node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
585
5
Asynchronous_transfer_mode:asynchronous transfer mode asynchronous transfer mode atm according atm forum telecommunications concept defined ansi itu formerly ccitt standards carriage complete range user traffic including voice data video signals atm developed meet needs broadband integrated services digital network defined late 1980s designed integrate telecommunication networks additionally designed networks must handle traditional high-throughput data traffic e.g. file transfers real-time low-latency content voice video reference model atm approximately maps three lowest layers iso-osi reference model network layer data link layer physical layer atm core protocol used sonet/sdh backbone public switched telephone network pstn integrated services digital network isdn use declining favour ip atm provides functionality similar circuit switching packet switching networks atm uses asynchronous time-division multiplexing encodes data small fixed-sized packets iso-osi frames called cells differs approaches internet protocol ethernet use variable sized packets frames atm uses connection-oriented model virtual circuit must established two endpoints actual data exchange begins virtual circuits may “ permanent ” i.e dedicated connections usually preconfigured service provider “ switched ” i.e set per-call basis using signaling disconnected call terminated use atm technology eventually largely superseded internet protocol ip -only technology wireless mobile atm never established significant foothold iso-osi reference model data link layer layer 2 basic transfer units generically called frames atm frames fixed 53 octets bytes length specifically called cells speech signal reduced packets forced share link bursty data traffic traffic large data packets matter small speech packets could made would always encounter full-size data packets normal queuing conditions cells might experience maximum queuing delays avoid issue atm packets cells small size addition fixed cell structure means atm readily switched hardware without inherent delays introduced software switched routed frames thus designers atm utilized small data cells reduce jitter delay variance case multiplexing data streams reduction jitter also end-to-end round-trip delays particularly important carrying voice traffic conversion digitized voice analogue audio signal inherently real-time process good job decoder codec needs evenly spaced time stream data items next data item available needed codec choice produce silence guess — data late useless time period converted signal already passed time design atm 155 mbit/s synchronous digital hierarchy sdh 135 mbit/s payload considered fast optical network link many plesiochronous digital hierarchy pdh links digital network considerably slower ranging 1.544 45 mbit/s us 2 34 mbit/s europe 155 mbit/s typical full-length 1,500 byte 12,000-bit data packet sufficient contain maximum-sized ip packet ethernet would take 77.42 µs transmit lower-speed link 1.544 mbit/s t1 line packet would take 7.8 milliseconds queuing delay induced several data packets might exceed figure 7.8 ms several times addition packet generation delay shorter speech packet clearly unacceptable speech traffic needs low jitter data stream fed codec produce good-quality sound packet voice system produce low jitter number ways design atm aimed low-jitter network interface however cells introduced design provide short queuing delays continuing support datagram traffic atm broke packets data voice streams 48-byte chunks adding 5-byte routing header one could reassembled later choice 48 bytes political rather technical ccitt itu-t standardizing atm parties united states wanted 64-byte payload felt good compromise larger payloads optimized data transmission shorter payloads optimized real-time applications like voice parties europe wanted 32-byte payloads small size therefore short transmission times simplify voice applications respect echo cancellation european parties eventually came around arguments made americans france others held shorter cell length 32 bytes france would able implement atm-based voice network calls one end france requiring echo cancellation 48 bytes plus 5 header bytes 53 chosen compromise two sides 5-byte headers chosen thought 10 payload maximum price pay routing information atm multiplexed 53-byte cells instead packets reduced worst-case cell contention jitter factor almost 30 reducing need echo cancellers atm cell consists 5-byte header 48-byte payload payload size 48 bytes chosen described atm defines two different cell formats user–network interface uni network–network interface nni atm links use uni cell format atm uses pt field designate various special kinds cells operations administration management oam purposes delineate packet boundaries atm adaptation layers aal significant bit msb pt field 0 user data cell two bits used indicate network congestion general purpose header bit available atm adaptation layers msb 1 management cell two bits indicate type network management segment network management end-to-end resource management reserved future use several atm link protocols use hec field drive crc-based framing algorithm allows locating atm cells overhead beyond otherwise needed header protection 8-bit crc used correct single-bit header errors detect multi-bit header errors multi-bit header errors detected current subsequent cells dropped cell header errors found uni cell reserves gfc field local flow control/submultiplexing system users intended allow several terminals share single network connection way two integrated services digital network isdn phones share single basic rate isdn connection four gfc bits must zero default nni cell format replicates uni format almost exactly except 4-bit gfc field re-allocated vpi field extending vpi 12 bits thus single nni atm interconnection capable addressing almost 2 vps almost 2 vcs practice vp vc numbers reserved atm supports different types services via aals standardized aals include aal1 aal2 aal5 rarely used aal3 aal4 aal1 used constant bit rate cbr services circuit emulation synchronization also maintained aal1 aal2 aal4 used variable bitrate vbr services aal5 data aal use given cell encoded cell instead negotiated configured endpoints per-virtual-connection basis following initial design atm networks become much faster 1500 byte 12000-bit full-size ethernet frame takes 1.2 µs transmit 10 gbit/s network reducing need small cells reduce jitter due contention consider makes case replacing atm ethernet network backbone increased link speeds alleviate jitter due queuing additionally hardware implementing service adaptation ip packets expensive high speeds specifically speeds oc-3 cost segmentation reassembly sar hardware makes atm less competitive ip packet sonet pos fixed 48-byte cell payload atm suitable data link layer directly underlying ip without need sar data link level since osi layer ip operates must provide maximum transmission unit mtu least 576 bytes sar performance limits mean fastest ip router atm interfaces stm16 stm64 actually compares pos operate oc-192 stm64 higher speeds expected future limits based segmentation reassembly sar slower congested links 622 mbit/s atm make sense reason asymmetric digital subscriber line adsl systems use atm intermediate layer physical link layer layer 2 protocol like ppp ethernet lower speeds atm provides useful ability carry multiple logical circuits single physical virtual medium although techniques exist multi-link ppp ethernet vlans optional vdsl implementations dsl used access method atm network allowing dsl termination point telephone central office connect many internet service providers across wide-area atm network united states least allowed dsl providers provide dsl access customers many internet service providers since one dsl termination point support multiple isps economic feasibility dsl substantially improved atm operates channel-based transport layer using virtual circuits vcs encompassed concept virtual paths vp virtual channels every atm cell 8- 12-bit virtual path identifier vpi 16-bit virtual channel identifier vci pair defined header vci together vpi used identify next destination cell passes series atm switches way destination length vpi varies according whether cell sent user-network interface edge network sent network-network interface inside network cells traverse atm network switching takes place changing vpi/vci values label swapping although vpi/vci values necessarily consistent one end connection concept circuit consistent unlike ip given packet could get destination different route others atm switches use vpi/vci fields identify virtual channel link vcl next network cell needs transit way final destination function vci similar data link connection identifier dlci frame relay logical channel number logical channel group number x.25 another advantage use virtual circuits comes ability use multiplexing layer allowing different services voice frame relay n* 64 channels ip vpi useful reducing switching table virtual circuits common paths another key atm concept involves traffic contract atm circuit set switch circuit informed traffic class connection atm traffic contracts form part mechanism quality service qos ensured four basic types several variants set parameters describing connection vbr real-time non-real-time variants serves bursty traffic non-real-time sometimes abbreviated vbr-nrt traffic classes also introduce concept cell-delay variation tolerance cdvt defines clumping cells time maintain network performance networks may apply traffic policing virtual circuits limit traffic contracts entry points network i.e user–network interfaces unis network-to-network interfaces nnis usage/network parameter control upc npc reference model given itu-t atm forum upc npc generic cell rate algorithm gcra version leaky bucket algorithm cbr traffic normally policed pcr cdvt alone whereas vbr traffic normally policed using dual leaky bucket controller pcr cdvt scr maximum burst size mbs mbs normally packet sar-sdu size vbr vc cells traffic virtual circuit exceeding traffic contract determined gcra network either drop cells mark cell loss priority clp bit identify cell potentially redundant basic policing works cell cell basis sub-optimal encapsulated packet traffic discarding single cell invalidate whole packet result schemes partial packet discard ppd early packet discard epd created discard whole series cells next packet starts reduces number useless cells network saving bandwidth full packets epd ppd work aal5 connections use end packet marker atm user-to-atm user auu indication bit payload-type field header set last cell sar-sdu traffic shaping usually takes place network interface card nic user equipment attempts ensure cell flow vc meet traffic contract i.e cells dropped reduced priority uni since reference model given traffic policing network gcra algorithm normally used shaping well single dual leaky bucket implementations may used appropriate atm build virtual circuits virtual paths either statically dynamically static circuits permanent virtual circuits pvcs paths permanent virtual paths pvps require circuit composed series segments one pair interfaces passes pvps pvcs though conceptually simple require significant effort large networks also support re-routing service event failure dynamically built pvps soft pvps spvps pvcs soft pvcs spvcs contrast built specifying characteristics circuit service contract two end points atm networks create remove switched virtual circuits svcs demand requested end piece equipment one application svcs carry individual telephone calls network telephone switches inter-connected using atm svcs also used attempts replace local area networks atm atm networks supporting spvps spvcs svcs use private network node interface private network-to-network interface pnni protocol pnni uses shortest-path-first algorithm used ospf is-is route ip packets share topology information switches select route network pnni also includes powerful summarization mechanism allow construction large networks well call admission control cac algorithm determines availability sufficient bandwidth proposed route network order satisfy service requirements vc vp network must establish connection two parties send cells atm called virtual circuit vc permanent virtual circuit pvc created administratively end points switched virtual circuit svc created needed communicating parties svc creation managed signaling requesting party indicates address receiving party type service requested whatever traffic parameters may applicable selected service call admission performed network confirm requested resources available route exists connection atm specifies following three layers atm became popular telephone companies many computer makers 1990s however even end decade better price/performance internet protocol-based products competing atm technology integrating real-time bursty network traffic companies fore systems focused atm products large vendors cisco systems provided atm option burst dot-com bubble still predicted atm going dominate however 2005 atm forum trade organization promoting technology merged groups promoting technologies eventually became broadband forum wireless atm mobile atm consists atm core network wireless access network atm cells transmitted base stations mobile terminals mobility functions performed atm switch core network known crossover switch similar msc mobile switching center gsm networks advantage wireless atm high bandwidth high speed handoffs done layer 2 early 1990s bell labs nec research labs worked actively field andy hopper cambridge university computer laboratory also worked area wireless atm forum formed standardize technology behind wireless atm networks forum supported several telecommunication companies including nec fujitsu mobile atm aimed provide high speed multimedia communications technology capable delivering broadband mobile communications beyond gsm wlans
[ 1068, 1916, 1543, 1364, 5822, 2650, 4783, 3462, 5492, 2062, 3821, 1784, 3060, 4553, 5880, 1988, 2352 ]
Validation
586
9
Language_for_Systems_Development:language systems development language systems development lsd programming language developed 1971 brown university ibm s/360 language also referred lsyd due negative connotations acronym lsd time lsd derived pl/i
[ 5932, 3509 ]
Test
587
4
List_of_compact_discs_sold_with_Extended_Copy_Protection:list compact discs sold extended copy protection following compact discs sold sony bmg shipped computer software known extended copy protection xcp result microsoft windows computer used play cds likely xcp installed cause number serious security problems several security software vendors including microsoft regard xcp trojan horse spyware rootkit mac os x systems used play cds may affected similar program mediamax
[ 4759, 7287, 1805, 6823 ]
Validation
588
4
Wireshark:wireshark wireshark free open-source packet analyzer used network troubleshooting analysis software communications protocol development education originally named ethereal project renamed wireshark may 2006 due trademark issues wireshark cross-platform using qt widget toolkit current releases implement user interface using pcap capture packets runs linux macos bsd solaris unix-like operating systems microsoft windows also terminal-based non-gui version called tshark wireshark programs distributed tshark free software released terms gnu general public license wireshark similar tcpdump graphical front-end plus integrated sorting filtering options wireshark lets user put network interface controllers promiscuous mode supported network interface controller see traffic visible interface including unicast traffic sent network interface controller mac address however capturing packet analyzer promiscuous mode port network switch traffic switch necessarily sent port capture done capturing promiscuous mode necessarily sufficient see network traffic port mirroring various network taps extend capture point network simple passive taps extremely resistant tampering gnu/linux bsd macos libpcap 1.0.0 later wireshark 1.4 later also put wireless network interface controllers monitor mode remote machine captures packets sends captured packets machine running wireshark using tzsp protocol protocol used omnipeek wireshark dissects packets analyze packets captured remote machine time captured late 1990s gerald combs computer science graduate university missouri–kansas city working small internet service provider commercial protocol analysis products time priced around 1500 run company primary platforms solaris linux gerald began writing ethereal released first version around 1998 ethereal trademark owned network integration services may 2006 combs accepted job cace technologies combs still held copyright ethereal source code rest re-distributable gnu gpl used contents ethereal subversion repository basis wireshark repository however ethereal trademark changed name wireshark 2010 riverbed technology purchased cace took primary sponsor wireshark ethereal development ceased ethereal security advisory recommended switching wireshark wireshark several industry awards years including eweek infoworld pc magazine also top-rated packet sniffer insecure.org network security tools survey sourceforge project month august 2010 combs continues maintain overall code wireshark issue releases new versions software product website lists 600 additional contributing authors wireshark data capturing program understands structure encapsulation different networking protocols parse display fields along meanings specified different networking protocols wireshark uses pcap capture packets capture packets types networks pcap supports wireshark native network trace file format libpcap format supported libpcap winpcap exchange captured network traces applications use format including tcpdump ca netmaster also read captures network analyzers snoop network general sniffer microsoft network monitor capturing raw network traffic interface requires elevated privileges platforms reason older versions ethereal/wireshark tethereal/tshark often ran superuser privileges taking account huge number protocol dissectors called traffic captured pose serious security risk given possibility bug dissector due rather large number vulnerabilities past many allowed remote code execution developers doubts better future development openbsd removed ethereal ports tree prior openbsd 3.6 elevated privileges needed operations example alternative run tcpdump dumpcap utility comes wireshark superuser privileges capture packets file later analyze packets running wireshark restricted privileges emulate near realtime analysis captured file may merged mergecap growing file processed wireshark wireless networks possible use aircrack wireless security tools capture ieee 802.11 frames read resulting dump files wireshark wireshark 0.99.7 wireshark tshark run dumpcap perform traffic capture platforms require special privileges capture traffic need dumpcap run privileges neither wireshark tshark need run special privileges wireshark color packets based rules match particular fields packets help user identify types traffic glance default set rules provided users change existing rules coloring packets add new rules remove rules wireshark also used capture packets network simulation tools ns opnet modeler netsim
[ 4759, 3085, 3088, 5373, 3950, 4316, 7534, 726, 5571, 5572, 1942, 5577, 578, 3463, 3638, 3383, 498, 325, 7696, 4892, 7476, 6929, 4895, 1403, 57, 5163, 6220, 6574, 4187, 7216, 3915, 5880, 5181, 1435, 1708 ]
Test
589
2
Kay_Sievers:kay sievers kay sievers computer programmer best known developing udev device manager linux systemd gummiboot efi boot loader kay sievers made major contributions linux hardware hotplug device management subsystems 2012 together harald hoyer sievers main driving force behind fedora merging /lib /bin /sbin file-system trees /usr simplification distributions arch linux since adopted kay sievers grew east germany nowadays resides berlin germany
[ 3938, 3084, 462, 7429, 1351, 1822, 4401, 5292, 3780, 5829, 1192, 578, 7740, 7463, 7559, 5759, 412, 4435, 3133, 2689, 3404, 7855, 6586, 966, 968, 2260, 8149 ]
Test
590
2
Text_Object_Model:text object model text object model tom microsoft windows api provides developers object-based rich text manipulation interfaces implemented com accessed microsoft word additionally richedit controls normally ship windows tom developed influenced heavily wordbasic macro language used within word vba word 95 previous releases tom developed alongside richedit technology present since version 1.0 richedit components api available option windows ce since 2.5 release richedit western languages least used pocket word time version 8.0 richedit shipped windows 8 added support opentype math retrieve implemented instance codice_1 interface top-level document interface codice_2 message may sent via sendmessage api obtain pointer codice_3 object also implements codice_1 interface tom may operate differently depending version richedit control interface retrieved richedit50w windows provide functionality standard richedit20w richedit20a controls like proper table support
[ 7149, 6420, 714, 720, 1460, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 4759, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 2018, 8085, 6989, 6991, 8...
Validation
591
8
Web_tracking:web tracking web tracking practice operators websites collect share information particular user activity world wide web analysis individual user behaviour may used provide content relates implied preferences use web tracking controversial applied context private individual varying degrees subject legislation eu ecommerce directive uk data protection act done without knowledge user may considered breach browser security business-to-business context understanding visitor behaviour order identify buying intentions seen many commercial organisations effective way target marketing activities visiting companies approached on- offline marketing sales propositions relevant current requirements point view sales organisation engaging potential customer actively looking buy produce savings otherwise wasted marketing funds contrary popular belief browser privacy mode prevent tracking attempts usually blocks storage information visitor site cookies help however live data transmissions like various fingerprinting methods fingerprints easily de-anonymized
[ 2469, 1998, 3609, 4600, 6541, 84, 2577 ]
Test
592
9
JASS:jass jass jass2 sometimes said stand another scripting syntax scripting language provided event-driven api created blizzard entertainment used extensively games jass2 starcraft jass scripting events game world map creators use warcraft iii world editor starcraft editor create scripts triggers ai artificial intelligence custom maps campaigns blizzard entertainment replaced jass galaxy starcraft ii language provides extensive api gives programmers control nearly every aspect game world example execute simple gui functions giving orders units changing weather time day playing sounds displaying text player manipulating terrain jass also create powerful functions trackables detect mouse goes hits position getlocalplayer cause disconnects used improperly using handles getlocalplayer syntax similar turing delphi unlike languages case sensitive jass primarily uses procedural programming concepts though popular user-made modifications blizzard world editor program since added c++-like object-oriented programming features syntax jass following function creates string containing message hello world displays players want one player want print message 90 times show iterator syntax jass similar turing context free examples basic syntax shown jass statically-typed types separated two classes natives handles native types types considered non-native native types behave similarly primitive types programming languages handle types however behave like objects handle types often represent object within game units players special effects etc. similarly java treats objects variables parameters jass handle types treated values reality values nothing references handle objects becomes important dealing garbage collection handles properly cleaned cause significant performance issues additionally local variables properly dereference handles go scope nullified properly handle indices garbage collected eventually leak also references handles take memory space users may experience reduced performance nullified though much smaller scale another property handle types worth noting handle types treated children handle type children types children types handle variables may reference specific handle type children type example since patch 1.24b new handle-based type called agent introduced separate handle types objects deleted manually dynamic memory allocation handle types objects deleted automatically stack-based memory allocation example types unit rect destructable refer dynamic allocated objects extend type agent whereas types race alliancetype actually kind wrappers native type integer compared enumerated types still extend type handle primitive types type casting integer real string officially supported language jass supports implicit explicit type casting implicit casting occurs integer real example jass library provides several functions explicit type casting important property handle types related type casting since variables handles references treated treated integers instance handle assigned unique integer value essentially acts identifier handle therefore type casting handles integers although technically supported jass possible practice implicit casting handle types integer occur code written certain way example game ever reached line return h would fact actually cast handle integer return value however blizzard never intended jass used way jass compiler actually throw error warning programmer function n't returning correct type however jass programmers found exploited famous bug jass compiler syntax checker so-called return bug essentially compiler make sure last return statement function returns correct type therefore following code compiles without error used cast handles integers bug fixed patch 1.23b although completely fixed patch 1.24b users use new hashtable natives instead return bug counterparts bug fixed patch 1.24b another return bug discovered users known return nothing bug return nothing bug fixed blizzard patch 1.23c return nothing bug lets user get last value returned function even another type properly utilize bug desired return must made separate function return calling function made impossible jass supports one-dimensional arrays type excluding code syntax declare arrays access members array outlined code one limitation arrays jass returned functions passed parameters functions though array members may returned function returns unit u 0 may returned u array type unit 2009 return bug shown allow arbitrary code execution registered security vulnerability blizzard entertainment shortly thereafter released patch 1.24 fixed vulnerability jass bug patch deployed map contains script code returns bugs run properly maps using return bugs therefore need re-written use newly available hashtable natives patch currently applied battle.net servers vjass set user-made extensions jass introduces object-oriented programming features language structs encapsulation polymorphism strictly speaking vjass add anything jass library instead mostly uses jass arrays integers used indices extension relies custom-made compiler compiles vjass code strict jass code manner additional mods either world editor program warcraft iii required maps made using vjass code fully compatible copy game even without compiler originally convenient tool use vjass jass newgen pack jngp however jngp suffered lack maintenance leaving incompatible newer warcraft iii versions jngp superseded world editor extended wex work wex stopped also leaving incompatible newer warcraft iii versions jasshelper part warcraft iii allowing vjass used without third party tools jass interpreter warcraft iii version 1.23 n't check memory region boundaries allows execution arbitrary bytecode map meaning practically anything including malware viruses trojans etc engineered map executed infect computer blizzard entertainment aware issue applied temporary workaround games hosted battle.net also preparing permanent fix lan single-player games issue addressed release version 1.24 possible exploit i/o capabilities preload jass native commonly used preload files initialization prevent in-game lag indirectly run code computer certain builds windows operating system via writing batch files startup folder exploit rather limited however requires path impossible retrieve since reading environment variables impossible despite limitations possible use preload native along corresponding natives preloadgenend write files player computer preload exploit made secure officially supported feature warcraft iii files written using preload exploit stored user folder documents\warcraft iii\custommapdata windows cause harm preload exploit commonly used custom maps convenient persistent save/load systems sample code following function creates empty file redist\miles folder used interfere warcraft iii program files making warcraft iii error next run warcraft iii version 1.31 run using either jass2 lua virtual machine specified operate lua virtual machine jass code transpiled lua combined lua code make lua code file facilitate lua virtual machine declarations match jass2 declarations well helper userdata easily accurately emulate jass language features arrays converting code lua using single virtual machine possible jass lua code seamlessly interact allows custom map developers start using lua without manually port existing jass vjass code also avoids problems lack interoperation support increased overhead would occur jass2 lua virtual machines used time due vastly different larger language feature set lua jass2 virtual machine compatibility lua code developers wanting use lua code use lua virtual machine
[ 1361, 1616, 7071, 3368, 6882, 310, 8174 ]
Test
593
1
Nadra:nadra national database registration authority nadra urdu نادرا commonly called nadra independent autonomous agency ministry interior government pakistan regulates government databases statistically manages sensitive registration database national citizens pakistan nadra also responsible issuing computerized national identity cards citizens pakistan maintaining sensitive informational upgraded government databases securing national identities citizens pakistan stolen theft one largest government database institution employing 11,000 people 800 domestic offices five international offices also claims hold record maintaining largest biometric database citizens world codified second amendment §30 constitution pakistan 2000 constitution grants powers nadra enact civil registration sensitive databases pakistan citizens databases kept extreme secrecy security ensure safety citizen databases 2018 directed headed usman yousaf mobin chief technology officer nadra appointed chairman independence pakistan prime minister liaquat ali khan launched personal identity system pis program register manage issue national identification cards citizens pakistan muslim refugees settling pakistan changes carried election commission pakistan 1965 process voter registration hold nationwide 1965 presidential election 1969–70 amendments pis program continued election commission election commission supervised 1970 general elections 1971 war resulted east-pakistan gaining independence bangladesh new statistical database system needed ensure safety pakistan citizens well national security country questions raised pakistani bhutto regime introduced national registration act parliament pakistan establish authority issue photo ids registered pakistani citizens 1973 new database system codified second amendment §30 constitution pakistan perform contain statistical database citizens pakistan registration pakistan citizens statistic database government computer accounts started 1973 promulgation constitution country new program visioned started prime minister zulfikar ali bhutto 1973 parliamentary session bhutto stated parliament people pakistan due absence full statistical database people country country operating utter darkness government started issuing national identity card nic numbers citizens started establish government databases people government computers national database registration authority nadra established 10 march 2000 merging directorate general registration pakistan department created 1973 constitution national database organization ndo attached department ministry interior government pakistan created 1998 census nadra autonomous body operate independently mandate replace old directorate general registration computrised system registering 150 million citizens nadra launched multi-biometric national identity card project developed conformance international security documentation issuance practices year 2000 program replaced paper based personal identity system pakistan use since 1973 date 96 million citizens pakistan abroad utilized system allied services receive tamper-resistant iso standard identification documents computerised national identity card cnic computerised national identity card issued nadra pakistani citizens cnic introduced 2000 2012 89.5 million cnics issued cnic issued first age 18 pakistani law compulsory carry one however pakistani citizens cnic mandatory thus seen de facto necessity meaningful civic life pakistan pakistan adult citizens must register computerised national identity card cnic unique number upon reaching age 18 serves identification document authenticate individual identity citizen pakistan introduction cnic manual national identity cards nics issued citizens pakistan today government shifted existing records national identity cards nic central computerised database managed nadra new cnic machine-readable carry facial fingerprint information every citizen required nic number number required many activities getting driver licence passport registering vehicle receiving social insurance/zakat funding enrolling school college technical institute filing legal affidavit wiring funds paying taxes opening bank account getting utility connection electricity phone mobile phone water sewer natural gas etc however since births country registered pakistanis conduct activities described id cards 2007 nadra announced issued 60 million cnic c standing computerized numbers approximately one-third population authority issued 10 millionth cnic 11 february 2002 20 millionth 18 june 2002 30 millionth 22 december 2003 40 millionth 1 october 2004 50 millionth cnic 14 february 2006 unique 13-digit number assigned birth parents complete child birth registration form form rg-2 commonly known b-form child registration certificate crc national identity card nic number issued age 18 2001 nic numbers 11 digits long 2001-2002 authority started issuing 13-digit nic numbers along new biometric id cards first 5 digits based applicant locality next 7 random numbers last digit check digit even number females odd number males old manual nic numbers invalid 1 january 2004 id card following information legal name gender male female transgender father name husband name married females identification mark date birth national identity card number family tree id number current address permanent address date issue date expiry signature photo fingerprint thumbprint nadra also records applicant religion noted cnic nadra registered 90 women pakistan although nadra started issuing ultra modern scnic smart computerized national identity card information english urdu languages nadra introduced smart national identity card snic pakistan first national electronic identity card october 2012 pakistan snic contains data chip 36 security features snic complies icao standard 9303 iso standard 7816-4 snic used offline online identification voting pension disbursement social financial inclusion programmes services nadra aims replace 89.5 million cnics snics 2020 order address security concerns nadra incorporated 36 security features physical design card making one securest cards world card printed multiple layers layer security features chip encrypted extremely competent software developers nadra secure communication protocols determined read remote devices enable remote verification citizens match-on-card applet designed nadra citizen places card card reader reader first authenticate card return card verify authenticity reader verifications successful device ask finger lpc nadra card enable verifications individuals remotest parts pakistan say decade individual casts vote government may ascertain person casting vote indeed one electoral roll one thousands scenarios identity fraud prevention card empowers majority space chip made available private sector use products services might appear expensive private sector use card initially number citizens critical mass reached profitable private sector use secure universal platform order track nadra smart card tracking id consisting 12 digits sent 8400 example tracking id 108231064935 message sent 8400 get message request tracking id 108231064935 printing facility expected delivery 2 working days nadra started service online application nicop poc crc online data collected e.g fingerprints thumb impressions signatures online fee submitted debit credit card
[ 7386, 3269 ]
Test
594
2
Matthew_Dillon:matthew dillon matthew dillon born 1966 american software engineer known amiga software contributions freebsd starting leading dragonfly bsd project since 2003 dillon studied electronic engineering computer science university california berkeley first became involved bsd 1985 also became known amiga programming c compiler dice work linux kernel founded worked best internet 1994 1997 contributing freebsd time diablo internet news transit program popular many isps 1997 dillon gained commit access freebsd code heavily contributed virtual memory subsystem amongst contributions concerned problems saw direction freebsd 5.x headed regards concurrency coupled fact dillon access freebsd source code repository revoked due falling-out freebsd developers started dragonfly bsd project 2003 implementing smp model using light-weight kernel threads dragonfly project also led development new userspace kernel virtualisation technique 2006 called virtual kernel originally ease development testing subsequent kernel-level features new file system called hammer created using b-trees hammer declared production-ready dragonfly 2.2 2009 subsequently hammer2 declared stable 2018 dragonfly 5.2 recently dillon gotten number headlines around cpu errata 2007 theo de raadt openbsd raised alarm around seriousness errata intel core 2 family cpus dillon independently evaluated intel errata overview intel core errata well suggesting several erratums serious warrant avoiding processor issues remain unfixed dillon since fan amd processors subsequently 2012 discovered brand-new deficiency amd processors existing erratum existed time matt continued work around cpu issues late 2018 presenting solutions tackle latest security vulnerabilities like meltdown subsequently adopted openbsd well matt frequent guest bsdtalk runtime show interviewed several times kerneltrap
[ 7514, 6794, 6085, 6431, 732, 738, 3636, 35, 2583, 5760, 3986, 5065, 6477, 424, 1133, 6489, 7942, 6149, 6860, 443, 6505, 1523, 3688, 1534, 1547, 481, 2300, 5833, 5836, 1193, 4059, 8001, 6918, 6211, 4806, 4441, 5865, 5518, 6583, 8037, 875...
Validation
595
4
Christopher_Tarnovsky:christopher tarnovsky christopher tarnovsky born 20 april 1971 nyack new york integrated circuit reverse engineering specialist hacker come public attention tarnovsky diagnosis attention deficit hyperactivity disorder 1990s tarnovsky soldier united states army field intelligence security cryptography 2013 tarnovsky vice president semiconductor services ioactive 2001 directv client nds company majority owned rupert murdoch newscorp demanded tarnovsky kept away systems plaintiffs directv dish network nagrastar alleged tarnovsky hacking protections placed set-top box smart cards used lock transmission customers defaulted 1997 2007 tarnovsky worked nds developing copy protection technology 2002 canal plus french premium cable television commenced civil action nds tarnovsky tarnovsky alleged extracted source code seca card 26 march 1999 uploaded file sharing website jury later largely cleared nds tarnovsky 2008 tarnovsky dismissed nds copyright infringement employ tarnovsky denies accusation 2008 tarnovsky broke trusted platform module type chip used xbox 360 example tarnovsky required nine months study discover main contents module 2010 black hat washington dc conference tarnovsky described used acid electron microscope small conductive needles hack infineon sle66 cl pe chip
[ 1698, 2972, 3486, 7093 ]
Test
596
9
Kateryna_Yushchenko_(scientist):kateryna yushchenko scientist kateryna lohvynivna yushchenko december 8 1919 chigirin died august 15 2001 ukrainian computer information research scientist corresponding member ussr academy sciences 1976 member international academy computer science developed one world first high-level languages indirect address programming called address programming language period academic career yushchenko supervised 45 ph.d students professional achievements include yushchenko awarded two ussr state prizes ussr council ministers prize academician glushkov prize order princess olga yushchenko first woman ussr become doctor physical mathematical sciences programming kateryna lohvynivna yushchenko née rvacheva born 1919 chyhyryn central ukraine started undergraduate studies kyiv university 1937 second world war attended central asian state university tashkent graduating 1942 war returned ukraine 1950 direction boris gnedenko obtained ph.d. institute mathematics ukrainian academy sciences period seven years yushchenko held position senior researcher kiev institute mathematics ukrainian ssr academy sciences 1950–57 1954 levedev laboratory first computer continental europe mesm created transferred institute mathematics yushchenko member joint group scholars operating mesm 1957 became director institute computer science ukrainian ssr academy sciences forty years service institute yushchenko created internationally notable scientific school theoretical programming yushchenko best known creation address programming language first fundamental advancement scientific school theoretical programming language provided free location program computer memory process working mesm became clear complex tasks difficult solve writing simple machine programs need develop high-level programming language problem absence appropriate translator better human/computer communication l.i kaluzhnin professor kyiv university taught course mathematical logic 1950-70s made significant advancement understanding problem formalized scheme interfacing program following development 1955 yushchenko developed programming language language-based two general principles computer work addressing software management creating convenient system concepts describing computer architecture system instructions language thus became means manipulation second-rank addresses yushchenko ’ contribution became first fundamental achievement soviet school theoretical programming well ahead creation first programming language fortran 1958 cobol 1959 algol 1960 yushchenko founder first soviet school theoretical programming 1970-1980 subject research theoretical programming formed major achievements school time creation algebraic grammar methods synthesis software 1990s efforts school theoretical programming concentrated study algebraic grammar-methods knowledge representation model computation friendly user interface designing developing databases knowledge bases decision support systems expert systems methods learning forty years research theoretical programming enriched formal-algorithmic apparatus subject research significantly expanded procedural languages methods knowledge representation form artificial intelligence tools developers application systems yushchenko worked probability theory algorithmic languages programming languages developing methods automated data processing systems prepare programmers yuschenko wrote educational series textbooks 1970s yuschenko held five copyright certificates developed eight state standards ukraine author 200 manuscripts including 23 monographs train aids part works two to-three editions translated 5 languages internationally including german czech hungarian french danish
[ 2054 ]
Validation
597
2
Nokia_E66:nokia e66 nokia e66 slider smartphone nokia eseries range s60 platform third edition device slide action targeting business users successor nokia e65 shares many features e66 similar features nokia e71 handset lacks sufficient battery capacity day use full qwerty however e66 smaller size weighs less e66 also includes accelerometer new animations transition effects lacking e71 2.5 mm 3/32 audio port suitable traditional 3.5 mm 1/8 headphones plugs microusb port used charge mobile dial 0000 check firmware version
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 8072, 1544, 2922, 4407, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 506...
Test
598
4
Zip_bomb:zip bomb zip bomb also known zip death decompression bomb malicious archive file designed crash render useless program system reading often employed disable antivirus software order create opening traditional viruses rather hijacking normal operation program zip bomb allows program work intended archive carefully crafted unpacking e.g virus scanner order scan viruses requires inordinate amounts time disk space memory modern antivirus programs detect whether file zip bomb avoid unpacking zip bomb usually small file ease transport avoid suspicion however file unpacked contents system handle one example zip bomb file 42.zip zip file consisting 42 kilobytes compressed data containing five layers nested zip files sets 16 bottom layer archive containing 4.3-gigabyte 4 294 967 295 bytes 3.99 gib file total 4.5 petabytes 4 503 599 626 321 920 bytes 3.99 pib uncompressed data file still available download various websites across internet many anti-virus scanners layers recursion performed archives help prevent attacks would cause buffer overflow out-of-memory condition exceed acceptable amount program execution time zip bombs often always rely repetition identical files achieve extreme compression ratios dynamic programming methods employed limit traversal files one file followed recursively level effectively converting exponential growth linear also zip files uncompressed yield identical copies sophisticated form zip bombs exploits specifications zip files deflate compression algorithm create bombs without use nested layers used 42.zip
[ 1019, 6225, 7122, 2491, 1576, 1471, 1704 ]
Test
599
7
UKFast:ukfast ukfast.net ltd business-to-business hosting company based manchester uk principally known managed hosting cloud services colocation business owns operates data centre complex trafford park manchester ukfast founded september 1999 welsh businessman lawrence jones partner gail jones 2007 company moved head office 28th floor city tower manchester acquired space 16th floor moving 2013 campus birley fields area hulme manchester 2013 firm launched ecloud range cloud hosting services whose hardware infrastructure reportedly cost £12 million build year business turned £23.4m year ending 31 december 2014 ukfast reported 24 per cent turnover increase £23.4m £28.9m 2011 2015 ukfast invested £25m capital expenditure projects including development four data centres flagship ukfast campus founder lawrence jones rejected reported £200m takeover bid 2014 amidst trend web hosting consolidation citing business still growing 2013 ukfast opened office glasgow 2015 opened office london 2018 30 stake ukfast sold private equity firm inflexion 2005 2009 ukfast six internet service providers association awards named best hosting provider four years running ukfast received data centre solutions awards ’ private cloud product year 2012 datacenterdynamics award innovation outsourcing 2013 year ukfast received national business awards employer year award institute customer service employee engagement strategy year awards ukfast also featured sunday times 100 best small companies work great place work institute ’ best workplaces lists placing 28th 12th respectively 2014 25th 5th respectively 2013 45th 7th respectively 2012
[]
Validation
600
4
ICloud_leaks_of_celebrity_photos:icloud leaks celebrity photos august 31 2014 collection almost 500 private pictures various celebrities mostly women many containing nudity posted imageboard 4chan later disseminated users websites social networks imgur reddit images initially believed obtained via breach apple cloud services suite icloud security issue icloud api allowed make unlimited attempts guessing victims passwords however access later revealed gained via spear phishing attacks event media outlets internet users referred names fappening portmanteau words fap —a slang term masturbation—and film happening celebgate met varied reaction media fellow celebrities critics felt distribution images major invasion privacy subjects allegedly depicted subjects questioned authenticity leak also prompted increased concern analysts surrounding privacy security cloud computing services icloud—with particular emphasis use store sensitive private information images obtained via online storage offered apple icloud platform automatically backing photos ios devices iphones apple later reported victims icloud account information obtained using targeted attack user names passwords security questions phishing brute-force guessing initially believed images obtained using exploit find iphone service court documents 2014 indicated one user created fake email account called appleprivacysecurity ask celebrities security information photos passed around privately least couple weeks public release august 31 claims unreleased photos videos exist daily mail cited anonymous posters 4chan deadspin stated ring hackers traders sellers operating months leading mass release hacker responsible leak described collector distributed leaked images image boards 4chan anon-ib exchange bitcoin ultimately images widely circulated online via channels including imgur tumblr celebrity gossip blogger perez hilton also re-posted photos blog soon took issued apology saying acted bad taste major center activity link-sharing website reddit subreddit created sharing photos single day amassed 100,000 followers reddit administrators criticized allowing take place alleged violation anti-doxing rules mckayla maroney claimed 18 time photos taken reddit staff took photos warned anyone re-posting underage photos liz lee circulating prior incident would permanently banned site could prosecuted distributing child pornography september 7 citing copyright issues reddit banned thefappening subreddit also saying workload dealing become much reddit banned another subreddit named fappening day original release contained photos videos 100 individuals allegedly obtained file storage hacked icloud accounts including leakers claimed a-list celebrities shortly photos leaked several affected celebrities issued statements either confirm deny photos authenticity celebrities confirmed photos authenticity include jennifer lawrence confirmed publicist kate upton husband justin verlander confirmed upton lawyer mary elizabeth winstead confirmed twitter jessica brown findlay confirmed spokesman kaley cuoco confirmed via instagram kirsten dunst also criticized icloud service jill scott confirmed twitter one leaked photos stating another fake celebrities denied photos authenticity include ariana grande yvonne strahovski olympic gymnast mckayla maroney initially denied images authenticity twitter later confirmed photos legitimate also stating underage time taken victoria justice denied photos authentic later stated twitter pursuing legal actions found leak massive invasion privacy privacy celebrities affected leak reports october indicated nick hogan first male star directly targeted hackers however hogan denied pictures authenticity according security expert nik cubrilovic addition photographs personal information text messages calendars address books phone call logs data stored phones backed service also likely stolen september 20 2014 second batch similar private photos additional celebrities leaked hackers september 26 2014 third batch also leaked dubbed fappening 3 actress lena dunham pleaded twitter people view pictures saying violat es women okay actress emma watson condemned release photos also accompanying comments social media show lack empathy actors seth rogen lucas neff also spoke hackers people posted pictures justin verlander pitcher detroit tigers told media prior game cleveland indians keeps private life private would rather focus tigers race kansas city royals al central title distraction teammates security analysts stated breach could prevented use two-factor authentication forbes writer recommended turning icloud photo stream feature uploads photos taken ios device icloud servers automatically entirely incident given many names including fappening portmanteau happening fap internet slang term masturbation celebgate reference watergate scandal term fappening received criticism journalists like radhika sanghani daily telegraph toyin owoseje international business times said term trivialized leak also according sanghani made light severe situation articles used term extensively describe event including headlines interview wall street journal apple ceo tim cook stated response leaks company planned take additional steps protect privacy security icloud users future notifications provided whenever data restored device via icloud logging icloud via web browser addition existing notifications user icloud password changed additionally apple broaden encourage use two-factor authentication future versions software operating systems then-upcoming ios 8 conclusion emphasized want everything protect customers outraged jennifer lawrence contacted authorities publicist stated authorities prosecute anyone posts leaked images forbes columnist joseph steinberg questioned whether reactions law enforcement technology providers indicated celebrities treated differently ordinary americans case law enforcement may illegal october 1 2014 google threatened lawsuit lawyer martin singer 100 million behalf unnamed victims leaks alleging google refused respond requests images removed platforms including blogger youtube failing act expeditiously responsibly remove images knowingly accommodating facilitating perpetuating unlawful conduct interview vanity fair lawrence called leak sex crime sexual violation added anybody looked pictures 're perpetuating sexual offense cower shame view contrasted another victim hack emily ratajkowski told gq lot people victims hack said anyone looks pictures feel guilty n't think fair 'm sure anyone googles necessarily criminal think people stole photos fbi said aware allegations concerning computer intrusions unlawful release material involving high profile individuals addressing matter similarly apple stated investigating whether security breach icloud service responsible leaked photographs per company commitment user privacy september 2 2014 apple reported leaked images result compromised accounts using targeted attack user names passwords security questions practice become common internet october 2014 fbi searched house chicago seized several computers cell phones storage drives tracking source hacking attack ip address linked individual named emilio herrera related search warrant application mentioned eight victims initials a.s. c.h. h.s. j.m. o.w. a.k. e.b. a.h. supposedly point stolen photos abigail spencer christina hendricks hope solo jennette mccurdy olivia wilde anna kendrick emily browning amber heard according law enforcement officials herrera one several people investigation fbi carried various searches across country march 2016 36-year-old ryan collins lancaster pennsylvania agreed plead guilty one count unauthorized access protected computer obtain information resulting 18-month sentence victims named court documents numerous media outlets connected collins case fappening investigation found collins phished sending e-mails victims looked like came apple google warning victims accounts might compromised asking account details victims would enter passwords collins gained access accounts downloading e-mails icloud backups october 2016 collins sentenced 18 months prison august 2016 28-year-old edward majerczyk chicago illinois agreed plead guilty similar phishing scheme although authorities believe worked independently accused selling images posting online january 24 2017 majerczyk sentenced nine months prison ordered pay 5,700 restitution cover counseling services one unnamed celebrity victim emilio herrera also chicago first named press 2014 pleaded guilty one count unauthorized access protected computer obtain information october 2017 herrera accessed accounts unnamed celebrities others accused involved leaking sharing photos videos obtained sentenced 16 months jail march 2018 april 2018 26-year-old george garofano north branford connecticut pleaded guilty one count unauthorized access protected computer obtain information garofano attorney said led phishing scheme criminals august 29 2018 federal court sentenced garofano eight months prison october 22 2018 christopher brannan former virginia teacher became fifth man convicted relation hacking brannan pled guilty federal charges aggravated identity theft unauthorized access protected computer phishing expedition hacked 200 people addition celebrity victims brannan targeted underage sister-in-law well teachers students school used teach brannan sentenced 34 months prison march 1 2019
[ 704, 3932, 6788, 2912, 376, 3277, 2923, 744, 2587, 3323, 2961, 5779, 7600, 4025, 1528, 2991, 1173, 6526, 6904, 6541, 6194, 2678, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 5889, 1996, 7328, 208, 2021, 5922, 6628, 924, 6654, 4531, 13...
Test
601
4
Dropper_(malware):dropper malware dropper kind trojan designed install sort malware virus backdoor etc target system malware code contained within dropper single-stage way avoid detection virus scanners dropper may download malware target machine activated two stage
[ 74, 4235, 5401, 2733 ]
Test
602
3
Sony_Toshiba_IBM_Center_of_Competence_for_the_Cell_Processor:sony toshiba ibm center competence cell processor sony toshiba ibm center competence cell processor first center competence dedicated promotion development sony toshiba ibm cell microprocessor eight-core multiprocessor designed using principles parallelism memory latency center part georgia institute technology college computing headed david a. bader according ibm center intended build community programmers broaden industry support cell processor far program resulted two workshops involved detailed lectures training various basic cell programming concepts deployed cluster 28 ibm bladecenter qs20 servers 14 blades student faculty use
[ 6597, 7232, 450, 6330, 2177, 7514, 3514, 4761, 1244, 6621, 4408, 481, 5042, 6543, 4242, 5665, 7003, 1388, 7509, 746, 4839, 3807, 2139, 4718, 239, 6130, 763, 2873, 2601, 424, 253, 3234, 6586, 4011, 4200, 1606, 4911, 2803, 5446, 4748 ]
Test
603
3
Cosmic_Soldier_(video_game):cosmic soldier video game game introduced dialog conversation system player recruit allies speaking choose whether kill spare enemy engage enemies conversation similar later famous megami tensei battles fought turn-based style game also displayed nudity title screen 1987 sequel cosmic soldier psychic war released msx2 computer japan ms-dos platform west changed turn-based combat predecessor unique tug war style real-time combat system battles clash energy party enemy player needing push energy towards enemy strike able use shield block suction ability absorb opponent power game also improves upon conversation system predecessor closely resembles one megami tensei released around time
[ 6380 ]
Test
604
7
Gemstone_(database):gemstone database gemstone/s computer software application framework first available programming language smalltalk object database proprietary commercial software gemstone systems founded march 1 1982 servio logic build database machine based set theory model ian huang instigated founding technology adviser ceo sampoerna holdings putera sampoerna recruiting frank bouton president cofounder floating point systems inc dr. michael mulder vice president engineering group manager advanced processor design sperry univac principal architect univac 1180 mainframe steve ivy vice president operation senior manager tektronix leonard yuen vice president business development development manager ibm db2 database dr. george copeland chief architect senior staff engineer advanced development group tektronix steve redfield chief engineer chief engineer intel 80286 microprocessor alan purdy staff engineer tektronix bob bretl software engineering manager tektronix signal processing systems allen otis also tektronix john telford software engineering manager electro scientific industries monty williams servio logic renamed gemstone systems inc. june 1995 firm developed first hardware prototype 1982 shipped first software product gemstone 1.0 1986 engineering group resides beaverton oregon three original cofounding engineers bob bretl allen otis monty williams retired firm since start gemstone owners pioneered implementing distributed computing business systems many information system features associated java ee implemented earlier gemstone gemstone visualwave early web application server platform visualwave visualworks owned cincom gemstone played important sponsorship role smalltalk industry council time ibm backing visualage smalltalk owned instantiations inc. major transition gemstone smalltalk continued gemstone/s various c++ java products scalable multitier architecture distributed computing systems evolved gemstone/j product turn gave rise gemfire early example data fabric complex event processing cep event stream processing esp data virtualization distributed caching may 6 2010 springsource division vmware announced entered definitive agreement acquire gemstone may 2 2013 gemtalk systems acquired gemstone/s platform pivotal software emc vmware spin-off .. gemfire remained pivotal big data division product available standalone also integrated cloud foundry paas pivotal cloud cache gemstone builds programming language smalltalk gemstone systems serve mission-critical applications gemstone frameworks still see interest web services service-oriented architectures recent revival interest smalltalk occurred result use generate javascript e-commerce web pages web application frameworks seaside web framework systems based object databases common based orm object-relational mapping frameworks toplink hibernate application framework market jboss bea weblogic somewhat analogous gemstone
[ 6507, 2451, 5014, 4295, 3847, 6594, 6428, 3779, 6986, 5571, 578, 3391, 2054, 761, 8137, 3915, 360 ]
Test
605
1
Partial_index:partial index databases partial index also known filtered index index condition applied includes subset rows table allows index remain small even though table may rather large extreme selectivity suppose transaction table entries start status active may pass statuses p pending w worked reaching final status f point longer likely processed postgresql useful partial index might defined index would bother storing millions rows reached final status f would allow queries looking transactions still need work efficiently search via index similarly partial index used index rows column null benefit column usually null index would allow following query read updated tuples necessary condition index criterion stonebraker paper presents number examples indexes similar following sql server type index called filtered index partial indexes supported postgresql since version 7.2 released february 2002 sqlite supports partial indexes since version 3.8.0 mongodb supports partial indexes latest release v3.2 mysql version 8.0 support partial indexes mysql term partial index sometimes used refer prefix indexes truncated prefix value stored index another technique reducing index size
[ 3863, 7248, 7715, 1730, 5956 ]
Test
606
2
NetInfo:netinfo netinfo system configuration database nextstep mac os x versions mac os x v10.4 tiger netinfo replaces unix system configuration files though still present running machine single user mode unix apis wrap around netinfo instead netinfo stores system wide network-type configuration information users groups binary databases mac os x machine application specific settings stored plist files netinfo introduced nextstep version 0.9 replaced unix system configuration files sun microsystems network information service yellow pages next computers immediately caused controversy much unfavorable netinfo unique next computers although next later licensed netinfo xedoc australian software company produced netinfo unix systems dns queries went netinfo led situation basic tasks translating unix uid user name string would complete netinfo stalled dns lookup first possible disable netinfo use unix system files nextstep version 2 disabling netinfo also disabled dns support thus next computers became notorious locking user everyday tasks dns server stopped responding mac os x version netinfo remedied many problems due early problems netinfo never took world unix system configuration apple moved away using netinfo towards ldap particularly mac os x server mac os x v10.4 last version support netinfo beginning mac os x v10.5 netinfo completely phased replaced new local search node named dslocal files located /var/db/dslocal/ standard property list xml-based files netinfo database stored /private/var/db/netinfo/local.nidb/ accessed root viewed modified application programming interface netinfo manager utility command line tools niutil netinfo completely removed mac os x 10.5 netinfo-based command line tools also phased replaced tools also netinfo manager removed netinfo stores following data
[ 4183, 2054, 5450 ]
Test
607
2
OS/360_and_successors:os/360 successors os/360 officially known ibm system/360 operating system discontinued batch processing operating system developed ibm then-new system/360 mainframe computer announced 1964 heavily influenced earlier ibsys/ibjob input/output control system iocs packages one earliest operating systems require computer hardware include least one direct access storage device although os/360 discontinued successor operating systems including virtual storage mvs 64-bit z/os still run maintain application-level compatibility ibm announced three different levels os/360 generated tapes sharing code ibm eventually renamed options made significant design changes users often coined nicknames e.g. big os os/mft none names official recognition ibm major operating system system/360 hardware dos/360 os/360 public domain downloaded freely well run actual system/360 hardware executed free hercules emulator runs unix unix-like systems including gnu/linux solaris macos well windows os/360 turnkey cds provide pregenerated os/360 21.8 systems ready run hercules ibm originally intended system/360 one batch-oriented operating system os/360 capable running machines small 32 kib also intended supply separate timesharing operating system tss/360 system/360 model 67 least two accounts ibm eventually decided produce simpler batch-oriented operating systems ibm introduced series stop-gaps prevent system/360 hardware sales collapsing—first bos/360 basic operating system smallest machines 8k byte memories tos/360 tape operating system machines least 16k byte memories tape drives finally dos/360 disk operating system became mainstream operating system ancestor today widely used z/vse ibm released three variants os/360 pcp primary control program stop-gap could run one job time 1966 mft multiprogramming fixed number tasks mid-range machines mvt multiprogramming variable number tasks top end mft mvt used least 1981 decade successors launched division mft mvt arose storage limitations scheduling constraints initially ibm maintained mft mvt simply two configurations os/360 control program although later ibm described separate versions os/360 ibm originally wrote os/360 assembly language later ibm wrote os/360 code new language basic systems language bsl derived pl/i large amount tso code release 20 written bsl tss/360 late unreliable ibm canceled although ibm later supplied three releases tss/370 prpq time cp-67 running well enough ibm offer without warranty timesharing facility large customers three options offered similar facilities porting applications usually required minimal effort versions ibm program products application utility software ran text mostly treats pcp mft mvt simply new names original sss mss mps although design changes also text distinguish m65mp mvt officially pcp mft mvt separate operating systems os/360 install-time configuration options—in today words three different variants os nucleus scheduler however quite different behavior memory requirements users commonly consider de facto separate operating systems refer early os/360 os/mft os/mvt respectively mft differs mvt mainly way manages memory installing mft customers specify fixed number partitions areas memory fixed boundaries application programs run simultaneously primary control program pcp intended machines small memories similar mft one partition experience indicated advisable install os/360 systems less 128 kib memory although limited production use possible much smaller machines 48 kib memory ibm dropped pcp option final releases os/360 leaving mft ii mvt required memory also referred sys=min macro expansions system-dependent multiprogramming fixed number tasks mft intended serve stop-gap multiprogramming variable number tasks mvt intended target configuration os/360 became available 1967 early versions mvt many problems simpler mft continued used many years introducing new system/370 machines virtual memory 1972 ibm developed mft 2 os/vs1 last system particular line first version mft shared much code architecture pcp limited four partitions cumbersome run multiple partitions many installations used houston automatic spooling priority hasp mitigate complexity mft version ii mft-ii shared much control program scheduler code mvt much flexible run maximum number partitions increased 52 later modifications mft-ii added sub-tasking fixed number tasks longer fixed although number partitions remain limitation experience indicated advisable install mft systems less 256 kib memory 1960s quite large amount also referred sys=int macro expansions system-dependent multiprogramming variable number tasks mvt sophisticated three available configurations os/360 control program one two available configurations final releases mvt intended largest machines system/360 family introduced 1964 become available 1967 early versions many problems simpler mft continued used many years experience indicated advisable install mvt systems less 512 kib memory mvt treated memory used operating system single pool contiguous regions could allocated required unlimited number simultaneous application systems programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough system/360 lacked memory relocation hardware memory compaction could used reduce fragmentation facility called rollout/rollin could swap running job secondary storage make memory available another job rolled-out job would however rolled-in original memory locations became available 1971 time sharing option tso use mvt added part release 20.1 tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso os/360 communicated terminals using telecommunications access method tcam tcam name suggests ibm hoped would become standard access method data communications fact tcam os/vs2 used almost entirely tso largely superseded virtual telecommunications access method vtam mid-to-late 1970s also referred sys=vms invocations macros system-dependent model 65 multiprocessing m65mp variant mvt runs 360/65 multisystem mode m65mp traps use set system mask ssm instruction serialize disabled code two cpus part m65mp system behavior interfaces mvt system keyword parameter sys=vms included m65mp well uniprocessor mvt pcp mft mvt provide similar facilities point view application programs features available mft mvt system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory ibm provided os/360 sysgen option s/370 support support dat os/vs1 successor mft offers similar facilities several additions e.g. res virtual memory vsam see initially available independent component release icr later integrated os/vs1 base ibm released fairly minor enhancements os/vs1 1983 1984 announced would aix/370 aix/esa dppx ix/370 os/vs1 tss/370 system/370 operating systems modern descendants os/vs2 release 1 mvt plus virtual memory vsam see version eventually renamed os/vs2 svs single virtual storage os/vs2 release 2 also known mvs multiple virtual storage introduced svs intended stepping stone mvt mvs historical interest today 1974 ibm released described os/vs2 release 2 really new operating system upwards-compatible os/vs2 release 1 supervisor new system largely rewritten new dialect bsl pl/s bsl pl/s dialects pl/i extensions designed transcribe assembly language code including privileged instructions needed control computer whole time-sensitive os components os dispatcher ios notably among many others remained coded assembly language enhanced os/vs ifox00 assembler older os/360 ieuasm assembler new version noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses application address space consists 3 areas operating system one instance shared jobs application area unique application shared virtual area used various purposes including inter-job communication ibm promised application areas would always least 8mb approach eliminated risk memory fragmentation present mvt svs improved system internal security new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ xxx mvs introduced new approach workload management allowing users define performance targets high-priority batch jobs enabled users give systems work without affecting performance highest-priority jobs mvs ibm first mainstream operating system system/370 support ibm called tightly coupled multiprocessing 2 later 12 ibm mainframes 16 amdahl mainframes cpus shared concurrent access memory single copy operating system peripheral devices providing greater processing power degree graceful degradation one cpu failed fortunately became increasingly rare event system time rose hours days years initially mvs supplied job queue manager called jes2 job entry subsystem 2 descended hasp houston automatic spooling priority also supported remote job entry workstations located elsewhere jes2 manage jobs one cpu might tightly coupled multiprocessor system 1976 ibm provided another option jes3 job entry subsystem 3 descendant asp attached support processor allows one cpu manage single job queue feeding work several physically distinct cpus therefore allows one operator console manage work cpus note jes1 job queue manager os/vs1 see ibm hoped virtual storage access method vsam would replace earlier sequential indexed direct access methods provided improved versions vsam formats became basis ibm database management systems ims/vs db2 usually esds actual data storage ksds indexes vsam also provides new implementation catalog facility enables applications access files name without needing know disk drive vsam datasets must defined vsam catalog used non-vsam datasets also listed vsam catalog mvs master catalog must vsam catalog catalogs originally provided os/360 form cvols mvs added separate catalog structure vsam later ibm added third type catalog known icf catalog ibm removed support cvol vsam catalogs 2000 since y2k-compliant hence z/os icf catalogs supported 1974 ibm announced systems network architecture meant reduce cost running large networks terminals mainly using communications lines much efficiently available ibm virtual memory operating systems since mainframe software component vtam available operating systems 1977 ibm announced mvs/system extensions program product i.e cost extra money improved mvs performance descendants mvs still used latest descendants system/360 system/390 zseries renamed os/390 system/390 64-bit version zseries named z/os data taken ibm 360 operating systems release history system/370 market chronology products services
[ 4291, 4670, 5726, 7172, 5041, 7546, 5396, 1851, 402, 1855, 6838, 2596, 3664, 6849, 4366, 5081, 1516, 1522, 7605, 4759, 5105, 6518, 810, 5481, 7264, 4421, 839, 4428, 5502, 5852, 7661, 6213, 850, 3751, 1989, 6957, 1994, 7331, 8066, 4494, ...
Validation
608
3
Communications_Processor_Module:communications processor module communications processor module cpm component motorola 68000 family quicc motorola/freescale semiconductor powerpc/power isa powerquicc microprocessors designed provide features related imaging communications microprocessor delegate input/output processing example sending receiving data via serial interface communications processor module microprocessor perform functions input/output functions require quick response processor example due precise timing requirements data transmission cpm performing operations main microprocessor free perform tasks cpm features risc microcontroller communication processor separate actual central processing unit ip core risc microcontroller communicates core using dual-ported ram special command configuration event registers well via interrupts motorola 68302 integrated multiprotocol processor featured risc processor controlled either microcode rom downloadable firmware various forms microcode shipped different applications example support signaling system 7 communications centronics parallel interface motorola 68360 quicc first design feature communications processor module offering microcode ss7 isdn applications specifications microcontroller programming interface generally shipped customers possible run 68360 slave mode use cpm part chip example m68360quads-040 board 68040 cpu master coupled 68360 cpm slave cpu 68360 processor disabled cpm used later powerquicc series powerpc- power isa-based processors early designs like mpc860 used virtually cpm previous 68360 quicc processors typical features cpm include
[ 5012, 2719, 3348, 7327, 5100, 3936, 1075, 1346, 2458, 804, 1083, 3451, 4408, 5652, 912, 7361, 2845, 3708, 7990, 5665, 1199, 1386, 7654, 7099, 2501, 239, 6474, 8125, 4815, 1131, 2257, 3674, 2353, 5622 ]
Test
609
5
Daytime_Protocol:daytime protocol daytime protocol service internet protocol suite defined 1983 rfc 867 intended testing measurement purposes computer networks host may connect server supports daytime protocol either transmission control protocol tcp user datagram protocol udp port 13 server returns ascii character string current date time unspecified format unix-like operating systems daytime server usually built inetd xinetd daemon service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration example output may
[ 7148, 456, 6879, 5369, 2281, 6521, 6976, 3775, 3855, 2644, 7170, 6531, 1462, 2649, 2650, 7637, 2119, 6908, 7091, 2219, 3383, 3640, 3797, 2043, 3312, 2057, 3819, 3820, 3821, 7214, 7217, 7765, 259, 5880 ]
Validation
610
9
Bayesian_inference_using_Gibbs_sampling:bayesian inference using gibbs sampling bayesian inference using gibbs sampling bugs software package performing bayesian inference using markov chain monte carlo based gibbs sampling bugs used following software
[ 1731 ]
Test
611
0
Computational_lexicology:computational lexicology computational lexicology branch computational linguistics concerned use computers study lexicon narrowly described scholars amsler 1980 use computers study machine-readable dictionaries distinguished computational lexicography properly would use computers construction dictionaries though researchers used computational lexicography synonymous computational lexicology emerged separate discipline within computational linguistics appearance machine-readable dictionaries starting creation machine-readable tapes merriam-webster seventh collegiate dictionary merriam-webster new pocket dictionary 1960s john olney et al system development corporation today computational lexicology best known creation applications wordnet computational processing researchers increased time use computational lexicology applied ubiquitously text analysis 1987 amongst others byrd calzolari chodorow developed computational tools text analysis particular model designed coordinating associations involving senses polysemous words computational lexicology contributed understanding content limitations print dictionaries computational purposes i.e clarified previous work lexicography sufficient needs computational linguistics work computational lexicologists almost every portion print dictionary entry studied ranging many computational linguists disenchanted print dictionaries resource computational linguistics lacked sufficient syntactic semantic information computer programs work computational lexicology quickly led efforts two additional directions first collaborative activities computational linguists lexicographers led understanding role corpora played creating dictionaries computational lexicologists moved build large corpora gather basic data lexicographers used create dictionaries acl/dci data collection initiative ldc linguistic data consortium went path advent markup languages led creation tagged corpora could easily analyzed create computational linguistic systems part-of-speech tagged corpora semantically tagged corpora created order test develop pos taggers word semantic disambiguation technology second direction toward creation lexical knowledge bases lkbs lexical knowledge base deemed dictionary computational linguistic purposes especially computational lexical semantic purposes information print dictionary totally explicated meanings words appropriate links senses many began creating resources wished dictionaries created use computational analysis wordnet considered development newer efforts describing syntactic semantic information framenet work fillmore outside computational linguistics ontology work artificial intelligence seen evolutionary effort build lexical knowledge base ai applications optimizing production maintenance extension computational lexicons one crucial aspects impacting nlp main problem interoperability various lexicons frequently incompatible frequent situation merge two lexicons fragments lexicons secondary problem lexicon usually specifically tailored specific nlp program difficulties used within nlp programs applications respect various data models computational lexicons studied iso/tc37 since 2003 within project lexical markup framework leading iso standard 2008 amsler robert 1980 ph.d. dissertation structure merriam-webster pocket dictionary university texas austin
[ 1314, 5429, 2087, 411, 7732 ]
Validation
612
3
SPARCclassic:sparcclassic sparcstation classic workstation introduced sun microsystems november 1992 based sun4m architecture enclosed lunchbox chassis sparcstation classic incorporates single 50 mhz microsparc processor sparcstation classic three banks two dsimm slots official maximum configuration uses 16mb modules first bank also hold 32mb modules giving maximum 128mb memory sparcstation classic hold one internal 3.5-inch 50-pin single ended fast-narrow scsi drive floppy also supports external scsi devices ide/atapi support sparcstation classic comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver openboot rom able boot network using rarp tftp like sparcstation systems ssc holds system information mac address serial number nvram battery chip dies system able boot following operating systems run sparcstation classic sparcstation classic designed entry-level workstation lower price point sparcstation lx lower-end cg3 framebuffer rather lx accelerated cg6 sparcclassic also features 8-bit audio opposed 16-bit audio lx motherboards two systems otherwise similar use chassis july 1993 sun introduced sparcclassic x stripped-down sparcclassic marketed x terminal shipped local storage either 4 8 mb memory rather running solaris sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included hard drive additional memory
[ 7400, 578 ]
Test
613
4
3-subset_meet-in-the-middle_attack:3-subset meet-in-the-middle attack 3-subset meet-in-the-middle hereafter shortened mitm attack variant generic meet-in-the-middle attack used cryptology hash block cipher cryptanalysis 3-subset variant opens possibility apply mitm attacks ciphers trivial divide keybits two independent key-spaces required mitm attack 3-subset variant relaxes restriction key-spaces independent moving intersecting parts keyspaces subset contains keybits common two key-spaces original mitm attack first suggested article diffie hellman 1977 discussed cryptanalytic properties des argued keysize des small reapplying des multiple times different keys could solution key-size however advised using double-des suggested triple-des minimum due mitm attacks double-des susceptible mitm attack des could easily split two subciphers first second des encryption keys independent one another thus allowing basic mitm attack reduces computational complexity formula_1 formula_2 many variations emerged since diffie hellman suggested mitm attacks variations either makes mitm attacks effective allows used situations basic variant 3-subset variant shown bogdanov rechberger 2011 shown use cryptanalysis ciphers lightweight block-cipher family ktantan general mitm attacks attack split two phases key-reducing phase key-verification phase first phase domain key-candidates reduced applying mitm attack second phase found key-candidates tested another plain-/ciphertext pair filter away wrong key key-reducing phase attacked cipher split two subciphers formula_3 formula_4 independent keybits normal mitm attacks instead conform limitation keybits two subciphers independent 3-subset attack allows splitting cipher two subciphers bits allowed used subciphers done splitting key three subsets instead namely carry mitm attack 3 subsets bruteforced individually according procedure key-candidate found key-reducing phase tested another plain-/ciphertext pair done simply seeing encryption plaintext p yields known ciphertext c. usually pairs needed makes 3-subset mitm attack little data complexity following example based attack done rechberger bogdanov ktantan cipher-family naming-conventions used paper also used example attack reduces computational complexity ktantan32 formula_17 formula_18 compared bruteforce attack computational complexity formula_17 2014 still practical break attack thus computationally feasible goes ktantan48 ktantan64 complexities seen end example attack possible due weaknesses exploited ktantan bit-wise key-schedule applicable ktantan32 ktantan48 ktantan64 since variations uses key-schedule applicable related kantan family block-ciphers due variations key-schedule ktantan kantan ktantan lightweight block-cipher meant constrained platforms rfid tags cryptographic primitive aes would either impossible given hardware expensive implement invented canniere dunkelman knezevic 2009 takes block size either 32 48 64 bits encrypts using 80-bit key 254 rounds round utilizes two bits key selected key schedule round key preparation attack weaknesses key schedule ktantan allows 3-subset mitm attack identified since two key-bits used round diffusion key per round small safety lies number rounds due structure key-schedule possible find large number consecutive rounds never utilized certain key-bits precisely authors attack found characteristics key-schedule used staging 3-subset mitm attack able split cipher two blocks independent key-bits parameters attack thus one may notice problem step 1.3 key-reducing phase possible directly compare values formula_11 formula_13 formula_11 calculated end round 111 formula_13 calculated start round 131 mitigated another mitm technique called partial-matching authors found calculating forwards intermediate value formula_11 backwards intermediate value formula_13 round 127 8 bits still unchanged formula_11 formula_13 probability one thus compared part state comparing 8 bits 8 bits round 127 ktantan32 10 bits round 123 47 bits round 131 ktantan48 ktantan64 respectively yields false positives nothing increases complexity attack noticeably ktantan32 requires average 2 pairs find key-candidate due false positives matching part state intermediate values ktantan48 ktantan64 average still requires one plain-/ciphertext pair test find correct key-candidates results taken article rechberger bogdanov best attack ktantan anymore best attack 2011 contributed wei rechberger guo wu wang ling improved upon mitm attack ktantan family arrived computational complexity formula_37 4 chosen plain-/ciphertext pairs using indirect partial-matching splice cut mitm techniques
[ 1811, 4930, 464, 807, 1353, 2918, 3100, 119, 7548, 1283, 6637, 1480, 6647, 7200, 4805, 5765, 5327, 6657, 7928, 1587, 5333, 6763, 6049, 161, 433, 1320, 1146, 4917 ]
Validation
614
0
TeLQAS:telqas telqas telecommunication literature question answering system experimental question answering system developed answering english questions telecommunications domain telqas includes three main subsystems online subsystem offline subsystem ontology online subsystem answers questions submitted users real time online process telqas processes question using natural language processing component implements part-of-speech tagging simple syntactic parsing online subsystem also utilizes inference engine order carry necessary inference small elements knowledge offline subsystem automatically indexes documents collected focused web crawler web ontology server along api used knowledge representation main concepts classes ontology created domain experts classes however instantiated automatically offline components
[ 80, 8065, 5429 ]
Test
615
9
Don_Syme:syme syme australian computer scientist principal researcher microsoft research cambridge u.k designer architect f programming language described reporter regarded original new face computer languages since bjarne stroustrup developed c++ early 1980s earlier syme created generics .net common language runtime including initial design generics c programming language along others including andrew kennedy later anders hejlsberg kennedy syme dachuan yu also formalized widely used system holds ph.d. university cambridge member wg2.8 working group functional programming co-author book expert f 3.0 past also worked formal specification interactive proof automated verification proof description languages 2015 honored silver medal royal academy engineering
[ 2740, 851, 5621, 5623 ]
Train
616
3
The_Battle_For_Midway:battle midway battle midway turn-based strategy video game developed published personal software services first released united kingdom france msx 1984 re-released amstrad cpc commodore 64 zx spectrum 1985 second instalment strategic wargames series game set battle midway pacific ocean theatre world war ii revolves around united states navy attacking large imperial japanese fleet stationed midway atoll retaliation attack pearl harbour game player assumes control american forces must eliminate japanese forces around atoll air naval combat battle midway received largely negative reviews upon release criticised incompatibility black white television sets game accessible limited range colours easy difficulty gameplay also criticised game turn-based strategy focuses naval battles battle midway initiated response japanese attack pearl harbour player commands three american task forces two united states navy forces one united states air force unit stationed midway atoll objective game defeat three attacking imperial japanese naval forces american task force aircraft carrier whereas japanese four player begins game two american search aircraft used locate track attacking japanese forces main attacking japanese force located player must send available air units engage combat air combat takes place real time may take minute travel time launched aircraft carrier aircraft run fuel time crash refuelled carrier game contains elements arcade gameplay automatically enable player comes contact enemy arcade sequences involves player utilising anti-air machine gun order shoot japanese aircraft game ends four japanese aircraft carriers destroyed personal software services founded coventry england gary mays richard cockayne 1981 company known creating games featured historic war battles conflicts theatre europe bismark falklands '82 company partnership french video game developer ere informatique published localised versions products united kingdom 1986 cockayne took decision alter products release 16-bit machines found smaller 8-bit computers zx spectrum lacked processing power larger strategy games decision falsely interpreted pulling spectrum market video game journalist phillipa irving following years successful sales throughout mid 1980s personal software services experienced financial difficulties cockayne admitted retrospective interview took eye ball company acquired mirrorsoft february 1987 later dispossessed company due strains debt upon release battle midway packaged exclusive ring-binder manual detailing nature battle midway later re-released part strategic wargames compilation cassette known conflicts 2 published personal software services game received negative reviews upon release angus ryall crash criticised game incompatibility black white television sets stating despite growing british economy ryall expected developers designed games lowest common denominator gwyn hughes sinclair criticised tactical elements game light stating success player depends dexterity brainpower clare edgely sinclair user praised game historical accuracy however felt late release comparison wargames made battle midway feel ordinary reviewer computer stated game flawed attempt recreate famous battle midway despite admitting contained nice touches reviewer australian commodore review praised game wide range features save load functions however criticised menu designs insufficiently integrated arcade sequences calling poor two reviewers spectrum criticised combat sequences reliance speed pressing keys instead use strategy one reviewer considered game sophisticated however reviewer viewed game slow pace graphics negatively despite criticism ryall praised real time element game accessibility saying battle midway current standards reviewer amstrad action praised game accurate reproduction events different levels speed however criticised easy predictability japanese forces reviewer amtix stated game suffered average graphics poor sound also questioned inclusion arcade sequences reviewer 64 recommended battle midway beginners genre despite stating simple game reviewer commodore horizons called enthralling game
[ 1733 ]
Validation
617
2
POSSE_project:posse project portable open source security elements posse project co-operative venture university pennsylvania distributed systems laboratory openbsd project others received funding grant united states defense advanced research projects agency darpa project goal increase security open source projects including apache openssl project ran 2001 april 2003 grant darpa prematurely terminated security initiative directed university pennsylvania distributed systems laboratory paid composable high assurance trusted systems programme posse us 2,125,000 grant introduce advanced security features used special-purpose government computers standard office pcs united states government hoped benefit availability better security features affordable standardized computers software openbsd selected computing world ’ secure forum development open-source software approximately us 1,000,000 allotted development colleagues posse project included theo de raadt founder leader openbsd project ben laurie apache software foundation openssl group numerous faculty graduate students university pennsylvania april 2003 speaking interview canadian newspaper globe mail theo de raadt remarked occupation iraq try convince grant means half cruise missile n't get built jonathan smith head posse project stated us military officials expressed discomfort comment darpa funding project subsequently terminated theorized us government disapproved de raadt comments led decision cancel grant however darpa spokeswoman jan walker explained triggered recent world events specifically evolving threat posed increasingly capable nation-states
[ 1356, 5373 ]
Test
618
1
NaPTAN:naptan national public transport access node naptan database uk nationwide system uniquely identifying points access public transport uk database closely associated national public transport gazetteer every uk railway station coach terminus airport ferry terminal bus stop taxi rank place public transport joined left allocated unique naptan identifier relationship stop city town village locality indicated association elements national public transport gazetteer cen standardisation initiative identification fixed objects public transport 'ifopt develop naptan concepts european standard stop identification extension transmodel european standard public transport information ability identify locate stops relation topography consistently economically fundamental modern computer based systems provide passenger information manage public transport networks stop data needed journey planners scheduling systems real-time systems transport planning performance monitoring many purposes digitalising nation public transport stops essential step creating national information infrastructure uk naptan enabled creation transport direct portal uk nationwide system multi-modal journey planning naptan also underpins transxchange uk standard bus schedules used electronic registration bus services naptan comprises several distinct elements naptan identifiers designed used within uk digital national framework system unique persistent reference shareable information resources types managed ordnance survey naptan includes related standard uk national public transport gazetteer national public transport access node database holds current copy uk stops stops submitted ptes central authority consolidates stops distributes back users 450,000 stop points current database naptan database maintained centrally contract department transport naptan data described naptan xml schema used describe naptan data exchanging systems xml documents versioned different generations data managed see http //www.dft.gov.uk/naptan/schema/2.4/naptan.xsd nptg naptan data conforms family consistent interlocking data models models described nptg naptan schema guide uml notation naptan identifiers systematic way identifying uk points access public transport stop points naptan stop points number text descriptor elements associated name also additional labels distinguishing identifiers help users recognise elements combined different ways provide presentations names useful many different contexts example maps stop finders timetables etc. mobile devices purpose descriptors create iterative level detail i.e country county locality street name identifier information included user data decide much data relevant task hand every naptan point includes geospatial coordinates specified ordnance survey national grid format wgs84 latitude longitude pairs allows naptan points projected maps associated information layers integrated transport network ordnance survey national public transport gazetteer closely associated naptan dataset contains details every city town village suburb great britain i.e. uk including northern ireland dataset based usage names rather legal definitions includes local informal names places well official names
[ 2054 ]
Validation
619
6
WinRAR:winrar winrar trialware file archiver utility windows developed eugene roshal win.rar gmbh create view archives rar zip file formats unpack numerous archive file formats enable user test integrity archives winrar embeds crc32 blake2 checksums file archive winrar supports creating encrypted multi-part self-extracting archives winrar windows-only program android application called rar android also available related programs include command-line utilities rar unrar versions macos linux freebsd windows ce ms-dos winrar rar file format evolved time support archive format rar5 using rar file extension earlier versions added version 5.0 files older rar file format since referred rar4 winrar versions 5.0 support rar5 archives older versions winrar run windows versions prior xp open rar5 archives rar5 file format increased maximum dictionary size 1 gib 11 different compression directory sizes 1 mib 1 gib available default version 5 increased 4 mib 32 mib typically improving compression ratio aes encryption used increased 128- 256-bit maximum path length files rar zip archives increased 2048 characters options added v5.0 include 256-bit blake2 file-hashing algorithm instead default 32-bit crc32 duplicate file detection ntfs hard symbolic links quick open record allow large archives opened faster rar5 file format removed comments file though archive comment still remains authenticity verification specialized compression algorithms text multimedia files rar5 also changed file name split volumes archivename.rnn archivename.partnn.rar creating rar archives software distributed try buy may used without charge 40 days china free-to-use personal edition provided officially since 2015 although archiving rar format proprietary rarlab supplies copyrighted freeware c++ source code current unrar unpacker license allowing used software thus enabling others produce software capable unpacking creating rar archives rar android free charge displays advertisements payment disabled license winrar provide ad-suppression rar android february 2019 major security vulnerability unacev2.dll library used winrar decompress ace archives discovered consequently winrar dropped support ace format version 5.7 self-extracting archives created versions 5.31 including executable installer winrar vulnerable dll hijacking may load use dlls named uxtheme.dll riched32.dll riched20.dll folder executable file widely reported winrar v5.21 earlier remote code execution rce vulnerability could allow remote attacker insert malicious code self-extracting executable sfx file created user putting 500 million users software risk however examination claim revealed vulnerability existed result merely sfx delivered payload executed published responses dismissed threat one saying find suckers trust .exe labelled self-extracting archive ... trick running smuggled javascript recent versions support many older operating systems versions supporting older operating systems may still available maintained
[ 4213, 7058, 985, 6256, 1534, 3849, 1352, 6992, 2566, 5571, 3967, 5042, 658, 578, 4700, 1955, 7746, 3032, 7201, 6380, 7387, 3219, 510, 8118, 8126, 1127, 2334, 6940, 4732, 5256, 3152, 169, 1139, 7306, 1237, 3416, 352, 5349, 4461, 2897 ]
Test
620
8
Web_audience_measurement:web audience measurement web audience measurement wam audience measurement website analytics tool measures internet usage india system joint effort imrb international internet mobile association india surveys 6000 individuals across 8 metropolitan centers india tracks variety metrics time-on-site exposure reach frequency internet usage wam uses audience measurement continuous tracking panel study provides cross sectional data internet usage segmented gender sec location panel-based approach uses metering technology design indian context tracks computers web rating points factor multiple measures internet usage provide comprehensive picture web advertisers attempts standardize web analytics india web analytics market india currently fragmented comscore vizisense imrb key competitors several discussions revolve around difference numbers provided competitors digital audience measurement space therefore choosing right measurement partner imperative media stakeholders creates rifts users two different audience measurement tools
[ 4600 ]
Test
621
4
Algae_DNA_barcoding:algae dna barcoding dna barcoding algae commonly used species identification phylogenetic studies algae form phylogenetically heterogeneous group meaning application single universal barcode/marker species delimitation unfeasible thus different markers/barcodes applied aim different algal groups diatom dna barcoding method taxonomical identification diatoms even species level conducted using dna rna followed amplification sequencing specific conserved regions diatom genome followed taxonomic assignment one main challenges identifying diatoms often collected mixture diatoms several species dna metabarcoding process identifying individual species mixed sample environmental dna also called edna dna extracted straight environment soil water samples newly applied method diatom dna metabarcoding used ecological quality assessment rivers streams specific response diatoms particular ecologic conditions species identification via morphology relatively difficult requires lot time expertise high-throughput sequencing hts dna metabarcoding enables taxonomic assignment therefore identification complete sample regarding group specific primers chosen previous dna amplification several dna markers already developed mainly targeting 18s rrna using v4 hypervariable region ribosomal small subunit dna ssu rdna dna-based identification found efficient classical morphology based approach conserved regions genomes frequently used marker genes ribulose-1-5-bisphosphate carboxylase rbcl cytochrome oxidase cox1 coi 28s shown repeatedly molecular data gained diatom edna metabarcoding quite faithfully reflect morphology-based biotic diatom indices therefore provide similar assessment ecosystem status meantime diatoms routinely used assessment ecological quality freshwater ecosystems together aquatic invertebrates considered best indicators disturbance related physical chemical biological conditions watercourses numerous studies using benthic diatoms biomonitoring ideal diatom dna barcode found proposed different markers used different purposes indeed highly variable cox1 28s genes considered suitable taxonomic studies conserved 18s rbcl genes seem appropriate biomonitoring applying dna barcoding concept diatoms promises great potential resolve problem inaccurate species identification thus facilitate analyses biodiversity environmental samples.. molecular methods based ngs technology almost always leads higher number identified taxa whose presence could subsequently verified light microscopy results study provides evidence edna barcoding diatoms suitable water quality assessment could complement improve traditional methods stoeck et al also showed edna barcoding provides insight diatom diversity protist communities therefore could used ecological projection global diversity studies showed different results example inventories obtained molecular-based method closer obtained morphology-based method abundant species focus dna metabarcoding also increase taxonomic resolution comparability across geographic regions often difficult using morphological characters moreover dna-based identification allows extending range potential bioindicators including inconspicuous taxonomic groups could highly sensitive tolerant particular stressors indirectly molecular methods also help filling gaps knowledge species ecology increasing number samples processed coupled decrease processing time cost-effectiveness well increasing accuracy precision correlation species/motus occurrence environmental factors currently consensus concerning methods dna preservation isolation choice dna barcodes pcr primers agreement concerning parameters motu clustering taxonomic assignment sampling molecular steps need standardize development studies one major limitation availability reference barcodes diatoms species.the reference database bioindicator taxa far complete despite constant efforts numerous national barcoding initiatives lot species still lacking barcode information furthermore existing metabarcoding data locally available geographically scattered hindering development globally useful tools visco et al estimated 30 european diatoms species currently represented reference databases example important lack number species fennoscandian communities especially acidophilic diatoms eunotia incisa also shown taxonomic identification dna barcoding accurate species level discriminate varieties example reference missing another well-known limitation barcoding taxonomic identification clustering method used taxonomic assignation often leads massive loss genetic information reliable way assess effects different clustering different taxonomic assignation processes would compare species list generated different pipelines using reference database yet done variety pipelines used molecular assessment diatom communities europe taxonomically validated databases includes accessible vouchers also crucial reliable taxa identification via ngs additionally primer bias often found major source variation barcoding pcr primers efficiency differ diatoms species i.e primers lead preferential amplification one taxon another inference abundance metabarcoding data considered one difficult issues environmental use number generated sequences hts directly correspond number specimen biomass different species produce different amount reads example due differences chloroplast size rbcl marker vasselon et al recently created biovolume correction factor using rbcl marker example achnanthidium minutissimum small biovolume thus generate less copies rbcl fragment located chloroplast larger species correction factor however requires extensive calibration species biovolume tested species far fluctuations gene copy number markers the18s marker seem species specific tested yet barcoding marker usually combine hypervariable regions genome allow distinction species conserved region insure specificity target organism several dna markers belonging nuclear mitochondrial chloroplast genomes rbcl coi its+5.8s ssu 18s… designed successfully used diatoms identification ngs 18s gene region widely used marker protist groups jahn et al first test 18s gene region diatoms barcoding zimmerman et al proposed 390–410 bp long fragment 1800 bp long 18s rrna gene locus barcode marker analysis environmental samples hts discusses use limitations diatom identification fragment includes v4 subunit largest complex highly variable regions within 18s locus highlighted hypervariable region 18s gene great potential studying protist diversity large scale limited efficiency identification species level cryptic species rbcl gene used taxonomy studies trobajo et al 2009 benefits include rarely intragenomic variation easily aligned compared open-access reference library called r-syst :diatom includes data two barcodes 18s rbcl freely accessible website kermmarec et al also successfully used rbcl gene ecological assessment diatoms rbcl marker also easily aligned compared moniz kaczmarska investigated amplification success ssu coi its2 markers found 300 – 400 bp its-2 5.8s fragment provided highest success rate amplification good species resolution marker subsequently used separate morphologically defined species success rate 99.5 despite amplification success zimmerman et al criticised use its-2 due intra-individual heterogeneity suggested ssu rbcl mann et al. 2010 markers less heterogenous individuals therefore beneficial distinguishing species diatoms routinely used part suite biomonitoring tools must monitored part european water framework directive diatoms used indicator ecosystem health freshwaters ubiquitous directly affected changes physico-chemical parameters show better relationship environmental variables taxa e.g invertebrates giving better overall picture water quality recent years researchers developed standardised tools metabarcoding sequencing diatoms complement traditional assessment using microscopy opening new avenue biomonitoring aquatic systems using benthic diatoms method next-generation sequencing approach river biomonitoring revealed good potential many studies shown metabarcoding hts high-throughput sequencing utilized estimate quality status diversity freshwaters part environment agency kelly et al developed dna-based metabarcoding approach assess diatom communities rivers uk vasselon et al compared morphological hts approaches diatoms found hts gave reliable indication quality status rivers terms specific polluosensitivity index spi vasselon et al also applied dna metabarcoding diatoms communities monitoring network rivers tropical island mayotte french dom-tom rimet et al also explored possibility using hts assessing diatom diversity showed diversity indices hts microscopic analysis well correlated although perfect dna barcoding metabarcoding used establish molecular metrics indices potentially provide conclusions broadly similar traditional approaches ecological environmental status aquatic ecosystems diatoms used diagnosis tool drowning forensic practices diatom test based principle diatom inhalation water lungs distribution deposition around body dna methods used confirm cause death indeed drowning locate origin drowning diatom dna metabarcoding provides opportunity quickly analyse diatom community present within body locate origin drowning investigate body may moved one place another diatom metabarcoding may help delimit cryptic species difficult identify using microscopy help complete reference databases comparing morphological assemblages metabarcoding data chlorophytes possess ancients taxonomically diverse lineage fang et al 2014 including terrestrial plants even though 14 000 species described based structural ultrastructural criteria hall et al 2010 morphological identification often limited several barcodes chlorophytes proposed dna-based identification order bypass problematics morphological one although cytochrome oxidase coi cox coding gene link standard barcode animals proved unsatisfactory chlorophytes gene contains several introns algae group turmel et al 2002 nuclear marker genes used chlorophytes ssu rdna lsu rdna rdna leliaert et al 2014 macroalgae challenging identify simple morphology phenotypic plasticity alternate lifecycle stages thus algal systematics identification come rely heavily genetic/molecular tools dna barcoding ssu rdna gene common used barcode phylogenetic studies macroalgae however ssu rdna highly conserved region typically lack resolution species identification past 2 decades certain standards dna barcoding aim species identification developed main groups macroalgae cytochrome c oxidase subuinit coi gene commonly used barcode red brown algae tufa plastid elongation factor rbcl rubisco large subunit internal transcribe spacer commonly used green algae barcodes typically 600-700 bp long barcodes typically differ 3 main groups macroalgae red green brown evolutionary heritage diverse macroalgae polyphyletic group meaning within group share recent common ancestor making challenging find gene conserved among variable enough species identification adapted detailed information dna barcoding different organisms found microbial dna barcoding dna barcoding fish dna barcoding dna barcoding diet assessment
[ 621 ]
Test
622
9
Man_or_boy_test:man boy test man boy test proposed computer scientist donald knuth means evaluating implementations algol 60 programming language aim test distinguish compilers correctly implemented recursion non-local references algol 60 creates tree b call frames refer containing call frames copy k changes every time associated b called trying work paper probably fruitless k =10 correct answer −67 despite fact original paper knuth conjectured −121 survey paper charles h. lindsey mentioned references contains table different starting values even modern machines quickly run stack space larger values k tabulated three algol features used program difficult implement properly compiler things however test 're merely prerequisites test meaningful test whether different references b resolve correct instance b — one access -local symbols b created reference boy compiler might example instead compile program b always accesses topmost call frame
[ 1361, 1997, 7807, 21, 1114, 5986, 5948, 3437, 5225, 4039, 2081, 1828, 1435 ]
Test
623
4
SQL_injection:sql injection sql injection code injection technique used attack data-driven applications malicious sql statements inserted entry field execution e.g dump database contents attacker sql injection must exploit security vulnerability application software example user input either incorrectly filtered string literal escape characters embedded sql statements user input strongly typed unexpectedly executed sql injection mostly known attack vector websites used attack type sql database sql injection attacks allow attackers spoof identity tamper existing data cause repudiation issues voiding transactions changing balances allow complete disclosure data system destroy data make otherwise unavailable become administrators database server 2012 study observed average web application received 4 attack campaigns per month retailers received twice many attacks industries first public discussions sql injection started appearing around 1998 example 1998 article phrack magazine sql injection sqli considered one top 10 web application vulnerabilities 2007 2010 open web application security project 2013 sqli rated number one attack owasp top ten four main sub-classes sql injection storm worm one representation compounded sqli classification represents state sqli respecting evolution 2010—further refinement underway form injection occurs user input filtered escape characters passed sql statement results potential manipulation statements performed database end-user application following line code illustrates vulnerability sql code designed pull records specified username table users however username variable crafted specific way malicious user sql statement may code author intended example setting username variable using comments even block rest query three types sql comments three lines space end renders one following sql statements parent language code used authentication procedure example could used force selection every data field users rather one specific user name coder intended evaluation 1'= 1 always true following value username statement would cause deletion users table well selection data userinfo table essence revealing information every user using api allows multiple statements input renders final sql statement follows specified sql server implementations allow multiple statements executed one call way sql apis php codice_1 function allow security reasons prevents attackers injecting entirely separate queries n't stop modifying queries blind sql injection used web application vulnerable sql injection results injection visible attacker page vulnerability may one displays data display differently depending results logical statement injected legitimate sql statement called page type attack traditionally considered time-intensive new statement needed crafted bit recovered depending structure attack may consist many unsuccessful requests recent advancements allowed request recover multiple bits unsuccessful requests allowing consistent efficient extraction several tools automate attacks location vulnerability target information established one type blind sql injection forces database evaluate logical statement ordinary application screen example book review website uses query string determine book review display url codice_2 would cause server run query would populate review page data review id 5 stored table bookreviews query happens completely server user know names database table fields user know query string user sees url returns book review hacker load urls codice_3 codice_3 may result queries respectively original review loads 1=1 url blank error page returned 1=2 url returned page created alert user input invalid words caught input test script site likely vulnerable sql injection attack query likely passed successfully cases hacker may proceed query string designed reveal version number mysql running server codice_3 would show book review server running mysql 4 blank error page otherwise hacker continue use code within query strings glean information server another avenue attack discovered goals achieved second order sql injection occurs submitted values contain malicious commands stored rather executed immediately cases application may correctly encode sql statement store valid sql another part application without controls protect sql injection might execute stored sql statement attack requires knowledge submitted values later used automated web application security scanners would easily detect type sql injection may need manually instructed check evidence attempted sql injection well known attack easily prevented simple measures apparent sql injection attack talktalk 2015 bbc reported security experts stunned large company would vulnerable development platforms parameterized statements work parameters used sometimes called placeholders bind variables instead embedding user input statement placeholder store value given type arbitrary sql fragment hence sql injection would simply treated strange probably invalid parameter value many cases sql statement fixed parameter scalar table user input assigned bound parameter easily put using parameterized queries definitely prevent sql injection mainly means variables n't query strings would accept arbitrary sql inputs however parameters given types definitely necessary parameterized queries require developer define code therefore without parameterized queries anyone could put kind sql code field database erased parameters set username person would able put username without kind code using object-relational mapping libraries avoids need write sql code orm library effect generate parameterized sql statements object-oriented code straightforward though error-prone way prevent injections escape characters special meaning sql manual sql dbms explains characters special meaning allows creating comprehensive blacklist characters need translation instance every occurrence single quote codice_6 parameter must replaced two single quotes codice_7 form valid sql string literal example php usual escape parameters using function codice_8 sending sql query function prepends backslashes following characters codice_9 codice_10 codice_11 codice_12 codice_6 codice_14 codice_15 function normally used make data safe sending query mysql php similar functions database systems pg_escape_string postgresql function codice_16 works escaping characters used especially querying databases escaping functions php returns string backslashes characters need quoted database queries etc characters single quote double quote backslash nul null byte routinely passing escaped strings sql error prone easy forget escape given string creating transparent layer secure input reduce error-proneness entirely eliminate integer float boolean string parameters checked value valid representation given type strings must follow strict pattern date uuid alphanumeric etc checked match pattern limiting permissions database login used web application needed may help reduce effectiveness sql injection attacks exploit bugs web application example microsoft sql server database logon could restricted selecting system tables would limit exploits try insert javascript text columns database
[ 3932, 6092, 2923, 6098, 1096, 2566, 5401, 6823, 4345, 758, 74, 5435, 84, 3680, 3681, 2622, 5452, 6515, 3364, 7262, 5485, 2310, 4064, 1956, 5149, 2354, 6594, 7319, 545, 7715, 3448, 6266, 3794, 230, 7390, 3135, 3816, 1307, 3486, 5956, 168...
Test
624
4
Dendroid_(malware):dendroid malware dendroid malware affects android os targets mobile platform first discovered early 2014 symantec appeared underground sale 300 certain features noted used dendroid ability hide emulators time first discovered 2014 one sophisticated android remote administration tools known time one first trojan applications get past google bouncer caused researchers warn easier create android malware due also seems followed footsteps zeus spyeye simple-to-use command control panels code appeared leaked somewhere around 2014 noted apk binder included leak provided simple way bind dendroid legitimate applications capable
[ 6643, 6459, 6831, 3282, 1691, 1766, 7186, 2693 ]
Test
625
3
Switchover:switchover switchover manual switch one system redundant standby computer server system network upon failure abnormal termination previously active server system network perform system maintenance installing patches upgrading software hardware automatic switchover redundant system error condition without human intervention called failover manual switchover error would used automatic failover available possibly overall system complex
[ 6391, 6915, 2442, 2776 ]
Test
626
5
BEEP:beep blocks extensible exchange protocol beep framework creating network application protocols beep includes building blocks like framing pipelining multiplexing reporting authentication connection message-oriented peer-to-peer p2p protocols support asynchronous full-duplex communication message syntax semantics defined beep profiles associated one beep channels channel full-duplex pipe framing-mechanism enables simultaneous independent communication peers beep defined rfc 3080 independently underlying transport mechanism mapping beep onto particular transport service defined separate series documents profiles channels framing mechanism used beep exchange different kinds messages content type encoding defaulted specification leaving full flexibility using binary textual format open protocol designer profiles define functionality protocol message syntax semantics channels full-duplex pipes connected particular profile messages sent different channels independent asynchronous multiple channels use profile one connection beep also includes tls encryption sasl authentication 1998 marshall t. rose also worked pop3 smtp snmp protocols designed bxxp protocol subsequently handed internet engineering task force ietf workgroup summer 2000 2001 ietf published beep rfc 3080 beep tcp rfc 3081 enhancements bxxp three notable start beep session initiating peer connects listening peer peers sending positive reply containing greeting element immediately simultaneously greeting contains three different elements example greeting answer profiles define syntax semantics messages protocol functionality based beep single beep session provide access multiple profiles identify profile unique string assigned profile identifier format uniform resource identifier uri uniform resource name urn past uri format profile identifier lead confusion similar web address avoid misunderstandings newer profiles use urn format example profile identifier beep messages structured according mime standard sometimes misunderstandings beep using xml messages small subset xml used channel 0 transparent profile designer beep user profile designer message content format used textual format like json xml well binary data xml used channel management tls standard profile defined beep example successful channel close message exchange rfc3080 larger messages split multiple parts distributed number sequence frames beep defines 5 message types allow application protocols patterns needed following common application protocol patterns implemented like follows beep supports sequence frames seq implement flow control channel level sequence frames defined rfc 3081 section 3.3 transmission control protocol tcp defines sequence mechanism transport layer level supports flow control related connection flow control channel level beep needed ensure channel big message monopolizes entire connection extend sequence frames used support quality service qos avoid starvation deadlock
[ 6025, 1593, 7214, 5947, 7637, 2566, 6908, 5109, 3794 ]
Test
627
2
Jurix:jurix jurix early gnu/linux distribution created florian la roche former employee legal department saarland university distribution maintained 1993 1999 hosted now-defunct jurix.jura.uni-sb.de susix.jura.uni-sb.de domains 1996 jurix superseded slackware base suse linux name jurix borrowed department first http server named alexander sigel known whether name taken nearby dutch law organisation jurix simply portmanteau jura meaning law german linux readme 1999 touts following software among others
[ 5200, 1629, 3444, 7251, 474, 7075, 1941, 578, 314, 2758, 1663, 2864, 6209, 2680, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 7954, 6244 ]
Test
628
3
Turmoil_(1984_video_game):turmoil 1984 video game turmoil platform game released 1984 zx spectrum 1986 msx bug byte player takes control mechanic mick employed rich arabian sheikh sheikh refused pay mick work done mick decides steal collection expensive cars lieu payment must build cars collecting oil dripping oil tank oil also used offensive weapon pursuing arabian guards playing area consists number platforms ladders conveyor belts swinging ropes mick must negotiate first must collect oil must take tap dripping oil oil collected must taken garage mick empty drop time fill car car invisible initially built drop oil deposited first level car mini subsequent levels cars become sleek expensive also present level number enemies resembling arabs attack mick cause lose life unlike platform games main character jump must fall onto one springs present level bounce different platform arabs also make use ladders ropes springs reviews overwhelmingly positive crash gave game 90 crash smash spectrum called hit 3.5/5 dave nicholls spectrum said springs great idea crash called slick well executed program retrogaming website retro view despite commenting politically incorrect nature using arabs enemies claims comes pure fun-filled platforming speccy n't come much better turmoil 'it knockout 8-bit videogaming decided turmoil earned crash smash release opinion well deserved giving overall rating 93 game designed written david turner
[]
Test
629
2
AMPPS:ampps ampps solution stack apache mysql mongodb php perl python windows nt linux macos comes 442 php web applications 1000 php classes 6 versions php ampps created softaculous ltd. company founded 2009 makes softaculous auto installer ampps used develop php mysql applications like wordpress joomla drupal software 442 php applications
[ 6029, 5983, 933, 5965, 578, 6256, 3463 ]
Test
630
2
ISPF:ispf computing interactive system productivity facility ispf software product many historic ibm mainframe operating systems currently z/os operating system runs ibm mainframes includes screen editor user interface emulated microcomputer editors sold commercially starting late 1980s including spfpc ispf primarily provides ibm 3270 terminal interface set panels panel may include menus dialogs run tools underlying time sharing option tso generally panels provide convenient interface tasks—most execute modules ibm mainframe utility programs actual work ispf frequently used manipulate z/os data sets via program development facility ispf/pdf ispf user-extensible often used application programming interface many vendors created products z/os use ispf interface early version called merely spf introduced mvs system 1974 originally stood structured programming facility since introduced time structured programming concepts later name changed system productivity facility 1985 ibm ported ispf/pdf vm/sp operating system able use either pdf xedit editor ispf also run z/os batch job user signs tso start ispf/pdf menuing system provides access many useful tools application development administering z/os operating system tools include underlying ispf/pdf extensive set tools allow application developers create panel-driven applications set guidelines promote consistent use ispf functions panel character-based window encompass part 3270 session screen real estate see text-based user interfaces mainframe software vendors used ispf functions create applications tools similar appearance operation ispf similarly many installations write informal tools use ispf services ispf services generally available programmer shop used write panels either personal shop-wide use writing either compiled languages c cobol pl/i interpreted languages clist rexx ispf applications used perform so-called file tailoring functions customisation specially crafted jcl members called skeletons submitted batch jobs mainframe editor screen formatted 2 lines info command line top bottom -- user choice six character line number column left margin remainder screen width filled records dataset edited primary commands apply whole dataset find print sort etc typed command line line commands apply specific line copy move repeat insert exclude delete text flow text split entered over-typing line number fields one two character code representing command applied line followed optional number modifies supplied command editor several key features editor also invoked 'view mode behaves like editor allow saving data edited files also saved different name creating replacing another file ispf provides 'editor interface lets application program display arbitrary data familiar editor panel thus many vendor packages use familiar interface ispf designed customized user fairly new concept 1974 introduced supports set 24 function keys pressed execute commands customizable user replace default commands assigned key preferred command series commands user settings stored centrally user logon terminal session remember previously-chosen commands key personal computers copied set 12 function keys even defaults endured f1 key triggers help function large number mainframe pc programs ispf remembers user choices things screen colors layout location command line scrolling preferences also remembers last-used data set names panel next time panel used names already filled convenient mainframe programmers frequently work files repeatedly many early users pcs mainframe programmers users accustomed liked ispf panel system led several companies create versions ispf run windows unix pc systems 1984 ibm introduced ez-vu dialog manager dos pcs later os/2 spf/se 365 kedit editors still sold currently free spflite currently available ispf z/os provides built-in downloadable client program install run windows pcs unix workstations client program called ispf workstation agent communicates directly ispf z/os provides point-and-click graphical user interface automatically ispf workstation agent used edit pc based files ispf editor take advantage editor strengths
[ 3209, 6293, 5041, 4695, 2438, 850, 5726, 4673, 5932, 3874, 6957, 6785, 1435 ]
Validation
631
9
Java_Web_Start:java web start computing java web start also known javaws javaws jaws framework developed sun microsystems oracle allows users start application software java platform directly internet using web browser key benefits technology include seamless version updating globally distributed applications greater control memory allocation java virtual machine java web start distributed part java platform included downloads jre jdk deprecated oracle java se 9 removed java se 11 code java web start released oracle part openjdk thus openjdk originally support icedtea-web provides independent open source implementation java web start currently developed adoptopenjdk community redhat karakun ag bundled official openjdk installer unlike java applets web start applications run inside browser default run sandbox applets several minor extensions like allowing load save file explicitly selected user file selection dialog signed applications configured additional permissions web start advantage applets overcomes many compatibility problems browsers java plugins different jvm versions web start programs longer integrated part web page independent applications run separate frame web start also launch unmodified applets packaged inside .jar files writing appropriate jnlp file file also pass applet parameters applets also run separate frame applet launcher may support specific cases like loading class resource like applets java web start cross-platform jdk9 java applets deprecated oracle java web start intended replacement march 2018 oracle announced include java web start java se 11 18.9 lts later developers need transition deployment technologies developer prepares special xml file jnlp extension file describes application requirements code location parameters additional permissions browser downloads file following mime type codice_1 opens web start tool web start tool downloads necessary resources launches application java web start provides series classes codice_2 package provide various services application sun designed services aim allowing carefully controlled access resources files system clipboard restricting application authorized operations sun introduced version 1.0 web start march 2001 64-bit windows support added java 6 later 64-bit java first available since j2se 1.4 web start comes default part java runtime environment jre called codice_3 computer administrators longer install separately programmers often speak java network launching protocol jnlp interchangeably term web start jnlp protocol defined xml schema specifies launch java web start applications jnlp consists set rules defining exactly implement launching mechanism jnlp files include information location jar package file name main class application addition parameters program properly configured browser passes jnlp files java runtime environment jre turn downloads application onto user machine starts executing development jnlp took place java community process jsr 56 important web start features include ability automatically download install jre case user java installed programmers specify jre version given program needs order execute user remain connected internet execute downloaded programs execute locally maintained cache updates software download web become available user connection internet thus easing burden deployment computer user use jnlp simply installing jnlp client commonly java web start installation occur automatically end-user sees client launcher downloading installing java application first executed jnlp works similar fashion http/html works web rendering html webpage user clicks weblink browser submits url webserver replies html file browser requests resources referred file images css finally renders page received enough information page rendering usually starts resources downloaded resources critical layout page images follow afterwards jnlp mirrors process way web browser renders webpage jnlp client renders java app user clicks weblink browser submits url webserver replies jnlp file instead html file application jnlp client parses file requests resources specified jar files waits retrieval required resources launches application jnlp file list resources lazy informs jnlp client application need resources start retrieve later when/if application requests example gives simple jnlp file launch applet specifying code base source main class window size file contains necessary references self-sufficient launch application permissions requested code run sandbox jnlp also states application run offline already cached updated background process reduce size java web start application sun microsystems introduced compression system called pack200 java 1.5.0 compress large jar file one-ninth original size contains java classes java web start supported pack200 since first appeared initially feature required server-side cooperation certain amount expertise set sun introduced java se 6u10 pack200 support became available without need special server support application designers enable disable feature within jnlp files slow connections pack200 gives performance boost application startup time download time default java web start applications run restricted means access system resources local files publishers remove restrictions signing web start applications codice_4 tool comes jdk open-source icedtea project provides alternative jnlp implementation icedtea-web version 1.7.2 also works newer versions without official jws support openwebstart project run java web start base application release java 11 webswing specialized web server running swing based java applications browser jnlp implementations sun reference implementation
[ 2624, 3077, 5015, 5545, 7347, 1640, 6280, 7459, 401, 7460, 2487, 3879, 5408, 7109, 4185, 2519, 2520, 4997, 3495, 3915, 6156, 6858, 2530, 6319, 2619, 1803, 2807, 4287 ]
Test
632
7
CloudBolt:cloudbolt cloudbolt hybrid cloud management platform developed cloudbolt software deploying managing virtual machines vms applications resources public clouds e.g. aws ms azure gcp private data centers e.g. vmware openstack platform developed alexandre augusto auggy da rocha bernard sanders da rocha began work prototype platform 2010 calling smartcloud 1.0 together created generalized solution released august 2011 smartcloud 2.0 early version focused simple installs upgrades virtual machines building extensible product customers could use platform integrating technologies 2012 renamed company cloudbolt software avoid name conflict ibm offering released version cloudbolt command control 3.0 2014 product name cloudbolt command control c2 simplified cloudbolt product timeline company received series funding insight venture partners july 2018
[ 4211, 5894, 4295, 4217, 2988, 7613, 370, 189, 289, 1634, 3091, 6262, 7165, 3954, 7722, 3958, 6806, 22, 3627, 1550, 5927, 2212, 6906, 5135, 7741, 320, 1757, 3028, 5940, 2317, 7838, 842, 3309, 754, 5064, 330, 7114, 4627, 2961, 2430, 4636,...
Test
633
7
3Station:3station 3station diskless workstation developed bob metcalfe 3com first available 1986 3station/2e 10 mhz 80286 processor 1 megabyte ram expandable vga-compatible graphics video ram integrated aui/10base2 bnc network transceivers lan access product used single printed-circuit board four custom asics neither floppy disk drive hard disk booted server stored end-user files 3com advertised significant cost savings due 3station ease installation low maintenance would referred banner total cost ownership 3station cost lay somewhere ibm pc clone ibm pc day commercially successful similarly configured low end workstations followed 3stations sold package 3server central hub australian taxation office ato significant customer setup groupe bull subsidiary bull hn née honeywell eventually purchasing many thousand 3stations associated 3server machines network enabled tax office centrally control software versions canberra office distributing australia wide without tedium cost updating thousands independent hard drive based pcs 286 processor became obsolete ato opened tender replacement 3station 2e suitable 386 based machine tender process eventually bull hn product labelled 3station/386 shared external case common part 3com little input design supplying technical help access networking chip sets internals custom designed single board based 3com etherlink ii networking ati graphics 3station 2 3s manufactured license sydney contract ended
[ 1237, 4277, 7639 ]
Test
634
7
OProject@Home:oproject home oproject home volunteer distributed computing project running berkeley open infrastructure network computing boinc based dedicated library olib project directed lukasz swierczewski student college computer science business administration lomza computer science automation institute 2016 seems abandoned shor algorithm shor algorithm dp main subprojects oproject home objective test quantum algorithms e.g shor algorithm quantum computing gsce-sv verifies correctness goldbach conjecture alx non-cpu-intensive nci subproject capable running arm-based cpus running android linux used research develop artificial intelligence computer networks project supports playstation 3 weird engine subproject calculates weird numbers numbers available project database according oeis largest publicly available database numbers ongoing work application analyzing status water earth oproject home uses data nasa noaa satellites analyzed data taken devices avhrr amsr used measure earth radiation predominantly infrared based information easy calculate sea surface temperature ice concentration point earth information enable perform analysis simulations climate subprojects running platform oproject home important science address difficult unsolved problems physics theoretical mathematics example goldbach conjecture proposed 1742 never disproven even clear whether problem solved range numbers infinite also known odd weird numbers calculated weird numbers even climate change global warming also raised number controversies future goal effectively analyze entire earth predict probability various possible threats people systems warn natural disasters hurricanes cyclones may arise future although future development sample video showing sea surface temperature 1982 generated order show result simulation based publicly available databases organisations noaa nasa volunteer computing projects progress relies recruiting number users willing donate computing power project projects usually run background computer idle little performance impact person using computer side effect project develop high-performance algorithms various subprojects source code programs open available public download google code licensed gpl license data generated project also available project website also distributed gpl license project also open new subprojects although current focus continued development software order ensure stable platform project officially launched 13 august 2012 9 october 2012 2243 volunteers 1779 hosts participated project oproject 9th place boinc projects amount new hosts well-known wcg seti home milkyway collatz conjecture primegrid projects september 30 2012 project lead released news launch oproject home boinc official website later day project added overall list distributed systems
[ 3915, 4759, 5571, 2325, 4484, 578, 2081 ]
Test
635
9
GNU_LibreJS:gnu librejs gnu librejs simply librejs free software web browser extension mozilla firefox-based browsers created gnu project purpose block nonfree nontrivial javascript programs allow free trivial js user web browser add-on created address so-called javascript trap first described richard stallman 2009 situation many users unknowingly run proprietary software web browsers gnu librejs aims block nonfree javascript programs present many websites developed part gnu project ruben rodriguez nik nyby included default gnu icecat browser also work tor add-on allows site whitelisting e-mail detection system users contact page webmasters order persuade making javascript code compliant librejs according free software foundation many websites whitelisted break using add-on due pervasiveness proprietary javascript code web nevertheless programmer activist richard stallman supports usage gnu librejs
[ 2810, 562, 7581, 2451, 6489, 753, 6211, 2026, 7669 ]
Test
636
3
Choplifter:choplifter choplifter stylized choplifter 1982 apple ii game developed dan gorlin published brøderbund ported atari 5200 atari 8-bit family colecovision commodore 64 commodore vic-20 msx thomson computers graphically enhanced versions atari 8-bit family atari 7800 published 1988 atari corporation 1985 sega released coin-operated arcade remake turn ported nintendo entertainment system master system 1986 choplifter one games first appeared home system ported arcade choplifter player assumes role combat helicopter pilot player attempts save hostages held prisoner war camps territory ruled evil bungeling empire player must collect hostages transport safely nearby friendly base fighting hostile tanks enemy combatants according backstory helicopter parts smuggled country described mail-sorting equipment although iran hostage crisis ended year game released gorlin stated tie-in current events something never really crossed mind published helicopter face three directions left right forward facing player may shoot enemies directions need fly direction facing forward-facing mode used primarily shoot tanks player must careful protect hostages enemy fire well accidental friendly fire player rescues prisoners first shooting one hostage buildings release landing allow prisoners board sortie returning player starting point four buildings holds 16 hostages 16 passengers carried time several trips must made chopper full hostages attempt board wave helicopter wait return usually trip back risky previous one since enemy alerted deployed counter-attack player lands directly top hostage completely blocks building exit hostages killed apple ii atari 7800 versions hostages also die vehicle landed correctly slightly tilted crushed attempt board chopper grounded helicopter may attacked enemy tanks shoot returning air also enemy scrambles jet fighters attack vehicle air air-to-air missiles ground bombs coming stint working rand corporation lead designer dan gorlin initially developed choplifter using apple ii loaned grandfather game developed six months gorlin began experimenting animating helicopter apple ii added scenery tanks planes hostages added last stated story developed movie camera techniques seemed appropriate including final message end instead game gorlin first demonstration brøderbund realistic much helicopter simulation company helped make easier fly concept rescuing hostages came gorlin learned defender player must protect people ground first gorlin imagined choplifter 3d game switched traditional 2d game environment due technical limitations gorlin would later revisit 3d concept failed attempt remake game 1990s original choplifter art brøderbund commodore 64 release produced marc ericksen created art brøderbund first five covers softline 1982 called game may well first interactive computer-assisted animated movie fusion arcade gaming simulation filmic visual aesthetics choplifter destined occupy place software hall fame magazine praised animation helicopter subtle flight control concluded seeing hostages hope excitement faith made game hard play hurts see one lively people killed 1983 readers named choplifter fourth magazine top thirty list atari 8-bit programs popularity byte called choplifter great fun computer gaming world creative computing video arcade games commodore 64 home companion praised graphics animation latter stating little captives running across desert almost seem alive apple ii version game received certificate merit category best computer audiovisual effects 4th annual arkie awards shortly afterward billboard named computer game year addison-wesley book atari software 1984 gave game overall a+ rating calling masterpiece book concluded concept graphics animation make delightful game debuting may 1982 game sold 9,000 copies june appearing computer gaming world list top sellers ii computing listed choplifter seventh magazine list top apple ii games late 1985 based sales market-share data choplifter ii subtitled rescue survive released game boy 1991 remade game boy game gear choplifter iii 1994 unrelated choplifter iii released super nes sega released pair spiritual successors without choplifter brand programmer botti cited choplifter major inspiration 1996 game black dawn inxile entertainment released choplifter hd xbox live arcade playstation network windows january 11 2012 ouya august 2013
[ 4759, 1508 ]
Test
637
1
Atlas_of_Australian_Birds:atlas australian birds atlas australian birds major ongoing database project initiated managed birdlife australia formerly royal australasian ornithologists union map distribution australia bird species birdlife australia not-for-profit bird research conservation organisation bird atlasses produced various countries islands around world australian project first cover entire continent volunteers collected data australian birds order establish database publish book atlas australian birds 1984 summarising findings second period fieldwork nearly 20 years later resulted publication second book new atlas australian birds 2002 however atlas ongoing project idea australian bird atlas based data collected volunteer observers atlassers first mooted 1972 daunting scale task however test feasibility pilot atlas carried southern coast new south wales march 1973 september 1974 168 volunteers covering area 13,600 square kilometres august 1974 16th international ornithological congress held canberra providing opportunity discussions ornithologists involved atlas schemes outside australia leading decision proceed recognised although fieldwork would carried volunteers funding project management required february 1976 raou received grant australian government enabling appointment full-time staff member whose first task search existing ornithological literature records suitable complementary historical atlas discussions 1976 produced decisions main atlas project would structured organised methodology kept simple atlassers used maps determine locate one degree grid square recorded species birds seen within date location species data recorded survey sheets later entered hand computer database fieldwork began 1 january 1977 ended five years later 31 december 1981 data received every single one-degree block australian continent tasmania adjacent islands 3000 atlassers completing 90,000 survey sheets producing 2.7 million records sightings 716 bird species course atlas fieldwork period chair raou atlas committee pauline reilly project manager margaret blakers 1984 book published results 1987 spin-off book atlas victorian birds published jointly raou victorian department conservation forests lands covering state victoria higher 10-minute resolution detail reporting rates seasonal variations 20 years commencement fieldwork first atlas 1997 birds australia began negotiations environment australia towards obtaining funding new atlas project 1998 grant natural heritage trust bushcare wetlands programs approved fieldwork began august 1998 continued since though four years funding cut-off well deadline book publication purposes late 2002 methodology based first atlas improved use gps receivers scannable survey sheets four-year period 7,000 atlassers completed 279,000 surveys producing 4.7 million records 772 bird species coverage greater first atlas since well australian continent major islands second atlas included records australia territorial waters external territories christmas island cocos keeling islands norfolk island first atlas results published book new atlas australian birds atlas ongoing phase accepting electronic survey forms via birdata website analysis atlas data published birdlife australia report series end five-year data collection first atlas beginning fieldwork second atlas little atlassing took place national level however since end cut-off period inclusion data second atlas book atlassing continued database contains complete dataset two hard-copy atlasses published much additional material gathered since birds australia claims atlas database one important environmental databases world stated aims atlas australian birds project success project prompted launch number similar projects one notable example banksia atlas distribution atlas banksia species greatly increased knowledge banksia species distributions habitat even resulted discovery two new species
[]
Test
638
3
Atari_Jaguar:atari jaguar atari jaguar home video game console developed atari corporation console sixth programmable console developed atari brand originally released north america november 1993 also last atari console use physical media controversially atari marketed jaguar first 64-bit video game console competing existing 16-bit consoles sega genesis super nintendo entertainment system 32-bit 3do interactive multiplayer platform launched year development atari jaguar started early 1990s flare technology console released test markets new york city san francisco november 1993 general public 1994 jaguar shipped cybermorph pack-in game multi-chip architecture hardware bugs lacking developer support tools made game development difficult underwhelming sales contributed console lack third-party support addition lack internal development atari led games library comprising 50 licensed titles plus another 13 games jaguar cd atari attempted extend lifespan system atari jaguar cd add-on marketing jaguar low-cost next generation console price tag 100 less competitors release sega saturn sony playstation 1995 sales jaguar continued fall ultimately selling 250,000 units discontinued 1996 commercial failure jaguar prompted atari leave video game console market hasbro interactive bought atari late 1990s patents jaguar released public domain console declared open platform since jaguar gained cult following developer base produces homebrew games console jaguar developed members flare technology company formed martin brennan john mathieson team claimed could make console superior genesis super nes could also cost-effective impressed work konix multisystem atari persuaded close flare form new company called flare ii atari providing funding flare ii initially set work designing two consoles atari corp. one 32-bit architecture codenamed panther 64-bit system codenamed jaguar however work jaguar design progressed faster expected atari corp. canceled panther project focus promising jaguar jaguar unveiled august 1993 chicago consumer entertainment show jaguar introduced 1993 price 249.99 500 million manufacturing deal ibm system initially available test markets new york city san francisco slogan math claiming superiority competing 16-bit 32-bit systems u.s.-wide release followed six months later early 1994 computer gaming world wrote january 1994 jaguar great machine search developer/customer base atari overcome stigma name lack marketing customer support well poor developer relations past company ventured late third party software support competing console 3do 18 month public relations blitz would result avalanche software support magazine reported atari jaguar struggled attain substantial user base 1993 atari reported shipped 17,000 units part system initial test market end 1994 atari reported sold approximately 100,000 systems reduced price improve competitive nature console end 1995 sony sega entered marketplace competing consoles atari sales declined rapidly atari 1995 annual report noted addition atari corp. severely limited financial resources could create level marketing historically backed successful gaming consoles 1995 interview next generation then-ceo sam tramiel declared jaguar powerful powerful sega saturn slightly weaker playstation next generation received deluge letters response tramiel comments particularly threat bring sony court price dumping playstation entered u.s. market retail price 300 remark small number third party jaguar games good atari profitability angered jaguar owners already frustrated games coming system jaguar underlying hardware crippled flaw cpu memory controller prevented code execution system ram less severe defects included buggy uart memory controller flaw could mitigated mature code-development environment unburden programmer micromanage small chunks code jaguar development tools left much programmer implementation documentation incomplete design specs console allude gpu dsp capable acting cpu leaving motorola 68000 read controller inputs atari leonard tramiel also specifically suggested 68000 used developers practice however many developers used motorola 68000 drive gameplay logic due greater developer familiarity 68000 bugs made using custom chips difficult lacking developer support tools particularly early adequacy 68000 certain types games atari corp. tried play competing consoles proclaiming jaguar 64-bit system claim questioned cpu 68000 gpu executed 32-bit instruction-set sent control signals 64-bit graphics co-processors graphics accelerators atari corp. reasoning 32-bit tom jerry chips work tandem add 64-bit system ridiculed mini-editorial electronic gaming monthly commented sega math sega saturn way atari math 64-bit jaguar system sega saturn would 112-bit monster machine side next generation giving mostly negative review jaguar maintained true 64-bit system since data path dram cpu tom jerry chips 64 bits wide end 1995 atari revenues declined half us 38.7 million 1994 14.6 million 1995 late 1995 atari corp. ran early-morning infomercial advertisements enthusiastic salesmen touting powerful game system infomercials ran year significantly sell remaining stock jaguar systems november 1995 mass layoffs insider statements fueling journalistic speculation atari ceased development manufacturing jaguar simply trying sell existing stock exiting video game industry though atari corp. continued deny theories going 1996 core jaguar developers high voltage software beyond games stated longer receiving communications atari regarding jaguar projects 10-k405 sec filing filed april 12 1996 atari informed stockholders truly dire nature jaguar business filing also confirmed theory atari given jaguar late 1995 subsequent months concerned chiefly liquidating inventory jaguar products april 8 1996 atari corp. merged jt storage reverse takeover jaguar software reference manual page 1 jaguar custom chip set primarily intended heart high-performance games/leisure computer may also used graphics accelerator complex systems applied workstation business uses well general purpose cpu jaguar contains four processing units object processor graphics processor blitter digital sound processor jaguar provides blocks 64-bit data path external memory devices capable high data transfer rate external dynamic ram atari games licensed atari jaguar chipset use arcade games system named cojag coin-op jaguar replaced 68000 68020 mips r3000-based cpu depending board version added ram full 64-bit wide rom bus jaguar rom bus 32-bit optionally hard drive titles freeze rom ran lightgun games area 51 maximum force released atari dedicated cabinets area 51/maximum force combo machine games 3 3 basketball fishin frenzy freeze vicious circle developed never released atari jaguar duo proposed console similar turboduo genesis cdx attempt atari combine atari jaguar atari jaguar cd make new console prototype model described journalists resembling bathroom scale unveiled 1995 winter consumer electronics show console cancelled production could begin prior launch console november 1993 atari announced variety peripherals add-ons jaguar released console lifespan included cd-rom-based add-on console dial-up internet link support online gaming virtual reality headset mpeg-2 video card however due poor sales eventual commercial failure jaguar peripherals development scrapped peripherals add-ons released atari jaguar redesigned controller adapter four players cd console add-on link cable local area network lan gaming redesigned second controller jaguar procontroller atari added three face buttons two triggers controller created response criticism original controller console came said possess enough buttons fighting games particular sold independently however never bundled system release peripheral allowed 4 controllers plugged console also released dubbed team tap released independently bundle white men ca n't jump however team tap compatible white men ca n't jump nba jam tournament edition eight player gameplay team tap peripheral also possible second team tap plugged second controller port console neither compatible games supports eight players local area network multiplayer gameplay achieved use jaglink interface allowed two jaguar consoles linked together modular extension utp phone cable jaglink compatible three games aircars battlesphere doom 1994 ces atari announced partnered phylon inc. create jaguar voice/data communicator unit delayed eventually 1995 mass production canceled together estimated 100 made jaguar voice modem jvm became known utilized 19.9kbit/s dial modem ability answer incoming phone calls store 18 phone numbers players required directly dial online game play jaguar game supports jvm ultra vortek modem initialized ultra vortek start screen entering 911 key pad atari jaguar cd add-on jaguar made use cd-roms distribute games released september 1995 two years jaguar launch twelve games released system manufacturing lifetime made later homebrew developers jaguar cd unit came virtual light machine displayed light patterns corresponding music user inserts audio cd console developed jeff minter created program experimenting graphics development tempest 2000 program deemed spiritual successor atari video music system served similar purpose released 1976 additional accessory jaguar cd allowed jaguar cd games save persistent data preferences saved games also released known memory track cartridge contained 128 k eeprom inserted cartridge slot jaguar cd user played jaguar cd game program manager memory track accessed pushing option button system starting exited pushing keys simultaneously plans make second model jaguar console combined jaguar jaguar cd one unit la turboduo originally codenamed jaguar iii later jaguar duo proposed model scrapped discontinuation jaguar virtual reality headset compatible console tentatively titled jaguar vr unveiled atari 1995 winter consumer electronics show development peripheral response nintendo virtual reality console virtual boy announced previous year headset developed cooperation virtuality previously created many virtual reality arcade systems already developing similar headset practical purposes named project elysium ibm peripheral targeted commercial release christmas 1995 however deal virtuality abandoned october 1995 atari merger jts 1996 prototypes headset allegedly destroyed however two working units one low-resolution prototype red grey-colored graphics one high-resolution prototype blue grey-colored graphics since recovered regularly showcased retrogaming-themed conventions festivals one game developed jaguar vr prototype 3d-rendered version 1980 arcade game missile command entitled missile command 3d though demo virtuality zone hunter also created jaguar vr demonstrations unofficial expansion peripheral atari jaguar dubbed catbox released rockford illinois company icd originally slated released early jaguar life second quarter 1994 actually released mid-1995 icd catbox plugs directly av/dsp connectors located rear jaguar console provides three main functions audio video communications features six output formats three audio line level stereo rgb monitor headphone jack volume control three video composite s-video rgb analog component video making jaguar compatible multiple high quality monitor systems multiple monitors time capable communications methods known catnet rs-232 well dsp pass allowing user connect two jaguars together multiplayer games either directly modems icd catbox features polished stainless steel casing red leds jaguar eyes logo indicate communications activity ibm at-type null modem cable may used connect two jaguars together catbox also compatible atari jaglink interface peripheral adaptor jaguar allows webtv access revealed 1998 one prototype known exist reviewing jaguar weeks prior launch gamepro gave thumbs sideways praised power hardware criticized controller dubious software lineup would turn commenting atari failure secure support key third party publishers capcom bad sign concluded like 3do jaguar risky investment – quite expensive jaguar gamefan best new system award 1993 small size poor quality jaguar game library became commonly cited reason failure marketplace pack-in game cybermorph despite impressive polygonal game time criticized design flaws weak color palette compared unfavorably snes star fox early releases like trevor mcfur crescent galaxy raiden also received poor reviews latter two failing take full advantage jaguar hardware jaguar eventually earn praise titles tempest 2000 doom wolfenstein 3d successful title jaguar first year alien vs predator alien vs predator tempest 2000 named among system defining titles gamepro 2007 however occasional successes seen insufficient jaguar competitors receiving continual stream critically acclaimed software gamepro concluded rave review alien vs.predator remarking atari turn dozen games like avp jaguar owners could truly rest easy enjoy purchase late 1995 review jaguar next generation commented thus far atari spectacularly failed deliver software side leaving many question actual quality capability hardware one two exceptions – tempest 2000 cited frequently – truly great games jaguar noted atari well known older gamers company much less overall brand recognition sega sony nintendo even 3do company however argued low price point jaguar might still compete atari could improve software situation gave system two five stars small library games challenge incumbent 16-bit game consoles jaguar appeal never grew beyond small gaming audience digital spy commented like many failed hardware ventures still maintains something cult following considered misstep atari 2006 ign editor craig harris rated standard jaguar controller worst game controller ever criticizing unwarranted recycling 1980s phone keypad format small number action buttons found particularly unwise given atari actively trying court fighting game fans system ed semrad electronic gaming monthly commented many jaguar games gratuitously used controller phone keypad buttons making controls much difficult needed gamepro watch dog remarked controller usually n't use keypad games use keypad extensively alien vs predator doom keypad overlay used minimize confusion yes lot buttons nuttin atari added action buttons pro controller improve performance fighting games particular atari corporation properties bought hasbro interactive late 1990s hasbro released rights jaguar declaring console open platform opening doors homebrew development developers including telegames songbird productions released previously unfinished materials jaguar past several brand new titles satisfy system cult following united kingdom 2001 deal struck telegames retailer game bring jaguar game retail outlets machine initially sold £29.99 brand new software prices ranged £9.99 common games doom ruiner pinball £39.99 sought-after releases defender 2000 checkered flag machine presence stores 2007 remaining consoles sold £9.99 games sold low 97p imagin systems manufacturer dental imaging equipment since purchased molding plates jaguar casing minor modification found right size housing hotrod camera game cartridge molds reused create optional memory expansion card december 2014 molds console cartridges purchased imagin systems mike kennedy owner kickstarter funded retro videogame magazine propose new crowdfunded video game console called retro vgs later rebranded coleco chameleon entering licensing agreement coleco purchase molds imagin systems far cheaper designing manufacturing entirely new molds kennedy described acquisition entire reason retro vgs possible however project terminated march 2016 following criticism kennedy doubts regarding demand proposed console two prototypes discovered fakes coleco withdrew project project termination molds sold albert yarusso founder atariage website
[ 2175, 6330, 7442, 5822, 3701, 1192, 7990, 1670, 6217, 5079, 4006, 5522, 4368, 5526, 1237, 1795 ]
Test
639
4
BackupAssist:backupassist backupassist backup software physical virtual windows servers supports on-site cloud backup allows users restore anything files entire server bare-metal recovery software modular meaning customers pick choose want backup software suite providing core product backupassist several optional add-ons backupassist perform several kinds backup offering different level redundancy data loss full image backup backupassist takes image physical virtual system used perform full recovery even whole system lost corrupted destroyed first full backup rest performed incrementally meaning changes since last backup saved selected items backup selected files folders apps hyper-v guests databases drives archival backups highly compressed encrypted backups old unused data ready cold storage continuous sql backup continuous backup sql server potential data loss minimized e.g transactions backups compressed encrypted 256-bit aes cloud backups deduplicated order reduce backup size transfer times storage costs backup media supported backupassist 10 local disk nas san iscsi rdx usb hdd tape public cloud microsoft azure aws s3 private cloud data recovery performed scale complete granular instance exchange server restored entirety database individual mail items e.g e-mails attachments calendars contacts backupassist includes backup search tool allows user search backups currently connected searching backup libraries made backup performed much like google also supports wildcard searches backupassist hyper-v advanced add-on lost damaged hyper-v guests instantly brought back online lost damaged user run guest backup media ensure zero downtime happens full recovery performed background virtual machines backupassist licensed per host per socket vm backupassist includes recovery app called recoverassist acts boot environment performing bare-metal recovery environment includes dozen well-known third-party disaster recovery diagnostic apps backupassist support team also contacted within boot environment multiple installations backupassist managed remotely via web app called multisite manager management performed wan lan machine backup job level app data backup restore jobs remotely scheduled app also allows remote deployment backupassist machines without remote report license management user accounts created selected site permissions backupassist started software project designed overcome shortcomings ntbackup windows nt 2000 2002 backupassist released since expanded humble roots cater sorts data solutions 2017 backupassist customers 165 countries worldwide including nasa fortune 500 companies
[ 5516, 7838, 3827, 5571, 6731 ]
Test
640
4
Project_Honey_Pot:project honey pot project honey pot web-based honeypot network uses software embedded web sites collects information ip addresses used harvesting e-mail addresses spam bulk mailing e-mail fraud project also solicits donation unused mx entries domain owners 2007 project began number new initiatives including quicklinks program makes easier people participate well system track comment spam project also launched free new service called http bl leverages data allow website administrators keep malicious web robots sites addition collecting information made available top 25 list periodic intervals project organizers also help various law enforcement agencies combat private commercial unsolicited bulk mailing offenses overall work reduce amount spam sent received internet information collected also used research development newer versions software improve efforts group whole project honey pot founded managed unspam technologies inc.. addition various law enforcement agencies group affiliates internet law group viawest
[]
Test
641
7
Uptake_(business):uptake business uptake industrial artificial intelligence ai software company aims help companies digitally transform open purpose-built software built around foundation data science machine learning uptake ’ core products include asset performance management application fully managed platform uptake ’ industry-specific content including asset strategy library asl provides access deep domain knowledge guidance failure prevention asl largest market today approximately 800 equipment types 58,000 failure modes 180,000 reportable conditions uptake co-founded brad keywell eric lefkofsky chicago illinois 2014 uptake incorporated 2014 located chicago offices san francisco houston albuquerque riyadh mississauga march 2015 caterpillar announced minority investment uptake aim joint development systems monitor improve use nearly 3 million pieces caterpillar equipment field caterpillar ’ core business offerings completed mid 2016 september 21 2016 progress rail formed strategic partnership launching emd uptime uptake condition monitoring march 2 2017 warren buffett berkshire hathaway energy 84 billion portfolio companies primarily renewables space announced deal uptake two bhe subsidiaries bhe renewables midamerican energy company use uptake software connect track fleet wind turbines june 2018 uptake announced u.s. army would using software improve readiness dozen bradley fighting vehicles february 2018 uptake announced hire ganesh bell former chief digital officer general electric co ge.n president october 27 2015 uptake announced raised 45 million venture capital led greatpoint ventures existing investors including new enterprise associates caterpillar uptake ’ valuation estimated one billion dollars making third unicorn state illinois february 1 2017 investor revolution growth firm started steve case donn davis ted leonsis announced would backing uptake 40 million part series c round valued uptake 2 billion november 2017 uptake closed series round 117 million post-money valuation 2.3 billion brought uptake total funding 250 million uptake recipient 2015 moxie award best new startup chicago uptake named forbes hottest new startup 2015 february 9 2017 pitchbook named uptake fastest us startup reach 2b valuation cnbc ranked uptake disruptor 50 list two consecutive years 2017 2018 respectively uptake recognized 2017 technology pioneer world economic forum june 14 2017 uptake ranked 22 2017 forbes 100 list best private cloud companies world uptake ranked 12 fortune ’ 2018 best places work chicago uptake founder brad keywell named ey world entrepreneur year 2019 marking record third win us competition ’ 19-year history
[ 641 ]
Test
642
2
Guadalinex:guadalinex guadalinex ubuntu-based operating system promoted government andalusia spain used schools public libraries centers elderly people guadalinfo centers five different versions guadalinex
[ 5200, 1629, 3444, 6086, 7251, 5912, 7528, 474, 3780, 7075, 5571, 5658, 1941, 578, 314, 5232, 7587, 2758, 7463, 2585, 1663, 2864, 4165, 6209, 6761, 2511, 3738, 4632, 2063, 4991, 343, 4824, 5523, 5259, 1893, 5530, 5704, 2074, 3751, 968, 2...
Test
643
4
Alexander_Sotirov:alexander sotirov alexander sotirov computer security researcher employed determina vmware 2012 sotirov co-founded new york based trail bits dino dai zovi dan guido currently serves chief scientist well known discovery ani browser vulnerability well so-called heap feng shui technique exploiting heap buffer overflows browsers 2008 presented research black hat showing bypass memory protection safeguards windows vista together team industry security researchers academic cryptographers published research creating rogue certificate authority using collisions md5 cryptographic hash function december 2008 sotirov founder organizer pwnie awards program committee 2008 workshop offensive technologies woot '08 served black hat review board since 2011 ranked 6 violet blue list top 10 sexy geeks 2009
[ 113, 1594, 363, 5697, 4295, 8118, 6448, 1805 ]
Test
644
2
Active_Directory:active directory active directory ad directory service developed microsoft windows domain networks included windows server operating systems set processes services initially active directory charge centralized domain management starting windows server 2008 however active directory became umbrella title broad range directory-based identity-related services server running active directory domain service ad ds called domain controller authenticates authorizes users computers windows domain type network—assigning enforcing security policies computers installing updating software example user logs computer part windows domain active directory checks submitted password determines whether user system administrator normal user also allows management storage information provides authentication authorization mechanisms establishes framework deploy related services certificate services active directory federation services lightweight directory services rights management services active directory uses lightweight directory access protocol ldap versions 2 3 microsoft version kerberos dns active directory like many information-technology efforts originated democratization design using request comments rfcs internet engineering task force ietf oversees rfc process accepted numerous rfcs initiated widespread participants active directory incorporates decades communication technologies overarching active directory concept makes improvements upon example ldap underpins active directory also x.500 directories organizational unit preceded active directory concept makes use methods ldap concept began emerge even founding microsoft april 1975 rfcs early 1971 rfcs contributing ldap include rfc 1823 ldap api august 1995 rfc 2307 rfc 3062 rfc 4533 microsoft previewed active directory 1999 released first windows 2000 server edition revised extend functionality improve administration windows server 2003 additional improvements came subsequent versions windows server windows server 2008 additional services added active directory active directory federation services part directory charge management domains previously core part operating system renamed active directory domain services adds became server role like others active directory became umbrella title broader range directory-based services according bryon hynes everything related identity brought active directory banner active directory services consist multiple directory services best known active directory domain services commonly abbreviated ad ds simply ad active directory domain services ad ds cornerstone every windows domain network stores information members domain including devices users verifies credentials defines access rights server running service called domain controller domain controller contacted user logs device accesses another device across network runs line-of-business metro-style app sideloaded device active directory services excluding lds described well microsoft server technologies rely use domain services examples include group policy encrypting file system bitlocker domain name services remote desktop services exchange server sharepoint server active directory lightweight directory services ad lds formerly known active directory application mode adam light-weight implementation ad ds ad lds runs service windows server ad lds shares code base ad ds provides functionality including identical api require creation domains domain controllers provides data store storage directory data directory service ldap directory service interface unlike ad ds however multiple ad lds instances run server active directory certificate services ad cs establishes on-premises public key infrastructure create validate revoke public key certificates internal uses organization certificates used encrypt files used encrypting file system emails per s/mime standard network traffic used virtual private networks transport layer security protocol ipsec protocol ad cs predates windows server 2008 name simply certificate services ad cs requires ad ds infrastructure active directory federation services ad fs single sign-on service ad fs infrastructure place users may use several web-based services e.g internet forum blog online shopping webmail network resources using one set credentials stored central location opposed granted dedicated set credentials service ad fs purpose extension ad ds latter enables users authenticate use devices part network using one set credentials former enables use set credentials different network name suggests ad fs works based concept federated identity ad fs requires ad ds infrastructure although federation partner may active directory rights management services ad rms known rights management services rms windows server 2008 server software information rights management shipped windows server uses encryption form selective functionality denial limiting access documents corporate e-mails microsoft word documents web pages operations authorized users perform directory service active directory instance consists database corresponding executable code responsible servicing requests maintaining database executable part known directory system agent collection windows services processes run windows 2000 later objects active directory databases accessed via ldap adsi component object model interface messaging api security accounts manager services active directory structures arrangements information objects objects fall two broad categories resources e.g. printers security principals user computer accounts groups security principals assigned unique security identifiers sids object represents single entity—whether user computer printer group—and attributes certain objects contain objects object uniquely identified name set attributes—the characteristics information object represents— defined schema also determines kinds objects stored active directory schema object lets administrators extend modify schema necessary however schema object integral definition active directory objects deactivating changing objects fundamentally change disrupt deployment schema changes automatically propagate throughout system created object deactivated—not deleted changing schema usually requires planning active directory framework holds objects viewed number levels forest tree domain logical divisions active directory network within deployment objects grouped domains objects single domain stored single database replicated domains identified dns name structure namespace domain defined logical group network objects computers users devices share active directory database tree collection one domains domain trees contiguous namespace linked transitive trust hierarchy top structure forest forest collection trees share common global catalog directory schema logical structure directory configuration forest represents security boundary within users computers groups objects accessible objects held within domain grouped organizational units ous ous provide hierarchy domain ease administration resemble organization structure managerial geographical terms ous contain ous—domains containers sense microsoft recommends using ous rather domains structure simplify implementation policies administration ou recommended level apply group policies active directory objects formally named group policy objects gpos although policies also applied domains sites see ou level administrative powers commonly delegated delegation performed individual objects attributes well organizational units separate namespace consequence compatibility legacy netbios implementations user accounts identical samaccountname allowed within domain even accounts objects separate ous samaccountname user object attribute must unique within domain.. however two users different ous common name cn name stored directory fred.staff-ou.domain fred.student-ou.domain staff-ou student-ou ous general reason lack allowance duplicate names hierarchical directory placement microsoft primarily relies principles netbios flat-file method network object management microsoft software goes way back windows nt 3.1 ms-dos lan manager allowing duplication object names directory completely removing use netbios names would prevent backward compatibility legacy software equipment however disallowing duplicate object names way violation ldap rfcs active directory supposedly based number users domain increases conventions first initial middle initial last name western order reverse eastern order fail common family names like li 李 smith garcia workarounds include adding digit end username alternatives include creating separate id system unique employee/student id numbers use account names place actual user names allowing users nominate preferred word sequence within acceptable use policy duplicate usernames exist within domain account name generation poses significant challenge large organizations easily subdivided separate domains students public school system university must able use computer across network microsoft active directory ous confer access permissions objects placed within ous automatically assigned access privileges based containing ou design limitation specific active directory competing directories novell nds able assign access privileges object placement within ou active directory requires separate step administrator assign object ou member group also within ou relying ou location alone determine access permissions unreliable object may assigned group object ou common workaround active directory administrator write custom powershell visual basic script automatically create maintain user group ou directory scripts run periodically update group match ou account membership unable instantly update security groups anytime directory changes occurs competing directories security directly implemented directory groups known shadow groups created shadow groups selectable place ou administrative tools microsoft refers shadow groups server 2008 reference documentation explain create built-in server methods console snap-ins managing shadow groups division organization information infrastructure hierarchy one domains top-level ous key decision common models business unit geographical location service object type hybrids ous structured primarily facilitate administrative delegation secondarily facilitate group policy application although ous form administrative boundary true security boundary forest administrator domain forest must trusted across domains forest active directory database organized partitions holding specific object types following specific replication pattern microsoft often refers partitions 'naming contexts 'schema partition contains definition object classes attributes within forest 'configuration partition contains information physical structure configuration forest site topology replicate domains forest 'domain partition holds objects created domain replicates within domain sites physical rather logical groupings defined one ip subnets ad also holds definitions connections distinguishing low-speed e.g. wan vpn high-speed e.g. lan links site definitions independent domain ou structure common across forest sites used control network traffic generated replication also refer clients nearest domain controllers dcs microsoft exchange server 2007 uses site topology mail routing policies also defined site level physically active directory information held one peer domain controllers replacing nt pdc/bdc model dc copy active directory servers joined active directory domain controllers called member servers subset objects domain partition replicate domain controllers configured global catalogs global catalog gc servers provide global listing objects forest global catalog servers replicate objects domains hence provide global listing objects forest however minimize replication traffic keep gc database small selected attributes object replicated called partial attribute set pas pas modified modifying schema marking attributes replication gc earlier versions windows used netbios communicate active directory fully integrated dns requires tcp/ip—dns fully functional dns server must support srv resource records also known service records active directory synchronizes changes using multi-master replication replication default 'pull rather 'push meaning replicas pull changes server change effected knowledge consistency checker kcc creates replication topology site links using defined sites manage traffic intrasite replication frequent automatic result change notification triggers peers begin pull replication cycle intersite replication intervals typically less frequent use change notification default although configurable made identical intrasite replication link 'cost e.g. ds3 t1 isdn etc kcc alters site link topology accordingly replication may occur transitively several site links same-protocol site link bridges cost low although kcc automatically costs direct site-to-site link lower transitive connections site-to-site replication configured occur bridgehead server site replicates changes dcs within site replication active directory zones automatically configured dns activated domain based site replication active directory uses remote procedure calls rpc ip rpc/ip sites smtp used replication changes schema configuration partial attribute set global catalog gcs smtp used replicating default domain partition general network utilizing active directory one licensed windows server computer backup restore active directory possible network single domain controller microsoft recommends one domain controller provide automatic failover protection directory domain controllers also ideally single-purpose directory operations run software role certain microsoft products sql server exchange interfere operation domain controller necessitating isolation products additional windows servers combining make configuration troubleshooting either domain controller installed software difficult business intending implement active directory therefore recommended purchase number windows server licenses provide least two separate domain controllers optionally additional domain controllers performance redundancy separate file server separate exchange server separate sql server forth support various server roles physical hardware costs many separate servers reduced use virtualization although proper failover protection microsoft recommends running multiple virtualized domain controllers physical hardware active-directory database directory store windows 2000 server uses jet blue-based extensible storage engine ese98 limited 16 terabytes 2 billion objects 1 billion security principals domain controller database microsoft created ntds databases 2 billion objects nt4 security account manager could support 40,000 objects called ntds.dit two main tables data table link table windows server 2003 added third main table security descriptor single instancing programs may access features active directory via com interfaces provided active directory service interfaces allow users one domain access resources another active directory uses trusts trusts inside forest automatically created domains created forest sets default boundaries trust implicit transitive trust automatic domains within forest microsoft active directory management tools include management tools may provide enough functionality efficient workflow large environments third-party solutions extend administration management capabilities provide essential features convenient administration processes automation reports integration services etc varying levels interoperability active directory achieved unix-like operating systems including unix linux mac os x java unix-based programs standards-compliant ldap clients systems usually interpret many attributes associated windows components group policy support one-way trusts third parties offer active directory integration unix-like platforms including schema additions shipped windows server 2003 r2 include attributes map closely enough rfc 2307 generally usable reference implementation rfc 2307 nss_ldap pam_ldap provided padl.com support attributes directly default schema group membership complies rfc 2307bis proposed windows server 2003 r2 includes microsoft management console snap-in creates edits attributes alternative option use another directory service non-windows clients authenticate windows clients authenticate ad non-windows clients include 389 directory server formerly fedora directory server fds viewds identity solutions viewds v7.2 xml enabled directory sun microsystems sun java system directory server latter two able perform two-way synchronization ad thus provide deflected integration another option use openldap translucent overlay extend entries remote ldap server additional attributes stored local database clients pointed local database see entries containing remote local attributes remote database remains completely untouched administration querying modifying monitoring active directory achieved via many scripting languages including powershell vbscript jscript/javascript perl python ruby free non-free ad administration tools help simplify possibly automate ad management tasks since october 2017 amazon aws offers integration microsoft active directory
[ 5714, 363, 7879, 3937, 3263, 6795, 2555, 378, 6428, 2198, 4680, 6096, 2204, 3629, 1475, 6110, 7911, 7553, 743, 7195, 5410, 7564, 5064, 2953, 7567, 3996, 422, 3998, 6844, 2245, 432, 435, 5442, 4014, 6860, 4377, 5090, 3340, 5794, 7230, 44...
Test
645
4
Active_defense:active defense active defense refer defensive strategy military cybersecurity arena department defense defines active defense employment limited offensive action counterattacks deny contested area position enemy definition specify whether refers physical actions cyber-related actions cybersecurity arena active defense may mean asymmetric defenses namely defenses increase costs cyber-adversaries reducing costs cyber-defenders example active defense data protection strategy invented cryptomove leverages dynamic data movement distribution re-encryption make data harder attack steal destroy prior data protection approaches relied encryption data rest leaves data vulnerable attacks including stealing ciphertext cryptographic attack attacks encryption keys destruction encrypted data ransomware attacks insider attacks others three acm computing conferences explored moving target defense strategy network application-level security well instance rotating ip addresses dynamically changing network topologies production implementations mtd provided companies dispel applications including legacy systems communications election security defined active defenses including deception honeypots seek confuse attackers traps advanced forensics examples honeypot technologies include illusive networks trapx cymmetria attivo others types active defenses might include automated incident response attempts tie together different response strategies order increase work attackers decrease work defenders recently department homeland security financial institutions identified active defense top priority security industrial infrastructure systems part broader push greater resiliency national institute standards technology 800-160 volume 2 framework gone providing guidance standardization active defense
[ 1376, 2566, 1805 ]
Validation
646
9
RascalMPL:rascalmpl rascal experimental domain specific language metaprogramming static code analysis program transformation implementation domain specific languages general meta language sense bias particular software language includes primitives relational calculus term rewriting syntax semantics based procedural imperative functional programming
[ 3030, 3011, 7305, 5571, 3499, 578 ]
Validation
647
2
Sugar_(software):sugar software sugar free open-source desktop environment designed interactive learning children copyright sugarlabs developed part one laptop per child olpc project sugar default interface olpc xo-1 laptop computers olpc xo-1.5 later provided option either gnome sugar interfaces sugar available live cd live usb package installable several linux distributions run linux virtual machine windows mac os unlike desktop environments sugar use desktop folder window metaphors instead sugar default full-screen activities require users focus one program time sugar implements journal automatically saves user running program session allows later use interface pull past works date activity used file type sugar objective suitable even inexperienced users provides advanced facilities experienced project stated goal avoid bloated interfaces limit controls immediately relevant task hand. applications run full screen double-clicking used menus show icons sugar written python interpreted language modified users programming experience desktop environments used many operating systems written compiled languages c. applications developed sugar pragmatic offers number opportunity avail enhances skills make dexterous field.sugar activities include turle blocks 3d ruler recall many hundreds learning activities sugar downloaded sugar activity library additional activities available third parties project ceibal portal uruguay may 2006 sugar developers described primarily tool expression plans place include multimedia social networking features since may 2008 sugar developed umbrella sugar labs member project software freedom conservancy contributors employed one laptop per child related organizations others volunteers many cases associated free software community contributors original sugar platform included marco pesenti gritti walter bender christopher blizzard eben eliason simon schampijer christian schmidt lisa strausfeld takaaki okada tomeu vizoso dan williams early 2007 sugar could installed difficulty several linux distributions virtual machines operating systems mid-2008 sugar available debian ubuntu fedora distributions linux e.g. ubuntu 8.04 hardy heron sugar could installed official ubuntu universe repositories mid-2009 sugar also available opensuse linux distributions sugar 0.82.1 included olpc system software release 8.2.0 xo-1 laptops sugar 0.86 released september 30 2009 sugar 0.88 released march 31 2010 sugar 0.90.0 released october 2010 three releases 2011 one june 2012 included support arm architecture xo 1.75 builds olpc xo laptops release schedule available os releases sugar unofficially ported run android firefox os ios using html5 javascript project name sugarizer additional clients written web browsers supporting html5 sugar learning platform linux available usb-bootable linux distribution sugar stick software components forming installable additional desktop environment linux distributions installed using fedora live usb creator installed onto computer hard disk using codice_1 command sugar terminal console june 23 2009 sugar labs announced availability download sugar stick v1 strawberry run bootable 1gb usb flash drive july 23 2009 recycle usb.com went live program reflash used usb keys sugar software donate schools december 8 2009 sugar labs announced availability sugar stick v2 blueberry incorporates sugar release 0.86 fedora 11 sugar labs announced availability sugar stick v3 mirabelle incorporates sugar release 0.88 fedora 13 since mirabelle sugar stick regular semi-annual fedora spin official special-purpose version fedora spin using fedora v22 released 26 may 2015 olpc xo-1 1 gb nand flash drive 256 mb memory flash-based hard drive small swap added using sd card network block device many activities loaded time may performance problems due low memory processor load sugar many sugar run raspberry pi recommended use soas run sugar one learn run sugar raspberry pi sugar lab website sugar stick strawberry release based latest updates june 22 2009 features sugar learning environment namely version 0.84 including 40 activities enrich learning experience hundreds activities available download sugar activity library release includes fedora updates sugar features like view source file transfer supplementary sample content available journal usability improvements sugar stick v2 blueberry released 8 december 2009 based version fedora operating system contains number features improve overall user learning experience overview notable ones mirabelle 3rd release sugar stick project released 25 may 2010 mango lassi 4th version sugar stick released 2 november 2010 uses sugar version 0.90 5th version sugar stick released 9 october 2011 uses sugar version 0.92 6th version sugar stick released 8 november 2011 uses sugar version 0.94.1 7th version sugar stick released 29 may 2012 uses sugar version 0.96.1 8th version sugar stick released 15 january 2013 uses sugar version 0.98.2 9th version sugar stick released 2 july 2013 uses sugar version 0.98.8 10th version sugar stick released 17 december 2013 uses sugar version 0.100.0 sugar stopped giving official names soas releases however continues create new versions fedora release latest version sugar 0.112 sugar released latest versions latest fedoras fedora 23 fedora 24 fedora 25 fedora 26 fedora 27 sugarizer html javascript based application allows using sugar functionality device available web application mobile app offers similar user interface includes features sugar core datastore journal well many sugar activities
[ 2451, 6414, 3772, 3271, 5116, 5571, 578, 745, 154, 518, 5965, 6674, 5787, 5704, 1435, 788 ]
Test
648
3
Predication_(computer_architecture):predication computer architecture computer science predication architectural feature provides alternative conditional transfer control implemented machine instructions conditional branch conditional call conditional return branch tables predication works executing instructions paths branch permitting instructions taken path modify architectural state instructions taken path permitted modify architectural state associated predicated predicate boolean value used instruction control whether instruction allowed modify architectural state computer programs contain conditional code executed specific conditions depending factors determined beforehand example depending user input majority processors simply execute next instruction sequence traditional solution insert branch instructions allow program conditionally branch different section code thus changing next step sequence sufficient designers began improving performance implementing instruction pipelining method slowed branches thorough description problems arose popular solution see branch predictor luckily one common patterns code normally relies branching elegant solution consider following pseudocode system uses conditional branching might translate machine instructions looking similar predication possible branch paths coded inline instructions execute others basic idea instruction associated predicate word used similarly usage predicate logic instruction executed predicate true machine code example using predication might look something like besides eliminating branches less code needed total provided architecture provides predicated instructions guarantee faster execution general dosomething dosomethingelse blocks code short enough predication simplest form partial predication architecture conditional move conditional select instructions conditional move instructions write contents one register another predicate value true whereas conditional select instructions choose two registers contents written third based predicate value generalized capable form full predication full predication set predicate registers storing predicates allows multiple nested sequential branches simultaneously eliminated instructions architecture register specifier field specify predicate register supplies predicate main purpose predication avoid jumps small sections program code increasing effectiveness pipelined execution avoiding problems cache also number subtle benefits predication primary drawback increased encoding space typical implementations every instruction reserves bitfield predicate specifying conditions instruction effect available memory limited embedded devices space cost prohibitive however architectures thumb-2 able avoid issue see detriments following predication effective paths balanced longest path frequently executed determining path difficult compile time even presence profiling information predicated instructions popular european computer designs 1950s including mailüfterl 1955 zuse z22 1955 zebra 1958 electrologica x1 1958 ibm acs-1 design 1967 allocated skip bit instruction formats cdc flexible processor 1976 allocated three conditional execution bits microinstruction formats hewlett-packard pa-risc architecture 1986 feature called nullification allowed instructions predicated previous instruction ibm power architecture 1990 featured conditional move instructions power successor powerpc 1993 dropped instructions digital equipment corporation alpha architecture 1992 also featured conditional move instructions mips gained conditional move instructions 1994 mips iv version sparc extended version 9 1994 conditional move instructions integer floating-point registers hewlett-packard/intel ia-64 architecture instructions predicated predicates stored 64 special-purpose predicate registers one predicate registers always true unpredicated instructions simply instructions predicated value true use predication essential ia-64 implementation software pipelining avoids need writing separated code prologs epilogs x86 architecture family conditional move instructions codice_1 codice_2 added architecture intel pentium pro 1995 processor codice_1 instructions copied contents source register destination register depending predicate supplied value flag register arm architecture original 32-bit instruction set provides feature called conditional execution allows instructions predicated one 13 predicates based combination four condition codes set previous instruction arm thumb instruction set 1994 dropped conditional execution reduce size instructions could fit 16 bits successor thumb-2 2003 overcame problem using special instruction effect supply predicates following four instructions 64-bit instruction set introduced armv8-a 2011 replaced conditional execution conditional selection instructions predication used cuda warps given cuda core executes code branch unmet condition commit results computed execution path
[ 3764, 7529, 5737, 7541, 7449, 1556, 4154, 1854, 1568, 5055, 2226, 5947, 6922, 5243, 4985, 3061, 3747, 6148, 1237, 6236, 7499, 352, 971 ]
Test
649
2
Comparison_of_Java_and_Android_API:comparison java android api article compares application programming interfaces apis virtual machines vms programming language java operating system android android applications written java-like language differences java api android api android run java bytecode traditional java virtual machine jvm instead dalvik virtual machine older versions android android runtime art newer versions compile code dalvik runs executable linkable format elf executables containing machine code java bytecode java archive jar files executed android devices instead java classes compiled proprietary bytecode format run dalvik compiled version thereof newer art specialized virtual machine vm designed android unlike java vms stack machines stack-based architecture dalvik vm register machine register-based architecture dalvik traits differentiate standard vms bytecode loaded dalvik virtual machine java bytecode due way dalvik loads classes impossible load library packages jar files different procedure must used load android libraries content underlying codice_1 file must copied application private internal storage area loaded case java se class android class allows retrieving system properties however mandatory properties defined java virtual machine meaning different meaning android example current versions android use latest java language libraries full graphical user interface gui frameworks apache harmony java implementation older versions used java 8 source code works latest version android made work older versions android default default output stream output anything developers encouraged use class logs strings logcat tool changed least honeycomb output log console also android use abstract window toolkit swing library user interfaces built using view objects android uses framework similar swing based rather s. however android widgets javabeans android application must provided widget creation android widget library support pluggable look feel architecture look feel android widgets must embedded widgets however limited ability exists set styles themes application contrary swing layout managers applied container widget android layout behavior encoded containers android includes small subset codice_8 package related classes
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3310, 2591, 5771, 5775, 7956, 5473, 474, 6183, 822, 136, 6209, 6937, 6232, 5190, 4116, 5195, 2003, 195, 6978, 7346, 561, 201, 2017, 5919, 7357, 2398, 2037, 2756, 7007, 7749, 2417, 2054, 2788, 3507,...
Test
650
3
List_of_MIPS_architecture_processors:list mips architecture processors list processors implement mips instruction set architecture sorted year process size frequency die area processors designed imagination technologies mips technologies others displays overview mips processors performance functionality versus capabilities recent mips aptiv families mips technologies acquired 17 december 2012 imagination technologies since following processors introduced imagination technologies warrior p-class cpu announced cpu ip cores comprising mips series5 ‘ warrior ’ family based mips32 release 5 mips64 release 6 come three classes performance features number companies licensed mips architecture developed processors
[ 2903, 5804, 6074, 551, 5208, 6865, 5917, 5822, 4234, 5483, 5740, 1753, 5055, 1023, 4365, 5521, 4368, 4370, 3747, 1237, 4372, 536, 2443 ]
Test
651
4
Network_security:network security network security consists policies practices adopted prevent monitor unauthorized access misuse modification denial computer network network-accessible resources network security involves authorization access data network controlled network administrator users choose assigned id password authenticating information allows access information programs within authority network security covers variety computer networks public private used everyday jobs conducting transactions communications among businesses government agencies individuals networks private within company others might open public access network security involved organizations enterprises types institutions title explains secures network well protecting overseeing operations done common simple way protecting network resource assigning unique name corresponding password network security starts authentication commonly username password since requires one detail authenticating user name—i.e. password—this sometimes termed one-factor authentication two-factor authentication something user 'has also used e.g. security token 'dongle atm card mobile phone three-factor authentication something user 'is also used e.g. fingerprint retinal scan authenticated firewall enforces access policies services allowed accessed network users though effective prevent unauthorized access component may fail check potentially harmful content computer worms trojans transmitted network anti-virus software intrusion prevention system ips help detect inhibit action malware anomaly-based intrusion detection system may also monitor network like wireshark traffic may logged audit purposes later high-level analysis newer systems combining unsupervised machine learning full network traffic analysis detect active network attackers malicious insiders targeted external attackers compromised user machine account communication two hosts using network may encrypted maintain privacy honeypots essentially decoy network-accessible resources may deployed network surveillance early-warning tools honeypots normally accessed legitimate purposes techniques used attackers attempt compromise decoy resources studied attack keep eye new exploitation techniques analysis may used tighten security actual network protected honeypot honeypot also direct attacker attention away legitimate servers honeypot encourages attackers spend time energy decoy server distracting attention data real server similar honeypot honeynet network set intentional vulnerabilities purpose also invite attacks attacker methods studied information used increase network security honeynet typically contains one honeypots security management networks different kinds situations home small office may require basic security large businesses may require high-maintenance advanced software hardware prevent malicious attacks hacking spamming order minimize susceptibility malicious attacks external threats network corporations often employ tools carry network security verifications networks subject attacks malicious sources attacks two categories passive network intruder intercepts data traveling network active intruder initiates commands disrupt network normal operation conduct reconnaissance lateral movement find gain access assets available via network types attacks include
[ 2173, 1809, 3932, 7151, 6417, 4301, 6419, 374, 2191, 2914, 2556, 1461, 3281, 7177, 2566, 6107, 7186, 2577, 5401, 6823, 2944, 5761, 51, 4353, 1505, 74, 7585, 2614, 4374, 7600, 3680, 3681, 6507, 4025, 7963, 96, 2632, 1530, 6515, 7968, 299...
Test
652
7
Autonomic_computing:autonomic computing autonomic computing also known ac refers self-managing characteristics distributed computing resources adapting unpredictable changes hiding intrinsic complexity operators users initiated ibm 2001 initiative ultimately aimed develop computer systems capable self-management overcome rapidly growing complexity computing systems management reduce barrier complexity poses growth ac system concept designed make adaptive decisions using high-level policies constantly check optimize status automatically adapt changing conditions autonomic computing framework composed autonomic components ac interacting ac modeled terms two main control schemes local global sensors self-monitoring effectors self-adjustment knowledge planner/adapter exploiting policies based self- environment awareness architecture sometimes referred monitor-analyze-plan-execute mape driven vision variety architectural frameworks based self-regulating autonomic components recently proposed similar trend recently characterized significant research area multi-agent systems however approaches typically conceived centralized cluster-based server architectures mind mostly address need reducing management costs rather need enabling complex software systems providing innovative services autonomic systems involve mobile agents interacting via loosely coupled communication mechanisms autonomy-oriented computation paradigm proposed jiming liu 2001 uses artificial systems imitating social animals collective behaviours solve difficult computational problems example ant colony optimization could studied paradigm forecasts suggest computing devices use grow 38 per year average complexity device increasing currently volume complexity managed highly skilled humans demand skilled personnel already outstripping supply labour costs exceeding equipment costs ratio 18:1 computing systems brought great benefits speed automation overwhelming economic need automate maintenance 2003 ieee computer magazine article kephart chess warn dream interconnectivity computing systems devices could become “ nightmare pervasive computing ” architects unable anticipate design maintain complexity interactions state essence autonomic computing system self-management freeing administrators low-level task management delivering better system behavior general problem modern distributed computing systems complexity particular complexity management becoming significant limiting factor development large companies institutions employing large-scale computer networks communication computation distributed applications running computer networks diverse deal many tasks ranging internal control processes presenting web content customer support additionally mobile computing pervading networks increasing speed employees need communicate companies office using laptops personal digital assistants mobile phones diverse forms wireless technologies access companies data creates enormous complexity overall computer network hard control manually human operators manual control time-consuming expensive error-prone manual effort needed control growing networked computer-system tends increase quickly 80 problems infrastructure happen client specific application database layer 'autonomic service providers guarantee basic plumbing layer power hardware operating system network basic database parameters possible solution could enable modern networked computing systems manage without direct human intervention autonomic computing initiative aci aims providing foundation autonomic systems inspired autonomic nervous system human body nervous system controls important bodily functions e.g respiration heart rate blood pressure without conscious intervention self-managing autonomic system human operator takes new role instead controlling system directly he/she defines general policies rules guide self-management process process ibm defined following four types property referred self-star also called self-* self-x auto-* properties others poslad nami bertel expanded set self-star follows ibm set forth eight conditions define autonomic system system must even though purpose thus behaviour autonomic systems vary system system every autonomic system able exhibit minimum set properties achieve purpose ibm defined five evolutionary levels autonomic deployment model deployment autonomic systems design complexity autonomic systems simplified utilizing design patterns model-view-controller mvc pattern improve concern separation encapsulating functional concerns basic concept applied autonomic systems closed control loops well-known concept stems process control theory essentially closed control loop self-managing system monitors resource software hardware component autonomously tries keep parameters within desired range according ibm hundreds even thousands control loops expected work large-scale self-managing computer system fundamental building block autonomic system sensing capability sensors enables system observe external operational context inherent autonomic system knowledge purpose intention know-how operate e.g. bootstrapping configuration knowledge interpretation sensory data etc without external intervention actual operation autonomic system dictated logic responsible making right decisions serve purpose influence observation operational context based sensor input model highlights fact operation autonomic system purpose-driven includes mission e.g. service supposed offer policies e.g. define basic behaviour “ survival instinct ” seen control system would encoded feedback error function heuristically assisted system algorithm combined set heuristics bounding operational space
[ 2961, 2848 ]
Test
653
5
CUBIC_TCP:cubic tcp cubic implementation tcp optimized congestion control algorithm high bandwidth networks high latency lfn long fat networks cubic tcp implemented used default linux kernels 2.6.19 well windows 10.1709 fall creators update windows server 2016 1709 update less aggressive systematic derivative bic tcp window size cubic function time since last congestion event inflection point set window size prior event cubic function two components window growth first concave portion window size quickly ramps size last congestion event next convex growth cubic probes bandwidth slowly first rapidly cubic spends lot time plateau concave convex growth region allows network stabilize cubic begins looking bandwidth another major difference cubic standard tcp flavors rely cadence rtts increase window size cubic window size dependent last congestion event standard tcp flows short round-trip delay times rtts receive acks faster therefore congestion windows grow faster flows longer rtts cubic allows fairness flows since window growth independent rtt cubic increases window real-time dependent rtt dependent like bic calculation cwnd congestion window simpler bic define following variables cwnd modeled formula_1
[ 7637, 578, 4377 ]
Test
654
8
HTTrack:httrack httrack free open-source web crawler offline browser developed xavier roche licensed gnu general public license version 3 httrack allows users download world wide web sites internet local computer default httrack arranges downloaded site original site relative link-structure downloaded mirrored website browsed opening page site browser httrack also update existing mirrored site resume interrupted downloads httrack configurable options filters include/exclude integrated help system basic command line version two gui versions winhttrack webhttrack former part scripts cron jobs httrack uses web crawler download website parts website may downloaded default due robots exclusion protocol unless disabled program httrack follow links generated basic javascript inside applets flash complex links generated using functions expressions server-side image maps
[ 1152, 4565, 4655, 2812, 2451, 5542, 5984, 4759, 5283, 7886, 1732, 7628, 5821, 2739, 1276, 6809, 5127, 393, 5571, 3291, 578, 2574, 3383, 6114, 7015, 503, 8006, 3043, 855, 4352, 4725, 6221, 520, 3057, 3161, 1136, 5699, 348, 1057, 80, 84, ...
Validation
655
1
Transitive_dependency:transitive dependency transitive dependency functional dependency holds virtue transitivity among various software components computer program direct dependency functionality exported library api software component referenced directly program transitive dependency dependency induced components program references directly e.g call function usually induce transitive dependency library manages i/o write log message file dependencies transitive dependencies resolved different times depending computer program assembled and/or executed e.g compiler link phase dependencies resolved sometimes build system even allows management transitive dependencies similarly computer uses services computer program depend service started execute program transitive dependency case service service depend directly depends e.g web browser depends domain name resolution service convert web url ip address dns depend networking service access remote name server linux boot system based set configurations declare dependencies modules started boot time analyzes transitive dependencies decide execution order module start let b c designate three distinct necessarily disjoint sets attributes relation suppose three following conditions hold functional dependency → c follows 1 3 axiom transitivity transitive dependency database normalization one important features third normal form excludes certain types transitive dependencies e.f. codd inventor relational model introduced concepts transitive dependence third normal form 1971 transitive dependency occurs following relation functional dependency book → author nationality applies know book know author nationality furthermore therefore book → author nationality transitive dependency transitive dependency occurred non-key attribute author determining another non-key attribute author nationality
[ 1361, 2086, 4046, 1415, 4662, 1989, 6543, 2124 ]
Test
656
2
PackageForge:packageforge packageforge commercial graphical installation packaging software tool symbian os based smartphones packageforge allows developers graphically create software installation packages installed symbian os based phone installation user start using installed software application packageforge works providing graphical interface towards symbian package definition files .pkg developer provides information package like vendor package name version application files include package defined package compiled built symbian installation file .sis ready uploaded nokia ovi store direct installation phone sis installation files used installing flash lite python s60 symbian c/c++ qt symbian applications
[ 7881, 5571 ]
Test
657
3
Slamd64:slamd64 slamd64 linux distribution first unofficial port slackware x86-64 architecture port started shortly january 2005 first alpha release made publicly available january 2005 discontinued slackware official 64-bit version available support compiling 32-bit binaries removed 11.0 release reintroduced 12.0 release slamd64 created maintained fred emmott slamd64 latest stable release 12.2 also testing developmental version slamd64 called '-current used bleeding edge configuration
[ 5200, 1629, 3444, 7251, 474, 7075, 1941, 314, 5232, 2758, 1663, 2864, 6209, 6761, 2063, 343, 4824, 5523, 5259, 1893, 5530, 5704, 6317, 3751, 7587, 7954, 6244 ]
Test
658
6
File_archiver:file archiver file archiver computer program combines number files together one archive file series archive files easier transportation storage file archivers may employ lossless data compression archive formats reduce size archive basic archivers take list files concatenate contents sequentially archives archive files need store metadata least names lengths original files proper reconstruction possible advanced archivers store additional metadata original timestamps file attributes access control lists process making archive file called archiving packing reconstructing original files archive termed unarchiving unpacking extracting early archiver multics command archive descended ctss command name basic archiver performed compression multics also tape_archiver command abbreviated ta perhaps forerunner unix tar unix tools ar tar cpio act archivers compressors users unix tools use additional compression tools gzip bzip2 xz compress archive file packing remove compression unpacking archive file filename extensions successively added step process example archiving collection files tar compressing resulting archive file gzip results file codice_1 extension approach two goals approach however disadvantages built-in archiver microsoft windows well third-party archiving software winrar 7-zip often use graphical user interface also offer optional command-line interface windows windows archivers perform archiving compression solid compression may may offered depending product windows support winrar 7-zip offer option turned
[ 1710, 3683, 7058, 985, 4759, 6885, 1352, 6620, 3626, 6992, 1471, 3967, 576, 4700, 7089, 3878, 667, 3032, 2589, 3559, 7201, 7387, 3219, 8126, 2334, 6940, 4732, 5256, 3152, 169, 3413, 4461, 2897, 619 ]
Test
659
9
Dominator_(graph_theory):dominator graph theory computer science control flow graphs node dominates node n every path entry node n must go d. notationally written dom n sometimes formula_1 n definition every node dominates number related concepts dominance first introduced reese t. prosser 1959 paper analysis flow diagrams prosser present algorithm computing dominance wait ten years edward s. lowry c. w. medlock ron cytron et al rekindled interest dominance 1989 applied problem efficiently computing placement φ functions used static single assignment form dominators dominance frontiers particularly applications compilers computing static single assignment form number compiler optimizations also benefit dominators flow graph case comprises basic blocks automatic parallelization benefits postdominance frontiers efficient method computing control dependence critical analysis memory usage analysis benefit dominator tree easily find leaks identify high memory usage hardware systems dominators used computing signal probabilities test generation estimating switching activities power noise analysis selecting cut points equivalence checking software systems used reducing size test set structural testing techniques statement branch coverage dominators node n given maximal solution following data-flow equations formula_4 start node dominator start node start node set dominators node n intersection set dominators predecessors p n. node n also set dominators n. algorithm direct solution direct solution quadratic number nodes n lengauer tarjan developed algorithm almost linear practice except artificial graphs algorithm simplified version fast faster known algorithm graphs sizes advantage increases graph size keith d. cooper timothy j. harvey ken kennedy rice university describe algorithm essentially solves data flow equations uses well engineered data structures improve performance analogous definition dominance node z said post-dominate node n paths exit node graph starting n must go z similarly immediate post-dominator node n postdominator n n't strictly postdominate strict postdominators n
[ 1361 ]
Test
660
4
@MAX_SyncUp:max syncup max syncup free proprietary backup file synchronization program developed max software windows targeted individuals small businesses software supports backup locally writable folders including attached usb devices network drives local directories also supports backup synchronization webdav servers ftp servers cloud storages google drive dropbox users allowed use free edition program personal non-commercial purposes free edition allows using 1 fully functional backup synchronization profile unlimited time pro-version max syncup restrictions use provides fully functional 30-day trial period users may use max syncup free evaluation purposes max syncup allows users create backup copies files recover data backup copies including recovering old versions files changed files destroyed also allows users synchronize files two separate locations directions schedule backups synchronizations starting version 4.0 max syncup executes synchronization using rsync-like synchronization method due method users set direct synchronization two computers internet without cloud storage rsync-like algorithm detects changes synchronized files transfers parts files changed since previous synchronization minimizes network traffic reduces time required synchronize files especially synchronize large files small changes also max syncup provides backup strategy apple time machine style hard links created unchanged files uncompressed backups files created file structure retained hard links allow saving disk space placing file several folders users manage backups thinning old backups keep recent copies rather older ones version 4.2 measured “ really full featured software backup ” software comes even close max syncup crashplan reviewers complimented max syncup ease use customizability pc advisor expert review stating walks fine line power ease use well however reviewers criticised program lack cloud backup options limited google drive free storage pc advisor gave program 3.5 stars 5 max syncup 3.0
[ 6289, 2961, 2390, 3827, 4759, 5571, 1281 ]
Validation
661
4
Service_authentication:service authentication service authentication refers identity verification process service provider user far virtually types authentication user authentication user provides credentials service lieu service providing identity credentials user steady rise needs service authentication protect users malicious hacking attack commonly known ‘ pharming ’ lures users fake sites since pharming effectively entices user believe site genuine obviously vital users find way carefully verify authenticity site service authentication type mutual authentication technology combined international standard security protocol would prevent pharming attacks properly administered providing identity credentials server client securely encrypted communication several attempts within community security vendors iam providers successfully incorporate service authentication robust protection client-server communication secure sockets layer certificate refers set data files bind encrypted public key organization critical information certificate must installed first web server ensure secure communication secure connection established installing ssl certificate users safely conduct transactions web service data transfer web server web browser safely encrypted process user able verify whether site connection secure authentic since service provider authenticates authenticity first web server authentication web browser protect pharming since guarantees users 're fake site another standard service authentication technology uses personalized images known user authenticate identity service server technology used authenticating whether user person computer e.g image-based captcha user first registers personalized multiple images server user authentication process server pulls images storage user identify service process repeats times increase accuracy correct identification user must statistically close enough convinced validity server resembles knowledge-based authentication kba knowledge user determining factor service authentication human interaction plays key role entire user authentication process qr codes two-dimensional bar codes store encrypted array sensitive data used users instantly identify server using smartphones user log web site without needing type user id password user scans qr code generated pc verify server secure able effectively protect hacking threats uses specific time session cookie shared secret server user pc device-dependent technology service authentication methods needs set pc smartphone work properly new service authentication technology eliminated need type user password replaced conventional machine-to-machine service authentication human interaction trust human interaction plays major role users visually verify authenticity service identifying code generated server smartphones code generated service server challenge response-based one time password specific seed value binding complex session values user credentials users expect engage secure communication service server since service generates provides credentials user first especially effective protecting users pharming attacks
[ 2489, 4593, 7630, 4237, 3794, 3486 ]
Test
662
3
Hunchback_(video_game):hunchback video game hunchback arcade game developed century electronics published 1983 game loosely based victor hugo novel hunchback notre dame player controls quasimodo set top castle wall player must guide hunchback left right avoiding obstacles series non-scrolling screens goal screen ring church bell far right obstacles include pits must swung long rope ramparts must jumped contain knights spears flying fireballs arrows ducked jumped impose time limit screen knight climbs wall costing player life reach top eventually completing number screens player must rescue esmeralda final screen completed game begins faster speed hunchback character originally robin hood hence green costume game stages arrows artist drew robin hood character left company decision change theme hunchback time new artist taken green costume become accepted no-one questioned someone commented robin hood character drawn looked like hunchback ports released 1984 ocean software acorn electron amstrad cpc atari 8-bit family commodore 64 vic-20 dragon 32 oric zx spectrum ocean first arcade port spectrum version game reached number one uk sales charts version released superior software bbc micro 1984 originally unofficial clone ocean acquired home computer rights game reached agreement ocean could release acorn electron conversion developed superior continued sell bbc micro version released versions play sam 6 compilation 1988 msx port published 1985 home ports inspired two sequels hunchback ii quasimodo revenge hunchback adventure released ocean zx spectrum commodore 64 clones released 8-bit computers quasimodo 1983 synapse software atari 8-bit family great wall 1986 artic computing acorn electron bbc micro
[]
Validation
663
4
Killswitch_(film):killswitch film killswitch documentary film battle control internet movie collaboration director ali akbarzadeh producer jeffrey horn writer christopher dollar akorn entertainment premiered woodstock film festival october 2014 james k. lyons award best editing feature documentary made international debut playing alongside citizenfour international documentary film festival amsterdam november 2014 2015 screened capitol hill well film festivals four continents europe asia australia north america tech world excited democratic presidential candidate lawrence lessig role film kathy gill geekwire writes killswitch much dry recitation technical history director ali akbarzadeh producer jeff horn writer christopher dollar created human centered story large part connection comes lessig relationship swartz lawrence lessig tim wu peter ludlow frame story two young hackers aaron swartz edward snowden symbolize disruptive dynamic nature internet lives parallel one another free information take system putting directly cross-hairs powerful interests world swartz leads charge defeating stop online piracy act pays heavy price challenges mentor lawrence lessig take call lead crusade restore democracy snowden forced flee country ponder next move february 2015 killswitch invited screen capitol visitor center washington dc congressman alan grayson event held eve federal communications commission decision reclassify internet service providers title ii communications act 1934 congressman grayson harvard professor lawrence lessig free press ceo craig aaron paid homage aaron swartz committed suicide january 2013 prosecution various computer crimes spoke importance protecting free open internet
[ 8161, 3486 ]
Validation
664
5
Rsyslog:rsyslog rsyslog open-source software utility used unix unix-like computer systems forwarding log messages ip network implements basic syslog protocol extends content-based filtering rich filtering capabilities flexible configuration options adds features using tcp transport official rsyslog website defines utility rocket-fast system log processing rsyslog uses standard bsd syslog protocol specified rfc 3164 text rfc 3164 informational description standard various incompatible extensions emerged rsyslog supports many extensions format relayed messages customized important extensions original protocol supported rsyslog rsyslog project began 2004 rainer gerhards primary author rsyslog decided write new strong syslog daemon compete syslog-ng according author new major player prevent monocultures provide rich freedom choice rainer gerhards worked rsyslog inside company adiscon gmbh rsyslog available number unix systems linux distributions among others
[ 3821, 2858, 4382, 1247, 7637, 99, 5571, 7848, 3293, 1435 ]
Test
665
4
Protection_papers:protection papers protection papers also known seamen protection papers seamen protection certificates sailor protection papers issued american seamen last part 18th century first half 20th century papers provided description sailor showed american citizenship issued american sailors prevent impressed british men-of-war period leading war 1812 certificates could issued fee 25 cents required proof citizenship although later changed require notarized affidavit citizenship protection papers also offered remained loyal crown american revolution day richard stockton captured general william howe written proclamation offering protection papers full free pardon willing remain peaceable obedience king george iii although many took pardon stockton never marched perth amboy put irons treated common criminal 1796 federal legislation regarding seaman protection certificates enacted merchant seamen protection papers used define freemen citizenship many black sailors men also used show freemen stopped officials slave catchers also called free papers certified non-slave status many problems protection papers descriptions often vague could apply almost anyone frederick douglass used protection paper free black sailor escape said custom state maryland require free colored people called free papers instrument required renew often charging fee writing considerable sums time time collected state papers name age color height form free man described together scars marks upon person could assist identification device slaveholding ingenuity like devices wickedness measure defeated itself—since one man could found answer general description hence many slaves could escape impersonating owner one set papers often done follows slave nearly sufficiently answering description set forth papers would borrow hire till could means escape free state mail otherwise return owner operation hazardous one lender well borrower failure part fugitive send back papers would imperil benefactor discovery papers possession wrong man would imperil fugitive friend therefore act supreme trust part freeman color thus put jeopardy liberty another might free however infrequently bravely done seldom discovered fortunate sufficiently resemble free acquaintances answer description papers one friend—a sailor—who owned sailor protection answered somewhat purpose free papers—describing person certifying fact free american sailor instrument head american eagle gave appearance authorized document protection hands describe bearer accurately indeed called man much darker close examination would caused arrest start review many protection papers reveals number black men sailors 1800 18 percent one hundred thousand americans sea african americans possible trace number african americans vessels belonging united states unknown number sailed nations seamen protection certificates drawn citizens —as specified blacks used claim citizenship commonly denied—so theory could seized nations records show great statistical variations depending port philadelphia baltimore proportions african americans hovered around 15 percent 1800 1860 new york percentage fell 14 18 percent annually 1830 7 8 percent 1830 1860 savannah georgia dropped around 13 percent 1830 2 percent 1836 proportion black mariners new orleans louisiana also fell averages high teens 1820 around 10 percent 1830s 1 7 percent 1840s 1850s many protection certificates general easy abuse system many impressment officers royal navy paid attention applying duplicate seaman protection certificate 1817 james francis stated 'had protection granted collector port 12 march 1806 torn destroyed british captain sea one way making specific describe tattoo highly personal thus use description identify seaman result many certificates carried information tattoos scars well specific information also perhaps led increase proliferation tattoos among american seamen frequently protection papers made reference tattoos clear evidence individual seafaring man rarely members general public adorn tattoos late eighteenth early nineteenth centuries tattoos much self-expression unique way identify sailor body lost sea impressed british navy best source early american tattoos protection papers issued following 1796 congressional act safeguard american seamen impressment proto-passports catalogued tattoos alongside birthmarks scars race height using simple techniques tools tattoo artists early republic typically worked board ships using anything available pigments even gunpowder urine men marked arms hands initials loved ones significant dates symbols seafaring life liberty poles crucifixes symbols seamen protection certificates discontinued 1940s forms identification american sailors instituted several reports united states house representatives united states senate demonstrated longer needed threat american freedom high seas began disappear protection certificates became valuable identification used 1940 seamen continuous discharge book replaced documents common items maritime collections important research sources american seamen
[]
Test
666
9
Comparison_of_programming_languages_(syntax):comparison programming languages syntax comparison programming languages compares features language syntax format 50 computer programming languages programming language expressions broadly classified four syntax structures programming language statements typically conventions statement separator used demarcate boundaries two separate statements statement terminator used demarcate end individual statement languages interpret end line end statement called line-oriented languages line continuation convention line-oriented languages newline character could potentially misinterpreted statement terminator languages allows single statement span one line line continuation generally done part lexical analysis newline normally results token added token stream unless line continuation detected import library way read external possibly compiled routines programs packages imports classified level module package class procedure ... syntax directive name attributes ... statements also classified whether syntactic convenience allowing things referred shorter name still referred fully qualified name without import whether actually required access code without impossible access code even fully qualified names block notation group two statements expressions units code related way comprise whole comments classified inline comments generally use newline character indicate end comment arbitrary delimiter sequence tokens indicate beginning comment examples block comments generally use delimiter indicate beginning comment another delimiter indicate end comment context whitespace newline characters counted delimiters examples abap supports two different kinds comments first character line including indentation asterisk codice_6 whole line considered comment single double quote codice_210 begins in-line commet acts end line abap comments possible statements codice_211 codice_212 native sql usages characters sql dialects double dash codice_213 used instead wide variety syntax styles declaring comments source code codice_214 italics used indicate block comment style codice_215 italics used indicate inline comment style
[ 3931, 1445, 4302, 3944, 6428, 7902, 6120, 1114, 1879, 1889, 1892, 2619, 5091, 6882, 6172, 6891, 109, 5117, 3368, 4053, 5129, 2659, 486, 2661, 4070, 5855, 5506, 5510, 5164, 5171, 3410, 6585, 3069, 4112, 7333, 8082, 2740, 3106, 6277, 5932, ...
Validation
667
6
Pax_(Unix):pax unix pax archiving utility created posix defined posix.1-2001 standard rather sort incompatible options crept codice_1 codice_2 along implementations across various versions unix ieee designed new archive utility could support various archive formats including new format basically tar additional extended attributes name pax acronym portable archive exchange command invocation structure somewhat unification codice_1 codice_2 pax four general modes invoked combination read write options table summarizes modal behaviour examples list contents archive extract contents archive current directory create archive current directory used codice_2 style codice_6 command used get list files archived copy current directory tree another location target directory must exist beforehand pax used similar manner either codice_2 codice_1 codice_2 syntax takes list files standard input stdin archiving already existing archive listing contents extracting files respectively possible invoke commands codice_1-like syntax well clarity completeness listing files archive copy mode option specifies archive use instead writing stdout reading stdin also note option using pax together find keeps pax traversing directory trees implementations pax use gzip bzip2 switches compression feature however specified posix important note pax append compressed archives example extracting gzipped archive due possibility using pax codice_2-like fashion possible use whatever compression program example xz used listing xz-compressed archive september 2009 version pax included linux distributions derivative old mirbsd pax supports following formats selectable via option notably pax format supported version pax implementations heirloom pax support formats including pax file format pax supports archiving multiple volumes end volume reached following message appears restoring archive multiple media pax asks next media fashion end media reached end archive despite standardized 2001 ieee 2010 pax enjoys relatively little popularity adoption pax required present conformant systems linux standard base since version 3.0 released july 6 2005 far linux distributions ship install default however distributions include pax separately installable package pax also present windows nt limited file archives tapes supported later moved interix subsystem support archiving restoring win32 acls packages handled installer os x often carry bulk contents archive.pax.gz file may read using pax utility
[ 361, 6789, 2817, 366, 3685, 4387, 4662, 8165, 6256, 3085, 1537, 2834, 4283, 1837, 5480, 569, 3106, 5571, 658, 923, 5933, 5138, 1389, 1572, 5942, 6648, 7378, 3984, 2589, 5946, 1213, 3219, 7667, 6050, 7494, 6242, 169, 7868, 3417, 3587, 57...
Test
668
3
UGV_Interoperability_Profile:ugv interoperability profile ugv interoperability profile ugv iop robotics autonomous systems – ground iop ras-g iop simply iop originally initiative started united states department defense dod organize maintain open architecture interoperability standards unmanned ground vehicles ugv primary goal initiative leverage existing emerging standards within unmanned vehicle uxv community society automotive engineers sae as-4 joint architecture unmanned systems jaus standard army unmanned aircraft systems uas project office iops iop initially created u.s. army robotic systems joint project office rs jpo currently maintained u.s. army project manager force projection pm fp plural form interoperability profiles iops typically refers set documents comprise iop intended usage iops approved public release national advanced mobility consortium namc makes iops available https //namcgroups.org website registered users system perspective iop defined address interoperability multiple levels within varying systems configurations e.g key solution utilization jaus establish common message passing layer software components system iop specifies rules use standard jaus messages well custom extensions standard message set interoperability hardware components iop also includes specification hardware plugs mounts dod intends publish revisions iop every year current version iop version 2.0 iopv2 release version 3.0 scheduled end 2017 since version 3.0 whole set iop documents auto-generated xml files iops consist following documents validate conformance ugv components iop attributes jaus profiling rules tardec developed software tool called conformance validation tool cvt cvt client tool checks interface jaus messages protocol state required jaus services cvt uses original iop xml-files generate test messages thus cvt considered iop reference implementation nato team experts ugv recommended iop become nato stanag proposal considered nato land capability group land engagement lcg le prove applicability iop military robots nato team experts ugv conducted several interoperability exercises demonstrations several robotics companies already support iop-compliant interfaces software hardware products several academic robotics contests like iop challenge intelligent ground vehicle competition european robotics hackathon enrich recommend require iop common interface definition iop relies message passing architecture jaus iop-compliant software connected robotics middlewares translating software bridges studies shown iop-compliant software coexist ros-based robotics software
[ 2087, 3531, 4482, 7321 ]
Test
669
2
COM_Structured_Storage:com structured storage com structured storage variously also known com structured storage ole structured storage technology developed microsoft part windows operating system storing hierarchical data within single file strictly speaking term structured storage refers set com interfaces conforming implementation must provide specific implementation specific file format fact structured storage implementation need store data file addition providing hierarchical structure data structured storage may also provide limited form transactional support data access microsoft provides implementation supports transactions well one called simple-mode storage latter implementation limited ways well although performs better structured storage widely used microsoft office applications although newer releases starting office 2007 use xml-based office open xml default also important part com related object linking embedding ole technologies notable applications structured storage include sql server windows shell many third-party cad programs structured storage addresses inherent difficulties storing multiple data objects within single file one difficulty arises object persisted file changes size due update application reading/writing file expects objects file remain certain order everything following object representation file may need shifted backward make room object grows forward fill space left object shrinks file large could result costly operation course many possible solutions difficulty often application programmer want deal low level details binary file formats structured storage provides abstraction known stream represented interface codice_1 stream conceptually similar file codice_1 interface provides methods reading writing similar file input/output stream could reside memory within file within another stream etc. depending implementation another important abstraction storage represented interface codice_3 storage conceptually similar directory file system storages contain streams well storages application wishes persist several data objects file one way would open codice_3 represents contents file save objects within single codice_1 one way accomplish latter standard com interface codice_6 ole depends heavily model embed objects within documents microsoft implementation uses file format known compound files widely deployed structured storage implementations read write format compound files use fat-like structure represent storages streams chunks file known sectors may may correspond sectors underlying file system allocated needed add new streams increase size existing streams streams deleted shrink leaving unallocated sectors sectors reused new streams following applications use ole structured storage compound document format beta testing phase windows 2000 included feature titled native structured storage nss storage structured storage documents like binary microsoft office formats codice_7 file windows explorer uses cache thumbnails stream makes document stored separate ntfs data stream included utilities automatically split streams regular structured storage document ntfs data streams vice versa however feature withdrawn beta 3 due incompatibilities os components nss files automatically converted single data stream format
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 422, 6844, 2245, 435, 5442, 4377, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6558, 6575, ...
Test
670
7
Really_Simple_Systems:really simple systems really simple systems crm cloud crm provider offering crm systems small medium sized companies company states mission everything small business needs manage sales marketing really simple systems crm founded 2004 john paterson former ceo zeus technology coo systems union public launch january 2006 really simple systems crm 17,000 users hosted customer relationship management systems customers include royal academy red cross nhs ibm well thousands small medium sized companies company headquartered united kingdom office australia company software satisfaction awards best small business crm system twice 2008 2010 2011 company eurocloud award database marketing award 2014 best cloud application annual eurocloud awards finalist crm idol november 2017 pc mag listed really simple systems best lead management software article 2018 company finalist small businesss awards business innovation devops excellence awards 2019 2018 company listed 40 100 best tech companies uk g2 crowd october 2006 company marketing module launched initially offering campaign management email marketing added august 2012 october 2010 company launched free edition freemium two user hosted crm system existing product renamed enterprise edition may 2013 company accredited entry uk government gcloud cloudstore catalogue john paterson ceo really simple systems awarded crm idol citizen year 2014 july 2013 really simple systems launched cross-platform version crm running seamlessly desktops laptops tablets smartphones january 2015 company upgraded email marketing offer built-in alternative third party products mailchimp constant contact version 5 launched march 2017 offered new user interface custom dashboards help drawers grid customisation september 2017 company announced compliance european union general data protection regulation gdpr phased roll-out gdpr compliance features email marketing module february 2018 launched set gdpr compliance tools allowing users email marketing module collect consent digital marketing communications company headquartered petersfield hampshire united kingdom january 2008 company opened first overseas office sydney australia four really simple systems crm pricing plans product consists three modules really simple systems crm delivered software service application version 5 product written using lamp stack version 4 previous versions used microsoft technology javascript used client current version uses html5 responsive design deliver cross-platform availability applications runs two geographically dispersed datacentres automated failover achieve 99.999 uptime
[ 2961, 1229, 2451, 4387, 330, 2442, 740 ]
Test
671
4
Watering_hole_attack:watering hole attack watering hole computer attack strategy victim particular group organization industry region attack attacker guesses observes websites group often uses infects one malware eventually member targeted group becomes infected hacks looking specific information may attack users coming specific ip address also makes hacks harder detect research name derived predators natural world wait opportunity attack prey near watering holes websites often infected zero-day vulnerabilities browsers software defense known vulnerabilities apply latest software patches remove vulnerability allowed site infected assisted users ensure software running latest version additional defense companies monitor websites networks block traffic malicious content detected country-level watering-hole attack china late 2017 march 2018 group luckymouse also known iron tiger emissarypanda apt 27 threat group-3390 organization-level watering-hole attack montreal 2016-2017 unknown entity causing data breach august september 2017 installation binary ccleaner distributed vendor download servers included malware ccleaner popular tool used clean potentially unwanted files windows computers widely used security-minded users distributed installer binaries signed developer certificate making likely attacker compromised development build environment used insert malware june 2017 notpetya also known expetr malware believed originated ukraine compromised ukrainian government website attack vector users site downloading malware erases contents victims hard drives late 2016 polish bank discovered malware computers belonging institution believed source malware web server polish financial supervision authority reports financial losses result hack early 2013 attackers used united states department labor website gather information users information attack specifically targeted users visiting pages nuclear-related content december 2012 council foreign relations website found infected malware zero-day vulnerability microsoft internet explorer attack malware deployed users using internet explorer set english chinese japanese korean russian
[ 3957, 2791 ]
Validation
672
3
Aaargh!:aaargh aaargh single-player action video game player controls giant monster goal obtaining eggs destroying buildings different cities across lost island designed mastertronic arcadia systems arcade machine based custom hardware amiga released 1987 ported range platforms released across 1988 1989 electronic arts distributed amiga version game goal game find golden dragon egg player controls one two monsters must destroy buildings order find roc eggs discovery triggers fight rival monster five eggs found two monsters fight volcano claim dragon egg game action game fighting game elements player chooses play either dragon-like lizard ogre depicted cyclops game character player select becomes player rival obtain egg arcade version game either one two players could play simultaneously whereas ports one player could play time gameplay takes place across ten cities lost island representing different era civilisation ancient egypt wild west comprising one level game city represented single static playing area uses form 2.5d projection order give impression depth screen game received mixed reviews gaming magazines across platforms ported scores ranging around 2/10 equivalent almost 9/10 reviewers praised graphics sound particularly amiga port criticised gameplay ace magazine said although game good graphics atmospheric sound good gameplay enough challenge game players would want spend much time playing game know beat easily zx spectrum reviewers unimpressed fact game required levels loaded individually sinclair magazine describing multi-level multi-load beat 'em blowtorch 'em 'll screaming title time die reload game reviewed 1989 dragon 141 patricia hartley kirk lesser role computers column reviewers normally assign rating game ranging 1 5 stars disliked game much ranked x instead
[ 6380 ]
Test
673
3
Indiana_Jones_and_the_Temple_of_Doom_(1985_video_game):indiana jones temple doom 1985 video game indiana jones temple doom 1985 action arcade game developed published atari games based 1984 film name second film indiana jones franchise also first atari system 1 arcade game include digitized speech including voice clips harrison ford indiana jones amrish puri mola ram well john williams music film player assumes role indiana jones infiltrates lair evil thuggee cult armed trademark whip controls consist eight-position joystick button use whip player ultimate goal free children cult kidnapped slaves recover stolen relics known sankara stones escape temple defeat cult leader mola ram selecting one three difficulty levels player progresses three stages based different scenes film one life lost whenever indy touches hazard enemy character falls great height crashes mine cart falls lava whip used destroy stun enemies swing across gaps mines cycle repeats four times adding hazards time fourth repetition altar scene replaced final confrontation mola ram rope bridge river player completes scene mola ram falls death player advances bonus stage mines picking golden statues extra points stage continues remaining lives lost ports game later developed paragon programming released u.s. gold amstrad cpc commodore 64 msx zx spectrum 1987 game went number 2 uk sales charts behind renegade year mindscape ported atari st commodore 64 different compared u.s. gold version 1989 mindscape ported commodore amiga personal computers use ms-dos nes version ported tengen december 1988 apple // version ported papyrus design group june 1989 tengen computer video games reviewing zx spectrum amstrad cpc atari st versions called game quite accurate splendid conversion particularly atari st version magazine praised game playability criticized difficulty sound effects jonathan sutyak allgame gave commodore 64 version one half stars five called game major disappointment sutyak criticized gameplay terrible controls wrote graphically game mess game brown gray unappealing ... sounds great either bit better graphics theme music plays background best part game sound effects sharp enough exist indiana jones temple doom bad game way around looks bad bad controls way short
[ 1237, 6380 ]
Validation
674
1
InterSystems_Caché:intersystems caché intersystems caché commercial operational database management system intersystems used develop software applications healthcare management banking financial services government sectors customer software use database object sql code caché also allows developers directly manipulate underlying data structures hierarchical arrays known technology internally caché stores data multidimensional arrays capable carrying hierarchically structured data “ global ” data structures used mumps programming language influenced design caché similar used multivalue also known pick systems applications however object and/or sql access methods used caché objectscript caché basic t-sql used develop application business logic external interfaces include native object binding c++ java ejb activex .net caché supports jdbc odbc relational access xml web services also supported caché server pages csp technology allows tag-based creation web applications generate dynamic web pages typically using data caché database caché also includes intersystems zen implementation ajax enables component-based development rich web applications intersystems founded 1979 commercialize mumps hierarchical databases launched caché 1997 flagship product time ceased development original mumps product line intersystems claims caché world ’ fastest object database however high performance achieved transactional operations significantly hierarchical nature database management system dbms used part hospital patient tracking electronic medical record medicine management systems products developed companies epic systems well vista system used u.s. department veteran affairs sungard includes caché addvantage asset management software finance industry customers banks telecommunications vendors bt group vodacom also use caché db-engines website ranked caché popular object-oriented dbms every month since march 2013 caché runs windows linux solaris hp-ux aix macos openvms platforms
[ 4759, 900, 4769, 8183, 4946, 6986, 4142, 6991, 5571, 578, 4439, 6858, 2530, 4463 ]
Validation
675
9
Joe_Armstrong_(programmer):joe armstrong programmer joseph leslie armstrong 27 december 1950 – 20 april 2019 computer scientist working area fault-tolerant distributed systems best known author erlang programming language armstrong born bournemouth 1950 17 armstrong began programming fortran school district mainframe experience helped physics studies university college london debugged programs fellow students exchange beer working ericsson computer science lab helped develop erlang 1986 received ph.d. computer science royal institute technology kth stockholm sweden 2003 dissertation titled making reliable distributed systems presence software errors professor kth since 2014 died 20 april 2019 infection complicated pulmonary fibrosis peter seibel wrote originally physicist switched computer science ran money middle physics phd landed job researcher working donald michie—one founders field artificial intelligence britain michie lab armstrong exposed full range ai goodies becoming founding member british robotics association writing papers robotic vision funding ai dried result famous lighthill report back physics-related programming half decade first eiscat scientific association later swedish space corporation finally joining ericsson computer science lab invented erlang working ericsson 1986 joe armstrong one designers implementers erlang along robert virding mike williams 1986 armstrong developed erlang released open source 1998
[ 2803 ]
Test
676
5
TCP_Port_Service_Multiplexer:tcp port service multiplexer tcp port service multiplexer tcpmux little-used internet protocol defined rfc 1078 specification describes multiplexing service may accessed network protocol contact one number available tcp services host single well-known port number specification tcpmux rfc 1078 deprecated 2016 rfc 7805 technical reasons lack use internet host may connect server supports tcpmux protocol tcp port 1 host sends name service required followed pair carriage return line feed characters crlf server replies '+ '- character optional message followed crlf case positive reply '+ protocol service requested started otherwise connection closed service also features reserved name help remote server receives message output multi-line message listing names supported services one service name per line enabling tcpmux server enables attacker easily find services running host either using help command requesting large number services effect port scanning host available services iteratively tcpmux allows someone use service accessing port number 1 protocol makes difficult apply traditional port-based firewall rules block access certain hosts specific services
[ 5847, 7637, 2117, 4914 ]
Test
677
3
ARM_Cortex-A57:arm cortex-a57 arm cortex-a57 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings cortex-a57 out-of-order superscalar pipeline available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc january 2014 amd announced opteron a1100 intended servers a1100 four eight cortex-a57 cores support 128 gib ddr3 ddr4 ram eight-lane pcie controller eight sata 6 gbit/s ports two 10gige ports a1100 series released january 2016 four eight core versions qualcomm first offering made available sampling q4 2014 snapdragon 810 contains four cortex-a57 four cortex-a53 cores big.little configuration samsung also provides cortex-a57-based soc first one exynos octa 5433 available sampling q4 2014 march 2015 nvidia released tegra x1 soc four a57 cores running maximum 2 ghz
[ 6421, 7890, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5406, 1864, 67, 6148, 446, 451, 6874, 6165, 463, 5472, 469, 4041, 3008, 3365, 6910, 5845, 7654, 3397, 1977, 2339, 2711, 1995, 550, 4847, 3786, 568, 2024, 5576, 4879, 7376, 5585, 4166,...
Validation
678
2
UXP/DS:uxp/ds uxp/ds discontinued unix operating system developed fujitsu line workstations network servers uxp/ds based system v release 4 svr4 targets fujitsu ds/90 7000 series computers well gp7000 series computers 1991 fujitsu announced ds/90 7000 series workstations servers powered sparc processors running uxp/ds operating system 1998 fujitsu new gp7000 series granpower 7000 divided three parts series represented previous systems running uxp/ds series represented new systems also running uxp/ds series f represented new systems running solaris operating system gp7000f running solaris became basis later lines fujitsu unix servers 1999 uxp/ds ds/90 7000 series one reference platforms common desktop environment cde 2000 fujitsu released new primepower line unix servers solaris available option operating system
[ 578, 5571, 3751, 2118, 971, 5232 ]
Validation
679
7
Stratoscale:stratoscale stratoscale software company offering software-defined data center technology marketed term hyper-converged infrastructure cloud computing capabilities stratoscale combines compute storage networking hardware additional third party software stratoscale founded 2013 ariel maislos stratoscale headquartered israel offices herzliya haifa offices north america sunnyvale california boston massachusetts new york city new york stratoscale announced stratoscale symphony december 2015 selling channel partners stratoscale raised 70 million battery ventures bessemer venture partners intel capital cisco leslie ventures qualcomm ventures sandisk stratoscale symphony marketed software-defined data centers hyper-converged infrastructure software intended work customers hardware stratoscale symphony available subscription basis symphony suite may deployed commodity x86 servers provide amazon web services aws capability capacity augment legacy vmware 2016 stratoscale released symphony 3 stratoscale channel partners technology partners system partners channel partners consist resellers integrators distributors technology partners include cloudendure cloudera docker hortonworks intel mellanox technologies midokura openstack sandisk system partners adjust server configurations environments system partners include cisco hewlett packard enterprise hpe infinidat lenovo supermicro
[ 6506, 2961, 1134, 4295, 4692, 5064, 4783, 352 ]
Train
680
3
Batman_(1986_video_game):batman 1986 video game batman 1986 3d isometric action-adventure game ocean software amstrad pcw amstrad cpc zx spectrum msx first batman game developed game received favourable reviews unrelated batman game released two years later titled object game rescue robin collecting seven parts batcraft hovercraft scattered around batcave gameplay takes place 3d isometric universe programmer jon ritman artist bernie drummond would develop 1987 head heels notable implementing early example save game system allows players restart intermediate point game loss lives rather returning way start case point batman collects batstone batman received well computer game press time crash gave rating 93 sinclair scored 9/10 sinclair user gave five stars rated classic game went number 2 uk sales charts behind world cup carnival freeware remake called watman produced pc 2000 dos game remake called gwatman also written game boy advance remake pc produced retrospec remake msx2 produced aamsx fx software msx ru 2014
[ 2175, 4060 ]
Train
681
4
AFX_Windows_Rootkit_2003:afx windows rootkit 2003 afx windows rootkit 2003 user mode rootkit hides files processes registry installer rootkit executed installer creates files iexplore.dll explorer.dll system directory iexplore.dll injected explorer.exe explorer.dll injected running processes injected dlls hooks windows api functions hide files processes registry encyclopedia entry trojan win32/delf.m learn malware microsoft malware protection center
[ 1710, 4017, 6823 ]
Test
682
2
JLIVECD:jlivecd jlivecd open source cli command line interface based live cd/dvd customization tool debian arch linux ubuntu family distributions linux mint derivatives host system restricted live cd/dvd system e.g arch linux live cd modified ubuntu host ubuntu live cd modified debian host etc. tool released gpl-2 primarily intended non-commercial use developed help documentation found livecdcustomization written ubuntu community debian/modify/cd debian wiki remastering install iso arch linux wiki one needs know customization methods make use tool customization prepares environment customization automates task creating customized live cd/dvd iso image base iso image needed customization brought upon resulting iso image burnt cd dvd bootable live usb also prepared use
[ 4638, 3919, 3271 ]
Train
683
3
Columns_(video_game):columns video game columns one many samegame/tetris -like tile-matching puzzle games appear great success late 1980s area play enclosed within tall rectangular playing area columns three different symbols differently-colored jewels appear one time top well fall bottom landing either floor top previously-fallen columns column falling player move left right also cycle positions symbols within column lands three symbols connected horizontal vertical diagonal line symbols disappear pile columns settles gravity resettlement causes three symbols align disappear cycle repeats occasionally special column multicolor magic jewel appears destroys jewels color one underneath columns fall faster rate player progresses goal game play long possible well fills jewels ends game players score 99,999 points ports game offer alternate game modes well flash columns involves mining way set number lines get flashing jewel bottom doubles allows two players work together well time trial involves racking many points possible within time limit columns first pack-in game sega game gear version slightly different sega genesis version soundtrack transposed rearranged due limitations handheld sound chip columns updated genesis version overall decoration less like cartoon game gear version instead artistically designed lastly game gear version feature let player change jewels fruit squares dice card shapes clubs diamonds spades many sequels spin-offs produced columns ii voyage time columns iii revenge columns columns '97 1 2 many compilations re-releases columns arcade collection sega ages vol 07 columns well columns made sega versions made available master system genesis sega cd game gear saturn dreamcast additional versions game also made available pc engine game boy advance playstation 2 super famicom version released japan via nintendo power service game boy color version specifically called columns gb osamu tezuka characters featured many characters kimba astroboy also featured slightly less known characters unico november 7 2006 columns released part game sega genesis collection playstation 2 later another release compilation playstation portable december 4 2006 title released nintendo virtual console 800 wii points also included sonic ultimate genesis collection playstation 3 xbox 360 recently game ported ios sega columns also cloned many times across different platforms tokuhiko uwabo composed music columns song clotho named greek moira name related greek flavor game art main songs titled atropos lathesis sic moirai reviewing game appearance sega arcade classics sega cd glenn rubenstein gave b+ describing like tetris bit better mega placed game number 34 top mega drive games time
[ 7583, 5526, 3518, 2934, 7854 ]
Test
684
9
Query_language:query language query languages data query languages dqls computer languages used make queries databases information systems broadly query languages classified according whether database query languages information retrieval query languages difference database query language attempts give factual answers factual questions information retrieval query language attempts find documents containing information relevant area inquiry examples include
[ 3928, 4303, 1449, 4306, 3951, 6092, 6430, 6098, 3289, 6462, 1861, 6128, 7205, 5419, 7937, 7213, 6144, 1891, 4743, 1902, 784, 2265, 1905, 2624, 6507, 7248, 105, 2286, 3005, 7981, 3011, 7640, 4054, 6543, 2663, 7999, 4798, 6932, 517, 7303, ...
Test