node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
485
4
Institute_of_Information_Security_Professionals:institute information security professionals institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole primary aim institute provide universally accepted focal point information security profession institute information security professionals membership representing 8,000 individuals globally throughout industry academia government iisp offices evesham worcestershire southwark london institute hqs based evesham close cyber-hubs cheltenham malvern institute run members elected board directors dr alastair macwillson chairman one main activities act accreditation authority industry part government investment cyber security iisp consortium including crest rhul appointed ncsc provide certification uk government information assurance ia professionals consortium awarded licence issue cesg certified professional ccp mark based skills framework part certification scheme driven ncsc ia arm gchq full membership institute information security professional standard endorses knowledge experience professionalism individual field award membership levels competency-based sets apart purely knowledge-based qualifications awarded professionals demonstrate breadth depth knowledge substantial practical experience iisp number regional branches developed members based london united kingdom institute established 2006 information security professionals 2007 institute developed iisp skills framework framework describes range competencies expected information security information assurance professionals effective performance roles developed collaboration private public sector organisations academics security leaders 2012 part government investment cyber security iisp consortium appointed ncsc formally cesg provide certification uk government information assurance ia professionals iisp defined set information security skills skill levels skill definitions supplemented ncsc enable certification bodies make formal assessments others make informal assessments ia skill levels
[ 3241, 4648, 1539 ]
Test
486
9
Tcl:tcl tcl pronounced tickle tee cee ell high-level general-purpose interpreted dynamic programming language designed goal simple powerful tcl casts everything mold command even programming constructs like variable assignment procedure definition tcl supports multiple programming paradigms including object-oriented imperative functional programming procedural styles commonly used embedded c applications rapid prototyping scripted applications guis testing tcl interpreters available many operating systems allowing tcl code run wide variety systems tcl compact language used embedded systems platforms full form several small-footprint versions popular combination tcl tk extension referred tcl/tk enables building graphical user interface gui natively tcl tcl/tk included standard python installation form tkinter tcl programming language created spring 1988 john ousterhout working university california berkeley originally born frustration according author programmers devising languages intended embedded applications tcl gained acceptance ousterhout awarded acm software system award 1997 tcl/tk name originally comes tool command language conventionally spelled tcl rather tcl tcl conferences workshops held united states europe tcl features include safe-tcl subset tcl restricted features tcl scripts harm hosting machine application file system access limited arbitrary system commands prevented execution uses dual interpreter model untrusted interpreter running code untrusted script designed nathaniel borenstein marshall rose include active messages e-mail safe-tcl included e-mail application/safe-tcl multipart/enabled-mail supported functionality safe-tcl since incorporated part standard tcl/tk releases syntax semantics tcl covered twelve rules known dodekalogue tcl script consists series command invocations command invocation list words separated whitespace terminated newline semicolon first word name command may built language found available library defined script subsequent words serve arguments command following example uses puts command display string text host console sends string hello world standard output device along appended newline character variables results commands substituted strings example uses set expr commands store result calculation variable note tcl use codice_3 assignment operator uses puts short put string print result together explanatory text codice_4 character introduces comment comments appear anywhere interpreter expecting command name seen examples one basic construct language command quoting mechanisms substitution rules determine arguments command processed one special substitution occurs parsing commands arguments final character line i.e. immediately newline backslash backslash-newline combination spaces tabs immediately following newline replaced single space provides line continuation mechanism whereby long lines source code wrapped next line convenience readers continuing normal argument processing word begins double-quote character codice_5 extends next double-quote character word thus contain whitespace semicolons without characters interpreted special meaning i.e. treated normal text characters word begins opening curly-brace character codice_6 extends next closing curly-brace character codice_7 inside curly braces forms substitution suppressed except previously mentioned backslash-newline elimination words enclosed either construct known bare words bare double-quoted words three types substitution may occur substitution proceeds left-to-right single scan word substituted text scanned possible substitutions however number substitutions appear single word tcl 8.5 onwards word may prefixed codice_12 causes word split apart constituent sub-words purposes building command invocation similar codice_13 sequence lisp quasiquote feature consequence rules result command may used argument command also operator command string concatenation language concatenates directly note unlike unix command shells tcl reparse string unless explicitly directed makes interactive use cumbersome scripted use predictable e.g. presence spaces filenames cause difficulties single equality sign codice_3 serves special role language double equality sign codice_15 test equality used expression contexts codice_16 command first argument codice_17 commands part standard library special place library replaced desired majority tcl commands especially standard library variadic codice_18 constructor scripted command procedures allows one define default values unspecified arguments catch-all argument allow code process arbitrary numbers arguments tcl statically typed variable may contain integers floats strings lists command names dictionaries value values reinterpreted subject syntactic constraints types demand however values immutable operations appear change actually return new value instead important commands refer program execution data operations usual execution control commands looping commands additionally controlled following commands codice_1 allows command script executed scope current innermost scope stack command script may call procedures use uplevel command net effect transforming call stack call tree originally implemented permit tcl procedures reimplement built-in commands like still ability manipulate local variables example following tcl script reimplementation command omitting exception handling codice_2 arranges one local variables current procedure refer variables enclosing procedure call global variables upvar command simplifies implementation call-by-name procedure calling also makes easier build new control constructs tcl procedures decr command works like built-in codice_54 command except subtracts value variable instead adding tcl 8.6 added built-in dynamic object system tcloo 2012 includes features tcl object oriented oo syntax 2012 various extension packages emerged enable object-oriented programming widespread existing tcl source code popular extensions include tcloo added build strong object oriented system also enable extension packages build object oriented abstractions using foundation release tcloo incr tcl updated use tcloo foundation tcl web server pure-tcl implementation http protocol server runs script top vanilla tcl interpreter apache rivet open source programming system apache http server allows developers use tcl scripting language creating dynamic web applications rivet similar php asp jsp rivet primarily developed damon courtney david welton massimo manghi harald oehlmann karl lehenbauer rivet use thousands publicly available tcl packages offer countless features database interaction oracle postgresql mysql sqlite etc interfaces popular applications gd graphics library tcl interfaces natively c language originally written framework providing syntactic front-end commands written c commands language including things might otherwise keywords codice_17 codice_25 implemented way command implementation function passed array values describe already substituted arguments command free interpret values sees fit digital logic simulators often include tcl scripting interface simulating verilog vhdl systemverilog hardware languages tools exist e.g swig ffidl automatically generate necessary code connect arbitrary c functions tcl runtime critcl reverse allowing embedding arbitrary c code inside tcl script compiling runtime dll tcl language always allowed extension packages provide additional functionality gui terminal-based application automation database access commonly used extensions include
[ 3930, 361, 7878, 1819, 4302, 5731, 6428, 6095, 1840, 1102, 1105, 4705, 7190, 6116, 7557, 753, 417, 54, 5420, 7573, 7581, 6489, 2256, 5786, 5787, 6497, 2619, 4017, 5091, 6507, 1154, 1524, 2272, 3684, 1158, 1532, 7246, 103, 4039, 109, 228...
Test
487
1
Svensk_mediedatabas:svensk mediedatabas svensk mediedatabas swedish media database search engine audiovisual works national library sweden database contains data tv radio video movies shown cinemas gramophone records cds cassette tapes video games multimedia smdb contains swedish broadcasts publications since 1979 also older works almost complete list swedish gramophone records starting end 19th century smdb also contains information special collections older advertisement films video recordings swedish theatres database contains information nearly eight million hours audiovisual content database contains information following starting 1979
[ 2054 ]
Test
488
3
Palm_Vx:palm vx palm vx personal digital assistant made palm computing division 3com benefited sleek design low weight predecessor palm v increasing available storage 8 mb 114 grams one lightest models ever offered palm retail price launch us 399 soon release vx palm computing spun form palm inc.. result later-production palm vx units first palm devices longer carry 3com branding vx based palm v design primary difference two vx 8 megabytes ram compared v 2 megabytes one last palm models include memory slot also one first feature interaction email avantgo online programs vx powered motorola dragonball ez processor operating 20 mhz originally equipped palm os 3.3 later models came palm os 3.5 upgrade palm os 4.1 formerly offered sale palm website longer available device built rechargeable battery replaceable unless unit disassembled button top screen permitted access contrast menu also includes illumination feature causes screen backlit green glow however default backlight behaviour inverted text glowed background remained dark unfortunate side effect making backlit pictures appear negative images made display hard read ambient lighting level backlight screen crisp clear bright sunlight total darkness august 1 2000 palm announced release claudia schiffer edition palm vx palm vx cse featured blue brushed-metal finish instead usual silver color came pre-loaded healthetec diet exercise weight management software package abroad travel organization program device sold exclusively supermodel website retailed us 399 palm also released limited edition colored versions palm vx without special branding special edition offered gold millennium blue also palm cresenda edition blue faceplate reflecting corporate color cresenda wireless
[ 7326, 4754, 2551, 4317, 5571, 7919, 1581, 3405, 1237, 1702 ]
Validation
489
3
Laplace_no_Ma:laplace video game mixture role-playing video game survival horror genres set vicinity boston massachusetts town called newcam modeled fictional city arkham created h. p. lovecraft horror part game lies exploration fictional weathertop mansion whose owner dabbled black magic game crpg features include character classes—dilettante medium detective scientist journalist—and player leave mansion walk around town go shops buy items needed defeat monsters complete game release famicom tsūshin scored super famicom version game 26 40
[]
Test
490
2
X00:x00 x00 popular dos-based fossil driver commonly used mid-1980s late 1990s even still used today fossil drivers mainly used run bbs software ms-dos x00 also run windows even linux dosemu environments allow fossil-aware ms-dos based applications function x00 developed raymond l. gwinn 1989 1993 final release version version 1.50 later beta version 1.53 added support baud rates 38400 x00 free non-commercial usage x00 included many enhancements ftc fossil revision 5 specifications later used fossil drivers adf netfoss gwinn moved develop replacement serial port driver os/2 called sio sio contained virtualized fossil vx00 could loaded applications needed fossil support
[ 6380, 1978, 4759, 578 ]
Test
491
3
Processor_array:processor array processor array like storage array contains manages processing elements instead storage elements processor array following characteristics
[]
Test
492
2
PokerTH:pokerth pokerth open-source texas hold 'em simulator runs windows mac os x linux android pokerth written c++ using qt framework allows ten human players computer-controlled players filling enough humans players also play pokerth users online game ample settings players configure customize play pokerth project started 2006 felix hammer florian thauer version 0.1 released public allowed play flop well river version 0.2 released 4 october year followed 0.3 16 october version 0.2 game could play complete round version 0.4 released 4 april 2007 included completely new interface options dialog reprogrammed opponents june 2007 version 0.5 added network online play well sound effects internationalization started version 0.5 20 languages version 0.6 released 13 december 2007 prominent change addition dedicated game server online play well ipv6 support version 0.7 released 3 may 2009 adding support ten players new skinnable interface version 0.8 released 9 september 2010 adding option play online ranking games 2011 pokerth relicensed gplv2 agpl version 0.9 released january 4 2012 year development busy beta phase version introduces one frequently requested feature possibility rejoin internet games disconnection e.g trouble player internet connection players worry drop rank anymore furthermore around 15 new features lot bugfixes version 0.9.5 pokerth includes preliminary support android devices version 1.0 online log file analysis tool added sound support higher screen resolutions android devices support windows 8 desktop mode license change openssl exception windows 8 support gcrypt currently crashes windows 8 server re-factored using google protocol buffers basically enables use html5 clients latest stable version 1.1.2 released 1 september 2017 pokerth selected april 2013 hotpick linux format pokerth became quite popular freeware game downloaded alone sourceforge.net 2007 may 2017 2.8 million times article contains material translated german wikipedia article specifically version
[ 5571, 4759, 578 ]
Train
493
6
/dev/zero:/dev/zero read operations return many null characters 0x00 requested read operation unlike may used source sink data write operations succeed effects however commonly used purpose memory-mapped e.g. mmap virtual address space equivalent using anonymous memory i.e memory connected file /dev/zero introduced 1988 sunos-4.0 order allow mappable bss segment shared libraries using anonymous memory mid 1990s hp-ux introduced mmap flag map_anonymous maps anonymous memory directly without need open /dev/zero since late 1990s map_anonymous supported unix versions removing original purpose /dev/zero dd unix utility program reads octet streams source destination possibly performing data conversions process destroying existing data file system partition low-level formatting creating 1 mib file called foobar filled null characters note block size value given si decimal values e.g gb mb etc create 1 gb file one would simply type note instead creating real file zero bytes many file systems also support creation sparse files returns zeros upon reading use less actual space
[ 2717, 5626, 6620, 5571, 2621 ]
Test
494
5
Unidirectional_Lightweight_Encapsulation:unidirectional lightweight encapsulation unidirectional lightweight encapsulation ule data link layer protocol transportation network layer packets mpeg transport streams low protocol overhead especially suited ip satellite services every bit counts system example dvb-s however ule also used context dvb-c dvb-t theoretically every system based mpeg transport streams e.g. atsc ule engineered ip dvb ipdvb working group internet engineering task force ietf standardized rfc 4326 another encapsulation method multiprotocol encapsulation mpe developed standardized dvb project software linux kernel ulenet windows xp ipdvb working group maintains list ule implementations
[ 7148, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 5492, 7091, 3383, 3640, 2219, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 6044, 7214, 7217, 7765, 530, 259, 5880 ]
Test
495
3
A_View_to_a_Kill_(video_game):view kill video game view kill name two separate computer games released 1985 based james bond film view kill first action game titled view kill computer game developed published domark available zx spectrum amstrad cpc commodore 64 oric 1 oric atmos msx second game titled james bond 007 view kill text-based adventure video game ms-dos macintosh apple ii computers developed angelsoft inc. published mindscape domark created action game split three separate sections inspired scenes film game starts famous movie intro sequence moving gunsight bond shooting towards camera first section set paris james bond commandeers taxi follow may day parachuted eiffel tower roadblocks police cars stop bond shoot pistol get way display three sections overhead map paris small 3d view car point view scanner showing may day height james must arrive right location catch lands second section james must help stacey sutton escape san francisco city hall fire room displayed side-on perspective james must collect useful objects get floors building keys open doors buckets water stop progress fire third final section james must collect code numbers stop detonation zorin bomb bond runs around mine avoiding rockfalls long drops among objects pick grapnel gun fire ropes upward climb safety plank wood bridge gaps may day also somewhere mine password system lets user play second third levels without completing first music commodore 64 version written antony tony crowther consists two covers one famous james bond theme monty norman second duran duran theme film mindscape published text adventure game angelsoft inc dos macintosh apple ii computers full title james bond 007 view kill future bond novelist raymond benson worked development game spawned follow-up game sinclair user gave zx spectrum version four stars five commodore user called commodore 64 version certainly one better 'game film implementations around commodore gave commodore 64 version two stars five criticized gameplay concepts writing sometimes programmers go overboard special effects expense could otherwise superb game view kill one example zzap 64 gave commodore 64 version 36 percent rating criticized game graphics music three separate gameplay modes writing focusing single gameplay style might better zzap 64 overall conclusion game powerful idea seems missed point zzap 64 reviewed commodore 64 version 1992 giving 19 percent rating writing problem licence potential turned diabolical arcade adventure questbusters wrote positive review praised game well-written text well-paced story criticized first level skullsmasher near impossible without information obtained film ... maybe designers figured people would n't play game unless 'd seen movie questbusters criticized game slow loading times response times major drawback ultimately concluded bond fans disappointed
[ 6380 ]
Test
496
4
McAfee:mcafee mcafee llc formerly known mcafee associates inc. 1987–2014 intel security group 2014–2017 american global computer security software company headquartered santa clara california claims world largest dedicated security technology company company purchased intel february 2011 became part intel security division september 7 2016 intel announced strategic deal tpg capital convert intel security joint venture companies called mcafee deal closed april 3 2017 thoma bravo took minority stake new company intel maintains 49 stake company founded 1987 mcafee associates named founder john mcafee resigned company 1994 mcafee incorporated state delaware 1992 network associates formed 1997 merger mcafee associates network general pgp corporation helix software company restructured 2004 beginning sale magic solutions business remedy subsidiary bmc software early year mid-2004 company sold sniffer technologies business venture capital backed firm named network general name original owner sniffer technologies changed name back mcafee reflect focus security-related technologies among companies bought sold mcafee trusted information systems developed firewall toolkit free software foundation commercial gauntlet firewall later sold secure computing corporation mcafee result brief ownership tis labs/nai labs/network associates laboratories/mcafee research highly influential world open-source software organization produced portions linux freebsd darwin operating systems developed portions bind name server software snmp version 3 mcafee acquired calgary alberta canada-based fsa corporation helped company diversify security offerings away client-based antivirus software bringing board network desktop encryption technologies fsa team also oversaw creation number technologies leading edge time including firewall file encryption public key infrastructure product lines product lines individual successes including powerbroker written dean huxley dan freedman sold beyondtrust growth antivirus ware always outpaced growth security product lines fair say mcafee remains best known anti-virus anti-spam products august 19 2010 intel announced would purchase mcafee 48 share deal valued 7.68 billion january 6 2014 intel ceo brian krzanich announced consumer electronics show name change mcafee security intel security company red shield logo would remain firm continuing operate wholly owned intel subsidiary john mcafee longer involvement company expressed pleasure name longer associated software everlastingly grateful intel freeing terrible association worst software planet words words millions irate users however 2016 products still bore mcafee name company spun back intel april 4 2017 mcafee primarily develops digital-security tools personal computers server devices recently mobile devices mcafee brands products sub-products include
[ 7151, 3262, 385, 1838, 4689, 7177, 6106, 1847, 7911, 7186, 742, 2219, 6823, 7193, 7567, 6842, 5773, 6133, 62, 1130, 84, 7597, 88, 5452, 91, 5099, 4388, 7244, 6526, 113, 1931, 115, 6899, 2296, 4783, 5132, 496, 5144, 142, 2332, 518, 694...
Test
497
8
Visit_filter:visit filter visit filters used web log analysis software include exclude data visit session specifying ranges types data let limit web log data analyzed letting focus relevant activity
[ 3273, 4600, 84 ]
Test
498
5
M3UA:m3ua m3ua stands mtp level 3 mtp3 user adaptation layer defined ietf sigtran working group replaces supersedes m3ua enables ss7 protocol user parts e.g isup sccp tup run ip instead telephony equipment like isdn pstn m3ua uses service sctp transmit messages network elements several owns pc uses sgw stp transit pointcode m3ua uses complex state machine manage indicate states running several m3ua messages mandatory make m3ua association peering fully functional asp asp acknowledge asp active asp active acknowledge others recommended notify destination audits daud open implementation m3ua standard found openss7 web site wireshark shipped dissector m3ua sample packets found wireshark wiki page shows isup packet samples including m3ua
[ 498, 3982, 588, 4976, 7590, 5492, 995 ]
Train
499
5
Transmission_(BitTorrent_client):transmission bittorrent client transmission bittorrent client features variety user interfaces top cross-platform back-end transmission free software licensed terms gnu general public license parts mit license transmission allows users quickly download files multiple peers internet upload files adding torrent files via user interface users create queue files downloaded uploaded within file selection menus users customise downloads level individual files transmission also seeds automatically share downloaded content transmission allows assigning priorities torrents files within torrents thus potentially influencing files download first supports magnet uri scheme encrypted connections allows torrent-file creation peer exchange compatible vuze μtorrent includes built-in web server users control transmission remotely via web also supports automatic port-mapping using upnp/nat-pmp peer caching blocklists bad peers bandwidth limits dependent time-of-day globally per-torrent partial support ipv6 allows use multiple trackers simultaneously local peer discovery micro transport protocol µtp udp tracker support directly subscribing rss feeds containing torrent files automatic download third-party add-ons supply functionality macos-specific features include dock growl notifications automatic updates using sparkle universal binary version 2.22 transmission 1.60 later removed support mac os x v10.4 currently transmission 1.54 last version runs mac os x 10.4 although possible compile later versions source either downloading project web site using package manager like fink macports unsupported bugs specific 10.4 fixed starting transmission 2.30 apple mac intel cpu needed powerpc-based systems longer supported natively transmission back-end libtransmission also serves basis transmission daemon daemon supports web front-end called clutch older versions ported form basis update system video game playstation 3 well backend imageshack bittorrent service portable version available portableapps.com transmission set lightweight bittorrent clients gui cli daemon form incarnations feature simple intuitive interface top efficient cross-platform back-end several transmission clients different operating systems including unix-like macos beos/zeta operating system front-end built using native widget toolkits example transmission-gtk uses gtk+ interface transmission-qt qt interface transmission-cli command-line interface transmission-remote-cli ncurses interface transmission-daemon python-transmissionrpc python module implementing json-rpc client protocol transmission unofficial port transmission using command-line interface cli ios accomplished 3 march 2008 november 2010 itransmission another unofficial port released jailbroken iphones sporting gui capable downloading directly device wifi 3g transmission remote released android name transdroid currently support downloading directly devices windows transmission-qt built mingw daemon console tools built cygwin also two third-party guis transmission-remote-dotnet transmission remote gui well unofficial full builds transmission qt client. also unofficial full build transmission daemon run windows service unofficial full build transmission daemon running windows service used direct streaming downloading file port platforms enhanced streaming downloading file located github also ported maemo os nokia n810 internet tablet n900 smartphone well meego/harmattan os nokia n9 n950 smartphones download torrents device march 2016 palo alto networks reported transmission official website compromised tainted .dmg files uploaded site using apple developer signature bypass os x gatekeeper feature tainted packages installed ransomware application variant linux.encoder.1 recompiled mac known keranger encrypts user files attempts force users pay 1 bitcoin worth roughly us 404 time attack order get decryption pack transmission website advised mac users immediately upgrade new version removes malware-infected file apple revoked developer certificate used sign tainted package added package signature xprotect anti-malware system transmission default bittorrent client many unix linux distributions including joli os solaris ubuntu mandriva mint fedora ref name= distribution/download/bittorrent /ref puppy crunchbang zenwalk gnome flavor opensuse fonera ships routers transmission pre-installed cnet editor paul huges praised transmission simplicity lightweight well feature-packed april 2017 software ranked third p2p downloads mac cnet
[ 7959, 2984, 3172, 4759, 6609, 6883, 2728, 806, 7432, 7714, 6711, 3524, 7343, 1267, 7169, 2390, 1367, 7637, 5571, 1376, 314, 8100, 2664, 1017, 1202, 2581, 744, 6025, 6549, 7744, 2131, 2681, 5414, 7848, 761, 3573, 3738, 2338, 523, 2430, 2...
Test
500
2
RDMA_over_Converged_Ethernet:rdma converged ethernet rdma converged ethernet roce network protocol allows remote direct memory access rdma ethernet network two roce versions roce v1 roce v2 roce v1 ethernet link layer protocol hence allows communication two hosts ethernet broadcast domain roce v2 internet layer protocol means roce v2 packets routed although roce protocol benefits characteristics converged ethernet network protocol also used traditional non-converged ethernet network network-intensive applications like networked storage cluster computing need network infrastructure high bandwidth low latency advantages rdma network application programming interfaces berkeley sockets lower latency lower cpu load higher bandwidth roce protocol allows lower latencies predecessor iwarp protocol exist roce hcas host channel adapter latency low 1.3 microseconds lowest known iwarp hca latency 2011 3 microseconds roce v1 protocol ethernet link layer protocol ethertype 0x8915 means frame length limits ethernet protocol apply 1500 bytes regular ethernet frame 9000 bytes jumbo frame roce v1.5 uncommon experimental non-standardized protocol based ip protocol roce v1.5 uses ip protocol field differentiate traffic ip protocols tcp udp value used protocol number unspecified left deployment select roce v2 protocol exists top either udp/ipv4 udp/ipv6 protocol udp destination port number 4791 reserved roce v2 since rocev2 packets routable roce v2 protocol sometimes called routable roce rroce although general delivery order udp packets guaranteed rocev2 specification requires packets udp source port destination address must reordered addition rocev2 defines congestion control mechanism uses ip ecn bits marking cnp frames acknowledgment notification software support roce v2 still emerging mellanox ofed 2.3 later roce v2 support also linux kernel v4.5 roce defines perform rdma ethernet infiniband architecture specification defines perform rdma infiniband network roce expected bring infiniband applications predominantly based clusters onto common ethernet converged fabric others expected infiniband keep offering higher bandwidth lower latency possible ethernet technical differences roce infiniband protocols roce protocols define perform rdma using ethernet udp/ip frames iwarp protocol defines perform rdma connection-oriented transport like transmission control protocol tcp roce v1 limited single ethernet broadcast domain roce v2 iwarp packets routable memory requirements large number connections along tcp flow reliability controls lead scalability performance issues using iwarp large-scale datacenters large-scale applications i.e large-scale enterprises cloud computing web 2.0 applications etc. also multicast defined roce specification current iwarp specification define perform multicast rdma reliability iwarp given protocol tcp reliable rocev2 hand utilizes udp far smaller overhead better performance provide inherent reliability therefore reliability must implemented alongside rocev2 one solution use converged ethernet switches make local area network reliable require converged ethernet support switches local area network prevents rocev2 packets traveling wide area network internet reliable another solution add reliability roce protocol i.e reliable roce adds handshaking roce provide reliability cost performance question protocol better depends vendor intel chelsio recommend exclusively support iwarp mellanox xilinx broadcom recommend exclusively support roce/rocev2 vendors involved network industry provide support protocols marvell microsoft linux kazan cisco supports roce vic rdma protocol protocols standardized iwarp standard rdma tcp defined ietf roce standard rdma ethernet defined ibta aspects could defined roce specification left addition protocol running ip assume underlying network guaranteed ordering assume congestion occur least one vendor offers rdma ethernet solution supports another wire protocol addition roce known use pfc lead network-wide deadlock popular vendors roce enabled equipment include
[ 1933, 2701, 7637, 259, 5181, 6976, 7297, 7189 ]
Validation
501
4
Bug_bounty_program:bug bounty program bug bounty program deal offered many websites organizations software developers individuals receive recognition compensation reporting bugs especially pertaining exploits vulnerabilities programs allow developers discover resolve bugs general public aware preventing incidents widespread abuse bug bounty programs implemented large number organizations including mozilla facebook yahoo google reddit square microsoft companies outside technology industry including traditionally conservative organizations like united states department defense started using bug bounty programs pentagon ’ use bug bounty programs part posture shift seen several us government agencies reverse course threatening white hat hackers legal recourse inviting participate part comprehensive vulnerability disclosure framework policy hunter ready initiated first known bug bounty program 1983 versatile real-time executive operating system anyone found reported bug would receive volkswagen beetle a.k.a bug return little decade later 1995 jarrett ridlinghafer technical support engineer netscape communications corporation coined phrase 'bugs bounty netscape encouraged employees push whatever takes get job done ridlinghafer recognized netscape many enthusiasts evangelists products seemed even fanatical particularly mosaic/netscape/mozilla browser started investigate phenomenon detail discovered many netscape enthusiasts actually software engineers fixing product bugs publishing fixes workarounds ridlinghafer thought company leverage resources sat wrote proposal 'netscape bugs bounty program presented manager turn suggested ridlinghafer present next company executive team meeting next executive team meeting attended james barksdale marc andreessen vps every department including product engineering member given copy 'netscape bugs bounty program proposal ridlinghafer invited present idea netscape executive team everyone meeting embraced idea except vp engineering want go forward believing waste time resources however vp engineering overruled ridlinghafer given initial 50k budget run proposal first official 'bugs bounty program launched 1995 program huge success mentioned many books detailing netscape successes august 2013 computer science student named khalil used exploit post letter facebook timeline site founder mark zuckerberg according hacker tried report vulnerability using facebook bug bounty program vague incomplete report response team told vulnerability actually bug facebook started paying researchers find report security bugs issuing custom branded “ white hat ” debit cards reloaded funds time researchers discover new flaws “ researchers find bugs security improvements rare value find ways reward ” ryan mcgeehan former manager facebook ’ security response team told cnet interview “ exclusive black card another way recognize show conference show card say ‘ special work facebook. ’ ” 2014 facebook stopped issuing debit cards researchers 2016 uber experienced security incident individual accessed personal information 57 million uber users worldwide individual supposedly demanded ransom 100,000 order destroy users ’ data congressional testimony uber ciso indicated company verified data destroyed paying 100,000 mr. flynn expressed regret uber disclose incident 2016 part response incident uber worked partner hackerone update bug bounty program policies among things thoroughly explain good faith vulnerability research disclosure india either first second largest number bug hunters world depending report one cites also tops facebook bug bounty program largest number valid bugs “ india came top number valid submissions 2017 united states trinidad tobago second third place respectively ” facebook quoted post yahoo severely criticized sending yahoo t-shirts reward security researchers finding reporting security vulnerabilities yahoo sparking came called t-shirt-gate high-tech bridge geneva switzerland-based security testing company issued press release saying yahoo offered 12.50 credit per vulnerability could used toward yahoo-branded items t-shirts cups pens store ramses martinez director yahoo security team claimed later blog post behind voucher reward program basically paying pocket eventually yahoo launched new bug bounty program october 31 year allows security researchers submit bugs receive rewards 250 15,000 depending severity bug discovered similarly ecava released first known bug bounty program ics 2013 criticized offering store credits instead cash incentivize security researchers ecava explained program intended initially restrictive focused human safety perspective users integraxor scada ics software october 2013 google announced major change vulnerability reward program previously bug bounty program covering many google products shift however program broadened include selection high-risk free software applications libraries primarily designed networking low-level operating system functionality submissions google found adherent guidelines would eligible rewards ranging 500 3133.70 2017 google expanded program cover vulnerabilities found applications developed third parties made available google play store similarly microsoft facebook partnered november 2013 sponsor internet bug bounty program offer rewards reporting hacks exploits broad range internet-related software 2017 github ford foundation sponsored initiative managed volunteers uber microsoft facebook adobe hackerone software covered ibb includes adobe flash python ruby php django ruby rails perl openssl nginx apache http server phabricator addition program offered rewards broader exploits affecting widely used operating systems web browsers well internet whole march 2016 peter cook announced us federal government first bug bounty program hack pentagon program program ran april 18 may 12 1400 people submitted 138 unique valid reports hackerone total us department defense paid 71,200 june secretary defense ash carter met two participants david dworken craig arendt honor participation program open bug bounty crowd security bug bounty program established 2014 allows individuals post website security vulnerabilities hope reward affected website operators
[ 3932, 5983, 1074, 7614, 2190, 3089, 6428, 6092, 2560, 2291, 5297, 5571, 2398, 4056, 6029, 3393, 7845, 7848, 7493, 2791, 5965, 1989, 1332 ]
Test
502
2
Keychain_(software):keychain software keychain password management system macos developed apple introduced mac os 8.6 included subsequent versions mac os known macos keychain contain various types data passwords websites ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images private keys certificates secure notes macos keychain files stored ~/library/keychains/ subdirectories /library/keychains/ /network/library/keychains/ keychain access gui application located utilities folder applications folder free open source software released terms apsl command line equivalent keychain access /usr/bin/security keychain file stores variety data fields including title url notes password passwords secure notes encrypted triple des default keychain file login keychain typically unlocked login user login password although password keychain instead different user ’ login password adding security expense convenience keychain access application permit setting empty password keychain keychain may set automatically locked computer idle time locked manually keychain access application locked password re-entered next time keychain accessed unlock overwriting file ~/library/keychains/ new one e.g part restore operation also causes keychain lock password required next access login keychain protected login password keychain password changed whenever login password changed within logged session macos shared mac/non-mac network possible login keychain password lose synchronization user login password changed non-mac system also password changed directory service like active directory open directory password changed another admin account e.g using system preferences network administrators react deleting keychain file logout new one created next time user logs means keychain passwords remembered one session next even login password changed happens user restore keychain file ~/library/keychains/ backup lock keychain need unlocked next use keychain access macos application allows user access keychain configure contents including passwords websites web forms ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images etc unlocks locks displays passwords saved system dynamically linked user login password well managing root certificates keys secure notes graphical user interface displays various keychains usually least two login keychain system keychain also includes keychain first aid utility removed 10.11.2 update repair problems keychains various events cause problems keychains sometimes solution problem delete keychain also deletes passwords stored keychain create new one usually found utilities folder applications macos ancillary application macos subject updates via software update thus moved utilities folder also included command-line tool access keychain called security keychains initially developed apple e-mail system powertalk early 1990s among many features powertalk used plug-ins allowed mail retrieved wide variety mail servers online services keychain concept naturally fell code used powertalk manage user various login credentials various e-mail systems powertalk could connect passwords easily retrievable due encryption yet simplicity interface allowed user select different password every system without fear forgetting single password would open file return time implementations concept available platforms keychain one parts powertalk obviously useful suggested promoted become part basic mac os due internal politics kept inside powertalk system therefore available mac users return steve jobs 1997 keychain concept revived now-discontinued powertalk point time concept longer unusual still rare see keychain system associated particular piece application software typically web browser keychain later made standard part mac os 9 included mac os x first commercial versions keychain distributed ios osx ios version simpler applications run mobile devices typically need basic keychain features example features acls access control lists sharing keychain items different apps present thus ios keychain items accessible app created
[ 6788, 1069, 359, 2547, 3940, 6795, 713, 4690, 2566, 734, 1103, 405, 6832, 3989, 2597, 3322, 1502, 2609, 5786, 4740, 1897, 4376, 5450, 6505, 2627, 7609, 1171, 5109, 3001, 2284, 1178, 120, 6188, 1187, 2300, 1562, 6909, 6548, 6557, 2679, 1...
Test
503
8
Bingbot:bingbot bingbot web-crawling robot type internet bot deployed microsoft october 2010 supply bing collects documents web build searchable index bing search engine performs function google googlebot typical user agent string bingbot nowiki mozilla/5.0 compatible bingbot/2.0 +http //www.bing.com/bingbot.htm /nowiki appears web server logs tell webmaster requesting file webmaster able use included agent identifier bingbot disallow allow access site default access allowed n't want grant access use robots exclusion standard block relying assumed good behaviour bingbot use server specific means relying web server blocking
[ 6114, 2739, 3161, 654, 80, 7886, 84, 855, 1333, 1732 ]
Test
504
4
Controlled_Access_Protection_Profile:controlled access protection profile controlled access protection profile also known capp common criteria security profile specifies set functional assurance requirements information technology products software systems conform capp standards provide access controls capable enforcing access limitations individual users data objects capp-conformant products also provide audit capability records security-relevant events occur within system capp intended protection software systems users assumed non-hostile well-managed requiring protection primarily threats inadvertent casual attempts breach security protections intended applicable circumstances protection required determined attempts hostile well-funded attackers fully address threats posed malicious system development administrative personnel generally higher level access capp derived requirements c2 class u.s. department defense trusted computer system evaluation criteria material upon requirements based
[ 6208, 1805 ]
Test
505
2
Dispose_pattern:dispose pattern object-oriented programming dispose pattern design pattern resource management pattern resource held object released calling method – usually called codice_1 codice_2 codice_3 codice_4 similar – releases resources object holding onto many languages offer language constructs avoid call dispose method explicitly common situations dispose pattern primarily used languages whose runtime environment automatic garbage collection see motivation thus may styled manual resource management languages automatic memory management wrapping resources objects object-oriented form encapsulation underlies dispose pattern resources typically represented handles abstract references concretely usually integers used communicate external system provides resource example files provided operating system specifically file system many systems represents files file descriptor integer representing file handles used directly storing value variable passing argument functions use resource however frequently useful abstract handle example different operating systems represent files differently store additional auxiliary data handle handles stored field record along data opaque data type provides information hiding user abstracted actual representation example c file input/output files represented objects codice_5 type confusingly called file handles language-level abstraction stores operating system handle file file descriptor together auxiliary information like i/o mode reading writing position stream objects created calling codice_6 object-oriented terms factory acquires resource returns pointer resource released calling codice_7 pointer codice_5 object code note codice_7 function codice_10 parameter object-oriented programming instead instance method file object python precisely dispose pattern differs syntax code structure traditional file opening closing resources managed exactly way acquired constructor factory released explicit codice_1 codice_2 method fundamental problem dispose pattern aims solve resources expensive example may limit number open files thus released promptly finalization work often needed particularly i/o flushing buffers ensure data actually written resource unlimited effectively unlimited explicit finalization necessary important release fact short-lived programs often explicitly release resources due short run time unlikely exhaust resources rely runtime system operating system finalization however general resources must managed particularly long-lived programs programs use many resources safety ensure data written explicit disposal means resource finalization release deterministic prompt codice_2 method complete done alternative requiring explicit disposal tie resource management object lifetime resources acquired object creation released object destruction approach known resource acquisition initialization raii idiom used languages deterministic memory management e.g c++ case example resource acquired file object created scope variable codice_14 exited file object codice_14 refers destroyed part resource released raii relies object lifetime deterministic however automatic memory management object lifetime concern programmer objects destroyed point longer used abstracted indeed lifetime often deterministic though may notably reference counting used indeed cases guarantee objects ever finalized program terminates may finalize objects instead let operating system reclaim memory finalization required e.g. flush buffers data loss occur thus coupling resource management object lifetime dispose pattern allows resources released promptly giving implementation flexibility memory management cost resources must managed manually tedious error-prone key problem dispose pattern codice_2 method called resource leaked common cause early exit function due early return exception example function returns first return file never closed resource leaked intervening code raises exception function exits early file never closed resource leaked handled codice_17 construct ensures finally clause always executed exit generically codice_17 construct necessary proper exception safety since codice_19 block enables execution cleanup logic regardless exception thrown codice_20 block one disadvantage approach requires programmer explicitly add cleanup code codice_19 block leads code size bloat failure lead resource leakage program make safe use dispose pattern less verbose several languages kind built-in support resources held released block code c language features codice_22 statement automatically calls codice_23 method object implements codice_24 interface equal similarly python language codice_25 statement used similar effect context manager object context manager protocol requires implementing codice_26 codice_27 methods get automatically called codice_25 statement construct prevent duplication code would otherwise occur codice_20/codice_19 pattern java language introduced new syntax called codice_20-with-resources java version 7 used objects implement autocloseable interface defines method close beyond key problem correct resource management presence returns exceptions heap-based resource management disposing objects different scope created many complexities associated dispose pattern problems largely avoided raii however common simple use complexities arise acquire single resource something automatically release fundamental problem resource longer class invariant resource held object creation disposed object still live point resource may available object tries use example trying read closed file means methods object use resource potentially fail concretely usually returning error raising exception practice minor use resources usually fail reasons well example trying read past end file methods already might fail resource adds another possible failure standard way implement add boolean field object called codice_32 set true codice_2 checked guard clause methods use resource raising exception codice_34 .net object disposed possible call codice_2 object may indicate programming error object holding resource must disposed exactly simpler robust thus usually preferable codice_2 idempotent meaning calling multiple times calling easily implemented using boolean codice_32 field checking guard clause start codice_2 case returning immediately rather raising exception java distinguishes disposable types implement autocloseable disposable types dispose idempotent subtype closeable disposal presence inheritance composition objects hold resources analogous problems destruction/finalization via destructors finalizers since dispose pattern usually language support boilerplate code necessary firstly derived class overrides codice_2 method base class overriding method derived class generally needs call codice_2 method base class order properly release resources held base secondly object relationship another object holds resource i.e. object indirectly uses resource another object directly uses resource indirectly using object disposable corresponds whether relationship owning object composition viewing object aggregation even communicating association conventions found indirect user responsible resource responsible indirect use responsible resource must disposable dispose owned objects disposed analogous destroying finalizing owned objects composition owning provides encapsulation object used needs tracked cost considerable complexity relationships objects aggregation viewing considerably simpler cost lacking encapsulation .net convention direct user resources responsible implement idisposable type uses unmanaged resources directly see resource management details examples
[ 5965, 3351, 5571, 2736, 2420, 7460, 4771, 4564 ]
Test
506
0
ISO_12620:iso 12620 iso 12620 standard iso/tc 37 defines data category registry registry registering linguistic terms used various fields translation computational linguistics natural language processing defining mappings different terms terms used different systems goal registry new systems reuse existing terminology least easily mapped existing terminology aid interoperability end number terminologies added registry including ones based general ontology linguistic description national corpus polish termbase exchange localization industry standards association standard first released iso 12620:1999 rendered obsolete iso 12620:2009 first edition english-only second bilingual english-french standard relatively low-level used standards lexical markup framework iso 24613:2008
[ 1314, 2087, 5429, 7732, 5008 ]
Validation
507
5
TCP_Westwood_plus:tcp westwood plus tcp westwood+ sender-side modification tcp reno protocol stack optimizes performance tcp congestion control wireline wireless networks tcp westwood+ based end-to-end bandwidth estimation set congestion window slow start threshold congestion episode three duplicate acknowledgments timeout bandwidth estimated properly low-pass filtering rate returning acknowledgment packets rationale strategy simple contrast tcp reno blindly halves congestion window three duplicate acks tcp westwood+ adaptively sets slow start threshold congestion window takes account bandwidth used time congestion experienced tcp westwood+ significantly increases throughput wireless links fairness compared tcp reno/new reno wired networks tcp westwood+ evolution tcp westwood main idea westwood tcp end-to-end bandwidth estimation setting control windows congestion proposed saverio mascolo came idea reading chapter tcp congestion control book data networks larry peterson first implementation tcp westwood ns2 done university california los angeles ucla 1999 name westwood chosen s. mascolo due homage home ucla visiting researcher time main collaborators prof. mario gerla dr. claudio casetti dr. medy senadidi saverio mascolo went back italy evolution westwood tcp named westwood+ main novelty westwood+ algorithm used estimate available bandwidth end-to-end fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression phenomenon explained terms aliasing effects new version westwood+ implemented first time kernel linux 2.2 roberto ferorelli kernel linux 2.4 2.6 angelo dell'aera working politecnico di bari undergraduate students 2003 2004 main references saverio mascolo claudio casetti mario gerla m. y. sanadidi ren wang tcp westwood bandwidth estimation enhanced transport wireless links proc acm mobicom 2001 rome italy july 16-21 2001 l. a. grieco s. mascolo performance evaluation comparison westwood+ new reno vegas tcp congestion control acm computer communication review april 2004 vol 34 2 s. mascolo g. racanelli testing tcp westwood+ transatlantic links 10 gigabit/second rate third international workshop protocols fast long-distance networks pfldnet05 ecole normale supérieure lyon france february 3,4 2005
[ 7073, 7637, 578 ]
Test
508
4
Sheep_dip_(computing):sheep dip computing data security sheep dip process using dedicated computer test files removable media viruses allowed used computers protocol normal first line defence viruses high-security computing environments security specialists expected familiar concept process originally developed response problem boot sector viruses floppy discs subsequently scope expanded include usb flash drives portable hard discs memory cards cd-roms removable devices potentially carry malware name sheep dip derived method preventing spread parasites flock sheep dipping animals one another trough pesticide term use since least early 1990s though footbath also used time sheep dip system considered special case sandbox used test malware sheep dip normally stand-alone computer connected network antivirus software order scan removable media protect sheep dip computer system made effective one antivirus program single antivirus product able detect types virus important secure sheep dip computers strongly possible malware role first line defence means particularly likely attacked software updates applied soon become available antivirus signatures up-to-date available practice means must updated least daily operating system hardened locked far possible network connections avoided two reasons firstly internet connection potential attack vector via computer could compromised secondly risk worm removable device might escape local area network sheep dip computer connected isolation networks makes automatic updating impossible sheep dip computer able make contact servers software updates antivirus signatures distributed therefore normal updates applied manually downloaded separate network-connected computer copied usb flash drive computer security antivirus updates dependent manual intervention human beings system security becomes vulnerable human error pressure work prevents updates applied soon become available sheep dip computer gradually become insecure absence network connections also makes difficult organisation monitor status sheep dips deployed several different locations people central responsibility security must rely prompt accurate reports use sheep dips risk human error active sheep dip antivirus protection monitored real time another program order increase security antivirus effective up-to-date properly configured running active sheep dips add extra layer security checking antivirus intervening necessary least active sheep dip must disable access removable media detects antivirus signatures up-to-date advanced system allowed limited network access automatic updates remote monitoring must enable network connection immediate malware risk network connection active removable media access must disabled
[ 1710, 3495, 5401 ]
Test
509
3
Intel_8279:intel 8279 intel 8279 keyboard/display controller specially developed interfacing keyboard display devices intel 8085 8086 8088 microprocessors important features keyboard section display section scan section cpu interface section interfacing 8279 8085 microprocessor based system keyboard 7-segment led display interfaced using ports latches processor carry following task operating modes 8279 1 input modes basic input modes 1 scanned keyboard 2 scanned sensor matrix 3 strobed input 2 display modes two basic output modes 1 left entry typewriter type 2 right entry calculator type full datasheet link http //www.futurlec.com/datasheet/80series/8279.pdf
[]
Test
510
6
StuffIt:stuffit stuffit family computer software utilities archiving compressing files originally produced macintosh versions microsoft windows linux x86 sun solaris later created proprietary compression format used stuffit utilities also termed stuffit stuffit originally developed summer 1987 raymond lau student stuyvesant high school new york city combined fork-combining capabilities utilities macbinary newer compression algorithms similar used zip compared existing utilities mac notably packit stuffit offered one step operation higher compression ratios fall 1987 stuffit largely replaced packit mac world many software sites even going far convert existing packit archives save space stuffit soon became popular aladdin systems formed market last shareware release lau version 1.5.1 split product line two offering stuffit classic shareware stuffit deluxe commercial package deluxe added variety additional functions including additional compression methods integration mac finder allow files compressed magic menu without opening stuffit stuffit upgraded several times lau removed direct development major upgrades internal machinery rare new features techniques appeared regularly macintosh platform shareware utility compact pro emerged competitor stuffit early 1990s major competitive upgrade followed accompanied release freeware stuffit expander make format universally readable well shareware stuffit lite made easier produce prior anyone attempting use format needed buy stuffit making compact pro attractive move success compact pro subsequently fell use several mac compression utilities appeared disappeared 1990s none became real threat stuffit dominance ones see widespread use special-purpose disk expanders like diskdoubler superdisk served different niche apparently side-effect stuffit saw upgrades file format changed number major revisions leading incompatible updates pc-based formats long surpassed stuffit terms compression notably newer systems like rar 7z little impact mac market never appeared easy-to-use program mac introduction mac os x newer mac software lost forks longer needed anything except built-in unix utilities like gzip tar numerous programs wrapping utilities distributed since files could opened machine considerably practical stuffit era data cross-platform release os x public beta aladdin systems released stuffit 6.0 runs os x expander longer relying stuffit engine™ although late market aladdin systems introduced completely new stuffit x format september 2002 stuffit deluxe 7.0 macintosh designed extendable support compression methods support long file names support unix windows file attributes stuffit x improves original stuffit format descendants adding multiple compression algorithms ppm bwt lzw-type compression also added block mode option several encryption options january 2005 jpeg compression added stuffit x compression option see related 'sif format mid-1990s 2005 acquisition smith micro software coinciding release mac os x v10.4 tiger stuffit expander came bundled macintosh operating system although mac files generally use filename extensions one stuffit primary uses allow mac files stored non-mac systems extensions required stuffit-compressed files save resource forks macintosh files inside typically extension .sit newer non-backwards compatible stuffit x-compressed files carry file extension .sitx encrypted stuffit archives created now-discontinued private file utility .pf extensions stuffit-compressed shrinkwrap disk images carry .img .image extensions however classic mac os version stuffit needed mount images convert newer format readable macos smith micro software offers free downloads stuffit expander mac windows expands uncompresses files compressed using stuffit stuffit x format well many compressed encoded encrypted segmented formats shareware application dropstuff permits compressing files stuffit x format stuffit stuffit x formats remain unlike file compression formats proprietary smith micro software charge license fees use programs given alternative programs support format also self-expanding variant stuffit files .sea extension runs executable utility called unsea exists turn executable vanilla sit file early 2005 new jpeg compression system released regularly obtained compression order 25 meaning compressed file size 75 original file size without loss image quality ability rebuild original file original image zip-like programs typically achieve jpeg compression rates order 1 3 programs optimise jpegs without regard original file original image obtain compression rates 3 10 depending efficiency original jpeg programs use rarely implemented arithmetic coding option available jpeg standard typically achieve rates around 12 new technique implemented stuffit x format option stuffit deluxe product also proposed new image format known sif simply consists single jpeg file compressed using new technique pending filing patent retain knowledge details algorithm trade secret duplicate folding™ feature saves even space keeping one copy duplicate file archive changes stuffit compression software claimed developer upgrades frequently render previous versions stuffit unable decompress newer archives without first downloading purchasing new version incompatibility inconvenient work flows timely execution importance though users able create archives legacy format functionality clearly exposed july 5 2005 smith micro software announced acquisition intention expand new jpeg recompression technique wireless platforms file formats initial press release preliminary information saw first use title “ stuffit wireless. ” macos includes archive utility compatible open formats zip gzip bzip2 versions since 10.3 panther preserves resource forks zip format stuffit longer requirement mac file compression zip also de facto standard making widely accepted archives sharing stuffit used standard way packaging mac software download macos native compressed disk images dmg largely replaced practice stuffit might still used situations specific features required archive editing/browsing better compression jpeg compression encryption old packages open source alternative might unarchiver even n't support newer stuffit file formats 3rd-party software macintosh finder replacement path finder use stuffit sdk gain features stuffit
[ 1710, 4213, 7058, 985, 4759, 1352, 6992, 6537, 1471, 5571, 578, 4700, 405, 7555, 1955, 7746, 3032, 2589, 7201, 7387, 3219, 1675, 3042, 5191, 1127, 2334, 6940, 8126, 4732, 5256, 7584, 3152, 6232, 169, 1139, 3413, 352, 4461, 5349, 2897, 6...
Test
511
4
List_of_Kiosk_software:list kiosk software list kiosk software list includes kiosk-exclusive software well mobile device management software kiosk features
[ 6006, 4295, 2795, 3756, 4783, 578, 1634, 1284 ]
Test
512
3
Transmeta_Efficeon:transmeta efficeon efficeon processor transmeta second-generation 256-bit vliw design released 2004 employs software engine code morphing software aka cms convert code written x86 processors native instruction set chip like predecessor transmeta crusoe 128-bit vliw architecture efficeon stresses computational efficiency low power consumption low thermal footprint efficeon closely mirrors feature set intel pentium 4 processors although like amd opteron processors supports fully integrated memory controller hypertransport io bus nx bit no-execute x86 extension pae mode nx bit support available starting cms version 6.0.4 efficeon computational performance relative mobile cpus like intel pentium thought lower although little appears published relative performance competing processors efficeon came two package types 783- 592-contact ball grid array power consumption moderate consuming little 3 watts 1 ghz 7 watts 1.5 ghz passively cooled two generations chip produced first generation tm8600 manufactured using tsmc 0.13 micrometre process produced speeds 1.2 ghz second generation tm8800 tm8820 manufactured using fujitsu 90 nm process produced speeds ranging 1 ghz 1.7 ghz internally efficeon two arithmetic logic units two load/store/add units two execute units two floating-point/mmx/sse/sse2 units one branch prediction unit one alias unit one control unit vliw core execute 256-bit vliw instruction per cycle called molecule room store eight 32-bit instructions called atoms per cycle efficeon 128 kb l1 instruction cache 64 kb l1 data cache 1 mb l2 cache caches die additionally efficeon cms code morphing software reserves small portion main memory typically 32 mb translation cache dynamically translated x86 instructions
[ 5737, 694, 3610, 3156, 352, 4077, 441, 1265, 5669, 5670 ]
Validation
513
9
Richard_O'Keefe:richard o'keefe dr. richard a. o'keefe computer scientist best known writing influential book prolog programming craft prolog lecturer researcher department computer science university otago dunedin new zealand concentrates languages logic programming functional programming including prolog haskell erlang
[ 2740 ]
Test
514
3
Opcode_table:opcode table opcode table also called opcode matrix visual representation opcodes instruction set arranged axis table represents upper lower nibble combined form full byte opcode additional opcode tables exist additional instructions created using opcode prefix structure arrangement opcode table appears follows cell 00-ff contains information equivalent assembly instruction corresponding opcode parameters cpu cycle counts
[ 7533, 6078, 6079, 7541, 3747, 5680, 263, 5190 ]
Train
515
3
Multithreading_(computer_architecture):multithreading computer architecture computer architecture multithreading ability central processing unit cpu single core multi-core processor provide multiple threads execution concurrently supported operating system approach differs multiprocessing multithreaded application threads share resources single multiple cores include computing units cpu caches translation lookaside buffer tlb multiprocessing systems include multiple complete processing units one cores multithreading aims increase utilization single core using thread-level parallelism well instruction-level parallelism two techniques complementary sometimes combined systems multiple multithreading cpus cpus multiple multithreading cores multithreading paradigm become popular efforts exploit instruction-level parallelism stalled since late 1990s allowed concept throughput computing re-emerge specialized field transaction processing even though difficult speed single thread single program computer systems actually multitasking among multiple threads programs thus techniques improve throughput tasks result overall performance gains two major techniques throughput computing multithreading multiprocessing thread gets lot cache misses threads continue taking advantage unused computing resources may lead faster overall execution resources would idle single thread executed also thread use computing resources cpu instructions depend result running another thread may prevent resources becoming idle multiple threads interfere sharing hardware resources caches translation lookaside buffers tlbs result execution times single thread improved degraded even one thread executing due lower frequencies additional pipeline stages necessary accommodate thread-switching hardware overall efficiency varies intel claims 30 improvement hyper-threading technology synthetic program performing loop non-optimized dependent floating-point operations actually gains 100 speed improvement run parallel hand hand-tuned assembly language programs using mmx altivec extensions performing data prefetches good video encoder might suffer cache misses idle computing resources programs therefore benefit hardware multithreading indeed see degraded performance due contention shared resources software standpoint hardware support multithreading visible software requiring changes application programs operating systems multiprocessing hardware techniques used support multithreading often parallel software techniques used computer multitasking thread scheduling also major problem multithreading simplest type multithreading occurs one thread runs blocked event normally would create long-latency stall stall might cache miss access off-chip memory might take hundreds cpu cycles data return instead waiting stall resolve threaded processor would switch execution another thread ready run data previous thread arrived would previous thread placed back list ready-to-run threads example conceptually similar cooperative multi-tasking used real-time operating systems tasks voluntarily give execution time need wait upon type event type multithreading known block cooperative coarse-grained multithreading goal multithreading hardware support allow quick switching blocked thread another thread ready run achieve goal hardware cost replicate program visible registers well processor control registers program counter switching one thread another thread means hardware switches using one register set another switch efficiently active threads active thread needs register set example quickly switch two threads register hardware needs instantiated twice additional hardware support multithreading allows thread switching done one cpu cycle bringing performance improvements also additional hardware allows thread behave executing alone sharing hardware resources threads minimizing amount software changes needed within application operating system support multithreading many families microcontrollers embedded processors multiple register banks allow quick context switching interrupts schemes considered type block multithreading among user program thread interrupt threads purpose interleaved multithreading remove data dependency stalls execution pipeline since one thread relatively independent threads less chance one instruction one pipelining stage needing output older instruction pipeline conceptually similar preemptive multitasking used operating systems analogy would time slice given active thread one cpu cycle example type multithreading first called barrel processing staves barrel represent pipeline stages executing threads interleaved preemptive fine-grained time-sliced multithreading modern terminology addition hardware costs discussed block type multithreading interleaved multithreading additional cost pipeline stage tracking thread id instruction processing also since threads executed concurrently pipeline shared resources caches tlbs need larger avoid thrashing different threads advanced type multithreading applies superscalar processors whereas normal superscalar processor issues multiple instructions single thread every cpu cycle simultaneous multithreading smt superscalar processor issue instructions multiple threads every cpu cycle recognizing single thread limited amount instruction-level parallelism type multithreading tries exploit parallelism available across multiple threads decrease waste associated unused issue slots example distinguish types multithreading smt term temporal multithreading used denote instructions one thread issued time addition hardware costs discussed interleaved multithreading smt additional cost pipeline stage tracking thread id instruction processed shared resources caches tlbs sized large number active threads processed implementations include dec later compaq ev8 completed intel hyper-threading technology ibm power5 sun microsystems ultrasparc t2 cray xmt amd bulldozer zen microarchitectures major area research thread scheduler must quickly choose among list ready-to-run threads execute next well maintain ready-to-run stalled thread lists important subtopic different thread priority schemes used scheduler thread scheduler might implemented totally software totally hardware hardware/software combination another area research type events cause thread switch cache misses inter-thread communication dma completion etc multithreading scheme replicates software-visible state including privileged control registers tlbs enables virtual machines created thread allows thread run operating system processor hand user-mode state saved less hardware required would allow threads active one time die area cost
[ 3599, 5012, 1447, 5371, 3948, 3951, 7527, 7529, 5737, 4318, 2567, 4694, 1474, 5042, 3294, 1481, 5055, 2226, 1867, 6474, 2961, 4002, 5429, 2248, 3667, 2969, 6148, 2614, 441, 84, 4742, 5447, 2266, 3680, 6507, 2992, 6170, 7627, 4047, 1546, ...
Test
516
5
Security_association:security association security association sa establishment shared security attributes two network entities support secure communication sa may include attributes cryptographic algorithm mode traffic encryption key parameters network data passed connection framework establishing security associations provided internet security association key management protocol isakmp protocols internet key exchange kerberized internet negotiation keys provide authenticated keying material sa simplex one-way channel logical connection endorses provides secure data connection network devices fundamental requirement sa arrives two entities communicate one channel take example mobile subscriber base station subscriber may subscribe one service therefore service may different service primitives data encryption algorithm public key initialization vector make things easier security information grouped logically logical group security association sa id called said base station mobile subscriber share said derive security parameters words sa logical group security parameters enable sharing information another entity
[ 6533, 3434, 651, 7567, 7626, 2644 ]
Validation
517
1
Materialized_view:materialized view computing materialized view database object contains results query example may local copy data located remotely may subset rows and/or columns table join result may summary using aggregate function process setting materialized view sometimes called materialization form caching results query similar memoization value function functional languages sometimes described form precomputation forms precomputation database users typically use materialized views performance reasons i.e form optimization materialized views store data based remote tables also known snapshots c. j date regards phrase materialized view deprecated term snapshot database management system following relational model view virtual table representing result database query whenever query update addresses ordinary view virtual table dbms converts queries updates underlying base tables materialized view takes different approach query result cached concrete materialized table rather view may updated original base tables time time enables much efficient access cost extra storage data potentially out-of-date materialized views find use especially data warehousing scenarios frequent queries actual base tables expensive materialized view indexes built column contrast normal view typically possible exploit indexes columns come directly mapping indexed columns base tables often functionality offered materialized views implemented first oracle database query rewrite feature added version 8i example syntax create materialized view oracle refresh fast start sysdate postgresql version 9.3 newer natively support materialized views version 9.3 materialized view auto-refreshed populated time creation unless codice_1 used may refreshed later manually using codice_2 version 9.4 refresh may concurrent selects materialized view codice_3 used example syntax create materialized view postgresql microsoft sql server differs rdbms way implementing materialized view via concept known indexed views main difference views require refresh fact always synchronized original data tables compound view achieve necessary lines origin destination deterministic mapping limits types possible queries mechanism realised since 2000 version sql server example syntax create materialized view sql server create view mv_my_view schemabinding select col1 sum col2 total table_name group col1 go create unique clustered index xv apache kafka since v0.10.2 apache spark since v2.0 support materialized views streams data materialized views also supported sybase sql anywhere ibm db2 called materialized query tables mysql n't support materialized views natively workarounds implemented using triggers stored procedures using open-source application flexviews materialized views implemented amazon dynamodb using data modification events captured dynamodb streams
[ 1438, 5014, 6415, 1449, 7248, 2827, 3268, 1730, 3951, 3776, 5209, 3005, 1640, 3011, 1550, 4950, 6184, 6543, 2124, 4798, 840, 6462, 231, 235, 2054, 7205, 1407, 684, 5956, 7213, 7303, 4274, 1891, 4457, 1792, 784 ]
Test
518
8
Alexa_Internet:alexa internet alexa internet inc. american web traffic analysis company based san francisco wholly owned subsidiary amazon alexa founded independent company 1996 acquired amazon 1999 250m stock toolbar collects data internet browsing behavior transmits alexa website stored analyzed basis company web traffic reporting including alexa rank according website alexa provides web traffic data global rankings information 30 million websites 2018 website visited 3 million people every month alexa internet founded april 1996 brewster kahle bruce gilliat company name chosen homage library alexandria ptolemaic egypt drawing parallel largest repository knowledge ancient world potential internet become similar store knowledge alexa initially offered toolbar gave internet users suggestions go next based traffic patterns user community company also offered context site visited registered many pages many sites pointed frequently updated alexa operations grew include archiving web pages crawled examined automated computer program nicknamed bot web crawler database served basis creation internet archive accessible wayback machine 1998 company donated copy archive two terabytes size library congress alexa continues supply internet archive web crawls 1999 company moved away original vision providing intelligent search engine alexa acquired amazon.com approximately us 250 million amazon stock alexa began partnership google early 2002 web directory dmoz january 2003 december 2005 alexa opened extensive search index web-crawling facilities third-party programs comprehensive set web services apis could used instance construct vertical search engines could run alexa servers elsewhere may 2006 google replaced windows live search provider search results december 2006 amazon released alexa image search built in-house first major application built company web platform may 2007 alexa changed api limit comparisons three websites reduce size embedded graphs flash add mandatory embedded britepic advertisements april 2007 company filed lawsuit alexa v. hornbaker stop trademark infringement statsaholic service lawsuit alexa alleged ron hornbaker stealing traffic graphs profit primary purpose site display graphs generated alexa servers hornbaker removed term alexa service name march 19 2007 november 27 2008 amazon announced alexa web search longer accepting new customers service would deprecated discontinued existing customers january 26 2009 thereafter alexa became purely analytics-focused company march 31 2009 alexa revealed major website redesign redesigned site provided new web traffic metrics—including average page views per individual user bounce rate rate users come leave webpage user time website following weeks alexa added features including visitor demographics clickstream web search traffic statistics alexa introduced new features compete web analytics services key metric published alexa internet analytics alexa traffic rank also simply known alexa rank also referred global rank alexa internet designed estimate website popularity alexa internet tooltip global rank says rank calculated combination daily visitors page views website 3-month period alexa traffic rank used monitor popularity trend website compare popularity different websites alexa ranks sites based primarily tracking sample set internet traffic—users toolbar internet explorer firefox google chrome web browsers alexa toolbar includes popup blocker stops unwanted ads search box links amazon.com alexa homepage alexa ranking website user visiting also allows user rate website view links external relevant websites early 2005 alexa stated 10 million downloads toolbar though company provide statistics active usage originally web pages ranked amongst users alexa toolbar installed could biased specific audience subgroup reluctant take part rankings caused controversies representative alexa user base typical internet behavior especially less-visited sites 2007 michael arrington provided examples alexa rankings known contradict data comscore web analytics service including ranking youtube ahead google 2007 third-party-supplied plugin firefox browser served option firefox users amazon abandoned a9 toolbar july 16 2007 alexa released official toolbar firefox called sparky 16 april 2008 many users reported drastic shifts alexa rankings alexa confirmed later day announcement released updated ranking system claiming would take account sources data beyond alexa toolbar users using alexa pro service website owners sign certified statistics allows alexa access website traffic data site owners input javascript code page website permitted user security privacy settings runs sends traffic data alexa allowing alexa display—or display depending owner preference—more accurate statistics total pageviews unique pageviews number antivirus companies assessed alexa toolbar toolbar internet explorer 7 one point flagged malware microsoft defender symantec classified toolbar trackware 2007 mcafee classified adware deeming potentially unwanted program 2005 mcafee site advisor rated alexa site green 2007 finding significant problems warned small fraction downloads ... people consider adware potentially unwanted programs 2014 though possible delete paid subscription within alexa account possible delete account created alexa web interface
[ 3953, 6092, 4315, 6808, 394, 5742, 1847, 5746, 47, 5064, 52, 774, 73, 1137, 1507, 2609, 2255, 80, 2975, 2261, 7249, 6179, 1550, 496, 6554, 3723, 4800, 6219, 1589, 518, 167, 5894, 7340, 1264, 4491, 7722, 4495, 6986, 8083, 8084, 6274, 2...
Test
519
2
Microsoft_Data_Access_Components:microsoft data access components microsoft data access components mdac also known windows dac framework interrelated microsoft technologies allows programmers uniform comprehensive way developing applications access almost data store components include activex data objects ado ole db open database connectivity odbc several deprecated components well microsoft jet database engine msdasql ole db provider odbc remote data services rds components also become obsolete former data access objects api remote data objects first version mdac released august 1996 time microsoft stated mdac concept stand-alone program widespread distribution method later microsoft released upgrades mdac web-based redistributable packages eventually later versions integrated microsoft windows internet explorer mdac 2.8 sp1 ceased offering mdac redistributable package throughout history mdac subject several security flaws led attacks escalated privileges attack although vulnerabilities generally fixed later versions fairly promptly current version 2.8 service pack 1 product many different versions many components deprecated replaced newer microsoft technologies mdac known windows dac windows vista latest version mdac 2.8 consists several interacting components windows specific except odbc available several platforms mdac architecture may viewed three layers programming interface layer consisting ado ado.net database access layer developed database vendors oracle microsoft ole db .net managed providers odbc drivers database component layers made available applications mdac api microsoft sql server network library proprietary access method specific microsoft sql server also included mdac developers windows applications encouraged use ado ado.net data access benefit users application program constrained choice database architecture except supported mdac naturally developers still choice writing applications directly access ole db odbc microsoft sql server network library also known net-lib used microsoft sql server read write data using many different network protocols though net-lib specific sql server microsoft includes mdac sql server uses open data services ods library communicate net-lib interfaces directly windows nt operating system line win32 subsystem sql server network library controlled use client network utility bundled sql server net-lib supported network protocol separate driver confused device driver support session layer protocol stack two general types net-lib primary secondary primary net-lib consists super socket net-lib shared memory net-lib numerous secondary net-libs including tcp/ip named pipes network libraries named pipes method communicating processes via system-persistent pipeline given identity microsoft ole db provider sql server sqloledb communicates via primary net-libs super socket net-lib deals inter-computer communications coordinates secondary net-libs – though tcp/ip secondary net-lib exception calls windows sockets 2 api directly banyan vines appletalk servernet ipx/spx giganet rpc net-libs dropped mdac 2.5 onwards network library router job managing protocols however named pipes secondary net-lib managed router super socket net-lib also handles data encryption via use windows ssl api shared memory net-lib hand manages connections multiple instances sql server exist one computer uses shared memory area communicate processes inherently secure need data encryption instances sql server exist one computer operating system allow process access instances area shared memory net-lib also able support impersonation logged user security context protocols support authenticated connections called trusted connections allows net-lib provide integrated logon authentication mechanism via use windows authentication windows authentication supported windows 98 windows ole db also called oledb ole-db allows mdac applications access different types data stores uniform manner microsoft used technology separate application data store website data store needs access done different applications need access different types sources data necessarily need know access technology-specific functionality technology conceptually divided consumers providers consumers applications need access data provider software component exposes ole db interface use component object model com ole db database access interface technology used mdac ole db providers created access simple data stores text file spreadsheet complex databases oracle sql server however different data store technology different capabilities ole db providers may implement every possible interface available capabilities available implemented use com objects ole db provider map data store technology functionality particular com interface microsoft calls availability interface provider-specific may applicable depending database technology involved additionally however providers may also augment capabilities data store capabilities known services microsoft parlance microsoft ole db provider sql server sqloledb ole db provider microsoft provides microsoft sql server version 6.5 upwards universal data link files '.udl files provide common user interface specifying connection attributes user use data link properties dialog box save connection information .udl file alternative directly specifying hand connection string consequently files provide convenient level indirection additionally dialog box specifies number alternate ole db data providers variety target applications open database connectivity odbc native interface accessed programming language usually c make calls native library mdac interface defined dll separate module driver needed database must accessed functions odbc api implemented dbms-specific drivers driver microsoft provides mdac called sql server odbc driver sqlodbc name implies designed microsoft sql server supports sql server v6.5 upwards odbc allows programs use sql requests access databases without know proprietary interfaces databases handles sql request converts request individual database system understands according microsoft sql server 2012 odbc driver updated recent server features including microsoft windows azure sql database released microsoft odbc driver sql server activex data objects ado high-level programming interface ole db uses hierarchical object model allow applications programmatically create retrieve update delete data sources supported ole db ado consists series hierarchical com-based objects collections object acts container many objects programmer directly access ado objects manipulate data send sql query database via several ado mechanisms ado made nine objects four collections collections objects ado.net latest version ado ado 2.8 often referred ado classic part mdac 2.8 stack alongside classic ado built around microsoft .net though sometimes seen evolutionary step ado fundamental structural changes made microsoft ado.net runs .net managed provider modified version ole db provider specifically designed .net object structure longer built around recordset object instead dataset object used contain data gathered multiple sources transparent programmer unlike old ado recordset dataset design promotes use disconnected data conceptually dataset object seen small in-memory relational database right allows manipulation data direction order propagate changes back database dataadapter object used transfers data data source dataset object cursors also deprecated ado.net replaced datareader object used efficiently process large list results one record time without storing mdac continually evolving component framework several components previously part since deprecated removed entirely framework jet stands joint engine technology database engine used microsoft access microsoft exchange server visual basic jet part relational database management system rdbms offered single interface software could use access microsoft databases jet also provided support security referential integrity transaction processing indexing record page locking data replication later versions jet engine extended run sql queries store character data unicode format create views allowed bi-directional replication microsoft sql server since superseded msde three modules jet one native jet isam driver jet dynamic link library dll could directly manipulate microsoft access database files mdb modified form indexed sequential access method isam database another one modules isam drivers dlls allowed access isam databases among xbase paradox btrieve foxpro files final module data access objects dao dll dao allowed programmers access jet engine basically object-oriented data language used access basic visual basic application developers access jet similarly microsoft jet ole db provider replication objects jro allowed replication jet data sources removed mdac 2.6 microsoft ole db provider odbc codice_19 ole db provider allowing activex data objects access databases via odbc driver microsoft supplied several ole-db providers indexing service active directory jet sql server oracle codice_20 internet publishing however unless otherwise directed ado defaulted using msdasql default provider mdac 2.5 oracle odbc driver msdasql supported oracle 7 partially supported oracle 8i features supported microsoft initially deprecated msdasql component 64-bit operating systems microsoft oracle odbc driver later superseded .net managed oracle provider supported oracle 9i however windows server 2008 windows vista sp1 ship 64-bit version msdasql remote data services rds allowed retrieval set data server client altered way sent back server processing popular adoption transact-sql extends sql programming constructs loops conditional statements became less necessary eventually deprecated mdac 2.7 microsoft produced soap toolkit 2.0 allows clients via open xml-based standard sqlxml designed sql server 2000 deprecated mdac 2.6 allowed microsoft relational database viewed xpath allowed data viewable xml file actually deprecated removed later versions mdac though microsoft provide downloadable component support 64-bit operating systems several components completely removed mdac microsoft longer supported microsoft released several versions mdac time distribution method varied feature-set different version mdac 1.0 first released august 1996 according microsoft mdac 1.0 existed concept coordinated stand-alone setup program mdac 1.0 stack consisted odbc 3.0 ole db 1.1 ado 1.0 advanced data connector adc 1.0 – according microsoft precursor remote data service mdac 1.5 also included odbc drivers access/jet sql server oracle databases mdac 1.0 released via several mechanisms advanced data connector shipped internet information server iis 3.0 downloadable cab file ole db 1.1 ado 1.0 shipped ole db 1.1 sdk came visual studio 97 also downloadable mdac 1.0 came active server pages came iis 3.0 also came visual interdev 1.0 mdac 1.5 released september 1997 march 1998 involved centralised distribution mechanism mdac 1.0 released microsoft internet explorer 4.0 internet client sdk 4.0 cd-rom given 1997 professional developers conference pdc five versions mdac 1.5 different versions mdac 1.5 consisted version mdac security flaw made vulnerable escalated privileges attack vulnerability caused systems iis mdac installed give unauthorized web user ability execute shell commands iis system privileged user allowed attacker use mdac tunnel sql odbc data requests public connection private back-end network multi-homed internet-connected iis system also allowed user gain unauthorized access secured non-published files iis system mdac 1.5 last data access component release supported windows nt 3.51 sp5 mdac 2.0 distributed data access 2.0 sdk included contents mdac 1.5 odbc 3.5 sdk ole db 1.5 sdk ole db olap specification also included many updates core product including security feature added rds prevented used maliciously iis server version came included windows nt 4.0 sp4 also visual studio 6.0 came full data access sdk mdac 2.1 distributed sql server 7.0 sql server 6.5 sp5 mdac 2.1 sp1 distributed internet explorer 5 mdac 2.1 sp1a ga distributed microsoft office 2000 backoffice 4.5 visual studio 98 sp3 however none versions mdac released general public via world wide web mdac 2.1 sp2 distributed microsoft website components included 2.1 version security vulnerabilities whereby unchecked buffer could allow elevated privileges attack found time later affected mdac 2.1 2.5 2.6 addressed later patch mdac 2.5 released february 17 2000 distributed windows 2000 mdac service packs released parallel windows 2000 service packs also distributed microsoft website three service packs released components included 2.5 several issues found version mdac using ole db session pooling microsoft com+ would try continuously load unload ole db conflict could arise caused ole db session pooling run 100 cpu usage later fixed microsoft published full list bugs fixed mdac 2.5 service pack 2 mdac 2.5 service pack 3 security vulnerability also existed later fixed whereby unchecked buffer found sql server driver flaw introduced mdac 2.5 sp2 mdac 2.6 released september 2000 distributed web microsoft sql server 2000 mdac 2.6 rtm sp1 released june 20 2001 sp2 released june 11 2002 distributed parallel microsoft sql server 2000 service packs could also downloaded microsoft website beginning version mdac microsoft jet microsoft jet ole db provider odbc desktop database drivers included instead could installed manually microsoft also released alert warning mdac 2.6 installed sql server 7.0 cluster install mdac 2.6 later node cluster directly installation another program may cause catastrophic failure sql server agent sql server services issue affected veritas software backup exec 9.0 windows servers installs microsoft sql server 2000 desktop engine msde 2000 database revision 4367 installed mdac version 2.6 sp2 revision 4454 installed mdac version 2.7 sp1 problem mdac 2.7 released october 2001 microsoft website refresh release issued april 2002 release windows xp microsoft website version 2.7 available u.s. english chinese traditional simplified german japanese korean brazilian portuguese czech danish greek slovak slovenian spanish finnish french hungarian italian dutch norwegian polish portuguese russian swedish turkish hebrew arabic available windows xp main feature change support microsoft 64-bit operating system however support banyan vines also dropped version mdac several known issues mdac 2.7 continued causing connectivity problems clustered servers running microsoft sql server 6.5 sql server 7.0 workaround provided microsoft creating configuring odbc data source names dsns using microsoft sql server odbc driver network library protocol might unexpectedly switch tcp/ip even dsn configured use named pipes issue found infoworld reporter randall c. kennedy identified change actually made mdac 2.6 never documented discovered testing client/server database workloads windows xp computer infoworld claims although overall server cpu utilization rose 8 percent using tcp/ip context switches per second dropped 150 percent course impossible would negative context switch rate drop either 33 60 depending planet author time writing 10-user workload unimpressed fundamental functional change default behaviour net-lib occurred without passing mention unrelated document windows xp users also sometimes experienced problems connecting sql server sql server attempts use certificates finds local computer however one certificate available know one use attempting use microsoft analysis services 2000 rtm error would sometimes appear trying browse cubes microsoft also discovered problem windows 95 windows 98 windows setup program prevented mdac installation program rolling back encountered installation error several security issues resolved microsoft mdac 2.7 david litchfield next generation security software ltd reported security vulnerability results one odbc functions mdac used connect data sources contained unchecked buffer another vulnerability fixed one whereby attacker could respond sql server discovery message broadcast clients specially crafted packet could cause buffer overflow another flaw found whereby code could executed remotely attacker responded broadcast another specially crafted packet mdac 2.8 released august 2003 distributed microsoft windows server 2003 well microsoft data access technologies website introduce new features product fixed number bugs security issues – reg file automates changes registry removed made server run unsafe mode whereby rds could exploited gain unauthorized access system new restriction imposed length shape query string also several odbc administrator changes may 23 2005 brad rhodes lead program manager microsoft data access technologies announced mdac 2.8 sp1 last stand-alone redistributable mdac microsoft ship mdac official component microsoft operating system though providing ongoing bug security fixes previously released versions web-distributable version however microsoft created new component called sql native client sqlncli stand-alone data access api combined ole db odbc libraries one dll formed independent mdac reliant state operating system – developer links library avoids situations update operating system updates mdac breaks applications built different version mdac windows 7 sp1 broken forward compatibility mdac 2.8 software compiled windows 7 sp1 relies mdac ado work windows versions prior windows 7 sp1 including windows 7 rtm vista xp microsoft provided solutions work around issue applications vba applications remain affected fix issue release february 2012 windows vista longer use mdac instead use windows dac consists updated versions ado ole db odbc components according microsoft windows dac includes changes work windows vista almost entirely functionally equivalent mdac 2.8 two ways checking version mdac installed computer windows 2000 windows xp windows server 2003 one way check via microsoft component checker program compares value installed mdac dll mdac file manifest second way check key codice_21 windows registry microsoft notes information may incorrect versions mdac prior 2.1 compared versions mdac files installed system
[ 7149, 3932, 6795, 6420, 714, 3951, 720, 1460, 3280, 2928, 7907, 5747, 2953, 53, 6840, 422, 1891, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 4759, 6519, 7618, 2283, 3010, 5479, 7263, 5850, 5852, 150, 6933, 3052, 4448, 3407, 1232, 2702, 76...
Validation
520
2
Nokia_Browser_for_Symbian:nokia browser symbian nokia browser symbian formerly known web browser s60 default web browser s60 symbian mobile phone platform browser based port apple inc. ’ open-source webcore javascriptcore frameworks form webkit rendering engine apple uses safari web browser first version 2002 lacking support wireless application protocol wap wireless markup language wml adobe flash lite s60 version 2 introduced support wap wml hence nokia services wap browser default browser initial device shipments platform nokia announced porting webkit s60 browser june 2005 made available november 2006 world wide web conference nokia announced releasing source code port webkit back community supports drawbacks supports nokia browser 7.0 supported s60 5th edition devices version supports features prior nokia browser 7 releases well following additional features nokia browser 7.1 supported s60 3rd 5th edition devices new features drawbacks nokia browser 7.2 supported symbian^3 s60 3rd 5th edition platform devices new features nokia browser 7.3 pre-installed symbian anna devices like nokia e6 nokia x7 browser 7.3 also available symbian^3 devices nokia c6-01 nokia c7 nokia e7 nokia n8 part upgrade symbian^3 symbian anna s60 3rd edition s60 5th edition devices received updated browser form firmware updates version brings touch-optimized user interface addition better web standards support improved performance new features include nokia browser 7.4 pre-installed nokia belle devices nokia 600 nokia 603 nokia 700 nokia 701 browser 7.4 also available symbian^3/anna devices part upgrade symbian anna nokia belle browser 7.4 added support following features additionally user interface changed comparison v7.3 follows come nokia belle fp2 nokia 603 nokia 700 nokia 701 nokia 808
[ 4655, 3952, 6802, 5378, 7537, 6809, 6440, 393, 5044, 3291, 2574, 2577, 6452, 5062, 4352, 4725, 6489, 1136, 6858, 1904, 445, 1152, 1525, 7628, 5821, 3703, 7261, 5127, 6540, 3383, 139, 8006, 8009, 3043, 1970, 6221, 6576, 3057, 4101, 5887, ...
Test
521
9
Parlog:parlog parlog logic programming language designed efficient utilization parallel computer architectures semantics based first order predicate logic expresses concurrency interprocess communication indeterminacy synchronization within declarative language framework designed imperial college london steve gregory keith l. clark descendant ic prolog relational language
[]
Validation
522
2
Games_for_Windows:games windows games windows discontinued brand owned microsoft introduced 2006 coincide release windows vista operating system brand represents standardized technical certification program online service windows games bringing measure regulation pc game market much way console manufacturers regulate platforms branding program open first-party third-party publishers games windows promoted convention kiosks forums early 2005 promotional push culminated deal ziff davis media rename computer gaming world magazine first gfw issue published november 2006 2008 ziff davis announced magazine would cease published though online content would still updated maintained 2013 microsoft announced xbox pc marketplace would cease operations would result discontinuation games windows brand spite announcement company stated content previously purchased could still accessed via games windows – live client software games certified microsoft feature prominent games windows logo border across top packaging manner similar games developed xbox 360 software must meet certain requirements mandated microsoft order display brand packaging requirements include microsoft claimed increased sales games windows-branded games stores giving games greater focus stated planned increase marketing efforts brand certain games certified games windows brand including shadowrun uno featured cross-platform compatibility allowing gamers play across xbox 360 consoles traditional windows vista windows 7 pcs starting halo 2 may 31 2007 certain games windows titles access microsoft live network online play features including voice chat instant messaging friends lists accessed in-game menu called guide users log xbox live gamertags gain achievements play games chat across platforms games support cross-platform compatibility features including cross-platform multiplayer gaming multiplayer achievements initially required subscription xbox live gold however july 22 2008 microsoft announced games windows functionality would free existing future members early adopters technology would receive refunds previously incurred charges addition microsoft launched games windows live marketplace similar xbox live marketplace allowed users download purchase content game demos add-ons gamer pics microsoft points publisher title would determine item required purchased time microsoft announced intentions make games windows live client software interface friendly reduce technical requirements developers games explorer included versions windows vista windows 7 special folder showcases games installed user computer related information compatible game installed operating system adds shortcut game games explorer optionally download additional information game packaging content rating information e.g. esrb pegi acb cero developer game definition file information provided internet although feature discontinued since 2016 windows experience index information also displayed within interface feature removed entirely windows 10 v1803 games explorer supports custom commands games also includes shortcuts configure various operating system components may pertinent gamers audio devices display devices firewall settings game controllers windows vista games explorer allows developers expose game metadata thumbnails interface windows search shell handler games explorer fully compatible parental controls feature included windows vista windows 7 parental controls allows parents include preclude certain games played based content rating and/or title also block games played altogether compatibility typically depends age popularity game newer games better compatibility game incompatible user manually add game dragging dropping games explorer tray play technology developed microsoft windows vista allows users insert game disc optical disc drive play game installs background streams disc minimal zero caching—in manner similar game console first commercial game known use technology windows version halo 2 part games windows initiative involved ensuring xbox 360 peripherals xbox 360 controller wireless gaming receiver worked across windows platforms xbox 360 peripherals work certified games also default games included windows vista minesweeper
[ 3076, 8054, 4759, 7619, 2999, 8076, 5563, 1640, 5571, 6110, 3028, 6294, 7660, 6839, 7848, 239, 8118, 6844, 522, 432, 6054, 1418, 7685, 786, 2085 ]
Test
523
2
Fink_(software):fink software fink project effort port package open-source unix programs macos fink uses dpkg apt debian package management system well frontend program codice_1 implemented set perl modules fink features binary distribution quick easy installation using apt well extensive source distribution addition command-line tools handling packages shareware app phynchronicity provides gui fink used install newer versions packages installed macos install packages included macos apple edict fink stores data directory codice_2 default though changed initially compiling fink source code goes filesystem hierarchy standard recommendation use codice_3 prefix reasons given fink faq installers might overwrite fink files codice_3 entirely separate directory makes easier disable binaries libraries fink installs within fink directory fhs-like layout codice_5 codice_6 codice_7 etc used fink project started december 2000 german hacker christoph pfisterer name fink german finch reference name macos core darwin charles darwin study diversity among finches led eventually concept natural selection christoph pfisterer left project november 2001 since several people stepped picked support fink march 2008 project managed 6 administrators 89 developers active community march 2014 fink core team made nine active developers responsible central management project maintain essential packages fink community regularly adds support latest versions macos release latest fink versions starting version 0.39 support os x el capitan
[ 4655, 5629, 8055, 2451, 5983, 2091, 5200, 4759, 5545, 6609, 1260, 5726, 4675, 7619, 7251, 5912, 6428, 3366, 5386, 569, 4778, 5571, 578, 2034, 4603, 4059, 7092, 6367, 7555, 499, 6029, 6743, 3889, 3559, 2771, 326, 3036, 3562, 1582, 2594, ...
Test
524
4
Shell_shoveling:shell shoveling shell shoveling network security refers act redirecting input output shell service remotely accessed computing basic method interfacing operating system shell microsoft windows based systems program called cmd.exe command.com unix unix-like systems may variety programs bash ksh etc program accepts commands typed prompt executes usually real time displaying results referred standard output usually monitor screen shell shoveling process one programs set run perhaps silently without notifying someone observing computer accepting input remote system redirecting output remote system therefore operator shoveled shell able operate computer present console
[ 4539, 5381, 651, 4759, 5116 ]
Test
525
4
Digital_Postmarks:digital postmarks digital postmark dpm technology applies trusted time stamps issued postal operator electronic document validates electronic signatures stores archives non-repudiation data needed support potential court challenge guarantees certainty date time postmarking global standard renamed electronic postal certification mark epcm 2007 shortly new iteration technology developed microsoft poste italiane key addition traditional postmarking technology integrity electronically postmarked item meaning kind falsification tampering easily definitely detected additionally content confidentiality guaranteed since document certification carried without access reading postal operator epcm eventually available upu international postal operators 191 member countries willing compliant standard thus granting interoperability certified communications postal operators united states us postal service operates non-global standard called electronic postmark although soon expected provide services utilizing epcm united states end 2010 authentidate authorized usps epm provider however contract allowed expire dpm fundamentally non-repudiation service supporting designed protect sanctity mail digital form working current infrastructure easy implement providing functionality even client-side software provides automated functionality client software digital postmark used variety business applications key dates development digital postmark recognizing great potential digital postmark numerous postal administrations worldwide begun deploying dpm-based solutions five postal services – canada france italy portugal united states – developed digital postmark use today major software developers also working incorporate global standard popular applications used millions people worldwide universal postal union upu identified trust services greatest opportunity global postal growth specifically identified digital postmark important trust service providing excellent defense online fraud abuse united states postal service usps electronic postmark epm © proprietary variation digital postmark issued usps introduced 1996 u.s postal service service offering provides proof integrity authentication electronic transactions applied email epostmarks inc. see epostmarks homepage usps epm web-based service third-party verify authenticity electronic content electronic proof postmarked postal service provides evidence support non-repudiation electronic transactions epm designed deter detect fraudulent tampering altering electronic data usps wrote key features electronic postmark usps listed laws relevant epm follows digital postmark dpm also network security mechanism developed penn state researchers ihab hamadeh george kesidis identify region packet set packets comes developed way combat spam denial-of-service virus attacks isolating source attacks still allowing good messages pass digital postmark works perimeter router marks packet border region-identifying data also called border router packet marking uses obsolete unused portion packet place regional mark-up room exist one portion packet region information broken hashed subsequently retrievable way
[ 2015, 4945, 3172, 651, 2566, 5401 ]
Test
526
4
Differentiated_security:differentiated security differentiated security form computer security deploys range different security policies mechanisms according identity context user transaction makes much difficult scale replicate attacks since cluster/individual different security profile common weaknesses one way achieving subdividing population small differentiated clusters extreme individual belongs different class
[ 1805 ]
Test
527
6
Linear_Data_Set:linear data set linear dataset lds type data set organization used vsam computer data storage system data set allows physical addressing allows used systems operating systems benefit systems os access multiple disk spindles view single storage implementation limitations though make particularly useful higher level abstraction levels
[ 1254 ]
Test
528
3
Koronis_Rift:koronis rift koronis rift 1985 computer game lucasfilm games produced designed noah falstein originally developed atari 8-bit family commodore 64 koronis rift ported amstrad cpc apple ii msx tandy color computer 3 zx spectrum atari c64 version shipped flippy disk one version game side cassette version also released commodore 64 atari version required computers gtia chip installed order display properly koronis rift one two games lucasfilm games second wave december 1985 eidolon enhanced fractal technology developed rescue fractalus koronis rift atari 8-bit family additional colors commodore 64 allowed programmers gradually fade background rather suddenly popping rescue early example depth cueing computer game player controls surface rover vehicle enter several rifts alien planet effectively fractal mazes lost civilisation known ancients left strange machinery so-called hulks within rifts guarded armed flying saucers different design color depending respective color shields gunshots rover saucers varying effectiveness part game figuring shield weapon modules work best means drone robot rover retrieve modules various functions immediately obvious nearby hulks deployed attacking guardian saucers destroyed modules installed rover analyzed aboard player space ship sold rover carry six different modules time activated de-activated player sees fit large variety modules available different weapon shield modules varying power levels color codes modules increase rover power output mapper activating extra screen rover even one module turns retrieval probe bomb destroying hulks probe sent investigate instead retrieving modules conversely different types hulks exist including one simply swallows probe without yielding module requiring player purchase new probe possibly sell useful modules raise required funds goal game find destroy saucer control base hulk located 20th rift end player must explore rifts find hulks retrieve analyze modules understand color-coding weapons shields overcome increasingly aggressive dangerous saucers game solved several ways quickest acquire bomb module send probe saucer base bomb module activated info rated koronis rift four stars five stating best epyx four lucasfilm games computer gaming world stated kr game also puzzle ... arcade skill alone n't enough reviewer enjoy game difficult spent much time savescumming praised graphics sound zzap 64 thought game improvement predecessor rescue fractalus superior graphics gameplay given overall rating 96
[]
Test
529
9
RoboDK:robodk robodk offline programming simulation software industrial robots simulation software used many manufacturing projects including milling welding pick place packaging labelling palletizing painting robot calibration robodk library 300 robots 30 different manufacturers including abb fanuc kuka motoman universal robots user interface enables easy simulation n't require previous programming knowledge different types files imported including step iges files robodk post processors allow programs exported actual robot including abb rapid mod/prg fanuc ls ls/tp kuka krc/iiwa src/java motoman inform jbi universal robots urscript
[ 3378, 5571, 4759, 578 ]
Test
530
5
Multiprotocol_Encapsulation:multiprotocol encapsulation multiprotocol encapsulation mpe short data link layer protocol defined dvb published part etsi en 301 192 provides means carry packet oriented protocols like instance ip top mpeg transport stream ts another encapsulation method unidirectional lightweight encapsulation ule developed standardized within ietf rfc 4326 mpe uses mpeg-2 private table sections carry user datagrams section header used convey mac addresses 1 6 bytes length may used format mpeg-2 dsm-cc sections happens compatible dvb mpe complete ip service offering mpeg-2 ts established organizing mpe streams one ip platforms carried broadcast network means ip/mac notification table mechanism also defined etsi en 301 192 major european satellite operators ses eutelsat offering commercial ip services using mpe astra2connect businesses consumers
[ 7148, 456, 6879, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2650, 7637, 2119, 6908, 2400, 5492, 7091, 2219, 494, 3383, 3640, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880, 5181, 2356 ]
Test
531
4
IDrive_Inc.:idrive inc. idrive inc. technology company specializes data backup applications flagship product idrive online backup service available windows mac linux ios iphone ipad android users pro softnet corporation founded 1995 based calabasas california within los angeles county pro softnet corporation initial product called ibackup acquired idrive.com domain name defunct company i-drive around mid-2003 idrive products mentioned lifehacker macworld pc world cnet tech crunch notebook review pc magazine engadget idrive based bangalore india pro softnet corporation plagued patent infringement lawsuits spoken publicly drain company resources idrive automated backup application runs windows mac ios android installed users select folders files backed user-specified times idrive offers incremental compressed backups users upload modified portions backup file files may also updated real time continuous backup option users ability limit bandwidth usage backup process previous 10 versions file automatically retained idrive automatically delete backup data even backup files deleted user computer users share files email social media sites including facebook twitter via mobile phone application android iphone windows phone idrive allows user back data compatible devices single account idrive application runs natively windows osx well several models nas devices made synology qnap netgear idrive provides multiple data retrieval options backup files accessed remotely internet browser idrive client software user wants access backup files idrive ship backup files 3 tb hard drive files idrive stored using 256-bit aes encryption allowing optional user-defined key must shared idrive idrive claims permanently stored servers idrive also provides activity reports backup status reports shared file reports idrivesync allows user synchronize files across different devices idrive portable usb hard drive designed local backup hard drive 3 terabyte storage space runs 5,400 rpm idrive lite free application ios blackberry android devices allows users back contacts list online users also restore backup contacts different devices even devices different operating systems 2012 idrive released idrive evs publicly available software development kit api kit includes built-in encryption command-line api allows users create applications use idrive cloud storage services idriveconnect allowing users access google docs sitting regular folder computer
[ 1544, 6788, 578 ]
Test
532
5
Firefly_Media_Server:firefly media server firefly media server formerly mt-daapd open-source audio media server daemon roku soundbridge itunes serves media files using roku server protocol rsp digital audio access protocol daap features include firefly media server formerly known mt-daapd renamed adopted new features support rsp support microsoft windows mac os x. firefly media server active development although attempts resurrect abortive effort continue project firefly2 media server without developers coming forward however old forums links many forked versions available new website since july 2009 development continues linux/freebsd fork named forked-daapd latest version forked-daapd v25.0
[ 6788, 3704, 3915, 4759, 6516, 7736, 578, 1435 ]
Test
533
5
SIP_extensions_for_the_IP_Multimedia_Subsystem:sip extensions ip multimedia subsystem session initiation protocol sip signaling protocol selected 3rd generation partnership project 3gpp create control multimedia sessions two participants ip multimedia subsystem ims therefore key element ims framework sip developed internet engineering task force ietf standard controlling multimedia communication sessions internet protocol ip networks working application layer internet protocol suite several sip extensions added basic protocol specification order extend functionality extensions based request comments rfc protocol recommendations ietf 3gpp collaboration groups telecommunications associations aimed developing maintaining ims stated series requirements sip successfully used ims could addressed using existing capabilities extensions sip cases 3gpp collaborate ietf standardize new sip extensions meet new requirements case ietf evolves sip generic basis use extensions restricted ims framework 3gpp stated several general requirements stated operation ims include efficient use radio interface minimizing exchange signaling messages mobile terminal network minimum session setup time performing tasks prior session establishment instead session establishment minimum support required terminal support roaming non-roaming scenarios terminal mobility management supported access network sip support ipv6 addressing requirements involve protocol extensions sip header fields exchange user server information sip methods support new network functionality requirement registration re-registration de-registration event notifications instant messaging call control primitives additional capabilities call transference specific requirements finally also necessary protocols network services dhcp dns adapted work sip instance outbound proxy p-cscf location sip uniform resource identifier uri ip address resolution respectively mechanism sip extension negotiation user agents ua servers consisting three header fields supported require unsupported uas servers i.e user terminals call session control function cscf ims may use specify extensions understand client initiates sip dialog server states extensions requires used also extensions understood supported server send response list extensions requires extensions listed client message response server error response likewise server support client required extensions send error response list unsupported extensions kind extensions called option tags sip also extended new methods case user agents servers use allow header state methods support require use particular method particular dialog must use option tag associated method two extensions allow users specify preferences service ims provides caller preferences extension calling party able indicate kind user agent want reach e.g whether fixed mobile voicemail human personal business services capable provide methods supports search three header fields accept-contact describe desired destination user agents reject-contact state user agents avoid request-disposition specify request handled servers network i.e whether redirect search user sequentially parallel using user agent capabilities extension user agents terminals describe register others search according caller preferences extension headers purpose list capabilities contact header field register message aim event notification obtain status given resource e.g user one voicemail service receive updates status changes event notification necessary ims framework inform presence user i.e online offline others may waiting contact notify user p-cscf registration state know reachable public identities registered moreover event notification used provide additional services voicemail i.e notify new voice messages inbox end specific event notification extension defines framework event notification sip two new methods subscribe notify new header fields response codes two roles subscriber notifier entity interested state information resource subscriber sends subscribe message uniform resource identifier uri resource request initial line type event event header entity charge keeping track state resource notifier receives subscribe request sends back notify message subscription-state header well information status resource message body whenever resource state changes notifier sends new notify message subscriber kind event subscriber subscribe defined new event package event package describes new value subscribe event header well mime type carry event state information notify message also allow-events header indicate event notification capabilities 202 accepted 489 bad event response codes indicate subscription request preliminary accepted turned notifier understand kind event requested order make efficient use signaling messages also possible establish limited notification rate real-time notifications mechanism called event throttling moreover also mechanism conditional event notification allows notifier decide whether send complete notify message depending something new notify since last subscription event notification framework defines user agent subscribe events state resource specify state published sip extension event state publication defined allow user agents publish state event entity notifier thais responsible composing event state distributing subscribers state publication framework defines new method publish used request publication state resource specified request-uri reference event stated event header information carried message body functionality sending instant messages provide service similar text messaging defined instant messaging extension messages unrelated i.e originate sip dialog sent sip signaling network sharing resources control messages functionality supported new message method used send instant message resource stated request-uri content carried message body content defined mime type text/plain common one order instant messaging session related messages message session relay protocol msrp used refer method extension defines mechanism request user agent contact resource identified uri refer-to header field request message typical use mechanism call transfer call participant sends refer message tells recipient contact user agent identified uri corresponding header field refer message also implies event subscription result operation sender know whether recipient could contact third person however mechanism restricted call transfer since refer-to header field kind uri instance http uri require recipient visit web page basic sip specification requests final responses i.e 2xx response codes transmitted reliably retransmitted sender acknowledge message arrives i.e corresponding response code request ack request corresponding 2xx response code mechanism necessary since sip run reliable transport protocols tcp assure message delivered also unreliable ones udp offer delivery guarantees even possible kinds protocols present different parts transport network however scenario ims framework necessary extend reliability provisional responses invite requests session establishment start call reliability provisional responses extension provides mechanism confirm provisional responses 180 ringing response code lets caller know callee alerted successfully received extension defines new method prack request message used tell sender provisional response message received message includes rack header field sequence number matches rseq header field provisional response acknowledged also contains cseq number identifies corresponding invite request indicate user agent requests supports reliable provisional responses 100rel option tag used aim update method extension allow user agents provide updated session description information within dialog final response initial invite request generated used negotiate allocate call resources called party alerted ims framework required callee alerted chances session failure minimum important source failure inability reserve network resources support session resources allocated phone rings however ims reserve resources network needs know callee ip address port session parameters therefore necessary initial offer/answer exchange establish session started invite request basic sip exchange eventually causes callee alerted solve problem concept preconditions introduced concept caller states set constraints session i.e codecs qos requirements offer callee responds offer without establishing session alerting user establishment occur caller callee agree preconditions met preconditions sip extension affects sip new option tag precondition defined offer/answer exchanges session description protocol sdp format used describe streaming media initialization parameters carried body sip messages new sdp attributes meant describe current status resource reservation desired status reservation proceed session establishment confirmation status indicate reservation status confirmed ims initial session parameter negotiation done using provisional responses session description updating extensions along sdp body messages first offer described means sdp carried invite request deal caller supported codecs request answered provisional reliable response code 183 session progress carry sdp list supported codecs caller callee corresponding prack provisional answer used select codec initiate qos negotiation qos negotiation supported prack request starts resource reservation calling party network answered 2xx response code response sent called party selected codec starts resource reservation side subsequent update requests sent inform reservation progress answered 2xx response codes typical offer/answer exchange one update sent calling party reservation completed called party respond eventually finish allocating resources resources call place caller alerted ims framework fundamental handle user identities authentication authorization accounting purposes ims meant provide multimedia services ip networks also needs mechanism charge users functionality supported new special header fields private header extensions sip also known p-headers special header fields whose applicability limited private networks certain topology characteristics lower layers protocols designed specifically meet 3gpp requirements general solution available header fields used variety purposes including charging information networks call traverses private headers defined user database accessing private extensions asserted identity within trusted networks designed enable network trusted sip servers assert identity authenticated users within administrative domain previously agreed policies generation transport usage identification information extensions also allow users request privacy identities spread outside trust domain indicate must insert privacy token id privacy header field main functionality supported p-asserted-identity extension header proxy server receives request untrusted entity authenticates user i.e verifies user says inserts header identity authenticated forwards request usual way proxy servers receive sip request within trust domain i.e network trusted entities previously agreed security policies safely rely identity information carried p-asserted-identity header without necessity re-authenticating user p-preferred-identity extension header also defined user several public identities able tell proxy public identity included p-asserted-identity header user authenticated finally privacy requested proxies must withhold asserted identity information outside trusted domain removing p-asserted-identity headers forwarding user requests untrusted identities outside trust domain exist analogous extension headers handling identification services users instead users case uniform resource names used identify service e.g voice call instant messaging session iptv streaming access security ims consists first authenticating authorizing user done s-cscf establishing secure connections p-cscf user several mechanisms achieve security mechanisms agreement extension sip introduced provide secure mechanism negotiating security algorithms parameters used p-cscf terminal extension uses three new header fields support negotiation process necessity ims reserving resources provide quality service qos leads another security issue admission control protection denial-of-service attacks obtain transmission resources user agent must present authorization token network i.e policy enforcement point pep token obtained p-cscf may charge qos policy control interface policy control entity network i.e policy decision function pdf originally provides authorization token private extensions media authorization link session signaling qos mechanisms applied media network defining mechanisms obtaining authorization tokens p-media-authorization header field carry tokens p-cscf user agent extension applicable within administrative domains trust relationships particularly designed specialized sip networks like ims general internet source routing mechanism allows sender message specify partially completely route message traverses sip route header field filled sender supports functionality listing set proxies message visit ims context certain network entities i.e certain cscfs must traversed requests user listed route header field allow sender discover entities populate route header field mainly two extension header fields path service-route extension header field registering non-adjacent contacts provides path header field accumulates transmits sip uris proxies situated user agent registrar register message traverses way registrar able discover record sequence proxies must transited get back user agent ims every user agent served p-cscf discovered using dynamic host configuration protocol equivalent mechanism user enters ims network requests responses user agent must traverse proxy user registers home registrar s-cscf p-cscf adds sip uri path header field register message s-cscf receives stores information associated contact information user way s-cscf forward every request addressed user corresponding p-cscf listing uri route header field extension service route discovery registration consists service-route header field used registrar 2xx response register request inform registering user entity must forward every request originated ims registrar home network s-cscf also required requests handled entity include sip uri service-route header field user include sip uri route header field requests forwarded home s-cscf ims possible user multiple terminals e.g mobile phone computer application instances e.g video telephony instant messaging voice mail identified public identity i.e sip uri therefore mechanism needed order route requests desired device application globally routable user agent uri gru uri identifies specific user agent instance i.e terminal application instance globally i.e valid route messages user agent user agent internet uris constructed adding gr parameter sip uri either public sip uri value identifies user agent instance specially created uri reveal relationship gruu user identity privacy purposes commonly obtained registration process registering user agent sends uniform resource name urn uniquely identifies sip instance registrar i.e s-cscf builds gruu associates registered identity sip instance sends back user agent response s-cscf receives request gruu able route request registered sip instance efficient use network resources may include radio interface low-bandwidth access essential ims order provide user acceptable experience terms latency achieve goal sip messages compressed using mechanism known sigcomp signaling compression compression algorithms perform operation substituting repeated words message position dictionary words appear first approach dictionary may built message compressor sent decompressor along message however many words repeated different messages extended operations sigcomp define way use shared dictionary among subsequent messages moreover order speed process building dictionary along subsequent messages provide high compression ratios since first invite message sip provides static sip/sdp dictionary already built common sip sdp terms mechanism indicate sip message desired compressed mechanism defines comp=sigcomp parameter sip uris signals sip entity identified uri supports sigcomp willing receive compressed messages used request-uris indicates request compressed via header fields signals subsequent response compressed order obtain even shorter sip messages make efficient use resources content indirection extension makes possible replace mime body part message external reference typically http uri way recipient message decide whether follow reference fetch resource depending bandwidth available network address translation nat makes impossible terminal reached outside private network since uses private address mapped public one packets originated terminal cross nat therefore nat traversal mechanisms needed signaling plane media plane internet engineering task force rfc 6314 summarizes unifies different methods achieve symmetric response routing client-initiated connections sip signaling use stun turn ice combines previous ones media streams internet engineering task force rfc 6157 describes necessary mechanisms guarantee sip works successfully internet protocol versions transition ipv6 sip signaling messages transmitted heterogeneous ipv4/ipv6 networks long proxy servers dns entries properly configured relay messages across networks according recommendations user agents need implement extensions directly exchange media streams extensions related session description protocol offer/answer initial exchange used gather ipv4 ipv6 addresses ends establish direct communication apart explained extensions sip make possible ims work successfully also necessary ims framework interworks exchanges services existing network infrastructures mainly public switched telephone network pstn several standards address requirements following two services interworking pstn internet i.e ims network also pstn-sip gateways support calls one end network moreover sip info method extension designed carry user information terminals without affecting signaling dialog used transport dual-tone multi-frequency signaling provide telephone keypad function users
[ 1998, 4469, 1730, 995, 2644, 7169, 7170, 2201, 7637, 1186, 5039, 2119, 3794, 1805, 5149, 3563, 2681, 2054, 3819, 3821, 6049, 1691, 5447, 3426 ]
Validation
534
3
DEC_Prism:dec prism prism parallel reduced instruction set machine 32-bit risc instruction set architecture isa developed digital equipment corporation dec final outcome number dec research projects 1982–85 time-frame point delivering silicon 1988 management canceled project next year work alpha started based heavily prism design period 1982 1985 fewer four attempts made create risc chip different dec divisions titan dec western research laboratory wrl palo alto california high-performance ecl based design started 1982 intended run unix safe streamlined architecture fast execution 64-bit design started year designed alan kotok spacewar fame dave orbits intended run vms hr-32 hudson risc 32-bit started 1984 rich witek dan dobberpuhl hudson fab intended used co-processor vax machine year dave cutler started cascade project decwest bellevue washington eventually cutler asked define single risc project 1985 selecting rich witek chief architect design started 64-bit chip later downsized 32-bits august 1985 first draft high-level design delivered work began detailed design prism specification developed period many months five-person team dave cutler dave orbits rich witek dileep bhandarkar wayne cardoza work 98 done 1985–86 heavily supported simulations pete benoit large vaxcluster terms integer operations prism architecture similar mips designs 32-bits instructions 6 highest 5 lowest bits instruction leaving 21 bits word encoding either constant register locations sixty-four 32-bit registers included opposed thirty-two mips usage otherwise similar prism mips lack register windows hallmark major risc design berkeley risc/sparc prism design notable several aspects instruction set notably prism included epicode extended processor instruction code defined number special instructions intended offer operating system stable abi across multiple implementations epicode given set 22 32-bit registers use set vector processing instructions later added well supported additional sixteen 64-bit vector registers could used variety ways two versions system planned decwest worked high-end ecl implementation known crystal semiconductor advanced development team worked microprism cmos version microprism finished first sent test fabrication april 1988 additionally cutler led development new microkernel-based operating system code-named mica offer unix-like vms-like personalities top common substrate services throughout prism period dec involved major debate future direction company newer workstations introduced performance benefit vax constantly eroded price/performance ratio completely undermined different groups within company debated best respond advocated moving vax high-end abandoning low-end workstations others suggested moving workstation market using commodity processor still others suggested re-implementing vax risc processor led considerable problems turf wars various groups competition divisions delayed architecture review n't closed 1986 work associated support chips memory management unit floating point unit later interrupted yet another debate whether design 32- 64-bit microprism design finalized april 1988 frustrated growing number losses cheaper faster competitive machines independently small group outside central engineering focused workstations unix/ultrix entertained idea using off-the-shelf risc processor build new family workstations group carried due diligence eventually choosing mips r2000 group acquired development machine prototyped port ultrix system initial meetings mips prototype machine took 90 days full production able start january 1989 resulting decstation 3100 family meeting reviewing various projects july 1988 company decided cancel prism continue mips workstations high-end vax products dave cutler left company soon every attempt produce faster vax could compete newer workstations eventually failed vax 9000 ran delays time shipped newer unix workstations already surpassed performance tiny fraction cost size apparently aware danger meeting prism canceled ken olsen started new project continue exploring risc-based vax indirectly led formation alpha project next year
[ 5012, 1447, 5021, 5371, 3948, 7527, 7529, 5737, 2567, 2929, 4694, 5042, 1481, 5055, 2226, 1867, 2248, 6148, 2266, 447, 6177, 4047, 4408, 5483, 3014, 1556, 5487, 6198, 4795, 6922, 7666, 515, 8024, 5521, 3747, 1237, 4099, 6236, 5893, 1252, ...
Test
535
8
Web_Services_Test_Forum:web services test forum web services test forum wstf provides framework members web service community develop interoperability scenarios test implementations scenarios implementations wstf charge dues central governing authority i.e board wstf patterned initial creators bea systems fujitsu ibm oracle soapbuilders mailing list/community main focus test various web service specifications also serves forum entire web service community share ideas concerns open fashion wstf founded following basic principles unlike interoperability organizations work wstf center around individual specifications activities organized around concept test scenario scenarios made three parts scenario defined members wstf may implement using products open source projects deploy implementations onto publicly available systems test interoperability crosswise fashion problems issues discussed wstf mailing lists scenario may need clarified re-factored process implementation reaches certain level maturity implementers choose scenario implementations made visible outside wstf publishing whether published endpoints provide scenario implementations expected maintained indefinitely allows members wstf perform regression testing test new implementations verify behavior etc without requiring active participation implementer wstf chose keep work private couple reasons first entirely public forum members may feel free bring sensitive topics signing participation agreement members agree keep discussions private group thus allowing much open honest discussion second members wstf wanted wstf published scenario mean broad community support without formal publish step process would hard distinguish scenarios community support versus ones implemented one company scenario published 5 different implementations least two third implementor choose make public members wstf put implementations/endpoints scenario eligible vote restriction done ensure skin game allowed influence information process see wstf charter functional non-functional web service testing done help wsdl parsing regression testing performed identifying changes made thereafter web service regression testing needs categories three different ways namely changes wsdl changes code selective re-testing web service operations capture three changes three intermediate forms wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively used intermediate forms wsdls combined form combined wsdl cwsdl used regression testing web service help automatic web service change management awscm performing selection relevant test cases construct reduced test suite old test suite wstf produces following artifacts
[]
Test
536
3
R6000:r6000 r6000 microprocessor chip set developed mips computer systems implemented mips ii instruction set architecture isa chip set consisted r6000 microprocessor r6010 floating-point unit r6020 system bus controller r6000 first implementation mips ii isa r6000 implemented emitter-coupled logic ecl mid- late 1980s trend implement high-end microprocessors high-speed logic ecl mips fabless company r6000 chip set fabricated bipolar integrated technology r6000 users control data systems cds used 80 mhz version high-end 4680-300 series inforserver server mips used r6000 rc6260 rc6280 servers
[ 2903, 5804, 6074, 551, 5208, 6865, 5917, 4234, 650, 5740, 5055, 1023, 4365, 4368, 4370, 3747, 7499, 4372, 2443 ]
Test
537
2
Masque_Attack:masque attack masque attack name ios vulnerability identified named computer security company fireeye july 2014 fireeye privately informed apple inc. issue july 26 2014 disclosed vulnerability public november 10 2014 blog post website vulnerability identified exist ios 7.1.1 7.1.2 8.0 8.1 8.1.1 beta jailbroken non-jailbroken ios devices vulnerability consists getting users download install apps deceptively created bundle identifier existing legitimate app deceptive app replace pose legitimate app long app one pre-installed along ios i.e. default apple apps – thus reason fireeye gave naming vulnerability masque attack november 13 2014 united states computer emergency readiness team us-cert part department homeland security released alert bulletin ta14-317a regarding masque attack apple stated november 14 aware incidents one customers affected attack
[ 2891, 3875, 1805 ]
Test
538
9
Solidity:solidity solidity object-oriented programming language writing smart contracts used implementing smart contracts various blockchain platforms notably ethereum developed gavin wood christian reitwiessner alex beregszaszi liana husikyan yoichi hirai several former ethereum core contributors enable writing smart contracts blockchain platforms ethereum solidity initially proposed august 2014 gavin wood language later developed ethereum project solidity team led christian reitwiessner present solidity primary language ethereum well private blockchains running platforms compete ethereum monax hyperledger burrow blockchain uses tendermint consensus swift deployed proof concept using solidity running burrow cornell university researcher stated solidity partially blame dao hack took place 2016 stated actually flaw exploit dao contract technically ethereum virtual machine evm operating intended solidity introducing security flaws contracts missed community missed designers language solidity statically-typed programming language designed developing smart contracts run evm solidity compiled bytecode executable evm solidity developers able write applications implement self-enforcing business logic embodied smart contracts leaving non-repudiable authoritative record transactions writing smart contracts smart contract specific languages solidity referred easy ostensibly already programming skills specified wood designed around ecmascript syntax make familiar existing web developers unlike ecmascript static typing variadic return types compared evm-targeting languages time serpent mutan solidity contained number important differences complex member variables contracts including arbitrarily hierarchical mappings structs supported contracts support inheritance including multiple inheritance c3 linearization application binary interface abi facilitating multiple type-safe functions within single contract also introduced later supported serpent documentation system specifying user-centric description ramifications method-call also included proposal known natural language specification example solidity program contract gavcoin solidity available
[ 6430, 2451, 5965, 5064, 3729, 1329, 6216, 6172, 3401, 8124, 744 ]
Validation
539
3
Pcmicro:pcmicro pcmicro large bulletin board system bbs support site 1981 1998 world wide web became popular pcmicro bbs served central file repository non-commercial bbs software related utilities bbs fidonet member 1991-1997 support distribution site several shareware freeware bbs packages including remoteaccess proboard elebbs pcmicro later released telnet communications driver named netfoss allows dos-based bbs software used telnet bbs longer service today entire collection freeware shareware bbs software utilities found bbs archives http //archives.thebbs.org containing thousands third party add-ons bbs packages
[]
Test
540
4
Relay_attack:relay attack relay attack computer security type hacking technique related man-in-the-middle replay attacks classic man-in-the-middle attack attacker intercepts manipulates communications two parties initiated one parties classic relay attack communication parties initiated attacker merely relays messages two parties without manipulating even necessarily reading peggy works high security building accesses using smart card purse approaches door building building detects presence smart card initiates exchange messages constitute zero-knowledge password proof card peggy building allows peggy enter mallory wants break building mallory approaches building device simulates smart card building responds initiating exchange messages mallory forwards message accomplice evelyn tailing peggy runs errands another part town evelyn relays message peggy smart card listens answer forwards answer mallory relays building continuing way mallory evelyn relay messages building peggy smart card building satisfied communicating peggy smart card building opens mallory enters
[ 1805, 3426 ]
Test
541
3
Circus_Charlie:circus charlie game six regular stages plus extra stage differing tasks completed charlie grabbing money bags performing dangerous tricks avoiding enemies completing stages etc. earns charlie points sixth stage completed game starts faster pace difficult exactly terms task completed levels charlie also races time bonus points awarded according time remaining running time cost player life standard arcade version 6 levels total levels 1 2 4 5 5 sublevels level 3 contains 7 sublevels sublevel gets difficult level 6 also 5 sublevels repeats long user lives level select version game player choose stages play limited number times whereupon level become unselectable ending game—after first five levels played limit player repeats trapeze stage lives exhausted famicom version trampoline stage omitted b mode levels repeated added difficulty game often shows famicom clone systems multicarts usually title screen altered remove copyright versions also levels split make separate games multicarts music comes american patrol blue danube mikie another konami arcade game headbutting teacher desk three times classroom stage make circus charlie appear giving player extra points circus charlie released along konami classic games nintendo ds compilation
[ 5995 ]
Validation
542
8
WebMethods_Glue:webmethods glue webmethods glue enterprise web services platform webmethods provides web services/soap capabilities existing java c/c++ applications developers use java-based product add enterprise web services integration legacy applications reduced programming effort embeddable product small footprint turns non-web service application one exposes functionality web services similar open source apache axis glue product provides layer web service interoperability existing applications webmethods glue features include created mind electric glue—as named—was company flagship product released two forms free unsupported standard version company-supported commercially licensed professional edition september 2003 glue featured microsoft press book microsoft .net j2ee interoperability toolkit webmethods acquired product part merger mind electric merger resulted rebranding product webmethods prefix become webmethods glue webmethods glue product 6.5.x maintenance ended may 31 2010 support ended year later http servlets xml soap wsdl uddi
[ 6986, 1435, 7315, 5075 ]
Test
543
3
Legacy_of_the_Wizard:legacy wizard legacy wizard originally released japan fantasy-themed action role-playing platform game released msx msx2 famicom japan nintendo entertainment system united states legacy wizard installment falcom dragon slayer series one five dragon slayer games localized outside japan game early example open-world non-linear action rpg combining action-rpg gameplay would later called metroidvania -style action-adventure elements game chronicles story drasle family abbreviation dragon slayer localized worzen family usa attempt destroy ancient dragon named keela magically entrapped painting within underground labyrinth accomplish goal must find dragon slayer magical sword protected four hidden crowns player must use unique abilities member family regain possession crowns destroy evil keela like many games era story legacy wizard explained almost entirely game instruction manual game contains little text little add even explain story game drasle family consists six members three generations plus family pet resembles small dinosaur player takes control members drasles pet sending one time vast underground cavern filled traps puzzles monsters search four crowns periodically returning family household surface change characters obtain password member family consists father mother son daughter pet different strengths weaknesses contribute goal characters seemingly powerful strengths offset proportionate limitations example father strongest attack power jump high rest family mother family relatively weak attributes one use specific magical items required find one crowns discovering utilizing character strengths player travels extensive dungeon eventually fighting four bosses gain crowns game vast labyrinth five major sections four contain boss guards one crowns fifth contains final boss section noticeably different characteristics different background music designed one particular playable character mind crowns acquired without player utilizing family members specific skills get sections dungeon therefore playable character must used point order complete game example one section may blocked bricks destroyed mattock player must use character use mattock get area four crowns acquired family young boy use magic crowns find dragon slayer use magical sword slay evil keela player encounter endless supply monsters running convoluted passageways character fire shots varying strength defeat monsters attacking uses character magic power monsters drop items defeated keys used open locked doors treasure chests bread restores player health potions restore magic power sometimes poison harms player money also collected defeated monsters spent shops inns located throughout dungeon characters legacy wizard must utilize several magical items quest acquired chests bought shops sometimes located impractical locations item effects include restoring character health magic power boosting attack power range environmental effects like enabling character fly move special bricks items used certain characters since accomplishing goals requires use items player determine character must used regain crown acquiring items finding properly use essence legacy wizard dragon slayer iv drasle family released msx2 home computer july 10 1987 ported famicom nihon falcom released july 17 1987 conversion often misattributed quintet due reference company name game ending credits composer yuzo koshiro confirmed pure coincidence since company n't formed two years later 2008 game released mobile phones japan 1up.com called hidden gem nes
[ 2207, 7128, 6734 ]
Test
544
5
RFB_protocol:rfb protocol rfb “ remote framebuffer ” open simple protocol remote access graphical user interfaces works framebuffer level applicable windowing systems applications including microsoft windows macos x window system rfb protocol used virtual network computing vnc derivatives default viewer/client uses tcp port 5900 connect server 5800 browser access also set use port alternatively server connect viewer listening mode default port 5500 one advantage listening mode server site configure firewall/nat allow access specified ports burden viewer useful server site computer expertise viewer user would expected knowledgeable although rfb started relatively simple protocol enhanced additional features file transfers sophisticated compression security techniques developed maintain seamless cross-compatibility many different vnc client server implementations clients servers negotiate connection using best rfb version appropriate compression security options support rfb originally developed olivetti research laboratory orl remote display technology used simple thin client atm connectivity called videotile order keep device simple possible rfb developed used preference existing remote display technologies rfb found second enduring use vnc developed vnc released open source software rfb specification published web since rfb free protocol anybody use orl closed 2002 key people behind vnc rfb formed realvnc ltd. order continue development vnc maintain rfb protocol current rfb protocol published realvnc website published versions rfb protocol follows developers free add additional encoding security types must book unique identification numbers maintainers protocol numbers clash clashing type numbers would cause confusion handshaking connection break cross-compatibility implementations list encoding security types maintained realvnc ltd separate protocol specification new types added without requiring specification reissued community version rfb protocol specification aims document existing extensions hosted tigervnc project terms transferring clipboard data currently way transfer text outside latin-1 character set vnc protocol pixel based although leads great flexibility i.e type desktop displayed often less efficient solutions better understanding underlying graphic layout like x11 desktop rdp protocols send graphic primitives high level commands simpler form e.g open window whereas rfb sends raw pixel data albeit compressed vnc protocol expresses mouse button state single byte binary up/down limits number mouse buttons eight effectively 7 given convention button 0 meaning “ disabled ” many modern mice enumerate 9 buttons leading forward/back buttons effect rfb
[ 4759, 5486, 7508 ]
Test
545
4
Software_Defined_Perimeter:software defined perimeter software defined perimeter sdp also called black cloud approach computer security evolved work done defense information systems agency disa global information grid gig black core network initiative around 2007 connectivity software defined perimeter based need-to-know model device posture identity verified access application infrastructure granted application infrastructure effectively “ black ” dod term meaning infrastructure detected without visible dns information ip addresses inventors systems claim software defined perimeter mitigates common network-based attacks including server scanning denial service sql injection operating system application vulnerability exploits man-in-the-middle cross-site scripting xss cross-site request forgery csrf pass-the-hash pass-the-ticket attacks unauthorized users open source implementation done paid homeland security premise traditional enterprise network architecture create internal network separated outside world fixed perimeter consists series firewall functions block external users coming allows internal users get traditional fixed perimeters help protect internal services external threats via simple techniques blocking visibility accessibility outside perimeter internal applications infrastructure weaknesses traditional fixed perimeter model becoming ever problematic popularity user-managed devices phishing attacks providing untrusted access inside perimeter saas iaas extending perimeter internet software defined perimeters address issues giving application owners ability deploy perimeters retain traditional model value invisibility inaccessibility outsiders deployed anywhere – internet cloud hosting center private corporate network across locations simplest form architecture sdp consists two components sdp hosts sdp controllers 6 sdp hosts either initiate connections accept connections actions managed interactions sdp controllers via control channel see figure 1 thus software defined perimeter control plane separated data plane enable greater scalability addition components redundant higher availability sdp framework following workflow see figure 2 general workflow remains implementations application sdps favor certain implementations others client-to-gateway implementation one servers protected behind accepting sdp host accepting sdp host acts gateway clients protected servers implementation used inside enterprise network mitigate common lateral movement attacks server scanning os application vulnerability exploits password cracking man-in-the-middle pass-the-hash pth others alternatively implemented internet isolate protected servers unauthorized users mitigate attacks denial service sql injection os application vulnerability exploits password cracking man-in-the-middle cross-site scripting xss cross-site request forgery csrf others client-to-server implementation similar features benefits client-to-gateway implementation discussed however case server protected running accepting sdp host software instead gateway sitting front server running software choice client-to-gateway implementation client-to-server implementation typically based number servers protected load balancing methodology elasticity servers similar topological factors 13 server-to-server implementation servers offering representational state transfer rest service simple object access protocol soap service remote procedure call rpc kind application programming interface api internet protected unauthorized hosts network example case server initiating rest call would initiating sdp host server offering rest service would accepting sdp host implementing sdp use case reduce load services mitigate attacks similar ones mitigated client-to-gateway implementation client-to-server-to-client implementation results peer-to-peer relationship two clients used applications ip telephone chat video conferencing cases sdp obfuscates ip addresses connecting clients minor variation user also client-to-gateway-to-client configuration user wishes hide application server well data breaches involve intellectual property financial information hr data sets data available within enterprise network attackers may gain entrance internal network compromising one computers network move laterally get access high value information asset case enterprise deploy sdp inside data center partition network isolate high-value applications unauthorized users network access protected application thus mitigating lateral movement attacks depend useful protecting physical machines software overlay nature sdp also allows integrated private clouds leverage flexibility elasticity environments role sdps used enterprises hide secure public cloud instances isolation unified system includes private public cloud instances and/or cross-cloud clusters software-as-a-service saas vendors use sdp protect services implementation software service would accepting sdp host users desiring connectivity service would initiating hosts allows saas leverage global reach internet without enabling internet global attack surface infrastructure-as-a-service iaas vendors offer sdp-as-a-service protected on-ramp customers allows customers take advantage agility cost savings iaas mitigating wide range potential attacks platform-as-a-service paas vendors differentiate offering including sdp architecture part service gives end users embedded security service mitigates network-based attacks vast amount new devices connected internet back-end applications manage devices and/or extract information devices mission-critical act custodian private sensitive data sdps used hide servers interactions internet provide improved security up-time
[ 623, 688, 2644, 4914, 5166, 1805 ]
Validation
546
7
ClearTrial:cleartrial cleartrial multinational software developer headquartered chicago illinois usa company develops markets software service saas system designed biopharmaceutical medical device manufacturers planning outsourcing tracking clinical trials cleartrial software architecture follows project management methodology includes activity-based costing predicts level effort specific resource person perform given task activity level effort calculated based algorithm derived analysis cost time drivers affect task cleartrial work breakdown structure defines groups tasks subtasks comprise clinical trial way organizes defines total work scope clinical project cleartrial ’ clinical trial subject matter experts smes published peer-reviewed articles functional service provider outsourcing clinical trials adaptive clinical trials clinical trials medical devices well articles clinical trial trends april 2011 cleartrial named one five “ cool vendors life sciences ” research firm gartner march 29 2012 oracle corporation announced agreed acquire cleartrial transaction closed
[ 330 ]
Test
547
3
Alabama_Regional_Communications_System:alabama regional communications system alabama regional communications system arcs radio/alert notification communications district responsibility providing user-based administration operations maintenance interoperable communications system serves calhoun county alabama talladega county alabama motorola trunked radio system licensed federal communications commission fcc operate radio frequency spectrum 800 megahertz mhz public safety band calhoun-talladega 800 mhz communications system originally developed installed enhance interoperability provide alert notification community destruction chemical weapons anniston army depot anad communications system funded maintained federal grant known chemical stockpile emergency preparedness program csepp joint united states army federal emergency management agency fema program designed provide community education emergency preparedness resources event chemical agent emergency original communications system legacy system analog trunking went on-the-air 1998 quickly became primary means two-way communications public safety agencies calhoun talladega counties replacing standalone conventional radio repeaters 2006 csepp communications system upgraded digital project 25 motorola type ii smartzone version 7.4 linear simulcast/multicast trunked 800 mhz communications system facilities anad known anniston chemical activity anca stored approximately seven percent nation chemical weapon stockpile including vx nerve agent sarin gb agent anad one nine united states army installations united states stored chemical weapons united states army began incinerating stored weapons august 9 2003 destruction anad chemical weapons stockpile controversial part potential danger surrounding community incident occur weapons disposal operations september 2011 us army chemical materials agency cma successfully completed safe elimination anad ’ chemical weapons stockpile result completion chemical warfare disposal operations anad federal funding communities surrounding anniston army depot end march 31 2012 includes funding operations maintenance csepp communications system years community become increasingly dependent upon capabilities communications system particular reliability interoperability capacity in-building coverage provides 24-7-365 voice data communications services nearly 3,000 users including law enforcement fire rescue emergency medical services school facilities buses hospitals transportation utilities many agencies also provides activation signaling almost 200 outdoor warning sirens located throughout counties time chemical weapons disposal completed system serving nearly 100 percent mission-critical communications needs calhoun talladega county preparation end csepp grant funding local officials explored alternative strategies generate funds would allow continued service operation existing communications system support cooperation local state elected officials fema consulting firms users system exploratory committee crafted legislation would allow users take ownership system june 15 2011 alabama governor robert j. bentley signed house bill 389 law act 2011-675 create radio/alert notification communications district purpose legislation create mechanism community transition csepp communications system federal grant funding locally generated funding operations ownership provided new alabama law codified sections 11-31-1 11-31-4 code alabama 1975 amended calhoun talladega county commissions made respective appointments communications district board directors term appointment listed parenthesis duly appointed board directors convened first time september 1 2011 first day appointment terms members present motion passed unanimously officially name communications district alabama regional communications system arcs board directors meetings open public regularly scheduled monthly meetings held second tuesday every month oxford alabama police department municipal court 600 stanley merrill drive oxford alabama 36203 april 1 2012 arcs become fully responsible administration operation 800 mhz system assets estimated value approximately 100 million dollars time cost operating system 100 percent funded revenue collected user fees based current predicted costs operate maintain system arcs board directors determined monthly user fee 22.50 per two-way radio device mobile portable modem siren control 50.00 per dispatch console rate applies local users calhoun talladega county formula determining user fee based total estimated annual costs operate communications system compared projected total number users subscribing system current user fees established based approximately 2,800 users projected annual cost approximately 760,000 operate maintain system
[ 2087, 6524 ]
Validation
548
5
Gigabit_Video_Interface:gigabit video interface gigabit video interface gvif digital video serial interface developed sony 1996 high quality uncompressed video transmission digital video hardware intended primarily automotive applications compatible hdcp encryption system gvif transmits uncompressed serial data speeds 1.95 gbit/s gvif transmits single differential pair result cable thin transmission distances ten meters possible gvif bus used circa 2000 onwards many mid range vehicles including land rover discovery 3 range rover lexus models toyota prius gvif bus primarily carrying video signal integrated satellite navigation unit vehicle display also known head unit gvif bus vehicles carried video despite specification allowing data stuffing information
[ 2566 ]
Test
549
2
Intel_Inspector:intel inspector intel inspector successor intel thread checker memory thread checking debugging tool increase reliability security accuracy c/c++ fortran applications memory checking includes memory leaks dangling pointers uninitialized variables use invalid memory references mismatched memory allocation deallocation stack memory checks stack trace controllable stack trace depth thread checking includes race conditions deadlocks depth configurable call stack analysis diagnostic guidance built-in knowledge threading building blocks tbb openmp posix win32 threads available part intel parallel studio limitations
[ 1363, 4318, 572, 5571, 4962, 2240, 1435, 2805 ]
Test
550
3
Apple_A12X:apple a12x apple a12x bionic 64-bit system chip soc designed apple inc first appeared 11-inch ipad pro third-generation 12.9-inch ipad pro announced october 30 2018 a12x variant a12 apple claims 35 percent faster single-core cpu performance 90 percent faster multi-core cpu performance predecessor a10x a12x features apple-designed 64-bit armv8-a octa-core cpu four high-performance cores called vortex four energy-efficient cores called tempest vortex cores 7-wide decode out-of-order superscalar design tempest cores 3-wide decode out-of-order superscalar design like mistral cores tempest cores based apple swift cores apple a6 similar performance arm cortex-a73 cpu cores apple ’ first soc octa core cpu a12x integrates apple-designed septa core graphics processing unit gpu twice graphics performance a10x embedded a12x m12 motion coprocessor a12x includes dedicated neural network hardware apple calls next-generation neural engine neural network hardware found a12 perform 5 trillion operations per second a12x manufactured tsmc using 7 nm finfet process contains 10 billion transistors vs. 6.9 billion a12 a12x paired 4 gb lpddr4x memory third-generation 12.9 ipad pro 11 ipad pro 6 gb 1tb storage configurations
[ 6788, 6421, 7890, 5732, 722, 1799, 1094, 2926, 5037, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 6125, 2954, 7572, 6482, 6847, 67, 6142, 4373, 7226, 2978, 446, 4749, 7601, 451, 3346, 6165, 4389, 5463, 102, 463, 5469, 4768, 5472, 469, 4041...
Test
551
3
R2000_(microprocessor):r2000 microprocessor r2000 32-bit microprocessor chip set developed mips computer systems implemented mips instruction set architecture isa introduced january 1986 first commercial implementation mips architecture first commercial risc processor available companies r2000 competed digital equipment corporation dec vax minicomputers motorola 68000 intel corporation 80386 microprocessors r2000 users included ardent computer dec silicon graphics northern telecom mips unix workstations chip set consisted r2000 microprocessor r2010 floating-point accelerator four r2020 write buffer chips core r2000 chip executed non-floating-point instructions simple short pipeline chip also controlled external code data caches made fast standard sram chips organized direct indexing one-cycle read latency r2000 chip contained small translation lookaside buffer mapping virtual memory addresses r2010 chip held floating point registers floating point data paths longer simple pipeline writes main memory dram took tens cycles fully complete r2020 chips queued completed 4 pending writes main memory allowing r2000 core proceed without stalling absence cache misses chip set sustained instruction completion rate one instruction per alu cycle much faster non-risc microprocessors time needed several cycles per instruction 1986 also saw similar technology sun first sparc microprocessor hewlett packard first pa-risc microprocessor overall speed limited cache size cache cycle time r2000 chip set sram initially sold complete circuit board ensure good cache bus timings 1987 system builders began using chip set arbitrary new board designs r2000 available 8.3 12.5 15 mhz grades die contained 110,000 transistors measured 80 mm 2.0 μm double-metal cmos process mips fabless semiconductor company capability fabricate integrated circuits chip set initially fabricated mips sierra semiconductor toshiba december 1987 mips licensed integrated device technology lsi logic performance semiconductor also fabricate market r2000 sierra toshiba continued serve foundries lsi fabricated chip set 2.0 μm double-metal cmos process marketed lr2000 performance semiconductor fabricated chip set pace-i 0.8 μm double-metal cmos process marketed pr2000 1988 improved version introduced r2000a composed r2000a r2010a ics operated 12.5 16.67 mhz used extensively embedded applications printer controllers 1988 r2000 followed r3000 using similar overall system design faster chip implementation
[ 2903, 5804, 6074, 2546, 5208, 6865, 5917, 5737, 4234, 650, 5740, 5055, 7010, 2226, 1023, 8117, 4365, 4368, 1506, 4370, 3747, 4372, 4099, 6236, 971, 536, 2443 ]
Validation
552
2
IPad_Mini_(1st_generation):ipad mini 1st generation first-generation ipad mini stylized marketed ipad mini mini tablet computer designed developed marketed apple inc announced october 23 2012 fourth major product ipad line first ipad mini line features reduced screen size contrast standard features similar internal specifications ipad 2 including display resolution first generation ipad mini received positive reviews reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage lack retina display october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company predisclose subject event widely expected ipad mini day event apple ceo tim cook introduced new version macbook family new generations macbook pro mac mini imac ipad mini higher end fourth-generation ipad released november 2 2012 nearly apple markets 32 gb 64 gb models discontinued release successor ipad mini 2 october 22 2013 almost 3 years june 19 2015 remaining 16 gb model discontinued well well discontinued stores ipad mini longer receives software updates supported apple ipad mini shipped ios 6.0 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available latest version currently ios 9.3.6 ipad mini comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed icloud although tablet designed make telephone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation using voice recognition technology iphone 4s user speaks ipad types say screen provided ipad connected wi-fi cellular network device optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad september 17 2014 ios 8 released first generation ipad mini apple devices however newer features software supported due relatively aged hardware shared ipad 2 september 16 2015 ipad mini received ios 9 update n't new multitasking features featured ipads june 13 2016 apple announced ios 10 update major updates mobile operating system however ipad mini receive update along devices using a5 processor including iphone 4s ipad 2 ipad 3rd generation ipod touch 5th generation due hardware limitations apple stopping latest ios updates ipad mini expected many industry however led criticism device sale june 2015 june 2016 versions operating system beyond ios 9 made available tablet four buttons one switch ipad mini including home button near display returns user home screen three aluminum buttons right side top wake/sleep volume volume plus software-controlled switch whose function varies software updates tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi ipad mini available 16 32 64 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos ipad mini features partially hardware ipad 2 screens resolutions 1024 x 768 ipad mini smaller screen thus higher pixel density ipad 2 163 ppi vs 132 ppi unlike ipad 2 5 mp 1.2 mp cameras lightning connector system-on-chip a5 one found later revision ipad 2 32 nm audio processor found iphone 5 ipad 4th generation allows ipad mini siri voice dictation unlike ipad 2 graphics processor gpu ipad mini one found ipad 2 powervr sgx543mp2 ipad mini initially featured slate silver colors however release mini 2 slate color changed space gray silver color remained smart cover introduced ipad 2 screen protector magnetically attaches face ipad smaller version available ipad mini 1 later models including ipad mini 4 also use smart cover cover three folds allow convert stand held together magnets smart covers microfiber bottom cleans front ipad wakes unit cover removed comes six colors polyurethane apple offers accessories including bluetooth keyboard several types earbuds headphones many adapters lightning connector applecare free engraving also available ipad mini reviews first generation ipad mini positive reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage retina display device competes tablets amazon kindle fire hd google nexus 7 barnes noble nook hd joshua topolsky verge praised industrial design ipad mini however panned lack retina display price
[ 6788, 3940, 7890, 5732, 722, 1094, 4320, 2926, 4690, 5037, 734, 5752, 405, 6125, 2954, 1123, 7572, 6482, 6847, 6142, 2609, 1895, 4373, 7226, 4376, 2978, 5091, 4749, 5450, 7601, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3001, 2284, 3008, ...
Test
553
3
Amdahl's_law:amdahl law computer architecture amdahl law amdahl argument formula gives theoretical speedup latency execution task fixed workload expected system whose resources improved named computer scientist gene amdahl presented afips spring joint computer conference 1967 amdahl law often used parallel computing predict theoretical speedup using multiple processors example program needs 20 hours using single processor core particular part program takes one hour execute parallelized remaining 19 hours execution time parallelized regardless many processors devoted parallelized execution program minimum execution time less critical one hour hence theoretical speedup limited 20 times formula_1 reason parallel computing many processors useful highly parallelizable programs amdahl law formulated following way furthermore shows theoretical speedup execution whole task increases improvement resources system regardless magnitude improvement theoretical speedup always limited part task benefit improvement amdahl law applies cases problem size fixed practice computing resources become available tend get used larger problems larger datasets time spent parallelizable part often grows much faster inherently serial work case gustafson law gives less pessimistic realistic assessment parallel performance task executed system whose resources improved compared initial similar system split two parts example computer program processes files disk part program may scan directory disk create list files internally memory another part program passes file separate thread processing part scans directory creates file list sped parallel computer part processes files execution time whole task improvement resources system denoted formula_4 includes execution time part would benefit improvement resources execution time one would benefit fraction execution time task would benefit improvement resources denoted formula_5 one concerning part would benefit therefore execution part benefits improvement resources accelerated factor formula_7 improvement resources consequently execution time part benefit remains part benefits becomes theoretical execution time formula_9 whole task improvement resources amdahl law gives theoretical speedup latency execution whole task fixed workload formula_11 yields 30 execution time may subject speedup p 0.3 improvement makes affected part twice fast 2 amdahl law states overall speedup applying improvement example assume given serial task split four consecutive parts whose percentages execution time respectively told 1st part sped 2nd part sped 5 times 3rd part sped 20 times 4th part sped 1.6 times using amdahl law overall speedup notice 5 times 20 times speedup 2nd 3rd parts respectively n't much effect overall speedup 4th part 48 execution time accelerated 1.6 times example serial program two parts b therefore making part run 2 times faster better making part b run 5 times faster percentage improvement speed calculated non-parallelizable part optimized factor follows amdahl law speedup due parallelism given formula_20 formula_21 meaning speedup measured respect execution time non-parallelizable part optimized formula_22 formula_24 formula_25 formula_26 next consider case wherein non-parallelizable part reduced factor parallelizable part correspondingly increased follows amdahl law speedup due parallelism given derivation agreement jakob jenkov analysis execution time vs. speedup tradeoff amdahl law often conflated law diminishing returns whereas special case applying amdahl law demonstrates law diminishing returns one picks optimally terms achieved speedup improve one see monotonically decreasing improvements one improves however one picks non-optimally improving sub-optimal component moving improve optimal component one see increase return note often rational improve system order non-optimal sense given improvements difficult require larger development time others amdahl law represent law diminishing returns considering sort return one gets adding processors machine one running fixed-size computation use available processors capacity new processor added system add less usable power previous one time one doubles number processors speedup ratio diminish total throughput heads toward limit 1/ 1 − p analysis neglects potential bottlenecks memory bandwidth i/o bandwidth resources scale number processors merely adding processors provides even lower returns implication amdahl law speedup real applications serial parallel portions heterogeneous computing techniques required example cpu-gpu heterogeneous processor may provide higher performance energy efficiency cpu-only gpu-only processor
[ 4654, 5371, 107, 5559, 1546, 5735, 4049, 4318, 4051, 3458, 5832, 5042, 7453, 4154, 1481, 5939, 4159, 1023, 4839, 1295, 5947, 48, 6922, 3041, 1405, 240, 1678, 515, 1679, 1586, 4899, 8024, 1592, 2961, 3578, 8130, 4993, 3667, 1786, 2969, 1...
Test
554
2
UNETix:unetix unetix early implementation unix ibm pc systems true unix written scratch pc without using code system v. unetix supported single user however maintained closer compatibility standard versions unix early versions qnx unetix multiple windows capability possibly first implementation windowing unix-like operating system 10 windows supported could run independent tasks could individual foreground background colors set special codice_1 command published lantech systems inc unetix list price 1984 130 usd discounted advertised 99 usd usd today minimum ram requirement 256 kb machine would able support single-tasking multitasking required 512 kb emulation environment ms-dos could run dos 1.1 programs one window unix programs ran windows major weaknesses slow speed lack hard disk support unetix came full assembly language programming environment c compiler optional lantech claimed c compiler first available x86 architecture
[ 4670, 5021, 13, 3271, 3626, 5041, 7550, 405, 65, 5783, 5088, 6500, 443, 785, 2266, 788, 1522, 4751, 7605, 4759, 4397, 5116, 2294, 2300, 4786, 6922, 5161, 5865, 4447, 861, 4454, 3751, 1992, 7325, 4478, 190, 8066, 900, 6984, 5571, 578, ...
Test
555
4
Download.ject:download.ject computing download.ject also known toofer scob malware program microsoft windows servers installed insecure website running microsoft internet information services iis appends malicious javascript pages served site download.ject first noted case users internet explorer windows could infect computers malware backdoor key logger merely viewing web page came prominence widespread attack starting june 23 2004 infected servers included several financial sites security consultants prominently started promoting use opera mozilla firefox instead ie wake attack download.ject virus worm spread june 23 attack hypothesised put place automatic scanning servers running iis hackers placed download.ject financial corporate websites running iis 5.0 windows 2000 breaking using known vulnerability patch existed vulnerability many administrators applied attack first noticed june 23 although researchers think may place early june 20 download.ject appended fragment javascript web pages compromised servers page server viewed internet explorer ie windows javascript would run retrieve copy one various backdoor key logging programs server located russia install user machine using two holes ie — one patch available without vulnerabilities present versions ie windows except version included windows xp service pack 2 beta testing time server browser flaws exploited attack notable however combining two placed upon popular mainstream websites although list affected sites released network compromised sites used attack reportedly numbering thousands far previous compromised network microsoft advised users remove infection browse security settings maximum security experts also advised switching javascript using web browser internet explorer using operating system windows staying internet altogether particular attack neutralised june 25 server download.ject installed backdoor shut microsoft issued patch windows 2000 2003 xp july 2 although sizable attack compared email worms time fact almost existing installations ie — 95 web browsers use time — vulnerable latest series ie holes leaving underlying operating system vulnerable caused notable wave concern press even business press started advising users switch browsers despite then-prerelease windows xp sp2 invulnerable attack
[ 4026, 2451, 5984, 6696, 4759, 555, 5378, 8183, 6991, 7176, 5571, 7734, 5401, 6381, 3135, 7850, 1970, 422, 3486, 74, 6495 ]
Test
556
9
Nyquist_(programming_language):nyquist programming language nyquist programming language sound synthesis analysis based lisp programming language extension xlisp dialect lisp named harry nyquist nyquist programmer designs musical instruments combining functions call upon instruments generate sound typing simple expression programmer combine simple expressions complex ones create whole composition also generate various kinds musical non-musical sounds nyquist interpreter read write sound files midi files adagio text-based music score files many platforms also produce direct audio output real time nyquist programming language also used write plug-in effects audacity digital audio editor one notable difference nyquist traditional music-n languages nyquist segregate synthesis functions see unit generator scoring functions example csound actually two languages one creating orchestras writing scores nyquist two domains combined nyquist runs linux unix environments mac os microsoft windows nyquist programming language interpreter written roger dannenberg carnegie mellon university support yamaha corporation ibm
[ 7878, 4759, 1445, 6087, 6981, 2734, 5734, 578, 4789, 4704, 6287, 3880, 7481, 2600, 7032, 4543, 1889, 3749, 5883, 2439, 6408, 5266 ]
Test
557
4
Arbor_Networks:arbor networks arbor networks software company founded 2000 based burlington massachusetts united states sells network security network monitoring software used – according company claims – 90 internet service providers company products used protect networks denial-of-service attacks botnets computer worms efforts disable network routers company founded 2000 co-founders farnam jahanian rob malan spun research university michigan sponsored darpa cisco intel joined students jonathan arnold matthew smart jonathan poland entrepreneurs ted julian dug song make founding team company raised 11 million round venture capital later august 2002 company raised another 22 million second round venture capital led thomas weisel venture partners participants included battery ventures cisco systems among others january 2008 arbor acquired ellacoya networks company provides broadband traffic shaping products acquisition expected increase total addressable market tam arbor 750 million 2008 1.5 billion end 2009 march 2009 arbor worked 100 isps create new network monitoring system called atlas 2.0 october 2009 company estimated google paid almost nothing youtube bandwidth noting google probably used dark fibre instead run website august 31 2010 tektronix communications announced completed acquisition arbor networks upon completion acquisition arbor networks joins danaher corporation portfolio communications enterprise companies includes tektronix communications september 3 2013 arbor networks announced acquired privately held packetloop leader security analytics based sydney australia arbor strategic partnerships cisco ibm juniper networks addition headquarters burlington massachusetts company also offices ann arbor michigan london singapore wired stated due popularity arbor software among isps company likely knows internet ebbs flows anyone outside national security agency arbor part netscout systems part acquisition fluke tektronix communications tekcomms vss 2015 danaher
[ 3821, 1691, 651, 3864, 6437, 7177, 4783, 2535 ]
Test
558
4
Wireless_intrusion_prevention_system:wireless intrusion prevention system computing wireless intrusion prevention system wips network device monitors radio spectrum presence unauthorized access points intrusion detection automatically take countermeasures intrusion prevention primary purpose wips prevent unauthorized network access local area networks information assets wireless devices systems typically implemented overlay existing wireless lan infrastructure although may deployed standalone enforce no-wireless policies within organization advanced wireless infrastructure integrated wips capabilities large organizations many employees particularly vulnerable security breaches caused rogue access points employee trusted entity location brings easily available wireless router entire network exposed anyone within range signals july 2009 pci security standards council published wireless guidelines pci dss recommending use wips automate wireless scanning large organizations wireless intrusion detection system wids monitors radio spectrum presence unauthorized rogue access points use wireless attack tools system monitors radio spectrum used wireless lans immediately alerts systems administrator whenever rogue access point detected conventionally achieved comparing mac address participating wireless devices rogue devices spoof mac address authorized network device new research uses fingerprinting approach weed devices spoofed mac addresses idea compare unique signatures exhibited signals emitted wireless device known signatures pre-authorized known wireless devices addition intrusion detection wips also includes features prevent threat automatically automatic prevention required wips able accurately detect automatically classify threat following types threats prevented good wips wips configurations consist three components simple intrusion detection system single computer connected wireless signal processing device antennas placed throughout facility huge organizations multi network controller provides central control multiple wips servers soho smb customers functionality wips available single box wips implementation users first define operating wireless policies wips wips sensors analyze traffic air send information wips server wips server correlates information validates defined policies classifies threat administrator wips notified threat policy set accordingly wips takes automatic protection measures wips configured either network implementation hosted implementation network wips implementation server sensors console placed inside private network accessible internet sensors communicate server private network using private port since server resides private network users access console within private network network implementation suitable organizations locations within private network hosted wips implementation sensors installed inside private network however server hosted secure data center accessible internet users access wips console anywhere internet hosted wips implementation secure network implementation data flow encrypted sensors server well server console hosted wips implementation requires little configuration sensors programmed automatically look server internet secure tls connection large organization locations part private network hosted wips implementation simplifies deployment significantly sensors connect server internet without requiring special configuration additionally console accessed securely anywhere internet hosted wips implementations available on-demand subscription-based software service model hosted implementations may appropriate organizations looking fulfill minimum scanning requirements pci dss
[ 2944, 3189, 1691, 7039, 330, 5181, 5046, 1708, 3426 ]
Test
559
3
Daniel_Slotnick:daniel slotnick daniel leonid slotnick 1931–1985 mathematician computer architect slotnick papers published john cocke 1958 discussed use parallelism numerical calculations first time later served chief architect illiac iv supercomputer principal investigator darpa contract early 1970s produced illiac iv arpanet fairly large operation building campus uiuc originally called center advanced computation astronomy building illiac iv constructed burroughs corporation using special chips made fairchild semiconductor campus unrest due vietnam war mansfield amendments illiac iv completed installed ames research center instead uiuc slotnick darpa contract renewed 1985 ida nsa formed supercomputing research facility dc area slotnick widow donated library 1987 first issue journal supercomputing contained tribute slotnick development arpanet took place mit lincoln labs bbn technologies however planned illiac iv would network work funded slotnick darpa contract example standard character set established also purdy polynomial secure hash function protect passwords arpanet ironically illiac iv project moved ames research center computer could accessed telephone 415 329-0740 awarded afips prize 1962 elected ieee fellow 1976
[ 6922, 1243 ]
Test
560
4
Project_Safe_Childhood:project safe childhood project safe childhood psc department justice initiative launched 2006 aims combat proliferation technology-facilitated sexual exploitation crimes children psc coordinates efforts various federal state local agencies organizations protect children investigating prosecuting online sexual predators psc partners include internet crimes children icac task forces fbi u.s postal inspection service immigration customs enforcement u.s marshals service national center missing exploited children state local law enforcement officials u.s. attorney ’ district
[ 7363 ]
Test
561
2
Android_Marshmallow:android marshmallow android marshmallow codenamed android development sixth major version android operating system 13th version android first released beta build may 28 2015 officially released october 5 2015 nexus devices first receive update marshmallow primarily focuses improving overall user experience predecessor lollipop introduced new permissions architecture new apis contextual assistants first used new feature tap provide context-sensitive search results new power management system reduces background activity device physically handled native support fingerprint recognition usb-c connectors ability migrate data applications microsd card internal changes 16.9 devices accessing google play run android 6.0 single popular point release android android nougat oreo major releases 7.x 8.x larger install bases release internally codenamed macadamia nut cookie first developer preview build codenamed android unveiled released google i/o may 28 2015 nexus 5 nexus 6 smartphones nexus 9 tablet nexus player set-top box second developer preview released july 9 2015 third final preview released august 17 2015 along announcing android would titled android marshmallow september 29 2015 google unveiled launch devices marshmallow lg-produced nexus 5x huawei-produced nexus 6p alongside google pixel c tablet android 6.0 updates factory images nexus 5 6 7 2013 9 player released october 5 2015 older nexus devices including nexus 4 nexus 7 2012 nexus 10 receive official update october 14 2015 lg announced planned release marshmallow flagship lg g4 smartphone poland following week marking first third-party device receive update marshmallow android 6.0.1 software patch featuring security fixes support unicode 8.0 emoji although without supporting skin tone extensions human emoji return next alarm feature disturb mode released december 7 2015 new assist api allows information currently opened app including text screenshot current screen sent designated assistant application analysis processing system used google search app feature google tap allows users perform searches within context information currently displayed on-screen home button used android 5 show available apps home button used together voice command generate on-screen cards display information suggestions actions related content direct share allows share menus display recently used combinations contacts associated app direct targets adoptable storage allows newly inserted sd card secondary storage media designated either portable internal storage portable maintains default behavior previous android versions treating media secondary storage device storage user files storage media removed replaced without repercussions subject access restrictions apps designated internal storage storage media reformatted encrypted ext4 file system adopted operating system primary storage partition existing data including applications private data folders migrated external storage normal operation device becomes dependent presence media apps operating system functions function properly adopted storage device removed user loses access storage media adopted storage forgotten makes data permanently inaccessible samsung lg however removed ability use sd card internal storage galaxy s7 g5 devices samsung arguing feature could result unexpected losses data prevents users able transfer data using card android marshmallow introduces redesigned application permissions model apps longer automatically granted specified permissions installation time opt-in system used users prompted grant deny individual permissions ability access camera microphone application needed first time applications remember grants revoked user time new permissions model used applications developed marshmallow using software development kit sdk older apps continue use previous all-or-nothing approach permissions still revoked apps though might prevent working properly warning displayed effect marshmallow introduces new power management schemes known doze app standby running battery power device enter low-power state inactive physically handled state network connectivity background processing restricted high-priority notifications processed additionally network access apps deferred user recently interacted app apps may request permission exempt policies rejected google play store violation dangerous products policy core functionality adversely affected android marshmallow provides native support fingerprint recognition supported devices via standard api allowing third-party applications implement fingerprint-based authentication fingerprints used unlocking devices authenticating play store google pay purchases android marshmallow supports usb-c including ability instruct devices charge another device usb marshmallow also introduces verified links configured open directly specified application without user prompts user data apps targeting marshmallow automatically backed google drive wi-fi application receives 25 mb storage separate user google drive storage allotment marshmallow android compatibility definition document contains new security mandates devices dictating capable accessing encrypted data without affecting performance must enable secure boot device encryption default conditions comprise part specification must met order certified operating system able license google mobile services software requirement mandatory device encryption originally intended take effect lollipop delayed due performance issues
[ 3933, 5372, 6427, 1095, 740, 7189, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 6153, 7956, 5455, 6176, 5473, 1544, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1582, 2683, 855, 6937, 168, 6232, 6950, 174, 2712, 4116, 5195, 2003, ...
Test
562
9
Index_of_JavaScript-related_articles:index javascript-related articles list articles related javascript programming language
[ 183, 5629, 2451, 3684, 4755, 893, 635, 5640, 6172, 6176, 4131, 5998, 1177, 1190, 2658, 831, 7734, 313, 4287, 131, 3719, 2040, 40, 6368, 3985, 5153, 237, 1492, 3398, 4079, 2870, 3318, 422, 6300, 340, 2604, 6400, 257, 5611, 4276, 7687, ...
Validation
563
2
Star_Control_II:star control ii star control ii ur-quan masters sequel star control developed toys bob fred ford paul reiche iii originally published accolade 1992 ms-dos released critical acclaim star control ii widely viewed today one greatest pc games ever made appeared numerous publications lists greatest video games time game features exoplanet abundant star systems hyperspace travel extraterrestrial life interstellar diplomacy game featuring 25 different alien races communicated game ported 3do crystal dynamics 1994 enhanced multimedia presentation allowed cd technology source code 3do port licensed gnu gpl 2002 game content creative commons license 3do code ported pc ur-quan masters sequel star control 3 released 1996 star control ii added large number species ship types already diverse cast replaced first game strategy-based scenarios story-driven space exploration adventure game included diplomacy inhabitants galaxy resource gathering sub-sections instances melee combat first game whenever diplomacy fails typical adventure game genre player must explore game world little direction make discoveries connections independently interaction various alien species chief part adventure game backstory species first games new ones fleshed considerably hours dialogue species bringing characteristic conversational quirks music even display fonts two-player mode available named super melee consisting solely ship-to-ship combat ships first game available even made appearance story along number new ones last phase war alliance free stars hierarchy battle thralls tobermoon earthling ship discovered ancient precursor subterranean installation cave surface uninhabited planet vela star system alliance hastily sent secret scientific mission study relics massive hierarchy offensive forced alliance fleets retreat beyond vela mission commander captain burton decided go hiding planet sent back tobermoon starship asking help though ur-quan forces n't find earthlings sweep system relief never arrived years later help genius child born planet colonists activated precursor machinery found programmed build starship using limited store raw materials available planet ten years precursor factory built barely functional ship could piloted grown genius child alone could interact precursor central computer first test flight discovered ship burton sent help severely damaged ur-quan orbiting unpowered outer solar system alliance never known mission discoveries colonists decided fix recovered ship train new crew members precursor ship tobermoon send mission back earth eager know war ended shortly reaching sol little fleet attacked unknown ship captain burton commanding earthling ship intercepted alien ship could damage defenseless precursor starship killed short fight leaving genius young man command player begins game commander precursor starship returns earth find enslaved ur-quan discovered rest humans allies war ur-quan either eradicated put slave shield put service ur-quan battle thralls player progresses revealed ur-quan fighting internecine war kohr-ah subspecies ur-quan believes eradicating life galaxy opposed enslaving winner war gain access sa-matra precursor starship unparalleled power player must take advantage ur-quans distraction contact recruit alien races new alliance gather resources build fleet find way destroy sa-matra ur-quan finish war become unstoppable contents soundtrack pc version determined running contest anybody could participate composing tracks based description game included soundtrack compositions aaron grier erol otus eric e. berge riku nuottajärvi kevin palivec dan nicholson president founding member kosmic free music foundation musicians searched posting contest amiga users newsgroup mostly amiga hobbyists making sample based tracker music days music protracker-mod format uses digitized instrument samples pc game music still relied fm-synthesis based instruments time game also supported gravis ultrasound sound card popular among mod composers star control ii highly influenced story game design games starflight 1986 1989 developed binary systems released variety platforms electronic arts indeed greg johnson starflight lead designer helped write dialog star control ii paul reiche iii contributed earlier game alien communication system david brin science fiction series uplift universe also often mentioned inspiration star control ii universe well larry niven known space universe addition numerous awards gaming magazines published around release star control ii also spots top games compilations notable gaming publications computer gaming world stated star control ii much sequel starflight star control reviewer praised vga graphics wrote game best dialogue ever encountered genre concluded game placed reviewer top ten list time ... one enjoyable games review year often perfect balance struck role playing adventure action/arcade 1994 survey space war games gave grade b+ stating game lacked replayability except ship-to-ship melee minigame 1994 survey strategic space games set year 2000 later gave game four-plus stars five stating offers hours 'simple hot deep play game reviewed 1993 dragon 195 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars reviewing 3do version gamepro remarked user-friendly interface makes complicated gameplay easy handle also praised impressive graphics voice acting use unique vocal inflections alien race concluded game addicting epic sci-fi adventure patient space explorers zero-gravity tacticians glued screens million hours others stay away four reviewers electronic gaming monthly likewise praised accessible interface impressive graphics complained alien voices sometimes difficult understand cited cd quality audio melee mode strong points one commented blows pc version water gave 8.25 10 star control ii nominated award 1993 game developers conference computer gaming world named magazine adventure game year eric unready next generation reviewed 3do version game rating three stars five stated 've patience spend hours digging minerals game addictive state art 1994 pc gamer us named star control ii 21st best computer game ever editors called epic thoroughly enjoyable play look year pc gamer uk named 33rd best computer game time editors wrote ever game deserved award underrated star control ii years later star control 2 remained 52nd best computer game time pc gamer 2011 version list star control remains highly ranked many best lists 1996 computer gaming world ranked 29th best pc game time calling stunning mix adventure action humor ign named star control ii 17th best game time 2005 2013 kotaku crowd sourced list best pc games time star control 2 emerging popular choice among audience gamespot also named one greatest games time addition also given eighth place gamespot list best gameworlds reader choice well third place best endings ur-quan masters uqm project aimed port star control ii modern operating systems including windows linux mac os x bsd project began 2002 original creators fred ford paul reiche iii released source code 3do version open-source gpl project renamed ur-quan masters trademark star control registered accolade 1997 acquired 1999 atari known infogrames along rest accolade assets latest version 0.7.0 released 4 july 2011 game media free use non-commercial context released creative commons by-nc-sa 2.5 license ur-quan masters adds option online multiplayer melee play something available original game ability mod game one project goals variety modifications melee released fans including versions superpowered ships numerous planets high-definition graphics version game uqm-hd subsequently released beta 2013 development uqm codebase second group semi-professional musicians called precursors created new musical tracks remixes originals ultimately releasing four remix packs optional package listened in-game replacing original music played audio player group main members jouni airaksinen alias mark vera tore aune fjellstad alias void espen gätzschmann alias tilt riku nuottajärvi original composer 1992 release fully sometimes unofficial playable port produced wii ouya android microconsole gp2x portable game system pandora handheld maemo 5-based n900 smart phone ports underway sony psp microsoft xbox
[ 2338, 4759, 6380, 5571, 578 ]
Test
564
9
Syntax_error:syntax error computer science syntax error error syntax sequence characters tokens intended written compile-time program compile syntax errors corrected interpreted languages however syntax error may detected program execution interpreter error messages might differentiate syntax errors errors kinds disagreement errors syntax errors example would say use uninitialized variable value java code syntax error many others would disagree would classify static semantic error 8-bit home computers used basic interpreter primary user interface syntax error error message became somewhat notorious response command user input interpreter could parse syntax error may also occur invalid equation entered calculator caused instance opening brackets without closing less commonly entering several decimal points one number java following syntactically correct statement following second example would theoretically print variable hello world instead words hello world however variable java space syntactically correct line would system.out.println hello_world compiler flag syntax error given source code meet requirements language grammar type errors attempt apply ++ increment operator boolean variable java undeclared variable errors sometimes considered syntax errors detected compile-time however common classify errors static semantic errors instead syntax error many scientific calculators occur many ways including confused math errors like dividing 0 equation resulting big number non scientific calculators math errors referred errors
[ 1361, 7333, 6882, 171, 3772 ]
Validation
565
9
COFFEE_(Cinema_4D):coffee cinema 4d coffee often written c.o.f.f.e.e computer scripting language forms part cinema 4d proprietary 3d graphics application although presented acronym letters word coffee allegedly stand cinema object-oriented fery fast environment enhancer primarily comic reference java considerably famous computer language like scripting languages coffee used extend modify functionality host software technique preferable writing so-called plug-in module using traditional language c number reasons among several different aspects cinema 4d operation customised using coffee scripts notably additions user interface extensions reading writing new file formats creating texture shaders almost main functionality application accessed coffee program customised features look behave much like supplied standard coffee fairly typical curly bracket language would look familiar previous user c/c++ java perl anything along lines function object class definitions closely modelled c++ however coffee dynamically typed variables defined simple var keyword without reference type unlike similar scripting languages squirrel javascript coffee use function keyword introduce functions require return type void return like c/c++ function definition simply begins function name coffee memory management handled entirely garbage collection process essentially means looks programmer seldom needs worry however possible control process explicitly necessary 3d graphics programming makes extensive use certain mathematical techniques notably trigonometry vector arithmetic coffee well equipped area good set mathematical functions built-in vector datatype since coffee used extend cinema 4d clearly needs make use host program features extent application programming interface api possible locate 3d objects created user access internal data structures example new object created existing one modified distorted script since major purpose coffee allow new file formats used cinema api provides features useful task file input/output class available allows individual items binary data integers floating point numbers read written
[ 1361, 1616, 5983, 2451, 6778 ]
Train
566
4
Nikto_(vulnerability_scanner):nikto vulnerability scanner nikto free software command-line vulnerability scanner scans webservers dangerous files/cgis outdated server software problems performs generic server type specific checks also captures prints cookies received nikto code free software data files uses drive program nikto detect 6700 potentially dangerous files/cgis checks outdated versions 1250 servers version specific problems 270 servers also checks server configuration items presence multiple index files http server options attempt identify installed web servers software scan items plugins frequently updated automatically updated variations nikto one macnikto macnikto applescript gui shell script wrapper built apple xcode interface builder released terms gpl provides easy access subset features available command-line version installed along macnikto application
[ 1461, 5983, 7308, 5571 ]
Test
567
4
Double_switching:double switching double switching double cutting double breaking practice using multipole switch close open positive negative sides dc electrical circuit hot neutral sides ac circuit technique used prevent shock hazard electric devices connected unpolarised ac power plugs sockets double switching crucial safety engineering practice railway signalling wherein used ensure single false feed current relay unlikely cause wrong-side failure example using redundancy increase safety reduce likelihood failure analogous double insulation double switching increases cost complexity systems employed example extra relay contacts extra relays technique applied selectively provide cost-effective safety improvement landslip washaway detector buried earth embankment opens circuit landslide occur possible guarantee wet earth embankment complete circuit supposed break circuit double cut positive negative wires wet conductive earth likely blow fuse one hand short detecting relay hand either almost certain apply correct warning signal clapham junction rail crash 1988 caused part lack double switching known double cutting british railway industry signal relay question switched hot side return current came back unswitched wire loose wire bypassed contacts train detection relays switched signal allowing signal show green fact stationary train ahead 35 people killed resultant collision similar accident united airlines flight 811 caused part single-switched safety circuit baggage door mechanism failure wiring insulation circuit allowed baggage door unlocked false feed leading catastrophic de-pressurisation deaths nine passengers study railway electrical signalling new south wales 1900s shows ever increasing proportion double switching compared single switching double switching course cost wires relay contacts testing hand double switching inherently less prone wrong side failures helps overcome short-circuit faults hard test partial double switching might double switch lever controls track circuits one signal next single switching track circuits less critical overlap beyond next signal double switching facilitated modern relays contacts less space
[]
Test
568
3
ARM_big.LITTLE:arm big.little arm big.little heterogeneous computing architecture developed arm holdings coupling relatively battery-saving slower processor cores little relatively powerful power-hungry ones big typically one side active cores access memory regions workloads swapped big little cores fly intention create multi-core processor adjust better dynamic computing needs use less power clock scaling alone arm marketing material promises 75 savings power usage activities commonly arm big.little architectures used create multi-processor system-on-chip mpsoc october 2011 big.little announced along cortex-a7 designed architecturally compatible cortex-a15 october 2012 arm announced cortex-a53 cortex-a57 armv8-a cores also intercompatible allow use big.little chip arm later announced cortex-a12 computex 2013 followed cortex-a17 february 2014 cortex-a12 cortex-a17 also paired big.little configuration cortex-a7 given library cmos logic active power increases logic switches per second leakage increases number transistors cpus designed run fast different cpus designed save power fast out-of-order cpu loafing low speeds cpu much less leakage fewer transistors could work example might use smaller fewer transistors memory cache simpler microarchitecture pipeline big.little way optimize cases power speed system practice big.little system surprisingly inflexible one issue number types power clock domains ic provides may match standard power management features offered operating system another cpus longer equivalent abilities matching right software task right cpu becomes difficult problems solved making electronics software flexible three ways different processor cores arranged big.little design depending scheduler implemented kernel clustered model approach first simplest implementation arranging processor identically-sized clusters big little cores operating system scheduler see one cluster time load whole processor changes low high system transitions cluster relevant data passed common l2 cache active core cluster powered one activated cache coherent interconnect cci used model implemented samsung exynos 5 octa 5410 cpu migration via in-kernel switcher iks involves pairing 'big core 'little core possibly many identical pairs one chip pair operates one so-termed virtual core one real core fully powered running time 'big core used demand high 'little core employed demand low demand virtual core changes high low incoming core powered running state transferred outgoing shut processing continues new core switching done via cpufreq framework complete big.little iks implementation added linux 3.11. big.little iks improvement cluster migration main difference pair visible scheduler complex arrangement involves non-symmetric grouping 'big 'little cores single chip could one two 'big cores many 'little cores vice versa nvidia created something similar low-power 'companion core tegra 3 system-on-chip powerful use model big.little architecture heterogeneous multi-processing hmp enables use physical cores time threads high priority computational intensity case allocated big cores threads less priority less computational intensity background tasks performed little cores model implemented samsung exynos starting exynos 5 octa series 5420 5422 5430 apple mobile application processors starting apple a11 paired arrangement allows switching done transparently operating system using existing dynamic voltage frequency scaling dvfs facility existing dvfs support kernel e.g codice_1 linux simply see list frequencies/voltages switch sees fit like existing hardware however low-end slots activate 'little core high-end slots activate 'big core alternatively cores may exposed kernel scheduler decide process/thread executed required non-paired arrangement could possibly also used paired cores poses unique problems kernel scheduler least modern commodity hardware able assume cores smp system equal rather heterogeneous may 2017 arm announced dynamiq successor big.little dynamiq expected allow flexibility scalability designing multi-core processors contrast big.little increases maximum number cores cluster 8 allows varying core designs within single cluster 32 total clusters technology also offers fine grained per core voltage control faster l2 cache speeds however dynamiq incompatible previous arm designs initially supported cortex-a75 cortex-a55 cpu cores
[ 451, 6874, 278, 6416, 4847, 5371, 5472, 722, 1640, 3786, 5740, 5571, 7453, 7376, 6371, 1864, 677, 7666, 4537, 67, 3747, 4197, 3751, 701, 2532 ]
Validation
569
2
Installer_(macOS):installer macos installer application included macos progenitors openstep nextstep extracts installs files .pkg packages created next maintained apple inc. purpose help software developers create uniform software installers installer launches package metapackage file opened installation process vary substantially installer allows developers customize information user presented example made display custom welcome message software license readme installer also handles authentication checks packages valid installing allows developers run custom scripts several points installation process installer packages file extension prior mac os x leopard installer packages implemented mac os x packages packages collection files resided folders .pkg file extension mac os x leopard software packaging method changed use xar extensible archiver file format directory tree containing files packaged xar archive file extension instead distributing multiple files package allowed software files contained single file easier distribution benefit package signing
[ 3940, 713, 4690, 734, 405, 6832, 3989, 2597, 3322, 1502, 7584, 5786, 3336, 4740, 1897, 5450, 6505, 3342, 2627, 7609, 1171, 5109, 2284, 1178, 6188, 1187, 1562, 6909, 6548, 502, 6557, 2679, 3042, 6565, 2329, 3050, 523, 163, 6582, 5535, 51...
Test
570
4
Anomali:anomali anomali us-based cyber security company known threat intelligence analysis platform anomali founded 2013 threatstream rebranded anomali 2016 company gained investments major investors including gv formerly google ventures lumia capital company launched first version threatstream 2013 threatstream threat intelligence solution designed aggregate curate integrate threat data myriad sources threatstream platform notable product anomali known collaboration data integration microsoft company subsequently launched app store marketplace customers purchase trial premium threat intelligence anomali partners anomali also created trusted circles enable secure sharing among peers anomali enterprise launched 2016 solution detection active threats based machine learning optimized threat intelligence enabling organizations identify new attacks explore historical data uncover existing breaches anomali launched staxx free utility supporting stix taxii equipped free threat intelligence feed limo company works bank england numerous isacs received coverage various mainstream sources wall street journal bbc fortune harvard business review hill others anomali named cybersecurity 500 list
[]
Test
571
4
VPNBook:vpnbook vpnbook free virtual private network service service financed advertising donations service connects vpn via openvpn client pptp connection minimal variety geographic locations available servers include united states canada romania vpnbook used bypass governmental restrictions service connected two ways connection via third-party openvpn client pptp mac os x ios android ubuntu windows operating systems pptp support built software openvpn clients used also provides protocol stack file system process scheduling openvpn uses ssl protocol generally secure layer 2 tunnel protocol pptp review done pc magazine concluded service good choice among free vpn services even though certain functionality flaws service also reviewed techradar
[ 4759, 1559, 4014, 1805 ]
Test
572
2
Memory_debugger:memory debugger memory debugger also known runtime debugger debugger finding software memory problems memory leaks buffer overflows due bugs related allocation deallocation dynamic memory programs written languages garbage collection managed code might also need memory debuggers e.g memory leaks due living references collections memory debuggers work monitoring memory access allocations deallocation memory many memory debuggers require applications recompiled special dynamic memory allocation libraries whose apis mostly compatible conventional dynamic memory allocation libraries else use dynamic linking electric fence debugger debugs memory allocation malloc memory debuggers e.g valgrind work running executable virtual machine-like environment monitoring memory access allocation deallocation recompilation special memory allocation libraries required finding memory issues leaks extremely time consuming may manifest except certain conditions using tool detect memory misuse makes process much faster easier abnormally high memory utilization contributing factor software aging memory debuggers help programmers avoid software anomalies would exhaust computer system memory thus ensuring high reliability software even long runtimes static analysis tools also help find memory errors memory debuggers operate part application running static code analysis performed analyzing code without executing different techniques typically find different instances problems using together yields best result list tools useful memory debugging profiler used conjunction memory debugger
[ 1616, 5012, 549, 3351, 3515, 8066, 1174, 379, 2736, 1361, 6002, 1363, 5218, 573, 574, 3114, 1854, 7742, 1855, 1019, 1203, 4347, 4525, 7474, 3566, 4810, 2420, 56, 1584, 5771, 6567, 858, 4729, 4990, 5606, 2153, 6778, 5357, 8150, 5190, 492...
Test
573
2
Valgrind:valgrind valgrind programming tool memory debugging memory leak detection profiling valgrind originally designed free memory debugging tool linux x86 since evolved become generic framework creating dynamic analysis tools checkers profilers name valgrind reference main entrance valhalla norse mythology development release project named heimdall however name would conflicted security package valgrind essence virtual machine using just-in-time jit compilation techniques including dynamic recompilation nothing original program ever gets run directly host processor instead valgrind first translates program temporary simpler form called intermediate representation ir processor-neutral ssa-based form conversion tool see free whatever transformations would like ir valgrind translates ir back machine code lets host processor run valgrind recompiles binary code run host target simulated cpus architecture also includes gdb stub allow debugging target program runs valgrind monitor commands allow query valgrind tool various sorts information considerable amount performance lost transformations usually code tool inserts usually code run valgrind none tool nothing ir runs 1/4 1/5 speed normal program multiple tools included valgrind several external ones default used tool memcheck memcheck inserts extra instrumentation code around almost instructions keeps track validity unallocated memory starts invalid undefined initialized deterministic state possibly memory addressability whether memory address question points allocated non-freed memory block stored so-called v bits bits respectively data moved around manipulated instrumentation code keeps track v bits always correct single-bit level addition memcheck replaces standard c memory allocator implementation also includes memory guards around allocated blocks bits set invalid feature enables memcheck detect off-by-one errors program reads writes outside allocated block small amount problems memcheck detect warn include following price lost performance programs running memcheck usually run 20–30 times slower running outside valgrind use memory memory penalty per allocation thus developers run code memcheck valgrind tool time commonly use tools either trace specific bug verify latent bugs kind memcheck detect code addition memcheck valgrind several tools also several externally developed tools available one tool threadsanitizer another detector race conditions version 3.4.0 valgrind supports linux x86 x86-64 powerpc support added version 3.5.0 support linux armv7 used example certain smartphones added version 3.6.0 support solaris added version 3.11.0 unofficial ports unix-like platforms like freebsd openbsd netbsd version 3.7.0 arm/android platform support added since version 3.9.0 support linux mips64 little big endian mips dsp ase mips32 s390x decimal floating point instructions power8 power isa 2.07 instructions intel avx2 instructions intel transactional synchronization extensions rtm hle initial support hardware transactional memory power named main entrance valhalla norse mythology original author valgrind julian seward 2006 google-o'reilly open source award work valgrind several others also made significant contributions including cerion armour-brown jeremy fitzhardinge tom hughes nicholas nethercote paul mackerras dirk mueller bart van assche josef weidendorfer robert walsh used number linux-based projects addition performance penalty important limitation memcheck inability detect cases bounds errors use static stack-allocated data following code pass memcheck tool valgrind without incident despite containing errors described comments experimental valgrind tool exp-sgcheck written address limitation memcheck detect array overrun errors provided first access array within array bounds note exp-sgcheck detect array overrun code since first access array bounds detect array overrun error following code inability detect errors involving access stack allocated data especially noteworthy since certain types stack errors make software vulnerable classic stack smashing exploit
[ 5540, 3932, 5453, 5803, 3174, 1535, 1260, 7528, 1176, 6002, 1363, 2559, 4318, 572, 5571, 6725, 1011, 578, 3114, 7912, 6736, 584, 1019, 1203, 5055, 6118, 7555, 3559, 3220, 6567, 8150, 1227, 2153, 8136, 7499, 1237, 352, 1435 ]
Test
574
2
Splint_(programming_tool):splint programming tool splint short secure programming lint programming tool statically checking c programs security vulnerabilities coding mistakes formerly called lclint modern version unix lint tool splint ability interpret special annotations source code gives stronger checking possible looking source alone splint used gpsd part effort design zero defects splint free software released terms gnu general public license development activity splint stopped 2010 according cvs sourceforge september 2012 recent change repository november 2010 june 2018 git repository github concurs showing changes since november 2010 splint output fixed source
[ 1019, 1155, 3932, 3915, 572, 5571, 7848, 1435 ]
Train
575
4
LogicLocker:logiclocker logiclocker cross-vendor ransomware worm targets programmable logic controllers plcs used industrial control systems ics first described research paper released georgia institute technology malware capable hijacking multiple plcs various popular vendors researchers using water treatment plant model able demonstrate ability display false readings shut valves modify chlorine release poisonous levels using schneider modicon m241 schneider modicon m221 allen bradley micrologix 1400 plc ransomware designed bypass weak authentication mechanisms found various plcs lock legitimate users planting logicbomb plc 14 february 2017 noted 1,400 plcs used proof-of-concept attack accessible internet found using shodan attack method used logiclocker employs five stages initial infection horizontal vertical movement locking encryption negotiation initial infection take place various vulnerability exploits ics devices typically always state gives cyber-criminals ample time attempt compromise plc plcs generally strong authentication mechanisms place assist protecting potential attack initial infection could take place users clicking potentially malicious email attachment upon initial infection plc horizontal vertical movement achieved plc corporate network depending capabilities plc next stage attack locking attacker locks legitimate users inhibit prevent restoration efforts done password changes oem locking over-utilization plc resources changing ip/ports different locking methods offer varying degrees success strengths ensure successful attack encryption employed follow traditional cryptoransomware practices future negotiations lastly negotiations conducted attacker victim service restoration plcs contain email capability used send ransom message case micrologix 1400 plc used proof-of-concept attack assist defense vulnerability mitigation efforts several strategies employed endpoint security techniques password changes disabling unused ports protocols implementation access control lists acl maintaining proper backups firmware updates used significantly reduce attack surface presented cyber-criminals increased vigilant network monitoring used detect abnormalities protocol whitelisting firewalls network segmentation automated backups provide additional security provide decreased restoration time provided backups compromised attack training employees properly identify phishing emails prohibition usb devices incorporating comprehensive incident response plan used assist countering threat
[ 1376, 2491 ]
Test
576
6
Block_suballocation:block suballocation block suballocation feature computer file systems allows large blocks allocation units used making efficient use slack space end large files space would otherwise lost use internal fragmentation file systems n't support fragments feature also called tail merging tail packing commonly done packing tail last partial block multiple files single block file systems traditionally divided disk equally sized blocks simplify design limit worst-case fragmentation block sizes typically multiples 512 due size hard disk sectors files allocated traditional file systems whole blocks allocated individual files file sizes often multiples file system block size design inherently results last blocks files called tails occupying part block resulting called internal fragmentation confused external fragmentation waste space significant file system stores many small files become critical attempting use higher block sizes improve performance ffs derived unix file systems support fragments greatly mitigate effect block suballocation addresses problem dividing tail block way allow store fragments files block suballocation schemes perform allocation byte level however simply divide block smaller ones divisor usually power 2 example 38 kib file stored file system using 32 kib blocks file would normally span two blocks 64 kib storage remaining 26 kib second block becomes unused slack space 8 kib block suballocation however file would occupy 6 kib second block leave 2 kib 8 kib suballocation block slack free 24 kib block files file systems since designed take advantage unused space pack tails several files single shared tail block may first seem like would significantly increase file system fragmentation negative effect mitigated readahead features modern operating systems – dealing short files several tails may close enough another read together thus disk seek introduced file systems often employ heuristics order determine whether tail packing worthwhile given situation defragmentation software may use evolved heuristic scenarios majority files shorter half block size folder small source code files small bitmap images tail packing increase storage efficiency even twofold compared file systems without tail packing translates conservation disk space may also introduce performance increases due higher locality reference less data read also translating higher page cache efficiency however advantages negated increased complexity implementation widely used read-write file systems support block suballocation btrfs freebsd ufs2 called block level fragmentation popular reiserfs reiser4 longer common several read-only file systems use blocks thus implicitly using space efficiently suballocating file systems file systems double archive formats
[ 6117, 3685, 7038, 5842, 5571, 2350, 8167, 658, 3501, 2689, 4941 ]
Validation
577
1
Act_on_Health_Sector_Database:act health sector database act health sector database also known act health sector database 139/1998 health sector database act media colloquial names 1998 act icelandic parliament allowed icelandic government grant license private company creation national biological database store health information could used research act noted boldly introducing policy related biobanks subject controversy decode genetics lobbying act beneficiary license create database passing act spurred international discussion policies already place differences policy existed among biobanks establishment national database icelandic citizens raised discussion nature informed consent process project
[]
Train
578
2
Linux:linux linux family open source unix-like operating systems based linux kernel operating system kernel first released september 17 1991 linus torvalds linux typically packaged linux distribution distributions include linux kernel supporting system software libraries many provided gnu project many linux distributions use word linux name free software foundation uses name gnu/linux emphasize importance gnu software causing controversy popular linux distributions include debian fedora ubuntu commercial distributions include red hat enterprise linux suse linux enterprise server desktop linux distributions include windowing system x11 wayland desktop environment gnome kde plasma 5 distributions intended servers may omit graphics altogether include solution stack lamp linux freely redistributable anyone may create distribution purpose linux originally developed personal computers based intel x86 architecture since ported platforms operating system linux leading operating system servers big iron systems mainframe computers os used top500 supercomputers since november 2017 gradually eliminated competitors used around 2.3 percent desktop computers chromebook runs linux kernel-based chrome os dominates us k–12 education market represents nearly 20 percent sub- 300 notebook sales us linux also runs embedded systems i.e devices whose operating system typically built firmware highly tailored system includes routers automation controls televisions digital video recorders video game consoles smartwatches many smartphones tablet computers run android linux derivatives dominance android smartphones linux largest installed base general-purpose operating systems linux one prominent examples free open-source software collaboration source code may used modified distributed—commercially non-commercially—by anyone terms respective licenses gnu general public license unix operating system conceived implemented 1969 bell laboratories united states ken thompson dennis ritchie douglas mcilroy joe ossanna first released 1971 unix written entirely assembly language common practice time later key pioneering approach 1973 rewritten c programming language dennis ritchie exception hardware i/o routines availability high-level language implementation unix made porting different computer platforms easier due earlier antitrust case forbidding entering computer business required license operating system source code anyone asked result unix grew quickly became widely adopted academic institutions businesses 1984 divested bell labs freed legal obligation requiring free licensing bell labs began selling unix proprietary product users legally allowed modify unix gnu project started 1983 richard stallman goal creating complete unix-compatible software system composed entirely free software work began 1984 later 1985 stallman started free software foundation wrote gnu general public license gnu gpl 1989 early 1990s many programs required operating system libraries compilers text editors unix shell windowing system completed although low-level elements device drivers daemons kernel called gnu/hurd stalled incomplete linus torvalds stated gnu kernel available time 1991 would decided write although released 1992 due legal complications development 386bsd netbsd openbsd freebsd descended predated linux torvalds also stated 386bsd available time probably would created linux minix created andrew s. tanenbaum computer science professor released 1987 minimal unix-like operating system targeted students others wanted learn operating system principles although complete source code minix freely available licensing terms prevented free software licensing changed april 2000 1991 attending university helsinki torvalds became curious operating systems frustrated licensing minix time limited educational use began work operating system kernel eventually became linux kernel torvalds began development linux kernel minix applications written minix also used linux later linux matured linux kernel development took place linux systems gnu applications also replaced minix components advantageous use freely available code gnu project fledgling operating system code licensed gnu gpl reused computer programs long also released compatible license torvalds initiated switch original license prohibited commercial redistribution gnu gpl developers worked integrate gnu components linux kernel making fully functional free operating system linus torvalds wanted call invention freax portmanteau free freak x allusion unix start work system project makefiles included name freax half year torvalds already considered name linux initially dismissed egotistical order facilitate development files uploaded ftp server codice_1 funet september 1991 ari lemmke torvalds coworker helsinki university technology hut one volunteer administrators ftp server time think freax good name named project linux server without consulting torvalds later however torvalds consented linux demonstrate word linux pronounced torvalds included audio guide kernel source code another variant pronunciation adoption linux production environments rather used hobbyists started take first mid-1990s supercomputing community organizations nasa started replace increasingly expensive machines clusters inexpensive commodity computers running linux commercial use began dell ibm followed hewlett-packard started offering linux support escape microsoft monopoly desktop operating system market today linux systems used throughout computing embedded systems virtually supercomputers secured place server installations popular lamp application stack use linux distributions home enterprise desktops growing linux distributions also become popular netbook market many devices shipping customized linux distributions installed google releasing chrome os designed netbooks linux greatest success consumer market perhaps mobile device market android one dominant operating systems smartphones popular tablets recently wearables linux gaming also rise valve showing support linux rolling gaming oriented linux distribution linux distributions also gained popularity various local national governments federal government brazil greg kroah-hartman lead maintainer linux kernel guides development stallman heads free software foundation turn supports gnu components finally individuals corporations develop third-party non-gnu components third-party components comprise vast body work may include kernel modules user applications libraries linux vendors communities combine distribute kernel gnu components non-gnu components additional package management software form linux distributions linux-based system modular unix-like operating system deriving much basic design principles established unix 1970s 1980s system uses monolithic kernel linux kernel handles process control networking access peripherals file systems device drivers either integrated directly kernel added modules loaded system running gnu userland key part systems based linux kernel android notable exception project implementation c library functions wrapper system calls linux kernel necessary kernel-userspace interface toolchain broad collection programming tools vital linux development including compilers used build linux kernel coreutils implement many basic unix tools project also develops popular cli shell graphical user interface gui used linux systems built top implementation x window system recently linux community seeks advance wayland new display server protocol place x11 many open-source software projects contribute linux systems installed components linux system include following user interface also known shell either command-line interface cli graphical user interface gui controls attached associated hardware common embedded systems desktop systems default user interface usually graphical although cli commonly available terminal emulator windows separate virtual console cli shells text-based user interfaces use text input output dominant shell used linux bourne-again shell bash originally developed gnu project low-level linux components including various parts userland use cli exclusively cli particularly suited automation repetitive delayed tasks provides simple inter-process communication desktop systems popular user interfaces gui shells packaged together extensive desktop environments kde plasma gnome mate cinnamon unity lxde pantheon xfce though variety additional user interfaces exist popular user interfaces based x window system often simply called x provides network transparency permits graphical application running one system displayed another user may interact application however certain extensions x window system capable working network several x display servers exist reference implementation x.org server popular several types window managers exist x11 including tiling dynamic stacking compositing window managers provide means control placement appearance individual application windows interact x window system simpler x window managers dwm ratpoison i3wm herbstluftwm provide minimalist functionality elaborate window managers fvwm enlightenment window maker provide features built-in taskbar themes still lightweight compared desktop environments desktop environments include window managers part standard installations mutter gnome kwin kde xfwm xfce although users may choose use different window manager preferred wayland display server protocol intended replacement x11 protocol received wider adoption unlike x11 wayland need external window manager compositing manager therefore wayland compositor takes role display server window manager compositing manager weston reference implementation wayland gnome mutter kde kwin ported wayland standalone display servers enlightenment already successfully ported since version 19 linux currently two modern kernel-userspace apis handling video input devices v4l2 api video streams radio dvb api digital tv reception due complexity diversity different devices due large amount formats standards handled apis infrastructure needs evolve better fit devices also good userspace device library key success userspace applications able work formats supported devices primary difference linux many popular contemporary operating systems linux kernel components free open-source software linux operating system although far widely used free open-source software licenses based principle copyleft kind reciprocity work derived copyleft piece software must also copyleft common free software license gnu general public license gpl form copyleft used linux kernel many components gnu project linux-based distributions intended developers interoperability operating systems established computing standards linux systems adhere posix sus lsb iso ansi standards possible although date one linux distribution posix.1 certified linux-ft. free software projects although developed collaboration often produced independently fact software licenses explicitly permit redistribution however provides basis larger scale projects collect software produced stand-alone projects make available form linux distribution many linux distributions manage remote collection system software application software packages available download installation network connection allows users adapt operating system specific needs distributions maintained individuals loose-knit teams volunteer organizations commercial entities distribution responsible default configuration installed linux kernel general system security generally integration different software packages coherent whole distributions typically use package manager apt yum zypper pacman portage install remove update system software one central location distribution largely driven developer user communities vendors develop fund distributions volunteer basis debian well-known example others maintain community version commercial distributions red hat fedora suse opensuse many cities regions local associations known linux user groups lugs seek promote preferred distribution extension free software hold meetings provide free demonstrations training technical support operating system installation new users many internet communities also provide support linux users developers distributions free software open-source projects irc chatrooms newsgroups online forums another means support notable examples linuxquestions.org various distribution specific support community forums ones ubuntu fedora gentoo linux distributions host mailing lists commonly specific topic usage development given list several technology websites linux focus print magazines linux often bundle cover disks carry software even complete linux distributions although linux distributions generally available without charge several large corporations sell support contribute development components system free software analysis linux kernel showed 75 percent code december 2008 january 2010 developed programmers working corporations leaving 18 percent volunteers 7 unclassified major corporations provide contributions include dell ibm hp oracle sun microsystems part oracle nokia number corporations notably red hat canonical suse built significant business around linux distributions free software licenses various software packages distribution built linux kernel based explicitly accommodate encourage commercialization relationship linux distribution whole individual vendors may seen symbiotic one common business model commercial suppliers charging support especially business users number companies also offer specialized business version distribution adds proprietary support packages tools administer higher numbers installations simplify administrative tasks another business model give away software order sell hardware used norm computer industry operating systems cp/m apple dos versions mac os prior 7.6 freely copyable modifiable computer hardware standardized throughout 1980s became difficult hardware manufacturers profit tactic os would run manufacturer computer shared architecture linux distributions support dozens programming languages original development tools used building linux applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ go fortran many programming languages cross-platform reference implementation supports linux example php perl ruby python java go rust haskell first released 2003 llvm project provides alternative cross-platform open-source compiler many languages proprietary compilers linux include intel c++ compiler sun studio ibm xl c/c++ compiler basic form visual basic supported forms gambas freebasic xbasic terms terminal programming quickbasic turbo basic programming form qb64 common feature unix-like systems linux includes traditional specific-purpose programming languages targeted scripting text processing system configuration management general linux distributions support shell scripts awk sed make many programs also embedded programming language support configuring programming example regular expressions supported programs like grep locate traditional unix mta sendmail contains turing complete scripting system advanced text editor gnu emacs built around general purpose lisp interpreter distributions also include support php perl ruby python dynamic languages common linux also supports c via mono vala scheme guile scheme acts extension language targeting gnu system utilities seeking make conventionally small static compiled c programs unix design rapidly dynamically extensible via elegant functional high-level scripting system many gnu programs compiled optional guile bindings end number java virtual machines development kits run linux including original sun microsystems jvm hotspot ibm j2se well many open-source projects like kaffe jikesrvm gnome kde popular desktop environments provide framework developing applications projects based gtk+ qt widget toolkits respectively also used independently larger framework support wide variety languages number integrated development environments available including anjuta codelite eclipse geany activestate komodo kdevelop lazarus monodevelop netbeans qt creator long-established editors vim nano emacs remain popular linux kernel widely ported operating system kernel available devices ranging mobile phones supercomputers runs highly diverse range computer architectures including hand-held arm-based ipaq ibm mainframes system z9 system z10 specialized distributions kernel forks exist less mainstream architectures example elks kernel fork run intel 8086 intel 80286 16-bit microprocessors µclinux kernel fork may run systems without memory management unit kernel also runs architectures ever intended use manufacturer-created operating system macintosh computers powerpc intel processors pdas video game consoles portable music players mobile phones several industry associations hardware conferences devoted maintaining improving support diverse hardware linux freedomhec time support different hardware improved linux resulting off-the-shelf purchase good chance compatible besides linux distributions designed general-purpose use desktops servers distributions may specialized different purposes including computer architecture support embedded systems stability security localization specific region language targeting specific user groups support real-time applications commitment given desktop environment furthermore distributions deliberately include free software four hundred linux distributions actively developed dozen distributions popular general-purpose use popularity linux standard desktop computers laptops increasing years modern distributions include graphical user environment two popular environments kde plasma desktop xfce single official linux desktop exists rather desktop environments linux distributions select components pool free open-source software construct gui implementing less strict design guide gnome example human interface guidelines design guide gives human–machine interface important role graphical design also considering people disabilities even focusing security collaborative nature free software development allows distributed teams perform language localization linux distributions use locales localizing proprietary systems would cost-effective example sinhalese language version knoppix distribution became available significantly microsoft translated windows xp sinhalese case lanka linux user group played major part developing localized system combining knowledge university professors linguists local developers performance linux desktop controversial topic example 2007 con kolivas accused linux community favoring performance servers quit linux kernel development frustration lack focus desktop gave tell interview topic since significant amount development focused improving desktop experience projects upstart systemd aim faster boot time wayland mir projects aim replacing x11 enhancing desktop performance security appearance many popular applications available wide variety operating systems example mozilla firefox openoffice.org/libreoffice blender downloadable versions major operating systems furthermore applications initially developed linux pidgin gimp ported operating systems including windows macos due popularity addition growing number proprietary desktop applications also supported linux autodesk maya foundry nuke high-end field animation visual effects see list proprietary software linux details also several companies ported companies games linux linux also supported platform popular steam desura digital-distribution services many types applications available microsoft windows macos also run linux commonly either free software application exist functions application found another operating system application version works linux skype video games like dota 2 team fortress 2 furthermore wine project provides windows compatibility layer run unmodified windows applications linux sponsored commercial interests including codeweavers produces commercial version software since 2009 google also provided funding wine project crossover proprietary solution based open-source wine project supports running windows versions microsoft office intuit applications quicken quickbooks adobe photoshop versions cs2 many popular games world warcraft cases linux port software areas desktop publishing professional audio equivalent software available linux also possible run applications written android versions linux using anbox besides externally visible components x window managers non-obvious quite central role played programs hosted freedesktop.org d-bus pulseaudio major desktop environments gnome kde include offering graphical front-ends written using corresponding toolkit gtk+ qt display server another component longest time communicating x11 display server protocol clients prominent software talking x11 includes x.org server xlib frustration cumbersome x11 core protocol especially numerous extensions led creation new display server protocol wayland installing updating removing software linux typically done use package managers synaptic package manager packagekit yum extender major linux distributions extensive repositories often containing tens thousands packages software run linux available official repositories alternatively users install packages unofficial repositories download pre-compiled packages directly websites compile source code methods come different degrees difficulty compiling source code general considered challenging process new linux users hardly needed modern distributions method specific linux linux distributions also become popular netbook market many devices asus eee pc acer aspire one shipping customized linux distributions installed 2009 google announced chrome os minimal linux-based operating system using chrome browser main user interface chrome os run non-web applications except bundled file manager media player certain level support android applications added later versions netbooks shipped operating system termed chromebooks started appearing market june 2011 linux distributions long used server operating systems risen prominence area netcraft reported september 2006 eight ten two unknown os reliable internet hosting companies ran linux distributions web servers linux top position june 2008 linux distributions represented five top ten freebsd three ten microsoft two ten since february 2010 linux distributions represented six top ten freebsd three ten microsoft one ten linux top position linux distributions cornerstone lamp server-software combination linux apache mariadb/mysql perl/php/python achieved popularity among developers one common platforms website hosting linux distributions become increasingly popular mainframes partly due pricing open-source model december 2009 computer giant ibm reported would predominantly market sell mainframe-based enterprise linux server linuxcon north america 2015 ibm announced linuxone series mainframes specifically designed run linux open-source software linux distributions also dominant operating systems supercomputers november 2017 supercomputers 500 list run variant linux several operating systems smart devices smartphones tablet computers smart tvs in-vehicle infotainment ivi systems based linux major platforms systems include android firefox os mer tizen android become dominant mobile operating system smartphones running 79.3 units sold worldwide second quarter 2013 android also popular operating system tablets android smart tvs in-vehicle infotainment systems also appeared market cellphones pdas running linux open-source platforms became common 2007 examples include nokia n810 openmoko neo1973 motorola rokr e8 continuing trend palm later acquired hp produced new linux-derived operating system webos built line palm pre smartphones nokia maemo one earliest mobile operating systems based debian later merged intel moblin another linux-based operating system form meego project later terminated favor tizen operating system targeted mobile devices well ivi tizen project within linux foundation several samsung products already running tizen samsung gear 2 significant example samsung z smartphones use tizen instead android result meego termination mer project forked meego codebase create basis mobile-oriented operating systems july 2012 jolla announced sailfish os mobile operating system built upon mer technology mozilla firefox os consists linux kernel hardware abstraction layer web-standards-based runtime environment user interface integrated web browser canonical released ubuntu touch aiming bring convergence user experience mobile operating system desktop counterpart ubuntu operating system also provides full ubuntu desktop connected external monitor due low cost ease customization linux often used embedded systems non-mobile telecommunications equipment sector majority customer-premises equipment cpe hardware runs linux-based operating system openwrt community driven example upon many oem firmware releases based example popular tivo digital video recorder also uses customized linux several network firewalls routers makers cisco/linksys korg oasys korg kronos yamaha motif xs/motif xf music workstations yamaha s90xs/s70xs yamaha mox6/mox8 synthesizers yamaha motif-rack xs tone generator module roland rd-700gx digital piano also run linux linux also used stage lighting control systems wholehogiii console past games available linux recent years games released support linux especially indie games exception aaa title games android popular mobile platform uses linux kernel gained much developer interest one main platforms mobile game development along ios operating system apple iphone ipad devices february 14 2013 valve released linux version steam popular game distribution platform pc many steam games ported linux december 13 2013 valve released steamos gaming oriented os based debian beta testing plans ship steam machines gaming entertainment platform valve also developed vogl opengl debugger intended aid video game development well porting source game engine desktop linux result valve effort several prominent games dota 2 team fortress 2 portal portal 2 left 4 dead 2 natively available desktop linux july 31 2013 nvidia released shield attempt use android specialized gaming platform linux users play windows games wine crossover linux 22 august 2018 valve released fork wine called proton aimed gaming features improvements vanilla wine vulkan-based directx 11 12 implementations steam integration better full screen game controller support improved performance multi-threaded games due flexibility customizability free open-source nature linux becomes possible highly tune linux specific purpose two main methods creating specialized linux distribution building scratch general-purpose distribution base distributions often used purpose include debian fedora ubuntu based debian arch linux gentoo slackware contrast linux distributions built scratch general-purpose bases instead focus jeos philosophy including necessary components avoiding resource overhead caused components considered redundant distribution use cases home theater pc htpc pc mainly used entertainment system especially home theater system normally connected television often additional audio system openelec linux distribution incorporates media center software kodi os tuned specifically htpc built ground adhering jeos principle os lightweight suitable confined usage range htpc also special editions linux distributions include mythtv media center software mythbuntu special edition ubuntu kali linux debian-based linux distribution designed digital forensics penetration testing comes preinstalled several software applications penetration testing identifying security exploits ubuntu derivative backbox provides pre-installed security network analysis tools ethical hacking arch-based blackarch includes 2100 tools pentesting security researching many linux distributions created privacy secrecy network anonymity information security mind including tails tin hat linux tinfoil hat linux lightweight portable security distribution based arch linux developed united states department defense tor-ramdisk minimal distribution created solely host network anonymity software tor linux live cd sessions long used tool recovering data broken computer system repairing system building upon idea several linux distributions tailored purpose emerged use gparted partition editor additional data recovery system repair software spacex uses multiple redundant fault-tolerant design falcon 9 rocket merlin engine controlled three voting computers two physical processors per computer constantly check operation linux inherently fault-tolerant operating system function whole system including hardware flight computer software makes purpose flexibility commercial off-the-shelf parts system-wide radiation-tolerant design used instead radiation hardened parts spacex conducted 76 launches falcon 9 since 2010 one successfully delivered primary payloads intended orbit plans use transport astronauts international space station addition windows used operating system non-mission critical systemslaptops used board space station examplebut replaced linux first linux-powered humanoid robot also undergoing in-flight testing jet propulsion laboratory used linux number years help projects relating construction unmanned space flight deep space exploration nasa uses linux robotics mars rover ubuntu linux save data satellites linux distributions created provide hands-on experience coding source code students devices raspberry pi addition producing practical device intention show students things work hood ubuntu derivatives edubuntu linux schools project well debian derivative skolelinux provide education-oriented software packages also include tools administering building school computer labs computer-based classrooms linux terminal server project ltsp instant webkiosk webconverger browser-based linux distributions often used web kiosks digital signage thinstation minimalist distribution designed thin clients rocks cluster distribution tailored high-performance computing clusters general-purpose linux distributions target specific audience users specific language geographical area examples include ubuntu kylin chinese language users blankon targeted indonesians profession-specific distributions include ubuntu studio media creation dnalinux bioinformatics also muslim-oriented distribution name sabily consequently also provides islamic tools certain organizations use slightly specialized linux distributions internally including gendbuntu used french national gendarmerie goobuntu used internally google astra linux developed specifically russian army many quantitative studies free/open-source software focus topics including market share reliability numerous studies specifically examining linux linux market growing rapidly revenue servers desktops packaged software running linux expected exceed 35.7 billion 2008 analysts proponents attribute relative success linux security reliability low cost freedom vendor lock-in linux kernel licensed gnu general public license gpl version 2 gpl requires anyone distributes software based source code license must make originating source code modifications available recipient terms key components typical linux distribution also mainly licensed gpl may use licenses many libraries use gnu lesser general public license lgpl permissive variant gpl x.org implementation x window system uses mit license torvalds states linux kernel move version 2 gpl version 3 specifically dislikes provisions new license prohibit use software digital rights management would also impractical obtain permission copyright holders number thousands 2001 study red hat linux 7.1 found distribution contained 30 million source lines code using constructive cost model study estimated distribution required eight thousand person-years development time according study software developed conventional proprietary means would cost us dollars develop united states source code 71 written c programming language many languages used including c++ lisp assembly language perl python fortran various shell scripting languages slightly half lines code licensed gpl linux kernel 2.4 million lines code 8 total later study analysis performed debian version 4.0 etch released 2007 distribution contained close 283 million source lines code study estimated would required seventy three thousand man-years cost us dollars develop conventional means united states name linux trademark registered linus torvalds initially nobody registered august 15 1994 william r. della croce jr. filed trademark linux demanded royalties linux distributors 1996 torvalds affected organizations sued trademark assigned torvalds 1997 case settled licensing trademark since handled linux mark institute lmi torvalds stated trademarked name prevent someone else using lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense free software foundation fsf prefers gnu/linux name referring operating system whole considers linux distributions variants gnu operating system initiated 1983 richard stallman president fsf explicitly take issue name android android os also operating system based linux kernel gnu part minority public figures software projects stallman fsf notably debian sponsored fsf 1996 also use gnu/linux referring operating system whole media common usage however refers family operating systems simply linux many large linux distributions example suse linux red hat enterprise linux contrast linux distributions containing free software use gnu/linux simply gnu trisquel gnu/linux parabola gnu/linux-libre blag linux gnu gnewsense 8 13 modern linux distribution made gnu components range depending whether gnome considered part gnu determined counting lines source code making ubuntu natty release meanwhile 6 taken linux kernel increased 9 including direct dependencies
[ 5717, 5719, 5, 9, 10, 5726, 13, 26, 5744, 5745, 5753, 5755, 42, 5759, 46, 5762, 55, 58, 65, 5780, 5783, 5786, 5787, 5789, 83, 5797, 91, 5803, 99, 100, 5810, 5815, 5820, 113, 116, 5826, 5829, 5833, 126, 5841, 138, 141, 145, 5857, ...
Test
579
7
Planview:planview planview global enterprise software company headquartered austin texas company founded 1989 austin texas patrick durbin 1997 company launched complete web-based resource project portfolio management ppm software planview enterprise version 14 2017 2010 company moved cloud offer software service saas solutions december 2013 insight venture partners acquired substantial interest planview august 2014 planview acquired projectplace stockholm-based project collaboration company planview went acquire troux technologies austin-based enterprise architecture management software company may 2015 august 1 2016 company announced acquisition san francisco-based innotas thus extending project portfolio management software leadership mid-market january 2017 thoma bravo acquired planview becoming majority shareholder insight venture partners maintained original 2014 capital investment company december 2017 planview acquired leankit december 2018 planview acquired spigit planview recognized visionary magic quadrant enterprise architecture tools gartner magic quadrant enterprise architecture tools – may 24 2017 gartner names planview leader project portfolio management ppm gartner 2017 magic quadrant project portfolio management worldwide may 25 2017 planview cited leader troux forrester wave™ enterprise architecture management suites q2 2017 – june 14 2017 forrester research identifies projectplace leader rapidly growing work collaboration market forrester wave™ enterprise collaborative work management q4 2016 ventana research awards 2016 cio/it leadership award mentor graphics using planview enterprise projectplace ensure resources working initiatives highest strategic value constellation research names projectplace 2016 constellation shortlist™ social task management
[]
Test
580
4
Cyber_Storm_Exercise:cyber storm exercise cyber storm exercise simulated exercise overseen department homeland security took place february 6 february 10 2006 purpose testing nation defenses digital espionage simulation targeted primarily american security organizations officials united kingdom canada australia new zealand participated well exercise simulated large scale attack critical digital infrastructure communications transportation energy production simulation took place series incidents included exercise computers running simulation came attack players heavily censored files released associated press reveal time exercise organizers sent every one involved e-mail marked important telling participants simulation attack game control computers cyber storm exercise highlighted gaps shortcomings nation cyber defenses cyber storm exercise report found institutions attack hard time getting bigger picture instead focused single incidents treating individual discrete light test department homeland security raised concern relatively modest resources assigned cyber-defense would overwhelmed real attack
[ 7155, 3486, 6544 ]
Test
581
4
Composite_Blocking_List:composite blocking list computer networking composite blocking list cbl dns-based blackhole list suspected e-mail spam sending computer infections cbl takes source data large spamtraps/mail infrastructures lists ips exhibiting characteristics cbl attempts avoid listing real mail servers certain misconfigurations mail servers make system appear infected example servers send helo 'localhost similar incorrect domain entries automatically expire period time cbl provide public access gathered evidence cbl data used spamhaus xbl list
[ 5733, 5401 ]
Test
582
1
Interfolio:interfolio interfolio academic faculty management software higher education technology company based washington d.c company provides software assist shared governance processes faculty activity tracking tools assist institutional accreditation reporting january 2016 company acquired 12 million investor funding interfolio founded georgetown university senior steve goldenberg 1999 interfolio ’ services represents complete faculty lifecycle information system interfolio created streamline college application process academic jobs providing online portfolio application system principal interfolio services includes dossier service collecting curating delivering academic materials scholarly opportunities interfolio based module faculty information includes workflow evaluation suite well tool faculty activity reporting
[]
Validation
583
7
Knowland_Group:knowland group knowland web-based software company provides business development products services hospitality industry knowland traces roots back small software engineering firm firm spent months developing entirely new kind hotel readerboard service heavily reliant web technology client industry client backed knowland ’ founders recognized hospitality industry ’ need higher standard market intelligence decided start hospitality field research service fall 2004 online readerboard service launched knowland signed first client holiday inn arlington va. september 2004 2005 company expanded 20 markets serving diverse clientele single multi-property clients end 2006 knowland 400 clients 60 markets tracked 200,000 events 2007 knowland introduced insight tool generates targeted sales leads details prospect ’ event booking history company also activated 7,000 square foot call center expand infrastructure customer support in-depth contact event research sales activities behalf customers event booking center employs research sales support professionals specialize cold calling become extension hotel clients ’ sales staff knowland launched target net meetings management sales force automation platform 2010 addition managing events start finish target net also generated sales leads opportunities product discontinued 2015 today knowland provider intuitive business intelligence products hospitality industry 3,000 client hotels 50,000 users globally knowland provider business development solutions hospitality industry target net insight readers cloud-based accessible computer connected internet target net salesforce automation meetings management tool allows hoteliers manage sales funnel start finish knowland longer sells target net product continues offer support clients already using insight search engine sales lead-generation tool gives hotel sales teams access database groups held millions meetings hotels conference centers 2014 knowland released insight 3.0 effort enhance insight platform transformed traditional search engine leads database customizable meeting intelligence tool event professionals insight 3.0 included new features anonymous reviews groups events ability follow groups properties people detailed group profiles receiving many unfavorable reviews clients regarding changes insight 3.0 release knowland launched insight 3.1 following year 2015 insight 3.1 designed almost entirely around user feedback release leveraged powerful enhanced search capabilities tool putting popular search features spotlight insight 3.1 made focus knowland technology less social media-influenced networking power raw historical data groups planners meetings contact information help clients optimize sales tactics readers online readerboard service offers daily reporting data groups hold meetings events hotels competitor properties readers combines online tool knowland ’ version traditional readerboard report addition telephone-verified contact information week approximately 400 field researchers take digital photos hotel readerboards photos uploaded night knowland database data made available online clients next morning new groups constantly added database detailed profiles created updated group april 2014 knowland released new data management process help maintain accuracy freshness information provided knowland group ranked 26th deloitte ’ 2010 technology fast 500™ list october 2010 list identifies fastest-growing technology media telecommunications life sciences clean technology companies north america rankings award based fiscal revenue growth 2005–2009 knowland grew 5,764 percent knowland ranked fifth 190 companies software industry largest industry recognized fast 500™ list knowland ranked first greater philadelphia fast 50 list target net knowland ’ sales force automation meetings management tool received 2010 product year award technology marketing corporation ’ customer interaction solutions magazine award given annually companies based vision leadership diligence
[ 2961, 2054 ]
Validation
584
3
Advanced_Vector_Extensions:advanced vector extensions advanced vector extensions avx also known sandy bridge new extensions extensions x86 instruction set architecture microprocessors intel amd proposed intel march 2008 first supported intel sandy bridge processor shipping q1 2011 later amd bulldozer processor shipping q3 2011 avx provides new features new instructions new coding scheme avx2 expands integer commands 256 bits introduces fused multiply-accumulate fma operations avx-512 expands avx 512-bit support using new evex prefix encoding proposed intel july 2013 first supported intel knights landing processor shipped 2016 avx uses sixteen ymm registers perform single instruction multiple pieces data see simd ymm register hold simultaneous operations math width simd registers increased 128 bits 256 bits renamed xmm0–xmm7 ymm0–ymm7 x86-64 mode ymm0–ymm15 legacy sse instructions still utilized via vex prefix operate lower 128 bits ymm registers avx introduces three-operand simd instruction format destination register distinct two source operands example sse instruction using conventional two-operand form b use non-destructive three-operand form c b preserving source operands avx three-operand format limited instructions simd operands ymm include instructions general purpose registers e.g eax support first appear avx2 alignment requirement simd memory operands relaxed new vex coding scheme introduces new set code prefixes extends opcode space allows instructions two operands allows simd vector registers longer 128 bits vex prefix also used legacy sse instructions giving three-operand form making interact efficiently avx instructions without need vzeroupper vzeroall avx instructions support 128-bit 256-bit simd 128-bit versions useful improve old code without needing widen vectorization avoid penalty going sse avx also faster early amd implementations avx mode sometimes known avx-128 avx instructions addition ones 256-bit extensions legacy 128-bit sse instructions usable 128-bit 256-bit operands cpus listed families support avx generally cpus commercial denomination core i3/i5/i7 support whereas pentium celeron cpus n't issues regarding compatibility future intel amd processors discussed xop instruction set gcc starting version 4.6 although 4.3 branch certain support intel compiler suite starting version 11.1 support avx visual studio 2010/2012 compiler supports avx via intrinsic /arch avx switch open64 compiler version 4.5.1 supports avx -mavx flag absoft supports -mavx flag pathscale supports via -mavx flag free pascal compiler supports avx avx2 -cfavx -cfavx2 switches version 2.7.1 vector pascal compiler supports avx via -cpuavx32 flag gnu assembler gas inline assembly functions support instructions accessible via gcc intel primitives intel inline assembler closely compatible gas although general handling local references within inline code assemblers masm vs2010 version yasm fasm nasm jwasm avx adds new register-state 256-bit wide ymm register file explicit operating system support required properly save restore avx expanded registers context switches following operating system versions support avx advanced vector extensions 2 avx2 also known haswell new instructions expansion avx instruction set introduced intel haswell microarchitecture avx2 makes following additions sometimes another extension using different cpuid flag considered part avx2 instructions listed page avx-512 512-bit extensions 256-bit advanced vector extensions simd instructions x86 instruction set architecture proposed intel july 2013 scheduled supported 2015 intel knights landing processor avx-512 instruction encoded new evex prefix allows 4 operands 7 new 64-bit opmask registers scalar memory mode automatic broadcast explicit rounding control compressed displacement memory addressing mode width register file increased 512 bits total register count increased 32 registers zmm0-zmm31 x86-64 mode avx-512 consists multiple extensions meant supported processors implementing instruction set consists following core extension avx-512f avx-512 foundation required implementations though current processors also support cd conflict detection computing coprocessors additionally support er pf 4vnniw 4fmaps vpopcntdq desktop processors support vl dq bw ifma vbmi vpopcntdq vpclmulqdq etc updated sse/avx instructions avx-512f use mnemonics avx versions operate 512-bit zmm registers also support 128/256 bit xmm/ymm registers avx-512vl byte word doubleword quadword integer operands avx-512bw/dq vbmi
[ 3942, 3955, 1465, 742, 744, 5055, 2226, 410, 6133, 766, 1881, 5431, 2977, 2989, 4759, 6173, 6523, 811, 1556, 1961, 2325, 4077, 6563, 5165, 2332, 3747, 6236, 6956, 4108, 2000, 1252, 4845, 6969, 3443, 5559, 6616, 573, 5571, 578, 5934, 415...
Test