 6300 plus used non-standard hardware make feat possible given limitations 80286 pc6300 plus shipped ms-dos 1985 though unix system v distribution would ready end march 1986 6300 plus sell well original 6300 forrester research estimated december 1986 financial losses pc market 600m year 6300 plus announced turning production development pc products olivetti 1987 offered true at-based 286 6310—a rebadge olivetti m28 equipped one-wait state 8 mhz processor pretty slow machine class even slower ibm xt 286 simultask also option 6310 later-released 6312 addressed speed problem 12-mhz cpu announcement 6310 april 1987 announced price cuts across 6300 pc product line 6300 plus discounted 27-38 original 6300 discounted 17-23 depending configuration response ibm launch ps/2 line olivetti revamped product line july 1987 include 3.5 floppy drives 5.25-to-3.5 converted bays though also introduced new 386-based products m24 m24 sp succeed m240 8086 10 mhz marketed usa 6300 wgs m28 m28 sp succeed m280 80286 12 mhz olivetti also introduced m380 series tower desktop using 80386 processor | [
4751,
7467,
4454,
914,
5784,
5571,
1237,
4277,
2118,
1947,
4018
] | Test |
397 | 9 | Yukihiro_Matsumoto:yukihiro matsumoto matsumoto chief architect ruby heroku online cloud platform-as-a-service san francisco fellow rakuten institute technology research development organisation rakuten inc appointed role technical advisor vasily inc. starting june 2014 born osaka prefecture japan raised tottori prefecture age four according interview conducted japan inc. self-taught programmer end high school graduated information science degree university tsukuba member ikuo nakata research lab programming languages compilers works japanese open source company netlab.jp matsumoto known one open source evangelists japan released several open source products including cmail emacs-based mail user agent written entirely emacs lisp ruby first piece software become known outside japan matsumoto released first version ruby programming language 21 december 1995 still leads development language reference implementation mri matz ruby interpreter april 2012 matsumoto open-sourced work new implementation ruby called mruby minimal implementation based virtual machine called ritevm designed allow software developers embed ruby programs keeping memory footprint small performance optimised december 2014 matsumoto open-sourced work new scripting language called streem concurrent language based programming model similar shell influences ruby erlang functional programming languages matsumoto listed investor treasure data many company programs fluentd use ruby primary language matsumoto married four children member church jesus christ latter-day saints standard service missionary counselor bishopric church ward | [
1532,
5369,
5116,
6428,
1361,
5927,
3021,
4151,
1287,
3879,
3889,
2600,
7671,
952,
8137,
5965,
1989,
5621,
1247
] | Test |
398 | 3 | Virtual_legacy_wires:virtual legacy wires virtual legacy wires vlw transactions interconnect fabric replaced particular set physical legacy pins intel microprocessors legacy wires replaced include intr a20m smi legacy signals | [] | Test |
399 | 2 | Soft_reference:soft reference soft reference reference garbage-collected less aggressively soft reference one strengths levels 'non strong reference defined java programming language others weak phantom order strongest weakest strong soft weak phantom soft references behave almost identically weak references soft weak references provide two quasi-priorities non-strongly referenced objects garbage collector always collect weakly referenced objects collect softly referenced objects algorithms decide memory low enough warrant soft references may used example write free memory sensitive cache cached objects kept enough heap space cases weakly referenced objects may reclaimed quickly make cache useful | [
1616,
1640,
7460,
401,
379
] | Test |
400 | 3 | Emerald_Dragon:emerald dragon game utilises top-down overhead perspective players move controllable character two dimensions player moves around world map may encounter battles turn-based time point system movements attacks sap bar top screen character turn ends bar depleted role-playing game experience points collected defeating enemies used level-up playable characters main protagonist atorushan stronger attacks made available key items collected game called emerald graces transform dragon unleash powerful attack cost reducing hp used long time ago dragons humans lived peace land ishbahn lord tiridates believing existence dragons among humans defiles ishbahn places curse kills dragons area dragons collectively called dragon tribe manage escape find refuge draguria dimensional rift prevents humans crossing start game ship wrecks coast draguria protagonist dragon tribe youth named atorushan seeks friendship sole survivor human girl named tamryn white dragon leader tribe girl nurtured dragons land 12 years later leaves wants find happiness kind atorushan breaks left horn gives means summoning need assistance 3 years incident atorushan called white dragon aforementioned horn blown granting silver scale keep perishing curse ishbahn white dragon sends tend tamryn upon arriving atorushan learns entirety ishbahn attack evil armies controlled tiridates stop remove land curse needs find 5 emerald graces dragon-based treasures scattered around land resurrect emerald dragon greatest dragons destined bring miracle akihiro kimura successfully crowdfunded sequel audio series titled elemental dragoon 2015 based ideas proposed sequel emerald dragon back 1990s never got ground due apparent copyright issues though kimura others made several independent dōjinshi novels continuing story years series designed get around copyright issues focusing new characters slightly changing names title though original characters appear end hopefully allow akihiro kimura generate interest true sequel emerald dragon regain copyright emerald dragon maintains score 3.59/5 50 votes gamefaqs website july 2019 youtubers reviewed game given positive rating youtuber snes drunk said game would n't think emerald dragon among ranks best role playing games snes offer certainly worthwhile play want scratch jrpg itch 5:00-5:08 youtuber avalanche reviews commented english fan translation super nintendo version aside novelty recently translated japanese rpg emerald dragon also interesting stab changing traditional rpg format small effective ways 've grown tired slim pickings westerners awarded rpg department emerald dragon may exactly 're looking amazing example genre accomplish fun different well written change pace ultimately well worth time 6:30-6:56 | [] | Validation |
401 | 2 | Phantom_reference:phantom reference phantom reference kind reference java memory reclaimed phantom reference one strengths levels 'non strong reference defined java programming language others weak soft phantom reference weakest level reference java order strongest weakest strong soft weak phantom object phantomly referenced finalized java 8 earlier versions reference needs cleared memory finalized referent reclaimed change java 9 allow memory finalized referent reclaimable immediately phantom references limited use primarily narrow technical uses first used instead codice_1 method guaranteeing object resurrected finalization allows object garbage collected single cycle rather needing wait second gc cycle ensure resurrected second use detect exactly object removed memory using combination codice_2 object ensuring memory available example deferring allocation large amount memory e.g. large image previous memory freed | [
3077,
3351,
631,
379,
7347,
399,
7459,
7460,
3879,
2519,
2520,
6319,
2619,
4287
] | Test |
402 | 2 | IBM_Airline_Control_Program:ibm airline control program ibm airline control program acp discontinued operating system developed ibm beginning 1965 contrast previous airline transaction processing systems notable aspect acp designed run models ibm system/360 mainframe computer family departed earlier model airline different machine-specific transaction system development began sabre semi-automatic business research environment deltamatic panamac programmed airline reservations system pars developed 1969 control program acp separated pars pars keeping functions processing airline reservations related data december 1979 acp became known acp/tpf tpf transaction processing facility transaction operating system became widely implemented businesses major airlines online credit card processing hotel rental car reservations police emergency response systems package delivery systems last free release acp 9.2.1 intended use bank card similar applications shipped mini-reel contained complete acp system libraries restoration ibm 3340 dasd packs complete system one could easily create derivative works hypervisor included allowed os/370 vs1 vs2 svs mvs run guest os acp end-user documentation shipped tape took almost 60 linear inches shelf space see also ibm airline control system alcs variant tpf specially designed provide benefits tpf high speed high volume high availability transaction processing advantages easier integration data center offered running standard ibm operating system platform | [
4566,
7605,
4291,
6518,
4670,
6705,
8173,
7172,
299,
5481,
3371,
5571,
5041,
7546,
4421,
5396,
7003,
3874,
839,
4428,
850,
5244,
2786,
607,
2431,
3664,
6849,
4366,
265,
1516,
1994
] | Validation |
403 | 7 | Comparison_of_software_and_protocols_for_distributed_social_networking:comparison software protocols distributed social networking distributed social network projects generally develop software protocols | [
2451,
7967,
6428,
6908,
3383,
744,
6029,
48,
5506,
2430,
4635,
7214,
7494,
6948,
7687
] | Test |
404 | 4 | National_Vulnerability_Database:national vulnerability database national vulnerability database nvd u.s. government repository standards-based vulnerability management data represented using security content automation protocol scap data enables automation vulnerability management security measurement compliance nvd includes databases security checklists security related software flaws misconfigurations product names impact metrics nvd supports information security automation program isap friday march 8 2013 database taken offline discovered system used run multiple government sites compromised software vulnerability adobe coldfusion june 2017 threat intel firm recorded future revealed median lag cve2 revealed ultimately published nvd 7 days 75 vulnerabilities published unofficially making nvd giving attackers time exploit vulnerability addition providing list common vulnerabilities exposures cves nvd scores vulnerabilities using common vulnerability scoring system cvss based set equations using metrics access complexity availability remedy | [
1722,
4036,
4486,
3543,
5401,
6029,
2137,
2875,
2800,
1613
] | Test |
405 | 2 | Classic_Mac_OS:classic mac os classic mac os series operating systems developed macintosh family personal computers apple inc. 1984 2001 starting system 1 ending mac os 9 macintosh operating system credited popularized graphical user interface concept included every macintosh sold era developed many updates system software done conjunction introduction new macintosh systems apple released original macintosh january 24 1984 first version system software official name partially based lisa os apple previously released lisa computer 1983 part agreement allowing xerox buy shares apple favorable price also used concepts xerox parc alto computer former apple ceo steve jobs lisa team members previewed operating system consisted macintosh toolbox rom system folder set files loaded disk name macintosh system software came use 1987 system 5 apple rebranded system mac os 1996 starting officially version 7.6 due part macintosh clone program program ended release mac os 8 1997 last major release system mac os 9 1999 initial versions system software run one application time introduction system 5 cooperative multitasking extension called multifinder added later integrated system 7 part operating system along support virtual memory mid-1990s however contemporary operating systems windows nt os/2 nextstep brought pre-emptive multitasking protected memory access controls multi-user capabilities desktop computers macintosh limited memory management susceptibility conflicts among extensions provide additional functionality networking support particular device led significant criticism operating system factor apple declining market share time two aborted attempts creating successor macintosh system software called taligent copland four-year development effort spearheaded steve jobs return apple 1997 apple replaced mac os new operating system 2001 named mac os x retained user interface design elements classic mac os overlap application frameworks compatibility two operating systems otherwise completely different origins architectures final updates mac os 9 released 2001 provided interoperability mac os x name classic signifies historical mac os whole reference classic environment compatibility layer helped ease transition mac os x titled macos macintosh project started late 1978 jef raskin envisioned easy-to-use low-cost computer average consumer september 1979 raskin began looking engineer could put together prototype bill atkinson member apple lisa team introduced raskin burrell smith service technician hired earlier year apple concept macintosh deliberately sought minimize user awareness operating system many basic tasks required operating system knowledge systems could accomplished mouse gestures graphic controls macintosh would differentiate contemporaries ms-dos use command-line interface consisting terse abbreviated textual commands january 1981 steve jobs completely took macintosh project jobs number apple engineers visited xerox parc december 1979 three months lisa macintosh projects begun hearing pioneering gui technology developed xerox parc former xerox employees like raskin jobs negotiated visit see xerox alto computer smalltalk development tools exchange apple stock options final lisa macintosh operating systems use concepts xerox alto many elements graphical user interface created apple including menu bar pull-down menus concepts drag drop direct manipulation unlike ibm pc uses 8 kb system rom power-on self-test post basic input/output system bios mac rom significantly larger 64 kb holds key os code much original mac rom coded andy hertzfeld member original macintosh team able conserve precious rom space writing routines assembly language code optimized hacks clever programming tricks addition rom also coded kernel macintosh toolbox desktop accessories das icons operating system represent folders application software designed susan kare later designed icons microsoft windows 3.0 bruce horn steve capps wrote macintosh finder well number macintosh system utilities apple aggressively advertised new machine release company bought 39 pages advertisement space 1984 november/december edition newsweek magazine macintosh quickly outsold sophisticated much expensive predecessor lisa apple quickly developed product named macworks allowed lisa emulate macintosh system software system 3 time discontinued rebranded macintosh xl many lisa operating system advances would appear macintosh operating system system 7 later early versions mac os compatible motorola 68000-family macintoshes apple introduced computers powerpc hardware os ported support architecture mac os 8.1 last version could run 68k processor 68040 systems prior powerpc g3-based systems significant parts system stored physical rom motherboard initial purpose avoid using limited storage floppy disks system support given early macs hard disk one model mac ever actually bootable using rom alone 1991 mac classic model architecture also allows completely graphical os interface lowest level without need text-only console command-line mode boot time errors finding functioning disk drives communicated user graphically usually icon distinctive chicago bitmap font chime death series beeps contrast ms-dos cp/m computers time display messages mono-spaced font black background require use keyboard rather mouse input provide niceties low level early mac os depends core system software rom motherboard also ensure apple computers licensed clones copyright-protected roms apple run mac os several computer manufacturers years made macintosh clones capable running mac os 1995 1997 apple licensed macintosh roms several companies notably power computing umax motorola machines normally ran various versions classic mac os steve jobs ended clone-licensing program returning apple 1997 support macintosh clones first exhibited system 7.5.1 first version include mac os logo variation original happy mac startup icon mac os 7.6 first named mac os instead system changes made disassociate operating system apple macintosh models macintosh originally used macintosh file system mfs flat file system one level folders quickly replaced 1985 hierarchical file system hfs true directory tree file systems otherwise compatible improved file system named hfs plus hfs+ mac os extended announced 1997 implemented 1998 files file systems used dos windows unix operating systems one fork contrast mfs hfs give files two different forks data fork contains sort information file file systems text document bitmaps image file resource fork contains structured data menu definitions graphics sounds code segments would incorporated program file format systems executable file might consist resources including code segments empty data fork data file might data fork resource fork word processor file could contain text data fork styling information resource fork application ’ recognize styling information still read raw text hand forks would provide challenge interoperability operating systems copying transferring mac os file non-mac system default implementations would simply strip file resource fork data files contained nonessential information resource fork window size location program files would inoperative without resources necessitated encoding schemes binhex macbinary allowed user encode dual-forked file single stream inversely take single stream so-encoded reconstitute dual-forked file usable mac os part apple goal creating computer appliance-like simplicity explicit distinction made operating system software hardware runs early versions operating system distinct name software consists two user-visible files system file finder application used file management also displays desktop two files contained folder directory labeled system folder contains resource files like printer driver needed interact system version numbers operating system based version numbers two files releases run one application time except desk accessories though special application shells multi-mac switcher discussed multifinder could work around visible changes best reflected version number finder major leaps found 1.x 4.x 5.x 6.x late 1990s apple retroactively gave older releases single name towards end 1987 apple introduced package titled apple macintosh system software update 5.0 first time macintosh operating system offered distinct retail product included four 800k disks three manuals cost 49 usd software still freely available user groups bulletin board services product box presented update operating system version 5.0 number appear software three four disks system tools 1 system tools 2 utilities 1 bootable user boot whichever floppy contain tools user needs instance system tools 2 disk printer drivers utilities 1 disk disk first aid apple hd sc setup disks named system tools users press commonly referred version system tools 5.0 primary new feature system 5 multifinder extension lets system run several programs system uses cooperative multitasking model meaning time given background applications foreground application yields control change system functions applications already calling handle events make many existing applications share time automatically well allowed perform tasks background users also choose use multifinder thereby using single application time 1990 infoworld tested four multitasking options pc mac viewing multifinder positively overall noting presence halved speed file transfer printing compared single-tasking system 6 without multifinder system software 6 also referred system 6 consolidation release macintosh system software producing complete stable long-lasting operating system two major hardware introductions requiring additional support system 6 68030 processor 1.44 mb superdrive debuting macintosh iix macintosh se/30 later updates include support first specialized laptop features introduction macintosh portable system 6 forward finder unified version number closely matching system alleviating much confusion caused often considerable differences earlier systems may 13 1991 system 7 released major upgrade system 6 adding significant user interface overhaul new applications stability improvements many new features introduction coincides release provided support 68040 macintosh line system 7 era saw numerous changes macintosh platform including proliferation macintosh models 68k power macintosh transition well rise microsoft windows increasing use computer networking explosion popularity internet one significant features system 7 virtual memory support essential subsystem anticipated years exists previous systems third party extension named virtual connectix accompanying move 32-bit memory addressing necessary ever-increasing amounts ram available motorola 68030 cpu 68020 cpus 68551 pmmu process involves making routines os code use full 32-bits pointer address—prior systems used upper 8 bits flags change known 32-bit clean system 7 32-bit clean many existing machines thousands applications time process completed ease transition memory control panel contains switch disable feature allowing compatibility older applications another notable system 7 feature built-in cooperative multitasking system software 6 function optional multifinder system 7 also introduced aliases similar symbolic links unix shortcuts introduced later versions microsoft windows shadows ibm os/2 system extensions enhanced moved subfolder subfolder system folder also created control panels system 7.5 apple includes extensions manager previously third-party program simplified process enabling disabling extensions apple menu home desk accessories system 6 made general-purpose user could make often-used folders applications—or anything else desired—appear menu placing aliases apple menu items subfolder system folder system 7 also introduced following applescript scripting language automating tasks 32-bit quickdraw supporting so-called true color imaging previously available system extension truetype outline font standard trash system 6 earlier empties automatically shutting computer—or multifinder running launching application system 7 reimplements trash special hidden folder allowing files remain across reboots user deliberately chose empty trash command system 7.1 mainly bugfix release minor features added one major new features system 7.1 moving fonts system file fonts folder system folder previously resource-copying utility resedit font d/a mover required installing fonts system 7.1 first macintosh operating system cost money previous versions free sold cost floppies also received pro sibling version 7.1.1 extra features system 7.1.2 first version support powerpc-based macs system 7.1 also introduces system enablers method support new models without updating actual system file leads extra files inside system folder one per new model supported system 7.5 introduces large number new features many based shareware applications apple bought included new system newer powerpc machines system 7.5 may stability problems partly due new memory manager turned issues handling errors powerpc code powerpc exceptions map type 11 issues affect 68k-architecture machines system 7.5 contemporary apple failed copland effort well release windows 95 coincides apple purchase several shareware system enhancements include new system features stability improved powerpc-based macs mac os 7.6 dropped system moniker trademarkable name needed order license os growing market third-party macintosh clone manufacturers mac os 7.6 required 32-bit-clean roms dropped support every mac 68000 processor well mac ii mac iix mac iicx mac se/30 mac os 8 released july 26 1997 month steve jobs became de facto ceo apple mainly released keep mac os moving forward difficult time apple initially planned mac os 7.7 renumbered 8 exploit legal loophole accomplish jobs goal terminating third-party manufacturers licenses system 7 shutting macintosh clone market mac os 8 added number features abandoned copland project leaving underlying operating system unchanged multi-threaded finder included files could copied background gui changed appearance new shaded greyscale look named platinum ability change appearance themes also known skins added new control panel though platinum one shipped capability provided new appearance api layer within os one significant changes apple sold 1.2 million copies mac os 8 first two weeks availability 3 million within six months light apple financial difficulties time large grassroots movement among mac users upgrade help save apple even pirate groups refused redistribute os mac os 8.1 introduced updated version hierarchical file system named hfs+ fixed many limitations earlier system continued used macos macos high sierra replaced apple file system interface changes separating network features printing improvements application switching however underlying technical respects mac os 8 different system 7 mac os 8.5 focuses speed stability 68k code replaced modern code native powerpc also improved appearance user interface although theming feature cut late development mac os 9 last major revision classic mac os released october 23 1999 generally steady evolution mac os 8 early development releases mac os 9 numbered 8.7 mac os 9 added improved support airport wireless networking introduced early implementation multi-user support though true multi-user operating system mac os 9 allow multiple desktop users data system settings improved sherlock search engine added several new search plug-ins mac os 9 also provides much improved memory implementation management applescript improved allow tcp/ip networking control mac os 9 also makes first use centralized apple software update find install os hardware updates new features included on-the-fly file encryption software code signing keychain technologies remote networking file server packages much improved list usb drivers mac os 9 also added transitional technologies help application developers adopt mac os x features introduction new os public help ease transition included new apis file system bundling carbon library apps could link instead traditional api libraries—apps adapted could run natively mac os x well changes made beginning mac os 9.1 update allow launched classic environment within mac os x final update classic mac os version 9.2.2 released december 5 2001. macos originally named mac os x 2012 os x 2016 apple current mac operating system officially succeeded classic mac os 2001 although originally marketed simply version 10 mac os history largely independent earlier mac os releases macos architectural legacy successor mac os 9 classic mac os legacy however unlike classic mac os unix-based operating system built nextstep technology developed next late 1980s early 1997 apple purchased company ceo steve jobs returned apple macos also makes use bsd codebase xnu kernel core set components based upon apple open source darwin operating system early version operating system mac os x server 1.0 released 1999 retains platinum appearance classic mac os even resembles openstep places desktop version mac os x 10.0 followed march 24 2001 supporting new aqua user interface since several versions operating system released mac os x renamed os x 2012 macos 2016 users classic mac os generally upgraded mac os x criticized early years difficult less user-friendly original mac os lack certain features yet reimplemented new os slower hardware especially older hardware incompatibilities older os drivers printers scanners tablets etc written older mac os compatible mac os x due lack mac os x support older apple computers macintosh users continued using older classic mac os years original release mac os x. steve jobs encouraged people upgrade mac os x staging mock funeral mac os 9 wwdc 2002 powerpc versions mac os x including mac os x 10.4 tiger include compatibility layer running older mac applications classic environment originally codenamed blue box environment runs nearly complete mac os 9 operating system version 9.1 later mac os x application allows applications ported carbon api run mac os x reasonably seamless though classic applications retain original mac os 9 appearance gain mac os x aqua appearance early new world rom powerpc-based macs shipped mac os 9.2 well mac os x. mac os 9.2 installed user—it installed default hardware revisions released mac os x 10.4 well-written classic mac os applications function properly environment compatibility assured software written unaware actual hardware interact solely operating system classic environment available intel-based mac systems due incompatibility mac os 9 x86 hardware third-party macintosh emulators vmac basilisk ii executor eventually made possible run classic mac os intel-based pcs emulators restricted emulating 68k series processors could n't run versions mac os succeeded 8.1 required powerpc processors also required mac rom image hardware interface supporting real mac rom chip requiring image dubious legal standing rom image may infringe apple intellectual property notable exception executor commercial software product abacus research development product used 100 reverse-engineered code without use apple technology ran extremely quickly never achieved minor subset functionality programs completely compatible many extremely crash-prone ran executor filled niche market porting 68k mac applications x86 platforms development ceased 2002 source code released author late 2008 emulators using mac rom images offered near complete mac os compatibility later versions offered excellent performance modern x86 processor performance increased exponentially apple included mac 68k emulator ran seamlessly powerpc-based versions classic mac os comparison 68k-emulator development powerpc support difficult justify due anticipated wide performance overhead emulated powerpc architecture would later prove correct pearpc project despite availability 7th 8th generation x86 processors employing similar architecture paradigms present powerpc nevertheless pearpc emulator capable emulating powerpc processors required newer versions mac os however longer maintained like many emulators tends run much slower native operating system would another powerpc emulator sheepshaver around since 1998 beos powerpc platform 2002 open sourced efforts began port platforms originally designed use x86 platforms required actual powerpc processor present machine running similar hypervisor although provides powerpc processor support run mac os 9.0.4 emulate memory management unit examples include shapeshifter developer created sheepshaver fusion ifusion latter ran classic mac os powerpc coprocessor accelerator card using method said equal better speed macintosh processor especially respect 68k series due real macs running mmu trap mode hampering performance apple rosetta powerpc emulator intel-based macs support classic mac os | [
4297,
7161,
13,
2915,
4320,
5752,
4347,
2954,
4355,
65,
5781,
5783,
5786,
5787,
7223,
4373,
4376,
1522,
7242,
4397,
3001,
7259,
120,
126,
1562,
4423,
3025,
1574,
5859,
149,
1584,
1588,
5865,
3050,
163,
4453,
1599,
7306,
169,
3062,
7308,... | Test |
406 | 7 | Gigya:gigya gigya inc. technology company founded tel aviv israel headquartered mountain view california additional offices new york tel aviv london paris hamburg sydney offers customer identity management platform managing profiles preference opt-in consent settings gigya technology used many corporations including fox forbes repsol toyota bose rtl netherlands campbells fairfax media wacom asos turner gigya offers identity management platform businesses includes products customized registration social login user profile preference management user engagement loyalty integrations third-party marketing services platforms patrick salyer became ceo march 2011 2017 press release gigya named leader forrester wave customer identity access management q2 2017 september 2017 company acquired sap 350 million october 2017 gigya introduced enterprise preference manager address new privacy regulations november 2014 gigya raised 104m intel capital benchmark capital mayfield fund first round capital advance publications parent company condé nast dag ventures common fund capital vintage investment partners greenspring associates software maker adobe systems also investor 27 november 2014 syrian electronic army hijacked gigya.com domain changing dns configuration domain registrar shortly incident ceo gigya patrick salyer confirmed news officially gigya blog stating data compromised issue resolved within hour gigya identifying issue next day 28 november 2014 syrian electronic army issued statement taking responsibility attack | [
2489
] | Test |
407 | 4 | ZeroTier:zerotier zerotier inc technology company working computer networking industry one company products named zerotier one zerotier one open source software product licensed gplv3 establishes peer peer vpn p2pvpn connections laptops desktops phones embedded devices cloud resources apps zerotier one identified social vpn friend friend f2f used site site vpn companies well zerotier one networking establish direct connection peers even though behind nat traditional vpn connections internet established clients server server public ip address internet open ports computers devices connected lan usually connected internet nat router device home networking nat router usually device zerotier one uses stun hole punching establish direct vpn connections peers behind nat company also centralized web portal gui interface manage zerotier one networking interfaces root nodes installed internet known planets moons used establish connection similarly ice webrtc company formed venture capital offers paid plans enterprises private users use service free limit 100 peers one network zerotier one available multiple platforms multiple forms | [
8,
5039,
7848,
3775
] | Train |
408 | 4 | Physical_Security_Interoperability_Alliance:physical security interoperability alliance physical security interoperability alliance psia global consortium 65 physical security manufacturers systems integrators focused promoting interoperability ip-enabled security devices systems across physical security ecosystem well enterprise building automation systems psia promotes develops open specifications relevant networked physical security technology across industry segments including video storage analytics intrusion access control work analogous groups consortia developed standardized methods allow different types equipment seamlessly connect share data usb bluetooth psia created seven complementary specifications enable systems devices interoperate exchange data intelligence three specifications “ reference works ” family specifications service model psia common metadata event model psia common security model “ common models ” define describe various security events well computer network software protocols relevant security devices systems four psia specifications correspond domains security ecosystem ip media device specification recording content management specification video analytics specification area control specification base communications security events psia common metadata event model one reference works described psia specifications expected become critical security system architecture major users integrate video surveillance access area control mobile devices local cloud-based storage across common information technology platform psia liaison international electrotechnical commission two specifications access control video access control specification iec 60839-11-1 pending vote expected big impact manufacturing interoperability thousands access control systems psia common security model csec specification comprehensive psia specification protocol data user security covers security requirements definitions network session security key certificate management user permission management security definitions apply psia nodes common metadata event model provides common set services used disparate physical security technologies chemical/biological sensors intrusion devices video analytics traffic control sensors respond various types alerts specification allows vendors simplify interoperability communications simply putting device-specific information top baseline common metadata event model protocols services ip media device video specification enables interoperability among disparate products comply specification ip camera intrusion device video management access control system interoperability based specification eliminates need software development kits custom drivers interfaces essentially creates common api used device vms vendors offers alternative proprietary apis exist today psia recording content management racm specification version 1.1a describes psia standards recording managing searching describing streaming multimedia information ip networks includes support nvrs dvrs specification references psia service model ip media device specifications xml schema definitions xml examples included specification aid implementers developing standards-based products v1.0 video analytics specification vas specifies interface enables ip devices video management/surveillance systems communicate video analytics data standardized way scope initial release specification focuses entirely video analytics capabilities discovery analytic data output video analytic capabilities discovery include standard configuration data exchange enable analytic device communicate another device application basic analytic capabilities device level video channel level multichannel devices includes information psia vas version number supported analytic vendor information name software version number etc event types mechanisms supported supported configurations analytic output perspective v1.0 vas includes definition multiple types analytic events including alerts counts well video analytics metadata output specification standardizes communication access control intrusion products making interoperable overall security system specification takes advantage psia specs especially common metadata events model cmem harmonizing sharing data access control intrusion video analytics systems results optimized easily integrated security management psia currently offers access control profile intrusion detection profile derived psia ’ area control specification every manufacturer supports every use case covered area control specification complying applicable profiles manufacturers still build psia plug-and-play interoperability products products technology comply psia profile interoperate product technology psia compliant profile psia offers profiles test tool validate profiles implementation correct complete ensures manufacturers ’ products interoperate psia-compliant products 1500 companies registered 1.0 ip media device video specification since initial release march 2008 commercially available products systems psia-compliant include physical security information management psim systems video management systems surveillance cameras video analytics access control systems sensors intrusion detection devices david bunzel executive director data storage industry standards association began exploring surveillance video storage requirements 2007 physical security industry physical security industry known closed proprietary systems custom coding typically required integrate closed system system digital tool bunzel convened meeting security industry leaders discuss creating open standards physical security industry following companies initial meeting adesta adt anixter axis cisco csc ge security genetec ibm iqinvision johnson controls march networks pelco objectvideo orsus panasonic sony texas instruments verint vidyo psia supports license-free standards specifications vetted open collaborative manner offered security industry whole five active working groups ip video video analytics recording content management area control systems develop specifications specification developed variety ways including submission core document member company working group submission based input committee members either case document expanded reviewed working group members consensus determining features characteristics specification organization members include leading manufacturers systems integrators consultants end users include assa abloy cisco systems dahua hid hikvision honeywell ingersoll-rand inovonics iqinvision lenel kastle systems milestone systems nice systems objectvideo onssi proximex sccg tyco international utc verint vidsys z9 security | [] | Test |
409 | 4 | Tim_Newsham:tim newsham tim newsham computer security professional contributing security community decade performed research working security companies including stake guardent iss network associates originally secure networks newsham best known co-authoring paper insertion evasion denial service eluding network intrusion detection thomas ptacek paper broke every network intrusion detection product market cited 150 academic works network intrusion detection since published prominent white papers addition research newsham also known pioneering work security products including newsham partially discovered newsham 21-bit wep attack newsham 21-bit attack method used primarily kismac brute force wep keys effective routers linksys netgear belkin d-link affect apple 3com use algorithms generating wep keys using method allows wep key retrieved less minute wep keys generated use text based key generated using 21-bit algorithm instead secure 40-bit encryption algorithm router presents key user 40-bit key method 2^19 times faster brute force 40-bit key would allowing modern processors break encryption rapidly 2008 newsham awarded lifetime achievement pwnie award | [
113,
1805,
3842,
4663,
7207
] | Test |
410 | 3 | X86_calling_conventions:x86 calling conventions article describes calling conventions used programming x86 architecture microprocessors calling conventions describe interface called code intimately related assignment sizes formats programming-language types another closely related topic name mangling determines symbol names code map symbol names used linker calling conventions type representations name mangling part known application binary interface abi often subtle differences various compilers implement conventions often difficult interface code compiled different compilers hand conventions used api standard stdcall uniformly implemented prior microcomputers machine manufacturer generally provided operating system compilers several programming languages calling convention platform defined manufacturer programming tools early microcomputers commodore pet apple ii generally came without os compilers ibm pc came microsoft fore-runner windows disk operating system dos come compiler hardware standard ibm pc-compatible machines defined intel processors 8086 80386 literal hardware ibm shipped hardware extensions software standards save bios calling convention thrown open market competition multitude independent software firms offered operating systems compilers many programming languages applications many different calling schemes implemented firms often mutually exclusive based different requirements historical practices programmer creativity ibm-compatible market shakeout microsoft operating systems programming tools differing conventions predominated second-tier firms like borland novell open-source projects like gcc still maintained standards provisions interoperability vendors products eventually adopted simplifying problem choosing viable convention conventions caller cleans arguments stack cdecl stands c declaration calling convention originates c programming language used many c compilers x86 architecture cdecl subroutine arguments passed stack integer values memory addresses returned eax register floating point values st0 x87 register registers eax ecx edx caller-saved rest callee-saved x87 floating point registers st0 st7 must empty popped freed calling new function st1 st7 must empty exiting function st0 must also empty used returning value context c programming language function arguments pushed stack right-to-left order i.e last argument pushed first linux gcc sets de facto standard calling conventions since gcc version 4.5 stack must aligned 16-byte boundary calling function previous versions required 4-byte alignment consider following c source code snippet x86 might produce following assembly code intel syntax caller cleans stack function call returns variations interpretation cdecl particularly return values result x86 programs compiled different operating system platforms and/or different compilers incompatible even use cdecl convention call underlying environment compilers return simple data structures length 2 registers less register pair eax edx larger structures class objects requiring special treatment exception handler e.g. defined constructor destructor assignment returned memory pass memory caller allocates memory passes pointer hidden first parameter callee populates memory returns pointer popping hidden pointer returning linux/gcc double/floating point values pushed stack via x87 pseudo-stack like using method ensures pushed stack correct format cdecl calling convention usually default calling convention x86 c compilers although many compilers provide options automatically change calling conventions used manually define function cdecl support following syntax _cdecl modifier must included function prototype function declaration override settings might place similar cdecl arguments pushed right-to-left eax ecx edx preserved size parameter list doublewords passed al syscall standard calling convention 32 bit os/2 api arguments pushed right-to-left three lexically first leftmost arguments passed eax edx ecx four floating-point arguments passed st0 st3 although space reserved argument list stack results returned eax st0 registers ebp ebx esi edi preserved optlink used ibm visualage compilers conventions callee cleans arguments stack functions utilize conventions easy recognize asm code unwind stack returning x86 ret instruction allows optional 16-bit parameter specifies number stack bytes release returning caller code looks like conventions entitled fastcall register standardized implemented differently depending compiler vendor typically register based calling conventions pass one arguments registers reduces number memory accesses required call thus make usually faster based borland pascal programming language calling convention parameters pushed stack left-to-right order opposite cdecl callee responsible removing stack returning result works follows calling convention common following 16-bit apis os/2 1.x microsoft windows 3.x borland delphi version 1.x modern versions windows api use stdcall still callee restoring stack pascal convention parameters pushed right left stdcall calling convention variation pascal calling convention callee responsible cleaning stack parameters pushed onto stack right-to-left order _cdecl calling convention registers eax ecx edx designated use within function return values stored eax register stdcall standard calling convention microsoft win32 api open watcom c++ microsoft gcc __fastcall convention aka __msfastcall passes first two arguments evaluated left right fit ecx edx remaining arguments pushed onto stack right left ms compiler compiles ia64 amd64 ignores __fastcall keyword uses one 64-bit calling convention instead visual studio 2013 microsoft introduced __vectorcall calling convention response efficiency concerns game graphic video/audio codec developers ia-32 x64 code __vectorcall similar __fastcall original x64 calling conventions respectively extends support passing vector arguments using simd registers x64 first six arguments vector types float double __m128 __m256 etc passed via corresponding xmm/ymm registers similarly ia-32 six xmm/ymm registers allocated sequentially vector type arguments left right regardless position additionally __vectorcall adds support passing homogeneous vector aggregate hva values composite types consisting solely four identical vector types using six registers registers allocated vector type arguments unused registers allocated hva arguments left right regardless position resulting vector type hva values returned using first four xmm/ymm registers evaluating arguments left right passes three arguments via eax edx ecx remaining arguments pushed onto stack also left right default calling convention 32-bit compiler delphi known register gcc supports calling convention regparm=3 option used linux kernel i386 since version 2.6.20 released february 2007 .. calling convention also used embarcadero c++builder called __fastcall compiler microsoft fastcall used __msfastcall watcom support __fastcall keyword except alias null register calling convention may selected command line switch however ida uses __fastcall anyway uniformity 4 registers assigned arguments order eax edx ebx ecx arguments assigned registers left right argument assigned register say large subsequent arguments assigned stack arguments assigned stack pushed right left names mangled adding suffixed underscore variadic functions fall back watcom stack based calling convention watcom c/c++ compiler also uses pragma aux directive allows user specify calling convention manual states users likely need method needed lifesaver first four integer parameters passed registers eax ebx ecx edx floating point parameters passed floating point stack – registers st0 st1 st2 st3 st4 st5 st6 structure parameters always passed stack additional parameters passed stack registers exhausted integer values returned eax pointers edx floating point types st0 delphi free pascal microsoft windows safecall calling convention encapsulates com component object model error handling thus exceptions n't leaked caller reported hresult return value required com/ole calling safecall function delphi code delphi also automatically checks returned hresult raises exception necessary safecall calling convention stdcall calling convention except exceptions passed back caller eax hresult instead fs 0 function result passed reference stack though final parameter calling delphi function delphi calling convention appear like calling convention although exceptions passed back eax automatically converted back proper exceptions caller using com objects created languages hresults automatically raised exceptions result get functions result rather parameter creating com objects delphi safecall need worry hresults exceptions raised normal seen hresults languages returns result raises exceptions like normal delphi function passes values exceptions though calling convention used calling c++ non-static member functions two primary versions thiscall used depending compiler whether function uses variable number arguments gcc compiler thiscall almost identical cdecl caller cleans stack parameters passed right-to-left order difference addition pointer pushed onto stack last first parameter function prototype microsoft visual c++ compiler pointer passed ecx callee cleans stack mirroring stdcall convention used c compiler windows api functions functions use variable number arguments caller cleans stack cf cdecl thiscall calling convention explicitly specified microsoft visual c++ 2005 later compiler thiscall keyword however disassemblers ida must specify ida uses keyword __thiscall another part calling convention registers guaranteed retain values subroutine call according intel abi vast majority compilers conform eax edx ecx free use within procedure function need preserved name implies general-purpose registers usually hold temporary volatile information overwritten subroutine therefore caller responsibility push registers onto stack would like restore values subroutine call registers used hold long-lived values non-volatile preserved across calls words caller makes procedure call expect registers hold value callee returns thus making callee responsibility save push beginning restore pop accordingly returning caller previous case practice done registers callee changes x86-64 calling conventions take advantage additional register space pass arguments registers also number incompatible calling conventions reduced two common use microsoft x64 calling convention followed windows pre-boot uefi long mode x86-64 uses registers rcx rdx r8 r9 first four integer pointer arguments order xmm0 xmm1 xmm2 xmm3 used floating point arguments additional arguments pushed onto stack right left integer return values similar x86 returned rax 64 bits less floating point return values returned xmm0 parameters less 64 bits long zero extended high bits zeroed compiling x64 architecture windows context whether using microsoft non-microsoft tools one calling convention – one described stdcall thiscall cdecl fastcall etc. one microsoft x64 calling convention caller responsibility allocate 32 bytes shadow space stack right calling function regardless actual number parameters used pop stack call shadow space used spill rcx rdx r8 r9 must made available functions even fewer four parameters registers rax rcx rdx r8 r9 r10 r11 considered volatile caller-saved ref name= caller/callee saved registers /ref registers rbx rbp rdi rsi rsp r12 r13 r14 r15 considered nonvolatile callee-saved example function taking 5 integer arguments take first fourth registers fifth pushed top shadow space called function entered stack composed ascending order return address followed shadow space 32 bytes followed fifth parameter x86-64 visual studio 2008 stores floating point numbers xmm6 xmm7 well xmm8 xmm15 consequently x86-64 user-written assembly language routines must preserve xmm6 xmm7 compared x86 wherein user-written assembly language routines need preserve xmm6 xmm7 words user-written assembly language routines must updated save/restore xmm6 xmm7 before/after function ported x86 x86-64 starting visual studio 2013 microsoft introduced __vectorcall calling convention extends x64 convention calling convention system v amd64 abi followed solaris linux freebsd macos de facto standard among unix unix-like operating systems first six integer pointer arguments passed registers rdi rsi rdx rcx r8 r9 r10 used static chain pointer case nested functions xmm0 xmm1 xmm2 xmm3 xmm4 xmm5 xmm6 xmm7 used certain floating point arguments microsoft x64 calling convention additional arguments passed stack integral return values 64 bits size stored rax values 128 bit stored rax rdx floating-point return values similarly stored xmm0 xmm1.. callee wishes use registers rbx rbp r12–r15 must restore original values returning control caller registers must saved caller wishes preserve values leaf-node functions functions call function 128-byte space stored beneath stack pointer function space called red-zone zone clobbered signal interrupt handlers compilers thus utilize zone save local variables compilers may omit instructions starting function adjustment rsp rbp utilizing zone however functions may clobber zone therefore zone used leaf-node functions codice_1 codice_2 offer codice_3 flag disable red-zone optimizations callee variadic function number floating point arguments passed function vector registers must provided caller al register unlike microsoft calling convention shadow space provided function entry return address adjacent seventh integer argument stack list x86 calling conventions conventions primarily intended c/c++ compilers especially 64-bit part thus largely special cases languages may use formats conventions implementations | [
2449,
2087,
6969,
4759,
3955,
5571,
2118,
578,
1198,
5670,
6367,
584,
4611,
5948,
421,
336,
1052,
4277,
352,
263,
6498,
4017,
1335,
5190,
2084
] | Test |
411 | 0 | Culturomics:culturomics culturomics form computational lexicology studies human behavior cultural trends quantitative analysis digitized texts researchers data mine large digital archives investigate cultural phenomena reflected language word usage term american neologism first described 2010 science article called quantitative analysis culture using millions digitized books co-authored harvard researchers jean-baptiste michel erez lieberman aiden michel aiden helped create google labs project google ngram viewer uses n-grams analyze google books digital library cultural patterns language use time google ngram data set unbiased sample include metadata several pitfalls using study language popularity terms medical literature accounts large shifting share corpus take account often literature printed read study called culturomics 2.0 kalev h. leetaru examined news archives including print broadcast media television radio transcripts words imparted tone mood well geographic data research able retroactively predict 2011 arab spring successfully estimate final location osama bin laden within 2012 paper alexander m. petersen co-authors found dramatic shift birth rate death rates words deaths increased births slowed authors also identified universal tipping point life cycle new words 30 50 years origin either enter long-term lexicon fall disuse 2014 paper steffen roth culturomic analyses used trace decline religion rise politics relevance economy modern societies one major results modern societies appear capitalist economized paper likely first application culturomics sociology culturomic approaches taken analysis newspaper content number studies i. flaounas co-authors studies showed macroscopic trends across different news outlets countries 2012 study 2.5 million articles suggested gender bias news coverage depends topic readability newspaper articles related topic separate study researchers covering 1.3 million articles 27 countries showed macroscopic patterns choice stories cover particular countries made similar choices related economic geographical cultural links cultural links revealed similarity voting eurovision song contest study performed vast scale using statistical machine translation text categorisation information extraction techniques possibility detect mood shifts vast population analysing twitter content demonstrated study t. lansdall-welfare co-authors study considered 84 million tweets generated 9.8 million users united kingdom period 31 months showing public sentiment uk changed announcement spending cuts 2013 study sudhahar co-authors automatic parsing textual corpora enabled extraction actors relational networks vast scale turning textual data network data resulting networks contain thousands nodes analysed using tools network theory identify key actors key communities parties general properties robustness structural stability overall network centrality certain nodes 2014 study lansdall-welfare co-authors 5 million news articles collected 5 years analyzed suggest significant shift sentiment relative coverage nuclear power corresponding disaster fukushima study also extracted concepts associated nuclear power disaster explaining change sentiment change narrative framing 2015 study revealed bias google books data set suffers number limitations make obscure mask cultural popularity calls question significance many earlier results culturomic approaches also contribute towards conservation science better understanding human-nature relationships 2016 publication richard ladle colleagues highlighted five key areas culturomics used advance practice science conservation including recognizing conservation-oriented constituencies demonstrating public interest nature identifying conservation emblems providing new metrics tools near-real-time environmental monitoring support conservation decision making assessing cultural impact conservation interventions framing conservation issues promoting public understanding 2017 study correlated joint pain google search activity temperature study observed higher search activity hip knee pain arthritis higher temperatures control relevant factors activity mass media misinterpreted myth busted rain increase joint pain authors speculate observed correlation due changes physical activity levels linguists lexicographers expressed skepticism regarding methods results studies including one petersen et al. demonstrated bias ngram data set results call question vast majority existing claims drawn google books corpus instead speaking general linguistic cultural change seems preferable explicitly restrict results linguistic cultural change ‘ represented google ngram data ’ unclear caused observed change sample | [
611,
715
] | Validation |
412 | 4 | Andries_Brouwer:andries brouwer andries evert brouwer born 1951 dutch mathematician computer programmer professor emeritus eindhoven university technology tu/e known creator greatly expanded 1984 1985 versions roguelike computer game hack formed basis nethack also linux kernel hacker sometimes referred handle aeb born amsterdam brouwer attended gymnasium obtained msc mathematics university amsterdam 1971 1976 received ph.d. mathematics vrije universiteit thesis entitled treelike spaces related topological spaces supervision maarten maurice pieter baayen turn students johannes de groot 2004 received honorary doctorate aalborg university graduation brouwer started academic career mathematisch centrum later centrum wiskunde informatica 1986 2012 professor eindhoven university technology tu/e brouwer varied research interests include several branches discrete mathematics particularly graph theory finite geometry coding theory published dozens papers graph theory areas combinatorics many collaboration researchers co-authors include least 9 co-authors paul erdős giving erdős number 2 december 1984 centrum wiskunde informatica cwi made first public release hack usenet hack implementation rogue originally written 1982 jay fenlason others brouwer heavily modified expanded distributed total four versions hack december 1984 july 1985 source code released free software widely copied played ported multiple computer platforms mike stephenson brought together large development team via usenet produce enhanced version 1987 incorporating changes many hack derivatives respected brouwer wishes renaming game nethack brouwer might ... eventually release new version brouwer also involved development unix-like computer operating systems based linux kernel previously maintainer man pager program codice_1 maintainer linux man-pages project 1995 2004 kernel maintainer areas disk geometry partition handling brouwer also serves specialist security aspects unix linux eipsi eindhoven institute protection systems information tu/e information security research institute | [
2182,
3938,
3613,
1822,
7528,
7532,
5744,
6443,
4341,
7559,
5759,
5762,
3666,
6857,
2260,
5453,
7242,
462,
1535,
1924,
6892,
1176,
4401,
1933,
5829,
1192,
1208,
6211,
4435,
2689,
5865,
7669,
3404,
1227,
1596,
165,
7312,
1607,
1243,
5884,
... | Test |
413 | 2 | Irina_Blok:irina blok irina blok born c. 1977 graphic designer artist best known creation google android logo including green robot icon irina blok appeared abc reality show shark tank one contestants designs featured nbc ny usa today sf weekly french edition elle magazine multiple publications around world born st petersburg russia blok moved u.s. 1995 studied graphic design san jose state university started career landor associates brand designer helped create evolve brands hp visa h r block fedex continued career number tech companies including yahoo google adobe course career design work appeared communication arts magazine magazine aiga ci annual creative review also directed study advisor graphic design mfa program academy art university san francisco | [] | Validation |
414 | 2 | W._Richard_Stevens:w. richard stevens william richard rich stevens february 5 1951september 1 1999 northern rhodesia-born american author computer science books particular books unix tcp/ip richard stevens born 1951 luanshya northern rhodesia zambia father worked copper industry family later moved salt lake city hurley new mexico washington d.c. phalaborwa south africa stevens attended fishburne military school waynesboro virginia received bachelor degree aerospace engineering university michigan 1973 master degree 1978 phd 1982 systems engineering university arizona moved tucson 1975 employed kitt peak national observatory computer programmer 1982 1982 1990 vice president computing services health systems international new connecticut stevens moved back tucson 1990 pursued career author consultant also avid pilot part-time flight instructor 1970s stevens died 1999 age 48 2000 posthumously awarded usenix lifetime achievement award stevens also co-authored several ietf request comments rfc documents informational documents ipv6 updates berkeley sockets api standards document tcp congestion control | [
66,
3838,
5941,
6055,
7637,
3828,
2612,
5880,
2281,
3855,
6046
] | Validation |
415 | 2 | Open_Sound_System:open sound system open sound system oss interface making capturing sound unix unix-like operating systems based standard unix devices system calls i.e posix read write ioctl etc. term also sometimes refers software unix kernel provides oss interface thought device driver collection device drivers sound controller hardware goal oss allow writing sound-based applications agnostic underlying sound hardware oss created hannu savolainen distributed four license options three free software licences thus making oss free software api designed use traditional unix framework open read write ioctl via special devices instance default device sound input output /dev/dsp examples using shell project initially free software following project success savolainen contracted company 4front technologies made support newer sound devices improvements proprietary response eventually linux community abandoned oss/free implementation included kernel development effort switched replacement advanced linux sound architecture alsa linux distributions ubuntu chosen disable oss support kernels ignore bugs filed oss4 packages although oss support may re-enabled ubuntu spite several operating systems freebsd continued distribute previous versions oss continue maintain improve versions july 2007 4front technologies released sources oss cddl opensolaris gpl linux january 2008 4front technologies released oss freebsd bsd systems bsd license freebsd contains independently developed implementation oss api includes among things in-kernel resampling mixing vchans equalizer surround sound independent volume control application also supports bit-perfect mode netbsd openbsd support compatibility mode oss api providing codice_1 header file codice_2 library internally operate using native sun-like audio interface solaris opensolaris uses fork oss4 called boomer combines oss4 framework audio mixer together sun earlier sada /dev/audio api oss/3d plugin music players acts audio postprocessing engine supported players include winamp windows media player 9 later musicmatch sonique foobar2000 jetaudio xmms ported windows linux platforms unlike oss shareware 4front oss3d later renamed joesoft hear linux kernel historically two uniform sound apis used one oss alsa advanced linux sound architecture alsa available linux one implementation alsa interface alsa refers equally implementation interface oss audio api linux 2.4 series official kernel.org linux kernels alsa added starting 2.5 versions linux kernel authors marked oss deprecated 4front continued develop oss outside linux kernel alsa provides optional oss emulation mode appears programs oss similarly alsa emulation mode linux implementation oss oss api software criticized developers paul davis jack audio connection kit lennart poettering competing pulseaudio criticisms either specific linux implementation oss api addressed oss version 4 | [
2182,
3613,
7528,
7532,
5744,
6443,
4341,
6830,
5762,
7581,
3666,
5453,
7242,
1535,
1924,
6892,
1176,
1933,
1208,
6211,
5865,
7669,
1227,
1596,
165,
7312,
1607,
5884,
1991,
6984,
5571,
578,
4877,
5580,
6640,
1659,
2765,
4174,
2060,
7038,
... | Test |
416 | 3 | Aperture_(computer_memory):aperture computer memory computing aperture portion physical address space i.e physical memory associated particular peripheral device memory unit apertures may reach external devices rom ram chips internal memory cpu typically memory device attached computer accepts addresses starting zero system one device would ambiguous addressing resolve memory logic contain several aperture selectors containing range selector interface one memory devices set selector address ranges apertures disjoint cpu presents physical address within range recognized aperture aperture unit routes request address remapped zero base attached device thus apertures form layer address translation level usual virtual-to-physical mapping | [
1254,
1374,
1237,
2617,
3905
] | Test |
417 | 8 | Zope:zope zope family free open-source web application servers written python associated online community zope stands z object publishing environment first system using common object publishing methodology web zope recognized python killer app application helped put python spotlight last years zope community spawned several additional web frameworks disparate aims principles sharing philosophy people source code zope 2 still widespread frameworks largely thanks plone content management system runs zope 2 bluebream earlier called zope 3 less widespread underlies several large sites including launchpad grok started programmer-friendly framework zope 3 cavemen 2009 pyramid ex bfg gained popularity zope community minimalistic framework based zope principles zope corporation formed 1995 fredericksburg virginia name digital creations joint venture infinet joint newspaper chain venture company developed classified advertisement engine internet 1997 company became independently owned private company software engineers led cto jim fulton pythonlabs creators python became part company 2000 python founder guido van rossum left zope corp 2003 known zope 2 began merging three separate software products – bobo document template bobopos – principia application server behest largest investor opticality ventures principia re-released free software name zope 1998 bobo therefore zope first web object publishing solution november 2004 zope 3 released zope 3 complete rewrite preserves original zodb object database directly intended enterprise web application development using newest development paradigms zope 3 however compatible zope 2 run zope 2 applications zope 3 originally intended introduce backwards-compatibility layer zope 2 software would run zope 3 instead module known five introduced new zope 3 paradigms zope 2 although full compatibility n't possible way either existence two incompatible web frameworks called zope caused lot confusion response january 2010 zope 3 renamed bluebream zope blue bream names kind fish ballerus ballerus zope foundation organization promotes development zope platform supporting community develops maintains relevant software components community includes open source software documentation web infrastructure contributors well business organization consumers software platform manages zope.org websites infrastructure open source collaboration zope website usually composed objects zope object database files file system usual web servers allows users harness advantages object technologies encapsulation zope maps urls objects using containment hierarchy objects methods considered contained objects well data stored databases well file system zodb common solution zope provides two mechanisms html templating document template markup language dtml zope page templates zpt dtml tag-based language allows implementation simple scripting templates dtml provisions variable inclusion conditions loops however dtml problematic dtml tags interspersed html form non-valid html documents use requires care including logic templates retain code readability use dtml discouraged many leading zope developers zpt technology addresses shortcomings dtml zpt templates either well-formed xml documents html documents special markup presented attributes tal template attribute language namespace zpt offers limited set tools conditional inclusion repetition xml elements consequently templates usually quite simple logic implemented python code one significant advantage zpt templates edited graphical html editors zpt also offers direct support internationalization zope 2 underlies plone content management system well erp5 open source enterprise resource planning system bluebream rewrite zope developers zope 2 web application server created name zope 3 existence two incompatible frameworks name caused much confusion zope 3 renamed bluebream january 2010 bluebream distributed terms zope public license thus free software zope 2 proven useful framework web applications development use revealed shortcomings name creating zope 2 products involves copying lot boilerplate code – magic code – built-in management interface difficult modify replace zope 3 rewrite software attempts address shortcomings retaining advantages zope led popularity bluebream based component architecture makes easy mix software components various origins written python although originally intended replacement zope 2 zope component architecture instead backported zope 2 starting zope 2.8 many zope platforms plone going type piece-by-piece rewriting first production release new software zope x3 3.0.0 released november 6 2004 zope 3 project started february 2001 effort develop new version zope almost complete rewrite goal retain successful features zope 2 trying fix shortcomings goal create developer-friendly flexible platform programming web applications zope 2 project began development component architecture allows structuring code small composable units introspectable interfaces interfaces supported interface package order provide functionality explicitly declared interfaces python language first production release software zope x3 released november 6 2004 january 2010 zope 3 renamed bluebream goal project enable programmers use zope order expose arbitrary python objects model objects web without need make objects fulfill particular behavior requirements zope 2 many behavior requirements allow objects participate framework resulted large amount mixin base classes special attributes bluebream uses model/view architecture separating presentation code problem domain code views models linked together component architecture libraries underlying bluebream evolving collection useful libraries web application development rather single monolithic application server bluebream includes separate packages interfaces component architecture http server publisher zope object database zodb zope page templates i18n security policy component architecture used glue together component architecture configured using zcml zope configuration markup language xml based configuration file language zope 3 project pioneered practice sprints open source software development sprints intensive development sessions programmers often different countries gather one room work together couple days even several weeks sprints various practices drawn agile software development used pair programming test-driven development besides goal developing software sprints also useful geographically separated developers meet person attracting new people project also serve way participants learn bluebream considered stable framework used production projects worldwide notably launchpad result development zope 3 bluebream many independent python packages used developed part bluebream although many usable outside bluebream many zope toolkit ztk project started clarify packages usable outside bluebream improve re-usability packages thus zope toolkit base zope frameworks zope 2.12 first release web framework builds zope toolkit grok bluebream set releases based ztk 2010 2006 grok project started number zope 3 developers wanted make zope 3 technology agile use accessible newcomers grok since seen regular releases core technology martian grokcore.component also finding uptake zope 3 zope 2 based projects late 2017 development began zope 4 zope 4 successor zope 2.13 making many changes backwards compatible zope 2 mentioned previously zope page templates xhtml documents means viewed edited using normal html editors xhtml compliant tools big advantage compared template languages used web applications templates also checked xhtml compliance fairly confident automatically expand proper xhtml however page templates meant rendered instead marked additional elements attributes special xml namespaces see additional information used describe page template ultimately processed basic examples conditionally include particular element like div element simply add tal condition attribute element follows control appears inside element use tal content attribute like finally introduce replace values attributes use tal attributes attribute use python alter href runtime cursory explanation zope page templates behavior zope page templates almost completely described template language fixed tal tales metal specifications schooltool open source student information system uses zope | [
1445,
5369,
1819,
6428,
6095,
1834,
7899,
26,
7544,
4701,
7920,
417,
54,
84,
2619,
7952,
103,
5820,
2646,
2291,
3368,
6536,
7988,
6191,
486,
3408,
1602,
5206,
7347,
5214,
6270,
2740,
5569,
5571,
5575,
933,
3135,
4535,
1686,
5965,
7411,
... | Test |
418 | 3 | Sun_Fire:sun fire sun fire series server computers introduced 2001 sun microsystems since 2010 part oracle corporation sun fire branding coincided introduction ultrasparc iii processor superseding ultrasparc ii-based sun enterprise series 2003 sun broadened sun fire brand introducing sun fire servers using intel xeon processor 2004 early intel xeon models superseded models powered amd opteron processors also 2004 sun introduced sun fire servers powered ultrasparc iv dual-core processor 2007 sun introduced intel xeon sun fire servers continuing offer amd opteron versions well sparc-based sun fire systems produced 2010 x86-64 based machines marketed mid-2012 mid-2012 oracle corporation ceased use sun fire brand new server models ultrasparc-based sun fire models licensed run solaris operating system versions 8 9 10 although officially supported linux versions also available third parties well openbsd netbsd intel xeon amd opteron based sun fire servers support solaris 9 10 openbsd red hat enterprise linux versions 3 6 suse linux enterprise server 10 11 windows 2000 windows server 2003 2008 2008 r2 later sun fire model numbers prefixes indicating type system thus sun offered intel xeon amd opteron sun fire servers v-series sub brand sun used x suffix denote intel xeon processor based systems z suffix amd opteron processor based systems convention later dropped z suffix also used previously differentiate v880z visualization server variant v880 server sun first-generation blade server platform sun fire b1600 chassis associated blade servers branded sun fire server brand later sun blade systems sold sun blade brand 2007 sun fujitsu fujitsu siemens introduced common sparc enterprise brand server products first sparc enterprise models fujitsu-developed successors midrange high-end sun fire e-series addition sun fire t1000 t2000 servers rebranded sparc enterprise t1000 t2000 sold fujitsu brands although sun continued offer original names later t-series servers also badged sparc enterprise rather sun fire since late 2010 oracle corporation longer uses sun fire brand current series sparc servers since mid-2012 new x series x86-64 machines based intel xeon cpus x86-64 server models developed sun microsystems acquisition still production rebranded sun server x-series servers produced two versions original version later rohs version since general maintenance upgrade guideline rohs components spares may installed original non-rohs versions server end-of-life eol date server deemed eol date rohs version server listing 2012 x86 server range continued sun server oracle server names | [
7535,
3294,
1105,
7213,
3673,
2977,
6505,
1160,
2992,
1923,
6184,
1185,
1937,
2299,
4418,
3026,
4427,
1223,
1590,
5882,
1254,
1258,
3443,
1263,
6270,
908,
6279,
6281,
578,
2033,
7368,
4515,
2765,
5587,
5956,
3820,
8138,
8145,
971,
7781,
... | Test |
419 | 4 | Raz-Lee:raz-lee raz-lee security inc. international organization provides data security solutions ibm power servers company clients include fiat agfa teva pharmaceuticals avnet aig dun bradstreet israel branch american insurance company american international group among others founded 1983 company formerly headquartered herzliya israel 1992 33 company products sold united states 1994 1996 business offices nanuet new york dramatically increased though primary purchasers still spread europe middle east africa 2009 company headquartered nanuet research development facility israel company also offices israel italy maintains technical support us account management center san francisco company best known product consists 15 individual products intended protect monitor information assets insider threat unauthorized external access | [] | Test |
420 | 4 | Awards_received_by_Edward_Snowden:awards received edward snowden awards received edward snowden part reactions global surveillance disclosures made edward snowden subject controversy snowden variously called hero whistleblower dissident patriot traitor honored publications organizations based europe united states edward snowden voted guardian person year 2013 garnering four times number votes candidate 2013 list leading global thinkers published annually foreign policy placed snowden first place due impact revelations fp global conversation visualization showed snowden occupied role 2013 global news media coverage slightly less important president barack obama snowden headed techrepublic ten tech heroes 2013 editor jack wallen noted besides raising public awareness surveillance government secrecy snowden leaks significant technology professionals snowden named time ′s person year runner-up 2013 behind pope francis time criticized placing top spot 2014 snowden named among time 100 influential people world february 2014 snowden joined board directors freedom press foundation co-founded pentagon papers leaker daniel ellsberg journalists glenn greenwald laura poitras also sit board july 2014 freie universität berlin announced snowden accepted offer honorary membership recognition university called extraordinary achievements defense transparency justice freedom apart honor rights privileges duties involved edward snowden awarded biennial german whistleblower prize august 2013 absentia accompanying award equal €3,000 established 1999 award sponsored german branch international association lawyers nuclear arms federation german scientists organizers berlin said prize acknowledge bold efforts expose massive unsuspecting monitoring storage communication data accepted democratic societies october 2013 sam adams award presented snowden moscow group four visiting american former intelligence officers whistleblowers two months asylee snowden made first public appearance accept award candlestick holder meant symbolize bringing light dark corners visit one presenters—fbi whistleblower jesselyn radack government accountability project—became snowden lawyer week later radack wrote nation snowden exemplified sam adams courage persistence devotion truth—no matter consequences snowden chosen give britain 2013 alternative christmas message channel 4 non-establishment parallel royal christmas message queen elizabeth ii short piece filmed laura poitras snowden spoke government surveillance terms george orwell classic novel nineteen eighty-four – arguing modern surveillance capabilities far surpass imagined big brother february 2014 snowden elected rector university glasgow ceremonial post student body representative chosen students historic office wide margin votes even though nomination like several past rectors purely symbolic gesture served three-year term absentia german big brother awards gala april 11 2014 edward snowden honored first-ever julia winston award positive award named two main rebellious characters orwell nineteen eighty-four award endowed one million stickers calling german government grant asylum snowden award organizers digitalcourage made stickers available free online public distribute throughout germany april 2014 snowden laura poitras awarded ridenhour truth-telling prize given nation institute fertel foundation transparency whistleblowing snowden poitras appeared video national press club accept award snowden gave speech took questions audience accorded several standing ovations speech questioned swiftly charged crimes whereas director national intelligence james clapper even reprimanded famous lie congress december 2014 snowden shared joint honorary award alan rusbridger editor guardian swedish right livelihood award foundation also december 2014 snowden shared international league human rights annual carl von ossietzky medal journalists glenn greenwald laura poitras 2014 snowden nominated iq award members non-profit organization mensa germany although official iq award commission confirmed nomination managing board mensa threatened commission subdue snowden nomination violated mensa bylaws german mensa board also reaction talks mensa international consequently possible mensa members vote snowden caused big controversies among mensa members leading effect opposing mensa members agreed vote protest actor jonny lee miller nonsensical nominee thus election 2016 norwegian chapter pen international awarded snowden ossietzky prize given outstanding achievements within field freedom expression snowden applied norway safe passage pick prize courts said unable legally rule anything snowden country received formal extradition request | [
147
] | Train |
421 | 3 | Interrupt_flag:interrupt flag interrupt flag system flag bit x86 architecture flags register determines whether central processing unit cpu handle maskable hardware interrupts bit bit 9 flags register may set cleared programs sufficient privileges usually determined operating system flag set codice_1 maskable hardware interrupts handled cleared set codice_2 interrupts ignored affect handling non-maskable interrupts nmis software interrupts generated int instruction flag may set cleared using cli clear interrupts sti set interrupts popf pop flags instructions cli clears sets 0 sti sets 1 popf pops 16 bits stack flags register means set cleared based ninth bit top stack three cases privileged applications usually os kernel may modify note applies protected mode code real mode code may always modify cli sti privileged instructions trigger general protection fault unprivileged application attempts execute popf simply modify flag application unprivileged privilege level required execute cli sti instruction set using popf determined iopl i/o privilege level eflags iopl set 2 example program running ring 0 execute cli modern operating systems set iopl 0 kernel execute cli/sti reason since clearing force processor ignore interrupts kernel may never get control back set 1 old dos programs use protected mode dos extender install interrupt handlers usually games use cli instruction handlers disable interrupts either popf corresponding pushf iret restores flags stack part effects restore works program started real mode causes problems programs run dpmi-based container modern operating systems ntvdm windows nt later since cli privileged instruction triggers fault operating system program attempts use os typically stops delivering interrupts program program executes sti would cause another fault however popf instruction privileged simply fails silently restore result os stops delivering interrupts program hangs dos programs use protected mode extender suffer problem execute v86 mode popf trigger fault satisfactory resolutions issue usually possible modify program source code typically available room instruction stream introduce sti without massive editing assembly level removing cli program causing v86 host ignore cli completely might cause bugs guest interrupt handlers re-entrant safe though executed modern processor typically execute fast enough avoid overlapping interrupts cli commonly used synchronization mechanism uniprocessor systems example cli used operating systems disable interrupts kernel code typically driver avoid race conditions interrupt handler note cli affects interrupt flag processor executed multiprocessor systems executing cli instruction disable interrupts processors thus driver/interrupt handler race condition still occur processors may service interrupts execute offending interrupt handler systems synchronization mechanisms locks must used addition cli/sti prevent race conditions hlt instruction halts interrupt occurs combination cli followed hlt commonly used intentionally hang computer sti instruction enables interrupts setting one interesting quirk sti instruction unlike cli immediate effect interrupts actually enabled instruction immediately following sti one side effect could if=0 executing cli instruction immediately sti instruction means interrupts never recognized sti instruction sets flag interrupts checked next instruction case would cli takes effect immediately behavior exists processor constantly takes interrupts still make forward progress see ia-32 manuals details | [
364,
6969,
4767,
4318,
2567,
5571,
4061,
4611,
6374,
410,
336,
2332,
858,
3144,
1237,
352,
263,
6498,
1335,
1150,
5190,
1248
] | Train |
422 | 9 | JScript:jscript jscript microsoft dialect ecmascript standard used microsoft internet explorer jscript implemented active scripting engine means plugged ole automation applications support active scripting internet explorer active server pages windows script host also means applications use multiple active scripting languages e.g. jscript vbscript perlscript jscript first supported internet explorer 3.0 browser released august 1996 recent version jscript 9.0 included internet explorer 9 jscript 10.0 separate dialect also known jscript .net adds several new features abandoned fourth edition ecmascript standard must compiled .net framework version 2 version 4 static type annotations optional explained douglas crockford talk titled javascript programming language yui theater however jscript supports conditional compilation allows programmer selectively execute code within block comments extension ecmascript standard supported javascript implementations thus making statement completely true although conditional compilation longer supported internet explorer 11 standards mode internal implementation differences javascript jscript point time noted microsoft developer network although default type value script element internet explorer javascript jscript alias apparent transition jscript javascript online microsoft edge developer guide refers mozilla mdn web reference library definitive documentation october 2017 microsoft msdn pages scripting internet explorer redirected well information may include jscript specific objects enumerator listed javascript language reference microsoft docs provide additional features included ecma standards whether supported edge browser predecessor original jscript active scripting engine like active scripting languages built com/ole automation platform provides scripting capabilities host applications version used hosting jscript inside web page displayed internet explorer html application classic asp windows script host scripts several automation environments jscript sometimes referred classic jscript active scripting jscript differentiate newer .net-based versions versions jscript available multiple versions internet explorer windows example jscript 5.7 introduced internet explorer 7.0 also installed internet explorer 6.0 windows xp service pack 3 jscript 5.8 introduced internet explorer 8.0 also installed internet explorer 6.0 windows mobile 6.5 microsoft implementation ecmascript 5th edition windows 8 consumer preview called javascript corresponding visual studio 11 express beta includes “ completely new ” full-featured javascript editor intellisense enhancements html5 ecmascript 5 syntax “ vsdoc ” annotations multiple overloads simplified dom configuration brace matching collapsible outlining “ go definition ” jscript also available windows ce included windows mobile optional windows embedded ce windows ce version lacks active debugging jscript .net microsoft .net implementation jscript cls language thus inherits powerful features lacks many features original jscript language making inappropriate many scripting scenarios jscript .net used asp.net pages complete .net applications lack support language microsoft visual studio places upgrade path classic asp using classic jscript new first-class language jscript .net supported .net compact framework note jscript .net versions related classic jscript versions jscript .net separate product even though jscript .net supported within visual studio ide versions sync .net languages versions c vb.net vc++ follow corresponding visual studio versions .net framework 3.0 3.5 built top 2.0 include newer jscript.net release version 10.0 .net framework 4.0 | [
7149,
7879,
3937,
3263,
6420,
714,
378,
2198,
720,
5378,
1460,
6096,
7176,
2928,
1475,
4697,
5747,
7907,
7553,
7557,
7195,
2949,
5410,
7564,
2953,
53,
54,
6840,
6844,
61,
425,
1128,
2245,
3663,
435,
6495,
5442,
4377,
4017,
3340,
5090,
... | Test |
423 | 3 | Digital_Devil_Story:_Megami_Tensei:digital devil story megami tensei digital devil story megami tensei refers two distinct role-playing video games based trilogy science fantasy novels japanese author aya nishitani one version developed atlus published namco 1987 famicom—atlus would go create games megami tensei franchise separate version personal computers co-developed atlus telenet japan published telenet japan year enhanced port super famicom opera house released 1995 story sees japanese high school students akemi nakajima yumiko shirasagi combat forces lucifer unleashed demon summoning program created nakajima gameplay features first-person dungeon crawling turn-based battles negotiation demons famicom version journey hostile labyrinth nakajima featuring real-time combat telenet version development versions video game began following release original video animation adaptation nishitani first digital devil story book early 1987 nishitani deeply involved design scenario gameplay mechanics atlus role-playing version game based wizardry series added demon negotiation system considered revolutionary time atlus telenet japan worked projects simultaneously playing genre expectations respective platforms famicom version proved popular critics gamers spawning sequel titled 1990 famicom version digital devil story megami tensei traditional role-playing video game player takes control party composed two humans number demons party explores large dungeon using first-person perspective human characters use variety weapons items primary weapons swords guns items range healing items different types currency picked enemies found chests scattered dungeon weapons accessories purchased different shops found within dungeon progress saved using password system battles turn-based random encounters taking place exploring dungeons end successful battle experience points money items obtained experience points shared nakajima yumiko gaining enough experience points levels raise given one ability point given one five character attributes strength intelligence attack dexterity luck battles player try persuade enemy demons join exchange magnetite money items player keep seven demons time four summoned time summoned demons aid player battles physical magic attacks cost money summon consume magnetite player walks around demons attitude towards player governed moon phase cycles eight phases new full demons level instead player create stronger demons visiting special location fusing two allied demons together new one version personal computers pc action role-playing game plays top-down perspective controlling nakajima player explores labyrinthine levels dungeon populated enemies combat plays real time nakajima fighting demons using short-range melee attacks ranged magic attacks section dungeon ends powerful boss character plot sees akemi nakajima clever bullied high school student reincarnation deity izanagi develop computer program summons demons makai realm demons initially using program gain revenge tormentors program goes control unleashes horde demons demons commanded lucifer resurrects demonic gods loki set following defeat nakajima yumiko help friend yumiko shirasagi transfer student became interested nakajima reincarnation goddess izanami nakajima takes makai help combat demons pair travel vast subterranean labyrinth defeat lucifer generals—including loki set—before fighting lucifer defeating closing entrance makai digital devil story megami tensei began trilogy science fantasy books written japanese author aya nishitani published tokuma shoten novels major success japan novels first adapted original video animation ova retold events first novel following completion ova 1987 tokuma shoten decided expand series video games license develop game based nishitani work simultaneously acquired two companies atlus telenet japan two companies willing work project wanted differentiate products famicom noted action-based titles pcs traditional role-playing games two companies decided respectively play platform expectations two different game projects created tokuma shoten supervision digital devil story megami tensei title atlus created traditional role-playing game published namco atlus telenet collaborated action role-playing game would published telenet two versions developed concurrently although version telenet first completed atlus version directed kouji okada scenario original elements written kazunari suzuki sprite promotional artwork designed esaki minoru music composed tsukasa masuko early phases gameplay concept near-copy gameplay style wizardry series attributed suzuki superiors fans series suzuki insisted inclusion new feature would distinguish wizardry resulted creation demon negotiation system okada later stated demon negotiation decided upon early stage speaking later first-person exploration okada highly critical feeling efforts left everything said done lots lots long winding dungeons storage space cartridge recurring concern team suzuki using unspecified programming tricks include high-quality sprite graphics due rules gaming industry time teams studios either went uncredited pseudonyms masuko credited project satan storyline game based final novel nishitani trilogy tensei shuuen although taking title first novel megami tensei nishitani deeply involved planning game contributing suggestions advice project according okada major issue development faithfully following novel plot due limited hardware space famicom cartridge together necessity creating compelling gameplay experience mind team picked key parts novel plot include game cutting non-essential elements one element included questionable morality main protagonist prominent feature novels suzuki later commented working namco game ever released due mature character designs heavy use religion narrative cerberus demon would become recurring feature later megami tensei games homage narrative nishitani trilogy time emulating trend games marketable mascot character pc version game published telenet japan pc88 msx x1 fm-7 models july september 1987 pc88 version re-released april 25 2006 kadokawa shoten part collection fifteen games platform famicom version digital devil story megami tensei published namco september 11 1987 version later re-released atlus dedicated mobile store first ntt docomo mobile devices february 26 2004 vodafone live service december 1 year finally brew services september 29 2005 mobile versions direct ports featured graphical improvements automatic mapping dungeons ability save anywhere game game received enhanced port super famicom japanese developer opera house combining game sequel version graphics reworked gameplay adjusted demon artwork redrawn then-established series illustrator kazuma kaneko music arranged hitoshi sakimoto titled kyuuyaku megami tensei port released march 31 1995 version re-released virtual console wii july 3 2012 version game released outside japan attributed nintendo policy censoring religious references games rendered early megami tensei titles unsuitable localization due central religious elements fan translation kyuuyaku megami tensei released august 28 2014 review famitsu compared 3d dungeon exploration atlus version deep dungeon series critics giving praise gameplay unusual setting article game 1991 family computer magazine called revolutionary rpg praising gameplay atmosphere despite design making easy players get lost ohta publishing magazine continue cited dark atmosphere mechanics impressive given limited hardware innovative among role-playing games time kurt kalata christopher j. snelgrove hardcore gaming 101 stated surprising depth monster catching fusing elements given game age praising mechanics despite age high difficult curve contrast praise famicom version referred telenet japan version poor clone gauntlet low-quality graphics specific sales figures available okada said game commercial success allowing atlus breathing room consider next take series mixture demon negotiation recruitment traditional role-playing mechanics considered revolutionary time ugo networks writer k. thor jensen cited game first successful use cyberpunk aesthetics video games saying series mix science fiction elements occult create truly unique fictional cyberpunk world 2012 feature influential games game informer kimberley wallace attributed digital devil story megami tensei pioneering monster collecting gameplay popularized pokémon series 2015 retrospective game 1992 successor shin megami tensei touch arcade shaun musgrave noted unusual game mechanics within standardised role-playing formula science fiction-inspired setting contrast fantasy settings dominating genre time following success game atlus decided create sequel instead continuing adapt nishitani work created original story expanded narrative refined gameplay titled game released famicom 1990 digital devil story megami tensei first game megami tensei series atlus eventually buying rights franchise turning series famous intellectual property megami tensei called third popular rpg series japan dragon quest final fantasy gone include multiple subseries expansions media | [
4023,
1507,
5532,
3735
] | Train |
424 | 2 | PlayStation_Vita_system_software:playstation vita system software playstation vita system software official firmware operating system playstation vita playstation tv video game consoles uses livearea graphical shell playstation vita system software one optional add-on component playstation mobile runtime package system built unix-base derived freebsd netbsd livearea name graphical user interface playstation vita system software developed sony computer entertainment interface features new touch-based screen acts like hub page allows users hop different parts game space eighth-generation playstation vita playstation tv consoles use livearea graphical shell instead previous xrossmediabar xmb interface used sony seventh-generation video game consoles playstation portable playstation 3 playstation 4 sony eighth-generation home video game console however uses neither livearea xrossmediabar graphical shell rather utilizes user interface called playstation dynamic menu playstation vita system software uses livearea user interface includes various social networking features via playstation network users select icon game application home screen open livearea screen game application playstation vita playstation tv new feature playstation vita playstation tv livearea latest game information downloadable contents shown livearea screen game addition scrolling game livearea activity users playing game checked instantly playstation vita playstation tv uses system software playstation vita supports feature called remote play sony home video game consoles playstation 3 playstation 4 allows playstation 3 playstation 4 transmit video audio output playstation vita however unlike remote play playstation vita playstation 4 well-integrated remote play playstation vita playstation 3 supported select ps3 titles results often laggy besides playstation vita used second screen device ps4 ps3 supported games class heroes 2g streaming content directly console playstation vita also users playstation vita playstation 3 possible share media files videos music images transferring multimedia files directly playstation vita playstation 3 vice versa updates playstation vita system software also downloaded ps vita devices via ps3 system furthermore service called cross-buy used allows players buy certain games support feature one time play sony platforms minecraft terraria examples games saved worlds transferable consoles minecraft longer cross buy february 25 2016 also feature called cross-play cross-platform play covering playstation vita software title interact playstation 3 playstation 4 software title different software titles use cross-play different ways example ultimate marvel vs. capcom 3 title supporting cross-play feature ps3 version game controlled using ps vita system although playstation vita console function without internet connection provide functionality connected internet example users may download updates system software internet well playing online internet properly connected additionally internet connection playstation vita system allows users access variety playstation network psn services playstation store playstation plus subscription service games content may purchased services applications live playstation app well various video streaming apps also require internet connection function properly browser preinstalled app playstation vita browsing world wide web although different web browsing playstation portable browser improved psp version intended result less difficult experience browser application tabs users 8 separate browser windows open also save images websites ps vita memory card touching holding image menu appears however users use web browser playing game watching video display content limited result recommended exit open game video performing intensive browsing tasks furthermore ps vita web browser supports html5 cookies javascript support adobe flash unlike psp web browser another application preinstalled playstation vita launch maps displayed online maps internet connection available however removed sony via system update along near feature 2015 like many video game consoles playstation vita capable photo audio video playback variety formats built-in cameras used take photos videos however unlike sony home consoles playstation 3 playstation 4 possible play blu-ray dvd movies playstation vita since lacks optical disc drive umd drive playstation portable however users transfer movies supported format playstation vita system videos download playstation store also users transfer content playing displayed playstation vita system playstation tv system allowing view content televisions instead ps vita screens following multimedia formats supported ps vita ps tv system furthermore entertainment applications available download playstation store ps vita ps tv system sony announced gamescom 2011 applications like netflix would become available via playstation store additional applications available download include music unlimited flickr nico nico tunein radio qello crunchyroll crackle hulu plus redbox instant youtube although many compatible ps tv launch similar early playstation 3 consoles compatible playstation 2 titles playstation vita backwards-compatible playstation portable games however playstation vita lacks playstation portable umd drive sony confirmed psp owners would able transfer physical umd games across ps vita system means users able play psp games ps vita originally downloaded via playstation network rather bought disc playing psp game ps vita system ps vita dual analog sticks supported psp games right stick set mimic either d-pad left stick l r buttons face button cluster original psp system graphics psp releases up-scaled optional bilinear filter reduce pixelation besides playstation portable games playstation vita also backwards-compatible majority titles platforms psone classics playstation minis playstation mobile games psone classic titles compatible ps vita launch gradually became available ps vita since system software update 1.80 released august 28 2012 playstation mobile games originally intended compatible playstation vita playstation tv certain devices run android operating system playstation mobile 2.00 released 2014 would target playstation vita optionally playstation tv gaming platforms sony gaming platforms generation gaming platforms seventh generation | [
2177,
7514,
6794,
2187,
6085,
2564,
728,
5391,
738,
3636,
740,
746,
2583,
5760,
5062,
5065,
4718,
5068,
2240,
6477,
6489,
4011,
6860,
84,
443,
5446,
5794,
786,
4748,
6158,
6505,
7956,
450,
7962,
4761,
4400,
5116,
474,
1547,
4408,
481,
... | Test |
425 | 2 | Windows_Hardware_Lab_Kit:windows hardware lab kit windows hardware lab kit windows hlk test automation framework provided microsoft certify devices windows earlier similarly released frameworks called windows hardware certification kit windows hck windows logo kit wlk provides automated scheduling execution driver tests hardware vendors required pass order qualify use microsoft designed windows logo also enables users automate driver tests created tests mixed matched logo tests provided microsoft create custom test pass enables organizations use dtm validate drivers way see fit windows 2000 xp 2003 timeframe old tool hardware compatibility test hct certify devices windows vista released tool replaced driver test manager dtm certify drivers then-supported platforms time dtm part windows driver kit wdk later dtm separated wdk changed name windows logo kit wlk windows 8 name changed windows hardware certification kit windows hck announced //build/ conference subsequently name changed windows hardware lab kit windows hlk windows 10 release intended testing hardware drivers windows 10 platform windows hardware certification kit continues testing hardware windows 7 windows 8 windows 8.1 server products respectively platforms | [
4759,
7619,
7621,
7715,
2283,
4936,
7971,
8183,
8085,
7635,
2840,
7080,
5571,
8094,
4697,
5747,
5234,
3303,
930,
53,
941,
422,
1684,
5694,
5252,
2341,
2885,
2702,
7687,
2530,
2802,
4017,
2085
] | Test |
426 | 5 | UDP-based_Data_Transfer_Protocol:udp-based data transfer protocol udp-based data transfer protocol udt high-performance data transfer protocol designed transferring large volumetric datasets high-speed wide area networks settings typically disadvantageous common tcp protocol initial versions developed tested high-speed networks 1 gbit/s 10 gbit/s etc however recent versions protocol updated support commodity internet well example protocol supports rendezvous connection setup desirable feature traversing nat firewalls using udp udt open source implementation found sourceforge one popular solutions supporting high-speed data transfer part many research projects commercial products udt developed yunhong gu phd studies national center data mining ncdm university illinois chicago laboratory dr. robert grossman dr. gu continues maintain improve protocol graduation udt project started 2001 inexpensive optical networks became popular triggered wider awareness tcp efficiency problems high-speed wide area networks first version udt also known sabul simple available bandwidth utility library designed support bulk data transfer scientific data movement private networks sabul used udp data transfer separate tcp connection control messages october 2003 ncdm achieved 6.8 gigabits per second transfer chicago united states amsterdam netherlands 30-minute test transmitted approximately 1.4 terabytes data sabul later renamed udt starting version 2.0 released 2004 udt2 removed tcp control connection sabul used udp data control information udt2 also introduced new congestion control algorithm allowed protocol run fairly friendly concurrent udt tcp flows udt3 2006 extended usage protocol commodity internet congestion control tuned support relatively low bandwidth well udt3 also significantly reduced use system resources cpu memory additionally udt3 allows users easily define install congestion control algorithms udt4 2007 introduced several new features better support high concurrency firewall traversing udt4 allowed multiple udt connections bind udp port also supported rendezvous connection setup easier udp hole punching fifth version protocol currently planning stage possible features include ability support multiple independent sessions single connection moreover since absence security feature udt issue initial implementation commercial environment bernardo 2011 developed security architecture udt part phd studies architecture however undergoing enhancement support udt various network environments i.e. optical networks udt built top user datagram protocol udp adding congestion control reliability control mechanisms udt application level connection oriented duplex protocol supports reliable data streaming partial reliable messaging udt uses periodic acknowledgments ack confirm packet delivery negative acks loss reports used report packet loss periodic acks help reduce control traffic reverse path data transfer speed high situations number acks proportional time rather number data packets udt uses aimd additive increase multiplicative decrease style congestion control algorithm increase parameter inversely proportional available bandwidth estimated using packet pair technique thus udt probe high bandwidth rapidly slow better stability approaches maximum bandwidth decrease factor random number 1/8 1/2 helps reduce negative impact loss synchronization udt packet transmission limited rate control window control sending rate updated aimd algorithm described congestion window secondary control mechanism set according data arrival rate receiver side udt implementation exposes set variables related congestion control c++ class allows users define set callback functions manipulate variables thus users redefine control algorithm overriding callback functions tcp control algorithms implemented using feature fewer 100 lines code beside traditional client/server connection setup aka caller/listener listener waits connection potentially accepts multiple connecting callers udt supports also new rendezvous connection setup mode mode sides listen port connect peer simultaneously connect one another therefore parties must use port connection parties role-equivalent contrast listener/caller roles traditional setup rendezvous widely used firewall traversing peers behind firewalls udt widely used high-performance computing support high-speed data transfer optical networks example gridftp popular data transfer tool grid computing udt available data transfer protocol commodity internet udt used many commercial products fast file transfer wide area networks udt purely based udp also used many situations tcp disadvantage udp scenarios include peer-to-peer applications video audio communication many others udt considered state-of-the-art protocol addressing infrastructure requirements transmitting data high-speed networks development however creates new vulnerabilities like many protocols relies solely existing security mechanisms current protocols transmission control protocol tcp udp research conducted dr. danilo valeros bernardo university technology sydney member australian technology network focusing practical experiments udt using proposed security mechanisms exploring use existing security mechanisms used tcp/udp udt gained interesting reviews various network security scientific communities analyze security mechanisms carry formal proof correctness assist determining applicability using protocol composition logic pcl approach modular comprising separate proof protocol section providing insight network environment section reliably employed moreover proof holds variety failure recovery strategies implementation configuration options derive technique pcl tls kerberos literature work developing validating security architecture using rewrite systems automata result work first literature robust theoretical practical representation security architecture udt viable work high-speed network protocols udt project base srt project uses transmission reliability live video streaming public internet udt team prestigious bandwidth challenge three times annual acm/ieee supercomputing conference world premier conference high-performance computing networking storage analysis sc06 tampa fl team transferred astronomy dataset 8 gbit/s disk-to-disk chicago il tampa fl using udt sc08 austin tx team demonstrated use udt complex high-speed data transfer involving various distributed applications 120-node system across four data centers baltimore chicago 2 san diego sc09 portland collaborative team ncdm naval research lab icair showcased udt-powered wide area data intensive cloud computing applications | [
6025,
2696,
7637,
8062,
2664,
6760,
2901
] | Test |
427 | 7 | Serval_Project:serval project serval project often referred serval project financed shuttleworth foundation well various organisations accepting individual donations headquartered flinders university adelaide australia project aims develop technology used create direct connections cellular phones wi-fi interfaces without need mobile phone operator technology allows live voice calls whenever mesh able find route participants text messages data communicated using store forward system called rhizome allowing communication unlimited distances without stable live mesh connection participants serval project includes collaborate mapping application intended support disaster relief recovery efforts mesh extender developed establishes short range serval mesh wifi joins distant meshes linking mesh extenders packet radio operating ism 915 mhz band serval mesh android application serval project flagship product currently distributed various application distribution platforms repositories also downloaded directly project website application may shared directly one device others nearby wifi bluetooth serval mesh application built two components user interface called batphone core networking encryption file sharing component called serval dna batphone source code licensed public terms gplv3 license whereas serval dna source code licensed terms gplv2 license | [
6987,
3762,
5571,
2974,
4177
] | Validation |
428 | 4 | Bradley_Willman:bradley willman bradley willman born 1980 anti-pedophile activist canada engaged private investigations using internet expose pedophiles one time unfettered access 2,000 3,000 computers used visit websites interest pedophiles result use trojan horse willman actions helped put california superior court judge ronald kline prison two years 2007 possession child pornography however legality willman use trojan horse basis appeal judge willman born 1980 langley british columbia canada willman identifies private computer cop previously used aliases garbie omnipotent late 1990s willman began tracking investigating people downloaded child porn internet time 2000 willman devised trojan horse type computer program used conduct investigations trojan horse posted websites interest pedophiles way appeared picture-file attached message actually program file visitor pedophile website downloaded file visitor unwittingly downloaded trojan horse would typically unaware running computer willman control chose download trojan horse downloaded willman could access search retrieve files infected computer willman stated whole intent program started working expected help kids willman estimated trojan horse gave access 2,000 3,000 computers used visit websites interest pedophiles including police officers military personnel social workers priests judges march 2000 willman helped royal canadian mounted police child molestation case time august 2000 willman anonymously provided private watchdog group documents related kentucky state investigation child molestation production child pornography prior january 2001 united states customs service contacted willman see whether discovered useful information related suspected russian child pornography ring early may 2000 california superior court judge ronald c. kline 1941– downloaded trojan horse computer trojan horse allowed willman b.c. monitor contents kline computer california may 2000 mid-april 2001 willman copied kline computer portions kline diary april 2001 willman anonymously forwarded excerpts diary kline hard drives final entry dated march 18 2001 website pedophile-watchdog pedowatch pedowatch passed diary san bernardino county sheriff office forwarded california attorney general office turn sent city irvine police department november 2001 irvine police searched kline irvine home found 1,500 pornographic computer images young children judge home computer child porn also found kline courthouse computer event drew national attention ultimately led kline drop bid reelection judge largely result efforts talk radio hosts john ken kfi-am 640 kline charged november 2001 united states federal government possession child pornography man said judge molested 14 years old quarter-century earlier came forward california state child molestation charges filed kline well state child molestation charges dismissed july 2003 legal case stogner v. california held california extension statute limitations sex-related child abuse could applied previously time-barred prosecutions united states evidence derives illegal government search generally used court defendant government however evidence derives illegal private search citizen tipster may used court government even though search illegal individual illegal search court answers private/government search question determining whether individual instrument agent government government knew acquiesced intrusive conduct ... party performing search intended assist law enforcement efforts party performing illegal search considered agent government march 17 2003 federal judge ruled willman working government informant invaded judge kline computers willman thought agent law enforcement ii willman motivation invasion act law enforcement purposes since judge ruled violated kline united states 4th amendment right privacy illegal searches government judge suppressed prosecution strongest evidence kline specifically judge suppressed evidence seized kline home home computer including excerpts computer diary sexual desires 1,500 pornographic photos young boys appeal united states court appeals ninth circuit appeals court disagreed federal judge found enough willman act intent assist government needed degree governmental knowledge acquiescence willman actions find willman acting government agent thus appeals court reversed district court order suppressing evidence found fruit willman illegal private search march 2005 united states supreme court declined hear case ended kline appeals 9th circuit united states supreme court actions willman evidence back play december 2005 former orange county superior court judge ronald c. kline pleaded guilty possessing child pornography home computer ending four-year legal battle kline house arrest trial conviction could brought kline 30-year prison term plea agreement limited prison time possible 27 33 months june 2006 state commission judicial performance gave kline serious punishment could give former judge barring receiving work state courts february 2007 kline sentenced 27 months prison possessing child pornography | [] | Validation |
429 | 4 | Threat_(computer):threat computer computer security threat possible danger might exploit vulnerability breach security therefore cause possible harm threat either intentional i.e hacking individual cracker criminal organization accidental e.g possibility computer malfunctioning possibility natural disaster earthquake fire tornado otherwise circumstance capability action event iso 27005 defines threat comprehensive definition tied information assurance point view found federal information processing standards fips 200 minimum security requirements federal information information systems nist united states america national information assurance glossary defines threat enisa gives similar definition open group defines threat factor analysis information risk defines threat national information assurance training education center gives articulated definition threat term threat relates basic security terms shown following diagram resource physical logical one vulnerabilities exploited threat agent threat action result potentially compromise confidentiality integrity availability properties resources potentially different vulnerable one organization others involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromises confidentiality owasp see figure depicts phenomenon slightly different terms threat agent attack vector exploits weakness vulnerability system related security controls causing technical impact resource asset connected business impact set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country countermeasures also called security controls applied transmission information named security services overall picture represents risk factors risk scenario widespread computer dependencies consequent raising consequence successful attack led new term cyberwarfare nowadays many real attacks exploit psychology least much technology phishing pretexting methods called social engineering techniques web 2.0 applications specifically social network services mean get touch people charge system administration even system security inducing reveal sensitive information one famous case robin sage widespread documentation computer insecurity technical threats computer virus trojan malware serious study apply cost effective countermeasures conducted following rigorous risk analysis framework isms pure technical approach let psychological attacks increasing threats threats classified according type origin note threat type multiple origins people interested studying possible threats microsoft proposed threat classification called stride initials threat categories microsoft previously rated risk security threats using five categories classification called model considered obsolete microsoft categories dread name comes initials five categories listed spread network threats lead dangerous situations military civil fields threat level defined example infocon threat level used us leading antivirus software vendors publish global threat level websites term threat agent used indicate individual group manifest threat fundamental identify would want exploit assets company might use company individuals within threat population practically anyone anything right circumstances threat agent – well-intentioned inept computer operator trashes daily batch job typing wrong command regulator performing audit squirrel chews data cable threat agents take one following actions asset important recognize actions affects different assets differently drives degree nature loss example potential productivity loss resulting destroyed stolen asset depends upon critical asset organization productivity critical asset simply illicitly accessed direct productivity loss similarly destruction highly sensitive asset play critical role productivity would directly result significant productivity loss yet asset disclosed result significant loss competitive advantage reputation generate legal costs point combination asset type action asset determines fundamental nature degree loss action threat agent takes driven primarily agent motive e.g. financial gain revenge recreation etc nature asset example threat agent bent financial gain less likely destroy critical server steal easily pawned asset like laptop important separate concept event threat agent get contact asset even virtually i.e network event threat agent act asset owasp collects list potential threat agents prevent system designers programmers insert vulnerabilities software threat agent capabilities intentions past activities individuals groups classified follows threat sources wish compromise occur term used distinguish threat agents/actors carry attack may commissioned persuaded threat source knowingly unknowingly carry attack threat action assault system security complete security architecture deals intentional acts i.e attacks accidental events various kinds threat actions defined subentries threat consequence threat analysis analysis probability occurrences consequences damaging actions system basis risk analysis threat consequence security violation results threat action includes disclosure deception disruption usurpation following subentries describe four kinds threat consequences also list describe kinds threat actions cause consequence threat actions accidental events marked collection threats particular domain context information identified vulnerable assets threats risks threat actors observed trends threats managed operating isms performing risk management activities foreseen laws standards methodologies large organizations tend adopt business continuity management plans order protect maintain recover business-critical processes systems plans foreseen set computer security incident response team csirt computer emergency response team cert kind verification threat management process organizations perform subset steps adopting countermeasures based non systematic approach computer insecurity studies battlefield computer security exploits defences results information security awareness significant market see lot software developed deal threats including open-source software see proprietary software see partial list threat management involves wide variety threats including physical threats like flood fire isms risk assessment process incorporate threat management cyber threats remote buffer overflows risk assessment process n't include processes threat intelligence management response procedures cyber threat management ctm emerging best practice managing cyber threats beyond basic risk assessment found isms enables early identification threats data-driven situational awareness accurate decision-making timely threat mitigating actions ctm includes cyber threat hunting process proactively iteratively searching networks detect isolate advanced threats evade existing security solutions contrast traditional threat management measures firewalls intrusion detection systems siems typically involve investigation warning potential threat incident occurred threat hunting manual process security analyst sifts various data information using knowledge familiarity network create hypotheses potential threats even effective efficient however threat hunting partially automated machine-assisted well case analyst utilizes software harnesses machine learning user entity behaviour analytics ueba inform analyst potential risks analyst investigates potential risks tracking suspicious behaviour network thus hunting iterative process meaning must continuously carried loop beginning hypothesis three types hypotheses analyst researches hypothesis going vast amounts data network results stored used improve automated portion detection system serve foundation future hypotheses sans institute conducted research surveys effectiveness threat hunting track disrupt cyber adversaries early process possible according survey released 2016 adopters model reported positive results 74 percent citing reduced attack surfaces 59 percent experiencing faster speed accuracy responses 52 percent finding previously undetected threats networks | [
3932,
1467,
5401,
5051,
2944,
3997,
1135,
84,
3680,
7964,
4036,
5113,
812,
7630,
6189,
4419,
3726,
5201,
5212,
5220,
5568,
7359,
8091,
6998,
8109,
943,
8121,
8123,
1311,
2791,
1691,
2434,
7039,
3170,
1353,
998,
4945,
6022,
7093,
7106,
6... | Test |
430 | 5 | Skinny_Call_Control_Protocol:skinny call control protocol skinny client control protocol sccp proprietary network terminal control protocol originally developed selsius systems acquired cisco systems 1998 sccp lightweight ip-based protocol session signaling cisco unified communications manager formerly named callmanager examples sccp clients include cisco 7900 series ip phones cisco ip communicator softphone 802.11b wireless wireless ip phone 7920 along cisco unity voicemail server callmanager acts signaling proxy call events initiated common protocols h.323 session initiation protocol sip isdn and/or mgcp sccp client uses tcp/ip communicate one call manager applications cluster uses real-time transport protocol rtp udp-transport bearer traffic real-time audio stream skinny clients h.323 terminal sccp stimulus-based protocol designed communications protocol hardware endpoints embedded systems significant cpu memory constraints cisco analog media gateways vg248 gateway register communicate cisco unified communications manager using sccp cisco acquired sccp technology acquired selsius corporation 1998 reason protocol also referred cisco documentation selsius skinny station protocol another remnant origin cisco ip phones default device name format registered cisco phones callmanager sep selsius ethernet phone followed mac address cisco also marketed skinny-based softphone called cisco ip communicator companies symbol technologies socketip digium implemented protocol voip terminals ip phones media gateway controllers softswitches open source implementation available asterisk freeswitch systems ipblue provides soft phone emulates cisco 7960 telephone twinlights software distributes soft phone implementation android-based devices cisco unified application environment product acquired cisco purchased metreos supports using sccp emulate cisco 7960 phones allowing applications access cisco line-side features | [
4316,
5361,
7590,
4783,
5181,
7170
] | Test |
431 | 4 | Global_Internet_Freedom_Consortium:global internet freedom consortium global internet freedom consortium consortium organizations develop deploy anti-censorship technologies use internet users countries whose governments restrict web-based information access organization reportedly begun 2001 chinese-born scientists living united states reacting chinese government oppression falun gong main products freegate ultrasurf organization states majority funding comes members may 2010 group offered 1.5 million usd grant united states department state move received criticism representatives chinese government | [
909,
731,
8191,
4196,
803,
6419,
1175,
4111
] | Train |
432 | 2 | Mojave_Experiment:mojave experiment mojave experiment failed advertising campaign microsoft windows vista campaign unsuccessful part microsoft efforts change felt unfair negative consumer perception operating system mojave spanned series advertisements consisted individuals shown demonstration windows vista microsoft however operating system rebranded disguise new version windows codenamed mojave revealed demonstration prior demonstration participants generally gave negative assessment windows vista afterwards participants pressured delivering reviews mojave positive participants stating intended use purchase operating system participants asked act astonished told mojave windows vista campaign implied negative consumer perception largely result preconceived notions operating system resulting continuous negative portrayals media mojave experiment public case study designed microsoft determine computer users thoughts windows vista absence prior experience study begins asking participant thoughts windows vista answers based solely knowledge word mouth asked rate windows vista 0 10 next participants introduced windows mojave windows vista rebranded prevent preconceived bias users guided microsoft assistant test mojave test participants asked rate mojave 0 10 revealed participants mojave simply windows vista rebranded mohab gabal criticized experiment hardware software already set users install applications device drivers typical source compatibility issues | [
183,
3076,
8054,
4293,
4759,
7619,
2550,
7715,
2283,
8076,
5475,
5213,
644,
3958,
2739,
5563,
6618,
8085,
4500,
1097,
5571,
7734,
6110,
5141,
3028,
134,
2492,
5850,
4524,
7660,
3395,
2326,
6839,
7848,
3135,
8118,
522,
2066,
6580,
6054,
... | Test |
433 | 4 | Integral_cryptanalysis:integral cryptanalysis cryptography integral cryptanalysis cryptanalytic attack particularly applicable block ciphers based substitution-permutation networks originally designed lars knudsen dedicated attack square commonly known square attack also extended ciphers related square crypton rijndael shark stefan lucks generalized attack called saturation attack used attack twofish similar square radically different feistel network structure forms integral cryptanalysis since applied variety ciphers including hierocrypt idea camellia skipjack misty1 misty2 safer++ khazad fox called idea nxt unlike differential cryptanalysis uses pairs chosen plaintexts fixed xor difference integral cryptanalysis uses sets even multisets chosen plaintexts part held constant another part varies possibilities example attack might use 256 chosen plaintexts 8 bits differ 8 bits set necessarily xor sum 0 xor sums corresponding sets ciphertexts provide information cipher operation contrast differences pairs texts sums larger sets texts inspired name integral cryptanalysis borrowing terminology calculus | [
1811,
4930,
464,
807,
1353,
2918,
907,
3100,
119,
6015,
6016,
7548,
1283,
6637,
1480,
6647,
7200,
4805,
5765,
5327,
6657,
7928,
1587,
762,
5333,
6763,
6049,
161,
1320,
7771,
613,
1146,
4917
] | Test |
434 | 7 | Distributed_design_patterns:distributed design patterns software engineering distributed design pattern design pattern focused distributed computing problems distributed design patterns divided several groups | [
7924
] | Test |
435 | 2 | Protected_Media_Path:protected media path protected media path set technologies creating protected environment first included microsoft windows vista operating system used enforce digital rights management drm protections content subsets protected video path pvp protected user mode audio puma application uses protected media path windows uses media foundation protected environment drm content played contains media components play drm content application needs provide remote control play rewind pause rather handle unprotected content data protected environment also provides necessary support microsoft-approved signed third-party software modules added provides wall outside copying within walls content processed without making content available unapproved software order prevent users copying drm content windows vista provides process isolation continually monitors kernel-mode software loaded unverified component detected vista stop playing drm content rather risk content copied protected environment implemented completely software software-based attacks patching windows kernel possible restrictions concern various outputs pc drm content digital outputs digital visual interface dvi high definition multimedia interface hdmi high-bandwidth digital content protection hdcp enabled prevent someone recording digital stream even analog tv-style outputs typically require restrictions provided mechanisms macrovision cgms-a restrictions apply drm-restricted content hd dvd blu-ray encrypted aacs also apply windows xp using supported playback applications users standard unprotected content restrictions output types s/pdif sony/philips digital interchange format typically ’ suitable drm scheme available need turned reliably content specifies vista control pc video outputs provided pvp-opm essentially next generation certified output protection protocol copp introduced windows xp however rather software application programming interface pvp-opm operates windows media components protected environment additionally pvp-uab protected video path user-accessible bus used encrypt video audio data passes pci-express bus prevent intercepted copied way graphics card complementary pvp output protection management january 2007 developer alex ionescu announced found method allows end users bypass vista protected media path would allow digital content played equipment implement drm restriction measures like rescaling video resolutions disabling analog audio outputs however release source code fear microsoft lawsuit regarding possible violation dmca 6 march 2007 microsoft responded internal testing described method would work addition common criticisms digital rights management schemes speculation scheme motivated fact would affect official free/open source graphics driver support manufacturers scheme relies internals graphics cards tell whether hardware trustworthy permitted play copy-protected content could subverted attacker knows certain details hardware operation could disclosed hardware documentation open source device drivers however affect platform independency scheme provided charge microsoft frequently accused adding protected media path feature vista block customers copying rightfully owned media content practice believed protected fair use provisions copyright act feature widely quoted example microsoft uncompromising adherence drm accusations never gained much traction largely vista treats non-drm media exactly previous versions windows following vista release change availability free/open source drivers graphics hardware manufacturers | [
7879,
3937,
3263,
378,
2198,
6096,
2566,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
5442,
4377,
5090,
3340,
7602,
6164,
458,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
... | Validation |
436 | 7 | NetScaler:netscaler netscaler line networking products owned citrix systems products consist netscaler adc application delivery controller adc netscaler appfirewall application firewall netscaler unified gateway netscaler management analytics system netscaler sd-wan provides software-defined wide-area networking management netscaler initially developed 1997 michel k susai acquired citrix 2005 citrix consolidated networking products netscaler brand 2016 netscaler line products part citrix systems networking business includes netscaler adcs netscaler unified gateway netscaler appfirewall netscaler sd-wan netscaler management analytics system products work conjunction citrix offerings including xen line products netscaler integrated openstack part citrix systems sponsorship openstack foundation netscaler adc citrix systems core networking product application delivery controller adc tool improves delivery speed quality applications end user product aimed business customers performs tasks traffic optimization l4-l7 load balancing web app acceleration maintaining data security netscaler adc monitors server health allocates network application traffic additional servers efficient use resources also performs several kinds caching compression made server proxy process ssl requests offers vpn micro-app vpn operations also includes netscaler application firewall ssl encryption capabilities netscaler adc manage traffic ddos attacks making sure traffic gets critical applications additionally netscaler logs network activity feed citrix cloud-based analytics service used analyze identify security risks four versions netscaler adc netscaler mpx hardware-based appliance use data centers netscaler sdx hardware-based appliance intended service providers provides virtualization delivering multitenancy virtual cloud-based data centers netscaler vpx software-based application implemented virtual machine intended small business use netscaler cpx netscaler adc packaged container designed cloud microservices applications addition netscaler line products include netscaler sd-wan formerly cloudbridge sd-wan provides software-defined wide-area networking branch networking netscaler unified gateway offers secure remote access virtual desktops variety applications single point entry single sign-on sso netscaler management analytics system platform designed organization automation policy management across devices applications tool intended professionals manage various netscaler products single dashboard platform also provides real-time analytics entrepreneur michel k. susai founded netscaler 1997 san jose california created netscaler solution reducing infrastructure growth internet late 1990s company repositioned netscaler security optimization tool 2001 2005 netscaler estimated 75 percent internet users used systems clients including google amazon citrix acquired netscaler 2005 approximately 300 million cash stock citrix released netscaler mpx faster power efficient netscaler adc model 2008 introduced vpx edition following year 2011 citrix launched netscaler sdx 2016 citrix transitioned delivery products netscaler brand citrix cloudbridge sd-wan became netscaler sd-wan company also introduced “ netscaler management analytics system ” console users manage netscaler products including adcs sd-wan containerized version netscaler called netscaler cpx citrix released free developer version netscaler cpx called netscaler cpx express august 2016. annual net revenue sales netscaler products services reviewing netscaler adc 2007 infoworld gave score 8.6 10 reviewer noted easy set administer provided performance improvements load balancing web application speed however variable results features tcp session buffering tcp session consolidation would depend factors well infoworld said netscaler best suited organizations making corporate applications available web internal external customers large heavily trafficked web sites costly available solutions small three-node web farm lightly loaded gcn wrote 2011 netscaler much load balancer ’ really all-in-one web application delivery system site gave netscaler a+ rating features b- ease use a+ performance c value article noted difficult learn expensive | [
2961,
1640,
3338,
4014,
3756
] | Validation |
437 | 1 | The_Health_Improvement_Network:health improvement network health improvement network thin large database anonymised electronic medical records collected primary care clinics throughout uk thin database owned managed health improvement network ltd collaboration practice systems ltd health improvement network ltd practice systems ltd subsidiary companies cegedim sa thin database similar structure content clinical practice research datalink cprd previously known gprd managed united kingdom medicines healthcare products regulatory agency mhra 1994 2002 epic uk not-for-profit company held non-exclusive licence use gprd research benefitting public health expiry licence thin developed epic alternative gprd substantial number primary care practitioners contribute data resources 2005 epic acquired cegedim global technology services company specialising healthcare field thin data made available permissive terms similar resources cprd allow for-profit use private companies access subject ethical approval independent scientific review committee data collection commenced january 2003 using information extracted vision widely used general practice management software package developed practice systems ltd company also owned cegedim sa database regularly updated currently contains data 10 million individuals living united kingdom clinical data thin catalogued using read codes comprehensive searchable classification scheme medical conditions symptoms important background information system complemented set additional health data ahd codes provide standardised system recording wide variety clinical measurements drug codes identify prescribed medications since 2004 uk quality outcomes framework performance-related pay scheme primary care practitioners effectively mandated use computer systems vision maintain patient medical records imposed standardised recording methods wide range important medical conditions addition practitioners contributing data thin receive training ensure consistent recording important clinical outcomes indicators including thin important resource fields epidemiology drug safety health outcomes research providing inexpensive means study causes disease effectiveness interventions large representative population | [
2542,
2054
] | Validation |
438 | 3 | Zork_III:zork iii zork iii dungeon master interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1982 infocom fourth game third game zork trilogy released amstrad cpc apple ii atari 8-bit family commodore 64 cp/m ibm pc self-booting disk msx trs-80 later macintosh atari st amiga player begins bottom endless stair zork ii zork iii less straightforward treasure hunt previous installments instead player—in role adventurer played zork zork ii —must demonstrate worthiness assume role dungeon master player must get past guardians zork complete garb dungeon master endure final test player must wearing amulet found bottom lake cloak hood received player chooses look hood vanquished opponent land shadow rather deal final blow staff received man cliff helping retrieve chest valuables attacking man way trying take valuables inevitably breaks staff strange key found key room player uses grue repellent zork ii get past dark places royal ring retrieved royal museum using gold machine travel back year 776 gue black book found royal puzzle unlike zork zork ii time-sensitive event earthquake randomly triggered 130 turns gameplay player must retrieve key earthquake aqueduct broken leaving escape route key room ca n't complete royal puzzle retrieve ring earthquake unopenable great door breaks also unlike previous two zork games lantern little relevance needed walk dark areas junction creepy crawl foggy room beginning game often done completing land shadow cliff flathead ocean—saying hello sailor viking yields invisibility vial—tasks another light source torch scenic vista used retrieve repellent zork ii deposit damp passage via teleportation table provide light source return journey retrieving key player items must give waybread elderly man engravings room reveals dungeon master fed find doorway leading final hallway elvish sword great antiquity used block beam beam room next adventurer must get guardians zork either accomplished using complicated mirror box simply drinking invisibility potion vial flathead ocean player knocks dungeon master door open player fully equipped see tells adventurer obey commands follow help solve final puzzle corridors lead parapet overlooks fiery cells reading book reveals map dungeon treasury zork 8 cells one bronze door leads treasury zork eight positions dial parapet correspond 8 cells adventurer must use trial error point summon cell bronze door dungeon master return original position replacing cell key unlock door revealing treasury zork contains wealth great underground empire well controlling share frobozzco international victorious discovery dungeon master appears transforms player duplicate signifying player succession position steve meretzky said 1984 worst bug ever got zork iii sword last puzzle makes game unwinnable call things like 'fatal errors caught one relatively early said zork iii 30 ways die compared games series scoring system unusual measures player potential simply reflection number treasures found points awarded taking creative steps toward solving problems rather actually solving e.g jumping lake earns adventurer point successfully taking amulet bottom lake system makes possible player 7 points without close finishing game game contains payoff hello sailor joke introduced zork saying hello sailor effect rest game saying hello sailor elicits response nothing happens anymore everywhere else saying hello sailor induces response nothing happens zork iii sold 129,232 copies 1986 creative computing reviewer wrote opinion zork iii best series addison-wesley book atari software 1984 gave game overall a+ rating calling perhaps entertaining three unexpected novel twist ending book concluded zork iii represents highwater mark subtlety logic four star must k-power rated zork iii 8 10 calling intelligent text game microcomputer 've ever seen gold machine known temporizer used travel time zork iii according strategy guide 1996 game zork nemesis caused using machine name shortened form golmac name one spells sorcerer | [
871
] | Test |
439 | 9 | FuseDocs_(programming):fusedocs programming fusedocs program definition language created hal helms late 1990s original form fusedocs used proprietary vocabulary define responsibilities properties i/o code module coldfusion programming language second form 2.0 fusedocs uses xml vocabulary essence fusedocs forms sort work order telling programmer everything needed write module nothing fusebox architect responsible creating fusedocs application dtd fusedocs available fusebox.org although fusedocs named creation within fusebox community also used developers employ fusebox application framework | [
3543
] | Test |
440 | 3 | Power_Drift:power drift objective finish race third place better order advance next stage players option continuing finish race fourth place lower game however player score increase upon continuing game tracks roller coaster feel lots steep climbs falls well ability fall higher levels add feeling sit-down cabinet built atop raised hydraulic platform machine would tilt shake quite violently circuit labeled e certain theme example circuit cities circuit b deserts circuit c beaches etc series five tracks also four laps course course springfield ovalshape foofy hilltop snowhill drive octopus oval curry de parl course b swingshot city phantom riverbend octangular ovalshape charlotte beach highland spheres course c bum beach jason bendyline nighthawk city zanussi island wasteman freefall course mexico colours oxygen desert jamie road monaco da farce blow hairpin course e aisthorpe springrose valley patterson nightcity lydia rightaway bungalow ridgeway karen longway two extra stages courses c e resemble jet fighter burner ii courses b resemble superbike super hang-on course game theme song follows power drift later ported amstrad cpc commodore 64 msx amiga atari st ms-dos zx spectrum activision 1989 spectrum version knocked long-standing robocop top sales charts pc engine version developed copya systems published exclusively japan asmik ace entertainment april 13 1990 sega later ported sega saturn part sega ages series compilations february 26 1998 yu suzuki game works vol 1 dreamcast december 1 2001 due weaker hardware every port except saturn dreamcast ones lacks tilting action seen original arcade version 32x port development sega never released unknown reasons likewise dempa also working sega cd conversion reached store shelves well players place first five tracks indicated five gold trophies number wins display behind course letter extra stage unlocked assigned car vehicle sega games courses c e allow players race f-14 tomcat fighter jet burner series extra stage courses b option race motorcycle hang-on series players also press start button race see rear view oddly enough billboards game contain ad well-known coca-cola soft drink defunct real-life chicago radio station wlak 94 sign showing popeye holding mug full beer text next reads seafood beer real estate sign saying sold name australian real estate company max christmas los angeles furniture store victory furniture using entity current real-life fonts signage might in-joke amongst designers might inspired seeing western advertisements magazines travels like | [
3332,
6380,
3518,
2377,
7994
] | Train |
441 | 3 | Comparison_of_CPU_microarchitectures:comparison cpu microarchitectures following comparison cpu microarchitectures | [
5012,
1075,
1447,
5371,
3948,
1083,
7527,
7529,
5737,
2567,
4694,
5042,
3294,
1481,
5055,
5405,
2950,
1867,
6474,
2248,
4370,
6148,
3674,
2977,
2266,
446,
5799,
451,
3348,
1162,
463,
6170,
5472,
4047,
4408,
1937,
5483,
1556,
3708,
5487,
... | Test |
442 | 1 | .NET_Persistence_API:.net persistence api .net persistence api also referred npa persistence object-relational mapping orm specification .net framework npa based java persistence api jpa standard persistence api java world npa follows jpa providing complete persistence api rich set orm features main purposes .net persistence api npa main features npa include npa persistence specification use npa implementation specification required persistence orm vendors provide implementations npa first implementation npa nhibernate released december 2011 | [
1860,
2702,
2530,
6594
] | Test |
443 | 2 | 386BSD:386bsd 386bsd also known jolix discontinued unix-like operating system based berkeley software distribution bsd released 1992 ran pc-compatible computer systems based 32-bit intel 80386 microprocessor 386bsd innovations included role-based security ring buffers self-ordered configuration modular kernel design 386bsd written mainly berkeley alumni lynne jolitz william jolitz william jolitz considerable experience prior bsd releases university california berkeley 2.8 2.9bsd contributed code developed symmetric computer systems 1980s berkeley work porting 4.3bsd-reno later 4.3bsd net/2 intel 80386 done university california william jolitz berkeley 4.3bsd net/2 incomplete non-operational release portions withheld university california encumbered i.e subject unix source code license 386bsd releases made public beginning 1992 based portions 4.3bsd net/2 release coupled additional code see missing pieces ii dr. dobb journal may–june 1992 written william lynne jolitz make complete operational release port began 1989 first incomplete traces port found 4.3bsd net/2 1991 port made possible keith bostic partly influenced richard stallman started remove proprietary bsd 1988 port first released march 1992 version 0.0 much usable version july 14 1992 version 0.1 porting process code extensively documented 18-part series written lynne jolitz william jolitz dr. dobb journal beginning january 1991 release 386bsd 0.1 group users began collecting bug fixes enhancements releasing unofficial patchkit due differences opinion jolitzes patchkit maintainers future direction release schedule 386bsd maintainers patchkit founded freebsd project 1993 continue work around time netbsd project founded different group 386bsd users aim unifying 386bsd strands bsd development one multi-platform system projects continue day due lawsuit usl v. regents university california potentially so-called encumbered source agreed distributed within berkeley software distribution net/2 university california subsequent release 1993 4.4bsd-lite made university correct issue however 386bsd dr. dobb journal william jolitz lynne jolitz never parties subsequent lawsuits settlements arising dispute university california continued publish work 386bsd code base lawsuits without limitation never legal filings claims university usl responsible parties respect 386bsd finally code developed 386bsd done william jolitz lynne jolitz issue lawsuits late 1994 finished version 386bsd release 1.0 distributed dr. dobb journal cdrom due immense size 600 mb release 386bsd reference cd-rom best-selling cdrom three years 1994–1997 386bsd release 1.0 contained completely new kernel design implementation began process incorporate recommendations made earlier berkeley designers never attempted bsd august 5 2016 update pushed 386bsd github developer ben jolitz named version 2.0 release 2.0 built upon modular framework create self-healing components however almost documentation remains version 1.0 change log available 386bsd often confused bsd/386 different project developed bsdi berkeley spinout starting 1991 bsd/386 used 386bsd code contributed university california 4.3bsd net/2 although jolitz worked briefly uunet later spun bsdi 1991 work diverged contributed university california appear 386bsd instead william jolitz gave regular code updates donn seeley bsdi packaging testing returned materials william jolitz left company following fundamental disagreements company direction goals rights respect 386bsd jolix held exclusively william jolitz lynne jolitz 386bsd public releases ended 1997 since code available many 386bsd-derived operating systems today along several derivatives thereof apple darwin openbsd portions 386bsd may found open systems opensolaris 1/91 ddj designing software specification | [
1807,
5362,
7514,
6794,
4670,
6085,
2559,
738,
5048,
2583,
4344,
5760,
1493,
6477,
424,
4733,
6489,
4751,
473,
5481,
2294,
481,
2300,
1193,
6918,
4441,
4447,
6577,
6583,
1614,
7702,
4478,
554,
900,
6267,
908,
5216,
3457,
1279,
5571,
578... | Test |
444 | 3 | Windows_NT_3.5:windows nt 3.5 windows nt 3.5 operating system developed microsoft released september 21 1994 second release windows nt one primary goals windows nt 3.5 development improve operating system performance result project codenamed daytona daytona international speedway daytona beach florida.. like many older windows versions 1996 microsoft stopped supporting windows nt 3.5 december 31 2001 support windows nt 3.51 workstation also ended date windows nt 3.5 comes two editions nt workstation nt server respectively replace nt nt advanced server editions windows nt 3.1 workstation edition allows 10 concurrent clients access file server support mac clients windows nt 3.5 includes integrated winsock tcp/ip support predecessor windows nt 3.1 includes incomplete implementation tcp/ip based unix system v streams api tcp/ip ipx/spx stacks windows nt 3.5 rewritten netbios tcp/ip netbt support compatibility layer tcp/ip introduced also microsoft dhcp wins clients dhcp wins servers windows nt 3.5 share files via file transfer protocol printers line printer daemon protocol act gopher http wais server ref name= tcp/ip windows nt 3.5 /ref includes remote access service remote dial-up modem access lan services using either slip ppp protocols windows nt 3.5 resource kit includes first implementation microsoft dns new features windows nt 3.5 include long filenames 255 characters object linking embedding ole version 2.0 support input/output completion ports microsoft updated graphical user interface would consistent windows workgroups 3.11 nt 3.5 shows performance improvements nt 3.1 requires less memory lack drivers pcmcia cards limited nt 3.5 suitability notebook computers install windows nt 3.5 computer sixth-generation later x86 processor one modify files installation cd-rom july 1995 windows nt 3.5 service pack 3 rated national security agency complying trusted computer system evaluation criteria tcsec c2 criteria | [
709,
4293,
7161,
4687,
1097,
5055,
2226,
6136,
5781,
6857,
5442,
2261,
4377,
5794,
447,
448,
1522,
458,
4759,
7616,
1536,
5480,
5826,
7660,
2329,
3048,
6580,
3062,
7685,
5880,
3751,
6256,
4500,
5571,
224,
8118,
2066,
2452,
5637,
3180,
3... | Test |
445 | 5 | Firefox_3.0:firefox 3.0 mozilla firefox 3.0 version firefox web browser released june 17 2008 mozilla corporation firefox 3.0 uses version 1.9 gecko layout engine displaying web pages version fixes many bugs improves standards compliance implements many new web apis compared firefox 2.0 new features include redesigned download manager new places system storing bookmarks history separate themes different operating systems firefox 3.0 8 million unique downloads day released july 2008 held 5.6 recorded usage share web browsers estimates firefox 3.0 global market share generally range 4–5 dropped users migrated firefox 3.5 later firefox 3.6 partially result mid-december 2009 end january 2010 firefox 3.5 popular browser counting individual browser versions passing internet explorer 7 mozilla ended support firefox 3 march 30 2010 release 3.0.19 firefox 3.0 developed codename gran paradiso like firefox codenames name actual place case seventh-highest mountain graian alps first came idea planning began october 2006 development team asked users submit feature requests wished included firefox 3 mozilla foundation released first beta november 19 2007 second beta december 18 2007 third beta february 12 2008 fourth beta march 10 2008 fifth final beta april 2 2008 first release candidate announced may 16 2008 followed second release candidate june 4 2008 third differing second release candidate corrected serious bug mac users june 11 2008 mozilla shipped final release june 17 2008 release date firefox 3 featured popular culture mentioned colbert report among others one big changes firefox 3 implementation gecko 1.9 updated layout engine new version fixes many bugs improves standard compliance implements new web apis particular makes firefox 3 first official release mozilla browser pass acid2 test standards-compliance test web-page rendering also receives better score acid3 test firefox 2 new features defined whatwg html 5 specification support web-based protocol handlers native implementation codice_1 method support safe message-passing codice_2 support offline web applications new features include apng support exslt support new internal memory allocator jemalloc used rather default libc one gecko 1.9 uses cairo graphics backend allowing improved graphics performance better consistency look feel various operating systems cairo lack support windows 95 windows 98 windows windows nt versions 4.0 microsoft ended support windows 98 windows july 11 2006 firefox 3 run operating systems similarly mac version firefox 3 runs mac os x 10.4 higher unlike previous versions native cocoa widget interface frontend changes firefox features redesigned download manager built-in search ability resume downloads also new plug-in manager included add-ons window extensions installed package manager microformats supported use software understand use documents store data machine-readable form password manager firefox 3 asks user would like remember password login attempt rather users able avoid storing incorrect password password manager bad login attempt firefox 3 uses places system storing bookmarks history sqlite backend new system stores information user history bookmarks particular letting user tag pages also used implement improved frecency-based algorithm new location bar auto-complete feature dubbed awesomebar mac version firefox 3 supports growl notifications mac os x spell checker aqua-style form controls give browser native look feel different operating systems firefox 3 uses separate themes mac os x linux windows xp windows vista running gnome firefox 3 displays icons environment thus desktop environment icon theme changes firefox follows suit additional icons also made used appropriate icon exists made following tango desktop project guidelines additionally gtk version replaced non-native tab bar implemented firefox 2.0 instead uses native gtk+ tab style default icons icon layout firefox 3 also changed dramatically taking keyhole shape forward back buttons default two three platforms however keyhole shape take effect linux small-icon mode iconfactory created icons microsoft windows platform addition separate icons sets displayed windows xp vista breakpad previously called airbag open-source crash reporter utility replaced proprietary talkback developed google mozilla used firefox thunderbird product significant first open source multi-platform crash reporting system development breakpad first included may 27 2007 firefox 3 trunk builds windows nt mac os x weeks later linux breakpad replaced talkback also known quality feedback agent crash reporter used mozilla software report crashes products centralized server aggregation case-by-case analysis talkback proprietary software licensed mozilla corporation supportsoft net applications noted use firefox 3 beta rapidly increased usage share 0.62 may 2008 interpreted increase mean firefox 3 betas stable users using primary browser within 24 hours release firefox 3.0 usage rose 1 3 according net applications reached peak 21.17 april 2009 declining users switched firefox 3.5 later firefox 3.6 official date launch firefox 3 june 17 2008 named download day 2008 firefox aiming set record software downloads 24 hours download day officially started 11:16 a.m. pdt 18:16 utc june 17 announced date download day june 18 time zones greater gmt +6 includes half asia oceania large number users attempting access mozilla website june 17 caused become unavailable least hours attempts upgrading new version resulted server timeouts site updated download firefox 3 12:00 pdt 19:00 utc two hours later originally scheduled download day ended 11:16 pdt 18:16 utc june 18 8,249,092 unique downloads recorded july 2 mozilla announced record 8,002,530 unique downloads parties 25 countries july 7 2008 31 million people downloaded firefox 3 gareth deaves records manager guinness world records complimented mozilla saying mobilizing 8 million internet users within 24 hours extremely impressive accomplishment would like congratulate mozilla community hard work dedication firefox 3 runs windows 2000 later windows 98 third-party kernel extender installed new functionality location bar dubbed awesomebar overall well received like due user interface performance changes much extensions made revert firefox 3 received cnet editors choice june 2008 | [
4655,
6802,
5378,
2205,
7537,
6809,
393,
3291,
2574,
6452,
6458,
4352,
1496,
4725,
1136,
7587,
5786,
2261,
84,
445,
1152,
4755,
4759,
7975,
7628,
5821,
5127,
1190,
3383,
8006,
5506,
3043,
1970,
6221,
520,
3057,
3060,
3412,
5887,
5542,
8... | Test |
446 | 3 | ARM_Cortex-A5:arm cortex-a5 arm cortex-a5 32-bit processor core licensed arm holdings implementing armv7-a architecture announced 2009 cortex-a5 intended replace arm9 arm11 cores use low-end devices cortex-a5 offers features armv7 architecture focusing internet applications e.g vfpv4 neon advanced simd key features cortex-a5 core several system-on-chips soc implemented cortex-a5 core including | [
2539,
5718,
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
441,
451,
6874,
6165,
5459,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
2711,
1995,
550,
4847,
3786,
2024,
5576,
4879,
5585,
7376... | Test |
447 | 3 | Windows_NT_3.1:windows nt 3.1 windows nt 3.1 operating system produced microsoft part windows nt family operating systems released july 27 1993 time windows nt release microsoft windows 3.1 desktop environment established brand recognition market share windows 3.1 relied dos operating system essential functions constrictive 16-bit architecture windows nt however complete 32-bit operating system retained desktop environment familiar windows 3.1 users extending windows brand beginning windows nt version 3.1 microsoft implied consumers expect familiar user experience name windows nt new technology advertised re-engineered version windows windows nt began rewrite os/2 operating system microsoft co-developed ibm 1980s several reasons including market success windows 3.0 1990 microsoft decided advance windows rather os/2 relinquished os/2 development responsibilities ibm forked work os/2 v3.0 competing operating system windows nt 3.1 available two editions windows nt 3.1 workstations windows nt 3.1 advanced server servers premiered sales limited high system requirements general lack 32-bit applications take advantage os data processing capabilities microsoft major foothold personal computer market due use ms-dos de facto operating system ibm pc compatibles nathan myhrvold joined microsoft acquisition dynamical systems research identified two major threats microsoft monopoly—the risc architecture proved powerful equivalent intel processors ms-dos ran unix family cross-platform multitasking operating systems support multiprocessing networking widespread use unix hindered need adapt programs individual variant bill gates believed combination unix-like operating system risc processors could market threat prompting need microsoft develop unix killer could run multiple architectures gates hired dave cutler digital equipment corporation assist developing new operating system cutler left company series conflicts surrounding work prism architecture microkernel operating system mica agreed join microsoft condition able bring number staff members team dec cutler arrived microsoft october 31 1988 work future operating system started november operating system first developed revised version os/2 operating system microsoft jointly developed ibm os/2 originally intended succeed ms-dos yet commercially successful os designed could ported different processor platforms support multiprocessor systems operating systems time target enterprise market os also support networking posix standard security platform compliant orange book standards would require os multi-user system permission framework ability audit security-related events microsoft ibm wanted market operating system appealed corporate enterprise software customers meant greater security reliability processing power computer networking features however since microsoft also wanted capture market share unix computing platforms needed system design portable os/2 end microsoft began developing testing new operating system non-x86 processor emulated version intel i860 alluding chip codename n10 microsoft codenamed operating system nt os/2 dec preemptively sued microsoft alleging stole code mica use new operating system out-of-court settlement microsoft agreed make nt os/2 compatible dec alpha processor development team originally estimated development would complete within 18 months april 1989 nt os/2 kernel could run inside i860 emulator however development team later determined i860 unsuitable project december begun porting nt os/2 mips r3000 processor instead completed task three months senior microsoft executive paul maritz targeting release date 1992 development schedule uncertain company eager silence naysayers speculated nt would n't market 1994 planned present new os comdex 1990 may 1990 microsoft released windows 3.0 new version ms-dos-based windows desktop environment windows 3.0 sold well resulting shift microsoft marketing strategy eroded partnership ibm—who wanted microsoft concentrate solely developing os/2 primary platform opposed building future business around windows users developers unsure whether adopt windows os/2 due uncertainties situation magnified fact operating systems incompatible api level microsoft resources also drained simultaneous development multiple operating systems august 1990 response popularity windows 3.0 nt os/2 team decided re-work operating system use extended 32-bit port windows api known win32 win32 maintained familiar structure 16-bit apis used windows would allow developers easily adapt software new platform maintaining level compatibility existing software windows shift windows-like architecture operating system shell also changed os/2 presentation manager windows program manager due changes nt presented comdex 1990 originally planned neither general public ibm knew transformation nt os/2 windows nt time although companies agree revised partnership ibm microsoft would alternate developing major versions os/2 instead collaborating version ibm eventually learned microsoft windows nt plans january 1991 immediately ended os/2 partnership ibm would solely develop os/2 2.0 planned amended version future versions without involvement microsoft october 1991 windows nt received first public demonstration comdex effort ensure software taking advantage windows nt available upon release scheduled late-1992 microsoft also distributed 32-bit software development kit selected developers attendance demonstration positively received pc magazine called windows nt modern reinvention operating system time claimed unlikely promised backward compatibility would kept final release march 1992 microsoft also released win32s would allow windows 3.1 partial compatibility windows nt programs purposes developing software optimized platform microsoft win32 professional developers conference june 1992 windows nt demonstrated running x86 mips processors beta version windows nt updated development kit also made available concurrently microsoft announced new version sql server product windows nt unix vendors feared software could killer app would affect market share unix systems concerns also raised nt memory usage computers era shipped 4 megabytes ram 16 mb recommended nts due high cost ram time critics thought high system requirements could affect sales adoption windows nt steps taken reduce memory usage methods paging microsoft began releasing public beta builds nt october 1992 month later comdex presentation focusing third-party software windows nt held final pre-release version nt released march 1993 alongside unveiling server version windows nt lan manager although stability performance improved still fears os could released unfinished state delayed 1993 windows nt 3.1 windows nt 3.1 advanced server numbered associate windows 3.1 released july 26 1993 first x86 mips versions shipped dec alpha version followed september microsoft sold workstation version 495 server version 1,495 ostensibly server price meant promotional discount offered first six months sale never raised retail price listed one— 2,995 250 programmers wrote 5.6 million lines code development cost 150 million last year development team fixed 30,000 bugs product lifecycle microsoft published three service packs service pack 1 released october 8 1993 service pack 2 followed january 24 1994 service pack 3 release date october 29 1994 service packs distributed cd-rom floppy disk also bulletin board systems compuserve internet microsoft terminated support operating system december 31 2000 windows nt 3.1 localized various languages besides english available dutch french german japanese spanish swedish workstation server available danish finnish italian norwegian portuguese cutler set three main goals windows nt first goal portability contrast previous operating systems strongly tied one architecture windows nt able operate multiple architectures meet goal operating systems including operating system core written c programming language planning phase clear would cause windows nt higher memory consumption previous operating systems besides graphics system parts networking system written c++ parts operating systems required direct hardware access performance critical functions written assembly language parts isolated could easily rewritten porting operating system new architecture second goal reliability system longer crash due faulty application faulty hardware way operating system made attractive critical applications meet goal architecture windows nt designed operating system core isolated applications could access directly kernel designed microkernel components core run atop kernel modular fashion cutler knew principle work digital reliability also includes security operating system able resist external attacks mainframes already system every user account assigned specific rights administrator way users could prevented access confidential documents virtual memory management designed thwart attacks malware prevent users accessing foreign areas memory third goal called personality operating system able run applications designed various operating systems windows ms-dos os/2 applications mach kernel followed similar concept moving apis components operated user mode applications could changed new ones could added principle applied windows nt despite goals performance operating system optimized possible adapting critical sections code fast execution speed improve networking performance large parts networking system moved operating system core windows nt designed networking operating system branch novell lead product netware mostly lack competition microsoft failed develop product could challenge netware lead cutler hoped gain additional customers reliable networking operating system bill gates already dominated market desktop operating systems ms-dos windows hoped networking market windows nt especially hoped find market emerging number servers time expect success desktop market 1995 therefore windows nt positioned high-end operating system interview product manager david thacher designed replace windows 3.1 completely rather supplement microsoft product palette operating system critical applications expectations 10 20 among windows sales market share 10 high end market amounted one million copies windows nt 3.1 uses graphical user interface windows 3.1 developed anew operating system dos-based independent 32-bit operating system many concepts taken cutler previous operating system vms architecture windows nt takes ideas client-server model like modular structure communication modules system resources like memory files devices viewed objects operating system accessed way handles way secured unauthorized access operating system designed multiprocessor systems supports preemptive multitasking make use threads run multiple processes parallel using symmetric multiprocessing processing usage evenly distributed among available processors inter-process communication windows nt 3.1 designed around networks two newly introduced functions remote procedure call rpc network dde extension dynamic data exchange dde facilitate access data exchange processes running different computers inside network operating system designed combine certain elements monolithic kernel microkernel nowadays often referred hybrid kernel hardware abstraction layer represents lowermost layer isolates operating system underlying hardware make easy port operating system platforms kernel running atop basic functions like interrupt management processor synchronization functions operating system core handled modules operate independently one another swapped without affecting rest operating system positioned operating system core subsystems two types subsystems one integral subsystems perform important operating system functions one subsystem security subsystem handles logon process monitors security system type subsystem environment subsystem exposes operating system functions applications via application programming interfaces base subsystem 32-bit subsystem runs 32-bit applications written windows nt windows nt applications run one platform must recompiled every platform 32-bit subsystem also contains output functions including graphics device interface gdi subsystems call 32-bit subsystem able output text graphics subsystems contained windows nt 3.1 posix subsystem supports posix-compatible applications built windows nt x86 version os/2 subsystem allows command-line based os/2 1.x applications run virtual dos machine vdm sometimes also viewed subsystem strictly speaking normal 32-bit windows application manages applications originally built dos built top windows windows wow allows applications built 16-bit windows operating systems like windows 3.1 run x86 computers virtual dos machine uses virtual 8086 mode run dos applications directly risc computers emulator licensed insignia solutions used emulates 80286 processor however dos 16-bit windows applications run windows nt 3.1 due various limitations one inability applications directly access hardware well vxd files sometimes needed applications used windows nt 3.1 pure dos applications run separate memory spaces 16-bit windows applications share one memory space done due compatibility reasons applications depend ability like schedule+ microsoft mail also means 16-bit windows applications run cooperative multitasking faulty 16-bit windows application way able cause 16-bit windows applications windows nt crash windows nt 3.1 provides boot manager called ntldr loaded startup process operating system x86-based computers allows multiboot setup multiple instances windows nt 3.1 well ms-dos os/2 1.x ntldr used risc versions risc computers firmware provides boot manager every user log computer windows nt 3.1 booted pressing key combination ctrl+alt+del entering user name password users user account user-specific settings like program manager groups stored separately every user users assigned specific rights like right change system time right shut computer facilitate management user accounts also possible group multiple user accounts assign rights groups users windows nt 3.1 introduced new ntfs file system new file system robust hardware failures allows assignment read write rights users groups file system level ntfs supports long file names features accommodate posix applications like hard links compatibility reasons windows nt 3.1 also supports fat16 well os/2 file system hpfs designed networking operating system windows nt 3.1 supports multiple network protocols besides ipx/spx netbeui tcp/ip protocol supported allowing access internet similar windows workgroups files printers shared access rights configuration resources edited network network printer installed required drivers automatically transferred network removing need manually install drivers every computer remote access service ras allows client outside network connect network using modem isdn x.25 access resources workstation allows one ras connection time server supports 64 windows nt 3.1 supports then-new unicode standard character set allows multiple languages displayed facilitates localization operating system strings well file folder names internally processed unicode included programs like file manager unicode aware folders containing unicode characters accessed demonstration purposes unicode typeface called lucida sans unicode shipped windows nt 3.1 even though installed default previous code pages still supported compatibility purposes windows registry introduced windows nt 3.1 central hierarchical configuration database designed allow configuration computers network replace commonly-used text-based configuration files like ini files autoexec.bat config.sys using undocumented registry editor windows registry viewed edited user advanced server designed manage workstation computers function domain controller users groups well rights stored way user log computer network users managed centrally server trust relationships built domains able exchange data cross-domain using replication service files like logon scripts synchronized across computers network advanced server supports appletalk protocol allow connections macintosh computers hard drives combined raids windows nt 3.1 advanced server supported configurations raid 0 raid 1 raid 5 windows nt 3.1 part comes 32-bit versions components featured windows 3.1 windows workgroups however also included applications specifically aimed needs windows nt like user manager performance monitor disk administrator event viewer backup application advanced server contained server-specific administration tools windows nt 3.1 dos-based new 32-bit command-line processor called cmd.exe included compatible ms-dos 5.0 compatibility reasons windows nt 3.1 shipped 16-bit applications like microsoft write edlin windows nt 3.1 all-new operating system previous drivers could used includes wealth drivers various common components peripherals includes common scsi devices like hard drives cd-rom drives tape drives image scanners well isa devices like graphics cards sound cards network cards pci bus however expressly supported windows nt 3.1 supports uninterruptible power supply windows nt 3.1 could installed either using cd-rom provided boot disk utilizing set twenty-two 3.5 floppies twenty-three floppies advanced server windows nt 3.1 could also installed network coupon included made possible order set twenty-seven 5.25 floppies twenty-eight floppies advanced server compared floppies cd-rom contained additional drivers applications windows nt 3.1 supports multiple platforms aside x86 architecture runs computers dec alpha mips r4000 r4400 processors minimum system requirements x86 systems include 25 mhz 80386 processor least 12 megabytes memory 75 megabytes hard drive space vga graphics card risc systems require 16 megabytes memory 92 megabytes hard drive space cd-rom drive advanced server edition requires 80386 processor 16 megabytes memory 90 megabytes hard drive space risc systems 110 megabytes hard drive space needed windows nt 3.1 supports dual processor systems advanced server edition supports four processors due error processor detection routine windows nt 3.1 installed pentium ii newer processors microsoft never fixed problem unofficial patches available windows nt 3.1 sold 300,000 copies first year hardware requirements deemed high time recommended system requirements 486 processor 16 megabytes memory well average computer configuration operating system turned slow use 32-bit applications could used capabilities windows nt 3.1 scarce users resort old 16-bit applications however ran slower windows 3.1 estimates november 1993 counted 150 windows nt applications common types software like office suites available windows nt 3.1 development operating system api calls changed 32-bit applications built 1992 pre-release version windows nt 3.1 could run final version affected even software like microsoft visual c++ 1.0 risc systems windows nt 3.1 even bigger disadvantage even though powerful x86 systems almost 32-bit applications drivers ported platforms 16-bit applications ran much slower risc systems 80286 emulation compared x86 systems could run 16-bit applications natively dos 16-bit applications depended 386 calls could run risc systems however reception negative multitasking capabilities operating system rated positively especially compared windows 3.1 compared size operating system installation turned easy even though installing floppies time-consuming task advanced server intended successor unsuccessful lan manager product technically much superior predecessor failed gain success shared problems workstation pendant low performance running 16-bit applications advanced server provided financial advantage large networks price dependent number clients unlike competitor novell netware windows nt microsoft entered market could previously address mostly dominated unix novell netware os/2 test performed infoworld magazine november 1993 networking capabilities several operating systems tested showed windows nt 3.1 seriously lacking inter-client communication could connect server via netbeui attempts connect unix netware os/2 failed client software available advanced server client macintosh limited os/2 able connect server even though operating system actual success moderate huge lasting impact developers unix derivations first time strived standardize operating systems novell concerned market share bought unix vendor manufacturers microprocessors hoped use portability new operating system increase sales thus ports windows nt announced various platforms like sun sparc architecture clipper architecture recognized windows nt would dominate desktop market soon hardware became powerful enough run operating system acceptable speed eight years later microsoft would unify consumer-oriented windows line remained ms-dos based nt line october 2001 release windows xp—the first consumer-oriented version windows use nt architecture notes references | [
4293,
4670,
5021,
6096,
4687,
1097,
5055,
2226,
6840,
6136,
768,
5781,
4368,
4370,
2254,
5442,
4377,
4017,
5794,
444,
6504,
448,
1522,
458,
4759,
7616,
1534,
1536,
5116,
2290,
5480,
4795,
7660,
2329,
3048,
3407,
6580,
3060,
7685,
2349,
... | Validation |
448 | 3 | Windows_NT_3.51:windows nt 3.51 windows nt 3.51 third release microsoft windows nt line operating systems released 30 may 1995 nine months release windows nt 3.5 three months release windows 95 release provided two notable feature improvements firstly nt 3.51 first short-lived outing microsoft windows powerpc architecture second significant enhancement offered release provides client/server support inter-operating windows 95 released three months nt 3.51 windows nt 4.0 became successor year later support nt 3.51 ended 2001 2002 workstation server editions respectively release windows nt 3.51 dubbed powerpc release microsoft original intention release powerpc edition nt 3.5 according microsoft david thompson basically sat around 9 months fixing bugs waited ibm finish power pc hardware editions nt 3.51 also released x86 mips alpha architectures new features introduced windows nt 3.51 include pcmcia support ntfs file compression replaceable winlogon gina 3d support opengl persistent ip routes using tcp/ip automatic display textual descriptions mouse pointer placed toolbar buttons tooltips support windows 95 common controls view significant difference kernel base windows nt 3.51 readily able run large number win32 applications designed windows 95 recent 32-bit applications work developers prevented application working windows version earlier windows 98 also applications work properly older windows nt 3.51 interface despite microsoft application releases muddied issue releasing 32-bit versions microsoft office right office 97 last version microsoft office supported nt 3.51 relying upon 16-bit versions internet explorer technology probably 32-bit versions internet explorer 4.0 later integrated windows 95 desktop nt 3.51 still used windows 3.1 desktop thereafter ie 5.0 later 5.x versions offered however open-source seamonkey internet suite supported nt 3.51 version 1.1.19 released 16 march 2010 requires manual file updates work without compromising browsing security windows nt 3.51 last series compatible intel 80386 processor 26 may 1995 microsoft released test version shell refresh named shell technology preview often referred informally newshell first incarnation modern windows gui taskbar start menu designed replace windows 3.x program manager/file manager based shell windows explorer-based graphical user interface release provided capabilities quite similar windows chicago codename windows 95 shell late beta phases however intended nothing test release second public release shell technology preview called shell technology preview update made available msdn compuserve users 8 august 1995 releases held windows explorer builds 3.51.1053.1 preview program provided early feedback shell update release next major windows nt version new interface built-in released july 1996 windows nt 4.0 five service packs released nt 3.51 introduced bug fixes new features service pack 5 example fixed issues related year 2000 problem supported eide addressing schemes include logical block addressing lba ontrack disk manager ezdrive extended cylinder-head-sector echs | [
4293,
6802,
1460,
4687,
1097,
5055,
2226,
4352,
6136,
5781,
5442,
4377,
5794,
444,
447,
1522,
458,
4759,
7616,
1534,
1536,
5480,
7660,
150,
2329,
3048,
6580,
3060,
7685,
2703,
3747,
1237,
3751,
6256,
4500,
5571,
5574,
6634,
224,
1670,
8... | Test |
449 | 4 | Sigreturn-oriented_programming:sigreturn-oriented programming sigreturn-oriented programming srop computer security exploit technique allows attacker execute code presence security measures non-executable memory code signing presented first time 35th security privacy ieee conference 2014 best student paper award technique employs basic assumptions behind return-oriented programming rop technique attacker controlling call stack example stack buffer overflow able influence control flow program simple instruction sequences called gadgets attack works pushing forged sigcontext structure call stack overwriting original return address location gadget allows attacker call sigreturn system call often single gadget needed successfully put attack effect gadget may reside fixed location making attack simple effective setup generally simpler portable one needed plain return-oriented programming technique sigreturn-oriented programming considered weird machine since allows code execution outside original specification program sigreturn-oriented programming srop technique similar return-oriented programming rop since employs code reuse execute code outside scope original control flow sense adversary needs able carry stack smashing attack usually stack buffer overflow overwrite return address contained inside call stack mechanisms data execution prevention employed wo n't possible attacker place shellcode stack cause machine execute overwriting return address protections place machine wo n't execute code present memory areas marked writable non-executable therefore attacker need reuse code already present memory programs contain functions allow attacker directly carry desired action e.g. obtain access shell necessary instructions often scattered around memory return-oriented programming requires sequences instructions called gadgets end codice_1 instruction way attacker write sequence addresses gadgets stack soon codice_1 instruction one gadget executed control flow proceed next gadget list attack made possible signals handled posix-like systems whenever signal delivered kernel needs context switch installed signal handler kernel saves current execution context frame stack structure pushed onto stack architecture-specific variant sigcontext structure holds various data comprising contents registers moment context switch execution signal handler completed codice_3 system call called calling sigreturn syscall means able easily set contents registers using single gadget easily found systems several factors characterize srop exploit distinguish classical return-oriented programming exploit first rop dependent available gadgets different distinct binaries thus making chains gadget non-portable address space layout randomization aslr makes hard use gadgets without information leakage get exact positions memory although turing-complete rop compilers exist usually non-trivial create rop chain srop exploits usually portable across different binaries minimal effort allow easily setting contents registers could non-trivial unfeasible rop exploits needed gadgets present moreover srop requires minimal number gadgets allows constructing effective shellcodes chaining system calls gadgets always present memory cases always fixed locations example kind gadget needed srop exploits always found vdso memory area x86-linux systems __kernel_sigreturn proc near pop eax mov eax 77h int 80h linux sys_sigreturn nop lea esi esi+0 __kernel_sigreturn endp linux kernel versions aslr disabled settings limits stack size unlimited effectively bypassing aslr allowing easy access gadget present vdso linux kernels prior version 3.3 also possible find suitable gadget inside vsyscall page mechanism accelerate access certain system calls often used legacy programs resides always fixed location possible use gadgets write contents stack frames thereby constructing self-modifying program using technique possible devise simple virtual machine used compilation target turing-complete language example approach found bosman paper demonstrates construction interpreter language similar brainfuck programming language language provides program counter codice_4 memory pointer codice_5 temporary register used 8-bit addition codice_6 means also complex backdoors obfuscated attacks devised number techniques exists mitigate srop attacks relying address space layout randomization canaries cookies shadow stacks address space layout randomization makes harder use suitable gadgets making locations unpredictable mitigation srop called signal cookies proposed consists way verifying sigcontext structure tampered means random cookie xored address stack location stored way sigreturn syscall needs verify cookie existence expected location effectively mitigating srop minimal impact performances linux kernel versions greater 3.3 vsyscall interface emulated attempt directly execute gadgets page result exception grsecurity set patches linux kernel harden improve system security includes so-called return-address protection rap help protect code reuse attacks starting 2016 intel developing control-flow enforcement technology cet help mitigate prevent stack-hopping exploits cet works implementing shadow stack ram contain return addresses protected cpu memory management unit | [
1019,
3793,
3932,
749,
5381,
74,
755,
3220,
578,
3635,
1265,
5116,
1658
] | Test |
450 | 3 | Namco_System_357:namco system 357 namco system 357 arcade system board based sony playstation 3 released 2007 board tekken 6 unlike predecessor see widespread adoption manufacturers 2011 namco released upgraded version arcade board system 369 also known system 359 use tekken tag tournament 2 system 369 specifications slim model retail ps3 consoles feature smaller chassis less heat | [
6597,
6330,
2177,
7962,
7514,
4761,
6621,
4408,
481,
5042,
4242,
5665,
1388,
746,
7014,
4839,
2139,
4718,
239,
763,
602,
2873,
2601,
424,
253,
3234,
4011,
4200,
1606,
4911,
1244,
5446,
4748
] | Test |
451 | 3 | ARM_Cortex-A7:arm cortex-a7 arm cortex-a7 mpcore 32-bit microprocessor core licensed arm holdings implementing armv7-a architecture announced 2011 two target applications firstly smaller simpler power-efficient successor cortex-a8 use big.little architecture combining one a7 cores one cortex-a15 cores heterogeneous system fully feature-compatible a15 key features cortex-a7 core several system-on-chips soc implemented cortex-a7 core including | [
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
441,
446,
6874,
6165,
463,
5472,
469,
4041,
3008,
3365,
6910,
5845,
7654,
3397,
1977,
2339,
2711,
1995,
550,
4847,
3786,
568,
2024,
5576,
1284,
4879,
7376,
5585,
4166,... | Validation |
452 | 4 | Autopsy_(software):autopsy software autopsy computer software makes simpler deploy many open source programs plugins used sleuth kit graphical user interface displays results forensic search underlying volume making easier investigators flag pertinent sections data tool largely maintained basis technology corp. assistance programmers community company sells support services training using product tool designed principles mind core browser extended adding modules help scan files called ingesting browse results called viewing summarize results called reporting collection open-source modules allow customization autopsy analyzes major file systems ntfs fat exfat hfs+ ext2/ext3/ext4 yaffs2 hashing files unpacking standard archives zip jar etc extracting exif values putting keywords index file types like standard email formats contact files also parsed cataloged users search indexed files recent activity create report html pdf summarizing important recent activity time short users may activate triage features use rules analyze important files first autopsy save partial image files vhd format investigators working multiple machines file systems build central repository data allowing flag phone numbers email addresses file pertinent data might found multiple places sql lite postgresql data base stores information investigators find occurrences names domains phone numbers usb registry entries version 2 autopsy written perl runs major platforms including linux unix macos windows relies upon sleuth kit analyze disk version 2 released gnu gpl 2.0 autopsy 3.0 written java using netbeans platform runs windows time released apache license 2.0 autopsy depends number libraries various licenses works sql lite postgresql data bases store information indices searching keywords built lucene solr | [
3700,
1756
] | Train |
453 | 5 | PCM30:pcm30 pulse code modulation pcm technology patented developed france 1938 could used suitable technology available world war ii came arrival digital systems 1960s improving performance communications networks became real possibility however technology completely adopted mid-1970s due large amount analog systems already place high cost digital systems semiconductors expensive pcm ’ initial goal converting analog voice telephone channel digital one based sampling theorem pcm30 describes application pulse-code modulation pcm 30 telephony analog signals binary coded digital signal stream term used today mostly synonym encoding 30 channels signalling rate 64-kbit/s rate also used first stage european pdh technique pcm30 also known e1 originally described device communications technology converted 30 analog telephone signals digital bit stream 2048 kbit/s ... beginning 1960s proliferation analog telephone lines based copper wires together lack space new installations led transmission experts look real application pcm digitalization techniques tdm multiplexing first digital communications system set bell labs 1962 consisted 24 digital channels running known t1 1965 permitted tdm multiplexing 24 digital telephone channels 64 kbit/s 1.544-mbit/s signal format called t1 t1 signal synchronization bit added 24 tdm time slots way aggregate transmission rate europe developed tdm multiplexing scheme little later 1968 although different capacity 32 digital channels 64 kbit/s resulting signal transmitted 2.048 mbit/s format called e1 standardized itu-t adopted worldwide except u.s. canada japan e1 signal aggregate transmission rate obtained following equation 32 × 8 ⁄ 125μs 2.048mbit/s pcm30-base system analog switching technology europe served digital transmission telephone traffic 30 coders phone channel 8-bit digital word byte implement 30 bytes together frame id word channel identifier bytewise successively sent see multiplexer thus large 32-byte frame receiving direction 30 channels using de-multiplexer converted back 30 analogue signals time slot 0 used frame id word word detection used sent alternately time slot 16 channel identifier speech channels voice channel assigned 4 bits one 16 over-under frequency 500 hz length 16 ⋅ 32 ⋅ 8 4096 bits analog input signals initially passed low-pass filter signals multiplexer cyclically sampled frequency 8 khz pam signal injected signals a-curve hörgerecht quantized analogue digital a/d converter 8-bit binary word coded since 8000 samples second 8 bits made bit stream 64 kbit/s sum 32 channels 30 channels 2 telephone management channels bit rate 2048 kbit/s transmission still suitable binary signal conducted dc transmission requires freedom constant synchronous information binary bit stream therefore intermediate stage ami code hdb3 code umcodiert entire bit stream 32 fernsprechkanälen hdb3 encoded 2.048 mbit/s distant opposite body distances 3.5 km regenerators so-called line equipment bridges since 2005 almanya pcm30 lines hdb3 base provided instead 2b1q encoding used baud rate vs constant transmission rate vue half allows signal lower frequency band relocate turn positive effect attenuation signal range number channels time slots 32 number telephone channels 30 frame duration 125 microseconds channel length 3.9 microseconds bits per channel 8 bit bit duration 488 ns bitrate 2048 kbit 2.048 mbit bit rate per channel 64 kbit/s clock frequency 8 khz | [
4970,
1374
] | Test |
454 | 4 | Hardware_keylogger:hardware keylogger hardware keyloggers used keystroke logging method capturing recording computer users keystrokes including sensitive passwords implemented via bios-level firmware alternatively via device plugged inline computer keyboard computer log keyboard activity internal memory hardware keyloggers advantage software keyloggers begin logging moment computer turned therefore able intercept passwords bios disk encryption software hardware keylogger devices following generally recorded data retrieved typing special password computer text editor hardware keylogger plugged keyboard computer detects password typed presents computer typed data produce menu beyond text menu keyloggers offer high-speed download speed retrieval stored data via usb mass-storage enumeration usb serial download adapter typically memory capacity hardware keylogger may range kilobytes several gigabytes keystroke recorded typically consuming byte memory denial monitoring physical access sensitive computers e.g closed-circuit video surveillance access control effective means preventing hardware keylogger installation visual inspection easiest way detecting hardware keyloggers also techniques used hardware keyloggers market detect via software cases computer case hidden view e.g public access kiosks case locked box monitor keyboard mouse exposed view user possibility run software checks user might thwart keylogger typing part password using mouse move text editor window typing garbage text mousing back password window typing next part password etc keylogger record unintelligible mix garbage password text see also keystroke logging countermeasures main risk associated keylogger use physical access needed twice initially install keylogger secondly retrieve thus victim discovers keylogger set sting operation catch person act retrieving could include camera surveillance review access card swipe records determine gained physical access area time period keylogger removed | [
1052,
2495,
1987,
5440,
2529,
880
] | Validation |
455 | 7 | Aditi_Technologies:aditi technologies aditi technologies american company headquartered bellevue washington united states largest center bangalore india aditi acquired symphony teleca april 2014 9 april 2015 harman international industries incorporated acquired symphony teleca corporation 12 november 2016 samsung entered definitive agreement acquire harman international pradeep singh founded aditi technologies 1994 nine years management positions microsoft including general manager windows 95 mobile services group aditi began microsoft service shop providing support services microsoft customers around globe 1999 talisma customer relationship management division aditi spun 1999 founding talisma driven concept supporting customers various modes communication using internet pradeep singh spent next 10 years talisma building company 2008 campus management acquired talisma brand talisma corporation pvt ltd. bangalore higher education business unit based bellevue washington 2003 pradeep singh came back aditi shifted focus company outsourced product development space area aditi spent first 12 years exclusively servicing microsoft 2004 aditi partnered pi corporation developing software targeted linux environment since 2006 involved product development software testing based microsoft software platforms october 2007 pradeep rathinam appointed president chief executive officer aditi technologies august 2010 aditi technologies partnered quest software migrate upgrade customers sharepoint 2010 sharepoint online 2011 aditi forayed cloud services space acquisition seattle based cloud computing start-up cumulux acquisition aditi invested 5 million azure acceleration lab azure-based rapid application development offering strengthen cloud computing capabilities may 2013 aditi expanded cloud capabilities acquisition get cloud ready thus entering aws market 10 april 2014 aditi announced acquired symphony teleca undisclosed amount following acquisition sanjay dhawan took ceo pradeep rathinam appointed president aditi becoming independent business unit symphony teleca aditi employs nearly 1600 people globally | [
2961
] | Validation |
456 | 5 | Neighbor_Discovery_Protocol:neighbor discovery protocol neighbor discovery protocol ndp nd protocol internet protocol suite used internet protocol version 6 ipv6 operates link layer internet model rfc 1122 responsible gathering various information required internet communication including configuration local connections domain name servers gateways used communicate distant systems protocol defines five different icmpv6 packet types perform functions ipv6 similar address resolution protocol arp internet control message protocol icmp router discovery router redirect protocols ipv4 however provides many improvements ipv4 counterparts rfc 4861 section 3.1 example includes neighbor unreachability detection nud thus improving robustness packet delivery presence failing routers links mobile nodes inverse neighbor discovery ind protocol extension rfc 3122 allows nodes determine advertise ipv6 address corresponding given link-layer address similar reverse arp ipv4 secure neighbor discovery protocol send security extension ndp uses cryptographically generated addresses cga resource public key infrastructure rpki provide alternative mechanism securing ndp cryptographic method independent ipsec neighbor discovery proxy nd proxy rfc 4389 provides service similar ipv4 proxy arp allows bridging multiple network segments within single subnet prefix bridging done link layer ndp defines five icmpv6 packet types purpose router solicitation router advertisement neighbor solicitation neighbor advertisement network redirects messages used provide following functionality iana maintains list current ndp options published | [
7148,
709,
4676,
4677,
7170,
4683,
6432,
1462,
5039,
6446,
2219,
3640,
4709,
4710,
3312,
7214,
7217,
2612,
3337,
1900,
6879,
2281,
6521,
106,
2644,
6531,
2650,
121,
7637,
4414,
6908,
3379,
5492,
3383,
494,
7297,
5169,
2335,
1984,
530,
5... | Test |
457 | 1 | Naval_Vessel_Register:naval vessel register naval vessel register nvr official inventory ships service craft custody titled united states navy contains information ships service craft make official inventory navy time vessel authorized life cycle disposal also includes ships removed register often termed stricken struck disposed sale transfer another government means ships service craft disposed prior 1987 currently included gradually added along updates nvr traces origin back 1880s evolved several previous publications 1911 bureau construction repair published ships data us naval vessels subsequently became ships data book 1952 bureau ships bureau ordnance vessel register first published 1942 retitled naval vessel register combined ships data book bureau ships 1959 since 1962 nvr maintained published navsea shipbuilding support office navshipso naval sea systems command referred congress statutes nvr maintained directed u.s. navy regulations article 0406 september 14 1990 vessels listed nvr classification hull number assigned ships service craft authorized built president united states chief naval operations requests instatement reinstatement vessels approved secretary navy listed ship service craft remains nvr throughout life navy asset afterwards final disposition recorded many vessels struck nvr transferred navy inactive fleet united states maritime administration marad become part national defense reserve fleet continue limited operation ready reserve fleet nvr updated weekly 2010s available electronic form online 6,500 separate record transactions processed annually supported official documentation nvr includes current list ships service craft hand construction converted loaned/leased loaned assigned military sealift command ship class fleet assignment name age home port planning yard custodian hull machinery characteristics builder key construction dates battle forces local defense miscellaneous support forces status conditions data elements provided march 2014 navy started counting self-deployable support ships fleet minesweepers surveillance craft tugs part battle fleet order reach count 272 october 2016 | [] | Validation |
458 | 2 | Features_new_to_Windows_7:features new windows 7 new features included windows 7 advancements touch speech handwriting recognition support virtual hard disks support additional file formats improved performance multi-core processors improved boot performance kernel improvements windows 7 retains windows aero graphical user interface visual style introduced predecessor windows vista many areas seen enhancements unlike windows vista window borders taskbar turn opaque window maximized windows aero active instead remain translucent support themes extended windows 7 addition providing options customize colors window chrome aspects interface including desktop background icons mouse cursors sound schemes operating system also includes native desktop slideshow feature new theme pack extension introduced codice_1 essentially collection cabinet files consist theme resources including background images color preferences desktop icons mouse cursors sound schemes new theme extension simplifies sharing themes also display desktop wallpapers via rss feeds provided windows rss platform microsoft provides additional themes free website default theme windows 7 consists single desktop wallpaper named harmony default desktop icons mouse cursors sound scheme introduced windows vista however none desktop backgrounds included windows vista present windows 7 new themes include architecture characters landscapes nature scenes additional country-specific theme determined based defined locale operating system installed although theme user home country displayed within user interface files country-specific themes included operating system themes included windows 7—excluding default theme—include six wallpaper images number new sound schemes associated included theme also introduced afternoon calligraphy characters cityscape delta festival garden heritage landscape quirky raga savana sonata themes may introduce custom sounds used others themes well windows 7 introduces desktop slideshow feature periodically changes desktop wallpaper based user-defined interval change accompanied smooth fade transition duration customized via windows registry desktop slideshow feature supports local images images obtained via rss windows vista microsoft introduced gadgets display information image slideshows rss feeds user desktop gadgets could optionally displayed sidebar docked side screen windows 7 sidebar removed gadgets still placed desktop gadgets brought foreground top active applications pressing several new features gadgets introduced including new desktop context menu options access gadgets hide active gadgets high dpi support feature automatically rearrange gadget based position gadgets additional new features include cached gadget content optimizations touch-based devices gadget windows media center gadgets closely integrated windows explorer gadgets continue operate single codice_2 process unlike windows vista gadgets could operate multiple codice_2 processes active gadgets also hidden via new desktop menu option microsoft stated option result power-saving benefits original equipment manufacturers enterprises windows 7 natively supports ability customize wallpaper displayed user login settings change wallpaper available via windows registry users also customize wallpaper options customize appearance interface lighting shadows also available windows explorer windows 7 supports file libraries aggregate content various locations – including shared folders networked systems shared folder indexed host system – present unified view libraries hide actual location file stored searching library automatically federates query remote systems addition searching local system files remote systems also searched unlike search folders libraries backed physical location allows files saved libraries files transparently saved backing physical folder default save location library may configured user default view layout library libraries generally stored libraries special folder allows displayed navigation pane default new user account windows 7 contains four libraries different file types documents music pictures videos configured include user profile folders respective file types well computer corresponding public folders public folder also contains hidden recorded tv library appears windows explorer sidepane tv set media center first time addition aggregating multiple storage locations libraries enable arrangement views search filter suggestions arrangement views allow pivot view library contents based metadata example selecting month view pictures library display photos stacks stack represents month photos based date taken music library artist view display stacks albums artists collection browsing artist stack display relevant albums search filter suggestions new feature windows 7 explorer search box user clicks search box menu shows showing recent searches well suggested advanced query syntax filters user type one selected typed manually menu update show possible values filter property list based current location parts query already typed example selecting tags filter typing tags search box display list possible tag values return search results arrangement views search filter suggestions database-backed features require locations library indexed windows search service local disk locations must indexed local indexer windows explorer automatically add locations indexing scope included library remote locations indexed indexer another windows 7 machine windows machine running windows search 4 windows vista windows home server another device implements ms-wsp remote query protocol windows explorer also supports federating search external data sources custom databases web services exposed web described via opensearch definition federated location description called search connector provided codice_4 file installed data source becomes queryable directly windows explorer windows explorer features previews thumbnails work results federated search well windows explorer received numerous minor enhancements improve overall functionality explorer search box address bar resized folders desktop user profile folders hidden navigation pane reduce clutter new content view added shows thumbnails metadata together new button toggle preview pane added toolbar button create new folder moved organize menu onto toolbar list view provides space items windows vista finally storage space consumption bars present hard disks windows vista shown removable storage devices areas shell also received similar fine-tunings progress bars overlay icons may appear application button taskbar better alert user status application work progress file types property handlers ifilters installed re-indexed default previously adding submenus shell context menus customizing context menu behavior certain folder possible installing form plug-in known shell extensions windows 7 however computer-savvy users editing windows registry and/or desktop.ini files additionally new shell api introduced designed simplify writing context menu shell extensions software developers windows 7 includes native support burning iso files functionality available user selects burn disc image option within context menu iso file support disc image verification also included previous versions windows users required install-third party software burn iso images start orb fade-in highlight effect user hovers mouse cursor start menu right column aero glass color windows vista always black windows 7 start menu retains two-column layout predecessors several functional changes start search field introduced windows vista extended support searching keywords control panel items example clicking start button typing wireless show control panel options related configuring connecting wireless network adding bluetooth devices troubleshooting group policy settings windows explorer provide ability administrators active directory domain expert user add five internet web sites five additional search connectors search results view start menu links appear bottom pane allow search executed selected web site search connector microsoft suggests network administrators could use feature enable searching corporate intranets internal sharepoint server windows taskbar seen significant revision since introduction windows 95 combines previous quick launch functionality open application window icons taskbar rendered aero glass element whose color changed via personalization control panel 10 pixels taller windows vista accommodate touch screen input new larger default icon size although smaller taskbar size available well maintain proportion newer high resolution monitor modes running applications denoted border frame around icon within border color effect dependent predominant rgb value icon follows mouse cursor also indicates opened status application glass taskbar translucent windows vista taskbar buttons show icons default application titles unless set 'not combine 'combine taskbar full case icons shown application running programs running pinned taskbar rearranged items notification area also rearranged quick launch toolbar removed default configuration may easily added windows 7 taskbar application-oriented window-oriented therefore n't show window titles shown application icon clicked hovered applications pinned taskbar allowing user instant access applications commonly use ways pin applications taskbar icons dragged dropped onto taskbar application ’ icon right-clicked pin taskbar thumbnail previews introduced windows vista expanded preview windows opened application small-sized thumbnail view also interact user close window opened clicking x corresponding thumbnail preview name window also shown thumbnail preview peek window obtained hovering thumbnail preview peeking brings window thumbnail preview mouse cursor hovers turns windows desktop transparent also works tabs internet explorer individual tabs may peeked thumbnail previews thumbnail previews integrate thumbnail toolbars control application thumbnail previews example windows media player opened mouse cursor hovering application icon thumbnail preview allow user ability play stop play next/previous track without switch windows media player window jump lists menu options available right-clicking taskbar icon holding left mouse button sliding towards center desktop icon application jump list corresponding features microsoft word displaying recently opened documents windows media player recent tracks playlists internet explorer recent browsing history options opening new tabs starting inprivate browsing windows live messenger common tasks instant messaging signing changing online status 10 menu items may appear list partially customizable user progress bar taskbar tasks allows users know progress task without switching pending window task progress used windows explorer internet explorer third-party software notification area redesigned standard volume network power action center status icons present application icons shown unless user chosen shown new notification area icons control panel added replaces customize notification icons dialog box taskbar start menu properties window first introduced windows xp addition able configure whether application icons shown ability hide application notification balloons added user view notifications later time triangle left visible notification icons displays hidden notification icons unlike windows vista windows xp hidden icons displayed window taskbar instead taskbar icons dragged window notification area previous versions windows taskbar ended notification area right-hand side windows 7 however introduces show desktop button far right side taskbar initiate aero peek feature makes open windows translucent hovered mouse cursor clicking button shows desktop clicking brings windows focus new button replaces show desktop shortcut located quick launch toolbar previous versions windows touch-based devices aero peek initiated pressing holding show desktop button touching button shows desktop button also increases width accommodate pressed finger windows dragged top screen maximize dragged away restore dragging window left right screen makes take half screen allowing user tile two windows next also resizing window bottom screen top extend window full height retain width features disabled via ease access center users wish windows automatically resize aero shake allows users clear clutter screen shaking dragging back forth window choice mouse windows minimize window user shook stays active screen window shaken restored similar desktop preview use many open windows desktop feature minimize windows except one shake click hold title bar window need open shake mouse window shake maximize others minimized restore windows shake mouse whilst holding title bar open window variety new keyboard shortcuts introduced global keyboard shortcuts taskbar user interface font management overhauled windows 7 windows vista collection installed fonts displayed windows explorer window fonts originate font family appear icons represented stacks display font previews within interface windows 7 also introduces option hide installed fonts certain fonts automatically removed view based user regional settings option manually hide installed fonts also available hidden fonts remain installed enumerated application asks list available fonts thus reducing amount fonts scroll within interface also reducing memory usage windows 7 includes 40 new fonts including new gabriola font dialog box fonts windows 7 also updated display font previews within interface allows users preview fonts selecting previous versions windows displayed name font cleartype text tuner previously available microsoft powertoy earlier windows versions integrated updated windows 7 microsoft would later backport windows 8 emoji features windows 7 two major new user interface components device management windows 7 devices printers device stage integrated windows explorer together provide simplified view devices connected computer capabilities support devices printers new control panel interface directly accessible start menu unlike device manager control panel applet still present icons shown devices printers screen limited components system non-expert user recognize plug-in devices example external monitor connected system displayed device internal monitor laptop device-specific features available context menu device external monitor context menu example provides link display settings control panel new control panel applet also replaces printers window prior versions windows common printer operations setting default printer installing removing printers configuring properties paper size done control panel windows 7 server 2008 r2 introduce print driver isolation improves reliability print spooler running printer drivers separate process spooler service third party print driver fails isolated impact drivers print spooler service device stage provides centralized location externally connected multi-function device present functionality user device portable music player connected system device appears icon task bar well windows explorer windows 7 ships high-resolution images number popular devices capable connecting internet download images devices n't recognize opening icon presents window displays actions relevant device screenshots technology presented microsoft suggest mobile phone could offer options two-way synchronization configuring ring-tones copying pictures videos managing device windows media player using windows explorer navigate device device status information free memory battery life also shown actual per-device functionality defined via xml files downloaded device first connected computer provided manufacturer installation disc hilton locke worked tablet pc team microsoft reported december 11 2007 windows 7 new touch features devices supporting multi-touch overview demonstration multi-touch capabilities including virtual piano program mapping directions program touch-aware version microsoft paint given things digital conference may 27 2008 video multi-touch capabilities made available web later day windows 7 introduces native support sensors including accelerometer sensors ambient light sensors location-based sensors operating system also provides unified driver model sensor devices notable use technology windows 7 operating system adaptive display brightness feature automatically adjusts brightness compatible computer display based environmental light conditions factors gadgets developed windows 7 also display location-based information applications certain sensor capabilities developed without requisite hardware data acquired sensors considered personally identifiable information sensors disabled default windows 7 account windows 7 requires administrative permissions enable sensor sensors also require user consent share location data unlike previous versions windows windows 7 able report laptop battery need replacement operating system works design capabilities present modern laptop batteries report information powercfg command enables customization hibernation file size default windows 7 automatically sets size hibernation file 75 computer total physical memory operating system also compresses contents memory hibernate process minimize possibility contents exceeds default size hibernation file windows 7 introduces new /energy parameter powercfg command generates html report computer energy efficiency displays information related devices settings windows 7 individually suspend usb hubs supports selective suspend in-box usb class drivers direct3d 11 direct2d directwrite dxgi 1.1 warp several components currently available windows vista sp2 windows server 2008 sp2 installing platform update windows vista first introduced windows vista desktop window manager dwm windows 7 updated use version 10.1 direct3d api performance improved significantly desktop window manager still requires least direct3d 9-capable video card supported new device type introduced direct3d 11 runtime video driver conforming windows display driver model v1.1 dxgi kernel windows 7 provides 2d hardware acceleration apis gdi direct2d directwrite though gdi+ updated use functionality allows dwm use significantly lower amounts system memory grow regardless many windows opened like windows vista systems equipped wddm 1.0 video card operate fashion windows vista using software-only rendering desktop window manager windows 7 also adds support systems using multiple heterogeneous graphics cards different vendors support color depths 30 48 bits included along wide color gamut scrgb hdmi 1.3 converted output xvycc video modes supported windows 7 16-bit srgb 24-bit srgb 30-bit srgb 30-bit extended color gamut srgb 48-bit scrgb user windows 7 server 2008 r2 individual dpi settings rather machine single setting previous versions windows dpi settings changed logging without needing restart time several technologies incorporated subsequent versions windows improve performance operating system traditional hard disk drives hdd rotating platters since solid state drives ssd differ mechanical hdds key areas moving parts write amplification limited number erase cycles allowed reliable operation beneficial disable certain optimizations add others specifically ssds windows 7 incorporates many engineering changes reduce frequency writes flushes benefit ssds particular since write operation wears flash memory windows 7 also makes use trim command supported ssd implemented early devices optimizes erase cycles performed reducing need erase blocks write increasing write performance several tools techniques implemented past reduce impact rotational latency traditional hdds notably disk defragmentation superfetch readyboost application launch prefetching involve reorganizing rewriting data platters since ssds moving platters reorganization advantages may instead shorten life solid state memory therefore tools default disabled ssds windows 7 except early generation ssds might still benefit finally partitions made windows 7 ’ partition-creating tools created ssd ’ alignment needs mind avoiding unwanted systematic write amplification enterprise ultimate editions windows 7 incorporate support virtual hard disk vhd file format vhd files mounted drives created booted way wim files furthermore installed version windows 7 booted run vhd drive even non-virtual hardware thereby providing new way multi boot windows features hibernation bitlocker available booting vhd default computer disk partitioned two partitions one limited size booting bitlocker running windows recovery environment second operating system user files windows 7 also seen improvements safely remove hardware menu including ability eject one camera card time single hub retain ports future use without reboot labels removable media also listed rather drive letter windows explorer default shows memory card reader ports computer contain card bitlocker brings encryption support removable disks usb drives devices protected passphrase recovery key automatically unlocked computer according data gathered microsoft customer experience improvement program ceip 35 vista sp1 installations boot 30 seconds less lengthy boot times remainder machines mainly due services programs loaded required system first started microsoft mike fortin distinguished engineer windows team noted august 2008 microsoft set aside team work solely issue team aims significantly increase number systems experience good boot times focused hard increasing parallelism driver initialization also microsoft aims dramatically reduce number system services along demands processors storage memory windows media center windows 7 retained much design feel predecessor variety user interface shortcuts browsing capabilities playback h.264 video locally media center extender including xbox 360 supported notable enhancements windows 7 media center include new mini guide new scrub bar option color code guide show type internet content tightly integrated regular tv via guide windows 7 versions support four tuners type qam atsc cablecard ntsc etc. browsing media library items n't album art shown range foreground background color combinations instead using white text blue background left right remote control buttons held browse library quickly two-letter prefix current album name prominently shown visual aid picture library includes new slideshow capabilities individual pictures rated also browsing media library new column appears top named shared allows users access shared media libraries media center pcs directly within media center television support windows media center tv pack released microsoft 2008 incorporated windows media center includes support cablecard north american atsc clear qam tuners well creating lists favorite stations gadget windows media center also included windows 7 includes avi wav aac/adts file media sinks read respective formats mpeg-4 file source read mp4 m4a m4v mp4v mov 3gp container formats mpeg-4 file sink output mp4 format windows 7 also includes media source read mpeg transport stream/bdav mpeg-2 transport stream m2ts mts m2t avchd files transcoding encoding support exposed built-in windows application codecs included media foundation transforms mfts addition windows media audio windows media video encoders decoders asf file sink file source introduced windows vista windows 7 includes h.264 encoder baseline profile level 3 main profile support aac low complexity aac-lc profile encoder playback various media formats windows 7 also introduces h.264 decoder baseline main high profiles support level 5.1 aac-lc he-aac v1 sbr multichannel he-aac v2 ps stereo decoders mpeg-4 part 2 simple profile advanced simple profile decoders includes decoding popular codec implementations divx xvid nero digital well mjpeg dv mft decoders avi windows media player 12 uses built-in media foundation codecs play formats default windows 7 also updates directshow filters introduced windows vista playback mpeg-2 dolby digital decode h.264 aac he-aac v1 v2 dolby digital plus including downmixing dolby digital action center formerly windows security center encompasses security maintenance called windows health center windows solution center earlier builds new user interface user account control introduced provides ability select four different levels notifications one notification settings default new windows 7 geo-tracking capabilities also available windows 7 feature disabled default enabled user limited control applications track location encrypting file system supports elliptic-curve cryptographic algorithms ecc windows 7 backward compatibility previous releases windows windows 7 supports mixed-mode operation ecc rsa algorithms efs self-signed certificates using ecc use 256-bit key default efs configured use 1k/2k/4k/8k/16k-bit keys using self-signed rsa certificates 256/384/512-bit keys using ecc certificates windows vista protected user-mode audio puma content protection facilities available applications running protected media path environment media foundation application programming interface could interact environment media player application designed use media foundation windows 7 restriction lifted puma also incorporates stricter enforcement copy never bits using serial copy management system scms copy protection s/pdif connection well high-bandwidth digital content protection hdcp hdmi connections windows 7 includes new windows biometric framework framework consists set components standardizes use fingerprint biometric devices prior releases microsoft windows biometric hardware device manufacturers required provide complete stack software support device including device drivers software development kits support applications microsoft noted white paper windows biometric framework proliferation proprietary stacks resulted compatibility issues compromised quality reliability system made servicing maintenance difficult incorporating core biometric functionality operating system microsoft aims bring biometric device support par classes devices new control panel called biometric device control panel included provides interface deleting stored biometrics information troubleshooting enabling disabling types logins allowed using biometrics biometrics configuration also configured using group policy settings alongside workgroup system used previous versions windows 7 adds new ad hoc home networking system known homegroup system uses password join computers group allows users libraries along individual files folders shared multiple computers computers running windows 7 windows 10 version 1709 create join homegroup windows homegroup home network feature support deprecated windows 10 removed windows 10 version 1803 later homegroup concept similar feature slated windows vista known castle would made possible identification service members network without centralized server homegroup created response need simple sharing model inexperienced users need share files without wrestling user accounts security descriptors share permissions end microsoft previously created simple file sharing mode windows xp enabled caused connected computers authenticated guest model either certain file folder shared anyone connects network even unauthorized parties range wireless network shared homegroup however windows 7 adds support multiple firewall profiles windows firewall windows vista dynamically changes network traffic allowed blocked based location computer based network connected approach falls short computer connected one network time computer ethernet wireless interface case vista applies profile secure network connections often desirable windows 7 resolves able apply separate firewall profile network connection windows 7 windows server 2008 r2 introduce support domain name system security extensions dnssec set specifications securing certain kinds information provided domain name system dns used internet protocol ip networks dnssec employs digital signatures ensure authenticity dns data received dns server protect dns cache poisoning attacks windows 7 contains windows powershell 2.0 out-of-the-box also available download install older platforms new management features include windows 7 includes internet explorer 8 .net framework 3.5 sp1 internet information services iis 7.5 windows installer 5.0 standalone xps viewer paint calculator resource monitor wordpad also updated paint features ribbon interface similar one introduced office 2007 also sports several new features calculator rewritten multiline capabilities including programmer statistics modes unit conversion date calculations calculator also given graphical facelift first since windows 95 1995 windows nt 4.0 1996 wordpad also features new ribbon user interface wordpad supports office open xml odf file formats resource monitor includes improved ram usage display supports display tcp/ip ports listened filtering processes using networking filtering processes disk activity listing searching process handles e.g files used process loaded modules files required executable file e.g dll files microsoft magnifier accessibility utility low vision users dramatically improved magnifier supports full screen zoom feature whereas previous windows versions magnifier attached top screen dock layout new full screen feature enabled default however requires windows aero advantage full screen zoom feature windows set windows 7 basic windows classic high contrast themes magnifier still function like windows vista earlier windows installer 5.0 supports installing configuring windows services provides developers control setting permissions software installation neither features available prior versions windows custom actions support features continue required windows installer packages need implement features | [
4293,
5378,
4687,
1097,
7567,
2953,
6136,
5781,
435,
5442,
4014,
4377,
4017,
5794,
444,
447,
448,
5805,
458,
4759,
7616,
6885,
1536,
2644,
7660,
2329,
3048,
8024,
3052,
4089,
3407,
6580,
1232,
7685,
5181,
3068,
1992,
5190,
4848,
6256,
5... | Test |
459 | 6 | Gpart:gpart gpart software utility scans storage device examining data order detect partitions may exist absent disk partition tables gpart written michail brzitwa germany release author website older releases distributions using appears michail brzitwa actively maintain code instead various distributions i.e fedora debian appear maintain versions gpart tries guess partitions device partitioned even file primary partition table lost overwritten destroyed partitions still exist media operating system access gpart ignores primary partition table scans disk disk image file sector sector several filesystem/partition types asking filesystem recognition modules think given sequence sectors resembles beginning filesystem partition type michail brzitwa man page gpart 8 linux man page january 2001 list modules listed also modules written future filesystems used detection process recovering partitions needed damaged bootable disk machine live cd used knoppix start machine use utilities disk also good finding listing types locations sizes inadvertently-deleted partitions primary logical gives information need manually re-create using fdisk cfdisk sfdisk etc. guessed partition table also written file firmly believe guessed table entirely correct directly disk device badly damaged devices good idea use utility ddrescue make backup copy device use gpart guess partitions copy successful try writing back device may find using ddrescue get read errors device damaged get partitions readable copy try using mount unix retrieve data copy mount partition offset part offset /mnt/loop recover data file get partition offset use either fdisk -ul /path/to/imagefile use output gpart look sample output size line last pair round brackets start 16 end 3906559 specifying offset always specify start sample output scan 8gb flash memory stick two partitions one fat16b 2gb partition one xfs 6gb partition supported guessable filesystem partition types | [
2390,
5571,
1793,
1798,
6500,
6761,
788
] | Test |
460 | 6 | Compact_Disc_File_System:compact disc file system compact disc file system cdfs file system read-only write-once cd-roms developed simson garfinkel j. spencer love mit media lab 1985 1986 file system provided creation modification renaming deletion files directories write-once media file system developed write-once cd-rom simulator used master one first cd-roms 1986 cdfs never sold source code published internet cd-roms distributed media lab sponsors file system basis wofs write-once file system sold n/hance systems 1989 | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
1... | Test |
461 | 5 | DCF_Interframe_Space:dcf interframe space ieee 802.11 family standards describe dcf protocol controls access physical medium station must sense status wireless medium transmitting finds medium continuously idle dcf interframe space difs duration permitted transmit frame channel found busy difs interval station defer transmission difs duration calculated following method difs sifs 2 slot time ieee 802.11g backward compatible ieee 802.11b devices associated ap timing parameters changed 802.11b | [
6071
] | Test |
462 | 2 | Patrick_Volkerding:patrick volkerding patrick volkerding born october 20 1966 founder maintainer slackware linux distribution volkerding slackware benevolent dictator life bdfl also known informally man volkerding earned bachelor science computer science minnesota state university moorhead 1993 volkerding deadhead april 1994 already attended 75 concerts volkerding church subgenius affiliate/member use word slack slackware homage j. r. bob dobbs subgenius influence slackware volkerding stated 'll admit subgenius inspired fact back 2.0 3.0 days used print dobbshead cd volkerding avid homebrewer beer lover early versions slackware would entreat users send bottle local beer appreciation work volkerding married 2001 andrea daughter briah cecilia volkerding b 2005 2004 volkerding announced via mailing list post suffering actinomycosis serious illness requiring multiple rounds antibiotics uncertain prognosis announcement caused number tech news outlets wonder future slackware project 2012 volkerding slackware project reported healthy state short chris lumens others assisted work slackware due lack continuing revenue stream following sale publisher walnut creek cdrom bsdi ultimately sold wind river systems people let go last several years volkerding managed slackware help many volunteers testers 2014 volkerding received o'reilly open source award | [
5540,
5453,
5803,
3938,
3174,
3084,
6794,
1351,
1535,
1260,
1822,
7429,
7528,
1176,
3856,
4401,
5292,
2559,
3780,
6620,
7075,
5829,
6725,
1192,
578,
4603,
6736,
7740,
7463,
7555,
7559,
5759,
589,
3559,
412,
2680,
4435,
3133,
2689,
3404,
... | Test |
463 | 3 | ARM11:arm11 arm11 group older 32-bit risc arm processor cores licensed arm holdings arm11 core family consists arm1136j f -s arm1156t2 f -s arm1176jz f -s arm11mpcore since arm11 cores released 2002 2005 longer recommended new ic designs instead arm cortex-a arm cortex-r cores preferred arm11 microarchitecture announced 29 april 2002 introduced armv6 architectural additions announced october 2001 include simd media instructions multiprocessor support new cache architecture implementation included significantly improved instruction processing pipeline compared previous arm9 arm10 families used smartphones apple nokia others initial arm11 core arm1136 released licensees october 2002 arm11 family currently armv6-architecture cores however armv6-m cores cortex-m0 cortex-m1 addressing microcontroller applications arm11 cores target demanding applications terms instruction set arm11 builds preceding arm9 generation incorporates arm926ej-s features adds armv6 instructions media support simd accelerating irq response microarchitecture improvements arm11 cores include jtag debug support halting stepping breakpoints watchpoints simplified embeddedice module replaced interface became part armv7 architecture hardware tracing modules etm etb compatible updated versions used arm9 particular trace semantics updated address parallel instruction execution data transfers arm makes effort promote good verilog coding styles techniques ensures semantically rigorous designs preserving identical semantics throughout chip design flow included extensive use formal verification techniques without attention integrating arm11 third-party designs could risk exposing hard-to-find latent bugs due arm cores integrated many different designs using variety logic synthesis tools chip manufacturing processes impact register-transfer level rtl quality magnified many times arm11 generation focused synthesis previous generations making concerns issue four arm11 cores | [
6082,
6421,
7890,
7531,
722,
2922,
2926,
5740,
7545,
5044,
5750,
5752,
4336,
5405,
5406,
1864,
6132,
4726,
67,
441,
446,
451,
6874,
6165,
804,
5472,
469,
4041,
472,
3008,
3365,
3703,
7261,
6910,
5493,
4061,
5845,
7654,
139,
3397,
4815,
... | Train |
464 | 4 | Rebound_attack:rebound attack rebound attack tool cryptanalysis cryptographic hash functions attack first published 2009 florian mendel christian rechberger martin schläffer søren thomsen conceived attack aes like functions whirlpool grøstl later shown also applicable designs keccak jh skein rebound attack type statistical attack hash functions using techniques rotational differential cryptanalysis find collisions interesting properties basic idea attack observe certain differential characteristic block cipher part permutation another type primitive finding values fulfilling characteristic achieved splitting primitive formula_1 three parts formula_2 formula_3 called inbound phase formula_4 formula_5 together called outbound phase attacker chooses values realize part differential characteristic inbound phase deterministically fulfill remainder characteristic probabilistic manner thus rebound attack consists 2 phases advantage using inbound two outbound phases ability calculate difficult parts differential characteristic inbound phase efficient way furthermore ensures high probability outbound phase overall probability finding differential characteristic thus becomes higher using standard differential techniques consider hash function uses aes-like substitution-permutation block cipher compression function compression function consists number rounds composed s-boxes linear transformations general idea attack construct differential characteristic computationally expensive part middle part covered inbound phase whereas easily achieved part characteristic covered outbound phase system equations describe characteristic inbound phase underdetermined many starting points outbound phase generated since difficult part characteristic contained inbound phase possible use standard differentials whereas truncated differentials used outbound phase achieve higher probabilities inbound phase typically number active state bytes bytes non-zero differences beginning propagate large number active bytes middle round returning low number active bytes end phase idea large number active bytes input output s-box middle phase characteristics efficiently computed choosing values differences start end inbound phase propagating towards middle looking matches input output s-box aes like ciphers typically done row- column-wise making procedure relatively efficient choosing different starting ending values leads many different differential characteristics inbound phase outbound phase goal propagate characteristics found inbound phase backwards forwards check whether desired characteristics followed truncated differentials usually used give higher probabilities specific values differences irrelevant goal finding collision probability characteristic following desired pattern outbound phase depends number active bytes arranged characteristic achieve collision enough differentials outbound phase specific type active bytes start end characteristic must also value feed-forward operation cancelled therefore designing characteristic number active bytes start end outbound phase position probability bytes cancelling adds probability outbound characteristic overall necessary generate sufficiently many characteristics inbound phase order get expected number correct characteristics larger one outbound phase furthermore near-collisions higher number rounds achieved starting ending outbound phase several active bytes cancel rebound attack used hash function whirlpool find collisions variants compression function aes-like block cipher w reduced 4.5 5.5 rounds near-collisions found 6.5 7.5 rounds description 4.5 round attack make rebound attack effective look-up table s-box differences computed attack let formula_6 represent s-box pair formula_7 find solutions formula_8 equation formula_10 represents input difference formula_11 represents output difference s-box 256 256 table called difference distribution table ddt makes possible find values follow characteristic specific input/output pairs go s-box table right show possible number solutions equation often occur first row describes impossible differentials whereas last row describes zero-differential find collision 4.5 rounds whirlpool differential characteristic type shown table must found characteristic minimum active bytes bytes non-zero differences marked red characteristic described number active bytes round e.g 1 → 8 → 64 → 8 → 1 → 1 goal inbound phase find differences fulfill part characteristic described sequence active bytes 8 → 64 → 8 done following three steps steps repeated 2 different starting values step 1 resulting total 2 actual values follow differential characteristic inbound phase set 2 values found complexity 2 round transformations due precomputation step outbound phase completes differential characteristic probabilistic way outbound phase uses truncated differentials opposed inbound phase starting point found inbound phase propagated forwards backwards order follow desired characteristic 8 active bytes must propagate single active byte directions one 8 1 transition happens probability 2 fulfilling characteristic probability 2 ensure collision values start end characteristic cancel feed-forward operation happens probability approximately 2 overall probability outbound phase therefore 2 find collision 2 starting points generated inbound phase since done average complexity 1 per starting point overall complexity attack 2 basic 4.5 round attack extended 5.5 round attack using two fully active states inbound phase increases complexity 2 extending outbound phase begins ends 8 active bytes leads near-collision 52 bytes whirlpool reduced 7.5 rounds complexity 2 assuming attacker control chaining value therefore input key-schedule whirlpool attack extended 9.5 rounds semi-free-start near-collision 52 bytes complexity 2 | [
1811,
4930,
807,
1353,
2918,
3100,
119,
4867,
7548,
1283,
6637,
1480,
6647,
7200,
4805,
5765,
5327,
6657,
7928,
1587,
5333,
6763,
6049,
161,
433,
1320,
613,
1146,
4917
] | Test |
465 | 6 | Storage@home:storage home storage home distributed data store project designed store massive amounts scientific data across large number volunteer machines project developed folding home team stanford university 2007 2011 scientists running folding home deal massive amounts data must stored backed expensive traditionally methods storing data raid servers used become impractical research budgets scale pande research group already dealt storing hundreds terabytes scientific data professor vijay pande student adam beberg took experience folding home began work storage home project designed based distributed file system known cosm workload analysis needed folding home results folding home volunteers easily participate storage home much disk space needed user folding home create robust network volunteers donate 10 gb storage space would hold encrypted files users gain points reward reliable storage file saved system replicated four times spread across 10 geographically distant hosts redundancy also occurs different operating systems across time zones servers detect disappearance individual contributor data blocks held user would automatically duplicated hosts ideally users would participate minimum six months would alert storage home servers certain changes end planned move machine bandwidth downgrade data stored storage home maintained redundancy monitoring repairs done needed careful application redundancy encryption digital signatures automated monitoring correction large quantities data could reliably easily retrieved ensures robust network lose least possible data storage resource broker closest storage project storage home storage home first made available september 15 2009 testing phase first monitored availability data basic statistics user machine would used create robust capable storage system storing massive amounts scientific data however year became inactive despite initial plans come april 11 2011 pande stated group active plans storage home | [
1004,
4759,
5571,
352,
578
] | Validation |
466 | 7 | Cloud_printing:cloud printing cloud printing technology enables printers accessed network cloud computing essence two kinds cloud printing one hand consumer-based cloud printing connects application cloud-enabled home printers people access using technology people take digital media primary communications tool create printed page need content physical form hand professional cloud printing enables publishers companies content owners print digital publications leveraging networks production facilities cloud computing technology short professional cloud printing allows ad-hoc transformation digital information physical forms 2d 3d consumers cloud ready printers eliminate need pc connections print drivers enabling print mobile devices publishers content owners cloud printing allows avoid cost complexity buying managing underlying hardware software processes required production professional print products leveraging cloud print print demand also allows businesses cut costs associated mass production moreover cloud printing considered eco-friendly significantly reduces amount paper used lowers carbon emissions transportation handful providers currently working towards professional cloud print solution operate niche focus mobile devices significantly large steps also taken consumer market google cloud print leading companies like konica minolta xerox ricoh followed google ’ footsteps mobile cloud solutions hewlett-packard implemented similar mechanism eprint solution additionally independent software vendors like printix leveraging cloud computing technology offer cloud-based print infrastructure cloud-based printing software service saas solutions may integrations cloud enabled printers provide printing via cloud features allow users print networks printers isolated network otherwise reachable user computer industry experts believe services become popular users longer consider printers necessary assets rather devices access demand need generate printed page presents cloud printing options simplify printing process print data must travel public cloud makes journey device printer also means printing possible cloud slow connection outage since clouds charge inbound and/or outbound traffic heavy print jobs significant cost true cloud print solutions require on-premise server company complementing cloud whether print server application server gateway service today many solution providers interface on-premise server cloud database label cloud print solution | [
3973,
2961,
6946
] | Test |
467 | 3 | IBM_System/360_architecture:ibm system/360 architecture ibm system/360 architecture model independent architecture entire s/360 line mainframe computers including limited instruction set architecture elements architecture documented ibm system/360 principles operation ibm system/360 i/o interface channel control unit original equipment manufacturers information manuals system/360 architecture provides following features memory storage system/360 addressed terms 8-bit bytes various instructions operate larger units called halfword 2 bytes fullword 4 bytes doubleword 8 bytes quad word 16 bytes 2048 byte storage block specifying leftmost lowest address unit within halfword fullword doubleword quadword low numbered bytes significant high numbered bytes sometimes referred big-endian many uses units require aligning corresponding boundaries within article unqualified term word refers fullword original architecture system/360 provided 2 16,777,216 bytes memory later model 67 extended architecture allow 2 4,294,967,296 bytes virtual memory system/360 uses truncated addressing means instructions contain complete addresses rather specify base register positive offset addresses base registers case system/360 base address contained one 15 general registers instructions example shifts computations performed 32-bit quantities addresses s/360 architecture defines formats characters integers decimal integers hexadecimal floating point numbers character integer instructions mandatory decimal floating point instructions part decimal arithmetic floating-point arithmetic features instructions s/360 two four six bytes length opcode byte 0 instructions one following formats instructions must two-byte boundary memory hence low-order bit instruction address always 0 program status word psw contains variety controls currently operating program 64-bit psw describes among things address current instruction executed condition code interrupt masks load program status word lpsw privileged instruction loads program status word psw including program mode protection key address next instruction executed lpsw often used return interruption loading old psw associated interruption class privileged instructions e.g. ssm stnsm stosm spka etcetera available manipulating subsets psw without causing interruption loading psw one non-privileged instruction spm available manipulating program mask architecture defines 5 classes interruption interruption mechanism automatically changing program state used synchronous asynchronous events two storage fields assigned class interruption s/360 old psw double-word new psw double-word processor stores psw interruption code inserted old psw location loads psw new psw location generally replaces instruction address thereby effecting branch optionally sets and/or resets fields within psw thereby effecting mode change s/360 architecture defines priority interruption class relevant two interruptions occur simultaneously interruption routine interrupted enabled interruption including another occurrence initial interruption reason normal practice specify mask bits exception machine-check mask bit 0 first-level interruption handlers second-level interruption handlers generally designed stacked interruptions multiple occurrences interruptions interruption class i/o interruption occurs completion channel program fetching ccw pci bit set also asynchronous events detected device control unit channel e.g. completion mechanical movement system stores device address interruption code stores channel status csw location 64 '40 x program interruption occurs instruction encounters one 15 exceptions however program mask bit corresponding exception 0 interruption exception 360/65 360/67 360/85 protection exception addressing exception interruptions imprecise case store instruction length code 0 interruption code may supervisor call interruption occurs result supervisor call instruction system stores bits 8-15 svc instruction interruption code external interruption occurs result certain asynchronous events bits 16-24 external old psw set 0 one bits 24-31 set 1 machine check interruption occurs report unusual conditions associated channel cpu reported another class interruption important class conditions causing machine check hardware error parity error found registers storage models may use report less serious conditions interruption code data stored scanout area '80 x 128 decimal model dependent article describes i/o cpu perspective discuss channel cable connectors summary elsewhere details found ibm literature i/o carried conceptually separate processor called channel channels instruction set access memory independently program running cpu smaller models 360/50 single microcode engine runs cpu program channel program larger models channels separate cabinets interfaces memory channel may contain multiple subchannels containing status individual channel program subchannel associated multiple devices concurrently channel programs referred shared subchannel representing single device referred unshared three types channels s/360 conceptually peripheral equipment attached s/360 control units turn attached channels however architecture require control units physically distinct practice sometimes integrated devices control similarly architecture require channels physically distinct processor smaller s/360 models 360/50 integrated channels steal cycles processor peripheral devices addressed 16-bit addresses. referred cua cuu article use term cuu high 8 bits identify channel numbered 0 6 low 8 bits identify device channel device may multiple cuu addresses control units assigned address capture range example cu might assigned range 20-2f 40-7f purpose assist connection prioritization multiple control units channel example channel might three disk control units 20-2f 50-5f 80-8f captured addresses need assigned physical device control unit also marked high low priority channel device selection progresses channel control unit order physically attached channel end chain selection process continues reverse back towards channel selection returns channel control unit accepted command sio returns condition code 3 control units marked high priority check outbound cuu within range i/o processed selection passed next outbound cu control units marked low priority check inbound returning cuu within range i/o processed selection passed next inbound cu channel connection three controls unit channel might physically -a-b-c marked high priority would abc marked low priority would cba b marked high ac low order would bca extending line reasoning first n controllers would priority 1 high 2n-1 low second priority 2 2n-2 third priority 3 2n-3 etc last physically attached would always priority n. three storage fields reserved i/o double word i/o old psw doubleword i/o new psw fullword channel address word caw performing i/o normally requires following channel program consists sequence channel control words ccws chained together see normally channel fetches ccws consecutive doublewords control unit direct channel skip ccw transfer channel tic ccw direct channel start fetching ccws new location several defined ways channel command complete allow channel continue fetching ccws others terminate channel program general ccw chain-command bit set tic channel terminate i/o operation cause i/o interruption command completes certain status bits control unit suppress chaining common ways command complete count exhausted chain-data set control unit signal data transfers made suppress-length-indication sli set one occurs without chaining allowed common situations suppress chaining unit-exception unit-check however combination unit-check status-modifier suppress chaining rather causes channel command retry reprocessing ccw addition interruption signal sent cpu i/o operation complete channel also send program-controlled interruption pci cpu channel program running without terminating operation delayed device-end interruption i/o completion interruption conditions detected channel indicated csw conditions presented channel control unit device cases handled channel cases indicated csw distinction conditions detected control unit conditions detected device fullword channel address word caw contains 4-bit storage protection key 24-bit address channel program started channel command word doubleword containing following low order 2 4 bits determine six types operations channel performs encoding meaning high order six four bits modifier bits table depends upon type i/o device attached see e.g. dasd ckd ccws eight bits sent interpreted associated control unit functional equivalent control used cause state change device control unit often associated mechanical motion e.g. rewind seek sense used read data describing status device important case command terminates unit check specific cause determined sense examining data returned sense command modifier bits zero always valid noteworthy deviation architecture dasd use sense command codes reserve release instead using control flags ccw affect executes terminates channel status word csw provides data associated i/o interruption architecture system/360 specified existence several common functions specify means implementation allowed ibm use different physical means e.g. dial keyboard pushbutton roller image text crt selecting functions values different processors reference key switch read applying e.g. light-pen selection equivalent keyboard sequence models alignment requirements problem-state instructions relaxed mechanism turn feature programs depending receiving program check type 6 alignment instructions must modified decimal arithmetic feature provides instructions operate packed decimal data packed decimal number 1-31 decimal digits followed 4-bit sign decimal arithmetic instructions except pack unpack generate data exception digit range 0-9 sign range a-f direct control feature provides six external signal lines 8-bit data path to/from storage floating-point arithmetic feature provides 4 64-bit floating point registers instructions operate 32 64 bit hexadecimal floating point numbers 360/85 360/195 also support 128 bit extended precision floating point numbers interval timer feature installed processor decrements word location 80 '50 x regular intervals architecture specify interval require value subtracted make appear though 1 subtracted bit 23 300 times per second smaller models decremented frequency 50 hz 60 hz ac power supply larger models high resolution timer feature processor causes external interruption timer goes zero multi-system operation set features support multi-processor systems e.g. direct control direct address relocation prefixing storage protection feature installed 4-bit storage key associated every 2,048-byte block storage key checked storing address block either cpu i/o channel cpu channel key 0 disables check nonzero cpu channel key allows data stored block matching key storage protection used prevent defective application writing storage belonging operating system another application permitted testing performed along production key four bits length maximum number different applications could run simultaneously 15 additional option available models fetch protection allowed operating system specify blocks protected fetching well storing system/360 model 20 radically different considered s/360 system/360 model 44 missing certain instructions feature allowed missing instructions simulated hidden memory thus allowing use standard s/360 operating systems applications models features extended architecture e.g. emulation instructions paging models make minor deviations architecture examples include deviations served prototypes features s/370 architecture | [
1252,
7331,
5636,
7541,
2567,
1947,
1992,
7783,
5502,
6922,
1880,
3747,
4009,
4555
] | Validation |
468 | 3 | MOS_Technology_8502:mos technology 8502 mos technology 8502 8-bit microprocessor designed mos technology used commodore 128 based mos 6510 used commodore 64 8502 added ability optionally run double clock rate commodore 64 limitations normally vic-ii display chip 6510 share access main memory vic-ii using cycle stealing interleave accesses cpu however run double-speed enough downtime 8502 memory access timing feed vic-ii running double-speed mode 80-column vdc could fully used dedicated memory c128 40-column applications selectively disabled screen performing cpu-intensive calculations additional speed could utilized loss video output unimportant smaller speed gain 35 also possible keeping 40-column display active switching 2 mhz vic-ii drawing vertical screen border since ram access vic needed time pinout little bit different 6510 8502 extra i/o-pin built-in i/o port mapped addresses 0 1 extended 6 7 bits lacks ϕ2-pin 6510 2007 hp released hp 35s calculator uses sunplus technology generalplus splb31a/gplb31a embedded chip integrating 8502 microprocessor core alongside lc display i/o controllers hp 17bii+ hp 12c prestige well revised version hp 12c platinum hp 12c platinum 25th anniversary edition manufactured kinpo electronics also based chip | [
7960,
7519,
7531,
5296,
7730,
2036,
2237,
4532,
7668,
2602,
7222,
1237,
3918,
5087
] | Test |
469 | 3 | NovaThor:novathor novathor platform consisting integrated system chips soc modems smartphones tablets developed st-ericsson 50/50 joint venture ericsson stmicroelectronics established february 3 2009 st-ericsson also sold socs nova modems thor separately application processor portion system successor previous nomadik line stmicroelectronics early 2009 development already begun nomadik soc called stn8500 superseded novathor family st-ericsson renamed u8500 st-nxp wireless division merged st-ericsson joint venture november 2 2011 nokia announced novathor socs power nokia future windows phone based smartphones making deviation standard use qualcomm snapdragon socs windows phones february 28 2012 st-ericsson announced would switch fully depleted silicon insulator fd-soi transistors upcoming products reduce power consumption example stated l8540 soc fd-soi transistors would consume 35 less power april 23 2012 company announced development application processors novathor moved back stmicroelectronics november 21 2012 announced st-ericsson joined sailfish alliance hence novathor modap platform would support jolla smartphones sailfish os december 10 2012 st-ericsson announced stmicroelectronics leave joint venture transition period making ericsson full owner company december 20 2012 ericsson announced buy remaining 50 stake stmicroelectronics held future company therefore remained uncertain january 30 2013 st-ericsson announced part quarterly result shipped 10.7 million u8500 novathor units fourth quarter 2012 may 28 2013 st-ericsson announced would sell assets intellectual property rights mobile connectivity global navigation satellite system gnss intel 90 million august 5 2013 ericsson stmicroelectronics completed split st-ericsson novathor since stmicroelectronics product equad quad-core chip act two performance cores 0.6 v two power-saving cores e electrical | [
2538,
6082,
6421,
7890,
722,
2926,
5740,
1473,
5750,
5752,
5405,
5406,
1864,
67,
446,
451,
6165,
463,
804,
1167,
5472,
4041,
3008,
3365,
6910,
5845,
7654,
6919,
3397,
1977,
2339,
2711,
1995,
550,
4846,
3786,
2024,
5576,
7364,
1284,
4879... | Test |
470 | 9 | Jim_Brown_(computer_scientist):jim brown computer scientist james brown manager group within ibm responsible programming language apl2 program product apl2 first available ibm mainframe computers 1980 later available linux unix windows 1993 brown received kenneth e. iverson award outstanding contribution apl association computing machinery 1996 left ibm become consultant entrepreneur 1999 brown cofounded smartarrays inc. held senior position company many years firm develops specialized analytic software based columnar databases memory-resident vector processing uses customers consider commercial off-the-shelf software expensive slow limited | [
811,
6263,
578,
3464,
6285,
752,
5322,
1774,
7758,
1308,
6846,
8137,
3060,
1892,
6064,
356
] | Test |
471 | 2 | James_Clark_(programmer):james clark programmer james clark time datetime= 1964-02-23 23 february 1964 /time author groff expat done much work open-source software xml born london educated charterhouse merton college oxford clark lived bangkok thailand since time 1995 /time permanent resident owns company called thai open source software center provides legal framework open-source activities gnu project wrote groff well xml editing mode gnu emacs james clark served technical lead working group developed xml—notably contributing self-closing empty-element tag syntax example codice_1 name dfn style= font-style italic xml /dfn contributions xml cited dozens books subject james author co-author number influential specifications implementations including listed part working group developed java streaming api xml stax jsr 173 jcp time datetime= 2004-11 november 2004 /time late time 2006 /time clark worked thailand software industry promotion agency sipa promote open source technologies open standards country work included pushing thai localization openoffice.org office suite mozilla firefox web browser along open source software packages projects sipa include | [] | Test |
472 | 2 | Nokia_E75:nokia e75 nokia e75 smartphone eseries range side sliding qwerty keyboard also front keypad optional dvb-h digital video broadcasting handsets nokia mobile tv receiver su-33w possible watch television screen phone | [
1066,
5979,
2271,
6517,
372,
1724,
463,
7521,
3615,
1453,
4935,
3694,
3524,
3952,
5909,
8072,
2922,
4407,
118,
23,
2564,
3703,
7261,
6440,
7545,
5044,
5493,
740,
1202,
5315,
3029,
5499,
7012,
139,
6378,
6465,
5062,
3039,
3653,
1582,
489... | Test |
473 | 2 | Fiwix:fiwix fiwix operating system kernel based unix architecture fully focused posix compatible designed developed mainly hobby os also serves educational purposes runs 32-bit x86 hardware platform compatible good base existing gnu applications follows system v application binary interface also linux 2.0 system call abi mostly compatible gnu/fiwix operating system uses fiwix kernel includes gnu toolchain gcc binutils make uses newlib v2.2.0 system c library primary file system minix v2 limits file names 30 character length maximum file system size 1gb features according official website include | [
4751,
4478,
1630,
900,
2467,
2294,
3106,
5571,
2300,
5656,
2118,
5661,
5931,
6360,
578,
5232,
6367,
8115,
336,
4447,
3751,
443,
1435
] | Test |
474 | 2 | /e/_(operating_system):/e/ operating system /e/ formerly eelo free open-source operating system smartphones android mobile platform fork lineageos operating system developed e foundation founded gaël duval /e/ marketed privacy software contain proprietary google apps services 2017 duval series articles titled leaving apple google /e/ odyssey proposed concept operating system without privacy-invasive software followed kickstarter crowdfunding campaign os initially named eelo name subsequently changed /e/ due copyright issues first beta version based lineageos 14.1 released september 12 2018 source code gitlab latest beta version milestone 0.7 based lineageos 14.1 lineageos 15.1 released june 26 2019 operating system includes set pre-installed mobile apps /e/ include google apps normally pre-installed android phones /e/ offers several unique features lineageos include features 30 april 2019 /e/ officially builds 81 devices including essential phone fairphone samsung xiaomi devices official builds labelled nightly although generally released every couple days /e/ active user base thousand users interact users provide support /e/ team uses telegram channels discussion forum | [
3933,
2179,
2187,
2909,
5724,
5372,
6086,
6427,
7894,
1095,
2564,
5386,
5391,
2935,
740,
6453,
4340,
42,
2585,
2228,
1487,
3310,
5062,
2591,
5068,
5771,
58,
2240,
3996,
5775,
424,
7587,
4008,
1893,
5794,
6158,
7954,
7956,
1909,
5806,
68... | Train |
475 | 8 | Heeii:heeii heeii formerly known elkoog b.v. company based groningen netherlands provides recommendation service web browsers means plug-in website visitors use heeii recommendations able get appropriate content links result reaching online objectives heeii combining human computer interaction research software engineering techniques understand implicit emergent behaviors web surfers based array implicit behaviors heeii ’ technology discerns user ’ intent dynamically connects content based collective wisdom visitors similar interests heeii built technology many social principles popularized books long tail wisdom crowds implicit approaches one heeii implements collects community wisdom emerges web observing user behaviors see comparison active passive filtering company founded 2006 edwin kuipers headquartered groningen netherlands elkoog able start taking round angel funding various close business relations friends funding round came approximately 750,000 early 2007 concept proven feasible heeii scales non-linearly always available respond rapidly financing sufficient infrastructure realized elkoog took round angel funding venture capital fund called knowledge conversion fund ir g.j smid fund foundation second funding round came approximately 1.6 million beginning 2009 company raised additional 2.6 million marketing netherlands company home base rest world also early 2009 heeii received academic accreditation becoming member expertise center target building sustainable economic cluster intelligent sensor network information systems northern part netherlands aimed data management large amounts data prominent scientific research groups innovative businesses jointly develop improve complex scalable data systems starting point target paradigm full integration large-scale data processing archiving analysis experimental surroundings target model developed actual market applications participants follow-up projects develop products services target collaboration target ’ secretary university groningen partners drew innovative program 32 million euros total investing total sum almost 16 million euros | [] | Test |
476 | 4 | Fileless_malware:fileless malware fileless malware variant computer related malicious software exists exclusively computer memory-based artifact i.e ram write part activity computer hard drive meaning resistant existing anti-computer forensic strategies incorporate file-based whitelisting signature detection hardware verification pattern-analysis time-stamping etc. leaves little way evidence could used digital forensic investigators identify illegitimate activity malware type designed work in-memory longevity system exists system rebooted fileless malware sometimes considered synonymous in-memory malware perform core functionalities without writing data disk lifetime operation led commentators claim variant strain nothing new simply “ redefinition well-known term memory resident virus ” whose pedigree traced back 1980s birth lehigh virus developed originator term fred cohen became influential paper topic synonymy however incorrect although aforementioned behavioral execution environment cases i.e malware variants executed system memory crucial differentiation method inception prolongation malware ’ infection vector involves writing hard disk order executed whose origin could take form infected file attachment external media device e.g usb peripheral mobile phone etc. browser drive-by side-channel etc aforementioned methods contact host system ’ hard drive form another meaning even employing stealthiest anti-forensic methods form infected residue left host media fileless malware hand point inception process termination usually way system reboot aims never contents written disk purpose reside volatile system areas system registry in-memory processes service areas fileless malware evolutionary strain malicious software taken steady model self-improvement/enhancement drive towards clearly defined focused attack scenarios whose roots traced back terminate-and-stay-resident/memory resident viral programs launched would reside memory awaiting system interrupt gaining access control flow examples seen viruses frodo dark avenger number beast techniques evolved way temporary memory resident viruses seen famous examples anthrax monxla took truer fileless nature way in-memory injected network viruses/worms codered slammer modern evolutionary incarnations seen viruses stuxnet duqu poweliks phasebot etc february 8 2017 kaspersky lab global research analysis team published report titled fileless attacks enterprise networks implicates variants type malware latest incarnations affecting 140 enterprise networks across globe banks telecommunication companies government organisations top targets report details variant fileless malware using powershell scripts located within microsoft windows registry system launch attack target ’ machine leveraging common attack framework called metasploit supporting attack tools mimikatz leveraging standard windows utilities ‘ sc ’ ‘ netsh ’ assist lateral movement malware detected bank identified metasploit meterpreter code running physical memory central domain controller dc kaspersky labs company identified emerging trends principal security anti-malware companies coming forward similar findings symantec trend micro mcafee labs cybereason etc emergence malware operate fileless way presents major problem digital forensic investigators whose reliance able obtain digital artifacts crime scene critical ensuring chain custody producing evidence admissible court law many well-known digital forensic process models casey 2004 dfrws 2001 nij 2004 cohen 2009 embed either examination and/or analysis phase respective models implying evidence obtained/collected/preserved mechanism difficulty becomes apparent considering standard operating procedures digital investigators deal computer crime scene traditional methods direct investigator fileless malware subverts forensics models evidence acquisition take place memory image obtained live running system investigated method however compromise acquired host ’ memory image render legal admissibility questionable least instill enough reasonable doubt weight evidence presented may drastically reduced increasing chances trojan horse dude done defences may used effectively renders type malware extremely attractive adversaries wishing secure foothold network perform difficult trace lateral movement quick silent manner standard forensic investigatory practices ill-prepared threat | [
2733,
5452,
3100,
5150,
3391,
2724,
1670,
6589,
2618,
1992
] | Test |
477 | 1 | Flag_state:flag state flag state merchant vessel jurisdiction whose laws vessel registered licensed deemed nationality vessel merchant vessel must registered registered one jurisdiction may change register registered flag state authority responsibility enforce regulations vessels registered flag including relating inspection certification issuance safety pollution prevention documents ship operates laws flag state laws applicable ship involved admiralty case term flag convenience describes business practice registering merchant ship state ship owners flying state civil ensign ship ships may registered flags convenience reduce operating costs avoid regulations avoid inspection scrutiny owner country normally nationality i.e. flag ship determines taxing jurisdiction since flag right declaration 1921 recognised states—including land-locked countries—have right maintain ship register ship ’ flag state failure flag states comply survey certification responsibilities especially flag-of-convenience states delegated task classification societies number states since 1982 established port state controls foreign-registered ships entering jurisdiction january 2010 panama world largest flag state almost quarter world ocean-going tonnage registered united states united kingdom 1 world war ii nations able maintain dominance cases even improve position maritime trade offering vessels exclusive protection flying flags would turn give nation exclusive control vessels shipowners time needed protection pirates privateers provided naval vessels flag state cases states offered subsidies shipbuilding industries addition incentives states might impose restrictions based flag state closing ports ships one well known example applied case england restricted import asian goods american british vessels england opened ports maneuvered position strength like gain access continental ports similarly france imposed trade monopoly colonies remained place 1869 ships must registered ship register jurisdiction whose flag flying flag registers many countries open ships foreign owners normally flag state one ship register several countries one register flag state set flag state control system | [
1622,
7941,
3787,
2188
] | Test |
478 | 2 | Linux_India:linux india linux india informally organized community mailing lists founded around 1997 arun sharma karra dakshinamurthy help newcomers linux operating system discussion forum linux enthusiasts india initial days mailing lists administered moderated sudhakar chandrasekharan aka thaths late 1990s linux begun getting lot exposure india computer magazines enthusiasts adoption linux slow bandwidth india prohibitively expensive time technology magazines like pcquest chip magazine others began bringing linux special issues including cover cds containing full distributions cds helped introduce linux many could afford costs downloading publications became important source linux distributions india formal informal linux user groups sprung around time first best known one time bharat linux user group formed early 1997 nit surat svnit see description administered final year student suman saraf saraf left college group continued hosted nit surat two years superseded linux india many academic institutions including tata institute fundamental research mumbai national centre software technology mumbai indian institute science bangalore indian institute technology chennai already heavy users linux time many semi-formal user groups including mailing lists support 1997 1999 linux india mailing list grew focusing largely helping people technical issues related installing running linux pcs linux india became kind de facto umbrella various linux users groups across india users smaller towns lug often joined linux india met sufficient critical mass people interested linux area formed local lug november 1999 linux community bangalore participated technology industry exhibition broader adoption linux companies like gt also began selling cheap linux cds india result growth linux india mailing list split three—linux india help lih linux india general lig linux india programmers lip —in november 1999 web site created irc server defunct irc.linux-india.org started old-timers channel irc.freenode.net mailing lists still functional veterans still subscribe though number daily messages reduced almost every major city/state lug mailing lists discuss issues mailing lists subscribed sourceforge page linked www.linux-india.org 2000 attempt made formalize linux india registered organization one reasons repeat event november 1999 scheduled bangalore sponsors linux presence event felt need work formal organization order avoid inadvertently getting political cross-fire representatives known lugs invited join new private mailing list called li-reg list discussed whether linux india formalized various lugs related linux india considerable difference opinion among representatives whether need formalize nationwide organization felt important formal organization deal industry others felt things fine way without need formal organization consensus reached two months discussions idea formalizing linux india dropped re-attempted since archives li-reg mailing list available online 2001 administrator mailing lists resigned lists moved sourceforge resided since founded around july 2004 freenode become premier irc channel linux/foss enthusiasts india channel usually 30 50 members time members india biggest contingents delhi mumbai chennai channel holds loose allegiance dormant indian linux users group channel old-timers regulars include particular order oldmonk f3ew hobbes no_mind baks17 vivekvc binand viksit jace tazz stephdg z00dax gora svaksha jeevan_ullas ramkrsna t3rmin4t0r mary lap_64 koolhead killerx 2008 mailing list named linux-india-channel created facilitate channel irc channel regulars channel operators discuss irc channel policy relevant discussions related linux india irc channel | [
5571,
578
] | Validation |
479 | 3 | Department_of_Computer_Science,_University_of_Illinois_at_Urbana–Champaign:department computer science university illinois urbana–champaign department computer science cs university illinois urbana-champaign consistently ranked top computer science program world 2018 u.s. news world report rank uiuc computer science top 5 cs graduate school program nation university illinois urbana-champaign ranked one top 5 undergraduate schools computer engineering csrankings.org puts uiuc top 5 computer science schools world publications research output top conferences past 10 years since reorganization 1964 department computer science produced myriad publications research advanced field computer science addition many faculty alumni leads modern-day applications mosaic web browser paypal youtube 1949 university illinois created digital computer laboratory following joint funding university u.s. army create ordvac illiac computers direction physicist ralph meagher ordvac illiac computers two earliest von-neumann architecture machines constructed completed 1952 illiac inspired machines mistic musasino-1 silliac cyclone well providing impetus university continue research computing illiac ii project yet despite advances high-performance computing faculty digital computer laboratory continued conduct research fields computing well human-computer interaction plato project first computer music illiac suite computational numerical methods work donald b. gillies james e. robertson r co-inventor srt division algorithm name given explosion research computing 1964 university illinois reorganized digital computer laboratory department computer science 1967 department awarded first phd master degrees computer science 1982 uiuc physicist larry smarr wrote blistering critique america supercomputing resources result national science foundation established uiuc national center supercomputing applications 1985 ncsa one first places industry academia develop software 3 major operating systems time macintosh pc unix ncsa 1986 released ncsa telnet 1993 released mosaic web browser 2004 department computer science moved digital computer laboratory building thomas m. siebel center computer science following gift alumnus thomas siebel 2017-2018 academic year total 2702 students department 1787 undergraduate 915 graduate average salary reported 2016-2017 graduates 96,518 85 full-time faculty members fields department offers nine undergraduate degree programs leading bachelor science degrees four different colleges department also sponsors minor computer science available uiuc students department also offers two 5-year bachelors/masters programs college engineering bachelor science/master science b.s./m.s computer science bachelors science/masters computer science b.s./m.c.s | [
3840,
2451,
4755,
4940,
4688,
6437,
4416,
1859,
5237,
6922,
1773,
1314,
3408,
6782,
1707
] | Test |
480 | 3 | Game_Over_(video_game):game video game game action video game developed dinamic software published imagine software 1987 available amstrad cpc commodore 64 msx thomson to7 zx spectrum game generally received positively game promotional artwork caused controversy due portrayal female nipple subsequently covered-up sequel game ii released 1987 game shoot 'em game second part game features adventure game elements arkos former loyal lieutenant beautiful evil galactic empress queen gremla became rebel dedicated end cruel tyranny first part game takes place prison planet hypsis arkos must try escape second part arkos arrives jungle swamp planet sckunn infiltrate queen palace defeat giant guardian robot assassinate game mostly well received sinclair rated zx spectrum version 9/10 tragically modified 1990 re-release edition given 52 high difficulty level computer video games awarded 8/10 zx spectrum 7/10 amstrad cpc versions msx version rated overall 8/10 msx extra commodore 64 version given score 68 zzap 64 game best known controversy regarding image queen gremla visible nipple seen advertising inlay artwork originally appeared cover heavy metal may 1984 vol.8 no.2 called cover ere comprimee attributed luis royo oli frey art editor crash magazine painted original bare-breasted image thin grey corset could printed retailers still demanded logos placed nipples game awards best advert best inlay year according readers crash game followed game ii also known phantis native spain developed published dinamic software 1987 | [
2768
] | Test |
481 | 2 | PlayStation_3_system_software:playstation 3 system software playstation 3 system software updatable firmware operating system playstation 3 base operating used sony playstation 3 fork freebsd netbsd called cellos process updating almost identical playstation portable playstation vita playstation 4 software may updated downloading update directly playstation 3 downloading user local official playstation website pc using usb storage device transfer playstation 3 installing update game discs containing update data initial slim ps3s sku shipped unique firmware new features also seen software 3.00 native operating system playstation 3 cellos believed fork freebsd tcp/ip stack fingerprinting identifies playstation 3 running freebsd playstation 3 known contain code freebsd netbsd 3d computer graphics api software used playstation 3 libgcm psgl based opengl es nvidia cg libgcm low level api psgl higher level api developers preferred use libgcm due higher levels performance similar later playstation 4 console also two apis low level gnm higher level gnmx unlike software development kit sdk mobile apps sony playstation 3 sdk available registered game development companies contains software tools integrated hardware component due fact requires licensing agreement sony considered expensive number open source homebrew ps3 sdks available addition number leaked ps3 sdks playstation 3 uses xrossmediabar xmb graphical user interface also used playstation portable psp handheld console variety sony bravia hdtvs blu-ray disc players many sony products xmb displays icons horizontally across screen seen categories users navigate using left right buttons d-pad move icons forward back across screen highlighting one time opposed using kind pointer select option one category selected usually specific options available select spread vertically selected icon users may navigate among options using buttons d-pad basic features offered xmb implementations varies based device software version apart appearing psp console category icons photos music games ps3 added users tv friends xmb also xmb offers degree multitasking in-game xmb features added ps3 properly firmware version 2.41 causing early implementation problems xmb proved successful user interface sony products psp ps3 next generation sony video game consoles playstation 4 playstation vita longer use user interface playstation 3 supports remote play sony handheld game consoles playstation portable playstation vita however unlike remote play playstation 4 playstation vita problem ps3 supported select titles results often laggy however clear remote play ps3 testing bed much better integration ps4 also users playstation 3 playstation vita possible share media files videos music images transferring multimedia files directly playstation 3 playstation vita vice versa furthermore use service called cross-buy allows buy certain games support feature one time play sony platforms case games saved games actually transfer back forth devices allowing players pick moment left also feature called cross-play cross-platform play covering playstation vita software title interact playstation 3 software title different software titles use cross-play different ways example ultimate marvel vs. capcom 3 title supporting cross-play feature ps3 version game controlled using ps vita system addition ps3 games played ps vita using playstation streaming service similar many consoles playstation 3 capable photo audio video playback variety formats also includes various photo slideshow options several music visualizations furthermore playstation 3 able play blu-ray disc dvd movies well audio cds box also capable adopting streaming media services netflix web browser ps3 uses netfront browser although unlike successor ps4 uses modern webkit core safari apple ps3 web browser receives low score html5 compliance testing however unlike ps4 ps3 able play adobe flash including full-screen flash early versions playstation 3 system software also provided feature called otheros available ps3 systems prior slimmer models launched september 2009 feature enabled users install operating system linux due security concerns sony later removed functionality 3.21 system software update according sony computer entertainment sce disabling feature help ensure ps3 owners continue access broad range gaming entertainment content sce content partners secure system sony successfully sued class action removal feature settlement approved september 2016 sony agreed pay 55 many 10 million ps3 owners denied wrongdoing furthermore playstation 3 provides printing support example print images web pages supported printer connected via usb cable local network however selection printers canon epson hewlett-packard compatible ps3 playstation 3 consoles able play original playstation games psone discs downloadable classics however playstation 3 models backwards compatible playstation 2 games summary early ps3 consoles 60gb 20gb launch ps3 consoles backwards compatible ps2 games ps2 chips later models notably 80gb metal gear solid ps3 consoles also backwards compatible partial software emulation case since longer ps2 cpu although ps2 gpu allowing reduced backward compatibility hardware-assisted software emulation later models ps3 slim ps2 backwards compatible though users still enjoy ps3 psone games according sony removed backwards compatibility ps3 already point three years lifecycle time vast majority consumers purchasing ps3 cite ps3 games primary reason meaning ps2 compatibility longer necessary nevertheless ps2 classics playable ps3 officially introduced playstation network purchase afterwards although selection ps2 games republished digital format unlike ps3 games lack trophy support later playstation 4 console released backward compatible either playstation 3 playstation 2 games although limited ps2 backward compatibility later introduced ps4 owners might play selected group ps3 games streaming internet using playstation cloud-based gaming service playstation 3 lv0 keys set cryptographic keys form core playstation 3 security system according news story polygon lv0 keys users able circumvent restrictions placed sony commonly known jailbreaking lv0 keys released online group calling three musketeers granting users access sensitive parts playstation 3 access areas users decrypt security updates work around authorized playstation firmware allows playstation 3 firmware updates modified computer run modified console three musketeers decided release code group rival hackers obtained code planned sell first time playstation 3 hacked according eurogamer release new custom firmware—and lv0 decryption keys particular—poses serious issues also says options sony battling leak limited since reveal lv0 key basically means system update released sony going forward decrypted little effort whatsoever initial release playstation 3 system software version 1.10 appeared november 11 2006 japan november 17 2006 north america provided playstation network services remote play 60 gb model however version 1.02 included games number updates 1.xx versions provided new features account management compatibility usb devices playstation 2 format games supports usb webcams bluetooth keyboards mice version 1.80 released may 24 2007 added number relatively small new features mostly related media videos ability upscale standard dvd-videos 1080p downscale blu-ray video 720p version 1.90 released may 24 2007 added wallpaper feature background xmb ability eject game disc using controller re-order game icons format creation date update also forced 24 hz output blu-ray hdmi introduced bookmarks security function web browser last version 1.xx series 1.94 released october 23 2007 added support dualshock 3 controllers version 1.xx series number versions 2.xx 3.xx series released november 8 2007 september 20 2011 quite noticeable changes version 2.10 alone new features additions voice changer feature power make users sound like person using voice changer five presets hi low tones new music bitmapping process specifically designed ps3 provide enhanced audio playback well supports divx wmv playback blu-ray disc profile 1.1 picture-in-picture version 2.50 released october 15 2008 update 2.xx series contained largest number new features changes among support official ps3 bluetooth headset in-game screenshots adobe flash 9 recovery menu safe mode also introduced version later versions 2.xx series 2.7x 2.85 2.90 distributed ps3 slim similar versions 2.00 versions 3.00 3.10 3.30 3.40 3.70 introduced relatively large number new features changes supports new dynamic custom themes improvements internet browser trophy enhancements new video editor uploader application noticeable change version 4.00 released november 30 2011 added support playstation vita handheld game consoles example ps vita system added option ps vita system application utility added feature game update playstation 3 also gained ability transfer videos images musics game data playstation vita version 4.10 released february 8 2012 also added improvements internet browser including support html5 display speed web page layout accuracy later versions 4.xx series made changes system mostly improve stability operation quality uses applications addition adding new features displaying closed captions playing bds dvds check update options menu game playstation 3 system software currently still updated sony system software version 2.40 included in-game xmb feature playstation 3 trophies released july 2 2008 however withdrawn later day small number users unable restart consoles performing update fault explained certain system administrative data contained hdd issue addressed version 2.41 system software released july 8 2008 system software version 3.0 released september 1 2009 shortly release number users complained system update caused system blu-ray drive malfunction addition john kennedy florida filed class action suit sony computer entertainment america john kennedy purchased playstation 3 january 2009 claiming worked perfectly installed required firmware update 3.0 point blu-ray drive system ceased functioning properly sony later released statement scea aware reports ps3 owners experiencing isolated issues ps3 system since installing recent system software update v3.00 released software update 3.01 september 15 2009 however installing 3.01 plaintiff alleged problems solved new update created new issues well due removal otheros feature older models ps3 due security issues possibly related exploit released geohot caused uproar playstation community several lawsuits filed first one filed behalf ps3 owners anthony ventura suit states removing feature constitutes breach contract false advertising handful business practices relating consumer protection laws feature touted sony systems new way consumers could turn machines basic pc cites feature extremely valuable one main reasons many people paid ps3 buying competing console like wii xbox 360 also elaborates anyone accept update longer play future games future blu-ray movie releases later two suits also filed members playstation 3 community first newer lawsuits filed todd densmore antal herz claim sony rendered several playstation 3 features paid inoperable result release firmware 3.21 second filed jason baker sean bosquett paul graham paul vannatta claims among things lost money purchasing ps3 without receiving benefit bargain product claimed game console would provide os feature gaming functions fourth lawsuit filed keith wright seeks compensation equal cost console fifth lawsuit filed jeffrey harper zachary kummer calls jury trial sixth lawsuit filed johnathon huber quotes eu us playstation blogs sony responded lawsuits requesting dismissal grounds one cared feature filings cite quotes 3rd party websites instruction manual playstation web site claims invalid proof sony disable psn advertised features playing games require newer firmware etc wish lawyers plaintiffs reviewed request said fairly common stage process case would reviewed judge november 2010 february 2011 claims false advertising case dismissed plaintiffs allowed appeal amend case claims removal violated computer fraud abuse act allowed go forward march 2011 plaintiffs amended complaint refute sony claims within rights tos warranty remove feature adding details claims including breach warranty breach implied warranty breach contract unjust enrichment breach several california unfair business practices laws april 2011 scea asked case dismissed made claims plaintiffs refiled claim insufficient hackers wanted violate sony intellectual property asked judge grant search rights ps3 systems scea also made claims division solely responsible removal held responsible despite conflicting information contrary april 18 2011 plaintiffs fired back sony renewed efforts case dismissed pointing fact sony made many claims dismissed court also pointed several legal precedents california law refuted sony claims december 2011 whole case dismissed grounds plaintiffs failed prove could expect os feature beyond warranty machine however decision overturned 2014 appellate court decision finding plaintiffs indeed made clear sufficiently substantial claims ultimately 2016 sony settled users installed linux purchased playstation 3 based upon alternative os functionality system software version 4.45 released june 18 2013 however withdrawn one day later small number users unable restart consoles performing update june 21 2013 morgan haro community manager playstation network announced issue identified new update planned released resolve issue system update addressed issue version 4.46 released june 27 2013 fix affected system version 4.45 also provided sony gaming platforms sony gaming platforms next generation gaming platforms generation official playstation 3 system software update page | [
2177,
7514,
6794,
6085,
728,
738,
3636,
746,
2583,
5760,
5065,
4718,
6477,
424,
6489,
4011,
6860,
5446,
443,
6158,
786,
4748,
6505,
450,
7962,
4761,
1547,
4408,
1193,
4059,
8001,
6918,
4441,
6583,
1606,
875,
4839,
3764,
3081,
191,
908,
... | Test |
482 | 7 | Booker_Software:booker software booker software inc. software company headquartered new york city products cloud-based management systems spas salons booker headquartered new york city offices irvine california scottsdale arizona united kingdom singapore booker started 2007 peter ellis daniel lizio-katzen spabooker division spafinder spabooker initial software product october 2010 spabooker spun separate company called gramercyone time company continued add features spabooker platform market appointment-based service businesses hotels medical practices dance studios repair shops november 2012 gramercyone changed name booker software inc. march 2015 booker 270 employees leadership ceo josh mccarter february 2017 booker expanded new 10,000-square-foot office skysong booker 9,000 business clients 73 countries notable clients include hilton hotels hard rock café drybar october 2011 booker gramercyone secured 14.5 million funding revolution ventures grotech ventures tdf jubilee november 2012 booker reported triple-digit revenue growth fourth consecutive year august 2013 booker processing 4.5 million daily transactions 2 million monthly appointment bookings platform company grew 30 employees 160+ employees 2010 2012 april 16 2013 booker secured 27.5 million series b financing led bain capital ventures booker series investors revolution ventures grotech ventures tdf ventures vital financial also participated financing round march 2018 booker got acquired mindbody another leading cloud based business management software wellness service industry 150 million booker software designed help service businesses manage operations marketing platform cloud-based allowing users access accounts booker ’ desktop iphone ipad android applications booker currently version 8.5 booker ’ software sold general industry-specific names booker bookerenterprise spabooker salonbooker features including online booking employee room scheduling social media marketing specials/deal distribution payment processing wait list management customer database/management additionally software integrates business ’ social media profiles including facebook twitter foursquare booker account includes access scheduling gift certificate applications facebook booker software compared opentable online reservation system used restaurants spabooker salonbooker marketed packaged independent spas salons booker partners allure magazine virtual store lifebooker spafinder | [
6788
] | Validation |
483 | 2 | AMSDOS:amsdos amsdos disk operating system 8-bit amstrad cpc computer various clones name contraction amstrad disk operating system amsdos first appeared 1984 cpc 464 added 3 inch disk drive cpc 664 cpc 6128 relatively fast efficient time amsdos quicker effective contemporaries amsdos provided built rom either supplied external disk drive machine rom depending model accessible built-in locomotive basic well firmware routines main function map cassette access routines built every cpc model disk drive enabled majority cassette-based programs work disk drive modification amsdos able support two connected disk drives amdos extends amstrad basic addition number external commands identified preceding nowiki /nowiki bar symbol following list external commands supported amsdos disk operating systems amstrad range included cp/m also bundled external disk drive built-in rom depending model ramdos allowed full 800k capacity single-density 3 ½ disks used providing suitable drive connected symbos | [
1522,
3748,
5571,
4670,
2076,
12
] | Test |
484 | 9 | Mobile_Information_Device_Profile:mobile information device profile mobile information device profile midp specification published use java embedded devices mobile phones pdas midp part java platform micro edition java framework sits top connected limited device configuration cldc set lower level programming interfaces midp developed java community process first midp devices launched april 2001 core application programming interfaces defined underlying connected limited device configuration system contains java me-specific classes used i/o operations contains java me-specific classes used gui lcdui simple screen based approach single displayable always active time application user interface lcdui api provides small set displayables common mobile device user interfaces list alert textbox form canvas displayables device midp implementation control presentation layout displayable canvas low-level graphics surface application full control rendered although normally space reserved system areas like screen title indicators common mobile device uis since midp 2.0 canvas also supports full-screen mode allows use full screen graphics especially useful games lcdui also quite unique approach abstract operations called commands placement commands added displayable completely device implementation toolkit application programmer uses api specified command types indicate usage purpose command application user interface common types back exit item screen idea command abstraction make applications portable across various mobile devices application developers use command types properly indicate purpose operation device implementation places operation common location given type device specific user interface style may e.g specific key like back navigation key back commands button screen acronym lcdui actually in-house joke within jcp expert group though undefined midp specifications denotes limited capability device user interface joke no-one else really knew stood later book programming wireless devices java 2 platform micro edition gave definition common pseudo-definitions appeared liquid crystal display user interface would reflect fact mobile phones normally use lcds however api specifically tailored particular display technology also said lcd ui stands lowest common denominator due fact specific ui simplest possible design provides form persistent storage java database mobile device contains base classes java applications allows applications notified changes state following java specification requests selection optional jsrs added top midp implementation add extra functionalities optional jsrs guarantee midp handset implement apis wireless messaging api optional sending sms mms messages personal information management api optional access device address book to-do list calendar file connection optional package fcop one two optional packages defined jsr 75 java community process fileconnection api specified jsr 75 gives access local file systems devices like pda order overcome security issues midlet needs include requested file permission jad file midlet-permission property several different ways create midp applications code written plain text editor one use advanced ide netbeans intellij bundled java plugin eclipse plugins eclipseme user interface graphically laying forms create well providing many advanced features available simple text editor limitations may avoided using vendor-specific api midp 2.0 obviously reduces portability application midp developed java community process midp succeeded meep java 8 | [
1544,
3055,
7012,
2520,
2564,
7261,
5062,
6336,
6190,
6280,
3615,
2422,
3952,
4726
] | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.